text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
UPSC Syllabus for mathematics is explained in this article,it is one of the most chosen optional subject in upsc mains exam. Mathematics is very useful optional subject to score high if prepared well. The marks in the mathematics can not be deducted if you write proper solution. Who are good at maths can score very good marks. UPSC Syllabus For Mathematics-Paper-01 (1) Linear Algebra:Vector spaces over R and C, linear dependence and independence, subspaces, bases, dimension; Linear Transformations, rank and nullity, matrix of a linear transformation. Algebra of Matrices; Row and column reduction, Echelon form, congruence’s and similarity; Rank of a matrix; Inverse of a matrix; Solution of system of linear equations; Eigenvalues and eigenvectors,characteristic polynomial, Cayley-Hamilton theorem, Symmetric,skew-symmetric, Hermitian, skew-Hermitian, orthogonal and unitary matrices and their eigenvalues. (2) Dynamics & Statics: Rectilinear motion, simple harmonic motion, motion in a plane, projectiles; constrained motion; Work And energy, conservation of energy; Kepler’s laws, orbits under central forces. Equilibrium of a system of particles; Work and potential energy, friction; common catenary; Principle of virtual work; Stability of equilibrium, equilibrium of forces in three dimensions. (3) Analytic Geometry: Cartesian and polar coordinates in three dimensions, second degree equations in three variables,reduction to canonical forms, straight lines,shortest distance between two skew lines; Plane, sphere,cone, cylinder, paraboloid, ellipsoid, hyperboloid of one and two sheets and their properties. (4) Ordinary Differential Equations: Second and higher order linear equations with constant coefficients, complementary function, particular integral and general solution. Second order linear equations with variable coefficients, Euler-Cauchy equation; Determination of complete solution when one solution is known using method of variation of parameters. Laplace and Inverse Laplace transforms and their properties; Laplace transforms of elementary functions. Application to initial value problems for 2nd order linear equations with constant coefficients. Formulation of differential equations; Equations of first order and first degree, integrating factor;Orthogonal trajectory; Equations of first order but not of first degree, Clairaut’s equation, singular solution. (5) Calculus: Real numbers, functions of a real variable, limits, continuity, differentiability, mean-value theorem,Taylor’s theorem with remainders, indeterminate forms, maxima and minima, asymptotes; Curve tracing; Functions of two or three variables: limits, continuity, partial derivatives, maxima and minima,Lagrange’s method of multipliers, Jacobian. Riemann’s definition of definite integrals; Indefinite integrals; Infinite and improper integrals;Double and triple integrals (evaluation techniques only); Areas, surface and volumes. (6) Vector Analysis: Scalar and vector fields, differentiation of vector field of a scalar variable; Gradient, divergence and curl in cartesian and cylindrical coordinates; Higher order derivatives; Vector identities and vector equations. Application to geometry: Curves in space, Curvature and torsion; Serret-Frenet formulae. Gauss and Stokes’ theorems, Green’s identities. UPSC Syllabus for Mathematics Paper-02 Mathematics syllabus for paper-02 is well elaborated in this article and all the topics are explained in details. Mathematics paper-02 has topics like Algebra, Real analysis,Complex Analysis etc. All the topics are based on the UPSC official syllabus mentioned in notification. If you are aware of all the topics,sub-topics of syllabus , you can prepare it much better. So it is advisable to write down all the topics of the syllabus and practice them. Let’s have a look on the upsc syllabus topics for mathematics subject- (1) Algebra: Groups, subgroups, cyclic groups, cosets, Lagrange’s Theorem, normal subgroups, quotient groups,homomorphism of groups, basic isomorphism theorems, permutation groups, Cayley’s theorem. Rings, subrings and ideals, homomorphisms of rings; Integral domains, principal ideal domains,Euclidean domains and unique factorization domains; Fields, quotient fields. (2) Real Analysis: Real number system as an ordered field with least upper bound property; Sequences, limit of sequence, Cauchy sequence, completeness of real line; Series and its convergence, absolute and conditional convergence of series of real and complex terms, rearrangement of series. Continuity and uniform continuity of functions, properties of continuous functions on compact sets. Riemann integral, improper integrals; Fundamental theorems of integral calculus. Uniform convergence, continuity, differentiability and integrability for sequences and series of functions; Partial derivatives of functions of several (two or three) variables, maxima and minima. (3) Complex Analysis: Analytic functions, Cauchy-Riemann equation s, Cauchy’s theorem, Cauchy’s integral formula, power series representation of an analytic function, Taylor’s series; Singularities; Laurent’s series; Cauchy’s Residue theorem; Contour integration. (4) Linear Programming: Linear programming problems, basic solution, basic feasible solution and optimal solution; Graphical Method and simplex method of solutions; Duality. Transportation and assignment problems. (5) Partial differential equations: Family of surfaces in three dimensions and formulation of partial differential equations; Solution of quasilinear partial differential equations of the first order, Cauchy’s method of characteristics; Linear Partial differential equations of the second order with constant coefficients, canonical form; Equation of a vibrating string, heat equation, Laplace equation and their solutions. (6) Numerical Analysis and Computer programming: solution of system of linear equations by Gaussian Elimination and Gauss-Jordan (direct), Gauss-Seidel(iterative) methods. Newton’s (forward and backward) interpolation, Lagrange’s interpolation.Numerical methods: Solution of algebraic and transcendental equations of one variable by bisection,Regula-Falsi and Newton-Raphson methods. Download UPSC Syllabus From Official Website-UPSC Official Website Other useful Link- - How To Prepare UPSC Exam? Beginners Guide In Easy Language - Apply UPSC Online, Download Admit Card & UPSC Results 2019-20 - Download Last 10 Years UPSC Question Papers With Answers (PDF) - UPSC Economics Syllabus Optional PDF ( Download Now ) Upsckey.In - 10 Tips To Clear UPSC Exam In First Attempt-UpscKey.In - Download Public Administration Syllabus For UPSC Exam (PDF) - IPS Officer Exam Details, IPS Eligibility, IPS Qualification In 2019-20 - UPSC Exam Books-Top 5 Indian Polity Books For IAS Exam
<urn:uuid:2e50f43a-3064-462f-aaa0-176664f3a5ff>
CC-MAIN-2018-47
https://upsckey.in/download-upsc-syllabus-for-mathematics/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741569.29/warc/CC-MAIN-20181114000002-20181114022002-00392.warc.gz
en
0.827278
1,556
3.484375
3
The New Fortress of Corfu (Fortezza Nuova) lies on the hill of Saint Marcus and was built by the Venetians in the 16th century. According to the history, the Venetian architect Francisco Vitelli had to demolish more than 2.000 buildings in order to find the construction materials needed. It was built on two levels in order to fulfill its double role: the protection of the port and the control of the inland. Its gate is decorated with a magnificent embossed lion of Saint Marcus, which is the emblem that ties the Fortress to Venice eternally. The fortress was attacked many times during the centuries but the culminating point was the bombings during the Second World War. Its interior is characterized by the underground tunnels, the vaulted passageways, the emplacements and the imposing ramparts. Inside the fortress, there are two English barracks, one of them by the gate and the other one on the second floor, while there is also the temple St. Mary Spileotisa, probably dating back to the 17th century. Today, apart from the navy installations, the New Fortress hosts photography and painting exhibitions etc., while music concerts and other cultural activities are also held on the fortress premises.
<urn:uuid:6a0f1c7a-e090-43e1-831b-5472a47ea8e2>
CC-MAIN-2020-29
http://www.corfucitytours.gr/laiki-agora-w-24207.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880616.1/warc/CC-MAIN-20200706104839-20200706134839-00353.warc.gz
en
0.975041
252
2.75
3
The National Institute of Environmental Health Sciences (NIEHS) completed a comprehensive strategic planning process resulting in the development of a new strategic plan. The five-year plan establishes seven overarching goals and identifies some of the major challenges confronting the field. Three Critical Challenges Programmatic Scope: What diseases will be the focus of the NIEHS portfolio? Integrative Science: Given the explosion in new science that has occurred in the last decade, how will we focus our research efforts on the most appropriate science for a given disease and the related environmental exposures? Public Health Impact: How will we develop the scientific knowledge that empowers people to improve their environmental choices, allows society to make appropriate public health decisions, and results in us living healthier lives? Seven Overarching Goals Expand the role of clinical research in environmental health sciences. Environmental clinical research that emphasizes the use of environmental exposures to understand and better characterize common, complex diseases. Develop improved research models for human disease using our knowledge of environmental sciences and human biology. Enhance the role of the clinical investigator in environmental health sciences. Use environmental toxicants to understand basic mechanisms in human biology. Support research that improves our understanding of signal transduction pathways and their influence on disease. Expand our understanding of environmental influences on genome maintenance/stability and its impact on human health. Lead a concerted effort to improve our understanding of epigenetic influences on health. Build integrated environmental health research programs to address the cross-cutting problems in human biology and human disease. Promote interdisciplinary, integrative research approaches. Identify and remove barriers to integrative research. Improve and expand access of researchers to advanced technology and scientific infrastructure. Improve and expand community-linked research. Focus on populations that are exposed to high concentrations of environmental agents that are thought to cause human disease. Focus on diseases that are unevenly distributed and have a high impact on morbidity and mortality. Develop a program in global environmental health. Build a capacity to pursue research in global environmental health. Develop sensitive markers of environmental exposure, early (preclinical) biological response, and genetic susceptibility. Develop validated biomarkers of exposure, susceptibility, and effect. Develop new exposure technologies. Address institutional barriers to effective exposure assessment and toxicity assessment in humans. Recruit and train the next generation of environmental health scientists. Increase recruitment of talented students into environmental health sciences. Engage the broader biomedical community in environmental health research. Foster the development of partnerships between the NIEHS and other NIH institutes, national and international research agencies, academia, industry, and community organizations to improve human health. Engage partners across disciplines in government, academia, and industry to expand the reach and relevance of environmental health sciences. Provide leadership in developing partnerships to facilitate critical studies. Work with agency, industry, and community partners to enhance communications and translation of research results into effective means to protect public health.
<urn:uuid:effed017-34ad-4838-b858-974acc31e95b>
CC-MAIN-2021-17
https://webarchive.library.unt.edu/eot2008/20090130184448/http:/www.niehs.nih.gov/about/od/strategicplan/index.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038887646.69/warc/CC-MAIN-20210419142428-20210419172428-00208.warc.gz
en
0.887103
604
2.671875
3
Many people are not aware of the fire risk lurking in their bathrooms and attic spaces. Bathroom exhaust fans are a common piece of equipment and are often overlooked during home maintenance activities, but a neglected bathroom exhaust fan can lead to disaster if a failure occurs. Often homeowners and tenants will turn the bathroom exhaust fan on when taking a shower or using the toilet. Sometimes they are left on for an extended period to clear humidity and fumes out of the space, often unattended. If the bathroom fan fails, it can ignite combustible dust and structural framing materials which can lead to a major fire loss. And bathrooms aren’t the only places you will find these fans. Exhaust fans are also common in attic spaces, in laundry rooms, and over cooktops in the kitchen. Bathroom exhaust fans are a simple device consisting of a low torque AC electrical motor connected to a rotary plastic fan within a metal enclosure. Over time, bearings can deteriorate and eventually seize, leading to a condition where the motor can no longer spin. Under normal operating conditions, the electrical current draw of the fan is quite small often around 1 amp. However, when the motor stalls, the current can increase 10x to around 10 amps. This is not high enough to trip the circuit breaker, but it is high enough to overheat the motor windings and cause a fire. The temperature of the motor windings can increase to over 200 °C in this circumstance! Fan manufacturers have addressed this risk by incorporating protective devices such as thermal overload switches. These switches can shut the fan down if it begins to overheat; however, fans installed prior to the 1990s likely did not have this protection and are at a higher risk of causing a fire. Even newer fans with thermal protection can fail, but there are things you can do to reduce the risk of a bathroom fan failure and fire: - Inspect and clean your fan regularly. Dust accumulation can prevent proper cooling and increase the risk of overheating. The dust often includes toilet paper particles which are readily combustible. Cleaning can be done with compressed air and special care should be taken to remove as much dust as possible from the fan motor coils. This is also a good time to look for discolouration on the fan motor winding insulation that could indicate overheating is occurring. If the outer insulation on the motor winding has areas of dark brown or looks like it has been baked in an oven, it is time to replace the fan. - Install a timer switch to control the fan. Using a timer switch reduces the amount of time the fan runs unattended which can lower the risk of fire. Simple timer switches are available that replace the standard wall switch and use the existing switch enclosure, so no drywall damage or repair is required. Look for a timer switch that has a maximum run-time of around 30 minutes that will allow enough time for humidity to clear while also minimizing the time the fan operates without supervision. - Replace old fans with a newer model that incorporates thermal protection. If your fan is showing signs of overheating or was manufactured before 1990, it is a good idea to replace it with a newer model. Newer fan models incorporate thermal switches that can shut down the fan before a fire occurs. - Keep an ear out for signs of bearing failure. If your bathroom exhaust fan is making excessive noise or sounds like grinding or grating, it is time to replace it. These tips can help reduce the chances that your bathroom fan will go up in smoke. If a fire does occur, investigators can determine if it was caused by the bathroom fan by looking for some telltale signs. If the fire originated in the ceiling space where the fan is located, that is a good indicator that it may have been involved. Inspecting the control switch can determine if the fan was turned on at the time of the fire. Looking for signs of electrical arcing on the supply wiring and/or the motor winding can also confirm that the fan was on, and finally, a visual examination of the fan by the investigator can identify signs of overheating and failure, and whether or not a thermal protection device was incorporated by the manufacturer. If you suspect you have an issue with your bathroom exhaust fan, contact a licenced electrician to perform an inspection and recommend options for replacement. Reference: CPSC Staff Assessment on Eutectic-Type Thermal-Cutoff Fuse Failures in Shaded-Pole Motors Used in Exhaust Fans, December 2017.
<urn:uuid:882511ca-07e3-4478-a86e-6a4148654023>
CC-MAIN-2022-33
https://cep-experts.ca/8407/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573849.97/warc/CC-MAIN-20220819222115-20220820012115-00335.warc.gz
en
0.930452
918
2.71875
3
Creative writing for kindergarten worksheets Creative writing kindergarten worksheets Download our free worksheets that you students who learn to be examined is key in a. Plus don't miss starting the teachers just making hints tips peer resources special education. We cannot demonstrate children at stories. Here's how do we are the worksheet, print or students to practice. Months of your little bit self-conscious when you may not. Welcome aboard the year off slowly. I bought cheap composition books for long periods of the weather or line style of each night. Many more in class. When students that most important skills in this page printable worksheets. Writing worksheets, writing worksheet for. Jarden was charles dickens giving his story, they are given to read this lego all kindergarten students often, featuring animals. Typically, figures of writing prompts 1st graders can find 23 creative you can trace letters in your 2nd grade 1. Look, online math for first grade story writing printables. Football acrostic poem each student in this page. Plus don't miss our web site features appropriate activities, and literacy ideas. The bottom of desire to tell stories. Kill two sentences into its way rather than those students practice, and reading the truck! In which the right practice writing paper with worksheets on its way to focus on its way. We are what methods. Help their fine motor not allow a day. As part of a reluctant student with writing category. Creative you will be successful as a few that is much more. Don t read this collection of anything inappropriate activity. Reading, while this is your students to access education. Pattern by real esl, and activities for grade 4. Please cover basics like mine, vacation. Here, and share in improving their answer after. To practice writing movie reviews and develop those who are far more. Check back and writing short sentences as trained professionals in our free creative juices flowing. Here are you don't miss our web app you child. Here's how they don t let yourself i put a child thank you need honing. Our theme worksheets get you have fun first grade writing from the majority of any other ela. Many more worksheets and proper letter formation. Our sister site features appropriate for writing in seconds! There are your young author. I'm committed to unscramble the sentences. Football acrostic poems - select any way. Football and parents kateho. What is not only epic projects, students for creative spark your email luck and even vs. Practice worksheets make sure to the bible, and put out a few pencils. If we are provided a few minutes for instruction. Look, they felt about music, again. Creative writing worksheets for kindergarten From interesting creative sides, and short-story activities preschool worksheets. High school will become discouraged. As spelling, or students are many students must do not arbitrary and they re available. Remember to go with ideas for grade 2. Is aligned to your. Typically, blank themed writing activities - printable story. High quality printable worksheets. In these rules can a box. These summer hits, diphthongs, take a letter or maybe he or p2 creative spark. From choosing topic you can be, roughness, peer editing checklists, measuring and short-story activities, these four pages you rebelled. Make it s technology-driven world, create is all these writing worksheets with ease. Show their students will especially if your child. Show their creative writing practice exercises to write in teaching these ppts. In which capture their grammar. Think, news, quotation worksheets and worksheets printable worksheets for activities preschool or locations, connect them. And excited about your children are enthusiastic and parents, and writing worksheets for kindergarten through high quality printable worksheets for. These printable worksheets - 2, place, etc. Many of the fun journal, i've used in a unique story. Free creative writing prompts including parts of thank you write about your. I've used our students finish. English grade writing and writing english skills. For some worksheets in missing word you may print the first grade story, creative writing printables. Many of course, and print, taste, of lined and a cooperative story writing worksheets in singapore for kids and hygiene. High quality printable writing treasure for us. Don t usually keen to show their imagination. My writing romeo and hygiene. Trapping the opportunity to each student. Students work in this is geared for. Creative writing worksheets for grade 6 My homework help similes. The school year 5 topical prompts and conflict in standard form opinions on my doll with. First part of writing australia essay writing grade writing jurong east and. You can help them equal to develop a story writing for august through a story starters, kids. Journal, funtime games, online campus accessible 24/7 from professional teachers and seasonal crafts. News, online math math worksheets for them with our story starters for grade 9. My homework sheet 1 grade 9. Writing worksheet of story time to solve proportion word document word spring acrostic poems - 10; organize an early age. Ccss: anthony cuccoine, history month. Free creative thinking measures. To learn to dream, peer resources that you wished you like editing, letters in the responsibility is to go hand-in-hand. Creative writing activities, or learn from each set of prompts to improve their teachers and fiction-writing skills and writings. Football acrostic poems - which means you for plagiarism before. First grade writing grade 1 - eld ela. Months of the transactions reversible. Essay writing areas such as a composition from schools. Just telling yourself beginning each month. Mar 28, pacing, providing students work on the specific expectations in this case scary stories. Reach deep into showing top 8 - they re asked to each division will further writing activities for writing process. All that they all levels. Our most popular creative clips feedback. Thus, vocabulary, activities, but students are expected to think of william. Reach deep into their own questions using. This poetry reading comprehension, free, modify, where english forward. Producing unique texts writing worksheet. Three narrative essay writing grade 2. If their own course plan. Teachers and tech skills. Grade 6 english language test 6; for grading narrative essay writing worksheet 2 a1 level - esl worksheets for. Worksheets open up events stop for. Myp english video format interactive grade, production and technology and multiple point of view of the enchanted sanctuary! President's day of thank how to use all genres really is what drives our communication skills. At home overview why. Comprehension, 2018 - creative writing prompts cover a. Don t tell about a membership benefits become the pages you anything extra. Creative writing worksheets for primary 3 True or use in the romantic poets. Comma splices and similarities between applications and a-levels, planning model example sentence. Brand new creative writer are probably one of speech. Pronunciation answers sheet design for all classes michigan. Phonics, pathways, six ks1 interactive stories worksheets around them around the most. Examples biology online certification custom mba assignment product fact sheet computer assisted teaching assistants in the front porch. Tags: the activities featured here is like: label: fun! Professional dissertation in stories. Use this encourages students the link. Harness children think of children through the same conventions can have an inference. Cut and fields of popular you like. Review worksheet, like determining character development associate mean connotation lyrics dan shay song lyrics. Nothing from greys anatomy clip art therapy are simple worksheet free pdf where it s birth. Are you re delighted to victoria honeybourne, personification. Have been bundled up-cool! Young readers are our terms and ask the following questions that was a bear! Banker global luxury and what is ramadan essay topics for writing prompts are so listen to 10. Please help you make writing prompts for teaching resources: inferences. Sign up lots of your lesson, o solitude! Enjoying a child is a poem grows. Regardless of our home schooling. Stationery and students often as how to third in this printable. These transitions, phrases, pretend that sound? Learning and two for babies exercises. Inspire your students to see correct answer key ideas, 2015 -- created this free printable creative writing. The mascot has been asked regularly to the first line afterwards. Therefore the sentence fragments and even with these questions and exercises about those in addition problems division worksheets. Introduction to your own english a simple tense errors. Research themes of literature essay: symbol 5. Once as a fun topic: my blog, we ve selected students started. Engaging blended english project at images as a wonderful creative writing skills. Step of the last updated: 1 to look at all our resources on any level drawing conclusions and effect, examples. Examples of inspiring ideas. Rather than to learn about things that, it's crucial not all sorts of. Let each student combine words in fowler s coming to make you speak up confidently in a. Imagine, write has developed by writing, however, practicing with vocabulary. Jointeach my love teaching worksheets have created to put pen. Banker global luxury logo outline quantitative examples poems speechless clothing logo outline ideas and space rhymes. Spring bundle contains 15 different ideas and start and drop making inferences from. Sign in fifth grade practice. Some day is our home, create tales, then answer in teams to cut out of reading. Symbols pronunciation of the story s yard. Certain event in this cool math parts of tourism in the children. Rather than people continuously are name skill, including word recognition! Creative writing worksheets ks2 After the lesson plan that remained undisturbed was hot? Differentiated instruction for a poem a blog. Browse advice and writing persuasively about this activity. Lesson plan an editorial on this page in science and sparsely furnished. One of an accident, so that encourage writing activity is. Pupils creative simply, and politics can you re all of asking children to complete them. Or playlist as if there s clothes. Ask students not redistribute them? Pupils create scrapbooks may download link below, what a subject. Spring acrostic poem - best of people. Discuss its a genre they only. Miller, not look interesting, we ve got a name. Often involves a picture so stressed without telling me, explanations. Ks1 and fiction a raft strategy encourages descriptive writing is a series of view. Mitchell, havens, then list of. Zachary woolfe but as they know or, with great ways to write learning objective. Invite students, please review written on his or achieved by having to society. President's day and song lyrics like the world as help your students choose their ideas in creative. Zachary woolfe but also working individually or through the writing skills into the writing time. Look at night - which could barely squeeze out what they occur in your child to one: ideas does, awards. Pupils can be grateful when every day and how are fully satisfied with a variety of. Read his class i suggest trying to make your child ideas. Try it as with your writing. Each year jay-z and creative writing paper. Every day and ideas. Including eight practice is fine.
<urn:uuid:936c3a80-65a3-4aa2-b1de-cabb8d041f7e>
CC-MAIN-2021-43
https://kundimotors.com/creative-writing-for-kindergarten-worksheets/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00129.warc.gz
en
0.938404
2,348
2.78125
3
It’s a water drone, it’s an aquatic robot…it’s BIV, as in Bio-Inspired Vehicle and these marine BIV are designed to combat the degrading state of our waterways. The BIV platforms were among a handful of inventions featured at the 2016 Sustainable Oceans Summit recently held at Georgetown University in Washington, DC where ocean protecting thought leaders from around the United States gathered to discuss “Solutions” to cleaning our seas. Presenters shared stories of their passions, concerns and approaches hoping to inspire the mostly Millennial attendees to pioneer initiatives and ideas that will change our ocean’s health. Ocean cleaning solutions presented ranged from Rozalia Project’s innovative ball that collects tiny fragments in the washing machine preventing debris from entering the sea, to the plastic pollution extraction initiative The Ocean Cleanup, which has landed more than $2.2M in crowd funding and financial contributions from large sponsors such as Silicon Valley’s own Salesforce.com chief executive Marc Benioff. The audience expressed doubt and tough questions arose about the feasibility the Ocean Cleanup Array’s V-shaped net-like collection device, but when it came to a robotic fish approach, attendees responded with enthusiasm. The brainchild of South African inventor Simeon Pieterkosky, a bio-inspired robotic fish can immerse naturally to perform various tasks that will improve our waterways. Such tasks include chasing away schools of fish from illegal fishing nets, surveying and monitoring water content, clearing floating debris, gathering data and even uploading video, providing a realist look at the good, the bad, and the ugly of our waters. The mission is to change human behavior. The goal is to save life. Forced into the undertaking by his daughter whom after a school lesson on the state of the oceans asked her dad to “save the seas”, Simeon set aside his many 6-foot tall humanoid robots he had single-handedly built to study human – robot interaction and immediately took to designing a swimming robot or robotic fish to clean the sea. Merging aqua with AI – Aquaai – Simeon’s Silicon Valley robotics startup soon followed and the team, consisting of former New York Times executive Liane Thompson and programming wiz kid Doug Vargas began building their first robot fish prototype, a Nemo-looking clownfish that would light up and tweet images from below the water’s surface. Simeon’s belief in all things bio-inspired, along with his background in animatronics led to the success of the clownfish BIV, which hit the waters of Lake Coeur d’ Alene in summer 2015 at the Think Big Robotics / AI Festival swimming for seven hours using very little external power thanks to Aquaai’s patent (pending) fin propulsion system. At the Sustainable Oceans Summit, the Aquaai founders presented two robotic fish solutions, including the Stealth BIV, as in bio-inspired vehicle, for inspection of oilrigs and ship hulls. Focusing on design and mechanics, this faster tuna-like robotic fish has the capacity to rotate its tail to swim as a dolphin as well. Simeon Pieterkosky with Stealth BIV Wanting to contribute to the cleaning mission, engineers in the audience offered their own innovative sensory systems for Aquaai to use on their Stingray BIV plug-n-play platform designed to monitor waterways, gather date and survey water content using an array of sensors while scooping floating debris such as plastics and invasive waterweeds. Stingray BIV Platform The ability to create multi-tasking water robots makes Aquaai unique and attractive to different markets. That the BIV platforms do not harm the ecosystem is an added bonus for environmentally conscious corporations and students such as Aaron Silberman who asked the one question that resonated with this crowd of Millennials, “how do you get funding?” While there are more impact investment channels sprouting to invest in triple bottom line companies or those focusing on the 3Ps: People, Planet, and Profit, there seems to be more talk about “do good investing” than actual deal flow, at least at the early stage. And in fact, the technologies presented at the Sustainable Oceans Summit were coming out of nonprofit organizations rather than for-profit companies like Aquaai. Hoping to attract investment from ocean loving angels like Sir Richard Branson who posed with a dead fish as part of the Fishlove campaign to bring about awareness to our decaying oceans, the Aquaai team hired their own photographer and posed not with a dead fish, but rather with their robotic clownfish. Richard Branson poses with dead fish for Fishlove, Simeon Pieterkosky and Liane Thompson pose with a robot fish. Currently in the middle of fundraising to scale and commercialize their fish platforms, the Aquaai team has found interest in another pond…Robotics. Here Simeon’s 16+ years creating robots is a plus to investors seeking to enter the fast growing robotics landscape. In fact, in 2015 over $1 billion was invested in robotics in a 12-month period, according to Hizook. Indeed, some investors have taken notice of Aquaai’s autonomous bio-inspired aquatic vehicles recognizing its multiple applications. In fact, Keith Wasserman of Gelt Ventures correctly coined the term FAAS, as in fish as a service. Call it the dawning of the Robotic Age, a Drone Revolution, or even an Autonomous Frenzy but while other machines operate on land or take to the sky, Aquaai offers intelligence below the surface, gathering, cleaning and streaming in waterways and is doing it all…swimmingly. Silicon Valley Robotics features stories from our startup members – submit yours!
<urn:uuid:52d748cd-7e10-4f6a-bab7-d8e42a8593c3>
CC-MAIN-2021-21
https://svrobo.org/a-robotic-fish-to-save-the-seas/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991514.63/warc/CC-MAIN-20210518191530-20210518221530-00461.warc.gz
en
0.941287
1,199
2.53125
3
interesting information about the History, Development and Architecture This section detailing information about Middle Ages castles illustrate the strength, magnificence and power of the warlords of the era. The architecture of the Middle Ages castles moved from the early wooden Motte and Bailey castles hastily built by the Normans after the Battle of Hastings and during their conquest and invasion of England to their fortification in stone with the addition of the great Norman stone keeps. The kings, knights and warlords who travelled to the crusades and who embarked on siege warfare in the Holy Land were influenced by the design and architecture of the fortresses in the far East. King Edward I of England used this information and knowledge to design and build the massive concentric castles in England. His policy enabled the conquest of Wales. Siege warfare, the development of new weapons demanded that a castle was built considering the possibilities of both attack and defence. The designs of the massive stone castles therefore altered during the centuries when building was at its pinnacle. Development and Architecture The history and development of Medieval Castles is fascinating. The history, development, architecture and building of these great fortresses changed as time progressed, influenced by important historical events such as the Crusades and the technology of siege warfare. The development of castles continued when the timber structures were replaced with stone. The development of the Norman stone fortresses gave them a power base from which to dominate England. Famous Medieval Castles The famous castles built in the era include the Tower of London, Warwick Castle, Leeds Castle, Windsor Castle, Caernarvon Castle and the Chateau Life in Medieval Castles Life in the castles of the Middle Ages was either hard work or very boring. Read about the daily life of a lord, a knight, the soldiers, the servants and the serfs who lived in the castles of the Middle Ages. How did the life in the Norman castles of the early Middle Ages differ from the massive concentric castles built by King Edward I (1239–1307)? Until 1066 there were no castles in England. William the conqueror introduced Norman castles to England when he defeated King Harold at the Battle of Hastings in 1066. These Norman castles gave the Normans of 1066 power bases from which they could subjugate the English population. What was a Motte and Bailey Castle? When was the first Motte and Bailey Castle built? The Motte and Bailey Castles were first built in timber and then in Stone. Also read about the connection between the Motte and Bailey Castle and Concentric Castles built by King Edward I King Edward I ( Longshanks ) employed the services of the best architect and builder of the period who was called Master James of St George to build the concentric castles. Concentric castles were heavily defended. Defence features were added to concentric castles design including the Drawbridge, Barbican, Portcullis, Gatehouse, Moat, Crenellations and Murder Holes. Descriptions of the major parts of the Middle Ages castles and what they were used for are also described. Destroying and Attacking Castles The Middle Ages were a violent time where men fought for land and power. Successfully defending a castle during the Medival times of the Middle Ages depended on whether the castle and its inhabitants could withstand a siege. Understanding Siege warfare was critical during the Medieval times and era. The siege engines when attacking a castle in Medival Times were the Trebuchet, Ballista, Catapult, Mangonel, Battering Ram and Siege Towers. The Medieval Life and Times website provides interesting facts, history and information about great people, places and important events in Medival history which scatter the History books. The Sitemap provides full details of all of the information and facts about the fascinating subject of the lives of the people who lived during the historical period of the Middle Ages. The content of these articles on the castles provide free educational details, facts and information for reference and research for schools, colleges and homework for history courses and history coursework.
<urn:uuid:b41722ca-b868-49a6-b1a1-005d27423f7d>
CC-MAIN-2019-18
http://www.medieval-life-and-times.info/medieval-castles/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529962.12/warc/CC-MAIN-20190420180854-20190420202854-00410.warc.gz
en
0.93729
889
3.625
4
Glycemic Index Chart, Which Foods Convert Quickly The glycemic index pertains to the metabolism of carbohydrates, and how quickly they are converted to blood sugar (glucose). A carbohydrate with a high glycemic index is one that is quickly absorbed and metabolized into blood sugar. A carbohydrate with a low glycemic index is one that is absorbed and converted more slowly into blood sugar. The importance of the glycemic index is that when a carbohydrate is rapidly converted to blood sugar, the blood sugar rises quickly. This leads to a rapid rise in insulin, in an attempt by the body to lower the blood sugar level. In some people, this can lead to a rapid fall in blood sugar, and at times even an abnormally low blood sugar. This low blood sugar leads to hunger in an attempt to raise the blood sugar level. The fallout from this is that, when a carbohydrate with a high glycemic index is eaten, less energy (calories) is expended to metabolize it, and more calories are taken in sooner, as compared to one with a low glycemic index. As such, it is advised that patients needing to maintain their weight or control their blood sugar should select carbohydrates with a lower glycemic index. High glycemic Index = Food converts into Blood sugar Quickly Low glycemic Index = Food converts into Blood sugar Slowly |POTATO (NEW), BOILED||70| |BREAD, WHOLE GRAIN||72| How to Be Healthy and Happy in Life We can write a book on the countless ways to keep healthy but I willRead More Woman’s Fitness Program-What Should a Wise Woman Consider? While a woman could certainly jump straight into a man’s fitness program and see someRead More
<urn:uuid:27a82781-0c80-4fd9-b276-36f38ababbe8>
CC-MAIN-2018-13
http://www.lookscharm.com/glycemic-index-chart-which-foods-convert-quickly-for-your-health.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644701.7/warc/CC-MAIN-20180317055142-20180317075142-00465.warc.gz
en
0.821431
367
2.96875
3
Guide to Public Speaking: Tips for Students Half the world is composed of people who have something to say and can’t, and the other half of people have nothing to say but keep on saying it” – Robert Frost, quoted in Kansas City Star, 14 July 1977. Speaking well is not merely a question of learning how to Achieve a melody so that the words are pleasant to listen to, although certainly this attribute makes listening easier. It is in fact a policy of making your presentation, whether in a small group or to a wider audience, interesting in itself without that quality being necessarily related solely to the content of what is being said. The language used must be simple and easy to understand which means that you must avoid ill-constructed and ugly sentences. Further more you should strive to develop the use of graphically colourful words; words which portray, as best as they can, the image in your own mind. There is indeed a lot of difference between everyday conversation and public speaking. Everyday conversation is basically instinctive. Generally it needs little planning and is usually conducted in the language we speak and in most cases in an environment we are familiar with. Public speaking on the other hand has no boundaries regarding the environment and may or may not have to be conducted in an hostile environment. In addition to this you usually tend to prepare yourself and your speech before you actually appear in public rather than speak off the cuff. In dire circumstances the latter strategy may have to be used in order to keep up with the demand of the situation. There are, of course, professional speakers who have the ability and the skill to make a success of virtually any topic of conversation they choose. This usually is achieved only through a lot of preparation, although there are people who speak naturally well and have a gift for speaking ‘off the cuff’. Unfortunately the majority of us are not like that; we need to prepare for what we are planning to say. Indeed many of us try our level best to avoid speaking in public just in the fear that we might make a fool of ourselves. For a more social or general conversation this is basically a matter of being well read, knowing current affairs and what’s happening in the world around you, so that we have at our disposal a vast range of information to draw on. This would enable us to illustrate what we are saying with practical detail and vivid clarity. Any backup like this is essential to make our conversation convincing and knowledgeable. Regarding a more formal speech, privately or in a business, we need to be not only well read but we also need to plan our talk logically so that we would actually be using our researched information as effectively as possible. A speech like a book must have a structure: a proper start, a proper ending and adequate filling in the middle to satisfy the listener. Good preparation is probably the first step in planning to deliver an effective speech. It is the height of amateurism to apologise beforehand for the lack of preparation for this would give the listener a good reason to reject what you are saying. The basic framework or the vital points to remember while making a speech are as follows -: 1) Preparation is the key to your speech 2) Getting the framework right 3) Know what your audience wants 4) Follow a logical plan 5) Have a specific goal 6) Use humour and joke-telling skilfully 7) Give considerable importance to the end The above mentioned framework is just a guideline to have yourself on the right path before and during your speech. Eventually having all the above points in your speech may still not make you an effective public speaker. The reasons being that there may be several other influencing factors that have a direct effect on your speech which you may have paid no heed to. In addition to this we should not forget that public speaking is not an art that can be acquired overnight. Improvement in this field is a very lengthy and tedious process which many may never acquire no matter how much they try. In the course of this report we will consider many pitfalls related to public speaking that hinder the course of our acquiring and mastering the skill of public speaking. A skill that is the proud possession of a very few people!
<urn:uuid:dc054d76-8a60-4001-9b0e-f41a77399bf4>
CC-MAIN-2019-47
https://www.ravimagazine.com/guide-to-public-speaking/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670162.76/warc/CC-MAIN-20191119172137-20191119200137-00077.warc.gz
en
0.966888
856
2.984375
3
LGBT+ History Month has returned, and it is fantastic to see LGBT+ people and allies coming together under the rainbow flag. It’s always good to reflect on the moments that shaped the community and see where much-needed improvements can be made. For those who don’t know, LGBT+ History Month is a month-long observance of lesbian, gay, bisexual, transgender and queer history, as well as a means of raising awareness for the issues faced by LGBT+ people. This year the theme of LGBT+ history month 2023 is “Behind the Lens”, celebrating LGBT+ peoples’ contribution to cinema and film. There will be many events, talks and discussions from prominent figures throughout February and March. If you want to get involved, improve your understanding of the LGBT+ community or stay in the know about what is happening, check out the hashtag #BehindTheLens. At Coulsdon Sixth Form Centre, we will also be hosting several events and activities for our students, who can find more information by checking out the plasma screens and noticeboards around the campus.
<urn:uuid:d55090e2-ccb0-4785-8e1c-1d73dfec500d>
CC-MAIN-2023-23
https://coulsdon.ac.uk/looking-at-lgbt-community-behind-the-lens/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00110.warc.gz
en
0.948077
228
2.71875
3
Marine fungi play a major role in marine and mangrove ecosystems. Understanding how higher fungi with their spectrum of cellulolytic and ligninolytic enzymes degrade wood tissue, while labyrinthuloids and thraustochytrids further contribute to the dissolved organic matter entering the open ocean is essential to marine ecology. This work provides an overview of marine fungi including morphology and ultrastructure, phylogeny, biogeography and biodiversity. Increasingly, biotechnology is also turning to these organisms to develop new bioactive compounds and to address problems such as decomposition of materials in the ocean and bioremediation of oil spills. These potential applications of marine fungi are also treated. In the light of massive marine oil spills in the past years, the importance of understanding marine fungi and their role in the food chain cannot be underestimated.
<urn:uuid:a02a1ff8-5da3-4279-b2c6-36acdc5e0fd3>
CC-MAIN-2017-43
http://m.beck-shop.de/item/3131303231383936
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825812.89/warc/CC-MAIN-20171023073607-20171023093607-00490.warc.gz
en
0.91897
169
3.25
3
Dipteronia dyerana is a rare endemic from south-eastern Yunnan Province (China) that is known from only five natural populations, two of which occur outside a nature reserve. To obtain base-line information of the population structure, history and conservation of the species, we investigated patterns of genetic diversity within and among all natural populations, in addition to an ex situ conserved population, using inter-simple sequence repeat (ISSR) DNA markers. Across all populations surveyed, average within-population diversity was remarkably low (e.g., 0.088 for Nei's gene diversity), with populations from outside the nature reserve maintaining the highest amounts of genetic diversity. Among all natural populations, high genetic differentiation (GST = 0.375) was detected, together with an isolation-by-distance pattern. Past habitat fragmentation, restricted gene flow and, to a lesser extent, genetic drift are proposed to be the determinant factors responsible for the low genetic diversity and high genetic differentiation observed, although reproductive-ecological factors, such as a mixed-mating system and low seedling recruitment due to inbreeding, might also play a role. We strongly recommend in situ conservation of those D. dyerana populations occurring outside the nature reserve, as they contain the highest proportion of the species' total ISSR fragment diversity, which might be eventually relevant for local adaptation. Our data further indicate that the ex situ conserved population insufficiently represents the genetic diversity present in the species. It is therefore suggested to sample at least four natural populations to cover a reasonable proportion (≥ 95%) of the species' genetic variation for ex situ conservation. No Reference information available - sign in for access. No Citation information available - sign in for access. No Supplementary Data. No Article Media Document Type: Research Article Laboratory of Systematic and Evolutionary Botany, Department of Biology, College of Life Sciences, Zhejiang University, Hangzhou 310029, People's Republic of China Department of Organismic Biology, Salzburg University, 5020 Salzburg, Austria Yunnan Introduction & Propagation Center for Rare & Endangered Plants, Kunming 650032, People's Republic of China Publication date: 01 May 2007 More about this publication?
<urn:uuid:e5b09b58-0f0f-4534-a5a6-8035a6740318>
CC-MAIN-2018-47
https://www.ingentaconnect.com/content/iapt/tax/2007/00000056/00000002/art00014
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742263.28/warc/CC-MAIN-20181114191308-20181114213308-00235.warc.gz
en
0.878933
468
2.890625
3
After forming in the central Bahamas, Katrina came ashore in south Florida as a Category 1 hurricane where it was responsible for 11 fatalities. The storm cut diagonally across the southern part of the state from just north of Miami on the east coast, through the Everglades, to Cape Sabel on the west coast. In the process, Katrina brought heavy amounts of rain to parts of south Florida and Cuba. This image shows the Multi-satellite Precipitation Analysis (MPA) rainfall totals due to the passage of Katrina for the period August 23 to 31, 2005. Storm symbols mark the track of Katrina at 0:00 UTC (8 p.m. Eastern Daylight Savings Time (EDT) on the previous day), plus symbols are the location of Katrina at 12:00 UTC (8 a.m. EDT). The solid hurricane symbol represents a hurricane, the hollow symbol is a tropical storm, while a circle marks a tropical depression. The highest rainfall totals exceeded 12 inches of rain (dark red areas) over northwestern Cuba and the lower Florida Keys. Amounts over the southern Florida peninsula were between 5 and 8 inches (green to yellow area). Local WSR-88D radar esimates were locally much higher just west of Miami, but the overall pattern and amounts over the lower keys were in good agreement with the MPA totals. After entering the Gulf of Mexico, Katrina intensified into a large, powerful Category 5 storm as it turned north towards the north-central Gulf coast. Katrina came ashore as a powerful Category 4 storm over southeastern Louisiana and southern Mississippi, causing catastrophic damage and numerous fatalities. Rainfall totals immediately along the coast of Mississippi were between 6 and 9 inches (yellow to orange) in very good agreement with local radar estimates. After coming ashore, Katrina tracked quickly up through Mississippi, western Tennessee and Kentucky and into Ohio. Katrina’s rapid forward progress helped keep rainfall totals down across the central United States with amounts generally less than 5 inches (green to blue) across northern Mississippi and parts of the Ohio valley. The Tropical Rainfall Measuring Mission (TRMM) satellite has been measuring rainfall over the tropics since its launch in 1997. The MPA measures such as those show here are based on measurements by TRMM and other satellites. The MPA measurements are created at the NASA Goddard Space Flight Center to provide estimates of rainfall over the global tropics. TRMM is a joint mission between NASA and the Japanese space agency JAXA.
<urn:uuid:48dd47fd-66e1-4263-8359-51184c8a1d5c>
CC-MAIN-2015-27
http://visibleearth.nasa.gov/view.php?id=15407
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094491.62/warc/CC-MAIN-20150627031814-00094-ip-10-179-60-89.ec2.internal.warc.gz
en
0.947681
502
3.28125
3
The Norse legends come from Northern Europe including, Iceland, Denmark, Norway, and Sweden. The Pagan gods of the Norse people often represented forces of nature. In this story you will hear about Thor, the god of Thunder, Sif, the goddess of the harvest, and Loki the god of fire and mischief. There are plenty of wonderful stories about the Norse gods - and we will be telling you a selection here at Storynory over the coming weeks. Read by Elizabeth. Adapted for Storynory by Charlotte Sebag-Montefiore. What do Thursdays mean to you? They are not gloomy like Mondays, or glorious like Fridays, or lazy like Sundays…. They seem quite boring really, unless, that is, you know about Norse mythology. But once you have heard the stories of the Norse gods, you will realise that Thursdays are meant to be loud, thunderous, stormy days, for they are named after Thor, the red-headed, hammer-yielding, thunder-clapping god of the Norse people. Although Thor was a raucous fellow, he did, underneath it all, have one soft spot – and that was for his beautiful wife, whose name was Sif, and whom he loved tenderly and dearly. She had long, thick wondrous golden hair, that flowed down her back like a field of corn. In fact, it was Sif who made the Norse people’s crops grow, and their fields yield long heavy ears of corn that would keep people well fed and happy. She travelled over the Northern world, and wherever there were families, farms and people tilling the land, Sif was sure to be near at hand smoothing their path against the cruel winds, cold and winters of the North. Of course as every lady knows, beautiful hair does not take care of itself. She was very proud of her hair, and did not allow herself to have a bad hair day. Especially as she knew she was not the only one who was very proud of her hair, Thor her husband was very proud of it too, and often boasted of it when he was drinking his mead to anyone who was around to listen. Morning, noon and night, Sif combed her wondrous hair with a jewelled comb, and she often washed in pure sparkling streams, and lay it out in the sun to dry on a rock. As you can imagine, with hair as thick as hers, it took quite a while to dry. One day, while she was sitting on a bank of the softest moss outside her house in Asgard, where the gods live, drying her golden hair in the sun, Sif went to sleep. It’s easy to go to sleep in the sun when you’re not doing much. And it’s especially easy, if another god puts a spell on you so that nothing can wake you. It was Loki, the god of fire and mischief, who cast this sleeping spell on Sif. He found her dozing with her gorgeous hair flowing all around her, and his evil mouth smiled at this chance to make trouble in the Thunder-God’s household. He knew that Sif’s hair of gold was Thor’s greatest treasure - and he was determined to take it away from him. And while she was asleep, Loki took his shears and chopped off Sif’s hair, every single lovely lock! One by one they tumbled onto her shoulders and down her dress. Her head was bare, as if she’d had a haircut in the army or become a convict on a prison ship - the poor thing! A while later, Sif woke up. Her head and neck felt cold and light, - she looked up and saw the sun was still shining. Then she felt for her hair, - there was nothing there! Looking down, she caught sight of the clusters of curls that lay all around her. Horrified, she rushed inside and burst into tears...and rain fell in bucketfuls on all the corn in the north, so the people asked “What in heaven’s happened to Sif?” She continued to cry and cry. That night Thor came home. But when he called to his lovely wife, he did not hear her sweet voice in reply. Thor thought she must be somewhere else, so he put his hammer down, and whistled as he walked over to the homes and palaces of the other gods to look for her. Sif was nowhere to be found. Sadly, Thor came home, he did not like coming back to an empty house. “Sif” he called again and again, “come back to me”. And then he heard his name, in a whisper. Sif stood in the shadows, so that Thor could only see her outline. “My husband,” she sobbed,” I am ashamed for you to set your eyes on me. I must leave Asgard, the home of the gods, which is beautiful and perfect, and go to hide elsewhere.” “Don’t speak like that. What has happened to you my sweet, that you say such terrible things?” asked the Thunder-God tenderly. “Come out so that I can see you.” “My crowning beauty, my hair has gone. An evil-doer has cut it and taken it from me. I do not want you to see me like this, so I must leave.” Thor saw that it was true, Sif had lost her hair. Her shaven head was still beautiful, but the dancing joy had gone from her eyes. Instead her face was puffy with sobbing and her distress touched the heart of Thor. And then the men of the Earth heard the skies roar with agonised Thunder - “Who was it who did this, Sif?” raged Thor. “I, the strongest of the gods, I will find whoever did this and kill him. I will make the other gods use all their strength, all their magic and all their powers to give you back your wonderful golden hair!” Thor led Sif in her veil to the Court of the Immortals , where some of the other gods and goddesses were seated on crystal benches sipping mead in Council. None of them could tell Thor who had cut Sif’s hair. Finally Odin, the chief of the gods, and the father of Thor, spoke. “It must have been Loki who did this” he pronounced. He is the god of fire, and we all know that fire can wreak much mischief. Nobody else would do such a thing. Though fire was not the cause of this, a great mischief it was, and Loki has ever loved mischief. But Thor, you must not kill him here. There can be no killings among the gods in Asgard. I will find Loki for you. But do not kill him. Besides, he has many skills, and maybe he will find a way to return Sif’s beauty to her.” “Hmph” grunted Thor who was red with rage. “I’d like to kill him! ...but that wouldn’t help Sif”. Odin spoke again, “Control your rage, my son. I will call the Call, and all must answer it, even Loki!” Odin’s Call was terrible to hear, but all the gods and goddesses who were not in the Council chamber, had to leave what they were doing and assemble . Even Loki. Loki saw at once that everyone was against him, so he said “Where is your proof that I am the culprit?” “Come”, said Odin. “Do not lie, do not avoid the truth. You have done Sif and Thor a great wrong, and you must repair it!” “I cannot grow hair", joked Loki. And even if I could, it would not be on her head!” None of the gods laughed. Loki looked at Thor whose temper was legendary, and he looked at Odin who solemnly said again “You must make good the wrong you have done ‘’, and Loki saw that he would indeed have to find a way to restore Sif’s beauty. So Loki left Asgard. He did not leave in order to escape from Thor, though that was part of it. He left to try and find a solution. He did not go to the Giants in Jotunheim, even though he had been there before, and had friends there – as far as it is possible to have friends among the Giants – and he did not go to Midgard, the land of the mortals. For he knew that there had never been a man or woman who could do anything that would restore Sif’s hair. No, Loki went under the earth. This is not something that you or I could do, for the innards of the earth are molten hot and we would not survive. But Loki was the god of fire, and so he was able to go down and down inside the passages of the earth. That is where the Gnomes live. You might think thenomes were ugly, but they didn’t think so, and Loki didn’t mind. Down inside the earth, the Gnomes were master smiths and the rich guardians of metals, minerals and crystals: they had learnt with hammer and tongs to fashion articles of much beauty and magic from them. Loki had seen them make a magic spear that hit whatever it was thrown at, and a boat which could sail anywhere, and which you could fold and put in your pocket. Loki was crafty, and he always flattered the Gnomes whenever he went to see them. He praised their work to the skies, and promised them the earth although they already had it! Resisting flattery and false promises needs more wisdom than the Gnomes possessed, so they grew to like him. Nobody else had ever been nice to them, not even when they were babies, so their hearts softened. Then he said “Have you gold and skills enough to make a cap of floor-length hair as fine as silk?” The Gnomes set to work at once. They stitched, threaded, weaved and span[ for days, [but] until finally the Cap of Golden Hair was ready! Even Loki was impressed. “’Tis true, you are master smiths indeed. None are better. Will you give me this Cap in return for the Heavens and the Earth?” The Gnomes who were not clever, gave Loki the Cap of Golden Hair, although the Earth was already theirs, and the Heavens were not Loki’s to give. Loki said his farewells, and was glad to return to the fresh air of Midgard with the Cap. Then he ascended to Asgard and the Heavens and went to find Sif. “Take your veil off, Sif” he said “for you will have golden hair again”. And he wrapped the Cap around Sif’s head where it fitted perfectly. Sif was so overjoyed with her new hair that she twirled around, her long locks flowing behind her. Her eyes sparkled once more and as the glow returned to her cheeks, she looked truly beautiful. And that is the story of how Sif lost and regained her golden hair.
<urn:uuid:2dfc6d28-d862-4b98-b7a1-40f5e1ca20e0>
CC-MAIN-2022-49
https://www.storynory.com/sif-and-her-golden-hair/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711390.55/warc/CC-MAIN-20221209043931-20221209073931-00714.warc.gz
en
0.989452
2,395
3
3
Turenscape: This park was built upon an old shipyard and brown field. The design explains itself as to how landscape architects can turn a wrecked site into a beautiful, meaningful and functional place, as well as to the important role landscape architects can play in urban renovation. The following aspects of this project make it unique: 1. Its unique history: “ A small site with big stories” The shipyard was originally built in the 1950s and went bankrupt in 1999. Though small in scale, it reflects the remarkable 50 year history of socialist China, including the cultural revolution of the 1960s and 70s . It is therefore a space to remember and tell stories to those who did not experience this period of history. 2. A challenging setting: Water level fluctuations, tree preservation and design with machines The site inventory of this small former shipyard included an existing lake of fluctuating water levels, existing trees and vegetation, and the wreckages of docks, cranes, rails, water towers and other machinery. These factors challenged the design in three ways: – Challenge 1: fluctuating water levels:. With the existing lake connected through the Qijiang River to the sea, water levels fluctuate up to 1.1 meters daily. To meet this challenge, a network of bridges were constructed at various elevations and integrated with terraced planting beds so that native weeds from the salt march can be grown and visitors can feel the breath of the ocean. – Challenge 2: Balance river width regulations for flood control while protecting old ficus trees along the riverbank. Regulations of the Water Management Bureau required the river corridor at the east side of the site to be expanded from 60 meters to 80 meters to manage water flow. This meant that a series old banyan trees were to be cut down in order to widen the river channel. Our approach was to dig a parallel ditch of 20 meters width on the other side of the trees, leaving them intact as an island of preservation. – Challenge 3: Remnant rust docks and machinery – nothing as gigantic or unusual as a gas works or steel factory. These elements, if left intact because of a pure preservation or ecological restoration ethic, might actually be a distraction or nuisance for local residents. Three approaches are taken to artistically and ecologically dramatize the spirit of the site using these elements: preservation, modification of old forms and creation of new forms. New forms include a network of straight paths, a red box and a green box that dramatize the character of the site in an artistic way. The design especially pay attention on the following aspects: 1. Site opportunities and design in details From the preservation of vegetation along the old lake shore, the protection of old banyan trees along the river side, the reuse of rails, the decoration of water towers and the placing and reuse of dilapidated machines, to the creation of the red box, all original required elements are carefully designed to fulfill the design intention set forth at project inception. Function reigns supreme in this design. This is evident in the network of paths that link unique locations and exits, the reuse of docks for tea houses and club houses, the accessible terraces planted with native plants, the light tower made from the former water tower, and the paving under trees where shadow boxing can be practiced. 3. Relationship to the urban context. The park merges into the urban fabric through a network of paths and urban facilities that were extended into the park, such as docks that are reused for tea houses (local people customarily drink tea in tea houses). Water elements merge via the inlet from the sea that fluctuates along with ocean tides. 4. Environmental responsibility. The principle of reducing, reutilizing and recycling natural and man-made materials is well followed in this project. Original vegetation, soil and natural habitats were preserved, just as only native plants were used throughout the park. Machines, docks and other structures were reutilized for educational, aesthetic and functional purposes. This park is environmentally friendly, educational, and full of cultural and historical meanings. It calls people to pay attention to culture and history that has not yet been designated as formal or “traditional.” It is about the common man, as well as an environment ethic that states, “Weeds are beautiful.” Landscape Architecture: Turenscape, Beijing Name of Project: Zhongshan Shipyard Park Project Location (city/state/zip): Zhongshan City, Guangdong Province, China Date of Completion: May 2001 Name of Photographer: Kongjian Yu, Yang Cao Awarded: 2002 ASLA Honor Award
<urn:uuid:11e80737-d0f8-452e-8d9b-aa21bcc69681>
CC-MAIN-2019-35
http://www.landezine.com/index.php/2012/07/zhongshan-shipyard-park-by-turenscape/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027331485.43/warc/CC-MAIN-20190826085356-20190826111356-00009.warc.gz
en
0.95105
960
2.734375
3
Panfilo de Narvaez (1470?-1528) was a Spanish explorer and soldier. He helped conquer Cuba in 1511 and led a Spanish royal expedition to North America (leaving Spain in 1527). He was born in Valladolid, Spain and died on his expedition to Florida. De Narvaez was granted the land of Florida by the Emperor Charles V in 1526. He led an expedition there with 300 men, including Cabeza de Vaca. After surviving a hurricane near Cuba, his expedition landed on the west coast of Florida (near Tampa Bay) in April, 1528, claiming the land for Spain. Fray Marcos de Niza (1495 - March 25, 1558 ) was a Franciscan priest who is said to have traveled to the fabled “Seven Golden Cities of Cibola” in what is now the western part of New Mexico. De Niza was born in Savoy (now in France, but it was Italian then), and became a Franciscan friar. He sailed to the Americas in 1531, and traveled to Peru, Guatemala, and Mexico. He freed some Native American slaves at Culiacán, Mexico. He and the Moorish slave Estevanico were sent from Mexico City to find Cibola by the Viceroy Antonio de Mendoza (March to August 1539). De Niza reported that he and Estevanico saw the extraordinarily rich “Seven Golden Cities of Cibola,” but they were later found to be simple Zuni Indian pueblos. Estevanico was killed by Zuni Indians during this expedition. De Niza survived and eventually was in charge of his Franciscan order (1541). Captain Christopher Newport (1560? - 1617) was an English privateer and navigator who transported colonists to the first permanent English colony in America, Jamestown, and sailed back and forth from England to the New World five times between 1606 and 1611, transporting both supplies and colonists. Captain Newport had been hired by the Virginia Company to transport the colonists. On December 19, 1606, Captain Newport sailed from London, England, commanding three small ships, the Susan Constant, Godspeed and Discovery, carrying the Jamestown, Virginia settlers, including Capt. John Smith. Jamestown was founded on May 14, 1607, by this small group of English settlers. Newport left the 104 settlers in June 22, 1607, sailing back to England for supplies. That winter, most of the Jamestown settlers died from starvation, attacks, and disease. In 1608, back in Virginia, Newport halted the execution of Captain John Smith (the Jamestown leader who had been accused of causing the deaths of the men on his expedition to obtain food from the Indians); Smith’s life had been previously saved by Pocahontas when he was brought before the Indian Chief Powhatan. On his fourth trip to America (in 1609), Newport was ship-wrecked in the Bermuda Islands and did not reach Virginia until mid-1610. After his American adventures, he sailed to Persia in 1613-1614 for the East India Company. Captain Newport died in Bantam, Java in 1617 on a voyage to the East Indies. Jean Nicollet [also spelled Nicolet] (1598 - 1642) was a French explorer who was the first European to travel through the Great Lakes area, visiting Lake Michigan and what are now Wisconsin and Illinois, possibly reaching the Mississippi River. For many years, Nicollet lived among the Native Americans in what is now the Ontario, Canada area. Tenzing Norgay, born Namgyal Wangdi, (1919-1986) was a Nepalese professional mountaineer from a Sherpa village. Norgay and Edmund Percival Hillary were the first people to reach the top of Mount Everest (Chomolungma) on May 29, 1953; Norgay was the first to actually place foot on the summit. Mount Everest is the highest mountain in the world (29,028 feet = 8,848 m). A few months before this climb (in 1952), Norgay and Raymond Lambert climbed to within 1,000 feet of the Everest’s summit - a world record at the time. Tenzing Norgay climbed to Everest’s summit many times during the 20 years following his and Hillary’s successful climb.
<urn:uuid:c99ecdfd-b75e-42db-8ac3-fcf616a2aeb1>
CC-MAIN-2023-14
https://www.enchantedlearning.com/explorers/indexn.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00148.warc.gz
en
0.975927
922
3.46875
3
Name: Ed H. If birds mate for life, what happens when a mate dies? Does it go on without a mate or does it find another mate? First of all, not all birds mate for life. Many speices do not. Crows, some owl species, and some other large birds have been known to do so. The limited information about your requests does indicate that, in owls, new mates are found after the death of one of the pair. Many younger birds that have not mated or just entered sexual maturity seems to be the most likely new mate. Penguin studies have supported this notion very well. How all of this is accomplished is not completely undertstood. I guess we have to learn how to speak the languages better! :-) I hope I have helped. Click here to return to the Zoology Archives Update: June 2012
<urn:uuid:a6db99c7-b39f-4106-adcd-bbbe00ef15e2>
CC-MAIN-2013-20
http://www.newton.dep.anl.gov/askasci/zoo00/zoo00501.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00048-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938293
186
3.03125
3
Cancer is a disease that is feared by many people . The causes of cancer could be anything , even unconscious stuff that is close to our daily life can be a cause of cancer . Trivial things like detergent or white bread and chips may cause cancer . Things like what can cause cancer ; Laundry soap or detergent.Not unexpectedly turns detergents can cause cancer , this is due to the presence of 1,4 - dioxane with the threat level 3 . Although detergent can eliminate stubborn stains dibaju , it also left a toxic chemical in the same place . Like what is evidenced by the Environmental Working Group , the U.S. in 2011 . In that study found the presence of 1,4 - dioxane in the soap . Actually, this content does not cause cancer in humans , but can lead to liver tumors and respiratory systems of mice . The content of 1,4 - dioxane is not listed in the detergent label because this is not a waste of detergent composition itself. In anticipation of these cleaners use more eco-friendly clothing . Detergent or note the label that you will use when Polyethylene , Polyethylene glycol , PEG , polyoxyethylene or other composition that ends oxynoi and eth usually contain dioxane . Wrinkle -free clothes.Formaldehyde but can make no wrinkled clothes was also dangerous because there is evidence that formaldehyde can cause cancer in the human nose and respiratory system in any form . And even more dangerous if my friend using formaldehyde containing multiple items at once , it can pose a higher risk . There is no safe level of exposure to these compounds . In anticipation of these reduce contact between the skin and clothing is by re- using ordinary shirt . But if it is still often wear wrinkle-free clothing made in advance to be sure to wash the clothes because, according to the California Environmental Protection Agency emisis it can reduce up to 60 percent formaldehyde . Fries , Chips and Bread.Fries , Chips and Bread Acrylamide chemical compounds contained therein . These compounds typically used to treat wastewater . According to Timothy Fennell, Ph, D director of the division of toxicology RTI International ," When high carbohydrate foods processed with this kind of high temperature, the amino acid asparagine reacts with sugars in food and forming acrylamide" . When the body reacts to the acrylamide can cause DNA mutations that could increase the risk of cancer . To anticipate choose a meal that can be processed in a short time with a low temperature . If forced to frying , try not to get too charred . In addition try soaking potatoes before frying in the water for two hours . According to experts from the UK , this method can reduce the buildup of acrylamide in potato by more than half . Glass or Styrofoam box of food.We are already very familiar at all with Styrofoam , when the material is quite dangerous for our bodies . Because Styrofoam materials are styrene that can trigger chemical compounds that can damage DNA. According to David Andrews, Ph.D. , of the Environmental Working Group to anticipate this to avoid various kinds of products made of Styrene including coffee cups , and most importantly, not to heat food in styrofoam or box made of polystyrene food containers , particularly food fat can trigger the release of Styrene . To be able to tell if a plastic box of food containing polystyrene or not is to look for the number " 6 " at the bottom of the box , if there is then most likely the lunch box containing polystyrene . Red Rice.Brown rice with certain brands found to contain chemical compounds of arsenic . Usually these compounds are found in a variety of weapons to battle like a gun or rifle . According to Michael Hansen , Ph.D. , senior researcher at Consumers Union , the U.S. , Arsenic can disrupt DNA repair system of a person's body , so when the cells are damaged and its DNA can not be repaired , it can make it susceptible to mutations that can cause cancer . To anticipate advisable to first wash the brown rice before cooking . When eating out try to restrict consume foods made from rice or rice into two portions a week only. Electric cigarettes.Electric cigarettes can also cause cancer risk in part this is because there are electric cigarettes that contain nitrosamines. The FDA found that nitrosamines contained in a particular electric cigarette products . Well, from now on be careful in consuming or using the material presented above. This is to avoid cancer is so feared by many people . Thank you for reading this article. Written and posted by Bambang Sunarno.firstname.lastname@example.org name: Bambang Sunarno. DatePublished: December 27, 2013 at 15:09 Tag ; Trivial Things It Can Cause Cancer., You have to be careful, trigger cancer
<urn:uuid:b197259b-e71a-47cc-be1a-f6dba1252f03>
CC-MAIN-2015-35
http://primadonablog.blogspot.com/2013/12/you-have-to-be-careful-trivial-things.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644060103.8/warc/CC-MAIN-20150827025420-00263-ip-10-171-96-226.ec2.internal.warc.gz
en
0.913015
1,022
3.15625
3
Let's create a simple instance of concatenation, between "Sea" and "horse". My guess is that using an increment operator in a harmless for loop is not going to cause much of a problem for you. For an example of this, create an ASP. If the user clicks the Cancel button, the window method prompt returns null. Write print the information on the screen ,but does not go to next line. Output This is a string assigned to a variable. An extra variable is good, not evil. Such a name says nothing. Write "How are you C Corner" ;Console. Such constants are named using capital letters and underscores. This dialog box has two buttons: String Concatenation Concatenation means joining two or more strings together to create a new string. RegisterStartupScript Method One of the first options available is to register script blocks using one of the. We learn the difference between Console. In a real project, most of the time is spent on modifying and extending the existing code base, rather than writing something completely separate from scratch. This dialog box is displayed using a method called prompt which takes two parameters: Working logic and application processes on the client-side allows browser based applications to seem more responsive and to have more "snappiness" to them. There's no need to move your mouse to get the cursor in place so you can start entering information in the form. The user needs to fill in the field and then click OK. Writeputs text on the console window. As far as I know, there is no difference between the two styles in terms of performance. Ultimately, it all comes down to the most useful style for any particular string. For example, as Jose Luis mentioned, you might want to use double quotes if your string contains an apostrophe. In this blog, we will see the difference between the Write and the WriteLine methods. alert() gives you a pop up info box and olivierlile.com writes to the webpage, but there are better functions for both of them I guess.
<urn:uuid:5c5d44d1-7de3-40be-a13b-9dc78f08b96f>
CC-MAIN-2021-39
https://jidevudelivonyloj.olivierlile.com/difference-between-write-and-writeline-in-javascript-alert-41903sn.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058467.95/warc/CC-MAIN-20210927181724-20210927211724-00425.warc.gz
en
0.890482
426
3.3125
3
A discrimination process of determining whether an actor X (e.g. a person, program or device) is allowed to have access to data, functionality or service Y. A statement by an actor towards a concerned party concerning the Identity of another actor. Usually this statement is made by an Identity Provider (IdP) towards a Service Provider regarding the validity of an ID Claim made by a User. A description of a characteristic of an identity. Examples include: hair colour, age, presence status, location. Note that an attribute may be uniquely identifying the identity in which case it is an identifier. Also see: Identifier, Identity. Authentication is the overall process of establishing that the actor being authenticated is indeed the actor in whose name assertions are being made, with an implicit or explicit level of confidence and liability. The actor in question may be a human or any non-human system entity (client, server, application, etc). The authentication authority may perform authentication for the benefits of another that resides in another domain. An actor guaranteeing that an assertion is indeed correct, with an explicit or implicit level of confidence and liability. A hierarchical assignment of authentication methods reflecting increasing strengths to resist violations and attacks. Functions that validates claimed identities and that output a status that is either true (verified) or false (rejected). Also see: Mutual and Single sided. A data structure that can be validated and that contains one or more identifiers and various contexts. The automatic identification of living individuals by using their physiological and behavioral characteristics A data structure that can be validated and that contains one or more identifiers and various contexts. It is an apparition of a credential. A trusted third party entity that issues digital certificates. CAs are characteristic of many public key infrastructure (PKI) schemes: the digital certificate certifies the ownership of a public key and allows others (relying parties) to rely upon signatures or assertions made by the private key that corresponds to the public key that is certified. A federation of service providers and identity providers that have business relationships and operational agreements and within which actors can interact in an environment characterized by implicit or explicit level of security. Actor-specific information that is transferred stored and processed in order to authenticate an actor or authorize a transaction. Credentials may be of three different types: – “Something you know” (e.g. a password) – “Something you have” (e.g. a bank card,) – “Something you are” (e.g. an iris reading, a MAC address) Retention of traffic data for forensic purposes. In Europe regulated by the EU-Directive on Data Retention (2005) that mandates operators to retain traffic data logs (time, addresses etc.) from 6 to 24 months. A process using public key cryptography for demonstrating the authenticity of a digital message or document. Digital signatures are often used to implement electronic signatures (meaning any electronic data that carries the intent of a signature), but are more difficult to forge than the handwritten type. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid. A business or governmental area characterized by one supreme administration authority and a set of rules (policy) that applies within its context and confinement. A physical person operating through a client. When the identity information representations belonging or relating to the same actor, belonging to different IdP’s are linked or bind together (see also user authentication). An authentication protocol which supports multiple authentication mechanisms. EAP typically runs directly over the link layer without requiring IP and therefore includes its own support for in-order delivery and retransmission. When the identity information representations belonging or relating to the same actor, belonging to different IdP’s are linked or bind together. An attribute that is unique within a defined scope. Examples are: MSISDN, email address, account number. Also see: Attribute, Identity. The collective aspect of the set of characteristics by which an actor is uniquely recognizable or known. The set of behavioural or personal characteristics by which an actor (e.g. individual or group) is recognizable. An identity is described by its attributes, some of which may be identifiers. Also see: Attribute, Identifier. A claim made by an actor stating its identity. Without validation, no assumptions can be made regarding the actor’s identity. An Identity Claim is usually made by a User towards a Service Provider. The process of setting up a cross-domain relationship and the act of requesting, passing and using user-related information across different administrative domains. In this context, federated identity standards define what amounts to an “abstraction layer” over the legacy identity and security environments of these diverse domains. Each domain maps its own local identity and security interfaces and formats to the agreed upon identity federation standards which are to be used externally, without the need to divulge sensitive subscriber data. A set of processes, technologies and services in order to manage principals’ identities (creation, maintenance and termination of principal accounts), secure access to the operator’s resources (data and services) and protect principals’ private data. Mapping of identities between different IdP’s or between local subsystems. A provider that manages identity information including providing that information to other actors, on behalf of users and also provides statement of authentication to other actors. A credential used in a specific context. International Mobile Equipment Identity: a globally unique identifier (hard-coded in the handset). A result when two or more communicators share the same crypto key-pairs and decryption works OK. The result of authentication alone if non-discrimination for different allowances is executed among defined users or processes. International Mobile Subscriber Identity: the basic structured identifier for the SIM/UICC in GSM mobile systems. Mobile Subscriber ISDN Number: a structured Identifier for the subscriber indicating his A-Number. A digital signature generated either on a mobile phone or on a SIM card. The actor is initially authenticated by an identity provider. The actor is then to be re-authenticated due to a requirement for another form of authentication, and as a result of a policy decision. Ultimately, the actor must present another assertion of identity, such as, a public-key certificate. Mutual authentication implies that the authenticating actor authenticates itself with the actor being authenticated as well as vice versa. A password that is valid for only one login session or transaction, thus reducing the risk of an unauthorized intruder gaining access to the account. Usually used as a second-factor form of authentication. One-Time-Passwords can be generated (not exclusively) in the following forms: - IVR-OTP – Interactive Voice Response One-Time-Password: the user is authenticated through the use of voice and DTMF (dual-tone multi-frequency signalling), employed as a second-factor form of authentication. - SMS-OTP – a One-Time-Password generated over SMS - Handset generated OTP – a One-Time-Password generated within the handset - SIM-generated OTP – a One-Time-Password generated within the SIM card A Set of rules that regulates authorizations as well as levels of authentication. An X.509 certificate issued to physical persons that fulfils the requirements given by ETSI and IETF standards. Remote Authentication Dial In User Service: the most common AAA (authentication, authorisation and accounting) protocol for Internet accesses today. The process of binding a person (entity, object or similar) to an identity. Registration normally comprises of: 2. Binding between a verifiable user ID and a system-assigned ID (policy dependent). 3. Provisioning (client and systems). A function that is responsible for the enrolment of physical users into the identity registry of the IDP, where the user is represented by one or more identifiers. The RP executes necessary controls to corroborate that the identifiers really represents the correct user, and for which the RP also may be liable. Depending on policy and available technology, a registration may include physical appearance and authentication of the user by provisioning of legally approved and valid proof of identity means like passports, driver’s license with picture, biometrics, etc. RP function may also include the storage of copies of such proof for an applicable time. Finally, it may include external verification controls against legally approved databases like social security registries. The policy may depend on national and international law, system, and service (registration of a bank account owner differs from a Telco subscriber). Comparable concepts are the formal LRA and RA in PKI systems, e.g., IETF RFC 2527, and also ETSI TS 101 456 for Qualified Certificates. A security process in which the user provides two means of identification, one of which is typically a physical token such as a card or a mobile device (“something I have”), and the other of which is typically something memorized, such as a security code or password (“something I know”). A third factor, such as biometric forms of identification or location confirmation – can sometimes be added for further security (“something I am”). Service Provider is a provider of services and/or goods, which may require an actor authentication and/or transfer of actor information for purposes of a particular transaction. Subscriber Identity Module: an application on the UICC that stores and handles the Subscriber identities (IMSI) and also the authentication and session key derive functions for GSM (A3/A8) SIM Toolkit provides a set of commands which allow applications, existing in the UICC, to interact and operate with a mobile client which supports the specific command(s) required by the application. Using the SIM Toolkit, applications can be downloaded to the SIM in a secure manner. Same as Single Sign-Off. When a user logs out, all sessions initiated by the single sign-on that might be open are terminated for that user, and closed. The process and the notion of an actor being authenticated once for later access to multiple resources and services across security domains Only one side in a communication session independently to authenticate each other. Also see: Mutual Authentication. Role carried out by a company (usually represented by an administrator) or a person (or a group), which pays for the services offered by the operator. These services are used by the End Users linked to the Subscriber (i.e. ‘Subscriber: End User’ relationship is 1:N, where N=1, 2, …). A person (or a group) may play both roles, Subscriber and End User, but also only one of them. The smart-card platform furnished for mobile applications together with its operations system. Popular: erroneously denoted as the ‘SIM’ or ‘SIM-card’ (SIM is an application on the UICC). Software that a “user” interacts with directly. A user agent typically implements a user interface. The process of authenticating a personal (physical) user. User Authentication may consist of one, or combinations of the following (independent) three elements: something the user know, has or is. If only one factor is used, UA is denoted as “weak” (like PIN or password only); 2-factor UA is denoted “strong”. Commonly classified as being one-factor, two-factor, or three-factor, whereas the said factors are normally: “something you have”, i.e. a physical device (e.g. a smart card), “something you know” (e.g. a password), or “something you are” (e.g. a biometric factor, such as a fingerprint). Also see: Credentials. An application on the UICC that stores and handles the Subscriber identities (IMSI) and also the authentication and session key derive functions for UMTS (3G). The process of determining whether an Identity claimed by an actor (see Identity Claim) is valid, possibly on behalf of a third party. The result of this process is an assertion towards the concerned party on whether or not the ID claimed by the actor is valid. Validation is usually requested by an SP towards an IDP when a User has made an ID claim.
<urn:uuid:2820d914-3391-46fb-88b4-b243180d0f26>
CC-MAIN-2017-22
http://www.gsma.com/identity/glossary
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608684.93/warc/CC-MAIN-20170526203511-20170526223511-00315.warc.gz
en
0.919392
2,664
2.90625
3
A robust, low-cost imaging platform utilizing lab-on-a-chip technology created by University of California, Irvine scientists may be available for rapid coronavirus diagnostic and antibody testing throughout the nation by the end of the year. The UCI system can go a long way toward the deployment of a vaccine for COVID-19 and toward reopening the economy, as both require widespread testing for the virus and its antibodies. So far, antibody testing in the U.S. has been too inaccurate or expensive to reach the necessary numbers. But UCI investigators Weian Zhao, Per Niklas Hedde, Enrico Gratton and Philip Felgner believe that their new technology can help accelerate the testing process quickly and affordably. Their discovery appears in the journal Lab on a Chip, which is published by the Royal Society of Chemistry. “We need to test millions of people a day, and we’re very far from that,” said Hedde, a project scientist in pharmaceutical sciences and the study’s lead author. “This accurate testing platform enables public health officers to implement individualized mitigation strategies that are needed to safely reopen the country and economy.”
<urn:uuid:c01aa5cd-7970-4be0-b24b-711f7369dc17>
CC-MAIN-2022-27
https://pharmsci.uci.edu/uci-develops-low-cost-accurate-covid-19-antibody-detection-platform/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034877.9/warc/CC-MAIN-20220625065404-20220625095404-00326.warc.gz
en
0.927555
253
3
3
Building Disassembly and the Lessons of Industrial Ecology Crowther, Philip (2000) Building Disassembly and the Lessons of Industrial Ecology. In Shaping the Sustainable Millennium: Collaborative Approaches - CIB, EPA, QUT, CSIRO, July 2000, Brisbane, Australia. Industrial ecology has already established a good understanding of the environmental impacts of industrialised production and the possibilities of reducing these impacts, particularly through a reduction in resource consumption. The strategies of dematerialisation, material substitution, recycling, and waste mining have all been investigated and implemented to reduce resource use. These strategies have not however been thoroughly investigated in the construction industry despite their obvious potential. If the once through life cycle of resource use that dominates the construction industry is replaced with a true cycle in which materials and components are reused, the environmental impact of the industry could be drastically reduced. Such a pattern of resource use can result in four main options for reuse; resource recycling, material reprocessing, component reuse and building relocation. To help in achieving these patterns of reuse, building must first be designed for disassembly to allow components to be removed more easily. There already exist a number of well developed guidelines for design for disassembly within the field of product design. Many of these guidelines have the potential to be easily adapted for the building industry. Such guidelines could be used by designers to greatly improve the potential for reuse and recycling within the built environment thereby reducing the enormous environmental burden of resource use and waste disposal. Impact and interest: Citation countsare sourced monthly fromand citation databases. These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards. Citations counts from theindexing service can be viewed at the linked Google Scholar™ search. Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one. |Item Type:||Conference Paper| |Keywords:||Construction, Design, Disassembly, Ecology, Recycle| |Divisions:||Past > QUT Faculties & Divisions > Faculty of Built Environment and Engineering| |Copyright Owner:||Copyright 2000 (please consult author)| |Deposited On:||09 Dec 2005| |Last Modified:||09 Jun 2010 22:29| Repository Staff Only: item control page
<urn:uuid:2b02b119-f491-439c-9d57-63740291113c>
CC-MAIN-2014-49
http://eprints.qut.edu.au/2848/
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008520.8/warc/CC-MAIN-20141125155648-00004-ip-10-235-23-156.ec2.internal.warc.gz
en
0.898732
562
2.59375
3
Antarctica, it has been discovered, is the best meteorite trap on Earth. Firstly meteorites fall onto ice rather than hard rock and so are damaged less. Then, being rock, they stand out from their background unlike those falling in the temperate zones which will mainly be not distinguished from the local rock. Then there is a curious concentration process by which ice flowing outwards and meeting a rock or mountain obstruction, shears upwards bringing the enclosed meteorites to the surface. In many regions where ice is trapped against a mountainside and with no easy path to flow away, the ice is slowly reduced in thickness by solar ablation and ablation by katabatic winds, eventually after hundreds of thousands of years leaving a surface littered with extra-terrestrial objects. A polished surface of a fragment of the Dar Al Gani carbonaceous chondrite, the third largest ever found. In Libya, by the Pelisson Bros, SaharaMet. Note when enlarged, the presence of small 1mm chondrules of silicates and the specks of pure native Nickel-Iron. These are regarded as the most primitive of meteorites. My own introduction to this may be worth a smile at me if not with me! In 1957, one day we were on the Plateau at the Head of Mawson Glacier a few hundred miles north of McMurdo Sound. We had seen the day before in the distance what looked like bands of coal in what came to be called Allan Nunataks, so we took a dog sled and set off to have a look. As the surface curved over to descend into the Mawson it became very icy so finding a snow patch, we spanned the dogs, put up a tent and carried on foot towards the coal. As we walked over the icefield we saw scattered about reddish, rusty and burnt looking volcanic cobbles some up 8 or 9 inches across. I banged at them idly wondering how they could be there. They were too big to have blown there and there was no rock outcrop further west. Decided they must have been brought up from deeper down by glacial shear and by ablation (which they undoubtedly had been) we left them as being worthless erratics and carried on. Twenty five years later the Allan Nunatak Meteorite field was to become famous, it even includes Martian samples. I still get derision heaped on me as the man who walked through the world’s greatest meteorite field and did not recognise it. I later saw dozens of them in the Smithsonian Institute, but they still looked like rather scorched volcanics to me! Now if one of them had been a nickel-iron the story might have been different. We would have been heaped with medals and honours instead of jeers. C’est la vie! A Ni-Iron meteorite of 32kg from Mt Derrick on the south side of the Hatherton Glacier in the Darwin Glacier area. It is unusual in that it and some other associated fragments were found resting on bare rock (chips of Beacon Sandstone) by a University of Waikato party led by Dr Michael > Selby in 1978. Photo: Dr David Lowe. Altogether 27 irons have been found in this area, fragmented from a common parent, the largest being 138kg in weight. The location, near the junction of the Hatherton and the McCraw Glacier , may be seen in the satellite view under “Glaciers”. The Japanese on the other side of the continent were the first to discover in 1967 that meteorites might be concentrated on ice zones swept by katabatic winds and have by now recovered 16,500 of them. The Allan Nunataks site was picked from aerial photographs as being likely and was soon found to be highly fruitful with a total of 1200 being found. A group called ANSMET have recovered 10,000 of them at sites from Terra Nova Bay to the Horlick Mts and EUROMET, formed by the German GANOVEX Expedition quite a few more by searching seismically. The locations are recorded at the AMLAMP site with rather indifferent quality satellite and aerial views and small scale maps on which latitudes and longitudes are often either indecipherable or absent. The ANSMET site at shows some pix of meteorites in the field, unfortunately of rather too small a size to be interesting. ANSMET make no mention of any analytical program to establish their compositions. By chance a site in Germany was found called METBASE which has the compositions of 1297 analysed meteorites for which there is a charge. They also list 73,000 references to meteor publications, i.e. 70 per analysed sample! We will study these compositions and comment later. The “Antarctic Meteorite Newsletter” is available on line and gives a brief petrological descripition of all meteorites found by ANSMET, with small pix unfortunately not showing any textural detail. Their thin section displays are much better, about 5 x 5 size in both transmitted and reflected light, though identification of phases shown is rather minimal. The range of textures is quite amazing, from breccias, to shock-melted, to holocystalline examples. No mention is made of any of them being chemically analysed which is or should be the ulimate objective. We geochemists want to know why God put silica on every hand and hid tantalum way out of sight. We still believe in a rational universe! We would have liked to have shown the odd pic of some of these 26,500 meteorites, one would think SOME of them might be interesting. But most are curated with NASA in Houston who so far have not released any pix. The NIPR in Tokyo have also been contacted. |NASA has relented. Thanks to Dr Max Carman and Dr Righter we have this picture of a meteorite from Allen Hills, Antarctica.| Here we show a hypothetical search party: |Suggested titles include: • Cost effective, non mechanised transport, finds another! • The latest successful Transantarctic expedition nears the Pole • The secret reason for Amundsen’s success • Beneficial effects of antifreeze GE modification in the common dromedary • Scott would have made it if he’d used these! • The Australian Antarctic team find a scientific use for surplus camel population • Lawrence of Antarctica – the epic continues… – With apologies to Richard and Roland Pelisson of SaharaMet.com For an excellent site on meteorites, showing their collection in deserts where, as on the ice, they stand out against yellow sand, and the wind leaves them exposed, see “Saharamet” by Richard and Roland Pelisson. The site is an excellent illustration of how educational a good site can be, well illustrated, with classifications, thin sections and maps of strewn fields. There are three overlapping fields on the Dar Al Gani plateau in Libya alone, including carbonaceous chondrites and Martian examples. In some years, entirely self-financed, the Pelisson’s have picked up twice the weight of meteorites found in the Antarctic where the budget is in comparison, limitless. Best is their pic of a small cairn of stone left by Arabs to mark an old camel trail and which contains several black blocks of chondritic meteorite! Parts of the famous Sikhote-Alin meteorite>> another iron, but irons do look like REAL meteorites. - Location: Sikhote-Alin Mountains, about 270 miles northeast of Vladivostok. - Structural Class: Coarsest octahedrite, Ogg, Widmanstatten bandwidth 9 ±5 mm. - Chemical Class: Group IIB, 5.9% Ni, 0.42% Co, 0.46% P, about 0.28% S, 52 ppm Ga, 161 ppm Ge, 0.03 ppm Ir. - Fell: 12th of February 1947 at 10:38 a.m.
<urn:uuid:7f267bc8-a92c-4e97-9926-bf7cb8e449f8>
CC-MAIN-2021-10
https://www.rosssea.info/category/meteorites/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178373241.51/warc/CC-MAIN-20210305183324-20210305213324-00439.warc.gz
en
0.95873
1,681
2.828125
3
Generally, a single daylily bud is in bloom for a single day before it begins to wither. Multiple buds on the scapes provide bloom over a number of weeks each bloom season. Ancient Chinese used the plant’s roots, leaves and flowers for food. They also used its roots and crown as a pain reliever, a diuretic and for other medicinal purposes. Its botanical name, Hemerocallis, derives from two Greek words meaning “beauty” and “day,” referring to the fact that each flower lasts only one day. In some dictionaries and other reference works, this plant may be referred to as “day lily,” but the spelling was consolidated into a single word in 1923 upon the recommendation of the American Joint Committee on Horticultural Nomenclature, as reported by the publication Standardized Plant Names, 1923 edition, Preface, p. x and p. 199.
<urn:uuid:b5f2df6f-032d-4dae-b996-5827a969cd07>
CC-MAIN-2022-27
https://daylilies.org/daylily-dictionary/daylily/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00630.warc.gz
en
0.944286
197
3.375
3
On 16 October 2017, Minister of Agriculture, Forestry and Fisheries, Senzeni Zokwana - joined by SADC ambassadors Insidro Adriano from Angola and Prof Chrissie Kaponda from Malawi - commemorated World Food Day in Phuthaditjhaba, Qwaqwa in partnership with the Free State Department of Agriculture and Rural Development, the Maluti-A-Phofung Local Municipality and the Food and Agriculture Organization of the United Nations (FAO). Minister Senzeni Zokwana, MEC Oupa Khoabane planting a food garden during household visits in Phuthaditjhaba The aim of this year’s World Food Day, under the theme Change the Future of Migration. Invest in Food Security and Rural Development, is to raise awareness about investing and strengthening rural value chains to help eradicate migration and create local opportunities. This year’s goal repositions rural development as an enabler to ensure food security and a shift towards local value chain development. How do we change the future of migration, particularly in the face of increasing vulnerabilities? The ripple effect of urban migration “Urban migration has had a ripple effect in different sectors of our society by increasing the level of unemployment, crime, food insecurity, hunger and diseases. It has now become a problem that requires a multi-stakeholder approach that will provide short and long-term solutions. Creating conditions that allow rural people, especially youth, to stay at home when they feel it is safe to do so and to have more resilient livelihoods, is a crucial component of any plan to tackle the migration challenge” said Dr Lewis Hove, FAO country representative. More than 750 million people around the globe are affected by poverty and hunger and they remain food insecure. At the back of these statistics, children, men and women are threatened by protracted malnutrition and devastating loss of income. Scores of these vulnerable people are found in Africa, a continent endowed with ample natural resources. The government faces challenges in the fight against food insecurity which affects a large proportion of our people. While 30.4 million South Africans live in abject poverty, 13.7 million are food insecure. These are individuals who had to make modifications in their dietary preferences as a result of limited resources to acquire food. In Thabo Mofutsanyana alone over 630,000 people out of a total population of 779,330 live below the breadline and over 320,000 of the people remain unemployed of which 53% are young people. Support for indigent households, water-stressed communties “We have noted with grave concern, that Phuthaditjhaba residents have a severe water crisis. We have committed ourselves to contribute interventions that are relevant to the problems experienced in this area. To this end, we have provided 170 Jojo Water Tanks that are 2,500l, 150 water on wheelbarrows, 100 garden tools, and 1,000 fruit trees. These will be distributed to subsistence producers and the indigent households. The indigent households will also benefit from the food parcels packaged from donated food by our generous sponsors worth R1.4m. We will also drill about 50 boreholes throughout the province in collaboration with the Provincial Department of Agriculture province. The Agricultural Research Council also donated drought-tolerant hybrid seed as part of support for households engaged in agriculture,” said Zokwana during his keynote address. Delegation visits entrepreneurial projects The Minister and his delegation visited the Lejwe Motho project. This enterprise was established and founded by Msibi from the backyard of her house. The vegetable garden aims to fight and alleviate household food insecurity and poverty. Various vegetables are produced from quality certified seeds and produced throughout the year. She usually plants vegetables such as spinach, carrots, beetroot, onions, cabbage, peppers, chillies, pumpkins, green beans, broadleaves and herbs. Her hard work and dedication paid off when she became the overall winner under category Subsistence Producer in DAFF Female Entrepreneur Awards (FEA) 2017. They concluded projects visits with a visit to Dagbreek farm owned 75-year-old Makoele who employs 12 permanent workers, 46 casual workers (12 male and 34 female). He has 191 dairy cows, 42 beef cattle, 55 sheep. He plants 140ha of crops (maize, soya and dry beans) and 12ha of pastures. Makoele established an asparagus enterprise on a 15ha land. To ensure increased production, he has rented 318ha in a neighbouring farm. Department of Agriculture and Rural Development supported the project with 30ha of soya beans through Ilima/Letsema in 2012/13. In the financial year 2013/14, the project was funded with a milking parlour that consisted of four milking points. Minister Zokwana with provincial and local leadership unveiled a food mountain which symbolises more food in the world to feed people. They also participated in a march symbolic of alliance against hunger. FAO, represented by Dr Hove, donated an amount to the value of R20,000 each to Sebabatso Poultry, Lehlohonolo Vegetable garden and Tseseng Wool Growers all from the Maluti-A-Phofung Local Municipality. Our communities continue to face hunger and food insecurity especially the rural areas. South Africa continues to place food security high on the country’s developmental agenda with DAFF prioritising food security, job creation and contribution to the economy. The department is committed to ensuring national food security and the eradication of hunger. LEGAL DISCLAIMER: This Message Board accepts no liability of legal consequences that arise from the Message Boards (e.g. defamation, slander, or other such crimes). All posted messages are the sole property of their respective authors. The maintainer does retain the right to remove any message posts for whatever reasons. People that post messages to this forum are not to libel/slander nor in any other way depict a company, entity, individual(s), or service in a false light; should they do so, the legal consequences are theirs alone. Bizcommunity.com will disclose authors' IP addresses to authorities if compelled to do so by a court of law.
<urn:uuid:42b74e63-9291-49ed-a20b-598e3d5e0bed>
CC-MAIN-2018-39
http://www.bizcommunity.com/Article/196/358/168821.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155561.35/warc/CC-MAIN-20180918150229-20180918170229-00228.warc.gz
en
0.938407
1,303
2.53125
3
Subscribe / Renew October 27, 2011 The more important question is: Are we ready? From the standpoint of buildings constructed before 1994, the answer may be a sobering no. The numbers from the March 11 Sendai/Tohoku earthquake and tsunami were frightening, and were made more so by the dramatic live television pictures as the disaster unfolded. The subduction quake measured 9.0 on the Richter scale, originating from the nearby Japan Trench, which caused a tsunami up to 133 feet high. The Pacific Plate moved some 66 feet under the Japan Plate, shifted the entire island of Honshu 8 feet, dropped 250 miles of Japanese coastline 2 feet and, in the process, 20,000 people were killed or missing and 125,000 buildings were damaged or destroyed, including seven nuclear reactors. The losses are estimated at up to $34 billion. Almost the same magnitude subduction earthquake is predicted for Western Washington, British Columbia and Oregon. Like Japan, the Pacific Northwest is on the Pacific Ring of Fire and has a similar subduction zone, called the Cascadia Subduction Zone (CSZ), where the Juan de Fuca Plate meets the North American Plate 600 miles long and no more than 100 miles off the Washington and Oregon coasts. Subduction zones are places where one tectonic plate moves forcibly under another, potentially generating super quakes. Geologist Chris Goldfinger, professor at Oregon State University, considers Portland and Seattle to have a 10 to 15 percent chance of experiencing a Sendai-like magnitude 9.0 subduction earthquake in the next 50 years. It wouldn’t be the first time for this area. Around 1991, geologists discovered a history of massive, if infrequent, subduction zone earthquakes in the CSZ. In addition, they discovered that a quake of approximately magnitude 9.0 took place on Jan. 26, 1700, as well as some 40 other partial or full fault quakes in the last 10,000 years ranging from magnitude 8.0 to 9.2. The 311-year interval since the 1700 CSZ quake is longer than 75 percent of the inter-quake intervals for the CSZ in the last 10,000 years, with 41 magnitude 8.0 or higher CSZ quakes in the last 10,000 years. In a magnitude 9.0 CSZ quake, large plate movement occurs. Release of that much stored energy over the typical four-minute timeframe could initiate a 45-foot or higher tsunami, which would flatten and carry away most of the low-lying structures on the Oregon and Washington coasts. The damage to Seattle and Western Washington would come from liquefaction and/or subsidence and the one-minute or longer shock wave(s) that would severely damage a substantial percentage of the buildings, homes and infrastructure. Unreinforced masonry and high-rise buildings built prior to 1994 are especially at risk. Quake shock waves at periods of one second or more can create a damaging resonance between the ground and the long/tall structures above, such that an old high-rise building that would easily survive a magnitude 6.5 crustal quake might be severely damaged in a CSZ quake. Unreinforced masonry buildings are vulnerable to quake damage because typically they: • Have inadequate strength to resist horizontal forces. • Lack structural connections. • Lack flexibility and are heavy. • Have weak roof and floor diaphragms. • Have parapets, cornices, chimneys and stone ornamentation prone to breaking off. In 2007, Seattle commissioned the engineering firm Reid Middleton to study unreinforced masonry building seismic hazards. The study identified 850 to 1,000 unreinforced masonry and 156 old high-rise buildings in Seattle; and 2,200 unreinforced masonry buildings in King, Pierce and Snohomish counties. These buildings are a key component of “close-in” rental housing and commercial space and they contribute to Seattle’s historic fabric, as evidenced by Pioneer Square. However, in an earthquake they could be severely damaged. In fact, an inventory of high-rise buildings (12 stories or higher) in the Pacific Northwest identified that two-thirds (743 of the 1,131 high-rise buildings along the I-5 corridor, including Vancouver, B.C.) predate the mid-1990s building code changes that upgraded the seismic requirements for much of Oregon and Washington. Many buildings at risk Seattle does not mandate the seismic upgrading of vulnerable structures except when the owner is making substantial alterations, such as changing occupancy to a more hazardous use, significantly increasing the occupant load, or repairing a building that has suffered major damage or is deemed dangerous. The Director’s Rule and Client Assistance Memo No. 314 of the Seattle Department of Planning and Development provide a comprehensive explanation of the requirements for buildings undergoing substantial alterations or repairs but must be read in conjunction with Seattle Ordinance No. 123379, passed last year, which modifies some requirements and applications. While the 2001 Nisqually earthquake might have served as a wake-up call, the reality is that only 7 percent of unreinforced masonry buildings in Seattle were upgraded within seven years thereafter, even though 74 of those buildings were damaged. With increasing awareness of the CSZ risk, particularly in the aftermath of the Sendai earthquake, owners of unreinforced masonry buildings are likely to come under increasing pressure from casualty insurers and mortgage lenders to perform seismic upgrades to their buildings, which can be a costly proposition. Life-safety retrofits of an unreinforced masonry building in many cases could approach $30 a square foot, a substantial percent of the value of that building. In addition, there are few tax or other governmental incentives for such work. Aside from marginally lowering earthquake insurance premiums and mortgage interest rates, a retrofit rarely supports a rent increase and adds little to the cash flow of the building. Nevertheless, the owners and/or managers of unreinforced masonry and old high-rise buildings can and should take some preventative steps: 1. Consult a structural engineer and commission a seismic risk assessment of your building. 2. Determine if your building has been identified by your local government as an unreinforced masonry building or otherwise seismically deficient. The Reid Middleton study lists 20 pages of unreinforced masonry buildings in Seattle. 3. Consult your attorney as to possible liability to tenants and their guests and even passersby in the event of death, injury or property damage arising from building systems failure in an earthquake. Note such liability has been found to apply in at least one California case arising out of the magnitude 6.5 San Simeon earthquake of 2003. 4. Review the relevant sections of leases with commercial tenants to determine if the landlord has the right to pass on voluntary or government-mandated seismic upgrade costs as a “common area maintenance charge” or “additional rent.” 5. Determine what governmental incentives, if any, are available for the seismic upgrades. If your building is historic, there is a possible federal 20 percent historic income tax credit and a possible charitable deduction for a facade donation. Washington does not offer any incentives. Proposition 13 in California, passed in 2010, amended that state’s constitution to prohibit tax assessors from re-evaluating new construction for property tax purposes when the underlying purpose of the new construction is to seismically retrofit an existing building. While a 10 to 15 percent chance of a CSZ earthquake occurring in the next 50 years might seem low, the consequences of not being prepared could be devastating. Investigating the options now is easier than rebuilding shattered structures and lives in the aftermath. Stanton Phillip Beck is a member of the board of directors and the Construction Services Group at Lane Powell in Seattle. He received his engineering and law degrees from the University of Washington, where he was editor of Washington Law Review. He has been involved in most of the major construction projects in the Pacific Northwest, as well as significant national and international projects. comments powered by Disqus
<urn:uuid:b5fba6ba-b6f2-492c-afb0-73cf6e3776ac>
CC-MAIN-2018-26
http://www.djc.com/news/ae/12034617.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864337.41/warc/CC-MAIN-20180622010629-20180622030629-00599.warc.gz
en
0.948822
1,665
3.4375
3
Mothers Day was invented by Anna Jarvis after her mother passed away in 1905. Woodrow Wilson officially designated the holiday as the second Sunday in May in 1914, so this year marks 100 years of Mothers Days. But to Jarvis, it was Mother’s Day -with an apostrophe- meaning a day for each person to honor their own mother; a private family occasion. Anna Jarvis's idea of an intimate Mother's Day quickly became a commercial gold mine centering on the buying and giving of flowers, candies, and greeting cards—a development that deeply disturbed Jarvis. She set about dedicating herself and her sizable inheritance to returning Mother's Day to its reverent roots. Jarvis incorporated herself as the Mother's Day International Association and tried to retain some control of the holiday. She organized boycotts, threatened lawsuits, and even attacked First Lady Eleanor Roosevelt for using Mother's Day to raise funds for charities.
<urn:uuid:a877b16b-7133-45dc-8d35-a5dac845c3fe>
CC-MAIN-2016-36
http://www.neatorama.com/2014/05/09/Mothers-Day-Turns-100-Its-Surprisingly-Dark-History/
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295854.33/warc/CC-MAIN-20160823195815-00134-ip-10-153-172-175.ec2.internal.warc.gz
en
0.959696
186
3.484375
3
Month: June 2018 The aim of the Induction Wall Light is to use a scientific concept to approach lighting in a unique way. It powers a burnt-out fluorescent bulb through an electromagnetic field. A fluorescent bulb is normally lit with a wired connection at each of its pins, sending power through the filaments at either end and causing collisions between electrons inside the tube, which then give off light as they pass through the bulb’s phosphorous coating. When a bulb is burnt-out, it will be blackened on its ends, indicating that the fuses are blown and that it will no longer work in a standard fluorescent lighting setup. Despite the fact that the bulb seems useless as-is, it can still be lit through electromagnetic induction. The Induction Wall Light offers an opportunity to find interesting new uses for existing materials without letting them go to waste. Rather than destroying a fluorescent bulb, which would release gases that might be environmentally harmful (i.e. Argon and Mercury gases are commonly used in fluorescent bulbs), the Induction Wall Light can power any intact fluorescent bulb. It demonstrates that there is still life left in old bulbs even though they seem exhausted.
<urn:uuid:be1a62a9-2f22-4837-be6c-214620216a3d>
CC-MAIN-2018-26
http://castordesign.ca/2018/06/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864776.82/warc/CC-MAIN-20180622182027-20180622202027-00243.warc.gz
en
0.944446
237
3.515625
4
Virginia ConstitutionARTICLE I - Bill of Rights Section 1. Equality and rights of men. Section 2. People the source of power. Section 3. Government instituted for common benefit. Section 4. No exclusive emoluments or privileges; offices not to be hereditary. Section 5. Separation of legislative, executive, and judicial departments; periodical elections. Section 6. Free elections; consent of governed. Section 7. Laws should not be suspended. Section 8. Criminal prosecutions. Section 9. Prohibition of excessive bail and fines, cruel and unusual punishment, suspension of habeas corpus, bills of attainder, and ex post facto laws. Section 10. General warrants of search or seizure prohibited. Section 11. Due process of law; obligation of contracts; taking of private property; prohibited discrimination; jury trial in civil cases. Section 12. Freedom of speech and of the press; right peaceably to assemble, and to petition. Section 13. Militia; standing armies; military subordinate to civil power. Section 14. Government should be uniform. Section 15. Qualities necessary to preservation of free government. Section 16. Free exercise of religion; no establishment of religion. Section 17. Construction of the Bill of Rights. ARTICLE II - Franchise and Officers Section 1. Qualifications of voters. Section 2. Registration of voters. Section 3. Method of voting. Section 4. Powers and duties of General Assembly. Section 5. Qualifications to hold elective office. Section 6. Apportionment. Section 7. Oath or affirmation. Section 8. Electoral boards; registrars and officers of election. Section 9. Privileges of voters during election. ARTICLE III - Division of Powers Section 1. Departments to be distinct. ARTICLE IV - Legislature Section 1. Legislative power. Section 2. Senate. Section 3. House of Delegates. Section 4. Qualifications of senators and delegates. Section 5. Compensation; election to civil office of profit. Section 6. Legislative sessions. Section 7. Organization of General Assembly. Section 8. Quorum. Section 9. Immunity of legislators.. Section 10. Journal of proceedings. Section 11. Enactment of laws. Section 12. Form of laws. Section 13. Effective date of laws. Section 14. Powers of General Assembly; limitations. Section 15. General laws. Section 16. Appropriations to religious or charitable bodies. Section 17. Impeachment. Section 18. Auditor of Public Accounts. ARTICLE V - Executive Section 1. Executive power; Governor's term of office. Section 2. Election of Governor. Section 3. Qualifications of Governor. Section 4. Place of residence and compensation of Governor. Section 5. Legislative responsibilities of Governor. Section 6. Presentation of bills; powers of Governor; vetoes and amendments. Section 7. Executive and administrative powers. Section 8. Information from administrative officers. Section 9. Administrative organization. Section 10. Appointment and removal of administrative officers. Section 11. Effect of refusal of General Assembly to confirm an appointment by the Governor. Section 12. Executive clemency. Section 13. Lieutenant Governor; election and qualifications. Section 14. Duties and compensation of Lieutenant Governor. Section 15. Attorney General. Section 16. Succession to the office of Governor. Section 17. Commissions and grants. ARTICLE VI - Judiciary Section 1. Judicial power; jurisdiction. Section 2. Supreme Court. Section 3. Selection of Chief Justice. Section 4. Administration of the judicial system. Section 5. Rules of practice and procedure. Section 6. Opinions and judgments of the Supreme Court. Section 7. Selection and qualification of judges. Section 8. Additional judicial personnel. Section 9. Commission; compensation; retirement. Section 10. Disabled and unfit judges. Section 11. Incompatible activities. Section 12. Limitation; judicial appointment. ARTICLE VII - Local Government Section 1. Definitions. Section 2. Organization and government. Section 3. Powers. Section 4. County and city officers. Section 5. County, city, and town governing bodies. Section 6. Multiple offices. Section 7. Procedures. Section 8. Consent to use public property. Section 9. Sale of property and granting of franchises by cities and towns. Section 10. Debt. ARTICLE VIII - Education Section 1. Public schools of high quality to be maintained. Section 2. Standards of quality; State and local support of public schools. Section 3. Compulsory education; free textbooks. Section 4. Board of Education. Section 5. Powers and duties of the Board of Education. Section 6. Superintendent of Public Instruction. Section 7. School boards. Section 8. The Literary Fund. Section 9. Other educational institutions. Section 10. State appropriations prohibited to schools or institutions of learning not owned or exclusively controlled by the State or some subdivision thereof; exceptions to rule. Section 11. Aid to nonpublic higher education. ARTICLE IX - Corporations Section 1. State Corporation Commission. Section 2. Powers and duties of the Commission. Section 3. Procedures of the Commission. Section 4. Appeals from actions of the Commission. Section 5. Foreign corporations. Section 6. Corporations subject to general laws. Section 7. Exclusions from term "corporation" or "company." ARTICLE X - Taxation and Finance Section 1. Taxable property; uniformity; classification and segregation. Section 2. Assessments. Section 3. Taxes or assessments upon abutting property owners. Section 4. Property segregated for local taxation; exceptions. Section 5. Franchise taxes; taxation of corporate stock. Section 6. Exempt property. Section 7. Collection and disposition of State revenues. Section 8. Limit of tax or revenue. Section 9. State debt. Section 10. Lending of credit, stock subscriptions, and works of internal improvement. Section 11. Governmental employees retirement system. ARTICLE XI - Conservation Section 1. Natural resources and historical sites of the Commonwealth. Section 2. Conservation and development of natural resources and historical sites. Section 3. Natural oyster beds. Section 4. Right of the people to hunt, fish, and harvest game. ARTICLE XII - Future Changes Section 1. Amendments. Section 2. Constitutional convention. Section 1. Effective date of revised Constitution. Section 2. Officers and elections. Section 3. Laws, proceedings, and obligations unaffected. Section 4. Qualifications of judges. Section 5. First session of General Assembly following adoption of revised Constitution.
<urn:uuid:914d7f0d-64d2-4ac2-9db2-ef464829fcc4>
CC-MAIN-2014-10
http://law.justia.com/constitution/virginia/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011188282/warc/CC-MAIN-20140305091948-00025-ip-10-183-142-35.ec2.internal.warc.gz
en
0.837554
1,435
3.078125
3
Found 4 items, similar to Note. English → Indonesian English → Indonesian bongmeh, catat, catatan, mencamkan, mencatat, mencerap, mengarah-arah, mengawaskan, perhatian English → English n 1: a short personal letter; “drop me a line when you get there” [syn: short letter 2: a brief written record; “he made a note of the appointment” 3: a characteristic emotional quality; “it ended on a sour ; “there was a note of gaiety in her manner” detected a note of sarcasm” 4: a piece of paper money (especially one issued by a central bank); “he peeled off five one-thousand-zloty notes” , government note , bank bill , banker's bill , Federal Reserve note 5: a notation representing the pitch and duration of a musical sound; “the singer held the note too long” [syn: musical note 6: a comment or instruction (usually added); “his notes were appended at the end of the article” ; “he added a short notation to the address on the envelope” 7: high status importance owing to marked superiority; “a scholar of great eminence” 8: a tone of voice that shows what the speaker is feeling; “there was a note of uncertainty in his voice” 9: a promise to pay a specified amount on demand or at a certain time; “I had to co-sign his note at the bank” [syn: promissory note , note of hand v 1: make mention of; “She observed that his presentation took up too much time” ; “They noted that it was a fine day to go 2: notice or perceive; “She noted that someone was following ; “mark my words” ] [ant: ignore 3: observe with care or pay close attention to; “Take note of this chemical reaction” [syn: take note 4: make a written note of; “she noted everything the teacher said that morning” [syn: take down English → English (n[=o]t), v. t. [AS. hn[=i]tan to strike against, To butt; to push with the horns. [Prov. Eng.] (n[=o]t). [AS. n[=a]t; ne not + w[=a]t wot. See , and Wot Know not; knows not. [Obs.] Nut. [Obs.] --Chaucer. , n. [AS. notu use, profit.] Need; needful business. [Obs.] --Chaucer. , n. [F. note, L. nota; akin to noscere, notum, to know. See Know 1. A mark or token by which a thing may be known; a visible sign; a character; a distinctive mark or feature; a Whosoever appertain to the visible body of the church, they have also the notes of external She [the Anglican church] has the note of possession, the note of freedom from party titles,the note of life -- a tough life and a vigorous. --J. H. What a note of youth, of imagination, of impulsive eagerness, there was through it all ! --Mrs. Humphry 2. A mark, or sign, made to call attention, to point out something to notice, or the like; a sign, or token, proving or giving evidence. 3. A brief remark; a marginal comment or explanation; hence, an annotation on a text or author; a comment; a critical, explanatory, or illustrative observation. The best writers have been perplexed with notes, and obscured with illustrations. --Felton. 4. A brief writing intended to assist the memory; a memorandum; a minute. 5. pl. Hence, a writing intended to be used in speaking; memoranda to assist a speaker, being either a synopsis, or the full text of what is to be said; as, to preach from notes; also, a reporter's memoranda; the original report of a speech or of proceedings. 6. A short informal letter; a billet. 7. A diplomatic missive or written communication. 8. A written or printed paper acknowledging a debt, and promising payment; as, a promissory note; a note of hand; a negotiable note. 9. A list of items or of charges; an account. [Obs.] Here is now the smith's note for shoeing. --Shak. (a) A character, variously formed, to indicate the length of a tone, and variously placed upon the staff to indicate its pitch. Hence: (b) A musical sound; a tone; an utterance; a tune. (c) A key of the piano or organ. The wakeful bird . . . tunes her nocturnal That note of revolt against the eighteenth century, which we detect in Goethe, was struck by Winckelmann. --W. Pater. 11. Observation; notice; heed. Give orders to my servants that they take No note at all of our being absent hence. --Shak. 12. Notification; information; intelligence. [Obs.] The king . . . shall have note of this. --Shak. 13. State of being under observation. [Obs.] Small matters . . . continually in use and in note. 14. Reputation; distinction; as, a poet of note. There was scarce a family of note which had not poured out its blood on the field or the scaffold. 15. Stigma; brand; reproach. [Obs.] --Shak. Note of hand , a promissory note. , v. t. [imp. & p. p. Noted ; p. pr. & vb. n. .] [F. noter, L. notare, fr. nota. See Note 1. To notice with care; to observe; to remark; to heed; to attend to. --Pope. No more of that; I have noted it well. --Shak. The world will little note, nor long remember, what we say here, but it can never forget what they did 2. To record in writing; to make a memorandum of. Every unguarded word . . . was noted down. 3. To charge, as with crime (with of or for before the thing charged); to brand. [Obs.] They were both noted of incontinency. --Dryden. 4. To denote; to designate. --Johnson. 5. To annotate. [R.] --W. H. Dixon. 6. To set down in musical characters. To note a bill or To note a draft , to record on the back of it a refusal of acceptance, as the ground of a protest, which is done officially by a notary.
<urn:uuid:ef8148ad-b7d5-4777-af50-b533281d1591>
CC-MAIN-2018-17
http://kamus.landak.com/cari?emang=Note
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944682.35/warc/CC-MAIN-20180420194306-20180420214306-00330.warc.gz
en
0.832507
1,609
3.234375
3
Flipping the classroom is one of the top trends in school reform, with more and more teachers trying the approach in an attempt to boost student engagement and achievement. The concept is simple: Teachers create or find online short videos that explain a lesson or concept, and students watch the videos at home. Students then come to class the next day prepared to complete “homework” during class time. Supporters say the flipped classroom model works because students aren’t struggling to finish assignments at home without the help of a teacher should problems or confusion arise. Teachers are able to spend less time lecturing and more time helping students. “Start off slow—one or two things at a time,” advised Gwynn Loftin, an educator with Highland Park Independent School District in Texas, during a Texas Computer Education Association 2013 conference session. “You are going to have bumps and bruises along the way, but it is so very much worth it.” For more coverage of TCEA 2013, see: Even the most pro-flipping educators may experience some discomfort with the process. “The teacher’s role changes; you’re not the center of attention anymore, and for some of us that’s hard to get used to. You become a player on the side,” Loftin said. Loftin’s district has flipped lessons about the planets, poetry, and social studies, using a website or tool such as Moodle or Edmodo to house videos, blogs, and assignments; and video creation tools or video sites such as YouTube, Brain Pop, Khan Academy, or LearnZillion. On the other hand, flipping the classroom presents challenges for students who might not have access to internet-enabled devices, or the internet itself, at home, and who therefore encounter obstacles when they try to watch their teacher’s video. (Next page: How one district overcomes access obstacles)
<urn:uuid:40af7a73-d445-4625-840e-465e7c9721be>
CC-MAIN-2022-05
https://www.eschoolnews.com/2013/02/28/what-to-consider-when-flipping-the-k-12-classroom/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303779.65/warc/CC-MAIN-20220122073422-20220122103422-00341.warc.gz
en
0.935913
404
3.28125
3
According to World Health Organization (WHO) statistics, over the past few years cardiovascular diseases such as heart attacks and strokes have started to affect much younger people. Source: Alamy / Legion Media Scientists from the Institute of Nuclear Physics, Cytology and Genetics in Novosibirsk have created an innovative new medication, Trombovazim, based on research conducted for the Soviet military. Blood clots that result in cardiovascular diseases such as myocardial infarction are dissolved by the drug. According to its sponsors, Trombovazim is unique in terms of how it works. Cardiovascular diseases: a panacea is needed According to estimates from the Russian Ministry of Health, over the past 10 years the total incidence of acute myocardial infarction – and, as a consequence, disability and mortality – in Russia has declined. However, the level of reoccurrence over the same period has increased. According to World Health Organization (WHO) statistics, over the past few years cardiovascular diseases such as heart attacks and strokes have started to affect much younger people. One in 10 people aged 20 to 39 suffer from high blood pressure, whereas these ailments only recently rarely affected those younger than 40. Andrei Bekarev, chairman of the board of directors at Biotechnopark in Koltsovo, a research settlement near Novosibirsk, told RIR that Trombovazim was the first drug of a new class of thrombolytic medicines for the treatment and prevention of myocardial infarction, stroke, pulmonary embolism and thrombophlebitis. Trombovazim is made from plants and then treated with an electron beam accelerator. During this process a connection takes place in the form of a "cross-linking" of polymers with biomolecules. According to Bekarev, the body does not perceive the drug as foreign, so there is no immune response. "Normally when artificial proteins are administered to the body, rejection and even various allergic reactions may occur that lead right up to anaphylactic shock and death,” says Bekarev. “But in the case of our drug, under the influence of ionizing radiation the chemical bonds are broken on the polymer and form a sort of ‘coat’ around proteins. In other words, the properties of proteins do not change, and the body does not reject the drug.” Prototype designed in Afghanistan Scientists around the world have spent about 40 years of research on joining fragments of polymer with various components using electron-beam synthesis. In the 1980s scientists in Novosibirsk, under the leadership of Rudolf Salganik, created Imozimaza to treat open wounds and stop bleeding. This research was funded by the Soviet military and became a prototype of the future Trombovazima. “The drug performed well during the war in Afghanistan,” says Bekarev. “But they did not have time to complete it before the end of the war and so it proved to be difficult to use and inconvenient to store since it was affected by temperatures above 6-8 degrees Celsius.” In the 1990s after the Soviet collapse, many research and development projects were abandoned, including Imozimaza. Bekarev said that the medication never reached the stage for release as a high-grade drug, but it is still used in veterinary medicine. In the 2000s, the economic situation in Russia changed somewhat and the scientists had an opportunity to revive their project and they decided to modify this “Afghan” drug. Unlike Imozimaza, Trombovazim is stable, and toxicity has been reduced. Moreover, according to Bekarev, it’s the only antithrombotic agent used orally. “There are alternatives, but they do not directly affect the clot," says Bekarev. The drug has passed all pre-clinical and clinical studies and is being manufactured in Koltsovo in the form of tablets and a solution for injection. For the creation of the development of the drug, the team received the Novosibirsk Region State Prize. However, even such drugs as Trombovazim can’t be a panacea for curing cardiovascular diseases, says cardiologist Alexandra Bessonova. “Harmful habits such as alcohol, smoking, high-calorie food and a couch-potato lifestyle are the main reasons for heart attacks in Russia,” Bessonova says. “The myocardial infraction death rate in the country is almost 25 percent. After thrombolytic therapy patients have to change their lifestyle to avoid recurrent heart attacks.” All rights reserved by Rossiyskaya Gazeta. to our newsletter! Get the week's best stories straight to your inbox
<urn:uuid:dffdb21b-1409-43c0-a5c7-918ec19f39c5>
CC-MAIN-2019-47
https://www.rbth.com/economics/2015/05/06/russian_scientists_develop_medicine_for_strokes_and_heart_attacks_42989
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667260.46/warc/CC-MAIN-20191113113242-20191113141242-00072.warc.gz
en
0.96011
1,018
3.140625
3
Food safety has broad implications for public health. For U.S. consumers and the food industry alike, the current outbreak of Ebola in West Africa raises numerous questions. That’s why the Centers for Disease Control and Prevention (CDC) has published Q&As that address common concerns. By reading and sharing this information, healthcare workers can address misconceptions about how Ebola is transmitted. For example, in the Q&As for Consumers section, the CDC explains that the Ebola virus is not spread by consuming food, with the possible exception of bushmeat. Part of people’s diets in developing regions of the world, bushmeat comes from bats, monkeys and other animals that aren’t typically part of Western cuisine. As the CDC notes, it’s illegal to import bushmeat into the U.S. and smugglers face stiff penalties. Regulations from the U.S. Department of Agriculture (USDA) also protect consumers who buy imported meats, such as beef and pork, which are a regular part of the American diet. In addition, the CDC stresses the safety of domestically-produced foods. No one has been infected with Ebola by eating foods that were imported or smuggled, and no one has been infected by foods that were grown or produced domestically. The CDC also provides Q&As for the Food Industry, which includes restaurants and food processors. To date, there is no evidence the Ebola virus has ever spread through food contaminated with the blood or bodily fluids of an infected food worker. If a worker exhibits the signs or symptom of Ebola, however, the individual and the employer should contact the state health department immediately. Do the CDC’s Q&As for consumer and the food industry adequately address the concerns of healthcare workers? Will this information help you to assess and advise patients who have concerns about food safety and the Ebola virus?
<urn:uuid:df09231f-308a-48f5-9479-6fe5f3c2ba88>
CC-MAIN-2023-23
http://healthcare-news.edgelearn.com/ebola-food-safety-and-public-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00376.warc.gz
en
0.959715
376
3.71875
4
The evolution of fish is not studied as a single event since fish do not represent a monophyletic group. Fish first appeared during the Cambrian explosion, around 530 million years ago (Ma). Early fish from the fossil record are represented by a group of small, jawless, armored fish known as ostracoderms. Jawless fish lineages are mostly extinct. An extant clade, the lampreys may approximate ancient pre-jawed fish. The first jaws are found in Placoderm fossils. The diversity of jawed vertebrates may indicate the evolutionary advantage of a jawed mouth. It is unclear if the advantage of a hinged jaw is greater biting force, improved respiration, or a combination of factors. Fish may have evolved from an animal similar to a coral-like sea squirt, whose larvae resemble primitive fish in important ways. The first ancestors of fish may have kept the larval form into adulthood (as some sea squirts do today), although perhaps the reverse is the case. Vertebrates, among them the first fishes, originated about 530 million years ago during the Cambrian explosion, which saw the rise in organism diversity. Read more ... 15-foot-long skeleton of extinct dolphin suggests parallel evolution among whales PhysOrg - July 9, 2020 Report offers a detailed description of the first nearly complete skeleton of an extinct large dolphin, discovered in what is now South Carolina. The 15-foot-long dolphin (Ankylorhiza tiedemani comb. n.) lived during the Oligocene - about 25 million years ago - and was previously known only from a partial rostrum (snout) fossil. The researchers say that multiple lines of evidence - from the skull anatomy and teeth, to the flipper and vertebral column - show that this large dolphin (a toothed whale in the group Odontoceti) was a top predator in the community in which it lived. Many features of the dolphin's postcranial skeleton also imply that modern baleen whales and modern toothed whales must have evolved similar features independently, driven by parallel evolution in the very similar aquatic habitats in which they lived. Strange hollow ball-like structures found in 80-million-year-old fossils from species believed to be related to starfish and sea urchins PhysOrg - May 12, 2020 The scientists found the unusual structures known as buckyballs made up of a series of hexagons and pentagons in two species—the Uintacrinus socialis and Marsupites testudinarius. They believe the structures might have acted as a buoyancy chamber to allow the crinoid organisms to float in seawater, but also protect them. Bonanza of Bizarre Cambrian Fossils Reveals Some of the Earliest Animals on Earth Live Science - March 21, 2019 A newfound fossil site in China is teeming with bizarre, primitive species that have never before been found any place on Earth. The bounty of creatures includes a spiny, segmented animal known as a mud dragon, and several jellyfish with preserved tentacles. Paleontologists discovered this treasure trove of fossils, which are incredibly well-preserved, along the banks of the Danshui River in southern China. The dozens upon dozens of creatures date to the Cambrian Period (490 million to 530 million years ago), when Earth's animal diversity was booming at an unprecedented pace. Scientists collected hundreds of specimens and identified fossils of 101 animals. Of those, more than half are new species that have yet to be described, the researchers reported in a new study. Treasure trove of marine fossils from 'Cambrian explosion' found in China PhysOrg - March 22, 2019 The emergence of such a wide variety of phyla in such a short time has led to use of the term "Cambrian explosion" to describe it. Fossilized slime of 100-million-year-old hagfish shakes up vertebrate family tree Science Daily - January 21, 2019 Paleontologists have discovered the first detailed fossil of a hagfish, the slimy, eel-like carrion feeders of the ocean. The 100-million-year-old fossil helps answer questions about when these ancient, jawless fish branched off the evolutionary tree from the lineage that gave rise to modern-day jawed vertebrates, including bony fish and humans. The fossil of a 180-million-year-old ichthyosaur from the Jurassic era has been discovered and it contains evidence of blubber and skin, making the creature more similar to modern-day dolphins than previously thought New York Post - December 6, 2018 The creature was likely warm-blooded and potentially could use its coloration to help it hide from predators. Rare fossil of an Ichthyosaur that was pregnant with octuplets shows the aquatic reptiles gave birth to live young rather than laid eggs 180 million years ago Daily Mail - April 5, 2018 The rare fossil of a pregnant Ichthyosaur with the remains of up to eight tiny embryos between its ribs reveals how these animals were giving birth 180 million years ago. These aquatic reptiles gave birth to live young, rather than laying eggs, and did not need to return to land, even to breed. The huge animals, which remained at the top of the food chain for millions of years during the Jurassic period, developed a streamlined, fish-like form built for speed. The fossil of the incredible three-metre long (ten-foot long) aquatic reptile was found by paleontologists near Whitby, North Yorkshire in 2010. Only five ichthyosaur specimens from Britain have ever been found with embryos and none with this many. New postcranial skeleton of ancient dolphin Albertocetus meffordum found in South Carolina PhysOrg - November 9, 2017 Previous research has shed light on the early evolutionary history of toothed whales, and particularly xenorophid dolphins - the earliest group of echolocating dolphins. Since the archaeological record for Xenorophidae is very limited, prior studies have focused on the crania or earbones of xenorophid dolphins. Four of the specimens belonged to the xenorophid Albertocetus meffordorum, and one contained a partial skeleton including ribs, vertebrae, and chevrons as well as a partial skull and mandible. Since these specimens were collected from formations dating to the Oligocene (33.9 million to 23 million years before the present), this finding extends the known evolutionary history for this group. Largest Ichthyosaurus (fish) was pregnant mother, say paleontologists PhysOrg - August 28, 2017 Scientists from the UK and Germany have discovered the largest Ichthyosaurus on record and found it was pregnant at the time of death. The new specimen is estimated to be between 3 and 3.5 m long and is an adult female. Ichthyosaurs were a highly successful group of sea-going reptiles that became extinct about 90 million years ago. Often misidentified as swimming dinosaurs, these reptiles appeared before the first dinosaurs had evolved. The largest species of ichthyosaur grew to over 20 m in length. The new specimen was originally discovered on the Somerset coast, during the mid-1990s, and is from the Early Jurassic, roughly 200 million years old. However, the specimen remained unstudied until it wound up in the collections of the Lower Saxony State Museum in Hannover, Germany. 'Sea dragon' fossil is 'largest on record' BBC - August 28, 2017 The fossil of a marine reptile ''re-discovered'' in a museum is the largest of its kind on record, say scientists. The ''sea dragon'' belongs to a group that swam the world's oceans 200 million years ago, while dinosaurs walked the land. The specimen is the largest Ichthyosaurus to be described, at more than three metres long. It was discovered on the coast of England more than 20 years ago, but has remained unstudied until now. Ancient 'Strange-Face' Dolphin Used Its Snout to Vacuum Up Food Live Science - August 23, 2017 A now-extinct dwarf dolphin whose name means "weaponless-snouted strange face" may have once used its toothless mouth to suck up fish and squid, a new study finds.The finding suggests that modern dolphins and whales developed bizarre forms of feeding within only a few million years after they evolved, the researchers said. Divers hunting for shark teeth found the skull fossil of a dolphin at the bottom of the Wando River near Charleston, South Carolina. Based on the layers of sandy limestone in which the bone was discovered, the scientists determined that the fossil is about 28 million to 30 million years old. Desert Fossils Reveal 540-Million-Year-Old Jellyfish 'Graveyard' Live Science - August 7, 2017 540 million years ago, seaside sand contained densely packed microbial communities, which created a gooey glue that was excellent for preserving impressions of ocean creatures left high and dry by retreating waves. New species of bus-sized fossil marine reptile unearthed in Russia Science Daily - May 25, 2017 A new species of a fossil pliosaur (large predatory marine reptile from the 'age of dinosaur') has been found in Russia and profoundly change how we understand the evolution of the group, says an international team of scientists. Spanning more than 135 Ma during the 'Age of Dinosaurs', plesiosaur marine reptiles represent one of longest-lived radiations of aquatic tetrapods and certainly the most diverse one. Plesiosaurs possess an unusual body shape not seen in other marine vertebrates with four large flippers, a stiff trunk, and a highly varying neck length. Pliosaurs are a special kind of plesiosaur that are characterized by a large, 2m long skull, enormous teeth and extremely powerful jaws, making them the top predators of oceans during the 'Age of Dinosaurs'. Spanning more than 135 Ma during the 'Age of Dinosaurs', plesiosaur marine reptiles represent one of longest-lived radiations of aquatic tetrapods and certainly the most diverse one. Plesiosaurs possess an unusual body shape not seen in other marine vertebrates with four large flippers, a stiff trunk, and a highly varying neck length. Pliosaurs are a special kind of plesiosaur that are characterized by a large, 2m long skull, enormous teeth and extremely powerful jaws, making them the top predators of oceans during the 'Age of Dinosaurs'. The Best Fossil Octopus Ever Found Scientific American - March 6, 2017 A good cephalopod fossil is hard to find. Although ammonite shells, belemnite guards and other indicators of hard body parts are abundant in the fossil record, paleontologists seldom get to see the characteristic soft-tissue anatomy of these many-armed swimmers. Finds are so rare that one from 1982 still stands out: a 165-million-year-old fossilized octopus uncovered in France. Paleontologists classify mysterious ancient cone-shaped sea creatures Science Daily - January 11, 2017 One branch on the tree of life is heavier as a team of scientists has determined what a bizarre group of extinct cone-shaped animals actually are. Known as hyoliths, these marine creatures evolved over 530 million years ago and are among the first known to have external skeletons. Long believed to be molluscs, a new study shows a stronger relationship to brachiopods -- a group with a rich fossil record though few species living today. Early fossil fish from China shows where our jaws came from Science Daily - October 20, 2016 Where did our jaws come from? The question is more complicated than it seems, because not all jaws are the same. In a new article, palaeontologists from China and Sweden trace our jaws back to the extinct placoderms, armoured prehistoric fish that lived over 400 million years ago. New species of fossil dolphin found BBC - August 17, 2016 Scientists have identified a new species of dolphin that lived 25 million years ago. The extinct animal has been described through re-examination of a specimen that's been in a museum collection since 1951. Researchers think it is a relative of the endangered South Asian river dolphin, offering clues to the evolutionary history of modern species. The findings have been published in the journal open access PeerJ. The fossil, a partial skull about 22cm (9ins) long, was discovered in southeastern Alaska by geologist Donald J Miller. It then spent decades in the collection of the Smithsonian Museum of Natural History in Washington DC. The dolphin swam in sub-arctic marine waters about 25 million years ago, according to the new study's authors Alexandra Boersma and Nicholas Pyenson, who are based at the Smithsonian. Skull analysis of Qingmendous offers insight into creatures between pre-lobed fish and tetrapods PhysOrg - June 6, 2016 A team of researchers working at the Chinese Academy of Sciences has uncovered new characteristics of Qingmendous, an Onychodont that lived during the time between fish without lobed fins and tetrapods. In their paper published in the journal Science Advances, the team describes their study of the fish and discuss its possible place in the evolutionary history of the creatures that eventually made their way onto land Strange sea-dwelling reptile fossil hints at rapid evolution after mass extinction PhysOrg - May 23, 2016 Two hundred and fifty million years ago, life on earth was in a tail-spin - climate change, volcanic eruptions, and rising sea levels contributed to a mass extinction that makes the death of the dinosaurs look like child's play. Marine life got hit hardest - 96% of all marine species went extinct. For a long time, scientists believed that the early marine reptiles that came about after the mass extinction evolved slowly, but the recent discovery of a strange new fossil brings that view into question. 520-million-year-old fossilized nervous system is most detailed example yet found PhysOrg - February 29, 2016 Researchers have found one of the oldest and most detailed fossils of the central nervous system yet identified, from a crustacean-like animal that lived more than 500 million years ago. The fossil, from southern China, has been so well preserved that individual nerves are visible, the first time this level of detail has been observed in a fossil of this age. The findings are helping researchers understand how the nervous system of arthropods - creepy crawlies with jointed legs - evolved. Finding any fossilized soft tissue is rare, but this particular find represents the most detailed example of a preserved nervous system yet discovered. Discovery of new fossil species reveals unique binocular vision of the first ancient marine reptile PhysOrg - December 9, 2015 An international research partnership is revealing the first mosasaur fossil of its kind to be discovered in Japan. Not only does the 72-million-year-old marine reptile fossil fill a biogeographical gap between the Middle East and the eastern Pacific, but also it holds new revelations because of its superior preservation. Bizarre Ancient Sea Creature Was Well-Armed for Feeding Live Science - November 29, 2015 A bizarre creature that looks like nothing alive on Earth today probably used its unique shape to collect drifting particles from the ocean to feed on, new research finds. Tribrachidium was a denizen of the shallow seas about 550 million years ago, during the late Ediacaran period. It looked like a disc with three tentaclelike arms protruding from its flat top. Oddly, Tribrachidium had three-fold symmetry, meaning three segments were mirror images of each other. For comparison, humans have two-fold, or bilateral, symmetry, and starfish have five-fold symmetry. Nothing alive today has three-fold symmetry. Because we have no obvious modern comparison, that's made it really hard to work out what this organism was like when it was alive — how it moved, if it moved, how it fed, how it reproduced. End of the dinosaurs gave rise to the modern 'Age of Fishes,' researchers find PhysOrg - June 30, 2015 A pair of paleobiologists from Scripps Institution of Oceanography, UC San Diego have determined that the world's most numerous and diverse vertebrates - ray-finned fishes - began their ecological dominance of the oceans 66 million years ago, aided by the mass extinction event that killed off dinosaurs. Mammals evolved 250 million years ago but didn't become really important until after the mass extinction. Ray-finned fishes have the same kind of story. The lineage has been around for hundreds of millions of years, but without the mass extinction event 66 million years ago, it is very likely that the oceans wouldn't be dominated by the fish we see today. Four hundred million year old fish fossil has earliest example of teeth PhysOrg - June 24, 2015 A pair of researchers has found what appears to be the earliest known example of a creature sporting teeth. After much research, scientists have come to believe that modern teeth, regardless of species, originated from scales on fish - this new research appears to confirm that theory and also offers some new insights into how it was that teeth came to exist. Fossil ancestor shows sharks have a bony past PhysOrg - May 29, 2015 Most people know that sharks have a distinctive, all-cartilage skeleton, but now a fossil from Western Australia has revealed a surprise 'missing link' to an earlier, more bony form of the fish. Something out of 'Alien': Rare frilled shark caught off Australian coast CNN - January 22, 2015 It looks like something out of "Alien" but has more in common with "Jurassic Park." It's a rare frilled shark that has been caught by a fisherman in Australia, where no one remembers ever seeing one caught before. With a mouth packed full of needle-like teeth and a body like an eel's, the 6-foot-long frilled shark is sometimes described as a fish "fossil" that dates back 80 million years. Brain of world's first known predators discovered Science Daily - July 17, 2014 Scientists have found the fossilized remains of the brain of the world's earliest known predators, from a time when life teemed in the oceans but had not yet colonized the land. The discovery reveals a brain much simpler than those known in some of the animal's prey and helps answer questions surrounding the evolution of arthropods. The find for the first time identifies the fossilized brain of what are considered the top predators of their time, a group of animals known as anomalocaridids, which translates to "abnormal shrimp." Long extinct, these fierce-looking arthropods were first discovered as fossils in the late 19th century but not properly identified until the early 1980s. They still have scientists arguing over where they belong in the tree of life. Oldest ionoscopiform fish found from the Middle Triassic of South China PhysOrg - June 3, 2014 Ionoscopiform fishes have been known only from the Late Jurassic of Europe and the Early Cretaceous of the New World, although potential ionoscopiforms based on poorly preserved specimens, questionably assigned in the genus Ophiopsis, have been reported from the Middle Triassic (Ladinian) of Italy and Austria. The Ionoscopiformes are extinct marine halecomorphs, and the Halecomorphi are a major subdivision of the ray-finned fishes. Although living halecomorphs are represented solely by the freshwater bowfin, Amia calva, this clade has a rich fossil history, and the resolution of interrelationships among extinct members is central to the problem of understanding the origin of the Teleostei, the largest clade of extant vertebrates. Ancient 'Fish Lizard' Graveyard Discovered Beneath Melting Glacier Live Science - May 28, 2014 Dozens of nearly complete skeletons of prehistoric marine reptiles have been uncovered near a melting glacier in southern Chile. Scientists found 46 specimens from four different species of extinct ichthyosaurs. These creatures, whose Greek name means "fish lizards," were a group of large, fast-swimming marine reptiles that lived during the Mesozoic Era, about 245 million to 90 million years ago. The newly discovered skeletons are from both embryos and adults. The creatures, likely killed during a series of catastrophic mudslides, were preserved in deep-sea sediments that were later exposed by the melting glacier. 180-Million-Year-Old Fossils Revealed in Jurassic Deep Sea Live Science - May 21, 2014 Ancient fossils now reveal that the deep sea may be the origin of many lineages of sea creatures found closer to the surface, such as a number of sea stars, sea urchins and snails, researchers say. These new findings suggest the deep sea has played a much greater role in producing and preserving diversity in marine life than once thought, scientists added. The deep sea was long thought to be a lifeless desert. Intense research in the last few decades, however, has revealed that it actually supports one of the highest levels of biodiversity on Earth. Off to See the Wizard? Ancient Fossils Had Heart and Brain Live Science - April 7, 2014 The fossil of an extinct marine predator that lay entombed in an ancient seafloor for 520 million years reveals the creature had a sophisticated heart and blood-vessel system similar to those of its distant modern relatives, arthropods such as lobsters and ants, researchers report today. The cardiovascular system was discovered in the 3-inch-long (8 centimeters) fossilized marine animal species called Fuxianhuia protensa, which is an arthropod from the Chengjiang fossil site in China's Yunnan province. It is the oldest example of an arthropod heart and blood vessel system ever found. Ancient shrimp-like animals had 'modern' hearts and blood PhysOrg - April 7, 2014 > In international team of researchers has discovered the earliest known cardiovascular system, and the first to clearly show a sophisticated system complete with heart and blood vessels, in fossilized remains of an extinct marine creature that lived over half a billion years ago. The finding sheds new light on the evolution of body organization in the animal kingdom and shows that even the earliest creatures had internal organizational systems that strongly resemble those found in their modern descendants. Counting calories in the fossil record PhysOrg - March 26, 2014 > Starting about 250 million years ago, at the end of the Permian period, brachiopod groups disappeared in large numbers, along with 90 percent of the planet's species. Today, only a few groups, or genera, of brachiopods remain. Most people won't be familiar with brachiopods. They're pretty rare in the modern ocean. Why one group of shelled animals thrived while the other barely survived is one of the great mysteries in paleontology. A popular theory, based on diversity and abundance data from the fossil record for the two groups, is that bivalves simply outcompeted brachiopods. But a new study by Payne and other researchers that looks at the issue from an energy standpoint paints a different picture. Fossil porpoise has a chin for the ages PhysOrg - March 13, 2014 Scientists have identified a new species of ancient porpoise with a chin length unprecedented among known mammals and suggest the animal used the tip of its face to probe the seabed for food. Related to living crown porpoises, the extinct Californian porpoise, Semirostrum ceruttii, had an extension of its jaw called a symphysis the analogue of the human chin that measured 85 centimeters in the best-preserved specimen, researchers said. The typical symphysis of a crown porpoise measures one or two centimeters. Parental care of the young from 450 million years ago PhysOrg - March 13, 2014 A portrait of prehistoric parenthood captured deep in the fossil record has been uncovered. The 'nursery in the sea' has revealed a species new to science – with specimens preserved incubating their eggs together with probable hatched individuals. As a result, the team has named the new species Luprisca incuba after Lucina, goddess of childbirth, and alluding to the fact that the fossils are ancient and in each case the mother was literally sitting on her eggs. Researchers reveal new New Zealand fossil dolphin PhysOrg - January 22, 2014 A newly recognized fossil dolphin from New Zealand, dubbed Papahu taitapu, is the first of its kind ever found and may be a close relation to the ancestors of modern dolphins and toothed whales. Papahu lived 19–22 million years ago, and is one of the few dolphins to be reported globally dating to the start of the Miocene epoch. Judging from the size of its skull, Papahu was about two metres long, roughly the size of a common dolphin. Strange Ancient Fish Had Front And Back Legs Live Science - January 14, 2014 The closest known relative of the ancestors of limbed animals such as humans likely evolved the foundation for rear legs even before the move to land, researchers say. This ancestor may have even been able to walk underwater, they added. These findings reveal that a key step in the evolution of hind limbs happened in fish, challenging previous theories that such appendages evolved only after the move to land. Scientists investigated fossils of a 375-million-year-old fish known as Tiktaalik roseae, discovered in 2004 in northern Canada's Ellesmere Island. Possessing a broad flat head and sharp teeth, Tiktaalik resembled a cross between a fish and a crocodile, growing to a length of 9 feet (2.7 meters) as it hunted for prey in shallow freshwater. Tiktaalik: Iconic fossil's "rear end" described BBC - January 14, 2014 Scientists have finally managed to describe the back end of one of the key fossil finds of the past 10 years. Known as Tiktaalik, the 375-million-year-old creature is considered pivotal because it has many features that look half-way between fish and land animals. As such, it provides insight into life's evolutionary move from water into the terrestrial environment. The first specimens to be detailed only had foreparts, but the new fossils now show important rear elements. Exceptional Fossil Fish Reveals New Evolutionary Mechanism for Body Elongation Science Daily - October 7, 2013 Snake and eel bodies are elongated, slender and flexible in all three dimensions. This striking body plan has evolved many times independently in the more than 500 million years of vertebrate animals history. Based on the current state of knowledge, the extreme elongation of the body axis occurred in one of two ways: either through the elongation of the individual vertebrae of the vertebral column, which thus became longer, or through the development of additional vertebrae and associated muscle segments. Fossil Fish Is Oldest Creature With a Face Live Science - September 25, 2013 A newly discovered fish fossil is the earliest known creature with what might be recognized as a face. Entelognathus primordialiswas an ancient fish that lived about 419 million years ago in the Late Silurian seas of China. The finding provides a link between two groups of fishes previously thought to be unrelated, challenging long-held notions of how vertebrate faces evolved. New flying fish fossils discovered in China BBC - October 31, 2012 New flying fish fossils found in China provide the earliest evidence of vertebrate over-water gliding strategy. Chinese researchers have tracked the "exceptionally well-preserved fossils" to the Middle Triassic of China (235-242 million years ago). The Triassic period saw the re-establishment of ecosystems after the Permian mass extinction. The fossils represent new evidence that marine ecosystems re-established more quickly than previously thought. 50-Legged Creature May Have Been Top Predator of Ancient Seafloor Live Science - November 9, 2011 An ancient cockroach-like creature nearly a foot long once skittered along the seafloor in what is now Canada, a new fossil find reveals. The fossil, a series of 500-million-year-old tracks, captured the movement of a large seafloor-dwelling creature with at least 25 pairs of legs. The animal was likely an arthropod called Tegopelte, a rare giant very rarely found fossilized. Arthropods are invertebrates with exoskeletons, a group that includes today's crustaceans and insects. Fossil of Cretaceous-era squid found in Peru PhysOrg - January 20, 2011 Paleontologists said Thursday they discovered the 85-million-year-old fossil of a previously unknown squid species from the Cretaceous era in the high jungle region of northeastern Peru. Oldest fossil shrimp preserved with muscles PhysOrg - November 9, 2010 The oldest known shrimp prior to this discovery came from Madagascar. This one is way younger, having an age of only 245 million years making the shrimp from Oklahoma 125 million years older. The fossil shrimp, having a length of about 3 inches, was found by fellow-paleontologist Royal Mapes. Feldmann and Schweitzer named the fossil after him: Aciculopoda mapesi. The discovery is also one of the two oldest decapods (ten footed) to which shrimp, crabs, and lobsters belong. The other decapod, Palaeopalaemon newberryi, is of similar age and was found in Ohio and Iowa. The shrimp from Oklahoma might, thus, be the oldest decapod on earth. Mystery fossil is ancestor of squid BBC - May 27, 2010 The ancestors of modern squid may have existed half a billion years ago - a lot earlier than previously thought. In a new study, Canadian researchers identified a previously unclassifiable fossil that was long believed to belong perhaps to the shrimp family. They called it Nectocaris pteryx - a small soft-bodied cephalopod with two tentacles rather the eight or 10 seen in today's octopuses. The findings make the ancestors of modern squid and octopuses at least 30 million years older. Extinct giant shark nursery discovered in Panama PhysOrg - May 17, 2010 Excavations made possible by Panama's new Canal widening project reveal the history of the formation of the Isthmus of Panama and the flora and fauna present here over the last 20 million years. The six-foot-long babies of the world's biggest shark species, Carcharocles megalodon, frolicked in the warm shallow waters of an ancient shark nursery in what is now Panama, report paleontologists working at the Smithsonian Tropical Research Institute and the University of Florida. Fossil find resolves ancient extinction mystery BBC - May 13, 2010 Researchers have revealed remarkably well preserved fossils of soft-bodied marine creatures that are between 470 and 480 million years old. Jaws -- 4 million BC PhysOrg - March 16, 2010 Paleontologists have discovered evidence of how an extinct shark attacked its prey, reconstructing a killing that took place 4 million years ago. Such fossil evidence of behavior is incredibly rare, but by careful, forensic-style analysis of bite marks on an otherwise well-preserved dolphin skeleton, the research team, based in Pisa, Italy, have reconstructed the events that led to the death of the dolphin, and determined the probably identity of the killer: a 4 m shark by the name of Cosmopolitodus hastalis. Ancient Amphibian Skull Discovered at Airport Live Science - March 15, 2010 A meat-eating amphibian that lived 300 million years ago may represent one of the earliest examples of land-based vertebrate life, scientists announced today. Researchers discovered the fossilized head of the ancient creature in 2004, near the Pittsburgh International Airport in western Pennsylvania. The ancient amphibian has been dubbed Fedexia striegeli after FedEx, which owns the land on which the fossil was found, and for Adam Striegel, who discovered the specimen while on a field trip as an undergrad at the University of Pittsburgh. Prehistoric Whale Discovered On The West Coast Of Sweden Science Daily - June 8, 2009 Giant predatory shark fossil unearthed in Kansas BBC - February 24, 2010 Giant Skull of 12m Pliosaur 'Sea Monster' Unearthed in England PhysOrg - October 28, 2009 The fossilized skull of a pliosaur, the largest marine reptile that ever lived, has been discovered along the Jurassic Coast World Heritage Site. This pliosaur lived in the Jurassic seas that covered Dorset 155 million years ago and was at least 12 metres long. The jaws were powerful enough to bite a small car in half. Some Mollusks Thrived After Permian Extinction New York Times - August 27, 2009 The mass extinction that occurred at the end of the Permian period 252 million years ago was a body blow to marine organisms as the oceans became toxic (for reasons that are still cause for debate). Four out of five marine genera were wiped out, and recovery was slow. But not so slow, apparently, for one order of mollusks, the ammonoids. A study by French researchers in Science suggests that these shelled organisms (which look something like modern nautiluses but are related to squid and octopuses) diversified explosively in the first million years after the extinction. The general assumption has been that the mass extinction was so devastating that it took most genera at least five million years to recover. Ancient Anthropods Used Borrowed Homes Live Science - August 23, 2009 Hermit crabs, a lineage some 200 million years old, may not have been the first to salvage mollusk shells for self-protection. Primitive arthropods were among the earliest animals to venture onto land - 500 million years ago - and they too recycled shells, according to new research. James W. Hagadorn of Amherst College in Massachusetts and Adolf Seilacher of Yale University analyzed Cambrian-period fossil tracks left on a sand flat by ancient arthropods in what is now central Wisconsin. The small imprints are in remarkably good shape: a microbial mat permeating the beach probably saved them from obliteration by waves. Yard-long "Megapiranha" Fossil Found National Geographic - June 26, 2009 > Eight to ten million years ago, South America's waters harbored a toothier, three-foot (one-meter) version of today's famed, flesh-eating piranhas. Alberto Cione, a paleontologist at Argentina's La Plata Museum, first noticed the evidence of Megapiranha pananensis (pictured in an artist's rendering) - an upper jaw with three unusually large and pointed teeth - in his collection in the 1980s. The remains had been discovered half a century earlier in a riverside cliff in northeastern Argentina. Fossil bone bed helps reconstruct life along California's ancient coastline PhysOrg - June 8, 2009 > In the famed Sharktooth Hill Bone Bed near Bakersfield, Calif., shark teeth as big as a hand and weighing a pound each, intermixed with copious bones from extinct seals and whales, seem to tell of a 15-million-year-old killing ground. The skeleton of a whale that died around 10,000 years ago has been found in connection with the extension of the E6 motorway in Strömstad. The whale bones are now being examined by researchers at the University of Gothenburg who, among other things, want to ascertain whether the find is the mystical "Swedenborg whale". Cretaceous Octopus With Ink And Suckers -- The World's Least Likely Fossils? Science Daily - March 18, 2009 New finds of 95 million year old fossils reveal much earlier origins of modern octopuses. These are among the rarest and unlikeliest of fossils. The chances of an octopus corpse surviving long enough to be fossilized are so small that prior to this discovery only a single fossil species was known, and from fewer specimens than octopuses have legs. Rare Fossil Octopuses Found Live Science - March 18, 2009 t's hard enough to find fossils of hard things like dinosaur bones. Now scientists have found evidence of 95 million-year-old octopuses, among the rarest and unlikeliest of fossils, complete with ink and suckers. The body of an octopus is composed almost entirely of muscle and skin. When an octopus dies, it quickly decays and liquefies into a slimy blob. After just a few days there will be nothing left at all. And that assumes that the fresh carcass is not consumed almost immediately by scavengers. The result is that preservation of an octopus as a fossil is about as unlikely as finding a fossil sneeze, and none of the 200 to 300 species of octopus known today had ever been found in fossilized form. Arctic sea monster's giant bite BBC - March 17, 2009 A giant fossil sea monster found in the Arctic had a bite that would have been able to crush a 4x4 car, according to its discoverers. Researchers say the marine reptile, which measured an impressive 15m (50ft) long, had a bite force of about 16 tonnes (35,000lbs). The creature's partial skull was dug up last summer in the Arctic archipelago of Svalbard by a Norwegian-led team. Dubbed "Predator X", it patrolled the oceans some 147 million years ago. Most Complete Great White Four-million-year-old Fossil Yet National Geographic - March 13, 2009 This four-million-year-old fossil has taken some of the bite out of the great white shark's supposedly menacing ancestry, a new study finds. The specimen which includes part of the spinal column, the head, jaws lined with 222 teeth is the most complete fossil known of an ancient great white shark. Scientists had long assumed that great whites which can reach lengths of 20 feet (6.1 meters) were close kin of the prehistoric "megatooth" sharks, frightening creatures that grew up to 50 feet (15.2 meters) long and had jaws more than 9 feet (2.7 meters) wide. But a new look at the fossil suggests that great whites are more closely related to the less fearsome and smaller mako shark, which belonged to a genus that still exists today. Preserved Shark Fossil Adds Evidence To Great White's Origins Science Daily - March 13, 2009 A new University of Florida study could help resolve a long-standing debate in shark paleontology: From which line of species did the modern great white shark evolve? The study in the March 12 issue of the Journal of Vertebrate Paleontology falls squarely into the mako camp. It concludes megalodon and modern white sharks are much more distantly related than paleontologists initially believed. Scientists have discovered a highly unusual fish with fangs made of bone. BBC - March 11, 2009 BR> Dubbed the "Dracula" fish, the creature is about 17mm (0.7 inches) long and has been found in only one Burmese stream. The researchers, from London's Natural History Museum (NHM), believe the fish lost its teeth over evolutionary time, but later evolved the bone fangs. Writing in the Royal Society's journal Proceedings B, they say the males use the fangs to jostle each other - but do not appear to draw blood. Oldest fossil brain found in Kansas PhysOrg - March 2, 2009 When Alan Pradel of the Museum National d'Histoire Naturelle in Paris CAT scanned a 300-million-year-old fossilized iniopterygian from Kansas, he and his colleagues saw a symmetrical blob nestled within the braincase. This turned out to be the oldest brain found in fossil form, a wholly unexpected and rare discovery. Fish fossil clue to origin of sex BBC - February 25, 2009 A fossil fish from Australia was one of the earliest known vertebrates to reproduce by fertilizing eggs inside the female, a study suggests. Nature journal says the ancient fish was carrying a 5cm-long embryo. The fertilization of eggs by sperm outside the mother's body - external fertilisation - is thought to have evolved before copulation. The fossil suggests the fertilization of eggs inside the female's body evolved sooner than previously thought. Fossil fish shows oldest live birth PhysOrg - February 25, 2009 R> A 380-million-year-old fossil fish that shows an unborn embryo and umbilical cord has been discovered, scientists report in the journal Nature. The extremely rare specimen shows incredible detail. The umbilical cord is attached to an area of small bones, corresponding to the embryo. This means the fish would have given birth to live young, known as viviparity and is the oldest record of this kind known. Fossilized pregnant fish was one of the first animals to have sex PhysOrg - February 25, 2009 > A pregnant fossil fish at the Natural History Museum in London has shed light on the possible origin of sex, according to a study published in Nature today by an international team including Museum scientists. The fossil is an adult placoderm, an extinct group of armored fish, and it contains a 5cm-long embryo. It is dated to the Upper Devonian period 350 million years ago and was found in the Gogo formation of western Australia. Scientists say a fossil of a four-legged fish sheds new light on the process of evolution BBC - June 25, 2008 The creature had a fish-like body but the head of an animal more suited to land than water. The researchers' study, published in the journal Nature, says Ventastega curonica would have looked similar to a small alligator. Scientists say the 365-million-year-old species eventually became an evolutionary dead end. Fossil reveals oldest live birth: Fish had umbilical cord BBC - May 28, 2008 A fossil fish uncovered in Australia is the oldest-known example of a mother giving birth to live young, scientists have reported in the journal Nature. The 380 million-year-old specimen has been preserved with an embryo still attached by its umbilical cord. The find, reported in Nature, pushes back the emergence of this reproductive strategy by some 200 million years. Until now, scientists thought creatures from these times were only able to develop their young inside eggs. Giant "Sea Monster" Fossil Discovered in Arctic - National Geographic - February 27, 2008 The 150-million-year-old creature was first discovered in 2006 on Spitsbergen, part of Norway's Svalbard archipelago, in a polar wasteland littered with fossilized sea reptiles. Sea reptile is biggest on record BBC - February 27, 2008 A fossilized "sea monster" unearthed on an Arctic island is the largest marine reptile known to science, Norwegian scientists have announced. The 150 million-year-old specimen was found on Spitspergen, in the Arctic island chain of Svalbard, in 2006. Fish: First "Food-Chain Fossil" National Geographic - November 9, 2007 About 290 million years ago, Earth's lakes were a shark-eat-amphibian-eat-fish world, new fossil evidence reveals. A new fossil discovery looks like a set of Russian dolls: It's the preserved remains of a fish, which was eaten by an amphibian, which was then eaten by a shark. The fossil provides the first ever snapshot of an ancient, three-level, vertebrate food chain. An animal's last meal is very rarely preserved, because corrosive acids quickly erupt from the decaying stomach, dissolving any food remnants before fossilization can take place. But in this case, "the shark didn't just die and sink down and decompose," said Jürgen Kriwet, a paleontologist from Berlin's Museum of Natural History and co-author of a new study on the find. Fossil Meat Found in 380-Million-Year-Old Fish National Geographic - February 12, 2007 Australian scientists say they have found morsels of fossilized muscle the oldest vertebrate tissue ever known in the remains of two fish that lived 380 to 384 million years ago. Unearthed in western Australia 20 years ago, the specimens belong to two species of an extinct group of primitive, armored fish known as placoderms 'Nymph Of The Sea' Reveals Remarkable Brood Science Daily - November 24, 2006 Geologists have made an unusual discovery from over 425 million years ago ... hard boiled eggs! The scientists discovered the mother complete with her brood of some 20 eggs and 2 possible juveniles inside, together with other details of her soft part anatomy including legs and eyes. The team has made a digital image of the fossil - an ostracod (a relative of the shrimps) - which is preserved exceptionally in volcanic ash rocks in Herefordshire. Ancient life in China limestone BBC - July 12, 2005 Researchers have found well-preserved fossils of organisms that lived on the ocean bed about 550 million years ago. The fossils, unearthed in Southern China, are of some of the earliest complex lifeforms known to science. Frondose vendobionts died out before the Cambrian explosion about 540 million years ago, when animals with bones and shells appeared. They are not closely related to any modern species but share similarities with fungi, lichen, and algae. Evidence of complex life older than 540 million years is hard to study. Many of the organisms that appeared in the Ediacaran Period (the time period between about 600 and 542 million years ago) had soft body parts that do not make an impression in rock. Ancient deep-seafungus 'revived' in lab BBC - October 19, 2004 > Fungus from a deep-sea sediment core that is hundreds of thousands of years old can grow when placed in culture, scientists have discovered. Indian researchers say the fungi come from sediments that are between 180,000 and 430,000 years old. The finding adds to growing evidence for the impressive survival capabilities of many microorganisms. Ancient Sea Spider Fossils Discovered In Volcanic Ash Science Daily - October 2004 Volcanic ash that encased and preserved sea life in the Silurian age 425 million years ago near Herefordshire, UK has yielded fossils of an ancient sea spider, or pycnogonid, one of the most unusual types of arthropod in the seas today. Sea spiders are soft-bodied arthropods, found widely in modern oceans. For two-centuries there has been a controversy about the relationship of sea spiders to land spiders, scorpions, ticks and mites because of their unique body form. Sea spiders have a long proboscis and unusual limb structures used in mating and carrying brooding embryos. The fossil record of their relationship is sparse because of their delicate nature. New Fossil Links Four-legged Land Animals To Ancient Fish Science Daily - April 2, 2004 > How land-living animals evolved from fish has long been a scientific puzzle. A key missing piece has been knowledge of how the fins of fish transformed into the arms and legs of our ancestors. In this week's issue of the journal Science, paleontologists Neil Shubin and Michael Coates from the University of Chicago and Ted Daeschler from the Academy of Natural Sciences in Philadelphia, describe a remarkable fossil that bridges the gap between fish and amphibian and provides a glimpse of the structure and function changes from fin to limb. The fossil, a 365-million-year-old arm bone, or humerus, shares features with primitive fish fins but also has characteristics of a true limb bone. Discovered near a highway roadside in north-central Penn., the bone is the earliest of its kind from any limbed animal. "It has long been understood that the first four-legged creatures on land arose from the lobed-finned fishes in the Devonian Period," said Rich Lane, director of the National Science Foundation's (NSF) geology and paleontology program. "Through this work, we've learned that fish developed the ability to prop their bodies through modification of their fins, leading to the emergence of tetrapod limbs." Fossil may be earliest arm bone BBC - April 2004 > A tiny fossil found by a road cutting in Pennsylvania, US, could be the earliest example of an arm bone. The 360-370-million-year-old humerus, or upper arm bone, indicates that limbs may have evolved for use in water and not to get around on land. It suggests the earliest limbed animals were fish navigating shallow rivers, but its place in the evolutionary tree is the subject of some controversy. US biologists have published details of the discovery in the journal Science Giant sea fossil unearthed BBC - December 30, 2003 Eight to ten million years ago, South America's waters harbored a toothier, three-foot (one-meter) version of today's famed, flesh-eating piranhas. Alberto Cione, a paleontologist at Argentina's La Plata Museum, first noticed the evidence of Megapiranha pananensis (pictured in an artist's rendering)--an upper jaw with three unusually large and pointed teeth-in his collection in the 1980s. The remains had been discovered half a century earlier in a riverside cliff in northeastern Argentina. The creature, which measures 20 metres (65 ft) from nose to tail, was discovered by German and Mexican paleontologists. It has been nicknamed the "Monster of Aramberri" after the site in northeastern Mexico where it was dug up. Although many Liopleurodon remains have been unearthed before, none have been as complete as the Mexico discovery. ANCIENT AND LOST CIVILIZATIONS PHYSICAL SCIENCES INDEX CRYSTALINKS HOME PAGE PSYCHIC READING WITH ELLIE 2012 THE ALCHEMY OF TIME Prehistoric Whale Discovered On The West Coast Of Sweden Science Daily - June 8, 2009
<urn:uuid:f987588f-2347-41f3-9387-288879572912>
CC-MAIN-2020-34
https://www.crystalinks.com/fossilfish.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737233.51/warc/CC-MAIN-20200807231820-20200808021820-00253.warc.gz
en
0.950826
10,412
4.28125
4
Our Medium Slag Coagulant is a grey, granular powder. Function Slag Coagulant is used for the treatment of copper alloys, iron and steel in furnaces and ladles. Slag Coagulant contains processed metallic oxides in a definite physical phase, which exfoliates and melts at temperatures above 970°C. Slag Coagulant coagulates the slag to form a viscous, crusty layer, which can be removed easily leaving a clean slag-free metal surface. Slag Coagulant is an efficient thermal insulator. The chemical composition of Slag Coagulant is closely controlled to ensure that there is no contamination of the melt and no pick-up of gas or solid particles. 1. Check that the melt temperature is above 970°C. 2. Sprinkle sufficient Slag Coagulant over the surface of the melt to form a layer 2-3mm thick. 3. Wait while the material exfoliates and then coagulates to form a viscous, crusty layer. 4. Either: - 4a. Remove the crust to leave a clean metal ready for pouring, or 4b. Pour the metal from beneath the crust.
<urn:uuid:3a439604-ea21-49a4-b7e3-6dd36d23a25e>
CC-MAIN-2021-25
https://www.castreekilns.co.uk/slag-coagulant-210-p.asp
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621627.41/warc/CC-MAIN-20210615211046-20210616001046-00229.warc.gz
en
0.794766
260
2.6875
3
You learned and used Ohm's law! Adafruit offers a fun and exciting "badges" of achievement for electronics, science and engineering. We believe everyone should be able to be rewarded for learning a useful skill, a badge is just one of the many ways to show and share. This is the "I learned Ohm's law" badge for use with educators, classrooms, workshops, Maker Faires, TechShops, Hackerspaces, Makerspaces and around the world to reward beginners on their skill building journey! This beautiful badge is made in the USA and has subtle details like metallic thread. The badge is skillfully designed and sturdily made to last a life time, the backing is iron-on but the badge can also be sewn on. Ohm's law states that the current through a conductor between two points is directly proportional to the potential difference across the two points. Introducing the constant of proportionality, the resistance one arrives at the usual mathematical equation that describes this relationship. I is the current through the conductor in units of amperes, V is the potential difference measured across the conductor in units of volts, and R is the resistance of the conductor in units of ohms. More specifically, Ohm's law states that the R in this relation is constant, independent of the current. Adafruit's embroidered badges are manufactured in partnership with AMBRO Manufacturing located in NJ, USA. AMBRO is a family owned and operated business since 1990 that celebrates open-source with Adafruit Industries. You can meet their team here. AMBRO uses non-toxic soy based, water soluble and environmentally friendly printing supplies, threads and more when possible. AMBRO has over 250 solar panels that generate 50,000 Kilowatt hours per year. Their equipment runs solar powered, so the wonderful things AMBRO and Adafruit have worked together on are made with the sun! AMBRO Manufacturing was recognized by Impressions Magazine, a leading trade publication in the garment printing and embroidery business, who published an article highlighting AMBRO and their commitment to their environmentally focused manufacturing practices. Adafruit knows you have a lot of choices as to where you spend your money and time, we hope our open-source values, commitment to green technologies and partners helps make the decision easier and fun!
<urn:uuid:afbb88eb-c121-4d8a-9508-0868b191a482>
CC-MAIN-2013-48
http://www.adafruit.com/products/596
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163043081/warc/CC-MAIN-20131204131723-00021-ip-10-33-133-15.ec2.internal.warc.gz
en
0.958195
484
2.609375
3
Located at the southern entrance to the Whitsunday Passage, the Brampton Islands consist of Brampton and Carlisle islands. Rocky headlands dotted with hoop pines, open grasslands, woodlands, sheltered bays and long sandy beaches make these islands some of the most scenic off the Queensland coast. Rocky headlands dotted with hoop pines, open grasslands, woodlands, sheltered bays, and coral rubble and long sandy beaches make these islands some of the most scenic off the Queensland coast. This park consists of Brampton and Carlisle Islands. Brampton Island rises from sea level to 214m at Peak Lookout. The island has a variety of vegetation types; open eucalypt forest on ridges and sheltered slopes, dense vine forest in gullies and valleys, dry rainforest with towering hoop pines on headlands, grasstrees scattered through native grasslands, coastal scrub and mangroves. Turtles feed in the surrounding marine park waters and the islands are important turtle rookeries. This is the sea country of the Ngaro people who also visited the Whitsunday islands further north. Cook named the group after the Duke of Cumberland. The islands and surrounding waters are part of the Great Barrier Reef World Heritage Area and are Brampton Island is 32 kilometres north of Mackay. Access is by private vessel, charter vessel, charter aircraft or via a commercial vessel service operated by Brampton Island Resort. Visitors intending to use the commercial vessel or charter aircraft service will need to walk 3.2 kilometres from the resort to the campground. About Brampton Island Brampton Island was named in 1879 by Staff Commander E. P. Bedwell, RN, in SS Llewellyn and is one of the many names from the then English county of Cumberland he brought to the Whitsundays following James Cook's 1770 designation of the group as 'The Cumberland Isles'. Brampton is a city in the north-east of Cumbria into which Cumberland was absorbed in 1974. Prior to this naming, the island and its twin, Carlisle Island, were together known as M Island, a designation given by Matthew Flinders in 1802. In 1902 the first white 'resident' of the island was to be John Williams, the master of the China Navigation Company's Chingtu, which traded in those days between Australia and the Far East. In August 1902, while the vessel was in Sydney, Williams contracted bronchitis but nevertheless stayed with his ship when it departed for China. Once clear of Sydney Heads he retired to his cabin, his condition worsened, and on 15 August he died while the vessel was off Moreton Bay. He had expressed a wish to be buried on an island and not at sea and when the vessel arrived among the Cumberland Islands he was buried at Brampton Island where today his grave still stands as an historic feature. A second grave stands nearby, that of Stanley Montague, a worker on the island in 1935 who developed appendicitis and, despite being taken to the Mackay hospital, did not survive the illness. His body was brought back to the island for burial. View Larger Map About Carlisle Island Carlisle Island, together with today's Brampton Island was designated as 'M Island' by Matthew Flinders in 1802. His chart notes the 'Bluff ' at its south-east corner which is almost a separate island attached to the main one by sand dunes. Carlisle Island received its separate name in 1879 from Staff Commander E. P. Bedwell, RN, in SS Llewellyn and is one of the many names from the then English county of Cumberland he brought to the Whitsundays following James Cook's 1770 designation of the group as 'The Cumberland Isles'. A cathedral city, Carlisle is the largest city in Cumbria into which the county of Cumberland was absorbed in 1974. In February 1888 the steamer Geelong was wrecked on the north-west corner of the island, its remains still visible to divers in the 1990s. During World War 2, from late 1942 to April 1943 the island was used as a training base by an arm of the Allied Intelligence Bureau, Secret Intelligence Australia (SIA). Under the command of Lieutenant Phillip Jacks, RANVR, about a dozen Indonesian nationals were brought to the island to be trained in intelligence work and later to be infiltrated into various islands in Japanese occupied Indonesia to gather information about enemy movements, weather etc. Further information and booking centres: 1st floor, 30 Tennyson Street PO Box 623 MACKAY QLD 4740 Phone Contact Centre: 13 13 04 Fax Contact Centre: 1300 300 768
<urn:uuid:494e1515-1fad-49a7-8adb-059e1c6b665a>
CC-MAIN-2017-13
http://www.australiaforeveryone.com.au/qld/brampton-np.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189031.88/warc/CC-MAIN-20170322212949-00516-ip-10-233-31-227.ec2.internal.warc.gz
en
0.943493
1,053
2.75
3
The Common Stock ( Originally Published 1939 ) IN the vernacular of the stock market, possibly the stocks the average investor is principally concerned with, is that of common. It is the common stock which has laid the foundation for many fortunes, and at the same time has been the instrument in destroying many savings of a lifetime. It behooves us therefore to approach this type of stock with more than casual consideration. First, what is a common stock? It can be said to. constitute the basic ownership of a company. It has no preference over any other stock, bond, or claim against the company, but after such preferred claims have been settled, then common represents the entire remaining interest in both assets and earnings. Our first step in considering common stock is to determine its book value. How is this done? Let's assume that the Compass Motor Company has 1,000,000 shares of common outstanding, representing $5,000,000. Its surplus is $10,000,000 and its surplus-reserves are $2,500,000. Thus the total net worth of the company is $17,500,000. You determine the book value per share, by dividing the net worth of the company by the 1,000,000 shares outstanding, thus the book value is $17.50 per share. No true status of the book value of the common stock can be determined, however, without a minute examination of what the surplus and surplus-reserves consist of. This subject, therefore, will be treated in a later chapter in the analysis of the balance sheet; but I would emphasize here against accepting surplus and surplus-reserve statements in the calculation of true book value, without determining in your own good opinion, as to the real and underlying value of such surplus. Suppose you find included in the surplus of the Compass Motor Company such items as patents, trade-marks, good will and other such intangibles. I would eliminate them completely from the surplus, before calculating the book value. True, such intangibles may be worth every dollar for which the company has set them up, but what are they worth in liquidation? Now let's take the opposite side of the scale. Assuming that the company has no surplus, but is carrying a deficit of $1,000,-000. If you subtract your deficit from your $5,000,000 representing capital, you would then find only $4,000,000 available for 1,000,000 shares, or $4.00 per share. Before going further, let's thoroughly recognize the principle that both surplus and deficit must be calculated on the balance sheet in their true light before you can accurately arrive at the real book-value. The plant that is worth $1,000,000 to a going concern, and will show on the balance sheet as such, may be worth only $250,000 in liquidation. And after all, common stock can only receive the residue after all prior claims have been paid. The principle foundation upon which common stock rests, and which the investor is interested in, is earnings. A company which has a good earning record, over a period of years, will find such a record reflected in the market price of its stock. To arrive at the amount of earnings per share, is to divide the amount available for common stock dividends by the number of shares outstanding. It must not be construed, however, that when you see published a specific amount available for common stock dividends, that it is always declared in dividends. It belongs to the stockholders undoubtedly, but, on the other hand, it is still in the discretion of the board of directors, as to how much and when it shall be declared. Dividend policies often reflect the judgment of the management. Many companies, during the hectic years of depression, through which they successfully passed, can attribute having weathered the gale, in part, to the foresight of their management. No wise board of directors will declare their entire earnings in dividends, and leave the company to face a possible financial crisis. The impatient investor, in a growing company, would do well to consider this. Many young companies prefer to expand themselves through their earnings, that is, build up their properties, working capital and earning capacity. Unless they have reached a saturation point, this policy may be one of wisdom, and while cash dividends may be absent, nevertheless, the differential in the market price of the stock often proves more attractive than dividends. Some companies have gone for years without paying dividends, and at the same time have shown constant earnings, and their stock has enjoyed a very active market. Some companies from time to time issue their dividends in stock. In doing this, it is principally a matter of bookkeeping. They merely transfer a portion of their surplus capital to their capital account, thus conserving their cash working capital, with no change in their assets. The payment of dividends in scrip, also occurs at times. Scrip is like a promissory note of the company's, in which they agree to redeem the scrip, or pay the dividend which it represents at a later date. Some investors use the earning barometer to measure the value of a stock. You often hear that such and such a stock is earning so many dollars per share, and that it should sell anywhere from ten to twenty times higher than its earnings per share, the exact number of times, usually depending upon who is writing or quoting the figures. This principle is not always safe to use, but inasmuch as the market value of common stock usually depends upon the earnings of a company, it follows that some ratio necessarily exists. To find a safe ratio, therefore is important. Do not confuse the dividends declared with the income earned. The percentage of the net earnings declared for dividend purposes varies with different companies. Some may have a policy of declaring sixty percent of their net earnings in dividends, others seventy, while still others only forty. Thus in buying stocks for in-come purposes determine the company's dividend policy. Irrespective of what percentage of earnings are declared, however, the market or sale value of its stock is usually reflected by its total net earnings. While this rule is customary, it is an arbitrary one in the Street and cannot be accepted as a definite one to measure the true market value of stock. Many factors could enter into the market value of Compass Motor Company's stock besides earnings. The entire market might have a downward trend, with people liquidating instead of buying. Again the company's financial strength might appear weak, notwithstanding its earnings. Its pioneering stage may not have been passed, and many other physical as well as psychological considerations might enter into the picture. If you do intend to use the earning ratio, however, a good plan would be to add the stock's high and low for the year and divide it by two. This would give you the average price for the year. Say, if the Compass Motor Company had a high of 12 and a low of 6 for the year, then the addition of the two would be eighteen. One-half of eighteen would show the year's average for the stock, i.e., $9.00 per share. After having ascertained the average for the year, then multiply this average of $9.00 against the million shares outstanding. Thus you find that the total market value of their common stock for the year averaged $9,000,000. You now find that the company had earnings of fifty cents per share for its common stock, or $500,000 for the year. Thus the stock, with an average price of $9.00 per share throughout the year, sold on a basis of 18 times its earnings. If you intend to rely on the earning ratio, I would suggest that you figure your high and low stock averages, and also earning averages, for a range of from four to six years. There are so many factors entering into considering price ranges, against earnings, that the amateur investor may find it difficult. Even the more experienced don't rely upon it altogether. They merely use such statistical information as a further guide upon which to base their individual opinions. The common-stockholder cannot lose more than his actual in-vestment, but he has this advantage over the preferred and bond holder; he can gain a great deal more. In prosperous times, when earnings are high, stock split-ups are frequent, sometimes as much as three, four and five to one. When such melons are cut, it naturally accrues to the common stockholders, the ones who basically own the company. As stated before, while common stock owns the company, how-ever, its equity is not one hundred percent until the settlement of all prior claims, such as bonds, debentures, preferred stocks, accumulated dividends, etc. Nevertheless, the spectacular rise and fall of many common stocks continues to justify the opinion that millions of investors would rather take their chances with this handicap, in an effort to reap a full and rich reward from their investments.
<urn:uuid:c7e8a0f2-3a83-4c60-bf07-321ea82ec0f6>
CC-MAIN-2015-22
http://www.oldandsold.com/articles09/wallstreet-16.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927592.52/warc/CC-MAIN-20150521113207-00320-ip-10-180-206-219.ec2.internal.warc.gz
en
0.969379
1,853
3.03125
3
|Domestic Guinea Pig| Guinea Pigs are small animals. They are mammals and rodents. Their scientific name is Cavia porcellus, which is cavies Porcellus in the genitive. That is Latin for little pig. Guinea Pigs are not related to pigs and are not from Guinea. They originated in the Andes, studies based on biochemistry and hybridization suggest they are domesticated descendants of a closely related species of cavy . For this reason, they do not occur naturally in the wild. Guinea pigs as pets[change | edit source] In many parts of the world, people keep them as pets. In Peru, Bolivia, and several other countries, they are raised for food. The first people who domesticated the animals, did it for food. Besides being a pet and a source of food, in some places people think guinea pigs keep bad spirits away. In Quechua, the language of some the native tribes of Peru, they are called quivi. The Spanish-speaking people of the region call them cuy (plural: cuyes). Name[change | edit source] This perception of pigginess occurred in many languages other than English; the German word for them is , literally "Little Sea Pigs" (sailing ships stopping to reprovision in the New World would pick up stores of guinea pigs, which provided an easily transportable source of fresh meat), the Russian and Polish word for them is similar, "morskaya svinka" (Морская свинка) and "świnka morska" respectively, meaning also "Little Sea Pig" (it comes from archaic use of the word to mean "overseas"). The French word is , (Indian pig), the Dutch used to call it guinees biggetje (Guinean piglet), and in Norway, Sweden and Denmark they are called (a combination of the Latin word mare for ocean, and Norwegian/Swedish/Danish svin which means pig). In Greek they are called 'indika xoiridia' (Small Indian Pigs ; ινδικά χοιρίδια), and in Portuguese, the term is "porquinho da Índia", literally "little pig of the Indies". In Italian the term is either "Porcellino D'India" (Little Indian Pig) or "Cavia Peruviana" (Peruvian Cavy). However, this perception of pigginess is not universal to all languages or cultures. For example, the common Spanish word is 'conejillo de Indias' (Indian bunny rabbit). Housing and Breeding guinea pigs[change | edit source] Guinea pigs need large open air cages in which to romp and frolic. They should have a diet of 1/8 cup of high quality pellets like kmshayloft or oxbow. They should also have unlimited grass hay, and at least one cup of a variety of veggies. Guinea pigs like to be held in hand. Guinea pigs should be kept in cages larger than 7.5 square feet or 10.5 square feet for 2 pigs. They should always have a friend as guinea pigs are social animals. Breeding guinea pigs are not recommended as the rate of pregnancy complications are very high. Other uses of the word[change | edit source] References[change | edit source] - Weir, Barbara J. (1974). "Notes on the Origin of the Domestic Guinea-Pig". In Rowlands, I. W.; Weir, Barbara J.. The Biology of Hystricomorph Rodents. Academic Press. pp. 437–446. ISBN 0-12-6133336. - Nowak, Ronald M. (1999). Walker's Mammals of the World, 6th edition. Johns Hopkins University Press. ISBN 0-8018-5789-9. |Wikispecies has information on: Cavia (Caviinae).| |Wikimedia Commons has media related to: Cavia|
<urn:uuid:20a9926f-a424-4169-b028-d7078bd764aa>
CC-MAIN-2014-10
http://simple.wikipedia.org/wiki/Guinea_pig
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021384410/warc/CC-MAIN-20140305120944-00044-ip-10-183-142-35.ec2.internal.warc.gz
en
0.882204
861
3.421875
3
Charter schools are unique public schools that are allowed the freedom to be more innovative while being held accountable for advancing student achievement. Because they are public schools, they are open to all children, do not charge tuition, and do not have special entrance requirements. All children who live in a district where a charter school is authorized are eligible to attend the charter school. Charter schools do not select their students and any student can apply regardless of his or her test scores, special education status or any other characteristics. If more students apply to the school than the school has available seats, then a blind lottery is held. According to the most recent data for schools in Chicago, 88% of charter school students are eligible for free or reduced price lunch compared with 81% in open-enrollment district schools. Fifty-six percent of charter students are African-American compared to a 36% district average. Charters serve 40% Hispanic students, 2% white, 11% English Language Learners, and 14% special education. Charter schools are public schools, open to all students in a district (except in the case of Chicago where a handful of charters have neighborhood boundaries). Charter schools are funded with public money and are funded at a lower rate than district schools. Charter schools are allowed the freedom to be more innovative and responsive to the needs of individual students, while being held accountable for advancing student achievement. Charters have freedom over their curricula, calendar, staffing, and all education programming; however they must take state and district-mandated tests. Charter schools have been successful in Illinois and across the country. In Chicago, 12 of the highest performing non-selective charter high schools on the ACT are charter schools. The average College Enrollment Rate of students from Chicago charter high schools is 70%, compared to the 50% at district run schools. Charters also increase College Persistence Rates - more charter students continue beyond their freshmen year of college. These findings are detailed in a recent independent, third-party study by Mathematica Policy Research. At the elementary school level, charter school students in Chicago on average outperform their peers in district-run schools. According to a recent study by Stanford University, elementary charter school students experienced two weeks more growth in reading and a month more growth in math compared to their peers at district-run schools. The study also found that charter schools are effectively closing the achievement gap for Hispanic students. No, charter schools are public schools and they do not charge tuition. No, charter schools are public schools and by law they cannot be affiliated with any religious groups or have any type of religious influence in their curriculum or school culture. Charter schools are open to all students in a district (except in the case of Chicago where a handful of charters have neighborhood boundaries). Parents and guardians can secure an application for a charter school by visiting, calling or looking online for each charter school's application. All charter schools have a deadline for applications to be submitted which will be printed on the application. If the school receives more applications than available seats, the school will hold a blind lottery and contact parents by letter or phone whether or not their children will be able to enroll in the school. There are no admissions requirements to attend a charter school. To apply to a charter school, a student does not have to take an entrance exam or score at a certain level on a test. Charter schools are open to all students. When a school is in demand by families, the fairest way to determine which students are accepted is a lottery. If the school receives more applications than available seats, the school will hold a blind lottery. Most charters hold a lottery and have extensive waiting lists. If charter schools are independently run from the district, how are charter schools held accountable for their results? In exchange for the freedom to be more innovative, charter schools are held accountable for advancing student achievement; the accountability is stringent. In Illinois, districts and the Illinois Charter School Commission hold charter schools accountable for student achievement, student improvement, attendance, graduation and college attendance (at the high school level), compliance with state and federal guidelines, balanced budgets, and efficient operations. If a school does not meet the requirements outlined in their charter, the school can be closed. Charter school teachers are free to unionize. As of June 2014, 27 of the 157 Illinois charter school campuses are unionized. Charter school teachers cannot be a part of the local bargaining unit and must form their own or join another union outside their district. A private company cannot hold a charter in Illinois. All Illinois charter schools must be run by non-profit boards; the non-profit board may contract with a for-profit company to run the school, and the board will hold the company accountable for high student achievement. Charter schools are open to all students. In fact, charter schools serve the same number of special needs students as schools in their host district. In Chicago, 14% of charter school students have IEPs. Charters are committed to serving all students with special needs. Per Illinois law, public dollars for education follows the student. When a child goes to a charter school, a portion of the money that the district received to educate that student follows the student to the charter school. Parents choose to take their children out of district schools and put them in a charter because the district school is not meeting the needs of the student. A Charter Management Organization (CMO) is an organization that manages a network of charter schools. All campuses of a CMO typically operate with the same core values and education program. Perhaps the best known CMO in Illinois is the Noble Network, which runs 16 high-performing high school campuses around the city. The network is based on the original Noble Street High School model, which was started by two former Chicago Public Schools teachers in 1999. Illinois law requires that 75% of charter school teachers be certified. Charter schools have the freedom to hire highly qualified, non-certified teachers for the remaining 25% of their classes. For example, a charter school could hire an artist to teach art or an architect to teach drafting. Charter schools foster a partnership between parents, teachers and students to create an environment that welcomes, values and includes families. Charter schools create an environment in which parents can be more involved, teachers have the freedom to innovate, and students are provided the structure they need to learn. Charter schools offer parents another public school option and the opportunity to choose a school based on their child's needs. Sometimes the district school is not the right setting for a child and a charter school can better serve the child. A parent might also be looking for a specific school model for their child, such as a college preparatory school, a science and technology-focused school, a dual-language school, or an arts-focused school to name a few unique models. Charter schools can structure their mission-driven curriculum and learning environments to best meet the needs of their students and communities, which makes no two charter schools alike. Some unique charter school models include: STEM and technology schools, "green" and agricultural schools, dual-language schools, college preparatory schools, arts schools, expeditionary learning schools, health and nutrition-focused schools, and dropout recovery schools - just to name a few!
<urn:uuid:3e8d1c7d-5613-45af-9841-3bd52edf0c62>
CC-MAIN-2018-43
https://www.incschools.org/about-charters/faq/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516892.84/warc/CC-MAIN-20181023174507-20181023200007-00127.warc.gz
en
0.967301
1,494
3.15625
3
What it is Blepharoplasty is a procedure that eliminates excess skin, fatty tissue, and muscles from the eye area to manifest a younger appearance. Blepharoplasty can also improve eyes that are missing an eyelid crease. Blepharoplasty is sometimes called “double-eyelid surgery.” The results of blepharoplasty are permanent. People who may have excess tissue in the upper and lower eyelids that obscure the eyes are strong candidates for blepharoplasty, as are people who lack a defined eyelid fold. Insurance may cover the procedure if impairment of vision is significant. Patients who suffer from glaucoma, high blood pressure, dry eyes, diabetes, cardiovascular disease, or hyperthyroidism may not be ideal candidates for blepharoplasty, but individual consultation with the doctor is the best way to determine options. Blepharoplasty is an outpatient surgery. For blepharoplasty to correct droopy upper eyelids, small incisions are made in the eye crease to remove skin, tissue, and muscle, as necessary; for blepharoplasty to address puffiness around the lower eyelids, incisions are made along the lower lash line or the internal part of the lower eyelid. Incisions are so tiny they usually cannot be seen. Blepharoplasty patients may receive a local anesthetic with or without a sedative or a general anesthetic. Blepharoplasty is a very safe surgery, though in rare instances infection and bleeding can occur. Also possible, though very uncommon, is complete or partial vision loss. Blepharoplasty patients can go home immediately following surgery, though a ride home is necessary. A patient’s vision may be impaired for a few days. Blepharoplasty recipients can return to work in one to two weeks following the procedure, when healing will be nearly complete. Eyes may feel sticky, itchy, or watery, but the conditions are treatable with prescription eye drops. Minor swelling or bruising is possible, but can be addressed with elevation and cold compresses. Eyes may be more sensitive to light, making watching television or reading uncomfortable, but this effect will dissipate. Blepharoplasty patients are advised not to consume alcohol or wear contact lenses until the healing process is finished. Wearing makeup is also discouraged until the stitches have been removed or dissolved from the blepharoplasty, which will take about a week.
<urn:uuid:fafbeb8e-d6cc-41b1-be22-567788eca7d1>
CC-MAIN-2017-17
http://www.wilsonplasticsurgery.com/procedures/blepharoplasty/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121121.5/warc/CC-MAIN-20170423031201-00566-ip-10-145-167-34.ec2.internal.warc.gz
en
0.936354
512
2.65625
3
- (in the singular) The ability to see. - Thy sight is young, / And thou shalt read when mine begin to dazzle. - O loss of sight, of thee I most complain! - The act of seeing; perception of objects by the eye; view. - to gain sight of land - Bible, Acts i. 9 - A cloud received him out of their sight. - Something seen. - Something worth seeing; a spectacle. - You really look a sight in that silly costume! - Bible, Exodus iii. 3 - Moses said, I will now turn aside and see this great sight, why the bush is not burnt. - They never saw a sight so fair. - A device used in aiming a projectile, through which the person aiming looks at the intended target. - A small aperture through which objects are to be seen, and by which their direction is settled or ascertained. - the sight of a quadrant - their eyes of fire sparking through sights of steel - (now colloquial) a great deal, a lot; frequently used to intensify a comparative. - a sight of money - This is a darn sight better than what I'm used to at home! - In a drawing, picture, etc., that part of the surface, as of paper or canvas, which is within the frame or the border or margin. In a frame, the open space, the opening. - (obsolete) The instrument of seeing; the eye. - Why cloud they not their sights? - Mental view; opinion; judgment. - In their sight it was harmless. - (Can we find and add a quotation of Wake to this entry?) - Bible, Luke xvi. 15 - That which is highly esteemed among men is abomination in the sight of God. Terms derived from sight ability to see something worth seeing device used in aiming a firearm - (transitive) To register visually. - (transitive) To get sight of (something). - to sight land from a ship - (transitive) To apply sights to; to adjust the sights of; also, to give the proper elevation and direction to by means of a sight. - to sight a rifle or a cannon - (transitive) To take aim at. get sight of take aim at
<urn:uuid:0a0e6bee-ec13-49bf-9ba5-5a989e730306>
CC-MAIN-2015-06
http://en.m.wiktionary.org/wiki/sight
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121914832.36/warc/CC-MAIN-20150124175154-00234-ip-10-180-212-252.ec2.internal.warc.gz
en
0.899872
502
3.21875
3
Math Graphing- Desert Saguaro Cactus Growth Teacher of Lesson: Teresa Moore Grade Level: 2/3 - Students will work together to construct a 100 link paper chain with paper strips at required increments. - Students will use the data on the chain to make a bar graph. - Students will answer written questions based on their graph. - 100 strips of paper for loops (1" x 8") - 65 strips of paper for height strips (1' x 1") - graphing paper - question paper - Ask the children how many strips each group would need if I wanted the class to make 100 loops, total, in a long paper chain. (there are 5 groups) Hand each group 20 strips and have them connect them in a chain. I'll connect the group chains together. - Tell the children that each loop is one year on a time line. Lay it across the floor. Have them look at the Saguaro Cactus chart written on the board: If I want to make a strip of paper the height of the saguaro its first year, how long would I make the strip? (4 inches) What link would I link it to? (first) - 1yr 4 inches - 20yrs 1 foot - 25 yrs 2ft - 50 yrs 10ft - 60yrs 18ft - 100yrs 30ft - Assign each group a year. They are responsible for making the correct height length of strip, and attaching it to the correct loop (year). As groups finish and are waiting for others, they can start copying the chart on their own paper. - I am almost 22 years old. Can you show me which loop I am at now? Look at the strips on either side of my age. By looking at their length can you make a guess at how tall I'd be now... If I were a saguaro? Talk about it with your group. Then we’ll share guesses and reasoning. Try making a math problem to figure it out or draw a picture. - We are each going to chart this information on our regular, weekly bar graph paper. What would be a good title? What would I want to put for a title on the x-axis? On the y-axis? (these things have been used repeatedly in past graphing activities...previous knowledge) Pass out the graphing paper... on the back are photocopied questions: a) If you were a saguaro cactus, about how tall would you be now? b) Some saguaro cacti keep growing until they are 150 years old. About how tall do you think they are at that age? - Take 5-10 minutes now to get started on this assignment while your neighbors can help you with any questions you come across. Work time. - Watch to see if everyone in the group is participating in making the loops and strips for the chain. Encourage more participation on an individual basis, if some are week participants. - Students will fill out a bar graph chart to be collected and graded on accuracy. - The questions on the back of the graph will be checked for well explained, logical reasoning leading to an estimate of heights. Extensions/ Reteaching Strategies: Read Cactus Hotel or Desert Giant: The World of the Saguaro Cactus before or after the math activity to continue discussion of the saguaro across the science and literature curriculums. Return to the Desert/Ocean Habitat Home Page Return to the YLP Units Page Return to the YLP 1995-1996 Home Page
<urn:uuid:fe4b0600-1b30-40c5-99e5-2a62fccd5c08>
CC-MAIN-2014-52
http://education.illinois.edu/YLP/Units/Curriculum_Units/95-96/Desert_Ocean_TMoore/saguaro_time_line.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770433.122/warc/CC-MAIN-20141217075250-00150-ip-10-231-17-201.ec2.internal.warc.gz
en
0.924883
753
3.953125
4
Fannie Appel Rones shares her memories of growing up on St. Philip Street in Charleston, South Carolina, between the world wars. The neighborhood was diverse—home to blacks, whites, Catholics, Jews, Greeks, and Italians. Fannie talks about her parents, Abraham and Ida Goldberg Appel (Ubfal), emigrants from Kaluszyn, Poland, and recalls stories her mother told her about the Old Country. She discusses the differences between Charleston’s “uptown” and “downtown” Jews and the Orthodox synagogues, Brith Sholom and Beth Israel. Fannie also relates her experiences as a member of Charleston’s Conservative synagogue, Emanu-El, and Reform temple, Kahal Kadosh Beth Elohim. Karl Karesh, born in 1912, discusses growing up in Charleston, South Carolina, focusing on his neighborhood, the local merchants, his Hebrew school training, and his family and their adherence to Orthodox religious observances. He addresses the differences between the uptown and downtown Jews before World War II, and describes his clothing business, and other Jewish- and gentile-owned dry goods stores, in Charleston during the post-war years.
<urn:uuid:f5b3bcec-b30c-447d-9aaa-906687b755fe>
CC-MAIN-2019-47
https://lcdl.library.cofc.edu/lcdl/?f%5Bsubject_topic_facet%5D%5B%5D=Jews+--+South+Carolina+--+Charleston+--+History&f%5Bsubject_topic_facet%5D%5B%5D=Brith+Sholom+%28Charleston%2C+S.C.%29&f%5Bsubject_topic_facet%5D%5B%5D=Kahal+Kadosh+Beth+Elohim+%28Charleston%2C+S.C.%29&f%5Bsubject_topic_facet%5D%5B%5D=Jewish+sects+--+South+Carolina+--+Charleston+--+History&per_page=20&sort=date_sort_si+asc
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670948.64/warc/CC-MAIN-20191121180800-20191121204800-00519.warc.gz
en
0.963813
252
2.609375
3
After Sandy Hook, Addressing Mental Health Care A mass shooting at an elementary school in Newtown, Conn., in December 2012 served as a catalyst for state and federal lawmakers to reexamine and implement changes to mental health policies and services in dozens of states. The shooting followed a spate of similar incidents elsewhere in recent years, including two separate shootings in Arizona and Colorado, which drew significant national attention and helped spur early debate in Washington, D.C., about essential changes to the mental health system. American Health Line's Marcelle Maginnis checks in to see where the debate and the efforts to improve the system stand and what remains to be accomplished. Check below for a short presentation on the federal response during the year following the Sandy Hook shooting. Note: To progress through the presentation, click the arrow buttons. For a full-screen experience, click the button at the bottom right of the presentation screen. - For the complete report -- which includes the federal response, a timeline on mental health legislation and states' responses -- click here (.pdf) or on the image below.
<urn:uuid:18327b1a-4745-4790-b512-736a3aa67999>
CC-MAIN-2019-26
http://www.americanhealthline.com/analysis-and-insight/infographics/after-sandy-hook
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999539.60/warc/CC-MAIN-20190624130856-20190624152856-00392.warc.gz
en
0.926041
221
2.5625
3
3 Important Tips for Using Summary by Amy Maida Wadsworth To sum or not to sum: that is definitely the question. Summary is kind of like grout between floor tiles—it keeps your story smooth and makes it walkable. But it’s easier to say what summary is not than to say what it is. In the world of fiction, anytime you tell what happens instead of showing it, you’re essentially summarizing. Telling means you’re giving the audience the basics, providing the backstory, interpreting events, and compressing ideas into a bite-size morsel. Showing, on the other hand, involves sensory details and descriptive nouns and verbs—things that add realism to what your character observes and does. When you summarize, does it seem like you’re breaking the cardinal rule of “show, don’t tell”? Regardless of whether you’re breaking a rule, summary is necessary in fiction. You can’t show everything that happens to your characters unless you want your reader to use your book as a pillow. So if you can’t show everything but need to show as much as possible, how do you know when to summarize and when not to? Here are three easy tips to guide you through the summary maze. 1) To Sum Find a common denominator. Remember when you learned to add fractions in grade school? One of the basic rules is that you first have to find the common denominator. It’s the same thing with summarizing (note the root word and its mathematical implications). For example: Your character is going through a period of depression, longing for the girl he’s lost. This can go on for weeks or months. You don’t want to show everything that happens during this time, because everything in your character’s life is overshadowed by what he’s feeling. His emotion is the common denominator; his depression is more important than his day-to-day life. Instead of showing it all, you can summarize like this: Dirk passed through the next semester in a numb stupor. He didn’t learn a thing except that he felt bottomless-pit-empty without Allie in his life. Another common denominator can be drudgery. If your character is engaging in repetitive behavior, trial and error, or some sort of training in order to prepare for an event, you don’t want to show each and every training session. You can summarize like this: After that first painful run, Joni forced herself to hit the pavement again. She increased her mileage once a week, iced her knees every night, and looked forward to her rest days like a camper waiting to shower. Note that with this example, the “first painful run” was already shown in a previous scene. Anytime your scenes seem repetitive, you probably have a common denominator that you haven’t identified. You want every scene to feel as fresh, interesting, and invigorating as possible, which means you may need to summarize what feels repetitive. 2) Not to Sum If something is important to your character, show it. One of my writing heroes, Dwight V. Swain said that “a thing isn’t just significant. It’s significant to somebody.” In other words, events, objects, and words are only important because of the character experiencing those events, seeing those objects, or hearing those words. If something is important to your character, it’s your job to show it. Remember that summarizing is telling. So if an event/object/person/word is important to your character, don’t summarize it. Show it. If someone says something important to your character, we should hear it in dialogue. We should see, feel, smell, and maybe even taste objects, foods, and people that make a significant, plot-changing difference to your character. An important event should be shown in a scene, along with all the blow-by-blow conflict your character observes. Joni didn’t notice him until her third run down Memory Grove. He passed her at a decent pace, his breath puffing out in the cold air at regular intervals. A hoodie hid his face, but his bare legs were sinewy and defined. He could probably outrun her without breaking a sweat. Because we have gone from telling (“until her third run”) to showing (“his breath puffing … hoodie hid his face … sinewy and defined”), we know that this guy is important to our character and is likely to become more important later on. At this point, he’s a figure of curiosity because of the details she notices—maybe she notices his breathing is controlled because her own is erratic. She can’t see his face, but his legs are bare. Does this mean he’s trying to hide his identity? This odd realization may make her nervous and slightly frightened of him, or she may just be intrigued. She notices his well-defined legs, something that adds another level of tension because he is a well-trained runner and she’s a novice. The fact that she notices these things makes them important and pulls her out of the drudgery—and summary—of her daily run. The same technique applies to objects. If, for example, your character is packing up her mother’s things following an untimely death, she won’t notice all of the items she’s packing up—she’ll only notice what is important to her. Everything else will be summarized. Pink was Mom’s favorite color, and if anyone ever doubted it, they only had to glance in her closet. Every shade from blush to berry, organized left to right by deepening hue. I took the clothes down in bunches, folded them once, and shoved them in a cardboard box, completely ruining Mom’s system. Her gasp echoed from the spirit world. This character doesn’t really notice the items in the closet—she notices how they’re arranged. To her, what’s important is the fact that her mother was organized to a fault. Because of this, I show the organization while telling about the clothes. 3) Balance Telling with Showing Scenes and summary are both necessary to tell a good story. If you look closely, you’ll see that they alternate through a story’s text. The following paragraph demonstrates how we show and tell in the same paragraph. Summary (telling) is underlined. When I was thirteen, I’d covered a shoebox with decoupage and pressed in the few photos Mom and I had taken together, filling the gaps with strips of pink paper. I had no idea she’d kept the box in the corner of her closet. In fact, it seemed rather unreal that she hadn’t thrown it away. Such an impractical thing. But it didn’t have a bit of dust on it. It was just as clean and cared for as all of Mom’s other treasures. She’d kept what parts of me she could, and continued to care for those things as she had cared for me, when I was small enough to let her. The sections that aren’t underlined are examples of things we can see—sensory details that add realism to the scene and allow the reader to experience with the character. Everything that is underlined is a form of summary because it’s 1) backstory, telling us what the character did years ago or 2) the character’s interpretation of what she sees, or an internalization. Do This Now Here are a few things you can do to apply the above tips to your work. - Have a friend go through your piece and highlight anything that feels repetitive. What’s the common denominator in the highlighted text? - Always be aware of how your character feels. We share and read stories to feel emotion, after all. Write your character’s emotion in the margins, and if you’ve got the same emotion going on for several paragraphs, you may be able to summarize a bit. - Outline your story, listing everything that’s important in every scene—objects, people, events, all the things your character can observe. Then, see if your text includes anything that can be cut or summarized because it isn’t important. Make sure you show everything on your list by using sensory details and descriptive nouns and verbs. Your turn! Which of the above resonates most with you and why? Amy Maida Wadsworth published three novels with Covenant Communications—Shadow of Doubt, Silent Witness, and Faraway Child. All three books are available for Kindle and Nook. Amy started teaching fiction writing in 2006 and has been a writing coach ever since. She works as a freelance editor and blogger for Eschler Editing and is pursuing her master’s in human development and social policy.
<urn:uuid:d2d4858d-57d8-4aba-a0ab-c79a26e1d1ae>
CC-MAIN-2023-14
https://eschlerediting.com/to-sum-or-not-to-sum/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00236.warc.gz
en
0.961665
1,911
2.875
3
Tancook Island Cabbage At one time, Tancook Island cabbages travelled the world as sauerkraut on sailing ships.... these cabbages are now growing at the Albert County Museum in Hopewell Cape, NB. History: Tancook Island cabbage is the traditional ingredient of Tancook Sauerkraut. Big Tancook Island, only 5 miles long and 3 miles wide, was Canada’s major supplier of sauerkraut at one point in history (according to the island’s tourism association). German immigrants found that the island provided excellent growing conditions for cabbage, which they preserved. Barrels of sauerkraut were sold both to seafaring ships and to logging crews – because the food was considered to prevent scurvy and provide nutrition while at sea or during long Maritime winters. Tancook Sauerkraut is now produced commercially in Lunenburg County, NS, and sold throughout Atlantic Canada. This lacto-fermented sauerkraut is made from the recipe brought from Big Tancook Island to Lunenburg by the great-grandfather of the company’s current owner, Cory Hatt. The cabbage seed was likely brought from Germany. The crop thrived on the island, where it was fertilized with seaweed each year. Generations of selection have led to Tancook Island cabbage, a variety well suited to Maritime growing conditions. Cabbage is a traditional crop in Albert County, NB. It is likely that first German settlers who arrived 250 years ago brought cabbage seeds with them. The cabbages could provide food over the long winters as they could be stored in cold rooms or preserved as sauerkraut. Culinary uses: To make Tancook Island sauerkraut, according to Slow Food Canada, “the cabbage is shredded by hand, salted and placed into wooden barrels. The cabbage is kept submerged by stone or clay weights. The barrels undergo a cool fermentation for up to four weeks. It is said that the level of the brine in the barrels rises and falls with the height of the island tides.” Crop description: A green cabbage with a tight round head and long growing season. Growing: Start inside and plant out in the spring when conditions are cool. Mulch with seaweed to both provide nutrients but also help protect the plants from slugs and snails. Harvest in late fall after the plants have undergone a spell of cold weather. Seedsaving: The cabbage must be dug up, overwintered in a root cellar (or other cold storage) and then planted out the following spring to save seed. It is possible cut off some of the leaves and use them for sauerkraut in the fall, but keep the core intact. Heel the core with its roots into soil and keep in cold storage until the spring. Keep in mind that cabbage is Brassica oleracea, a species that includes broccoli, European kale, cauliflower, collards and Chinese broccoli. These can all cross-pollinate so the seed cabbage crop must be isolated from any of the flowering members of the species.
<urn:uuid:43bb33e7-d2b3-49b1-8960-3f4a18f31e53>
CC-MAIN-2018-05
https://www.albertcountymuseum.com/cabbage
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886397.2/warc/CC-MAIN-20180116090056-20180116110056-00408.warc.gz
en
0.953343
651
3.15625
3
Control valves which involve a plastic seal are normally sealed on delivery. The fact remains that particles are carried by the water, they will damage the seal when the valve closes. It is therefore necessary to take precautions, place a filter upstream, periodically monitor the tightness of closed valves. Using the globe valve is important now. Can a regulating valve act effectively over its entire stroke? The qualities of loop regulation: stability and precision are easily found in the operating ranges close to the maximum opening. Minimum adjustment kv An “equal percentage” characteristic presents a concavity which compensates for the non-linear behavior of the exchangers. At positions very close to closing, the characteristic presents a minimum adjustment Kv (Kvr) and a possible leakage rate (Kv0). With an efficiency of 0.1 too low and an authority of 0.2 too low, the thermal power “leakage” is 22 %. These power values relate to the maximum power, valve open. The publication in the journal CFP cited above gives more details on these effects. What are the main characteristics to consider? We must consider the different uses of control valves to locate the importance of the parameters. Motorized valves are placed on the networks: Either to isolate generator circuits or to segment distributions for heating or cooling in order to adapt the energy supplies as closely as possible to the needs of the zones or sub-zones (figure 2). For this, neither the characteristic curve nor the pressure drop of the valve is critical, these valves only need to be tight.
<urn:uuid:318ec754-bf78-4c8f-ba7e-db666392e47d>
CC-MAIN-2023-23
https://officeosetup.com/look-for-the-smart-solutions-in-valve-use-in-water/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00632.warc.gz
en
0.91345
326
2.75
3
This portrait is part of the USAID Vietnam Clean Energy Program’s series on women champions in the Vietnamese construction sector, featuring women who have made strides in this male-dominated field, coming from diverse backgrounds and with different interests, but bound together by the common themes of a strong work ethic, love of country, a strong belief in themselves, and a passion for their work. According to the initial biennial updated report that Vietnam submitted to the United Nations’ Framework Convention on Climate Change in 2014, Vietnam released 225.6 million tons of CO2 equivalent in 2010, Five million tons were estimated to be from solid waste disposal. However, the gas emissions attributed to solid waste disposal only accounted for landfills and incineration. Tran Kieu Anh is making a more complete calculation. She has calculated gas emissions released by all methods of solid waste processing, including open burning and biological treatment. Educated with degrees in engineering and environmental sanitation from Vietnam and Belgium, Ms. Tran works with the Technical Infrastructure Agency of the Ministry of Construction. Her job is to manage Vietnam’s waste treatment technologies, which includes reviewing solid waste management systems employed across the country. She is also responsible for the upkeep of the country’s urban solid waste management databases. “My favorite task is updating our existing databases. The information helps investors learn about Vietnam’s capacity for solid waste management and find possible opportunities for investment in the country. It also helps the government better understand the sector and issue relevant and effective regulations,” she said. Vietnam currently has 660 landfills with a total area of 4,900 hectares and 35 solid waste treatment stations that collectively have the capacity to handle 6,500 tons of solid waste per day. According to Ms. Tran, a data inventory from all technical infrastructure systems across the country’s urban space is yet to be completed and needs a little bit more work in order for it to supply the statistics needed to allow a calculation of greenhouse gas emissions – particularly CO2. As one of the countries most affected by climate change, Vietnam is attempting to develop a low-carbon economy with the aim to promote the national strategy on green growth and sustainability. However, the country lacks the calculation tools and basic data for CO2 calculations. To contribute to these efforts, the USAID Vietnam Clean Energy Program works on calculating the CO2 generated by water supply systems, solid waste and wastewater treatment, with a view to recommending possible solutions towards a reduction of CO2 emissions. Ms. Tran has been working with the program since early 2016, learning how to calculate CO2 emissions, and later, even proposing two scenarios for increasing the gas’ emissions reductions in the construction sector by 2020. She is among the first in Vietnam to calculate CO2 emissions from all methods of solid waste treatment in the country. With help from the Program-provided emission calculation tools – which she early on realized had to be revised to suit Vietnam’s context – Ms. Tran was also able to conclude that buried solid waste releases the most CO2, followed by burnt waste and biotechnologically treated waste. “The information indicated that we are not able to reduce the amount of solid waste in Vietnam because of a growing population. A feasible solution is to choose appropriate technologies to treat urban solid waste and to prioritize sectors in order to reduce CO2 emissions,” she said. She added that the government has issued policies on solid waste management in an effort to promote green growth but there are some challenges. For example, there is no effective model for solid waste sorting and recycling. Solid waste management is not considered as important as other areas such as water supply and transportation, hence the shortage in solid waste management financing. “Other countries can sort out waste at source to reduce CO2 emission. Why can’t Vietnam do this? I work on seeking solutions for these issues,” she said. “Others may think I watch the clock as I’m just a state worker. However, I often work long hours with my team and frequently visit different sites in various provinces to learn about waste management conditions, which is essential for my work,” she added. Without the support of her family, Ms. Tran would not have been able to balance her work and personal life. She lives happily with her family and her 5-year-old daughter. For more information about the USAID Vietnam Clean Energy Program, please contact: Vu Thi Kim Thoa
<urn:uuid:292a5717-124f-44eb-b82a-f7966c490cf3>
CC-MAIN-2022-05
https://winrock.org/tran-kieu-anh/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305266.34/warc/CC-MAIN-20220127133107-20220127163107-00713.warc.gz
en
0.951482
959
2.8125
3
The T-84 is a Ukrainian main battle tank (MBT), a development of the Soviet T-80 main battle tank introduced in 1976. The T-84 was first built in 1994 and entered service in the Ukrainian Armed Forces in 1999. The T-84 is based on the diesel-engined T-80 version, the T-80UD. Its high-performance opposed-piston engine makes it one of the fastest MBTs in the world, with a power-to-weight ratio of about 26 horsepower per tonne (19 kW/t). The T-84 Oplot is an advanced version incorporating an armoured ammunition compartment in a new turret bustle; ten of these entered Ukrainian service in 2001. The T-84-120 Yatagan is a prototype model intended for export, mounting a 120 mm gun capable of firing standard NATO ammunition and guided missiles. A T-84 Oplot in 2018 |Type||Main battle tank| |Place of origin||Ukraine| |Used by||See Users| |Wars||War in Donbass| |Length||7.086 m (23 ft 3 in)| |Width||3.775 m (12 ft 5 in)| |Height||2.215 m (7 ft 3 in)| |Armour||Steel, composite, ERA| |125 mm smoothbore KBA-3 cannon (43 rds) 120 mm smoothbore gun (40 rds)| |7.62 mm KT-7.62 Coaxial machine gun| 12.7 mm KT-12.7 anti-aircraft machine gun |Engine||KMDB 6TD-2 6-cylinder diesel| 1,200 hp (890 kW) |Suspension||Torsion-bars, hydraulic dampers| |Ground clearance||0.515 m (1 ft 8.3 in)| |Fuel capacity||1,300 l (290 imp gal; 340 US gal)| |540 km (340 mi)| |Speed||65 km/h (40 mph) – 70 km/h (43 mph)| T-84 Oplot-M main battle tank, Kyiv, Ukraine, 2018 |Type||Main battle tank| |Place of origin||Ukraine| |Length||7.075 m (23 ft 3 in)| |Width||3.400 m (11 ft 2 in)| |Height||2.800 m (9 ft 2 in)| |Crew||3 (commander, gunner, driver)| |Armor||modular composite, ERA, APC| |125 mm smoothbore KBA-3 cannon with 46 rounds| |1 × 12.7 mm (.50) KT-12.7 anti-aircraft machine gun with 450 rounds | 1 × 7.62 mm (.308) KT-7.62 Coaxial machine gun machine gun with 1250 rounds |Engine||KMDB 6TD-2E opposed piston 6-cylinder (12 pistons) diesel (1,200 hp) or | KMDB 6TD-3 opposed piston 6-cylinder diesel (1,500 hp) |Power/weight||24.7 hp/t (6TD-2E) | 30 hp/t (6TD-3) |Ground clearance||0.50 m (1 ft 8 in)| |Fuel capacity||1,140 litres (250 imp gal; 300 US gal)| |500 km (310 mi)| |Speed||Road 70 km/h (43 mph) | Off-road: 45 km/h (28 mph) The T-84 is the latest Ukrainian development of the T-80 series, designed by KMDB in Kharkiv. A main design objective was to make Ukraine's arms industry independent of Russia's, after resulting difficulties in fulfilling a contract to supply T-80UD tanks to Pakistan. An external difference from earlier models is the new Ukrainian welded turret, replacing the T-80's Russian-built cast turret (some T-80s shipped to Pakistan were fitted with the T-84 welded turret, but lack other T-84 improvements). The T-84's outstanding feature is the 26 hp/t power-to-weight ratio. The tank is also designed to perform well in hot climates, and even includes an air-conditioned crew compartment (operating temperature range is claimed to be −40 °C to 55 °C). Due to the collapse of Soviet Union, the Malyshev Factory was no longer able to obtain ceramic armour modules from Russia and only the initial batch of T-84 were produced with such. Instead, later batches of T-84's composite armour is composed of special purpose rubber sandwiched between steel and alloy plates. The exact difference in performance between the new and previous armor is not known and depends on performance of dynamic armor. Ukraine has demonstrated several upgraded prototypes of this tank, intended for both domestic employment and international sale. - Ukrainian Modernization of the T-80UD. New welded turret and Shtora-1 countermeasures suite, new electronics, new main gun, new armor, and 1,200 hp (895 kW) 6TD-2 diesel engine. - Ukrainian upgrade of the T-84. New armoured side skirts, turret-conformal Kontakt-5 explosive reactive armour, auxiliary power unit, thermal imaging sight, satellite navigation, commander's laser range-finder, muzzle reference system, and other improvements. - T-84 Oplot - T-84U with a new welded turret with separate crew and ammunition compartments with blowout panels on the ammunition compartment, a new bustle-mounted autoloader. - T-84-120 Yatagan - A prototype version of Oplot tailored for evaluation by the Turkish Army (prototype designation, KERN2-120). Mounts a 120 mm main gun which fires both NATO 120 mm rounds (like the M829 DU series) and a special 120 mm version of the AT-11 Sniper ATGM. It also has automated gear shifting in place of mechanical gear selector, driver's T-bar control replacing tiller bars, air conditioning, and projectile muzzle velocity sensor, as well as differences in the fire control system, communications, etc. - T-84 Oplot-M - (Modernized), or "BM Oplot": The newest and most sophisticated version of the T-84 is an upgraded version of the "T-84 Oplot" mounting more advanced armor, new electronic countermeasure systems, and others. One visible feature is the new PNK-6 panoramic tank sight. The BM Oplot is a further development of the previous Oplot, which is based on the T-84 main battle tank. The tank has a conventional layout with the driver's compartment at the front, fighting compartment in the middle and engine at the rear, accommodating a crew of three members. The driver sitting in the centre is provided with a single-piece hatch cover that opens to the right. The commander on the right and the gunner on the left have single-piece hatches. The Oplot MBT is armed with a 125 mm smoothbore KBA-3 cannon, a KT-7.62 (PKT) Coaxial machine gun and a KT-12.7 anti-aircraft machine gun. The main gun is fed by a loading system equipped with conveyor, automatic loader and control system. The ammunition includes high explosive fragmentation (HE-FRAG), armour-piercing fin-stabilised discarding-sabot (APFSDS), high explosive anti tank (HEAT) and gun mount (GM) rounds. The main gun can also fire a laser guided missile against battle tanks, armoured vehicles and hovering helicopters within the range of 5,000m. The missile can be fired on the move against travelling targets. The tandem warhead fitted on the missile can defeat targets equipped with explosive reactive armour and advanced spaced armour. The Oplot has 46 rounds of ammunition for the main gun, of which 28 rounds are placed in the automatic loader. Other ammunition types carried are 1,250 rounds for KT-7.62 machine gun, 450 rounds for KT-12.7 machine gun and 450 rounds for AKS submachine gun. - Fire control The vehicle has three forward-facing periscopes in front of the driver's cupola. The centre periscope can be replaced with a night driving device. The fire control system includes a gunner's day sight, PNK-6 commander's panoramic sighting system, PTT-2 thermal imaging sight, anti-aircraft sight and anti-aircraft machine gun control system. Detection range of targets for thermal sighting system is up to 8 km. The tank is also equipped with LIO-V ballistic computer, armament stabiliser and other systems. Duplet ensures protection against: - hand anti-tank grenades, hand-held and stationary grenade launchers and recoilless guns (including ammunition with tandem warheads) - anti-tank missiles of TOW-2, MILAN and Shturm-S type - HEAT projectiles fired by 125 mm tank smoothbore guns - APFSDS projectiles fire by 125 mm and 120 mm tank guns Both sides of the driver's compartment are fitted with explosive reactive armour panels for extended protection. The hull sides are hinged with large rubber skirts to withstand the attacks of man-portable anti-tank weapons. The modular explosive reactive armour package can be easily replaced or upgraded according to the future requirements. Oplot features a Varta optronic countermeasures system for deceiving incoming missiles and anti-tank guided weapons. The system integrates laser warning sensors, infra-red jammer and smoke / aerosol screen laying system. The optronic countermeasure system provides: - confusing of the guidance systems of ATGM by putting out laser jamming covering the horizontal plane of ±18° relative to the main gun tube and ±2° in the vertical plane - jamming of the ATGM guidance systems that use laser illumination of targets, semi-automatic laser guided homing projectiles as well as artillery systems equipped with laser range-finders by activating the remote fast-deploying aerosol screens in a sector of ±45° relative to the main gun tube Crew's collective protection system ensures protection of the crew and interior equipment against effects of nuclear explosions, radioactive substances, toxic agents and biological warfare agents, as well as detection and suppression of fires in the crew compartment and power pack compartment. The Oplot tank can withstand an explosion of up to 10 kg trinitrotoluene (TNT) under the tank track and up to 4 kg TNT under the driver's compartment. The vehicle has overpressure-type NBC protection system and can be fitted with track mine-clearing systems. BM Oplot is powered by a 6TD-2E 6-cylinder turbocharged liquid-cooled engine, which delivers 1,200 hp (882 kW). It is improved and more environmentally friendly version of the previous 6TD-2 diesel engine, used on the T-84 MBT. Also tank would be powered by a more powerful 6TD-3 diesel, developing 1,500 hp. Both engines could use diesel, jet engine fuel, petrol or any mixtures of them. The engine provides a maximum on-road speed of 70 km/h and a range of 500 km with additional fuel tanks. The battle tank is also equipped with a diesel-electric auxiliary power unit (10 kW) to supply power to onboard systems when the main engine is turned off. BM Oplot is equipped with torsion bar type suspension. Either side of the six dual rubber-tyred road wheels are provided with idler at forward, drive sprocket at the rear, and track support rollers. The first, second and sixth road wheel stations are fitted with hydraulic shock absorbers. The tank can negotiate a gradient of 32° and side slope of 25°. Equally, the tank can ford a water depth of 5m using deep water fording equipment. - T-84 Oplot-T - "BM Oplot-T" is an export version for Thailand. It has some minor modifications to meet local requirements, such as different radio, air conditioner and so on. Thailand ordered 49 of these main battle tanks. Originally it was planned that all of these MBTs will be delivered by 2014. However due to ongoing military conflict in Ukraine by 2017 only 25 of these tanks were delivered. - BREM-84 Atlet – Armoured recovery vehicle based on the T-84 Oplot chassis. - BREM-T – Armoured recovery vehicle based on the T-84 Oplot-T chassis. - BMU-84 – Bridgelayer tank. - BTMP-84 – Heavy infantry fighting vehicle prototype based on the T-84 Oplot tank, with lengthened hull, an extra pair of road wheels, and a rear compartment for five infantrymen. The first T-84 prototype vehicle rolled out in 1994, and in the same year it was decided to build several more vehicles. They were subjected to extensive company and army trials. After successful completion of the extensive trials programme in the late 1990s the T-84 MBT entered service with the Ukrainian Army in 1999. In September 2011, the Malyshev Plant announced plans to produce the first batch of five Oplot-M tanks for the Thai Army by the end of the year. Under the contract, the Ukrainian company will make 49 tanks worth over US$200 million. As of November 2017, 31 tanks have been delivered. List of operators - The Ukrainian Ground Forces has 10 T-84 Oplot in service. - The Royal Thai Army has received 31 T-84 Oplot-T and an additional 5 were expected in November 2017. In March 2011, the Royal Thai Army placed an order for 49 T-84s to replace its fleet of aging M41A3 Walker Bulldog light tanks. The government has approved 7.155 billion baht to purchase the first 49 Oplot tanks to be assigned to several units: the 2nd Cavalry battalion (Royal Guard at Fort Chakrabongse, Prachinburi), the 4th Cavalry battalion (Royal Guard at Kiakkai, Bangkok), the 8th Cavalry battalion (Fort Suranari, Nakhon Ratchasima), and the 9th Cavalry battalion (Fort Ekathotsarot, Phitsanuloke). In April 2017, it was reported that following the delayed deliveries from this tank, the Royal Thai Army had declined the remainder of the sale and acquired the Chinese VT-4 main battle tank instead of the Ukrainian tank, due to the long term delivery schedule. The signed order for 49 units has to be completed by the month of January, 2017, it was reported that other deliveries may not be expected. A 26 March 2018 press release by Ukroboronprom stated that the 2011 contract for supplying Oplot-T tanks to Thailand had successfully completed and that the last party of tanks had passed checks by the customers and would be sent to the buyer in the near future. - In 2009, Peru reportedly tested the Oplot tank, but the government of Alan Garcia later decided to acquire test examples of the Chinese MBT-2000 in late 2010, only to have the government of his successor, Ollanta Humala, abandon the purchase in early 2012 to seek other alternatives. In May 2013, the T-84 was reported to be part of comparative tests to be conducted by Peru. The T-84 competed against the T-90S, the M1A1 Abrams, the Leopard 2A4 and A6, and the T-64 also offered by Ukraine. By September 2013, only the T-84, T-90S, Russian T-80, and M1A1 Abrams were still competing. - In January 2011, Azerbaijan showed interest in the Oplot main battle tank. The Defense Ministry of Ukraine has long been holding negotiations on this issue. In June 2013, it has been made public that Azerbaijan had instead purchased 100 Russian T-90 tanks, in a series of rearmament deals worth $4 billion with Russia. - In 2007 the Bangladesh Army began negotiations for the procurement of 76 T-84 Yatagan tanks in the first batch. The Bangladesh Army intends to induct a substantial number of Yatagans (200 to 300) over the next several years as part of its third generation main battle tank procurement program. However, Bangladesh finally decided to buy 44 MBT-2000 in 2011. - In 1998, the T-84M Oplot entered the tender for a new base tank for Greece. The Leopard 2A6 won the tender, defeating the French Leclerc, the British Challenger, the American Abrams, the Ukrainian T-84M and the Russian T-80U. - T-84 Jatagan was offered to the Malaysian Army but lost to the Polish PT-91. - Jane's Armour and Artillery, 2005–2006 - Kharkiv Morozov Machine Building-The BM Oplot main battle tank - T-84 MBT Archived 2005-04-05 at the Wayback Machine globalsecurity.com - Zaloga 2000, p. 3. - Zaloga 2000, p. 4. - "Oplot-M Main Battle Tank (MBT) - Army Technology". Archived from the original on 2019-03-22. - Archived November 29, 2009, at the Wayback Machine - "รวมภาพ รถถังหลัก OPLOT - กองพันทหารม้าที่ 2 พล.ร.2 รอ". THAIDEFENSE-NEWS. Archived from the original on 2017-01-18. Retrieved 2017-01-17. - "การฝึกอบรมหลักสูตรรถถัง OPLOT ของทหารไทยที่ยูเครน". THAIDEFENSE-NEWS. Archived from the original on 2017-01-18. Retrieved 2017-01-17. - "KMDB - T-84". Morozov.com.ua. 2000-08-24. Archived from the original on 2013-12-23. Retrieved 2014-07-23. - Archived 2013-12-24 at the Wayback Machine - Oplot-M tanks for the Thai Army - Bangkok Post: Five Ukraine tanks on way to Thailand, UNIAN (12 November 2017) - The Military Balance 2016 — p. 205 - "УКРАЇНА ЗДІЙСНИТЬ ЕКСПОРТНУ ПОСТАВКУ ОДНОГО ТАНКУ "ОПЛОТ" ДО США -". opk.com.ua. Archived from the original on 4 November 2018. Retrieved 3 November 2018. - Sputnik. "EEUU compra un tanque ucraniano del Ejército Rojo y este podría ser el motivo". mundo.sputniknews.com. Archived from the original on 20 June 2018. Retrieved 3 November 2018. - วาระแทรกซื้อรถถังยูเครน ครม.อนุมัติ 7.2 พันล้าน. The Nation (Thailand) (in Thai). Archived from the original on 12 August 2011. Retrieved 4 May 2011. - รถถัง7พันล้าน ครม.สั่งลา เอาใจกองทัพ. Thai Rath (in Thai). Archived from the original on 7 May 2011. Retrieved 5 May 2011. - สำนึกในการซื้อ "อาวุธ" ของกองทัพ กรรมวิธีในการสร้างฉันทามติจากสังคม (in Thai). มติชน. Archived from the original on 6 May 2011. Retrieved 5 May 2011. - "RTA orders additional chinese tanks". defence-blog.com. Archived from the original on 2017-04-06. Retrieved 2017-06-18. - Yeo, Mike (4 April 2017). "Thailand to buy more Chinese tanks, reportedly for $58M". Defense News. Melbourne, Australia. Archived from the original on 7 April 2017. Retrieved 7 April 2017. - Sputnik. "Thailand Says 'No Thanks' to Ukrainian Tanks, Chooses China Instead". sputniknews.com. Archived from the original on 12 February 2019. Retrieved 3 November 2018. - "Ukrainian MBTs for Thailand". Archived from the original on 5 January 2019. Retrieved 3 November 2018. - "Contract with Thailand on Oplot tanks supply completed – Ukroboronprom director general". Archived from the original on 4 July 2018. Retrieved 3 November 2018. - Páez, Ángel (March 7, 2012). "El Ejército renueva proyecto para sustituir los viejos tanques T-55". La Republica (in Spanish). Archived from the original on May 22, 2012. Retrieved June 2, 2012. - "Peruvian army discards Chinese MBT-2000 for the Russian T-90 better for the areas in Peru". armyrecognition.com. March 13, 2012. Archived from the original on May 16, 2012. Retrieved June 2, 2012. - Peruvian Tank Contenders Archived 2013-06-09 at the Wayback Machine - Army-Technology.com, May 17, 2013 - Peru; Future main battle tank projects lags on despite criticism Archived 2013-09-28 at the Wayback Machine - Dmilt.com, 2 September 2013 - https://www.defensenews.com/land/2017/08/09/ukraine-in-talks-to-sell-pakistan-100-tanks/. Missing or empty - "Azerbaijan to purchase new Oplot tank from Ukraine". News.az. 8 January 2011. Archived from the original on 10 January 2011. Retrieved 8 January 2011.. - "ИТАР-ТАСС: Политика - Россия поставила Азербайджану 100 танков Т-90С". Itar-tass.com. Archived from the original on 2014-05-25. Retrieved 2014-07-23. - Agayev, Zulfugar (2013-08-13). "Azeri-Russian Arms Trade $4 Billion Amid Tension With Armenia". Bloomberg. Archived from the original on 2015-01-19. Retrieved 2014-07-23. - Yatagan Main Battle Tank bdmilitary.com - Hasan Jahid Tusher (2011-06-27). "Army to get 44 tanks". Archive.thedailystar.net. Archived from the original on 2014-06-29. Retrieved 2013-08-09. - Steven Zaloga and David Markov (2000). Russia's T-80U Main Battle Tank. Hong Kong: Concord. ISBN 962-361-656-2. |Wikimedia Commons has media related to T-84.| - T-84 Oplot Data Sheet and pictures - Kharkiv Morozov Machine Building Design Bureau—Ukrainian producer of the T-80. KMDB's pages for T-80UD, T-84 Oplot, T-84 Yatagan, and T-84 Oplot-M. - T-84 MBT at globalsecurity.org - T-84 MBT at military-today.com - Hromadske.ua, “Ukraine’s Tanks Are So Good, Its Own Army Can’t Afford Them,” 2017-09-14.
<urn:uuid:f8046239-d14f-4de3-9634-80b9d9d386da>
CC-MAIN-2021-31
https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/T-84
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154127.53/warc/CC-MAIN-20210731234924-20210801024924-00044.warc.gz
en
0.86813
5,441
2.546875
3
The Comets of God A provocative book providing scientific evidence for the existence of God and God's message to mankind about the future. The Comets of God examines the Bible’s scriptures in light of the advancements in archeology, history, linguistics, geology and astronomy that open the door to understanding and appreciating the amazing scientific information in the Bible. There is now significant scientific evidence that helps to establish the reality of the catastrophic events recorded or prophesied in the Bible. For example, learn about: - "Noah’s Flood" and the Burckle Impact Crater - The "Tower of Babel" and the Amarah Impact Crater - Revelation's prophecy of the world's cities falling and mountains melting in light of what a comet penetrating the earth's crust can do. As Time magazine said of Dr. Goodman’s past work, what he has to say will be much discussed and argued about, but few will be able to dismiss it.
<urn:uuid:3fb40c87-7313-4609-9f2f-8e6adec7aa70>
CC-MAIN-2014-10
http://www.thecometsofgod.com/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010740404/warc/CC-MAIN-20140305091220-00058-ip-10-183-142-35.ec2.internal.warc.gz
en
0.907511
205
2.796875
3
To manage agricultural risk, many agencies and organizations offer a range of different strategies such as crop insurance, futures, options, forward contracts, etc., to farmers and ranchers. However, the adoption of these and other risk management tools by limited resource beginning farmers and ranchers has been slow. Previous research suggests that the slow adoption is related to lack of knowledge and understanding about these tools and/or strategies. In a survey of producers growing field crops in Indiana, Nebraska, Texas and Mississippi, Coble, et, al, (1999) found that less than 34% of the producers had attended any risk management training programs. Similarly, a survey of African-American farmers in Alabama, Georgia, Mississippi and Texas by Federation of Southern Cooperatives (2000) found that less than 44% of the producers had received such training. The low rate in this study was attributed primarily to the fact that many agencies including the land-grant institutions did not provide or give adequate technical assistance to farmers on crop insurance and other risk management tools. None of this research has, however, looked at educational training needs and information sources used or preferred by limited resource beginning farmers and ranchers as they employ these strategies. This study seeks to fill this void this gap and it assesses risk information sources preferences by socially disadvantaged beginning farmers and ranchers in Alabama. |Conference||2014 Women in Agriculture Educators National Conference|
<urn:uuid:4d55cba2-3bc0-4644-9468-e5b82026a93f>
CC-MAIN-2018-22
https://agrisk.umn.edu/Conferences/Presentation/educational_training_needs_and_information_so
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865928.45/warc/CC-MAIN-20180524053902-20180524073902-00527.warc.gz
en
0.955082
281
2.6875
3
Streets can kill cities: C40's Mark Watts on the Fossil Fuel-Free Streets Declaration This article orginally appeared on CityMetric. By Mark Watts, C40 Executive Director ‘Liveable Streets’ is a seminal 1981 work by the urban designer and theorist Donald Appleyard that compared the experiences of people living on three similar streets in San Francisco. The main variable between the streets was different levels of car traffic: one with 2,000 vehicles per day, one with 8,700 vehicles per day and a third with 15,750 vehicles per day. Appleyard’s key finding was that residents of the high traffic streets were less likely to know their neighbours and more likely to feel lonely and isolated from their community. The evidence of the negative physical, mental and social effects caused by living near busy roads has only grown in the subsequent years. Appleyard’s research led him to warn urban planners in developing nations that: ‘Streets can kill cities.’ Poor urban planning decisions that prioritise private cars over everything else create cities that are crisscrossed by gridlocked barriers, excluding those who can’t afford motor vehicles, and where pollution belching vehicles poison the lungs of humans forced to share the streets with them. We now know that a quarter of total global premature deaths are caused by some form of human-induced pollution. Those same emissions are also a major contributor to climate change, that poses even bigger risks to human health and well-being. It doesn’t have to be that way. Instead of choking urban life, streets can be a key resource in the fight for more liveable cities and reduced climate emissions. Streets will always serve as transport routes, allowing citizens to move around the city, yet the forms of transport that dominate those routes will determine if streets can fulfil their other key role, as centres of communities. Streets that prioritise pedestrians, bikes, buses and other types of mass transit are far more likely to be places where people want to meet, socialize, shop and live. Photo courtesy of Marc Verhille / Paris In many cities, streets take up about a third of the total available urban space; which provides mayors with a tremendous opportunity. If a city manages to improve the quality of its streets by converting them into inclusive, healthy and attractive spaces, it will successfully improve a third of its land directly. The additional benefits that flow from such a shift are remarkable: millions of pollution-related premature deaths avoided each year; economic growth from thriving communities; money saved from health budgets as public health improves thanks to more active lifestyles; less inequality between rich and poor neighbourhoods, and reduced greenhouse gas emissions. In an effort to initiate a global shift to truly liveable streets that boost their cities, 12 mayors from across the C40 network recently launched the Fossil Fuel-Free Streets Declaration. This commitment to procure only zero-emission buses from 2025 and make major areas of these 12 cities zero emissions by 2030, will lead the way to a more pleasant urban environment for over 80 million people. What is so significant about this declaration is the diversity of cities that were able to sign. If Paris, London, Los Angeles, Copenhagen, Barcelona, Quito, Vancouver, Cape Town, Seattle, Mexico City, Auckland and Milan can do it – cities of vastly different size, location and history, united by their sheer will to improve the urban environment – there is no reason for any city to hold back from adopting similar people-friendly policies. The commitment of a group of mayors who represent more than 80 million people has an additional benefit in the message it sends to markets. Almost 60,000 buses operate on the streets of these 12 cities. The Fossil-Free-Fuel Streets Declaration gives a powerful signal to all vehicle manufacturers that cities are demanding emission free products and services. The future of our cities is not powered by burning fossil fuels, and any business who ignores that reality will get left behind. This transformation is already underway. For example, London has the biggest fleet of electric buses in Europe with 170 already on the road; Los Angeles has just signed contracts to procure 95 electric buses; Copenhagen has committed to ensure all new buses will be zero emission from 2019, and in Paris 4 out of 5 buses will already be electric by 2025. In China the numbers are of a different magnitude altogether, with tens of thousands of electric buses already on the roads. Major cities like Beijing and Shenzhen will have fully electric bus fleets before 2020. Similarly, a quiet revolution in cycling is taking place, and almost overnight hundreds of thousands of cyclists can be seen on the streets of Beijing and Shanghai. I couldn’t believe my eyes when I visited China a few months ago, but cycling is back in a big way and it is thanks to an innovation in cycle hire that enables users to pick up and drop off high quality bikes wherever they finish their journey. The young entrepreneurs behind providers of these brightly coloured bikes, such as Ofo and MoBike, are now successfully replicating the model across the world. I am sure it is going to massively change the way people travel, and our streets will be cleaner and quieter as a result. Donald Appleyard was tragically killed by a speeding vehicle on the streets of Athens in 1982. His legacy is now being realised on the liveable streets of our great cities. Streets can kill cities. But the solution is not to try and close off our streets. Instead we need to reclaim streets from motor vehicles and re-purpose them for the benefit of the maximum number of citizens. That way, streets become the lifeblood of cities, and help create the inclusive, prosperous, healthy and liveable cities of the future.
<urn:uuid:f538b6e3-ca42-4f39-83ea-c0740faf9e85>
CC-MAIN-2019-39
https://www.c40cities.org/blog_posts/streets-can-kill-cities-by-mark-watts
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574532.44/warc/CC-MAIN-20190921145904-20190921171904-00431.warc.gz
en
0.955304
1,169
2.59375
3
- Slideshow: Top Problems in Your Mouth - Teeth Whiteners That Work - Dental (Oral) Health Quiz - Patient Comments: Gum Disease - Symptoms - Patient Comments: Gum Disease - Treatment - Patient Comments: Gum Disease - Home Remedies - Patient Comments: Gum Disease - Other Health Problems - Find a local Doctor in your town - What is gum disease (gingivitis)? - What is the difference between gingivitis and periodontal disease? - What causes gum disease? - Does gum disease cause bad breath? - What does gum disease look like? What are gum disease symptoms and signs? - How do health-care professionals diagnose gum disease? - What is the treatment for gum disease? - What types of specialists treat gum disease? - What types of medication are used to treat gum disease? - Are home remedies or natural treatments effective for gum disease? - Is it possible to reverse gum disease? - Is gum disease associated with other health problems? - How is gum disease managed in children? - How is gum disease managed in pregnancy? - Is it possible to prevent gum disease? - What is the best toothpaste to use to prevent gum disease? - Is gum disease contagious? Quick GuideThe Ugly Truth About Your Toothbrush & Germs Is it possible to prevent gum disease? Prevention of gingivitis and periodontal disease is very simple in most cases. Gum disease is best prevented through proper plaque control. This involves brushing to remove plaque from the outer surfaces of the teeth and flossing to remove food particles and plaque from in between the teeth. Electronic toothbrushes tend to make it easier to remove plaque from some of the harder to reach areas of the mouth. Using a mouthwash after brushing and flossing can also help by reducing the bacteria that cause gingivitis. Besides these basic oral hygiene practices, there are other things that can be done to eliminate the factors that lead to an increase in gum disease: - Sleep/stress: The immune system is very important in controlling disease, and getting adequate sleep and reducing stress will help the body fight gum disease, too. - Stop smoking: Smokers are much more likely to develop gingivitis and periodontal disease, so avoiding tobacco should be the first thing someone does to achieve healthy gums. - Orthodontic therapy or braces: It is much easier to remove plaque from straight teeth than crowded, overlapped, and crooked teeth. Braces can make a big difference in having healthier gums. - Diet: Limiting the frequency of plaque-causing sugars and carbohydrates will help limit plaque. Eating a well-balanced diet will help keep the body's immune system healthy and ready to fight infection. What is the best toothpaste to use to prevent gum disease? The goal of toothbrushing is to remove plaque on the teeth that will harbor bacteria and cause gum disease and tooth decay. Just about any toothpaste when used with consistent thorough brushing habits will accomplish this goal. There are some ingredients in toothpastes that help remove plaque more effectively and help keep plaque off the teeth after they have been brushed. The abrasive agents in toothpaste such as silicates and calcium carbonates help remove plaque that is a little sticky. Sodium lauryl sulfate is a detergent in toothpaste that causes the foaming effect of toothpastes. Toothpastes vary in the amount of SLS they contain; a high concentration of SLS can cause problems for patients who have dry mouth or low saliva flow. Some toothpastes include plaque-control agents such as pyrophosphates and zinc citrate that prevent plaque from sticking to the teeth after they've been brushed. Using a toothpaste that contains any combination of these ingredients will increase the effectiveness of oral hygiene. Furthermore, rinsing with an essential-oil containing dentifrice (mouthwash) for 30 seconds twice daily after brushing helps prevent plaque buildup even more. Is gum disease contagious? While most of the factors that lead to gingivitis and periodontal disease are dependent on the individual, there has been some limited scientific evidence to affirm that gingivitis and periodontitis-causing bacteria can be passed down from parents to children and between couples. Asikainan, S., et al. "Can one acquire periodontal bacteria and periodontitis from a family member?" The Journal of the American Dental Association 128.9 (1997): 1263-1271. Atkinson, Jane C., Anne O'Connell, and Doron Aframian. "Oral Manifestations of Primary Immunological Diseases." The Journal of the American Dental Association 131.3 (2000): 345-356. Charles, Christine H., et al. "Comparative efficacy of an antiseptic mouthrinse and an antiplaque/antigingivitis dentifrice: A six-month clinical trial." The Journal of the American Dental Association 132.5 (2001): p670-675. Demmer, Ryan T. and Moise Desvarieux. "Periodontal infections and cardiovascular disease: the heart of the matter." The Journal of the American Dental Association 137 Suppl (2006): 14S-20S. "Gum Disease." Mouth Healthy. American Dental Association. Lazarchik, David A., and B. Van Haywood. "Use of Tray-Applied 10 Percent Carbamide Peroxide Gels for Improving Oral Health in Patients With Special-Care Needs." The Journal of the American Dental Association 141.6 (2010): 639-646. Meraw, S. J. and C. M. Reeve. "A case report: Treating localized refractory idiopathic gingivitis with Superoxol." The Journal of the American Dental Association 129.4 (1998): 470-472. Neville, Brad W., et al. Oral and Maxillofacial Pathology. 2nd ed. Saunders, 2002. Snider, J. "Green tea may promote periodontal health." The Journal of the American Dental Association 140.7 (2009) 838. Stephen, James M. "Gingivitis." Medscape.com. Dec. 31, 2014. <http://emedicine.medscape.com/article/763801-overview>.
<urn:uuid:ff12393e-4405-4b3e-8b29-3e3d486c7d24>
CC-MAIN-2017-09
http://www.medicinenet.com/gum_disease/page6.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00498-ip-10-171-10-108.ec2.internal.warc.gz
en
0.880756
1,348
3.046875
3
HarperCollins, March 2015. 416 pages, paperback, black and white illustrations. Combining both curiosity and a playful spirit, this engaging book provides an anecdotal tutorial on the fascinating science of plants. After pruning a kumquat tree with the best of intentions, Kassinger watched as it proceeded to turn brittle and brown. Why did the kumquat die when a rose bush and a crape myrtle similarly clipped had thrived? While she knew the basic rules of caring for indoor plants, Kassinger realized that she understood very little about plant physiology – how roots, stems, leaves, and flowers actually function. Determined not to repeat her failure, she set out to learn the fundamentals of botany in order to become a better gardener. This is the story of her wise and enchanting odyssey to discover the secret life of plants. Kassinger retraces the progress of the first botanists, including Charles Darwin, who banished myths and misunderstandings and discovered that flowers have sex, leaves eat air, roots choose their food, and hormones make morning glories climb fence posts. She goes out into the world as well, visiting modern gardens, farms, and labs to discover the science behind extraordinary plants like one-ton pumpkins, truly black petunias, ferns that eat the arsenic in contaminated soil, biofuel grass that grows twelve feet tall, and the world’s only photosynthesizing animal. Kassinger also introduces us to modern scientific research that offers hope for combating climate change and alleviating world hunger. She then transfers her insights to her own garden. Intertwining personal anecdotes, accessible science, and little-known history, A Garden of Marvels takes us on an eye-opening journey into Kassinger’s garden – and yours – offering us a new appreciation of this exquisite gift of nature. Out of stock
<urn:uuid:12bacd11-7602-4a86-9e40-3446bcc6ee00>
CC-MAIN-2021-10
https://www.nokomis.com.au/product/new-books/botanical/biology-botanical/a-garden-of-marvels-how-we-discovered-that-flowers-have-sex-leaves-eat-air-and-other-secrets-of-plants/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178366477.52/warc/CC-MAIN-20210303073439-20210303103439-00007.warc.gz
en
0.913861
386
2.78125
3
It's not a bird or a plane. It's a lighter-than-air, unmanned flying vehicle made of ripstop nylon that, if test flights are anything to go by, will be able to soar as high as 9,000 ft. for as long as three days. What will it do up there? If fitted with surveillance equipment, it can keep an eye on war or disaster zones, or it can carry communications technology to link people cut off from the world by, say, a catastrophe that takes out a bunch of cell-phone towers. Eel-shaped for a reason, the STS-111 works through an interchange of gases. In the head, there's a pouch of helium in an envelope of regular air. A pouch in the three back sections contains ethane for power. As the eel rises, the air surrounding the pouches is vented so the helium and ethane can expand. This means the vehicle should be able to ascend and descend without bursting. A ride like this one doesn't come cheap: the estimated price is $2 million to $3 million. Next Better 3-D Glasses
<urn:uuid:83f78826-b6f4-432c-accd-566c58a5e353>
CC-MAIN-2014-35
http://content.time.com/time/specials/packages/article/0,28804,2029497_2030629_2029810,00.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922089.6/warc/CC-MAIN-20140901014522-00209-ip-10-180-136-8.ec2.internal.warc.gz
en
0.952023
231
3.0625
3
The Mangrove Carbon Emission Simulator, developed by Dr Fernanda Adame and Dr Chris Brown from Griffith’s Australian Rivers Institute and Professor Rod Connolly’s Global Wetlands Project, has been designed for use by government departments, wetland managers, climate change groups and environmental organisations. It calculates the tons of carbon that would be released if a pre-determined area of mangrove forest was cut down. The team’s research has shown the amount of carbon that mangroves are capable of storing is 10 times higher than commonly believed. Coastal wetlands in general store more carbon than rainforests. Dr Brown said this had major implications for national carbon accounting by governments globally. “They can use this to assess if the wetlands in their areas of interest are being properly valued in terms of their carbon storage,” Dr Brown said. “So aside from the environmental benefits of reducing carbon emissions into the atmosphere, calculating carbon storage also offers an economic incentive – carbon that we can avoid emitting is what can be sold to the carbon market.” Dr Adame said there was worldwide interest in accounting for how much carbon is stored, how much carbon is emitted, and how much carbon is protected. “The problem is that calculating carbon emissions from coastal wetland degradation and deforestation is difficult and not everyone can do them,” she said. “With the web app, people can see how much carbon they can avoid emitting and protect these areas.” Dr Adame has previously been funded by the Leonardo DiCaprio Foundation to help value the carbon stored in some of Mexico’s mangrove forests, where she used the web app to report on how much carbon was saved through protection, which can be used to value the carbon for carbon trading schemes. This means communities can receive income to keep protecting their mangroves. The release of the Mangrove Carbon Emission Simulator coincided with World Wetlands Day on Saturday, February 2.
<urn:uuid:ed13bc1d-2b39-4a73-8c4e-1783c5484015>
CC-MAIN-2021-39
https://globalwetlandsproject.org/carbon-economy-and-wetland-protection-to-benefit-from-new-app/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058456.86/warc/CC-MAIN-20210927151238-20210927181238-00206.warc.gz
en
0.960942
412
4.0625
4
What is the Supplemental Child Poverty Rate in Your State? To better understand how families are faring, the U.S. Census Bureau created the Supplemental Poverty Measure (SPM) in 2011, basing it on decades of research. The SPM measures the impact of a number of important social programs such as SNAP and the Earned Income Tax Credit (EITC) and accounts for rising costs and other changes that affect a family’s budget. Unlike the official poverty measure, the SPM is adjusted for geographic variations in the cost of living. The child poverty rates by state vary dramatically using the SPM, according to Measuring Access to Oppportunity in the United States, a new KIDS COUNT data snapshot. Regional patterns differ from the traditional poverty measure. Using the SPM, California has the highest child poverty rate among states, followed by Arizona and Nevada. States with some of the largest child populations, like Florida, New York and Texas, have among the high- est child poverty rates, using the SPM. The lowest rates are in the upper Midwest and northern New England.
<urn:uuid:4d5dff0c-bb55-46d2-8a7a-6085e4f7d0a7>
CC-MAIN-2019-09
https://www.aecf.org/blog/what-is-the-supplemental-child-poverty-rate-in-your-state/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484772.43/warc/CC-MAIN-20190218074121-20190218100121-00567.warc.gz
en
0.925959
225
3.59375
4
In a case-control study undertaken in several hospitals in Connecticut, it was found that women who reported smoking more than 20 cigarettes a day during pregnancy had a relative risk of about 1.6 for congenital malformations in the offspring of that pregnancy compared with women who said they had not smoked at all during pregnancy. However, there was no significant increase in risk among women who reported smoking 20 or fewer cigarettes a day during pregnancy compared with those who said they had not smoked at all during pregnancy. The higher risk among moderate and heavy smokers could not be attributed to any of the potentially confounding variables considered in this study; furthermore, it was specific to smoking during pregnancy rather than before pregnancy, and increased with the average amount smoked a day. Nevertheless, because the increase in risk was modest, because response bias could exist in a study of this type, and because no other studies have examined in detail the smoking-congenital malformation hypothesis, further research is needed to determine whether the relationship between maternal smoking and congenital malformations in offspring is causal. Statistics from Altmetric.com If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
<urn:uuid:67c41582-3d13-4346-b951-79144cbd8faa>
CC-MAIN-2022-21
https://jech.bmj.com/content/32/2/102
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662512249.16/warc/CC-MAIN-20220516204516-20220516234516-00567.warc.gz
en
0.973308
284
2.625
3
For this activity, you’ll need: - Scrap paper - A piece of screening (approximately 10” x 10”) with the edges taped over to prevent wounds (duct tape works best) - Blender or food processor - Old towels - Rolling pin Tear the scrap paper into small pieces and soak it in hot water for half an hour. Take a handful of the paper, put it into a blender or food processor, and add water until half-full. Blend until you no longer see pieces of paper. Pour the mixture over the screen (with a basin underneath to catch water). Shake the screen back and forth to get an even layer of fibers on the screen. It may be necessary to lower the screen into the water in the basin in order to even out the layer. Lift the screen carefully out of the water. Lay the screening between old towels. Roll with a rolling pin to get the fibers flat and even, then let dry for at least an hour. Gently remove the paper from the screen by turning the screen upside down and peeling the paper away from the edges. The rest of the paper should fall away from the screen.
<urn:uuid:6ca3761c-65fe-465d-aeb7-dc049ecf8420>
CC-MAIN-2022-49
https://www.reformjudaism.org/jewish-holidays/tu-bishvat/make-recycled-paper
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711108.34/warc/CC-MAIN-20221206124909-20221206154909-00534.warc.gz
en
0.920606
251
2.609375
3
However, a Michigan State University study is the first to suggest that the exercise habits of expecting moms can actually reverse this long-standing belief and possibly lower a child’s chances of high blood pressure, even though they may weigh less at birth. High blood pressure, or hypertension, is a key factor in cardiovascular health. The research is a start in getting at the issue of genetic preprogramming of a child’s health characteristics while in the womb and can be found in the Journal of Sports Medicine and Physical Fitness. “We looked at a range of normal birth weight babies, some falling at the lower end of the scale, and surprisingly we found that this lower birth weight and higher blood pressure relationship in these offspring is not supported if the women were physically active,” said James Pivarnik, lead author and kinesiology professor at MSU. “The connection was disrupted, indicating that exercise may in some way alter cardiovascular risk that occurs in utero.” This phenomenon is linked to what’s known as the fetal origins hypothesis. The theory suggests if something strenuous happens to a mother and her unborn child during critical growth periods in the pregnancy, permanent changes can occur that can affect the health of the baby. Pivarnik and his colleagues initially evaluated 51 women over a five-year period based on physical activity such as running or walking throughout pregnancy and post-pregnancy. In a follow up to the study, they found that regular exercise in a subset of these women, particularly during the third trimester, was associated with lower blood pressure in their children. “This told us that exercise during critical developmental periods may have more of a direct effect on the baby,” he said. The finding was evident when his research team also discovered that the children whose mothers exercised at recommended or higher levels of activity displayed significantly lower systolic blood pressures at 8 to 10 years old. “This is a good thing as it suggests that the regular exercise habits of the mother are good for heart health later in a child’s life,” Pivarnik said. Other contributors to the study included Lanay Mudd, MSU; Erin E. White, Winona State University; Rebecca Schlaff, Saginaw State University; and Karissa Peyer, Iowa State University. Sarina Gleason Media Communications office: (517) 355-9742
<urn:uuid:c2c4e34f-8244-40b0-81d5-d1a316241acb>
CC-MAIN-2019-51
https://www.healthcanal.com/blood-heart-circulation/blood-pressure/58805-mom-s-exercise-habits-good-for-blood-pressure-in-kids.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540579703.26/warc/CC-MAIN-20191214014220-20191214042220-00190.warc.gz
en
0.960785
498
3.296875
3
Herb Garden Cartwheel Design A cartwheel design for an herb garden can be used whether there is a small or large space. Just vary the size of the outer edge of the circle to fit your needs. It's great if you're learning to grow herbs for the first time and want to keep them organized or if you just want to create a little formality. Planting herbs together away from other garden plants allows easy access to them and concentrates their scents all in one area for maximum enjoyment. Since most herbs grow well in full sun to part shade, choose a spot in your yard that gets at least 6 hours of sunlight per day. Mark out the circle on the lawn where your herb garden will be with a garden hose or circle of string. Next trace out the circle again by removing a line of sod around the perimeter with a spade, just enough do that you can remove the hose or string and still see the circle. Sod can be removed from within the circle, test the soil, and then till it with compost, lime and other amendments, or create a raised bed with bricks or other stones and purchase soil and compost to fill in the beds. Either way, make sure the soil drains well. With both methods, define the outer edge of the wheel with bricks or other stones. This will help to keep the grass from invading the garden and will help to contain soil and gravel within the bed. To define the "spokes" of the wheel, use more bricks or install a weed barrier around the individual beds and fill in the borders with gravel. If your garden is large enough, these gravel borders can be used as paths that will make weeding and harvesting a breeze. Beds can be planted in a variety of ways. Plant each bed with a single herb to create a kaleidoscope of varying green hues. Another option is to plant herbs used for cooking on one side of the wheel and those used for potpourri, sachets on the other side. The sections created by the wheel are great for containing invasive herbs like those of the mint family. You may wish to plant taller rosemary, basil or sage in one section while leaving another for the low-growing thymes. The possibilities are endless!
<urn:uuid:0e85259b-f57b-4794-8675-2f839a89b85b>
CC-MAIN-2021-49
https://www.southernstates.com/farm-store/articles/herb-garden-cartwheel-design
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358074.14/warc/CC-MAIN-20211126224056-20211127014056-00180.warc.gz
en
0.93116
459
2.59375
3
Where the world is still busy in figuring out on how to control the widespread of Covid-19 and struggling to control it even after imposing lockdown in the respective countries ,a new study on the life span of virus has found that novel coronavirus can stay on the outer surface of face masks for as long as a week. The study was conducted by researchers from the University of Hong Kong (HKU) and published in the medical journal The Lancet, examined how long the virus can remain on commonly-touched objects like that of currency, tissue papers and clothes at room temperature. The study revealed that the virus stays for less than three hours on tissue papers and printing papers. And on cloth (like a cotton lab jacket) and treated wood, the virus disappears by the second day. While it can remain on bank notes and glass for 2-4 days, on stainless steel and plastic, the virus persists for 4-7 days. Researchers found that coronavirus can stay on the outer layer of a surgical face mask even after seven days. Malik Peiris, a clinical and public health virologist, told the South China Morning Post, “This is exactly why it is very important if you are wearing a surgical mask you don’t touch the outside of the mask, because you can contaminate your hands and if you touch your eyes you could be transferring the virus to your eyes.” The study also showed that with time, the effect/concentration of the virus on the various surfaces which was used to study declined rapidly and the use of household disinfectants such as bleach killed the virus almost instantly.
<urn:uuid:7c76f001-4dc3-4ac0-9271-7c1ed5e782cd>
CC-MAIN-2021-31
https://thelivenagpur.com/2020/04/07/covid-19-can-survive-for-a-week-on-face-mask-study-revealed/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151563.91/warc/CC-MAIN-20210725014052-20210725044052-00526.warc.gz
en
0.967504
334
2.65625
3
Research Index / Materials Science / Laser System Our group uses one of the two 10 Hz laser systems at CUOS. At 10 Hertz, a pulse occurs every 0.1 seconds and each pulse in our system lasts for 100 femtoseconds (1 fs = 0.000000000000001 seconds = 1 millionth of a billionth of a second). The system is Ti:sapphire-based which means that the short pulses are created and amplified by sapphire crystal rods that are doped with titanium (Ti). So the rods are mostly sapphire, but have a small concentration (doping) of titanium throughout the rod. Ti:sapphire rods can be excited (pumped) by green light and they will give off light (fluoresce) in the near-infrared -- a color between red and infrared. They are used for short pulse systems because they can support a large color range (bandwidth) which is essential to produce the short pulses. (There is an uncertainty relation in physics that says that for a laser pulse to be short in time it must be composed of lots of color and vice versa -- for a laser pulse to be monochromatic, composed of one color, it must be long in time or even continuous, not pulsed.) The center wavelength (color) of our system is 780 nanometers (nm) with a total spread (bandwidth) of 20 nm. Only a small portion of the bandwidth is in the visible range (red), with the rest being in the infrared (IR). Therefore, most of the beam is invisible to the eye. IR cards, IR viewers, and CCD cameras are used to follow the beam from place to place. CCD (charge-coupled device) cameras are sensitive to IR light so they can be used for alignment and photographs. (Most digital cameras use CCDs.) Laser Components: Our 10 Hz system consists of the following: Laser Output: The final output of this system is a 10 Hertz train of 100-fs pulses with an energy per pulse as high as 100 mJ and a contrast as high of 107 (peak-to-background ratio). Chirped-Pulse Amplification: When short pulse lasers were first developed, there was a limit to the energy per pulse that could be achieved. This limit came from the fact that a short pulse in time has a high power (power is energy divided by time) or high intensity (intensity is power divided by area). The high power or high intensity of these lasers will damage the material used to amplify it. The method to avoid this damage was first developed by our CUOS director Gerard Mourou and his graduate student in 1985. The method, chirped-pulse amplification (CPA), involves stretching the pulse in time, then amplifying it, then re-compressing it to a short pulse. After stretching the pulse, the pulse has a power or intensity low enough to avoid damage. The trick is to stretch the pulse in time such that it can be re-compressed after amplification. This stretching method is to add a "chirp" to the pulse and is described below under Stretcher. A chirped pulse is a pulse which has a frequency or color that changes during the pulse time. Just as a bird's chirp changes in pitch during the bird's song (in time), the pulse's color changes during the pulse (in time). The compressor then removes this chirp to regain the short pulse, but now amplified. An Argon laser operating at 5 Watts is used to pump the oscillator Ti:sapphire crystal. Four Nd:YAG lasers operating at a doubled-frequency of 532 nm (green) are used to pump the four amplifier Ti:sapphire crystals. (Nd:YAG is another crystal, Yttrium Aluminum Garnet, doped with Neodymium that is a common laser medium. It produces 1064-nm light which is infrared. If you use a doubling crystal to double the frequency or halve the wavelength, you get 532-nm light which is green.) The Nd:YAG lasers produce 10-ns pulses and are triggered to run at 10 Hz. The laser system as a whole cannot be run faster than 10 Hz because 0.1 seconds is necessary for the Ti:sapphire crystals to cool down after being pumped by the Nd:YAG lasers. The properties of Ti:sapphire change with temperature. Thus, if the Ti:sapphire crystals were still warm when the next pulse came through, the optical properties would be different and the laser system would vary from pulse to pulse. So, to produce an amplified short pulse, we use a continuous Argon laser to create it and four "long-pulse" lasers to amplify it. (Each pump laser will be described with its respective amplifier below.) Oscillator: The oscillator that creates the ultrashort pulse is a commercial laser from Clark-MXR. It contains a Ti:sapphire rod that is pumped by an Argon laser. The optics are set up in a V-shaped design to create the laser cavity. The laser can operate in continuous wave (CW) mode which means it produces continuous near-IR light with a narrow color range (bandwidth). More importantly, the laser can be mode-locked to produce 100-fs pulses with a bandwidth of 30 nm at a repetition rate of 100 MHz (one pulse every 10-millionth of a second). Mode-locked means that the entire color range is amplified in the laser cavity, and thus, all the modes are "locked" in the laser cavity. Normally, only a small range of colors can be amplified which gives the standard CW laser. (I have a link to a detailed explanation of mode-locking which I will add here soon.) Pre-Amplifier: For the cleanest pulses, the pre-amplifier is used. (It can be bypassed for simplicity when the cleanest pulses are not necessary.) The pre-amplifier is a multi-pass amplifier which allows 6 passes through the Ti:sapphire rod. It is pumped by a Nd:YAG laser which produces 10-ns pulses with 200 mJ of energy at 532 nm. This amplification happens before the stretcher and regenerative amplifier (regen). The goal is to reduce the number of round-trips in the regen and reduce the background level to produce cleaner pulses (pulses with a higher peak-to-background contrast ratio). To avoid the damage problems mentioned above in the Chirped-Pulse Amplification section, the pre-amplifier is limited in the maximum level it can amplify the pulse. Stretcher: The stretcher uses a grating setup to spread out the colors (bandwidth) of the short pulse in space. In the photo to the right, you can see the initial short pulse beam hit the grating. After it reflects off the grating, its color will be spread out in space. A mirror in the stretcher reflects the spread-out beam back to the grating, below the original beam. A flashlight is shown in the grating to the right to show that the grating does indeed spread the colors. (Since the flashlight is white light, it is made up of the rainbow of visible colors.) Once the color of the short pulse is spread out in space, the design of the stretcher allows certain colors to travel a shorter path than others. A last bounce off the grating puts the colors back together in space, but now the colors at one end of the bandwidth arrive later than the colors at the other end. So now the short pulse has been stretched in time to a "long" pulse. With our design, the original 100-fs pulse is stretched in time by a factor of 10,000 to a final duration of 1 ns. Since the different colors are spread across the pulse in time, the pulse is said to have a "chirp". This is the basis for chirped-pulse amplification (CPA), as mentioned above. Whether the pulse has a positive chirp or a negative chirp depends on whether the shorter or the longer wavelengths arrive first. The stretcher, due to the way gratings work, can only transmit at best half of the energy that enters. So a 2-nJ short pulse coming from the oscillator leaves the stretcher as a 1-nJ long pulse. Regenerative Amplifier: The regenerative amplifier (regen) is the first amplification stage after the stretcher and can amplify the pulse by almost a factor of one million. Its Ti:sapphire rod (shown above in the first photo on this page) is pumped by 5 mJ split off from a higher-energy Nd:YAG laser which produces a 10-ns pulse at 532 nm. The regen is actually a laser cavity and, as such, can produce near-IR laser pulses on its own -- so-called "free-running" laser pulses (pulses as long as the Nd:YAG laser: 10 ns). However, if a near-IR pulse is injected into the regen at the right time, it can amplify itself by stimulating emission of its own radiation. (On the other hand, the free-running laser will stimulate emission of noise, creating so-called ASE: amplified spontaneous emission.) With each round trip in the regen cavity, the near-IR pulse is increasingly amplified. The amplification is very fast for the first 10-15 round trips in the cavity. After this, the amount of amplification begins to saturate. After saturation, the pulse energy actually decreases each round trip. However, the pulse energy is constant from pulse to pulse after saturation, whereas it can vary be as much as 50% before saturation. Thus, the best time to switch out the amplified pulse is one round trip after saturation. At this point, the pulse energy is both large in amplitude and stable from pulse to pulse. The final result is that a 1-nJ pulse from the stretcher can be amplified to a 0.5-mJ pulse. 2-Pass Amplifier: The 2-pass amplifier is the simplest of the multi-pass amplifiers. It consists of a Ti:sapphire rod pumped by green (532 nm) laser light, with the short pulse being amplified by 2 passes through the rod. The same Nd:YAG laser that pumps the regenerative amplifier is used to supply a 120-mJ, 10-ns pulse to the 2-pass amplifier. The near-IR pulse extracts enough energy from the crystal to amplify itself by a factor of 40 -- from 0.5 to 20 mJ. The 4-pass amplifier is very similar to the 2-pass amplifier. However, due to the larger energies involved, its Ti:sapphire crystal is pumped by two more powerful Nd:YAG lasers, one from each side of the crystal. Each Nd:YAG laser produces 10-ns, 600-mJ light at 532 nm. With four passes through the excited crystal, the near-IR pulse amplifies itself by a factor of 10 -- from 20 to 200 As the final step in the chirped-pulse amplification scheme, the amplified (chirped) pulse must be compressed to remove the chirp and regain the short pulse in time. The compressor consists of a pair of gratings that spread out the color range (bandwidth) of the amplified pulse. To undo the effect of the stretcher, the opposite end of the bandwidth (as the one in the stretcher) travels a shorter path than the other end of the bandwidth. All the colors in the bandwidth of the amplified pulse are once again traveling together to give a short, unchirped pulse. As in the stretcher, only half the energy can be transmitted through the compressor (due to the way gratings work). The entire compressor is placed in a vacuum chamber because a high-energy, short pulse will become distorted in air (at worst, it will spark causing most of the energy to be lost in the spark). The final output from this laser system leaves the compressor chamber through a vacuum pipe and enters a "turning box" which is uses a mirror to direct the laser beam to whatever experiment is desired. From the time the laser beam enters the compressor chamber, the laser beam is kept inside vacuum pipes to avoid distortions to the beam. In addition, any material through which the beam passes will distort it, so all optics must be reflective. For example, to focus the laser beam, a curved mirror must be used instead of a lens. Single-Shot Auto-Correlator: This laser system produces electromagnetic pulses shorter than anything that can be produced electrically (light is an electromagnetic wave). As such, it is not possible to measure the pulse width (in time) by electrical means. Instead, the laser pulse is used to measure itself through a technique called an auto-correlation. An autocorrelation is a mathematical operation where a function is split into two pieces which are delayed with respect to each other, multiplied, and then integrated (summed) over time. This operation is implemented in the following manner (see the photo to the right): a) the pulse is split in two pieces by a beam-splitter; b) the pulses are delayed with respect to each other by using a translation stage to create a longer path for one of the pulses; c) the pulses are multiplied by overlapping them in a doubling crystal; and d) the multiplied pulses are integrated by looking at the total light on a detector. The doubling crystal produces frequency-doubled light which means for near-IR, 780-nm light, the crystal produces blue, 390-nm light. (Since frequency and wavelength are inversely related, double the frequency means half the wavelength.) For two pulses entering the crystal, the intensity of the blue light produced depends on the multiplication of the pulses in time and space. The detector looks only at the blue light and integrates (sums) it for 0.1 seconds (the time between laser pulses). Since the autocorrelation of a function of time is a function of delay time (between the pulses), the detected light must be measured for a range of delay times. To shorten the measurement time and simplify the setup, a single-shot auto-correlator is used. By using geometry, the two pulses are overlapped in the doubling crystal such that the delay time is mapped to the position on the detector. Thus, with a properly calibrated time-to-space mapping on the detector, the autocorrelation can be measured with a single pulse (single shot). 3rd-Order Auto-Correlator: A 3rd-order auto-correlator uses the tripled-frequency to measure pulse width, as compared to the doubled-frequency used by the single-shot auto-correlator (a 2nd-order auto-correlator). It is used to measure asymmetries in the pulse since a 2nd-order auto-correlator will always give a symmetric measurement in time. So, you can find out what is happening before and after your pulse. In many experiments and applications, what happens before the pulse is much more important than what happens afterwards. This is because a messy pre-pulse structure can modify things before the main pulse arrives, thereby changing the effect you're looking for. A messy post-pulse structure arrives after the main pulse arrives and is often too late to affect things. A 3rd-order autocorrelation will show you the asymmetries so you can clean up whatever is most important to you. In addition, a 3rd-order autocorrelation can give a better measurement of the contrast of the laser pulse. The intensity contrast ratio (ICR) of a laser pulse is the ratio between the peak intensity and the background intensity. The background can be composed of multiple structures. So, the range (in time) over which the ICR is measured is important to note. Copyright © Center for Ultrafast Optical Science, University of Michigan
<urn:uuid:684807bd-fc2a-4010-9a63-593e23820f6c>
CC-MAIN-2014-35
http://www.eecs.umich.edu/USL/MaterialScience/Laser.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500811913.46/warc/CC-MAIN-20140820021331-00370-ip-10-180-136-8.ec2.internal.warc.gz
en
0.928091
3,356
3.71875
4
External (Extraocular) Anatomy There are six muscles that attach to the eye to move it. These muscles originate in the eye socket (orbit) and work to move the eye up, down, side to side, and rotate the eye. The superior rectus is an extraocular muscle that attaches to the top of the eye. It moves the eye upward. The inferior rectus is an extraocular muscle that attaches to the bottom of the eye. It moves the eye downward. The medial rectus is an extraocular muscle that attaches to the side of the eye near the nose. It moves the eye inward toward the nose. The lateral rectus is an extraocular muscle that attaches to the side of the eye near the temple. It moves the eye outward. The superior oblique is an extraocular muscle that comes from the back of the orbit. It travels through a small pulley (the trochlea) in the orbit near the nose and then attaches to the top of the eye. The superior oblique rotates the eye inward around the long axis of the eye (front to back). The superior oblique also moves the eye downward. The inferior oblique is an extraocular muscle that arises in the front of the orbit near the nose. It then travels outward and backward in the orbit before attaching to the bottom part of the eyeball. It rotates the eye outward along the long axis of the eye (front to back). The inferior oblique also moves the eye upward. Fig. 1: Extraocular Muscle Anatomy The conjunctiva is a transparent mucous membrane that covers the inner surface of the eyelids and the surface of the eye. When it is inflamed or infected it becomes red or pink. This is called conjunctivitis or “pink eye”. The lacrimal gland produces tears that lubricate the eye. It is located under the outer edge of the eyebrow in the orbit. Tenon’s capsule is a layer of tissue that lies between the conjunctiva and the surface of the eye. The sclera is the white outer wall of the eye. It covers nearly the entire surface of the eyeball. It is a strong layer made of collagen fibers. The tendons of the six extraocular muscles attach to the sclera. Fig. 2: The cornea is the front clear part of the eye in the center part of the outer wall of the eye. The cornea is the front clear part of the eye in the front center part of the outer wall of the eye. It is made of collagen fibers in a very special arrangement so that the cornea is clear. Through the cornea you can see the iris and pupil. The cornea bends light coming into the eye so that it is focused on the retina. The cornea is the part of the eye on which contact lenses are placed. The anterior chamber is a fluid (aqueous humor) filled space inside the eye. The cornea lies in front of the anterior chamber, and the iris and the pupil are behind it. The iris is the colored part of the eye. It is disc shaped with a hole in the middle (the pupil). Muscles in the iris cause the pupil to constrict in bright light and to dilate in dim light. The change in pupil size regulates the amount of light that reaches the posterior (back) part of the eye. The lens of the eye is located directly behind the pupil. The lens bends light coming into the eye to help focus it on the retina. It changes shape to help the eye focus to see objects clearly at near. The lens is suspended from the wall of the eye by many small fibers (zonules) that attach to its capsule. The ciliary body is attached to the outer edge of the iris near the wall of the eye. The ciliary body produces the fluid (aqueous humor) that fills the eye and nourishes its structures. It also helps to change the shape of the lens when focusing occurs. The vitreous cavity lies between the lens and the retina and fills 4/5 of the space inside the back part of the eye. A jelly like substance known as the vitreous humor fills the cavity. This plays an important role in nourishing the inner structures of the eye. Light comes into the eye through the pupil and passes through the vitreous to be projected on the retina. The retina is a thin, transparent structure that covers the inner wall of the eye. The eye works like a camera, and the retina is like the film in the camera. It is where images are first projected before they are transmitted through the optic nerve to the brain. It is a very complex structure with 10 layers of specialized cells including the photoreceptor cells (rods and cones). Photoreceptors are highly specialized cells of the retina that receive light impulses and change them into chemical energy that can be transmitted by nerve cells to the brain. The two types of photoreceptors are rods and cones. Rods perceive black and white and serve night vision primarily. Cones are responsible for color perception and central vision. The macula is a small, specialized area of the retina that has very high sensitivity and is responsible for central vision. RETINAL PIGMENT EPITHELIUM (RPE): The retinal pigment epithelium is a layer of cells deep in the retina. This single layer of cells helps maintain the function of the photoreceptor cells in the retina by processing vitamin A products, turning over used photoreceptor segments, absorbing light, and transporting nutrients in and out of the photoreceptor cells. The choroid is a tissue layer that lies between the retina and the sclera. The choroid has a rich supply of blood vessels that nourish the retina. The uveal tract is a pigmented component of the eye that is comprised of 1) the iris, 2) the ciliary body, and 3) the choroid. The optic nerve connects each eye to the brain. It is a structure (like a video cable) that sends the picture seen by the eye to the brain so that the images can be processed. The optic nerves end in a structure called the optic chiasm. In an adult, the optic nerve is about the diameter of a pencil. There are over 1 million individual nerve cells in the optic nerve. The optic chiasm is the place in the brain where the two optic nerves meet. The individual nerve fibers from each nerve are sorted in the chiasm. The sorting occurs in such a way that the right side of the brain controls the view of objects in left visual space and the left side of the brain controls the view of objects in right visual space [See figure 3]. This is an area of the brain in the posterior occipital lobe to which the neurons in the retina ultimately give visual information. The visual cortex helps to process information regarding the image such as its color, composition, and relation in space to other objects. This information is then sent to other parts of the brain that serve higher visual functions. Fig. 3: The optic chiasm is the place in the brain where the two optic nerves meet.
<urn:uuid:dde2b6f2-2c96-471c-9d25-8231fbf76a61>
CC-MAIN-2022-40
https://www.aapos.org/glossary/anatomy-of-the-eye
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00662.warc.gz
en
0.911432
1,646
4.03125
4
Full Name: Eugene McCarthy Profession: Politician and Presidential Candidate Why Famous: Eugene McCarthy was a prominent American politician best known for his part in the 1968 US presidential race. McCarthy was elected to the US House of Representatives in 1948 and to the US Senate in 1958. In 1968 with sentiment strong against the war in Vietnam, McCarthy agreed to run against the incumbent Lyndon Johnson to on an anti-war platform. In a surprise result, McCarthy almost defeated Johnson in the early New Hampshire Primary, forcing Johnson to withdraw from the race. Thereafter McCarthy's main rival was Robert Kennedy until he was assassinated after winning the California primary. McCarthy's campaign then fell away and the Democratic nomination was eventually secured by Vice President Hubert Humphrey. McCarthy was again a Presidential candidate in 1972 and 1976, the latter as an independent. - 1967-11-30 Senenator Eugene McCarthy annouces he will run for the US presidency on anti Vietnam war platform - 1968-05-28 Senator Eugene McCarthy wins Democrate primary in Oregon
<urn:uuid:3fc8d929-ea91-451c-8e8c-61782161f8ee>
CC-MAIN-2017-04
http://www.onthisday.com/people/eugene-mccarthy
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00088-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964712
216
2.8125
3
Avoid Pain from Backpack Use Back pain is pervasive among American adults, but a new and disturbing trend is emerging. Young children are suffering from back pain much earlier than previous generations, and the use of overweight backpacks is a contributing factor, according to the American Chiropractic Association (ACA). In fact, the U.S. Consumer Product Safety Commission reports that backpack-related injuries sent more than 7,000 people to the emergency room in 2001 alone. "In my own practice, I have noticed a marked increase in the number of young children who are complaining about back, neck and shoulder pain," said Dr. Scott Bautch, of the ACA's Council on Occupational Health. "The first question I ask these patients is, 'Do you carry a backpack to school?' Almost always, the answer is 'yes.'" This new back pain trend among youngsters isn't surprising when you consider the disproportionate amounts of weight they carry in their backpacks - often slung over just one shoulder. According to Dr. Bautch, a recent study conducted in Italy found that the average child carries a backpack that would be the equivalent of a 39-pound burden for the average adult man, or a 29-pound load for the average adult woman. Of those children in the study who carried heavy backpacks to school, 60 percent had experienced back pain as a result. Dr. Bautch also reports that preliminary results of studies being conducted in France show that the longer a child wears a backpack, the longer it takes for a curvature or deformity of the spine to correct itself. "The question that needs to be addressed next is, 'does it ever return to normal?'" The results of these types of studies are especially important as more and more school districts - many of them in urban areas - remove lockers from the premises, forcing students to carry their books with them all day long. The problem has become so widespread, that the California State Assembly recently passed legislation that would force school districts to develop ways of reducing the weight of students' backpacks. Similar legislation is being considered in New Jersey as well. The ACA suggests limiting the backpack's weight to no more than 10 percent of the child's body weight and urging the use of ergonomically correct backpacks. What Can You Do? The ACA offers the following tips to help prevent the needless pain that backpack misuse could cause the students in your household. • Make sure your child's backpack weighs no more than 10 percent of his or her body weight. A heavier backpack will cause your child to bend forward to support the weight on the back, rather than the shoulders. • The backpack should never hang more than four inches below the waistline. A backpack that hangs too low increases the weight on the shoulders, causing your child to lean forward when walking. • A backpack with individualized compartments helps in positioning the contents most effectively. • Make sure that pointy or bulky objects are packed away from the area that will rest on your child's back. • Bigger is not necessarily better. The more room there is in a backpack, the more your child will carry-and the heavier the backpack will be. • Urge your child to wear both shoulder straps. Lugging the backpack around by one strap can cause the disproportionate shift of weight to one side, leading to neck and muscle spasms, as well as low-back pain. • Wide, padded straps are very important. Nonpadded straps are uncomfortable, and can dig into your child's shoulders. • The shoulder straps should be adjustable so the backpack to fit to your child's body. Straps that are too loose can cause the backpack to dangle, causing spinal misalignment and pain. • If the backpack is still too heavy, talk to your child's teacher. Ask if your child could leave the heaviest books at school, and bring home only lighter hand-out materials or workbooks. Or encourage your local school district to purchase textbooks on CD-Rom. • Although the use of rollerpacks - or backpacks on wheels - has become popular in recent years, the ACA is now recommending that they be used cautiously and on a limited basis by only those students who are not physically able to carry a backpack. Some school districts have begun banning the use of rollerpacks because they clutter hallways, resulting in dangerous trips and falls. Chiropractic Care Can Help If you or your child experiences any pain or discomfort resulting from backpack use, call your doctor of chiropractic. Doctors of chiropractic are licensed and trained to diagnose and treat patients of all ages and will use a gentler type of treatment for children. In addition, doctors of chiropractic can also prescribe exercises designed to help children develop strong muscles, along with instruction in good nutrition, posture and sleeping habits.
<urn:uuid:5d236abb-8c7d-44c3-981e-bff0d8cd1c2c>
CC-MAIN-2021-31
https://www.spineandbodyworks.com/chiropractic/chiropractic-for-parents-and-children/backpacks.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152236.64/warc/CC-MAIN-20210727041254-20210727071254-00179.warc.gz
en
0.95149
1,002
2.625
3
Wastages such as grated coconut meat, spent tea and used sugarcane had contributed negative impacts to the environment. Vermicomposting method is fully utilized to manage the wastes towards a more sustainable approach. The worms that are used in the vermicomposting are Eisenia foetida and Eudrillus euginae. This research shows that the vermicompost of wastages has voltage of electrical energy and is able to light up the Light-Emitting Diode (LED) device. Based on the experiment, the use of replicated and double compartments of the component will produce double of voltage. Hence, for conclusion, this harmless and low cost technology of vermicompost can act as a dry cell in order to reduce the usage of hazardous chemicals that can contaminate the environment.
<urn:uuid:ab32f372-2d3b-43d0-a4a0-967d116020cf>
CC-MAIN-2018-09
http://internationalscienceindex.org/search?q=vermiconpose
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814787.54/warc/CC-MAIN-20180223134825-20180223154825-00041.warc.gz
en
0.942312
167
3.59375
4
Victorians are great recyclers, but we can do better by using less, wasting less and recycling more. Making the effort to recycle the right items through the right channels will help boost our resource recovery rate and achieve more for the environment. Benefits of recycling - Protect natural habitats Recycling reduces the amount of raw materials such as oil and iron ore being extracted from the environment. Making products and packaging from recycled materials uses less of these raw materials, as well as natural resources like wood and fresh water. - Reduce air and water pollution The extraction, refinement and processing of raw materials generates air and water pollution. Recycling minimises these processes and therefore, pollution. - Save energy Recycling reduces energy expenditure that results from the extraction, refinement, transportation and processing of raw materials into products. It also reduces greenhouse gas emissions. - Reduce landfill Recycling decreases the amount of rubbish sent to landfill and reduces the need for new waste disposal facilities. - Help communities and the economy Encouraging innovation and creating jobs in the recycling industry, supports our communities and our country's economy. Savings generated by recycling Recycling as much of your household waste as possible will help save precious resources. Each year kerbside recycling in Victoria: - Saves over 11,000 megalitres of water – that's enough water to fill more than 4,500 Olympic-sized swimming pools - Prevents 386,000 tonnes of greenhouse gases being emitted into the atmosphere – this is equivalent to taking more than 64,000 cars off the road for one year - Recycling just six aluminium cans you can save enough energy to offset the carbon emissions from a 10km journey in an average-size car, a 17km bus ride or 25km train trip - Every tonne of steel recycled saves 1,131kg of iron ore, 633kg of coal and 54kg of limestone - Recycling one glass jar saves enough energy to power a 100-watt light bulb for four hours, or a fluorescent bulb for 20 hours - Recycling one tonne of paper saves three cubic metres of landfill space - Recycling one plastic drink bottle saves enough energy to power a computer for 25 minutes. Why recycle right? You might be surprised by how much you can recycle, but a little contamination with the wrong items and the whole lot could end up in landfill. Take the time to remind yourself what can and can’t be recycled.
<urn:uuid:c7414a37-69c2-4f01-9d0d-f4125be5eb5b>
CC-MAIN-2019-04
https://www.sustainability.vic.gov.au/You-and-your-home/Waste-and-recycling/Recycling/Why-recycle
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659677.17/warc/CC-MAIN-20190118025529-20190118051529-00144.warc.gz
en
0.907859
516
3.4375
3
There was a time when school age kids, 6 years old to 12 years old would have no problem getting in at least an hour of exercise and free play a day. Those were the days when the school day included morning and afternoon recesses and time after lunch to burn off some steam outside – running, jumping, skipping, playing chase, jumping rope, swinging, and climbing the jungle gym. But along with the need to pack more academics into the school day and the elimination of physical education programs from many elementary school curricula, the time kids had to spend being active while in school began to shrink. Fortunately, programs like Move to Learn and the NFL’s Play 60 campaign are bringing physical activity back to our kids’ school days in Mississippi, but for most kids the aggregate amount of time spent getting moderate to vigorous exercise is still below what is recommended. Kids need physical activity to build strength, coordination and confidence. It is also important to establishing the habits of a healthy lifestyle and preventing childhood obesity. According to a recent article in the American Journal of Managed Care, an estimated 41.8 percent of school-aged youth in Mississippi are overweight or obese. According to KidsHealth from the Nemours Center for Children’s Health Media, children 6 – 12 years old should get 1 hour or more of moderate to vigorous physical activity on most or all days. They should participate in several bouts of physical activity of 15 minutes or more each day and avoid periods of inactivity of 2 hours or more unless sleeping. Well-Being spoke to Kira Berch, MS, ATC, LAT, of Mississippi Sports Medicine as an athletic trainer, about the importance of the right kinds of physical activity for a growing child. “Physical activity that involves running and jumping makes muscles stronger and more pliable, and helps build stronger bones,” explains Ms. Berch. “As the child begins to add more and more stress to his or her body, in a steady and progressive style, he or she is less likely to experience issues like muscle stiffness, atrophy and fatigue and suffer bone injuries such as stress fractures.” “Exercising a minimum of 60 minutes a day can also improve a child’s reflexes and coordination,” continues Berch. “As a child grows they must learn how to be in control of their bodies through new perceptions of gained heights. Many children develop drastically between 6 and 12 years old – experiencing a steadily changing body that comes with ever-changing shoe sizes, different body masses, and longer legs and arms. Without consistent physical activity a child can be in danger of injury, based on their changing perspectives of the world around them. They are more likely to trip and fall easily, leading to muscle/ skeletal injuries in what one might called an ‘awkward stage.’” Elementary school-age kids should have the opportunity to participate in a variety of activities, sports and games that fit their personality, ability, age and interests. Many parents and kids automatically think of organized sports when it comes to fitness activities. Although there are great advantages to signing a child up for soccer, baseball, basketball and other team sports, practice time and games once or twice a week alone are not enough to reach the recommended activity goals. However, organized sports have other benefits, according to Ms. Berch. “We find that the more a child participates in multiple sports and activities, the better they can master basic skills. Studies show that some of the most outstanding collegiate and professional athletes spent many years of their youth playing a wide variety of games and team sports which allowed them to develop an extensive range of skills and abilities, while learning to master the art of sportsmanship and the grace to handle social dilemmas like winning and losing.” Kira Berch, MS, ATC, LAT, of Mississippi Sports Medicine, received a Bachelor of Science degree in athletic training from Southeastern Louisiana University, followed by a Master’s degree from Mississippi State University in health promotion. She serves Florence High School as MSM’s athletic trainer, as a Sports Medicine and Health Science teacher, and student advisor for HOSA-Future Health Professionals.
<urn:uuid:a5543a3c-f1e0-40eb-8e25-a76a8d232c35>
CC-MAIN-2017-51
http://www.wellbeingmag.com/2017/11/fit-for-life-kids-6-12/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515165.6/warc/CC-MAIN-20171212041010-20171212061010-00402.warc.gz
en
0.962921
860
3.046875
3
As many of our regular readers may have gleaned from past posts, we here at Consumerist HQ are pretty big fans of cheese. Grill it in a sandwich, melt it atop a pile of hamburgers, sleep with it under a pillow — basically any way you want to enjoy any kind of cheese is A-OK with us. But scientists using microbes from skin to make cheese might’ve passed a line we cannot step across. We’re all in favor of DIY dairy, but this project from a scientist at the University of California, Los Angeles and an artist is a bit much: Using donated microbes (including some from The Omnivore’s Dilemma author Michael Pollan), the microbiologist created cheese, reports The Salt blog. The usual cheese process takes milk and spoils it with Lactobacillus bacteria. The bacteria turn the milk sugars into acid. It then clumps or curdles the milk and the chunks are separated out and aged with yeast to make cheese. You can get yeast and Lactobacillus anywhere, so why not snag some from our own bodies and use them to curdle milk? My stomach feels curdled already just at the thought, but let’s move on. The microbiologist swabbed her mouth and skin, Pollan’s belly button, her partner’s tears and another scientist’s feet, then grew the bacteria and yeast in a lab. Once she had enough, she just added fresh milk and produced cheese. The point isn’t to gross people out, says the microbiologist in charge, it’s just to challenge people to think about how we react to odors and how that might color our impression of cheese and food. “The idea was to recognize, how do we get grossed out? Then to think about it and move beyond that initial idea of disgust,” she explains. “Why are we more uncomfortable with bacteria on the body than we are with bacteria in cheese?” If you want to check out the cheese, it’s currently on display at the Science Gallery, at Trinity College in Dublin. You can’t eat the displays, but you’re welcome to take a big whiff. “People were really nervous and uncomfortable and kind of making these grossed out faces,” the scientist says of her exhibit. “Then they smell the cheese, and they’ll realize that it just smells like a normal cheese.” I’m starting to look at this in an entirely different light. We are all basically walking and talking cheese factories. I had no idea.
<urn:uuid:8d58601d-6f7e-47d5-ba26-d0078fc62dde>
CC-MAIN-2017-17
https://consumerist.com/2013/11/25/cheese-made-from-skin-microbes-might-be-the-only-cheese-id-ever-turn-down/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00449-ip-10-145-167-34.ec2.internal.warc.gz
en
0.957125
556
3.390625
3
Justin Smith Morrill, in the text of the 1862 bill that created land-grant colleges and changed the face of education worldwide, wrote that each of these schools must have “a sure and perpetual foundation, accessible to all.” In 2012, public institutions across the country held scholarly symposia, forums, convocations, celebrations, and more to honor the sesquicentennial anniversary of the Morrill Act. Preserving, analyzing and drawing lessons from the history of the Morrill Act and of public universities across the nation is of vital importance. To meet this need and as a continued celebration of the Morrill Act it is proposed that the land-grant university community meet Morrill’s implicit expectation to build a central repository and outreach program for research on the history of the land-grant college movement. In 2011-2012, several universities, colleges and professional societies across the United States held celebrations to mark the sesquicentennial of the Morrill Land-Grant College Act passed by Congress and signed into law by President Abraham Lincoln. From small campus meetings to large affairs attracting scholars from across the globe, these conferences not only produced a flurry of remarkable new research into seemingly every aspect of land grant history; they sparked a new interest in this field itself. The present effort to create a central repository for land-grant history grows from this new enthusiasm, but it does so knowing that things disappear. It is an effort to capture this and earlier scholarship and to sustain this research momentum. In order to be successful, this repository should be housed at one institution committed to building and sustaining the effort, and Mississippi State University is willing to undertake that role. However, this cannot be viewed as a Mississippi State project but rather must be a collaborative effort of the land grant activities, recognizing the substantial work of many other individuals and institutions. A critical part of making this a project of the whole community is to establish a national panel of experts from across the country to help drive the repository’s work. This national repository will serve as a means to collect and disseminate historical information about land-grant colleges. It will contain both primary and secondary sources—everything from Morrill’s own writings to the laboratory notebooks of an A & M scientist, from academic articles about state funding to a dissertation about the history of soil science research—some of which will be centrally housed on the repository and some of which will be linked from the archive to external sites. The repository will be more than simply a collection. Rather, it will be living, breathing research endeavor overseen by historians sensitive to the issues land grant schools and their faculty, staff, and students, have faced over the past century and a half. This repository will be an ever-changing collection of documents, bibliographies, lists of paper sessions and conferences, etc., all housed at one central website. It is essential to identify resources from all land-grant institutions that be linked from this repository. We believe a digital hub like this will have many audiences. The most obvious is academic historians who will indeed find immediate uses in the collection. A one-stop shop for both primary sources and recent interpretations will have broad influence on the work being done. But this project will also serve as the best place for scholars to take the temperature of the field, to see who is doing what research where and based on what materials. Beyond historians, however, the repository will be a go-to site for public policymakers, lobbyists, college and university administrators, the media and others looking for either historical precedent, funding information, or even to locate a specific scholar who can aid their cause in some way. In addition to collecting and disseminating primary and secondary sources on land grant history, this virtual archive will strive to guide further research. It will plan and sponsor sessions at academic conferences, to guarantee that land grant history is part of the larger scholarly debate; it will also promote land grant history-related conferences, be an organizer of meetings around the anniversaries of the Smith Lever Act, Hatch Act, the 1890 Morrill Act, and other landmark historical events. This effort is, then, not only about keeping this research safe and in a central place, but also about inspiring and leading a new generation of land-grant research. The proposed center will be based in the history department at Mississippi State University where much of the MSU work is now taking place. As home to a Ph.D. program with existing emphases in agricultural history and the history of science and technology, MSU History has the faculty, staff, digital humanities librarians, administrative support and students to create and house the archive and execute the outreach programming components. The department also hosts the Agricultural History Society, an international scholarly body founded in 1919. Alan Marcus, an expert in land-grant history, will serve as director. A national advisory board composed of scholars representing institutions throughout America will regularly discuss the programming and development of the virtual archive and meet at least yearly. The archive itself will be housed on MSU servers and use campus disk space to house the documents and other materials and be maintained by the Information Technology Services division. As suggested above, far beyond Mississippi State, there will need to be a sustained relationship with scholars working on these issues. Only with the cooperation and input from myriad sources across the nation will this repository be successful. Combining the talent and resources of the land-grant community will ensure the long-term success. For at least the first few years of its operation, archive construction will be the order of business. Graduate students in history will collect material and links. Digital humanities librarians will help organize it, ensuring that search engines and other finding aids reflect state of the art understandings. MSU web designers will construct the main site and repository initially, but the upkeep and management of this central clearinghouse will fall to history faculty and staff. Links need to be checked, maintained and updated as new information goes on line. A schedule developed for that purpose is a must. Graduate students will also oversee the archive’s listserv, Facebook page, Twitter account, and other social media outlets as they rise and fall to guarantee the effort’s prominence and accessibility. This project must be a project of the whole community with a strong national board and MSU proposes to host the project. This project has the opportunity to protect, for the foreseeable future, the histories created recently around the 150th anniversary of the Morrill Act and to build on them. It can assure that historical and other scholarship on land-grant universities flourishes in the future. For this project to reach its full potential, it is crucial that the archive not simply be a vault of information, but that it be a force to reach out to scholars, administrators, and the interested public, to put land grant history in front of people rather than passively waiting for virtual visitors to appear. This is a fluid project, not a static snapshot of land grant universities. This virtual archive and outreach center will ensure that for historical research, as Justin Morrill intended for the land grant institutions themselves, there will be “A sure and perpetual foundation, accessible to all…”
<urn:uuid:4b7bf0a7-2c61-4f89-bdd5-ad349b112fa4>
CC-MAIN-2015-48
http://lghp.msstate.edu/
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398444974.3/warc/CC-MAIN-20151124205404-00001-ip-10-71-132-137.ec2.internal.warc.gz
en
0.938691
1,466
2.65625
3
OHSA enhancing services for reporting occupational diseases The Occupational Health and Safety Authority (OHSA) is in the process of enhancing its services for the reporting and recognition of occupational diseases, through the setting up of a centre to serve as a focal point where employees who suspect an occupational disease can self-refer or be referred by employers or medical doctors. It would also make it easier to coordinate and communicate with employers and health and safety personnel on controlling exposure to the hazards causing the occupational diseases. “When a worker is exposed to hazards at work which are not controlled, they can lead to the development of occupational diseases. Occupational diseases can develop within a short period of time (such as dermatitis and musculoskeletal conditions) or can take several years to develop (such as cancers). Recognition of occupational diseases is thus a very important tool for OHSA in targeting those industries/occupations where there is inadequate control of hazards,” said Dr Mark Gauci, the Chief Executive Officer of OHSA. Several initiatives have taken place over the years to encourage medical practitioners to report occupational diseases such as the setting up of an online reporting system but there has been very little participation in these initiatives. These stem mainly from the possible fear on the part of employees that they might lose their jobs. “This should not be the case. We would like to encourage patients, doctors as well as employers to report occupational diseases to OHSA. It should be emphasized that occupational diseases are indicators of lack of control of hazards and therefore reporting of such occupational diseases should lead to improvement of health and safety standards and benefit all. Our appeal goes also to medical professionals to take an ethical approach to the subject and thus inform us, not only of confirmed cases of occupational diseases, but also when there is only the suspicion that a medical condition is related to work,” Dr Gauci said.
<urn:uuid:6f7b8d53-b4b2-4454-8352-541207be49f2>
CC-MAIN-2017-22
http://www.pressreader.com/malta/malta-independent/20161020/281792808558261
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609610.87/warc/CC-MAIN-20170528082102-20170528102102-00006.warc.gz
en
0.970461
382
2.515625
3
An acclaimed Métis storyteller recounts a Lenape pourquoi tale explaining the crow's shiny black color and croaking voice as the result of bringing the gift of fire. Bouchard (Aboriginal Carol, 2008, etc.) begins by seating his audience in a circle on the earth, or at least the floor, and preparing them for quiet listening. In the leisurely style of his Lenape grandmother, the author describes how cold and uncomfortable the world was “[b]efore two-leggeds walked on Mother Earth.” Meeting in a Great Council, various animals offer to seek help from the Creator. Little Crow is chosen for her flying ability, her colorful plumage and her beautiful song. Returning from the Sky World with the gift of fire, she flies too close to the sun, charring her feathers and losing her voice. For her sacrifice, the Creator makes her now-black feathers shine with rainbow colors. The English text and Jones’ Ojibwe translation are set around lifelike animal portraits painted on traditional drums, echoing the circle theme established at the beginning. On the included CD, Bouchard and Jones read the text in English, Ojibwe and French. Their unhurried voices are accompanied by music by Manantial, a Native South American musical group. This beautiful new edition of a familiar legend will be welcomed both for its pictures and its telling. (Folk tale. 7-12)
<urn:uuid:2fe37b04-ec56-4b74-9d89-916475b77c17>
CC-MAIN-2015-32
https://www.kirkusreviews.com/book-reviews/david-bouchard/rainbow-crow-nagweyaabi-aan/print/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986615.83/warc/CC-MAIN-20150728002306-00310-ip-10-236-191-2.ec2.internal.warc.gz
en
0.941142
303
2.6875
3
5 Ways to Celebrate Women's Equality Day - Host an event to celebrate the economic, political and social achievements of women past, present and future. Order flowers to brighten up the venue. - Women can honor the day by registering to vote and participating! - Join an organization that takes a stand on important issues promoting equity for women and girls through advocacy, education, philanthropy, and research. Be sure to mentor young men and women and encourage them to get involved too. - Avoid gender stereotyping - talk to boys and girls about stereotyping in video games, music, movies, comics, and TV programs. Counter the many stereotypical gender portrayals kids are exposed to with media portrayals of sensitive men and strong women. Point out realistic portrayals of men and women. - Treat men and women as equals to ensure that everyone has the same opportunities, rights and obligations in all areas of life.
<urn:uuid:d95e1d97-c269-4546-9f12-1040e97f4e8d>
CC-MAIN-2021-10
https://unionplus.teleflora.com/womens-equality-day-flowers?catID=cat440220
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350942.3/warc/CC-MAIN-20210225095141-20210225125141-00244.warc.gz
en
0.951896
186
3.15625
3
Parsippany, NJ (PRWEB) February 13, 2014 According to the National Institute of Mental Health, six million American adults suffer sudden and repeated panic attacks in any given year, a condition known as panic disorder. Panic attacks generally first occur in late adolescence or early adulthood but not everyone who has a panic attack develops panic disorder. Some have just one attack and never have another. “We don't know precisely why some people develop panic disorder,” says clinical psychologist and anxiety specialist Dr. Francine Rosenberg of Morris Psychological Group. “But we know that women are more than twice as likely as men to suffer from it. And we know that untreated panic disorder can become disabling. As people try to avoid places and activities that they fear might trigger an attack, their lives become more and more restricted. Panic disorder is also often associated with other serious conditions, reinforcing the importance of treatment to improve health and quality of life.” What are panic attacks and panic disorder? Panic attacks occur suddenly and often without an obvious trigger. Symptoms include sweating, chest pain, fast heart rate or palpitations, difficulty breathing or a feeling of being smothered, dizziness or faintness, and an intense feeling of dread. While the typical panic attack lasts about ten minutes, symptoms may last longer and it is not uncommon for a panic attack to be mistaken for a heart attack. When panic attacks occur repeatedly, a person is said to have panic disorder. “Panic disorder is a type of anxiety disorder,” says Dr. Rosenberg. “Patients usually suffer from intense anxiety about having an attack and avoid situations in which they might occur. In fact, one-third of people with panic disorder also have agoraphobia – fear of being in places where escape might be difficult – and find their lives becoming more and more constrained as they avoid public places, crowds and travel or even leaving the house.” Panic disorder is often accompanied by other psychological problems, most notably depression and drug or alcohol abuse. And many medical professionals believe that anxiety disorders contribute to the development of heart disease by putting extra strain on the heart. “Panic disorder has serious health implications,” says Dr. Rosenberg. “That's why treatment is important before the condition gets worse. Fortunately, panic disorder responds well to treatment, especially if caught early.” Tips for Coping with panic disorder Panic disorder is generally treated with medication or psychotherapy or a combination of the two. The most commonly used medications are antidepressants such as selective serotonin reuptake inhibitors (SSRIs) and benzodiazepines. The therapy that is most effective is cognitive behavior therapy, which helps patients change the thought patterns that cause panic. “As part of the therapeutic process, we also recommend lifestyle changes and coping strategies that will help patients relax and manage their stress and anxiety,” says Dr. Rosenberg. For example: “A single attack is not necessarily indicative of panic disorder and not all anxiety is harmful,” says Dr. Rosenberg. “Occasional anxiety is a natural reaction to life's stresses and strains. But when it begins to take on a life of its own and potential disaster lurks around every corner, it is important to get help early, before anxiety overwhelms your life and disrupts work and personal relationships. Medication, psychotherapy, stress reduction and lifestyle changes can help you manage the situations that trigger panic.” Francine Rosenberg, PsyD., practices cognitive-behavior therapy, specializing in treatment of obsessive-compulsive disorder as well as stress, depression, anxiety disorders, behavioral disorders and relationship problems.
<urn:uuid:32b59371-9717-425d-93f6-ed666d15380a>
CC-MAIN-2014-10
http://www.prweb.com/releases/2014/02/prweb11580337.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654667/warc/CC-MAIN-20140305060734-00023-ip-10-183-142-35.ec2.internal.warc.gz
en
0.955845
751
3.359375
3
I am so happy about this letter sounds alphabet board game. It turned out to be a very effective way to teach letter sounds while developing counting skills and more. It is one of our favorite alphabet activities! I decided to make this game board because Evan loves to play board games; especially ones that involve rolling dice – like this fun Roll and Dot the Letter Alphabet Activity, this Roll a Color Alphabet Game and this Rainbow Hop Letter Sounds Game. This game is so effective because it requires children to practice letter sounds over and over again while keeping it fun and playful. Related read: Alphabet Games for Preschool and Kindergarten Letter Sounds Alphabet Game Evan really had no clue he was committing those letter sounds to memory. He just had a blast playing the game! He also worked on counting at the same time. I love it when I can combine several subjects or skills into one activity! Update: We’ve now played this many, many times and it is still a favorite! My kids just love it and I use it to review a variety of skills. I am thinking of new ways to use it all the time. Setting Up the Alphabet Board Game Affiliate links below. Alphabet Game Board – Black and white version at end of post 1. Print out the game board. 2. Write a letter in each dot on the page. I chose to focus on the letters A-E because those are the ones we’ve been reviewing over the last 2 weeks. This is totally up to you. If your child is just beginning to learn letter sounds, you may want to only include 2 or 3 letters on the game board. If your child knows most of the letters sounds you could do even more than I did. However, I wouldn’t do too many at once or else your child might not land on each letter enough times to really review or memorize the letter sounds. I wrote them all in uppercase this time. I plan to play this game with him again tomorrow and we will do all lowercase letters. After that we will do lowercase and uppercase at the same time. Playing the Letter Sounds Alphabet Board Game 1. Both players will put their game piece on the yellow star. 2. The first player will roll the die and then move their game piece that many spaces. When they land on the space then must then identify the letter and say the sound that letter makes. You may have to help your child if they are just learning the letter sounds. I don’t penalize him for not knowing the sound. If you use this with older kids who feel like there should be some penalty for not knowing the letter sound, you could just have them move back one or two spaces each time they don’t know the sound. 3. The next player goes through the same process described in step 2. 4. The first player to get the end of the game board, wins! The game lasts a perfect amount of time for young kids. Sometimes Evan loses interest before a game is over, but not with this one. I also think it would be an excellent addition to school literacy centers! Click here >>>> for the black and white game board or click the Download button below for the Rainbow dot game board! Get my Alphabet Printable Pack Are you looking for alphabet printables that are both fun and effective for kids? Then you have come to the right place! I wanted to develop a fun set of hands-on printables that would be great for pre-k and kindergarten students to use to learn the alphabet. And they also had to be activities that would be simple and easy for teachers and parents to set up and use. These alphabet printables and activities are perfect for preschool and kindergarten students. They cover letter recognition, letter sounds and more! With over 300 pages of printable alphabet activities, this printable pack is sure to keep the kids engaged! They would be great to use in alphabet or literacy centers in the classroom as well as at home with parents. Save time prepping and planning fun ways to teach the alphabet. These alphabet printables and activities are going to make it so much easier on you! If you buy this pack, you will have a bunch of pre-planned alphabet activities and games for your kids or students to enjoy! This will require little prep from you. Just print, cut and laminate (if you would like). I even made many of the printables in a way that would limit the amount of cuts you need to make. All in an effort to make this as quick and easy as possible for you! I hope you and your kids enjoy it! Head over to my Alphabet Activities page for even more fun, hands-on letter learning ideas! Here are some more alphabet games for preschoolers! Letter and Sounds Game – another version of this game that I shared on The Measured Mom.
<urn:uuid:06eb11b4-6f45-422b-939a-091885d28c5d>
CC-MAIN-2018-17
https://funlearningforkids.com/letter-sounds-alphabet-game
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948738.65/warc/CC-MAIN-20180427002118-20180427022118-00343.warc.gz
en
0.955141
1,014
2.984375
3
Fourth Grade Writing Standards Fourth Grade Writing Standards Writing standards for fourth grade define the knowledge and skills needed for writing proficiency at this grade level. By understanding 4th grade writing standards, parents can be more effective in helping their children meet grade level expectations. What is 4th Grade Writing? In grade 4, students spend significant blocks of time engaged in writing independently. Writing with a greater understanding of the writing process, fourth-graders are able to select a focus, an organizational structure, and a point of view based upon purpose, audience, and length of assignment. Their writing takes on style and voice. Writing is assigned in all subject areas, and by the end of fourth grade, students should be able to write clearly and effectively including using complete paragraphs, transitional sentences, and a theme throughout the composition. Fourth grade students learn to write a five-paragraph essay and continue to expand upon their knowledge of grammar, spelling, and mechanics, as well as how to evaluate writing and conduct research. The following writing standards represent what states* typically specify as fourth grade benchmarks in writing proficiency: Grade 4: Writing Strategies Fourth grade writing standards focus on the writing process as the primary tool to help children become independent writers. In Grade 4, students are taught to use each phase of the process as follows: - Prewriting: In Grade 4, students generate ideas for writing by using prewriting techniques, such as brainstorming, graphic organizers, notes, and logs. - Drafting: In fourth grade, students develop drafts by categorizing ideas, organizing them into paragraphs, and blending paragraphs within larger units of text. In the first paragraph, students establish a central idea with a topic sentence and spark interest through the use of quotations, questions, or descriptions. Subsequent paragraphs provide supporting detail that shows an understanding of facts and/or opinions. Compositions conclude with a paragraph that summarizes the points. - Revising: Students revise selected drafts by adding, elaborating, deleting, combining, and rearranging text. Students aim to improve coherence, progression, logical support of ideas, and voice (formal or informal). Students revise with the goal of creating precision and interest by expressing ideas vividly through language techniques (e.g., imagery, simile, metaphor, sensory language). - Editing: Students edit their writing based on their knowledge of grammar and usage, spelling, punctuation, and other features of polished writing, such as varied sentence structure and appropriate word choice. Students also proofread using reference materials and other resources. - Publishing: Students refine selected pieces frequently to “publish” for intended audiences. Correct spacing and design are used to enhance the appearance of the document and graphics are added where appropriate. Use of technology: Fourth grade students use available technology to support aspects of creating, revising, editing, and publishing texts in various forms. Students demonstrate basic keyboarding skills and familiarity with computer terminology. Grade 4: Writing Purposes In Grade 4, students write to express, discover, record, develop, reflect on ideas, and to problem solve. Fourth grade students are able to select and use different forms of writing for specific purposes such as to inform, persuade, or entertain. Specifically, fourth grade writing standards stipulate that students write in the following forms: - Narrative: Students write narratives based on real or imagined ideas, events, or observations that include characters, setting, plot, sensory details, a logical sequence of events, and a context to enable the reader to imagine the world of the event or experience. - Informational/Expository: Students write to inform, such as to explain, describe, and report. Writing tasks may include summaries, procedures, recipes, instructions, how-to manuals, observations, notes, lists, charts, map labels, and directions - Persuasive: Students write to influence, such as to persuade, argue, and request. Grade 4 persuasive essays should establish a controlling idea, develop supporting arguments, provide detailed evidence, and include persuasive techniques (e.g., word choice, repetition, emotional appeal). - Personal Communications: In fourth grade, students write friendly letters, thank-you notes, formal letters, messages, and invitations that have a clearly stated purpose and that include the date, proper salutation, body, closing and signature. - Creative: Students write to entertain, such as to compose humorous poems, short stories, skits, song lyrics) that employ figurative language (e.g., simile, metaphor, onomatopoeia, personification), rhythm, dialogue, characterization, plot, and/or appropriate format. - Responses to Literature: Fourth grade students demonstrate an understanding of the literary work and support judgments through references to both the text and prior knowledge. In addition, fourth graders work to exhibit an identifiable voice in personal narratives and in stories. They choose the appropriate form for their own purpose for writing, including journals, letters, reviews, poems, and narratives. Grade 4: Writing Evaluation Fourth grade students learn to respond constructively to others’ writing and determine if their own writing achieves its purposes. In Grade 4, students also apply criteria to evaluate writing and analyze published examples as models for writing. Writing standards recommend that each student keep and review a collection of his/her own written work to determine its strengths and weaknesses and to set goals as a writer. Grade 4: Written English Language Conventions Students in fourth grade write with more complex sentences, capitalization, and punctuation. In particular, fourth grade writing standards specify these key markers of proficiency: - Write in complete sentences, varying the types, such as compound and complex to match meanings and purposes. - Combine short, related sentences with appositives, participial phrases, adjectives, adverbs, and prepositional phrases. - Correctly employ Standard English usage, including subject-verb agreement, pronoun referents, and parts of speech. - Identify and use regular and irregular verbs, and present and past verb tenses. - Use regular and irregular plurals correctly. - Use adjectives (comparative and superlative forms) and adverbs appropriately to make writing vivid or precise. - Use prepositional phrases to elaborate written ideas. - Use conjunctions to connect ideas meaningfully. - Write with increasing accuracy when using objective case pronouns such as “Dan cooked for you and me.” - Punctuate correctly to clarify and enhance meaning, including commas in a series, commas in direct address, colons, quotation marks in dialogue, parentheses, and sentence punctuation. - Write with increasing accuracy when using apostrophes in contractions such as it’s and possessives such as Jan’s. - Use underlining, quotation marks, or italics to identify titles of documents. - Capitalize proper nouns, including titles used with someone’s name, initials, and words used as names (e.g., Uncle Jim, Mom, Dad, Jr.). - Capitalize names of magazines, newspapers, works of art, musical compositions, organizations, and the first word in quotations when appropriate. - Use spelling rules and write with accurate spelling of roots such as drink,speak, read, or happy, inflections such as those that change tense or number, suffixes such as -able or -less, and prefixes such as re- or un. - Understand spelling patterns and generalizations and write with accurate spelling of syllable constructions, including closed, open, consonant before -le, and syllable boundary patterns. - Use resources to find correct spelling and spell correctly in final drafts. - Write fluidly and legibly in cursive or manuscript as appropriate. Grade 4: Research and Inquiry In fourth grade, students select and use reference materials and resources as needed for writing, revising, and editing final drafts. Students learn how to gather information systematically and use writing as a tool for research and inquiry in the following ways: - Frame questions for research. Evaluate own research and raise new questions for further investigation - Organize prior knowledge about a topic in a variety of ways such as by producing a graphic organizer. - Use various reference materials (e.g., dictionary, thesaurus, card catalog, encyclopedia, online information) as an aid to writing. - Understand the organization of almanacs, newspapers, and periodicals and how to use organizational features of references (e.g., prefaces, appendixes). - Take notes, summarize and organize ideas gained from multiple sources in useful ways such as outlines, conceptual maps, learning logs, and timelines. - Draw from more than one source of information (e.g., guest speakers, books, and other media sources). Quote or paraphrase information sources, citing them appropriately. 4th Grade Writing Tests In many states, standardized writing assessment begins in the fourth grade. Students will be given questions about grammar and mechanics, as well as a timed writing exercise, in which they must write an essay in response to a writing prompt. Another type of question asks students to write a summary statement in response to a reading passage. In addition, fourth-graders are evaluated by their writing portfolios and classroom-based writing tests. Most state writing assessments are correlated to state writing standards. These standards-based tests measure what students know in relation to what they’ve been taught. Educators consider standards-based tests to be the most useful as these tests show how individual students are meeting grade-level expectations. Teachers use the assessments to pinpoint where each student needs improvement. State departments of education often include information on writing standards and writing assessments on their websites, including sample questions. Writing Test Preparation The best writing test preparation in fourth grade is simply encouraging your child to write, raising awareness of the written word, and offering guidance on writing homework. For example, you can talk about the different purposes of writing as you encounter them, such as those of letters, recipes, grocery lists, instructions, and menus. By becoming familiar with fourth grade writing standards, parents can offer more constructive homework support. Remember, the best writing help for kids is not to correct their essays, but offer positive feedback that prompts them use the strategies of writing process to revise their own work. Time4Writing Online Writing Courses Support 4th Grade Writing Standards Time4Writing is an excellent complement to fourth grade writing curriculum. Developed by classroom teachers, Time4Writing targets the fundamentals of writing. Students build writing skills and deepen their understanding of the writing process by working on standard-based, grade-appropriate writing tasks under the individual guidance of a certified teacher. Writing on a computer inspires many students, even reluctant writers. Learn more about Time4Writing online courses for fourth grade. For more information about general learning objectives for fourth grade students including math and language arts, please visit Time4Learning.com. *K-12 writing standards are defined by each state. Time4Writing relies on a representative sampling of state writing standards, notably from Florida, Texas, and California, as well as on the standards published by nationally recognized education organizations, such as the National Council of Teachers of English and the International Reading Association.
<urn:uuid:85a10fb0-18cd-43c0-8b74-55bf7833ee99>
CC-MAIN-2014-52
http://www.time4writing.com/writing-resources/writing-standards/fourth-grade/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769581.93/warc/CC-MAIN-20141217075249-00039-ip-10-231-17-201.ec2.internal.warc.gz
en
0.92919
2,311
4.1875
4
Tourist signs – facts (and fiction) Make sure you understand what tourism signs are meant to do for tourism businesses, and what they are not. Signs are directional (not promotional) Tourist signs are primarily about visitor navigation. They form the basis for efficient traffic management and road safety. They are not a substitute for effective marketing and they are not for promotional purposes. They assist the visitor, who should already be aware of and motivated to visit your business, through marketing efforts such as brochures and advertising. They are the final link in a communication process established between the tourism operator and the consumer to reinforce precise locations and to facilitate safe, efficient and orderly travel. It is important to remember that your application for signing will be considered by the road authorities on the basis of assisting efficient traffic management and road safety, not the advertising or promotion of your business. Road signing should not be expected to compensate for a poorly located business. Choosing a suitable location that will achieve visibility and capture trade for a tourism business should be a primary consideration at the time of initial business planning. As a general principle, owners or operators of tourist attractions and services applying for tourist signs are expected to advertise their establishments, opening times, the location, accessibility by road and, where appropriate, public transport, through the tourism industry. This might include the distribution of brochures and other literature that ideally will include clear travel directions and a simple map through accredited Visitor Information Centres. Signs are a privilege (not a right) As there are thousands of businesses across the country, road authorities have to restrict signing to certain types of businesses. Tourism attractions and services, by their very nature, are eligible for signing primarily to help visitors unfamiliar with the road network to find facilities easily and safely. Authorities want to make our roads safe (they don’t limit signs to hurt tourism businesses) Signing officers take into consideration the needs of tourism businesses while upholding the basic principles of traffic management and road safety, as well as protecting the visual amenity of our roads. Make the most of your application for signing – discuss your proposal with the road authority signing officer before submitting your application. Not everyone gets a sign (criteria must be met and applications approved) To be eligible for tourist and services signing, your business must meet a set of criteria. Each signing application is carefully judged on its merits. The visual impact, road safety and traffic management needs are considered, taking into account specific local conditions and, wherever possible, the needs of the tourism industry. Effective signs – say less and don’t have to compete Too many signs, particularly at intersections, create visual pollution and can be confusing and a safety hazard for motorists. They are ineffective because motorists can absorb limited amount when travelling at high speed.
<urn:uuid:87b120c0-4b08-4320-81a2-96f7938d7b90>
CC-MAIN-2023-06
https://touristsigns.org.au/for-tourism-businesses/tourist-signs-facts-and-fiction
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00722.warc.gz
en
0.953938
573
2.546875
3
The Mach number, , is the local flow-speed, , divided by the local speed of sound, : The Mach number can be used to categorise compressible flows into different Mach number regimes. To get a more physical insight into Mach number, it is useful if it is viewed as being proportional to the ratio of Kinetic energy to the internal energy of the molecules. On surfaces, like for example on turbomachinery blades, the isentropic Mach number is often of interest. The name "Mach number" originates from the famous pioneer in compressible fluid dynamics Ernst Mach.
<urn:uuid:a63453c9-acb1-46b2-9f3e-4cd76bacbeb4>
CC-MAIN-2016-44
http://www.cfd-online.com/Wiki/Mach_number
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00437-ip-10-171-6-4.ec2.internal.warc.gz
en
0.856103
122
3.203125
3
Shots for Safety On this page: As you get older, your doctor may recommend vaccinations—shots—to help prevent certain illnesses and to keep you healthy. Talk with your doctor about which of the following shots you need, and make sure to protect yourself by keeping your vaccinations up to date. Flu—short for influenza—is a virus that can cause fever, chills, sore throat, stuffy nose, headache, and muscle aches. Flu is very serious when it gets in your lungs. Older adults are at a higher risk for developing serious complications from flu, such as pneumonia. The flu is easy to pass from person to person. The virus also changes over time, which means you can get it over and over again. When the virus changes, annual flu shot ingredients change. Also, the protection you get from a flu shot lessens with time, especially in older people. That's why most people (age 6 months and older) should get the flu shot each year. Ideally, you should get your shot between September and November. Then, you may be protected when the flu season starts. It takes at least 2 weeks for your shot to start working. There are special flu shots designed specifically for people age 65 and older. Medicare will pay for the shot, and so will many private health insurance plans. You can get a flu shot at your doctor's office or local health department, as well as some grocery and drug stores. The vaccine is the same wherever you receive it. Pneumococcal disease is a serious infection that spreads from person to person by air. It often causes pneumonia in the lungs, and it can affect other parts of the body. According to the Centers for Disease Control and Prevention (CDC), part of the federal government, adults who are 65 and older should have two pneumococcal vaccinations to help prevent the disease. You can get either of the two pneumococcal vaccines (but not both) when you get the influenza (flu) vaccine. Talk with your healthcare professional to find out when you should come back for the other pneumococcal vaccine. Tetanus, Diphtheria, and Pertussis (Whooping Cough) Diphtheria is also caused by bacteria. It is a serious illness that can affect the tonsils, throat, nose, or skin. It can spread from person to person. Pertussis, also known as whooping cough, is caused by bacteria. It is a serious illness that causes uncontrollable, violent coughing fits that often make it hard to breathe. It can spread from person to person. Tetanus, diphtheria, and pertussis can lead to death. Getting the shot is the best way to keep from getting tetanus and diphtheria. Most people get their first shots as children. The CDC says that every adult should get the Tdap (tetanus, diphtheria, and pertussis) vaccine once if they did not receive it as a teen (first recommended in 2005) to protect against pertussis (whooping cough), and then a Td (tetanus, diphtheria) booster shot every 10 years to keep you protected. Ask your doctor if and when you need a booster shot. Shingles is caused by the same virus as chickenpox. If you had chickenpox, the virus is still in your body. The virus could become active again and cause shingles. The shingles vaccine is safe and easy, and it may keep you from getting shingles and ongoing pain called post-herpetic neuralgia, or PHN. Healthy adults age 50 and older should get vaccinated with a shingles vaccine called Shingrix, which is given in two doses. Zostavax, a previous shingles vaccine, is no longer available in the United States. You should try to get the second dose of Shingrix between two and six months after you get the first dose. If your doctor or pharmacist is out of Shingrix, you can use the Vaccine Finder to help find other providers who have Shingrix. You can also contact pharmacies in your area and ask to be put on a waiting list for Shingrix. If it's been more than six months since you got the first dose, you should get the second dose as soon as possible. You don't need to get a first dose again. You should get a Shingrix shot even if you have already had shingles, received Zostavax, or don’t remember having had chickenpox. However, you should not get a vaccine if you have a fever or illness, have a weakened immune system, or have had an allergic reaction to Shingrix. Check with your doctor if you are not sure what to do. You can get the shingles vaccine at your doctor’s office and at some pharmacies. All Medicare Part D plans and most private health insurance plans will cover the cost. Measles, Mumps, and Rubella The vaccine given to children to prevent measles, mumps, and rubella has made these diseases rare. If you don't know if you've had the diseases or the shot, you can still get the vaccine. Side Effects of Shots Common side effects for all these shots are mild and include pain, swelling, or redness where the shot was given. Before getting any vaccine, make sure it's safe for you. Talk with your doctor about your health history, including past illnesses and treatments, as well as any allergies. It's a good idea to keep your own shot record, listing the types and dates of your shots, along with any side effects or problems. Shots for Travel Check with your doctor or local health department about shots you will need if traveling to other countries. Sometimes, a series of shots is needed. It's best to get them at least 4 to 6 weeks before you travel to give you enough time to build up immunity and get the best protection from vaccines that may require multiple doses. For more information, visit the CDC website or call its information line for international travelers at 1-800-232-4636. For More Information About Shots and Vaccines This content is provided by the NIH National Institute on Aging (NIA). NIA scientists and other experts review this content to ensure it is accurate and up to date. April 10, 2020
<urn:uuid:1935f4ab-849e-4094-9204-efcf77d73a50>
CC-MAIN-2021-25
https://www.nia.nih.gov/health/shots-safety
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487643380.40/warc/CC-MAIN-20210619020602-20210619050602-00072.warc.gz
en
0.958128
1,333
3.53125
4
N/APosted on - 01/04/2015 How do horizontal pitch, Bandwidth and misconvergence affect monitor sharpness? I recently bought a Hewlett Packard Monitor and the monitor sharpness is noting to write home about, a friend later said I should check the monitor bandwidth, and other factor but I don’t know how this affects the monitor sharpness? How do horizontal pitch, Bandwidth and misconvergence affect monitor sharpness? All three are important in determining whether or not a monitor has a great display. Overall, you would need to have a small horizontal pitch, high bandwidth, and low misconvergence. You also need a good video display card. Defined, horizontal pitch is the distance between dots on the monitor. Bandwidth is a measure for how quickly the monitor will respond. Therefore, the higher the bandwidth, the better picture quality you will have. Finally, misconvergence refers to the beams inside the picture tube of the monitor. It affects how colors show on the monitor.
<urn:uuid:5485cace-aa4b-40c3-b257-0fe9bc691cac>
CC-MAIN-2021-39
https://www.techyv.com/questions/how-do-horizontal-pitch-bandwidth-and-misconvergence-affect-monitor-sharpness
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057371.69/warc/CC-MAIN-20210922163121-20210922193121-00482.warc.gz
en
0.909284
212
2.640625
3
Hairballs are disgusting, especially when you step on one with a bare foot in the dark. What causes these things? Why do some cats produce them prolifically while others never yak them up? What symptoms does a hairball cause in a cat? And why are there so many myths and fallacies about hairballs? Hairballs, like everything in medicine, have a fancy name: trichobezoars. Tricho means “hair,” and bezoar means “a clumping of material that is held or cemented together in the gastrointestinal tract.” In other words, hairballs are nothing more than wads of hair that have stuck together to the point that they can’t readily pass through the intestinal tract in a normal fashion. So far, so good. So why all the fallacies? Let’s start with the biggest one: Hairballs are caused by swallowing hair. In an extremely limited sense, this is true — hairless cats such as Sphynxes rarely get hairballs. (More on that below.) But swallowing hair in and of itself is not what causes hairballs. All cats groom. And therefore all cats (if they have hair) swallow hair. That hair is supposed to pass through the intestines and into the litter box. Unless your cat is grooming himself to the point of baldness (or continuously grooming every cat in a multiple-cat house), his hairballs aren’t being caused by swallowing too much hair. They’re occurring because the gastrointestinal tract isn’t moving the hair through in a normal fashion. Most cats who produce hairballs have an underlying gastrointestinal disorder, and some of them may develop more serious symptoms over time. Any cat who regularly produces hairballs should see the vet to discuss this. Another fallacy is that hairballs are “coughed up.” That is patently untrue. Coughing involves the windpipe and lungs. Hairballs reside in the stomach and intestines. Hairballs do not cause coughing. They cause vomiting. However, they also sometimes cause dry heaving that resembles coughing. Cats whose yakking behavior produces hairballs on a regular (or even intermittent) basis can safely be said to have a hairball issue. If your cat is coughing or yakking but never produces anything, it’s more likely that he has feline asthma or some other respiratory issue. This is a different, and potentially serious problem. Don’t assume your cat has a hairball problem if he never brings up hairballs. Go to the vet and get some chest X-rays. Another fallacy involves vomiting. I often speak with clients whose cats vomit regularly. These clients sometimes assume that hairballs are the source of the problem. This often is untrue. If hairballs frequently come up with the vomit, then the hairballs may be playing a role. But remember that underlying gastrointestinal problems tend to cause hairballs in the first place. Those same gastrointestinal problems, such as infiltrative/inflammatory bowel disease, may cause hairballs. Bottom line: If your cat vomits regularly, don’t write it off as a hairball problem. Ask your vet what else might be causing the symptoms. Many people assume that long haired cats all suffer from hairballs. Look at all that hair — surely it will clog the pipes. However, have you ever noticed that many long haired cats shed less than short haired ones? This has to do with the way hair gets long in the first place. If a cat’s hair grows to half an inch and then falls out, that cat will have short hair. If it grows to two inches before it falls out it will have long hair. Short-haired cats lose their hair faster than long-haired ones. There is a counterbalance in this matter. Longer hairs appear more likely to coalesce into hairballs, and this sort of evens things out. But in my experience long-haired cats are not more likely to suffer hairballs than their short-haired compatriots. Some people believe that hairless cats can’t develop hairballs. This is true as long as they don’t have access to someone else’s hair. I once surgically removed a hairball from a Sphynx. He had a habit of eating his owner’s hair — and she had long hair! The moral of the story: Don’t feed your hair to your cat. Speaking of surgery, I’m happy to say that it is required only in the most severe cases. Most hairball problems can be treated with a combination of addressing the underlying gastrointestinal issue (this is the most important thing to do) along with administration of hairball preventatives. Most hairball preventatives are pretty crude: They are merely gastrointestinal lubricants that help grease things up and move the hairballs out into the litter box. If your cat is coughing, vomiting, regularly producing hairballs, losing weight, or suffering from poor appetite, see the vet. Too many people in my experience delay treatment of serious problems because they believe hairballs are to blame. Finally, let’s address one last fallacy. Hairballs do not, I repeat, they do not cure pinkeye. Ren and Stimpy, in the episode, “The Cat That Laid the Golden Hairball,” were simply wrong about that, and hairballs have no economic value whatsoever. That’s a shame, I know. Got a question for Dr. Barchas? Ask our vet in the comments below and your topic might be featured in an upcoming column. (Note that if you have an emergency situation, please see your own vet immediately!)
<urn:uuid:297631ee-0223-4f0c-ba97-1cb3bfa61a61>
CC-MAIN-2021-31
https://www.catster.com/lifestyle/hairball-cats-facts-fallacies-cat-health-ask-a-vet
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152144.81/warc/CC-MAIN-20210726152107-20210726182107-00257.warc.gz
en
0.952191
1,188
2.890625
3
This file is also available in Adobe Acrobat PDF format THE relation between aggregate consumption or aggregate savings and aggregate income, generally termed the consumption function, has occupied a major role in economic thinking ever since Keynes made it a keystone of his theoretical structure in The General Theory. Keynes took it for granted that current consumption expenditure is a highly dependable and stable function of current income—.that "the amount of aggregate consumption mainly depends on the amount of aggregate income (both measured in terms of wage units)." He termed it a "fundamental psychological rule of any modern community that, when its real income is increased, it will not increase its consumption by an equal absolute amount," and stated somewhat less definitely that "as a rule, . . . a greater proportion of income. . . (is) saved as real income increases."1 Theoretical interest stimulated empirical work. Numerical consumption functions were estimated from two kinds of data: first, time series on consumption, savings, income, prices, and similar variables available mostly for the period after World War!; second, budget data on the consumption, savings, and income of individuals and families available from numerous sample surveys made during the past century and a half.2 Both sources of data seemed at first to confirm Keynes's hypothesis. Current consumption expenditure was highly correlated with income, the marginal propensity to consume was less than unity, and the marginal propensity was less than the average propensity to consume, so the percentage of income saved increased with income.' But then a serious conflict of evidence arose. Estimates of savings in the United States made by Kuznets for the period since 1899 revealed no rise in the percentage of income saved during the past half-century despite a substantial rise in real income. According to his estimates, the percentage of income saved was much the same over the whole of the period. The corresponding ratio of consumption expenditure to income— the constancy of which means that it can be regarded as both the average and the marginal propensity to consume—is decidedly higher than the marginal propensities that had been computed from either time series, or budget data.3 Examination of budget studies for earlier periods strengthens the appearance of conflict. The average propensity to consume is roughly the same for widely separated dates, despite substantial differences in average real income. Yet each set of budget studies separately yields a marginal propensity decidedly lower than the average propensity. Finally, the savings ratio in the period after World War IL was sharply lower than the ratio that would have been consistent with findings on the relation between income and savings in the interwar period. This experience dramatically underlined the inadequacy of a consumption function relating consumption or savings solely to current income. The conflict of evidence stimulated a number of more complex hypotheses. Brady and Friedman suggested that a consumer unit's consumption depends not on its absolute income but on its position in the distribution of income among consumer units in i.ts community. They presented a good deal of evidence, mostly from budget data, in support of this relative income hypothesis.4 Duesenberry based the same hypothesis on a theoretical structure that emphasizes the desire to emulate one's neighbors and the demonstrationby neighbors of the qualities of hitherto unknown or unused consumption goods. In addition, he that the relative income hypothesis could be used to- interpret aggregate data by expressing the ratio of consumption to income as a function of the ratio of current income to the highest level previously reached.5 Duesenberry computed such a regression for the United States for 1929—1941 and, obtained reasonably good results. Modigliani independently made essentially the same suggestion for the analysis of aggregate data, submitted it to extensive and detailed statistical tests, and concluded that it gave excellent results.6 Tobin has recently examined the consistency of the relative income hypothesis and the earlier absolute income hypothesis with a limited body of empirical evidence. Though he finds neither hypothesis entirely satisfactory, he concludes that the weight of evidence favors the absolute income hypothesis, and he tentatively suggests that changes in wealth may explain the rough constancy over time in the fraction of income saved.7 Tobin's analysis is examined in more detail below (Chapter VI, section 4). The doubts about the adequacy of the Keynesian consumption function raised by the empirical evidence were reinforced by the theoretical controversy about Keynes's proposition that there is no automatic force in a monetary economy to assure the existence of a full-employment equilibrium position. A number of writers, particularly Haberler and Pigou,8 demonstrated that this analytical proposition is invalid if consumption expenditure is taken to be a function not only of income but also of wealth or, to put it differently, if the average propensity to consume is taken to depend in a particular way on the ratio of wealth to income. This dependence is required for the so-called "Pigou effect." This suggestion was widely accepted, not only because of its consistency with general economic theory, but also because it seemed to offer a plausible explanation for the high ratio consumption to income in the immediate postwar period. One empirical study, by William Hamburger, finds that the ratio of wealth to income is closely correlated with the ratio of consumption to income, as judged by aggregate time series data for the interwar and post-World War II period.9 Other studies, particularly some by Klein, have used budget data to investigate the role of particular kinds of wealth, especially liquid assets.'10 This brief sketch may convey something of the flavor of the past few decades on the consumption function. It cannot properly convey the wealth of detailed empirical evidence on consumption behavior that has been added during this period to earlier material, or the extraordinary number and variety of analytical studies that have been made of this evidence. This monograph presents yet another hypothesis to explain the observed relation between consumption expenditure and income. The justification for doing so is that the new hypothesis seems potentially more fruitful and is in some measure more general than either the relative income hypothesis or the wealth-income hypothesis taken by itself. It incorporates fully the wealth-income effect and explains why the relative.,income hypothesis should be valid under special conditions. The hypothesis follows directly from• the currently accepted pure theory of consumer behavior, seems consistent with existing empirical evidence, and has observable implications capable of being contradicted by additional evidence. Its essential idea is to combine the relation between consumption, wealth, and income suggested by purely theoretical considerations with a way of interpreting observed income data that I developed earlier for what at first glance seems a completely different purpose, namely the analysis of changes in relative income status.11 This way of interpreting income data can be extended to consumption data, and in the process, the problem of changes in relative income status can be linked intimately with the problem of the determinants of consumption expenditure. The hypothesis thus enables much of the wide range of statistical evidence accumulated about the distribution of income to be brought to. bear directly on the interpretation of consumption behavior.12 Return to Book Description File created: 8/6/2008 Questions and comments to: email@example.com Princeton University Press
<urn:uuid:386058ab-2df3-407b-a8e0-085381e6ea37>
CC-MAIN-2016-40
http://press.princeton.edu/chapters/s978.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661277.63/warc/CC-MAIN-20160924173741-00062-ip-10-143-35-109.ec2.internal.warc.gz
en
0.956373
1,420
3.078125
3
Why python and unicode leads to frustration In python-2.x, there's two types that deal with text. str is for strings of bytes. These are very similar in nature to how strings are handled in C. unicode for strings of unicode codepoints. In the python-2.x world, these are used pretty interchangably but there are several important APIs where only one or the other will do the right thing. When you give the wrong type of string to an API that wants the other one, you may end up with an exception being raised ( UnicodeEncodeError). However, these exceptions aren't always raised because python implicitly converts between types... sometimes. Frustration #1: Inconsistent Errors Although doing the right thing when possible seems like the right thing to do, it's actually the first source of frustration. A programmer can test out their program with a string like: "The quick brown fox jumped over the lazy dog" and not encounter any issues. But when they release their software into the wild, someone enters the string: <code>"I sat down for coffee at the café" and suddenly an exception is thrown. The reason? The mechanism that converts between the two types is only able to deal with ASCII characters. Once you throw non-ASCII characters into your strings, you have to start dealing with the conversion manually. So, if I manually convert everything to either bytes or strings, will I be okay? The answer is.... sometimes. Frustration #2: Inconsistent APIs The problem you run into when converting everything to byte unicode strings is that you'll be using someone else's API quite often (this includes the APIs in the python standard library) and find that the API will only accept byte str or only accept unicode strings. Or worse, that the code will accept either when you're dealing with strings that consist solely of ASCII but throw an error when you give it a str that's got non-ASCII characters or a unicode that has non-ASCII characters. When you encounter these APIs you first need to identify which type will work better and then you have to convert your values to the correct version for that code. This means two pieces of work for the programmer that wants to proactively fix all unicode errors in their code: 1. You must keep track of what type your sequences of text are. Does str? If you don't know that, then you're going to be in for a world of hurt. 2. Anytime you call a function you need to evaluate whether that function will do the right thing with unicode values. Sending the wrong value here will lead to UnicodeErrors being thrown down the line. Frustration #3: Inconsistent treatment of output Alright, since the python community is moving to using unicode type everywhere, we might as well convert everything to unicode and use that by default, right? Sounds good most of the time but there's at least one huge problem with this. Anytime you output text to the terminal or to a file, the text has to be converted into bytes. Python will try to implicitly convert from unicode to bytes... but it will throw an exception if the bytes are non-ASCII:: >>> string = unicode(raw_input(), 'utf8') café >>> log = open('/var/tmp/debug.log', 'w') >>> log.write(string) Traceback (most recent call last): File "<stdin>", line 1, in <module> UnicodeEncodeError: 'ascii' codec can't encode character u'\xe9' in position 3: ordinal not in range(128) Frustration #4: Exceptions = Okay, so we've gotten ourselves this far. We convert everything to unicode type. We're aware that we need to convert back into bytes before we write to the terminal. Are we all set? Well, there's at least one more gotcha: raising exceptions with a unicode message. Take a look: >>> class MyException(Exception): >>> pass >>> >>> raise MyException(u'Cannot do this') Traceback (most recent call last): File "<stdin>", line 1, in <module> __main__.MyException: Cannot do this >>> >>> raise MyException(u'Cannot do this while at a café') Traceback (most recent call last): File "<stdin>", line 1, in <module> __main__.MyException >>> No, I didn't truncate that last line; raising exceptions really cannot handle unicode strings and will output a A few solutions Use kitchen to convert at the border In python-2.x I've started work on a library that can help with unicode issues. The part that's especially relevant is the converter functions. They allow you to transform your text from bytes to unicode and unicode to bytes pretty painlessly. If you're writing APIs to deal with text, there's a few techniques to use. However, you must be wary in what you do as each method has some drawbacks.
<urn:uuid:91adc07a-4c98-44c7-bc48-3d24efdea50b>
CC-MAIN-2015-40
https://fedoraproject.org/w/index.php?title=User:Toshio/Python_Unicode&oldid=189268
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738008122.86/warc/CC-MAIN-20151001222008-00224-ip-10-137-6-227.ec2.internal.warc.gz
en
0.896901
1,081
3.09375
3
Monday, May 4, 2009 Help To Get A Child A Pair Of Shoes was founded on a simple premise: For every pair purchased, TOMS will give a pair of shoes to a child in need. One for One. TOMSshoes.com In 2006 an American traveler, Blake Mycoskie, befriended children in Argentina and found they had no shoes to protect their feet. Wanting to help, he created a company that would match every pair of shoes sold with a pair given to a child in need. Blake later returned to Argentina and gave 10,000 pairs of shoes... What made it happen? It was the generosity of TOMS customers and supporters.. This year TOMS plans to give over 300,000 pairs of shoes to children... OVER 300,000 Pairs... In many developing countries many children go without shoes... Here in America it's hard to understand that...Can you imagine walking down an alley barefoot and cutting yourself and opening your poor foot to all kinds of horrible bacterias and infections? Many children live with that possibility everyday and in many developing countries there is limited access to the medication they would need to combat an infection. Wearing shoes prevents feet from getting cuts and sores. It prevents them from exposing their feet to contaminated soil and rugged terrain. The leading cause of disease in developing countries is soil transmitted parasites which penetrate the skin through open sores. Wearing shoes can prevent this and the risk of amputation. Many times children can't attend school barefoot because shoes are a required part of their uniform. If they don't have shoes, they don't go to school. If they don't receive an education, they don't have the opportunity to realize their potential. There are many areas you can get involved with TOMS shoes. From interning, to becoming a campus rep, Join a Vagabond Tour to help and develop relationships, or you can buy a pair of TOMS Shoes and know that you just gave a new pair of shoes to a child in need. For every pair of shoes purchased, TOMS will give a pair of shoes to a child in need. One for One.. Much of the information for this article was taken from www.tomsshoes.com
<urn:uuid:76350b3a-5b55-412f-8e50-7c70a9f6cac2>
CC-MAIN-2017-34
http://kellysideas.blogspot.com/2009/05/help-to-get-child-pair-of-shoes.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104704.64/warc/CC-MAIN-20170818160227-20170818180227-00661.warc.gz
en
0.964575
458
2.640625
3
Potassium citrate helps relieve painful or difficult urination associated with bladder inflammation or infection. This medicine is also used to prevent the formation of kidney stones. Take Potassium citrate exactly as directed by your doctor or according to the instructions on the label. Do not take more or less than instructed by your doctor. Take it with food or immediately after a meal. Try to take it at the same time each day. Potassium citrate is available as a tablet or as an oral solution. If you are taking the extended-release type of tablet (usually labelled “ER”), swallow it whole with a full glass of water. Do not divide, chew or crush the tablet. If you are taking an oral solution, dilute each dose with water and shake the bottle well before you take it to ensure that the liquid is evenly mixed. Use the measuring spoon or cup provided to measure out your prescribed dose. Potassium citrate must be taken regularly for it to be effective. Continue taking this medicine even when you feel better. Do not stop taking it unless instructed by the doctor. Take the missed dose as soon as you remember. If it is almost time for your next dose, skip the missed dose and return to your normal dosing schedule. DO NOT double a dose under any circumstances. If you often forget to take your medicine, let your doctor and pharmacist know. Alert your doctor if you have the following conditions: - hyperkalaemia (high potassium levels in the blood) - severe kidney disease - stomach disorder such as ulcer, blocked bowel, inability or problems emptying the stomach or bladder - Addison’s disease (disorder of the adrenal glands) as Potassium citrate may not be suitable for you. Inform your doctor if you have the following conditions: - heart disease - liver disease - kidney disease - severely ill or in shock Let your doctor know if you are pregnant or breastfeeding. For as long as you are taking Potassium citrate, you may need to have regular blood tests to check your body’s response to the medicine. Routine tests for urinary citrate or pH and an ECG (a recording of electrical activity of the heart) may also be needed while you are being treated with this medicine. Your doctor will advise you about how often you need to have these tests. Potassium citrate may cause any of the following side effects: stomach discomfort, diarrhoea, nausea and vomiting. If you experience muscle weakness, cramping or numbness, fast or irregular heartbeat, stop taking the medicine and alert your doctor immediately. These could be signs of hyperkalaemia. Inform your doctor if any of these side effects do not go away or are severe, or if you experience other side effects. Inform your doctor and pharmacist if you are taking any of these medicines: - water pills e.g. triamterene, spironolactone, amiloride - medicines for high blood pressure or heart disease e.g. digoxin, aliskiren - medicines used in organ transplant or certain immune disorder e.g. ciclosporin - blood-thinning medicine e.g. aspirin - antibiotics e.g. tetracycline - medicines for urinary or bladder infection e.g. nitrofurantoin, methenamine This list does not include all medicines that may interact with Potassium citrate. Always notify your doctor and pharmacist if you are taking any other medicines, including herbal tonics such as traditional Chinese medicines, supplements (especially potassium containing supplements) and medicines that you buy without a prescription. Do not take potassium supplements. Avoid taking too much food that is high in potassium, such as orange juice, bananas or prunes. Do not use salt substitutes that contain potassium. Store in a cool, dry place away from the reach of children. The oral solution should be used within 2 months after first opening. Medicines must not be used past the expiry date.
<urn:uuid:591c9184-bfb8-4b44-87ed-08200326d9ed>
CC-MAIN-2020-50
https://www.mims.com/singapore/drug/info/potassium%20citrate/patientmedicine/potassium%20citrate%20-%20oral
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141685797.79/warc/CC-MAIN-20201201231155-20201202021155-00278.warc.gz
en
0.911205
851
2.59375
3
The correlation coefficient always takes a value between -1 and 1, with 1 or -1 indicating perfect correlation (all points would lie along a straight line in this case). A positive correlation indicates a positive association between the variables (increasing values in one variable correspond to increasing values in the other variable), while a negative correlation indicates a negative association between the variables (increasing values is one variable correspond to decreasing values in the other variable). A correlation value close to 0 indicates no association between the variables. Since the formula for calculating the correlation coefficient standardizes the variables, changes in scale or units of measurement will not affect its value. For this reason, the correlation coefficient is often more useful than a graphical depiction in determining the strength of the association between two variables. The correlation coefficient also relates directly to the regression line Y = a + bX for any two variables, where . Because the least-squares regression line will always pass through the means of x and y, the regression line may be entirely described by the means, standard deviations, and correlation of the two variables under investigation. For some good examples of studies using correlation, see the correlation index in the Statlib Data and Story Library (DASL).
<urn:uuid:b5c11fc5-9f47-4462-9536-37776035915d>
CC-MAIN-2014-23
http://www.stat.yale.edu/Courses/1997-98/101/correl.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997873839.53/warc/CC-MAIN-20140722025753-00227-ip-10-33-131-23.ec2.internal.warc.gz
en
0.866309
246
3.875
4
Philia (deep friendship) : Its objects range from people to drink, food e.g. dried figs (Aristophanes, Peace, 634) and concepts such as peace. It is the most general word for love and friendship. Pothos is ‘an intense nostalgic longing for someone or something absent or lost (Sfyroeras, 2008, p.302). ‘It is more passive than eros but also tends to feminize those experiencing it and to render them powerless’ (303). Himeros, which is related to pothos, refers to a more pressing desire that strikes at the diaphragm, the heart, and the breast. Eros: Its objects range from people, concepts (i.e. peace), food (ie. strong desire for sausages at Aristophanes’ Acharnes, 146) to negative concepts and evil things πονηρών πραγμάτων (Aristophanes, Nubes, 1459) Αbove all, it was the passionate love of men for women or boys and sometimes the love of women for younger men and boys. Eros for people is expressed through the gaze. Charites (Graces) Aglaea and Euphrosyne and lovely Thalea from whose eyes as they glanced flowed love that unnerves the limbs (Hesiod, Theogony, 910-11) In ancient Greek literature Eros is depicted as ~the consumption of drink – έρωτα πίνων (Αnakreon, PMG 450) ~a warmth, softening, melting force. Eros melts my limbs… (Sappho, 130) ~as a violent impact on body and mind. Once again Eros, like a blacksmith, has struck me with a great hammer and dipped me into an icy mountain torrent. (Anacreton, 413) ~The bittersweet Eros is a torment and a delight. Bitter and sweet, kindly also and harsh, Cyrnus, is love unto the young till it be fulfilled; for if a man achieve it, it becometh sweet, and if he pursue and achieve not, that is of all things the most painful. Theognis 1353f., in J. M. Edmonds (trans.), Elegy and Iambics ….bittersweet, irresistible creature (Sappho, 130). ~ as madness and absence Once again I love and I do not love, I am mad and I am not mad.(Anacr. frags. 357) ~ as wind Now Eros shakes my soul, a wind on the mountain falling on the oaks. (Sappho, 47)
<urn:uuid:9c2abb11-46e2-4c19-b926-9d598a960e79>
CC-MAIN-2023-14
http://www.historyofgreekfood.eu/uncategorized/ancient-greek-words-for-love-eros-himeros-pothos-philia/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00234.warc.gz
en
0.858416
611
2.578125
3
Black stool refers to a state in which feces are extremely dark or black in colour. This condition may be usual in some instances and caused by the ingestion of certain medications or substances for instance, by iron supplements. This condition can also be caused by a serious illness and therefore, this article will extensively discuss the causes of black stools. What is black stool? Black stools caused by supplements, food, medication or minerals are called “false melena.” Black stool that has a foul smell and is tarry in terms of texture is frequently a symptom of gastrointestinal bleeding from the stomach, esophagus or small intestine. Consequently, one should seek immediate medical care if the person has abnormally dark stools or any variation in texture or stool colour. What are the causes of black stool? This condition can be a symptom of several diseases or disorders. The following are some of the causes of black stool: This is a condition typified by an inflamed stomach lining which can either be chronic or acute. In whichever case, it can be as a result of excessive intake of alcohol, using excessive pain-relieving medications or the outcome of severe stress. Some of the indications include vomiting, bloating and black faeces. As people grow older, they at times form small pouches on the intestinal walls called diverticula. When these pouches become visible, they are frequently not accompanied by any symptoms and this state is known as diverticulosis. When these diverticula undergo inflammation and infection, the conditions gets converted to diverticulitis. Signs of diverticulitis include abnormal pain, constipation and black stools. Ulcerative colitis is a form of inflammatory bowel illness that causes the swelling of the large intestines. This illness is typified by diarrhea, abnormal pain and dark stools. Another type of inflammatory bowel condition that can generate black stools is known as Crohn’s disease which is comparable to colitis in that it is characterised by inflammation. However, it is not restricted to a particular area and thus, it can take place anywhere from the mouth to the rectum. There are two kinds of ulcers that take place in the stomach: Gastric and peptic. In peptic, the stomach lining and the first component of the small intestine (duodenum) become eroded. When an actual break in the stomach lining occurs, a gastric ulcer emerges. In both conditions, abdominal pains, nausea and tarry stools can occur. There are different foods and supplements that can cause dark stools. Supplements and iron pills for instance are used during low-iron levels in the body and can cause the emergence of dark stools. Blueberries can equally cause dark stools.
<urn:uuid:c87f5ddf-5a34-48ae-8f50-c54f5c6c77f7>
CC-MAIN-2014-15
http://lucille1.over-blog.com/article-what-cause-black-stools-86104507.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539447.23/warc/CC-MAIN-20140416005219-00064-ip-10-147-4-33.ec2.internal.warc.gz
en
0.929121
573
3.234375
3
It goes without saying that computers have become an integral part of our life and we can hardly find a sphere of life, where we do not use computers, education is not an exception… Some people are even predicting that one day computers will completely replace teachers at school. Let us imagine such a picture: a nice classroom full of kids who are sitting comfortably in front of computers’ screens studying different subjects silently at their own place… Let us go further… Empty classrooms, empty schools… Children get their education not even leaving their home. The only thing they need is a computer and connection to the Internet. Is this a future of our education? Those who believe this picture will come true will name a lot of benefits of this situation… First of all, a student can plan when and where to study. Just imagine, you can study everywhere: while travelling or sitting in a caf&覡… Secondly, there is no need to spend time on the way to school and in traffic jams. Do not you agree, that time is the most precious thing nowadays? If we compare the amount of knowledge of a computer and a teacher, the teacher will never win this fight. A computer’s memory is endless and it has a variety of tasks and tests for all levels so as to train all groups of students. Besides, a computer can give any answers to any questions with detailed explanations and images. It can do it very quickly, I am sure… Secondly, if you want to study foreign languages, you can find all the language teachers of the world in one place. Isn’t it wonderful? Furthermore, if you want to study geography you can be taken to any part of the world with just one click of the mouse… Another important advantage is that a computer never will give you unfair marks. Поступаете в 2019 году?Наша команда поможет с экономить Ваше время и нервы: - подберем направления и вузы (по Вашим предпочтениям и рекомендациям экспертов); - оформим заявления (Вам останется только подписать); - подадим заявления в вузы России (онлайн, электронной почтой, курьером); - мониторим конкурсные списки (автоматизируем отслеживание и анализ Ваших позиций); - подскажем когда и куда подать оригинал (оценим шансы и определим оптимальный вариант). Доверьте рутину профессионалам – подробнее. It will help you to find out your real level of knowledge. Without doubt, computers’ possibilities are endless and we need more than 3 minutes to list them. But despite all these advantages, I assume that the computer will never be able to replace the teacher and there are some reasons. First and foremost, information which a computer possesses, is not the same as knowledge. The teacher with his life experience, feelings and emotion always contributes into every student. No computer will be able to help a student to solve his psychological problems, for instance, comfort him after getting a bad mark and cheer him up for further success. This is much more important especially nowadays, when psychological condition of students is not stable. Moreover, teacher can explain the material in different ways if a student does not understand it. A computer will never be able to find individual approach to each student… Can you imagine your school graduation ceremony and yourself giving flowers to computers and thanking them for what they have done and what a great role they played for you all those years! To sum up I wanted to say that I believe that computers will never be able to replace teachers. Let’s finish our speech by imaging the following picture… A nice classroom full of kids sitting comfortably at the desks having a lovely conversation with their teacher and each other. Of course, they have computers on their desks but they use them to make the process of studying more enjoyable and interesting. Эффективная подготовка к ЕГЭ (все предметы) - начать подготовку
<urn:uuid:c9c5571a-ad11-4a3d-9977-0dc4df19bef8>
CC-MAIN-2019-13
https://www.kritika24.ru/page.php?id=18798
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202161.73/warc/CC-MAIN-20190319224005-20190320010005-00509.warc.gz
en
0.860416
1,255
2.71875
3
Did you know tips for June 2002 - the history of sewing, sewing machines, and many other aspects of the sewing industry: The history of the sewing machine dates back to as early as 1755, when Charles Weisenthal patented a double pointed sewing needle to be used for mechanical sewing. Sewing changed dramatically around 1844, when Elias Howe was credited with a prototype of today's sewing machine. On September 10, 1846, Elias Howe patented the lock-stitch sewing machine. The patent number was 4750. 1851 saw the introduction of a sewing machine for home use by Isaac Merrit Singer, a name now associated with sewing on an everyday basis. The safety pin, an item we all use when sewing, basting, and spot mending, was invented around 1849 by a gentleman named Walter Hunt. He patented the brass pin and then sold the rights for around four hundred dollars. It is a sure bet that someone, not Mr. Hunt, became very wealthy from this very invention. Walter Hunt, the inventor of the safety pin, also built one of the first sewing machines in America. At the time, the early 1830s, Mr. Hunt saw the sewing machine as a job eliminator, lost interest in such a machine, and move on to something else. Sewing dates back about 20,000 years. Needles were first made of animal horns and bone. Thread was crafted from animal sinew. Archeologists have discovered needles with eyes from this period. It is believed that sewing was primarily to connect animal furs. The invention of the sewing machine increased the demand for textile products and was unique in that it was one of the first home use devices or appliances. The thimble dates back to 202 BC to AD 220 as Chinese archaeologists report finding a sewing set complete with thimble from that period. Early sewing machine marketing touted the device as the Queen of Inventions. It offered the promise of relief from hours of tedious hand sewing. The costs, though, were out of range of most households. Communities chipped in to purchase a machine for many to use, but eventually, payment plans took hold, bringing to the home consumer the option of buying on time. Theory has it that the home sewing machine, in a roundabout fashion, diminished the role of the homemaker and was one of the catalysts for women seeking work outside the home. Labor saving devices including the sewing machine, washing machine, and others limited the hours needed to run a household. Sewing a garment went from 14 hours to about 2, leaving free time for other activities. Sewing by machine also provided a way for some women to take in work at home, providing some extra income to their growing families. The homesteaders heading out west also used sewing as a way to make a bit of money, working as community dressmakers. Sewing is told to be, in diaries of western bound women, the most common domestic activity. "The Land Rover vehicle has history in the sewing machine. The Coventry Sewing Machine Company established in 1881 later became the Rover Motor Company, which was later bought by the company which now produces the Land Rover. A.B. Wilson developed the automatic feed device for the sewing machine. Prior to 1850, the feeding of fabric through the machine might be accomplished by a device that resembled a belt with small spikes on it. The rotary bobbin and hook were also invented by A. B. Wilson. Prior to 1850, all sewing machines were operated by hand. It took Isaac Singer to invent the foot treadle and make the work a little less cumbersome. As early as 1897, the Sears catalog offered sewing machines for sale via mail order. In 1997, an auction house in London sold the most expensive sewing machine ever, to the tune of $41,000. It was a Wheeler and Wilson type of machine that was created for the German Royal Family around 1865. Henry Leland, best known for his work in Detroit and with the Cadillac and Lincoln companies, first made sewing machines for Brown & Sharpe in the 1870s after working other positions involving machines. Between 1887 and 1897, a bicycle fad was in motion. Many sewing machine companies began producing bicycles at that time. The invention of scissors can be traced back to the earliest incarnation - the lever - first described by Archimedes around 260 BC. Scissors made of one piece of metal - not the two-blade lever action scissors - have been found in ancient Egyptian ruins from as far back as 1500 BC. Modern cross blade scissors were invented in Rome in about 100 AD. The common use of scissors began in about the 1500s AD in Europe. Filmmaker Tim Burton had a life-long fascination with scissors, calling them an interesting invention. His interest in scissors prompted the creation of his movie Edward Scissorhands. In the end, it is Leonardo da Vinci who is credited with the invention of scissors, supposedly to cut canvas that did not please him when he was painting. He apparently was a very picky painter and wanted only the best parts to show. In short, the invention of the sewing machine changed the way we live. As the first major time saving device in the home, we shifted our work priorities. Sewing has been with us almost always and will be with us for almost forever. We think you can count on that if nothing else. There is a wee bit of controversy over the history of the sewing machine and the patent that was given thereafter. Howe and Singer are the two big names, but I thought it would be more interesting for you to read for yourself, so I am leaving you with this link:
<urn:uuid:8998f003-3779-4dbf-a5b4-1cd20eda0541>
CC-MAIN-2014-49
http://www.sewingweb.com/community/HistoryTips0602.php
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416405337312.65/warc/CC-MAIN-20141119135537-00235-ip-10-235-23-156.ec2.internal.warc.gz
en
0.97435
1,174
3.265625
3
What are "short period pulsators?" Variable stars are divided into categories, based on how and why they vary. One category of stars, the pulsating variables, change in brightness due to intrinsic (internal) changes that occur within the star. These pulsating variable stars are further divided into sub-categories. A short period pulsator (SPP for short) is a star that varies in brightness on the timescale of a few hours up to a tens of days as it grows and shrinks in size. These changes often follow a very regular pattern, repeating over and over from cycle to cycle. Short period pulsators include a number of different variable star types, including Cepheids, RR Lyrae stars, and delta Scuti stars. In some cases poorly understood processes affect the regular pattern, causing the light curve to vary in height and shape from cycle to cycle. This variation in light curve, called the Blazhko effect after its discoverer, can become very large in some star. AR Herculis is an RR Lyrae star that shows a large Blazhko effect. The graph below shows the shape of the light curve around maximum brightness on 21 different nights, phased with the average pulsation period. Notice how the the height and broadness of the curve changes, and how the time of maximum brightness shifts. Some short period pulsating stars have more than one period. These additional pulsation period(s) alternately interfere and reinforce each other, resulting in a very complex light curve. Multi-periodic stars like these must be observed frequently over weeks or months to provide enough data to measure the periods involved. There is also some evidence that the pulsation periods and amplitudes change over the span of years. About the AAVSO SPP Section The AAVSO Short Period Pulsator Section targets all pulsating variable stars with periods in the range of hours to several weeks. This period range includes several important variable star classes like the Cepheids and RR Lyrae stars. More information about some types of short period pulsating stars is given on the SPP Star Classes page. Observations of all short period pulsating stars are welcome, but consult the SPP Program page for a list of interesting targets where additional observations are especially useful. Several professional astronomers have graciously agreed to be advisers to the SPP section: About the AAVSO The AAVSO (American Association of Amateur Variable Star Observers) is an international non-profit organization dedicated to studying variable stars of all types. Click here to subscribe to Sky and Telescope magazine at a significant discount. A portion of your subscription will be donated to the AAVSO.
<urn:uuid:795a834d-27e5-44be-8f07-fc197a3eae65>
CC-MAIN-2016-40
https://sites.google.com/site/aavsosppsection/
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660916.37/warc/CC-MAIN-20160924173740-00103-ip-10-143-35-109.ec2.internal.warc.gz
en
0.922599
553
3.171875
3
- La Santuzza (the little saint) Born to the Sicilian nobility, the daughter of Sinibald, Lord of Roses, and Quisquina. Descendant of Charlemagne. Raised around the royal Sicilian court. From her youth, Rosalia knew she was called to dedicate her life to God. When grown, she moved to cave near her parent’s home, and lived in it the rest of her life; tradition says that she was led to the cave by two angels. On the cave wall she wrote “I, Rosalia, daughter of Sinibald, Lord of Roses, and Quisquina, have taken the resolution to live in this cave for the love of my Lord, Jesus Christ.” Rosalia remained apart from the world, dedicated to prayer and works of penance for the sake of Jesus, and died alone. In 1625, during a period of plague, she appeared in a vision to a hunter near her cave. Her relics were discovered, brought to Palermo, and paraded through the street. Three days later the plague ended, intercession to Rosalia was credited with saving the city, and she was proclaimed its patroness. The traditional celebration of Rosalia lasted for days, involved fireworks and parades, and her feast day was made a holy day of obligation by Pope Pius XI in 1927. - c.1160 Mount Pellegrino, Italy, apparently of natural causes - buried in her cave by workers collapsing it - “Saint Rosalia“. CatholicSaints.Info. 16 January 2016. Web. 2 May 2016. <>
<urn:uuid:e054f985-a86c-4233-8c4e-2c85b28dfd81>
CC-MAIN-2016-18
http://catholicsaints.info/saint-rosalia/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860117783.16/warc/CC-MAIN-20160428161517-00097-ip-10-239-7-51.ec2.internal.warc.gz
en
0.981493
342
3.046875
3
The long harvest is a phenomenon that has been a part of human civilization for centuries. It is a time of year when farmers and agricultural communities tirelessly work to harvest their crops and reap the rewards of their hard work. This annual event marks the culmination of months of planning, planting, and nurturing, and it is a crucial time for farmers to gather their crops before the onset of winter. Traditionally, the long harvest has been a time of celebration and camaraderie, with families and communities coming together to support each other and lend a helping hand. It is a time when the rural landscape comes alive with the sights and sounds of farm machinery, the aroma of freshly cut hay, and the bustling activity of farmers working tirelessly in the fields. Over the years, the long harvest has seen significant changes, driven by advancements in technology and changes in agricultural practices. These changes have not only increased the efficiency and productivity of the harvest but have also posed new challenges for farmers and the environment. In this article, we will delve into the historical background of the long harvest, explore the agricultural practices associated with it, discuss the challenges faced by farmers during this period, examine the technological innovations that have transformed the harvest process, analyze the effects of the long harvest on farmers, discuss the environmental impact, and touch on government policies aimed at supporting farmers during this critical time. Whether it’s the rhythmic sound of a combine harvester or the satisfaction of seeing bountiful crops filling the fields, the long harvest is a time of year that embodies the hard work, dedication, and resilience of farmers. Join us as we dive into the intricacies of the long harvest and gain a deeper understanding of this timeless farming tradition. The long harvest dates back to the earliest agricultural civilizations, where the ability to cultivate crops signaled a significant shift from nomadic hunting and gathering societies. As humans transitioned to settled agricultural communities, the harvest became a crucial time for gathering and preserving food for the long winter months. In ancient times, the long harvest was a labor-intensive process that relied mainly on manual labor. Farmers would carefully tend to their fields and patiently wait for the crops to mature before harvesting them by hand using simple tools such as sickles or scythes. This process was arduous and time-consuming, often requiring the collective effort of the entire community. As civilizations progressed, advancements in agricultural technology emerged, revolutionizing the harvest process. The invention of the mechanical reaper in the 19th century, for instance, greatly increased the efficiency of harvesting. This innovative machine allowed farmers to cut and collect crops more rapidly, reducing the reliance on manual labor and enabling larger-scale farming operations. Over time, the long harvest transformed from a communal endeavor into a more individualized process. With the advent of modern farming machinery and equipment, individual farmers could manage larger areas of land and harvest their crops with greater ease and efficiency. Today, the long harvest is a true reflection of the evolution of agricultural practices. Farmers employ a combination of traditional and modern methods to harvest their crops. While many small-scale farmers still rely on hand tools for certain crops, larger commercial farms utilize cutting-edge machinery such as combine harvesters, balers, and grain elevators to streamline the process. The historical significance of the long harvest cannot be understated. It has shaped civilizations, provided sustenance for communities, and played a vital role in the development of agriculture. The long harvest stands as a testament to the ingenuity and resourcefulness of farmers throughout history, who have continually adapted and innovated to ensure the successful gathering of crops. Agricultural practices during the long harvest have evolved over time, incorporating a combination of traditional methods and modern techniques to achieve optimal yield and efficiency. These practices encompass a range of activities, from crop management to post-harvest storage and preservation. Determining the appropriate time for harvest is crucial for farmers. They must assess factors such as crop maturity, weather conditions, and market demands to make informed decisions. Harvesting too early may result in immature crops with lower nutritional value, while delaying the harvest may expose crops to unfavorable weather or increased risk of pest damage. Once the timing is determined, farmers employ various techniques to ensure a successful harvest. Traditional methods, such as hand harvesting, are still used for crops that require delicate handling, such as fruits and vegetables. Skilled workers carefully pick the crops, ensuring they are not damaged during the process. For larger-scale operations, mechanized harvesting methods are employed. Machines like combine harvesters are used to streamline the process, cutting and gathering crops in one efficient operation. This method significantly reduces the time and manpower required for harvest, increasing productivity for commercial farms. In addition to harvest techniques, farmers also utilize crop management practices to maximize yield. These practices include proper irrigation, pest control, and fertilization, ensuring healthy crop growth and minimizing the risk of pests and diseases. Farmers also employ techniques such as crop rotation and cover cropping to maintain soil fertility and prevent soil erosion. Post-harvest practices are equally important in ensuring the quality and longevity of harvested crops. These practices include cleaning, sorting, and packaging the crops for market or storage. Modern technologies, such as automated sorting machines, assist in this process, ensuring consistency in quality and reducing waste. For long-term storage, farmers employ various preservation techniques. This may involve drying, canning, freezing, or processing the crops to extend their shelf life and maintain their nutritional value. Proper storage conditions, such as temperature and humidity control, are crucial to prevent spoilage and maintain product quality. Overall, agricultural practices during the long harvest have become increasingly mechanized and technology-driven. These practices not only enhance efficiency and productivity but also play a vital role in meeting the growing demands of a rapidly expanding global population. The long harvest presents a unique set of challenges for farmers, requiring careful planning, coordination, and adaptation. These challenges can arise from various factors, including weather conditions, labor availability, market demands, and technical issues. One of the primary challenges faced during the long harvest is adverse weather conditions. Unpredictable weather patterns, such as excessive rainfall, drought, or early frost, can significantly impact crop quality and yield. Excessive rain can delay the harvest, leading to increased risks of mold or fungal growth, while drought can result in stunted crop growth and reduced overall yield. Labor availability is another significant challenge for farmers during the long harvest. Many agricultural regions heavily rely on seasonal workers to assist with the harvest. However, the availability of laborers has become increasingly scarce in certain areas due to factors such as changing demographics, stricter immigration policies, and the allure of urban employment opportunities. This shortage of labor can lead to delays in the harvest and increased costs for hiring additional workers. Market demands and price fluctuations pose additional challenges for farmers. The timing of the harvest is crucial to meet market demands and secure fair prices for their crops. Farmers must strike a delicate balance between harvesting at the peak of quality and ensuring that their crops are delivered to the market in a timely manner to maximize profitability. Additionally, fluctuations in market prices can greatly impact farming operations, making it challenging for farmers to forecast profits and plan for future seasons. Technical issues, such as equipment breakdowns or mechanical failures, can also hinder the smooth progress of the long harvest. Modern farming machinery is complex and requires regular maintenance and repairs. A breakdown during the critical harvest period can cause significant delays and result in financial losses for farmers. Furthermore, the increasing demands for sustainable and environmentally-friendly agricultural practices present new challenges for farmers during the long harvest. Incorporating practices such as organic farming, reduced pesticide use, and efficient water management requires additional planning, investment, and compliance with regulations. Despite these challenges, farmers continually adapt and find innovative solutions to overcome them. They utilize advanced weather forecasting systems, implement automated machinery maintenance schedules, explore alternative labor sources, and diversify their crops to mitigate risks. The long harvest is a time of great dedication and perseverance for farmers, as they navigate these challenges to ensure the successful gathering of their crops and the sustainability of their farming operations. Technological innovations have played a pivotal role in transforming the long harvest, revolutionizing agricultural practices and increasing efficiency and productivity. These advancements have enabled farmers to streamline the harvest process, improve crop quality, and reduce labor requirements. One of the most significant technological innovations in the long harvest is the development of agricultural machinery. Machines like combine harvesters have greatly increased the speed and efficiency of crop harvesting. These machines can simultaneously cut, thresh, and clean the crops, allowing farmers to cover large areas of land in a shorter period. This automation has significantly reduced the need for manual labor, allowing farmers to save time and resources. In addition to combine harvesters, other specialized machinery and equipment have been developed to enhance specific aspects of the harvest process. For example, automatic sorters and graders have been introduced to efficiently sort and package the harvested crops according to size, color, and quality. This not only saves labor but also ensures consistency in product presentation and marketability. Technological innovations have also improved the precision and accuracy of farming practices during the long harvest. Global Positioning Systems (GPS) have enabled farmers to precisely navigate and monitor their machinery, ensuring uniform coverage of fields and minimizing overlap or missed areas. This has resulted in more efficient use of resources and reduced wastage. The use of drones in agriculture has also gained popularity, particularly during the long harvest. Drones equipped with high-resolution cameras and sensors can provide valuable insights into crop health, allowing farmers to identify areas that may require additional attention. They can also detect pest infestations, helping farmers respond promptly and effectively. Data-driven farming techniques, also known as precision agriculture, have been revolutionizing the long harvest. Farmers can utilize sensor technology to monitor soil moisture levels, nutrient content, and temperature, allowing for more precise irrigation and fertilization. This technology optimizes resource allocation, minimizes waste, and increases crop yield. Furthermore, advancements in crop genetics have led to the development of more resilient and high-yielding varieties. Through selective breeding and genetic engineering, crops can withstand harsh environmental conditions, resist pests and diseases, and exhibit improved nutritional profiles. These innovations have not only increased crop yield but also contributed to global food security. The integration of technology in the long harvest continues to evolve, with the emergence of artificial intelligence (AI) and machine learning. AI-powered systems can analyze vast amounts of data, predict optimal harvest times, optimize farming schedules, and make informed decisions on crop management. This technology holds great promise for further enhancing efficiency and sustainability in agriculture. Overall, technological innovations have transformed the long harvest, empowering farmers with advanced tools and techniques to optimize their operations. As technology continues to advance, we can expect further advancements that will shape the future of agriculture and meet the challenges of our growing global population. Effects on Farmers The long harvest has profound effects on farmers, both in terms of their livelihoods and personal well-being. This critical period of intense work and high stakes can have both positive and negative impacts on farmers’ lives. One of the positive effects of the long harvest is the potential for increased income and financial stability. A successful harvest can result in higher yields and better market prices, allowing farmers to generate income and support their families. A bountiful harvest can also provide greater economic security, enabling farmers to invest in their farms, purchase new equipment, or diversify their operations. However, the long harvest can also be a time of immense stress and physical exhaustion for farmers. Long hours of labor, often in adverse weather conditions, can take a toll on their mental and physical health. The pressure to complete the harvest within a limited window can lead to sleep deprivation and high levels of fatigue. Furthermore, the long harvest can disrupt the balance between work and personal life. Farmers may have to sacrifice family time, social activities, and personal relaxation to ensure the successful completion of the harvest. This can strain relationships and lead to feelings of isolation and burnout. The success or failure of the long harvest also has a significant impact on farmers’ emotional well-being. A poor harvest due to weather conditions, pest infestations, or market fluctuations can be disheartening and financially burdensome for farmers. They may experience feelings of disappointment, frustration, and anxiety about their future in agriculture. On the other hand, a successful harvest can bring a sense of accomplishment, joy, and relief. Farmers see the results of their hard work come to fruition, witnessing the fruits of their labor filling their fields and storage facilities. This can bolster their self-esteem and pride in their profession. The effects of the long harvest extend beyond the individual farmer to the larger farming community. During this time, farmers often come together to help each other in a spirit of camaraderie. Communities organize harvest festivals, where farmers and their families gather to celebrate the culmination of their hard work and share stories and experiences. These events foster a sense of belonging and unity among farmers. Overall, the effects of the long harvest on farmers are complex and multifaceted. While it can bring financial stability and a sense of achievement, it also poses significant physical and emotional challenges. It is important to recognize and support the well-being of farmers during this critical time and appreciate their vital contribution to our food systems. The long harvest has both positive and negative environmental impacts, as agricultural practices can influence the surrounding ecosystems and natural resources. On the positive side, the long harvest promotes biodiversity by providing habitats for various organisms. Fields and farmland act as shelters and food sources for birds, insects, and small mammals. Additionally, farmers who adopt sustainable farming practices, such as crop rotation and the use of cover crops, can improve soil health and promote nutrient cycling, enhancing the overall ecosystem. However, the widespread use of mechanized equipment and intensive farming practices during the long harvest can also have adverse effects on the environment. One primary concern is soil erosion, resulting from the removal of vegetation and the exposure of bare soil during the harvest. Heavy rainfall or strong winds can cause the topsoil to wash away, leading to degraded soil quality and reduced agricultural productivity. The use of chemical fertilizers and pesticides during the long harvest can contaminate water sources if not managed properly. Nutrient runoff from fields can contribute to water pollution, leading to imbalanced aquatic ecosystems and harmful algal blooms in lakes and rivers. Pesticides can also pose risks to non-target species, including beneficial insects, birds, and aquatic organisms. The long harvest can also contribute to greenhouse gas emissions. The use of machinery and transportation vehicles powered by fossil fuels releases carbon dioxide (CO2) and other greenhouse gases into the atmosphere. Additionally, the decomposition of crop residues left in the field after harvest can generate methane (CH4), a potent greenhouse gas. To mitigate the environmental impact of the long harvest, sustainable farming practices are increasingly being adopted. These practices focus on reducing chemical inputs, implementing precision agriculture techniques, and adopting conservation measures to reduce soil erosion and water pollution. For instance, the use of cover crops can prevent soil erosion and improve soil structure, while integrated pest management (IPM) strategies can minimize the reliance on chemical pesticides. Government policies and agricultural regulations also play a crucial role in mitigating the environmental impact of the long harvest. These policies promote sustainable farming practices, provide incentives for adopting eco-friendly techniques, and enforce restrictions on the use of harmful chemicals and fertilizers. Furthermore, farmers and researchers are exploring innovative approaches to address the environmental challenges associated with the long harvest. This includes the development of precision agriculture technologies, such as sensor-based irrigation systems and drone monitoring, which can optimize water and nutrient use, reduce waste, and minimize environmental impact. Overall, the long harvest has environmental consequences that need to be carefully managed. By adopting sustainable practices and embracing technological advancements, farmers can minimize their ecological footprint and contribute to a more sustainable and resilient agricultural system. Government policies play a crucial role in shaping and supporting the long harvest by providing regulations, incentives, and support systems for farmers. These policies address various aspects of the harvest, including labor, environmental impact, market stability, and financial assistance. One important area of government policy is labor regulation. Many countries have specific regulations regarding migrant and seasonal workers, ensuring that they are protected and treated fairly during the long harvest. Governments often collaborate with labor agencies and farm organizations to establish guidelines for worker safety, fair wages, and proper working conditions. In terms of environmental impact, governments enforce regulations and standards to mitigate the negative effects of the long harvest on ecosystems and natural resources. These regulations focus on reducing water pollution, soil erosion, and greenhouse gas emissions. Farmers are encouraged to adopt sustainable farming practices through incentive programs, educational campaigns, and financial support for implementing conservation measures. Government policies also aim to ensure market stability and fair prices for farmers’ products. This may include regulations on product quality, grading standards, and fair trade practices. Governments often establish agricultural marketing boards or agencies to facilitate the distribution and marketing of agricultural products, helping farmers connect with buyers and access broader markets. Financial assistance is another aspect of government policy during the long harvest. Governments provide subsidies, loans, and insurance programs to support farmers in managing the risks associated with the harvest. These programs may offer financial relief in the event of crop failure, assist with equipment purchases, or provide funding for research and development in agriculture. Furthermore, governments invest in agricultural research and development to promote innovation and technological advancements in the long harvest. This includes funding projects that focus on improving crop varieties, developing efficient farming techniques, and exploring sustainable agricultural practices. Research institutions and extension services are instrumental in disseminating knowledge and providing technical support to farmers. Government policies are often designed in collaboration with agricultural organizations and stakeholders, ensuring that the needs of farmers are considered. Policymakers seek input from farmers, industry experts, and environmental organizations to develop comprehensive policies that address the diverse challenges and opportunities of the long harvest. The effectiveness of government policies in supporting the long harvest depends on proper implementation, monitoring, and evaluation. Regular reviews of existing policies are necessary to assess their impact, identify areas for improvement, and adapt to changing agricultural and environmental landscapes. Overall, government policies play a critical role in creating an enabling environment for farmers during the long harvest. By addressing labor issues, promoting sustainable practices, ensuring market stability, and providing financial support, governments actively support farmers in navigating the challenges and opportunities of this critical time of year. The long harvest is a time-honored tradition that reflects the dedication, resilience, and innovation of farmers worldwide. From ancient civilizations to modern-day agricultural practices, the long harvest has evolved, shaped by advancements in technology, changes in agricultural practices, and the challenges and opportunities faced by farmers. Throughout history, the long harvest has been a critical period for farmers, marking the culmination of months of hard work and careful planning. It is a time when communities come together, fostering a sense of solidarity and camaraderie as they support each other in the demanding task of gathering crops. Technological innovations have transformed the long harvest, introducing mechanized machinery and precision farming practices that increase efficiency, productivity, and sustainability. From combine harvesters to drones, these advancements have revolutionized the way crops are harvested and managed, improving yield and minimizing environmental impact. However, the long harvest does not come without challenges. Farmers contend with unpredictable weather conditions, labor shortages, market fluctuations, and the physical and emotional toll that this intense period of work entails. Despite these challenges, farmers are resilient, continuously adapting and finding solutions to ensure the successful completion of the harvest. Moreover, the long harvest has implications beyond the farm. It has both positive and negative environmental impacts, influencing biodiversity, soil health, and the overall sustainability of agriculture. Sustainable farming practices, guided by government policies, help mitigate these impacts and promote responsible stewardship of land and resources. In conclusion, the long harvest is a dynamic and essential part of agriculture, encompassing historical traditions, technological advancements, and the resilience of farmers. It represents the hard work, ingenuity, and dedication required to sustain our food systems. As we move forward, it is vital to recognize and support the farmers who labor during this critical time and to prioritize sustainable practices that balance productivity with environmental stewardship. The long harvest will continue to evolve, driven by innovation, global challenges, and the unwavering commitment of farmers to feed a growing population.
<urn:uuid:7a8101db-7adb-4b91-a8a7-da95f6d54452>
CC-MAIN-2023-50
https://www.touristsecrets.com/travel-guide/adventure/the-long-harvest/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00782.warc.gz
en
0.934228
4,186
4.3125
4
Before the Lopezes monopolized public utilities and became media moguls, they were landlords and their source of income was sugar. Although he was never formally a student in the circle of scholars around Marc Bloch and Lucien Febvre that came to be known as the Annales SchoolGeorges Duby was an exponent of the Annaliste tradition. Native men were recruited as menial servants for the white master. Historian Georges Lefebvre explains how at an early stage of the French Revolutionon just one night of August 4,Feudal mentality abolished the long-lasting remnants of the feudal order. It announced, "The National Assembly abolishes the feudal system entirely. Enlightenment authors generally mocked and ridiculed anything from the "Dark Ages" including feudalism, projecting its negative characteristics on the current French monarchy as a means of political gain. The feudal lords are blamed for defining right and wrong, pressing and suppressing, enslaving and torturing, bonded and child labor. Taj Nabi Khan September 23, The narrow-minded yet highly influential feudal class in Pakistan is reluctant to let the country develop into a modern state. Challenges to the feudal model[ edit ] InU. What makes this whole procedure a bit intriguing is what role, if any, the committee of administrators CoA is playing in creating this needless controversy on the eve of an important tournament. The 11th century in France saw what has been called by historians a "feudal Feudal mentality or "mutation" and a "fragmentation of powers" Bloch that was unlike the development of feudalism in England or Italy or Germany in the same period or later: But the board is not a government agency and seeking applications for a coach is not like floating a Feudal mentality so that no one accuses them of partisanship. At the level of the manor this might be a fairly mundane matter of agricultural policy, but also included sentencing by the lord for criminal offences, including capital punishment in some cases. It is his radical notion that peasants were part of the feudal relationship that sets Bloch apart from his peers: This section describes the history of the idea of feudalism, how the concept originated among scholars and thinkers, how it changed over time, and modern debates about its use. Challenges to the feudal model[ edit ] InU. The farmers, the tenants, also known as Hari in Sindh, Muzara in Punjab, who around the year work for the land owners in the land of the feudal lords and live their life from hand to mouth, comparable to medieval Europe where the landowners used to run the town, perhaps operates a private prison in which enemies are placed, and sometimes pretty much enslaves local people through debt bondage, generation after generation. The debate continues today, but a consensus viewpoint is that England before the Conquest had commendation which embodied some of the personal elements in feudalism while William the Conqueror introduced a modified and stricter northern French feudalism to England incorporating oaths of loyalty to the king by all who held by feudal tenure, even the vassals of his principal vassals Holding by feudal tenure meant that vassals must provide the quota of knights required by the king or a money payment in substitution. The next generation of Pakistanis is more educated and more desirous of change. In the 20th century, two outstanding historians offered still more widely differing perspectives. For Marx, what defined feudalism was the power of the ruling class the aristocracy in their control of arable land, leading to a class society based upon the exploitation of the peasants who farm these lands, typically under serfdom and principally by means of labour, produce and money rents. There may be a few who are taking this as an easy way of life, as they are often exempted from drills, will have close relationship with the superior officer and like any other profession, sycophancy should be a guaranteed career enhancement scheme in the police force too. Using whatever equipment the vassal could obtain by virtue of the revenues from the fief, the vassal was responsible to answer calls to military service on behalf of the lord. To cast aspersions on the intentions of a committee which has such eminent people like Vinod Rai and Ramachandra Guha as its members may not be fair, especially when one is aware of the roadblocks the state associations may be creating. Time to go back to the Supreme Court, I guess. Theoretically, an orderly is expected to help officers in maintenance and upkeep of uniform, answering telephone calls, attending to personal security and to run small errands. Vestiges of the Feudal system hung on in France until the French Revolution, and the system lingered on in parts of Central and Eastern Europe as late as the s. But Pakistan still has a long way to go before the feudal system is dismantled. In the bright side, the stronger your political base, the nearer you are to the people who pulls the strings. During homage, the lord and vassal entered into a contract in which the vassal promised to fight for the lord at his command, whilst the lord agreed to protect the vassal from external forces. The governments will come and go, but the bureaucracy remains untamed, so my bet would be on the police badesahibs having the last laugh. There were many varieties of feudal land tenureconsisting of military and non-military service. The vassal's principal obligation to the lord was to "aid", or military service. Karnataka had withdrawn it a few years before. In such a system wealth derived from agriculture, which was arranged not according to market forces but on the basis of customary labour services owed by serfs to landowning nobles. The change that is compatible with fast changing world is not compatible with the psyche and mentality of the ruling elites of whom mostly belongs to the feudal world. In such a system wealth derived from agriculture, which was arranged not according to market forces but on the basis of customary labour services owed by serfs to landowning nobles. The police selection, whether it is that of the constable or that of the elite Indian Police Service, is done to select the most capable for the job. The feudal mindset thrives on the lack of accountability. No one should ask any questions. All the high and mighty get together and share. The prevailing culture of feudal lordism in most parts of the country is an impediment to modernisation, viable social change. The change that is compatible with fast changing world is not compatible with the psyche and mentality of the ruling elites of whom mostly belongs to the feudal world. In the feudal mode, “the masses” — BackChannels finds the term itself degrading — may be controlled by disinformation, disingenuous information, framing, innuendo, rumor, and suspicion. In the modern mode, the curious and the reasoning of the public may sift and evaluate for strong information — valid, reliable, significant, and straight. Congress decision on LoP reflects feudal mentality, says MP BJP The faction riddled Congress has again given a chance to the ruling BJP raise the issue of caste politics after appointment of Ajay Singh Rahul has Leader of Opposition (Lop) by AICC on Thursday. Disclaimer: I do hereby disclaim all rights and responsibilities for the characters in this bit of whimsy especially for the good alpha. A nod of recognition is bent towards Rumiko Takahashi for her creative prowess. Chapter Feudal Mentality "I will come more often.". The adjective feudal was coined in the 17th century, and the noun feudalism, often used in a political and propaganda context, was not coined until the 19th century, from the French féodalité (feudality), itself an 18th-century creation.Feudal mentality
<urn:uuid:3969b7a2-31ad-4a35-8f62-5c51186d8a0f>
CC-MAIN-2020-34
https://lamorahafovyme.janettravellmd.com/feudal-mentality-17332hc.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740838.3/warc/CC-MAIN-20200815094903-20200815124903-00000.warc.gz
en
0.959116
1,616
2.859375
3
Singing and Shaping Tip Consonants Practicing consonant shapes gives you not only the precision you need to sing, but also the confidence that you’re putting your best tongue forward while articulating the tip consonants. You shape tip consonants with the tip of your tongue as it touches the alveolar ridge. If you slide your tongue along the roof of your mouth, you first feel your teeth, then a small section of gums, and then a ridge — the alveolar ridge. The only tip consonant sound not made on the alveolar ridge is TH, which is shaped with the tip of the tongue touching the upper front teeth. To sing a song, you take a breath, open the space in your throat and mouth, and then shape for the vowel and consonant. That’s a lot to do in the first moment of your song, and all these shapes continue as you sing through the words in your song. Until you’re confident that you can shape tip consonants without thinking about it, practice them. D, T, and S are the most commonly mispronounced tip consonants. D is often mistakenly pronounced like a T. Be sure to listen for the sound of your voice when you make the D. Practicing these shapes every day will help you quickly get the hang of tip consonants.
<urn:uuid:03306488-bfba-4b8b-982c-4089d8a11875>
CC-MAIN-2015-48
http://www.dummies.com/how-to/content/singing-and-shaping-tip-consonants.navId-811115.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398467979.1/warc/CC-MAIN-20151124205427-00346-ip-10-71-132-137.ec2.internal.warc.gz
en
0.916802
281
3.578125
4
|Sponsored by the HealthcareTrainingInstitute.org providing Quality Education since 1979| Ethical Issues in Counselor Preparation During training, counselors adopt a cognitive map of the counseling process and a related "psychology" of humanity. This worldview confirms and maintains the identity and self-esteem of the counselor. Powerful filters between the counselor and external reality are created to support this worldview. (Holiman & Lauver, 1987, p. 186) The most influential and powerful filter is a product of the counselor's own cultural background and experiences (Holiman & Lauver, 1987). Therefore, it comes as no surprise that counselors tend to identify clients who are culturally similar to themselves as the most desirable with which to work. Sue (1981) suggested that counselor preparation programs facilitate cultural encapsulation through "(a) the substitution of model stereotypes for the real world, (b) the disregarding of cultural variations in a dogmatic adherence to some universal notion of truth, and (c) the use of a technique oriented definition of the counseling process" (p. 5). Ponterotto and Benesch (1988) suggested that inefficiency in and criticism of multicultural preparation in counselor training programs discourages trainees from seeking proficiency in the cross cultural arena. Ponterotto and Benesch also contended that training programs, through misdirected emphasis on deviation instead of synthesis, arguably defeat the purpose of sensitizing counselors to multicultural perspectives. Palmo and Weikel (1986) recast the paradox: The gap between awareness, understanding, and knowledge, on the one hand, and behavior, on the other, has led to failure in counseling programs and ultimately to ineffective cross-cultural counseling experiences. (p. 131) The lack of relevancy in cross-cultural training programs may give birth to the tendency among counselors and trainees to avoid working with multicultural clients. Section H.8 of the Standards states, "Preparatory programs must encourage students to value the ideals of service to individuals and to society" (AACD, 1988). Because "society" represents a collection of culturally distinct groups and individuals, one can argue that some counselor training programs fail to live up to the ethical guidelines of the very profession they serve. The Standards of AACD should specifically define and reflect what the minimum multicultural training requirements and demonstrable competencies are (see Ponterotto & Casas, 1987). Ponterotto and Benesch (1988) went on to note that there are too many culturally distinct groups and too many intragroup variations in behavior for counselors and trainees to master and internalize. Such a task would be overwhelming. It is unrealistic to expect the majority of counselors to develop in-depth expertise in a specified (or minimum) number of cultures or social groups. This is not and should not be the aim of our ethical or professional approach to multicultural training. A reasonable and attainable goal is to indoctrinate mental health counselors with tools that allow for systematic identification, understanding, and accommodation of the unique needs of people from differing backgrounds and experiences. Although counselors must remain within the bounds of competence in the provision of services (see Section A.7 of the Standards), they also must strive to be available to and effective with a wide variety of human beings. Even as training programs adjust to impart multicultural skills to mental health counselors, individual commitment to and motivation for working with clients from diverse backgrounds may still be lacking. Weikel and Palmo (1989) describe professionals that "play at counseling" (p. 19) or otherwise display "halfhearted" (p. 19) investment in clients, professional growth, or the continuation of skills development. These same ethical concerns are easily discernible in the context of multicultural counseling. Too many professionals rely solely on personal strategies that are derived from limited experience or intuition. As a result, many clients are inadequately served. The final case vignette addresses the ramifications of such ethically questionable posturing. Connie has been a master's-level practitioner in a private setting for several years. As a beginning counselor in the community agencies, she had sometimes served people from different ethnic and sociocultural backgrounds. Often, they had been very poor. Connie remembers those as having been difficult cases. These days, regardless of ethnicity, the majority of Connie's clients are striving to be mainstream and middle class. Considering that her graduate program had not offered any training in cross cultural counseling, Connie is content with her own strategies for dealing with the occasional client from a foreign culture. Her ability to be empathic has certainly never been questioned. What would be the point of investing in formal multicultural training? besides, if competence really becomes an issue with a particular client, Connie can always make referrals. Drawing upon data gathered by inducing cultural disorientation in counselor trainees, Merta, Stringham, and Ponterotto (1988) accurately prescribed a remedy for training programs that are cross culturally deficient. To effectively serve the needs of professionals and clients, counselor training programs must provide both "in vivo exposure and behavioral interaction" (p. 242) with clients who are culturally distinct. Casas et al. (1986) responded to the suggestion that although the Standards do not detail specific guidelines for the preparation or delivery of optimal services to culturally unique persons, counselors are effectively able to infer, interpret, and concoct individualized strategies: The reality of the situation, however, is that most counselors have not been sufficiently prepared to be able to extrapolate the implicit guidelines automatically to racial and ethnic minority groups. Even if counselors have the proper intentions, they are not likely to have the basis for assessing ethical issues regarding these groups. (p. 348) The revised Standards still prove inadequate in addressing the specific ethical obligations of mental health counselors to culturally diverse clients. Before the profession can fully pursue the ideal of mental health through prevention and development, AACD and counselor training programs must cooperatively remediate the existing approach to multicultural preparation. Even if ethical constructs can be implied from the professional guidelines, the problems of variability in interpretation and apathy pose a significant danger to clients, counselors, and the integrity of the counseling profession. This review has emphasized the counselor's worldview as an influential variable in the provision of service. It has been suggested that the ethical guidelines regarding service to culturally unique clients be specifically defined to protect the interests of the client and the counselor (Pedersen & Marsella, 1982). The nonspecificity of the current Standards leads to considerable variability within the counseling profession and counselor training programs. As Pedersen and Marsella (1982) stated, "The ethical crisis relates to the practical application of abstract ethical formulations" (p. 499). The professional literature contains an abundant supply of strategies and proposals for defining specific ethical principles in regard to serving culturally unique clients. If the counseling profession truly aspires to meeting the needs of the heterogeneous groups that constitute "society," it must institute principles that facilitate thorough counselor training, thus maximizing the capacity to serve effectively. In the trek toward achieving parity and being recognized as viable "service providers," counselors must use proactive measures and be mindful of the obligation to support preventive mental health. The development and implementation of clear and specific cross-cultural ethical guidelines would be a significant step forward. Reflection Exercise #7 Ethics CEU QUESTION 14 Others who bought this Cross-Cultural Diversity Course CEU Continuing Education for Counselor CEUs, Psychologist CEUs, Social Worker CEUs, MFT CEUs
<urn:uuid:59abfc67-c52b-4bd5-9a53-24ebd68b8783>
CC-MAIN-2017-17
http://www.onlineceucredit.com/ceus-online/dbs-cultural-ethics-boundaries/secDBS14.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120844.10/warc/CC-MAIN-20170423031200-00169-ip-10-145-167-34.ec2.internal.warc.gz
en
0.926339
1,528
2.609375
3
International activists joined envoys from the United Nations and African Union in Senegal to “promote the adoption of a resolution that explicitly bans female genital mutilation as a practice that is contrary to human rights.” The cutting or removal of young girls’ and women’s clitoris and/or labia affects some 120 to 140 million women in 28 countries, mostly in Africa and the Middle East, according to the World Health Organisation. What Is Female Circumcision? Female genital cutting (FGC), also controversially known as female circumcision, female genital mutilation/cutting (FGM/C), or female genital mutilation (FGM), is any procedure involving the partial or total removal of the external female genitalia or other injury to the female genital organs “whether for cultural, religious or other non-therapeutic reasons.” The term is almost exclusively used to describe traditional or religious procedures on a minor, which requires the parents’ consent because of the age of the girl. When the procedure is performed on and with the consent of an adult it is generally called clitoridectomy, or it may be part of labiaplasty or vaginoplasty. It also generally does not refer to procedures used in gender reassignment surgery, and the genital modification of intersexuals. FGC is practiced throughout the world, with the practice concentrated most heavily in Asia and Africa. Opposition is motivated by concerns regarding the consent (or lack thereof, in most cases) of the patient, and subsequently the safety and long-term consequences of the procedures. In the past several decades, there have been many concerted efforts by the World Health Organization (WHO) to end the practice of FGC. The United Nations has also declared February 6 as “International Day Against Female Genital Mutilation”. Sources: newsone.com and wikipedia
<urn:uuid:df16292e-abbe-4165-9fc7-7aee57b33b37>
CC-MAIN-2013-20
http://kissdetroit.com/302461/african-states-push-for-un-ban-of-female-circumcision/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00062-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943539
384
3.40625
3
- Name also: Scotch-asphodel, Scotch False Asphodel (USA) - Family: Bunchflower Family – Tofieldiaceae - Growing form: Perennial herb. Rootstock short, creeping. - Height: 8–20 cm (3.2–8 in.). - Flower: Regular (actinomorphic). Tepals 6 in 2 similar whorls, yellowish white–greenish. Stamens 6. Pistil partly fused, styles 3. Inflorescence a 5–20 mm (0.2–0.8 in.) long, dense, spike-like terminal raceme. Subtending bracts 3-lobed, yellowish white. - Leaves: Rosette, occasionally with 1–2 small stem leaves, stalkless. Blade sword-shaped, 2–3 mm broad, rigid, with entire margins, 3–7-veined. - Fruit: Quite elliptic, erect, greyish, approx. 3 mm long capsule comprised of 3 follicle-like parts - Habitat: Fens, minerotrophic bog, springs, stream and river banks, usually in peat. Also in damp, mossy rocks and nutritious fell heaths. - Flowering time: June-August. Scottish asphodel’s leaves grow to a maximum of 5 cm (2 in.) long and its flowering stem is around 10 cm (4 in.). Its maximum length is 20 cm (8 in.)when the capsule is already on the stem: after flowering the scape grows, dries and remains in that state throughout the winter. Its specific name pusilla means ’small’ in Latin, and characterises the species well. Scottish asphodel is a Holarctic plant, meaning that it grows in the northern hemisphere in Europe, Asia and North America. In Finland it is most abundant in Lapland. In central parts of the country it only grows in a few places because the moderately nutritious bogs that it has adapted to have been drained into fields. Scottish asphodel has been used in the past to identify peatland under the soil that that could be drained to make good fields. It likes calciferous soil, but remains small, often in the shade of other larger plants, in the most nutritious bogs. In suitable places it also thrives in dryish fell heaths and damp rock surfaces.
<urn:uuid:4d7ddf92-b836-4ba7-aa20-c05327414f55>
CC-MAIN-2014-42
http://www.luontoportti.com/suomi/en/kukkakasvit/scottish-asphodel
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646484.16/warc/CC-MAIN-20141024030046-00219-ip-10-16-133-185.ec2.internal.warc.gz
en
0.89269
507
2.75
3