text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
Separation of Willow Tit and Marsh Tit in Britain: a review Broughton, Richard K.. 2009 Separation of Willow Tit and Marsh Tit in Britain: a review. British Birds, 102 (November). 604-616.Full text not available from this repository. (Request a copy) Separation of the British races of Willow Tit Poecile montana and Marsh Tit P. palustris is notoriously difficult. Numerous identification criteria have been proposed during the past 50 years, based primarily on information gained from examination of birds in the hand, although none are judged to be wholly reliable.The best separation feature for birds in the field is considered to be voice, yet the vocal repertoires of both species have not been fully documented. Despite some work to assess the reliability of distinguishing characteristics, some current texts continue to place emphasis on discredited criteria for field identification, or on those of use only for in-hand examination. This paper reviews the separation criteria in the current literature in order to clarify the most important and reliable characters for the separation of this species pair. New information is provided from examination of skins and live birds, and on diagnostic vocalisations. A clarification of the races occurring in Britain is also provided. Recommendations are made for the key criteria to be used for field, photographic and in-hand identification, with a primary focus on voice, bill marks, cheek pattern, plus wing and tail measurements and the presence or absence of a clear wing panel. |Item Type:||Publication - Article| |Programmes:||CEH Programmes pre-2009 publications > Biodiversity > BD01 Conservation and Restoration of Biodiversity > BD01.1 Distributions and abundance of taxa CEH Topics & Objectives 2009 - 2012 > Biodiversity > BD Topic 1 - Observations, Patterns, and Predictions for Biodiversity > BD - 1.1 - Standards for data collection, quality, management and integration ... |Additional Pages:||online sound files at www.britishbirds.co.uk/sounds.htm| |Additional Keywords:||Marsh Tit, Willow Tit, Poecile palustris, Poecile montana, identification| |NORA Subject Terms:||Zoology Ecology and Environment |Date made live:||09 Nov 2009 14:30| Actions (login required)
<urn:uuid:89198d0d-1a13-4888-83d0-e35215239673>
CC-MAIN-2016-50
http://nora.nerc.ac.uk/8431/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543315.68/warc/CC-MAIN-20161202170903-00015-ip-10-31-129-80.ec2.internal.warc.gz
en
0.852332
487
2.671875
3
Qn 0. [George Costanza qn] Consider two learners that are trying to solve the same classification problem with two classes (+ and -). L1 seems to be averaging about 50% accuracy on the test cases while L2 seems to be averaging 25% accuracy. Which learner is good? Why is this called the George Costanza question? ;-) Qn 1. Consider a scenario where the training set examples have been labeled by a slightly drunk teacher--and thus they sometimes have wrong labels (e.g. +ve are wrongly labelled negative etc.). Of course, for the learning to be doable, the percentage of these mislabelled instances should be quite small. We have two learners, L1 and L2. L1 seems to be 100% correct on the *training* examples. L2 seems to be 90% correct on the training examples. Which learner is likely to do well on test cases? Qn 2. Compression involves using the pattern in the data to reduce the storage requirements of the data. One way of doing this would be to find the rule underlying the data, and keep the rule and throw the data out. Viewed this way, compression and learning seem one and the same. After all, learning too seems to take the training examples, find a hypothesis ("pattern"/"rule") consistent with the examples, and use that hypothesis instead of the training examples. What, if any, differences do you see between Compression and Learning? Qn 3. We said that most human learning happens in the context of prior knowledge. Can we view prior knowledge as a form of bias? In particular, can you say that our prior knowledge helps us focus on certain hypotheses as against other ones in explaining the data? Qn 4. We test the effectiveness of a learner on the test cases. Obviously, the test can be made "unfair" in that the test examples are somehow unconnected with training examples. One way of ensuring fairness, the the learner would love, is to pick a subset of training examples and give them back as test examples. (This is like your good old grade school days where the teacher would give "review" sheet and the exam will ask a subset of questions from the review sheet). Obviously, this makes the test a litle too dull (from the sadistic teacher's point of view). A way of ensuring fairness that the teacher would love is to actually give test cases that have not been seen in the training cases (e.g. set exams that don't just repeat homework questions). However, it is too easy to get into unfair tests this way. ***What is the most general restriction you can put on the test so that it is considered "FAIR"? Can you argue that your definition works well with your gut feelign about "fair" vs. "unfair" exams/tests? (Anecdote on "unfair tests": When my wife took a class on algorithms and complexity in her UofMD days, the teacher--who I won't name--spent one class at the end of the semester on NP-completeness proofs, and set the entire final exam on NP-completeness proofs. She never realized how riled up she was about this until she met another student from the same class, who is a faculty member at Duke at a DARPA meeting 15 years later--and found themselves talking about the sheer unfairness of the test in the first couple of seconds. Apparently we remember unfair tests quite well ;-). that is all for now.
<urn:uuid:6a08b980-09a1-42e3-b32c-1e3c1c7077db>
CC-MAIN-2017-43
http://cse471-f07.blogspot.com/2007/11/thinking-cap-on-learning-may-be-last-or_26.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823260.52/warc/CC-MAIN-20171019084246-20171019104246-00626.warc.gz
en
0.963357
735
2.890625
3
Mixed-signal integrated circuit A mixed-signal integrated circuit is any integrated circuit that has both analog circuits and digital circuits on a single semiconductor die. In real-life applications mixed-signal designs are everywhere, for example, a smart mobile phone. However, it is more accurate to call them mixed-signal systems. Mixed-signal ICs also process both analog and digital signals together. For example, an analog-to-digital converter is a mixed-signal circuit. Mixed-signal circuits or systems are typically cost-effective solutions for building any modern consumer electronics applications. A mixed-signal system-on-a-chip (AMS-SoC) can be a combination of analog circuits, digital circuits, intrinsic mixed-signal circuits (like ADC), and embedded software. Integrated circuits (ICs) are generally classified as digital (e.g. a microprocessors) or analog (e.g. an operational amplifier). Mixed-signal ICs are chips that contain both digital and analog circuits on the same chip. This category of chip has grown dramatically with the increased use of 3G cell phones and other portable technologies. Mixed-signal ICs are often used to convert analog signals to digital signals so that digital devices can process them. For example, mixed-signal ICs are essential components for FM tuners in digital products such as media players, which have digital amplifiers. Any analog signal (such as an FM radio transmission, a light wave or a sound) can be digitized using a very basic analog-to-digital converter, and the smallest and most energy efficient of these would be in the form of mixed-signal ICs. Mixed-signal ICs are more difficult to design and manufacture than analog-only or digital-only integrated circuits. For example, an efficient mixed-signal IC would have its digital and analog components share a common power supply. However, analog and digital components have very different power needs and consumption characteristics that make this a non-trivial goal in chip design. Typically, mixed-signal chips perform some whole function or sub-function in a larger assembly such as the radio subsystem of a cell phone, or the read data path and laser sled control logic of a DVD player. They often contain an entire system-on-a-chip. Examples of mixed-signal integrated circuits include data converters using delta-sigma modulation, analog-to-digital converter/digital-to-analog converter using error detection and correction, and digital radio chips. Digitally controlled sound chips are also mixed-signal circuits. With the advent of cellular technology and network technology this category now includes cellular telephone, software radio, LAN and WAN router integrated circuits. Because of the use of both digital signal processing and analog circuitry, mixed-signal ICs are usually designed for a very specific purpose and their design requires a high level of expertise and careful use of computer aided design (CAD) tools. Automated testing of the finished chips can also be challenging. Teradyne, Keysight, and Texas Instruments are the major suppliers of the test equipment for mixed-signal chips. The particular challenges of mixed signal include: - CMOS technology is usually optimal for digital performance and scaling while bipolar transistors are usually optimal for analog performance, yet until the last decade it has been difficult to either combine these cost-effectively or to design both analog and digital in a single technology without serious performance compromises. The advent of technologies like high performance CMOS, BiCMOS, CMOS SOI and SiGe have removed many of the compromises that previously had to be made. - Testing functional operation of mixed-signal ICs remains complex, expensive and often a "one-off" implementation task. - Systematic design methodologies comparable to digital design methods are far more primitive in the analog and mixed-signal arena. Analog circuit design can not generally be automated to nearly the extent that digital circuit design can. Combining the two technologies multiplies this complication. - Fast-changing digital signals send noise to sensitive analog inputs. One path for this noise is substrate coupling. A variety of techniques are used to attempt to block or cancel this noise coupling, such as fully differential amplifiers, P+ guard-rings, differential topology, on-chip decoupling, and triple-well isolation. - Atari POKEY - MOS Technology SID - PSoC – Cypress PSoC Programmable System on Chip - Silego Technology Inc. - System to ASIC - Texas Instruments' MSP430 - Triad Semiconductor - Wolfson Microelectronics Most modern radio and communications use mixed signal circuits. - Saraju Mohanty, Nanoelectronic Mixed-Signal System Design, McGraw-Hill, 2015, ISBN 978-0071825719 and 0071825711. - "Mixed-Signal IC Design". quote: "mixed-signal (IC's with mixed analog and digital circuits on a single chip)" - Mark Burns and Gordon W. Roberts, "An Introduction to Mixed-Signal IC Test and Measurement", 2001. - "ESS Mixed Signal Circuits" - "Fully differential current-input CMOS amplifier front-endsuppressing mixed signal substrate noise for optoelectronic applications" by Chang, J.J.; Myunghee Lee; Sungyong Jung; Brooke, M.A.; Jokerst, N.M.; Wills, D.S. 1999 - "Substrate noise issues in mixed-signal chip designs using Spice" by Singh, R.; Sali, S. 1997 - "Mixed-Signal IC Merges 14-Bit ADC With DSP In 0.18-μm CMOS"
<urn:uuid:89da8fe0-1df2-4060-8b60-58be3d1aac21>
CC-MAIN-2017-22
https://en.wikipedia.org/wiki/Mixed-signal_integrated_circuits
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607813.12/warc/CC-MAIN-20170524112717-20170524132717-00461.warc.gz
en
0.869463
1,215
3.765625
4
|Marine Resource Fact Sheet| |Pelagic Redfish - Barents and Norwegian Seas| |Beaked Redfish (Sebastes mentella) in Subareas I and II| |FAO Names: en - Beaked redfish, fr - Sébaste du Nord, es - Gallineta nórdica, ru - Клювач| |Considered a single stock: Yes Spatial Scale: Sub-Regional| Management unit: Yes Reference year: 2012 Habitat and Biology Depth zone: Shelf (50 m - 200 m). Vertical distribution: Demersal/Benthic. This species is long-lived (maximum age 75 years), and inhabits pelagic and epibenthic habitats from 300 to 1400 m in the North Atlantic. The male and female aggregate to mate; the female releases live larvae (ovoviviparous) along the continental slope from 62°N to 74°N during March–April. The size and age at first maturity (50%) are 31 cm and 11 years. Larvae are pelagic and drift northward along the continental slope in the surface layers and eventually disperse over the shelf in the Barents Sea. The juveniles are predominantly distributed in the Barents Sea and Svalbard areas. Adults are widely distributed on the shelf, slope, and the open ocean, but south of 69°N hardly on the shelf. Jurisdictional distribution: Shared between nations Water Area Overview Spatial Scale: Sub-Regional Ecoregion: Barents Sea. Considered a single stock: Yes A pelagic fishery for S. mentella has developed in the Norwegian Sea outside EEZs since 2004. This fishery is managed by the North-East Atlantic Fisheries Commission (NEAFC) who, by consensus, adopted a TAC for 2012 of 7500 t. Other catches of S. mentella are taken as bycatches in the demersal cod/haddock/Greenland halibut fisheries, as juveniles in the shrimp trawl fisheries, and occasionally in the pelagic blue whiting and herring fisheries in the Norwegian Sea. |Catch distribution ||Total landings (2011) = 12.4 kt, of which 67% is taken by pelagic trawl in international waters in the Norwegian Sea and 33% as bycatch in the Barents Sea and adjacent waters. | ICES advises on the basis of the MSY approach that a commercial fishery can operate on Sebastes mentella in Subareas I and II, given that the total catch level, including bycatches and discards, does not exceed 47 000 tonnes. Measures currently in place to protect juveniles have proven successful and should be maintained. Assessment ModelScientific basis |Assessment type ||Statistical catch-at-age 1992–2011. The Gadget model and the Schaefer biomass model are used in addition. | |Input data ||Catch numbers-at-age from the pelagic and demersal fleets and numbers-at-age from three surveys in the Barents Sea (BS-NoRu-Q1-Btr, Eco-NoRu-Q3-Btr, Ru-Q4-Btr). | |Discards and bycatch ||Not available. | |Indicators ||Additional information from the Norwegian Sea pelagic surveys, international 0-group survey in Barents Sea (Eco-NoRu-Q3), and Norwegian Sea slope surveys. Cod consumption on juveniles (BS-NoRu-Q1-Btr, Eco-NoRu-Q3-Btr, Ru-Q4-Btr). | |Other information ||Last benchmark was in February 2012 (ICES, 2012b). Assessment methodology has been revised. | |Working group report ||AFWG (ICES, 2012a) | Management unit: YesManagement plans No specific management objectives have so far been implemented. Biological State and Trend |Figure 22.214.171.124 | Spawning-stock biomass has steadily increased from 1992 to 2005. Due to poor year classes during the period 1996–2003, the spawning-stock biomass is decreasing. Source of information The above excerpts are from the first two pages of the ICES advice, the supporting information to this advice can be read in full at the following reference: ICES. Beaked redfish (Sebastes mentella) in Subareas I and II. Report of the ICES Advisory Committee, 2012. ICES Advice, June 2012. http://www.ices.dk/committe/acom/comwork/report/2012/2012/smn-arct.pdf
<urn:uuid:477f4444-7064-4700-94cf-b7ccca714be1>
CC-MAIN-2016-18
http://firms.fao.org/firms/resource/10332/en
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860113553.63/warc/CC-MAIN-20160428161513-00147-ip-10-239-7-51.ec2.internal.warc.gz
en
0.859648
1,000
2.796875
3
Canalith Repositioning Maneuver (Vertigo Treatment) Canalith repositioning maneuvers are used in the treatment of vertigo. Vertigo is often caused by an inner ear problem. One of the most common causes of vertigo is Benign Paroxysmal Positional Vertigo. Benign Paroxysmal Positional Vertigo (BPPV) occurs when small particles of calcium carbonate (also referred to as “canaliths”) clump up in canals of the inner ear. The function of the inner ear is to communicate with the brain about head and body movements relative to gravity, which helps a person keep balance. Displaced canalith sends false signals tot he brain, causing dizziness and vertigo symptoms. The canalith repositioning maneuver moves the displaced canaliths to stop the enervating symptoms of dizziness and vertigo. Before the Procedure Your doctor will provide personalized instructions before the procedure. Typically, no special preparations are required for the maneuver. It is suggested that patients wear nonrestrictive clothing so that you are able to move freely during the maneuvers. During the Procedure Your health care provider will help you through several positions that will be held for a period of time. Positions may be repeated within a treatment session. Some sessions may include the use of an imaging device over your eyes based on your needs and your doctor’s discretion. During the procedure you can expect: • Moving from a seated position to a reclined position. Your doctor or technician will help you to position your head at the appropriate angle. • From the previous position you will be guided to turn your head to a 90 degree angle. • Your doctor or technical will help you to roll onto your stomach, and turn your head to a new angle. • You will be returned to a seated position. These maneuvers may be repeated during the session. After the treatment, you will be required to keep your head above shoulder level, including while sleeping. Your doctor will give you specialized instructions about how what symptoms to monitor and how to check to see if the procedure worked. You may be given additional exercises to do at home.
<urn:uuid:9efb680c-676a-4b35-bfad-6043ef5dc444>
CC-MAIN-2019-35
https://caymanneurologist.com/canalith-repositioning-maneuver-vertigo-treatment/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313715.51/warc/CC-MAIN-20190818062817-20190818084817-00016.warc.gz
en
0.918826
449
2.59375
3
If you have ever read advanced textbooks or papers about electronics, you may have been surprised to see the use of complex numbers used in the analysis of AC circuits. A complex number has two parts: a real part and an imaginary part. I’ve often thought that a lot of books and classes just kind of gloss over what this really means. What part of electricity is imaginary? Why do we do this? The short answer is phase angle: the time delay between a voltage and a current in a circuit. How can an angle be a time? That’s part of what I’ll need to explain. First, consider a resistor. If you apply a voltage to it, a certain current will flow that you can determine by Ohm’s law. If you know the instantaneous voltage across the resistor, you can derive the current and you can find the power–how much work that electricity will do. That’s fine for DC current through resistors. But components like capacitors and inductors with an AC current don’t obey Ohm’s law. Take a capacitor. Current only flows when the capacitor is charging or discharging, so the current through it relates to the rate of change of the voltage, not the instantaneous voltage level. That means that if you plot the sine wave voltage against the current, the peak of the voltage will be where the current is minimal, and the peak current will be where the voltage is at zero. You can see that in this image, where the yellow wave is voltage (V) and the green wave is current (I). See how the green peak is where the yellow curve crosses zero? And the yellow peak is where the green curve crosses zero? These linked sine and cosine waves might remind you of something — the X and Y coordinates of a point being swept around a circle at a constant rate, and that’s our connection to complex numbers. By the end of the post, you’ll see it isn’t all that complicated and the “imaginary” quantity isn’t imaginary at all. If you catch a grizzled old radio amateur propping up the bar in the small hours, you will probably receive the gravelly-voiced Wisdom of the Ancients on impedance matching, antenna tuners, and LC networks. Impedance at RF, you will learn, is a Dark Art, for which you need a lifetime of experience to master. And presumably a taste for bourbon and branch water, to preserve the noir aesthetic. It’s not strictly true, of course, but it is the case that impedance matching at RF with an LC network can be something of a pain. You will calculate and simulate, but you will always find a host of other environmental factors getting in the way when it comes down to achieving a match. Much tweaking of values ensues, and probably a bit of estimating just how bad a particular voltage standing wave ratio (VSWR) can be for your circuit. An exciting development over the last few years has been the arrival of extremely cheap instrumentation modules easily bought online and usually shipped from China. Some of them have extremely impressive paper specifications for their price, and it was one of these that caught the eye of [Carol Milazzo, KP4MD]. A frequency counter for under $14 on your favourite online retailer, and with a claimed range of 500 MHz. That could be a useful instrument in its own right, and with a range that significantly exceeds the capabilities of much more expensive bench test equipment from not so long ago. Just how good is it though, does it live up to the promise? [Carol] presents the measurements she took from the device, so you can see for yourselves. She took look at sensitivity, VSWR, and input impedance over a wide range, after first checking its calibration against a GPS-disciplined standard and making a fine adjustment with its on-board trimmer. In sensitivity terms it’s a bit deaf, requiring 0.11 Vrms for a lock at 10 MHz. Meanwhile its input impedance decreases from 600 ohms at the bottom of its range to 80 ohms at 200 MHz, with a corresponding shift in VSWR. So it’s never going to match a high-end bench instrument from which you’d expect much more sensitivity and a more stable impedance, but for the price we’re sure that’s something you can all work around. Meanwhile it’s worth noting from the pictures she’s posted that the board has unpopulated space for an SPI interface header, which leaves the potential for it to be used as a logging instrument. We think it’s worth having as much information as possible about components like this one, both in terms of knowing about new entrants to the market and in knowing their true performance. So if you were curious about those cheap frequency counter modules, now thanks to [Carol] you have some idea of what they can do. If you’ve worked with radios or other high-frequency circuits, you’ve probably noticed the prevalence of 50 ohm coax. Sure, you sometimes see 75 ohm coax, but overwhelmingly, RF circuits work at 50 ohms. [Microwaves 101] has an interesting article about how this became the ubiquitous match. Apparently in the 1930s, radio transmitters were pushing towards higher power levels. You generally think that thicker wires have less loss. For coax cable carrying RF though, it’s a bit more complicated. First, RF signals exhibit the skin effect–they don’t travel in the center of the conductor. Second, the dielectric material (that is, the insulator between the inner and outer conductors) plays a role. The impedance is also a function of the dielectric material and the diameter of the center conductor. We have no intention of wading into the vacuum tube versus silicon debates audiophiles seem to thrive on. But we know a quality build when we see it, and this gorgeous tube preamp certainly looks like it sounds good. The amp is an attempt by builder [Timothy Cose] to give a little something back to the online community of vacuum tube aficionados that guided him in his journey into the world of electrons under glass. Dubbed a “Muchedumbre” – Spanish for “crowd” or “mob”; we admit we don’t get the reference – the circuit is intended as a zero-gain preamp for matching impedance between line level sources and power amplifiers. Consisting of a single 12AU7 in a cathode-follower design and an EZ81 for rectification, where the amp really shines is in build quality. The aluminum and wood chassis looks great, and the point-to-point wiring is simple and neat. We especially appreciate the neatly bent component leads and the well-dressed connections on the terminal strips and octal sockets. There’s a nice photo gallery below with shots of the build. Seeing what’s going on inside a human body is pretty difficult. Unless you’re Superman and you have X-ray vision, you’ll need a large, expensive piece of medical equipment. And even then, X-rays are harmful part of the electromagnetic spectrum. Rather than using a large machine or questionable Kryptonian ionizing radiation vision, there’s another option now: electrical impedance tomography. [Chris Harrison] and the rest of a research team at Carnegie Mellon University have come up with a way to use electrical excitation to view internal impedance cross-sections of an arm. While this doesn’t have the resolution of an X-ray or CT, there’s still a large amount of information that can be gathered from using this method. Different structures in the body, like bone, will have a different impedance than muscle or other tissues. Even flexed muscle changes its impedance from its resting state, and the team have used their sensor as proof-of-concept for hand gesture recognition. This device is small, low power, and low-cost, and we could easily see it being the “next thing” in smart watch features. Gesture recognition at this level would open up a whole world of possibilities, especially if you don’t have to rely on any non-wearable hardware like ultrasound or LIDAR. Standing waves are one of those topics that lots of people have a working knowledge of, but few seem to really grasp. A Ham radio operator will tell you all about the standing wave ratio (SWR) of his antenna, and he may even have a meter in the shack to measure it. He’ll know that a 1.1 to 1 SWR is a good thing, but 2 to 1 is not so good. Ask him to explain exactly what a standing wave is, though, and chances are good that hands will be waved. But [Allen], a Ham also known as [W2AEW], has just released an excellent video explaining standing waves by measuring signals along an open transmission line. To really understand standing waves, you’ve got to remember two things. First, waves of any kind will tend to be at least partially reflected when they experience a change in the impedance of the transmission medium. The classic example is an open circuit or short at the end of an RF transmission line, which will perfectly reflect an incoming RF signal back to its source. Second, waves that travel in the same medium overlap each other and their peaks and troughs can be summed. If two waves peak together, they reinforce each other; if a peak and a trough line up, they cancel each other out.
<urn:uuid:78195cf5-2436-4dbf-9f62-9b6dff850d1c>
CC-MAIN-2017-34
http://hackaday.com/tag/impedance/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102757.45/warc/CC-MAIN-20170816231829-20170817011829-00713.warc.gz
en
0.945427
2,015
3.703125
4
The county of Los Angeles may not like this distinction, but environmental engineer John Novak says the sludge from this area of California has the worst odor of any he has ever tested. A walk inside his laboratory, sealed-off from other testing facilities on the Virginia Tech campus, produces instant agreement. "This county can haul its sludge hundreds of miles into the desert, and it still gets complaints," Novak smiles. On the East Coast, a $400 million sludge handling system, slated to be built along the Potomac River by the Washington D.C. Water and Sewer Authority by 2010, may not be able to completely thwart the odor problems if it uses current technology. Novak, the Nick Prillaman Professor of Civil and Environmental Engineering, is working with both localities, as well as others, to identify better processes for the destruction of organic solids and the elimination of disease causing organisms in biosolids. Any time a treatment plant works with water or wastewater, sludge is generated. And twice a week, Novak's lab receives two shipments of the processed solids from the sewage. Novak laughingly admits that if "a package stinks, it belongs to me." "Biosolids management is one of the most important aspects of wastewater treatment because of economic and health and safety issues," Novak says. "The cost of biosolid treatment and hauling is a major expenditure for wastewater treatment utilities. Pathogens and odor problems may restrict the biosolid disposal options and affect hauling costs." Biosolids applied to land in the form of fertilizer can also impact ground water quality, primarily through nitrogen contamination. Novak's approach to reduce the volatility of waste and to remove nitrogen from the process differs from some of the previously tried techniques. His work is based in part on some successful treatments of wastewater where a sequential anaerobic and aerobic digestion, called a dual-digestion process, is used. "Recent studies suggest that some solids in sludge are degraded only during the anaerobic digestion and some only during the aerobic digestion treatments," Novak explains. "Therefore, a dual digestion, using both anaerobic and aerobic treatments would be expected to provide a reduction in the volatile solids beyond that achieved when using only one of the processes." His initial studies indicate that his theory is correct. The dual treatment achieved up to a 65 percent volatile solids reduction, compared to 46 and 52 percent when using one of the single anaerobic digestion processes. His studies also showed that more than 50 percent of the nitrogen and 80 percent of the ammonia can be removed from anaerobic effluent after digesting it aerobically. He reported his findings at the 2006 Residuals and Biosolids Management Conference in Cincinnati, Ohio. Novak has also investigated the role that two specific metals, iron and aluminum, play in odor coming from sludge treated anaerobically. Working with researchers from Carollo Engineers and CH2M-Hill, they used a centrifuge simulation method developed at Virginia Tech to anaerobically digest a blend of primary and waste activated sludge from 12 different wastewater treatment plants. Their findings indicated that aluminum reduced the odor potential for sludges that were high in iron. The Water and Environmental Research Foundation has supported Novak's research on odors from sludges since 2000, As he conducted his studies, the 35-year veteran of water, sludge, solid and hazardous waste treatments, has learned that some new technologies are partially responsible for an increase in odors. "In recent years, companies started selling sludge dewatering systems that consist of new centrifuges that reduce the amount of water in the process, thus reducing costs," Novak says. However, the odor increases. A $600,000 facility in Charlotte, N.C., with the more recently developed centrifuge technology is an example of a new plant hearing complaints about its foul aroma. "The production of odors from sludges is a complex biochemical process," Novak says. "Odors, primarily from organic sulphur compounds, can be produced from anaerobically digested dewatered sludge cakes, especially when high solids centrifuges are used for dewatering. Even when digestion is effective, centrifugation can generate headspace concentrations of total volatile organic sulphur that are quite high and likely to cause odor problems." If odors remain a problem, the dewatering process may need to be changed, Novak asserts. The College of Engineering at Virginia Tech is internationally recognized for its excellence in 14 engineering disciplines and computer science. The college's 5,500 undergraduates benefit from an innovative curriculum that provides a "hands-on, minds-on" approach to engineering education, complementing classroom instruction with two unique design-and-build facilities and a strong Cooperative Education Program. With more than 50 research centers and numerous laboratories, the college offers its 1,800 graduate students opportunities in advanced fields of study such as biomedical engineering, state-of-the-art microelectronics, and nanotechnology. Virginia Tech, the most comprehensive university in Virginia, is dedicated to quality, innovation, and results to the commonwealth, the nation, and the world. Cite This Page:
<urn:uuid:6671de2d-d626-4bf9-a2a7-c36216fb2e8a>
CC-MAIN-2016-07
http://www.sciencedaily.com/releases/2007/01/070102101004.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701145519.33/warc/CC-MAIN-20160205193905-00109-ip-10-236-182-209.ec2.internal.warc.gz
en
0.943627
1,089
3.171875
3
As most migratory birds head south for the winter, flocks of tundra swans make their way to northeastern North Carolina each year in order to take advantage of the hospitable climate and bountiful food supply. Around 65,000-75,000 swans fly to Currituck County each fall, and these swans populate the Currituck Sound and surrounding fields, giving waterfowl hunters in North Carolina a chance to take home these beautiful trophy birds. North Carolina swan hunting produces more successful tundra swan hunting excursions than any other state, with most hunting lodges or associations guaranteeing a hunting success on all guided hunting runs. Swan hunting is also popularly combined with other waterfowl hunting. Swan and goose hunting can be done over fields, while swan and duck hunting works well around the marshy Currituck Sound. Over 20,000 acres of land are available for Currituck swan hunting. There are 5,000 permits available at the end of the summer, and interested North Carolina hunters or non-resident hunters can receive their permit by being chosen from the lottery system. To apply for your North Carolina swan hunting permit, visit the North Carolina Wildlife Resources Commission.
<urn:uuid:41a6760a-e823-4e7a-ab4a-6a398ad77069>
CC-MAIN-2023-06
https://www.visitcurrituck.com/places/swan-hunting/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00601.warc.gz
en
0.896447
250
2.609375
3
The Importance of GALVANIC THE GILBERTS IN AMERICAN STRATEGY To American planners, the capture of bases in the Gilberts marked the beginning of a major effort against Japan, the type of offensive outlined in the ORANGE Plans. The loss of Tarawa, Apamama, Makin, Abaiang, Marakei, and Maiana Atolls did not cripple the enemy, for GALVANIC had not been designed to do so. Although Admirals King and Nimitz believed that a victory in the Marshalls would be more damaging to the enemy than the conquest of the Gilberts, geographical considerations plus slender military resources forced them to strike first at the Gilberts. Both Nimitz, who was willing to undertake any operation that had "a reasonable prospect of success," and King, who was willing to accept "very considerable calculated risks," refused to plunge blindly into the mandated islands.1 Not until bombers and photographic planes had penetrated the Marshalls were the American naval leaders willing to risk the ships and men necessary for amphibious operations in that area. The capture of airfield sites in the Gilberts brought the Marshalls within more effective range of land-based planes and enabled the Navy to launch its westward drive. "This operation," commented Nimitz, "is considered to have been highly successful. Island bases essential to our advance across the Pacific were captured from the enemy with the complete destruction of all his defending forces."2 As a result of GALVANIC, the Army Air Forces gained four new airfields from which to launch strikes at targets in the Marshalls. At Tarawa, a 6,000-foot runway was built on Betio, while 7,000 and 4,000-foot runways were constructed on Buota. On 15 December, the first bombers, twin-engine B-25s (North American Mitchells), arrived at Tarawa, but neither of the two atoll bases was then ready to handle its full complement of planes. As the year 1944 arrived, heavy B-24s began flying bombing and reconnaissance missions from Tarawa. In spite of swamps and soft ground, a 7,000-foot flight strip was finished at Makin early in January. Because this runway was built on sand rather than coral, it could not support the weight of B-24s. The Apamama facility, completed by 15 January, boasted 7,000 feet of hard coral surface ideally suited to heavy bombers.3 Although the bases gained as a result of GALVANIC were in themselves important, far more valuable was the experience amassed by American Army, Navy, and Marine Corps commanders. By capturing Betio Island, the men of the 2d Marine Division had proven that Marine Corps amphibious doctrine was essentially sound. Although the casualty list shocked the American public, the operation was nonetheless a success, for the capture of Makin, Tarawa, and four lesser atolls had neutralized the entire Gilberts group and advanced American might across some 700 miles of ocean. Because the loss of life was confined to so short a period, the impact on civilian morale was especially severe. Almost unnoticed was the possibility that a land campaign over a similar distance, even though comparatively few men fell each day, might in the end prove more costly than a violent but brief assault from the sea. GALVANIC, moreover, did show means by which losses could be reduced in future amphibious operations. Because Betio was to be taken by a previously specified number of men in what was expected to be a brief but furious battle, corps personnel officers were not concerned with a replacement system, which would be needed in a campaign of longer duration. Routine administration, however, had to be carried on as usual, and at Betio personnel accounting proved a difficult task. Breakdowns in communications, plus the hectic tempo of the fighting prevented the 2d Marine Division from checking each day on the number of able-bodied men in its ranks. Summaries of casualties and prisoners taken were submitted to VAC immediately after the action, but the confusion of reembarkation resulted in incomplete and inaccurate returns. To provide more thorough statistics in future operations, VAC urged that periodic G-1 reports be submitted as promptly as possible. At Butaritari, where 27th Infantry Division headquarters was rapidly established ashore, two periodic reports of losses were prepared. Details of the Apamama venture, however, remained unknown to Holland Smith's G-1 section. No reports were submitted by VAC Reconnaissance Company until the unit returned to Hawaii. Although GALVANIC represented a greater concentration of naval might than any previous effort against the Japanese, the size of the expeditionary force was limited by the number of transports and trained men available in the Central Pacific area. The 2d Marine Division, the only experienced amphibious division that could be assigned to the Gilberts expedition, was given the mission of capturing Tarawa. In order to lessen the risk of loss of valuable ships, the Marines had to assault Betio before landing elsewhere in that atoll. Had the American fleet been strong enough to accept the possible loss of several transports or warships, the assault force could have risked prolonging the action by first seizing islands near Betio and emplacing field artillery to support the storming of the principal objective. In addition, one Marine regiment had to be retained in corps reserve, thus leaving only two regiments at the disposal of the commanding general of the division. In brief, circumstances forced upon Julian Smith a plan that called for the direct assault by an understrength division against a heavily fortified objective. Although he later was able to employ his third regiment, he could not count on its use and had to rely on aerial and naval bombardment to make up for what he lacked in numbers. The lesson was clear. In assessing operations to seize the atoll, Admiral Nimitz wrote: "Under present conditions, it is necessary to plan for the employment of not less than one division for the capture of an enemy position comparable in strength to Tarawa."5 Compared to the defending garrison, the force assigned to capture Butaritari was of overwhelming strength. Yet, in the opinion of both Admiral Turner and General Holland Smith, the might of this reinforced regiment could not be dissipated in secondary landings on neighboring islands until Butaritari had been won. After the fall of the major objective was certain, the possible need for further reinforcements at Betio kept General Ralph Smith from employing his reserve battalion as he desired. Not until victory at Betio was assured, could the Army general carry out his plan to trap the remnants of the Makin garrison by landing troops on Kuma Island. The operations against the Gilberts were the most damaging blows that could be struck against the enemy with the resources then available to Admiral Nimitz. The expedition, no more than equal to its task, was the largest that could have been mounted in the fall of 1943. The GALVANIC force, in comparison to expeditions sent forth later in the war, was small, but these few troops were able to shatter Japanese power in the Gilberts and open the way into the Marshalls. American intelligence officers, working from photographs taken by submarine and aircraft, were able to locate almost all of the enemy's defensive installations before the operation got underway. If anything, the interpretation of these photos was too cautious, for several dummy gun emplacements on Butaritari were listed as containing actual weapons. Intelligence specialists, however, failed to foresee the adverse conditions off the beaches at Butaritari. Although the unexpected boulders and coral outcropping there, together with unforeseen tides, complicated the unloading of men and supplies, these conditions had little effect on the assault landings. A greater number of oblique photos, taken at irregular hours over a period of several days, might have given a clearer indication of Betio's regular tides, but no available information could have plotted the freak dodging-tide that occurred on D-Day. When traders and British colonial administrators familiar with the Gilberts failed to agree on tidal conditions, American officers were forced to use a concensus estimate in order to prepare their carefully drawn landing plans. While General Julian Smith felt there was one chance in two that standard landing craft would be able to cross the reef at Betio, he approved a plan that envisioned "a tide that would not float our boats across the reef."6 More thorough photographic coverage would be needed in future amphibious undertakings, but only prolonged observation could give a hint of the course of eccentric tides. Another partial solution to the problem lay in the use of the Naval Combat Demolitions Units that had been organized prior to the invasion of Kiska. Although the six-man team destined for the Aleutians was inadvertently left behind at San Francisco, Admiral Turner felt that a similar team would have been valuable in destroying underwater obstacles off Betio. In the course of the Pacific war, these units, designated Underwater Demolitions Teams (UDTs), also were employed to collect last-minute information on the depth of water, approaches, and gradients off various objectives.7 During the 76-hour battle for Betio, there was little opportunity to collect, evaluate, and disseminate intelligence information. Most of the Japanese and Koreans preferred death to surrender, and the information provided by the few prisoners had no effect on the conduct of the fighting. At Butaritari, friendly natives confirmed preinvasion estimates of the size of the enemy garrison and its location. ln addition, villagers on Kuma Island provided an accurate count of the Japanese in the area, information which helped General Ralph Smith prevent the enemy from retreating along the atoll. Most of the intelligence gathered in the Gilberts, however, was applicable to future operations rather than to the situation at hand. After Betio was secured, Japanese language officers of the 2d Marine Division scoured the island in search of enemy documents. The most important find was a set of plans and specifications for some of the defenses encountered on the island. This document and the examination by engineers of shattered emplacements enabled the Americans to build sample blockhouses and test their durability. Such experiments led to improvements in naval gunfire techniques and infantry tactics in time for the Marshalls operation.8 Of the prisoners questioned by 2d Division intelligence specialists, only Ensign Kiyoshi Ota was able to provide valuable information. He testified that although air strikes had destroyed two or three protected installations, the men in shelters or covered fortifications were safe from both bombs and naval shells. In his opinion, naval gunfire had devastated antiaircraft emplacements, shattered communications, but failed to destroy concrete structures. The ensign, however, was impressed by the effective on-call fire delivered by destroyers posted in the lagoon. Since the building where Ota was stationed was destroyed by a tank-infantry team, his testimony indicated both the importance of coordination between infantry and armor as well as the need for a more accurate and powerful preparatory naval bombardment.9 COMMAND AND COMMUNICATIONS The command relationships decided upon for GALVANIC satisfied neither Holland Smith nor Ralph Smith. Before the expedition sailed, the Marine general had pointed out that, although nominally a corps commander, he had no troops under his tactical control. The Army general felt that, since he had not been free to alter his tactical plans without Admiral Turner's approval until after the naval officer had directed him to assume command ashore, the commander of the landing force was for the most part "a conduit for the issue of orders"10 by the assault force commander. Ralph Smith, however, was quick to admit that an amphibious operation was a type of combat in which the concern of the Navy for its ships might conflict with the scheme of maneuver ashore. Obviously, some sort of compromise was necessary. In the general's opinion, "the successful execution of an amphibious operation is dependent not on who or what component of the armed forces commands, but on the mutual confidence between all commanders and a comprehensive understanding of the problems faced by each."11 Apparently, there was no lack of confidence and understanding, for Turner's system of command was adequate to the situation at both major objectives. The difficulty in transmitting orders and information rather than any weakness in the command structure caused confusion and needless delay at both Makin and Tarawa. Because there was little opposition at the beaches of Butaritari, communications failures did not jeopardize the success of the 27th Infantry Division assault troops. Radio contact between ship and shore was reliable enough, but elements of the assault battalions at times had difficulty in exchanging messages.12 As a command ship for the Tarawa operation, the battleship Maryland proved an unhappy choice. Transmitters, receivers, and antennas, installed in a compact area, interfered with each other, severely hampering communication efficiency. In addition, the concussion from the 16-inch guns of the vessel ruined some of the more delicate pieces of radio equipment. Admiral Hill recommended that, as a temporary expedient, the number of radio channels in use be drastically reduced, but the problem of ship-to-shore communications could not be solved until specially designed command ships were introduced in the Central Pacific. The communications difficulties extended to transports and landing control craft as well. There was an evident need for better facilities, better trained control personnel, and a more systematic command setup. As a result of lessons learned, the transport group, and later the transport squadron commander, "was given a greatly enlarged staff and made responsible for ėtraffic control' off the beaches. With the better communications facilities made available to him, he was," in the words of the transport commander at Tarawa, "the logical one to be charged with this duty."13 Once ashore on Betio, the Marines continued to have communication troubles. Batteries in the MU radio, the handset carried by platoon leaders, wore out too quickly to suit the men who depended on these sets. Officers in the division complained that the TBX radios were susceptible to water damage, but VAC analysts held that the case containing the radio was watertight if assembled properly. Neither division nor corps, however, had a kind word for the TBY, and Admiral Hill's headquarters recommended that this piece of equipment be replaced by its Army equivalent. Waterproof bags or cartons also were needed to protect telephones and switchboards during the ship to shore movement. Because each used a different type of radio, contact between infantrymen and tank commanders was uncertain.14 The most important feature of the assaults upon Betio and Butaritari was the role of the amphibian tractor as an assault craft. Prior to GALVANIC, LVTs had been used to haul supplies from transports to dumps inland of the beaches, but the conquest of the Gilberts marked the first time that these vehicles had carried the first wave of troops. The tractors proved so successful in their new role that Holland Smith came to believe that LVTs were vital to the amphibious assault. As valuable as the tractors had been, they were not perfect. Greater speed, additional armor protection, and a ramp for discharging troops were the improvements suggested by VAC.15 At the time of GALVANIC, an armored amphibian tractor mounting a 37mm gun, the LVT(A), and an amphibious 21/2-ton truck, the DUKW, were in production. Even though neither of these types had undergone an adequate combat test,16 corps recommended that a battalion of armored tractors, two companies of the new DUKWs, and two battalions of ordinary LVTs be assigned each division in future assault landings.17 The fighting on Betio centered around pillboxes and shelters built of either steel and concrete or log and coral. Many of the flamethrowers which the Marines used so effectively against these installations had been made available by the Army Chemical Warfare Service detachment in Hawaii.18 In spite of the help of the Army, there were not enough flamethrowers at Betio, so VAC recommended that in the future one such weapon be assigned to each rifle platoon. In addition, the Army, Navy, and Marine Corps agencies in Hawaii began cooperating in the development of a flame-throwing tank. The Sherman tanks and the halftracks, which also mounted high-velocity 75mm guns, proved effective against the lighter Japanese installations. Because the 37mm guns of the light tanks could do little damage to prepared fortifications, Holland Smith's headquarters recommended that these vehicles be replaced by the heavier Shermans. Pack howitzers, which had to be wheeled into position by their crews, were not as effective in delivering direct fire against pillboxes as were the more maneuverable tanks and self-propelled guns. Demolitions had proved so deadly that corps recommended the issue of one demolitions kit to each rifle squad. Flamethrowers, demolitions, and armor had enabled Marine infantrymen to close with and kill the enemy by means of grenades and rifle fire. Grenades, in fact, were so valuable that VAC urged still greater emphasis on the offensive or concussion type. Perhaps the most important lesson learned was that the destruction of a Japanese garrison as skilfully entrenched as the defenders of Betio was a task that required teamwork as well as courage. Because units tended to become intermingled during the amphibious assault, individual Marines might find themselves commanded by a stranger. Under these adverse conditions, the riflemen had to fight as part of a hastily organized team. In the opinion of corps operations officers, this kind of teamwork could only result from the self-discipline, resourcefulness, and initiative of every unit leader. Leadership, then, would continue to be stressed in future training.19 ARTILLERY AND NAVAL GUNFIRE Had circumstances not forced him to do otherwise, General Julian Smith would have seized the islands adjacent to Betio, emplaced artillery on them, and shelled the main objective before attempting to storm it. The need to capture Betio as quickly as possible prevented him from landing elsewhere in the atoll prior to the principal assault, but a study of the operation indicated the soundness of the original idea. Although Holland Smith's headquarters had no choice but to veto such tactics at Tarawa, the corps headquarters now urged that every effort be made in future operations to land artillery on lightly defended islands within range of the major objective.20 At Betio in particular, great things had been expected of the preparatory naval bombardment. Representatives of V Amphibious Force, V Amphibious Corps, and the 2d Marine Division, had contributed their knowledge to the drafting of a naval gunfire plan. As a result of their combined efforts, a greater weight of metal was hurled into each square foot of Betio than had rained down on any previous amphibious objective, but the bombardment, awesome as it seemed, did not kill enough Japanese. The VAC commander noted, however, in his report on the operation that "without naval gunfire the landing could not have been made."21 GALVANIC taught naval gunfire officers that, when the requirements of a surprise attack did not preclude it, adequate preparation required days rather than hours of precision bombardment. To fire for two or three hours, much of the time shifting from one sector to another, was not enough. The sturdiest Japanese installations, many of them dug into the coral sands, could be penetrated only by a base-fused, armor-piercing shell plunging at a steep angle. Instead of the armor-piercing type, comparatively ineffective point-detonating, high-capacity ammunition was used at Betio. Although the training and rehearsals for GALVANIC had helped, especially in the accurate delivery of on-call fire, still more training was thought necessary. A simpler and more effective target designation system needed to be developed.22 ln the future, the officers of every supporting ship should know just what was expected of their guns. The ideal solution to the problems posed by the fortifications at Tarawa appeared to be the early arrival of the objective of thoroughly trained fire support units stocked with the proper ammunition, a deliberate bombardment designed to shatter possible strongpoints, additional shelling by destroyers and landing craft during the assault, and finally the accurate delivery of whatever fires the troops ashore might request.23 Because the preliminary hammering of Betio had not achieved the spectacular results hoped for, the importance of naval gunfire to the success of the operation could easily be underestimated. The 3,000 tons of explosives that blasted the island caused many casualties, disrupted Japanese communications, and enabled the first three assault waves to gain the beaches without meeting organized resistance.24 Once these Marines were ashore, the enemy rallied to inflict serious casualties on succeeding waves. This seemingly remarkable recovery was due in part to the lifting of naval gunfire where the LVTs were some distance from shore. Out of the entire task force, only the pair of destroyers in the lagoon could see the progress of the amphibian tractors and time their fires accordingly. The other fire support ships halted their bombardment according to a prearranged schedule that did not take into account the distance yet to be traveled by the assault waves. To prevent the premature lifting of preliminary fires, Admiral Hill's staff recommended that destroyers take up positions from whch they could track the incoming waves and thus keep firing as long as the friendly troops were not endangered.25 The original logistical plan for the Betio operation, though carefully drafted and based on previous amphibious experience, proved unrealistic. A beachhead was needed for the unloading of supplies and evacuation of casualties, but at Betio the Marines fought through the first day with their backs against the sea. Not until the long pier was pressed into service as a transfer point was there room to store or sort cargo. Even if space had been available ashore, landing craft could not have crossed the reef to reach the island. The carrying of supplies from the end of the pier, a point accessible to LCVPs and LCMs, to the front lines was best done by LVTs. Casualties were evacuated in the same vehicles that brought food, water, and ammunition to the embattled units. Wounded Marines were placed in the tractors and carried to the end of the pier where they were given emergency treatment and transferred to landing craft for the journey out to the transports. A naval officer in a minesweeper at the line of departure was given control over boat traffic, and the improvised system worked quite well. The Navy and Marine Corps officers responsible for beachhead logistics, when confronted with an unforeseen difficulty, had responded to the challenge. The waters off the pier were usually dotted with landing craft waiting their turn to unload. This congestion was due to the conflicting needs of the Navy and Marine Corps as well as to the fact that supplies had to be funneled along the pier. The Marines wanted items landed in the order of their importance, but the Navy had to unload the transports as rapidly as possible regardless of the value of the cargo to the attacking troops.26 The longer the transports remained at the objective, the greater the danger to these valuable ships from Japanese planes and submarines. In their eagerness to aid the assault troops, the ship crews were often too cooperative. As the commander ashore on D-Day noted: In their enthusiasm, they did not load what I wanted, they just loaded. By the time they got a message from me requesting certain items the boats were already filled with other material. Tarawa made SOP [Standing Operating Procedure] that the Navy would not unload supplies except as requested by the landing force commander ashore. . . . Items that come ashore must be in accordance with the requirements of those ashore.27 Although pallets, a few of which were used at Tarawa, were recommended for adoption, Marine planners pointed out that not all bulk supplies could be lashed to wooden frames. During the early hours of the assault, or when the beachhead was narrow and under fire, supplies would have to be landed rapidly and in comparatively small quantities. Once the beachhead had been won, these platforms appeared to be one of the best means of speeding the movement of cargo from the transports, across the beaches, and to inland dumps. At Betio, supplies piled up on the beaches, for enemy opposition and a shortage of manpower prevented the shore party from functioning as planned. A single pioneer battalion from the engineer regiment was not equal to the task, and the Marines from certain of the rifle companies, men who were supposed to be sorting and moving supplies, had joined in the fighting, leaving their work to be done by whomever the shore party officers could press into service. In the opinion of the corps G-4 section, the shore party machinery was in need of overhaul, for the pioneer unit was not large enough to do its work without reinforcement. Until the table of organization could be revised, Marines from service rather than combat units should be detailed to aid in the logistical effort.28 The evacuation of casualties became increasingly efficient as the beachhead was expanded. On the first day, the wounded were placed in rubber boats and towed by hand to the edge of the reef where they were transferred to landing craft for the journey out to the transport area. Later, LVTs became available to evacuate the wounded to boats waiting at the end of the pier. Although the supplies of morphine, sulpha drugs, splints, dressings, and plasma proved adequate, the collecting platoons did run short of litters. At Tarawa, the doctors and corpsmen did a heroic job. The major recommendation to result from the operation was that hospital ships be assigned to task forces charged with seizing heavily defended atolls.29 THE ROLE OF AVIATION Both defense against air attack and the close support of ground troops were entrusted to carrier planes flown by Navy pilots. One force of carriers stood ready to intercept Japanese planes striking from the Marshalls. Other carriers protected the Makin task force and attacked targets ashore, while a third group performed the same tasks at Tarawa. Except for unsuccessful night attacks on the retiring task forces, the enemy offered no serious challenge to American air defenses. Air support at Tarawa, in the opinion of both Navy and Marine Corps officers, suffered many of the ills that had plagued naval gunfire support. The strikes made prior to the assault accomplished little, for not enough bombs were delivered, and those dropped were not heavy enough to damage Japanese emplacements. On D-Day, because of severe communication difficulties, there had been poor coordination of the aerial effort with the progress of the assault waves toward the beaches. The planes scheduled to attack at dawn arrived late, and those which were to support the landing were early, their pilots unaware of a postponement of H-Hour. Although the beaches were strafed just before H-Hour, the attack was not effective, for the Japanese, who had taken cover in air raid shelters and pillboxes, were immune to harm from machine gun bullets. Later in the operation, while supporting units ashore, the aviators had difficulty in locating their targets. These shortcomings indicated, among other things, that effective air support was impossible unless the pilots and ground troops had trained as a team. Marine Colonel Peter P. Schrider, VAC air officer, was convinced that the division and its supporting carriers should train together for two or three days--the longest possible time at this stage of the war.30 Holland Smith recommended that Marine aviators thoroughly schooled in the principles of direct air support should be assigned to escort carriers and included in any future amphibious operation undertaken by a Marine division. If this request could not be granted, he continued, the Navy airmen selected for the task should be carefully indoctrinated in the tactics they would employ.31 Air operations at Tarawa led to certain changes in doctrine, which would benefit soldiers and Marines storming other beaches. Unless dive bombers were attacking a particular target which might be obscured by smoke and dust, there was no need to suspend naval gunfire while the planes executed the strike. No danger of shells striking aircraft existed as long as the pilots pulled out of their dives at an altitude higher than the maximum ordinate of the naval guns. In addition, the practice of scheduling the final aerial attack in relation to H-Hour was judged to be unrealistic. Those planes assigned to maintain the neutralization of the beaches just prior to the assault should begin their attack when the landing craft were about 1,000 yards from the objective and continue the bombing and strafing until the assault waves were approximately 100 yards from shore. Finally, since machine gun fire had proved ineffective against beach defenses, some sort of gasoline bomb was needed, a device which would insure that the defenses remained silenced during the last few minutes of the ship-to-shore movement.32 Not only were important lessons learned from GALVANIC, but many necessary changes in amphibious tactics and techniques were made almost immediately. By the time of the Marshalls operation, for example, naval gunfire would improve in both accuracy and volume. On the other hand, the war had reached the Marianas before effective coordination was achieved between air strikes and naval gunfire. As one study of amphibious warfare has phrased it, "Tactically, Betio became the textbook for future amphibious landings and assaults."33 In the flames of Tarawa was tempered the sword that would cut to the heart of the Japanese Pacific empire. Table of Contents ** Previous Chapter (II-4) * Next Chapter (III-1) King and Whitehall, Fleet Admiral King, p. 432. CinCPac WarD, Nov43, Anx F, p. 10. In regard to the decision to attack fortified islands, like Tarawa and targets in the Marshalls, rather than undefended objectives, Admiral Hill commented that prevailing trade winds required an island air base to have fields running in the wind direction and that the Japanese, recognizing this fact, had built their bases on the relatively few islands that were situated to take best advantage of the winds. Many of the undefended atoll islands were too small for airfields or would require too much construction work to be usable. Hill interview/comments. Craven and Cate, Guadalcanal to Saipan, pp. 303-304; Morison, The Aleutians, Gilberts, and Marshalls, pp. 221-212. Unless otherwise noted, the material in this section is derived from: VAC G-1 Rpt GALVANIC, dtd 6Jan44, Encl E to VAC AR; Isely and Crowl, Marines and Amphibious War, pp. 203-205. CinCPac 1stEnd to ComCenPacFor ltr to Cominch, dtd 10Dec43 (OAB, NHD). LtGen Julian C. Smith interview with HistBr, G-3, HQMC, dtd 4Oct62. For an interesting discussion of the development of tide information at Tarawa see: Patrick L. McKiernan, "Tarawa: The Tide that Failed," U.S. Naval Institute Proceedings, v. 88, no. 2 (Feb62). Cdr Francis D. Fane and Don Moore, The Naked Warriors (New York: Appleton-Century-Crofts, Inc., 1956), pp. 24, 30-31. Maj Eugene P. Boardman ltr to CMC, dtd 16Jun47. 2d MarDiv PrelimIntelRpt of Tarawa Op, dtd 7Dec43, Encl N to VAC G-2 Rpt, dtd 8Dec43, Encl C to VAC AR. 27th InfDiv OpRpt, p. 2. Ibid.; Rpt of 27th InfDiv SigO, dtd 4Dec43, Encl no. 2 to 27th InfDiv OpRpt. Knowles ltr. V PhibFor CommRecoms and Cmts, Encl A to V PhibFor AR, p. 62; VAC AR, p. 17; VAC Analysis of CommRpts, dtd 3Jan44, Encl 5 to SpStfRpts, n.d., Encl F to VAC AR. Of the 125 LVTs used at Tarawa, 35 were sunk at sea, 26 were filled with water on the reef, 9 were burned on the beach as gas tanks ignited, and 2 were destroyed by mines on the beach. Eight tractors were put out of action by mechanical failures. Of the 500 men in the 2d Amphibian Tractor Batallion, 323 were killed, wounded, or missing in action, including the battalion commander, Major Henry C. Drewes, killed on D-Day. Information supplied by LtGen Julian C. Smith, dtd 15Oct62. Two of the DUKWs were used at Makin Atoll. VAC AR, p. 12. Col George F. Unmacht, USA, "Flame Throwing Seabees," U.S. Naval Institute Proceedings, v. 74, no. 4 (Apr48), pp. 425-426. VAC AR, p. 20. Ibid., p. 20. NGF SptRpt, n.d., p. 49, Encl A to TF 53 AR. The naval gunfire grid and target designation system used in the Gilberts proved to be "cumbersome and inaccurate" at times. In future Central Pacific operations, the Tactical Area Designation system, developed by a group of Army, Navy, and Marine intelligence and mapping officers at Pearl Harbor, was standard. The new system, based on a 1,000-yard grid broken down into 200-yard lettered squares was readily usable by all fire support agencies. Col Cecil W. Shuler comments on draft MS, dtd 12Dec62. VAC AR, pp. 16-17; Rpt of NavShoBomb, dtd 4Dec43, Encl H, and ImportantRecoms, dtd 4Dec43, Encl J, to V PhibFor AR; NGF Rpt, dtd 7Jan44, Encl 2 to SplStfRpts, n.d., Encl F to VAC AR. General Shoup, noting the few casualties in the leading assault waves, commented: "I always attributed this to a destroyer on the flank which kept firing and kept the Japanese in their holes." Shoup interview/comments. TF 53 NGF SptRpt, n.d., p. 49, Encl A to TF 53 AR. LtCol Robert D. Heinl, Jr., notes of an interview with BGen Merritt A. Edson, dtd 26May47. Shoup interview/comments. G-4 Rpt, dtd 4Jan44, pp. 3-4, Encl D, and Rpt of TQM, dtd 30Dec43, Encl 8 to SplStfRpts, n.d., pp. 13-14, Encl F to VAC AR. Rpt of MedObserver, FwdEch, GALVANIC, dtd 1Dec43, Encl 6 to SplStfRpts, n.d. Encl F to VAC AR. Rpt of AirO, dtd 6Jan44, Encl 1 to SplStfRpts, n.d., p. 2, Encl F to VAC AR. VAC AR, p. 16. Rpt of AirSpt, n.d., Encl A to TF 53 AR, pp. 58-61. Isely and Crowl, Marines and Amphibious War, p. 251.
<urn:uuid:2cefe917-0e71-4fd2-a29e-77e466235e28>
CC-MAIN-2014-42
http://www.ibiblio.org/hyperwar/USMC/III/USMC-III-II-5.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444774.49/warc/CC-MAIN-20141017005724-00245-ip-10-16-133-185.ec2.internal.warc.gz
en
0.971489
7,399
3.8125
4
We went to the science lab and learned about arctic animals and their adaptations with Mrs. Riggins. We experienced how their fat keeps them protected from the cold. We put our hand in baggie that contained a baggie filled with Crisco. We put the side that wasn't covered by the Crisco on the ice water first and then flipped it to the where the Crisco was between our hand and the ice water to see how their fat keeps them warm. Then we went to the library. Mrs. Anderson read The Polar Express to us and Mr. Gonzalez showed us the pictures on a PowerPoint. Next we went to the reindeer food station. We read the poem, talked about what the word "roam" means. Then we made our baggie of reindeer food. We also read the story Imogene's Antlers. In the classroom, we filled in the word wall words in our poem. We played Christmas bingo using M&Ms as our markers. The students had fun taking turns being the bingo caller. When we were finished playing we ate our M&Ms! Yum!
<urn:uuid:d6fc8a95-d7ba-4c45-8241-c083e1d4c339>
CC-MAIN-2017-17
http://shawskindercrew.blogspot.com/2011/12/polar-express-day-2011.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118831.16/warc/CC-MAIN-20170423031158-00554-ip-10-145-167-34.ec2.internal.warc.gz
en
0.97971
232
3.34375
3
The word ”hybrid,” when referring to genetics means, “the offspring of genetically dissimilar parents or stock, especially the offspring produced by breeding plants or animals of different varieties, species, or races.” In general, the word means, “something of mixed origin or composition.” Hybrid dogs, or designer dogs as some call them, are becoming quite popular. Below is a list of the most popular hybrid dogs. The best way to determine the traits of a mixed breed is to look up all breeds in the cross and know you can get any combination of any of the characteristics found in all breeds. The Dog Breed Info Center® does not attempt to interpret the temperaments of each individual hybrid mix because the differences in the dogs, even within the same litter, can vary greatly. If you do not feel the temperament of one of the purebreds in the mix is suited for your lifestyle, then that hybrid dog is not for you. Do not take a gamble that the puppy or dog will turn out like the other breed in the mix. Choosing a dog simply for its looks is a foolish way to choose a dog. Read the article on Designer Dogs for more info on these mixed breeds. Please Note: A hybrid dog is not a BREED; it is a hybrid, which means it is a mix of more than one purebred dog. Scientifically speaking, the term "hybrid” is incorrect as all dogs are a sub-species of wolf (Canis lupus familiaris) and as such, it is impossible to have a hybrid as they are two of the same species. Although technically incorrect, the term "hybrid" is the name which is predominantly used for these mixes and therefore it is the name we will also use when referring to them. Designer dog?? What the heck is a designer dog, you ask?? A "designer" dog (as the media has labeled them) is a cross between two purebred dogs. A purebred dog is one that has been bred over many generations to breed true, meaning each puppy that is born looks and has the same temperament and characteristics as the others. In most cases a standard is written and breeders must follow this written standard. Only dogs that make the written standard are to be bred. Purebred dogs are beneficial in that when you buy a purebred dog you know what you are getting. You know how big your puppy will grow and you know basically what type of care the dog will need. You know the dog’s limits, whether it is capable of agility, hunting, search and rescue, police work, herding, flock guarding, or just simply being a companion dog. You have a pretty good idea how much exercise the dog will require. When one breeds purebred dogs great care must be taken to ensure the lines do not become too thin. Even with all the best DNA testing available genetic problems can occur, however with the proper testing these problems can be greatly reduced. To give you a simple analogy, let's say there was a law passed that stated only people with red hair and green eyes with a high IQ could have children, with the end goal being everyone in the USA to be smart with red hair and green eyes. If this were to happen, as you can imagine, our gene pool would eventually become thin, and many genetic problems would occur. This is why it is very important to ask breeders of purebred dogs what types of genetic testing they perform.(http://www.dogbreedinfo.com/designerdogs.htm) |2014 - One of the Best Hybrids, Harley the Buggs (Boston Terrier/ Pug Mix) | Okay, so this part could go on for days...so we will just list a few "L" for "Lab" and "P" for "Pug" hybrids we found. Can you guess what the mix is? GEEZE LOUISE! Well, if you dare, check back tomorrow and see if there are "Designer Dats" to be found...Yes, we meant Cats!!
<urn:uuid:8f7ec0cd-1528-454e-a301-749c616163f5>
CC-MAIN-2017-26
http://tootsuncommon.blogspot.com/2013/12/hybrid-for-100-alex.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00697.warc.gz
en
0.953051
841
2.5625
3
Next generation solar cells are a new domain in the solar energy conversion field in which the ratio efficiency-to-cost is significantly increased with respect to traditional devices. In this regard, our goal is to achieve low cost/ large throughput PV based on new semiconductor nano-structures that smartly exploit sunlight. In order to do so, we work on: - The development of a fundamental understanding of the potential benefits and/or limitations that may exist in these structures when used for solar energy conversion. In order to do so, we combine the dual perspective of theoretical simulations and experimental techniques. The combination of electromagnetic and electric modeling is essential to find new designs with enhanced functionalities. On the other hand, we aim at experimentally providing an understanding of the different local processes occurring during light conversion into power. - The development of cost-effective fabrication methods that enable the fabrication of semiconductor nanostructures in a deterministic manner. To this end, we seek to exploit capabilities of scanning probe microscopy towards local electrochemical deposition of semiconductors in liquid environments. The SPM tip is intended as an electrochemical “pen” to drive growth in 3D.
<urn:uuid:c325c337-ba72-43a7-913a-14eb5d54f0c4>
CC-MAIN-2021-39
https://amolf.nl/research-groups/3d-photovoltaics/research-activities-2
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057083.64/warc/CC-MAIN-20210920161518-20210920191518-00365.warc.gz
en
0.900441
238
2.59375
3
News from within the borders of Philadelphia, the capital Pennsylvania and the fight for LGBT equality there. The city is recognized historically as the birthplace of the United States and the American Revolutionary War, and was also the setting of Philadelphia, the acclaimed film starring Tom Hanks as a gay lawyer dying of an AIDS-related illness. Learn more about past and present obstacles toward achieving equality in Philadelphia including hate crimes law, transgender rights, adoption, and other rights denied to same-sex couples and LGBT people. Learn about individuals—activists, politicians, and allies—who have helped us make strides toward equality. We also cover the campaigns of groups opposed to marriage equality and explore how gay marriage is covered in mainstream media. We stay on top of developments so that you can stay informed about this issue. October 28 2013 11:31 AM ET October 30 2013 2:31 PM ET The legislation, signed by Mayor Nutter Thursday, mandates that all new city-owned buildings be equipped with gender-neutral restrooms and offers tax credits to businesses that offer LGBT-inclusive benefits.
<urn:uuid:69f77002-099f-44bf-b4a1-1828a18cb5d5>
CC-MAIN-2013-48
http://www.advocate.com/topics/philadelphia
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164022411/warc/CC-MAIN-20131204133342-00075-ip-10-33-133-15.ec2.internal.warc.gz
en
0.968216
215
2.6875
3
In the last post in this series we saw some simple examples of linear programs, derived the concept of a dual linear program, and saw the duality theorem and the complementary slackness conditions which give a rough sketch of the stopping criterion for an algorithm. This time we’ll go ahead and write this algorithm for solving linear programs, and next time we’ll apply the algorithm to an industry-strength version of the nutrition problem we saw last time. The algorithm we’ll implement is called the simplex algorithm. It was the first algorithm for solving linear programs, invented in the 1940’s by George Dantzig, and it’s still the leading practical algorithm, and it was a key part of a Nobel Prize. It’s by far one of the most important algorithms ever devised. As usual, we’ll post all of the code written in the making of this post on this blog’s Github page. Slack variables and equality constraints The simplex algorithm can solve any kind of linear program, but it only accepts a special form of the program as input. So first we have to do some manipulations. Recall that the primal form of a linear program was the following minimization problem. where the brackets mean “dot product.” And its dual is The linear program can actually have more complicated constraints than just the ones above. In general, one might want to have “greater than” and “less than” constraints in the same problem. It turns out that this isn’t any harder, and moreover the simplex algorithm only uses equality constraints, and with some finicky algebra we can turn any set of inequality or equality constraints into a set of equality constraints. We’ll call our goal the “standard form,” which is as follows: It seems impossible to get the usual minimization/maximization problem into standard form until you realize there’s nothing stopping you from adding more variables to the problem. That is, say we’re given a constraint like: we can add a new variable , called a slack variable, so that we get an equality: And now we can just impose that . The idea is that represents how much “slack” there is in the inequality, and you can always choose it to make the condition an equality. So if the equality holds and the variables are nonnegative, then the will still satisfy their original inequality. For “greater than” constraints, we can do the same thing but subtract a nonnegative variable. Finally, if we have a minimization problem “” we can convert it to . So, to combine all of this together, if we have the following linear program with each kind of constraint, We can add new variables , and write it as By defining the vector variable and and to have as appropriately for the new variables, we see that the system is written in standard form. This is the kind of tedious transformation we can automate with a program. Assuming there are variables, the input consists of the vector of length , and three matrix-vector pairs representing the three kinds of constraints. It’s a bit annoying to describe, but the essential idea is that we compute a rectangular “identity” matrix whose diagonal entries are , and then join this with the original constraint matrix row-wise. The reader can see the full implementation in the Github repository for this post, though we won’t use this particular functionality in the algorithm that follows. There are some other additional things we could do: for example there might be some variables that are completely unrestricted. What you do in this case is take an unrestricted variable and replace it by the difference of two unrestricted variables . For simplicity we’ll ignore this, but it would be a fruitful exercise for the reader to augment the function to account for these. What happened to the slackness conditions? The “standard form” of our linear program raises an obvious question: how can the complementary slackness conditions make sense if everything is an equality? It turns out that one can redo all the work one did for linear programs of the form we gave last time (minimize w.r.t. greater-than constraints) for programs in the new “standard form” above. We even get the same complementary slackness conditions! If you want to, you can do this entire routine quite a bit faster if you invoke the power of Lagrangians. We won’t do that here, but the tool shows up as a way to work with primal-dual conversions in many other parts of mathematics, so it’s a good buzzword to keep in mind. In our case, the only difference with the complementary slackness conditions is that one of the two is trivial: . This is because if our candidate solution is feasible, then it will have to satisfy already. The other one, that , is the only one we need to worry about. Again, the complementary slackness conditions give us inspiration here. Recall that, informally, they say that when a variable is used at all, it is used as much as it can be to fulfill its constraint (the corresponding dual constraint is tight). So a solution will correspond to a choice of some variables which are either used or not, and a choice of nonzero variables will correspond to a solution. We even saw this happen in the last post when we observed that broccoli trumps oranges. If we can get a good handle on how to navigate the set of these solutions, then we’ll have a nifty algorithm. Let’s make this official and lay out our assumptions. Extreme points and basic solutions Remember that the graphical way to solve a linear program is to look at the line (or hyperplane) given by and keep increasing (or decreasing it, if you are minimizing) until the very last moment when this line touches the region of feasible solutions. Also recall that the “feasible region” is just the set of all solutions to , that is the solutions that satisfy the constraints. We imagined this picture: The constraints define a convex area of “feasible solutions.” Image source: Wikipedia. With this geometric intuition it’s clear that there will always be an optimal solution on a vertex of the feasible region. These points are called extreme points of the feasible region. But because we will almost never work in the plane again (even introducing slack variables makes us relatively high dimensional!) we want an algebraic characterization of these extreme points. If you have a little bit of practice with convex sets the correct definition is very natural. Recall that a set is convex if for any two points every point on the line segment between and is also in . An algebraic way to say this (thinking of these points now as vectors) is that every point when . Now an extreme point is just a point that isn’t on the inside of any such line, i.e. can’t be written this way for . For example, A convex set with extremal points in red. Image credit Wikipedia. Another way to say this is that if is an extreme point then whenever can be written as for some , then actually . Now since our constraints are all linear (and there are a finite number of them) they won’t define a convex set with weird curves like the one above. This means that there are a finite number of extreme points that just correspond to the intersections of some of the constraints. So there are at most possibilities. Indeed we want a characterization of extreme points that’s specific to linear programs in standard form, “.” And here is one. Definition: Let be an matrix with . A solution to is called basic if at most of its entries are nonzero. The reason we call it “basic” is because, under some mild assumptions we describe below, a basic solution corresponds to a vector space basis of . Which basis? The one given by the columns of used in the basic solution. We don’t need to talk about bases like this, though, so in the event of a headache just think of the basis as a set of size corresponding to the nonzero entries of the basic solution. Indeed, what we’re doing here is looking at the matrix formed by taking the columns of whose indices are in , and the vector in the same way, and looking at the equation . If all the parts of that we removed were zero then this will hold if and only if . One might worry that is not invertible, so we’ll go ahead and assume it is. In fact, we’ll assume that every set of columns of forms a basis and that the rows of are also linearly independent. This isn’t without loss of generality because if some rows or columns are not linearly independent, we can remove the offending constraints and variables without changing the set of solutions (this is why it’s so nice to work with the standard form). Moreover, we’ll assume that every basic solution has exactly nonzero variables. A basic solution which doesn’t satisfy this assumption is called degenerate, and they’ll essentially be special corner cases in the simplex algorithm. Finally, we call a basic solution feasible if (in addition to satisfying ) it satisfies . Now that we’ve made all these assumptions it’s easy to see that choosing nonzero variables uniquely determines a basic feasible solution. Again calling the sub-matrix for a basis , it’s just . Now to finish our characterization, we just have to show that under the same assumptions basic feasible solutions are exactly the extremal points of the feasible region. Proposition: A vector is a basic feasible solution if and only if it’s an extreme point of the set . Proof. For one direction, suppose you have a basic feasible solution , and say we write it as for some . We want to show that this implies . Since all of these points are in the feasible region, all of their coordinates are nonnegative. So whenever a coordinate it must be that both . Since has exactly zero entries, it must be that both have at least zero entries, and hence are both basic. By our non-degeneracy assumption they both then have exactly nonzero entries. Let be the set of the nonzero indices of . Because , we have . Now has all of its nonzero entries in , and because the columns of are linearly independent, the fact that implies . In the other direction, suppose that you have some extreme point which is feasible but not basic. In other words, there are more than nonzero entries of , and we’ll call the indices where . The columns of are linearly dependent (since they’re vectors in ), and so let be a nontrivial linear combination of the columns of . Add zeros to make the into a length vector , so that . Now And if we pick sufficiently small will still be nonnegative, because the only entries we’re changing of are the strictly positive ones. Then for , but this is very embarrassing for who was supposed to be an extreme point. Now that we know extreme points are the same as basic feasible solutions, we need to show that any linear program that has some solution has a basic feasible solution. This is clear geometrically: any time you have an optimum it has to either lie on a line or at a vertex, and if it lies on a line then you can slide it to a vertex without changing its value. Nevertheless, it is a useful exercise to go through the algebra. Theorem. Whenever a linear program is feasible and bounded, it has a basic feasible solution. Proof. Let be an optimal solution to the LP. If has at most nonzero entries then it’s a basic solution and by the non-degeneracy assumption it must have exactly nonzero entries. In this case there’s nothing to do, so suppose that has nonzero entries. It can’t be a basic feasible solution, and hence is not an extreme point of the set of feasible solutions (as proved by the last theorem). So write it as for some feasible and . The only thing we know about is it’s optimal. Let be the cost vector, and the optimality says that , and . We claim that in fact these are equal, that are both optimal as well. Indeed, say were not optimal, then Which can be rearranged to show that . Unfortunately for , this implies that it was not optimal all along: An identical argument works to show is optimal, too. Now we claim we can use to get a new solution that has fewer than nonzero entries. Once we show this we’re done: inductively repeat the argument with the smaller solution until we get down to exactly nonzero variables. As before we know that must have at least as many zeros as . If they have more zeros we’re done. And if they have exactly as many zeros we can do the following trick. Write for a we’ll choose later. Note that no matter the , is optimal. Rewriting , we just have to pick a that ensures one of the nonzero coefficients of is zeroed out while maintaining nonnegativity. Indeed, we can just look at the index which minimizes and use . . So we have an immediate (and inefficient) combinatorial algorithm: enumerate all subsets of size , compute the corresponding basic feasible solution , and see which gives the biggest objective value. The problem is that, even if we knew the value of , this would take time , and it’s not uncommon for to be in the tens or hundreds (and if we don’t know the trivial search is exponential). So we have to be smarter, and this is where the simplex tableau comes in. The simplex tableau Now say you have any basis and any feasible solution . For now might not be a basic solution, and even if it is, its basis of nonzero entries might not be the same as . We can decompose the equation into the basis part and the non basis part: and solving the equation for gives It may look like we’re making a wicked abuse of notation here, but both and are vectors of length so the dimensions actually do work out. Now our feasible solution has to satisfy , and the entries of are all nonnegative, so it must be that and , and by the equality above as well. Now let’s write the maximization objective by expanding it first in terms of the , and then expanding . If we want to maximize the objective, we can just maximize this last line. There are two cases. In the first, the vector and . In the above equation, this tells us that making any component of bigger will decrease the overall objective. In other words, . Picking (with zeros in the non basis part) meets this bound and hence must be optimal. In other words, no matter what basis we’ve chosen (i.e., no matter the candidate basic feasible solution), if the two conditions hold then we’re done. Now the crux of the algorithm is the second case: if the conditions aren’t met, we can pick a positive index of and increase the corresponding value of to increase the objective value. As we do this, other variables in the solution will change as well (by decreasing), and we have to stop when one of them hits zero. In doing so, this changes the basis by removing one index and adding another. In reality, we’ll figure out how much to increase ahead of time, and the change will correspond to a single elementary row-operation in a matrix. Indeed, the matrix we’ll use to represent all of this data is called a tableau in the literature. The columns of the tableau will correspond to variables, and the rows to constraints. The last row of the tableau will maintain a candidate solution to the dual problem. Here’s a rough picture to keep the different parts clear while we go through the details. But to make it work we do a slick trick, which is to “left-multiply everything” by . In particular, if we have an LP given by , then for any basis it’s equivalent to the LP given by (just multiply your solution to the new program by to get a solution to the old one). And so the actual tableau will be of this form. When we say it’s in this form, it’s really only true up to rearranging columns. This is because the chosen basis will always be represented by an identity matrix (as it is to start with), so to find the basis you can find the embedded identity sub-matrix. In fact, the beginning of the simplex algorithm will have the initial basis sitting in the last few columns of the tableau. Let’s look a little bit closer at the last row. The first portion is zero because is the identity. But furthermore with this trick the dual LP involves everywhere there’s a variable. In particular, joining all but the last column of the last row of the tableau, we have the vector , and setting we get a candidate solution for the dual. What makes the trick even slicker is that is already the candidate solution , since is the identity. So we’re implicitly keeping track of two solutions here, one for the primal LP, given by the last column of the tableau, and one for the dual, contained in the last row of the tableau. I told you the last row was the dual solution, so why all the other crap there? This is the final slick in the trick: the last row further encodes the complementary slackness conditions. Now that we recognize the dual candidate sitting there, the complementary slackness conditions simply ask for the last row to be non-positive (this is just another way of saying what we said at the beginning of this section!). You should check this, but it gives us a stopping criterion: if the last row is non-positive then stop and output the last column. The simplex algorithm Now (finally!) we can describe and implement the simplex algorithm in its full glory. Recall that our informal setup has been: - Find an initial basic feasible solution, and set up the corresponding tableau. - Find a positive index of the last row, and increase the corresponding variable (adding it to the basis) just enough to make another variable from the basis zero (removing it from the basis). - Repeat step 2 until the last row is nonpositive. - Output the last column. This is almost correct, except for some details about how increasing the corresponding variables works. What we’ll really do is represent the basis variables as pivots (ones in the tableau) and then the first 1 in each row will be the variable whose value is given by the entry in the last column of that row. So, for example, the last entry in the first row may be the optimal value for , if the fifth column is the first entry in row 1 to have a 1. As we describe the algorithm, we’ll illustrate it running on a simple example. In doing this we’ll see what all the different parts of the tableau correspond to from the previous section in each step of the algorithm. Spoiler alert: the optimum is and the value of the max is 8. So let’s be more programmatically formal about this. The main routine is essentially pseudocode, and the difficulty is in implementing the helper functions def simplex(c, A, b): tableau = initialTableau(c, A, b) pivot = findPivotIndex(tableau) return primalSolution(tableau), objectiveValue(tableau) Let’s start with the initial tableau. We’ll assume the user’s inputs already include the slack variables. In particular, our example data before adding slack is c = [3, 2] A = [[1, 2], [1, -1]] b = [4, 1] And after adding slack: c = [3, 2, 0, 0] A = [[1, 2, 1, 0], [1, -1, 0, 1]] b = [4, 1] Now to set up the initial tableau we need an initial feasible solution in mind. The reader is recommended to work this part out with a pencil, since it’s much easier to write down than it is to explain. Since we introduced slack variables, our initial feasible solution (basis) can just be . And so is just the slack variables, is the zero vector, and is the 2×2 identity matrix. Now , which is just the original two columns of we started with, and . For the last row, is zero so the part under is the zero vector. The part under is just . Rather than move columns around every time the basis changes, we’ll keep the tableau columns in order of . In other words, for our example the initial tableau should look like this. [[ 1, 2, 1, 0, 4], [ 1, -1, 0, 1, 1], [ 3, 2, 0, 0, 0]] initialTableau is just a matter of putting the data in the right place. def initialTableau(c, A, b): tableau = [row[:] + [x] for row, x in zip(A, b)] tableau.append(c[:] + ) As an aside: in the event that we don’t start with the trivial basic feasible solution of “trivially use the slack variables,” we’d have to do a lot more work in this function. Next, the objectiveValue() functions are simple, because they just extract the encoded information out from the tableau (some helper functions are omitted for brevity). # the pivot columns denote which variables are used columns = transpose(tableau) indices = [j for j, col in enumerate(columns[:-1]) if isPivotCol(col)] return list(zip(indices, columns[-1])) canImprove() function just checks if there’s a nonnegative entry in the last row lastRow = tableau[-1] return any(x > 0 for x in lastRow[:-1]) Let’s run the first loop of our simplex algorithm. The first step is checking to see if anything can be improved (in our example it can). Then we have to find a pivot entry in the tableau. This part includes some edge-case checking, but if the edge cases aren’t a problem then the strategy is simple: find a positive entry corresponding to some entry of , and then pick an appropriate entry in that column to use as the pivot. Pivoting increases the value of (from zero) to whatever is the largest we can make it without making some other variables become negative. As we’ve said before, we’ll stop increasing when some other variable hits zero, and we can compute which will be the first to do so by looking at the current values of (in the last column of the tableau), and seeing how pivoting will affect them. If you stare at it for long enough, it becomes clear that the first variable to hit zero will be the entry of the basis for which is minimal (and has to be positve). This is because, in order to maintain the linear equalities, every entry of will be decreased by that value during a pivot, and we can’t let any of the variables become negative. All of this results in the following function, where we have left out the degeneracy/unboundedness checks. [UPDATE 2018-04-21]: The pivot choices are not as simple as I thought at the time I wrote this. See the discussion on this issue, but the short story is that I was increasing the variable too much, and to fix it it’s easier to update the pivot column choice to be the smallest positive entry of the last row. The code on github is updated to reflect that, but this post will remain unchanged. # pick first nonzero index of the last row column = [i for i,x in enumerate(tableau[-1][:-1]) if x > 0] quotients = [(i, r[-1] / r[column]) for i,r in enumerate(tableau[:-1]) if r[column] > 0] # pick row index minimizing the quotient row = min(quotients, key=lambda x: x) return row, column For our example, the minimizer is the entry (second row, first column). Pivoting is just doing the usual elementary row operations (we covered this in a primer a while back on row-reduction). The pivot function we use here is no different, and in particular mutates the list in place. def pivotAbout(tableau, pivot): i,j = pivot pivotDenom = tableau[i][j] tableau[i] = [x / pivotDenom for x in tableau[i]] for k,row in enumerate(tableau): if k != i: pivotRowMultiple = [y * tableau[k][j] for y in tableau[i]] tableau[k] = [x - y for x,y in zip(tableau[k], pivotRowMultiple)] And in our example pivoting around the chosen entry gives the new tableau. [[ 0., 3., 1., -1., 3.], [ 1., -1., 0., 1., 1.], [ 0., 5., 0., -3., -3.]] In particular, is now , since our pivot removed the second slack variable from the basis. Currently our solution has . Notice how the identity submatrix is still sitting in there, the columns are just swapped around. There’s still a positive entry in the bottom row, so let’s continue. The next pivot is (0,1), and pivoting around that entry gives the following tableau: [[ 0. , 1. , 0.33333333, -0.33333333, 1. ], [ 1. , 0. , 0.33333333, 0.66666667, 2. ], [ 0. , 0. , -1.66666667, -1.33333333, -8. ]] And because all of the entries in the bottom row are negative, we’re done. We read off the solution as we described, so that the first variable is 2 and the second is 1, and the objective value is the opposite of the bottom right entry, 8. To see all of the source code, including the edge-case-checking we left out of this post, see the Github repository for this post. Obvious questions and sad answers An obvious question is: what is the runtime of the simplex algorithm? Is it polynomial in the size of the tableau? Is it even guaranteed to stop at some point? The surprising truth is that nobody knows the answer to all of these questions! Originally (in the 1940’s) the simplex algorithm actually had an exponential runtime in the worst case, though this was not known until 1972. And indeed, to this day while some variations are known to terminate, no variation is known to have polynomial runtime in the worst case. Some of the choices we made in our implementation (for example, picking the first column with a positive entry in the bottom row) have the potential to cycle, i.e., variables leave and enter the basis without changing the objective at all. Doing something like picking a random positive column, or picking the column which will increase the objective value by the largest amount are alternatives. Unfortunately, every single pivot-picking rule is known to give rise to exponential-time simplex algorithms in the worst case (in fact, this was discovered as recently as 2011!). So it remains open whether there is a variant of the simplex method that runs in guaranteed polynomial time. But then, in a stunning turn of events, Leonid Khachiyan proved in the 70’s that in fact linear programs can always be solved in polynomial time, via a completely different algorithm called the ellipsoid method. Following that was a method called the interior point method, which is significantly more efficient. Both of these algorithms generalize to problems that are harder than linear programming as well, so we will probably cover them in the distant future of this blog. Despite the celebratory nature of these two results, people still use the simplex algorithm for industrial applications of linear programming. The reason is that it’s much faster in practice, and much simpler to implement and experiment with. The next obvious question has to do with the poignant observation that whole numbers are great. That is, you often want the solution to your problem to involve integers, and not real numbers. But adding the constraint that the variables in a linear program need to be integer valued (even just 0-1 valued!) is NP-complete. This problem is called integer linear programming, or just integer programming (IP). So we can’t hope to solve IP, and rightly so: the reader can verify easily that boolean satisfiability instances can be written as linear programs where each clause corresponds to a constraint. This brings up a very interesting theoretical issue: if we take an integer program and just remove the integrality constraints, and solve the resulting linear program, how far away are the two solutions? If they’re close, then we can hope to give a good approximation to the integer program by solving the linear program and somehow turning the resulting solution back into an integer solution. In fact this is a very popular technique called LP-rounding. We’ll also likely cover that on this blog at some point. Oh there’s so much to do and so little time! Until next time.
<urn:uuid:28c9ce06-dec9-465d-a0e2-581f63eb41ba>
CC-MAIN-2018-26
https://jeremykun.com/category/geometry/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864303.32/warc/CC-MAIN-20180621231116-20180622011116-00398.warc.gz
en
0.911636
6,352
3.8125
4
Sex Gender And Society Sex, Gender, and Society by Ann Oakley was first published in the year 1991. The book is based on gender education within a community. In the article, Oakley discusses how the question of sex and gender are considered within the society at the same time evaluating how different people perceive the subject. The central theme of the book is to assess what different sexes are in the community — at the same time, establishing what makes them different from one another. She applies biological knowledge on animals as she tries to uncover what the difference is between distinct sexes. She notes that the question of gender has been raised over several decades to find out what makes one feel entitled or a member of a particular gender. She goes ahead to say that people in a community are the same however, most societies have stereotyped the subject which creates a big gap between the two genders in that they appear as two different groups who have to fight for everything. Societies have deviated the issue of gender way too long in that every community has its way of defining things, thus the source of confusion among most individuals. Most cultures are conditioned by history to think from a particular perspective, which makes changing the notion challenging. To make the matter worse, none of these groups have taken steps in making the situation bearable to all. The main aim of Ann Oakley is to create an informative society whereby people will not have to fight over the question of gender and sex. Social interaction and structure create the basis under which community functions within (Amadiume, 2015). Various fundamentals are required in the society set up. Most organizations are based on specific activities which act as a binding factor for the group to coexist. There are various beliefs as well, which are carried on in diverse cultures and usually determine the number of things in these societies. In the article of sex, gender, and society, Ann Oakley points out that the organization has been the primary cause of the misconception on various genders and sexes. Many communities have their way of viewing the subject, which creates a lot of confusion among people. As a result, there has been a wide gap between men and women for they are made to appear as different groups. Culture has swayed people’s thoughts in a way that is difficult to change. As a result, social interaction has reduced at the same time, creating a significant lift in the way the social structure is supposed to look like. The current social structure spells doom for the future of the societies as seen in different social institutions. Maintaining stability in institutions that sexually divide is difficult. As Oakley notes, the community has not done much in trying to change this social phenomenon. Institutions do not treat their members equally, and neither are they given the same chances courtesy of their gender. As a result, the core values of these institutions is lost in the process. This is changing the perception in which the society has created on various groups. People have been fed with various forms of information in that they tend to create a certain perception on others. As noted earlier, society is responsible for what people perceive about others. As a result, the impression that certain people create should be eliminated because, at the end of the day, their judgement is based on a perspective that has been created in their minds over and over which controls the way they see things. Impression management means developing a society in which people see things in a different way rather than what they have been made to think. By this, people will be in a position to think more positively thus eliminate the gap that has been created in the society based on genders. Social imbalance, as seen in the case of sexes and gender, has caused more harm than benefit to society (Amadiume, 2015). It is high time people work together to change this misconception. As Ann Oakley notes, men and women should not be viewed as a different group. This will enhance equality even among institutions; hence, cases of sidelining one group will reduce eventually. Societies should also play a role in changing all mythical misconceptions that have been passed on to generations.
<urn:uuid:a9d06e15-fd93-496b-845b-472523dbac60>
CC-MAIN-2023-50
https://writix.com/essay-examples/sex-gender-and-society
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00244.warc.gz
en
0.972801
831
3.5625
4
The antibiotics of tomorrow may also come from an unexpected source: insects or, to be more precise, from the bacteria that infect insects, or that live in symbiosis with them. Significant help in dealing with the problem of treating wastewater containing organic residues (from food waste, livestock manure, grass and dry leaves, waste wood, etc.) could come from a [...] The solution to one of the big issues of world health, i.e. the growing resistance to antibiotics by many types of bacteria, may also come from the sea and, specifically, from sponges. [...] They are celled NanoZymes, artificial enzymes which could provide important help in the battle against antibiotic resistant infections. Researchers from several Australian universities [...]
<urn:uuid:4599b4d0-27af-43b8-840f-2086fb84d4a8>
CC-MAIN-2019-13
https://www.ibsafoundation.org/tag/bacteria/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204768.52/warc/CC-MAIN-20190326014605-20190326040605-00061.warc.gz
en
0.956779
148
2.75
3
Presentación del tema: "The Present Tense of ir (to go)"— Transcripción de la presentación: 1The Present Tense of ir (to go) (El tiempo presente del verbos ir ) 2Yo voy Nosotros vamos Tú vas The verb ir = to go Vosotros vais Its conjugationYo voyNosotros vamosTú vasVosotros vaisUsted vaÉl vaElla vaUstedes vanEllos vanThe verb ir is irregular not only in its yo form, but in all other forms as well.Essentially, ir is conjugated like a regular -ar verb in all its forms except yo. 3The verb ir = to go Voy a la tienda para comprar pan. Since we generally go to a place, the verb ir is almost always used with the preposition a.Voy a la tienda para comprar pan.Vas al museo con tus amigos, ¿no?(a + el = al)Mario va a la biblioteca a estudiar.Occasionally, ir is used in isolation, as when answering a knock at the door:¡Voy!I’m coming! 4The verb ir = to goSimilarly, when we ask where someone is going, we use the question word ¿adónde? (to where?) rather than ¿dónde? (where?)The useful construction ir a + infinitive is used in Spanish to express a future action, that is, what someone is going to do.I’m going to do my homework in the library.Hi, Susana! Where are you going? 5ir a + infinitive Vamos a estudiar los verbos. It is important to remember that, with this construction, we conjugate only the verb ir . . .then add a . . .and then an infinitive that expresses what we are going to do.Vamosaestudiarlos verbos.We’re going to study . . .We never conjugate both verbs! 6TranslateShe goes to the park because she has to run.2) They are going to dance in the school.3) We are going to study for the class.I go to the gym every day.You (formal/singular) go to my house.You (other countries) go to the zoo to see the animals 7The verb hacer = to do; to make Its conjugationhagohacemoshaceshacéishacehacenThe verb hacer is irregular only in its yo form. 8The verb hacer = to do; to make Yo hago mi tarea todos los días.I do my homework every day.Me gusta cuando mamá hace tacos.I like it when mom makes tacos.¿Qué haces los fines de semana?What do you do on weekends? 9The verb hacer = to do; to make When you are asked a question using hacer, you usually respond with another verb . . .¿Qué hacen los estudiantes ahora?What are the students doing now?Comen en la cafetería.They’re eating in the cafeteria.. . . unless, of course, your response involves making or doing.¿Qué hacen los estudiantes ahora?What are the students doing now?Hacen la tarea.They’re doing the homework.
<urn:uuid:b85dd1c5-8cf8-4395-9ff9-708a49521e19>
CC-MAIN-2017-30
http://slideplayer.es/slide/168871/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423774.37/warc/CC-MAIN-20170721122327-20170721142327-00702.warc.gz
en
0.658798
767
3.25
3
Free math worksheets for basic operations This worksheet generator allows you to make worksheets for addition, subtraction, division, and multiplication of whole numbers and integers, including both horizontal and vertical forms (long division etc.), and simple equations with variables. You can make worksheets for... - basic addition/subtraction facts - mental addition and subtraction (for example, whole hundreds) - multiplication tables, including missing factors - basic division facts, including with remainders - mental multiplication and division (for example, by powers of ten) - column-form addition and subtraction, including subtraction with or without regrouping - column-form multiplication (long multiplication) - long division - simple equations using either an empty line or a variable (choose missing addend/subtrahend/minuend/factor/dividend/divisor). This is usable from first grade up to pre-algebra/algebra 1! All of this can be done either with positive whole numbers or integers (negative numbers) by choosing the range of numbers used. Experiment with the options to customize the worksheets as you like! For example, you can add any amount of extra space for working out the problems, put a border around each problem, and choose the font and font size, which allows customizing the worksheets for students with visual problems or ADHD. See below some example worksheet types. The generator can make an enormous variety of worksheets: - Single-digit addition facts - Subtraction facts within 18 - Add and subtract whole tens - Multiplication tables of 6 and 7 practice - Multiplying by whole tens and hundreds - missing factors - Long division, 2-digit divisor, 3 or 4-digit dividend - Simple multiplication and division equations - Addition and subtraction of integers - Addition and subtraction equations with integers ... and MANY MORE! You can find LOTS of ready-made links for various addition, subtraction, multiplication, and division worksheets on the grade-level pages:
<urn:uuid:30072e4f-561e-4e7b-9542-909a2196aaa1>
CC-MAIN-2017-22
http://www.homeschoolmath.net/worksheets/basic-operations-worksheets.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609054.55/warc/CC-MAIN-20170527191102-20170527211102-00036.warc.gz
en
0.845739
444
4.34375
4
Cattle have been a part of the American agricultural landscape since the arrival of New World colonists beginning in 1493 with the second Spanish voyage. Cattle indigenous to Europe were brought with immigrants during the colonization of America, and the many different types of cattle they brought have provided milk, meat, leather, tallow, draft power, and pleasure for centuries. Modern breed associations maintain pedigree registries of purebred animals for each breed that descends from these colonial, as well as later, introductions. Registration of animals destined to become breeding stock is essential to the long-term security of the breeds. Registration validates purebred status of animals and assures their availability for conservation by future generations. Many cattle breeds that were once core components of regional cultures are now in danger of extinction. As cultures are homogenized and historic agricultural traditions abandoned, the flavors and food traditions that revolved around specific breeds are threatened as well. In response to this threat, The Livestock Conservancy is defining Heritage Cattle, and the Heritage Beef and Milk that come from them. This ensures that the legacy left to succeeding generations has as much genetic breadth and biological robustness as the current generation has itself inherited from previous generations. The definition draws attention to endangered breeds of cattle, supports their genetic integrity and long-term conservation, encourages management strategies that are biologically appropriate and agriculturally sustainable, and celebrates the cultural and culinary traditions of these breeds. Cattle and cattle products marketed as Heritage must meet all of the following criteria. Heritage Cattle must adhere to all of the following: Once animals have met the criteria of the Heritage Cattle definition, their products too much evaluated against the criteria established for Heritage Beef, Heritage Milk, and Heritage Milk Products. Heritage Cattle Products must come from: A. Definition of Heritage Beef Products: Beef animals and their products marketed as Heritage Beef must: B. Definition of Heritage Milk or Heritage Milk Products: Milk marketed as Heritage Milk must: Products made with Heritage Milk: Terms like “heirloom,” “antique,” old-fashioned,” and “old timey” imply heritage and are understood to be synonymous with the definition provided here.
<urn:uuid:241cefb2-6636-436c-8bd0-8ddbda818c9f>
CC-MAIN-2014-42
http://www.livestockconservancy.org/index.php/resources/internal/heritage-cattle
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119648008.18/warc/CC-MAIN-20141024030048-00303-ip-10-16-133-185.ec2.internal.warc.gz
en
0.953951
459
3.78125
4
Visitors to the various regions within the African continent are frequently surprised by the lack of clothing worn by traditional or rural people. Despite few cloth coverings, though, the locals are draped in jewellery and decorations. Indeed, using the body as a canvas for a particular type of art has long been a tradition amongst many of the world’s earliest inhabitants. The African tribes have five main ways of beautifying or decorating their bodies. These are: 2. Body painting Scarification involves cutting, burning or whipping the body to create permanent scars. These are frequently inflicted in specific shapes and sizes, and indicate something about their host. For example, the pubescent girls of the Nigerian tribe Ga’anda are scarred with delicate designs on their stomachs, backs and shoulders to indicate that they are entering womanhood. The Sudanese tribe of Shilluk uses scarred dots across the forehead to convey details about that person’s heritage. Body painting is a common method, and is used in religious rituals, celebrations and to indicate sexual maturity. The colours frequently represent the tribe (as a sports jersey would indicate what team the spectator supports), or can be used to convey a specific message about that person. Oil, clay, chalk, ash and plant products (fruit, sap etc…) are traditionally used to create different colours and textures. The Nuba males in Sudan are painted and decorated all over their body between 17 and 30 years of age to indicate their life stage, while other tribes only use the paints for worship or mourning. Africans are famous for their use of colourful beads, both on their body and in their accessories, hair and clothing. Certain colours and patterns usually represent certain aspects of the wearer, such as gender, number of children, power, achievements and so on. When colonialists began to arrive in Africa, they brought with them exquisite glass beads, which the Africans held in such high regard that they even traded human slaves for them. Apart from these, they also used ivory, fish bones and shells for beads. Jewellery was made using leather, hair, grasses, beads, bones, shells and seeds. It came in the form of traditional necklaces, bracelets, ankle chains and rings, but also as headdresses, foot detail, and strings of decorations draped over the hair, back and stomach. When jewellery was made from a rare or valuable substance, like coral or certain types of woods and shells, they became more valuable to those wearing them. Mutilation includes lip plugs, earlobe plugs, neck rings and similar methods of changing the body structure and appearance. These take years to effect, and become the identity of the tribes making use of them. They often result in a bizarre physical feature, such as bottom lips that have a disk the size of a dinner plate in the soft tissue, or elongated necks that have been stretched by gradually increasing the number of copper rings around them. Art is a fascinating way of identifying a group of people, or of expressing personal ideas and preferences. The African people have used it extensively to establish their own identities and cultures. For more information, please view: African Body Modification
<urn:uuid:1f49d72a-a4d8-4b84-bd78-ddc07f83429d>
CC-MAIN-2017-51
http://www.fantasticafrica.org/african-body-art/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948627628.96/warc/CC-MAIN-20171218215655-20171219001655-00114.warc.gz
en
0.96477
648
3.15625
3
In the early 19th century, the Norwegian Army decided that the nature of warfare was changing away from the massed ranks firing in volleys towards smaller units advancing and firing independently. This conclusion was reached after having observed the American Revolutionary War, the Napoleonic Wars and the short Swedish campaign against Norway in 1814. Lessons were also learned from the Gunboat War, where small, mobile gunboats outmaneuvered larger, more heavily armed ships. It was decided that a breech loaded rifle was needed, more accurate than the old smoothbore muskets, yet quicker to load than the rifles issued to the Norwegian Jeger and Skijeger units. A special committee was created, and it started considering various firearm actions in 1837. It was soon clear that the desired weapon should: - have a reduced caliber compared to the then standard musket; - have reliable ignition, with the means of the caplock mechanism (earlier muskets had been equipped with the flintlock mechanism); - be quicker to load than the musket, and therefore be a breech loader; and - be more accurate than the old smoothbore muskets. The end result was that a modern, breech-loading rifle was approved for use on the 18 May 1842. The caliber chosen for the new rifle was 18 lødig (gauge); in other words, one could manufacture 18 round bullets out of one Norwegian pound of lead. In modern terms this means the caliber of the rifle was 17.5 mm. From 1842 until the Remington M1867 was approved in 1867, more than 40,000 kammerladers in more than 80 different models were manufactured. In 1860 the caliber was reduced again, to four Swedish Linjer, or about 11.77 mm. When some of the Kammerladers were modified to rimfire after 1867, this meant that the barrels had to be bored out to 12.17 mm to accept the new cartridge. During a military sharpshooting competition held in Belgium in 1861, the Kammerlader was proven to be among the most accurate military long arms in Europe. The Norwegian rifles were shown to be accurate to a range of about 1 km (0.6 mi), which is quite an achievement even by today's standards. Every breechloader must have some form of mechanism that allows the breech to be opened for loading, yet securely locked for firing. This was even more important in the early designs made before the introduction of the cartridge. Achieving a gas-tight seal was difficult with the metallurgy of the day, and it can be argued that the Norwegian kammerladers are the first fully successful military breechloaders — the needle gun was slightly earlier, but it leaks a significant gas pressure around the breech. A crank mounted on the side of the weapon operates the kammerlader. Rotating the crank opens the breech of the weapon, allowing for loading. The use of paper cartridges — a pre-measured amount of gunpowder and a lead bullet wrapped in paper — also sped up the rate of fire. While not as fast as more modern rifles, which use fixed cartridges, the kammerlader was much faster than contemporary muzzleloading rifles. The loading sequence is as follows (refer to picture): - The hammer mounted under the weapon is cocked. - The crank is rotated, opening the breech. - A percussion cap is placed on the nipple. - A pre measured amount of gunpowder is poured into the breech, and the paper from the paper cartridge is used as wadding. - The bullet is placed in the chamber. - The crank is rotated forwards, locking the breech and making the rifle ready to fire. The exact rate of firing with the kammerlader depends, as with all manually operated weapons, entirely on the shooter. While the sources do not give any indication as to the rate of fire attainable by the average soldier, it is known that it was higher than for a muzzle loading musket — roughly four rounds a minute — and most probably lower than the contemporary German needle gun's 10 to 12 rounds a minute, since the kammerlader has a more elaborate loading procedure. Most of the rifles were modified during their service life. The first major modification was the change from a fixed rear sight mounted behind the receiver to an adjustable rear sight mounted in front of it. The first of the adjustable rear sights was a 'flip over' type: an L-shaped piece of metal that was hinged so it could 'flip' over. Later this was again modified to a design known in Norway as a 'ski hill sight'; a simple, yet functional, adjustable tangent sight. In principle, this latest sight doesn't differ from the iron sights found on most modern firearms. Towards the end of the service life of the kammerladers, most of the small bore rifles were modified to allow the use of rim fire ammunition.
<urn:uuid:77a5a88d-a0c5-4a9e-a65f-f9c8317bddae>
CC-MAIN-2018-09
https://www.onwar.com/weapons/infantry/firearms/Kammerlader.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814538.66/warc/CC-MAIN-20180223075134-20180223095134-00082.warc.gz
en
0.97551
1,039
3.96875
4
The Australian search team tasked with finding the remains of the Malaysian Airline jet that vanished along with 239 passengers nearly two years ago has found a second centuries-old shipwreck — but still no plane. The MH370 search team was conducting its exhaustive search of the Indian Ocean's floor on Dec. 19 when underwater Sonar alerted the crew to a man-made object along the west Australian coast. After high-resolution images were taken Jan. 2, the team was able to confirm that it was yet another ship, officials announced Wednesday. Experts at the Western Australian Museum think that the latest find was probably a metal or iron vessel dating back to the 19th century, much like the previous ship that the Australian Transport Safety Bureau announced it had found last summer. That destroyed ship was found with the help of underwater drones scouring the area. It is difficult to pinpoint the exact origin of an ancient ship at the bottom of the sea, Michael McCarthy, the curator of Australia's WA Maritime Museum said at the time. "The best we can do at the moment is a mid-to late 19th century wooden hull, iron sailing ship of unknown origin but of European-style build," he added. With the exception of a wing that washed up on an Indian Ocean island in 2015, finding any remains of the Malaysia Airlines Flight 370 that disappeared in March 2014 has proved exceedingly difficult. The flight was headed to Bejing Capital International Airport from Malaysia, carrying mostly Chinese citizens, when it disappeared after deviating from its flight path. All 239 passengers on the flight have been presumed dead. — ATSB (@atsbinfo) January 13, 2016 The search teams — which include crews from Malaysia, China and Australia — have already checked two thirds of their 46,000 square mile search zone without finding the Boeing 777 jet. "The expression 'like finding a needle in a haystack' shouldn’t be used to describe (search-and-rescue) and recovery at sea," the Soufan Group, a security intelligence firm, wrote in a briefing about the missing plane. "A more accurate expression would be like finding a drifting needle in a chaotic, color-changing, perception-shifting, motion-sickness-inducing haystack." There are plans to halt search efforts if no evidence is found between now and summer 2016. By completion, the search will be the most expensive in aviation history, the BBC reported. Despite not turning up any remnants of the plane, however, the search has been a success from a scientific standpoint. Over the past couple years, the search for Flight 370 has uncovered troves of new information about the belly of the Indian Ocean, an area that scientists previously knew little about compared to other oceanic floors. The valuable time at sea has gifted researchers with information about currents, marine life, previously uncharted underwater volcanoes and the constantly-changing sea floor.
<urn:uuid:e92804c8-fe91-4ff7-88d2-442e14fe9b1d>
CC-MAIN-2016-40
http://mashable.com/2016/01/13/mh370-search-finds-second-shipwreck/?utm_campaign=Feed%3A+Mashable+%28Mashable%29&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_source=feedburner&utm_medium=feed
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659680.65/warc/CC-MAIN-20160924173739-00150-ip-10-143-35-109.ec2.internal.warc.gz
en
0.961506
591
2.703125
3
Details about Core Concepts in Cultural Anthropology: Designed to address the needs of anthropology professors who prefer to make extensive use of ethnographies and other supplementary readings in their courses, this is a concise, accurate introduction to the basic ideas and practices of contemporary cultural anthropology. Not a standard textbook, Core Concepts is more like an annotated bibliography of the terms and concepts that anthropologists use in their work. The book will prepare students to read ethnography more effectively and with less confusion and misunderstanding. Back to top Rent Core Concepts in Cultural Anthropology 2nd edition today, or search our site for other textbooks by Robert Lavenda. Every textbook comes with a 21-day "Any Reason" guarantee. Published by McGraw-Hill Humanities Social. Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our tutors now.
<urn:uuid:e7be98a0-4005-4321-99c1-33800229f3f5>
CC-MAIN-2016-26
http://www.chegg.com/textbooks/core-concepts-in-cultural-anthropology-2nd-edition-9780072818604-0072818603?ii=8&trackid=7bd43514&omre_ir=0&omre_sp=
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00089-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923368
179
2.546875
3
Uganda is a landlocked country bordered by Kenya in the east, Sudan in the north, Democratic Republic of the Congo in the west, Rwanda in the southwest and Tanzania in the south. Uganda’s total land area is 241,559 sq km. About 37,000 sq km of this area is occupied by open water while the rest is land. The southern part of the country includes a substantial portion of Lake Victoria, which it shares with Kenya and Tanzania. Uganda is located on the East African plateau, averaging about 1,100 meters (3,609 ft) above sea level. The plateau generally slopes downwards towards Sudan explaining the northerly tendency of most river flows in the country. Although generally equatorial, the climate is not uniform since the altitude modifies the climate. Uganda’s elevation, soil types and predominantly warm and wet climate impart a huge agricultural potential to the country. They also explain the country’s large variety of forests, grasslands and wildlife reserves. Uganda has a total population of about 32 million people. Land Area: 199,808 Sq. Km. Water and Swamps: 41,743 Sq. Km Total Area: 241,551 Sq. Km. Latitude: 4012’N and 1029’S Longitude:29034’E and 3500’W Minimum (above sea level – Albert Nile): 620 metres Maximum (above sea level – Mt. Rwenzori):5,110 metres Kampala: Annual Mean Temperature: 17.00C Kampala: Annual Rainfall: 1436.0 mm Arable Land: 25% Permanent Crops: 9% Forests and Woodland: 28% Total Population (2011 mid year)* :32.9 million Female Population: 16.8 million Male Population:16.1 million Percentage Urban (2012):14.7 % Population of Kampala City (2012): 1.72 million Population/Aged under 18 Years (2008 mid year): 56% Population/Aged 65+ (2007 mid year): 4.6% Population Density (2002): 123 persons/km2 Inter-Censal Annual Population Growth Rate 1991- 2002:3.2% per year Infant Mortality Rate (2002 census)*: 76 per 1000 Life Expectancy at birth (2002 census)*: 50.4 years Male: 48.8 years Female: 52.0 years Population per Physician (Doctor): 18,575 English, Luganda and Kiswahili Literacy Rate (2006): 69 % Roman Catholic: 33% Indigenous Beliefs: 18% GDP at current market prices (US$ million): 15.01 Per capita GDP at current market Prices (US$) (2011): 1,241 GDP Growth at constant (2002) market prices: 5.6% Per capita GDP at constant (2002) market Prices: 1.9% Agriculture as a % to GDP at market prices:22.5% Balance of Payments surplus (US$ million):210.9 Inflation rate (March 2012):21.2% Note: *Demographic estimates were based on the census 2002 final results.
<urn:uuid:b9d02d03-6f5d-4ce0-abad-605df9730643>
CC-MAIN-2022-05
https://www.gou.go.ug/content/facts-figures
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300244.42/warc/CC-MAIN-20220116210734-20220117000734-00084.warc.gz
en
0.844005
782
3.140625
3
Analysis: Narrator Point of View Who is the narrator, can she or he read minds, and, more importantly, can we trust her or him? Third Person (Limited) The story is told by an unnamed narrator in the third person; however, the narrator has special access to Kit’s thoughts, feelings, and consciousness. This is what is meant by “third person limited” (or "close"): the narration is written in third person, yet the narrator is mostly limited to Kit's perspective. An example of third person limited narration is as follows: “I had a black nursemaid. But I never needed anyone but Grandfather. He was –” There were no words to explain Grandfather. (2.22) Kit describes her relationship to her father, but the narrator already knows her deepest feelings on the matter and completes her sentences for her.
<urn:uuid:1dc6d42b-021f-42db-a4e8-1c2703903752>
CC-MAIN-2015-48
http://www.shmoop.com/witch-blackbird-pond/narrator-point-of-view.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398454553.89/warc/CC-MAIN-20151124205414-00113-ip-10-71-132-137.ec2.internal.warc.gz
en
0.985578
185
3.359375
3
|Scarlet Lily Beetle| Holes in lily leaves may mean the scarlet lily leaf beetle has moved into your garden. This European native was first discovered in North America in Montreal Canada back in 1945. The Asiatic lily is most susceptible. Dayliles and some Oriental lily varieties appear to be resistant. You may also see this pest feeding on Solomon seal, potatoes, Smilax and flowering tobacco. The adults overwinter in the ground and emerge in spring when they begin feeding on leaves and mating. The bright red beetles are less than ½ inch long. The females lay their eggs on the underside of the leaves. The eggs eventually turn red before hatching into larvae that resemble slugs. Control these pests by removing and destroying the adult, larvae or egg masses as soon as they are found. Larger populations can be controlled with organic pesticides. A bit more information: Always read and follow label directions carefully when using any pesticide, organic, natural or synthetic. If this is a new pest in your area, consider contacting your local extension office. This will help them track the spread and monitor the populations of this pest.
<urn:uuid:ea77cc4b-7bc3-46ee-a755-1f80d773ccf9>
CC-MAIN-2017-34
http://melindamyers.com/Radio-Pests-Disease-and-Weed-Management/pests-disease-and-weed-management/scarlet-lily-beetle.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106779.68/warc/CC-MAIN-20170820150632-20170820170632-00157.warc.gz
en
0.941816
236
3.359375
3
President Lyndon Johnson Appoints Thurgood Marshall, First African-American Supreme Court Member Thurgood Marshall (July 2, 1908 – January 24, 1993) was an American jurist and the first African American to serve on the Supreme Court of the United States. Before becoming a judge, he was a lawyer who was best remembered for his high success rate in arguing before the Supreme Court and for the victory in Brown v. Board of Education. He was nominated to the court by President Lyndon Johnson in 1967. On June 13, 1967, President Johnson appointed Marshall to the Supreme Court following the retirement of Justice Tom C. Clark, saying that this was "the right thing to do, the right time to do it, the right man and the right place." Marshall was confirmed as an Associate Justice by a Senate vote of 69-11 on August 31, 1967. He was the 96th person to hold the position, and the first African-American. President Johnson confidently predicted to one biographer, Doris Kearns Goodwin, that a lot of black baby boys would be named "Thurgood" in honor of this choice (in fact, Kearns's research of birth records in New York and Boston indicates that Johnson's prophecy did not come true). Marshall served on the Court for the next twenty-four years, compiling a liberal record that included strong support for Constitutional protection of individual rights, especially the rights of criminal suspects against the government. His most frequent ally on the Court (indeed, the pair rarely voted at odds) was Justice William Brennan, who consistently joined him in supporting abortion rights and opposing the death penalty. Brennan and Marshall concluded in Furman v. Georgia that the death penalty was, in all circumstances, unconstitutional, and never accepted the legitimacy of Gregg v. Georgia, which ruled four years later that the death penalty was constitutional in some circumstances. Thereafter, Brennan or Marshall dissented from every denial of certiorari in a capital case and from every decision upholding a sentence of death. In 1987, Marshall gave a controversial speech on the occasion of the bicentennial celebrations of the Constitution of the United States. Marshall stated, "the government they devised was defective from the start, requiring several amendments, a civil war, and major social transformations to attain the system of constitutional government and its respect for the freedoms and individual rights, we hold as fundamental today." In conclusion Marshall stated "Some may more quietly commemorate the suffering, struggle, and sacrifice that has triumphed over much of what was wrong with the original document, and observe the anniversary with hopes not realized and promises not fulfilled. I plan to celebrate the bicentennial of the Constitution as a living document, including the Bill of Rights and the other amendments protecting individual freedoms and human rights." Although he is best remembered for his jurisprudence in the fields of civil rights and criminal procedure, Marshall made significant contributions to other areas of the law as well. In Teamsters v. Terry he held that the Seventh Amendment entitled the plaintiff to a jury trial in a suit against a labor union for breach of duty of fair representation. In TSC Industries, Inc. v. Northway, Inc. he articulated a formulation for the standard of materiality in United States securities law that is still applied and used today. In Cottage Savings Association v. Commissioner of Internal Revenue, he weighed in on the income tax consequences of the Savings and Loan crisis, permitting a savings and loan association to deduct a loss from an exchange of mortgage participation interests. In Personnel Administrator MA v. Feeney, Marshall wrote a dissent saying that a law that gave hiring preference to veterans over non-veterans was unconstitutional because of its inequitable impact on women. Among his many law clerks were Judge Douglas Ginsburg of the D.C. Circuit Court of Appeals; Judge Ralph Winter of the United States Court of Appeals for the Second Circuit; United States Solicitor General Elena Kagan; well-known law professors Dan Kahan, Cass Sunstein, Eben Moglen, Susan Low Bloch, Martha Minow, Rick Pildes, and Mark Tushnet (and editor of Thurgood Marshall: His Speeches, Writings, Arguments, Opinions and Reminiscences, cited hereafter); Law Schools Deans Paul Mahoney of University of Virginia School of Law, and Richard Revesz of New York University School of Law. See, List of law clerks of the Supreme Court of the United States. He retired from the Supreme Court in 1991, and was reportedly unhappy that it would fall to President George H. W. Bush to name his replacement. In 1965 President Lyndon Johnson appointed Judge Marshall to the office of U.S. Solicitor General. Before his subsequent nomination to the United States Supreme Court in 1967, Thurgood Marshall won 14 of the 19 cases he argued before the Supreme Court on behalf of the government. Indeed, Thurgood Marshall represented and won more cases before the United States Supreme Court than any other American.
<urn:uuid:7a112d60-14f2-4fb2-85ce-06e261b7fc72>
CC-MAIN-2022-40
https://worldhistoryproject.org/1967/6/13/president-lyndon-johnson-appoints-thurgood-marshall-first-african-american-supreme-court-member
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00208.warc.gz
en
0.960892
1,025
3.734375
4
An easel is a wooden or metal stand used for holding a canvas, board or panel. There are many different types of easels, with varying levels of stability and mobility. These are the different types of easels available: A- Frame - a three legged easel which is economical and portable, however it lacks in stability. H Frame Easel - your standard studio easel. The H Frame Easel is sturdy but lacks portability. Giant Easel - basically a larger version of the H Frame Easel, used for large scale studio works. Convertible Easel - a versatile easel which 'converts' between a standard upright easel and a horizontal, tabletop easel. Single Mast Easel - the most basic and affordable type of easel. However it is also the least stable. Tabletop Easel - great for if you prefer to work at a desk. French Easel - the built in storage makes the French Easel a favorable choice for plein air painters. Display Easel - merely for 'displaying' your finished works. This easel is not suitable for painting on. Children's Easel - an easel specifically built for children.
<urn:uuid:7a8c47e9-307c-4ae7-8056-7d4751c7402f>
CC-MAIN-2017-51
https://drawpaintacademy.com/easel/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513784.2/warc/CC-MAIN-20171211164220-20171211184220-00363.warc.gz
en
0.905318
252
2.5625
3
“Homer (Ancient Greek: Ὅμηρος [hómɛːros], Hómēros) is best known as the author of the Iliad and the Odyssey. He was believed by the ancient Greeks to have been the first and greatest of the epic poets. Author of the first known literature of Europe, he is central to the Western canon. When he lived, as well as whether he lived at all, is unknown.” source: Wikpedia More info here at the University of Cincinnati Observation : More detail needed. Plus, this may need a re-write. Someone obviously composed the texts, so the question might be better phrased along the lines of 'Who wrote the texts attributed to Homer?'.
<urn:uuid:a2897624-5758-487b-b099-611508f1a956>
CC-MAIN-2019-30
http://wikenigma.org.uk/doku.php?id=start:history:homer
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525355.54/warc/CC-MAIN-20190717161703-20190717183514-00031.warc.gz
en
0.973844
162
3.140625
3
Since the early 1990s, Dubai's population has increased by more than 200 percent, according to the Government of Dubai's statistic center. This has caused drastic lifestyle changes for residents. With an abundance of housing, shopping and eating options, Dubai's fast-paced lifestyle provides the population with abundant convenience and variety. However, as the booming metropolis has grown, so has the population's obesity. Wafaa Al-Bassum, clinical dietician and diabetes educator at the Dr. Sulaiman Al-Habib Medical Group, believes there are several factors that contribute to the recent rise of the obesity rate in Dubai. "I always tell my patients: 'It is your choice—this is your health and you know that things are not healthy,'" says Al-Bassum. According to Al-Bassum, the obesity problem is a result of three factors: Dubai's wide variety of eating options, the popularity of foods that are heavy in fat, and the basic health education of the population.
<urn:uuid:e6a59dc2-b0cf-4140-b398-d67b2315b21d>
CC-MAIN-2021-25
https://pulitzercenter.org/stories/dubais-rapid-transformation-spurs-change-eating-habits
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586465.3/warc/CC-MAIN-20210612222407-20210613012407-00404.warc.gz
en
0.963482
208
2.53125
3
Waste Disposal/Sanitation Teacher Resources Find Waste Disposal/sanitation educational ideas and activities Showing 1 - 20 of 57 resources Integrated Unit on Nevada Solid Waste Disposal Sixth graders walk through an environment and record on a worksheet things they saw, touched,and heard as well as a list of animals and people. In this investigative lesson students become aware of environments and their interdependence and how their balance is important. 6th Science 3 Views 0 Downloads A Messy Survey Learners examine food waste and the concept of recycling. In this recycling lesson, students learn what composting is, conduct a lunchroom survey, and tabulate the results. They study vocabulary related to composting and share the results of the food-waste survey. 3rd - 5th Science 4 Views 16 Downloads A Messy Survey Students explore the concept of composting. In this environmental lesson, students examine the food waste in their school's cafeteria and recognize composting as a way to care for the planet as they share the results a food waste survey they conduct. 3rd - 5th Social Studies & History 3 Views 2 Downloads Environment: How'd That Pollution Get There? Students examine how global wind and water patterns aid in the spread of worldwide pollution. In groups, they read articles about the domino effect of pollution and create posters displaying its journey. On blank world maps, students trace the distribution pattern of the pollution mentioned in their article. 6th - 12th Science 4 Views 12 Downloads Trash! How Cities Work: Dealing with Garbage in the US and India Students identify how different cultures deal with the challenge of trash. Read an excerpt from a chapter book based on real life written from the Southern Indian perspective. Describe the life of a street child in Southern India. Explain the importance of recycling and list at least 5 ways to reduce garbage. 4th - 6th Social Studies & History 4 Views 32 Downloads Coal, Steam, and the Industrial Revolution Your young historians will learn about the truly revolutionary processes and developments of the Industrial Revolution in this presentation. The narrator begins by discussing specific advancements of the British textile industry, and then details arguments behind why the Industrial Revolution originated in Europe versus China and India. 11 mins 9th - 12th Social Studies & History 5 Views 3 Downloads CCSS: Adaptable The Importance of Recycling Batteries Students discover the types of batteries and their uses. They experience static electricity by rubbing glass jars and using it to raise their hair. After discussing the importance of recycling batteries and using ones that are rechargeable, they build homemade wet cells based on the Voltaic cell. 5th - 12th Math 18 Views 61 Downloads The Hydrologic (Water) Cycle Learners construct a model of the hydrologic cycle, and observe that water is an element of a cycle in the natural environment. They explain how the hydrologic cycle works and why it is important, and compare the hydrologic cycle to other cycles found in nature. 9th - 12th Science 109 Views 352 Downloads Three R's to Environmental Stewardship: Earth Day Students explore the ways to conserve our natural resources. In this recycling, reusing, and reducing instructional activity students read Dinosaurs to the Rescue and apply their findings to learning ways to conserve resources. Students complete a worksheet and complete a chosen project for Earth Day. 3rd - 5th Science 9 Views 87 Downloads Wow! Separate organelles from the cells of dried peas. Observe vacuoles in beet cells. Watch protists in action. Examine SEM photographs. Beginning biologists get a complete exposure to the structure and function of cell organelles. Two assessments are also available, which you can assign as homework. 9th - 12th Science 9 Views 66 Downloads Industrialization of the American Landscape Students explore the Chernobyl incident and the resulting environmental health impacts. They explore three different isotopes that were released into the atmosphere. Through inquiry, students determine the difference between types of ionizing radiation and how elements are transmuted. 9th - 12th Science 5 Views 18 Downloads Pollution Solutions: Earth Day Eighth graders explore water pollution. In this stewardship lesson, 8th graders draw comparisons between potable and impaired waters. Students use the Learning Link website to examine ways people are fighting pollution and then design an action hero to end water pollution. 8th Science 3 Views 4 Downloads Organic and Inorganic Recycling Students examine their role in polluting the environment and discuss the importance of recycling. In groups, they place earthworms into compost piles to observe why they are considered natural recyclers. They also practice sorting a pile of materials into recycleable and non-recyclable objects. 5th - 8th Science 3 Views 22 Downloads Recycling Lesson Plan Students examine the role of choice in a democracy, the choice to participate and not to participate. They take a position on the role of recycling and whether in a democracy people can be forced to recycle. They break into for and against groups, build an argument and debate the conclusion. 7th - 10th Social Studies & History 3 Views 1 Download
<urn:uuid:7bb452cf-2267-438a-9dec-aba6ec6df582>
CC-MAIN-2014-41
http://www.lessonplanet.com/lesson-plans/waste-disposal-sanitation
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657114926.36/warc/CC-MAIN-20140914011154-00306-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.910481
1,085
4.03125
4
Q & A: Royal British Titles Britain’s royalty and nobility fascinate the world. We wonder what all those titles mean and who all those people we’ve seen at royal weddings and funerals are. The British royal family is like other families, made up of spouses, children, grandchildren, grandparents, uncles, aunts and cousins. The head of the British royal family is Queen Elizabeth II, and she is the one who decides who are bona fide members of the family and what titles they will carry. Who are the Duke of York and the Duke of Kent and how did they get their titles? To answer the question – a duke is the highest rank you can achieve without being a king or a prince. Historically a duke is a high-ranking nobleman, land-owner or a prince, and in feudal times was the lord over part of the country. Today the titles are largely symbolic and there are 28 dukedoms. Some people (like Prince Charles) have several dukedoms and some dukedoms are unassigned. When a duke who does not have an heir dies, the title returns to the royal family to be given out to someone new. Not everyone who carries the title duke or earl is a member of today’s royal family. Britain has a system of peerage, which ranks members of the nobility and aristocracy. Many titles of nobility were won many years ago through great wealth, favors to the king or good deeds and are passed on from one generation to the next. This is known as the inherited peerage. For example, Earl Spencer, the brother of the late Diana, Princess of Wales, is the ninth man in his family to carry that title. Other noble titles are given on merit or on special occasions. The life peerage are titles that the monarch confers on exceptional people during their lifetimes, and those titles do not pass to children or descendents. Margaret Thatcher, the former prime minister of Britain, is now Baroness Thatcher. The British prime minister consults with the queen about who is deserving of a life peerage, and several people are elevated to the peerage every year. Life peers get a seat in the House of Lords, but a law passed in 1999 limits the right of hereditary peers to have a seat. The order of the titles in British Isles nobility from highest to lowest are: • Duke ( duchess): The name is derived from the Latin dux, which means leader. Most dukedoms carry a place name, although that means little today. • Marquess or marquis (marchioness): This title appeared in England with the Norman Conquest and was given to nobles in charge of border areas. The name is related to “frontier.” • Earl (countess): The name comes from a Norse word, jarl, which meant leader. It is equivalent to a count in European nobility. • Viscount (viscountess): Pronounced “VI-count”, this title derives from the Latin comes for a companion and was sort of an assistant nobleman in the old days. • Baron ( baroness): The lowest rank of nobility came to England with the Normans, also, and the word is derived from the Norman word for a “freeman”. The highest title of a life peerage. Below these are the lower nobility, who carry the titles: • Baronet: This title is granted to members of the upper classes, referred to as the gentry. • Knight (dame): In medieval times, knights were the soldiers of the king or of princes. Now, the queen grants knighthood to her subjects who have achieved great success in their professions. Paul McCartney, the former Beatle, has been knighted as has Elton John. • Esquire: In medieval times, a candidate for knighthood. Nowadays, it is applied to members of the gentry just below knights. The queen bestowed titles on her sons at their marriages and gave her daughter a special title. She has several titles that are hers to do with as she wishes. If an inherited peer dies without an heir, the title becomes the crown’s property. Some titles that the queen’s sons hold are part of the Scottish or Irish peerage. The princes’ titles can be inherited by their sons. According to the royal family’s official Web site, here are the members of the family today: • Queen Elizabeth II. When Elizabeth Alexandra Mary was born in 1926, no one expected her to become the queen. Her father, the Duke of York, was Prince Albert, the second oldest son of King George V, and his older brother, Prince Edward, was the heir apparent to the throne. Prince Edward did become King Edward VIII when George V died in early 1936. But in one of the most famous scandals of the 20th century, Edward abdicated the throne because he wanted to marry a twice-divorced American woman named Wallis Simpson. So, in late 1936, Prince Albert became King George VI, and his older daughter became the heir presumptive, meaning that unless her parents had a son, she would succeed to the throne. Elizabeth became queen at her father’s death in 1952. • Elizabeth is the only member of the royal family who is referred to as "Her Majesty,” an address that is reserved for kings and queens. Everyone else in good standing is “His Royal Highness” or “Her Royal Highness.” • Prince Philip, the Duke of Edinburgh. The queen’s husband, like the queen, is a great-great-grandchild of Queen Victoria, and he was a member of both the Greek and Danish royal families. He spent a great deal of his childhood in England and served in the Royal Navy. He gave up his royal title and became a British citizen as a young adult. He received his noble title just before he and then Princess Elizabeth wed in 1947. He can’t be king because that would actually give him a rank higher than his wife’s. • The Prince of Wales. The queen has given her oldest son, Prince Charles, several titles, chief among them Prince of Wales. That is the traditional title carried by the heir to the British throne. He is also Duke of Cornwall, Duke of Rothesay, Earl of Carrick and Baron Renfrew, Lord of the Isles, and Prince and Great Steward of Scotland. His sons, Prince William and Prince Harry, are second and third in the line of succession after Charles. Their mother, of course, was Diana, who died in 1997. • The Duke of York. The queen’s second son, Andrew, is also Earl of Inverness and Baron Killyleagh, titles his mother gave him when he married. His wife, Sarah Ferguson, became the Duchess of York, and even though the couple divorced in 1996, she is known as Sarah, Duchess of York. She is no longer “Her Royal Highness” though. Their daughters are Princess Beatrice and Princess Eugenie. Because Prince Andrew has no sons, his title will not be passed on to an heir. It is the crown’s property, and when the current Duke of York dies, a king or queen in the future could give the title to another man. • The Earl of Wessex. The youngest son of the queen prefers to be called Edward Windsor when he is working as a television producer, but he is listed as the Earl of Wessex in the royal family. He became an earl at his marriage in 1999 to Sophie Rhys-Jones, who is now the Countess of Wessex. It is unusual for the son of a sovereign to have a title as low as earl. • The Princess Royal. The queen gave her only daughter, Princess Anne, this special title in 1987. It is a title that traditionally can only be given to the monarch’s oldest daughter, but not all oldest daughters get the title. The Princess Royal, married for the second time and the mother of two, is considered the hardest working member of the royal family, sponsoring many charitable causes. • Princess Alice, Duchess of Gloucester. Princess Alice is the widow of the Duke of Gloucester. Her husband, Prince Henry, was the third son of King George V, the queen’s grandfather. The Duke and Duchess of Gloucester. Prince Richard is Princess Alice’s son and the queen’s cousin, and the duchess is his wife, the former Birgitte van Deurs. He inherited his father’s title, even though he was a second-born son because his older brother died in an accident some years before his father died. • The Duke and Duchess of Kent. The duke is the queen’s cousin, Prince Edward. His father was the fourth son of King George V. The Duke of Kent inherited his title from his father, who died in an accident in 1942. The Duchess of Kent is the former Katharine Worsley. • Prince and Princess Michael of Kent. Prince Michael is the younger brother of the Duke of Kent. The prince’s wife is known as Princess Michael of Kent, even though her given name is Marie-Christine. That is the nobility’s way of indicating that she is a princess by marriage, not by birth. Prince Michael is no longer in the line of succession for the throne. He gave up his spot when he married Princess Michael, a Roman Catholic divorcee, but the two still perform royal duties and represent the queen at weddings and funerals. • Princess Alexandra. She is the sister of the Duke of Kent and Prince Michael of Kent. Her husband is Sir Angus Ogilvy, and they have two children. The following 10 people are in line of Succession to the British Throne. 1. HRH The Prince of Wales (b. 1948) 2. HRH Prince William of Wales (b. 1982) 3. HRH Prince Henry of Wales (b. 1984) 4. HRH The Duke of York (b. 1960) 5. HRH Princess Beatrice of York (b. 1988) 6. HRH Princess Eugenie of York (b. 1990) 7. HRH The Earl of Wessex (b. 1964) 8. Lady Louise Mountbatten-Windsor (b. 2003) 9. HRH The Princess Royal (b. 1950) 10. Peter Phillips (b. 1977) Can a member of the royal family do as they please? It is true that members of the royal family do not have any formal constitutional functions. They do not, however, have the same freedom as other citizens to behave and say in public what they wish. For example, if they intend to make a speech which could be considered controversial, it is courteous for them to send a copy of their speech beforehand to the appropriate government minister. The Sovereign and his heir do not vote in elections, general or local ones, because they must remain politically neutral and it would be considered unconstitutional for them to do so. Until 1999, the members of the royal family who held a hereditary peerage were subject to a ‘legal incapacity to vote’, as members of the House of Lords. The House of Lords Act of 1999 has removed that disqualification for all peers who lost the right to sit in the House of Lords, including the Prince of Wales, the Dukes of Edinburgh, York, Gloucester, and Kent, and the Earl of Wessex. Further, the members of the royal family do not stand for election to political or non-political positions. The royal family’s public role is to stand for unity and neutrality. The members of the royal family are bound by the Act of Settlement and the Royal Marriages Act when planning to marry. Since the spouse of a member of the royal family is instantly in a special position, as the possible parent or ancestor of a future sovereign, it is indeed perfectly relevant for the Crown to have a say in whom a member of the royal family marries. If any member of the royal family refuses to accept that authority they may act as they wish, but forfeit their rights and privileges. If they wish to retain the privileges of their rank, they have a duty of obedience to the law – and it is perfectly reasonable that permission to marry should be part of the law (every European royal family have “house Laws” regulating marriage). Even in “ordinary” families, parents indicate their consent or disapproval of the choice of spouse of a family member, and the consequence of disobedience may occasionally lead to alienation in a family. There isn’t anything particularly odd or unusual about this. In the case of the royal family, Princess Margaret’s decision not to marry Peter Townsend was not least because she was persuaded that as someone so close to the Throne she had a duty of obedience to royal tradition and to the teachings of the Church of England (as they then stood). In both the cases of the Duchess of Windsor and Princess Margaret, it was not the Royal Marriages Act of 1772 which stood in the way of their marriages. Rather, it was the laws of the Church of England, and the impossibility at that time of being married to a divorced person and being able to receive the Sacraments (a necessary part of the Coronation service). When a man marries a princess or a queen, does he take his wife’s rank? When a man marries a princess or a queen, he does not take his wife’s rank and become automatically a prince or a king. In English Common Law a man retains his own name upon marriage. Conversely, when a woman marries a prince or a king, she becomes automatically a princess or a queen; this is in keeping with English Common Law, whereby a woman is entitled to her husband’s name. If the husband of a queen were permitted to be known as king, he would then technically rank higher than his wife the queen. The husband of a princess or a queen can have a peerage or a title conferred upon him by the Sovereign. Three examples when a peerage or a title was bestowed on the spouse of a princess or a queen: • 1961: when Antony Armstrong-Jones, husband of HRH Princess Margaret, was made Earl of Snowdon. • 1947: when Lieutenant Philip Mountbatten, husband of HRH Princess Elizabeth (later Queen Elizabeth II), was made Duke of Edinburgh on the day of his wedding. • 1857: when Prince Albert of Saxe-Coburg and Gotha, husband of Queen Victoria, was granted the title Prince Consort. It is worth noting that the British Constitution does not make any provision for the position of a husband to a Queen. A man who marries a princess who later becomes queen or who marries a queen regnant, does not become king. Queen Victoria succinctly summarized the situation: 'It is a strange omission in our Constitution that while the wife of a King has the highest rank and dignity in the realm after her husband assigned to her by law, the husband of a Queen regnant is entirely ignored by the law.’ Why Is Queen Elizabeth II “HM” and not “HRH”? The style His (or Her) Majesty is reserved for those individuals who are kings or queens. Elizabeth II as queen is styled Her Majesty. If she was a princess who was the daughter of a king or queen, she would be styled Royal Highness (HRH). (HM was “HRH Princess Elizabeth” during her father’s lifetime.) In the United Kingdom, the style HM is also the style of the wife or the widow of a king. The children of HM The Queen (Charles, Anne, Andrew and Edward) are styled HRH because they are children of the sovereign, a queen. Their style and title are allowed to them as children of the sovereign. The children of HRH Princess Margaret (David and Sarah) are not HRH because princesses do not usually transmit their titles to their children. They are the children of a royal mother but take their rank from their father. Queen Elizabeth II HRH The Duke of Edinburgh (Prince Philip of Greece) (b. 1921) HRH The Prince of Wales (Prince Charles) (b. 1948) HRH The Princess Royal (Princess Anne) (b. 1950) HRH The Duke of York (Prince Andrew) (b. 1960) HRH The Earl of Wessex (Prince Edward) (b. 1964) HRH Prince William of Wales (b. 1982) HRH Prince Henry (Harry) of Wales (b. 1984) (sons of The Prince of Wales) HRH Princess Beatrice of York (b. 1988) HRH Princess Eugenie of York (b. 1990) (daughters of The Duke of York) Lady Louise Mountbatten-Windsor (b. 2003) (daughter of The Earl of Wessex) Peter Phillips (b. 1977) Zara Phillips (b. 1981) (children of The Princess Royal) Nephew and Niece: David Armstrong-Jones, Viscount Linley (b. 1961) Lady Sarah Chatto (née Armstrong-Jones) (b. 1964) (children of Princess Margaret) What is the address of HM The Queen? When sending a letter to HM, the envelope should read as follows: The Private Secretary to HM The Queen London SW 1
<urn:uuid:e96e75e8-77e1-45db-bf7c-6ee446d339d6>
CC-MAIN-2018-05
http://eng.1september.ru/article.php?ID=200801008
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890947.53/warc/CC-MAIN-20180122014544-20180122034544-00653.warc.gz
en
0.977845
3,682
2.96875
3
N. B. KURNICK, M.D. Reports on hunger edema were published many centuries ago. Diogenes Laertius described the fate of the philosopher Heraclitus (born ca. 435 B.C.) who, despairing of his fellow man, withdrew to the hills as a hermit. Here he subsisted only on herbs, became dropsical and died. Since then, recorded history reports the frequent recurrence of epidemics of edema in periods of famine.1 The condition particularly attracted the attention of the medical profession in Central Europe during its outbreak in the First World War, when it became known as "War Edema" These observers were the first to appreciate the importance of the KURNICK NB. WAR EDEMA IN THE CIVILIAN POPULATION OF SAIPAN1. Ann Intern Med. ;28:782–791. doi: 10.7326/0003-4819-28-4-782 Download citation file: Published: Ann Intern Med. 1948;28(4):782-791. Results provided by: Copyright © 2018 American College of Physicians. All Rights Reserved. Print ISSN: 0003-4819 | Online ISSN: 1539-3704 Conditions of Use
<urn:uuid:ee578f4e-8d20-45cf-8543-7111d52f7c5d>
CC-MAIN-2018-47
http://annals.org/aim/article-abstract/673780/war-edema-civilian-population-saipan
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744368.74/warc/CC-MAIN-20181118114534-20181118140534-00215.warc.gz
en
0.935119
265
2.859375
3
The effects of this storm were pretty substantial. It hadn't even been a month since the infamous Hurricane Katrina had hit, and Rita old made the effects Katrina had on Louisiana worse. In fact, because Rita hit so soon after Katrina, a record-breaking 2.5 to 3.7 million people evacuated from the Texas coastline in preparation. Rita left areas of Texas and Louisiana without power for several weeks, and resulted in a total of $12 billion in damage. And that number is reported in 2005 US dollars; the damage would have amounted to about $15.2 billion in 2012 US dollars. On top of the material damage, as many as 120 deaths across 4 different states were reported. Texas reported 113 of these deaths. While only 7 were directly related to the hurricane (caused by winds, flooding, tornadoes, storm surges, or oceanic effects), all were in some way related to the storm. This image shows Hurricane Rita as it starts to make its landfall on the Gulf Coast on September 23, 2005. This image is a storm track map of Hurricane Rita's entire progression.
<urn:uuid:3174e713-5053-4602-bf14-13a4594bbaa7>
CC-MAIN-2016-30
http://enb110-efp-2012.blogspot.com/2012_12_01_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829320.91/warc/CC-MAIN-20160723071029-00162-ip-10-185-27-174.ec2.internal.warc.gz
en
0.960997
222
3.421875
3
The Ivory Coast produces a large portion of the world’s cocoa beans, some sources say up to forty percent. Apparently they want to increase that figure to fifty. None of those facts are problematic. But one issue some might not be aware of is the use of pre-teen and teen slaves in cocoa production there. According to Okio Credit USA there might be 100,000 youth slaves in the Ivory Coast. A case study from American University says that slave traders are trafficking boys ranging from the age of 12 to 16 from their home countries and are selling them to cocoa farmers in Cote d’Ivoire. They work on small farms across the country, harvesting the cocoa beans day and night, under inhumane conditions. Most of the boys come from neighboring Mali, where agents hang around bus stations looking for children that are alone or are begging for food. A UNICEF estimate pegged the number of children trafficked in West and Central at 200,000 per year but they are not all for the cocoa industry. Consumers of chocolate in the West aren’t to blame for the enslavement of African youth, because they have no direct involvement in the horrific practice. It is also likely most of them aren’t aware a portion of the chocolate sold in the West is made from cocoa beans picked by slaves. Articles like these sometimes seem to imply the point is to make people feel bad, and that is not true at all. The point is to inform ourselves about the sources of our food, so we don’t inadvertently wind up supporting the abuse of human rights in this case, and environmental destruction in others. A recent awareness campaign claims Hershey’s won’t divulge their African cocoa suppliers because they might be buying cocoa beans from farms using child slaves. One key aspect of the situation from the consumer point of view is fair trade chocolate. When you see chocolate products with Fair Trade labels, they should have cocoa bean sources from farms that don’t use child slaves or abusive labor practices. One example is Divine Chocolate, which is associated with Lutheran World Relief, an international non-profit working to alleviate poverty. Fair trade chocolate might cost slightly more, but you won’t be supporting child slavery. Children shouldn’t have to be enslaved and beaten for any reason, but especially not so people in affluent countries can have a snack or dessert. Image Credit: Public Domain
<urn:uuid:b7c232ef-93aa-47d6-94c6-9ab160ffcf7e>
CC-MAIN-2014-23
http://www.care2.com/greenliving/chocolate-and-child-slavery.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510256757.9/warc/CC-MAIN-20140728011736-00039-ip-10-146-231-18.ec2.internal.warc.gz
en
0.945879
495
3.265625
3
A high-precision test bench for LISA technology AEI researchers develop novel precise laboratory setup to verify technology for LISA, the planned gravitational-wave observatory in space For the first time, it has been possible to test laser measurement technology for LISA in laboratories almost under mission conditions. A team of researchers led by the Max Planck Institute for Gravitational Physics (Albert Einstein Institute; AEI) and the Institute for Gravitational Physics at Leibniz Universität in Hannover, Germany, achieved the breakthrough with a novel experiment. The work ties up with the LISA Pathfinder mission, which tested LISA technologies in space from 2015 to 2017. LISA is a planned observatory in space that will detect gravitational waves inaccessible on Earth. A consortium of international scientists is currently developing LISA as a mission of the European Space Agency (ESA). With their experiment, the AEI scientists demonstrate the functionality of the LISA phasemeter, which will be the central measuring unit of the observatory. Their experiment can also be easily extended for further testing and can thus verify other steps of LISA measurements observatory. “All components of the planned LISA space observatory must meet strict precision requirements to measure gravitational waves,” says Dr. Thomas Schwarze, lead author of the article published today in the renowned journal Physical Review Letters. “Creating conditions in a laboratory under which the enormous precision for LISA can be verified requires great care. For the first time, we can test an important part of LISA technology under almost realistic mission conditions in our laboratories and show that it works as intended.” LISA – a gravitational-wave observatory in space LISA is scheduled to launch into space in 2034 as a mission of the European Space Agency (ESA). The mission will consist of three satellites that will create an equilateral laser triangle with each side approximately 2.5 million kilometers long. The distances of this formation flight in space are changed by a trillionth of a meter by gravitational waves. To detect these tiny changes, instruments (phasemeters) in the LISA satellites monitor and measure the laser light exchanged between them. This measurement has to be performed with highest precision – like an extremely accurate microphone with low noise and low distortion – over a large range of 8 to 10 orders of magnitude. Testing LISA measurements in a laboratory In their article, the researchers describe a new experimental setup which, for the first time, enables laser-based LISA measurements in a laboratory under almost realistic mission conditions and use it to verify the accuracy of the phasemeter. The setup consists of an optical bench which, due to its special construction, is highly precise and stable and thus eliminates all undesirable noise sources ten times better than previous experiments. The required LISA accuracy in the trillionth of a meter range can thus be achieved. On the optical bench, three laser beams produced in a controlled manner are superimposed in pairs in order to obtain six new laser beams with precisely defined properties. By skillfully superimposing three of these mixed beams and measuring their properties with the phasemeter, its function can be precisely checked. Successful test under almost realistic mission conditions The phasemeter tested with the setup meets the mission requirements almost throughout LISA’s entire measurement range. This successful test is the first under almost realistic conditions. It shows that with the new setup and with small modifications, further central components of the LISA mission can be tested under even more realistic conditions. “It’s crucial to understand all the details of the LISA mission precisely and to test them in advance in the laboratory,” explains Prof. Gerhard Heinzel, leader of the research group for space interferometry at AEI Hannover. “Only in this way can we be sure that the complex mission will work as planned. Once the satellites are in orbit around the Sun, we can no longer modify the hardware.” Future gravitational-wave astronomy with LISA LISA will measure low-frequency gravitational waves with oscillation periods from 10 seconds to more than half a day, which cannot be observed with detectors on Earth. Such gravitational waves are emitted, for example, by supermassive black holes, millions of times heavier than our Sun, which merge at the centers of galaxies, the orbital movements of tens of thousands of binary stars in our Galaxy, and possibly from exotic sources such as cosmic strings and the echo of the Big Bang. Between December 2015 and July 2017, the LISA Pathfinder mission demonstrated other LISA components in space and showed that they exceeded requirements throughout the LISA measurement band. ESA is currently conducting the Phase A system study with the international LISA consortium. A preliminary design of the space components is to be developed in preparation for the mission.
<urn:uuid:bf9ecf5e-c86c-483e-b754-fece85009df2>
CC-MAIN-2021-25
https://www.aei.mpg.de/57830/a-high-precision-test-bench-for-lisa-technology
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487612537.23/warc/CC-MAIN-20210614135913-20210614165913-00240.warc.gz
en
0.917003
986
3.59375
4
Growers in South Australia and Victoria have been equipped with greater knowledge to increase nitrogen fixation by their pulse crops during workshops in June. The "Boosting on-farm nitrogen fixation in pulses" workshops featured presentations on the latest research into inoculation techniques, while also discussing factors relating to inoculation - including dry sowing, acid tolerance, chemicals, soil types and the effectiveness of new and existing rhizobia strains. Workshops were held at Kimba, Cummins and Adelaide, in South Australia, and Swan Hill, in Victoria, with about 80 growers and advisers attending. Researchers from Primary Industries and Regions SA's research division the South Australian Research and Development Institute (SARDI), Dr Liz Farquharson and Ross Ballard, as well as independent consultant Dr Maarten Ryder, shared their insights at the workshops. Attendees also heard from a local agronomist on region-specific issues regarding crop management to maximise nitrogen fixation benefits. SARDI senior research officer Dr Liz Farquharson says topics covered included general inoculation practice, dry sowing, acid soils and inoculant compatibility with pesticides. "A key component of the workshops was an interactive hands-on session where participants could inspect plants for adequate nodulation," Dr Farquharson says. "Prior to the workshops, growers and advisers were encouraged to dig up some pulse plants with as much of the root system as possible and bring them along to the workshops to assess early nodulation. "This included providing a guide on how to assess crop nodulation, including when and how to sample." Key discussion points arising from the workshops were: - The impact of seed dressing chemicals on rhizobia survival; - The difference between peat and granule inoculants; and - The impact of suboptimal conditions on rhizobia survival. Research conducted by SARDI has shown that increasing the rate of inoculant applied as peat slurry to seed improves nodulation where conditions at sowing are suboptimal, for example, in dry or acidic soils. Researchers have identified rhizobia strains with improved acidity tolerance and have been testing the best strains in the field since 2015. The performance of new rhizobia strains for faba beans and lentils across a number of scenarios has been encouraging and there are good prospects for commercialisation, according to researchers. Growers and advisers who missed out on the June workshops have another opportunity to learn about unlocking the full potential of nitrogen fixation at additional workshops to be held in South Australia and Victoria in September and October. These workshops are an initiative of the GRDC investment "Increasing the effectiveness of nitrogen fixation in pulse crops through extension and communication of improved inoculation practices in the southern region". The project's partners are: - Mallee Sustainable Farming; - Bates Ag; - Rural Directions; - Southern Farming Systems; - Birchip Cropping Group; - Moodie Agronomy; - Riverine Plains; - Trengove Consulting; - Ryder Ryan Research; and GRDC Research Code 9175525 More information: Belinda Cay, AgCommunicators, 0423 295 576
<urn:uuid:f6c785e2-ffc6-4f4c-95e4-3c2352409b21>
CC-MAIN-2019-35
https://groundcover.grdc.com.au/story/6295928/workshops-boost-nitrogen-knowledge/?cs=14042
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315750.62/warc/CC-MAIN-20190821022901-20190821044901-00126.warc.gz
en
0.92673
660
2.515625
3
The Tokyo Metropolitan Government is currently studying ways to install power supplies in public parks and cemeteries that are meant to hold in case the capital is struck with a major earthquake disaster. It is also closely studying building a generator for the purpose. To test the concept, the metro government is planning to set up a power generator in Toneri Park in Adachi Ward. This plan has been moved up from the initial target of 2020. Tokyo has already designated 60 parks and six cemeteries as emergency temporary evacuation sites in its regional disaster response plan, and the Metro government is considering installing emergency generators in them. In cases of a blackout brought about by a major disaster, these temporary evacuation sites must have functioning toilets, lighting and signage. The power for those is expected to come from the generators, which will also power nearby hospitals and distribution centers for emergency supplies. Once the study has concluded, the metro government Construction Bureau will now ascertain the minimum power requirement for lighting and park offices, and how much power can be distributed to emergency facilities located within a few hundred meters of the parks and cemeteries. Other types of power sources will also be considered depending on the amount of power they can provide. Comments Off on JDP Startup Corner: Pros & Cons of Working with a Partner in Japan
<urn:uuid:7f71e1f9-f914-40de-ba86-dba7b93cacff>
CC-MAIN-2015-27
http://japandailypress.com/tokyo-studying-installation-of-emergency-power-supply-in-parks-cemeteries-1421461/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096579.52/warc/CC-MAIN-20150627031816-00072-ip-10-179-60-89.ec2.internal.warc.gz
en
0.964655
264
2.703125
3
This isn’t so much about a current wearable product, but we’re betting it’s a technology you’ll be seeing pretty soon. Researchers at Princeton University have developed a new approach that uses mid-infrared light to measure blood glucose levels without the need for a blood stick. Wearables that monitor heart rate typically use LEDs that transmit near-infrared light, with a wavelength somewhere around 1 micron. That’s the type of light used in fiber optic communication, which is why it’s been miniaturized and is easily available. The wavelength of mid-infrared light, however, is between 3 and 8 microns, and is typically what heat-seeking missiles home in on. It requires more energy to generate than near-infrared does, which makes miniaturization more difficult. That’s one of the next steps for researchers. Accuracy of the readings is not as good as with a blood stick but is apparently well within medically accepted standards. So you won’t see stickless glucose monitoring in a wearable anytime soon. But scientists are clearly working on it. The research was published July 1 in the journal Biomedical Optics Express (and we know you were just about to get around to reading that, right?). Here’s the press release about it from Princeton, which came out late this week.
<urn:uuid:c6fc8f82-8755-46f4-a5ee-5a47bb55c0eb>
CC-MAIN-2018-22
http://wearablesinsider.com/2014/08/researchers-use-mid-infrared-laser-measure-blood-glucose-levels/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866870.92/warc/CC-MAIN-20180524205512-20180524225512-00614.warc.gz
en
0.960571
286
3.078125
3
Beat the heat this summer In the hot weather, you need to take care of your health. Western Australia can experience long periods of extreme heat, where the maximum and minimum temperatures are much hotter than usual. The WA Department of Health advises people to follow the following information to stay safe as the weather heats up. How can you plan ahead for the heat? - Check fans and air conditioners are working and that filters and air vents are clean. - If you need to service or replace your fan or air-conditioner, try to do it before the summer rush. - If you have reverse cycle air-conditioning, check that it is set to ‘cool’ before summer begins. - If you are worried about the cost of using your air-conditioner, investigate whether concessions are available on your energy bills. - Make a plan for keeping in regular contact with friends and neighbours when it is very hot. - Make sure you have food and other groceries at home so you are less likely to have to go out when it is really hot. - Take care when you buy, store and handle food in hot weather to reduce the risk of food poisoning. - Listen to radio and television weather reports and try to plan ahead for the hot days. How can you keep cool in the heat? - Drink plenty of fluids: water, diluted juice (mixed with water), low sugar sports drinks. - Limit or avoid alcohol and caffeinated drinks (including tea, coffee and energy drinks) as these can increase dehydration. - Make ice cubes from water or cordial and suck them. - Wear light-coloured, loose clothing. - Stay indoors with a fan or air-conditioner on (ensure adequate ventilation if using a fan). - Take a cool shower or bath, or put your feet in a bowl of cool water. - Use a spray bottle filled with water, or a wet cloth, to cool your face and body. - Keep curtains, blinds and windows closed during the day to keep your home cool. - Sleep with just a sheet over you, in the coolest part of the house. - Limit time spent outdoors: go early morning or late evening, stay in the shade, put on a hat and sunglasses, and apply sunscreen. - Always carry a water bottle when out.
<urn:uuid:15b7d29d-52c0-4b86-89ad-d6af57c39596>
CC-MAIN-2019-35
https://southernplus.org.au/2018/12/21/beat-the-heat-this-summer/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315936.22/warc/CC-MAIN-20190821110541-20190821132541-00022.warc.gz
en
0.910898
486
2.75
3
(Hebrew Ashdodh; in Septuagint Azotos) (1) One of the five great cities of the Philistines (Joshua 13:3), the modern Esdud, situated three miles from the Mediterranean Sea, about half-way between Gaza and Jaffa. The temple of Dagon, whither the Ark of the Covenant was carried by the Philistines, was situated here (1 Samuel 5:1-5; 1 Maccabees 10:83; 11:4). Azotus, like other Philistine cities, suffered varying fortunes in the wars with Israel, Assyria, and Egypt. Oxias fought against it (2 Chronicles 26:6), Sargon besieged and took it (Isaiah 20:1; Schrader, "Keilinschriftliche Bibliothek", II, 66-67), and Sennacherib did likewise (Schrader, op. cit., II, 90-91). According to Herodotus, Psammetichus besieged the city for twenty years. In 163 B.C. Judas Machabeus cleared Azotus of idols (1 Maccabees 5:68), and in 148 B.C. Jonathan and Simon burnt the temple of Dagon (1 Maccabees 10:83-84). Today Esdud is a modern village, with many ruins attesting its glorious past. In the New Testament Azotus is mentioned in connection with Philip's return from Gaza (Acts 8:40). Situated near the seacoast, between Jaffa and Ascalon. Its episcopal list (325-536) is given in Gams (452). It is the Ashdod of the Book of Josue (xv, 47), was one of the five principal cities of the Philistines, and the chief seat of the worship of their god Dagon (1 Samuel 5:1-7). Herodotus mentions it (II, 157) as having withstood King Psammetichus of Egypt in a siege of twenty-nine years, the longest then known. Lequien, Oriens Christ. (1740), III, 659-662; Robertson, Biblical Researches, II, 368; Vigouroux in Dict. De la Bible, s.v. Azot. APA citation. (1907). Azotus. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/02169a.htm MLA citation. "Azotus." The Catholic Encyclopedia. Vol. 2. New York: Robert Appleton Company, 1907. <http://www.newadvent.org/cathen/02169a.htm>. Transcription. This article was transcribed for New Advent by Susan Birkenseer. Ecclesiastical approbation. Nihil Obstat. 1907. Remy Lafort, S.T.D., Censor. Imprimatur. +John M. Farley, Archbishop of New York. Contact information. The editor of New Advent is Kevin Knight. My email address is feedback732 at newadvent.org. (To help fight spam, this address might change occasionally.) Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads.
<urn:uuid:54088e64-1d3c-4cd3-bf72-86b1a47988cf>
CC-MAIN-2013-48
http://www.newadvent.org/cathen/02169a.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164695251/warc/CC-MAIN-20131204134455-00041-ip-10-33-133-15.ec2.internal.warc.gz
en
0.867824
713
3.09375
3
September is gynaecological cancer awareness month, and it is crucial to recognize the symptoms of different types of gynaecological cancers. Ovarian cancer, in particular, can often go undetected due to its similarity to common illnesses. Bloating, for example, is a typical symptom of ovarian cancer, but many women may dismiss it as a result of their diet or menopause. Early diagnosis is vital as it improves the chances of successful treatment. This article aims to provide an overview of ovarian cancer, including its causes, symptoms, and available treatments. Ovarian cancer starts in the ovaries, which are the two small, oval-shaped organs responsible for releasing eggs during the ovulation and menstrual cycle. It is estimated that around 7,400 women are diagnosed with ovarian cancer in the UK each year. Most ovarian cancers are believed to originate from the cells at the end of the fallopian tube and then spread to the ovaries or the peritoneum. The most common type of ovarian cancer is epithelial ovarian cancer, accounting for 80% of cases. Other types include borderline tumors and rare germ cell ovarian tumors. The exact cause of ovarian cancer is unknown, but it is more common in women over the age of 50. There may also be a genetic predisposition, as ovarian cancer can sometimes run in families. Recognizing the symptoms of ovarian cancer is crucial for early detection. Alongside bloating, other common symptoms include fatigue, back pain, and a swollen abdomen. While these symptoms can be caused by various factors, if they occur frequently (around 12 times or more a month), they should not be ignored. Additional symptoms may include indigestion, constipation or diarrhea, frequent urination, loss of appetite, weight loss, and post-menopausal vaginal bleeding. If you experience any of these symptoms, it is important to consult your GP. They will ask questions about your health and family medical history and may conduct a physical examination. If necessary, they will refer you to a specialist who will determine the appropriate course of treatment based on factors such as the size and type of the cancer, its location, and your overall health. Treatment options for ovarian cancer may include surgery, chemotherapy, radiotherapy, targeted therapies, and hormone therapy. Surgery often involves the removal of both ovaries and fallopian tubes, while a hysterectomy may also be considered. These procedures can be combined with other forms of treatment depending on the specific case. For more information and support related to ovarian cancer, visit Macmillan or speak to your healthcare provider. – [Source 1] – [Source 2]
<urn:uuid:6ac186f8-2699-433f-be55-a644d938a575>
CC-MAIN-2023-40
https://www.expresshealthcaremgmt.com/news2/bloating-back-pain-and-fatigue-are-all-signs-of-this-serious-disease/77720/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00646.warc.gz
en
0.953876
543
3.046875
3
Help your teens learn how to work safely. They may not learn it on the job. So, school’s almost finished and your kids are about to start their summer jobs. How do you help them prepare? Here’s something critical that you can do: help them learn how to work safely. They may not learn it on the job. Just look at these statistics: in 2008, 29,000 Ontario youth ages 15 to 24 sustained an injury on the job, but were able to continue working. Another 10,000 sustained a lost-time injury; six were injured so severely they died. The reality is young workers are more likely than any other age group to be injured at work. Furthermore, workers in their first four weeks on a job are up to four times more likely to be injured than at any other time. While a number of these injuries occur in high-risk settings, such as construction, mining, and forestry, injuries can also occur in what most of us would consider safe environments, such as grocery stores, fast food chains, retail outlets, even offices. While the law requires workplaces to prevent or control hazardous working conditions, some workplaces may not be as diligent as others. The bottom line: never make assumptions about how safe a workplace is. You may not be able to watch over your kids while they’re at work, but you can help them protect themselves. We spoke with Christy Sneddon, a parent and health and safety professional who, on behalf of the Ontario Service Safety Alliance, (www.ossa.com) has developed training material for young and new workers, and Hervé Le lagadec, a parent and the manager of Health, Safety & Environment for SGS Canada Inc. in Lakefield, ON. They offer the following suggestions. Teach safety to everyone at home The goal is for all family members, including children, to integrate safety into everything they do. We’re surrounded by potential hazards: cuts, burns, scrapes, electrical shock, and slips, trips, and falls. So, teach everyone to consider safety hazards before taking on a task, and act accordingly. It’s simpler than it sounds. “For instance,” says Hervé Le lagadec, “no cutting the lawn while wearing flip-flops.” When explaining how to do something safely, include the “why” factor. As in, why we have to unplug the toaster before digging out the bagel. Ease safety into everyday conversations “The problem with any parent/teen conversation,” says Christy Sneddon, “is that for most parents you’re the last person your teenager is going to listen to.” So, toss the “you should” approach and instead share stories and experiences. At the same time, encourage analytical thinking. “When something happens, however minor, ask questions,” suggests Sneddon, such as, ‘What did you learn from that?’ ‘What could you do differently next time? How could you avoid that in the future?’ Become a walking safety poster Always demonstrate safe behaviour, even if you think no one’s watching. “Parents must lead by example,” says Le lagadec. “Kids automatically mimic what they see at home, and I can tell that a lot of parents don’t follow the rules. I hear this from our summer students: ‘My dad does this all the time…’” Introduce your teen to safety basics before work starts For example: his or her health and safety rights. Workers have three rights: - to refuse work they believe to be unsafe - to know about hazards in the workplace - to participate in keeping the workplace healthy and safe. They also have responsibilities: - always practise safe work procedures ∂ report unsafe conditions as soon as possible to the boss - properly wear any protective equipment the job requires - don’t do anything on the job that will endanger themselves or others (i.e., no horsing around) Learning the basics is easy through such online resources as the Ministry of Labour and Workplace Safety and Insurance Board websites, as well as the Passport to Safety program (see “Safety Resources”). Program participants take an online awareness “test.” Successful participants receive a transcript, which they can attach to job applications, demonstrating their awareness of basic health and safety principles. This national program even has a local connection: it was first pioneered by the Peterborough Safe Communities Coalition. Take the test yourself, or review parent guidelines, so that you and your teen will have common ground for safety conversations. Pierce your teenager’s perceived invulnerability Who can blame teens for thinking bad things won’t happen to them? They rarely do. However, the exceptions can open even the most over-confident teenager’s eyes. With your teen, visit the LifeQuilt website (www.youngworkerquilt.ca/). The LifeQuilt is a 3 x 6 metre tapestry that commemorates the thousands of young workers across Canada who are injured every year. One hundred of their stories have been captured in the quilt and on the website. Be aware of how workplaces can fall short Ontario’s Ministry of Labour is so concerned about young worker safety that it has launched a four-month inspection blitz, targeting workplaces likely to hire summer workers. At the top of the inspectors’ list: safety orientation training. The quality of orientation training is a good indicator of the workplace’s commitment to safety. “A new worker should never be expected to do a job without someone explaining what the hazards are and how to do it safely,” says Le lagadec. The purpose of orientation training is to safely integrate new workers into the organization so that they can become contributing members of the work team. Making new workers aware of job hazards and how they are controlled helps to reduce the risk of injury. However, statistics show that only 40% of young workers receive health and safety training before starting their job or within their first week of work. Safety supervision is another issue. “People who have been working for years don’t always remember what it’s like to start a new job,” says Christy Sneddon. “A supervisor might say, ‘Go over there and do that,’ without having thought through whether the worker will know how to do that safely. All the supervisor may know is, ‘Everyone else can do it.’” Take control of the situation by asking your teen questions after the first day at work (see next section). Your teen may receive lots of safety training at work, but you won’t know unless you do a little digging. After the first day at work, start a conversation about the job and about the safety training. Here are some points to cover: ? Was there any orientation training? ? Did anyone talk to you about safety? ? Did someone show you where the emergency exit is? ? Do you have to wear safety equipment? What were you doing? ? Does your boss encourage people to ask questions, or report hazards when they find them? ? Do coworkers seem to follow safety rules and wear safety equipment? ? Does anyone ever ask you to take shortcuts? (This could indicate how seriously a workplace takes safety. Doing something faster may mean doing it less safely. “Shortcuts can bite you in the butt,” warns Le lagadec.) If you’re troubled by any of your teen’s responses, review workers’ rights and responsibilities together. Remind your teen that it’s okay to… √… ask questions. Many new workers are afraid to admit they don’t understand, or can’t remember, what they’ve been told. But no one expects them to know everything right from the beginning. If new workers pretend they do, they’re putting themselves and their co-workers at risk. √… say no. Many kids think they could be fired for refusing to do something they truly believe is unsafe, says Sneddon. Not so. The law prevents employers from firing anyone in this circumstance, and instead requires them to conduct a thorough safety assessment. Sneddon advises that, if you’re afraid to do something, there may be a good reason for it. Your fear may be based on misinformation, lack of information, inexperience, or real danger. “Don’t assume you have no choice in the matter,” says Sneddon. “Speak up.” It all comes down to this: if your child finds a job in a safe workplace, then your efforts to keep him or her safe will reinforce the safety messages conveyed at work. If the workplace isn’t as safe as it could be, then your efforts could help prevent an injury. If your teen appears indifferent to your efforts, says Christy Sneddon, don’t be discouraged. “Kids actually hear and act on more of what we say than they may want us to believe.” Passport to Safety, an online program operating on a not-for-profit basis that builds and tests young workers’ safety awareness. Among the topics: supervisor and employer responsibilities, workers’ rights and responsibilities, WHMIS, the basics, common workplace hazards and controlling workplace hazards. For $10.50, participants can take the test and receive a lifetime membership, access to all Passport to Safety resources, and a Passport to Safety wallet card. Available in English and French; www.passporttosafety.com Talking to Teens about Safety at Work: A Guide for Parents, a free, 20-page download published by Ontario’s Workplace Safety and Insurance Board (WSIB), which manages Ontario’s workers’ compensation system and promotes workplace health and safety. The guide covers employer, supervisor and worker rights, as well as questions to ask your teen; www.prevent-it.ca/files/ParentsGuide.pdf Graphic dramatizations of workplace incidents, also from the WSIB; originally shown as TV commercials; www.prevent-it.ca/index.php?q=top-10-most-downloaded-items Worksmart Ontario, a Ministry of Labour website for young workers. Includes info on refusing unsafe work, conditions under which you can refuse, and how to go about it; www.worksmartontario.gov.on.ca/scripts/default.asp Young Worker LifeQuilt, a memorial tapestry that draws on the stories of 100 young workers to deliver a profound safety message; www.youngworkerquilt.ca
<urn:uuid:0e21d0e0-dea9-487c-9c66-9d5909d3f89f>
CC-MAIN-2020-29
http://www.localparent.ca/local_parent/parenting/teens-tweens/safe-teens-summer-job/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887319.41/warc/CC-MAIN-20200705090648-20200705120648-00503.warc.gz
en
0.956798
2,271
3.359375
3
November 18/19, 2021 – Deep Partial Lunar Eclipse Look up & don’t miss this sky show! It’s the longest lunar eclipse since 1440, and the longest until 2669! What is a deep partial lunar eclipse? During the early morning hours of November 19 or late evening hours of November 18, depending on your location and time zone, the full moon will pass through Earth’s dark or inner shadow (umbra) creating a deep partial lunar eclipse. It is a deep partial eclipse because it is almost total. About 97% of the moon will be within the umbra. Only a tiny sliver of the moon, ~3% will be exposed to direct sunlight. The rest of the moon appears bright orange to blood red. For more on check out Visual Appearance of Lunar Eclipses. Unlike a solar eclipse, 97% of the totality is great and almost like a total. This is not the case for a solar eclipse because in that case even when 99% of the Sun is covered by the Moon it is nothing like a total solar eclipse. For a solar eclipse, totality and a deep partial eclipse are truly like night and day. North America is the best place to see the eclipse in its entirety. The map below shows the different regions of visibly during the lunar eclipse. This is the longest lunar eclipse in a period of 1229 years! The last partial lunar eclipse that was longer was on February 18, 1440. The next partial lunar eclipse as long as the November 18-19, 2021 eclipse will be on February 8, 2669. The reason this eclipse is so long is because of the Moon’s orbit around Earth. It orbits in an eclipse (American football-like shape) and the eclipse is 1.7 days before it reaches its farthest point from Earth. The farther away the moon is from Earth the longer the eclipse. Learn more about the length of this lunar eclipse. The overall duration of the November 2021 eclipse from first entering then finally leaving the penumbral shadow is about 6 hours and 2 minutes. The umbral phase of the partial lunar eclipse is about 3 hours 28 minutes. A long time! When can I watch it? The times of the major eclipse phases are listed as follows. These times are in Universal Time (UTC); translate UTC to your time. - Penumbral Eclipse Begins: 06:02:09 UTC on November 19 - Partial Eclipse Begins: 07:18:43 UTC (2:19 a.m. EST in North America) - Greatest Eclipse: 09:02:56 UTC (4:03 a.m. EST) - Partial Eclipse Ends: 10:47:07 UTC (5:47 a.m. EST) - Penumbral Eclipse Ends: 12:03:44 UTC (7:04 a.m. EST) Find eclipse timings for your location at timeanddate.com. If you are not able to observe the lunar eclipse in person there are several YouTube live streams including: The Sun, Earth, and Moon Never Ceases to Amaze This is certainly true when it comes to lunar and solar eclipses. When the Moon, Earth, and Sun are lined up just right we can get a lunar eclipse (during a full moon) and a solar eclipse (during a new moon). Well, it is that time again – Eclipse Season! This is the second eclipse season of 2021 with a deep partial lunar eclipse & total solar eclipse! Every year there are typically two eclipse seasons, which contain at least two and sometimes three eclipses. Each eclipse season is roughly 34 days long and repeats at 173.4 day intervals (close to 6 months). The first eclipse season for 2021 had two eclipses: The second eclipse season for 2021 has two eclipses: - a deep partial lunar eclipse on November 18-19, 2021 - and a total solar eclipse on December 4, 2021. Stay Tuned! On December 4, 2021, we get a total solar eclipse in Antarctica and we hope to have our own video and images to share.
<urn:uuid:3fe39b6c-995e-4925-9f5f-cd023eafe548>
CC-MAIN-2023-40
https://www.thesuntoday.org/eclipses-transits/deep-partial-lunar-eclipse-2021/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00020.warc.gz
en
0.917332
848
2.609375
3
Singing bowls are very useful in meditation, healing, and as instruments. Singing bowls can be played alone at home, in yoga classes, or in concerts. Like anything, learning how to play a singing bowl takes a bit of practice, but once you learn how to play one singing bowl you will be able to play other singing bowls as well. Singing Bowl Playing Environment Find a calm environment where you can be alone and make your body comfortable. You might find it comfortable to sit in the floor on a pillow or to sit in a chair. Close your eyes for a moment just before playing your singing bowl so that you bring your body and mind to a calm, quiet space. Holding The Singing Bowl Please make sure you put the singing bowl on the front of your palm. A common mistake in learning how to play singing bowls is to place the singing bowl in your fingers. Striking the Singing Bowl You can strike the singing bowl with a singing bowl mallet before you begin playing the bowl if you would like to, it is not required to do so for the singing bowl to play. Strike the singing bowl near the rim or the side of the bowl and the sound will make the singing bowl resonate for a while after. Playing the Singing Bowl Singing bowls make their sound, or sing, by rubbing the striker around the rim of the singing bowl. Wooden singing bowl strikers give the singing bowl a low tone. Leather wrapped singing bowl mallets give the singing bowl a lower tone. But different singing bowls make different sounds based on the shape of the bowl. Singing bowls can be curved inward, outward, or straight up and down. Each of these different shapes makes a different sound. We have included recordings of each singing bowl listed on our site so that when you shop for a singing bowl you can choose the sound you would like to purchase, as well as the color, size, and style. Be sure to press the wooden singing bowl striker firmly against the rim of the singing bowl. The striker must remain in constant contact with your singing bowl. Move the striker slowly around the outside rim of the singing bowl and you will soon hear the singing bowl hum, or sing. Slowly run the mallet around the bowl with constant even pressure. If the hum of the singing bowl sounds inconstant, or choppy, slow down and continue to move the striker slowly along the outside of the singing bowl. If you let the striker stray away from the side of the bowl, the singing may stop, in which case you start over, slowly increasing the speed without ever going too fast. Some bowls come to full volume in a couple of seconds, others take ten or more seconds. If you have trouble making your singing bowl sing, see the 'tips to remember' section below. By adjusting the speed and angle of the mallet, the sound will change accordingly. Practice to find the speed and pressure that allows you to make the singing bowl hum, or sing. Find the proper balance of angle, speed, and pressure in order to make your singing bowl sing continuously for as long as you would like to play. If you are new to playing a Tibetan singing bowl, it is best to get a cast bowl rather than a hand-hammered bowl because cast bowls are much more easy to play. Bowls with straight sides also make it easier to play your singing bowl. Like this copper and silver singing bowl with straight sides.
<urn:uuid:d8c05db2-6119-4412-a5a0-0e777b241a77>
CC-MAIN-2016-07
http://www.singingbowlshop.com/how-to-play-a-singing-bowl/
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146196.88/warc/CC-MAIN-20160205193906-00314-ip-10-236-182-209.ec2.internal.warc.gz
en
0.946133
707
2.65625
3
What is a MOV file? MOV or the Movie format is a media container for video, audio, and text streams. It is an open format that was developed by Apple and is mostly used by the QuickTime Player. Presently, MOV is considered a major video format that can be opened on any leading media player. What is an M4A file? M4A or MPEG-4 files follow a lossy compression while containing audio streams. It is the default format for audio files that are downloaded from the iTunes Store. You can open M4A files with music players like iTunes, VLC, Windows Media Player, and other popular apps.
<urn:uuid:3f879da4-0b5a-4494-abac-c7b62d33cf71>
CC-MAIN-2023-23
https://www.online-audioconvert.com/mov-to-m4a/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00290.warc.gz
en
0.937508
135
2.765625
3
Section 2: Document Markup When you are creating your HTML pages and following the responsive design patterns that restrict tags to structural as much as possible, you have already laid the groundwork to support mobile devices. When all of your page content is broken down into logical pieces, and those pieces have ID and/or class attributes, we will be able to show, hide, or reposition those elements using CSS. When we determine the screen dimensions the user has on their device, we can decide what or how to show content from our regular page. The key to this, of course, are the ID and class tags. Anything that you may want or need to control (move, alter, edit, etc.) as a single piece by itself should have an ID tag. Elements that will share the same changes (for example, pictures, links, paragraphs, etc.) should have the same class or classes so they can be changed at the same time. A single element, say a paragraph in a group of paragraphs, can have both an ID and a class, and can receive style changes from CSS due to both. We will get to this in more depth in CSS, but keep it in mind as you build pages now so they are ready for you later. If you are reading this chapter looking for examples on HTML5 support of things like , these will be found in the section as they require the use of a scripting language to function, and are not available through HTML markup. Important considerations for mobile development go beyond styling changes and begin to include performance measures as well, since mobile devices often lack computing power that can match a desktop or laptop’s capacity. Skipping some of your fancier animations or large background images to trim down your loading times is another responsive-style adjustment to your site alongside other CSS changes. See the resources below for some examples of methods that may help your site improve response times.
<urn:uuid:5d46e53b-c3b9-4d9a-9d33-fbb6a1aeaddb>
CC-MAIN-2019-30
https://milnepublishing.geneseo.edu/themissinglink/chapter/chapter-17-mobile-device-support/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525973.56/warc/CC-MAIN-20190719012046-20190719034046-00388.warc.gz
en
0.937967
387
2.9375
3
Popular projects to plant more trees in cities may not protect residents from soaring and often deadly heat, say researchers By Zoe Tabary ABU DHABI, Feb 12 (Thomson Reuters Foundation) - Popular projects to plant more trees and expand green space in cities may not protect residents from soaring and often deadly heat unless the efforts target those most in need of relief and bring communities closer, researchers and policymakers said. As record numbers of people move into urban areas, cities around the world are struggling with fast-rising temperatures and worsening heatwaves - from the global north to the south. "Heat isn't just a developing-world issue," Anne-Marie Hitipeuw-Gribnau, chief resilience officer of the Dutch city of The Hague, told the U.N. World Urban Forum in Abu Dhabi this week. "Even in a city like The Hague we see rising numbers of deaths due to extreme summer temperatures." Unlike other disasters such as floods, however, casualties from extreme heat draw less attention, she added. "If there's flooding and people die, it's immediately in the news. But if they die due to extreme heat it's harder to get attention - people think they would have died anyway," she said. "Heat really is a silent killer." Australia's second-biggest city Melbourne, which baked in temperatures of 40 degrees Celsius (104°F) last month, is part of a growing city movement planting trees as a way to make heat shocks less severe and reduce the health damage they cause. It has pledged to increase its tree cover from 22% to 40% by 2040 - a push that has already lowered the city's temperature by several degrees Celsius, said Red Cross climate advisor Julie Arrighi. The biggest challenge was not the upfront cost of planting trees but the ongoing expense of looking after them, she told the conference. "It's one thing to grow trees - you have to also make sure they stay watered," she said. To make cities greener, planners must first understand how existing public spaces are distributed, said Joy Mutai, a specialist on the issue with UN-Habitat, the U.N. agency for housing and urban development. "Public spaces are usually concentrated in urban centres ... when cities grow and expand they tend not to consider the creation of new public spaces," she said, adding that this could leave some areas with less greenery. Ensuring that initiatives to cool cities include poorer communities, as well as smarter neighbourhoods, would also build more social cohesion, said Michael Berkowitz, a founding principal of Resilient Cities Catalyst, a nonprofit consultancy. "We don't just need more trees - or seawalls if we're talking about floods," he told the Thomson Reuters Foundation. "We need ideas that truly change society and make it more cohesive." He cited Paris' 2018 "schoolyard oasis" project, whereby the city is turning asphalt-covered playgrounds in its network of more than 750 schools into "cooling islands" with green walls and water-absorbing surfaces. "Those spaces will be open to the public during the weekend, which is significant in a dense city where you may not live near a park but are within walking distance of a school," he added. Changing behaviours can be as powerful as planting trees to protect residents from heat, said Hitipeuw-Gribnau, whose city encourages neighbours to check on each other during hot spells. "We want to get people to a point where they ask 'how can I help those in my neighbourhood? Who is alone and might not know how to act?'," she said. (Reporting by Zoe Tabary @zoetabary; editing by Megan Rowling. Please credit the Thomson Reuters Foundation, the charitable arm of Thomson Reuters, that covers humanitarian news, women's and LGBT+ rights, human trafficking, property rights, and climate change. Visit http://news.trust.org) Our Standards: The Thomson Reuters Trust Principles.
<urn:uuid:a5dd032c-4a29-40ea-b169-04673c5507a7>
CC-MAIN-2023-40
https://news.trust.org/item/20200212152600-j89j8/?source=package&id=a838d9b4-4401-4e67-b368-93dfff442c2c
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00050.warc.gz
en
0.961652
828
2.984375
3
Provides the ability to create dynamic citations in which the bibliographic information is pulled from the web rather than having to be entered into a local database such as 'bibtex' ahead of time. The package is primarily aimed at authoring in the R 'markdown' format, and can provide outputs for web-based authoring such as linked text for inline citations. Cite using a 'DOI', URL, or 'bibtex' file key. See the package URL for details. knitcitations is an R package designed to add dynamic citations to dynamic documents created with Yihui's knitr package. Install the development version directly from Github Or install the current release from your CRAN mirror with Start by loading the library. It is usually good to also clear the bibliographic environment after loading the library, in case any citations are already stored there: Set pandoc as the default format: options("citation_format" = "pandoc") (Note: The old method will eventually be depricated. For documents using knitcitations <= 0.5 it will become necessary to set this as Cite an article by DOI and the full citation information is gathered automatically. By default this now generates a citation in pandoc-flavored-markdown format. We use the inline command citep("10.1890/11-0011.1") to create this citation [@Abrams_2012]. An in-text citation is generated with citet, such as citet("10.1098/rspb.2013.1372") creating the citation to @Boettiger_2013. Not all the literature we may wish to cite includes DOIs, such as arXiv preprints, Wikipedia pages, or other academic blogs. Even when a DOI is present it is not always trivial to locate. With version 0.4-0, knitcitations can produce citations given any URL using the Greycite API. For instance, we can use the call citep("http://knowledgeblog.org/greycite") to generate the citation to the Greycite tool [@greycite2739]. We can also use bibentry objects such as R provides for citing packages (using R's citep(citation("knitr") produces [@Xie_2014; @Xie_2013; @Xie_2014a]. Note that this package includes citations to three objects, and pandoc correctly avoids duplicating the author names. In pandoc mode, we can still use traditional pandoc-markdown citations like @Boettiger2013 which will render as @Boettiger2013 without any R code, provided the citation is already in the .bib file we name (see below). When the citation is called, a key in the format FirstAuthorsLastName_Year is automatically created for this citation, so we can now continue to cite this article without remembering the DOI, using the command citep("Abrams_2012") creates the citation [@Abrams_2012] without mistaking it for a new article. At the end of the document, include a chunk containing the command: Use the chunk options message=FALSE to hide the chunk command and output. This creates a Bibtex file with the name given. Pandoc can then be used to compile the markdown into HTML, MS Word, LaTeX, PDF, or many other formats, each with the desired journal styling. Pandoc is now integrated with RStudio through the rmarkdown package. Pandoc appends these references to the end of the markdown document automatically. In this example, we have added a yaml header to our Rmd file which indicates the name of the bib file being used, and the optional link to a CSL stylesheet which formats the output for the ESA journals: ---bibliography: "references.bib"csl: "ecology.csl"output:html_document--- rmarkdown::render("tutorial.Rmd") from R on the tutorial compiles the output markdown, with references in the format of the ESA journals. For more fine-grained list of changes or to report a bug, consult Releases will be numbered with the following semantic versioning format: And constructed with the following guidelines: For more information on SemVer, please visit http://semver.org/. rmarkdownand pandoc (see #67) cite_optionsthat was causing many options to be ignored. (See #63) This version is a ground-up rewrite of knitcitations, providing a more powerful interface while also streamlining the back end, mostly by relying more on external libraries for knitty gritty. While an effort has been made to preserve the most common uses, some lesser-used functions or function arguments have been significantly altered or removed. Bug reports greatly appreciated. citep now accept more options. In addition to the four previously supported options (DOI, URL, bibentry or bibkey (of a previously cited work)), these now accept a plain text query (used in a CrossRef Search), or a path to a PDF file (which attempts metadata extraction). Citation key generation is now handled internally, and cannot be configured just by providing a named argument to cite function is replaced by bib_metadata. This function takes any argument to citep as before (including the new arguments), see docs. Linked inline citations now use the configuration: cite_options(style="markdown", hyperlink="to.doc") provides a link to the DOI or URL of the document, using markdown format. Support for cito and tooltip have been removed. These may be restored at a later date. (The earlier implementation did not appropriately abstract the use of these features from the style/formatting of printing the citation, making generalization hard. bibliography now includes CSL support directly for entries with a DOI using the style= argument. No need to provide a CSL file itself, just the name of the journal (or rather, the name of the corresponding csl file: full journal name, all lower case, spaces as dashes). See https://github.com/cboettig/knitcitations/issues/38 bibliography formatting has otherwise been completely rewritten, and no longer uses print_markdown, print_html, and print_rdfa methods. rdfa is no longer available, and other formats are controlled through cite_options. For formal publication pandoc mode is recommended instead of citepmethod (caused by missing .Rmdfiles remain as before, importing citation data on the fly with citettaking DOIs, URLs, or bibentries as arguments, but render in pandoc's markdown. The citations used are written to a bibtex file and the user must use pandoc (either directly or through RStudio's rmarkdown) to format the citations appropriately. See the updated vignette & README. This method has to be enabled with options(citation_format = "pandoc")at present, otherwise compatibility mode is enabled by default. (see #57) citet(see issue #32) bib_formatmethod to change order of citation elements in reference list linked=FALSEto the calls to cite_options, to toggle certain settings such as tooltips, linked inline text, citeis now exported to the namespace. Useful to return a bibentry object given a DOI or URL. bibliographycan print with method 'rdfa' to provide RDFa enhanced HTML bibliography data, and citations can take cito arguments as an option. (Closes issues #16 and #17) bibliographynow takes more options to match the citeptake an optional argument for formating the citation, defaulting to authoryearformat. Future versions may move this into an option. newbib()function initializes and clears existing cache files. options("bibtex_data" = TRUE). print(bibliography, "html"), one can simply call bibliography("html"). Sort is still an option, other options that were for internal use ( remove_duplicates) are removed as they are no longer necessary. bibliography()now takes style as an option (html, text, bibtex output)
<urn:uuid:bd09eadc-30c2-4f8e-ae6e-bde7d95579b0>
CC-MAIN-2021-39
https://r-pkg.org/pkg/knitcitations
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056711.62/warc/CC-MAIN-20210919035453-20210919065453-00291.warc.gz
en
0.7625
1,778
2.578125
3
Perennials: Start collecting flowers for drying. Pick them in late morning after the dew has thoroughly dried. Remove leaves from the stems and hang in small bunches. Use elastic bands to attach the bunches to coat hangers, which can be hung near the furnace or in a dry attic. Achillea, lavender and goldenrod can be dried this way. Flowers: Continue to fertilize every other week and keep pinching off faded flowers from petunias, geraniums, snapdragons and other annuals to keep them blooming. Vegetables and fruits: Pick every day. The more you pick the more you get. Give away the surplus or preserve in jellies, jams and pickles. Continue monitoring for insects. Japanese beetles can be controlled by hand picking. Check tomato plants to be sure stems are tied securely to stakes: use cotton string or cloth. One tie in a figure eight form will train the leader to grow upright. Another tie 6 to 10 inches above a fruit cluster will keep the fruits from pulling down the plant with their weight. Cages are useful, too, but need additional support with stakes. Trees and shrubs: Monitor for insect infestation and treat if the damage is severe. Summer blooming trees and shrubs include abelia, sourwood, stewartia, clethra and some viburnums. Lawns: Mow high and often with a sharp mower. Do not treat with anything during hot and dry weather. Houseplants: Keep them happy so that they will keep you happy next winter. General: This is the time to be energetic about garden care, even though the weather is hot, so that weeds and bugs don’t take over. The garden will repay with lushness and beauty in late summer and fall. Susan Henry, master gardener with Cornell Cooperative Extension of Westchester
<urn:uuid:6505d862-19e3-4378-9434-fecf4dccfe33>
CC-MAIN-2016-44
http://gardening.lohudblogs.com/2013/07/11/what-to-do-this-week-in-the-garden-174/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00535-ip-10-171-6-4.ec2.internal.warc.gz
en
0.944884
391
2.96875
3
Captivity and release take on many different forms for many different people, depending on their particular situation and context. In Charlotte Perkins Gilman’s “The Yellow Wallpaper,” the narrator has been suffering from what her husband (who happens to be a physician) considers to be hysteria. Rather than treating what might be physiological depression with counseling or medication, as might happen in modern times, he treats it with confinement. While this might seem cruel, this was not uncommon. Indeed, confined rest was one of the less eccentric treatments applied to hysteria in women in the 1800’s (Pinals, p. 428). Locked in her bedroom, the narrator begins to crawl around the outer edge of her chamber, wearing a groove (she calls it a “smooch”) against the wall. She thinks that she sees a woman walking around behind the pattern in the wallpaper, and so she starts peeling the wallpaper off the wall to let this woman out. During this project, though, she begins to confuse herself with the woman behind the pattern. Eventually, her husband comes in the room and is horrified to find his wife crawling around, the bed gouged up with bite marks, looking as though she has not groomed herself for months (which she has not). His wife declares, “’I’ve got out at last…in spite of you and Jane. And I’ve pulled off most of the paper, so you can’t put me back.’”(Gilman). In a way, she has escaped; in several other ways, though, she has not. Her imprisonment is far more profound, and more deep, than either one of them could have imagined. On a literal level, the narrator has gotten out of her prison. Her husband opens the door and even faints dead away, so that if she wants to, she can crawl right out of the room and out of the house. Her husband, as did many doctors in the nineteenth century, thought that enforced confinement would help women “snap out of it” when it came to hysteria. They thought that women who encountered hysteria simply had too much stimulation and needed mental rest (Pinals, p. 427). When he comes to open the door, though, he finds that his wife’s mental condition has degenerated much further, to the point that he finds a raving lunatic crawling around the floor. Buy “Yellow Wallpaper” essay paper online On more important levels, though, the narrator is still confined – now in the bonds of insanity. She believes that she has spent time trapped behind the wallpaper, because she has confused herself with the imaginary person she thought she saw back there. Now that the wallpaper is down, of course, she thinks that she has jumped out from behind the pattern. The awful truth, of course, is that she has a new cage: that of her mind. Another way in which the narrator still has not escaped has to do with her status as a woman in the nineteenth century. In those days, male doctors would often ignore many of the symptoms that their female patients reported, believing that the one-size-fits-all diagnosis of “hysteria” would fit just about any complaint that did not manifest with visible symptoms (Pinals, p. 427). As a result, the diagnoses that these doctors would provide often had nothing to do with the conditions involved, and they came nowhere near treating the problems at hand. No matter what the narrator does, she cannot escape her status as a woman, married to a male doctor who will not listen to her. In the nineteenth century, such women had little recourse against their male doctors, which meant that for too many women suffering from genuine emotional and mental disorders, there was truly no way out. Related Free Literary Analysis Essays - The Statue of Liberty as the Mother of Exile in Lazarus’s Poem “The New Colossus” - The flap of a butterfly’s wings - Missed Connections - Nora, the Selfish Mother and Wife - Frankenstein by Mary Shelley: Chapter 13 - Motherhood and Maternal Instincts in “Mother Courage and Her Children” by Bertold Brecht - The Color of Love by Danzy Senna - The Nature of Comedy in A Midsummer Night’s Dream - Japanese Literature - Selfishness: Love and Devotion to others
<urn:uuid:e89e108d-5fee-4866-8986-f25016a215bb>
CC-MAIN-2019-30
https://exclusivepapers.com/essays/literary-analysis/yellow-wallpaper.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524685.42/warc/CC-MAIN-20190716180842-20190716202842-00559.warc.gz
en
0.97614
921
3.265625
3
1. What is the new information regarding sunscreen? After decades of considering stronger sunscreen regulations and years of strong encouragement by Sen. Jack Reed, the Food and Drug Administration (FDA) finally announced new regulations that will require comprehensive testing and prevent misleading information from appearing on the labels of sunscreen products. Under the new requirements, all sunscreen products sold in the U.S. will be tested and appropriately labeled for both UVA and UVB protection. The new regulations will also prevent the makers of these products from marketing their sunscreens with unproven claims (e.g., “waterproof,” “sweatproof,” “all day protection”). 2. What did Senator Jack Reed do? U.S. Senator Jack Reed (D-RI) has kept this important public health issue at the forefront by continuing to push the FDA for stronger sunscreen standards. After years of prodding, the FDA has finally agreed to exact tougher standards on the makers of sunscreen products. 3. How is this important to me? Proper protection from the sun’s harmful rays is an important public health issue. Consumers should be confident that the sunscreen products they purchase are safe and effective, so they may better protect themselves and their families. 4. How do I protect myself and my children from the harmful effects of the sun? Until the new regulations take effect, it’s important to choose a sunscreen that addresses both UVA and UVB rays, and to reapply the sunscreen often when outdoors. According to the Skin Cancer Foundation, sunscreen active ingredients that provide both UVA and UVB protection include: It’s also important to remember to wear sun-protective clothing, such as wide-rimmed hats, sunglasses, and long-sleeved shirts. 5. Why is it so important to get protection from the sun’s rays? Unprotected sun exposure can cause premature aging of skin, increasing wrinkles and sunspots on skin. It can also increase chances of skin cancer, the most common form of cancer in the U.S. It’s important to also note that indoor tanning can pose a health risk as well. Studies have shown a 75-percent increase in the risk of developing melanoma in those who use indoor tanning beds. 6. Are UVA and UVB rays really that harmful? While sunburns are primarily caused by UVB rays, both UVB and UVA rays can cause skin cancer and early skin aging (e.g., wrinkling). The American Academy of Dermatology offers a helpful way to remember this difference, describing UVA rays as “aging rays” and UVB rays as “burning rays.”
<urn:uuid:fe5c2b5b-fa29-46b1-b875-47c82af5ceda>
CC-MAIN-2018-34
https://www.drsullivan.com/news-media/six-salient-sunscreen-updates/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209040.29/warc/CC-MAIN-20180814131141-20180814151141-00012.warc.gz
en
0.920838
565
2.8125
3
Plain English Summary Background and study aims Cryoglobulinemia is a medical condition in which abnormal cryoglobulin proteins in the blood cause problems such as inflammation of blood vessels (vasculitis). It is associated with hepatitis C virus (HCV) infection. There is evidence that antiviral treatment with interferon or with interferon plus ribavirin is effective. On the other hand, standard immunosuppressive treatments may lead to severe complications in HCV-positive patients. Thus, less toxic treatments are needed. Based on early results, rituximab may be a safe and effective alternative to standard immunosuppression. The aim of this study is to compare rituximab treatment with the best available treatment for type II mixed cryoglobulinemia. Who can participate? Patients aged 18-80 with type II cryoglobulinemic vasculitis, HCV-related or unrelated What does the study involve? Participants are randomly allocated to receive either conventional treatment or rituximab treatment. Conventional treatment is chosen by the clinician for the individual patient, and can include treatment with glucocorticoid, azathioprine or cyclophosphamide medications or plasmapheresis, a procedure where the blood is filtered to remove the cryoglobulins. Participants are followed up over 24 months: weekly from day 0 to day 28, monthly up to month 6, then every 2 months up to month 24. A general physical examination is performed, and vital signs (pulse rate, blood pressure and temperature) are taken. What are the possible benefits and risks of participating? As the study involves patients who require immunosuppressive treatment, possible benefits include the possibility to cure their vasculitis with a less toxic and more effective treatment. Rituximab can cause an infusion related reaction involving fever, chills or rigors. Other commonly reported reactions include nausea, urticaria (hives), fatigue, headache, itching, bronchospasm, dyspnoea (breathlessness), sensation of tongue or throat swelling, rhinitis (inflammation of the inside of the nose), vomiting, hypotension (low blood pressure) and flushing. While in most patients these reactions are mild to moderate in severity, there have been reports of severe reactions in lymphoma patients. Patients who experience a severe reaction should have their infusion interrupted immediately and should receive aggressive treatment. The infusion should not be restarted before all the symptoms have disappeared. Further treatment of patients after complete resolution of signs and symptoms has rarely resulted in a repeated reaction. Where is the study run from? The study involves different Italian centers led by University of Udine (Italy) When is the study starting and how long is it expected to run for? March 2004 to December 2008 Who is funding the study? University of Udine (Italy) Who is the main contact? Prof. Salvatore De Vita Prof Salvatore De Vita University of Udine Clinic of Rheumatology Piazzale Santa Maria della Misericordia 15 Anti-CD20 monoclonal antibody therapy for type II mixed cryoglobulinemia syndrome versus best available treatment: a phase III controlled study Type II mixed cryoglobulinemia (MC) or MC syndrome is a systemic vasculitis prevalently mediated by immune-complexes, and associated with hepatitis C virus (HCV) infection and B-cell lymphoproliferation. Despite the bone marrow pathologic findings often suggesting an indolent B-cell malignancy, type II MC is definitely a non-neoplastic disorder, as finally demonstrated by molecular analyses of B-cell clonal expansion in extensively characterized patients with long-term follow-up. B-cell expansion and lymphoproliferation occur in target organs of HCV infection. There is evidence of an antigen-driven proliferation of rheumatoid factor (RF) - positive clones, with a restricted immunoglobulin gene usage, leading to cryoglobulin production. Future studies should clarify the preferential and persistent expansion of such RF-positive clones in the course of HCV infection if compared to other chronic inflammatory/infectious conditions. Since only a fraction of patients with HCV infection have positive serum cryoglobulins or develop MC syndrome, additional mechanisms, virus-or host-related, are implicated. Recent studies were focused on insertions or deletions in HCV gene (HVR1-E2 region), HLA genetic predisposition, C4 deficiency, anti-endothelium and anti-alpha enolase antibodies, T-helper 2 profile and cytokines. Finally, serum cryoglobulins and RF usually persists even after the negativization of HCV RNA with the antiviral therapy. Since RF-positive B-cells may be stimulated by immune complexes containing quite different antigens, HCV infection might be crucial for the induction of MC, while not for the survival of RF-positive clones, which might prove pathogenetically relevant also in the lack of HCV persistence. In the lack of such information, the treatment of HCV-associated MC remains difficult, and strategies should be necessarily focused both on the viral trigger (when present) and on downstream pathogenetic events. There is general clinical evidence that effective antiviral treatment with interferon (old studies) or with interferon plus ribavirin (recent studies) is often accompanied by clinical efficacy, but results may differ in the different systemic features. Thus, even if antiviral therapy has a strong rationale and represents a cornerstone for the treatment of MC, additional pathobiologic events should be dissected and targeted for the different organ manifestations. Furthermore, antiviral therapy may be ineffective, counterindicated or not tolerated, and finally does not allow a rapid improvement in progressive or life threatening MC manifestations. On the other hand, standard immunosuppressive approaches may lead to severe complications in HCV-positive MC patients, including major infections, cytopenias, enhancement of viral replication, and may have direct oncogenetic properties. Thus, less toxic approaches are needed. University of Udine Ethics Committee, 13/10/2003, ref: 6/2003 Randomised controlled multicenter non-blinded phase III study Primary study design Secondary study design Randomised controlled trial Patient information sheet Not available in web format, please use the contact details to request a patient information sheet Mixed cryoglobulinemia HCV- related or unrelated NON-Rituximab (RTX) GROUP (conventional treatment, i.e., as chosen by the expert clinician in that individual patient among the following): 1. Glucocorticoids (maximal initial dose of 1 mg/kg/day of prednisone equivalents) with or without preceding 6-methylprednisolone pulses (500 to 1000 mg/day for 3 consecutive days), with subsequent reduction of the glucocorticoid dosage in the following months. 2. Azathioprine or cyclophosphamide, orally at 1-2 mg/kg/day, with or without glucocorticoids (as in point 1); if response was observed, azathioprine or cyclophosphamide might be suspended after the end of month +6 after randomization, and then reintroduced if clinical relapse occurred (as it occurs in the current clinical practice). 3. Plasmapheresis, with or without glucocorticoids (as in point 1); if response was observed, plasmapheresis could be suspended after the end of month +6 after randomization, and then reintroduced if clinical relapse occurred (current clinical practice). At least two plasmapheretic procedures per week were required in the first month after randomization, with subsequent reductions according to the response observed and to local protocols. Rituximab (RTX) GROUP: RTX 1 g intravenously on days 0 and 14, with premedication with 100 mg of methylprednisolone intravenously, paracetamol 1000 mg orally, and clorpheniramine maleate 10 mg intravenously, before each infusion. Only glucocorticoids were allowed as concomitant treatment, at the same dose given before randomization if already administered, or lower; if introduced with RTX, only low doses (≤ 0.1 mg/kg/day of prednisone equivalents) were allowed. In case of clinical disease relapse in this Group, retreatment with RTX, at the same schedule, was permitted in case of previous response to RTX. Patients failing treatment in non-RTX Group could be switched to RTX in an open-label extension manner (RTX-switch Group). Patients were randomized to treatment stratified for the following three disease manifestations: 1. Skin ulcers 2. Active glomerulonephritis (assessed by renal biopsy) 3. Peripheral neuropathy (assessed by electromyography); sensory: evolving or with severe pain unresponsive or insufficiently managed with analgesics and gabapentin or pregabalin; motor: of any type and duration). Patients with two or three of these clinical manifestations simultaneously present were randomized within the group where the accrual of patients was lower. Primary outcome measures The proportion of patients surviving on treatment at the end and 12 months after randomization, i.e., after a follow-up considered sufficient to assess both the efficacy and safety of treatment. Efficacy and safety issues were in fact considered equally relevant in the long term, and a single end point integrating both of them was then chosen. Survival of treatment was statistically higher in RTX Group in comparison to non-RTX Group (conventional treatment). Secondary outcome measures 1. The proportion of patients surviving on treatment at the end month +24, i.e., to evaluate the long-term efficacy and safety of treatment 2. The proportion of patients surviving on treatment at the end month +6, i.e., to evaluate the short-term efficacy and safety of treatment 3. The proportion of patients surviving on treatment at the end month +3, i.e., to evaluate the very early efficacy and safety of treatment 4. Superiority of RTX to decrease the global disease activity, as defined by the Birmingham Vasculitis Activity Score (BVAS) 5. Superiority of RTX for response in the single CV manifestations considered in the randomization scheme. 6. Efficacy of RTX in patients where conventional treatment had failed 7. Duration of response to RTX and efficacy of retreatment 8. Assessment of the profile of side effects of RTX, both in the short and the long term Overall trial start date Overall trial end date Participant inclusion criteria 1. Patients with CV with type II cryoglobulins 2. HCV related or unrelated, classified according to published criteria 3. With positive serum cryoglobulins 4. Suffered from severe active CV manifestations, i.e., skin ulcers, active glomerulonephritis, or worsening or refractory peripheral neuropathy 5. In patients with HCV-related CV, study inclusion implied that antiviral therapy with interferon plus ribavirin had failed, had been poorly tolerated, or was considered contraindicated 6. Patients aged 18-80 years 7. Negative for antibodies against the human immunodeficiency virus (HIV), hepatitis B virus core antigen, and for hepatitis B virus surface antigen Target number of participants Participant exclusion criteria 1. Active CV manifestations with immediate risk for patient survival 2. Acute renal failure or rapidly progressive glomerulonephritis 3. Severe concomitant uncontrolled illness CV-unrelated 4. Active or recurrent infections 5. History of cancer (except for CV-related indolent B-cell lymphoproliferation in the bone marrow, not requiring treatment) 6. Alcohol or drug abuse 7. Serum creatinin > 4 mg/dl 8. AST or ALT > 3 times the upper limit of normal 9. Haemoglobin < 8 g/dl 10. Neutrophils < 1000/mmc or total leukocytes < 1500/mmc 11. Platelets < 40.000/mmc 12. History of severe allergic reactions to monoclonal antibodies 13. Pregnancy (if reproductive potential, an accepted birth control method was required) 14. Previous treatment with RTX 15. Previous failure of all the following: 15.1. High dose glucocorticoids 15.2. Plasma exchange Recruitment start date Recruitment end date Countries of recruitment Trial participating centre University of Udine Funding Body Type private sector organisation Funding Body Subtype Results and Publications Publication and dissemination plan Not provided at time of registration Intention to publish date Participant level data Not provided at time of registration Results - basic reporting
<urn:uuid:fb549735-f6c2-4090-80dc-e23b013303c6>
CC-MAIN-2018-09
http://www.isrctn.com/ISRCTN55287110
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811243.29/warc/CC-MAIN-20180218003946-20180218023946-00499.warc.gz
en
0.884526
2,742
2.859375
3
Know Ohio: Native Plants Well, it looks like winter is finally behind us…now that the snow is all melted, we’re starting to see a lot more green. And as those April snow showers begin to bring us some May flowers, Know Ohio correspondent Mary Fecteau is here to talk about some of the native Ohio plants you might see springing up this season. When you take a walk outside, you probably see all kinds of plants. But the ones you see most often are likely not native plants. Native plants are plants that grow in Ohio naturally. The grass on your lawn, the roses in your neighbor’s garden, and even some of the weeds your parents can’t seem to get rid of -- were all brought here, at one time, by people. The native plants and wildflowers that grew here before white settlers arrived are colorful, vibrant, and uniquely beautiful. Ohio’s official state wildflower – the white trillium – grows a gorgeous white flower with 3 petals. But this plant grows veeeery slowly. In fact, it takes 7 to 10 years to even grow flowers. And it’s virtually impossible to grow one of these guys in a nursery – according to experts, it only grows in the wild. But Ohio’s native plants aren’t just eye candy – they’re also like candy…candy. Like the pawpaw. The pawpaw is a small tree native to Southeastern Ohio, but the real prize is the fruit that grows on it – I would describe the taste as a cross between a banana and a mango. Although it was enjoyed by Native Americans and early White settlers, the pawpaw was a forgotten fruit for years – but it has recently seen a resurgence in popularity. The folks in Athens, Ohio are so crazy for the pawpaw that they have a festival devoted to it! Parks are one place you’re likely to see a lot of native plants – but sometimes it takes work. At the Cuyahoga Valley National Park Chris Davis, a plant biologist, has been growing natives in a green house, and plants them all around the park. He says native plants are important because native animals and insects rely on them – and the more native species there are, the healthier and more vibrant the park becomes. One thing I like to do when I’m out for a hike is look for some of these native plants. Maybe you can impress your friends by identifying them. But one thing you shouldn’t do is pick them – an old saying that many hikers live by is “take only pictures, leave only footprints” – unless, of course, a delicious ripe pawpaw is staring you in the face. Then, I say, pick away! Website Article: Ohio Department of Natural Resources, Go Native! Website Article: Native Plant Society of Northeastern Ohio, Plant Identification Website: Cuyahoga Valley National Park PDF: 5 Orange Potatoes, Wild Edible Plants Website Article: Botatnical Society of America, Careers in Botany Classroom Resources: PBS LearningMedia, Plants
<urn:uuid:7e981813-97e4-4b50-aa9e-fdba9cefcbae>
CC-MAIN-2019-18
https://www.ideastream.org/programs/newsdepth/know-ohio-native-plants
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527839.19/warc/CC-MAIN-20190419141228-20190419163228-00190.warc.gz
en
0.956168
655
2.875
3
The rice diet is a weight loss method developed by Dr. Walter Kepmner, which consists of an eating plan high in complex carbohydrates, low in fat, and low in sodium. Foods rich in fiber are the main sources of nutrients, so you can also consume fruits, vegetables, beans and cereals. What foods are allowed in the rice diet? This is an eating plan that helps to control portions while maintaining a balanced and healthy diet. In the first phase, rice and other cereals are eaten, as well as fruits, legumes and grains. Later, vegetables and beans are incorporated. To start, daily caloric intake should be 800 calories, then increasing to 1200/1500 calories per day. It begins with a significant caloric restriction and also reduces sugar, sodium and protein, which allows you to reduce a large volume of weight, and then maintain the weight achieved. Rice is the basic cereal consumed during this diet, but this It must be brown rice, as it contains fewer calories and carbohydrates than white rice, with twice the fiber. It also has more vitamins, minerals, antioxidants, and essential amino acids. Menu options for the rice diet - Breakfast: 1 serving of boiled brown rice and 1 fruit (apple or orange). - Lunch: 1 serving of brown rice boiled with fish, vegetable salad, or grilled vegetables. - Dinner: 1 serving of boiled brown rice, a small portion of boiled meat, and low-fat kefir. - Breakfast: 1 serving of brown rice boiled with raisins and 1 fruit. - Lunch: 1 serving of boiled brown rice, vegetable soup and chicken breast. - Dinner: 1 serving of boiled brown rice with boiled cabbage. - Breakfast: 1 serving of boiled brown rice and fruit salad. - Lunch: 1 serving of brown rice boiled with herbs, vegetable broth and vegetable salad. - Dinner: Rice porridge with low-fat kefir. As the time of the diet passes, other foods are added little by little, starting with fruits, vegetables, cereals and beans, avoiding additives and sauces. This, like other highly restrictive diets, is not suitable for everyone, which is why it is important consult your doctor before starting the rice diet. Leave your comments and opinions on this popular weight loss diet, as well as your tips to put it into practice. Click on the buttons of your social networks and recommend that your friends read the suggested menu to start with the rice diet.
<urn:uuid:1c184e1b-b3f4-49a6-ae35-7ba10f54c24a>
CC-MAIN-2022-05
https://zierak.com/menu-for-rice-diet/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304835.96/warc/CC-MAIN-20220125130117-20220125160117-00515.warc.gz
en
0.947735
518
2.65625
3
By Richard Black Environment correspondent, BBC News website The UK needs a "modal shift" from road to rail if greenhouse gas emissions from transport are to be curbed, a report concludes. The report urges pricing of transport impacts such as air quality The Institution of Mechanical Engineers (IMechE) says changes are needed to government policies on transport pricing, energy and town planning. A train journey can produce about one tenth of the carbon emissions generated if the same trip is made by air. The report's authors say substantial investment in the railways is needed. "We have ambitious government targets for transport emissions, but transport emissions are static," said Cliff Perry, vice president of IMechE's Railway Division and a former head of Thameslink under British Rail. "Eighty-five percent of transport emissions come from roads, so if we are serious about doing something, we must hit road transport." Comparing emissions between various forms of transport is not a straightforward matter, as factors such as the efficiency of engines, the number of people on board and, for electric trains, how the electricity was generated all affect the final equation. IMechE calculates that on average London to Paris trips, people travelling by car generate two and a half times more CO2 than those relaxing in a train, while an air passenger produces 10 times more. But achieving a substantial shift from road to rail would need a coherent policy covering issues such as how secure passengers feel, the convenience of connections, the cost of tickets, and reliability. Road pricing is set to spread to more areas of the UK Emissions from electric trains are of course much lower if the electricity comes mainly from low-carbon sources. The report's authors said Britain could learn much from countries with superb rail systems, such as Japan, where trains routinely arrive and depart on the minute, equipment failures are rare, and where many railway stations form centrepieces of cities and districts. "Spatial planning has to be considered, and new developments should take account of what we can learn from the Japanese system," observed Bill Banks from Strathclyde University, deputy president of IMechE. Train companies should consider offering services like wi-fi internet access throughout, and improving catering services so that rail travel becomes something to look forward to. The report's authors acknowledge that the price of rail tickets can be prohibitive, sometimes costing many times more than the air equivalent. One remedy they suggest is proper pricing of all transport options to include environmental impacts. They also suggest tickets could include references to the relative carbon output of different modes of transport. Whatever changes are made, IMechE considers the "modal shift" will necessitate some investment in infrastructure, including new high-speed lines that can carry more trains significantly faster than the UK's existing stock.
<urn:uuid:e99b8059-665d-4cd5-8659-0398c8f63df5>
CC-MAIN-2016-36
http://news.bbc.co.uk/2/hi/science/nature/7277757.stm
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982947760.88/warc/CC-MAIN-20160823200907-00074-ip-10-153-172-175.ec2.internal.warc.gz
en
0.952239
577
2.96875
3
The books of Genesis through Second Kings trace a history of Israel from earliest times through the fall of the Southern Kingdom in 586 BCE. In earlier work, I demonstrate that this narrative contains a sophisticated political theory – a systematic analysis which justifies political authority; demonstrates the necessity of law and government; explores the nature of power relations in families; argues that nationhood is the best form of political organization; identifies self-governance, centralized institutions and sovereignty as the essential elements of nationhood; and claims that constitutional monarchy represents the best form of national government. But if the bible contains such a theory, why has it not been identified before now? The reason is that the bible’s political theory is embodied in narratives rather than in discursive analysis. The political meaning of the narratives was lost as the bible came to be interpreted from an exclusively spiritual point of view. This paper identifies advantages and disadvantages of narratives and offers conjectures for why Greek thinkers presented their political ideas discursively while the culture of ancient Israel opted to convey abstract ideas in the form of narrative. Date of Authorship for this Version Miller, Geoffrey P., "Logos and Narrative" (2010). New York University Public Law and Legal Theory Working Papers. 239.
<urn:uuid:125b6c40-6394-45ec-ab27-3bc29ee18873>
CC-MAIN-2018-34
https://lsr.nellco.org/nyu_plltwp/239/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211185.57/warc/CC-MAIN-20180816211126-20180816231126-00657.warc.gz
en
0.911387
250
2.984375
3
Weather changes before and after dark During a typical day at the races, the weather can fluctuate quite a bit. As the temperature heats up in the afternoon, you can feel the heat radiate from the pavement and the moisture in the air. Then as the day wears on, the night becomes cool and calm. Not only does this influence whether you wear shorts or pants but it also influences how your engine performs. This is especially an issue in places with extreme temperature fluctuations like in coastal areas. It's not as much of an issue in places where the temperature stays near a median. While you will want to tune your engine according to the local weather, in these places you do not necessarily need to check multiple times per day. The sun heats the atmosphere When the sun rises, it starts heating the atmosphere. This accumulates until approximately mid-afternoon when the hottest part of the day is reached. Hotter temperatures mean that the molecules in the atmosphere are moving faster and, therefore, there is more space in the air for other molecules like moisture. This is why the air sometimes feels soupy in the summer. The atmosphere is filled with moisture. The sun heating the atmosphere is also heating the earth's surface. In a place like a racetrack, this means that the pavement gets hot and tires have a harder time hooking up. In tracks that use VHT, the surface gets gummy with high temperature (130 deg. F). Spraying water on a drag strip starting line, for example, can cool the pavement enough for the tires to better hookup. With sunset, the air begins to cool As the sun begins to set and there is less heat beating down, the molecules in the atmosphere do not move around as much. This doesn't necessarily mean the amount of moisture in the air becomes less, but it does bring the moisture down to the surface, and pavement can get moist. You might notice that the percentage of relative humidity changes even though the amount of moisture in the air remains the same. This is because humidity is a measurement of the amount of moisture in the air relative to the amount of other molecules in the air. As the temperature cools and air molecules are not moving around as much, the amount of air molecules increase which changes the ratio of air to moisture. Because of this, relative humidity is not a total measure of the amount of moisture in the air. However, the number of grains of water is a better measure. This is an absolute measurement of how much water vapor is in the air. You can learn more about this and other weather variables in our first article Measuring Racetrack Atmosphere. As the temperature cools, the amount of oxygen in the atmosphere increases. Usually this helps engines to run better. However, you should monitor the weather to ensure you are maintaining the best air fuel ratio for your engine. The night before race day, you should check the weather report so you can plan accordingly. For mechanical fuel injection or carburetors, you can plan your jetting ahead of time so you have the necessary nozzle sizes with you in the pits. On this site, you can check the forecast for various tracks. If you would like assistance setting up your mechanical fuel injection engine jetting so you can tune for the weather, check out our ProTuning Package for assistance in getting set up. Fuel Injection Racing Secrets
<urn:uuid:0ee65b68-f53b-41a4-b31e-f11e5d597ca7>
CC-MAIN-2021-31
https://airdensityonline.com/2017/01/weather-changes-before-and-after-dark/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150307.84/warc/CC-MAIN-20210724160723-20210724190723-00341.warc.gz
en
0.932523
692
3.546875
4
A Texas research facility team successfully recovers four baboons. The monkeys escaped from the research center that studies complex human diseases with the help of primates. Four Baboons Escape From Primate Research Center On April 14, four baboons escaped from the Southwest National Primate Research Center. Evidently, the baboons got out of their enclosure and even got past the security perimeters surrounding the facility. A team from the facility managed to catch three of the baboons within 20 to 30 minutes, but not before the baboons had given them a rather difficult time. According to a witness who was able to take photos of the baboons as they ran around, the workers had been wearing masks and cautious when they attempted to gather the creatures so as not to hurt them. She further stated that at one point, the baboon paused but then darted into the bushes, causing a bit of a commotion among the workers. The fourth baboon eventually returned to the enclosure on its own. According to the research facility, all baboons are accounted for and checked by veterinarians who confirmed that the creatures are all okay. The institute states that the public has nothing to worry about. "Our immediate concern has been for the safety of the animals, personnel and our neighbors in the surrounding area. Our animal capture team and entire animal care team acted diligently to locate, secure and account for all four baboons," the Texas Biomedical Research Institute said in a statement. Biomedical Research Institute The Southwest National Primate Research Institute is a part of the Texas Biomedical Research Institute and is home to about 2,900 primates including baboons, chimpanzees, marmosets, and other non-human primate species. All of the primates in the facility are cared for by licensed veterinarians, and most of them stay in enclosures with indoor heating and outdoor facilities that simulate their natural habitats. The facility receives regular inspections by the United States Department of Agriculture to review and ensure animal care and treatment. The facility's 1,400 baboon colony is actually the world's largest captive baboon population, which started in 1972 with just 200 feral baboons. They provide pedigreed baboons for research projects that investigate human diseases such as obesity, hypertension, insulin resistance, epilepsy, and immune system aging. "Our work produces measurable and meaningful advances in multiple fields of research that benefit humans. We have a reputation for excellence and maintain strict regulatory standards under all laws that govern nonhuman primates used in research," states the institute philosophy.
<urn:uuid:eefad4d3-b671-49a0-8467-bec1c3acc477>
CC-MAIN-2018-34
https://www.techtimes.com/articles/225232/20180415/4-baboons-escape-from-research-facility-in-texas.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210105.8/warc/CC-MAIN-20180815122304-20180815142304-00559.warc.gz
en
0.961066
512
3.21875
3
Climate change knowledge, concerns and experiences in secondary school learners in South Africa Naidoo, Nicolette P. MetadataShow full item record Climate change poses a major threat to the future of today’s youth. Globally, young people are at the forefront of climate change activism. Their ability to engage, however, depends on the level of knowledge of climate change and concern about the topic. We sought to examine levels of knowledge and concerns about climate change among youth in South Africa, and their experiences of heat exposure. Ten questions on climate change knowledge, concerns and experiences were nested within a cross-sectional survey conducted in a cluster randomised trial among 924 secondary school learners in 14 public schools in low-income Western Cape areas. Learners’ mean age was 15.8 years and they were predominately female. While 72.0% of respondents knew that climate change leads to higher temperatures, only 59.7% agreed that human activity is responsible for climate change, and 58.0% believed that climate change affects human health. Two thirds (68.7%) said that climate change is a serious issue and 65.9% indicated action is needed for prevention. Few learners indicated climate change events had affected them, although many reported difficulties concentrating during hot weather (72.9%). Female learners had lower knowledge levels than male learners, but more frequent heat-related symptoms. Learners scoring high on knowledge questions expressed the most concern about climate change and had the highest heat impacts. Many youth seem unaware that climate change threatens their future. Heat-related symptoms are common, likely undermining educational performance, especially as temperatures escalate. More is needed to mainstream climate change into South African school curricula.
<urn:uuid:f3137733-00bd-48ac-945f-ae43fe8c266b>
CC-MAIN-2022-49
https://repository.nwu.ac.za/handle/10394/39717
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00226.warc.gz
en
0.963529
385
2.828125
3
Have some MPEG-4 (MP4) videos downloaded or stored on your computer and wanna know how to make full use of these MP4 media files? If so, it is important to understand exactly what MP4 files are. And here we introduce the MP4 File Extension Details and Tips. What is MP4? MPEG-4 or MP4 is a digital multimedia format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images. Like most modern container formats, it allows streaming over the Internet and can be easily be played by almost all video players. How to Play a MP4 file? Generally speaking, there are no additional codecs required to play MP4 files. Everything needed to play the video file is already built-in to the player. As it is known to all, MP4 files can be opened with Windows Media Player, and other MP4-compatible media players like VLC, QuickTime, and more. Important Note: To enable your favorite video player like VLC open and play MP4 files perfectly, you may need to install an MPEG-4 codec, which allows your computer to recognize MP4 files and have them play properly. Why Transcode MP4 files? MP4 format is now widely used not limited to movies and TV shows, some cameras/ camcorders (like GoPro, Sony XDCAM EX) also capture videos in MP4. While, as mentioned above, MP4 file is a container format which would be a bit hard for video editing programs like FCP, iMovie, Adobe Premiere, Sony Vegas, Windows Movie Maker, etc to read and process it- it is suggested to reformat the MP4 format for further editing. Plus, if the MP4 video does not meet the specification of your devices or media players, the MP4 will either fail to be added or unable to be played on your Xbox One, Xbox 360, PS3, PS4, iPhone, iPad, QuickTime, VLC, etc. unless transcoding your MP4 into playable videos with the right codec. Why Choose Pavtube Video Converter Ultimate? Obviously, to play, edit, share your MP4 files freely, you need the help with conversion software. And Pavtube Video Converter Ultimate is considered to be the most sought after. With this MP4 file converter, you are able to transcode MP4 video to hundreds of popular formats like H.265 MP4, M3U8, MKV, MOV, FLV, AVI, MKV, WMV, etc.. Not only does it functions as a MP4 movie converter, but also as a MP4 editor that you can use to trim, crop, set effects, add subtitles and more to personalize your movies. Top Solutions for MP4 Conversion: Although MP4 is widely used and most supported by many devices, it’s weird that there are not few people asking compatiblity problems in different forums or Q&A websites. Don’t worry, here lists some top solutions form solve all your problems concerning conversion between MP4 and other formats. Make Copy of MP4 on Windows/Mac: Play MP4 Files on Devices: Play MP4 Files on Media Players: Import MP4 Files to Editing Programs: Stream MP4 Files to Media Servers: Upload MP4 Files for Sharing: Adjust MP4 to Any Formats: Backup Any Formats to MP4: Other Related MP4 Solutions:
<urn:uuid:b2fcf5f5-9740-4e2e-a20f-54ab3309847b>
CC-MAIN-2017-30
http://i-samsunggadgets.com/video-format/mp4/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424088.27/warc/CC-MAIN-20170722162708-20170722182708-00698.warc.gz
en
0.887196
729
2.515625
3
Resources for Children and Teens About Alzheimer's Disease When someone has Alzheimer's disease, it affects everyone in the family, including children and grandchildren. This resource list offers a selection of fiction and nonfiction books, articles, websites, and other materials that may help children and teenagers cope when a family member or friend has Alzheimer's. They can also help parents talk with their children about the disease. Some of the resources on this list are free; others must be purchased. To buy an item, please contact the publisher to confirm price and payment information. Many items are also available from traditional and online booksellers. The items in this resource list are organized alphabetically within four categories: Always My Grandpa: A Story for Children About Alzheimer's Disease (by Linda Scacco, 2005, 48 p.) This picture book tells the story of young Daniel and his grandfather, who has Alzheimer's disease. Daniel and his mom spend every summer with Grandpa, a fisherman who lives by the sea. Daniel loves the times spent playing baseball, walking on the beach, and hearing Grandpa's stories. But this summer is different—Daniel is about to learn what Alzheimer's means for both Grandpa and himself. A note to parents at the end of the book offers advice for helping children deal with common emotions and reactions to a loved one with Alzheimer's. Published by Magination Press. Phone: 1-800-374-2721. Email Magination Press. Hardcover $14.95; paperback $9.95. Do You Have a Moon at Your House? (by Jeannie Johnson, 2005, 39 p.) This illustrated storybook is about Madison and her grandmother, who have a very special bond. Together they read stories, go on walks, or just sit on the swing and talk. When her grandmother begins to forget things and ask strange questions, Madison is worried. Her mother explains that Grandma has Alzheimer's disease. The arrival of a special gift gives Madison and her grandmother the chance to reconnect. For ages 6–10. Available from online booksellers. Hardcover $24.99. Flowers for Grandpa Dan (by Connie McIntyre, 2005, 32 p.) In this picture book, a family copes with the illness of Grandpa Dan, an avid gardener who has passed on his hobby to his children and grandchildren. An informational page from the St. Louis chapter of the Alzheimer's Association suggests ways for adults to talk with children about the disease. Available from online booksellers. Hardcover $15.19; paperback $12.53. Getting to Know Ruben Plotnick (by Roz Rosenbluth, 2005, 32 p.) This illustrated children's book tells the story of David and his Grandma Rosie, who has dementia. Grandma's weird and unpredictable behavior threatens to embarrass David in front of Ruben Plotnick, a new friend and the coolest kid in class. One day, Ruben invites himself over to David's house. When Grandma calls out, "Nate, let's dance," Ruben steps up and gallantly dances around the kitchen with her. David discovers the importance of looking beneath the surface to get to know someone. For ages 5–9. Available from Independent Publishers Group. Phone: 1-800-888-4741. Email the Independent Publishers Group. Hardcover $15.95; PDF and ePub,$12.95. Grandfather's Story Cloth (by Linda Gerdner and Sarah Langford, 2008, 32 p.) Written in English and Hmong, this illustrated book tells the story of Chersheng and his grandfather, who is starting to forget little things like turning off the water and big things like Chersheng's name. Chersheng feels sad and helpless when he learns that Grandfather has Alzheimer's. Then Chersheng's mother gives him a Hmong story cloth that makes Grandfather's memories of his life in Laos come alive. For ages 6–10. Includes a discussion guide for parents, teachers, and healthcare providers. Available from online booksellers. Hardcover $13.21. Grandpa Doesn't Know Me Anymore (by Terri Kelley, 2013, 36 p.) When his grandfather moves into his home, a young boy tries to reconnect with the man he knows. When this isn't possible, the boy promises to always love and take care of his grandpa. Available from online booksellers. Paperback $9.49. It Only Looks Easy (by Pamela Swallow, 2009, 192 p.) This book tells the story of a girl, Kat, whose dog is nearly killed by Mrs. Lawrence, an elderly driver with Alzheimer's disease. When Kat visits Mr. and Mrs. Lawrence, she realizes that Mrs. Lawrence is very confused and doesn't remember what she did. After the visit, Kat's mother explains Alzheimer's to her. Available from Macmillan. Phone: 1-646-307-5151. Paperback $6.99. The Memory Box (by Mary Bahr, 1992, 32 p.) This is the story of young Zach, who spends summers on a lake with his beloved grandparents. When Gramps develops Alzheimer's, his memory sometimes fails, and Zach has to help him out. Zach and his grandparents start a memory box, a wooden box filled with treasures to help everyone remember the times they shared. For ages 6-9. Available from online booksellers. Paperback $6.88. My New Granny (by Elisabeth Steinkellner, 2012, 32 p.) This book tells the heartwarming story of Fini, a young girl who learns to accept her grandmother's dementia. After Granny moves in, Fini at first is puzzled by her sometimes strange and childlike behaviors. But Fini gets used to her "new Granny" and learns how she can help her mother and the new aide take care of her. Available from Sky Pony Press. Phone: 1-212- 643-6816. Hardcover $16.95. Remember Me? Te acuerdas de mi? (by Sue Glass, 2004, 32 p.) Written in English and Spanish, this tale is told from a child's point of view. A little girl whose grandfather has Alzheimer's disease is confused and upset when he cannot remember her. Her mother tells her about Alzheimer's and gives the girl a job—to be her grandfather's memory and remind him about all the fun things they have done together. Available from Raven Tree Press. Phone: 1-800-323-8270. Email Raven Tree Press. Hardcover $14.95. Singing with Momma Lou (by Linda Jacobs Altman, 2002, 32 p.) This book for children age 6–9 tells the story of 9-year-old Tamika and her grandmother, Momma Lou, who has Alzheimer's disease. Every Sunday, Tamika visits Momma Lou in the nursing home. Tamika uses photographs, school yearbooks, movie ticket stubs, newspaper clippings, songs, and other mementos to help Momma Lou remember important times in her life and to learn about her grandmother's life. Available from online booksellers. Hardcover. Still My Grandma (by Veronique Van den Abeele, 2007, 28 p.) Recommended for ages 4–8, this illustrated story describes little Camille's fun times with her grandmother. When her grandmother develops Alzheimer's and does odd things, Camille learns about the disease and finds ways to continue their special relationship. Available from Eerdmans Books for Young Readers. Phone: 1-616-459-4591. Email Eerdmans Books for Young Readers. Hardcover $16. Striped Shirts and Flowered Pants: A Story About Alzheimer's Disease for Young Children (by Barbara Schnurbush, 2006, 32 p.) In this picture book for children ages 4–8, Libby and Nana love to read stories and feed birds together. But Libby notices that Nana is forgetting the words in books, mixing up the names of birds, and wearing clothes that don't match. When Libby's parents tell her about Alzheimer's disease, she begins to understand what is happening to Nana. With their reassurance and help, she finds ways to be with Nana and still do the things they love. Published by Magination Press. Phone: 1-800-374-2721. Email Magination Press. Hardcover $14.95. The Voice of the Climbing Rose: A Tribute to Caregivers (by Christopher Perry, 2004, 32 p.) This illustrated storybook is designed to help children understand what is happening to loved ones with Alzheimer's. It tells the story of a mother who plants a rose bush the day her daughter was born. As time passes, the woman watches both her daughter and the rose bush grow, but she eventually develops Alzheimer's and forgets many things, including the rose bush and her own daughter. The daughter still loves and cares for her, as her mother cared for the once-fallen bush long ago. The book comes with a CD containing a lullaby. Available from online booksellers. Paperback from $1.25. What's Happening to Grandpa? (by Maria Shriver, 2004, 48 p.) This book tells the story of Kate, a young girl whose grandfather has Alzheimer's disease. Grandpa has always been the best storyteller Kate has ever known, but lately he repeats himself, becomes easily frustrated, and even forgets Kate's name. When Kate's mother explains that Grandpa has Alzheimer's, Kate finds a way to cherish his life and memories. For children age 3–6. Available from online booksellers. Hardcover $15.99. When My Grammy Forgets, I Remember: A Child's Perspective on Dementia (by Toby Haberkorn, 2015, 38 p.) This picture book, told from a young girl's perspective, reveals the closeness and love between a grandmother and granddaughter as they spent time together. The girl notices changes in her Grammy's behavior, like how Grammy can't read to her anymore. The girl's mother tells her that "Grammy's brain is not working properly" but assures her that Grammy still loves her. The refrain "My Grammy hugs me tight" becomes "I hug my Grammy tight." Available from online booksellers. Paperback $12.95. Why Did Grandma Put Her Underwear in the Refrigerator? An Explanation of Alzheimer's Disease for Children (by Max Wallack and Carolyn Given, 2013, 40 p.) Seven-year-old Julie explains Alzheimer's to young readers in terms they can understand. Told from a second-grader's point of view, this illustrated book can help children cope with a relative's gradual memory loss and new behaviors and learn how to care for a relative in their own way. Available from online booksellers. Paperback $11.53. A Young Man's Dance (by Laurie Knowlton, 2006, 32 p.) This illustrated children's book tells the story of a young boy whose Grandma loved to dance with her grandson while cookies baked in her oven. Now she lives in a nursing home, where she sits in a wheelchair and doesn't remember the cookies or her grandson's name. Seeing his grandmother like this is hard for the boy. One day, when a band plays at the nursing home, the grandson finds a way to relive dancing with Grandma. Available from online booksellers. Hardcover $14.26. This website seeks to raise awareness of Alzheimer's and engage teens in the cause. For teens with family members affected by the disease, AFA Teens offers an online community with support from experts and the chance to share experiences and connect with each other through a bulletin board and blog. Other features include an e-newsletter and calendar of events. Published by the Alzheimer's Foundation of America. Phone: 1-866-AFA-8484. Email the Alzheimer's Foundation of America. Free online access. This web page explains the parts of the human brain, functions they control, and how they work, with accompanying figures. It describes the brain's communications system and lists major neurological disorders that alter the brain's ability to function properly. Published by the National Institute of Neurological Disorders and Stroke. Email the National Institute of Neurological Disorders and Stroke. Free online access. Curveball: The Year I Lost My Grip (by Jordan Sonnenblick, 2012, 304 p.) After Peter's hopes to join his new high school's baseball team are dashed, he turns to an old hobby, photography. Taught by his grandfather, a professional photographer, Peter spends more and more time with his grandfather and a girl in photography class at school. Grandpa's forgetfulness and new habits puzzle Peter until he learns about Alzheimer's. This novel explores friendship, romance, family, and tragedy. Age 12 and up. Published by Scholastic Press. Phone: 1-800-724-6527. Hardcover $12.59; paperback $5.59. Pop (by Gordon Korman, 2011, 272 p.) New-boy-in-town Marcus joins the school football team and meets Charlie, a middle-aged man who turns out to be retired NFL linebacker Charlie Popovich, "the king of the pop." Marcus's rival teammate Troy turns out to be Charlie's son. This book weaves a tale of intergenerational friendship as Marcus learns that Charlie has early-onset Alzheimer's—a fact that Charlie's family desperately wants to hide but that is increasingly hard to ignore. Published by HarperCollins/Balzer + Bray. Phone: 1-212-207-7000. Email HarperCollins/Balzer + Bray. Paperback $9.99. Trudy (by Jessica Lee Anderson, 2005, 192 p.) In this novel for teens, Trudy, who is in middle school, has older parents who are sometimes mistaken to be her grandparents. And if that isn't enough, math class isn't going well, and her best friend Ashley has ditched her for a new crowd. Then Trudy finds a new best friend and has her first crush on a boy. Just when things are starting to look up at school, Pop is diagnosed with Alzheimer's disease, and Trudy and her mother face some tough decisions. Available from Milkweed Editions. Phone: 1-800-520-6455. Hardcover $6.95 About My Grandfather, About My Grandmother (2007, 6:30) This video features young children and teens from two different families talking about what it's like to experience a grandparent's dementia. They discuss how they learned about Alzheimer's, their feelings during situations that arose, and how they responded. Produced by the Alzheimer's Society. Free online access. Alzheimer's Disease (2011) This short website article for children describes Alzheimer's disease, what happens to the brain, symptoms and diagnosis, and treatment. It also discusses how children might react to a loved one with Alzheimer's and simple ways to show caring and love. Published by the Nemours Center for Children's Health Media. Free online access. Grandpa, Do You Know Who I Am? (2009, 30:48) This film is part of The Alzheimer's Project, which looks at groundbreaking scientific discoveries and seeks to increase public understanding of Alzheimer's research and caregiving. Narrated by Maria Shriver, it tells five stories of children ages 6–15 whose grandparents have Alzheimer's. It shows how dementia can affect children and how children can relate to older family members with memory problems. An accompanying discussion guide (PDF, 318K) is designed to help start family and community conversations between kids and adults about the film and about Alzheimer's disease. Produced by HBO Documentary Films. Free online access. Information About Dementia for Young People (PDF, 152K) (2012, 2 p.) This fact sheet provides basic information about dementia for children and adolescents. The first part provides a general overview of dementia, its symptoms, and diagnosis. The second part explains how dementia can affect children and grandchildren, how kids can help people with dementia, and how kids can handle their feelings about dementia. Includes a list of downloadable publications. Available from Alzheimer's Australia. Free online access. This web page links to several videos, fact sheets, and other materials to help young people understand Alzheimer's disease, how it affects the brain, and how to cope with a family member's diagnosis. It links to the Alzheimer's Association's "Brain Tour" and related websites, as well as resources for parents to help them talk to children about Alzheimer's. Includes videos for teens. Published by the Alzheimer's Association. Phone: 1-800-272-3900. Email the Alzheimer's Association. Free online access. After a Diagnosis of Alzheimer's: Libby's Story (2011, 3:49) In this video, Libby explains how she told her grandson about her diagnosis of Alzheimer's disease and "made memories" with him. Produced by the Alzheimer's Association. Free online access. Explaining Dementia to Children and Young People (2013, 8 p.) Finding out that someone close to you has dementia, and coping with the ongoing illness, can be distressing for anyone, including children and young people. This fact sheet explains how children and teens can be affected and suggests ways parents can talk with their children about dementia and help them feel secure and involved. Published by the Alzheimer's Society. Free online access. When a family member has Alzheimer's, it affects everyone in the family, including children and grandchildren. This article suggests ways to help children and teenagers cope with their feelings and find ways to spend time with the person with Alzheimer's. Published by the National Institute on Aging's Alzheimer's and related Dementias Education and Referral (ADEAR) Center. Phone: 1-800-438-4380. Email the ADEAR Center. Free online access. Parents' Guide: Helping Children and Teens Understand Alzheimer's Disease (PDF, 1.6M) (2018, 12 p.) This brochure is intended to help parents talk to their children and teenagers so they can understand what's happening to a relative with Alzheimer's disease. It outlines the emotions children and teens may feel and how they might express them, as well as questions they may ask. The brochure also suggests activities kids can do with the person with Alzheimer's and other ways parents can help kids cope. Published by the Alzheimer's Association. Phone: 1-800-272-3900. E-mail the Alzheimer's Association. Free online access. This four-part dementia education curriculum for high school students includes an overview of dementia, information about caregiving, community resources in Michigan, and career paths and volunteer opportunities for students interested in working with older adults. The curriculum addresses many issues that teens with Alzheimer's in the family may face and suggests activities and coping strategies. Available from Northern Michigan University. Phone: 1-906-227-1000. Free online access. Content reviewed: May 19, 2017
<urn:uuid:94830091-60a9-4df6-be69-6c910b2996e1>
CC-MAIN-2018-39
https://www.nia.nih.gov/health/resources-children-and-teens-about-alzheimers-disease
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161638.66/warc/CC-MAIN-20180925123211-20180925143611-00131.warc.gz
en
0.9343
4,015
3.359375
3
- A Within device - B Physical at console - C Local console switch - D Local only switched connection - E LAN - F Local radio link - G Remote over closed infrastructure - H Remote over open infrastructure - C Links - B Encrypted links - A Authenticated encrypted links Updates and changes: - 0 Never update or change - 1 Update or change when there is a specific reason to do so - 2 Update or change at convenient system changeover times - 3 Update or change at regular intervals - Z No authentication, anonymous: This is common for remote access to Web pages and other similar things. - Y No authentication, identified: - F Password (something they know): Passwords are the most commonly used authentication approach and will likely remain so for the indefinite future because of their extreme ease of use by people and universal compatibility. - D Query/Response (something they can do): This is a process in which a set of passwords, or the equivalent thereof, are associated with queries and the user demonstrates their ability to do something in order to authenticate themselves. In more advanced cases they may be things like the ability to compose music of a genre on the spot, to computer a formulaic response in time, or answers to questions with pre-defined answers - such as mother's maiden name. It also encompasses typing characteristics and other similar indicators. - E Possession of a key (something they have - static): Door keys or other similar mechanisms are commonly used for entry and access. - D Possession of another device (something they have - changing): This includes time variant mechanisms, electronic query response systems, one-time passwords, and so forth. - D Physiological characteristics (something they are): This includes retinal prints, facial recognition, infrared facial recognition, fingerprints, hand geometry measurements, DNA samples, and so forth. It also includes things like color blindness, trained responses, and other similar mechanisms. - C Something they know or can do AND something they have: This is a combination of two other factors. - C Something they know or can do AND something they are: This is a combination of two other factors. - B Something they know or can do AND something they are AND something they have: This includes personal authentication by someone who knows the individual engaging in some level of communications as well as a variety of combinations of devices and other similar things. - A Within device: This includes forensic examination of a device and other mechanisms based on presence inside a physical system or facility. - B Physical at console: This is presence at the directly connected device intended to control the mechanism locally. - C Local console switch: This includes switching devices that allow connection to multiple devices and switching between them, but does not include LAN-based console devices. - D Local only switched connection: This includes local telephone lines on the same PBX, a local only switched network, or other similar devices. - E LAN: A local area network that extends only to the physical facility and may be connected through a gateway to other networks. - F Local radio link: This includes infrared, bluetooth, and other similar limited radius devices. - G Remote over closed infrastructure: This includes a wide variety of technologies such as campus-wide networks, lease lines, remote telephonic connections, and so forth. - H Remote over open infrastructure.: This includes the Internet and all variations thereupon. - C Links: This is any connection without protective mechanisms. - B Encrypted links: This is a connection that is encrypted but not authenticated, such as an SSL link or an SSL session without a password. It also includes carrier encrypted tunnels and other similar mechanisms. - A Authenticated encrypted links: This includes encrypted links that are also authenticates so that the remote machine, facility, or device is authenticated and the traffic encrypted. Changes are generally made to password-based and token-based authentication mechanisms and keys for encryption systems. - 0 Never update or change "Never say never" may apply here. In some cases changing passwords may not reduce exposures, but these cases are rare. For example, for a physically secured system without external user access and where only authorized users have physical access to the location with the computer, password changes may be of little or no value. - 1 Update or change when there is a specific reason to do so Changing passwords whenever there is a specific reason to believe that there is an exposure is clearly a sensible idea. But if carried to extremes may be too expensive for the level of the exposure. This approach calls for knowing when an event has occurred and what systems may be affected by it. Examples of events causing obvious exposures include the movement of an employee from one job to another, a known computer break-in, or a change in key personnel. In each case, access in excess of that necessary for the users' job functions are caused by their ability to access accounts using known passwords. Figuring out which systems may be affected is somewhat complicated by interdependencies of systems and commonalities between systems. For example, if a file server password is exposed, it may affect all of the systems that use that file server. If the same user has access to multiple systems, they likely use the same or similar passwords on many of those systems and all of those systems are therefore exposed. There are many other similar examples. - 2 Update or change at convenient system changeover times There is nothing inherently wrong with this practice, and indeed all new systems should have all user passwords initially set to non-default values. But this does not address the other exposure issues and is thus of limited value. - 3 Update or change at regular intervals This is recommended by most security standards and thus widely accepted. There are, however, some problems with changing passwords at regular intervals. Some of the major problems include: The basic reason to change a password is that the password in question may be known to an unauthorized user. The period of time between when an unauthorized user knows a password and when the password is changed represents a period of exposure to attack. The goal of password changes is to reduce this exposure. It is also important to consider that a fairly short exposure period can cause high consequences. In many cases, within seconds to minutes of an initial break-in, "back doors" are put in place to allow reentry to the system even if the passwords are changed. For this reason, simply changing passwords may not be an effective action when an exposure occurs. - 0 Never update or change "Never say never" may also apply here. While normal operations of security tokens do not require changes, any such system should, at the architectural level, be updateable and replaceable or it risks being brittle. - 1 Update or change when there is a specific reason to do so Changing tokens when there is a breach of a token provider, token server, or other similar risk aggregating mechanism is likely to be required at some point in the lifecycle of an enterprise. As such, this should be part of planning. - 2 Update or change at convenient system changeover times There is nothing inherently wrong with this practice, but for most token systems at the enterprise level, it is quite expensive and not system-specific. - 3 Update or change at regular intervals Most token systems have defined lifecycles for tokens (on the order of a few years or less), so tokens should be replaced periodically as part of this mechanism. For encryption keys - 0 Never update or change "Never say never" definitely applies here. - 1 Update or change when there is a specific reason to do so Changing encryption keys under duress is a challenge and the useful enterprise encryption system should be designed so that multiple keys are always available and change-over from one set of keys to another should be able to be done quickly and efficiently. - 2 Update or change at convenient system changeover times There is nothing inherently wrong with this practice, but encryption keys are normally changes quite often in any case. Public and private keys are normally generated for each system at inception and should reasonably be updated during major changes. - 3 Update or change at regular intervals This is recommended for all encryption keys, largely owing to the ready availability of cyphertext and sometimes plaintext and cypertext pairs. In addition, session keys should be generated for each session. For encryption and token systems - 0 Never update or change "Never say never" may also apply here, but systems themselves tend to be hard and expensive to replace. As a result, great care should be taken in choosing them. - 1 Update or change when there is a specific reason to do so Changing encryption or token systems are sometimes necessary, and when it is, the costs are high. These can be substantially reduced by choosing systems that are amenable to multiple methods or modes of operation. For example, an encryption system should allow for the use of a variety of different encryption algorithms, the change and addition of algorithms, and arbitrarily long and adaptable key sizes should be a built-in feature of the overall system. Otherwise, it is a problem waiting to happen. - 2 Update or change at convenient system changeover times Generally, if a changeover must be made, this is the time to do it, but at the enterprise level, this is problematic because cryptographic infrastructure tends to span many systems. Major architectural changes are really the only time to consider this strategy. - 3 Update or change at regular intervals This is not recommended for encryption or token systems. The cost is almost certainly very high and unnecessary.
<urn:uuid:89af30f5-500d-4862-9427-db125204d07c>
CC-MAIN-2013-20
http://www.all.net/SecDec/ControlArch3b.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706469149/warc/CC-MAIN-20130516121429-00010-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928516
1,984
2.6875
3
Humans and The Half-Races Humans by and large are the most plentiful race. This is due to two incredible and yet disturbing factors. Firstly, humans have a shorter lifespan than the other races and a much more rapid reproductive ability. Elves typically live to 300 and carry a child for 2 years before birth. There is also a ~5 year recovery period before an Elven woman can bear another child. Dwarves live to 250 and carry a child for 1 year. Dwarves possess no recovery period, but socially rarely have more than a single child. Gnomes, Fennic, Lizard folk, Halflings, and Teiflings often live to 200 with varying incubation periods all greater than 1 year. Humans however rarely live to 100, and carry for only 9 months with no significant recovery period after the birthing. Socially it is common for Humans to raise 2-3 children on average, a number only surpassed by the Fennic who hatch 4-6 in a lifetime. Secondly, Humans have the most flexible genome of all the races that share Meridian. This flexibility allows them to procreate with any of the other races to create “Half-” children. These Half races are not technically 50/50 humans as their namesakes would imply, but rather a mule like offspring that shares traits of both while being neither. Depressingly, these half races have a high rate of sterility for reasons unknown. Those that can breed have been observed to create full blooded children of either race. Half races do not spawn half races. Half races also fail to possess the humans flexible genome, they are limited to breeding with other humans, a matching half race or wherever their other half comes from. Mechanically, Humans and Half races are normal, as dictated by the 3.5 players hand book.
<urn:uuid:b04fdb09-c28e-4d74-b6ae-a1224392b429>
CC-MAIN-2017-30
http://meridiancity.obsidianportal.com/wikis/humans-and-the-half-races
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423992.48/warc/CC-MAIN-20170722102800-20170722122800-00657.warc.gz
en
0.953843
382
2.828125
3
The development of creative abilities is vital to survive. Teaching in a creative way is essential to make learning a process that all students can enjoy and benefit from. European education has a critical need to find a way to weave creativity within education settings. Teaching and learning by embedding the arts into school curriculum is the answer. Arts involve emotional intelligence, and brain changes are most extensive and powerful when emotion is part of learning. The chemicals of emotions modify synapses and modifications of synapses is the very root of learning. Furthermore, by offering innumerable opportunities for experiential, sensory learning that engages the emotions - The arts are arguably the most important tool a teacher has to engage the emotions. Examples of using the arts to teach curricular subjects: teaching maths through sculpture, chemistry through dance, history with painting, science with music, geography with drama. ARTinED was extremely successful, receiving praise and maximum score by the experts of the European Commission. The project activities were tested by a crowd of enthusiastic teachers who are waiting for updates and new resources. . Exploitation of the project was very effective indeed. A result is visible in Sweden where the leader institution of the present application is currently working along with the Ministry of Education, regional and local authorities, on developing a school in Sweden based on the ARTinED methodology. The school would act as a catalyst for innovation for the entire country and would contribute to include new concepts in education.
<urn:uuid:db5848f2-c190-4149-9e2b-7dca27f3aec0>
CC-MAIN-2021-43
http://eulib.eu/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585424.97/warc/CC-MAIN-20211021133500-20211021163500-00556.warc.gz
en
0.967006
295
3.46875
3
Musk is used as raw material in the majority of fragrant blends particularly in perfumery. It is resulting from glandular secretions of animals such as; the musk deer, beaver, muskrat or musk ox. There are also various plants that emit similar fragrances such as floral musk found in angelica root, seeds, hibiscus and other plants. Furthermore, musk is derived from other artificial substances with similar scents such as the nitro-musk, polycyclic musk and macrocyclic musk. Musk was a name primarily given to a strong-smelling brownish substance with a dominating odor secreted from a musk gland that sits in a sac located between the genitals and the umbilicus of a male musk deer and secretes strong pheromones employed to draw in mates and as outlined by contemporary scientists, this musk odor operates as a great aphrodisiac based on the fact that the scent strongly is similar to the smell of testosterone, that might function as a pheromone in human beings. The various types of musk include: The original deer musk has been utilized and valued for centuries as one of the very valuable raw materials in perfumery something similar to the scent of babies' skin . After its dried, the reddish-brown liquid substance inside the musk pod changes into a dark granular material known as "musk grain” which is then tinctured with alcohol. The fragrance of the tincture gives a pleasant odor only after it has been significantly diluted. The first references of the use of deer musk in perfumery points to the Arab and Byzantine perfume makers of the 6th century. This aromatic substance was also added to mortared walls of mosques during their construction, to exude the excellent fragrance when it’s warmed by the sunlight. The Hyrax ; a small and furry herbivorous animal is a member of the family Procaviidae along with the order Hyracoidea located in the Southern parts of Africa and the Middle East . The petrified and fossilized excrement of the Cape Hyrax is known as Hyraceum or Dassie . This excrement is made up from the faeces and urine of the Hyrax which is a jelly-like substance which has an incredibly sophisticated scent comparable to notes of deer musk, Castoreum, civet, agarwood and tobacco. It is a sweet smelling raw material useful within perfumery in addition to the treatments for epileptic seizures, abdominal issues, ear contamination, back problems, kidney problems, convulsions, feminine hormonal disorders and as a tranquilizer. The Civet is a small creature which belongs to the civet family very similar to the weasel or cat in appearance. African civet resides in savannahs and also woodlands of South and central Africa, while Indian civet dwells in Nepal, Bangladesh and Vietnam. A number of species of these animals produce odorous secretion with the purpose of marking their territory. This secreted substance referred to as civet or zibet is a soft, almost liquid material which appears pale yellow when fresh, becomes dark when placed in light and becomes greasy in consistency. Its odour is strong, even putrid as a pure substance, but once diluted it is pleasantly and sweetly aromatic useful in both perfumery as well as medicine. Castoreum is a yellowish odoriferous oily secretion that is generated by the castor sac of the North American Beaver Castor Canadensis and also the European Beaver Castor fibre utilized in combination with urine for the purpose of marking the beaver’s territory. When secreted, it is used as a tincture in some perfumes, as a food additive and as medicine as treatment for epilepsy, headache, fever, and hysteria. The odour of Castoreum is a warm, carnal, and leather-like scent often described as razor-sharp, spreading a tar-like note that reminds of an odour of a birch tar or Russian leather. After it is diluted with alcohol, the raw Castoreum melts into more pleasant musky and fruity nuances. The scent of Castoreum is wild and bodily, lustful and passionate, bestowing on the one whom wears it a delicate ambiance of sensuality.
<urn:uuid:106fdb6b-37a7-4486-a21e-cdeffc3f931b>
CC-MAIN-2017-26
https://www.agarscentsbazaar.com/blog/2016/05/09/different-type-of-natural-musk-oil
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320545.67/warc/CC-MAIN-20170625170634-20170625190634-00634.warc.gz
en
0.95246
909
2.953125
3
Nursery Rhyme Coloring: Twinkle, Twinkle, Little Star Most nursery rhymes we sing today are a few hundred years old, and they've stuck around for so long because they are a great way to introduce kids to simple words and sounds. Familiarize your child with some simple sight words and rhymes with this coloring page of "Twinkle, Twinkle, Little Star". Need more nursery rhymes to color? Never fear, they're right here. Personalized worksheets is an Education.com Pro feature Subscribe to Education.com Pro to add your student names, class name, date, and more to your worksheetsLearn More
<urn:uuid:9aecb723-4a12-42a7-ab3b-035d4d7a17ff>
CC-MAIN-2017-39
https://www.education.com/worksheet/article/coloring-twinkle-twinkle-little-star/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689975.36/warc/CC-MAIN-20170924100541-20170924120541-00641.warc.gz
en
0.894113
140
2.84375
3
Back in 1890 one Shakespeare super-fan took his enthusiasm too far, and the American bird population has never been the same. It sounds like the set-up of some bizarre popular legend, but it's as strange as it is true. Eugene Schlieffen was the amateur ornithologist who had the idea of filling New York's Central Park with every bird mentioned in the works of Shakespeare. Certain species among the European birds mentioned in Shakespeare were unable to adapt to ecological conditions in the park, but the European starling succeeded beyond Shleiffen's wildest expectations. It didn't take long for the starlings to form established breeding areas. By 1891 breeding was observed, and by the turn of the century the range of the bird began to expand rapidly, reaching central Maine, the Great Lakes, and northern Georgia by 1926. By 1945, starlings had established breeding populations on the Pacific coast. Starlings are an invaseive species, and they cause over $800 million in annual damage to U.S. agriculture. On a positive note, when seeds from those plants pass through a starling's system, they are more likely to germinate when deposited. Today, the hundred starlings Schlieffen released have multiplied and now colonize the whole North American continent in numbers estimated at 93 million strong. That number represents an estimated 50 percent loss since 1970, when the population was near 200 million. The sharp decline in starlings mirrors the horrific loss of birds in North America in general. This means that starlings are decling, but they remain year-round competitors of some native species for nesting spots and food.
<urn:uuid:064e118b-f1cb-40b0-a344-1ad89895f2bc>
CC-MAIN-2022-21
https://indianapublicmedia.org/amomentofscience/the-invasion-of-the-starlings.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00132.warc.gz
en
0.959029
337
3.328125
3
Iowa Agriculture and Home Economics Experiment Station |This article expired 12-Sep-2012 -- it may contain outdated or superceded information ISU Digital Collections has recently added the Iowa Agriculture and Home Economics Experiment Station (IAHEES) Research Bulletin covering 1911-1967 (bulletin nos. 1-555). The IAHEES has been in existence since 1888 to fulfill the requirements of a Congressional charge for land-grant universities to advance science and work with the citizens of Iowa. Disciplines include agriculture, dairy, soil chemistry, bacteriology, agronomy, entomology, botany, farm crops, animal husbandry and rural sociology. Our intent is to continue adding historic IAHEES reports and bulletins to the collection over time. Click here to access the Research Bulletin http://cdm16001.contentdm.oclc.org/cdm/search/collection/p16001coll13. The collection can also be accessed through the Digital Collections home page under ISU Research http://www.lib.iastate.edu/preserv/cdm/digital.html UPDATE: The IAHEES Research Bulletin has been moved from ISU Digital Collections to a new location in the Digital Repository @ Iowa State University. Please use this link instead of the one above to find the collection.
<urn:uuid:4fabe760-739c-4b53-97a1-85db19bf742c>
CC-MAIN-2015-14
http://www.lib.iastate.edu/news-article/2025/100692
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131292567.7/warc/CC-MAIN-20150323172132-00228-ip-10-168-14-71.ec2.internal.warc.gz
en
0.807941
274
2.640625
3
Global corn-based plastics for Packaging market: Introduction Corn-based plastics are primarily a biodegradable group of polymers that can be manufactured from renewable resources. Corn-based plastics are starch-based bioplastics in the form of disposable tableware and carrier bags. Bioplastics have widespread applications in various industries, including the packaging industry. There are numerous advantages of corn-based plastics in the packaging industry. One of the key factors positively influencing preference for corn-based plastics is that they are 100% biodegradable, which results in less pollution. Another important property possessed by corn-based plastics is that they are carbon neutral which results in reducing the number of greenhouse gases significantly. Corn-based plastics are free from toxic substances and do not leach harmful substances into the food even at high temperatures. Corn-based plastics are made up from polylactic acid, which is a plastic replacement made from fermented plant starch, and is expected to quickly emerge as a popular alternative to traditional petroleum-based plastics. As corn-based plastics garner more attention as an environment-friendly alternative to traditional plastics, the global corn-based plastics for packaging market is expected to expand at a healthy CAGR, during the forecast period Global corn-based plastics for Packaging market: Dynamics The major driver for the global corn-based plastics packaging market is the rising support given by the government, encouraging the incorporation corn-based plastics in place of conventional plastics. Amidst rising concerns regarding the pollution caused by the usage of conventional plastics, corn-based plastics have been widely regarded as an appropriate alternative. Due to the various benefits of corn-based plastics mentioned above, it is anticipated that they will witness growth in the global packaging industry, during the forecast period. Growing awareness among the general population about the ecological impact of their lifestyle is another key driver for growth of the global corn-based plastics for packaging market. Corn-based plastics are being used in various end-use industries such as the food industry, pharmaceutical industry, agriculture industry and textile industry. Corn-based plastics have been developed to eliminate the problems caused by conventional plastics. Corn-based plastics are made from biodegradable feedstock, which means that they can degrade into the soil like any other organic matter. The global market for corn-based plastic packaging has been driven by the rising awareness among the global population regarding the adverse effect of conventional plastics which led to increased adoption of corn-based plastics among manufacturers rather than conventional plastics. Despite the positive outlook for growth, over the forecast period, there are certain factors that could hamper growth of the global corn-based plastics for packaging market. The same can be exemplified by the fact that polylactic acid, which is a corn-based plastic, does not biodegrade easily. Therefore, many experts have recommended the use of reusable container such as, backpacks, baskets, and cloth bags for grocery shopping. Such developments could hamper growth of the global corn-based plastics packaging market. The European region is the current leader in the global corn-based packaging market. The European Union has been supportive of several environmental protection initiatives and several countries in Europe have adopted the usage of corn-based plastics for packaging due to its various advantages. On comparing the pricing between corn-based plastics and conventional plastics, corn-based plastics are more likely to be preferred rather than conventional plastics. Asia Pacific could make rapid progress in the global corn-based plastics for packaging market. Global corn-based plastics for packaging market: Key Players Some of the players operating in the global Corn-Based Plastics packaging market are – CornWare UK LTD, Natureworks LLC, and Klockner Pentaplast, among others. The research report presents a comprehensive assessment of the market and contains thoughtful insights, facts, historical data, and statistically supported and industry-validated market data. It also contains projections using a suitable set of assumptions and methodologies. The research report provides analysis and information according to market segments such as geographies, application, and industry. The report covers exhaust analysis on: - Market Segments - Market Dynamics - Market Size - Supply & Demand - Current Trends/Issues/Challenges - Competition & Companies involved - Value Chain Regional analysis includes: - North America (U.S., Canada) - Latin America (Mexico. Brazil) - Western Europe (Germany, Italy, France, U.K, Spain) - Eastern Europe (Poland, Russia) - Asia Pacific (China, India, ASEAN, Australia & New Zealand) - Middle East and Africa (GCC Countries, S. Africa, Northern Africa) The report is a compilation of first-hand information, qualitative and quantitative assessment by industry analysts, inputs from industry experts and industry participants across the value chain. The report provides in-depth analysis of parent market trends, macroeconomic indicators and governing factors along with market attractiveness as per segments. The report also maps the qualitative impact of various market factors on market segments and geographies. Global corn-based plastics for Packaging market: Segmentation On the basis of end-user industry, the global corn-based plastics for packaging market has been segmented as: - Food Industry - Pharmaceutical Industry - Agriculture Industry - Textile Industry Global corn-based plastics for Packaging market: Geographical Outlook - North America - Latin America - Western Europe - Eastern Europe - Asia Pacific Excluding Japan (APEJ) - Middle East & Africa (MEA) - Detailed overview of parent market - Changing market dynamics in the industry - In-depth market segmentation - Historical, current and projected market size in terms of volume and value - Recent industry trends and developments - Competitive landscape - Strategies of key players and products offered - Potential and niche segments, geographical regions exhibiting promising growth - A neutral perspective on market performance Market Research Methodology - Perfected through Years of Diligence A key factor for our unrivaled market research accuracy is our expert- and data-driven research methodologies. We combine an eclectic mix of experience, analytics, machine learning, and data science to develop research methodologies that result in a multi-dimensional, yet realistic analysis of a market.
<urn:uuid:9e01b58f-8e6a-4580-929f-8d43d5fd3743>
CC-MAIN-2020-40
https://www.futuremarketinsights.com/reports/corn-based-plastics-packaging-market
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402132335.99/warc/CC-MAIN-20201001210429-20201002000429-00204.warc.gz
en
0.934622
1,293
2.734375
3
Blog . BFA Review Tips This handout describes what a thesis statement is, how thesis statements work in your writing, and how you can discover or refine one for each of your BFA papers. Writing in college often takes the form of persuasion—convincing others that you have an interesting, logical point of view on the subject you are studying. Persuasion is a skill you practice regularly in your daily life. You persuade your roommate to clean up, your parents to let you borrow the car, your friend to vote for your favorite candidate or policy. In college, course assignments often ask you to make a persuasive case in writing. You are asked to convince your reader of your point of view. This form of persuasion, often called academic argument, follows a predictable pattern in writing. After a brief introduction of your topic, you state your point of view on the topic directly and often in one sentence. This sentence is the thesis statement, and it serves as a summary of the argument you’ll make in the rest of your paper. What is a thesis statement? A thesis statement: If your assignment asks you to take a position or develop a claim about a subject, you may need to convey that position or claim in a thesis statement near the beginning of your draft. The assignment may not explicitly state that you need a thesis statement because your instructor may assume you will include one. When in doubt, ask your instructor if the assignment requires a thesis statement. When an assignment asks you to analyze, to interpret, to compare and contrast, to demonstrate cause and effect, or to take a stand on an issue, it is likely that you are being asked to develop a thesis and to support it persuasively. How do I get a thesis? A thesis is the result of a thinking process. Before you develop an argument on any topic, you have to collect and organize evidence, look for possible relationships between known facts (such as surprising contrasts or similarities), and think about the significance of these relationships. Once you do this thinking, you will probably have a “working thesis,” a basic or main idea, an argument that you think you can support with evidence but that may need adjustment along the way. How do I know if my thesis is strong? If there’s time, run it by your instructor or make an appointment at the Writing Center to get some feedback. Even if you do not have time to get advice elsewhere, you can do some thesis evaluation of your own. When reviewing your first draft and its working thesis, ask yourself the following:
<urn:uuid:5048189c-a26f-4253-8f6b-d00dcb31519e>
CC-MAIN-2018-43
https://www.cia.edu/blog/2013/05/bfa-review-tips
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510867.6/warc/CC-MAIN-20181016201314-20181016222814-00520.warc.gz
en
0.958187
527
3.046875
3
VOICE creates a learning atmosphere that encourage campers to think critically, confidently speak in English, be reflective, apply creativity, and have fun! We believe long term impact comes from learning by doing and connecting content to real-life situations and challenges. VOICE’s unique activity-based curriculum contains core and elective chapters. Our model allows partners to customize content based on the needs of their girls while ensuring all girls get basic information, life skills, and spoken English. This model allows us to adapt to local needs while still delivering a product that can scale nationally. VOICE has defined three areas of focus for camps: (1) critical knowledge, (2) life skills, and (3) spoken English. These competencies make up VOICE’s camp curriculum. Critical Knowledge and Life Skills VOICE’s curriculum model is comprised of core and additional chapters, which allows us to customize camps We have a core curriculum comprised of basic health, safety, rights, and future planning topics along with relevant life skills. Elective topics are adapted regionally, such as Disaster Response for our campers in Uttarakhand. - Health: Nutrition, hygiene, common illnesses, first aid, puberty, menstruation, reproduction, childbirth, HIV/AIDS - Safety: dealing with harassment, preventing and coping with sexual assault, support systems, rights - Future Planning: higher education, careers, fitting skills and interests to careers, financial literacy and budgeting, goal setting and planning - Exposure: field trips to local corporations, mentor visits from local professionals, community engagement English Language Teaching and Learning English communication is a marketable skill that’s widely valued, increasing education and employment opportunities for girls. VOICE enriches girls’ vocabulary and knowledge on grammar structures by integrating English Snapshots into activities, making learning fun and maximizing their participation in activities. English Snapshots also equip girls with necessary language phrases to articulate thoughts and ideas. Every chapter in the book is structured around three themes: Past Ideas (What We Know), New Ideas (What We Will Learn) and Application (What We Can Do). VOICE curriculum draws on what girls have already learned, introduces them to new ideas, and facilitates application of information to real-life situations. Short homework tasks ask the girls to share camp knowledge with their family and peers. Tools and Methods VOICE uses a variety of interactive techniques and low-cost materials to engage campers. Our activities cater to different learning styles, involve a lot of movement, and promote group work, which is lacking in schools. Camp provides opportunities to think critically and make independent decisions. - Individual, pair, group work - Puzzles, quizzes, games - Skits and role play - Interviewing and discussions - Dance and songs - Case studies and stories - Ice-breakers and energizers
<urn:uuid:38420d3c-6f9f-4229-8a36-fc5d25969661>
CC-MAIN-2017-17
http://voice4girls.org/what-we-do/curriculum/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122992.88/warc/CC-MAIN-20170423031202-00058-ip-10-145-167-34.ec2.internal.warc.gz
en
0.911226
585
2.84375
3
How exactly does binary code work? - José Américo N L F Freitas - 1,097,030 Views - 14,965 Questions Answered - TEDEd Animation Wouldn't it be better to use the widespread decimal system then? Actually, we use binary computers because binary devices are easier to implement than "decimal devices.” Currently, a computer's central processing units (CPU) are made of electrical components called "transistors.” Check out this lesson to see how transistors are made, how they operate, and how they have changed in the last century. Binary can also be implemented in multiple other ways. An optical fiber transmits data encoded in pulses of light, while hard disks store information using magnetic fields. You can check several examples of binary devices, even solutions that use more than one transistor to implement a single bit, here. The choice of which technology will be used depends specifically on each application and the most important parameters are cost, speed, size, and robustness. Now that we know how to build devices that can represent numbers, we can expand their scope by mapping those numbers to a set of interest. A set of interest can be literally anything, such as letters in the alphabet or colors in a palette. The effort to encode letters with industry standards began in the 1960s, when the American Standard Code for Information Interchange (ASCII) was developed. This encoding used 7 bits, which were mapped to the English letters and special characters. The values corresponding to each symbol are here. As computers became more popular worldwide, the need for tables containing more symbols emerged. Nowadays, the most used encoding is the UTF-8, which was created in 1993 and maps more than one million symbols to binary, including characters in all known alphabets and even emojis. You can navigate through the UTF-8 table here. In this encoding, each character can take one to four bytes to be represented, as shown in the first table here. Colors are also mapped to binary sequences. Besides the RGB system, other systems were conceived to represent colors. The HSL system also uses three components to represent colors: hue, which varies from 0 to 360, with the color “red” being mapped to 0, “green” to 120 and “blue” to 240; saturation, which is the intensity of the colored component; and lightness, the "white level" of the color. The CMYK uses four components, corresponding to the levels of cyan, magenta, yellow, and black in the pixel. This system is called "subtractive," which means that, as a component gets larger, the pixel emits less light. It is very convenient for printers, where the ink acts as a "filter" for the white canvas of the paper. In this paragraph, the name of each color system has a link to interactive panels that allow you to see the colors corresponding to each possible encoding. If you want to see how those systems compare with each other, check this website. It is possible to reduce the number of bits without losing information, optimizing data transmission or storage. Strategies that perform compression include the run-length encoding, the Lempel-Ziv algorithm, and the Huffman coding. The Lempel-Ziv algorithm replaces repeated patterns in the data with a token. Both the token and the pattern are added to the compressed file, so the decoder can accurately rebuild the original file. Although this post's discussion is not related to binary, it illustrates the Lempel-Ziv algorithm. The Huffman coding counts the number of occurrences of symbols in the file and creates a new binary encoding for each one of those symbols. Symbols that are more frequent receive a shorter binary sequence, reducing the size of the file. The ZIP files are created by using a combination of those algorithms. Binary is a way to represent information like any other language. Engineers use international standards to attribute meaning to states of binary devices; they are able to represent letters, colors and even sounds. Just as a painting of pipe is not the pipe itself, the meaning of each bit is not embedded in itself, but in the program that reads it. Create and share a new lesson based on this one. More from Math In Real Life lesson duration 05:20
<urn:uuid:fd6899a9-3e14-4ce0-a94d-cbb2ab44f934>
CC-MAIN-2023-06
https://ed.ted.com/lessons/how-exactly-does-binary-code-work-jose-americo-n-l-f-freitas
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00086.warc.gz
en
0.94461
907
4.15625
4
A stunning new photograph by the Hubble Space Telescope has captured the cosmic version of a needle in a haystack: an edge-on spiral galaxy much like our own Milky Way. The new Hubble photo shows one point of the so-called Needle galaxy, a narrow streak of stars located about 40 million light-years from Earth in the constellation Coma Bernices. The galaxy is officially known as NGC 4565 and its spiral shape makes it a tantalizing target for astronomers hoping to compare it to our Milky Way galaxy. According to a NASA image description, "NGC 4565 is relatively close by, and being seen edge-on makes it a particularly useful object for comparative study. As spiral galaxies go, NGC 4565 is a whopper — about a third as big again as the Milky Way." The new view of the Needle galaxy reveals several features that scientists find in the Milky Way. Both galaxies have dark ribbons of interstellar dust blocking some of the light pouring out of their galactic cores. In Hubble's Needle galaxy photo, the dust lanes are clearly visible in the lower right of the image due to the contrast of bright, yellow light emanating from the star-filled interior. The Needle galaxy was first discovered in 1785 by noted 16th-century astronomer Sir William Herschel. Because it is one of the closer examples of a spiral galaxies, Needle has become a popular target for scientists hoping to learn more about our Milky Way galaxy. Astronomers used the Hubble telescope's Advanced Camera for Surveys to create the new view of the Needle galaxy. NASA posted the image to its Hubble telescope website on July 13. A version of the image was entered into NASA's Hubble's Hidden Treasures Image Processing Competition by Hubble fan Josh Barrington. The Hidden Treasures contest challenges astronomy enthusiasts to sift through the Hubble telescope's extensive archive to find spectacular cosmic photos that have never been released to the public. The competition has actually closed, with the results to be released soon, officials with the European Space Agency said. The Hubble Space Telescope launched into orbit in 1990 and has been beaming stunning images of the cosmos to Earth ever since. The mission is overseen by NASA and the European Space Agency.
<urn:uuid:562c95e4-dcc3-4eee-8bd8-b193dc1ea6d4>
CC-MAIN-2017-34
https://www.space.com/16610-needle-galaxy-hubble-telescope-picture.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109157.57/warc/CC-MAIN-20170821152953-20170821172953-00124.warc.gz
en
0.9309
454
3.421875
3
Bay’s new ‘pollution diet’ carries a lot of weight in accountability - Comments are closed for this article. At the EPA, we've described the Chesapeake Bay "pollution diet" established on Dec. 29, 2010, as historic and monumental. And with good reason. By far the most comprehensive and rigorous road map to restoration ever developed, this pollution diet differs markedly from past Bay cleanup efforts. From its legal underpinnings to the tough accountability system, it ensures results and gives us our best chance to restore the Chesapeake Bay and the region's streams and rivers. The pollution diet-or Total Maximum Daily Load-calls for pollution reductions of 25 percent in nitrogen, 24 percent in phosphorus and 20 percent in sediment. It is designed to ensure that all pollution control measures to fully restore the Bay and its tidal rivers are in place by 2025, with at least 60 percent of the actions completed by 2017. Now the hard work begins in shedding those excess tons of nitrogen, phosphorus and sediment that continue to harm the Bay. Our confidence is drawn from the strong and verifiable watershed implementation plans advanced by the Chesapeake Bay Program partner jurisdictions of Maryland, Virginia, Pennsylvania, Delaware, West Virginia, New York and the District of Columbia, and the EPA's firm resolve to hold them accountable along the way. With a few exceptions, those plans met EPA's strict expectations, detailing how they would meet the pollution limits. It has been the EPA's goal from the outset that the pollution diet be driven primarily by these state plans, giving states and the District the flexibility to determine how to reduce pollution in the most cost-efficient, effective and reasonable manner. The jurisdictions are to be congratulated for their leadership in rising to this challenge. The plans reflect extensive public input and contain many new ideas and commitments. The EPA worked closely with the states and the District last fall to help them improve on the draft plans submitted in September. The accountability framework for meeting the pollution diet includes regular two-year milestones, close monitoring through a tracking and accounting system, and the set of actions the EPA is prepared to take if necessary. The federal government will also do its share in the cleanup. The EPA has committed to reducing air deposition of nitrogen to the tidal waters of the Chesapeake Bay from 17.9 million to 15.7 million pounds per year through federal air regulations during the coming years. And federal agencies will establish their own two-year milestones for progress. Clean water is our shared obligation to the watershed's 17 million residents and countless communities. In addition to the significant environmental and economic benefits of a healthy Bay, the actions taken under the TMDL will help clean rivers and other waterways throughout the watershed, supporting local economies and recreational activities. We look forward to continuing our work with our Bay Program partners and all stakeholders as we move toward realizing our shared commitment to clean water and a healthy Bay. - Category: Pollution By submitting a comment, you are consenting to these Rules of Conduct. Thank you for your civil participation. Please note: reader comments do not represent the position of Chesapeake Media Service. Comments are now closed for this article. Comments are accepted for 60 days after publication.
<urn:uuid:b6fba5ce-253e-416b-b6e8-c361faacb835>
CC-MAIN-2017-30
http://www.bayjournal.com/article/bays_new_pollution_diet_carries_a_lot_of_weight_in_accountability
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426234.82/warc/CC-MAIN-20170726162158-20170726182158-00597.warc.gz
en
0.939019
658
3.078125
3
No Featured Found! Selenium WebDriver Browser (Navigation) Commands:- Navigation commands are used to navigate from one web page to another web page that we deal with. Below are some basic Navigation commands which are commonly used while writing the test scripts in Selenium. 1) Navigate To Command - "naviga... Selenium WebDriver Browser (Get) Commands:- Selenium Webdriver is a automation testing tool which is used for testing the web applications. Opening and closing a browser is the very first test step in Selenium which a tester would like to do. The 'Commands' refers to what Selenium has to d...
<urn:uuid:2ba5f24c-2a8b-4436-8c78-0ca370776b8d>
CC-MAIN-2023-23
https://findnerd.com/NerdDigest/Automation/1/?tag=Browser%20Commands%20in%20Selenium
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648635.78/warc/CC-MAIN-20230602104352-20230602134352-00096.warc.gz
en
0.911884
140
2.71875
3
For teens who established good oral hygiene routines as children, it comes naturally to keep their teeth and gums healthy as the grow into young adulthood. That said, here are some helpful tips from our Burnaby dentists on how to keep your teens' smiles healthy. The basics of good oral health for teens are much the same as those for adults: Brush twice a day with fluoride toothpaste and a soft toothbrush to remove plaque. Remember that plaque is the main cause of cavities and gum disease. Floss at least once a day to remove plaque from between your teeth and under the gum line. If plaque isn't removed daily, it can harden into tartar. Limit foods that are high in sugar or starches, especially sticky foods, since these tend to linger on the surface of the teeth for longer. Visit your dentist at least every six months for professional checkups and cleanings. In addition to these basics, here are a few dental health issues that often affect teens specifically: The early teen years are when many people undergo orthodontic treatment. Talk to your dentist about the alignment of your teen’s teeth, and whether orthodontic treatment is something that should be considered. As they become more independent, teens begin making more of their own food choices, and they may not always make the best choices for their oral or overall health. Make sure your teen understands how their dietary choices affect their health. It's important to give your teen the tools they need to make better choices. Unfortunately, many people start smoking in their teens. In addition to the range of general health risks that smoking comes with, it also increases the risk of cavities, gum disease and even oral cancer. Smoking also causes tooth discolouration and bad breath. Talk to you teen about all the reasons that smoking is a terrible idea, and of avoiding even trying it once. Oral piercings are popular among teens, but they can cause some oral health problems, including chipped teeth and infections. For further information on why we advise against oral piercings speak to your dentist.
<urn:uuid:a49f7923-c878-408b-9c9c-454216253982>
CC-MAIN-2019-43
https://www.smiletownnorthdelta.com/site/blog/2019/01/22/how-to-keep-your-teens-smile-healthy
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986692126.27/warc/CC-MAIN-20191019063516-20191019091016-00268.warc.gz
en
0.963938
437
3.328125
3
New research being funded by Diabetes UK is investigating whether regular doses of medication derived from fish oil could be used to improve nerve damage and prevent diabetes complications such as amputation, blindness or heart disease. Researchers at the University of Southampton will study 100 people at risk of developing Type 2 diabetes to determine whether a medication called OMACOR can improve the function of nerves and small blood vessels in the feet. OMACOR is a medication derived from fish oil found in Norwegian sardines. Improving the lives of people with diabetes Researcher Keith McCormick said: “OMACOR has already proved to be extremely successful in the treatment of high triglycerides (a type of fat) in the blood, but if this trial is successful it will provide evidence that treatment with these purified long chain fatty acids can also serve to improve small nerve and blood vessel function that is very relevant to people at risk of Type 2 diabetes. It is hoped this knowledge could then help to improve the lives of people with diabetes who are at risk of nerve and blood vessel damage.” Preventing complications in those at risk “We know that neuropathy and blood vessel damage are behind many of the complications of diabetes,” said Dr Iain Frame, Director of Research at Diabetes UK. “Type 2 diabetes can go undetected for up to ten years, meaning 50 per cent of people already have complications, such as neuropathy, kidney disease, cardiovascular disease and stroke, by the time they’re diagnosed. The research being funded at the University of Southampton therefore has the potential to identify a readily available treatment to prevent some of the serious complications of diabetes and protect those at risk.”
<urn:uuid:5095d012-bbb3-4230-adbc-94299c1124bc>
CC-MAIN-2018-13
https://www.diabetes.org.uk/about_us/news_landing_page/new-research-looks-to-prevent-diabetes-complications
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648207.96/warc/CC-MAIN-20180323102828-20180323122828-00660.warc.gz
en
0.951662
344
2.828125
3
||The neutrality of this article is disputed. (March 2013)| There is a school of thought that presumes all children can learn if they are provided with the appropriate learning conditions. Learning for mastery or mastery learning, are terms coined by Benjamin Bloom in 1968 and 1971 respectively. Bloom hypothesized that a classroom with a mastery learning focus as opposed to the traditional form of instruction would reduce the achievement gaps between varying groups of students (Guskey 2007). In Mastery learning, "the students are helped to master each learning unit before proceeding to a more advanced learning task" (Bloom 1985) in contrast to "conventional instruction". Mastery learning has little to do with specific content, but rather is a description of the process of mastering particular learning objectives. This approach is based on Benjamin Bloom's Mastery for Learning model, with refinements made by Block. Mastery learning may be implemented as teacher-paced group instruction, one-to-one tutoring, or self-paced learning with programmed materials. It may involve direct teacher instruction, cooperation with classmates, or independent learning. It requires well-defined learning objectives organized into smaller, sequentially organized units. Individualized instruction has some elements in common with mastery learning, although it dispenses with group activities in favor of allowing more able or more motivated students to progress ahead of others and maximizing teacher interaction with those students who need the most assistance. In one meta-analysis (Kulik, Kulik & Bangert-Drowns, 1990), the mean effect size (Cohen's d) of 103 studies was 0.52, which is considered a moderately large effect size. The concept of mastery learning can be attributed to the behaviorism principles of operant conditioning. According to operant conditioning theory, learning occurs when an association is formed between a stimulus and response (Skinner, 1984). In line with the behavior theory, mastery learning focuses on overt behaviors that can be observed and measured (Baum, 2005). The material that will be taught to mastery is broken down into small discrete lessons that follow a logical progression. In order to demonstrate mastery over each lesson, students must be able to overtly show evidence of understanding of the material before moving to the next lesson (Anderson, 2000). In 2008, Jon Bergmann and Aaron Sams began to embrace what they call the Flipped-Mastery model. This is mastery learning that used technology to time-shift the individual instruction. They created videos for each learning objective and posted these online so that as students moved through the content, they were able to move at their own pace. Technology freed up the teachers to individualize the learning for each student. (Bergmann, Sams 2012) Assessment in mastery learning In a mastery learning environment, the teacher directs a variety of group-based instructional techniques, with frequent and specific feedback by using diagnostic, formative tests, as well as regularly correcting mistakes students make along their learning path. Assessment in the mastery learning classroom is not used as a measure of accountability but rather as a source of evidence to guide future instruction. A teacher using the mastery approach will use the evidence generated from his or her assessment to modify activities to best serve each student. Teachers evaluate students with criterion-referenced tests rather than norm-referenced tests. In this sense, students are not competing against each other, but rather competing against themselves in order to achieve a personal best. Mastery learning curricula generally consists of discrete topics which all students begin together. After beginning a unit, students will be given a meaningful and formative assessment so that the teacher can conclude whether or not an objective has been mastered. At this step, instruction goes in one of two directions. If a student has mastered an objective, he or she will begin on a path of enrichment activities that correspond to and build upon the original objective. Students who do not satisfactorily complete a topic are given additional instruction until they succeed. If a student does not demonstrate that he or she has mastered the objective, then a series of correctives will be employed. These correctives can include varying activities, individualized instruction, and additional time to complete assignments (Guskey 2007). These students will receive constructive feedback on their work and will be encouraged to revise and revisit their assignment until the objective is mastered. In general, mastery learning programs have been shown to lead to higher achievement in all students as compared to more traditional forms of teaching (Anderson, 2000; Guskey & Gates, 1986). Despite the empirical evidence, many mastery programs in schools have been replaced by more traditional forms of instruction due to the level of commitment required by the teacher and the difficulty in managing the classroom when each student is following an individual course of learning (Anderson, 2000; Grittner, 1975). Despite the conclusive evidence that an appropriately instituted mastery approach to instruction yields improvement in student achievement, there is a strong movement against it. Critics of mastery learning often point to time constraints as a flaw in the approach. Those that favor breadth of knowledge over depth of knowledge may feel that it is more important to “cover” a lot of material with little detail rather than focus more energy on ensuring that all students achieve learning goals. Many teachers are hesitant to institute a mastery learning approach in their classroom because of fears that they may get behind in their lessons. Some critics argue that allowing some students extra time to complete their work is unfair. They argue that differentiated instruction is inherently unfair because the students who receive extra feedback and time are somehow given an advantage over the students who master the objectives the first time. Most of this criticism stems from a misunderstanding of Bloom’s approach.[dubious ] In Bloom’s ideal classroom, the institution of a mastery learning approach is postulated to eventually lead to a drastic decline in the variation of student achievement, as Students who require more correctives initially would “gain direct evidence of the personal benefits the process offers” (Guskey 2007) and thus they eventually come to employ these varying strategies and techniques on their own, while those students who receive less will make slower progress. As the gap in student achievement shrinks, more time will be devoted to "enrichment activities" for all students than corrective activities (Guskey 2007). - Anderson, J. R. (2000). Learning and memory: An integrated approach (2nd ed.). New York: John Wiley and Sons, Inc. - Baum, W. M. (2005). Understanding Behaviorism: Behavior, Culture and Evolution. Malden, MA: Blackwell Publishing. - Bergmann, Sams (2012). Flip Your Classroom: Reach Every Student in Every Class Every Day, ISTE ISBN 1564843157 - Block, Schools, Society and Mastery Learning. ISBN 978-0-03-088407-8 - Grittner, F. M. (1975). Individualized instruction: An historical perspective. The Modern Language Journal, 323 333. - Guskey, T. R., & Gates, S. (1986). Synthesis of research on the effects of mastery learning in elementary and secondary classrooms. Educational Leadership, 43, 73-80. - Guskey, T.R. (2007). Closing Achievement Gaps:Revisiting Benjamin S. Bloom’s “Learning for Mastery. Journal of Advanced Academics. 19, 8-31. - Kulik, C., Kulik, J., & Bangert-Drowns, R. (1990). Effectiveness of mastery learning programs: A meta-analysis. Review of Educational Research, 60(2), 265-306. - Skinner, B. F. (1984). The evolution of behavior. Journal of Experimental Analysis of Behavior, 41, 217-221.
<urn:uuid:b293da16-2831-43db-a8a7-b179259bdfe3>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/Mastery_learning
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462206.12/warc/CC-MAIN-20150226074102-00209-ip-10-28-5-156.ec2.internal.warc.gz
en
0.942268
1,577
3.875
4
INCOME AND EXPENDITURE OF 150 NEGRO FAMILIES IN ATLANTA, GA., U.S.A. In 1900 creative artists from nations around the world assembled at the Exposition Universelle in Paris to showcase their achievements. One of the exhibits was dedicated to the progress made by African Americans since Emancipation. This Exposition des Nègres d’Amérique featured an eclectic set of objects, images, and texts and among them approximately sixty data visualizations, that were contributed by W.E.B. Du Bois. It was “an attempt to give, in a systematic and compact a form as possible, the history and present condition of a large group of human beings”, as Du Bois has put it himself. The first set of infographics, that Du Bois and his team created, used Georgia’s diverse and growing black population as a case study to demonstrate the progress made by African Americans since the Civil War. A second set was more national and global in scope. It included renderings of national employment and educational statistics, the distribution of black populations across the United States, a comparison of literacy rates in the United States relative to other countries, and other striking visualizations. Further reading: W. Battle-Baptiste & B. Rusert (Eds.), W.E.B. Du Bois’s Data Portaits. Visualizing Black America
<urn:uuid:3480b93d-991a-4353-a965-69a44280c92d>
CC-MAIN-2022-27
https://vizzlo.com/gallery/100percent-stacked-bar-chart/example/income-and-expenditure-of-150-negro-families-in-atlanta-ga-u-s-a
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103646990.40/warc/CC-MAIN-20220630001553-20220630031553-00638.warc.gz
en
0.940117
302
3.90625
4
What is debt ratio? How do you calculate debt ratio? Sometimes referred to as debt to income ratio, or income to debt ratio, the Debt Ratio is a number used to compare the amount of monthly debt you carry to the amount of monthly income you have. This ratio is a key component to qualify for many mortgages. To calculate the debt ratio, you compare your house payment to your total monthly gross income and your total monthly payments to your total monthly gross income. Example: Alpha Bank looks for a debt ratio of 29/35 to qualify for a new mortgage. This means that your house payment can not exceed 29% of your total monthly gross income and your total monthly payments (house payment, car loans, credit cards, loans, etc) added to your house payment can not exceed 35% of your total gross monthly income. If your total monthly gross income is $3,000 before taxes, your house payment (PITI) can not exceed 29% of $3000, or $870. In addition to this, your total monthly minimum payments on house payment and other debts (credit card, loans, etc) can not exceed 35% of $3000, or $1050. Win $100 towards teaching supplies! We want to see your websites and blogs. We use your calculator ideas to create new and useful online calculators. Submit Calculator Idea
<urn:uuid:a1115214-6542-42cf-ab13-d6aaebb8aa20>
CC-MAIN-2018-13
https://www.calcunation.com/calculator/debt-ratio.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649627.3/warc/CC-MAIN-20180324015136-20180324035136-00460.warc.gz
en
0.920233
294
3.046875
3
cientists have taken a new, wide-ranging look at leptospirosis, a zoonotic disease that can cause symptoms ranging from mild headaches to severe bleeding. They sequenced the genomes of different species of leptospira, hoping to figure out what causes some of them to be infectious to humans while others aren’t. Here’s what lead researcher Dr. Joseph Vinetz of the University of California, San Diego, said about the findings, published in PLOS Neglected Tropical Diseases. What’s the need for figuring out how the leptospira becomes a pathogen? We can’t diagnose it in the places most affected by the disease, because there aren’t really any simple tests that are inexpensive enough. The gold standard tests take weeks or even a couple months to get results. But it’s really treatable — you can treat it with penicillin — so you’d like to be able to make the diagnosis now or within a day or two. But that requires molecular diagnostics which aren’t widely available. How does it help to sequence all the types of leptospira? Within the genus, there are 20 species and they’re divided between infectious and non-infectious. We’ve done comparative genome analysis to look for what genes and gene families are present in the infectious leptospira that aren’t present in the non-infectious leptospira. That shows how bacteria have evolved to adapt to hosts like humans. It also shows how difficult vaccine development can be, because of that diversity. If you’re in Brazil, different parts of Brazil have different types of leptospira, and we can take these differences into account now in terms of vaccine development research.
<urn:uuid:1cf213a8-0d75-40f1-ab98-f6a7426df86f>
CC-MAIN-2018-09
https://www.statnews.com/2016/02/19/bacterium-pathogen-leptospirosis/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811795.10/warc/CC-MAIN-20180218081112-20180218101112-00463.warc.gz
en
0.916945
375
3.796875
4
Here is a second installment of famous women explorers you may never heard of. I’m please to say that I am on the final days of editing Rebel Green so I have put it up for pre-order: You can get it here I will be putting it up for beta reads in the near future and I would very much appreciate your opinions and sharp eyes to spot any typos. Watch this space for more info. Mary Kingsley, the daughter of George Kingsley and Mary Bailey, and the niece of Charles Kingsley, was born in Islington in 1862. Her father qualified as a doctor and worked for the Earl of Pembroke. Both men had a love of travelling and together they produced a book of their foreign journeys, South Sea Bubbles. Her mother was an invalid, and she expected Mary to stay at home and look after her. Mary had little formal schooling but she did have access to her father’s large library of travel books. When her father was at home Mary loved to hear his stories about life in other countries and willingly agreed to help him with his proposed book he was writing on the customs and laws of people in Africa. Although Kingsley did not consider taking his daughter with him on his travels, he gave her the task of making notes on relevant material from his large collection of books on the subject. In 1891 Kingsley returned to England after one journey suffering from rheumatic fever. With both her parents bedridden, Mary took complete control over the running of the household. Mary even subscribed to the journal, English Mechanic, so that she could carry out repairs on their dilapidated house. George Kingsley died in February 1892. Five weeks later her mother also passed away. Freed from her family responsibilities, and with a income of £500 a year, Mary was now able to travel. Mary decided to visit Africa to collect the material needed that would enable her to finish off the book that her father had started on the culture of the people of Africa. Mary also offered to collect tropical fish for the British Museum while she was touring the continent. During 1893 and 1894 she visited Cabinda, the coastal enclave of Angola lying today between Congo (Kinshasa) and Congo (Brazzaville); Old Calabar in southeast Nigeria; and the island of Fernando Po, now part of Equatorial Guinea, near the Cameroon coast. Around the lower Congo River she collected specimens of beetles and freshwater fishes for the British Museum. Her adventures included a crocodile attacking her canoe and being caught in a tornado. Kingsley returned in 1895 in order to study cannibal tribes. She travelled by canoe up the Ogowe River where she collected specimens of formerly unknown fish. Several times her canoe capsized in the river’s dangerous rapids. Mary also journeyed through dense forests infested with poisonous snakes and scorpions and wading through swamps trying to avoid the attentions of crocodiles. After meeting the cannibal Fang tribes, she climbed the 13,760 feet Mount Cameroon by a route unconquered by any other European. News of Mary Kingsley’s adventures reached England and when she landed at Liverpool, she was greeted by journalists who wanted to interview her about her experiences. Kingsley was now famous and over the next three years she toured the country giving lectures on life in Africa. In her talks she challenged the views of the “stay at home statesmen, who think the Africans are awful savages or silly children – people who can only be dealt with on a reformatory penitentiary line.” |Figure 1 Figure 1 Mary Kingsley sitting between Sir Claude and Lady Rose MacDonald in Calabar, 1895 (Royal Commonwealth Society Library, London).| Mary Kingsley upset the Church of England when she criticised missionaries for trying to change the people of Africa. She defended polygamy and other aspects of African life that had shocked people living in Britain. Mary argued that a “black man is no more an undeveloped white man than a rabbit is an undeveloped hare.” The Temperance Society was also angered by Kingsley’s defence of the alcohol trade in Africa. The African, she argued, is “by no means the drunken idiot his so-called friends, the Protestant missionaries, are anxious, as an excuse for their failure in dealing with him, to make out.” Kingsley held conservative views on women’s emancipation. When the Daily Telegraph described her as a “New Women” she wrote a letter of complaint argued that “I did not do anything without the assistance of the superior sex.” In a speech she made on women’s suffrage in 1897 she argued against women being given the vote in parliamentary elections. Kingsley claimed that the country already suffered from having a poorly informed House of Commons and believed that the “addition of a mass of even less well-informed women would only make matters worse.” According to Kingsley, “women are unfit for parliament and parliament is unfit for them”. However, women she believed were well informed on domestic issues and fully supported women taking part in local elections. Kingsley first book about her experiences, Travels in West Africa (1897) was an immediate best-seller. In her second book, West African Studies (1899) she described the laws and customs of the people in Africa and explained how best they could be governed. Joseph Chamberlain, the government’s Colonial Secretary, wrote to Kingsley seeking her advice. However, Kingsley was such a controversial figure he asked her to keep their meetings secret. Kingsley’s descriptions of the behaviour of missionaries and traders in Africa inspired the young journalist, E. D. Morel, to carry out his own research into the problem. This resulted in a series of articles entitled The Congo Scandal (1900) that eventually had an impact on government policy. On the outbreak of the Boer War, Kingsley volunteered to work as a nurse. When the editor of the Morning Post heard she was going, he asked her to report on the war. However, her work as a nurse in Simonstown kept her fully occupied. In a letter to a friend in England, Kingsley explained how typhoid fever was daily killing four of five of her patients. She also described fellow nurses dying of the disease and added that she thought it was unlikely that she would survive. Her prediction was unfortunately accurate and she died on 3rd June, 1900. As requested just before her death, Mary Kingsley was buried at sea. Mary Kingsley once wrote that there were only two things of which she was particularly proud in her extraordinary, though short, life as an explorer: that her scientific mentor approved of the fish she collected on her travels, and that she learned how to paddle a canoe “pace, style, steering and all” as if she were an African. As was her style, she was being far too modest. By the time she died at age 38, after having traveled alone through West Africa on and off for seven short years, she had become the century’s foremost authority on the area. This was no small feat, given the extreme rarity of women traveling in this part of the world. In fact, many of the African tribes she studied and befriended had never seen a white person, let alone glimpsed an unmarried woman by herself. A passage in her book West Africa Studies portrays this fact best. In the book she writes of walking through the forest and encountering a group of men highly bedecked in shells, beads and other ornaments. Assuming they were a secret society (death is often the punishment for an intruder to such gatherings) she turned and fled, but was caught by one of the men. They were not, in fact, a secret society, but a party of monkey hunters on a hunt. To catch monkeys they covered themselves in decoration and sat in a clearing, waiting for the curious monkeys to come down out of the trees. Not bound by secrecy, they did not kill Mary. Instead, they had her sit with them in the clearing. Since they thought she was the “queerest object they had personally ever seen,” they assumed the monkeys would react that way, too, and come down to see this strange sight. This “queer” woman who had no formal education did more, in some ways, for the people of West Africa than anyone had before her. Her two handbooks, Travels in West Africa, and West African Studies, as well as her speeches and lobbying back in England promoted a new understanding and tolerance of these little understood tribes. Just before her first trip to Africa, Mary had written in a letter to a friend that she was going to Africa to die. Seven years later, her life had changed so dramatically for the better that it is clear she no longer wanted to. But her life ended as she had lived it, tending others. I hope you enjoy these posts. Let me know if you have any questions about them or any of my books.
<urn:uuid:221cedca-1e2c-473e-a8bc-ca87b9e8f4df>
CC-MAIN-2023-23
https://pjskinner.com/2020/11/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00356.warc.gz
en
0.984796
1,884
2.71875
3
He takes time to resurrect the Jesuits, especially the missionaries to the Huron, pointing out that, wrong-headed as they might have been in some ways, they far exceeded any other missionary group (especially Protestant Americans) in their ability to empathize with the natives. Their letters are our best source for what 17th-century native Canadians were like and had a profound influence on European thought from Voltaire (who wrote a novella set among the Huron) to Rousseau and his Noble Savage.Sounds a like a book I'd find worth reading. It was my interest in my French-Canadian roots that led me back to my love of History and set me on the path towards getting an MA. (I still hold out hope for going for the PhD, but that'll have to wait for the kids to grow up...or the lottery!) He reminisces about his boyhood rambles in the Massachusetts woods, notes with irony the fact that 40 per cent of the Catholic priests in the St. Ignace area are now Indians (from India), explains the shortcomings of the 17th-century French economic system, mounts a terse refutation of Marx (a modern and an enemy of religion) and then takes a quick stab at Michel Foucault and postmodern historians. But his tone is always amiably ironic; he wears his erudition lightly. Marchand eschews political correctness, taking a swipe at native Americans for the unecological practice of running bison herds over cliffs. But then he digresses on how the Iroquois influenced Friedrich Engels's theories of the family. He is quite clear that native Americans took it in the neck through disease, war, displacement and economic disruption. But again, his point of view allows a wry observation. The fur trade brought the Iroquois sudden wealth but eroded their industrial base. Marchand says, "Perhaps the situation of the United States, in this regard, was not so different from the Great Lakes Indians four hundred years ago." Wednesday, October 12, 2005 Douglas Glover offers a positive review of Philip Marchand's Ghost Empire: How the French Almost Conquered North America. In a bit of French-Canadian and Catholic bias, I offer you this snippett:
<urn:uuid:cc7777a2-1cb5-48e1-b376-b00eb4c67863>
CC-MAIN-2018-05
http://cliopolitical.blogspot.com/2005/10/franco-american-empire-that-almost-was.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888341.28/warc/CC-MAIN-20180120004001-20180120024001-00498.warc.gz
en
0.965174
460
2.609375
3
Understanding the effect of food on human health is a current research priority in Europe but it is also a strong consumer demand. People want to be aware of the effects on their body of the food they eat. After ingestion, food will be broken down in the gut releasing components (peptides, amino acids, minerals, fatty acids…) that, beside their nutritional properties, may have a biological action. INFOGEST aims at improving the current scientific knowledge on how foods are disintegrated during digestion. This improved knowledge will help the scientific community and the industry to design new foods with improved nutritional and functional properties. INFOGEST will provide a timely opportunity to fulfil the need for developing a trans-European network to improve dissemination of critical research findings, develop truly multidisciplinary collaborations and harmonise approaches between groups and discipline areas spanning the main stages of food digestion. Up to now (July 2013) INFOGEST gathers more than 260 research scientists from 90 institutions in 32 countries (EU, Argentina, Australia, Canada, New Zealand…). It is open to new participants.
<urn:uuid:e30985ac-0601-495c-aaa9-a9a998cebd42>
CC-MAIN-2018-09
https://www.cost-infogest.eu/ABOUT-Infogest
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813626.7/warc/CC-MAIN-20180221143216-20180221163216-00644.warc.gz
en
0.907177
216
2.8125
3
The Open Meadows Foundation offers grants of up to $2,000 for projects that promote gender, racial, and economic justice, and are led by and benefit women and girls, particularly those from vulnerable communities. The projects should reflect the diversity of the community in both its leadership and its organization, and promote racial, social, economic, and environmental justice. In addition, the organizations should have limited financial access or have encountered obstacles in their search for funding. Preference is given to first-time applicants. Interested applicants will find this grant opportunity on GetEdFunding, a free database sponsored by CDW•G of thousands of funding opportunities for educators. Deadlines: Two cycles for proposals—Fall 2018 Cycle, July 1–August 15, 2018, for proposals; Spring 2019 Cycle, January 1–February 15, 2019, for proposals DonorsChoose has launched #ISeeMe, a campaign aimed at boosting the amount of culturally responsive materials in US classrooms. These include books written by authors of color or other resources featuring figures from diverse backgrounds. The American Library is a celebration of the diversity of the American population. Printed in gold on the spines of many of the books in the installation are the names of people who immigrated, or whose antecedents immigrated to the United States. On other books are the names of African Americans who relocated or whose parents relocated out of the American South during The Great Migration. In 1968 three astronauts embarked on the Apollo 8 mission and witnessed Earth as it had never been seen before. The firstcolor photograph taken beyond Earth’s orbit was later titled Earthrise. An award-winning film from Global Oneness Project documents the story of this photograph. How does the Earthrise photograph provide a context for what it means to be a global citizen?
<urn:uuid:b3622a66-4915-4ed2-9486-213085b77c07>
CC-MAIN-2019-26
https://www.bigdealbook.com/newsletters/k-12_technology/?show=grants_for_projects_that_promote_equality/b27347787-bf6f-4c0f-afcd-a6ad78593f08
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999779.19/warc/CC-MAIN-20190624231501-20190625013501-00410.warc.gz
en
0.958168
363
2.765625
3
In developed countries aging populations and an increase in life expectancy is driving up the cost of healthcare for governments and consumers alike. While these budgetary pressures create challenges, they are also generating new opportunities to improve healthcare and when combined with technology, HealthTech or eHealth, which includes electronic medical record software, telemedicine and remote monitoring, clinical decision support, radiology artificial intelligence, among others, could be transformational. Managing the burgeoning cost of healthcare Healthcare spending in OECD countries is currently 8.8 per cent of GDP, up from 5 per cent in 1970 and projected to reach 10 per cent by 2030 with further increases beyond. And, when it comes to rising healthcare costs, few countries can compete with the United States. According to a report by the American Healthcare Initiative, in the 1970s major health programs made up just five per cent of the budget. This had increased to 20 per cent by 2000 and 28 per cent by 2017. If spending continues to rise at the same pace, one-third of US federal money not spent on interest repayments will go towards healthcare by 2028. By 2040, it will be 40 per cent. This means that unless action is taken, the cost of providing healthcare will eat into the government's capacity to pay for other essentials such as education and welfare. Optimizing spend and performance Perhaps most striking is that as much as 31 per cent of healthcare spending goes to administration. This makes it an obvious starting place for technology to reform existing practices. “At the moment, you'll find that many clinicians have to input different information into different systems and if these systems do not “speak” to each other, if access by other stakeholders is difficult, if one is incomplete or there is an error, it can lead to real inefficiencies," says Dr Julian Feneley, Head of Healthcare in Europe, Macquarie Capital. But for all the cost savings HealthTech could bring to the administrative side of medicine, Feneley is more excited in the role it could have in bringing greater efficiency to the diagnostic side. Here, he sees technology such as automation being used to bring down the cost of healthcare because it can help perform the more mundane tasks currently still carried out by doctors. “Already, for example, machines are looking at chest X-rays and mammograms and making a diagnosis, so that the radiologist is free to concentrate their energy on other challenging clinical decisions." The way we allocate resources is also vital to reining in costs, Feneley argues. After all, two of the most expensive items in any healthcare system are usually the medical professionals and the equipment - such as the latest MRI and radiotherapy technology. "There are real opportunities in making sure both are continually used in an optimal way so that governments and private participants in the healthcare sector receive better value for every dollar they spend," he says. How big data could mean big savings Bo Crowell, Head of US Healthcare Services, Macquarie Capital, explains that adopting technologies could lead to superior preventative health and improved early intervention, as well as helping eliminate misdiagnosis. While these will importantly lead to improved patient outcomes, they will also help to ease budgetary pressures and significant long-term costs of healthcare. “A lot of medicine currently relies on a physician identifying a likely illness based on symptoms, but even the most adept and experienced doctor won't have seen every rare disease and condition." Using big data, we could potentially compare someone to millions of people instantly and know when they're developing a disease at a very early stage, even before they experience symptoms. Crowell says that so long as privacy concerns can be navigated, the possibilities for HealthTech in transforming detection are enormous - particularly when it comes to some of the more common diseases such as diabetes or hypertension. “This won't just mean we are likely to see substantially better health outcomes, it also means we reduce the high costs associated with misdiagnosis and late-stage intervention." Playing the long game While Crowell sees very real opportunities in HealthTech, he cautions investors against looking for quick wins, noting it is a very different sector to FinTech or others that technology has already transformed. “The nature of healthcare means things take time to happen, and you often need to be prepared to look at a time frame of 10 to 20 years for major changes to work their way through the profession," he explains. “But for those who take the right mindset into it, they won't just be helping solve an economic problem, they'll be having a real societal impact that can dramatically save more lives." Visit the Healthcare Conference website for more information.
<urn:uuid:bfbbd4b3-9ea8-402e-9b7a-10b27ea412dd>
CC-MAIN-2020-05
https://www.macquarie.com/cn/corporate/advisory-and-capital-markets/events/international-healthcare-conference-2019/acm-health-conf-2019-article
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00312.warc.gz
en
0.959015
966
2.859375
3
My botanist friend Ann recently wrote to me: In my agricultural work in Africa, I met African Christians that believe they are cursed still because of the story of Noah and Ham. They are very sad. I was surprised to encounter that idea. God seems so active in Africa-- he has so many believers there! Surely the work of Christ liberates Africa too from that curse, --whether one believes it is literal or symbolic? Does your work give any insights about that? Alice C. Linsley The so-called "curse of Ham" has been used to justify racism by people who are ignorant of what Genesis tells us about fathers who curse their children out of anger, something that greatly displeases our Heavenly Father. Noah, a man of the soil, proceeded to plant a vineyard. When he drank some of its wine, he became drunk and lay uncovered inside his tent. Ham, the father of Canaan, saw his father's nakedness and told his two brothers outside. But Shem and Japheth took a garment and laid it across their shoulders; then they walked in backward and covered their father's nakedness. Their faces were turned the other way so that they would not see their father's nakedness. When Noah awoke from his wine and found out what his youngest son had done to him, he said, "Cursed be Canaan! The lowest of slaves will he be to his brothers." He also said, "Blessed be the LORD, the God of Shem! May Canaan be the slave of Shem. May God extend the territory of Japheth; may Japheth live in the tents of Shem, and may Canaan be his slave. (Gen. 9:20-27) To understand this in the proper biblical context we must investigate the pattern. In the following account, we find two themes: the anger of the father and the ranking of sons. We notice also that it is not Ham that is cursed, by Canaan. This supplies a clue as to when this story entered the biblical narrative. It comes from the later Deuteronomist Historian who is anxious to assert Shem's right over his brothers. However, since the rulers of the lines of Ham and Shem intermarried, the curse of Ham would have to fall on Shem's descendants as well. In this sense, Noah’s curse falls upon both his Hamitic and Semitic descendants, which is what happens when a father acts out of self-loathing. Noah’s cursing and blessing of his three sons parallels Jacob’s cursing and blessing of his twelve sons at the end of Genesis. The two accounts highlight the reality that fathers are often displeased by the actions of their sons. In both narratives there may also be an element of self-loathing. There are other interesting similarities as well. Noah was angry because his son Ham had looked upon his nakedness. Jacob was angry because his son Reuben has slept with his concubine. In both cases we find the idea of exposing the father's nakedness. Noah’s curse falls on Canaan, Ham’s son, which is a deflection of guilt. Jacob’s blessing of Joseph’s sons falls on the youngest, a deflection of blessing. The excuse given for Jacob’s behavior is that he was blind. The excuse given for Noah’s behavior is that he was drunk. (The theme of drunken fathers bringing disgrace upon their children is taken up here.) Another parallel exists between the curse of Canaan and the curse of Cain (Gen. 4:11). Cain’s curse involves his being expelled from his homeland. The curse of Canaan is clearly intended to justify Israel’s conquest of the land of Canaan by the driving out of the inhabitants know as the Canaanites. Although it is clear that some Habiru/Hebrew married Canaanites. Rahab’s marriage to Salmon, of the tribe of Judah, is one example. More importantly, the Genesis genealogical information makes it clear that the descendants of Ham intermarried with the descendants of Shem. The fact that the lines of Ham and Shem intermarried underscores the stupidity of claiming the curse involves only black people of black. Further, we know today from molecular genetics that these peoples were diverse in their appearance, some having a red skin tone and waving dark hair, and some having a black skin tone with wooly hair. |Red and black Nubians| Detail from a Champollion drawing |These red Nubians resemble the Nabatean warriors of Edom| Image: Dr. Arthur Brack There is no justification of racism in the book of Genesis. Race itself is a non-starter, anthropologically and genetically speaking. What people looked like has no bearing on their intelligence, their technological development, or their way of life. If a white person lives a simple country life, this is viewed by whites as "simplicity" but if black person chooses the same way of life, whites are likely to regard that person as lacking ambition. Related reading: Seligman's Legacy; Who Were the Kushites?; Abraham's Kushite Ancestors; The Seven Bowls of Revelation 16; Edo, Edom, Idumea
<urn:uuid:b4709b7f-dc7e-4c2c-9a60-927d8d0f75a8>
CC-MAIN-2019-04
http://jandyongenesis.blogspot.com/2009/10/curse-of-ham.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00256.warc.gz
en
0.974967
1,095
2.6875
3
Completed 0 of 10 questions. What is a quarter note? On a flute, you can't play the note: G How many notes are in the musical alphabet? How many strings are on a ukelele?? The trebble clef is on the top of the music sheet. Does a clarinet have the same notes as a flute? What is a soprano? What is an oboe? A flute has the same amount of notes as any other instrument. Do you play chords or notes on guitar when using ALL of the strings?
<urn:uuid:1d53a046-21e6-450f-8bfb-35311af61e59>
CC-MAIN-2021-10
https://apps.quibblo.com/quiz/1mZYZKr/Are-you-a-true-musician
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362513.50/warc/CC-MAIN-20210301121225-20210301151225-00634.warc.gz
en
0.95156
125
2.703125
3
Unfortunately, even though we have made certain strides, racism still exists today. Since the passage of the Civil Rights Acts of 1866 and 1964, race discrimination has been unlawful in the workplace. Race discrimination occurs when an individual is treated differently with regard to the terms and conditions of employment that is motivated in any way by his or her race. This can include anything from termination, demotion, failure to hire or disparate pay practices. Racial harassment leading to a “hostile work environment” is also a cognizable claim. A “hostile work environment” based on race can occur in the workplace when individuals of one race are treated less favorably than other individuals and/or where the environment contains racially-based remarks, nicknames, or jokes. Moreover, although many discrimination cases must first proceed through the Equal Employment Opportunity Commission (“EEOC”) before an action may be commenced in federal court, race discrimination cases can often proceed directly to federal court under Section 1981 of the Civil Rights Act of 1866 which does not require any filing with the EEOC and provides the ability to recover uncapped compensatory and punitive damages – unlike Title VII of the Civil Rights Act of 1964. Some of our Firm’s largest and most noteworthy cases have involved race discrimination. If you think you may have been a victim of race discrimination, you should speak with an attorney who can advise you of your rights.
<urn:uuid:c0d9d7d1-bb93-4489-9579-1c548950d86f>
CC-MAIN-2023-06
https://www.wigdorlaw.com/employment-litigation/race-discrimination/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495001.99/warc/CC-MAIN-20230127164242-20230127194242-00869.warc.gz
en
0.960294
291
3
3
Trees in WPF In many technologies, elements and components are organized in a tree structure where developers directly manipulate the object nodes in the tree to affect the rendering or behavior of an application. Windows Presentation Foundation (WPF) also uses several tree structure metaphors to define relationships between program elements. For the most part WPF developers can create an application in code or define portions of the application in XAML while thinking conceptually about the object tree metaphor, but will be calling specific API or using specific markup to do so rather than some general object tree manipulation API such as you might use in XML DOM. WPF exposes two helper classes that provide a tree metaphor view, LogicalTreeHelper and VisualTreeHelper. The terms visual tree and logical tree are also used in the WPF documentation because these same trees are useful for understanding the behavior of certain key WPF features. This topic defines what the visual tree and logical tree represent, discusses how such trees relate to an overall object tree concept, and introduces LogicalTreeHelper and VisualTreeHelpers. Trees in WPF The most complete tree structure in WPF is the object tree. If you define an application page in XAML and then load the XAML, the tree structure is created based on the nesting relationships of the elements in the markup. If you define an application or a portion of the application in code, then the tree structure is created based on how you assign property values for properties that implement the content model for a given object. In Windows Presentation Foundation (WPF), there are two ways that the complete object tree is conceptualized and can be reported to its public API: as the logical tree and as the visual tree. The distinctions between logical tree and visual tree are not always necessarily important, but they can occasionally cause issues with certain WPF subsystems and affect choices you make in markup or code. Even though you do not always manipulate either the logical tree or the visual tree directly, understanding the concepts of how the trees interact is useful for understanding WPF as a technology. Thinking of WPF as a tree metaphor of some kind is also crucial to understanding how property inheritance and event routing work in WPF. Because the object tree is more of a concept than an actual API, another way to think of the concept is as an object graph. In practice, there are relationships between objects at run time where the tree metaphor will break down. Nevertheless, particularly with XAML-defined UI, the tree metaphor is relevant enough that most WPF documentation will use the term object tree when referencing this general concept. The Logical Tree In WPF, you add content to UI elements by setting properties of the objects that back those elements. For example, you add items to a ListBox control by manipulating its Items property. By doing this, you are placing items into the ItemCollection that is the Items property value. Similarly, to add objects to a DockPanel, you manipulate its Children property value. Here, you are adding objects to the UIElementCollection. For a code example, see How to: Add an Element Dynamically. In Extensible Application Markup Language (XAML), when you place list items in a ListBox or controls or other UI elements in a DockPanel, you also use the Items and Children properties, either explicitly or implicitly, as in the following example. <DockPanel Name="ParentElement" xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" > <!--implicit: <DockPanel.Children>--> <ListBox DockPanel.Dock="Top"> <!--implicit: <ListBox.Items>--> <ListBoxItem> <TextBlock>Dog</TextBlock> </ListBoxItem> <ListBoxItem> <TextBlock>Cat</TextBlock> </ListBoxItem> <ListBoxItem> <TextBlock>Fish</TextBlock> </ListBoxItem> <!--implicit: </ListBox.Items>--> </ListBox> <Button Height="20" Width="100" DockPanel.Dock="Top">Buy a Pet</Button> <!--implicit: </DockPanel.Children>--> </DockPanel> If you were to process this XAML as XML under a document object model, and if you had included the tags commented out as implicit (which would have been legal), then the resulting XML DOM tree would have included elements for <ListBox.Items> and the other implicit items. But XAML does not process that way when you read the markup and write to objects, the resulting object graph does not literally include ListBox.Items. It does however have a ListBox property named Items that contains a ItemCollection, and that ItemCollection is initialized but empty when the ListBox XAML is processed. Then, each child object element that exists as content for the ListBox is added to the ItemCollection by parser calls to ItemCollection.Add. This example of processing XAML into an object tree is so far seemingly an example where the created object tree is basically the logical tree. However, the logical tree is not the entire object graph that exists for your application UI at run time, even with the XAML implicit syntax items factored out. The main reason for this is visuals and templates. For example, consider the Button. The logical tree reports the Button object and also its string Content. But there is more to this button in the run-time object tree. In particular, the button only appears on screen the way it does because a specific Button control template was applied. The visuals that come from an applied template (such as the template-defined Border of dark gray around the visual button) are not reported in the logical tree, even if you are looking at the logical tree during run time (such as handling an input event from the visible UI and then reading the logical tree). To find the template visuals, you would instead need to examine the visual tree. The Purpose of the Logical Tree The logical tree exists so that content models can readily iterate over their possible child objects, and so that content models can be extensible. Also, the logical tree provides a framework for certain notifications, such as when all objects in the logical tree are loaded. Basically, the logical tree is an approximation of a run time object graph at the framework level, which excludes visuals, but is adequate for many querying operations against your own run time application's composition. In addition, both static and dynamic resource references are resolved by looking upwards through the logical tree for Resources collections on the initial requesting object, and then continuing up the logical tree and checking each FrameworkElement (or FrameworkContentElement) for another Resources value that contains a ResourceDictionary, possibly containing that key. The logical tree is used for resource lookup when both the logical tree and the visual tree are present. For more information on resource dictionaries and lookup, see XAML Resources. Composition of the Logical Tree The logical tree is defined at the WPF framework-level, which means that the WPF base element that is most relevant for logical tree operations is either FrameworkElement or FrameworkContentElement. However, as you can see if you actually use the LogicalTreeHelper API, the logical tree sometimes contains nodes that are not either FrameworkElement or FrameworkContentElement. For instance, the logical tree reports the Text value of a TextBlock, which is a string. Overriding the Logical Tree Advanced control authors can override the logical tree by overriding several APIs that define how a general object or content model adds or removes objects within the logical tree. For an example of how to override the logical tree, see Override the Logical Tree. Property Value Inheritance Property value inheritance operates through a hybrid tree. The actual metadata that contains the Inherits property that enables property inheritance is the WPF framework-level FrameworkPropertyMetadata class. Therefore, both the parent that holds the original value and the child object that inherits that value must both be FrameworkElement or FrameworkContentElement, and they must both be part of some logical tree. However, for existing WPF properties that support property inheritance, property value inheritance is able to perpetuate through an intervening object that is not in the logical tree. Mainly this is relevant for having template elements use any inherited property values set either on the instance that is templated, or at still higher levels of page-level composition and therefore higher in the logical tree. In order for property value inheritance to work consistently across such a boundary, the inheriting property must be registered as an attached property, and you should follow this pattern if you intend to define a custom dependency property with property inheritance behavior. The exact tree used for property inheritance cannot be entirely anticipated by a helper class utility method, even at run time. For more information, see Property Value Inheritance. The Visual Tree In addition to the concept of the logical tree, there is also the concept of the visual tree in WPF. The visual tree describes the structure of visual objects, as represented by the Visual base class. When you write a template for a control, you are defining or redefining the visual tree that applies for that control. The visual tree is also of interest to developers who want lower-level control over drawing for performance and optimization reasons. One exposure of the visual tree as part of conventional WPF application programming is that event routes for a routed event mostly travel along the visual tree, not the logical tree. This subtlety of routed event behavior might not be immediately apparent unless you are a control author. Routing events through the visual tree enables controls that implement composition at the visual level to handle events or create event setters. Trees, Content Elements, and Content Hosts Content elements (classes that derive from ContentElement) are not part of the visual tree; they do not inherit from Visual and do not have a visual representation. In order to appear in a UI at all, a ContentElement must be hosted in a content host that is both a Visual and a logical tree participant. Usually such an object is a FrameworkElement. You can conceptualize that the content host is somewhat like a "browser" for the content and chooses how to display that content within the screen region that the host controls. When the content is hosted, the content can be made a participant in certain tree processes that are normally associated with the visual tree. Generally, the FrameworkElement host class includes implementation code that adds any hosted ContentElement to the event route through subnodes of the content logical tree, even though the hosted content is not part of the true visual tree. This is necessary so that a ContentElement can source a routed event that routes to any element other than itself. The LogicalTreeHelper class provides the GetChildren, GetParent, and FindLogicalNode methods for logical tree traversal. In most cases, you should not have to traverse the logical tree of existing controls, because these controls almost always expose their logical child elements as a dedicated collection property that supports collection access such as Add, an indexer, and so on. Tree traversal is mainly a scenario that is used by control authors who choose not to derive from intended control patterns such as ItemsControl or Panel where collection properties are already defined, and who intend to provide their own collection property support. The visual tree also supports a helper class for visual tree traversal, VisualTreeHelper. The visual tree is not exposed as conveniently through control-specific properties, so the VisualTreeHelper class is the recommended way to traverse the visual tree if that is necessary for your programming scenario. For more information, see WPF Graphics Rendering Overview. Sometimes it is necessary to examine the visual tree of an applied template. You should be careful when using this technique. Even if you are traversing a visual tree for a control where you define the template, consumers of your control can always change the template by setting the Template property on instances, and even the end user can influence the applied template by changing the system theme. Routes for Routed Events as a "Tree" As mentioned before, the route of any given routed event travels along a single and predetermined path of a tree that is a hybrid of the visual and logical tree representations. The event route can travel either in the up or down directions within the tree depending on whether it is a tunneling or bubbling routed event. The event route concept does not have a directly supporting helper class that could be used to "walk" the event route independently of raising an event that actually routes. There is a class that represents the route, EventRoute, but the methods of that class are generally for internal use only. Resource Dictionaries and Trees Resource dictionary lookup for all Resources defined in a page traverses basically the logical tree. Objects that are not in the logical tree can reference keyed resources, but the resource lookup sequence begins at the point where that object is connected to the logical tree. In WPF, only logical tree nodes can have a Resources property that contains a ResourceDictionary, therefore there is no benefit in traversing the visual tree looking for keyed resources from a ResourceDictionary. However, resource lookup can also extend beyond the immediate logical tree. For application markup, the resource lookup can then continue onward to application-level resource dictionaries and then to theme support and system values that are referenced as static properties or keys. Themes themselves can also reference system values outside of the theme logical tree if the resource references are dynamic. For more information on resource dictionaries and the lookup logic, see XAML Resources.
<urn:uuid:36368662-dcea-461a-96c6-5c3030c84aea>
CC-MAIN-2019-51
https://docs.microsoft.com/en-us/dotnet/framework/wpf/advanced/trees-in-wpf
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540488870.33/warc/CC-MAIN-20191206145958-20191206173958-00202.warc.gz
en
0.899794
2,823
3.859375
4
A stroke often causes problems with bladder and bowel control. These usually improve in the early weeks after the stroke, but around a third of stroke survivors may have longer term difficulties. Bladder and bowel problems are common after a stroke. Many people soon recover, but if you have longer-term problems, there are treatments and support that can help you get on with daily life. It's estimated that about half of people admitted to hospital with a stroke will have lost control of their bladder, and a third will experience loss of bowel control. Last week, a research incontinence workshop was held at Guy's Hospital London, with the aim of stimulating research into incontinence. Browse through a list of organisations that can provide support and information to help with the effects of stroke. An ischaemic stroke happens when a blood clot, or other blockage, cuts off the blood supply to your brain. This is the most common type of stroke.
<urn:uuid:9b7e04a4-7fa1-42ea-858f-e3366f0f0438>
CC-MAIN-2021-39
https://www.stroke.org.uk/search?key=Bowel
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056656.6/warc/CC-MAIN-20210919005057-20210919035057-00700.warc.gz
en
0.966206
194
2.71875
3
Dan Girardi (far right) after a hit to the head Doctors and scientists are looking to the animal kingdom for answers and while there is no silver bullet yet, there are some interesting developments Concussions have become hockey’s white whale in recent years, but in the search for a solution, doctors and innovators have actually been looking at woodpeckers and bighorn sheep. Specifically, what the brains of those beasts can tell us about elastic collisions. Elastic collisions are good…OK, they’re better than inelastic collisions, let’s put it that way. Inelastic collisions send shock waves through the brain, whipping it against the skull. With elastic collisions, the energy passes through the body instead – it’s the difference between getting into a car accident without seatbelts or airbags versus one with those safety measures. In terms of the human brain, inelastic collisions cause brain slosh, where the force of the impact is made worse by the fluids surrounding the brain taking on their own energy. “We want the brain tighter to the skull,” said Dr. Gregory Myer of the Cincinnati Children’s Hospital, “so the energy passes through.” So what’s up with the woodpeckers? The unique birds hit their heads (beaks) against trees an estimated 85 million times in their lifespan, yet they do not get concussions. Scientists have determined that the major reason is that birds’ brains do not float in their skulls (they’re also smaller than human brains, which helps). This is where the hockey industry comes in. Dr. Myer was one of two specialists brought in by Bauer to talk about the equipment company’s latest gambit, a neck collar called the NeuroShield which aims to cut down on sub-concussive events, or repetitive hits. It was created by a firm called Q30 Innovations and Bauer is licensing the product for commercial use. “Immediately I was skeptical,” said Jamie Eno, senior director of Bauer Hockey. “Because it was inspired by woodpeckers.” But humanity owes a great debt to a variety of animals who have given us scientific insight. Heck, naked mole rats may be the key to defeating cancer (look it up; I’m not kidding). The NeuroShield’s purpose is to slightly increase the amount of blood in the brain by putting pressure on the jugular vein (which carries blood out of our heads). “We’re putting a kink in the hose,” said Dr. Myer. This mirrors the lives of bighorn sheep, which migrate to higher altitudes, forcing more blood to rush into their heads. These sheep also bash their skulls against each other on the regular. Dr. Myers noted that studies have found a 30 percent reduction in concussion rates for NFLers and high schoolers that play at higher altitudes (so, play for the Denver Broncos, I guess?), which is pretty interesting. But the NeuroShield cannot prevent concussions. Bauer is very upfront about that. What the company and the doctors they have enlisted believe, is that the collar can prevent the structural change of the brain due to sports-related impacts, because helmets don’t cut it. “The cranium is, in many ways a hydraulic system,” said Dr. Julian Bailes, a top American neurosurgeon. “Fluid buoys the brain. The brain gets injured by moving and a helmet cannot prevent movement.” What a hockey helmet can do is prevent skull fractures and superficial wounds – important functions, to be sure – but it is of less use when it comes to concussions. As for the NeuroShield collar, Bauer and the doctors hope it can also help keep youth participation in contact sports such as football (both Myer and Bailes are big fans) and hockey from falling off a cliff in the coming years. Concussions are indeed scary and it’s impossible not to note that Bauer sells hockey equipment for a living. For Hall of Famer Mark Messier (who works with Bauer on grassroots initiatives), a future where the next generation is physically inactive doesn’t sit well. “It’s frightening,” Messier said. “Kids’ decisions on what sport they play shouldn’t be based on fear.” But it is a reality that football in particular is facing and clearly Bauer doesn’t want hockey to reach that fever point. The NeuroShield will cost $199 in Canada and is recommended for kids as young as seven. Will parents pony up that amount? Hockey is already a very expensive sport. Will players – including influential NHLers – wear something that feels like someone putting their hand around the back of your neck? Ultimately, the market will decide…but clearly the equipment and medical industries aren’t going to just sit back and let that market shrivel due to the terrible potentials behind concussions. “There is hope,” Messier said. “There is a future.”
<urn:uuid:ca51dd60-f53d-4151-b27e-218476d715ce>
CC-MAIN-2018-26
http://www.thehockeynews.com/news/article/concussion-research-is-venturing-into-weird-and-interesting-territory
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864191.74/warc/CC-MAIN-20180621153153-20180621173153-00273.warc.gz
en
0.956991
1,074
2.90625
3
What is the difference between suckers and primocanes on blackberries? Certified GKH Gardening Expert The Blackberries produce canes in the spring called primocanes. Suckers refer to the growth that comes up from the ground runners. Here are some links that may help you identify the parts of the plant more easily, Here is a site that will help you iron out the differences between primocanes (fall fruiting, tall, no lateral branching), floricanes (summer fruiting, tall, lateral branching), and suckers (non-fruiting, short spindly canes): https://www.wikihow.com/Prune-Raspberries.
<urn:uuid:1469e752-52c6-4aac-94a4-04f03276a442>
CC-MAIN-2018-22
https://questions.gardeningknowhow.com/thornless-blackberries-2/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865595.47/warc/CC-MAIN-20180523102355-20180523122355-00069.warc.gz
en
0.83562
149
2.546875
3
Pelagic Habitat Use by Juvenile Reef Fishes in the Northern Gulf of Mexico 2015 Joint Meetings of Ichthyologists and Herpetologists, Reno, Nevada, July 15-19, 2015 The assemblage composition, abundance, biomass, and vertical distribution of juvenile reef fishes in the offshore pelagic habitat of the northern Gulf of Mexico are described. This study, a component of the NOAA-supported Offshore Nekton Sampling and Analysis Program, is the first to examine juvenile reef fish distributions across the oceanic northern Gulf of Mexico after the Deepwater Horizon oil spill. Results presented here are derived from a 3-month, spring/summer research cruise in 2011 on the M/V Meg Skansi. A 44-station sampling grid covering an area of 420 X 120 nautical miles was sampled with a 10-m2 MOCNESS midwater trawl from the surface to a depth of 1500m, both day and night at each station. A total of 85,475 fish specimens were collected from 373 samples, including 767 reef fish specimens representing 52 species from 29 families. Initial analysis has revealed the presence of juveniles of some species in locations where adults are not known to occur. Juveniles were found almost exclusively in the uppermost 200m of the water column. A greater number of individuals were collected in nighttime trawls. Surprisingly, some individuals were sampled between 1000- 1500m. During the MS7 sampling program, hydrographic profiles of the water column were recorded. This information provides the hydrographic background setting against which the coastal reef fish distributions in the offshore pelagic habitat of the Gulf of Mexico can be characterized. Results of fish distributions as a function of location (relative to the shelf break) and major mesoscale oceanographic features will be presented. Bowen, Katie and Sutton, Tracey, "Pelagic Habitat Use by Juvenile Reef Fishes in the Northern Gulf of Mexico" (2015). Marine & Environmental Sciences Faculty Proceedings, Presentations, Speeches, Lectures. 391.
<urn:uuid:e5b1dbb3-c433-426e-9f1e-672efbf25f75>
CC-MAIN-2022-40
https://nsuworks.nova.edu/occ_facpresentations/391/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00291.warc.gz
en
0.91654
471
2.65625
3
Psychotherapy and counselling have been called the talking cures– although counselling tends to deal more with specific,here-and-now difficulties whilst psychotherapy tends to deal with more diffuse or long-standing difficulties. There are many different types of counselling and psychotherapy with different theories about human nature, what causes difficulties and how change occurs. Research over 40 years has proved convincingly that therapy works and that, at the end of treatment, the average treated person is better off than 80% of the untreated sample and that these gains are maintained over time, after the end of treatment. Research suggests that the qualities of the therapist and of the relationship between therapist and client are more important than the theoretical approach (Common factors theory). Good outcome depends on, in descending order of importance, the qualities of the client and what else is going on in their life at the time (40%), how good the relationship is between client and therapist (30%), faith and hope in the process (15%) and, finally, the techniques of the therapist (15%). It is most important that you feel able to trust the person you choose to work with so feel free to do your research, see several therapists face to face if necessary, and ask them as many questions as you need to. For more information on different therapies and how to choose a therapist click on: which summarises the Department of Health’s publication, Choosing Talking Therapies People are often confused about the various helping professions and the difference between them.The following brief summary may be helpful. All of those below offer “a talking cure”, though Psychiatrists may additionally or preferentially offer drug therapy, hypnosis or shock treatment. Psychologists may additionally or preferentially offer exercises, homework and structured task-orientated programmes. Counsellor – Anyone may call themselves a counsellor. Someone who calls themselves a counsellor may range from someone who has had no training, to one who has done a short course to someone with a three year training and a great deal of experience. The best safeguard is to find someone who is not just a member but is accredited by the British Association for Counselling and Psychotherapy (BACP) or by the United Kingdom Council for Psychotherapy (UKCP). Psychotherapist –anyone can call themselves a psychotherapist. Look for someone registered with the British Psychoanalytic Council (BPC) or the United Kingdom Council for Psychotherapy (UKCP) who will have had a three year plus post graduate training. Psychoanalytic Psychotherapist – Four- six years post graduate training plus own analysis. Member of the British Psychoanalytic Council (BPC). Little difference between psychoanalytic psychotherapists and psychoanalysts (See below) Psychiatrist – Medically qualified Doctor who then goes on to specialise in mental illness for an additional three plus years. Member of the Royal College of Psychiatry (M.R.C.Psych.) Psychoanalyst – A psychotherapist/analyst trained in the understanding and approach pioneered by Freud but modified and developed substantially over the years into various approaches such as Kleinian, Object Relations, Ego Psychologists, Independents etc. Four-six year post graduate training plus own analysis. Member of the International Psycho-Analytic Association (IPA) and the British Psychoanalytic Council (BPC) Analytical Psychologist – A psychotherapist/analyst who is trained in the Jungian approach. Four- six years postgraduate training plus own analysis. Member of the Society for Analytical Psychology (SAP) Clinical Psychologist – Three year plus post graduate training. The approach is mainly cognitive-behavioural. Member of the British Psychological Society (BPS)
<urn:uuid:9732df24-1032-4866-9036-25b1d27d451a>
CC-MAIN-2018-17
https://philippashadrachlong.com/about-therapy/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948029.93/warc/CC-MAIN-20180425232612-20180426012612-00119.warc.gz
en
0.94661
779
2.515625
3
Are free-ranging cats pint-size murderers who need to be removed from the landscape because they critically decrease bird and small-mammal populations? Or is the estimation of free-ranging cats' impact on birds exaggerated, so that we'd do better to rein in the anti-cat hype and to focus on our own actions toward wildlife? Are these the only two possible positions? Or is this dichotomy itself a kind of hype? These questions aren't new, but they've heated up again this month thanks to Peter P. Marra and Chris Santella's book, Cat Wars: The Devastating Consequences of a Cuddly Killer. Cat Wars has garnered significant attention for its claim that free-ranging cats — ferals and strays and pet cats allowed to go outdoors — kill birds and small mammals in such enormous numbers that they themselves should be trapped and/or killed by "any means necessary." Yes, that's an extraordinary statement, so let me quote directly from the book: "While individual pet owners must take responsibility for their cats, it is everyone's responsibility to address the challenges of managing free-range cats to limit their impact on wildlife, both as predators and vectors of disease. From a conservation ecology perspective, the most desirable outcome seems clear — remove all free-ranging cats from the landscape by any means necessary." I've found that on social media and in blog posts when this passage is cited in horror, the very next bit isn't often quoted: "But such a solution is hardly practical given the legions of cats roaming the land — as many as 100 million unowned animals, plus 50 million cats that roam — and the painful question of what to do with the cats even if they could be captured." So what exactly do Marra and Santella intend? A little more background first: As Katie Lisnik, of the Humane Society of the United States, notes, their "by any means necessary" language has led Princeton University Press to issue a statement avowing that the authors don't support inhumane treatment of animals. That's extraordinary in itself. And let's be clear: I'm the sort of person that Marra and Santella explicitly charge with being part of the problem because for years my husband and I have fed and cared for feral cats. We now live with six rescued cats who never go outdoors, and we care for eight more feral cats who reside entirely in a shaded-and-sheltered outdoor enclosure in our back yard — plus a ninth outside cat who (after a failed attempt to enclose him) roams freely. I'm a cat advocate and, at the same time, I care about the lives of birds and other small wildlife. Marra and Santella are right to say that cat caretakers need to do all we can to minimize cats' predation on local wildlife. Cat Wars is, though, problematic for me because it recommends that some feral cats should be killed, including by drastic measures, and it roots this conclusion in the claim that science shows that cats are an extinction-level threat to birds and other small wildlife. In fact, in the contiguous United States, Marra and Santella say, cats kill between 1.3 billion and 4 billion birds annually. Regarding drastic measures, I'll again quote directly: "In high-priority areas [the authors say these exist in every state] there must be zero tolerance for free-ranging cats. If the animals are trapped, they must be removed from the area and not returned. If homes cannot be found for the animals and no sanctuaries or shelters are available, there is no choice but to euthanize them. If the animals cannot be trapped, other means must be taken to remove them from the landscape — be it the use of select poisons or the retention of professional hunters." [emphasis mine] Reaction from animal behaviorists and animal activists both to the recommendation and to the science has been swift. As Marc Bekoff writes in the Huffington Post: "The phrase 'by any means necessary' is among the most reprehensible statements I've ever seen, and of course, in addition to it being morally repugnant, it is not based on science and it won't work." On the question of science, Peter Wolf, writing in the Vox Felina blog, is lacerating: "The fact is, the best estimates available suggest there are only 3.2 billion land birds in the entire country. Were the authors' estimates even remotely accurate, birds would have vanished from the U.S. long ago. This was, in other words, classic junk science." Wolf supports that strong "junk science" criticism in passages like this one: "As evidence of the 'clear message' that cats have a negative impact on bird populations, for example, Marra and Santella refer to a study done in Sheffield, England — ignoring the evidence that blackbirds, the species alleged to be under threat, are actually increasing in abundance across much of the U.K., with declines observed only in London, and due not to predation but 'a lack of insects and other food.' " Research scientist and ethicist Bill Lynn sent me this, among other comments on the book, via email: "Marra, Santella, and their supporters violate basic tenets of scientific reasoning when making their claims about outdoor cats. They do so by overgeneralizing the findings of specific, local studies to the world at large. In terms of logic, this involves both the fallacy of composition (all the world is like the part where cats and wildlife have been studied), and the fallacy of hasty generalization (if cats are a problem for wildlife in this place, then they must be a problem in every place). There are simply too many variables to warrant their alarmism — the vastly more important human depredations on biodiversity, the diversity of ecological contexts in which cats are found, and differences in cat personality and behavior." This topic is complex. For example, I have no clear idea how many birds are in the U.S. and available to cats. I do know this: It's not a war against cats that we need. We should slow down, critically review the assumptions that underpin the science, and resist panicky, dire recommendations. TNR — a program favored by cat advocates whereby cats are trapped, neutered (or spayed) and returned to the community — isn't a failed practice, as Marra and Santella charge. As the advocacy organization Alley Cat Allies says, given appropriate resources and community commitment, it may be quite effective. The stakes are not merely academic here; they are life-and-death important, nowhere more so than for the cats. Lynn, whose work is to bring science together with ethics and public policy in dealing with thorny questions like these, put it to me this way: "[Cat Wars] is rooted in a worldview that trivializes the value of individual animal lives. This is the shame of traditional approaches to conservation and wildlife management — a pre-commitment to killing our way back to biodiversity that is nothing but bloodsport writ large." We should work hard to protect birds and small wildlife, and, as part of that project, to reduce free-ranging cat numbers. This can be done across the generations by population-control measures, not with poison and bullets aimed at living cats who deserve our empathy and care. Barbara J. King is an anthropology professor emerita at the College of William and Mary. She often writes about the cognition, emotion and welfare of animals, and about biological anthropology, human evolution and gender issues. Barbara's most recent book on animals is titled How Animals Grieve, and her forthcoming book is Personalities on the Plate: The Lives and Minds of Animals We Eat. You can keep up with what she is thinking on Twitter: @bjkingape
<urn:uuid:2da27661-6a21-4c52-9a70-8f4d47affb87>
CC-MAIN-2022-40
https://www.npr.org/sections/13.7/2016/09/29/495883093/stakes-grow-higher-in-the-cat-bird-wars
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00761.warc.gz
en
0.943835
1,623
2.765625
3
In the ongoing fight against fake news, including propaganda, clickbait, native advertising, conspiracy theories, and hoaxes, knowledge is power. For librarians, knowledge is stock in trade, and we’re in a unique position to empower a huge number of people, across a range of demographics, to seek knowledge – particularly in media literacy. However, doing that can be tricky. Where do you start? How do you engage people who aren’t interested or don’t see the problems with fake news? How do you find appropriate materials for different ages, learning abilities, and languages? Enter the Libguides Luckily for us, many libraries and librarians have been monitoring media literacy levels for a number of years, and the recent proliferation and conversations around fake news have prompted a swift and highly engaging response in the form of Libguides – a customisable web platform for libraries to create learning portals from. Below are some of my favourite fake news Libguides. All are publicly accessible (some content may require an account to access), and provide a huge number of resources and talking points for a range of audiences. These are all in English so if you know of other guides and resources in different languages, please let me know! Fake News by Tri-College Libraries A simple, single page guide that includes a discussion about hoax images, and a glossary of common terms like “fact check” and “echo chamber”. Pause Before You Click by Boston College Libraries This guide includes interactivity in the form of polls so you can see what other people think about the topics being presented. While it’s not exactly social, it’s nice to see that I’m not alone in being sucked in by, and sharing, a fake news story. News Makers/News Fakers by James Cook University Libraries With plenty of videos, graphics, and a light sprinkling of memes, this guide is entertaining and informative. There’s a lot of content here, and a quiz at the end, which makes it feel like a miniature course in media literacy. Full disclosure: I helped make this one. Fake News and How to Spot it by Lowther Hall Anglican Grammar School Aimed at high school students, this guide is part of the school’s 7-12 English guide. It covers all the bases, and provides some great links and videos for all ages. Honourable Mention: Media Influence by Melbourne High School Library While not specifically about fake news, this guide provides links and resources about how media influences culture, society, and politics. What are your favourite fake news resources? Do you have a guide you use a lot? Have you made your own guide? Do these make you want to make your own guide? Let me know in the comments below!
<urn:uuid:04333a9c-7d76-4292-8e54-c931b30f4676>
CC-MAIN-2022-05
http://libsaurus.com/2017/05/30/resources-fighting-fake-news/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301263.50/warc/CC-MAIN-20220119033421-20220119063421-00547.warc.gz
en
0.91604
589
2.8125
3
Model Essay for UPSC: The UPSC exam is held every year. The essay paper consists of eight topics that are divided into two parts. Each part holds a total of 250 marks for the time duration of three hours. An essay is a short piece about a particular subject. It should be in prose format and mostly analytical, speculative, or interpretative. It helps the examiners to gauge the candidate’s argumentative skills. The essays help to check the coherence in the writing of the candidate. It helps gauge the construction of ideas in their mind and the systematic way they write. The topics can range from contemporary socio-political issues to ethical and philosophical inquiries. We have prepared some of the crucial topics for the upcoming UPSC examination. You can also find more Essay Writing articles on events, persons, sports, technology and many more. List of Essay Topics for UPSC Exam Below are some of the vital topics aspirants need to prepare for the upcoming UPSC examination: - Judiciary, and it’s working. - Water disputes between states - Foreign policy in the Modi era - National health protection scheme - Modi’s agricultural schemes during rampant farmer suicide - Importance of higher education - A political education - Developing skills in the youth of India - Environment vs. Growth - Universal basic income vs. Subsidy - Why is the administration insensitive about the plight of slum dwellers? - India’s role in changing the global world order - Nationalism debate - The Indian model of secularism - Digitalization drive - Feminization of agriculture - Pollution crisis in urban areas - Artificial intelligence - Entrance exams versus qualifying exams- what is the relevance of entrance exams for admissions to UG and PG courses in India - Scraping section 377- the latest addition to human rights protection - Pro-poor policies of Modi Government - Controversies surrounding present-day NDA government - Decriminalization of the adultery laid under section 497 of IPC - Indian’s standing in BRICS countries - Cultural transformation in the 21st century - Higher education vs. skill acquisition - Worsening INR - Impact of the increasing oil prices on the Indian economy - Impact of new economic measures on fiscal ties between the union and states in India - Farming has lost the ability to be a source of subsistence for the majority of farmers. - The destiny of a nation is shaped in classrooms. - Joy is the simplest form of gratitude. - Social media is inherently a selfish medium. - The fulfillment of ‘new women’ in India is a myth. - We might brave human laws but cannot resist natural laws. - The relevance of non-alignment movement (NAM) - Need brings greed; if need increases, it spoils the breed. - If development is not engendered, it is endangered. - Innovation is the key determinant to economic growth and social welfare. - Cyberspace and internet- blessing or curse in the long run Tips for Preparation of Essay Papers in UPSC Mains Certain subjects in UPSC overlap with most of the important essay topics. If you can prepare the general studies paper extremely well, you will get to know the information and write the essays. The general studies paper covers many of the important topics for the essay. Hence, aspirants should prepare for it well. This way, you will be able to prepare for a paper and build confidence in the essay topics simultaneously. You can save a lot of time while gaining the edge in the preparation this way. - Know your basics in grammar. - Familiarize yourself will the parts of speech. - Present arguments on both sides of the central theme if possible. - Be creative and add new points in sample essays to score more. - Work on your presentation of your essay. - Read a lot of fiction and non-fiction to gain confidence in your communication skills and increase your vocabulary. - Spend at least an hour every day to read something that helps to score more in the essay paper. - Always try to keep yourself up to date with current affairs. - Read the newspaper every day. - Improve your general awareness. - Read through critical opinions and comments. - Do not use redundant words over and over. Use unique words. How to Write a UPSC Essay Many dread the task of writing an essay. This section is to help candidates navigate their ideas better in their articles. Here are some things aspirants should keep in mind while writing an essay in the UPSC examinations. 1. Begin with an Introduction: You can try to compose the introduction so that it grabs the attention of the examiner. You can begin by presenting a question with a rhetorical answer. The introduction should capture the body paragraphs’ essence and give the reader insight into the following portions. 2. Body Paragraph: Here, you are supposed to write about the central theme in detail. It does not necessarily mean that you need to cite every piece of information you can remember the topic. There should be a balance between information and presenting your personal opinion. Try to be creative with your writing and present all the sides to the theme. You can cite examples, sayings, governmental schemes that support your answer. Unlike the introduction, the body paragraphs can be more than one paragraph. But it is vital to stay with the word limit. A conclusion plays a significant role in every essay. No matter what your topic is, students need to write the conclusion properly to impact the examiner. You can brainstorm the significant points from the body paragraphs and then conclude with a final hook statement or question about the topic. Use transition sentences to make the conclusion spontaneous. Your essays are a portrayal of your ideas. They should be self-generating, self-reinforcing, and fulfilling. You refer to expert writers and learn from their style and technique. Though essays are a formal piece of writing, they should be anything but boring. Try not to use big words, just for its sake, since it may have the opposite effect. Try to present your true opinion straightforwardly and smoothly.
<urn:uuid:fa5fc9b1-a4ce-4ab1-b67b-35365d744636>
CC-MAIN-2022-49
https://www.aplustopper.com/model-essay-for-upsc/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710712.51/warc/CC-MAIN-20221129232448-20221130022448-00540.warc.gz
en
0.906988
1,300
2.9375
3
Trouble-free use of fluid power cylinders and their ability to serve and remain leak-free depends, in large part, on properly mounting the component for the particular application. The designer must determine the loading the cylinder will experience and mount it accordingly. The National Fluid Power Association, NFPA, has standardized on a number of dimensions for square-headed tie rod cylinders to promote cylinder interchangeability between manufacturers. Part of this standardization program includes cylinder mounting styles, which generally provide: • straight-line force transfer with fixed mounts that absorb force on the centerline of the cylinder • straight-line force transfer with fixed mounts that do not absorb force on the centerline of the cylinder, and • pivot force transfer with pivot mounts that absorb force on the centerline of the cylinder and allow the cylinder to change alignment in one plane. Straight line — Cylinders with fixed mounts that absorb the force on the centerline of the cylinder are considered the best for straight line force transfer. Tie rods extended, flange, or centerline lug mounts are symmetrical and allow the thrust or tension forces of the piston rod to be distributed uniformly about the cylinder centerline. Mounting bolts are subjected to simple tension or shear without compound forces; when properly installed, cylinder bearing sideloading is minimized. Cylinder tie rods are designed to withstand maximum rated internal pressure, and can be extended at either end and used to mount the cylinder. When the tie rods extend at both ends of the cylinder, one end can be used for cylinder mounting and the opposite end can support the cylinder or be attached to the machine members. Flange mounts also are extremely good for straight line force transfer applications. Three standard styles are head (rod)-end rectangular flange, head (rod)-end square flange, and a larger and thicker rectangular head with its own mounting holes; the same three versions are available for the capend of the cylinder. Selection of a flange mount depends partly on whether the major forces applied to the load result in compression or tension on the piston rod. Cap mounting is recommended for thrust loads, whereas head mounting should be used where major loading loads the piston rod in tension. Centerline lug mounts absorb forces on the centerline and are the least popular fixed mounting style. When used at higher pressures or under shock conditions, the lugs should be dowel pinned to the machine. Straight line, force not absorbed — Side mounted cylinders do not absorb force along their centerlines. These mounting styles have lugs on the end closures and one style has side-tapped holes for flush mounting. The plane of their mounting surface is not through the centerline of the cylinder; for this reason, side mounted cylinders produce a torque moment as the cylinder moves the load. This moment tends to rotate the cylinder about its mounting bolts. If the cylinder is not well secured to the machine, or the load is not well guided, side loads will be applied to the rod gland and piston bearings. To avoid this problem, side mounted cylinders should have a stroke length at least as long as the bore size. Shorter stroke, large bore cylinders tend to sway on their mounts with heavy loading especially with side lugs, end lugs, and end angle mounts. Side mount cylinders depend wholly on the friction of their mounting surfaces in contact with the machine to absorb the forces the cylinder produces. The torque applied to the mounting bolts should equal that of the tie rod torque as recommended by the manufacturer. For heavy loads or shock conditions, side mounted cylinders should be held in place with a key or pins to prevent shifting. A shear key — consisting of a plate extending from the side of the cylinder — can be supplied with most cylinders. It should be placed at the proper end to absorb the major loading — that is, at the rod end with the load in tension and at the cap end with a thrust load. This method may be used where a keyway can be milled into a machine member. The key takes shear loads and provides accurate alignment of the cylinder. Side lug mounts are designed to allow dowel pins to pin the cylinder to the machine. When used, pins are installed on both sides of the cylinder but not at both ends. Pivot force transfer — Cylinders with pivot mounts that absorb force along the centerline should be used when the actuated load travels through an arc. There are two ways to mount a cylinder so it will pivot during the work cycle: clevis mounts or trunnion mounts. Pivot mount cylinders are available with cap fixed clevis; cap detachable clevis; cap spherical bearing; and head, cap, and intermediate fixed trunnion. Special trunnion assemblies are also available, such as gimbal mounting, which allows the rotation of an object about a single axis. Pivot mount cylinders can be used in tension or thrust applications at full rated pressure, except that long stroke cylinders in thrust applications are limited by piston rod column strength. Clevis or single-ear mounts usually are an integral part of the cylinder cap, although detachable styles are available and provide a single pivot for mounting the cylinder. A pivot pin of appropriate length and diameter to withstand the maximum shear load at rated cylinder operating pressure is included as part of the clevis mount. The fixed clevis mount is the most popular and is used where the piston rod travels a fixed arc in one plane. It can be used vertically or horizontally. On long-stroke thrust applications, it may be necessary to use a larger diameter piston rod to prevent buckling or use a stop tube to minimize cylinder side loading in its extended position. Fixed clevis mounted cylinders do not function well if the path of rod travel is in more than one plane. Such an application results in misalignment and causes unnecessary side loading on the bearing and piston. For applications where the piston rod will travel a path not more than 3° either side of the true plane of motion, a cap spherical bearing mount and spherical bearing rod eye should be used. Cap detachable clevis mounts are most often used for air or medium-duty hydraulic service. Trunnion pivot mounts also are used when the piston rod travels an arc in one plane. Trunnion pins are designed for shear loads only and should not be used with bending stresses. The support bearings should be mounted as close as possible to the trunnion shoulder faces. Head trunnion mounted cylinders usually can be specified with smaller diameter piston rods than cylinders with the pivot point at the cap or at an intermediate position. On head trunnion mounted long stroke cylinders, the designer should consider the over-hanging weight at the cap end of the cylinder. To keep trunnion bearing loads within limits, stroke lengths should be not more than five times bore size. Proper installation begins with machine layout. Here are some guidelines: An intermediate fixed trunnion mount is the best. It can be located to balance the weight of the cylinder or anywhere between the head and cap to suit the application. Its location must be specified at time of order because it cannot be easily changed once manufactured. • if high shock loads are anticipated, mount the cylinder to take full advantage of its elasticity, and don't forget: the fluid lines are along for the ride, hold fixed-mounted cylinders in place by keying or pinning at one end only • use separate keys to take shear loads: at the head end if major shock loads are in thrust, at the cap end if they are in tension • locating pins may be used instead of shear keys to help take shear loads and insure cylinder alignment. Avoid pinning across corners - this can cause severe warpage when a cylinder is subjected to operating temperature and pressure. Such warpage also is imposed on fluid connectors at cylinder ports, and • pivoted mounts should have the same type of pivot as the cylinder body and the head end. Pivot axes should be parallel, never crossed. Many fluid power cylinders incorporate cushions to absorb the energy of moving masses at the end of a stroke, including the masses of the piston and rod, the load being moved, and the fluid medium operating the cylinder. When the cushion operates, the additional thrust is imposed on the cylinder assembly and it will change length. What about the fluid conductors? Consider protecting exposed rods from abrasion and corrosion that could destroy the rod surface and, in turn, the rod seal. In especially dirty environments, protect the rod with a cover such as a rod boot or bellows. Cylinders undergoing pressure and temperature changes elongate and contract. In addition, flexing and rocking makes the mounting head sway under load. The type of mount to specify depends on the application, but the effect of pressure and temperature changes must be provided for or the cylinder will leak. Consider these factors: • Cylinders with non-centerline-type mountings tend to change length and sway under load and temperature change. Any rigid tubing connected to a cylinder cap port will be subject to that resulting force and motion. If a cylinder is rigidly plumbed, the question is not whether it will leak, but when. • Cylinders with non-centerline mountings often require stronger machine members to resist bending, so consider the rigidity of the machine frame. For example, where one end of a cylinder must be overhung, an additional supporting member should be provided. • In most cases, a layout of the rod-end path will determine the best type of pivot mounting. * Fixed, non-centerline mounted cylinders with short strokes add another strength problem because mounting bolts will be subjected to increased tension in combination with shear forces. • Do the major applied forces result in cylinder rod thrust or tension? Cap-end flange mounts are best for thrust loading; rod-end flange mounts are best if the rod is in tension. • If misalignment occurs between the cylinder and its load, the mounting style may have to be altered to accommodate the skewing movement. A simple, pivoted centerline mounting, such as a clevis and trunnion, compensates for single-plane misalignment. If multiple-plane misalignment is encountered, the cylinder should have self-aligning ball joints on the cap and rod ends of a clevis-mounted cylinder - and fluid-line connections should be able to accept the movement.
<urn:uuid:80406f70-26ed-4b49-b3ea-050f761eee19>
CC-MAIN-2016-26
http://hydraulicspneumatics.com/print/200/TechZone/Cylinders/Article/False/6577/TechZone-Cylinders?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00090-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909571
2,135
2.71875
3