text
stringlengths
214
619k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
2.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
64
127k
score
float64
2.52
5.06
int_score
int64
3
5
input_ids
listlengths
64
64
attention_mask
listlengths
64
64
Saturday, April 17, 2010 "If we treated everyone we meet with the same affection we bestow upon our favorite cat, they, too, would purr.” Martin Robison Delany (1812–1885) was an African-American abolitionist and arguably the first proponent of American black nationalism. Shem Hotep ("I go in peace"). The picture above is funny. Read a Book. African Presence in Early Europe (Journal of African Civilizations) by Ivan Van Sertima Read a Book. Black Man of the Nile. By Dr. Yosef ben-Jochannan. Read a Book. Destruction of Black Civilization : Great Issues of a Race from 4500 B.C to 2000 A.D. by Chancellor Williams. Elizabeth “Bessie” Coleman (1892–1926) was an American civil aviator. She was the first African American female pilot and the first person of African American descent to hold an international pilot license. ANDREW JACKSON WAS AN INDIAN KILLER. As a general and politician, ANDREW JACKSON took actions that resulted in the mass killing of Native Americans. He is, nonetheless, commemorated on US currency, and specifically, on the banknote that people regularly take from their ATMs. Rather than advocating the elimination of the Jackson twenty-dollar bill, however, let's advocates a re-design of the bill so that it would bear the text, "ANDREW JACKSON WAS AN INDIAN KILLER," next to Jackson's image. In other words, it advocates remembering Jackson's horrendous actions, rather than the removal of what is disturbing from the public sphere and our historical consciousness. On the suppression of the Native American holocaust: I learned a lot in school. I We learned about the great American Presidents such as Andrew Jackson (the guy on the $20 bill), I learned about Teddy Roosevelt, I learned about Howard Taft, and all the great American Legends. There are 2 things all these "Great American Legends" have in common. Andrew Jackson (1767–1845) was the seventh President of the United States. Theodore "Teddy" Roosevelt (1858–1919 was the 26th President of the United States. William Howard Taft (1857–1930) was the 27th President of the United States. 1.They all believed in Manifest Destiny 2.They all were "Great Indian Killers." The American Society makes all these people great, and all these people were great because they were "Indian Killers". Don't you think it is morally wrong to commit the crime of Genocide? Don't you think it is morally wrong to consider Indian Killer a complement? No, it is not wrong, because The American Society makes it right. The American Propogandist make it right. We think what the want us to think. We believe what they want us to believe. Well, if all this stuff is morally right in the American Society, then Why isn't "Jew Killer" a complement? Because Genocide is morally wrong and is a crime thats why Hitler is considered wrong. Hey but Andrew Jackson, and all the American Legends did the same thing, Genocide the Indians. But Hitler Genocided the Jews but he is a given curse in the Soceity today. If Andrew Jackson is considered as a hero, then why isn't Hitler considered as a hero? Instead Hitler is a better Jew Killer than Andrew Jackson was Indian Killer. Adolf Hitler 1889–? was an Austrian-born German politician and the leader of the National Socialist German Workers Party. But the American Society which is mainly controlled by "Jew Loving Politicians" make it wrong for us to consider Jew killer as a complement and make it right for us to consider Indian Killer as a complement. Ques.How many People died in the Holocaust? Ans. 6 million Ques.How many days are spent in High School learing about the Holocaust? Ans. All four years. Ques.How many people were killed by the Americans? (Indian and Slaves) Ans. Over 25 million. Ques.How many days are spent in High School learning abou the killing of Indian and about the Slaves? We spend four fucking years learning about the Holocaust which only killed 6 million Jews but not one fucking day learning about the 25 million Indians and Slaves killed by the Americans. Why? No one knows about the 25 million Indians and Slaves being killed by the Americans but it is not as significant as the 6 million Jews killed in the Holocaust. Posted by Sawaad Amen Ra at 5:25 PM
<urn:uuid:43998142-0c2c-4efb-b80a-9a184ce7c210>
CC-MAIN-2017-39
http://nubianmoor.blogspot.com/2010/04/andrew-jackson-was-indian-killer.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696677.93/warc/CC-MAIN-20170926175208-20170926195208-00258.warc.gz
en
0.960231
985
2.671875
3
[ 19844, 11, 3035, 1596, 11, 3050, 198, 1, 1532, 356, 5716, 2506, 356, 1826, 351, 262, 976, 17696, 356, 1266, 322, 2402, 674, 4004, 3797, 11, 484, 11, 1165, 11, 561, 1308, 81, 13, 447, 251, 198, 24778, 3851, 1653, 4216, 1092, 357, 1507, 1065, 1906, 1507, 5332, 8, 373, 281, 5510, 12, 7437, 30480, 396, 290, 15242, 262, 717, 42461, 286, 1605, 2042 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
When people think of Artificial Intelligence (AI) they often conjure images of humanoid machines functioning at a level beyond standard human capability. But that concept doesn’t reflect the more common implementation for in today’s business world. Instead, the purpose of AI in most corporate landscapes involves automating mundane tasks. Advanced computing technologies can manage these duties with an increased level of efficiency when compared to the speed and accuracy of their human counterparts. And, in some cases, they can be programmed to “learn” as they move along. With all of the potential represented in AI, it’s no wonder that the technology can help businesses work even smarter by efficiently managing resources and lowering operational costs associated with data analysis and management. AI and Processing Power Even though AI has been on the technological radar for quite some time, we have only recently been able to create systems with the necessary processing power to make these solutions effective. Advances in CPU technology and GPU acceleration create trainable neural networks. This makes concepts like machine learning, also known as deep learning, and advance algorithm processing a reality. As the speed of processing and analysis improves, businesses can use the results to alter the course of their business more effectively. Additionally, the ability to automate simple processes means that employee efforts can be directed to more complex development matters instead of spending time managing the nitty-gritty of daily processing requirements. AI and Data Analytics The advent of big data in the business world initially represented cumbersome data sets housed across multiple systems and based on varying structures. AI is able to effectively review the information to find meaningful information. This allows businesses to adjust their approach to many standard operations. For example, data analytics of this nature allow large scale advertising systems to select better-targeted ads based on web-users activities. Other areas of growth include the self-driving cars, the development of virtual personal assistants, and even recommendations regarding how to treat someone with cancer. AI and Technical Employees Some of the fear around AI-centered on the likelihood that duties traditionally performed by people would be delegated to their machine-based counterparts. While the idea that improved technology leads to a loss of certain jobs is nothing new, the fact remains that AI is still a developing technology. As mundane tasks are moved from the hands of a person to the processing power of a computerized system, IT professionals can redirect their efforts towards more advanced development or other critical business goals. AI, as it is seen now, appears to be a point of augmentation instead of straight replacement. By removing certain tasks from the hands of workers, they can focus their efforts in a way that can increase their overall productivity. The activities of people will be enhanced by these sophisticated systems, allowing professionals to prioritize their activities more effectively. As developments in AI continue, it can be assumed that a disruptive technology will soon emerge that allows businesses to revamp their current methodologies. To take advantage of AI’s potential, a business needs to be prepared to move forward when the opportunity arises. Are you looking for IT Professionals with up-to-date- technical skills? If you are interested in finding technical professionals capable of creating or integrating AI-oriented solutions into your business, Solving IT has the expertise in technical staffing that will let your business find ideal candidates for your open positions. Contact Solving IT today and see what the future may hold for your business.
<urn:uuid:5b1803e1-4d2f-4d92-b805-ffb9ef6be501>
CC-MAIN-2017-22
https://solvingit.com/blog/can-artificial-intelligence-help-business-work-smarter/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612018.97/warc/CC-MAIN-20170529053338-20170529073338-00308.warc.gz
en
0.952951
694
3
3
[ 2215, 661, 892, 286, 35941, 9345, 357, 20185, 8, 484, 1690, 11644, 495, 4263, 286, 34870, 8217, 15025, 379, 257, 1241, 3675, 3210, 1692, 12971, 13, 887, 326, 3721, 1595, 447, 247, 83, 4079, 262, 517, 2219, 7822, 329, 287, 1909, 447, 247, 82, 1597, 995, 13, 5455, 11, 262, 4007, 286, 9552, 287, 749, 6355, 32964, 9018, 3557, 803, 30741, 8861, 13, 198 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Welcome to the Coral Digest Coral reefs are the proverbial "canary in a coal mine" of the oceans. In the face of climate change, there is no doubt that coral reefs are declining worldwide. Increased concentrations of CO2 in the atmosphere have led to warming oceans, ocean acidification, coral disease, and global bleaching events that occur too frequently for coral to recover. Localized threats from overfishing, pollution (including marine plastics), invasive species, and even the sunscreen that we all wear all but ensure that coral reefs, and the amazing assortment of fish and creatures that depend on them, will cease to exist as we know them, despite our best efforts to preserve and manage the reefs. This site is a collection of student research. For the spring 2020 semester, students are investigating the following topics: - Role of sound on the reefs - Coral disease - Plastic pollution - Benefits of conservation and restoration measures
<urn:uuid:211fc270-5494-440c-832d-60d7a6f5d5a6>
CC-MAIN-2021-25
https://www.coraldigest.org/index.php?title=Main_Page&direction=prev&oldid=9148
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621519.32/warc/CC-MAIN-20210615180356-20210615210356-00616.warc.gz
en
0.940616
189
3.3125
3
[ 14618, 284, 262, 41390, 44255, 198, 34, 6864, 43190, 389, 262, 47327, 366, 5171, 560, 287, 257, 5655, 6164, 1, 286, 262, 23744, 13, 554, 262, 1986, 286, 4258, 1487, 11, 612, 318, 645, 4719, 326, 29537, 43190, 389, 18080, 8688, 13, 25944, 14587, 286, 7375, 17, 287, 262, 8137, 423, 2957, 284, 9917, 23744, 11, 9151, 7408, 2649, 11, 29537, 4369, 11, 290 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Macro photography is a kind of close-up photography in which the image on film or electronic sensor is at least as large as the subject. Therefore, on 35mm film (for example), the camera has to have the ability to focus on an area at least as small as 24×36 mm, as this is the size of the image on the film. This is a magnification of 1:1. For example, suppose a photographer wants to take a macro photograph of a coin on film. With the lens set for a magnification of 1:1, he or she moves the camera to and fro until the coin is in focus, then takes the picture. After having the film developed, the photographer can place the coin on the film, and the coin will be exactly the same size as the picture of the coin on the negative or slide. In recent years, the term macro has come to mean being able to focus on a subject close enough so that when a standard 102×152 mm (4×6 inch) print is made, the image is life-size or larger. Next, the photographer photographs it from farther away, this time, setting the lens to a magnification of 1:4, again moving to and fro until the coin is in focus, and taking the picture. The real coin is now four times as big across as the image; that is, the image and the coin are in a 1:4 relationship. If a 4× enlargement print (about 100×150 mm) is made, the size of the coin will match the size of the photo of the coin. That is, the image is life-size, or 1:1, in the print. There are several kinds of equipment for making the image the required size. These include - Using a special-purpose lens called a macro lens (some manufacturers call it a micro), having a long barrel for close focusing. A macro lens might be optimized to provide its best performance at a magnification of 1:1. Some macro lenses, like the Canon MP-E 65 mm f/2.8, can achieve even better magnification— up to 5:1 macro, bringing the structure of small insect eyes, snowflakes, and other miniscule but detailed objects into striking focus. - Placing an extension tube between the camera body and the lens. The tube has no glass in it; its sole purpose is to move the lens farther from the film or digital sensor. The farther the lens is, the closer the focus (and the bigger the magnification). Also, less light will reach the film or sensor, therefore a longer exposure time will be needed. - Using a bellows attachment between the camera body and the lens to extend the lens to film plane distance. Similar to an extension tube, but adjustable. - Placing an auxiliary close-up lens in front of the camera's taking lens. Inexpensive screw-in or slip-on attachments provide close focusing at very low cost. The quality is variable, with some two-element versions being excellent. This method works with cameras that have built-in lenses. - Attaching a telephoto extender between the camera body and the lens. A 1.4× or 2× teleconverter gives a larger image, adding macro capabilities. As with an extension tube, less light will reach the film or sensor, therefore a longer exposure time will be needed. - Using a smaller film or sensor. Placing a rollfilm adaptor on a 4×5 view camera can give a macro image. Likewise, using only the central 1/4 of the area of a digital sensor (discarding the outer 3/4 of the pixels) results in a larger image. Enlarging a small portion of a 35 mm negative or slide also results in a larger image. Photographers might debate whether this is true macro photography, but semantics aside, it can result in a frame-filling photograph that is as large as the original subject. - Reversing the lens using a "reversing ring". This special adapter attaches to the filter thread on the front of a lens and makes it possible to attach the lens in reverse. Excellent quality results up to 4x lifesize magnification using fairly cheap, "standard" (not specially designed for macro) lenses can be produced. For cameras with all-electronic communications between the lens and the camera body, such as Canon EOS, reversing rings are available which allow all camera functions, including open aperture metering, to be used. When used with extension tubes or bellows a relatively cheap but highly versatile macro system can be assembled. - Reversing a lens of lesser focal length in front of a normally mounted lens using a very inexpensive "macro coupler," which uses two male filter threads to join lenses. This method allows most cameras to maintain the full function of electronic communcation with the normally mounted lens for features such as open-aperture metering. Magnification ratio is calculated by dividing the focal length of the normally mounted lens by the focal length of the reversed lens (i.e., when a 50 mm lens is reverse mounted on a 200 mm lens a 4:1 magnification ratio is achieved). The use of automatic focus is not recommended due to the extra weight of the reverse-mounted lens. Attempted use of automatic focus with this technique could result in damage to the camera or lens. Technical considerations Edit Depth of field is an important consideration in macro photography. This makes it essential to focus critically on the most important part of the subject. Parts of the subject that are even a millimeter closer or farther might be noticeably blurry. Due to this, the use of a microscope stage is highly recommended for precise focus with large magnification such as photographing skin cells. Camera movement can be a problem at extremely close distances due to the paper-thin Depth of field. Use of a tripod or other camera support can be extremely helpful, and is essential when lighting conditions require slow shutter speeds. Tripods and other supports can be equipped with a Macro rack, a device that allows fine movement of the camera toward or away from the subject along the lens axis without moving the tripod. Lighting can be difficult. Some cameras can focus on subjects so close that they touch the front piece of glass in the lens. It's impossible to place a light between the camera and a subject that close, making this extreme close-up photography impractical. A normal-focal-length lens (50 mm on a 35 mm camera) can focus so close that lighting remains difficult. To get more distance between the camera and the subject, photographers use telephoto macro lenses. Focal lengths from about 100 to 200 mm are popular. This permits lighting. Ring flashes, with flash tubes arranged in a circle around the front of the lens, can be helpful in lighting at close distances. More recently, ring lights have emerged, using white LEDs to provide a continuous light source for macrophotography. - This article contains information originally taken from the Wikipedia article "Macro_photography". You can see the authorship and revision history of that article here. - Macro Lenses. Special lenses for close-up work. - Trick Photography and Special Effects by Evan Sharboneau a very popular instructional eBook that explains how to do most of the trick photos that often capture attention and amazement from viewers. - Macro photography - photo gallery of macro images. - Macro and Close up photography - photo gallery with good examples of macro images. - Use of Microscope Stage for Microphotography - Macrophotography on a Budget - Extender lens using Pringles Can - Canon Lens Reviews - Numismatic Cabinet - Macro Photo Galleries of Coins - Inespensive Macro Photography DSLR with Manual Focus Lens
<urn:uuid:e014a4bc-437b-464f-8f92-41768c7b8e22>
CC-MAIN-2020-34
https://photography.fandom.com/wiki/Macro_Photography?veaction=edit
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736972.79/warc/CC-MAIN-20200806151047-20200806181047-00018.warc.gz
en
0.925728
1,594
3.34375
3
[ 14155, 305, 16223, 318, 257, 1611, 286, 1969, 12, 929, 16223, 287, 543, 262, 2939, 319, 2646, 393, 7914, 12694, 318, 379, 1551, 355, 1588, 355, 262, 2426, 13, 8447, 11, 319, 3439, 3020, 2646, 357, 1640, 1672, 828, 262, 4676, 468, 284, 423, 262, 2694, 284, 2962, 319, 281, 1989, 379, 1551, 355, 1402, 355, 1987, 12906, 2623, 8085, 11, 355, 428, 318 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
How an ancient North American civilization was plundered in the twentieth century When a group of relic hunters drove their picks into a lost Indian burial crypt in eastern Oklahoma in 1935, they unearthed a vast treasure trove of Mississippian art—considered by many at the time to be America’s answer to King Tut’s Tomb. They also ignited a controversy that continues to have repercussions throughout archaeological and American Indian communities. The Spiro Mounds contained some of the most impressive pre-Columbian Indian art ever found. In Looting Spiro Mounds, David La Vere takes readers behind the scenes of this discovery to re-create a Great Depression–era archaeological adventure worthy of Indiana Jones. The looting of the mounds is considered one of the major archaeological tragedies of all time. Today Spiro artifacts are scattered among the world’s museums, with some still circulating in the antiquities market and eagerly snatched up by collectors. La Vere weaves a compelling story of grave robbers and lost treasures as he pieces together the puzzle of the civilization that thrived at Spiro from A.D. 800 to 1450. He plumbs the mystery of why the people of Spiro abandoned the site, leaving behind their treasures but no forwarding address. Looting Spiro Mounds explains what the continuing mystique of Spiro artifacts is all about as the book uncovers a controversy—and a mystery—that lives on to this day.
<urn:uuid:72a61e2f-a0dc-4bcb-9a17-64d3e7918fe7>
CC-MAIN-2021-25
https://oupress.com/books/9781270/looting-spiro-mounds
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488504838.98/warc/CC-MAIN-20210621212241-20210622002241-00016.warc.gz
en
0.941709
297
2.984375
3
[ 2437, 281, 6156, 2258, 1605, 14355, 373, 458, 917, 1068, 287, 262, 29112, 4289, 198, 2215, 257, 1448, 286, 26341, 21490, 10357, 511, 11103, 656, 257, 2626, 3942, 23867, 8194, 287, 10183, 10433, 287, 30704, 11, 484, 41562, 257, 5909, 14068, 42377, 286, 12732, 3974, 666, 1242, 960, 5936, 3089, 416, 867, 379, 262, 640, 284, 307, 2253, 447, 247, 82, 3280, 284, 2677 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Reading can be a wonderful pastime. It can broaden your outlook, the way you see the world. Reading can make you more informed about events around you, or even just entertain and amuse you. But how can you get the most of the times you set aside to read? Having good reading skills can be tremendously useful. It can save you time, or at least make sure that you don't waste time, by helping you properly absorb all the words and concepts. This article will discuss some ways that you can improve your reading skills, and perhaps enjoy reading even more! To gain knowledge and understanding when we read, we need to take time to pause and really think. Yes, take some time to fully understand each phrase that you meet. Some times it takes a while to to really grasp some ideas, as I have often found myself. But don't be afraid to re-read a sentence. This can be really beneficial in connecting the whole book together. So as you come across every sentence, be sure to 'chew' it carefully. Don't cheat yourself by skipping out lines. Think about how the ideas relate to each other, this will help you form a clear picture of the plot in your head. Try to anticipate what might happen next, and what the writer is trying to express. You might find that this helps you to be more engaged in your book. Reading can be so hard to do, when you are in a noisy environment. Choosing a calm comfortable area to read can help you to focus and may make reading a pleasure. Also choose somewhere that has good lighting, so you don't find yourself squinting down at your book. That won't be very good for you. Keeping focused while you read is important. If you are constantly raising your head to catch something on the TV, for instance, you will not be able to absorb as much as you would if you focused on the book. I remember how when I was younger, my teachers always used to encourage us to read for at least 15 minutes a day. And that is a really good habit. Practice makes perfect, so why not practice reading? Of course, you may want to increase the time to 30 minutes a day, so you can really get somewhere, but it's up to you. But like with most things, regularity is important. So stick to the set amount of time to read everyday. You would be surprised how books you may be able to finish in a few weeks, if you just keep to a steady schedule. This will really improve your reading skills, as reading becomes an exciting part of your daily routine. Improve your reading skills by reading a variety of literature. There are so many books out there on a variety of topics. If you are someone who normally likes to read fiction and fantasy, it may be idea to read some nonfiction material. Go out of your comfort zone, and explore different authors and genres of books. I have found some of my favorite books by doing this. Reading a variety of things will greatly enrich you. It will make you smarter. And it will enable you to understand more situations that you encounter. You may like to plan in advance the next book you want to read, why not choose something slightly different. You can ask your friends and family what books they have recently enjoyed reading, and this may help you discover some good reads. What are the different types of literature that you can read? Here are a few: Reading to others is a great way to improve your reading skills. As you read to others you are more aware of the way you are reading and when you misread or mispronounce a word. When you read to others you will also get some feedback which will help you to identify the areas in which you can improve. Reading out loud is generally a good way for you to really hear yourself. It will enable you to reflect on your tone of voice and clarity of speech. So keep practicing your reading skills, and see the way you improve and become a great reader! Mar 21, 19 11:57 PM Let's discuss types of marketing strategy that businesses can deploy to reach their ideal customer in the best way. Select your strategies and watch them work. Mar 11, 19 11:58 PM In Other Words has to be one of the best books I've ever read. It tells the story of Jhumpa Lahiri's journey into the Italian language, a journey I relate to... Mar 04, 19 10:26 PM On the internet we hear the phrase 'Stay Hungry' quite a lot, but what does it actually mean? Let's talk about what it means to stay hungry & why you should. If you can see this, please share this post with the buttons below :)
<urn:uuid:93bd60ce-8b07-4379-83a8-472070900714>
CC-MAIN-2019-13
https://www.roliedema.com/reading-skills.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203378.92/warc/CC-MAIN-20190324063449-20190324085449-00515.warc.gz
en
0.972975
973
2.8125
3
[ 36120, 460, 307, 257, 7932, 1613, 524, 13, 632, 460, 44870, 534, 19360, 11, 262, 835, 345, 766, 262, 995, 13, 11725, 460, 787, 345, 517, 7981, 546, 2995, 1088, 345, 11, 393, 772, 655, 8204, 290, 26072, 345, 13, 887, 703, 460, 345, 651, 262, 749, 286, 262, 1661, 345, 900, 7263, 284, 1100, 30, 11136, 922, 3555, 4678, 460, 307, 34355, 4465 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Doctors call for earlier autism screening The leading pediatricians' group in the United States is making its strongest push yet to have all children screened for autism twice by age 2, warning of symptoms such as babies who don't babble at 9 months and 1-year-olds who don't point to toys. |Report an Error| Share via Email CHICAGO–The leading pediatricians' group in the United States is making its strongest push yet to have all children screened for autism twice by age 2, warning of symptoms such as babies who don't babble at 9 months and 1-year-olds who don't point to toys. The advice is meant to help both parents and doctors spot autism sooner. There is no cure for the disorder, but experts say that early therapy can lessen its severity. Symptoms to watch for, and the call for early screening, come in two new reports. They are being released by the American Academy of Pediatrics today at its annual meeting in San Francisco and will appear in the November issue of the journal Pediatrics and on the group's website, aap.org. The reports list numerous warning signs, such as a 4-month-old not smiling at the sound of mom or dad's voice, or the loss of language or social skills at any age. Experts say one in 150 U.S. children have the troubling developmental disorder. Autism Society Canada puts the figure at about one in 165 children. The new reports say children with suspect cases should be treated before a formal diagnosis is made. In Ontario, there has been no push for testing, although the provincial government has explored the feasibility of universal developmental surveillance – which includes early signs of autism – focused on 18 months as a start, said Dr. Wendy Roberts of the autism research program at the Hospital for Sick Children. There are basic warning signs at 12 months, including babies not pointing at things of interest in attempts to get their parents to look. Debbie Hrybinsky, president of the Toronto chapter of Autism Ontario, and parent of autistic son Matthew, 7, called the U.S. recommendations a positive step. Her son's autism was confirmed by the time he was 3. Her son would have benefited from the guidelines being proposed in the U.S., she said. "If we got the diagnosis sooner I think he'd be further ahead,'' Hrybinsky said last night. Dr. Chris Johnson, co-author of the new reports and a researcher at the University of Texas Health Science Center in San Antonio, said: "Parents come into your office now saying `I'm worried about autism.' Ten years ago, they didn't know what it was." The authors caution not all children who display a few symptoms are autistic and parents should not overreact to quirky behaviour. Just because a child lines up toy cars or has tantrums "doesn't mean you need to have concern, if they're also interacting socially and also pretending with toys and communicating well," said co-author Dr. Scott Myers, of Danville, Pa. Recommended treatment for autism should include at least 25 hours a week of intensive behaviour-based therapy, including educational activities and speech therapy, according to the reports. For very young children, therapy typically involves fun activities, such as bouncing balls back and forth or sharing toys to develop social skills; there is repeated praise for eye contact and other behaviour autistic children often avoid. - Photos Updated Two Canadians among 239 aboard missing Malaysia Airlines plane - Police take out new search warrant in Mayor Rob Ford case - OPP will take ORNGE probe to Italy - Mayor Rob Ford unaware of ex-aide's part in federal kicback scheme - Raptors cruise to comfortable win in Rudy Gay’s return to Toronto - Roberto Luongo makes triumphant homecoming as a Panther: DiManno - Sunshine List: More than a third of Toronto police officers earned $100,000 - Fog of war lifts in Ukraine, death toll upped to 100
<urn:uuid:cf48934e-f798-48b2-8569-945569b0d722>
CC-MAIN-2014-10
http://www.thestar.com/life/health_wellness/2007/10/29/doctors_call_for_earlier_autism_screening.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653644/warc/CC-MAIN-20140305060733-00085-ip-10-183-142-35.ec2.internal.warc.gz
en
0.962473
829
2.546875
3
[ 47087, 869, 329, 2961, 15998, 14135, 198, 464, 3756, 29775, 1547, 6, 1448, 287, 262, 1578, 1829, 318, 1642, 663, 12841, 4574, 1865, 284, 423, 477, 1751, 32862, 329, 15998, 5403, 416, 2479, 362, 11, 6509, 286, 7460, 884, 355, 11903, 508, 836, 470, 9289, 903, 379, 860, 1933, 290, 352, 12, 1941, 12, 10119, 508, 836, 470, 966, 284, 14958, 13, 198, 91 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
10 Astonishing Facts About America’s Founding Fathers Many of us will recognize the majority of names on this list, having learned about their integrity, honor, and imprint on American history. However, many of the trivial and unflattering details of their lives are often left out of the classroom. The following stories relate astonishing facts that few of us know about 10 Founding Fathers of the United States of America. 10 Prison For An American Hero Robert Morris, a Founding Father who signed the Declaration of Independence, Articles of Confederation, and the United States Constitution, was known as the “Financier of the Revolution.” Without Morris, the colonies would have failed to secede from British rule. Nevertheless, he spent a few of his final years behind bars. Upon his retirement, Morris embarked on risky investments, one of which was building a mansion designed by renowned architect Pierre L’Enfant. When the market crashed, Morris couldn’t make the interest payments and taxes owed on the estate, and in February 1798, a creditor had him arrested. He was incarcerated in a Philadelphia debtor’s prison for 3.5 years, only to be released following the passage of a federal bankruptcy law. Sadly, in his final years, his wealth was gone and he lived on a small pension that his cousin had arranged for his wife, Mary. 9 Scattered Remains Thomas Paine—Founding Father, author, and hero of both the American and French Revolutions—spent his final years as an alcoholic who died broke and alone. Only six people attended his funeral in 1809. Paine had fallen out of public favor because he opposed organized religion and disagreed with the country’s elites. His burial wishes were disregarded, and he was laid to rest in a modest grave on his farm. A decade later, William Cobbett disinterred Paine’s remains without permission and brought them to London with the hope of giving Paine a proper and honorable burial. Cobbett’s grand plans, however, never materialized. Paine’s bones were passed down to Cobbett’s descendants and scattered across the world after being sold off piece by piece. Today, it is said that Paine’s head is in Australia while the rest of his remains are at the four corners of the world. 8 The Suffering Of Benjamin Franklin When the Europeans arrived in North America, they brought crude opium, either alone or dissolved in liquid. The drug was highly regarded as a means to diminish pain and often abused by colonists, including Founding Father Benjamin Franklin. Few know of Franklin’s physical suffering in his last years of life, much of which was attributed to a kidney stone. During his final 12 months, he was confined to bed. To treat Franklin’s unbearable intermittent pain, Dr. John Johns provided Franklin with laudanum, a mixture of opiates and alcohol. At the time, few knew of the dangers or addictive power of opium. When Franklin died in 1790, he was severely addicted to the drug. 7 The Wealthy Smuggler In the 18th century, 40 percent of all British exports to the northern American colonies had to enter via the Port of Boston. These exports were protected by the British through a series of trade taxes imposed by the Navigation Acts. Although John Hancock was a man of enormous wealth (having inherited most of his fortune in his mid-twenties), he avoided paying these duties to the British by illegally smuggling exports such as French molasses, tea, glass, lead, paper, tobacco, rum, and wine. His fortune grew until the late 1760s when he was formally charged with smuggling. Hancock sought the counsel of John Adams, an attorney who was the cousin of Hancock’s closest friend, Samuel Adams. Although Hancock was guilty, Adams got Hancock relieved of all charges. 6 William Blount’s Conspiracy William Blount, Governor for the Territory South of the River Ohio as well as Superintendent of Indian Affairs for the Southern Department, was a popular frontiersman who led Tennessee to full statehood in 1796. That year, Blount also became one of the first US Senators and served as chairman for Tennessee during the Constitutional Convention. Soon after, Blount conspired with Britain to conquer the Spanish provinces of Florida and Louisiana with the help of British naval forces, frontiersmen, and Native Americans. These plans were exposed in a letter by Blount that unexpectedly fell into the hands of President Adams. Although the Senate responded by impeaching Blount, no further action was taken. Surprisingly, neither the conspiracy nor his impeachment daunted Blount’s popularity among the citizens of Tennessee, and in 1798, he was elected to the state legislature. However, he died only two years later at age 50. 5 Dr. Benjamin Rush Dr. Benjamin Rush, signatory to the Declaration of Independence, is perhaps best known for being the “father of American psychiatry.” Serving on the Pennsylvania Hospital medical staff for 30 years, he brought forth the original idea that mental illness is a disease of the mind rather than a “possession of demons.” In 1812, Rush wrote Medical Inquiries and Observations upon the Diseases of the Mind, the first psychiatric textbook published in the US. Dr. Rush was also the first to believe that people who drank too much alcohol suffered from a disease rather than a failure of free will. This disease concept ultimately led to the term “alcoholic” in 1891. Throughout the late 1800s and early 1900s, those involved in the temperance movement referenced Dr. Rush’s theory to further their political agenda, which eventually led to Prohibition. 4 The Company You Keep The city of Dayton, Ohio, is named after Jonathan Dayton, a leading American politician who represented New Jersey. Dayton was the speaker of the US House of Representatives, the youngest member of the US Constitutional Convention, and Senator for the state of New Jersey. In 1807, Dayton’s career in politics came to a sudden end when he met Aaron Burr, who had coincidentally shot and killed Alexander Hamilton three years earlier. Dayton became involved in Burr’s questionable activities, although the depth of Dayton’s involvement is unclear. After Burr was accused of trying to overthrow and seize the western United States, Dayton was implicated as a coconspirator and arrested for treason. Although the conspiracy became a national scandal, Dayton was never tried nor was there any proof of his involvement in the Aaron Burr case. Regardless, Dayton’s political career was brought to an end and his reputation tarnished. 3 Thomas Jefferson’s DNA For two centuries, there has been speculation as to whether Thomas Jefferson fathered children with of one of his slaves, Sally Hemings. Jefferson neither confirmed nor denied the allegations. Meanwhile, two of Hemings’s children insisted that he was their father. In 1998, Dr. Eugene Foster conducted tests on Y-chromosomal DNA samples of Jefferson and Hemings’s descendants. Foster concluded that an individual carrying Jefferson’s DNA did indeed father Eston Hemings, the last known child born to Sally Hemings. According to Dr. Foster, this compelling evidence, which has been published in the scientific journal Nature, is the simplest and most probable explanation that Thomas Jefferson was the father of Eston Hemings. To support the study, a DNA expert at the Whitehead Institute in Boston stated that there was a less than 1 percent chance that a person chosen at random would share the same Y-chromosomal mutations as in the Jefferson lineage. 2 Poisonous Coffee George Wythe, another signatory to the Declaration of Independence, suffered a horrendous death. In 1806, his black servant, Lydia Broadnax, fixed coffee for herself, Wythe, and 16-year-old Michael Brown. Minutes later, all three were stricken with horrific abdominal pains. Earlier, Broadnax had seen Wythe’s 18-year-old grandnephew, George Wythe Sweeney, toss a piece of paper into the coffeepot, leading Wythe to insist that Sweeney had poisoned them. Before the poisoning, Wythe had threatened to cut Sweeney out of his will. Sweeney had been forging checks and selling Wythe’s prized books to pay his gambling debts. Two days after the three fell ill, Sweeney was jailed for attempting to cash a forged check in Wythe’s name for $100. Wythe died shortly afterward, along with Michael Brown. Sweeney stood trial for murder and forgery. However, Virginia prohibited blacks from testifying against whites, so Broadnax’s claims fell on deaf ears. Sweeney was acquitted of murder, and the forgery charges were eventually dropped. 1 Duel To The Death Founding Father Alexander Hamilton and Vice President Aaron Burr had a long-standing rivalry. Burr even claimed that he lost the presidency because of Hamilton’s interference. As Burr’s vice-presidential term neared its end, he ran for governor of New York, only to lose following Hamilton’s public opposition. Infuriated, Burr challenged Hamilton to a duel and Hamilton accepted. On July 11, 1804, the two men raised their pistols and fired a single shot. Burr walked away from the fight unscathed, but Hamilton succumbed to his injury the following day. As dueling was against the law in the state of New York, Burr was later charged with murder. Ultimately, the charges against him were dropped and he passed away 32 years later in 1836. Adam is just a hubcap trying to hold on in the fast lane.
<urn:uuid:ca1ae515-17ce-4f6d-801e-6dde14b1d839>
CC-MAIN-2017-22
http://listverse.com/2016/08/15/10-astonishing-facts-about-americas-founding-fathers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608659.43/warc/CC-MAIN-20170526105726-20170526125726-00415.warc.gz
en
0.980706
2,012
3.34375
3
[ 940, 33644, 3929, 26972, 7994, 2253, 447, 247, 82, 44593, 30969, 198, 7085, 286, 514, 481, 7564, 262, 3741, 286, 3891, 319, 428, 1351, 11, 1719, 4499, 546, 511, 11540, 11, 7522, 11, 290, 29122, 319, 1605, 2106, 13, 2102, 11, 867, 286, 262, 20861, 290, 42880, 16475, 3307, 286, 511, 3160, 389, 1690, 1364, 503, 286, 262, 15806, 13, 383, 1708, 3923, 15124 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Posted: 30 Mar 2017 10:23 AM PDT full ScienceDaily article here Playing ‘natural sounds’ affects the bodily systems that control the flight-or-fright and rest-digest autonomic nervous systems, with associated effects in the resting activity of the brain, new research shows. The gentle burbling of a brook, or the sound of the wind in the trees can physically change our mind and bodily systems, helping us to relax. New research explains how, for the first time. Researchers at Brighton and Sussex Medical School (BSMS) found that playing ‘natural sounds’ affected the bodily systems that control the flight-or-fright and rest-digest autonomic nervous systems, with associated effects in the resting activity of the brain. While naturalistic sounds and ‘green’ environments have frequently been linked with promoting relaxation and wellbeing, until now there has been no scientific consensus as to how these effects come about. The study has been published in Scientific Reports….. When listening to natural sounds, the brain connectivity reflected an outward-directed focus of attention; when listening to artificial sounds, the brain connectivity reflected an inward-directed focus of attention, similar to states observed in anxiety, post-traumatic stress disorder and depression. There was also an increase in rest-digest nervous system activity (associated with relaxation of the body) when listening to natural compared with artificial sounds, and better performance in an external attentional monitoring task. Interestingly, the amount of change in nervous system activity was dependant on the participants’ baseline state: Individuals who showed evidence of the greatest stress before starting the experiment showed the greatest bodily relaxation when listening to natural sounds, while those who were already relaxed in the brain scanner environment showed a slight increase in stress when listening to natural compared with artificial sounds. …Artist Mark Ware commented, “Art-science collaborations can be problematic, often due to a lack of shared knowledge and language (scientific and artistic), but the team at BSMS has generously sought common ground, which has resulted in this exciting and successful outcome. We have plans to continue collaborating and I am keen to explore how the results of this work might be applied to the creation and understanding of time-based art (installations, multimedia performance, and film) for the benefit of people in terms of wellbeing and health.” Cassandra D. Gould van Praag, Sarah N. Garfinkel, Oliver Sparasci, Alex Mees, Andrew O. Philippides, Mark Ware, Cristina Ottaviani, Hugo D. Critchley. Mind-wandering and alterations to default mode network connectivity when listening to naturalistic versus artificial sounds. Scientific Reports, 2017; 7: 45273 DOI: 10.1038/srep45273
<urn:uuid:d40efb77-3745-4674-8d3a-fd109153b411>
CC-MAIN-2020-50
https://elliecohen.org/2017/03/31/its-true-the-sound-of-nature-helps-us-relax/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141727782.88/warc/CC-MAIN-20201203124807-20201203154807-00042.warc.gz
en
0.926304
567
3.078125
3
[ 14231, 25, 1542, 1526, 2177, 838, 25, 1954, 3001, 28288, 1336, 5800, 28545, 2708, 994, 198, 36530, 564, 246, 11802, 5238, 447, 247, 10975, 262, 20734, 3341, 326, 1630, 262, 5474, 12, 273, 12, 69, 3506, 290, 1334, 12, 12894, 395, 11827, 291, 10927, 3341, 11, 351, 3917, 3048, 287, 262, 19186, 3842, 286, 262, 3632, 11, 649, 2267, 2523, 13, 198, 464, 10296 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Tanganyika by night The exhibit presents nocturnal African animal species, such as Senegal bushbaby, Northern greater galago, Southern tree hyrax (a small mammal related to elephants and so far kept in the zoo back-stage facility), or African rock python. However, visitors will find several new species as well, e.g. African brush-tailed porcupine, Four-toed hedgehog, Electric catfish, or Giant African millipede - a representative of invertebrates. Nocturnal exhibits are based on a reverse light regime. The lights in the exhibit are switched on during the night, and on the contrary, during the daytime the night light conditions are created by the blue light by which the animals are not disturbed. Therefore, the visitors have a chance to see nocturnal animals naturally active.
<urn:uuid:a90f890f-8f8a-4a49-94c8-6206cd028424>
CC-MAIN-2017-47
http://zooostrava.cz/en/exhibits-and-animals/exhibits/660-tanganyika-by-night.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805923.26/warc/CC-MAIN-20171120071401-20171120091401-00495.warc.gz
en
0.948593
170
2.890625
3
[ 43909, 1092, 9232, 416, 1755, 198, 464, 15866, 10969, 645, 310, 35735, 5510, 5044, 4693, 11, 884, 355, 49657, 24484, 40252, 11, 8342, 3744, 9426, 3839, 11, 8050, 5509, 2537, 32040, 357, 64, 1402, 46103, 3519, 284, 25368, 290, 523, 1290, 4030, 287, 262, 26626, 736, 12, 14247, 6841, 828, 393, 5510, 3881, 21015, 13, 2102, 11, 9692, 481, 1064, 1811, 649, 4693, 355 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
In the broad feeling, apparel also involves headgear, footwear, gloves, and comparable articles or blogposts. Ornamentation plays a supplementary function in outfits.Along with housing, apparel arose as just one of the principal means of defense from the factors. Some bourgeois scholars accept this utilitarian concept of the origin of outfits, but lots of manage an idealistic issue of see and assert that the donning of outfits originated mainly as a final result of modesty, an aesthetic awakening (clothes as an extension of ornamentation), or religious and magical beliefs.Russian garments. The earliest information about historic Russian outfits dates from the time period of Kievan Rus’. With the acceptance of Christianity at the conclusion of the tenth century, the princes adopted Byzantine costume as ceremonial wear. Nevertheless, a sure originality of Reduce was introduced to the costume, and the decoration was fewer lavish. Masculine peasant attire consisted of a coarse, sackcloth shirt, woolen trousers, bast footwear, and onuchi (cloths wrapped all-around the ft). Cool Funny Tshirts A narrow belt, embellished with patterned steel spangles, added a attractive touch to the stylistically straightforward ensemble. A shuba and a sharply pointed fur hat served as outer apparel. The gown of the Kievan princesses carefully resembled Byzantine attire, but the effect of a rigid trunk was avoided by the use of softer fabrics. The principal article of clothes among the city and peasant women was the chemise. Gals possibly wore a garment comparable to a poneva (peasant female’s homespun skirt). An ubrus (ornamental kerchief) served as the head masking. The most commonly applied resources had been sackcloth (canvas) and woolens, which normally had printed patterns. Apparel is 1 of the most historic inventions of person Late Paleolithic remains incorporate stone scrapers and bone needles applied for treating and sewing animal skins. Other resources used for clothing in the late Paleolithic incorporated leaves, grass, and bark (for case inpoint, the peoples of Oceania utilized tapa). Hunters and fishermen utilized fish skins, the intestines of Steller’s sea lions and other sea animals, and chook skins. In the Neolithic, immediately after learning the arts of spinning and weaving, folks created apparel from the fibers of wild vegetation. The transition throughout the Neolithic to stock raising and land cultivation led to the use of the wool of domestic animals and fabric created from the fibers of these cultivated vegetation as flax, hemp, and cotton.The prototypes of sewn garments were the primitive cloak (animal pores and skin) and the loincloth. From the cloak progressed these kinds of slipon content articles of garments as the toga, the tunic, the poncho, the burka, and the shirt. Many varieties of waisted garments, this kind of as the apron, the skirt, and trousers, derived from the loincloth.The most easy sort of historic footwear consisted of sandals or just a piece of animal pores and skin that was wrapped close to the feet. The latter is thought of to be the ancestor of the leather morshni (porshni) of the Slavs, the chuviaki of the peoples of the Caucasus, and the moccasins of the American Indians. Bark (in Japanese Europe) and Wooden (amongst sure peoples of Western Europe) ended up also utilized for footwear.Since historic occasions, headgear served as protection and as an emblem indicating social status (for case in point, the headgear of chieftains or of monks of heathen religious cults). It has also mirrored spiritual and magical beliefs (for example, headgear depicting an animal’s head). Clothes is generally tailored to geographic circumstances And its varied types and the content from which it is created are identified by climate. The most historic clothing of the peoples of the tropicalforest zone, for instance, in Africa and South The unitedstates, consisted of a loincloth, an apron, and a cape. In moderately chilly and arctic locations, outfits included the complete overall body. A distinction is made among the apparel of the Much North and of northern regions with cold temperate climates. The garments worn by the peoples of the Much North are completely built from fur. The peoples of Siberia have two attribute varieties of fur garments. In the polar zone, a thick, pullover fur garment is worn among the this sort of peoples as the Eskimo, Chukchi, and Nentsy. In the taiga zone, the outfits is loose and opens in entrance (for illustration, amid the Evenki and the Yakuts). Exclusive garments built of suede, chamois, or tanned leather-based appeared among the Indians of the North American forest zone: the Ladies wore a very long, shirtlike garment, and the Guys wore a very long shirt and significant leggings.The forms of garments are closely related with person’s economic exercise. Consequently, in early antiquity a variety of clothing acceptable for horseback riding developed among nomadic peoples who engaged in inventory boosting. Equally the men and the women wore robes and vast trousers.As Culture turned a lot more complicated, variances in social and familial positions significantly motivated clothes. Distinctions appeared amongst Males’s and Girls’s apparel and between the clothes of unmarried and married Gals. Everyday, festive, wedding day, and mourning clothing appeared. As labor grew to become extra diversified, different kinds of occupational garments designed. In the early levels of background, clothing mirrored ethnic (clannish and tribal) characteristics, and subsequently basic countrywide characteristics, such as community variants, had been reflected.
<urn:uuid:b9078623-c893-4450-ade0-2e999ae86341>
CC-MAIN-2021-21
https://rankerx1.com/the-common-time-period-for-the-synthetic-coverings/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991514.63/warc/CC-MAIN-20210518191530-20210518221530-00519.warc.gz
en
0.946089
1,172
2.71875
3
[ 818, 262, 3154, 4203, 11, 34273, 635, 9018, 1182, 31763, 11, 43463, 11, 18051, 11, 290, 13975, 6685, 393, 4130, 24875, 13, 49359, 3263, 341, 5341, 257, 43871, 2163, 287, 27655, 13, 24035, 351, 5627, 11, 34273, 21172, 355, 655, 530, 286, 262, 10033, 1724, 286, 3761, 422, 262, 5087, 13, 2773, 19749, 9123, 2453, 428, 48239, 3721, 286, 262, 8159, 286, 27655, 11 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Key Stage 3 The science curriculum at KS3 covers all areas of biology, chemistry and physics, moving on from one subject to the next approximately every term. This structure is similar to the way that students complete their GCSE course so they are well prepared for KS4. The recent change in the curriculum at KS3 sees an increase in the development of specific skills such as analysis and evaluation, scientific communication and investigative skills. Assessment involves a formal test, approximately every half term, which includes extended writing, numeracy and working scientifically. The Year 7 content has an emphasis on cell biology, moving onto the structure and function of body systems and a specific focus on reproduction in mammals and plants, and the foundations of chemistry (particles and their behaviour; elements, atoms and compounds; chemical reactions; and acids and alkalis). Forces and space are the two physics topics that are also covered. In Year 8 health and lifestyle, ecosystem processes and adaptation and inheritance are the biology topics. The periodic table, separating mixtures and the Earth are studied in chemistry while physics focuses on waves, with both sound and light being covered. This leaves one chemistry topic (metals and acids) and three physics topics (electricity and magnetism; energy; and motion and pressure) to be completed in the first term of Year 9, at which point the students will have completed the KS3 course. After Christmas in Year 9 students start their KS4 science studies. Key Stage 4 Students follow one of two learning routes: - The majority of students will complete the AQA Combined Science (Trilogy) course which is a double award and counts as two GCSEs. - Our most able students will continue to take the three sciences (biology, chemistry and physics) as separate GCSE subjects. All the courses are linear with all the exams being completed at the end of Year 11 In the Combined Science biology course the Year 9 programme of study covers cells and organisation, moving on to disease and bioenergetics in Year 10. In the final year biological responses, genetics and reproduction and ecology are the main topics. Students taking the separate biology GCSE cover some areas in more depth and also extra topics such as homeostasis and sustainable food production. The Year 9 chemistry programme focuses on atomic structure, linked to the periodic table, and the structure and bonding of ionic and covalent compounds. Year 10 includes chemical calculations, chemical reactions and energy changes and Year 11 sees the introduction of rates and equilibrium, chemical analysis and environmental chemistry. The separate GCSE chemistry programme also has a significant organic chemistry content, along with an extra section on using resources. Physics starts with energy and energy resources in Year 9 and then electricity, thermal physics and radioactivity in Year 10. The final year programme focuses on forces and motion and the properties and uses of waves. Those studying physics as a separate GCSE will also cover pressure, space and a much more in-depth study of light waves and electromagnetism. We offer OCR biology, chemistry and physics courses at A Level. These courses are academically challenging and prepare students well for studying science, engineering and related courses, such as medicine, at university. The courses all have a significant practical element, with students being awarded a practical endorsement alongside their A-level qualification. Extra Curricular Activities We aim to stimulate as many minds as possible with a variety of activities that range from lectures and demonstrations to clubs, quizzes and competitions. In recent years groups of KS3 students have competed in the MBDA Robot Rumble and Glider competitions and students of all ages have entered and won prizes at the prestigious Big Bang events. We also organise a variety of external trips, including in recent years Year 8 trips to Whipsnade Zoo and a residential trip to CERN in Switzerland. Other Useful Websites Our lively and expanding department is made up of specialist teaching staff, technicians and dedicated learning assistants. - Dr Richard Blackford – Head of Department - Ms Helen Bonner – 2nd in Department - Mr Lawrence Foster – Teacher of Science; Deputy Headteacher (Behaviour & Attendance) - Mrs Sandra Hibbert – Teacher of Science; Assistant Headteacher (Data & Assessment) - Mrs Faye Nearney – Teacher of Science; Deputy Headteacher (Curriculum & Safeguarding) - Dr Alan Reid – Lead Practitioner in Science - Mrs Cara Matthews – 3rd in Department - Mr Ben Stokes – Teacher of Science - Mr Richard Parmar – Teacher of Science - Miss Alex Duric – Teacher of Science; Head of Year 9 - Dr Carolyn Kisby – Teacher of Physics - Miss Olivia Bradley – Teacher of Science - Miss Alice Mills – Teacher of Science - Mr Simon Poliakoff – Teacher of Science; Lead Practitioner Data & Assessment - Mrs Joanna Willis – Teacher of Science - Mrs Julie Simpson – Science Technician - Ms Natalie Graham – Science Technician
<urn:uuid:835e5c14-5cc1-4f69-9b8c-d5d10f541809>
CC-MAIN-2021-43
https://www.priory.herts.sch.uk/departments/science/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00138.warc.gz
en
0.929486
1,021
3.5
4
[ 9218, 15371, 513, 198, 464, 3783, 20583, 379, 34172, 18, 8698, 477, 3006, 286, 17219, 11, 16585, 290, 11887, 11, 3867, 319, 422, 530, 2426, 284, 262, 1306, 6702, 790, 3381, 13, 770, 4645, 318, 2092, 284, 262, 835, 326, 2444, 1844, 511, 20145, 5188, 1781, 523, 484, 389, 880, 5597, 329, 34172, 19, 13, 383, 2274, 1487, 287, 262, 20583, 379, 34172, 18 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Distribution of Coal in India Occurrence: Major coalfields in India lie East- West , starting from a point approximately 185 km NW of Kolkata (Calcutta) and streaching ewestward. Distribution of coals in India can be subdivided into a) Lower Gondowana Coalfields, b) Upper Gondowana Coalfields, c) Tertiary Coalfields. The tables below show over all distribution of coalfields in India. Gondowana Coals are most important in India and account for more than 90% of coal production in country. The land mass of southern hemisphere was united with South Africa, India, Australia and possibly South America. India drifted north-east relative to Africa and the Gondowana landmass was exposed to sub-aerial conditions for a long period of time. The initiation of Gondowana period is marked by a glacial period (evidenced by Talcher Series). Climate changed to a more temperate condition in later period melting snow and allowing prolific growth of vegetation. This huge vegetation got buried and produced Gondowana Coals. The land subsidence began in the east giving rise to a great depth of Barakar and Ranigunju measures. The great depth along with earth movement allowed the coal seam to lose moisture and volatile matter and change in chemical conditions and sometimes converted to coke (example: Barakar Strata). To the west, subsidence was less as evidenced by thin and poor quality coal seams. Tertiary Coals contribute very little of the total coal production in India. They usually have high sulfur content (2-8%). a) Lower Gondowana Coalfields in India: |West Bengal||Damodar Valley||Raniganj (Trans Barakar),Bankura| |Darjeeling District||Bagrakote, Tindharia| |Bihar||Damodar Valley||Ranigunj (Cis Barakar), Jharia, Bokaro, Chandrapura, South Karampura, North Karampura, Ramgarh| |Rajmahal Area||Hura, Gilhuria and Jilbari, Chuparbhita, Pachwara, Brahmini| |Deogarh Area||Kundit Kuria, Sahajuri, Jainti| |Hazaribagh District||Giridhi, Chope, Itkhori.| |Palamu Region||Anuranga, Daltongunj, Hutar| |Madha Pradesh||South Rawa Region||Singrauli, Korar, Johilla river, Umaria, Sohagpur| |North Chattishgarh Region||Jhilmili, Tatapani-Ramkola, Sanhat, Jharkhand, Chirimiri-Kurasia, Koreagarh, Bassar, Bisrampur, Lakhanpur, Panchbhaini, Dambhamunda, Sendargarh| |South Chattishgarh Region||Hasdo -Rampur, Korba, Raigarh, Mand River, Kankani.| |Satpura Region||MOhpani, Sonada, Sahpur (Tawa), Dulhara (Tawa), Pathakera, Bamhanwara, Upper Tawa Valley, Kanhan Valley, Pench Valley.| |Maharashtra||Wardha Valley||Kamptee, Bandar, Warora, Rajur (Wun), Ghugus – Telwasa, Chanda, Ballarpur, Wamanapalli, Antargaon – Aksapur, Sasti – Rajpura.| |Orissa||Mahanadi Valley||Talcher, Ib river (Rampur – Hingir).| |Andhra Pradesh||Pranhita – Godavari Valley||Tandur Kanala, North Godavari, South Godavari, Jangam, Chinur-Sendrapalli, Kamavaram, Bandala – Alapalli, Singareni (yellendu), Lingala, Kothagudium, Damar-cherla, Kannergiri, Beddadanuru.| |Uttar Pradesh||Kota (in Mirzapur District)| |Assam||Abor, Aka and Daphla Hills| b) Upper Gondowana Coalfields in India: |Madhapradesh||Satpura Region||Hard River Valley| C) Tertiary Coalfields in India: |Assam||Upper Assam||Namphuk, Namchik, Makum, Jaipur, Nazira, Janji, Disai| |Mikir Hills||Longloi Hills, Dissoma River, Numbor River, Doigrung River, Koilapahar| |Khasi and Jaintia Hills||Langrin, Barsoura, Wah, Rongah Valley, Lakma, Umasur, Charigaon, Cherrapunji, Um Rileng, Mawlong, Mawbehlarkar, Rangsonoba, Lairango, Jarain, Lakadong, Satunga| |Garo Hills||Karaibari, Rongreggiri, Daranggiri, Tura, Sogring, Waimong| |Jammu and Kashmir||Kalakoth, Methka, Mahogala, Chakar, Dhanswal-Sawalkot, Ladda, Chinkah, Kashmir Valley lignites| |Rajasthan||Palana (in Bikanir)| |Madras||Neyveli (South Arkot), Cuddalore – Pondicherry Area| |Gujrat||Umarsar (in Kutch)| Note: It is really very hard to find any good book on coals in India. I have used “Advanced Coal Mining” by B.M Vorobjev and R.T Deshmukh published in 1964! If you know some good reference other than the book I mentioned, please let us know.
<urn:uuid:140ef3a0-781d-402b-8991-6f505ebb7372>
CC-MAIN-2016-36
http://www.coalgeology.com/distribution-of-coal-in-india/39/
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290765.41/warc/CC-MAIN-20160823195810-00171-ip-10-153-172-175.ec2.internal.warc.gz
en
0.758559
1,323
3.828125
4
[ 20344, 3890, 286, 12896, 287, 3794, 198, 29223, 33928, 25, 8386, 763, 1604, 1164, 82, 287, 3794, 6486, 3687, 12, 2688, 837, 3599, 422, 257, 966, 6702, 22855, 10571, 21966, 286, 509, 13597, 1045, 357, 9771, 8968, 8326, 8, 290, 1937, 8103, 304, 7038, 904, 13, 27484, 286, 763, 874, 287, 3794, 460, 307, 45944, 1384, 656, 257, 8, 16048, 402, 623, 322, 2271 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
An essay can be wonderfully articulated and thought out, but will still result in a poor grade if it doesn’ t adequately answer the prompt provided. break the prompt down into two parts. steps of a basic essay i. introduction ( establishes the paper’ s topic) a. opening statements ( sentences containing some general comments about the subject at hand) b. thesis statement ( 1- 2 sentences saying what the paper is about and how it will be broken down. following this process is the easiest way to draft the steps of writing an essay a successful essay, whatever its purpose might be. Essays written for you. according to kathy livingston’ s guide to writing a basic essay, there are seven steps to writing a successful essay. essay tips: 7 tips on writing an effective essay 1. knowing how to write an essay is a skill that you can use throughout your life. the ability to organize ideas that you use in constructing an essay will help you write business letters, company memos, and marketing materials for your clubs and organizations. steps of writing an essay publish a profitable book ( source: publishaprofitablebook. i steps of writing an essay am so glad you handled my literature essay. let' s not go steps of writing an essay there. besides, they not only praise us for the services that we offer steps but also encourage us to work on areas where they saw could have been done better. the best way to avoid this mid- essay disaster is to plan ahead: you need to write an essay plan! essay planning is one of the most important skills i teach my students. when i have one- to- one tutorials with my students, i always send them steps off with an essay plan and clear goals about what to write. essay planning isn’ t as dull as you think. step- by- step guide to writing an essay. so your teacher assigned another essay to write. does the mere thought of putting pen to paper – or fingers to the keyboard – send shivers down your spine? for many students in elementary, middle or high school, it does, but writing an essay shouldn’ t be intimidating. citibank launching the credit card in asia pacific b case study help, case study solution & analysis & ambition: integrated delivery group that has a significant market share by environment individual pace of expansion dependant on the group’ s monetary power. citibank case analysis essay 1934 words | 8 pages. citibank: launching the credit card in asia pacificmarketing management marc brands masatoshi kaneko oscar lehmann shu yagi juan zatarain janu executive summary we recommend in the first phase to expand the credit card business into india, the philippines, taiwan and thailand. starting with mass- marketing, they withdrew towards a more specific target market, thus effectively “ minimizing credit losses while sustaining a high level of 1 “ citibank india credit cards: strategy for profitable growth”, page 10, paragraph 5, lines 1- 2 2 “ citibank india credit cards: strategy for profitable growth”, page 1. case study: citibank’ s indian business model citigroup opened its first office in india in kolkata ( calcutta) in 1902. with capital nearing us$ 1 billion it is the single largest foreign direct investor in the financial services industry in india. toutes les années depuis ( entrée en vigueur du nouveau programme des séries technologiques) depuis ( date d' entrée en vigueur du nouveau programme des séries générales). les priorités et la philosophie politique du texte constitutionnel dissertation de 4 pages - droit administratif. la loi constitutionnelle du 3 juin 1958 confie le pouvoir de révision steps au « gouvernement investi le 1er juin 1958 », c’ est – à – dire celui présidé par le. comment commencer une writing dissertation universitaire. commencer une dissertation universitaire peut être difficile, surtout si le sujet ne vous inspire pas ou que vous n' êtes pas assez organisé pour articuler vos pensées. mais ne vous inq. la writing raison conduit- elle toujours au bonheur? ( dissertation de philosophie) sujet 3845 la raison suffit- elle à nous garantir le bonheur? sujet 102623 la recherche du bonheur : bien ou mal? sujet 6718 la recherche du bonheur est- elle le fondement de la morale? sujet 101089 la recherche du bonheur est- elle nécessairement immorale? the journal of pediatrics encourages submissions relating to the scientific and health policy implications of the current covid- 19 pandemic that are specific to infants, children, and adolescents. after desk review, manuscripts related to covid- 19 chosen for peer review will undergo rapid review. upon acceptance, the accepted manuscript will be posted on the journal website. work- up of non- febrile pediatric seizures. lab tests may not be necessary in a child who is alert and has returned to a baseline level of function and should be based on clinical suspicion. consider ordering laboratory studies on pediatric patients who: have prolonged seizures, < 6 steps months of age ( specifically for hyponatremia). this is a compilation of cbd and epilepsy studies and well as cbd and seizure studies. cbd and epilepsy as well as cannabidiol and seizure disorders have been a topic of study for quite some time. cannabidiol still remains a steps hot topic of interest today with regard to. overview: this case requires knowledge of hydrocephalus, spina bifida, growth and devel- opment, as well as an understanding of the client’ s background, personal situation, and. jerod is delivered by caesarean section and transferred to the pediatric intensive care unit ( picu). on admission to the nursery he weighs 3. we did not find results for: professional resume writer singapore. check spelling or type a new query. maybe you would like to learn more about one of these? Write argument essay Type essay online Dissertation paper meaning Dissertation proposal writing uk Get writing paragraphs and essays third edition Effect of wind on transpiration Write a 5 paragraph essay this map, called an outline, serves as a diagram for writing each paragraph of the essay, listing the three or four most important ideas that you want to convey. I am always satisfied with the services provided, and what I like the most is the understanding, which had helped a lot. the most important step in writing an essay or research paper is to fully comprehend the essay question.
<urn:uuid:71159994-afde-48a5-8881-5d96056a8012>
CC-MAIN-2022-05
https://orderessaycheap.com/?the.steps.of.writing.an.essay
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301263.50/warc/CC-MAIN-20220119033421-20220119063421-00510.warc.gz
en
0.790059
1,456
3.015625
3
[ 2025, 14268, 460, 307, 33138, 36877, 290, 1807, 503, 11, 475, 481, 991, 1255, 287, 257, 3595, 9559, 611, 340, 1595, 447, 247, 256, 22668, 3280, 262, 6152, 2810, 13, 2270, 262, 6152, 866, 656, 734, 3354, 13, 4831, 286, 257, 4096, 14268, 1312, 13, 9793, 357, 30742, 262, 3348, 447, 247, 264, 7243, 8, 257, 13, 4756, 6299, 357, 13439, 7268, 617, 2276 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Phobias are rather persistent fears which are indeed very irrational. It can be about any object living, non-living or of a situation. It may or may not have any relation to any particular situation in one’s life. Usually, phobias are indeed accompanied by a strong desire to avoid any given particular situation or object that one fears. It can also lead to an inability to function normally at any job, home or at social settings. What is a phobia you may ask? Any specific phobia is considered to an intense fear of something that does pose little or no actual danger. Grown-up individuals do no doubt suffer from it, even though they tend to realize that it is an irrational fear and try to avoid the fear factor. Whenever these individuals encounter this phobic stimulant, they do get a severe anxiety attack. Phobias can be broadly divided into three types: simple, social and agoraphobia (fear of public places). Simple phobias: These phobias do include a fear of: heights (acrophobia); enclosed spaces (claustrophobia); flying (pterygophobia); water (hydrophobia); dentists (odontiatophobia); tunnels; bridges; animals -lizards, snakes, rats etc. Fear of public places (agoraphobia) is the fear of the being alone in a place such as a mall or even in an elevator or a room full of people and one cannot escape from it. This usually develops from an anticipatory fear of getting an acute anxiety attack (panic attacks) in a public place and generally occurs in patients who suffer from panic attacks or acute anxiety disorder. Social phobia: It is a feeling of strong fear that involves the fear of social situations or gatherings, etc. Social phobia involves a combination of being too much conscious of self, a fear of public scrutiny or humiliation in social situations, and a fear of negative evaluation by others. Homeopathy and phobias Homeopathic medicines are an effective form of treatment for phobias and fears be it of lizards, heights, cockroaches spider, snakes, cockroaches, mouse, etc. The medication can help treat specific phobia. Even phobias which are a part of other diseases such as chronic depressions, etc. do require necessary evaluation and needs to be treated accordingly. This is indeed a very common form of relaxation therapy which is in the form of progressive muscle relaxation (learning to relax one’s muscles) and autogenic relaxation (using imagery to help one relax). Meditation such as yoga can also be of great help. Desensitising your fear This therapy helps in altering one’s response to the feared object or situation. Measured, gradual as well as repeated exposure to the cause of the phobia may be able to assist one to learn to conquer one’s fear. Cognitive-behavioral therapy does aim at altering one’s belief about the feared object or even situation, the impact it has on one’s life and also how one can view and also cope up with the feared object or a different situation. Lycopodium is useful for anticipation anxiety, stage fright and a lack of self-confidence. This helps one to relax. One suffers from over talking and goes on the binge for sweets on account of being anxious about something. Aconite is beneficial for excessive fear or outright panic, particularly, if one is in a crowded place. Symptoms that one experiences are agitation, restlessness as well as fearfulness. One may think one is about to die and even may predict death. Other symptoms that one experiences are dry skin and mouth; thirst as well as a pounding heart. This remedy can be used for all types of fears and anxieties that occur due to an over-active imagination. Stage fright, claustrophobia, and anxiety on account of unexpected situations can be treated by this remedy. One suffers from a superstition that something bad is going to happen. It is useful for reckless behavior and dangerous impulses, such as jumping from a high-level window. Anxiety induced sweats or palpitations can be cured by this medication and is also useful in treating digestive complaints such as diarrhea, flatulence, and vomiting which are brought on by nervous excitement. This remedy is also ideal in case a one is deeply anxious about one’s health and is extremely concerned with order and security. A person gets obsessive about small details and also gets desperate to control situations. Bush Flower Essences: Calm & Clear Calms one’s mind and makes a person less irritable. Homeopathy does help in controlling anxiety that occurs due to phobias and fears. It is a safe method of treatment.
<urn:uuid:a64b5baa-e6d3-4b95-a95b-a488544984f5>
CC-MAIN-2018-17
http://www.drankireddy.com/effective-homeopathy-for-fears-and-phobias/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944479.27/warc/CC-MAIN-20180420155332-20180420175332-00271.warc.gz
en
0.939684
983
3.078125
3
[ 2725, 672, 4448, 389, 2138, 16218, 10251, 543, 389, 5600, 845, 25086, 13, 632, 460, 307, 546, 597, 2134, 2877, 11, 1729, 12, 19950, 393, 286, 257, 3074, 13, 632, 743, 393, 743, 407, 423, 597, 8695, 284, 597, 1948, 3074, 287, 530, 447, 247, 82, 1204, 13, 19672, 11, 872, 672, 4448, 389, 5600, 11791, 416, 257, 1913, 6227, 284, 3368, 597, 1813 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
At the time of Gaddafi, Libya was producing mustard gas in a clandestine manner in the Rabta chemical plant, 80 kilometers south of Tripoli. Experts estimate that Libya had also built a number of chemical weapons depots located throughout the country. In 2004, as part of a rapprochement with the West, Libya has ratified the Convention on the Prohibition of Chemical Weapons, agreeing to destroy all its stocks. According to estimates by the Organization for the Prohibition of Chemical Weapons (OPCW), Libya has succeeded in destroying 55% of its reserves of mustard gas before the start of the international operation against the Gaddafi regime on March 19. According to data from the old Libyan government in March 2011, the country still had 25 tonnes of mustard gas and 1,400 tonnes of material that can be used to manufacture chemical weapons.
<urn:uuid:5fb4286a-7ca9-4e26-b533-7bb0d79d239b>
CC-MAIN-2018-17
http://wreporter.com/world/libya-has-eleven-tons-of-mustard-gas-belgian-minister/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00462.warc.gz
en
0.965181
165
2.9375
3
[ 2953, 262, 640, 286, 40320, 11, 13465, 373, 9194, 33694, 3623, 287, 257, 39903, 5642, 287, 262, 28559, 8326, 5931, 4618, 11, 4019, 18212, 5366, 286, 47318, 13, 36095, 8636, 326, 13465, 550, 635, 3170, 257, 1271, 286, 5931, 3777, 1207, 1747, 5140, 3690, 262, 1499, 13, 198, 818, 5472, 11, 355, 636, 286, 257, 374, 21064, 2395, 434, 351, 262, 2688, 11, 13465 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Description of the project: The Community Conservation Resilience Initiative (CCRI) aims to assess the legal, political, moral, socio-economic, financial, technical and capacity-building support that is required to sustain and strengthen the resilience of community conservation and restoration initiatives in different communities around the world. The methodology is a simple guiding framework meant to be adapted to specific nation and local contexts. It includes a gender toolkit to identify and address potential forms of marginalization of women through dialogue within communities about women’s unique rights, roles, needs and aspirations. Climate Impact: Many of the different communities at the study sites are going through severe weather changes; some have managed to successfully adapt – or are adapting- to such changes by using their traditional knowledge and practices. Women are key knowledge-holders, allowing entire communities to overcome the different challenges. For instance, in Samoa, strong self-organized women groups have established mangrove recovery programs by planting up to two acres of mangrove trees, which help the community face tidal waves, sea rising and ultimately help restore the rich biodiversity providing food, medicine, and income to the local populations. Gender Impact: In many areas, patriarchal societies settled after colonization and the key role of women in community conservation is now invisible. For instance, in Ethiopia, women have lost most of their inheritance rights; but some traditions remain, bringing women’s key role back: i.e., In Mount Bale women inherit from their mothers a ‘Singe’_ stick as a symbol of respect. This community observes strict non-violence rules for women. The CCRI intends to visualize the gender aspects of community conservation and is paving the pathways to empower women to take on leadership roles. Scalability/replicability: The CCRI is conducted in 22 countries around the world. The results of this experiment will contribute to the implementation of the Convention on Biodiversity’s 2011–2020 Strategic Plan, and also to Aichi Targets and the proposed SDGs related to forests and climate change. It will provide policy advice on transformative, effective and appropriate forms of support for community conservation to foster climate change mitigation and resilience
<urn:uuid:f5b2d3e1-c601-4bba-9e4f-55498556a809>
CC-MAIN-2022-40
https://womengenderclimate.org/gjc_solutions/community-conservation-resilience-initiative-adaptable-to-different-nations-and-contexts/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334332.96/warc/CC-MAIN-20220925004536-20220925034536-00761.warc.gz
en
0.934885
440
3.265625
3
[ 11828, 286, 262, 1628, 25, 383, 8108, 23702, 1874, 346, 1240, 18362, 357, 4093, 7112, 8, 12031, 284, 4659, 262, 2742, 11, 1964, 11, 6573, 11, 21790, 12, 17079, 11, 3176, 11, 6276, 290, 5339, 12, 16894, 1104, 326, 318, 2672, 284, 8080, 290, 12160, 262, 31307, 286, 2055, 14903, 290, 19414, 15446, 287, 1180, 5348, 1088, 262, 995, 13, 383, 20411, 318, 257 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
THE HISTORY OF Shushtar The historical town of Shushtar was called as Adamdun in the past. Also, in Achaemenian time, this city’s name was Šurkutir and later on, it was changed to Susa and Shushtar. It is important to say that Shushtar is very popular for its historical hydraulic system which refers to Sassanid era and is a small town with special tissue and fabulous architecture which is located in the north of Khuzestan province and the North-west of Iran with an area of 2436 square kilometers. The height of this ancient city from sea level is 150 meters and the height of Shushtar’s center from sea level is 65 meters. Both rivers of Karun and Dez pass this city and it is the most important reason that Shushtar has the special situation in pedogenesis. In the winter and springtime, its climate is the Mediterranean. At the end of winter to the beginning of spring, its ecosystem is unbelievably green. Salasel Castel is one of the most important historical sites in Shushtar province which refers to the Achaemenid era. Shushtar on map You must see in Shushtar |Salasel Castel||Amin Zadeh House| |Chahartaq||Mostofi house and museum| |Lashkar Bridge||Darioon Creek| |Kolah Farangi Tower||historical hydraulic system|
<urn:uuid:d68dc53e-30d1-4a50-85fc-f3403a366d97>
CC-MAIN-2019-09
http://www.lovelypersia.com/iran-destination/shushtar/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481122.31/warc/CC-MAIN-20190216210606-20190216232423-00046.warc.gz
en
0.958816
310
3.125
3
[ 10970, 367, 42480, 3963, 911, 1530, 18870, 198, 464, 6754, 3240, 286, 911, 1530, 18870, 373, 1444, 355, 7244, 67, 403, 287, 262, 1613, 13, 4418, 11, 287, 317, 11693, 8952, 666, 640, 11, 428, 1748, 447, 247, 82, 1438, 373, 25370, 254, 333, 74, 315, 343, 290, 1568, 319, 11, 340, 373, 3421, 284, 8932, 64, 290, 911, 1530, 18870, 13, 632, 318 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Children are our infrastructure. America is a country that is fairly young by country existence standards. Born in 1776 and existing to 2017 that makes 241 years of the United States of America as a democratic sovereign nation. In 1776 there were approximately 2.5 million people living in the U.S.’ first 13 colonies – states. Today in 2017, that number has grown to more than 300 million people in 50 states. In terms of population, that is growth by a factor of 125. If you average that growth over the 241 years of existence it amounts to an average growth of about 1.2 million people per year. American society and its cities, roadways, waterways, and other elements have grown in complexity and scale during these last 241 years. The wikipedia notion of infrastructure searched this day, 9.4.17, reads; Infrastructure refers to the fundamental facilities and systems serving a country, city, or other area, including the services and facilities necessary for its economy to function. It typically characterises technical structures such as roads, bridges, tunnels, water supply, sewers, electrical grids, telecommunications, and so forth, and can be defined as “the physical components of interrelated systems providing commodities and services essential to enable, sustain, or enhance societal living conditions.” This definition suggests that we commonly use this word “ infrastructure” to describe the man-made physical systems that we create to undergird our society’s functions. It concludes by by breaking the ultimate purpose of having a society into three key themes; - Enhance …. societal living conditions. These three themes are key to the wiki-definition. Enable signifying what allows the condition to be. Sustain signifying keeping what is enabled going, and Enhance signifying make the conditions better. Recently I have been considering my wife and I’s last 32 years of work and service to children in public schools as an effort in enabling, sustaining, and enhancing the “ultimate infrastructure.” Just thinking of children and infrastructure together seems an activity worthy of the investment. More traditionally, one might think of variety of the physical and social service infrastructure in terms of how they support the development of children. Hospitals, schools, day care, parks, and other basic infrastructure seem all linked to growing the next generation of human citizens to reach the age of adulthood prepared to enable, sustain, and enhance the society they were born or immigrated to. This post puts the notion physical facilities and systems aside and stops to ponder the actual children of America as infrastructure. They too are physical systems however this post looks at them as fully human systems and more importantly, people. America has been said to be failing itself in recent decades in terms of sustaining or enhancing or facilities infrastructure. Roads, ports, bridges, subways, airports and the lack of high speed rails are commonly described as less than adequate by people from across the political spectrum whether they believe government or private investment should solve the problem. While there seems political agreement on our current -”needs improvement”- condition it is notable that investments and the condition of our “ultimate infrastructure” children, is less commonly agreed upon or emphasized. On one hand we invest the majority of our state budgets across the country to schools, on the other hand, we find the statistics on youth poverty, literacy, health, nutrition, educational attainment, and general well-being to be equally or even more problematic than our failing bridges, water treatment systems, and pot-holed streets. In 2017, more than 44% of children live close to the poverty line and 21% live in families in poverty. According to https://www.dosomething.org/us/facts/11-facts-about-literacy-america, - 2/3 of students who cannot read proficiently by the end of 4th grade will end up in jail or on welfare. Over 70% of America’s inmates cannot read above a 4th grade level. - 1 in 4 children in America grow up without learning how to read. - Students who don’t read proficiently by the 3rd grade are 4 times likelier to drop out of school….. - As of 2011, America was the only free-market OECD (Organization for Economic Cooperation and Development) country where the current generation was less educated than the previous one. - Nearly 85% of the juveniles who face trial in the juvenile court system are functionally illiterate, proving that there is a close relationship between illiteracy and crime. More than 60% of all inmates are functionally illiterate. Recent census data suggests that we have enhanced our nation’s achievements in terms of college education levels. It suggests some 34% of Americans now have a 4 year college education which is up dramatically from 1940 when we managed only 4.6%. In a sense, we have increased this aspect of the human infrastructure by a factor of 7.4%. 2017, however, is obviously a different time in terms of economics, the work world, and what represents the minimum bar for being basically educated to enter the workforce. It is now fairly easy for people across the political spectrum to recognize that a high school diploma has lots its value in the economy as the four year degree has taken its place. One can think of the infrastructure enhancements in education growing in relation to the demands of the other aspects of the society. Just as two lane roads worked well for many transportation needs and demands in the years between the car’s invention and the 1950s, it was recognized that construction of interstate, multilane highways was an enhancement to road infrastructure that was needed to keep pace with other demands in the society. These connected facts taking us from 1776 to 2017 demonstrate that different questions should be asked about our children as infrastructure. In some ways, when we average all the children in the country together and state the related %s….our country seems to have enabled, sustained, and enhanced our living conditions at satisfactory rates. When we begin to ask questions such as; which parts of the infrastructure, which groups of children, we open up a 241 year dilemma. While some statistics reported that revolutionary period boasted nearly 100% literacy among the new country’s residents, these data skipped the inclusion slaves and other peoples living in the states. Thus, the question broader questions of which children as infrastructure are we investing in and which benefit? Historical investments or diminishments in children across the world are also informative. Following the Korean war in the 1950s, thousands of Korean children left their country through international adoption. Since 1987, the country, in recognizing its lack of children deficit, began to legislate quotas on outgoing children and incentivize the sustaining and development of its youth. Other informed countries like Scotland, are realizing that investments in children, the “ultimate infrastructure,” are in the interests of their society as a whole, their “Getting it right for every child” initiatives are testament to this new mindset. http://www.gov.scot/Resource/Doc/1141/0065063.pdf This rudimentary pondering of children suggests a number of persuasive elements for people considering investing in and thinking of children as the “ultimate infrastructure.” If folks need more to persuade them, several other thoughts come to mind; As we get older as a society, who will care for us in old age? As our society becomes more complex, how are we preparing the next generation to sustain much less enhance what we have created? How are growing well-being differences in sub-groups of our children related to current and future living conditions for all citizens? Are crime,safety, life-expectancy, quality of life related to the quantity and quality of investment in children?
<urn:uuid:6559e870-251e-4f8c-883b-d633181a2599>
CC-MAIN-2019-35
https://rioschools.org/children-as-infrastructure/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330913.72/warc/CC-MAIN-20190826000512-20190826022512-00141.warc.gz
en
0.958904
1,594
2.875
3
[ 26829, 389, 674, 6884, 13, 198, 18165, 318, 257, 1499, 326, 318, 6547, 1862, 416, 1499, 6224, 5423, 13, 18889, 287, 1596, 4304, 290, 4683, 284, 2177, 326, 1838, 35150, 812, 286, 262, 1578, 1829, 286, 2253, 355, 257, 10518, 18901, 3277, 13, 554, 1596, 4304, 612, 547, 6702, 362, 13, 20, 1510, 661, 2877, 287, 262, 471, 13, 50, 13, 447, 247, 717 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Church of S. Miguel de Escalada, near León, Hispano-Islamic, 8th-11th cc. • Exterior: Formed by a group of monks. Basilica style however the use of Horseshoe shaped arches- Muslims used that style a lot. Timber roof allowed a light, open nave. Clerestory. Christian building using Islamic architecture characteristic (blending of visual cultures) • Interior: Plain now. They think the interior was at one time covered with paint, tiles, or hanging drapes. o Polychrome used Maius, Morgan Beatus, "Woman clothed with the sun", Hispano-Islamic, 8th-11th cc. Maius was a Mozarabic artist.• Manuscript took it's name from who owns it. • Beatus was a Spanish monk, who in the 8th c. wrote a commentary on the book of Revelation, which was very popular. It kept getting copied. So you will see many manuscript with it's name. Many different people kept illuminating it. • Beatus believed the world would end at 838 AD • He talked about how he was concerned about all the heiracy in Spain. • This refers the Ch. 12. • Latin text. Pictures represent words here. • Upper left, woman clothed in the sun, standing on the moon, with 12 stars above here. Upper right refers heaven. Woman is confronted by a 7 headed dragon. Woman brought forth a child. There is a war in heaven. Dragon doesn't win. Dragon in cast out. • Text is secondary to the images. Horizontal bands of color, and suggests landscape with foliage patterns. Ramsey Psalter, "Crucifixion," Anglo-Saxon, late 10th-11th cc. • Northern tradition: Brown ink, but also a use of blue ink • Limp body- dead. This is triumphant. Benedictional of St. Ethelwold, "The Marys at the Tomb," Anglo-Saxon, late 10th-11th cc. A benedictional is a prayer book used by the bishop during mass. • Story from the Gospel, you see the three marys at the tomb. The Angel has already rolled the stone away. • The manuscript is drawing from many visual cultures. Corner vegetal designs. Expressionistic clothing • Northern characteristics: Polychrome • Roman characteristics: Cantons leaf • The Marys are in front of the picture plan. • Highly interactive Abbey Church of St. Michael, Hildesheim, Ottonian, late 10th-11th c. • Massive and heavy • Very volumetric • Boxes and cylinders to create this building • Painted ceiling • Transverse arch • Nave: A pier, two columns, a pier, two columns. Systematic. This contrasting of horizontal and vertical movement characterizes the new architectural aesthetic and sets Ottonian basilicas apart. Hildesheim, Column of Bishop Bernward, Ottonian, late 10th-11th c. • Spiral Freeze- records Christ's early life. • Mimics tragons column • Column is a symbol of victory- for Jesus • Abstract and expressionistic figures- large, intense figures are compressed into a narrow space. Echternach Master (the artist), Doubting Thomas, ivory, Ottonian, late 10th-11th c. Diptych, Portable. Comes from gospel of John when Chirst commands Thomas to touch his wound • The frame contains the images • The body's are intertwined • Jesus, who is standing on a pedestal, and facing forward, makes him the more important figure. • Thomas, who's back is facing us, is a "stand-in". We become Thomas. • Jesus allows Thomas to test and doubt. intimate Saint Genis-des-Fontaines, (Fr. Pyrenees), Christ in Majesty with the Apostles, marble, Lombard-Catalonian, m. 10th- m. 11th c. Lombard-Catalonian architecture;s primary concern was for practical, sturdy construction.• Here we start to see exterior dercor • Lintile- the long stone that goes over an entrance • Relief sculpture- Low relief • Vegetal design. Roman leaf. Apostles define the contours of Mozarabic horseshoe arches- but a Islamic visual design. Cultures are blending here • Abstract figures. Clothing is linear and outlined. • The image is for the people coming into the door. Reliquary of S. Foy, Romanesque, mid. 11th - 12th cc., gold & jewels know reliquary: a repository or receptacle for relics. St. Albans Psalter, Romanesque, mid. 11th - 12th cc. • Polychrome and decorative • Christine Marqyat- A woman who knew at an early age she didn't want to marry. This psalter that was made for her • Story of Gabriel coming to Mary, telling her she will be the mother of Christ • She is on a throne and has a book in her hand- status already, she is literate • As if she has been interrupted from reading/ devotional • Angel- gesture of speech • Composition that has been divided in half • Figure style o More naturalistic o Yet in part, it is still linear. Conques (France), Abbey Church of S. Foy, Romanesque, mid. 11th - 12th cc. floor plan, \ Toulouse, France, S. Sernin, Romanesque, mid. 11th - 12th cc. plan, aerial vw, int. nave, ext. façade • Enormous building • Rose window is a later addition • This is the poster child for a Romanesque church- Transverse arches, groin vault, dark and heavy Moissac, Abbey Church of S. Pierre, Cloister, Romanesque, mid. 11th - 12th cc. • Images of o Crusaders, Monks Tempted, Wedding @ Cana, Lazarus & Dives, Daniel in Lions' Den, Christ Calling the Disciples, Christ Washing the Disciples Feet • They become on object of meditation Moissac, Abbey Church of S. Pierre, Cloister, Romanesque, mid. 11th - 12th cc, Capital:Daniel in Lions' Den become on object of meditation Fontenay, Former Cistercian Abbey, Romanesque, mid. 11th - 12th cc., interior nave Perfect proportions in building. Mathematicians create a theory of the universe whose perfection could be expressed through music consonances. • Romanesque: Buttresses, Heavy, Small windows • Different: No sculpture, Façade is missing the triumphant arch, Interior and capital lacks stories, images. Very geometric. Is it better to have the images? Arch of Constantine, Late Antique, 4th-6th cc, marble, Rome Honors Constantine's victory. His victory over Maxenious at the Battle of Milvian Bridge. The re-use of parts of earlier buildings are all over it-spolia. You see a move from naturalism to abstraction. Sculptors began to think in terms of light and dark- they undercut the edges of the forms to create shadow. Figures are simplified and geometric. Garden of Livia, 1st c BCE, fresco Example of Classical art. Roman naturalism/realism. Atmospheric perspective. Deep recessional space. Patron: owner of the house, summer retreat, residential/private space. Horizontal compositional lines- meant to draw your eyes outward. Use of fore, middle and background to show space. The Spoils of Jerusalem, 1st c CE, marble, Rome, Arch of Titus Arch of Titus is a sign of victory/recognition of Titus and his campaign against the Jews. This is relief sculpture on the inside. Shows distance with high and low relief. Cubiculum of Good Shepherd, Pre-Constantinian, 1st-3rd cc, fresco, Rome, Catacomb of Domitilla Peacock is a symbol of eternal like. Orant- Latin term, praying person, posture is one with spread out, upward ams. Ceiling of catacombs were considered heaven/paradise. Old St. Peter's Church, Late Antique, 4th-6th cc, Rome Once stood where the Basilica of St. Peter stands today. It is a place of pilgrimage- construction orders by Constantine. Thought to be location of the tomb of St. Peter. Santa Costanza, exterior, Late Antique, 4th-6th cc, Rome The mausoleum of Constantine's daughter. Circular central domed structure. Dome- Dome of Heaven. The 12 windows that light this symbolize the 12 apostles. Tomb and Basilica. Sarcophagus of Junis Bassus, Late Antique, 4th-6th cc, marble, Rome He was baptized on his death bed. Narrative concerns of the patron: guaranteed salvation and the triumph of the Roman Christian Church. Ten scenes from the Old and New Testaments occupy the two registers (Christ enthroned in heaven- tradio legis- handing down of the law to Peter and Paul. Short trees and buildings suppress the illusion of space. Symbols and narrative are used Tetrarchs, 1st c. CE, porphyry, Venice Diecletian, ruler of the Holy Roman Empire made Maximina his co-ruler. Then two more co-rulers where appointed to him and Maximina as their co-rulers. Senior rulers- two figures with beards. Very stylized, not individual. Closed sculpture- no space between arms and legs. Idea of the solidity of the Tetrarch. The porphry- hard, stability, enduring. Purple- royalty. Good Shepard, in the Tomb of Galla Placidia, Late Antique, 4th-6th cc, Ravenna, mosaic Lunette- half circle, mosaic over the entrance to the Mausoleum of Galla Placidia. Use of tessera- the individual tiles. How is it interpreted? The god Hermes or the Shepard Orpheus? A christian knew the image symbolized Christ and the parable of the lost sheep. Gold and purple of Christ's robe and mantle. The gold cross proclaims Christ's victory over death. A deep blue/heavenly/starry mosaic or a flowering meadow of Paradise? San Vitale, exterior, Early Byzantine, 4th-6th cc, Ravenna Patron dedicaated the church to the city's patron St. Vitalis, who had been martyred on the site. Has a central octagonal plan. It is "tomb-like" form. Pilgrimage sight. Hagia Sophia, exterior (Church of Holy Wisdom), Early Byzantine, 4th-6th cc, Architects: Anthemius of Tralles and Isidore of Miletus, Constantinople Church rebuilt by King Justinian; crowning architectural achievement. A place where the human and the divine meet. Mathmations, the architects, built a circle, shallow dome over a square building Icon of Christ Pantocrator, Encaustic/wood, Early Byzantine, 4th-6th cc, Monastery of St. Catherine, Sinai One of the earliest surviving icons. Pantocratoe- all powerful; ruler of all. This is an active picture plane- action between viewer and image. Personal. Image shapes viewers ideas, feelings and action. The image's holy qualities could shape the viewer- think of the media shaping us. Christ fills entire picture plane. His gard (robe) is purple. Holding the Book to Life. Big eyes. Gesture- blessing/speaking. Fully human and fully divine. Zeus- broad forehead, full beard, long hair- shows paganism Medallion w/ bust of Christ, Early Medieval Art, 7th-8th c., cloisonné Christ is holding text. Faces on the side, could represent the wind (Holy Spirit). Christ is flanked by alpha and omega (the 1st and last letter of Greek alphabet- beginning and the end) Abstract, more interested in the idea. Compositional line of Medallion- straight through Christ, bisects it. Contour lines are used in the Medallion. Portable. Color- Northern. show Christ in the Center, he is of central importance. Book of Durrow, Matthew page,parchment, Dublin, Early Medieval Art, 7th-8th c. This is smaller and portable. Book of Durrow only had the four gospels in it. Figure style is abstract. He has no arms. His body and face is frontal while his feet are in profile. Polychrome is used. Matthew is shown wearing precious/ expensive clothing. We have adorned him, showing the idea of his importance. "Matthew" from the Lindisfarne Gospels, Early Medieval Art, 7th-8th c. Color and linear lines show the Northern visual culture. Spatial recession is attempted. But it is confusing. Aachen, Palatine Chapel of Charlemagne, Carolingian, late 8th-9th c., Plan Aachen, Palatine Chapel of Charlemagne, Carolingian, late 8th-9th c., Plan Abbey Church of Corvey, (Westphalia), Carolingian, late 8th-9th c. Westwork"- vertical façade • Carolingian Towers- characteristic • Arch of Titus, or victory arches are mirrored. Jesus gets his own victory arch. Ebbo Gospels , St. Matthew, Carolingian, late 8th-9th c. Author page • Line o Expressionistic , movement of clothing, feverous, or active o Hand is framed and in the center. Emphases the action of the writing • Back ground is sketchy and faint- not important • Classical heritage- The foot rest, seat and podium • Figure style o Expressionistic o Some lingering of Naturalistic style. Maybe the clothes aren't but you can tell are real body is under there. There was really a human involved in this feverous activity. • The Angel in the background. Matthew is divinely inspired. Infused with the divine. Great Mosque, Cordova, Spain, Mihrab area, Islamic, 8th-10th cc Mosque is the center place of Muslim worship • This is a courtyard plan. Comes the closest to looking like Mohammad's house. Mirarb- along the wall that is oriented to Meca. Minbar- like a pulpit in Christian worship. Menerits- the tower were the call the prayer is given • Becomes a church and in the 16th c, they put a cathedral in the middle of it. In Islam, God is one and in the oneness of God (Allah) is contained all diversity. Hosios Loukas, Phocis, Greece, Interior,Middle Byzantine, mid. 9th-12th cc. congregation stood to witness here. no sitting St. Louis Psalter, "King David looks down upon Bathsheba bathing and up to God," Gothic m. 12th - 14th cc., parchment, Paris • Made of King Louis 9th • The images were meant to shape/ form Louis as a Christian and as a ruler • Historiated Initial- a large initial that begins a line and inside are stories • Medieval person would have seen John as themselves. He is a mediator Abbey Church of S. Denis, Gothic m. 12th - 14th cc., Nave w/ transept, Paris • Birth place of Gothic architecture • Abbey church, monastery • Church of French royalty, has an early history • Burial place of French kings • Abbet Suger- lived here since he was a young boy. He is shown at the feet of Jesus. o Very smart student, artistic • Suger added on to the building, the building was completely 100 yrs after his death Chartres Cathedral (of Notre Dame), Gothic m. 12th - 14th cc. • Notre Dome, refers to Mary (our lady) • Housed the tunic of Mary she wore when she gave birth to Christ (relic) • Façade survives a fire in 1134 • Walls of Glass- flying buttress, this allowed stability • External sculpture- royal portal o Subject shifts as well. From last judgment/ apocalypses to more theological themes (this is due to the shift in attitude towards human-beings. Humanism, it is a more optimistic view of people, they take on more value than previously thought about. This idea is reflected in sculpture. • Where the sculpture occurs becomes a iconographic issue Chartres Cathedral (of Notre Dame), Gothic m. 12th - 14th cc., north transept, Jamb figures, Ancestors of Christ (Melchizedek, Abraham & Isaac, Moses, Samuel, David) • North transept portal: Figures on columns, you have to fit them on columns, elongation- it's a functional thing. We are coming back to naturalism again. Virgin & Child, Gothic m. 12th - 14th cc., silver/gilt w/ enamel and jewels, Paris • Private sculpture • A gift from d'everraux • Mary is often times referred to as a queen • A gift from a queen to a queen • Wealthy patron, subject matter is precious • She has a child on her hip, causing countro poster. Compositional line is somewhat curved • Compositional line between eyes causes us to focuses on their relationship between each other English Apocalypse, "Angel Showing St. John the Heavenly Jerusalem, " Gothic m. 12th - 14th cc., parchment • Polychrome. Very drawn • Spatial recession: o No background. o Figures are breaking over the frame and in your face. It comes over into the viewer space. (inhabits a piece of your world) o Compositional line: • Really strong diagonal line, which directs the eye through the story • Format, Scale, Line, Light and Dark, Spatial attributes, Color, Medium and Texture Name the 8 Formal Elements: the objects would be considered large/small independently of its relationship to other objects Define Absolute Scale: An object is considered large/small in relationship to others around it Define Relate Scale: An object is represented as larger than those around it to indicate its importance. Define Hieratic scale: Define shape. The outline or edge of something- contains image. Define Contour Lines: Invisible-movement of our eyes over surface of a work follows a path of 'line'. This draws the viewers eye through work. Define Compositional Line: Calls attention to something; Symbolic; Shadow or dark as a way of modeling; Sharp light and dark create drama, emotion. How do light and dark function? The flat surface of the 2D work Define Picture Plane: The area 'behind' the picture plane. Fore, Middle and Background. Define Picture Space: Object depicted faithfully as it appears in nature. Looks 'natural', not distorted Object is naturalistic, but is perfect according to a particular time period or culture. Object is recognizable, but has been reduced to its basic elements. Object is recognizable, but one or more of its elements had been exaggerated to express an idea and/or a feeling. 1. Gothic style has its roots in urban settings. 2. For medieval persons, what one saw could act upon the person, changing him or her. 3. Light and space are important to Gothic Architecture Name 3 things that are important to know about Gothic art: Has it origins in Paris. Gothic was a term given by people in the Renaissance, they thought it was barbaric and named it after the Goths. Iconographic- people were really interested in decoding the images. Gothic art is interested in what? They thought images sent out rays that effected the person who was looking at the image. Its shaping you and influencing you- what you look at has negative/ positive consequences on you What did people think during the Gothic Period? • Strong verticality > • Developed to Buttresses > • Rose window then appeared, and elaboration of outside decoration. • All Basilica form Talk about the move from Romanesque church styles to Gothic church styles: • There is an understanding that you can climb yourself up back to god through materials. • You can work your way to the immaterial from the material world God is pure light, everything that exists have some of that divine light within it. But the lower you get in matter, the less light there is. Building had to allow an enormous amount of light to flood in. It is a distinctive blending of Christian and Muslim art. • Figures are first drawn with a pen, making them linear. • Filled in with color. Which are broad and flat. • Somewhat abstract • Abstract animals • Vegetal design • Picture space is shallow What are some characteristics of Mozarabic Art? 1. The center of culture and politics in the Romanesque period is the monastery. 2. Architectural sculpture, inside and outside, are the dominant visual forms. 3. Elaborate iconographies programs are found on these sculptures. 4. Pilgrimage and relics play an important part in religious life and visual art. Talk about Romanesque Art and Architecture Monastery, relic, and pilgrimage What are the three main words of Romanesque Art and Architecture • was a name given by art historians looking back. It looks like Roman art, but it's not as good. Not a compliment • As people traveled, Islamic influence was felt • Most of this art in Monastic, Christian Talk about some characteristics of Romanesque Art: • Jerusalem, Rome, and Santiago de Compostela (James the Apostle was believed to be here. These are the main cites • When relics moves its called translated. • People went on a pilgrimage as a result of sin, or to find spiritual or physical healing. Or because everyone else was doing it- it was the thing to do. Relics held the mind and spirit. • It was an Economic thing- people gave money to churches along their journey Talk about pilgrimage: • Capitals on the outside with a story • They were painted What is a Historiated Captial? • Churches become very tall and massive • Groin vault • Transverse arches Talk about Vaulting: • Walls have to be very thick • Windows will tend to be small • Busteress- increase the support of the walls Characteristics of Romanesque Churches: Life in the monastic community revolved around the cloister area- covered walkway. It is not just a passage from one place to another, they spent a lot of their time there. Reading, writing, meditating happened there. People grew up here. Christ disciples during the 11th c., they were on there own journey. Talk about monastery life: • A monk who argues that images are not beneficial. He felt monasteries are becoming to powerful, to wealthy. That images were a distraction. Who is Bernard Clairvaus?
<urn:uuid:066b5e8c-e144-486c-a3aa-20d8ad68ff2a>
CC-MAIN-2014-15
http://quizlet.com/2138119/medieval-ah-final-flash-cards/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533121.28/warc/CC-MAIN-20140416005213-00331-ip-10-147-4-33.ec2.internal.warc.gz
en
0.930312
5,022
2.953125
3
[ 46686, 286, 311, 13, 29825, 390, 16319, 282, 4763, 11, 1474, 1004, 18840, 11, 2399, 79, 5733, 12, 26723, 11, 807, 400, 12, 1157, 400, 36624, 13, 198, 3581, 1475, 14172, 25, 5178, 276, 416, 257, 1448, 286, 27646, 13, 32520, 3970, 3918, 2158, 262, 779, 286, 367, 669, 5069, 2577, 14292, 610, 2052, 12, 7045, 973, 326, 3918, 257, 1256, 13, 27893, 9753 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
House of Mansfeld The House of Mansfeld was a princely German house, which took its name from the town of Mansfeld in the present-day state of Saxony-Anhalt. Mansfelds were archbishops, generals, supporters as well as opponents of Martin Luther, and Habsburg administrators. County of Mansfeld |Status||County of the Holy Roman Empire| |Historical era||Early modern Europe| Upon the revolt instigated by the Wettin margrave Dedi I in 1069, Emperor Henry IV appointed the loyal House of Mansfeld counts (Grafen) in the Saxon Hassegau at Eisleben. The family progenitor, Count Hoyer I of Mansfeld, also known as Hoyer the Great, was a field marshal in the service of Emperor Henry V. He was killed at the Battle of Welfesholz on 11 February 1115, fighting the rebellious Saxon forces under Count Lothair of Supplinburg. The Mansfelds held extended fiefs both in the Archbishopric of Magdeburg and the Bishopric of Halberstadt. The male line became extinct for the first time upon the death of Count Burchard of Mansfeld in 1229; his daughter Sophia married a scion of the Lords of Querfurt, who assumed the comital title. In the 15th century, the primary house divided into cadet branches: Hinterort, Mittelort, and Vorderort, while their County of Mansfeld in 1512 joined the Upper Saxon Circle as an immediate Imperial estate. Things worsened with the Protestant Reformation: While Count Hoyer VI of Mansfeld-Vorderort (1477-1540) remained a loyal supporter of the Catholic faith, the Mittelort and Hinterort branches sided with Martin Luther. When the county was devastated during the German Peasants' War, Count Albert VII of Mansfeld-Hinterort (1480-1560) not only fought with the Imperial troops in the 1525 Battle of Frankenhausen, but also signed the Protestant Augsburg Confession in 1530 and joined the Schmalkaldic League, wherefore he was banned by Emperor Charles V after the 1547 Battle of Mühlberg. To settle the enormous debts of the Counts of Mansfeld, their mighty neighbour Elector Augustus of Saxony urged Emperor Maximilian II to appoint a committee. On 15 March 1574, and again on 5 July 1574, in Leipzig and Halle, respectively, the surviving counts Hans Hoyer, Hans Georg, Hans Albrecht and Bruno concluded an agreement for the repayment of debts incurred by Counts Peter Ernst I von Mansfeld-Vorderort, Hans Ernst and Bruno von Mansfeld. The family's assets were confiscated in 1579, whereafter Imperial immediacy was lost and mediatized between the Electorate of Saxony and the Archbishopric of Magdeburg. The Mittelort and Hinterort branches died out in 1602 and 1666. The male Mansfeld-Vorderort line finally became extinct in 1780 with the death of Josef Wenzel Nepomuk, Prince of Fondi in Italy, and their fiefs fell back to the Electorate of Saxony and the Prussian Duchy of Magdeburg. Josef Wenzel's half-sister and heiress Maria Isabella was only able to retain the Bohemian possessions. In 1771 she had married Prince Franz de Paula Gundaker von Colloredo (1731–1807), last Vice Chancellor of the Holy Roman Empire from 1789, thereby establishing the House of Colloredo-Mansfeld, which claimed headship over the family after the German mediatization. Notable family membersEdit - Peter Ernst I von Mansfeld-Vorderort (1517–1604), military commander in Spanish Habsburg service, governor of the Spanish Netherlands - Gebhard I von Mansfeld-Vorderort (c. 1525 – 1562), his brother, Prince-elector and Archbishop of Cologne from 1558 - Karl von Mansfeld (1543–1595), legitimate son of Peter Ernst I, general during the Cologne War and the Ottoman–Habsburg wars - Ernst von Mansfeld (c. 1580 – 1626), natural son of Peter Ernst I, military commander of the Protestant Union during the early years of the Thirty Years' War - Philipp von Mansfeld (1589–1657), second-cousin of Ernst, commanded at first Swedish troops during the Thirty Years' War, from 1633 as Field Marshal of the Holy Roman Empire. - Agnes von Mansfeld-Eisleben (1551–1637), wife of the Cologne Prince-Archbishop Gebhard Truchsess von Waldburg - Mansfeld Castle, ancestral seat - Heldrungen in Thuringia, purchased in 1479 - Allstedt, former Saxon Kaiserpfalz, acquired by Count Albert VII of Mansfeld in 1526 - La Fontaine Castle, Luxembourg-Clausen, built at the behest of Count Peter Ernst I of Mansfeld from 1563 - Dobříš, Bohemia, acquired in 1630 - Chisholm, Hugh, ed. (1911). Encyclopædia Britannica. 17 (11th ed.). Cambridge University Press. p. 599. .
<urn:uuid:4007d4e3-a4ec-4726-a766-5afd8980503e>
CC-MAIN-2021-04
http://conceptmap.cfapps.io/wikipage?lang=en&name=House_of_Mansfeld
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704821253.82/warc/CC-MAIN-20210127055122-20210127085122-00348.warc.gz
en
0.915351
1,141
2.96875
3
[ 18102, 286, 18580, 16265, 198, 464, 2097, 286, 18580, 16265, 373, 257, 19716, 306, 2679, 2156, 11, 543, 1718, 663, 1438, 422, 262, 3240, 286, 18580, 16265, 287, 262, 1944, 12, 820, 1181, 286, 29242, 1647, 12, 2025, 71, 2501, 13, 18580, 16265, 82, 547, 3934, 65, 21863, 11, 26770, 11, 5941, 355, 880, 355, 7691, 286, 5780, 17461, 11, 290, 367, 8937, 7423 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
In what was often described as one of the most beautiful places on the Pacific Coast was once home to the Shoalwater Bay Lighthouse, Shoalwater Life Saving Station and a thriving community. Today, everything is gone, having disappeared from the face of the earth, destroyed by the ever approaching ocean. The casual visitor to the area would have absolutely no idea that there were once tree-covered lands, dunes, homes, schools, and highways extending for miles where now there is nothing but water. Gone are the lighthouse, the life saving station, the Coast Guard station that replaced it, the Grange Hall, the post office, dozens of homes and small farms, and the many memories that were part of this historic area. The only thing that was really saved was the cemetery which has headstones dating back to 1889. And the only reason the cemetery was saved was because it was moved. This was accomplished by, literally, digging up the coffins and moving them to new land donated by a local citizen. The lighthouse, originally known as the Shoalwater Bay Lighthouse was first established here in October of 1858 on land donated by the local Indian Chief, Ma-tote, (of the Shoalwater Indian Tribe) known as Toke and whom the nearby town of Tokeland was named after. More commonly, because of the land he donated for the lighthouse, he was referred to by many locals as "Lighthouse Charley." The lighthouse was a near twin to the Smith Island Lighthouse, built at the eastern end of the Strait of Juan de Fuca and also commissioned in 1858, the same year as the Shoalwater Bay Lighthouse. (The Smith Island Lighthouse is also gone, having been destroyed by erosion). The Willapa Bay Lighthouse was only in business for a short period of time. It was discontinued in 1859. It seems because of its severe isolation, adequate oil could not be supplied to the light to keep it lit. Finally the supply problem for the oil was solved, and the lighthouse was re-commission and lit again in July of 1861. Food and other supplies presented a constant problem to early keepers who were forced to buy their provisions from the local Indians. Many of those problems were solved when the federal government decided to build the nearby Shoalwater Bay Lifesaving Station. In 1889, the federal government decided to change the name from Shoalwater to Willapa (Whil-a-pah) to rightfully honor the tribe of Indians who had inhabited the land for centuries. Early Keepers at Willapa Bay never seemed to stay in the position for long, most never lasted a year, until H. Peterson, a former keeper at Tillamook Rock, took over in 1895. He must have liked it there, for he remained in the position until his death in 1913. Another Keeper, Olaf Ludwig Hansen, served at the station for 35 years, retiring in 1930. The last U.S. Lighthouse Service Keeper was John Wilson, who took over the position in 1930, and served until 1939, when the U.S. Lighthouse Service was taken over by the U.S. Coast Guard. However, time had run out for the lighthouse. By that time, the eroding bluff was up to the front door of the lighthouse and it was declared unsafe and was abandoned. Edith Olson, a correspondent for the Chinook Observer newspaper wrote in a 1992 article for that paper, "Four square miles of land have disappeared into the sea with many homes, the hotel, post office, school, cemetery, lighthouse, Coast Guard station, and countless local landmarks. To say four square miles doesn't sound like much. Try saying over 111 million square feet. Or 2500 acres. Or 7000 good-sized home building sites." Lois A Robson, the former postmaster, wrote an article called The North Cove I Remember. In that article she wrote, " I have written about how North Cove used to be at the turn of the century, with its named streets, lots and blocks, public buildings and private residences. However, I remember North Cove as it was between 1937 and the fifties. I wish it were like that again. All is washed away now by the insatiable sea . . , there once were people, houses, farms, work, fun and laughter. Now there is only water!" On December 26, 1940, the lighthouse met its demise. It had been precariously hanging over the side of the bluff, looking as though it might topple at any second. The Coast Guard decided it was endangering the many sightseers who swarmed to get a last glimpse of the light. One wall had already collapsed. First, they washed away the remaining sand from the west side of the structure and then set off a charge of dynamite which toppled the lighthouse over the brink, ending another part of U.S. Lighthouse history. Interestingly, the demise of the lighthouse was timed almost exactly with the end of the careers of two men closely associated with it. Olaf Ludwig Hansen, at the age of 80, a former crew member at the Willapa Life Saving Station and also a keeper from 1920-1930 at the Willapa Bay Lighthouse, passed away just several weeks before the lighthouse was destroyed. And, Captain Herman Winbeck, USCG Commander of the North Cove Coast Guard Station and the man put in charge of the lighthouse when the U.S. Lighthouse Service was dissolved, retired from the service. This story appeared in the January 1999 edition of Lighthouse Digest Magazine. The print edition contains more stories than our internet edition, and each story generally contains more photographs - often many more - in the print edition. For subscription information about the print edition, click here. All contents copyright © 1995-2013 by Lighthouse Digest®, Inc. No story, photograph, or any other item on this website may be reprinted or reproduced without the express permission of Lighthouse Digest. For contact information, click here.
<urn:uuid:96f3c5dd-7f97-4920-aad3-6daf65d3d4be>
CC-MAIN-2013-48
http://www.lighthousedigest.com/digest/Storypage.cfm?storykey=404
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049967/warc/CC-MAIN-20131204131729-00057-ip-10-33-133-15.ec2.internal.warc.gz
en
0.983833
1,234
3.1875
3
[ 818, 644, 373, 1690, 3417, 355, 530, 286, 262, 749, 4950, 4113, 319, 262, 8211, 8545, 373, 1752, 1363, 284, 262, 16509, 282, 7050, 4696, 406, 32303, 11, 16509, 282, 7050, 5155, 34689, 9327, 290, 257, 27723, 2055, 13, 6288, 11, 2279, 318, 3750, 11, 1719, 12120, 422, 262, 1986, 286, 262, 4534, 11, 6572, 416, 262, 1683, 13885, 9151, 13, 383, 9341, 21493 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Ant Diversity and Abundance Along an Elevational Gradient in the Philippines - Douglas A. Samson, Eric A. Rickart, Pedro C. Gonzales - Biotropica SCI(E) SCOPUS - in 1997 - Cited Count Ant communities were surveyed along an elevational gradient in the Philippines extending from lowland dipterocarp forest (250 m elevation) to mossy forest (1750 m). Standardized pitfall trapping in arboreal and terrestrial microhabitats at seven sites yielded 51 species. Collecting by hand at five of the sites yielded 48 species. The two methods produced substantially different assemblages, with only 22 species (29%) taken in common. Only a fraction of the total ant community appeared to be sampled at most of the sites. Measures of species richness and relative abundance peaked at mid-elevations and declined sharply with increasing elevation. Ants were extremely rare above 1500 m elevation. Arboreal ants were trapped much less frequently than terrestrial ants at all sites. Ant species that were abundant had broader elevational distributions than those that were less common, but most species were rare and occurred at only one or two sites. The elevational patterns for ants are largely the inverse of those documented for Philippine small mammals which reach their greatest diversity and abundance at high elevations where ants are rare. This suggests that the two groups may interact competitively. Some of the patterns observed or inferred from this study may apply to tropical ant communities in general, and are presented as series of testable hypotheses as a guide and stimulus for future research. 1.Aust. J. Ecol.. Vol. 11. 87(1986) Andersen A. N. 2.Aust. J. Ecol.. Vol. 16. 273(1991) Andersen A. N. 3.Regulation of "Momentary" Diversity by Dominant Species in Exceptionally Rich Ant Communities of the Australian Seasonal Tropics. Vol. 140. 401Alan N. Andersen 4.Pac. Insects Mono.. Vol. 8. 1(1966) Balthazar C. R. 5.Extrafloral Nectaries and Protection by Pugnacious Bodyguards(1977) Barbara L. Bentley Annual Review of Ecology and SystematicsEcology cited 156 times 6.On the Relationship between Abundance and Distribution of Species(1984) James H. Brown The American NaturalistGeneral Sciences cited 1013 times 7.Am. Zool.. Vol. 19. 1129(1979) Brown J. H 8.Patterns in the distribution and abundance of insect populationsKevin J. Gaston et al. NatureGeneral Sciences cited 30 times 9.Oikos. Vol. 58. 329(1990) Gaston K. J. 10.Manila. Vol. 2. 1(1983) Gonzales P. C.
<urn:uuid:04cf1563-d0b6-4d82-bec2-ffd0c529dda9>
CC-MAIN-2018-13
http://academic.naver.com/article.naver?doc_id=118833344
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647244.44/warc/CC-MAIN-20180319234034-20180320014034-00321.warc.gz
en
0.884438
589
3.078125
3
[ 13217, 36188, 290, 2275, 917, 590, 17159, 281, 37881, 864, 17701, 1153, 287, 262, 13316, 198, 12, 15796, 317, 13, 47977, 11, 7651, 317, 13, 8759, 433, 11, 28855, 327, 13, 17109, 2040, 198, 12, 347, 5151, 1773, 3970, 6374, 40, 7, 36, 8, 6374, 3185, 2937, 198, 12, 287, 8309, 198, 12, 327, 863, 2764, 198, 13217, 5348, 547, 20840, 1863, 281, 7662 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Tooth Pain Causes A toothache is a sensation of pain around teeth or jaw that may result from a number of causes. Tooth pain causes can be related either to the tooth itself, the tissues around it, or to a completely different non dental health condition. In either case, your dentist can make the proper diagnosis and recommend the necessary treatment. What Causes Toothache? A tooth pain is most frequently caused when a tooth nerve becomes irritated or damaged. This irritation may occur either inside the tooth (pulp) or around the tooth (periodontium), but in some cases it may be caused by other conditions not directly related with our teeth. The most common causes of severe toothache are tooth decay and its complications such as pulpitis and dental abscesses, but many other conditions may also trigger a tooth pain: Dental related causes of toothache Tooth Decay - Cavities are the most common suspect when having a toothache. The acids produced by dental plaque bacteria start to destroy the outer protective tooth structure, the enamel. When a hole in the enamel (cavity) is formed and tooth decay reaches the soft dentine under the enamel, the tooth becomes sensitive. A sharp intermittent tooth pain is the most common symptom of a small dental cavity. As the decay spreads inward into the dentine layer, the tooth becomes increasingly more sensitive to temperature and touch. Pulpitis – If the tooth decay penetrates through the dentine and reaches the pulp inside the tooth, the pulp tissues become infected and inflamed, irritating the tooth nerves and sending signals of tooth pain to the brain. The pressure on nerves from the inflammation of the pulp can cause mild to extreme pain, depending upon the extend of the infection. Tooth Abscess Pain – Dental abscesses are the main cause of severe toothaches. Pus is accumulated around the tip of the tooth root and the infection starts to damage the periodontal tissues. You should see your dentist immediately (the severe and continuous throbbing pain will not leave you another option, anyway). Sensitive Teeth – Dentinal sensitivity is a usual cause of tooth pain triggered by cold, heat or touch. It is a result of exposed dentine micro-tubules which allow external stimuli to reach the nerves of the tooth and irritate them. Enamel loss due to tooth abrasion, tooth erosion or natural wear and tear can create a sensitivity problem. Gum Recession – Receding gums can expose the roots of the tooth and cause a similar problem. Periodontal Disease – Gum disease (chronic bacterial infection of the gums) can also be the cause of toothaches, due to irritation of the gums, gum recession or the development of a gum abscess. Tooth Fractures - Cracked Tooth Pain – When a tooth is fractured or chipped, the tooth may become extremely sensitive due to exposed dentine. The pain is worse if the damage extends to the center of the tooth and affects the pulp. The condition is known as Cracked Tooth Syndrome. Wisdom Teeth Pain – Wisdom teeth may be the cause of toothache in several ways. Impacted wisdom teeth and pericoronitis are the most common related conditions, but in some cases their eruption (even without problems) may cause severe discomfort. Bruxism – Teeth grinding can cause severe enamel loss exposing the dentine, tooth fracture or chips. Teeth clenching puts the teeth under excessive pressure, irritating the nerves in the jaw and causing a toothache usually extended to several teeth. TMJ Disorders (TMD) - TMJ Tooth Pain – Temporomandibular joint disorders caused by injury or irritation of the joint that attaches the jaw to the skull, may cause a soreness to the jaw that may be confused with toothache. Damaged restorations – Old fillings or crowns may break or crack leaving exposed the inner tooth structures. Denture Pain – Denture pain is a common problem among denture wearers. The causative factor is in most cases that the denture does not fit properly on the gums and jaw. Dental treatments – A toothache may follow some dental treatments such as tooth extractions, root canal therapy, fillings, crowns or gum surgery. While some tooth pain or sensitivity may be normal for some days after treatment, you should contact your dentist if the pain persists or worsens as it may be an indication of treatment complications. Trapped food - Food debris wedged between teeth or trapped below the gum line can cause irritation and tooth pain. Dental Implant Pain – A dental implant that is not placed properly may cause a toothache. Other problems such as a dental implants infection can also be signaled by tooth pain. Teething Pain - Teething in babies and young children (eruption of primary and permanent teeth), although not a health problem, can often cause discomfort. The eruption of wisdom teeth can also be quite painful. Tooth Whitening - Aggressive tooth whitening can damage the tooth enamel exposing the dentine and causing dental pain due to increased tooth sensitivity. Non dental related causes of toothache Sinusitis - Sinus Toothache – Sinus infections, usually after a cold, may cause what is called a ‘referred toothache’. Sinuses are empty spaces in the bone, very close above the roots of the upper teeth. Sinus congestion or inflammation often causes a pain that feels like a toothache, affecting mostly the upper molar teeth. Ear infections - Infections of the inner or outer ear may also cause a referred pain that resembles a toothache. Heart disease - Angina pectoris, or heart spasm, (caused by inadequate supply of oxygenated blood to the heart muscle because of narrowing of the arteries to the heart) can cause a radiating pain to the left side of the jaw. Patients with a history of heart disease should be alerted by a sudden toothache, especially if they are in good dental health, as it may be a signal of a heart attack. Trigeminal Neuralgia – The condition affects the trigeminal nerve, which is the main nerve of the face and jaws branching to all teeth. Trigeminal neuralgia is probably caused when a blood vessel pressures the nerve, and it is characterized by a severe stabbing pain that may feel like it originates from the nerve endings inside the teeth. Cluster headaches and migraines – Immense headaches do often cause the feeling of a dull tooth pain that spreads to all teeth of one side of the head in one or both jaws, possibly due to the irritation of the trigeminal nerve.
<urn:uuid:61a81cc7-64a7-464f-a026-1bc1d2aab532>
CC-MAIN-2018-34
https://www.tooth-pain-relief.com/toothache-causes.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217006.78/warc/CC-MAIN-20180820195652-20180820215652-00003.warc.gz
en
0.922048
1,383
3.296875
3
[ 2514, 849, 15627, 46865, 198, 32, 16162, 4891, 318, 257, 18098, 286, 2356, 1088, 9941, 393, 19218, 326, 743, 1255, 422, 257, 1271, 286, 5640, 13, 46380, 2356, 5640, 460, 307, 3519, 2035, 284, 262, 16162, 2346, 11, 262, 21379, 1088, 340, 11, 393, 284, 257, 3190, 1180, 1729, 22727, 1535, 4006, 13, 554, 2035, 1339, 11, 534, 38408, 460, 787, 262, 1774, 13669 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
What are Sealants? Sealants are very thin coatings applied to the biting surfaces of teeth, which often feature predominate grooves. The vast majority of decay originates in these grooves, called pits and fissures, but they can be difficult to keep clean. The thin plastic, seals the grooves, leaving a smooth and easily cleanable surface. Sealants last for years, but do require checking for wear and chipping. Your dentist will evaluate them during the course of a regular visit. The most common recipients of sealants are children and teens between 6 and 16 years, as they are more prone to cavities. Many dental professionals advise sealants as soon as the six-year molars, the first permanent back teeth, appear. Some adults also get sealants on decay-free teeth with deep grooves, as an added layer of protection. In some cases, dentists will seal baby teeth for the same reason, or if the child is prone to cavities. How are Teeth Sealed? Sealants are easy to apply and take only a few minutes per tooth. First, your dentist or dental hygienist will clean and dry the specific teeth, surrounding them with cotton to keep them dry. A bonding solution is applied to the surface, followed by another rinse and drying of the tooth. The hygienist or dentist will then paint the sealant material onto the enamel; it either hardens automatically, or a curing light helps it set. Together with proper care, a balanced diet, and routine visits to the dentist, your sealants will help you avoid the problems that come with tooth decay.
<urn:uuid:8ec9a591-3d13-4303-9465-c4ebc1ab3a24>
CC-MAIN-2019-04
https://www.craigarmstrongdds.com/general-dentistry/cleanings-prevention/sealants/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583831770.96/warc/CC-MAIN-20190122074945-20190122100945-00599.warc.gz
en
0.949101
343
3.390625
3
[ 2061, 389, 26975, 1187, 30, 198, 50, 2287, 1187, 389, 845, 7888, 13209, 654, 5625, 284, 262, 30791, 16649, 286, 9941, 11, 543, 1690, 3895, 2747, 296, 4559, 7128, 5241, 13, 383, 5909, 3741, 286, 22119, 8159, 689, 287, 777, 7128, 5241, 11, 1444, 29699, 290, 277, 747, 942, 11, 475, 484, 460, 307, 2408, 284, 1394, 3424, 13, 383, 7888, 7309, 11, 29718 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
السلام عليكم و رحمة الله, Okay, so we’ve covered the main indicator of نصب (nasb). Now, for the other indicators, starting with ا. Because there is only one situation where the ا is used to signal nasb, this is going to be a shorter post. Let’s do this: Substitution of ا for فتحة وَأمَا الألِفُ فَتَكُونُ عَلامَةً لِلنَصبِ فِي الأسْماءِ الخَمْسَةِ, نَحْوُ رَأيتُ أباكَ وَأخاكَ وَما أشْبَهَ ذَلِكَ As for ا (alif), it is an indicator of nasb in the “five nouns”, as in رأيتُ أباكَ و أخاكَ (“I saw your father and brother”) and whatever is similar to that. We already know what the “five nouns” are from when we did Going high with رفع, Part 2: و. We saw then that when they are in رفع, they will show it using the letter و. When their state changes to nasb, you will see the letter ا instead of و. In a future post إن شاء الله, you’ll see that in state of خَفض (also known as جَرّ), you’d expect ي to be there. Consider these examples: [Read more…] about Standing tall with نَصب, Part 2: ا (Alif)
<urn:uuid:9f1acba6-1614-436d-9d0f-3068cdfc89b4>
CC-MAIN-2022-40
https://ultimatearabic.com/page/9/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00583.warc.gz
en
0.785391
461
3.1875
3
[ 23525, 45692, 13862, 12919, 25405, 17550, 117, 13862, 22654, 149, 225, 25405, 42092, 17550, 109, 148, 255, 25405, 45632, 28981, 13862, 29519, 11, 198, 16454, 11, 523, 356, 447, 247, 303, 5017, 262, 1388, 16916, 286, 18923, 228, 148, 113, 39848, 357, 24716, 65, 737, 2735, 11, 329, 262, 584, 21337, 11, 3599, 351, 220, 12919, 13, 4362, 612, 318, 691, 530, 3074, 810 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Fiber ship : constitutive models Document typeBachelor thesis Rights accessOpen Access Throughout the history of humans, materials and their behaviour have been studied in order to understand their responses to external interactions. The goal of understanding their behavior is to be able to make structures or objects with a function. In the last hundred years, the relation between the applied tension and its deformation as a response has been studied for many materials, and also general methods. Therefore, this work presents the main linear theories that characterize the behavior of different structures, especially plates. In reality, the materials do not have a linear behaviour, so this paper also explains a nonlinear theory that can be implemented together with the first ones explained with the aim of giving a non-linear character to the material. In particular, damage theory and its different types of evolution are studied. In recent decades, advanced composite materials have become a revolution in structural engineering. Their good relation between stiffness and weight makes them optimal for many engineering applications. That is why it is important to characterize its behavior and the relationship between its components. This paper explains the main ways in which we can find composite materials and their main uses in the industry. It also explains a theory that relates the behavior between tension and deformation for composite materials reinforced by long fibers. Finally, different simulations are launched in order to verify that the theories are well implemented in a software called Ramseries ® and at the same time verify that the response is the expected one. With respect to composite materials, this work fits the behaviour of the simulation with the experimental result with the objective of characterizing the behaviour of the material that afterward will be used in the European project called “Fibership” destined to develop the technologies to construct a ship made totally from composite materials. SubjectsComposite materials, Strains and stresses, Strength of materials, Deformations (Mechanics), Materials compostos, Esforç i tensió, Deformacions (Mecànica), Resistencia de materials DegreeGRAU EN ENGINYERIA MECÀNICA (Pla 2009)
<urn:uuid:30b3fae9-ced3-4320-9f6f-0a653dbda633>
CC-MAIN-2021-17
https://upcommons.upc.edu/handle/2117/171929
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038074941.13/warc/CC-MAIN-20210413183055-20210413213055-00072.warc.gz
en
0.933879
436
2.625
3
[ 37, 1856, 4074, 1058, 7892, 8827, 4981, 198, 24941, 2099, 33, 19335, 21554, 198, 49, 2337, 1895, 11505, 8798, 198, 26797, 262, 2106, 286, 5384, 11, 5696, 290, 511, 9172, 423, 587, 9713, 287, 1502, 284, 1833, 511, 9109, 284, 7097, 12213, 13, 383, 3061, 286, 4547, 511, 4069, 318, 284, 307, 1498, 284, 787, 8573, 393, 5563, 351, 257, 2163, 13, 554, 262 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Alzheimer's Disease (AD) is the most common form of dementia, accounting for 60 to 80 percent of dementia cases. It is "a type of dementia that causes problems with memory, thinking and behavior. Symptoms usually develop slowly and get worse over time, becoming severe enough to interfere with daily tasks." Notable studies[edit | edit source] - 2018, Corroboration of a Major Role for Herpes Simplex Virus Type 1 in Alzheimer’s Disease (FULL TEXT) Strong evidence has emerged recently for the concept that herpes simplex virus type 1 (HSV1) is a major risk for Alzheimer’s disease (AD). This concept proposes that latent HSV1 in brain of carriers of the type 4 allele of the apolipoprotein E gene (APOE-ε4) is reactivated intermittently by events such as immunosuppression, peripheral infection, and inflammation, the consequent damage accumulating, and culminating eventually in the development of AD. Population data to investigate this epidemiologically, e.g., to find if subjects treated with antivirals might be protected from developing dementia—are available in Taiwan, from the National Health Insurance Research Database, in which 99.9% of the population has been enrolled. This is being extensively mined for information on microbial infections and disease. Three publications have now appeared describing data on the development of senile dementia (SD), and the treatment of those with marked overt signs of disease caused by varicella zoster virus (VZV), or by HSV. The striking results show that the risk of SD is much greater in those who are HSV-seropositive than in seronegative subjects, and that antiviral treatment causes a dramatic decrease in number of subjects who later develop SD. It should be stressed that these results apply only to those with severe cases of HSV1 or VZV infection, but when considered with the over 150 publications that strongly support an HSV1 role in AD, they greatly justify usage of antiherpes antivirals to treat AD. Three other studies are described which directly relate to HSV1 and AD: they deal respectively with lysosomal changes in HSV1-infected cell cultures, with evidence for a role of human herpes virus type 6 and 7 (HHV6 and HHV7) in AD, and viral effects on host gene expression, and with the antiviral characteristics of beta amyloid (Aβ). Three indirectly relevant studies deal respectively with schizophrenia, relating to antiviral treatment to target HSV1, with the likelihood that HSV1 is a cause of fibromyalgia (FM), and with FM being associated with later development of SD. Studies on the link between epilepsy, AD and herpes simplex encephalitis (HSE) are described also, as are the possible roles of APOE-ε4, HHV6 and HSV1 in epilepsy. - 2018, Multiscale Analysis of Independent Alzheimer’s Cohorts Finds Disruption of Molecular, Genetic, and Clinical Networks by Human Herpesvirus (SUMMARY) Investigators have long suspected that pathogenic microbes might contribute to the onset and progression of Alzheimer’s disease (AD) although definitive evidence has not been presented. Whether such findings represent a causal contribution, or reflect opportunistic passengers of neurodegeneration, is also difficult to resolve. We constructed multiscale networks of the late-onset AD-associated virome, integrating genomic, transcriptomic, proteomic, and histopathological data across four brain regions from human post-mortem tissue. We observed increased human herpesvirus 6A (HHV-6A) and human herpesvirus 7 (HHV-7) from subjects with AD compared with controls. These results were replicated in two additional, independent and geographically dispersed cohorts. We observed regulatory relationships linking viral abundance and modulators of APP metabolism, including induction of APBB2, APPBP2, BIN1, BACE1, CLU, PICALM, and PSEN1 by HHV-6A. This study elucidates networks linking molecular, clinical, and neuropathological features with viral activity and is consistent with viral activity constituting a general feature of AD. Learn more[edit | edit source] - Wikipedia - Alzheimer's Disease - 2016, Reversing Alzheimer’s: What It Could Mean for ME/CFS and Fibromyalgia - 2018, A Common Virus May Play Role in Alzheimer’s Disease, Study Finds - 2018, There is mounting evidence that herpes leads to Alzheimer's References[edit | edit source] - "What Is Alzheimer's?". alz.org. - Itzhaki, Ruth F. (2018). "Corroboration of a Major Role for Herpes Simplex Virus Type 1 in Alzheimer's Disease". Frontiers in Aging Neuroscience. 10. doi:10.3389/fnagi.2018.00324. ISSN 1663-4365. - Readhead, Ben; Haure-Mirande, Jean-Vianney; Funk, Cory C.; Richards, Matthew A.; Shannon, Paul; Haroutunian, Vahram; Sano, Mary; Liang, Winnie S.; Beckmann, Noam D. (2018). "Multiscale Analysis of Independent Alzheimer's Cohorts Finds Disruption of Molecular, Genetic, and Clinical Networks by Human Herpesvirus". Neuron. 99 (1): 64–82.e7. doi:10.1016/j.neuron.2018.05.023. ISSN 0896-6273. - Johnson, Cort (Aug 2, 2016). "Reversing Alzheimer's: What It Could Mean for ME/CFS and Fibromyalgia - Health Rising". Health Rising. Retrieved Oct 23, 2018. - Belluck, Pam (Jun 21, 2018). "A Common Virus May Play Role in Alzheimer's Disease, Study Finds". Retrieved Oct 23, 2018. - Itzhaki, Ruth (Oct 23, 2018). "There is mounting evidence that herpes leads to Alzheimer's". bbc.com. BBC - Future. Retrieved Oct 23, 2018.
<urn:uuid:1d4505ed-3b51-43ff-bc6a-cccf3a0f0351>
CC-MAIN-2019-51
https://me-pedia.org/wiki/Alzheimer%27s
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00558.warc.gz
en
0.886884
1,284
2.984375
3
[ 2348, 89, 16288, 338, 17344, 357, 2885, 8, 318, 262, 749, 2219, 1296, 286, 27886, 11, 14317, 329, 3126, 284, 4019, 1411, 286, 27886, 2663, 13, 632, 318, 366, 64, 2099, 286, 27886, 326, 5640, 2761, 351, 4088, 11, 3612, 290, 4069, 13, 49559, 3221, 1205, 6364, 290, 651, 4785, 625, 640, 11, 5033, 6049, 1576, 284, 18135, 351, 4445, 8861, 526, 198, 45533 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The amazing story of a 16th century African Portuguese sailor who commanded a trade expedition to Japan. This is a layered interactive narrative that traces the life of Captain Antonio DaCosta, a Black Portuguese sailor who visited Japan in 1597. From his early life as a slave in Lisbon to his voyage to Japan, this site weaves together his personal diary and drawings, along with artwork and historical notes from 1500-1700, the Age of Exploration. Providing in-depth context to these extraordinary historical documents is essential. The interactive narrative mixes art, artifacts, and key world events from the time of DaCosta's voyage. © 2019 Pixel Fable. All rights reserved.
<urn:uuid:c21004c3-0179-414b-a86a-ef4f308d37fb>
CC-MAIN-2019-51
http://captaindacosta.com/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529955.67/warc/CC-MAIN-20191211045724-20191211073724-00552.warc.gz
en
0.941435
139
2.65625
3
[ 464, 4998, 1621, 286, 257, 1467, 400, 4289, 5510, 21813, 43272, 508, 22419, 257, 3292, 22817, 284, 2869, 13, 198, 1212, 318, 257, 37748, 14333, 8689, 326, 20675, 262, 1204, 286, 8599, 11366, 9637, 13729, 64, 11, 257, 2619, 21813, 43272, 508, 8672, 2869, 287, 1315, 5607, 13, 3574, 465, 1903, 1204, 355, 257, 11778, 287, 41898, 284, 465, 31505, 284, 2869, 11, 428 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
To create a custom lesson, click on the check boxes of the files you’d like to add to your lesson and then click on the Build-A-Lesson button at the top. Click on the resource title to View, Edit, or Assign it. ES.4. Objects in the sky move in regular and predictable patterns. As a basis for under-standing this concept: ES.4.a. Students know the patterns of stars stay the same, although they appear to move across the sky nightly, and different stars can be seen in different seasons. ES.4.b. Students know the way in which the Moon's appearance changes during the four-week lunar cycle. ES.4.d. Students know that Earth is one of several planets that orbit the Sun and that the Moon orbits Earth. ES.4.e. Students know the position of the Sun in the sky changes during the course of the day and from season to season. CA.IE.Investigation and Experimentation Investigation and Experimentation IE.5. Scientific progress is made by asking meaningful questions and conducting careful investigations. As a basis for understanding this concept and addressing the content in the other three strands, students should develop their own questions and perform investigations. Students will: IE.5.d. Predict the outcome of a simple investigation and compare the result with the prediction. IE.5.e. Collect data in an investigation and analyze those data to develop a logical conclusion. LS.3. Adaptations in physical structure or behavior may improve an organism's chance for survival. As a basis for understanding this concept: LS.3.a. Students know plants and animals have structures that serve different functions in growth, survival, and reproduction. Quiz, Flash Cards, Worksheet, Game & Study Guide Plants LS.3.b. Students know examples of diverse life forms in different environments, such as oceans, deserts, tundra, forests, grasslands, and wetlands. LS.3.d. Students know when the environment changes, some plants and animals survive and reproduce; others die or move to new locations. PS.1. Energy and matter have multiple forms and can be changed from one form to another. As a basis for understanding this concept: PS.1.d. Students know energy can be carried from one place to another by waves, such as water waves and sound waves, by electric current, and by moving objects. Quiz, Flash Cards, Worksheet, Game & Study Guide Energy PS.1.e. Students know matter has three forms: solid, liquid, and gas. Quiz, Flash Cards, Worksheet, Game & Study Guide Matter PS.1.f. Students know evaporation and melting are changes that occur when the objects are heated. PS.1.g. Students know that when two or more substances are combined, a new substance may be formed with properties that are different from those of the original materials. Quiz, Flash Cards, Worksheet, Game & Study Guide Matter PS.1.h. Students know all matter is made of small particles called atoms, too small to see with the naked eye. PS.1.i. Students know people once thought that earth, wind, fire, and water were the basic elements that made up all matter. Science experiments show that there are more than 100 different types of atoms, which are presented on the periodic table of the elements. Quiz, Flash Cards, Worksheet, Game & Study Guide Matter PS.2. Light has a source and travels in a direction. As a basis for understanding this concept: PS.2.b. Students know light is reflected from mirrors and other surfaces.
<urn:uuid:c9057999-852e-4ea1-9f77-2d9464f28722>
CC-MAIN-2019-26
https://www.newpathonline.com/standard/California_Standards/83/Science_Grade_3/4/3
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999817.30/warc/CC-MAIN-20190625092324-20190625114324-00286.warc.gz
en
0.912667
770
4.03125
4
[ 2514, 2251, 257, 2183, 11483, 11, 3904, 319, 262, 2198, 10559, 286, 262, 3696, 345, 447, 247, 67, 588, 284, 751, 284, 534, 198, 1203, 261, 290, 788, 3904, 319, 262, 10934, 12, 32, 12, 22058, 261, 4936, 379, 262, 1353, 13, 6914, 319, 262, 8271, 3670, 284, 3582, 11, 5312, 11, 393, 2195, 570, 340, 13, 198, 1546, 13, 19, 13, 35832, 287 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
A friend of mine and I were chatting about on-site energy generation and what to do when the seasons change. Specifically, solar pool heating. “I turn my system off in the winter,” he said. As we are in California and our climate is very mild, I was surprised. “Why? What kind of system do you have?” “It doesn’t matter, he replied. “Solar only works in the summer.” Although his assumption was incorrect, he did get me thinking about the connection between the efficacy of onsite generation systems and weather. Are some onsite generations only effective in certain climates and temperatures? Is there ever a temperature or time of year that requires you to turn that system off? The answer depends on the type of system that you have. In the spirit of our ever-changing weather, let’s look at a few systems and when they are optimal to produce energy, and if or when to shut them down. Solar hot water systems These systems are typically designed for the climate zone they are in. If you are in a freezing climate, these systems are typically designed and built with a non-toxic antifreeze mixture (not water) circulating in the collector, which heats the water in the tank. That means you can run it effectively in colder states. Granted, if your panels are coated with snow, you may not see a benefit, but if your system is designed for your climate, it should not need to be turned off in the winter. Solar photovoltaic (aka, solar PV) Photovoltaic systems require light to make energy and can operate all year long. While solar PV systems need light, they become less efficient in warmer temperatures. The colder the climate, the more energy the PV system creates. So solar PV systems certainly don’t need to be turned off in colder climates. They work better. Geothermal uses heat from the upper 10 feet of the earth that maintains temperatures between 50 and 60 degrees Fahrenheit all year long. Geothermal systems use this resource to heat and cool buildings, and there is no need to turn off these systems for any season. Of all renewables, wind is the most contingent upon weather and can be impeded by temperature. Rain creates a drag on the propellers and hot temperatures cause low air density, both of which cause lower production. Also, extremely cold temperatures can cause parts to freeze, requiring the system to be shut down to avoid damage. That said, some turbines are designed to operate at temperatures as low as -22 degrees Fahrenheit. I think that covers it. Now let’s go for a dip in that solar-heated pool. Author Mary Nitschke is the first president of the Utility Management Advisory Board, holds an Energy Resource Management Certificate from UC Davis, two BAs from UC Berkeley and is Director of Ancillary Services for Prometheus Real Estate Group, Inc. California.
<urn:uuid:4f036556-afec-466c-9feb-ad19e1f592d3>
CC-MAIN-2020-40
https://utilitysmartpro.com/2019/04/onsite-energy-generation-and-weather/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400274441.60/warc/CC-MAIN-20200927085848-20200927115848-00298.warc.gz
en
0.9486
612
2.6875
3
[ 32, 1545, 286, 6164, 290, 314, 547, 32046, 546, 319, 12, 15654, 2568, 5270, 290, 644, 284, 466, 618, 262, 7028, 1487, 13, 22426, 11, 6591, 5933, 16930, 13, 198, 447, 250, 40, 1210, 616, 1080, 572, 287, 262, 7374, 11, 447, 251, 339, 531, 13, 1081, 356, 389, 287, 3442, 290, 674, 4258, 318, 845, 11607, 11, 314, 373, 6655, 13, 198, 447 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Brigham Young University Researchers Take Look at How HIV Adapts in Three Separate Studies May 3, 2011 BYU researchers are examining HIV in twins, a failed HIV vaccine, and an anti-HIV protein in three separate studies to understand the virus. A second study is based on a failed HIV vaccine trial in Thailand, during which participants underwent regular blood draws. Scientists have blood samples from participants both at baseline and after some acquired HIV. Due to the close-knit nature of participants' risk groups, some study subjects may have shared needles with each other, acquiring an identical HIV strain. Crandall's team examined how HIV evolves in the different hosts. The study is published on PLoS One (2011;6(3):e16902 doi:10.1371/journal.pone.0016902). Deseret Morning News (Salt Lake City) 04.29.2011; Lois M. Collins Canada: Home Is Where the HAART Is -- An Examination of Factors Affecting Neighborhood Perceptions Among People With HIV/AIDS on Antiretroviral Therapy Scientists at Retrovirus Conference Present Findings on Microbicide Gel, Truvada, Male Circumcision, ART Care by Nurses This article was provided by CDC National Prevention Information Network. It is a part of the publication CDC HIV/Hepatitis/STD/TB Prevention News Update. Add Your Comment: (Please note: Your name and comment will be public, and may even show up in Internet search results. Be careful when providing personal information! Before adding your comment, please read TheBody.com's Comment Policy.)
<urn:uuid:e64b33c9-d796-482c-9122-fbbd88dfa32b>
CC-MAIN-2015-32
http://www.thebody.com/content/art61797.html?nxtprv
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042982745.46/warc/CC-MAIN-20150728002302-00317-ip-10-236-191-2.ec2.internal.warc.gz
en
0.880699
338
2.5625
3
[ 9414, 34000, 6960, 2059, 26685, 7214, 6803, 379, 1374, 10498, 30019, 82, 287, 7683, 8621, 30748, 10422, 198, 6747, 513, 11, 2813, 198, 17513, 52, 4837, 389, 17247, 10498, 287, 20345, 11, 257, 4054, 10498, 12319, 11, 290, 281, 3098, 12, 39, 3824, 7532, 287, 1115, 4553, 3640, 284, 1833, 262, 9471, 13, 198, 32, 1218, 2050, 318, 1912, 319, 257, 4054, 10498, 12319 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Topographic Data Resources Topographic data are information about the elevation of the surface of the Earth. Two such data types are commonly used with GeoPads. The first are data that represent the information typically found on a topographic quadrangle map, such as contour lines, roads, streams, railroads, towns, etc. For simplicity, this first category of data will be referred to as digital topographic map data. The second are grids of data, for which each cell in the grid represents the elevation at a certain point on the Earth. These data are commonly referred to as Digital Elevation Models or DEMs. Digital Topographic Map Data Digital topographic map data exists for the United States in both vector (points, lines and polygons) and raster (image) formats. The vector topographic data are called Digital Line Graphs (DLGs) while the raster topographic data are called Digital Raster Graphics (DRGs). Availability of each are described below. Digital Line Graphs Digital line graphs (PDF fact sheet) are files that contain the point, line, and polygon data found on a traditional paper topographic map, including the Public Land Survey System (township and range boundaries), contour lines, rivers, lakes, roads, railroads, towns, land cover, survey control points, etc. The advantage to using DLGs in a GIS setting is that the vector features can be rendered at any scale, such that zooming in and out on the map does not change the quality of the topographic data representation. The disadvantages of the DLG format are that importation of the data to a GIS requires more effort than importing a DRG raster image, and that the DLG data are quite large, sometimes slowing down the screen refresh rate of the GIS software, and that not all data layers are available for all topographic map quadrangles. Data layer projections for DLG data vary from state to state. DLG data is available in three series. - Large-Scale (7.5-minute) DLGs correspond to the USGS 1:20,000-, 1:24,000-, and 1:25,000-scale topographic quadrangle maps. These data are available for download in two file formats, Optional and SDTS. Optional format is available for download through the USGS Earth Explorer. SDTS format is available by 7.5' quadrangle name via File Transfer Protocol (FTP). The Master Data Directory necessary to import SDTS data is also available at this FTP site. - Intermediate-Scale (1:100,000-scale) DLGs are derived from USGS 30- by 60-minute quadrangle maps and are available in 30- by 30-minute units that correspond to the east or west half of the topographic quadrangle maps. Each 30-minute unit is produced and distributed as four 15- by 15-minute cells. These data are also available for download in two file formats, Optional and SDTS. Optional format is available through the USGS Earth Explorer. SDTS format is available by 30' x 60' half-quadrangle via File Transfer Protocol (FTP). The Master Data Directory necessary to import SDTS data is also available at this FTP site. - Small-Scale (1,2,000,000-scale) DLGs are derived from the USGS sectional maps from the U.S. National Atlas. These data are available only in SDTS format and are not currently available for Alaska. Data are available by state for download via FTP. Digital Raster Graphics Digital Raster Graphics (DRGs) are scanned images of USGS topographic maps, and are available in the standard USGS topographic map series, including 1:24,000, 1:100,000, and 1:250,000 for the United States (with the exception of 1:63,360 for Alaska instead of 1:24,000), and 1:20,000, 1:25,000, and 1:30,000 for U.S. territories. To display multiple DRGs seamlessly in a GIS, it is best to use DRGs with the map boundary information removed. These DRGs are referred to as 'trimmed', 'clipped', 'collarless', or 'enhanced'. DRGs are available for most of the United States from several on-line sources including: The states of California, Massachusetts, and parts of Tennessee and the surrounding Tennessee Valley Authority maintain and distribute their own DRGs. Digital Raster Graphics are also available for a large number of commercial distributors for a fee, and many states choose to distribute DRGs through a state-supported web portal. An Internet search on a state name and the keywords 'geospatial data' or 'gis data' will return many useful resources. Digital Elevation Model Data Digital Elevation Models (DEMs) are gridded representations of the surface of the Earth where each pixel in the grid contains an elevation value. Resolution of DEMs is often reported in radial measurements, such as arc-seconds. Global Digital Elevation Models Global topographic data including topography and bathymetry is available with a resolution of 1 arc-second (~2 km) as part of the ETOPO1 data set (more info) . The highest resolution DEM data set for the entire world (excluding bathymetry) is the 30 arc-second GTOPO30 DEM, which has a nominal ground resolution of ~1 km. The recent Shuttle Radar Topography Mission (SRTM) returned 3 arc-second (~90 m) resolution data for most of the continents between 60N and 60S. National Digital Elevation Models For much of the United States, the National Elevation Dataset contains 1 arc-second and 1/3 arc-second (~30 m and 10 m, respectively) resolution data. SRTM 1 arc-second DEM data are also available for the United States. Regional Digital Elevation Models High-resolution digital elevation models are available for small regions within the United States. The National Elevation Dataset contains some 1/9 arc-second (~3m) resolution DEM data, mostly for urban areas. Both the US Department of Agriculture and the US Coast and Geodetic Data have some airborne Interferometric Synthetic Aperture Radar (IfSAR) DEMs with resolution of 1-5 meters for small regions. Several consortiums in the US also offer sub-meter resolution DEMs generated from Light Detection and Ranging (LiDAR) airborne scanners. GEON hosts an on-line tool to process LiDAR point clouds into GIS-compatible DEMs. Comparison of Data Sets Topographic data created by airborne or space-based techniques (e.g. LiDAR or IfSAR, including the SRTM DEM data) have the advantage of being generally smooth and continuous data sets. The National Elevation Dataset is derived from digitization of USGS topographic maps, and the gridded data derived from this technique can be prone to a number of data artifacts. On the other hand, Synthetic Aperture Radar is absorbed by water and snow and generally does not return elevation data from these surfaces. Airborne and space-based techniques may also have difficulty in steep, rugged topography. A comparison of datasets may be necessary to find the most appropriate type for a particular project. Digital Elevation Model Data Resources - Global Digital Elevation Data - ETOPO2 5 km Global Topography and Bathymetry. - GTOPO30 1 km Global Topography. - SRTM30 1 km Global Topography - SRTM 3 arc-second data supplemented with GTOPO30 data for global topographic coverage. - USGS Seamless Data Server (more info) - Global SRTM 3 arc-second data. - Global SRTM 3 arc-second data - with holes filled and merged into 5-degree x 5-degree tiles. - Interactive Google Earth interface to SRTM 3 arc-second data - National Digital Elevation Data - Earth Explorer - National Elevation Dataset 1 and 1/3 arc-second data. - USGS Seamless Data Server - SRTM 1 arc-second and National Elevation Dataset 1 and 1/3 arc-second data. - USDA Geospatial Gateway (more info) - National Elevation Dataset 1 and 1/3 arc-second data. - Regional Digital Elevation Data - USGS Seamless Data Server - National Elevation Dataset 1/9 arc-second data. - USDA Geospatial Gateway (more info) - IfSAR high resolution DEM data. - NOAA Coastal Services Center - IfSAR and LiDAR high-resolution coastal DEMs. - EarthScope Spatial Data Repository—LiDAR data sets. - National Center for Airborne Laser Mapping—LiDAR data distribution site for NCALM. - Puget Sound LiDAR Consortium—LiDAR data from Puget Sound region of Washington state.
<urn:uuid:437973ec-5b03-4608-91be-5f9921d6700e>
CC-MAIN-2020-40
https://serc.carleton.edu/research_education/geopad/topographic_data.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201826.20/warc/CC-MAIN-20200921143722-20200921173722-00630.warc.gz
en
0.869104
1,902
3.34375
3
[ 9126, 6826, 6060, 13864, 198, 9126, 6826, 1366, 389, 1321, 546, 262, 22910, 286, 262, 4417, 286, 262, 3668, 13, 4930, 884, 1366, 3858, 389, 8811, 973, 351, 32960, 47, 5643, 13, 383, 717, 389, 1366, 326, 2380, 262, 1321, 6032, 1043, 319, 257, 1353, 6826, 15094, 81, 9248, 3975, 11, 884, 355, 542, 454, 3951, 11, 9725, 11, 15190, 11, 6787, 21372, 11 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
This video says about itself: 30 Aug 2011 Sharing the results of a massive, worldwide study, geneticist Svante Pääbo shows the DNA proof that early humans mated with Neanderthals after we moved out of Africa. (Yes, many of us have Neanderthal DNA.) He also shows how a tiny bone from a baby finger was enough to identify a whole new humanoid species. By Matthew MacEgan: The genetic legacy of the Neanderthals 6 January 2014 New research published in a recent issue of Nature presents the sequencing of the entire genome of a Neanderthal woman who lived in the Altai Mountains in southern Siberia over 50,000 years ago. The data gathered from this study, along with another published study regarding the genome sequencing of a Denisovan hominin, a related group of humans who lived side by side with Neanderthals during this period, has much to say about prehistoric human development and the genetic makeup of modern humans, going far beyond any previous genetic research on archaic humans. Genome sequencing is a relatively new process that enables researchers to map and examine DNA. The most famous example has been the Human Genome Project, an international effort to map the entire genetic sequence of modern humans all over the world, allowing for a detailed exploration of our biological history. The recent sequencing of Neanderthal and Denisovan genomes are the very first performed on extinct hominins (humans) and dramatically aid in our understanding of gene flow and drift between our archaic predecessors. The Neanderthal type specimen fossil was discovered in a limestone quarry in the Neander Valley near Düsseldorf, Germany, in August 1856. Its discovery took place just three years prior to the publishing of Charles Darwin’s On the Origin of Species, launching the finding into a larger debate about biological evolution. The most commonly debated aspect of Neanderthal history in recent years has been whether Neanderthals interbred with Homo sapiens and whether such offspring were fertile. Separating Neandertal DNA from modern human contamination: here. There are currently known remains attributed to 400 different Neanderthals ranging geographically from Portugal to Siberia, including northern European finds in England and Germany as well as Middle Eastern counterparts in Israel and Iraq. These fossils range in date from 350,000 years ago to 35,000 years ago. Earlier Neanderthal fossils share traits with the older hominin Homo heidelbergensis, which spread across Africa, Europe, and Asia at least 600,000 years ago. Both Neanderthals and Homo sapiens are believed to have evolved from Homo heidelbergensis, each group developing in isolation due to prolonged quaternary glacial periods. If this hypothesis is correct, Homo sapiens would have developed in Africa, while Neanderthals evolved throughout Eurasia. Neanderthals share 99.7 percent of their DNA with modern humans but display very specific morphological differences. Neanderthals were considerably more “robust” than Homo sapiens, featuring thicker bones and a larger brain case. While modern humans have an average brain capacity of 1400cc, the average Neanderthal reached 1600cc in size. Neanderthals are also thought to have been much stronger than anatomically modern humans, especially having stronger arms and hands. It has even been suggested that the more robust Neanderthal teeth were used as cutting tools (the more “gracile” Homo sapiens teeth perhaps developed along with the increased use of fire to cook food, which made it softer). Neanderthals are also thought to have consumed a larger percentage of meat as part of their diet, including big game animals. One of the more popular explanations for the physical divergence between Neanderthals and Homo sapiens is climatic. Bodies with shorter limbs and thicker forms retain heat more efficiently in colder geographic areas while more lissome figures with longer limbs disperse heat better in warmer climates. In 2008, an excavation performed in Denisova Cave in southern Siberia, near the borders of Kazakhstan and Mongolia, yielded the fossil remains of both Neanderthals and those of a potentially new group of hominins that have since become known as “Denisovans.” These remains have enabled researchers to determine that both groups inhabited Eurasia during the period when modern humans emerged from Africa (around 50,000 years ago), leading some to believe that Denisovans similarly evolved from Homo heidelbergensis living in Asia. According to the recent Nature article, the “Altai Neanderthal” genome was sequenced from DNA extracted from a toe phalanx discovered in Denisova Cave in 2010. The archaeological layer within which the toe was found is located in the east gallery of the cave and is thought to be at least 50,000 years old. While the bone features traits commonly found in both Neanderthals and modern humans, the DNA found within shares a common ancestor with six previously published Neanderthal DNA sequences, providing adequate evidence that it indeed belongs to a Neanderthal. The main finding of the report, which has been focused on by most media outlets, is a high level of inbreeding in the Altai Neanderthal. According to the published research, her parents were closely related enough to be either half-siblings who shared the same mother or of another close relation such as double first cousins, uncle and niece, or grandmother and grandson. While there has been a high level of discussion about whether inbreeding was common amongst the Altai Neanderthal population, no scientific evidence has surfaced which supports this theory. Inbreeding is more typical of small, isolated populations. The toe phalanx genome was compared to several other hominin genomes, including the Denisovan genome sequence that was previously recorded from DNA extracted from a finger phalanx. The Denisovan finger, excavated in 2008, was found within the same archaeological layer as the Neanderthal toe. Other genomes used for comparison include those of several other Neanderthals and 25 present-day humans. Researchers were thus able to provide new estimates of population split times. Their estimates suggest that the ancestors of modern humans split from both Neanderthals and Denisovans between approximately 553,000 and 589,000 years ago, while the Neanderthal and Denisovan populations seem to have split apart later, about 381,000 years ago. According to the authors of the Nature article and of potentially greater interest is the fact that the population of the ancestors of modern humans began to increase over time after the split, while Neanderthals and Denisovans saw subsequent decreases in population size. This supports previous speculations that Neanderthal populations were small and stable or even declining at the height of the last glacial period. The new genome sequences also support admixture theories previously suggested by researchers. Much controversy has surrounded the suggestion that archaic humans such as Neanderthals and Denisovans interbred with the ancestors of modern humans, especially amongst those who theorize that other hominin groups were violently eradicated by “blood-thirsty” Homo sapiens. Other earlier writers on the subject placed Neanderthals as direct ancestors of modern humans while more recent scholarly work has suggested a smaller percentage of Neanderthal genetic material in the Homo sapiens genome sequence. In recent years, new research has strongly indicated that modern humans emerged and dispersed from Africa approximately 50,000 years ago, mixing with Neanderthals in the Middle East before venturing into Europe and Asia, with those anatomically-modern humans who passed into Asia mixing further with Denisovans in Oceania. If these archaic groups intermingled genetically, a newer, clearer picture of our ancestors can be understood, a picture that is far less grim than the violent images of conquest propounded by some analysts. The Altai Neanderthal genome sequence shows that Neanderthal-derived DNA in all non-Africans is 1.5 to 2.1 percent, while Denisovan-derived DNA found in human inhabitants of Papua New Guinea and Australia is 3 to 6 percent. There are also small traces (0.5 percent) of Denisovan DNA in mainland Asian and Native American populations. Such evidence of archaic human gene flow into modern populations suggests that decreasing populations of Neanderthals and perhaps also Denisovans never became “extinct” but were merely subsumed by increasing numbers of modern humans. Ultimately this data supports the theory that Neanderthals and Denisovans did interbreed with Homo sapiens and did produce fertile offspring. Absolutely integral to an understanding of archaic humanity is consciousness of the fact that very much is still unknown to us. In fact, if all of the excavated hominin remains from which we derive our knowledge of our ancestors were gathered together into one collection, it would easily fit into the bed of a single pickup truck. Several other lineages and archaic human populations are for now beyond our knowledge. For example, 2.7 to 5.8 percent of the Denisovan genome comes from an unknown source, possibly an archaic hominin group which diverged from other hominins around 1 million years ago. Therefore, our current understanding of archaic humans must remain pliable and open to new findings and interpretations of raw data. Humans appear to have inherited some traits related to skin, hair & autoimmune diseases from Neandertal ancestors: here. DNA study shows why Neanderthals and modern humans are so different: here. Neandertal Demise: An Archaeological Analysis of the Modern Human Superiority Complex: here. A newly discovered hearth full of ash and charred bone in a cave in modern-day Israel hints that early humans sat around fires as early as 300,000 years ago — before Homo sapiens arose in Africa: here. Already earlier, Peking Man is said to have used fire. Neanderthal faces emerge from the gloom of a Spanish cave. Bones and skulls found in the cave show Neanderthal facial features appearing for the first time 430,000 years ago: here. The Neandertal branch of the hominid family tree just got a lot more shrublike: here. Neanderthals may have used their teeth as a third hand. Evolved big brain later: here. The Denisovans – The Third Species of Human: here.
<urn:uuid:07c3da2b-ce82-4470-85de-d6a65b5f0a62>
CC-MAIN-2016-50
https://dearkitty1.wordpress.com/2014/01/06/ancient-neanderthals-new-research/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540839.46/warc/CC-MAIN-20161202170900-00294-ip-10-31-129-80.ec2.internal.warc.gz
en
0.950111
2,102
3.765625
4
[ 1212, 2008, 1139, 546, 2346, 25, 198, 1270, 2447, 2813, 198, 2484, 1723, 262, 2482, 286, 257, 4858, 11, 8688, 2050, 11, 8513, 396, 311, 4520, 68, 350, 11033, 11033, 2127, 2523, 262, 7446, 6617, 326, 1903, 5384, 285, 515, 351, 38752, 400, 874, 706, 356, 3888, 503, 286, 5478, 13, 357, 5297, 11, 867, 286, 514, 423, 38752, 11669, 7446, 2014, 679, 635 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Each year 1 in 5 females and 1 in 7 males engage in self injury. Many teens who self harm report being bullied before they started using self harm as a coping strategy for dealing with difficult emotions. Self harm is one of the many negative results of bullying. As elementary counselors we need to continue to provide leadership to in school-wide anti-bullying efforts. To reduce bullying and mitigate its harmful effects all staff must be trained and on board about the importance of receiving bullying reports and developing interventions that reduce bullying behavior. We need to empower students to respond assertively to bullying. Urge students to speak up and challenge mean behavior. Teach the students to say "How do you think it is okay to say or do that to me?" or "Talking that way is not right, leave them alone" (for upstanders).
<urn:uuid:cb7be29e-8f84-4785-8853-e2932b64ab8e>
CC-MAIN-2018-30
http://elementarycounseling.blogspot.com/2015/04/bullying-can-lead-to-self-harm.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589980.6/warc/CC-MAIN-20180718002426-20180718022426-00161.warc.gz
en
0.96765
167
3.59375
4
[ 10871, 614, 352, 287, 642, 12366, 290, 352, 287, 767, 10835, 8209, 287, 2116, 5095, 13, 4650, 15508, 508, 2116, 4419, 989, 852, 33632, 878, 484, 2067, 1262, 2116, 4419, 355, 257, 35326, 4811, 329, 7219, 351, 2408, 10825, 13, 12189, 4419, 318, 530, 286, 262, 867, 4633, 2482, 286, 20714, 13, 1081, 19823, 44135, 356, 761, 284, 2555, 284, 2148, 5531, 284, 287 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Fuels planning : science synthesis and integration. Social issues fact sheet. 19, Impacts of wildland fire on communities. - Physical Description: 1 online resource (2 unnumbered pages) : color illustrations. - Publisher: [Fort Collins, Colo.] : United States Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2007. |General Note:|| Title from caption (viewed July 21, 2016). "Synthesizing scientific information for fire and fuels project managers." "Social Science Team Lead: Pamela Jakes." |Bibliography, etc. Note:|| Includes bibliographical references (page ). Search for related items by subject |Subject:||Wildfires > Social aspects > United States. Forestry and community > United States. Search for related items by series
<urn:uuid:b42d5e07-5a53-4ef3-879b-65ab619ee5a7>
CC-MAIN-2017-09
https://evergreen.lib.in.us/eg/opac/record/20766457
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00434-ip-10-171-10-108.ec2.internal.warc.gz
en
0.728965
168
2.640625
3
[ 41133, 1424, 5410, 1058, 3783, 21263, 290, 11812, 13, 5483, 2428, 1109, 9629, 13, 678, 11, 9855, 8656, 286, 4295, 1044, 2046, 319, 5348, 13, 198, 12, 16331, 12489, 25, 352, 2691, 8271, 357, 17, 555, 35565, 5468, 8, 1058, 3124, 27128, 13, 198, 12, 28045, 25, 685, 21926, 14006, 11, 41943, 8183, 1058, 1578, 1829, 2732, 286, 19717, 11, 9115, 4809, 11, 24534 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The other day, while preparing dinner, I listened to two announcers on the radio puzzling over the words in some old Christmas carols. "What's figgy pudding?" one asked. "And bells on Bob's tail ring - who's Bob?' commented the other. Of course, they were trying to be humorous, but I think their ignorance and confusion worked as humour because many people do not know the origins of Christmas carols, or the meaning and origins of many of our Christmas customs. Without any understanding of the faith-foundation of our religious traditions, it is easy to dismiss their relevance in our lives today. We follow them now because they are familiar, and "It just wouldn't be Christmas without it" but do they help increase our faith? Are artificial Christmas trees a modern convenience or a symptom of a deeper spiritual malnutrition in our society? OK, so that's a stretch. But to be serious, I think if we knew why, how and when our Christmas traditions began, we would gain a greater appreciation for our forbears, and for the faith that inspired them to create traditions that enrich our lives and teach our children. The many versions of each tradition do not dilute or contradict one another, but rather point to the universality of our faith; every culture and each family is unique and distinct. Each has its own strengths and blessings. All have something to contribute to the great communion of the Church, and the song of Joy which is the Nativity. by Shonnie Scarola used with permission from "Christian Customs, Folklore, Legends and Feast Days of the Christmas Season" Saint Boniface and The Christmas Tree: Saint Boniface, an English missionary, known as the "Apostle of Germany", in 722 came upon some men about to cut a huge oak tree as a stake (Oak of Thor) for a human sacrifice to their pagan god. With one mighty blow, Saint Boniface felled the massive oak and as the tree split, a beautiful young fir tree sprang from its center. Saint Boniface told the people that this lovely evergreen, with its branches pointing to heaven, was indeed a holy tree, the tree of the Christ Child, a symbol of His promise of eternal life. He instructed them henceforth to carry the evergreen from the wilderness into their homes and to surround it with gifts, symbols of love and kindness. Saint Boniface (feast June 5) received the name Winfrid at his baptism but took the name Boniface before he was ordained to the priesthood. He was martyred at the age of 75. The Paradise Tree: There is a very old and charming European custom of decorating a fir tree with apples and small white wafers representing the Holy Eucharist. These wafers were later replaced by little pieces of pastry cut in the shapes of stars, angels, hearts, flowers, and bells. Eventually other cookies were introduced bearing the shapes of men, birds, roosters and other animals. In the Middle Ages, about the 11th century, religious theater was born. One of the most popular plays, the German mystery play, concerned Adam and Eve, their fall and expulsion from the Garden of Eden--from the Early Paradise. The Garden of Eden was represented by a fir tree hung with apples. It represented both the Tree of Life and the Tree of Discernment of Good and Evil which stood in the center of Paradise. The play ended with the prophecy of a coming Savior, and for this reason, this particular play was often enacted during Advent. The one piece of scenery--the "Paradeisbaum (the Paradise Tree) became a popular object, and was often set up in churches, and eventually in private homes as well. It became a symbol of the Savior. Since the tree represented not only Paradise, and man's fall, but also the promise of salvation, it was hung not merely with apples, but also with bread or wafers (Holy Eucharist) and often sweets (representing the sweetness of redemption). In sections of Bavaria, fir branches and little trees, decorated with lights, apples and tinsel are still called Paradeis. The German and English immigrants brought the Christmas tree to America. Fruits, nuts, flowers, and lighted candles adorned the first Christmas trees, but only the strongest trees could support the weight without drooping; thus, German glassblowers began producing lightweight glass balls to replace heavier, natural decorations. These lights and decorations were symbols of the joy and light of Christmas. The star that tops the tree is symbolic of the "Star in the East". A Viking Story: This story tells us that when Christianity first came to Northern Europe, three personages representing virtues were sent from Heaven to place lights on the original Christmas Tree. They were Faith, Hope and Charity. Their search was long for they were required to find a tree that was as high as hope; as great as love; as sweet as charity; and one that had the sign of the cross on every bough. Their search ended in the forests of the North for there they found the Fir. They lighted it from the radiance of the stars and it became the first Christmas tree. The Legend of the Pine Tree: When the Holy family was pursued by Herod's soldiers, many plants offered them shelter. One such plant was the Pine Tree. When Mary was too weary to travel longer the family stopped at the edge of a forest to rest. A gnarled old pine which had grown hollow with its' years invited them to rest within its trunk--then it closed its branches down and kept them safe until the soldiers had passed. Upon leaving, the Christ Child blessed the pine and the imprint of his little hand was left forever in the tree's fruit--the pine cone. If a cone is cut lengthwise the hand may still be seen. What is the origin of Christmas cards? The Christmas card is a Victorian creation, which began as a kind of stationery. The first card was produced by Sir Henry Cole who worked for the British Postal Service, and an artist he hired named John Horsley. This early card was a depiction of a Christmas scene framed in three panels. In the center panel was a homey table scene: children, parents and grandparents seated and some raising their glasses for a toast. On either side were panels depicting acts of Christmas charity: to the left, feeding the hungry; to the right, clothing the naked. Underneath appears the now familiar phrase "A Merry Christmas and a Happy New Year to You." Actually cards were preceded by "Christmas Pieces" written by school boys in England as greetings to their parents and as proof of their progress in the art of writing. The Advent Wreath is a Lutheran custom that originated in Eastern Germany. They are round as a symbol of God's eternity and mercy, of which every season of Advent is a new reminder; and it is made of evergreens to symbolize God's "ever-lastingness" and our immortality. Green is also the Church's color of hope and new life. Four candles, three purple or violet that represent penance, sorrow, and longing expectation and one rose or pink that represents the hope and coming joy are placed within to represent the four weeks of Advent. They are replaced with white candles for the Christmas season which ends with Epiphany. Wreaths are an ancient symbol of victory and symbolize the "fulfillment of time" in the coming of Christ and the glory of His birth. In old German tradition, on the first Sunday of Advent, the children write their Christmas letter to the Christ child, Christkindl, who accompanied by His angels, will bring the Christmas tree and all the good things on it and under it. In Denmark, the Christmas season begins on December 1, with the lighting of the calendar candle. The candle is marked with 24 lines, one for each day before Christmas; the burning of the candle represents the waiting and preparing for Christ's coming. There are many ways to create an Advent Wreath...here's some advice on creating your own Advent Wreath. |Book related to this story ...| Legends and Traditions of Christmas: Devotional Ideas for Family And Group Use During Advent by Trudie West Revoir and John H. Pipe
<urn:uuid:82cc6d36-8d6b-4721-9324-7814dc44dfdf>
CC-MAIN-2016-07
http://www.domestic-church.com/CONTENT.DCC/19971201/ARTICLES/ADVTRAD1.HTM
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701160918.28/warc/CC-MAIN-20160205193920-00318-ip-10-236-182-209.ec2.internal.warc.gz
en
0.975036
1,711
2.828125
3
[ 464, 584, 1110, 11, 981, 10629, 8073, 11, 314, 16399, 284, 734, 2335, 7999, 319, 262, 5243, 42695, 625, 262, 2456, 287, 617, 1468, 6786, 1097, 10220, 13, 366, 2061, 338, 2336, 1360, 44670, 1701, 530, 1965, 13, 366, 1870, 30987, 319, 5811, 338, 7894, 5858, 532, 508, 338, 5811, 8348, 16476, 262, 584, 13, 3226, 1781, 11, 484, 547, 2111, 284, 307, 36102 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Learn something new every day More Info... by email The main functions of calcitonin, which is a naturally occurring hormone, are to help to regulate levels of calcium and phosphorus in the bodies of a variety of different animals. In its natural form, this hormone can help prevent the body from taking up calcium from the bones and from reabsorbing the mineral through the urinary tract. Both of these actions help to decrease the amount of calcium in the bloodstream of an animal. As a medical supplement, calcitonin can help prevent bone loss in patients with osteoporosis. Mammals create calcitonin in the thyroid gland. Once it enters the bloodstream, one of its functions is to prevent the body from breaking down the calcium in the bones. This action helps to decrease the amount of calcium in an animal's bloodstream by lowering the amount of the mineral that moves from where it is stored in the bones to the blood. One of its other functions is to prevent the kidneys from taking up calcium, allowing it to pass out of the body through the urine instead. Though this hormone has a significant effect on the amount of calcium in the blood of many animals, it does not appear that its role is as significant in humans. Human patients who have had the thyroid gland removed are still able to regulate the amount of calcium in their bloodstream through the use of other hormones. In most cases, the presence of too much calcium in the blood stream signals the thyroid gland to release calcitonin to quickly lower the levels. Though increased levels of calcitonin in the blood can indicate a number of different medical disorders, the hormone does not appear to have a significant effect on the physiology of the human body. This makes it safe to use for the treatment of osteoporosis, as well as in other disorders related to hypercalcemia. As a medical supplement, the most important of the functions of calcitonin is to help treat osteoporosis. This treatment is more commonly used for women than men because supplemental doses of the hormone testosterone can often help prevent bone loss in men. Men with normal levels of testosterone can be given calcitonin as a treatment, as can men who have not improved after treatment with testosterone. In women, calcitonin is usually only prescribed once treatment with biphosponates has proved ineffective.
<urn:uuid:63652453-bc89-4fdc-ac63-94d2cf74d226>
CC-MAIN-2014-49
http://www.wisegeek.org/what-are-the-functions-of-calcitonin.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009271.61/warc/CC-MAIN-20141125155649-00214-ip-10-235-23-156.ec2.internal.warc.gz
en
0.93814
473
3
3
[ 20238, 1223, 649, 790, 1110, 3125, 14151, 986, 416, 3053, 198, 464, 1388, 5499, 286, 42302, 37752, 259, 11, 543, 318, 257, 8752, 14963, 17770, 11, 389, 284, 1037, 284, 16697, 2974, 286, 19700, 290, 48980, 287, 262, 5920, 286, 257, 4996, 286, 1180, 4695, 13, 554, 663, 3288, 1296, 11, 428, 17770, 460, 1037, 2948, 262, 1767, 422, 2263, 510, 19700, 422, 262 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Virtual Private Networks, also known as VPNs, have had something of an image change in the last few years. Historically, the term VPN has come with negative connotations – linked to users on the Dark Web hiding their identities from law enforcement. With that in mind, it’s interesting to see the cultural shift around VPN use, and the widespread adoption of this kind of tool by everyone from digital nomads to retirees. The focus is no longer on anonymity for nefarious purposes, but on the heavy encryption of personal user data and the boost, a VPN can give to anyone’s cyber defences. In the USA, 65% of people recently surveyed stated that they use a VPN on their personal or work device, or on both. The UK is a little further behind, with 44% of respondents stating the same – but this is still a drastic uptake, and many VPN providers are reporting almost a 200% increase in sign-ups in the last two years. What is driving the change? Virtual Private Networks have two main functions – anonymity, and privacy. News around the UK’s Snooper’s Charter and the USA’s recent scrapping of internet privacy laws has made the general public painfully aware of the many ways in which their online activities are being logged, watched and sold. As a result, there’s been a dramatic increase in the number of people taking measures to avoid snooping. Virtual Private Networks are designed to hide the IP address of their user, meaning that online activities can’t be traced back to their device, and are instead logged as having been made through a VPN server in a different location. They also add a layer of end-to-end encryption to a user’s connection, meaning that if a cybercriminal did try to spy on things like bank account details and payments being transferred, they wouldn’t be able to. Instead, all they’d see on the connection are seemingly nonsensical encryption keys. Keeping things private When it comes to privacy rather than security, it’s the IP address switching that has piqued a lot of people’s interest. If websites and internet service providers know your IP and what you’re doing through a particular device, they can view your browsing history and in many instances, sell information about your habits and interests to advertising agencies who, in turn, want to sell you their products. Internet users are getting so fed up with being bombarded by targeted ads that they are using ad blockers in large numbers, but these can be inconsistent and cause browser lags and crashes. Hiding your browsing activity is a simple way to avoid pushy advertising. Another reason for the increase in VPN use is an increased awareness of the dangers of cybercrime. As people’s lives move more and more online, criminal activity is following – there were 978 million cybercrime victims around the world in 2017, resulting in hundreds of billions of dollars being stolen from ordinary people through hacking, ransomware, online fraud and similar tactics. Whether it’s payment card details in an online shop, internet banking transactions, or simply sending personal addresses and information via email, there are all kinds of processes we don’t think twice about acting out online that can put data at risk. While using antivirus on your devices is a good way to keep out things like malware and ransomware, it doesn’t protect your personal data from third-party onlookers while you’re browsing the web. To minimize the risk that you’ll be the next victim of cybercrime, privacy tools like a VPN are big steps in the right direction. Who really uses VPNs? Though there’s no doubt that schoolchildren around the world are still using VPNs to access Facebook and Instagram when they should be doing work, a host of common user types from other walks of life have proven to be big users of this kind of technology. Digital nomads are a key group, working on the move and looking for easy ways to turn unsecured airport and coffee shop Wi-Fi networks into something secure enough to work on. Everyday home workers, and businesspeople who catch up on client work from trains and coaches, also require the added encryption a VPN can offer. Elsewhere in the on-the-move community, VPNs are used to secure discounts on flights and hotel bookings, and to help holidaymakers stream their favorite shows while they’re abroad. People who retire abroad have been adopting them for similar reasons, but realistically, the majority of VPN adopters are just people who want to know their personal details aren’t going to be stolen from under their nose. VPN use in authoritarian countries tends to be somewhat higher, with users trying to sidestep national restrictions on access to certain websites, and things like Uganda’s social media tax. Online security concerns According to the US government, America’s greatest cybercrime concerns are identity theft, credit card and banking fraud, data collection and loss of control over personal data. In the UK, more than half of all reported crime each year now involves cybersecurity in some way. If a hacker does gain access to your connection, it isn’t just outright immediate theft that can occur. They can also edit the information you’re sending and receiving, with criminals identified as having changed notes on files and contracts to make them redundant or to reverse them, as well as more ‘traditional’ actions like changing a payment account number to their own. It’s understandable that people are starting to take more notice of cybersecurity, thinking about all of the tools they can have in their repertoire without needing expert knowledge and a huge pile of cash. Virtual Private Networks are no longer the domain of the hacker – they have slowly but surely stepped into place as the obvious companion to antivirus, as much a part of everyday cybersecurity as setting a complex password. Based Blockchain Network
<urn:uuid:0fa82a1c-b875-4a89-8a6c-849e24a8902e>
CC-MAIN-2019-35
http://www.hackwolrdwide.com/from-cybercrime-to-cyber-defence-how-vpns-went-mainstream/technology-hacking/2018/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313589.19/warc/CC-MAIN-20190818022816-20190818044816-00387.warc.gz
en
0.953062
1,224
2.75
3
[ 37725, 15348, 27862, 11, 635, 1900, 355, 21669, 82, 11, 423, 550, 1223, 286, 281, 2939, 1487, 287, 262, 938, 1178, 812, 13, 48153, 11, 262, 3381, 21669, 468, 1282, 351, 4633, 369, 30078, 784, 6692, 284, 2985, 319, 262, 3801, 5313, 11816, 511, 18413, 422, 1099, 5394, 13, 198, 3152, 326, 287, 2000, 11, 340, 447, 247, 82, 3499, 284, 766, 262, 6467 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
It is thrilling to discover the Biblical Holy Days and begin celebrating them. At the same time, many who study the Feasts of the Lord also come to the realization that some of the other days they have observed in the past may not really be pleasing to God. A growing number of Christians, learning of the pagan roots of major “Christian” holidays, are abandoning them. But what about Thanksgiving? Should a true follower of Yeshua (Jesus) celebrate Thanksgiving Day? Does it also have roots in paganism? Obviously this relatively recent American and Canadian holiday is not found in the Bible, though there is some speculation that the early pilgrims may have patterned their celebration after the Feast of Tabernacles. Certainly they were offering thanksgiving to God for a bountiful harvest. The first North American “Thanksgiving” feast was a harvest festival including the pilgrims and native Americans. Harvest festivals are common in many cultures, and this one lasted for three days. It didn’t become a national holiday in the United States until 1863, proclaimed by President Abraham Lincoln and acknowledging the “blessings of fruitful fields and healthful skies” as coming from “the ever watchful providence of Almighty God.” Lincoln entreated every American “to set apart and observe the last Thursday of November next as a day of Thanksgiving and Praise to our beneficent Father who dwelleth in the heavens.” Give Thanks – Hodu About a dozen times in the Hebrew Bible we read the phrase hodu l’Adonai, “Give thanks to the Lord.” Half of those include the entire refrain hodu l’Adonai kiy tov kiy l’olam chasdo, “Give thanks to the Lord, for he is good; for his lovingkindness is everlasting.” The word hodu comes from the Hebrew word yadah (Strong’s #H3034) meaning (in the hiphil stem for you scholars) “to give thanks, laud, praise” (Brown-Driver-Briggs). And, it is in the imperative form. All of that technical grammar stuff just boils down to this: it is a command. Hey, you, give thanks! Giving thanks to the Lord usually included lifting the hands in praise. In fact, the Hebrew word for hand (yad) can be found in the word yadah. The Theological Wordbook of the Old Testament further explains that the Hebrew Bible “does not have our independent concept of thanks. The expression of thanks to God is included in praise; it is a way of praising.” The first place we see this phrase is in 1 Chronicles 16 when David brings the Ark of the Covenant to Jerusalem. It is both the opening (verse 8) and closing (verse 34) of a psalm of praise. The next time it is used we find King Jehoshaphat leading the army of Judah against their enemies. Before his army advanced, the king put the temple choir in front of the army and instructed them, “Give thanks to the LORD, for his lovingkindness is everlasting” (2 Chronicles 20:21). When they arrived at the battle site, it was not even necessary to fight. God had already been there and caused the enemy camps to destroy each other. Thanksgiving is a theme throughout many of the Psalms. The phrase “Give thanks to the LORD” opens Psalm 105, Psalm 106 and Psalm 107. The first and last verses of Psalm 118 are exactly the same, as is the beginning of Psalm 136. “Give thanks to the LORD, for He is good; For His lovingkindness is everlasting.” Psalm 136 then continues by concluding every one of its 26 verses with “For His lovingkindness is everlasting,” ending with the instruction “Give thanks to the God of Heaven.” Thanksgiving – Todah The 100th Psalm, aptly titled in the Hebrew Bible as “A Song for Thanksgiving,” tells us to “Enter His gates with thanksgiving, and His courts with praise.” The Hebrew word for thanksgiving is todah (Strong’s #H8426), a noun derived from the verb yadah. This word also occurs about a dozen times in the Psalms, usually rendered as thanksgiving, and sometimes as praise in a few translations. Psalm 42 associates thanksgiving with a festival celebration: “For I used to go along with the throng and lead them in procession to the house of God with the voice of joy and thanksgiving; a multitude keeping festival” (Psalm 42:4). The same word is used in Jeremiah 33:11 where it refers to those “who bring a thank offering into the house of the LORD.” The familiar King James Version says “bring a sacrifice of praise into the house of the LORD.” This passage is alluded to in Hebrews 13:15 where the Greek word ainesis (Strong’s #G133) is used, a word meaning “specifically, a thank offering” (Strong’s Dictionary). Giving Thanks in Greek Inserted between Daniel 3:23 and 3:24 are two short books, sometimes combined, that are found in the Apocrypha. The Prayer of Azariah and the Song of the Three Young Men give an account from inside the fiery furnace. There Azariah (Abednego) prays “Blessed are you, O Lord, God of our ancestors, and worthy of praise.” It is a beautiful prayer continuing for the next twenty verses. Then he is joined by his companions as they declare “Blessed are you, O Lord, God of our ancestors, and to be praised and highly exalted forever.” Their song also continues, and then concludes with the familiar refrain “Give thanks to the Lord, for he is good, for his mercy is forever.” The Apocrypha is written in Greek. The Greek root equivalent to Hodu, used here and elsewhere in the Septuagint translation of the Hebrew Bible, is exomologeo (Strong’s #G1843). One of its meanings is an expression of praise and thanksgiving, which we now know are inseparable. This is the word recorded in Matthew 11:25 and Luke 10:12 when Yeshua prayed, “I praise You, Father, Lord of heaven and earth…” The KJV/NKJV translates this as “I thank you, Father…” So What About Thanksgiving Dinner? Clearly the giving of thanks to the Lord is encouraged – even commanded – in Scripture. The Thanksgiving Day celebration in America is founded upon acknowledging the providence of God and giving thanks to Him. Unlike some of the other holidays, Thanksgiving Day has no roots in any pagan celebration. So enjoy the time with family and friends, feast on the bounty of the harvest, and remember to “always give thanks for everything to God the Father in the name of our Lord Yeshua the Messiah” (Ephesians 5:20 CJB).
<urn:uuid:0252876a-be8b-45f9-bc0b-cc3b20902cd5>
CC-MAIN-2023-14
https://messianiclight.com/what-about-thanksgiving/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00509.warc.gz
en
0.951636
1,509
2.578125
3
[ 1026, 318, 31610, 284, 7073, 262, 31752, 7439, 12579, 290, 2221, 17499, 606, 13, 1629, 262, 976, 640, 11, 867, 508, 2050, 262, 5452, 5773, 286, 262, 4453, 635, 1282, 284, 262, 23258, 326, 617, 286, 262, 584, 1528, 484, 423, 6515, 287, 262, 1613, 743, 407, 1107, 307, 28790, 284, 1793, 13, 317, 3957, 1271, 286, 9316, 11, 4673, 286, 262, 36164, 11135 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Pest Control Methods in Rice Production Disclaimer: This work has been submitted by a student. This is not an example of the work written by our professional academic writers. You can view samples of our professional work here. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays. Published: Wed, 23 May 2018 CHAPTER 1: Introduction As a cereal crop, rice has become the staple food for most human population in Asia, including Malaysia. Rice is a commodity that paramount importance in people uses every day. Rice, Oryza sativa L., belongs to the Poacea family. In Malaysia, it is grown in the Peninsular and on Borneo Island. About 300 500 hectares in Malaysia Peninsular and 190 000 hectares in Borneo Islands are devoted to rice production (FAO, 2002). Being a security crop, rice production in Malaysian is protected by the government. The national average rice production in the country is only 3.0 tons per hectare. The local productions can fulfil only 60-65% of domestic requirements, thus the needs of importation of rice from foreign country. In 1999, about 600 000 metric ton of rice has imported by Malaysia from various countries (Consumer International, 2008). 40% of rice consumption in Malaysia is imported from countries such as Thailand, Vietnam, China and Pakistan. Malaysia has enhanced the production of rice in many ways to ensure food security and to meet the demand of population, but still there is many constraints involving rice industry. Rice production faced many constraints and one of the constraints is the attacked by the pest. Pest is any organisms or microbes with the potential to reduce the yield or value of the rice crop are rice pest (or of rice seeds) (Jahn et al., 2007). Insects that can cause damage are insects, weeds, rats, birds and pathogens. Excessive use of pesticide and high rates of nitrogen fertilizer application can be a factors contributing to outbreaks of the pest. The main pests of the rice include rice weevils, stemborer, panicle rice mite, rats (Leung et al., 2002), the rice gall midge (Jahn and Khiev 2004), the rice bug (Jahn et al., 2004), the brown planthopper (Preap et al., 2006), the rice leafroller (Murphy et al., 2006) and the weed Echinochloa crusgali (Pheng et al., 2001). At 2007, pests damage cost loses 1 148 hectare in Malaysia (ASEAN Food Security Information, 2008). Rice Ragged Stunt, Sheath Blight and Tungro are the main diseases of the rice. Rice blast cause by the fungus Magnaporthe grisea, is the most significant disease affecting rice cultivation. In addition to causing direct damage to the plants, many rice insect pests also act as a vector of spiral disease of rice, such as Tungro virus (Dale, 1994; Thresh, 1989). Pest control is at least as old as agriculture, as there has always been a need to keep crops free from pests. In order to maximize food production, it is advantageous to protect crops from competing species of plants, as well as from herbivores competing with humans. Pest management is an important practice in order to reduce pest population and disease in rice field. Pest management practices include chemical control, biological control and insect pest management (IPM). Most of them using pesticide as chemical control either other animals or predators as biological control. IPM is one of strategies that can reduce the use of pesticide in crop production. Adoption of IPM can reduce the potential of pesticide contamination to environment and food chain. Chemical control has been the most pest control methods, it has created many problems, such as reduce in beneficial insect and pesticide residues in water, soil and plant itself. Pesticide residues can cause negative effect to the human health and environment. At least 40% of sample taken from wholesale market in Selayang such as spinach (bayam), kangkung, round cabbage and Chinese mustard were contaminated and all the celery and curry leaf tested positive for three groups of cancer causing pesticide (Asean Food Conference, 2007). The objectives of this study are: - To confirm the current pest control methods used in KADA area. - To find out if there is a relationship of farmers’ background to their pest control method. CHAPTER 2: Literature Review The scientific name of rice is Oryza sativa, is a plant in Poacea family (USDA, 2006). In the developing country, rice become the most important cereal crop and it also became the staple food of over half of the world’s population, grown over about 124 million hectares (Pathak, 1975) and produced in at least 95 countries (Coats, 2003). Classified primarily as a tropical and sub-tropical crop, it is grown in over 100 countries today, on every continent except Antarctica, extending from 50-53°N to 40°S and from sea level to an altitude of 3000 meters (Juliano, 1993; Pathak & Khan, 1994). Rice is grown either by direct sowing – broadcast, drilled or by transplanting and under diverse water regimes: as an upland crop where is no standing water and rains are the sole source of moisture, or under lowland conditions whereby water, derived from the rain or irrigation system, is impounded in the fields. On slopes, it is cultivated in terraces, and in valleys, or low-laying sites, floating rice may be grown in several feet of prolonged sunshine. The optimum temperature is about 30°C but, particularly during the flowering stage, temperature of about 20°C induces sterility (Pathak, 1975). Cultivated rice is a semi-aquatic annual grass, although in the tropics it can survive as perennial, producing new tillers from nodes after harvest (rotton rice). A mature rice has a main stem and several tillers (or side branches), each productive tillers bearing a terminal flowering head or panicle. Plant height varies with the variety and environmental conditions, ranging from around 0.4 m to more than 5 m in deepwater rice varieties. Roots of the rice plant develop from nodes. There are two major types of roots. Crown roots (including mat roots) developed below the soil surface. Roots that developed from nodes above the soil surface are usually referred as nodal roots. Rice can grow to 1-1.8 m tall, occasionally more depending on the variety and soil fertility. The grass has long, slender leaves 50-100 cm long and 2-2.5 cm broad. The small wind-pollinated flowers are produced in a branched arching to pendulous inflorescence 30-50 cm long. The edible seed is a grain (caryopsis) 5-12 mm long and 2-3 mm thick. The growth period of the rice plants is three to six months (90 to 180 days), depending on the variety and the environment in which it is grown (IRRI, 2003a). The growth duration can be divided into many stages, but the most basic division is into three phases: the vegetative phase, reproductive phase, and ripening phase (Tanaka, 1965). The vegetative phase begins with germination and ends at panicle initiation, when the plant begins to partition assimilate to developing panicle. During the reproductive phase, the panicle forms within the least sheath, is exserted, and undergoes anthesis (flowering). The ripening or grain-filling phases begins after anthesis and ends at maturation (Karen & Julia, 2003) Thus, although rice is grown under diverse cultural conditions and over a wide geographical range, it is essentially a crop of warm, humid environments conducive to the survival and proliferation of insects. Of the more than 70 species recorded as pests of rice, about 20 have major significance. They infests all parts of the plant at all growth stages, vectors of virus disease, and are a major factors responsible for low rice yields particularly in tropical Asia (Pathak, 1975). 2.1 Rice in Malaysia Rice area accounts for about 11 percent of the total agricultural lands in Malaysia. Rice remains as the country’s most important crop in terms of cultivation, being the principal staple food for most of the populace. To maintain rice production and sufficiency, the government has designated eight granary areas as the permanent rice-producing areas in the country. These designated areas, of various sizes and productivity, include the Muda Agriculture Development Authority (MADA) Kedah, Kemubu Agriculture Development Authority (KADA) Kelantan, Barat Laut Selangor, Besut, Krian/Sg.Manik, Endau/Rompin, Seberang Prai, Seberang Perak and Kemasin/Semerak (Tan, 1987). These areas currently cover only 36 percent of the total physical paddy land located mainly in Peninsular Malaysia, their combined area constitutes 57 percent of the total land area planted to rice and their combined production amounts to 72 percent of the total national rice production. These granary areas were officially designated based on their being the traditionally most important rice-producing regions in the country. All areas are located in Peninsular Malaysia. These eight major granary areas have been reserved solely for rice cultivation where new rice varieties and new technologies from research and development efforts can be adopted. The other rice areas excluded from the eight are free to choose what alternative crops to plant every season (Tunku Mahmud, 2006). The designation of specific rice granary areas is an astute policy to protect the interest of the dwindling, but politically important, rice-producing Malay-dominated segment of the rural population within the overall context of national economic policies that thrust towards industrial crop production. As the priority areas for rice production supplying the needs of the rest of Malaysia, government programs, support and interventions in the rice sector are focused in these eight designated regions. 2.3 Definition of Pest Control Good Agriculture Practice (GAP) is the design to approach aims at applying available knowledge to addressing environmental, economic and social sustainability dimensions for on-farm production and post-production processes, resulting in safe and quality food and non-food agricultural products. Establishing the suitable procedures for IPM in pest management in rice cultivation is an important component of GAPs in order to reduce the usage of chemical substance and pesticide in crop production. . Pests are harmful organisms and can cost the food industry billions of dollars each year (Marriott, 1991). The pests of primary concern are insects and rodents and they are responsible to spread disease through foods. Rodents and insects carry pathogenic bacteria both internally and on their bodies (FAO, 1997). Pest control is the process of minimizing or removing a wide range of undesirable insects and other pests from spaces occupied by people. Pest control tactics that commonly used today can be divided into two categories: natural controls and artificial controls. Natural control can be any environmental factor that keeps a pest population below its economic injury level and for artificial controls, it employs products or processes of human origin to modify a pest’s behaviour, distribution or physiology. 2.3.1 Chemical control Chemical control involve of chemical substance that disrupt developmental processes (growth regulators), prevent reproduction (sterilants), cause direct mortality (toxicants) or modify insect behaviour (semi chemicals). The most common method of chemical pest control is the use of pesticides. Pesticides are often classified according to the pest they are intended to control. For example, insecticides are used to control insects, herbicides to control plants, fungicides to control fungi, rodenticides to control rodents, avicides to control birds and bactericide to control bacteria. 2.3.2 Biological control Biological control is the introduction of natural enemies into a new place where they did not originate or do not occur naturally. Biological control also defined as the reduction of pest populations by natural enemies and typically involves an active human role. Natural enemies or biological control agents, includes parasitoids, predators, pathogens, viruses, fungi, and bacteria. Biological control is frequently incorporated into integrated pest management (IPM) programs. Integrated pest management (IPM) is an integrated approach of crop management to solve ecological problems when applied in agriculture. There are three methods used in this programme: observation, prevention and intervention. It is an ecological approach with a main goal of significantly reducing or eliminating the use of pesticides while at the same time managing pest populations at an acceptable level. The major objective of IPM is to control pests economically through environmentally sound techniques (Marriott, 1994). 2.3.3 Cultural control Cultural control involves of the manipulation of the environment to make it less habitable for pest species.  If there is any changes in the time of planting or harvesting, water and fertilizer applications, the spatial distribution of host plants (crop rotation, intercropping, or trap cropping), and management of ground cover or surrounding vegetation can cause significant effect on the survival and growth of pest populations. 2.4 Integrated pest management in Malaysia Integrated pest management (IPM) was first introduced into Malaysia in 1960s to combat the surging problem of pest resistance and resurgence in the seventies, however, the implementation of IPM principles and practices in Malaysia was gradual yet continual process. The IPM were introduced in rubber (Rao, 1969), cocoa (Wood, 1971), oil palm (Wood, 1971), rice (Lim, 1970; Jusoh rt al.., 1980) and coconut (Ho et al.., 1971). The use of barn owl, Tyto alba (Scopoli) as a predator of rat, Rattus argentiventer in paddy field has been found to be a very successful biological control agent in Malaysia. Another alternative to control weedy rice and weeds are by using duck. Ducks are very effective because they will scooping up the grains and seeds of weeds. Duck also can be used to control the population of the golden apple snails in paddy area (Othman and Palasubramaniam, 2001). Further with the extracts from the duck can be used as organic fertilizer. The use of biological control agent in paddy field has proven to be a success method. By using biological control agent, farmers can reduce their cost of production because less herbicide is needed in the early stage. CHAPTER 3: METHODOLOGY To achieve the objective of this study, a survey was conducted to gather the information on rice farmers’ attitudes on pest control practices in Kelantan and Terengganu. This study was carried out at Kemubu Agriculture Development Authority (KADA), Kelantan and Integrated Agriculture Development Area (IADA KETARA), Besut, Terengganu. KADA covers 5 irrigation plans for 5 separate territories, namely Kota Bharu, Bachok, Pasir Puteh, Pasir Mas and Tumpat. While IADA KETARA consist of four block of irrigation areas. Kemubu Agriculture Development Authority (KADA) was established in 1967. It covers 49 929 hectares of paddy area with 38 415 farmers. The current status of the net production in 2008 is 179 048 metric ton The Integrated Agriculture Development Area (IADA KETARA) was establish in 1992. It consist of 9 846 hectares of paddy area with 2 759 farmers. The net production in 2008 is 46 097 metric ton (DOA, 2010). 3.2 Data Sources 3.1.1 Data Collection There are many research techniques used for gather information on farmers pest management practise. However, the most common methods for data collection are personnel interviews, telephone interviews and self-administrated interview. For this study, the data was obtained by conducting the survey using questionnaire and interview with Agriculture Officer. The survey was conducted from June to August 2010. The total number of farmers involve in this study was 239 respondents from both IADA KETARA and KADA Interview was also conducted on agriculture officers from Department of Agriculture in the district to gather information on the he extension source on pest control practices of farmers. 3.1.2 Questionnaire Design Relevance and accuracy are two basic criteria to achieve the research’s purpose. Hence, a good questionnaire is needed so that the interviewer can get quick, accurate and reliable answers from the respondents. Therefore the questionnaire has been design using simple and direct way to avoid complexity as well as loaded question. The questionnaire constructed was referred to other related study. It was prepared in Bahasa Malaysia. It was divided into 4 sections; Section A, Section B, Section C and Section D where it was about demographic profile and attitudes of respondent respectively. 3.2 Data Analysis The data were analyzed using Statistical Package for Social Science (SPSS®) software. Descriptive analysis was used to analyze raw data from survey forms, and then transform into statistical data such as table, chart and histogram. Data from descriptive analysis was used to see the value in term of percentage, mean and chart. The data were analyzed using Pearson’s Chi-Square (X2) where appropriate. Cite This Work To export a reference to this article please select a referencing stye below:
<urn:uuid:980e3f7d-86d1-4425-92de-f5cd0f61b737>
CC-MAIN-2018-43
https://www.ukessays.com/essays/biology/rice-staple-food-most-human-population-asia-malaysia-biology-essay.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514030.89/warc/CC-MAIN-20181021140037-20181021161537-00277.warc.gz
en
0.929366
3,607
3.296875
3
[ 47, 395, 6779, 25458, 287, 13823, 19174, 198, 19618, 25, 770, 670, 468, 587, 8948, 416, 257, 3710, 13, 770, 318, 407, 281, 1672, 286, 262, 670, 3194, 416, 674, 4708, 8233, 8786, 13, 921, 460, 1570, 8405, 286, 674, 4708, 670, 994, 13, 198, 7149, 9317, 11, 6373, 11, 13242, 393, 10763, 6241, 287, 428, 2587, 389, 883, 286, 262, 7035, 290, 466 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Computer-Aided Drafting Technology Does the challenge of transforming ideas into reality excite you? Computer-Aided Drafting Technology gives you the skills and knowledge to do just that. Program graduates take engineers' inventive ideas and transform them into products or product parts. CAD technicians take a concept from theory to reality by using the latest software in industry to create the technical drawings used in the production process. - Computer-Aided Drafting Technology offers an Associate in Applied Science degree, a diploma, and a certificate - Students learn to design and prepare plans using Computer-Aided Design and Drafting (CADD) software - Students use their understanding of design and manufacturing techniques to produce effective product designs - Classes are offered at the Lee County Campus day and evening - CAD graduates work under the supervision of engineers and product managers, preparing multiple versions of designs for their review Computer-Aided Drafting Technology students learn art visualization and apply this knowledge to understand the mechanics of precision drawings related to the 3D design process. In addition, they learn a variety of software programs such as AutoCAD, Inventor, SolidWorks, and MasterCAM. Graduates are qualified for employment opportunities in the manufacturing or service sectors of engineering consulting firms and industrial design businesses. According to the U.S. Bureau of Labor Statistics Occupational Outlook Handbook, job growth for Drafting Technicians is about six percent per year. For information about careers and salaries, visit the Occupational Outlook Handbook website at: www.bls.gov/oco and search for "drafting technician".
<urn:uuid:ecb29d25-6c07-46e1-9f2c-28141ab1404b>
CC-MAIN-2016-30
http://www.cccc.edu/curriculum/majors/computeraideddrafting/
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823387.9/warc/CC-MAIN-20160723071023-00261-ip-10-185-27-174.ec2.internal.warc.gz
en
0.908616
323
3.078125
3
[ 34556, 12, 32, 1384, 13650, 278, 8987, 198, 13921, 262, 4427, 286, 25449, 4213, 656, 3950, 2859, 578, 345, 30, 198, 34556, 12, 32, 1384, 13650, 278, 8987, 3607, 345, 262, 4678, 290, 3725, 284, 466, 655, 326, 13, 6118, 19087, 1011, 12037, 6, 47602, 4213, 290, 6121, 606, 656, 3186, 393, 1720, 3354, 13, 37292, 33519, 1011, 257, 3721, 422, 4583, 284, 3950 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Gone are the days when almost everything was done through pen and paper. For example, in different professions, you needed letters for communication. All these activities are replaced with Android apps for professionals. Currently, doctors, teachers, lawyers, and business people use their tablets and smartphones at some point to do their work. The establishment of a smartphone has revolutionized the way professionals handle various activities at their workplaces. In many cases, companies owned expensive laptops to help manage their employees, data, and transactions. They have been replaced by tablets and smartphones that are owned by the workers. Android or Apple iPhone cases & screen protectors and mobile cybersecurity are the only added investment companies must make to ensure their reliance on smartphone technology is safe. Furthermore, business applications for professionals are being rewritten and the new ones established to help them perform their tasks much faster. Using a smartphone to do your job is not only a way to help you access the corporate network but also to help simplify organizational tasks. Along the way, different professions have had to change their operational culture to create room for the always-present nature of a modern smartphone. Here are various ways in which smartphones have become vital tools across virtually all professions. Smartphones in the Health Industry Smartphones have changed how individuals chat with friends, listen to music, read news and pay bills. Currently, they are poised to revolutionize the healthcare industry. Maybe you already use a smartphone to remind you to take medicines or use it to look for information from various healthcare facilities. Android and iPhone apps for professionals and plug-in accessories are turning the smartphone into what individuals have likened to doctors in pockets. At some point, this device could perform basic tests and diagnose health issues ranging from uncomplicated infections to complex ones such as cancer. The first application of the smartphone in healthcare technology is the out-of-clinic patient use of peripheral hardware and software tools that attach to these devices. Already, mobile-compatible medical systems such as weight scales, cuffs, and blood pressure, are being used by doctors and patients. Doctors can provide essential information to their customers through user-friendly interfaces and smartphone-synced devices that help patients take active roles in their health. The Use of Smartphones in Law Smartphones provide 24-hour connectivity between lawyers, law firms and clients, which drives a modern and mobile working lifestyle. Data that was previously not accessible in in-house document management and the accounting systems are currently available to modern lawyers regardless of their location. With simple practices such as keeping your device protected and excellent management of systems, you can move out of your office and still access your client information. Checking the status of the client’s information and reading the news to stay updated on the current events are some of the ways in which smartphones impact the way lawyers do their business. The Use of Smartphone in Business For the past few years, businesspeople, consumers, and companies have been utilizing the many features that smartphones provide to better their services. This includes social networks that help them make an online presence and networking that help them keep in touch with their clients, colleagues, prospects, and acquaintances. It also helps them build rapport with as many individuals as possible in a short period. Businesspeople that are keen on utilizing their smartphones to the network have a competitive advantage compared to those who do not. Smartphones have changed the way business people make their businesses as well as their productivity levels.
<urn:uuid:8f59c357-ee01-4f01-899f-4494e2e5a56c>
CC-MAIN-2021-31
https://tgdaily.com/technology/technology-mobile-why-smartphones-are-vital-tools-across-virtually-all-professions/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153892.74/warc/CC-MAIN-20210729172022-20210729202022-00384.warc.gz
en
0.96765
697
2.734375
3
[ 38, 505, 389, 262, 1528, 618, 2048, 2279, 373, 1760, 832, 3112, 290, 3348, 13, 1114, 1672, 11, 287, 1180, 34423, 11, 345, 2622, 7475, 329, 6946, 13, 1439, 777, 4568, 389, 6928, 351, 5565, 6725, 329, 11153, 13, 16888, 11, 7519, 11, 7799, 11, 9326, 11, 290, 1597, 661, 779, 511, 17255, 290, 18151, 379, 617, 966, 284, 466, 511, 670, 13, 198 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The Mars rover Opportunity idled in a Martian sand dune for 39 long days, trapped with its wheels mostly covered. Only after very gradually working its way out of the sand could the rover move on. Given the long life of Opportunity, the temporary sand trap was not a grave concern, but other missions may not be as lucky. When we send more rovers to dusty terrain on Mars and the moon, sand could still cripple a mission. Now advances in robots capable of navigating waves of sand may make concerns of alien dust storms or sand traps a thing of the past. Built at the University of Pennsylvania and tested at the Georgia Institute of Technology under team leader Daniel Goldman, SandBot is a six-legged robot with curved, C-shaped limbs instead of wheels. SandBot’s limbs spin around like regular wheels but slow down briefly when they strike the ground, allowing it to scoot along loose sand at up to three centimeters per second. The technology behind SandBot will first be deployed on Earth in RespondBot, a search-and-rescue robot built to assist police and fire departments facing situations too risky for humans to enter.
<urn:uuid:0b128c1b-17fd-4cd6-bd20-bfd346567eff>
CC-MAIN-2016-18
http://discovermagazine.com/2008/jul/04-the-robot-designed-to-master-mars
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111313.83/warc/CC-MAIN-20160428161511-00027-ip-10-239-7-51.ec2.internal.warc.gz
en
0.919319
232
3.703125
4
[ 464, 8706, 35761, 32675, 4686, 992, 287, 257, 32508, 6450, 288, 1726, 329, 5014, 890, 1528, 11, 13640, 351, 663, 13666, 4632, 5017, 13, 5514, 706, 845, 11835, 1762, 663, 835, 503, 286, 262, 6450, 714, 262, 35761, 1445, 319, 13, 11259, 262, 890, 1204, 286, 32675, 11, 262, 8584, 6450, 12840, 373, 407, 257, 12296, 2328, 11, 475, 584, 10566, 743, 407, 307 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Chanda Cooper, Education Coordinator, Richmond Soil and Water Conservation District, Columbia, South Carolina Chanda plans activities based on her research into the impact that outdoor, … Students across the country will “learn by doing” through a variety of projects they help design and implement to conserve and improve the environment. David Shelley works to improve the understanding, appreciation, and stewardship of forests and rivers as the education coordinator at Congaree National Park, Hopkins, South Carolina. Victoria Pasco teaches at the Science Discovery Center at Catawba Trail Elementary School in Elgin, South Carolina, and has used PLT resources since the 1980s. Matthew (Matt) Schnabel, a science teacher at White Knoll High School in Lexington, South Carolina, uses PLT to teach AP Environmental Science and other courses. Exploring Mars while recycling on Earth, composting in the classroom, creating a wildlife garden. These are some highlights from service-learning projects funded by GreenWorks! grants. Cynthia is Assistant Professor and Elementary Education Coordinator at Lander University in Greenwood, South Carolina. She is one of the state’s most active PLT facilitators. Sandy Gresham, a science teacher and environmental education coordinator, incorporated PLT throughout Lowcountry Preparatory School in Pawleys Island, South Carolina. Students and teachers from a South Carolina high school share tips for PLT GreenSchools success. Denise Trufan is a science lab facilitator for grades K-5 who launched a recycling program at Indian Land Elementary School, Indian Land, South Carolina.
<urn:uuid:3e1e2716-292b-41be-98c8-bf58055d5f33>
CC-MAIN-2017-30
https://www.plt.org/blog/category/location/south_carolina/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423839.97/warc/CC-MAIN-20170722002507-20170722022507-00580.warc.gz
en
0.91651
326
2.8125
3
[ 1925, 5282, 10382, 11, 7868, 36831, 11, 16940, 1406, 346, 290, 5638, 23702, 5665, 11, 9309, 11, 2520, 5913, 609, 5282, 3352, 4568, 1912, 319, 607, 2267, 656, 262, 2928, 326, 15162, 11, 3926, 198, 28239, 1973, 262, 1499, 481, 564, 250, 35720, 416, 1804, 447, 251, 832, 257, 4996, 286, 4493, 484, 1037, 1486, 290, 3494, 284, 45075, 290, 2987, 262, 2858, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Lao Tzŭ, Lao Tse |Other spellings:||Lao Tse, Laotse, | Lao Tze, Laotze |Actual name:||Lǐ Ěr| Laozi (Chinese: 老子, Pinyin: Lǎozǐ; also transliterated as Lao Tzŭ, Lao Tse, Laotze, and in other ways) was an ancient Chinese philosopher. According to Chinese tradition, Laozi lived in the 6th century BC, however many historians contend that Laozi actually lived in the 4th century BC, which was the period of Hundred Schools of Thought and Warring States Period. Laozi was credited with writing the seminal Taoist work, the Tao Te Ching (also known simply as the Laozi). Asteroid 7854 Laotse was named after him. Whether Laozi even existed is the issue of strong debate, because authorship of the Tao Te Ching (Dàodéjīng) is attributed to him. Laozi became an important cultural hero to subsequent generations of Chinese people. Ostensibly, Laozi's wise counsel attracted followers, but he refused to set his ideas down in writing, worrying that written words might solidify into formal dogma. Laozi laid down no rigid code of behavior. He believed a person's conduct should be governed by instinct and conscience. He believed "simplicity" to be the key to truth and freedom. Laozi encouraged his followers to observe, and seek to understand the laws of nature; to develop intuition and build up personal power; and to wield power with love, not force. According to the legend and the biography included in Sima Qian's work, Laozi was a contemporary of Confucius, and worked as an archivist in the Imperial Library of the Zhou Dynasty (1122–256 BC). Hearing of Laozi's wisdom, Confucius travelled to meet him. Confucius put much emphasis on traditional rituals, customs and rites. Confucius met him in Zhou, near the location of modern Luoyang, where Confucius was going to browse the library scrolls. According to this story, Confucius and Laozi discussed ritual and propriety (cornerstones of Confucianism) over the following months. Laozi strongly opposed what he felt to be hollow practices. Taoist legend claims that these discussions proved more educational for Confucius than did the contents of the libraries. Laozi perceived that the kingdom's affairs were disintegrating, so it was time to leave. He was travelling West on a buffalo when he came to the Han Gu Pass, which was guarded. The keeper of the pass realized Laozi was leaving permanently, so he requested that Laozi write out some of his wisdom so that it could be preserved once he was gone, Laozi climbed down from his buffalo and immediately wrote the Tao Te Ching. He then left and was never heard of again. According to the Taoist fables, Laozi lived for over 900 years, which explained how he was both the senior and the contemporary of Confucius. These fables held that Laozi had been a court advisor in all of his previous twelve incarnations, starting at the time of the Fuxi (伏羲), one of the Three August Ones and Five Emperors. No historical text supports these beliefs. |Part of a series on | Deities and Immortals Laozi's work, the Tao Te Ching, is one of the most significant treatises in Chinese philosophy. It is his magnum opus, covering large areas of philosophy from individual spirituality and inter-personal dynamics to political techniques. The Tao Te Ching is said to contain 'hidden' instructions for Taoist adepts (often in the form of metaphors) relating to Taoist meditation and breathing. Laozi developed the concept of "Tao", often translated as "the Way", and widened its meaning to an inherent order or property of the universe: "The way Nature is". He highlighted the concept of Wei wuwei, or "action without action". This does not mean that one should hang around and do nothing, but that one should avoid explicit intentions, strong wills or proactive initiatives. Laozi believed that violence should be avoided as much as possible, and that military victory—which logically would be attained through use of force—should be an occasion for mourning rather than triumphant celebration. Similarly to the arguments fowarded by Plato in The Republic on various forms of governing, Laozi said that the codification of laws and rules into the society created difficulty and complexity in managing and governing. As with most other ancient Chinese philosophers, Laozi often explains his ideas by way of paradox, analogy, appropriation of ancient sayings, repetition, symmetry, rhyme, and rhythm. The writings attributed to him are often very dense and poetic. They serve as a starting point for cosmological or introspective meditations. Many of the aesthetic theories of Chinese art are widely grounded in his ideas and those of his most famous follower Zhuang Zi. The libertarian economist Murray N. Rothbard suggests that Laozi was the first libertarian, likening Laozi's ideas on government to F.A. Hayek's theory of spontaneous order. (See also: .) Similarly, the Cato Institute's David Boaz includes passages from the Tao Te Ching in his 1997 book The Libertarian Reader. Philosopher Roderick Long, however, argues that libertarian themes in Taoist thought are actually borrowed from earlier Confucian writers. Laozi's most famous follower, Zhuangzi, wrote a book that had a great deal of influence on Chinese Literati, through the ideas of individualism, freedom, carefree living, and art, which may well be the cornerstone of Chinese aesthetic, although the author never speaks about it. The name "Laozi" is an honorific. Lao means "venerable" or "old". Zi or tsu translates literally as "boy", but it was also a term for a rank of nobleman equivalent to viscount, as well as a term of respect attached to the names of revered masters; thus, "Laozi" can be translated roughly as "the old master". Laozi's personal name may have been Li Er. His courtesy name may have been Boyang, and also Dan, which also means "mysterious". Laozi is also known as: During the Li Tang Dynasty, in order to create a connection to Laozi as the ancestor of the imperial family, he was honoured as The Emperor of Xuanyuan, meaning "Profoundly Elementary" with a temple name of Shengzu, meaning "Saintly/Sagely Progenitor".
<urn:uuid:1cbb85f4-226f-46bf-9f91-054ec58a5f59>
CC-MAIN-2020-05
https://www.bookyards.com/en/author/page/607/Tse-Lao
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594705.17/warc/CC-MAIN-20200119180644-20200119204644-00482.warc.gz
en
0.970924
1,436
3.859375
4
[ 43, 5488, 309, 89, 129, 255, 11, 4689, 78, 309, 325, 198, 91, 6395, 4822, 654, 25, 15886, 43, 5488, 309, 325, 11, 4689, 313, 325, 11, 930, 198, 43, 5488, 309, 2736, 11, 4689, 313, 2736, 198, 91, 6398, 723, 1438, 25, 15886, 43, 131, 238, 34754, 248, 81, 91, 198, 43, 5488, 17027, 357, 23604, 25, 5525, 222, 223, 36310, 11, 350 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
There are a myriad of misconceptions when it comes to the flu vaccine. One of the most widely spread misconception is that you are given the live flu virus when you get the flu shot. However, this is not the case. Every year, people in the US usually question whether or not to get the flu shot and its effectiveness. Overall, the flu shot is beneficial to all but this is especially the case for children and the elderly. We have all heard of the flu, but some might not actually know what it is. The flu is a respiratory illness that is super contagious (which is one of the reasons that the flu shot is so important). The main symptoms of the flu include a fever, a runny nose, a sore throat, and muscle soreness. Although often grouped together, the flu and the common cold are not one in the same, although sometimes they do have overlapping symptoms. It is caused by influenza viruses and can actually be quite dangerous. It can cause you to be out of commission for at least a few days and up to a few weeks. It doesn’t help that flu season is anything but short, usually taking up half of the year from October to March. Flu shot clinics start around October so now is the best time to learn more about it, especially since you likely have a lot of questions about it since there tends to be a lot of misinformation and unanswered questions when it comes to the flu shot. The flu shot is the #1 way to prevent you from getting the flu and passing it on to others. As we mentioned above, the flu is very contagious. The reason for this is the fact that it can be spread through anything referred to as a respiratory secretion which spread when we cough or sneeze. These secretions often end up on surfaces, especially things like door handles and other things that are touched by a lot of people. Just take a moment to think about all of the potentially infected surfaces you touch in a day. For instance, the elevator buttons and door handles that you have to touch just to leave your apartment (if you live in on, of course). Then think about the apple you might eat in your car on the way to work without first washing it or your hands. Schools, offices, and means of public transportation like busses and subways are some of the biggest culprits since they all make up spaces that house a lot of potentially sick people. It’s honestly not that hard when you think about it. If your goal is to avoid getting the flu or at least not getting as severe of a flu in the event that you do get it, then get the flu shot. There is no denying that it is not 100%, but the more people that get vaccinated the less there is to spread to others in the community. Recent studies conducted by the CDC studies have found that the flu vaccine can lower someone’s risk of getting the flu by 40–60%. Unless you are under 6 months old or have an allergy to it, the flu shot is just the right choice.
<urn:uuid:43bbc280-2625-40c6-ad44-5fc53bba60bd>
CC-MAIN-2022-40
https://thingshealth.com/13-facts-about-the-flu-shot-everyone-should-know/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00665.warc.gz
en
0.978596
624
2.984375
3
[ 1858, 389, 257, 24862, 286, 45679, 618, 340, 2058, 284, 262, 6562, 12319, 13, 1881, 286, 262, 749, 6768, 4104, 43122, 318, 326, 345, 389, 1813, 262, 2107, 6562, 9471, 618, 345, 651, 262, 6562, 2823, 13, 2102, 11, 428, 318, 407, 262, 1339, 13, 198, 6109, 614, 11, 661, 287, 262, 1294, 3221, 1808, 1771, 393, 407, 284, 651, 262, 6562, 2823, 290 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
BOD Reduction – Activated Sludge Process The activated sludge (AS) biological treatment process is the most common process for reducing five-day biochemical oxygen demand (BOD5) in wastewater, for both industrial and municipal applications. Activated sludge consists of many naturally occurring aerobic microorganisms mostly in the form of bacteria, protozoa, and fungi (biomass). The biomass uses the BOD5 in wastewater as their food source. As with any living organism, they require a very controlled environment including adequate food source (BOD5), proper nutrients (nitrogen and phosphorus), and adequate oxygen (aerobic organisms) to survive and replenish. The AS process converts the organic waste materials to simpler compounds such as carbon dioxide, nitrates, sulfates, and more biomass. These substrates are removed from the water by either settling, DAF, or membrane separation. The biomass reproduces to the point that some must be removed from the process. The excess biomass is referred to as waste activated sludge (WAS) and the removal process is referred to as “wasting”. There are a number of activated sludge configurations but all function based on the same principals. All activated sludge systems incorporate an aeration basin or tank and some means of separating the biomass from the treated water phase. The primary difference in the following processes is the way that the biomass is separated from the water phase. Continuous Flow Activated Sludge (CFAS) The CFAS system consists of an aeration basin and solids (biomass) settler. Wastewater enters the aeration basin where it is aerated and mixed with an appropriate amount of biomass for good BOD5 removal. From the aeration basin, the mixture of biomass and treated wastewater flows to a gravity settler (clarifier). The clarifier is designed to allow settling of the biomass and discharge of the clarified wastewater. A measured amount of the settled biomass is returned to the aeration basin to maintain the correct ratio of biomass to incoming BOD5 for good treatment. The biomass that is returned is referred to as returned activated sludge (RAS). The excess biomass (WAS) is “wasted” to the solids handling system. Activated Sludge Using DAF Clarification Primary DAF with Biological / Secondary DAF This type system consists of an aeration basin and dissolved air flotation for solids clarification. As with the CFAS system, wastewater enters the aeration basin where it is aerated and mixed. From the aeration basin the mixture of biomass and treated wastewater flows to a DAF for clarification. The DAF is designed to promote separation of the biomass by flotation rather than settling. This type system is much more efficient and occupies a smaller footprint. A measured amount of the float (RAS) is returned to the aeration basin for treating the incoming wastewater. The excess biomass (WAS) is “wasted” to the solids handling system. Sequencing Batch Reactor (SBR): The SBR process consists of aeration basins only. The biomass is settled in the aeration basin by turning off the aerators creating a settling cycle within the aeration basin. Most SBR systems use two bio-reactors that operate on an alternating and sequential basis (i.e. while one basin is in the aeration mode, the second is in a settling mode). Single tank SBR systems generally use equalization to store untreated wastewater while the bioreactor is in the settling mode. Since the biomass remains in the basin, there is no RAS in an SBR system. The excess biomass (WAS) is simply removed at the end of the settling cycle. Membrane Bioreactor (MBR): The MBR is the most advanced technology with respect to biological wastewater treatment. The MBR uses ultra-filtration membranes for separating the biomass from the treated wastewater. Due to the size of the membrane sieve virtually all of the suspended solids are removed. A well designed and operated MBR System can achieve wastewater reuse standards for municipal applications and provide significant opportunities for industrial wastewater recycling.
<urn:uuid:8d7e5d71-22df-4d8c-8985-e5380fc3420f>
CC-MAIN-2019-43
https://cwaterservices.com/bod5-reduction-active-sludge-2/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987769323.92/warc/CC-MAIN-20191021093533-20191021121033-00540.warc.gz
en
0.93371
860
3.140625
3
[ 33, 3727, 33396, 784, 13144, 515, 3454, 12587, 10854, 198, 464, 13906, 1017, 12587, 357, 1921, 8, 10685, 3513, 1429, 318, 262, 749, 2219, 1429, 329, 8868, 1936, 12, 820, 47685, 11863, 3512, 357, 33, 3727, 20, 8, 287, 42073, 11, 329, 1111, 7593, 290, 13474, 5479, 13, 13144, 515, 1017, 12587, 10874, 286, 867, 8752, 14963, 43294, 4580, 45165, 4632, 287, 262, 1296 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Analyze data & present it in beautiful graphs and charts. Creating & editing datasets Entries & fields Datasets in Lively Logic are made up of a list of entries and a collection of fields. Entries are like rows in a spreadsheet. If your dataset holds information about employees, then each entry represents a different employee; if it holds information about financial transactions, then each entry represents a different transaction. Dataset fields, then, are like a spreadsheet’s columns. Each field represents a specific attribute of the entries. For example, in a dataset about employees, there may be fields for the employees’ first and last names, for their salaries or hourly wages, for the number of hours they’ve worked in the current pay period, and so on. Viewing & editing datasets If you have data in a CSV file, you can add it to your document by dragging the file into the window or by choosing File ▸ Import Dataset. Or you can create a dataset from scratch by clicking the + button in the dataset bar at the bottom of the window. The dataset bar lists all the datasets in a document. You can view or edit a dataset by clicking its name in the dataset bar. The dataset editor The dataset editor has four panes: Properties, Fields, Entries, and Calculator. In the Properties pane, you can set the name of the dataset. Since your document might contain several datasets, it can help to give each one a short but descriptive title. You can also make a note of the person, publication, or website from which you obtained the data. This can be useful if you want to cite the data’s source, or if you want to check the source again later to see if the data has been updated. In the Fields pane, you can modify the dataset’s fields. Click the + button to add a new field. Click the − button and choose an existing field to delete it. You can rename a field by double-clicking the field’s name. You can also enter “model” formulas that will be used to calculate data values in the field. For more about formulas, see the Formulas guide. The Entries pane displays all the dataset’s entries’ values in a table. Click the + or − buttons to create a new entry or delete the selected entry or entries. To edit a value, double-click it and enter the new value. (You can use the Tab key to move the cursor to the next field.) Any values that have been calculated from fields’ model formulas are shown in gray; values that have been entered directly are shown in black. Note that even if a field model is present, you can still enter your own values to override the calculated ones. In the Calculator pane, you can enter formulas to test field models or do one-off calculations like sums or averages. Enter a formula in the field at the bottom and press Return: the result is computed and added to the results list. Whenever the values in the dataset change, the calculations are automatically updated to show the new results. Graphing the data To learn how to create & customize charts, see the Charts guide. © 2012-2014 Ripeware, LLC. All rights reserved. Ripeware, the Ripeware logo, and Lively Logic are trademarks of Ripeware, LLC.
<urn:uuid:8cce7350-4833-4dec-b60a-7faa4b557bcd>
CC-MAIN-2014-15
http://www.livelylogic.com/guides/datasets/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202774.3/warc/CC-MAIN-20140423032002-00035-ip-10-147-4-33.ec2.internal.warc.gz
en
0.847362
710
2.984375
3
[ 37702, 2736, 1366, 1222, 1944, 340, 287, 4950, 28770, 290, 15907, 13, 198, 32071, 1222, 12857, 40522, 198, 14539, 1678, 1222, 7032, 198, 27354, 292, 1039, 287, 406, 2280, 30146, 389, 925, 510, 286, 257, 1351, 286, 12784, 290, 257, 4947, 286, 7032, 13, 198, 14539, 1678, 389, 588, 15274, 287, 257, 30117, 13, 1002, 534, 27039, 6622, 1321, 546, 4409, 11, 788, 1123 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Part of speech: Tending to avoid speaking openly or making revelations about oneself. Disposed to lie, cheat, defraud, or deceive. Light in color, especially blond: The definition of unjust is something unfair or not morally right. Contrary to established moral principles. Not permitted; prohibited (Mathematics) Of or being operations or sequences of operations, such as differentiation and integration, when applied to only one of several variables at a time. Naughty in a playful way; mischievous Out of proportion, as in size, shape, or amount. (Now Rare) Not equitable; unjust; unfair Not equitable; unfair; unjust (Archaic) Low in height; short Harmful to one's reputation; blameworthy: (Management) Capable of being articulated as an action item or a set of action items. Exceeding a normal, usual, reasonable, or proper limit. Injuring or likely to cause injury; harmful The definition of culpable is deserving of blame. Deserving to be blamed Irritable or upset: Prohibited by law; against the law; unlawful; illicit (Obsolete) Full of shame; ashamed. Deliberately seeking to inflict pain and suffering; enjoying others' suffering; without mercy or pity Marked by a lack of shame: Very serious; deplorable The definition of vicious is someone or something that is especially cruel, harsh or violent, especially when the unkindness is done intentionally. Morally base or evil; wicked; depraved; sinful Not yet due or payable, as a debt Not lawful; illegal. Petty is defined as something relatively worthless or unimportant. Low in quality, value, or importance; paltry; poor; inferior Not justifiable; inexcusable: Impossible to excuse, pardon, or justify: Of uneven rate, occurrence, or duration: Not in accord with approved trade practices Discriminating, or distinguishing Given to or characterized by trickery; deceitful Full of shade; shaded: (Comparable) Fair, generous; resilient, "˜game'. (Usage Problem) Unaware or uninformed; naive. So harmful to the interests of one of the parties to an agreement or contract as to make that paper unenforceable and, therefore, null and void. Unequal, as in length or thickness An instance of injustice or unfairness: Exceeding reasonable limits; immoderate: Find another word for unfair. In this page you can discover 70 synonyms, antonyms, idiomatic expressions, and related words for unfair, like: wrong, dishonorable, evasive, dishonest, fair, unrightful, unjust, immoral, forbidden, unethical and partial.
<urn:uuid:5c590624-3b96-4201-916d-d9be9a4e44c3>
CC-MAIN-2020-29
https://thesaurus.yourdictionary.com/unfair
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657169226.65/warc/CC-MAIN-20200716122414-20200716152414-00036.warc.gz
en
0.876061
596
2.578125
3
[ 7841, 286, 4046, 25, 198, 51, 1571, 284, 3368, 5486, 11764, 393, 1642, 19111, 546, 27186, 13, 198, 7279, 29813, 284, 6486, 11, 22705, 11, 825, 22863, 11, 393, 38666, 13, 198, 15047, 287, 3124, 11, 2592, 32749, 25, 198, 464, 6770, 286, 21218, 318, 1223, 11675, 393, 407, 22388, 826, 13, 198, 4264, 11619, 284, 4920, 6573, 7811, 13, 198, 3673, 10431, 26 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Implants are increasingly used to substitute missing structure or function in the human body. Despite the improved design, biocompatibility and functionality, implants also carry a significant risk of infection. Implant-associated infections are one of the most feared and difficult to treat complications, causing high morbidity, and considerable mortality and consuming substantial health care cost. There are more than 2 million implant insertions (knee, hip, breast, cardiac devices) per year in the USA alone (similar number in the EU), with infection rates varying from 1% to 40%, depending on the surgical site. Implant-associated infections are difficult to detect and treat due to the presence of biofilms on the implant surface. The antimicrobial susceptibility is significantly reduced in biofilms, causing chronic and persistent infections. Delayed and low-grade infections, such as those induced by P. acnes, are especially difficult to detect and treat, because the acute infection symptoms are absent and the infection is diagnosed too late, after a significant amount of biofilm is formed. P. acnes-infected implants have to be exchanged in a two-stage process with careful removal of all foreign material combined with antibiotic treatment. This procedure is cumbersome, time-consuming and often functional recovery is delayed or suboptimal. Treatment of implant infections generates medical cost of up to €100,000 per patient and long rehabilitation times and off-work periods. Consequently, there is a high medical need for a prophylactic vaccine to prevent implant-associated infections.
<urn:uuid:572e32c2-11b4-4e06-90a0-504b1a07e777>
CC-MAIN-2018-05
http://www.origimm.com/rd-programs/implant-associated-infections-2/implant-associated-infections/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891543.65/warc/CC-MAIN-20180122213051-20180122233051-00024.warc.gz
en
0.936898
313
3.203125
3
[ 29710, 1187, 389, 6481, 973, 284, 15373, 4814, 4645, 393, 2163, 287, 262, 1692, 1767, 13, 7945, 262, 6596, 1486, 11, 3182, 420, 3361, 25901, 290, 11244, 11, 35223, 635, 3283, 257, 2383, 2526, 286, 10280, 13, 1846, 15060, 12, 32852, 16079, 389, 530, 286, 262, 749, 15240, 290, 2408, 284, 2190, 19481, 11, 6666, 1029, 34813, 414, 11, 290, 11091, 12430, 290, 18587 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Some have questioned why artificial intelligence is needed in healthcare besides for record keeping purposes for hospitals and doctor offices; unfortunately, these critics have difficulties in understanding the need for innovation or do not grasp the urgency on why it will be needed. According to the Association of American Medical Colleges, they predict a shortage of physicians in the U.S. by 2025 that will be estimated to reach between 34,600 to 88,000 doctors (https://aamc-black.global.ssl.fastly.net/production/media/filer_public/a5/c3/a5c3d565-14ec-48fb-974b-99fafaeecb00/aamc_projections_update_2017.pdf). Since this is something that cannot be ignored, healthcare will have to embrace AI innovations and hope it can pick up the slack as a shortage of physicians will continue to grow. Recently, Naveen Jain, who is the founder of the health technology firm known as Viome, talked with CNBC and said that a tsunami is coming regarding AI and that its’ role in healthcare will be a massive one (Viome provides a service that lets an individual send a stool sample to them for it to be analyzed by using AI). He went on to say that AI is going to play the biggest role because there is so much data that no humans can every process (https://www.cnbc.com/2017/12/01/tsunami-of-a-i-coming-into-healthcare-tech-ceo-says.html). The number of healthcare facilities that are opting to use artificial intelligence is growing, here are several innovations that should be explored for technologies using AI that can help in the upcoming shortage of physicians. Artificial Intelligence for Medical Imaging Back in 2014, AI systems were trained by technology companies to differentiate and identify an image’s elements, such as cats and dogs. Research and development over time could train these systems to successfully analyze a patient’s MRI’s, X-rays and CT scans; this could then lead over time to accurately find, diagnose and follow-up on specific health concerns. Several experts that includes Dr. Keith J. Dreyer, the executive director of the Massachusetts General Hospital and Brigham and Women’s Hospital Center for Clinical Data Science, strongly believes that applications involving AI imaging could revolutionize the field of disease management (https://giving.massgeneral.org/artificial-intelligence-healthcare-impact/). Drug Designing Through AI Many people do not realize that to create drugs meant to tackle complex diseases that includes several types of cancer and Alzheimer’s disease, analyzing and collecting various amounts of information is required. The healthcare industry could use a combination of big data and machine learning algorithms to assist experts in the industry utilize everything about complex diseases to create more efficient development and drug design. Actually, several startups in healthcare tech have begun exploring this idea, such as the biotechnology firm known as Numerate; they design an algorithm-centric process that streamlines preclinical processes that include nominating clinical trial candidates and identifying relevant markers (https://www.inc.com/rhett-power/as-physician-shortage-grows-healthcare-embraces-ai-technology.html). Using AI for Augmenting Human Capability Experts believe soon that artificial intelligence will converge with other advanced technologies that would provide the ability to enhance the human body. This could be achieved by thousand of nanobots possibly eradicating diseases during their initial stage or integrate with a human’s brain that would augment its intelligence while backing it up to the cloud (http://observer.com/2017/02/a-glimpse-of-the-future-ai-will-change-everything/). Mark Minevich is a B20 Digital Task Force expert and founder of Going Global Ventures who predicts this will usher in a brand-new phase of human advancement. Minevich said that to put it simply,” he says, “recent advances in big data, software, chemistry, biotech, and machine learning would be combined to provide humans additional capabilities that would be directly uploaded to the human brain. The Future of AI Innovations with Healthcare is Coming Although artificial intelligence has been making considerable progress with healthcare, more is on the horizon and will be needed to cope with the upcoming shortage of physicians. There are more innovations that AI can build on, such as opening AI for better-decision making, that can make patient-care easier and more productive. Whether or not you may fall into the category of thinking artificial intelligence will be the downfall of mankind, healthcare will need to embrace innovations in AI to pick up the slack that will occur as the shortage of physicians grows.
<urn:uuid:8344fbba-46b9-475e-b575-f5e61e4ba59c>
CC-MAIN-2018-05
https://sanvada.com/2017/12/18/healthcare-will-embrace-ai-innovations-physician-shortage-grows/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891886.70/warc/CC-MAIN-20180123091931-20180123111931-00336.warc.gz
en
0.948846
992
2.828125
3
[ 4366, 423, 11434, 1521, 11666, 4430, 318, 2622, 287, 11409, 13769, 329, 1700, 5291, 4959, 329, 11301, 290, 6253, 9730, 26, 12716, 11, 777, 9188, 423, 13156, 287, 4547, 262, 761, 329, 11044, 393, 466, 407, 13180, 262, 25615, 319, 1521, 340, 481, 307, 2622, 13, 4784, 284, 262, 5396, 286, 1605, 8366, 49727, 11, 484, 4331, 257, 18772, 286, 17206, 287, 262, 471 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Squash, or squash racquets as it was known in its early days, was invented at Harrow School, England, around 1830. The first purpose-built squash courts were built at Harrow in the 1860s. The game remained the preserve of schools and universities until the early part of the 20th century. The United States became the first nation to form a dedicated association and codify its game in 1907. In the same year, the (British) Tennis & Rackets Association formed a squash rackets sub-committee and, in 1928, the (British) Squash Rackets Association took over. Only when commercial operators began building public courts from the 1950s did the game start to boom in popularity, with participation peaking around the early 1980s. Until then, the game was divided between amateur players and professional players, who were often coaches employed by exclusive clubs. Today, squash is played in 153 countries, of which 124 are members of the World Squash Federation, with 50,000 courts now worldwide. Squash made its debut at the 13th Asian Games in Bangkok 1998. It is also played in the World Games, All Africa Games, Pan-American Games and Commonwealth Games.
<urn:uuid:6182f9ba-c40f-4b77-95fd-1fb4475a29c2>
CC-MAIN-2019-18
http://sports.gov.pk/Introduction/Intro_Squash.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528058.3/warc/CC-MAIN-20190419201105-20190419222103-00036.warc.gz
en
0.989194
249
2.84375
3
[ 22266, 1077, 11, 393, 34613, 3444, 421, 1039, 355, 340, 373, 1900, 287, 663, 1903, 1528, 11, 373, 15646, 379, 2113, 808, 3961, 11, 4492, 11, 1088, 45440, 13, 383, 717, 4007, 12, 18780, 34613, 8028, 547, 3170, 379, 2113, 808, 287, 262, 37637, 82, 13, 198, 464, 983, 6150, 262, 12201, 286, 4266, 290, 11155, 1566, 262, 1903, 636, 286, 262, 1160, 400 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
- Effective Seminar Participation - Speak up in Class and Add to Class Discussions (City College of San Francisco) - Simple, practical tips. - Class Participation (Gustavus Adolphus College) - Brief set of tips focusing on when to participate and when not to participate. - Participating in Discussion Classes (Gustavus Adolphus College) - Tips on preparation, participation, and note-taking in discussion classes. Online class participation - Resources on "Netiquette" - Writing Strategies for Online Learners - Communicating Online: Netiquette (UBC) - Tips for respectful and productive online communication. - Blackboard Discussion Forum Participation (Lawrence Technological University) - Examples of what high, medium, and low quality discussion forum contributions look like. The best way to gain confidence and skills in participating in class, speaking in public, or delivering presentations is frequent practice.
<urn:uuid:ce4b74e5-834a-4348-9f77-280d68a44c9b>
CC-MAIN-2018-39
https://www.lib.sfu.ca/about/branches-depts/slc/learning/participation
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160337.78/warc/CC-MAIN-20180924090455-20180924110855-00524.warc.gz
en
0.778824
189
2.765625
3
[ 12, 29455, 12449, 22050, 34408, 198, 12, 40802, 510, 287, 5016, 290, 3060, 284, 5016, 8444, 21585, 357, 14941, 5535, 286, 2986, 6033, 8, 532, 17427, 11, 8472, 9040, 13, 198, 12, 5016, 34408, 357, 38, 436, 615, 385, 1215, 10196, 385, 5535, 8, 532, 22821, 900, 286, 9040, 10759, 319, 618, 284, 8277, 290, 618, 407, 284, 8277, 13, 198, 12, 13928, 803 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Vertical jump height is a measurement that coaches, physical educators, health care professionals, and strength and conditioning practitioners use to predict or assess physical performance for talent identification and player development purposes. For example, many sport scouting combines use vertical jump performance to identify talent (football and basketball) (Teramoto, Cross & Willick, 2016). Moreover, the literature has demonstrated that individual and sport characteristics such as sex, skill level, sport position, and risk of injury are associated with vertical jump performance (Burr et al., 2008; Mujika et al., 2009; Marques & Izquierdo, 2014; Janot, Beltz & Dalleck, 2015; Spiteri et al., 2017). Vertical jump performance has also been found to be associated with neuromuscular fatigue and thus has been used to monitor and avoid overtraining in athletes (Gathercole et al., 2015). Lastly, vertical jump tests correlate with total and lower extremity lean mass (Stephenson et al., 2015) and bone strength (Janz et al., 2015; Yingling et al., 2017). The “gold standards” for vertical jump height measurement are video analysis to calculate the position of the body’s center of mass (Aragón, 2000) and integration of the ground reaction force measured on a force plate (Menzel et al., 2010). However, relative to “real-world” assessment by non-elite and/or non-research populations, limited access to laboratory settings, excessive cost of such measurement tools, time, and/or expertise constraints render these approaches largely unsuitable for field assessments conducted by many sport and physical activity practitioners. Many devices have been developed to measure vertical jump height in a low cost and reliable manner, including contact mats (Just Jump System, Ergo Jump), velocity systems (GymAware, accelerometers), and linear position transducers (OptoJump, Myotest, Vertec). Three factors can affect the reliability and validity of all these approaches: the method used to calculate height, the type of jump performed, and body mass. The force plate, considered the “gold standard,” measures jump height by calculating flight time of the jump (Walsh et al., 2006; Glatthorn et al., 2011); however, excessive hip and/or knee flexion during the jump can overestimate flight time and jump height (Nuzzo, Anning & Scharfenberg, 2011). The type of jump used to assess subjects has varied between studies and was typically dependent on the purpose of the assessment, the population assessed, and the setting of the assessment. The squat jump (SJ) and countermovement jump (CMJ) are predominantly used in laboratory settings (Markovic et al., 2004; Nuzzo, Anning & Scharfenberg, 2011), but a common field test used in physical education settings as well as in professional sport combines is the Sargent jump and reach test (VJ) (De Salles et al., 2012; Castagna et al., 2013; Ayán-Pérez et al., 2017). The VJ is not only focused on the lower limbs but necessitates coordination of both the lower and upper limbs (Markovic et al., 2004; Leard et al., 2007; Nuzzo, Anning & Scharfenberg, 2011) as the upper limbs may increase take-off velocity up to 10% (Luhtanen & Komi, 1978; Harman et al., 1988). High reliability of the jump and reach test was reported in both pre-school age children (Ayán-Pérez et al., 2017) and in athletes (14-year-old soccer players) (De Salles et al., 2012). In addition, ecological validity was found for VJ testing in activities such as basketball and volleyball, in which reaching height is key during the jump (Menzel et al., 2010). A common measuring tool of the VJ in the field is the Vertec, however the Vertec requires execution of a more complex jump from the participant, potentially affecting the reliability of the VJ heights (Buckthorpe, Morris & Folland, 2012; Harman et al., 1988; Nuzzo, Anning & Scharfenberg, 2011). The participant must be able to coordinate the arm swing such that the arms are fully extended and in contact with the vanes at the moment that the participant has attained their greatest displacement from the floor (Harman et al., 1988). In addition, measurement error may be introduced due to the two-step measurement protocol for the Vertec as well as the vane spacing on the Vertec (Nuzzo, Anning & Scharfenberg, 2011). Yet, the use of the Vertec to measure VJ height remains commonplace in physical education and sport settings due to its convenience and price point. Although the measurement tool and type of jump may introduce error, body mass is also a large factor affecting VJ height (Sayers et al., 1999). The difference in body mass can significantly affect the vertical height reached by two participants yet the impulse generated may be similar (Harman et al., 1988). A new approach to vertical jump height measurement is the use of mobile applications. My Jump, a mobile application for iOS and android devices, uses the device camera’s frame-by-frame analysis to calculate flight time and jump height. Recent studies have found almost perfect agreement between the force plate and My Jump for measuring CMJ height using either time in air (Balsalobre-Fernández, Glaister & Lockey, 2015; Driller et al., 2017) or calculated height from take-off velocity (Carlos-Vivas et al., 2018). Furthermore, excellent agreement between force plate and My Jump measurements was found for three different types of jumps including the CMJ, SJ and drop jump (DJ) in both male and female competitive athletes (Gallardo-Fuentes et al., 2016; Stanton, Wintour & Kean, 2017). Intra rater reliability for both CMJ and DJ was also found to be excellent (Stanton, Wintour & Kean, 2017). My Jump is an affordable, portable alternative to other tools that assess vertical jump performance. Moreover, high reliability and accuracy of My Jump compared to the gold standard (force plate) has been reported (Balsalobre-Fernández, Glaister & Lockey, 2015; Gallardo-Fuentes et al., 2016; Carlos-Vivas et al., 2018; Stanton, Wintour & Kean, 2017). However, both the force plate and My Jump use flight time as the source of the height calculation (Balsalobre-Fernández, Glaister & Lockey, 2015) while the commonly used field measurement is a direct distance measurement of jump height. Thus, the Vertec may yield different absolute jump height values compared to My Jump, yet no studies to date have compared My Jump to the Vertec. Therefore, the primary purpose of the study was to examine the reliability of My Jump VJ values compared to those of Vertec. A secondary purpose was to examine whether the use of raw VJ values versus calculated external peak power values using the Sayers equation influenced reliability results. We hypothesized that: (a) reliability relative to degree of consistency between the measurement tools (Vertec and My Jump) would be high, and (b) reliability, in terms of absolute agreement between the measurement tools would be low, with a detectable systematic difference. Materials and Methods One hundred and thirty-five healthy adults (94 males, 41 females; university students, staff, and faculty) participated in the study (Table 1). All participants were informed of the risks and benefits of the study and provided written informed consent. All study procedures were approved by the California State University, East Bay Institutional Review Board (CSUEB-IRB-2015-275-F). |Male (n = 94)||Female (n = 41)| |Height (m)||1.77 (0.08)||1.67 (0.08)| |Mass (kg)||72.8 (9.9)||63.5 (9.3)| Age range and average height and mass of the male (n = 94) and female (n = 41) participants. Mean (SD). Participants completed a general health and demographic survey and were excluded if they had a history of health concerns, a disease or physical condition that may affect physical activity, or, were pregnant. The demographic information collected includes sex, height, and mass. Height and mass were measured using a stadiometer and a calibrated scale. All participants were asked if they were competitive athletes (yes/no; defined as: “One who plays an organized sport for a team or in an organization”), and whether they regularly participated in vigorous physical activity (yes/no; defined as: “Activity that causes large increases in breathing or heart rate for at least 10 min continuously”). Two vertical jump measuring systems, Vertec and My Jump, were used simultaneously to assess VJ height. “Peak Power” was then calculated from the jump height measured from the two measuring systems (Sayers et al., 1999). Jump height was quantified using a Vertec (JUMPUSA.com, Sunnyvale, CA, USA) while also being recorded using an iPad mini 2 (Frame Rate 60 fps, 1080 p video, Apple Inc, Cupertino, CA, USA). The take-off and landing frames from the video were determined using My Jump and flight time (ms) was then calculated. The jump height was determined using the calculation (Bosco, Luhtanen & Komi, 1983): The iPAD mini 2 was connected to a tripod and placed perpendicular to the frontal plane of the participants focused on their feet and approximately 1.5 m from the participant. One researcher was responsible for all analysis of flight time duration; takeoff was determined as the first frame with both feet off the ground and landing when at least one foot touched the ground. Participants were given the option to participate in warm up exercises consisting of 10 squats, 10 alternating high knees, and 1 min running in place. Following verbal explanation of the jump and reach CMJ and a physical demonstration by a research assistant, the participants standing reach height was measured using the Vertec followed by three VJ jumps as high as possible to displace the Vertec vanes. At the moment preceding the jump, the participants could freely flex the hip, knee, and ankle joints and prepare the upper limbs for a sudden upward thrust, in an effort to promote the highest vertical jump possible. The rest time between jumps was 20 s. The participant’s vertical jump height was calculated as the difference between their maximum jump height and standing reach height. “Peak Power” was calculated from the maximal jump height of three trials. Sayers Peak Power Equation (Sayers et al., 1999) Intraclass correlation (ICC) is a measure of reliability which assesses both, degree of correlation (i.e., consistency) and degree of absolute agreement between two variables (Shrout & Fleiss, 1979). Given the purpose of our study, we were equally interested in consistency and absolute agreement between the two measurement tools. We were also interested in determining whether VJ jump height and peak power (calculated using the Sayers et al. (1999) equation) produced differential ICC results. As such, reliability was assessed using four separate ICC estimates and their 95% confidence intervals (calculated using SPSS statistical package version 23; SPSS Inc., Chicago, IL, USA). More specifically, we conducted four separate single rater two-way random-effects model ICCs. Two analyses (with jump height and peak power as the dependent variables, respectively) were based on a single rater, consistency, two-way random-effects model, while two others (with jump height and peak power as the dependent variables, respectively) were based on a single rater, absolute-agreement, two-way random-effects model. A two-way random-effects model is noted to be appropriate for evaluating assessment methods that are intended for routine use by raters with similar characteristics (Koo & Li, 2016). We chose a single rater ICC type as we assumed a single rater would be the basis for real world measurement of jump height (e.g., a single coach, trainer, PE teacher, etc. will administer the vertical jump test during assessment). We chose to adopt Koo and Li’s guidelines for interpretation of ICC values; based on a confidence interval (CI) of 95% of the ICC estimate, <0.50, 0.50–0.75, 0.75–0.90, and >0.90 represent poor, moderate, good, and excellent ICC, respectively (Koo & Li, 2016). Analysis separating the participants by sex was also run. Paired student’s t-test were performed to determine any systematic differences between the absolute values of jump height between the two measurement tools, Vertec and My Jump. Bland–Altman plots were constructed using Graph Pad (GraphPad Prism version 6.00 for Windows, GraphPad Software, San Diego, CA, USA). The ICC estimate and 95% CI demonstrated good reliability for jump height (ICC = 0.813; 95% CI [0.747–0.863]) and excellent reliability for calculated peak power (ICC = 0.926; 95% CI [0.897–0.947]) between the Vertec and My Jump. These ICC results indicate that the Vertec and My Jump are highly consistent with each other with respect to measurement of maximum VJ height (Table 2; Figs. 1A and 1B). Furthermore, given the greater ICC estimate and greater and narrower CI for peak power values, our results indicate that the use of calculated peak power as the dependent variable resulted in stronger reliability values compared to VJ height. The ICC estimate and 95% CI demonstrated poor to moderate reliability for jump height depending on sex; males (n = 94) (ICC = 0.732; 95% CI [0.623–0.814]) and females (n = 41) (ICC = 0.555; 95% CI [0.302–0.735]). Consistency for calculated peak power values increased for both groups to moderate to excellent; males (ICC = 0.893; 95% CI [0.844–0.928]) and females (ICC = 0.807; 95% CI [0.667–0.892]) (Table 2). |My Jump||Vertec||ICC(3,1) (95%CI) consistency||ICC(3,1) (95%CI) absolute agreement| |Vertical jump height (cm)||43.05 (12.13)||51.93 (14.36)*||0.813||0.747–0.863||0.665||0.050–0.859| |Peak power (W)||3,974 (1,043)||4,435 (1,144)||0.926||0.897–0.947||0.851||0.272–0.946| |Females (n = 41)| |Vertical jump height (cm)||31.52 (8.22)||37.02 (9.36)*||0.555||0.302–0.735||0.469||0.118–0.699| |Peak power (W)||2,952 (684)||3,238 (706)*||0.807||0.667–0.892||0.748||0.425–0.881| |Males (n = 94)| |Vertical jump height (cm)||48.07 (9.94)||58.43 (10.90)*||0.732||0.623–0.814||0.492||0.086–0.774| |Peak power (W)||4,420 (840)*||4,958 (874)*||0.893||0.844–0.928||0.747||0.007–0.913| Interclass correlation values comparing the consistency and absolute agreement of the My Jump and Vertec for vertical jump height (cm) and peak power (W). Mean (SD). ICC estimates and 95% CI demonstrated poor to good reliability for jump height (ICC = 0.665; 95% CI [0.050–0.859]) and poor to excellent reliability for calculated peak power (ICC = 0.851; 95% CI [0.272–0.946]). Despite reasonable ICC estimates—particularly, for calculated peak power—the very broad CI for each dependent variable indicate that the Vertec and My Jump do not consistently produce similar absolute VJ height values relative to each other. A paired-samples t-test confirmed the lack of absolute agreement between the tools; mean VJ height using the Vertec (51.93 ± 14.36 cm) were found to be significantly higher (statistically) than mean VJ height values measured using My Jump (43.05 ± 12.13 cm; t(134) = 12.69, p < 0.0001; Table 2; Fig. 2). ICC estimates and 95% CI demonstrated poor to good reliability for jump height depending on sex; males (ICC = 0.492; 95% CI [0.086–0.774]) and females (ICC = 0.469; 95% CI [0.118–0.699]) and poor to excellent reliability for calculated peak power; males (ICC = 0.747; 95% CI [0.007–0.913]) and females (ICC = 0.748; 95% CI [0.425–0.881]). The very broad CI for each dependent variable indicate that the Vertec and My Jump do not consistently produce similar absolute VJ height values relative to each other for both males and females (Table 2). My Jump compared to Vertec demonstrated good to excellent reliability relative to degree of consistency, and poor to excellent reliability relative to absolute agreement. The force plate may be considered the “gold standard” for vertical jump testing accuracy (Menzel et al., 2010), however, this measurement tool is not easily accessible to non-elite and/or non-professional physical activity practitioners due to environmental, financial, time, and/or expertise constraints (and thus, not commonly used by this population). Although preliminary support for the use of My Jump by field practitioners has been established (Balsalobre-Fernández, Glaister & Lockey, 2015; Gallardo-Fuentes et al., 2016; Driller et al., 2017), these reliability studies have compared My Jump to force plate data. Given that relatively few field practitioners are using force plates to measure vertical jump height and that the goal of applied research is to provide data and recommendations that are likely to be adopted by practitioners, it was important to examine the reliability of My Jump compared to a more commonly used field measurement tool. Like the force plate, the Vertec has also been found to be a reliable vertical jump measurement tool (Klavora, 2000; Caruso et al., 2010; Nuzzo, Anning & Scharfenberg, 2011), but unlike the force plate, the Vertec is amenable to multiple testing locations (e.g., laboratory, field, court, etc.) and thus, is more commonly used in “real-world” vertical jump test settings. In a similar vein, it was important to examine the reliability of My Jump using a jump that most closely approximates the manner in which individuals actually perform maximum vertical jumps in the real world. Indeed, previous My Jump reliability studies have employed less ecologically valid jump styles (i.e., CMJ, SJ, and DJ) (Balsalobre-Fernández, Glaister & Lockey, 2015; Gallardo-Fuentes et al., 2016; Driller et al., 2017), thus reducing the generalizability of their findings to the real world. The VJ jump is not without criticism from an experimental control perspective; these criticisms have centered upon two issues: the complexity of the movement, and human measurement error (Luhtanen & Komi, 1978; Harman et al., 1988; Leard et al., 2007; Menzel et al., 2010; Nuzzo, Anning & Scharfenberg, 2011). Reliability relative to absolute agreement between the jump height measurement tools ranged from poor to excellent (Figs. 1 and 2; Table 2) and the absolute jump height values measured via Vertec were significantly higher than those measured via My Jump (Fig. 2; Table 2). Thus, the data from this study indicates that the Vertec and My Jump do not consistently produce similar absolute jump height values relative to each other. These differences are due to the way in which jump height was calculated; the My Jump was based on time in the air and does not account for the upper limb reach component of the jump that was measured by the Vertec (Menzel et al., 2010; Nuzzo, Anning & Scharfenberg, 2011). This finding (a lack of absolute agreement between measurement tools) parallels that found in previous studies examining vertical jump heights in healthy adult participants (Hoffman & Kang, 2002; Caruso et al., 2010; Menzel et al., 2010). Collectively, based on these findings the recommendation is that field practitioners explicitly use either the My Jump or the Vertec to assess VJ jump height; one tool should be used exclusively for repeat measures and the measurement tools should not be considered interchangeable. Reliability relative to degree of both consistency and absolute agreement increased for the calculated peak power values compared to jump height measures. The absolute differences in measurements between Vertec and My Jump were smaller when peak power was calculated from jump height (Table 2). Peak power calculations (Sayers et al., 1999) include body mass and body mass significantly affects an individual’s ability to jump. Individuals with similar jump heights can have very different peak power values due to body mass differences (Harman et al., 1988; Johnson & Bahamonde, 1996). One limitation of using peak power in the current study, which should be noted, is that the use of the Sayers regression equation to estimate peak power inherently inflated the ICC estimates due to the shared variance of body weight. Thus, the reader may wish to interpret the specific ICC values with caution. However, the reader can still confidently conclude that the use of peak power values demonstrated higher reliability values compared to that observed of jump height values. From an ecological validity perspective, the specific jump style employed, the use of healthy adult participants from across the general university population, the relatively large number of participants, and our decision to test in the field rather than in a controlled laboratory space all represent strengths of the current study. Such data collection methods increase the generalizability of the current results. A possible limitation of our study was that some participants may not have been familiar with the VJ jump style. If that were the case for some participants, their resultant jumps may have been inconsistent from jump to jump, or, may not have be representative of their “true” maximum vertical jump height. In this study, we aimed to minimize the influence of this limitation and between jump reliability by providing verbal instructions and physically demonstrating the VJ jump style to participants prior to their VJ jump attempts, as well as by taking each participant’s highest VJ of their three jump trials. Furthermore, success in the VJ tests requires a maximal impulse to be applied to the ground resulting in maximal momentum of the body (maximal vertical velocity). The net vertical impulse is highly correlated with external power flow to the ground (Knudson, 2009; Winter et al., 2016) resulting in the misuse of “power” associated with vertical jump success. The vertical jump test provides information about the ability of an individual to jump vertically, and the height of the jump should not be interpreted (through a predictive equation based on the height or the flight time of a jump or a series of jumps) as a true measure of the power an individual can generate but more as a measure of the jumping ability of an individual (Tessier et al., 2013). External power flow is a poor descriptor of performance compared with the impulse that changes velocity (Knudson, 2009; Winter et al., 2016), however we used the Sayer’s equation to compare the two methods and used the terminology from that paper “Peak Power.” Although Vertec and My Jump were found to be comparable tools for measuring VJ jump height, the relative ease of use, affordability, and portability makes My Jump an attractive option for non-elite and/or non-professional movement practitioners. However, practitioners should be aware that absolute VJ jump values for Vertec and My Jump, respectively, will differ significantly from each other (although the use of the “Peak Power” regression equation that includes body weight will minimize this difference). Thus, regardless of whether the practitioner chooses to use Vertec or My Jump, it is recommended that the selected tool should be used exclusively during repeated measures within-subject testing of individuals or groups.
<urn:uuid:7eb74e9d-202e-4238-83e8-6a4f73995eba>
CC-MAIN-2018-39
https://peerj.com/articles/4669/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158766.65/warc/CC-MAIN-20180923000827-20180923021227-00412.warc.gz
en
0.918651
5,342
3.359375
3
[ 42369, 605, 4391, 6001, 318, 257, 15558, 326, 11070, 11, 3518, 30770, 11, 1535, 1337, 11153, 11, 290, 4202, 290, 21143, 24068, 779, 284, 4331, 393, 4659, 3518, 2854, 329, 7401, 11795, 290, 2137, 2478, 4959, 13, 1114, 1672, 11, 867, 6332, 27088, 21001, 779, 11723, 4391, 2854, 284, 5911, 7401, 357, 15914, 290, 9669, 8, 357, 15156, 25384, 11, 6372, 1222, 2561, 624 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
1 THE EFFECT OF CRIME VICTIMIZATION ON ATTITUDES TOWARDS CRIMINAL JUSTICE IN LATIN AMERICA Gabriel Demombynes Draft of May 2009 ABSTRACT This paper examines the effects victimization on criminal justice attitudes using data for most countries in Latin America. Using a representative survey for almost all of Latin America, we show that being victimized by crime reduces trust in the criminal justice system, increases the approval of people taking the law into their own hands, and reduces the probability that an individual believes authorities should always respect the law. Identification relies on the plausible assumption that crime victimization is random conditional on individual characteristics and neighborhood location, which are controlled for in the regression analysis. Most notable in the comparisons across countries is the particularly large negative effect of victimization in Mexico, El Salvador, and Guatemala on the belief that authorities should always respect the law. These results are worrisome because they imply that high levels of crime may feed vigilantism and support for brutal tactics that may themselves fuel greater levels of crime. JEL Classification: K42, D63 Key Words: Victimization, Criminal Justice, Latin America Abby Beatriz Cordova provided research assistance on a draft of the analysis presented in this paper. The views expressed in this paper are the author s alone, and in no way reflect those of the World Bank, its Executive Directors, or the countries they represent. Corresponding author: 2 1. INTRODUCTION A number of countries in Latin America and the Caribbean have experienced rising crime rates in recent years. Central America, in particular, has faced a rising wave of violent crime since the beginning of the decade, and the governments of the region have struggled to find ways to tackle the crime problem. One of the many possible effects of rising crime rates is a change in attitudes about the criminal justice system. As the incidence of crime rises, a growing fraction of the population will be people who have recently been victimized. The emotional shock of being victimized, combined with first-hand experience with the criminal justice system, may alter one s belief about the proper way for authorities and individual citizens to confront crime. If attitudes affect the way society deals with crime, a rising crime rate can drive public and private responses via the effect of crime on victims attitudes. Attitudes towards the criminal justice system have been recognized as a potentially important determinant of how well the criminal justice system functions. Previous work has argued that public support for the criminal justice system, and in particular for the police, is essential for the system to be effective (Tyler 1990), and previous work has shown that fear of crime increases among those who are victims (Wetzels, 1997). Research has not, however, demonstrated that crime victimization can change the attitudes of victims towards the criminal justice system. 3 In this paper, we consider the effect of crime victimization on three attitudes: trust in the criminal justice system, support for vigilantism, and support for the position that authorities should always respect the law when apprehending criminals. The first of these measures captures the overall view of the functioning of the state apparatus charged with controlling crime. The second concerns citizen response to crime, and the third concerns the response of public officials to crime. These attitudes are of concern because they are likely to be determinants of public and private behavior, particularly in countries with democratically elected governments. If citizens taking the law into their own hands is more widely supported, the costs of vigilante actions in terms of social and legal sanctions is likely to decrease, raising the expected prevalence of such actions. Likewise, an increased sentiment that the authorities should bend the law when apprehending criminals is likely to translate into more abusive practices by the police and criminal justice authorities. If declining trust in the criminal justice system, greater vigilantism, and increased police abuses produce a less effective criminal justice system, there is the potential for a country to find itself in a self-reinforcing spiral of crime and ineffective responses. The objective of this paper is not to demonstrate the full set of relationships outlined above but rather to present convincing evidence of one piece of the story: the effect of crime victimization on attitudes. The paper is organized as follows: Section 2 describes in detail the data used. Section 3 describes the analysis and the results, and Section 4 concludes. 4 2. DATA Comparison of crime data across time and countries is notoriously difficult due to problems of underreporting and varying crime definitions. Both problems are less severe for homicide, which is consequently preferred for international comparisons. Figure 1 shows homicide rates for Central America drawn from administrative data. The countries of the region exhibit a rising trend. In Guatemala homicide rates have almost doubled since 1999, after a sharp decrease following the signing of the peace agreement which ended the country s civil war. Homicides appear to have intensified in El Salvador and Honduras, although this may be in part a consequence of the improvement in methodology for collecting statistics. Homicide rates in Nicaragua, Panama, and Costa Rica, while substantially lower, have increased at an average pace of 5 to 10 percent per year. The principal data for this study is drawn from surveys conducted by Vanderbilt University s Latin American Public Opinion Project (LAPOP). Surveys were conducted in 10 countries in 2004, 20 countries in 2006, and 20 countries in (A survey was carried out in Guyana only in 2006 and in Argentina only in 2008.) For each survey, approximately 1500 adults were interviewed (3000 in Ecuador and Bolivia.) The questions used for the analysis in this paper were identical across years and countries. LAPOP surveys use two-stage randomized samples, and all surveys are designed to be representative at the national level of the adult population. 5 Crime victimization was measured using the question Have you been a victim of any type of crime in the past 12 months? Attitudes towards the criminal justice system were measured with three separate questions: 1) To what extent do you trust the criminal justice system? (on a scale from 1 to 7) 2) How much do your approve or disapprove of people taking the law into their own hands when the government does not punish criminals? (on a scale from 1 to 10, where 10 is the highest level of approval). 3) In order to apprehend criminals do you think that the authorities should always respect the law or that occasionally they can skate close to the limits of the law? For each of the three attitude variables, an individual-level index was created by rescaling responses to attitude questions on a scale from 0 to 100. This means that for the binary responses to the third question, responses that authorities should always respect the law were given the value 100 and the alternative response was given the value 0. Additionally, on order to control for socioeconomic status in the analysis, a wealth index was constructed using information in the LAPOP surveys on household ownership of the following assets: television, refrigerator, telephone, vehicle, washing machine, microwave oven, motorcycle, indoor plumbing, indoor bathroom, and computer. Weights for the index were constructed using the first component from a principal components analysis, following the approach described by Filmer and Pritchett (2001). 6 3. ANALYSIS First, we consider victimization rates by country and survey year in the LAPOP data. Victimization rates across all countries and years are in the range of percent, with the large bulk falling between 13 and 20 percent. Tables 2-4 present mean values by country and year of the trust in criminal justice indices. Both victimization rates and attitude measures show substantial variation across countries and time. Notable patterns include the apparent decline in beliefs that authorities should always respect the law. In 7 of the 8 countries surveyed in both 2004 and 2008, the percentage voicing support for this position declined. Figure 1 shows a scatter plot of changes in victimization rates and changes in beliefs on this question; the national level figures suggest a loose correlation between these changes. It is impossible, however, to determine the causal effect of victimization by merely examining the beliefs of victims vs. non-victims either at the national or individual level. It is possible that those who are most likely to be victimized are different from the average citizen along other characteristics that affect their attitudes. Most importantly, the people at high risk for being crime victims are those that live in areas with high crime prevalence. These people may well have different attitudes from those who live in lower crime areas, independent of whether they are actually victims or not. In order to move beyond correlations at the national level, the basic approach employed for the analysis is to regress measures of attitudes towards the criminal justice system on a binary 7 variable for crime victimization along with additional control variables. The analysis controls for wealth, demographic characteristics, and fixed effects at the neighborhood (sampling cluster) level. This econometric strategy effectively determines the effects of victimization on attitudes by comparing victims to similar non-victims who live in the same neighborhoods. This approach will produce valid estimates of the effect of victimization on attitudes if victimization is random conditional on observed characteristics and neighborhood. Results from the basic specification for all three variables are shown in Table 5. Columns 1, 3, and 5 show OLS specifications, while columns 2, 4, and 6 present specifications including cluster-level fixed effects. Columns 1 and 2 shows that trust in the criminal justice system is lower among nonwhites, those with more education, and those who are less wealthy. Trust in the criminal justice system declines with age but at a decreasing rate. Columns 3 and 4 show that approval of vigilantism people taking the law into their own hands is lower for women, nonwhites, those who are married, those with more education, and those who are wealthier. Support for vigilantism declines with age, also at a decreasing rate. Columns 5 and 6 show that support for the proposition that authorities should always uphold the rule of law is lower among men, whites, the married, and the wealthier. This belief declines with age, also at a decreasing rate. 8 For most variables, the magnitude of the point estimate is smaller in the specification including cluster effects, indicating that part of the correlation between attitudes and characteristics may be due to location-specific attitudes. Turning to the focus of the analysis, the results show significant effects of victimization on attitudes. The preferred fixed-effects estimate (columns 2, 4, and 6) imply that crime victimization reduces trust in the criminal justice system by 3.6 points, increases approval of people taking the law into their own hands by 4.1 points, and reduces the belief that authorities should always uphold the rule of law by 6.5 points. Recall that all three indices are scaled from 0 to 100. Because the third index is constructed from a simple binary question, the estimated effect can be taken as the change in the probability of an affirmative answer. In other words, the results in column 6 imply that being victimized makes one 6.5 percent less likely to believe that authorities should always uphold the rule of law. In Table 6, we present the same fixed effect results shown in Table 5 alongside an alternative specification which uses dummies for the individual components of the wealth index rather than the wealth index itself. Although very few of the coefficients on the individual assets are statistically significant, the estimates are extremely similar. Table 7 summarizes estimated effects from country-level regressions. These regressions use cluster-level dummies and the specification which includes the wealth index but not individual assets. Effects that are statistically significant at the 10 percent level are shown in bold. While the magnitude of effects varies by country, and some country-specific estimate are not statistically significant, the sign of estimates effects is the same as that of the region 9 as a whole in all except one case (the effect of victimization on attitudes towards vigilantism in Brazil, which is near zero and insignificant.) The estimated effects are remarkably robust and are not driven by only a small number of countries. The effects may differ across countries in part because the nature of crime may vary. The victimization variable is a rough measure which refers to any victimization in the previous 12 months, which could range from petty theft to violence assault, and more severe crimes are probably more likely to provoke changes in attitudes. Some weak suggestion of this is given by some of the variation across countries in estimated effects. In particular, the strongest effects of victimization on belief that authorities should not always uphold the law are in three countries which have experienced particularly violence waves of crime in recent years: Mexico, Guatemala, and El Salvador. 4. CONCLUSIONS Overall, the analysis shows that being victimized by crime reduces trust in the criminal justice system by 3.6 points, increases the approval of people taking the law into their own hands by 4.1 points, and reduces by 6.5 percent the probability that an individual believes authorities should always respect the law. Most notable in the comparisons across countries is the relatively large negative effect of victimization in Mexico, El Salvador, and Guatemala on the belief that authorities should always respect the law. The reported estimates imply that being victimized in those countries makes an individual approximately 10 percent less likely to say that authorities should always respect the law. These results are worrisome 10 because they imply that high levels of crime may feed vigilantism and support for brutal tactics that may themselves fuel greater levels of crime. Two limitations to this analysis merit consideration. First, it is unclear how enduring changes in attitudes as a result of victimization are likely to be. The estimates presented here are for the effect of victimization during the previous 12 months on current attitudes. However, it is possible that the effects of victimization on attitudes fades over time and is therefore less of a concern. On the other hand, if there is high serial correlation in the likelihood of victimization so that those victimized this year are particularly likely to have been victimized in past years (even after controlling for location and other variables) then the estimates presented in this paper may overestimate the effect of more recent victimization. Second, high crime rates may have an effect on attitudes of those who are not victims as well. In fact, it seems likely that the climate of fear generated by knowledge of high levels of crime may affect attitudes. In Honduras and El Salvador, two countries that have seen large declines in confidence in the criminal justice system, the changes observed are too large to be accounted for by the estimated changes in attitudes among victims. This suggests that the change in attitudes in response to rising crime occurs among non-victims as well. This effect is more difficult to analyze empirically given that an adequate control group is difficult to identify but is likely to be substantial. This remains a topic for future research. 11 5. REFERENCES Bilsky, W., & Wetzels, P. (1997). On the relationship between criminal victimization and fear of crime. Psychology, Crime & Law, 3(4), Dull, R. T., & Wint, A. V. N. (1997). Criminal Victimization and Its Effect on Fear of Crime and Justice Attitudes. J Interpers Violence, 12(5), doi: / Filmer, D., & Pritchett, L. H. (2001). Estimating wealth effects without expenditure data-or tears: an application to educational enrollments in states of India. Demography, Roberts, J. V., & Hough, J. M. (2005). Understanding Public Attitudes to Criminal Justice (p. 183). Tyler, T. R. (2004). Enhancing Police Legitimacy. The ANNALS of the American Academy of Political and Social Science, 593(1), doi: / 12 Table 1: Crime Victimization Rates by Country and Year Mean SE Mean SE Mean SE Mexico 17.3 (1.5) 20.2 (1.5) 16.1 (1.5) Guatemala 12.8 (1.1) 19.2 (1.3) 17.1 (1.9) El Salvador 17.1 (2.2) 15.6 (1.9) 19.0 (1.2) Honduras 13.7 (1.2) 19.2 (1.4) 13.7 (1.5) Nicaragua 15.2 (2.4) 16.0 (1.1) 16.5 (1.4) Costa Rica 15.9 (1.2) Panama 14.8 (1.0) 7.1 (0.8) 8.4 (1.0) Colombia 14.4 (1.3) 13.2 (1.1) 15.5 (1.2) Ecuador 18.3 (1.1) 20.0 (1.2) 22.6 (1.2) Bolivia 25.9 (1.3) 16.8 (1.2) 19.0 (1.1) Peru 26.2 (1.3) 25.4 (1.0) Paraguay 17.3 (1.3) 16.6 (1.3) Chile 23.1 (1.3) 22.2 (1.2) Uruguay 21.6 (1.5) 22.0 (1.6) Brazil 15.5 (1.4) 16.3 (1.3) Venezuela 25.1 (1.5) 21.4 (1.4) Argentina 27.5 (1.6) Dominican Republic 14.8 (1.0) Haiti 16.9 (1.1) 14.3 (1.0) Jamaica 10.1 (0.9) 8.4 (0.9) Guyana 11.0 (0.9) Source: Author s calculations using LAPOP data. Figures shown are the percentage of respondents who report having been the victim of any crime in the previous 12 months. 13 Table 2: Levels of Trust in Justice System by Country and Year Mean SE Mean SE Mean SE Mexico 49.4 (1.2) 49.2 (1.1) 49.7 (1.2) Guatemala 43.0 (0.7) 46.7 (0.8) 43.2 (1.4) El Salvador 55.3 (0.9) 48.6 (0.9) 46.1 (0.8) Honduras 51.2 (0.9) 46.3 (0.6) 43.2 (1.1) Nicaragua 47.7 (1.1) 44.6 (1.0) 43.1 (0.9) Costa Rica 51.4 (0.9) Panama 50.2 (0.8) 44.2 (1.1) 46.0 (1.1) Colombia 53.0 (0.7) 52.4 (0.9) 57.0 (0.8) Ecuador 37.1 (0.6) 32.2 (1.0) 36.0 (0.7) Bolivia 36.4 (0.8) 41.3 (0.7) 43.7 (0.6) Peru 35.1 (0.6) 36.2 (0.7) Paraguay 31.2 (0.9) 24.4 (0.8) Chile 49.8 (1.0) 52.8 (1.0) Uruguay 55.1 (1.2) 54.8 (0.8) Brazil 48.8 (1.2) 46.4 (1.2) Venezuela 42.5 (1.1) 39.8 (1.6) Argentina 38.2 (1.0) Dominican Republic 50.7 (0.9) Haiti 40.1 (1.1) 45.0 (1.0) Jamaica 47.6 (1.0) 49.2 (1.1) Guyana 53.2 (1.0) Source: Author s calculations using LAPOP data. 14 Table 3: Approval of People Taking the Law into Their Own Hands by Country and Year Mean SE Mean SE Mean SE Mexico 30.0 (1.6) 21.5 (1.2) 23.9 (1.3) Guatemala 31.0 (1.1) 36.2 (1.3) 22.9 (1.1) El Salvador 36.2 (1.2) 35.4 (1.0) 37.4 (1.1) Honduras 34.0 (1.0) 47.4 (1.3) 34.1 (1.2) Nicaragua 35.0 (1.6) 31.5 (0.8) 33.4 (1.3) Costa Rica 28.7 (1.5) Panama 25.3 (1.3) 35.0 (1.5) 27.9 (1.2) Colombia 22.5 (1.3) 25.0 (1.3) 24.0 (1.1) Ecuador 36.9 (1.2) 40.2 (1.6) 36.9 (1.2) Bolivia 27.4 (1.0) 32.3 (1.3) 31.1 (1.2) Peru 39.7 (1.5) 35.9 (1.6) Paraguay 22.7 (1.0) 21.5 (1.2) Chile 32.1 (1.6) 33.0 (1.4) Uruguay 18.4 (1.1) 26.0 (1.3) Brazil 19.1 (1.2) 17.0 (1.1) Venezuela 25.1 (1.7) 20.7 (1.7) Argentina 30.0 (1.9) Dominican Republic 31.9 (1.1) Haiti 29.0 (1.8) 24.6 (1.1) Jamaica 24.5 (1.2) 26.5 (1.3) Guyana 27.5 (1.3) Source: Author s calculations using LAPOP data. 15 Table 4: Respect for the Rule of Law by Country and Year Mean SE Mean SE Mean SE Mexico 67.8 (2.0) 58.1 (2.0) 69.3 (1.9) Guatemala 75.9 (1.4) 56.9 (1.8) 57.6 (1.9) El Salvador 65.3 (1.3) 56.0 (1.1) 55.4 (1.5) Honduras 63.2 (1.4) 44.4 (1.8) 47.8 (1.6) Nicaragua 71.1 (2.4) 52.1 (1.5) 46.7 (2.2) Costa Rica 56.6 (1.6) Panama 65.7 (1.8) 58.3 (1.7) 62.9 (1.6) Colombia 69.7 (1.8) 60.2 (1.5) 64.8 (1.7) Ecuador 59.6 (1.6) 50.2 (2.1) 55.2 (1.7) Bolivia 56.8 (1.7) 61.7 (1.6) Peru 53.2 (1.8) 56.3 (2.0) Paraguay 47.1 (1.8) 51.3 (2.1) Chile 49.5 (1.7) 51.4 (1.3) Uruguay 51.9 (1.9) 50.2 (1.7) Brazil 71.1 (2.0) Venezuela 68.6 (2.1) 68.0 (2.4) Argentina 62.7 (2.1) Dominican Republic 66.3 (1.4) Haiti 65.1 (2.2) 78.4 (2.1) Jamaica 69.8 (1.8) 86.5 (1.3) Guyana 62.1 (2.0) Source: Author s calculations using LAPOP data. 16 Table 5: Effect of Victimization on Attitudes Towards Criminal Justice: Main Results Dependent variable: (1) (2) (3) (4) (5) (6) Trust in Criminal Justice System Approval of People Taking the Law into Their Own Hands Belief That Authorities Should Always Uphold the Rule of Law Crime victim -4.84*** -3.63*** 4.97*** 4.11*** -7.21*** -6.48*** (0.28) (0.24) (0.44) (0.38) (0.61) (0.55) Female *** -1.65*** 1.36** 1.27** (0.20) (0.18) (0.29) (0.28) (0.43) (0.41) Nonwhite -2.64*** -0.86*** *** 3.50*** 0.86 (0.36) (0.25) (0.42) (0.39) (0.64) (0.57) Married *** -1.69*** -1.16* 0.34 (0.26) (0.21) (0.35) (0.32) (0.51) (0.48) Yrs education -0.35*** -0.07* -0.30*** -0.52*** (0.04) (0.03) (0.05) (0.04) (0.07) (0.06) Age -0.22*** -0.21*** -0.32*** -0.30*** 0.36*** 0.23*** (0.04) (0.03) (0.05) (0.05) (0.07) (0.07) Age squared 0.00*** 0.00*** 0.00** 0.00* -0.00* (0.00) (0.00) (0.00) (0.00) (0.00) (0.00) Wealth index 0.66*** *** -0.75*** -0.91** -0.86** (0.18) (0.14) (0.24) (0.22) (0.34) (0.32) Constant 54.19*** 49.81*** 42.80*** 46.83*** 45.56*** 50.77*** (0.87) (0.72) (1.22) (1.11) (1.80) (1.62) Number of cluster dummies N/A 3009 N/A 3009 N/A 3009 Observations R-squared Source: Author s calculations using LAPOP data. All regressions include dummy variables at the level of the sampling cluster. Dependent variables are indices with ranges from 0 to 100. 17 Table 6: Effect of Victimization on Attitudes Towards Criminal Justice: Alternative Specifications Dependent variable: (1) (2) (3) (4) (5) (6) Trust in Criminal Justice System Approval of People Taking the Law into Their Own Hands Belief That Authorities Should Always Uphold the Rule of Law Crime victim -3.63*** -3.65*** 4.11*** 4.10*** -6.48*** -6.52*** (0.24) (0.24) (0.38) (0.38) (0.55) (0.55) Female *** -1.57*** 1.27** 1.32** (0.18) (0.18) (0.28) (0.28) (0.41) (0.41) Nonwhite -0.86*** -0.85*** -1.41*** -1.38*** (0.25) (0.25) (0.39) (0.39) (0.57) (0.57) Married *** -1.72*** (0.21) (0.21) (0.32) (0.32) (0.48) (0.48) Yrs education -0.07* -0.07** -0.52*** -0.52*** (0.03) (0.03) (0.04) (0.04) (0.06) (0.06) Age -0.21*** -0.22*** -0.30*** -0.30*** 0.23*** 0.23** (0.03) (0.03) (0.05) (0.05) (0.07) (0.07) Age squared 0.00*** 0.00*** 0.00* 0.00* (0.00) (0.00) (0.00) (0.00) (0.00) (0.00) Wealth index *** -0.86** (0.14) (0.22) (0.32) Assets Television *** (0.39) (0.61) (0.89) Refrigerator -0.86** (0.29) (0.45) (0.66) Landline phone * 0.12 (0.24) (0.38) (0.55) Vehicle (0.25) (0.39) (0.57) Washing machine (0.28) (0.44) (0.65) Microwave (0.27) (0.42) (0.61) Motorcycle *** (0.31) (0.47) (0.69) Indoor plumbing (0.31) (0.48) (0.71) Indoor bathroom * (0.29) (0.45) (0.67) Computer * 0.37 (0.27) (0.42) (0.62) Constant 49.81*** 50.36*** 46.83*** 48.33*** 50.77*** 55.01*** (0.72) (0.78) (1.11) (1.21) (1.62) (1.78) Number of cluster dummies Observations R-squared Source: Author s calculations using LAPOP data. All regressions include dummy variables at the level of the sampling cluster. Dependent variables are indices with ranges from 0 to 100. 18 Table 7: Effects of Victimization, by Country Trust in Criminal Justice System Approval of People Taking the Law into Their Own Hands Belief That Authorities Should Always Uphold the Rule of Law Estimated Effect SE Estimated Effect SE Estimated Effect SE Argentina -4.9 (1.3) 7.1 (2.0) -6.6 (3.1) Brazil -3.5 (1.6) -0.8 (2.1) -2.0 (3.4) Chile -2.2 (1.0) 2.2 (1.5) -7.7 (2.3) Colombia -2.0 (1.2) 5.1 (1.8) -5.6 (2.7) Costa Rica -4.1 (1.9) 4.6 (2.9) -5.9 (4.1) Dominican Re -5.5 (2.0) 3.2 (2.9) -5.8 (3.5) Ecuador -2.2 (0.7) 2.9 (1.2) -7.7 (1.7) El Salvador -5.7 (1.2) 7.0 (2.0) -9.2 (2.7) Guatemala -3.6 (1.1) 5.9 (1.7) (2.6) Haiti -3.7 (1.0) 3.5 (1.7) -4.9 (2.3) Honduras -2.2 (1.0) 6.3 (1.7) -6.9 (2.5) Jamaica -3.9 (1.4) 4.0 (2.0) -2.6 (2.5) Mexico -6.9 (1.1) 3.6 (1.5) (2.4) Nicaragua -5.4 (1.2) 1.6 (1.9) -5.1 (2.6) Panama -1.9 (1.5) 1.6 (2.1) -0.3 (3.5) Paraguay -8.1 (1.9) 5.4 (2.9) -0.9 (4.7) Peru -2.4 (0.9) 2.1 (1.5) -7.2 (2.2) Uruguay -5.5 (1.1) 5.9 (1.5) -2.0 (2.4) Venezuela -6.7 (1.1) 3.9 (1.4) -3.1 (2.1) Source: Author s calculations using LAPOP data. All regressions include dummy variables at the level of the sampling cluster. Dependent variables are indices with rangs from 0 to 100. 19 Figure 2: Changes in Victimization Rates vs. Changes in Belief that Authorities Should Always Uphold the Law 5 Change in % of Who Believe Authorities Should Always Respect the Law Panama Mexico Colombia Ecuador El Salvador Honduras Guatemala Nicaragua Change in % Victimized by Crime in Previous 12 Months Source: Author s calculations using LAPOP data. All regressions include dummy variables at the level of the sampling cluster. Dependent variables are indices with rangs from 0 to 100. 20 Figure 3: Effect of Victimization on Trust in Criminal Justice System by Country Effect of Being a Crime Victim on Trust in Criminal Justice System Change in Index(Range: 0-100) Argentina Brazil Chile Colombia Costa Rica Dominican Republic Ecuador El Salvador Guatemala Guyana Haiti Honduras Jamaica Mexico Nicaragua Panama Paraguay Peru Uruguay Venezuela Source: Author s calculations. The plotted figures show coefficients on crime victimization from country-specific regressions of three different indices on crime victimization and other covariates. Regressions include fixed effects at the sampling cluster level. Dependent variables are indices with ranges from 0 to 100. 21 Figure 4: Effect of Victimization on Approval of People Taking the Law into Their Own Hands by Country Argentina Brazil Chile Colombia Costa Rica Dominican Republic Ecuador El Salvador Guatemala Guyana Haiti Honduras Jamaica Mexico Nicaragua Panama Paraguay Peru Uruguay Venezuela Effect of Being a Crime Victim on Approval of People Taking the Law into Their Own Hands Change in Index (Range: 0-100) Source: Author s calculations. The plotted figures show coefficients on crime victimization from country-specific regressions of three different indices on crime victimization and other covariates. Regressions include fixed effects at the sampling cluster level. Dependent variables are indices with ranges from 0 to 100. 22 Figure 5: Effect of Victimization on Belief that Authorities Should Always Respect the Rule of Law by Country Effect of Being a Crime Victim on Belief that Authorities Should Always Respect Rule of Law Change in Index (Range: 0-100) Argentina Brazil Chile Colombia Costa Rica Dominican Republic Ecuador El Salvador Guatemala Guyana Haiti Honduras Jamaica Mexico Nicaragua Panama Paraguay Peru Uruguay Venezuela Source: Author s calculations. The plotted figures show coefficients on crime victimization from country-specific regressions of three different indices on crime victimization and other covariates. Regressions include fixed effects at the sampling cluster level. Dependent variables are indices with ranges from 0 to 100. . Find us at: www.lapopsurveys.org Like us on: Latin American Public Opinion Project Follow us at: @Lapop_Barometro Citizen Insecurities and Democracy in the Americas: Looking Back over a Decade of the This is the third paper (I0803, I0813) in the AmericasBarometer Insight Series to analyze the sources of corruption victimization, focusing on another question included in the 2008 round of the Latin American developing world. Studies have shown that citizens view crime as one of the most pressing problems facing their nation (Quann and Kwing 2002) AmericasBarometer Insights: 2009 (No. 32) Crime and Support User Guide to LAPOP s System for Online Data Analysis (v1) The following guide is designed to help users navigate through and use LAPOP s System for Online Data Analysis (SODA). The system allows individuals Issue Brief March 2008 Center for Economic and Policy Research 1611 Connecticut Ave, NW Suite 400 Washington, DC 20009 tel: 202-293-5380 fax:: 202-588-1356 www.cepr.net The Economic Impact of a U.S. Slowdown Contents Poverty, income distribution, perceptions of distribution and social spending - Changes in poverty and its determinants - Income distribution and perceptions of distribution - Trends in household AmericasBarometer Insights: 2015 Number 110 Public Health Services Use in Latin America and the Caribbean By email@example.com Vanderbilt University Executive Summary. This Insights report Agrimonitor: PSE Agricultural Policy Monitoring System in LAC INE/RND WHAT POLICY MONITORING IS,WHY IS IMPORTANT AND WHAT HAS ALREADY BEEN DONE IN OUR COUNTRIES? Monitor and evaluate developments in agricultural Obtaining Finance in Latin America and the Caribbean 1 World Bank Group latin America and the Caribbean Series Note No. REV. 8/14 Basic Definitions Countries surveyed in and how they are grouped for analysis: UN/POP/EGM-MIG/2005/10 5 February 2006 EXPERT GROUP MEETING ON INTERNATIONAL MIGRATION AND DEVELOPMENT IN LATIN AMERICA AND THE CARIBBEAN Population Division Department of Economic and Social Affairs United RACE/ETHNICITY EDUCATION GDP GROWTH WOMEN S RIGHTS FINANCIAL INCLUSION UPDATED AND EXPANDED VERSION SOCIAL PROGRAMS CIVIL RIGHTS LGBT In its second year, AQ s Index adds three new variables, expands to Ministerial Declaration Preventing through education The Ministerial Declaration Preventing through Education, was approved in Mexico City in the framework of the 1st Meeting of Ministers of Health and AmericasBarometer Insights: 2010 (No.44) Support for Same Sex Marriage in Latin America 1 Germán Lodola, Universidad Torcuato Di Tella, University of Pittsburgh firstname.lastname@example.org Margarita Corral, Vanderbilt REPARIS A REGIONAL PROGRAM Accounting Education in Latin America and the Caribbean Henri Fortin, Program Manager, CFRR THE ROAD TO EUROPE: PROGRAM OF ACCOUNTING REFORM AND INSTITUTIONAL STRENGTHENING (REPARIS) Susanne Karstedt School of Criminology and Criminal Justice, Griffith University, Australia. Global Hotspots of Violence: Intervention and Prevention in the Top most Violent Countries Global Violence Reduction INTERNATIONAL FACTORING November 3, 2011 1 L. Gabriel Segura President and founding officer of CVCredit Inc, a Miami-based company which focuses in USA-domestic and international factoring services. Nine Health Care Expenditure and Financing in Latin America and the Caribbean [Fact sheet] December 2012 Overview of Health Expenditure and Financing Current Situation and Trends In 2011, the national or total research brief The International Policy Centre for Inclusive Growth is jointly supported by the United Nations Development Programme and the Government of Brazil. August/2014no. 47 A Profile of the Middle 100/2015-9 June 2015 EU Community of Latin American and Caribbean States (CELAC) summit CELAC represents the fifth most important trading partner of the EU More than 200 bn total trade The 28 Member States Survey of LAC agricultural research institutes on technical information management. FORAGRO Technical Secretariat Area of Technology and Innovation Directorate of Technical Leadership and Knowledge Management, APPLICATION RECEIPT DEADLINE February 28, 2014 PROJECT PERIOD September 1, 2014 August 31, 2015 PROGRAM DESCRIPTION Southern Exposure: Performing Arts of Latin America is a national initiative that supports Human Resources Development and Training in Comprehensive Evaluation Cuarto Foro Global de los Centros para el Aprendizaje en Evaluación y Resultados (CLEAR) November 19, 2013 Conduct evaluations Train Idle Youth in Latin America: A Persistent Problem in a Decade of Prosperity By Mauricio Cárdenas, Rafael de Hoyos and Miguel Székely 1 August 2011 1 Correspondence to: email@example.com. Cárdenas Education and Training Education The William J. Harrington Medical Training Programs for Latin America and the Caribbean 1967 August 2011 Total 3939 Residency Program for Internal Medicine 397 Elective Crime and Violence in Central America: A Development Challenge 2011 Sustainable Development Department and Poverty Reduction and Economic Management Unit Latin America and the Caribbean Region Document Information for applicants from Latin America and the Caribbean for study commencing in 2014 Development Scholarships The Development Scholarships (NZDS) scheme offers the opportunity to people from targeted Tourism Statistical Yearly Report 2012 The Costa Rica Tourism Board is pleased to present the Tourism Statistical Yearly Report 2012. The information has been collected and organized by officers of Subproceso Latin America s s Foreign Debt Causes and Effects Internal Causes of the Debt Overvalued currency associated with ISI Returns on projects in future, but payments now: Debt trap Populist economic policies: AmericasBarometer Insights: 2009(No.8) * Should Government Own Big Businesses and Industries? Views from the Americas By Margarita Corral Margarita.firstname.lastname@example.org Vanderbilt University P rivatization Goal 4. Reduce child mortality 4.1. Introduction Target 4.A of MDG 4 reads: Reduce by two-thirds, between 1990 and 2015, the under-five mortality rate. Monitoring of this Goal consists of three indicators Recommendations for implementing sustainable energy activities in the regions: LAC NESTOR LUNA DIRECTOR OF STUDIES AND PROJECTS ICSU: GLOBAL REGIONAL INTEGRATION WORSHOP ON SUSTAINABLE ENERGY April 9th, SIGNATURES AND CURRENT STATUS OF RATIFICATIONS AMERICAN CONVENTION ON HUMAN RIGHTS "PACT OF SAN JOSE, COSTA RICA" (Signed at San José, Costa Rica, 22 November 1969, at the Inter-American Specialized Conference Social Pensions for the Elderly or Social Assistance for Poor Households? Margaret Grosh Pensions Core Course March 3, 2014 World Bank, Washington DC 1 The Elderly are Not all Poor In fact, many studies Review of Income and Wealth Series 36, No. 2, June 1990 A BALANCE OF PAYMENTS ANALYSIS OF THE LATIN AMERICAN DEBT CRISIS BY J. THOMAS ROMANS SUNY Buffalo AND STANTON A. WARREN Niagara University In this The United Nations High Commissioner for Refugees, Sin Fronteras, the Inter-American Commission on Human Rights, and the Asociación Mexicana de Impartidores de Justicia A.C. CALL FOR PROPOSALS Recognition Citi s Online Academy Presents: The Pharmaceutical & Healthcare Industry in Latin America Jamie Davies Head of Pharmaceuticals & Healthcare Business Monitor International Oscar Mazza Consumer & Healthcare Trends, News and Events that are Shaping the AML Arena in Latin America Presented by: Octavio Betancourt- Managing Director 1 MoneyLaundering.com 15 th Annual International Anti-MoneyLaundering Conference Table 1. Growth of Latin American and Caribbean Medical Schools Country 1969 1975 1988 1992 2004 Argentina 9 9 9 13 24 Antigua and Barbuda 1 Bolivia 3 3 3 7 10 Belize 2 Brazil 30 75 78 80 112 Chile 4 10 . Coordinating national investment promotion with subnational investment promotion Investment climate, World Bank Global Market Access from an International Economy Spain: your partner in Europe Business Distr. LIMITED LC/L.3379(CEA.6/7) 19 October 2011 ENGLISH ORIGINAL: SPANISH Sixth meeting of the Statistical Conference of the Americas of the Economic Commission for Latin America and the Caribbean Bávaro, Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable FCPA and Anti-Corruption in Latin America May 2011 FCPA Enforcement "FCPA enforcement is stronger than it's ever been and getting stronger. We are in a new era of FCPA enforcement; and we are here to stay." 352 UNHCR Global Report 2010 Argentina Bolivia (Plurinational State of) Brazil Chile Colombia Costa Rica Cuba Ecuador El Salvador Guatemala Honduras Mexico Nicaragua Panama Paraguay Peru Uruguay Venezuela Senate Committee: Education and Employment QUESTION ON NOTICE Budget Estimates 2015-2016 Outcome: Higher Education Research and International Department of Education and Training Question No. SQ15-000549 HUNT Mobile Ads Traffic Q2-2011 Report #2-2011 Intro Continuing with the quarterly reports from HUNT Mobile Ads, the leading mobile advertising network in Latin America and the Spanish speaking markets, nter-american Development Bank Banco Interamericano de Desarrollo Latin American Research Network Red de Centros de Investigación Office of the Chief Economist Working paper #R-376 An Asset-Based Approach Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document What explains modes of engagement in international trade? Conference paper for Kiel International Economics Papers 2011 Current Version: June 2011 Natalia Trofimenko Kiel Institute for World Economy Hindenburgufer Chapter 1 Religion and Demography More than two-thirds (68%) of Hispanics are Roman Catholics. The next largest category, at 15%, is made up of born-again or evangelical Protestants. Although their numbers Energy Briefing: Global Crude Oil Demand & Supply November 6, 215 Dr. Edward Yardeni 516-972-7683 eyardeni@ Debbie Johnson 48-664-1333 djohnson@ Please visit our sites at www. blog. thinking outside the Enterprise Surveys Country Note Series Brazil World Bank Group Country note no. 12 11 Running a Business in Brazil Brazilian firms are more integrated into their country's financial system than other firms Please cite as: Albó, L., Hernández-Leo, D., Oliver, M. (2016) Are higher education students registering and participanting in MOOCs? The case of MiríadaX. EMOOCs 2016 conference, Graz, Austria. Are higher THIRD MEETING OF THE INTERGOVERNMENTAL OEA/Ser.L./XIV.4.3 WORKING GROUP ON THE MULTILATERAL CICAD/MEM/doc.14/98 rev. 1 EVALUATION MECHANISM (MEM) 4 December 1998 October 26-28, 1998 Original: Spanish Tegucigalpa, Resolution Seminar-Workshop The Promotion and Protection of Reproductive Rights through the Work of the National Human Rights Institutions for Latin America, the Caribbean and Canada. Representatives of Public Policy and Development Masters Programme Paris School of Economics Course on Social Policies in Developing Countries Lecture 3: Policy objectives, constraints and domains. Francisco H. G. Ferreira Violence and Crime in Latin America Mark A Cohen (Vanderbilt University) and Mauricio Rubio (Universidad Externado de Colombia) CHALLENGES Background Crime and violence is a major concern in Latin America. IPv6 World Congress Meeting Las Vegas, Nevada, U.S. Azael Fernández Alcántara February 2006 CONTENTS 1. Introduction. 2. (6Bone) 3. IPv6 in Mexico 4. IPv6 in CLARA Network 5. IPv6 current status in Latin Company Presentation Corporate Motor Show 1 Company Overview 1. Company Overview Technology & Service Provider Network Operator 2 FY 2010 Financial Highlights 1. Company Overview Revenues Ebitda 60.9 19.2 COSTA RICA: LINKING TRADE AND INVESTMENT FOR INCLUSIVE GROWTH AND DEVELOPMENT GETTING TO KNOW COSTA RICA o A small country of 51,100 km2 o With 4.7 million inhabitants o Strategically located in the middle POVERTY WITHIN CONTINENTS The poverty maps we used to identify hunger hotspots throughout Africa were the main source of data for identifying the Millennium Villages. The maps acted as an organizing principle Telephone and Cell Phone Adoptions in Latin American and Caribbean Nations Kallol K. Bagchi The University of Texas at El Paso email@example.com Adriano O. Solis The University of Texas at El Paso firstname.lastname@example.org Professional Development Scholarship Program Preparing Tomorrow's Teachers with Web 2.0 Tools and 21st Century Skills 1 OAS/DHDEC/CIR.031/2012 1) Study venue: The course will be delivered entirely online PAN AMERICAN HEALTH ORGANIZATION WORLD HEALTH ORGANIZATION SUBCOMMITTEE ON PLANNING AND PROGRAMMING OF THE EXECUTIVE COMMITTEE 31st Session, 23-24 November 1998 Provisional Agenda Item 8 SPP31/8, Rev.1 WHAT S NEXT FOR MOBILE PAYMENTS? ? INSIGHT FROM LATIN AMERICA: WHAT S NEXT FOR MOBILE PAYMENTS? Mobile technology opens new opportunities for both financial institutions and merchants in Latin America. Brochure More information from http://www.researchandmarkets.com/reports/1937256/ Latin America - Digital Media and Pay TV Market Description: This market report provides a comprehensive overview of convergence, Capacity building for non communicable disease prevention and control in Latin America and Caribbean Advances and challenges Branka Legetic, Anselm Hennis Pan American Health Organization- World Health SERVICES AND RATES FedEx International Solutions for your business Whether you are shipping documents to meet a deadline, saving money on a regular shipment or moving freight, FedEx offers a suite of transportation Latin America Argentina Belize Bolivia Brazil Chile Colombia Costa Rica Cuba Ecuador El Salvador Guatemala Honduras Mexico Nicaragua Panama Paraguay Peru Uruguay Venezuela (Bolivarian Republic of) Working Goal 2. Achieve Universal primary education 2.1. Introduction The second Goal proposed in the Millennium Summit reflects the commitment adopted by the international community to achieve universal primary News Media Consumption and Political Interest in Latin America Ryan Salzman Northern Kentucky University email@example.com Abstract For media communication researchers, a relationship between media EXECUTIVE SUMMARY Technological Innovation for Security in Latin America Phase 1: Diagnosis in Latin America With the support of: I. Introduction Technology is a key element to increase the effectiveness Fall 2015 International Student Enrollment Prepared by The Office of International Affairs Nova Southeastern University Nova Southeastern University International Student Statistics Fall 2015 International 1) Project Leaf - Law Enforcement Assistance for Forests 2) Project summary: Project Leaf (Law Enforcement Assistance for Forests) is a consortium forests and climate initiative on combating illegal logging Excerpt Sudan Fixed Telecommunications: Low Penetration Rates Get a Boost from Broadband Internet and VoIP Services This report is part of Pyramid Research s series of Africa & Middle East Country Intelligence RESEARCH BRIEF Joseph Cera, PhD Survey Center Director UW-Milwaukee Atiera Coleman, MA Project Assistant UW-Milwaukee CITY OF MILWAUKEE POLICE SATISFACTION SURVEY At the request of and in cooperation with Preventing violence against children: Attitudes, perceptions and priorities Introduction As countries in every region of the world strive to meet the targets of the Millennium Development Goals (MDGs), Page 1 of 6 Title Demonstrate knowledge of Central American and/or South American countries as tourist destinations Level 3 Credits 8 Purpose People credited with this unit standard are able to: locate Last reviewed: 04/21/2016 1 PAY-TV SIGNAL PIRACY IN LATIN AMERICA AND THE CARIBBEAN Pay-TV signal piracy is a multi-billion-dollar problem in Latin America and the Caribbean. It poses daunting challenges THE Art of moving Forward International Latino Cultural Center of Chicago Your point of encounter Tu punto de encuentro Seu ponto de encontro Introduction The International Latino Cultural Center of Chicago Trade Finance Services: Current Environment & Recommendations: Wave 3 A Survey Among Banks Assessing the Current Trade Finance Environment Sponsored by The International Monetary Fund BAFT-IFSA April 2010 The Challenge of Financing Business in Latin America and the Caribbean The Future of the Financial Services Industry after the Crisis 14th Caribbean Business Executive Seminar Port-of of-spain, Trinidad 2008/SOM1/ECSG/SEM/018 APEC Information Privacy Principles in the Development of Outsourcing Business: Contact Center in Peru Submitted by: Peru Technical Assistance Seminar on International Implementation Pan American Health Organization XI Annual Evaluation Meeting AMI/RAVREDA Antigua Guatemala, March 19-23, 2012 SESSION 5: Quality of the ANTIMALARIALS Strengthening of the medicines quality control laboratories
<urn:uuid:83e34a99-535c-45d5-b158-969f23d58056>
CC-MAIN-2018-43
http://docplayer.net/9957180-The-effect-of-crime-victimization-on-attitudes-towards-criminal-justice-in-latin-america.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511897.56/warc/CC-MAIN-20181018173140-20181018194640-00023.warc.gz
en
0.850383
11,102
2.765625
3
[ 16, 3336, 33659, 9782, 3963, 8740, 12789, 569, 18379, 3955, 14887, 6234, 6177, 26195, 2043, 8322, 1546, 309, 3913, 48294, 8740, 3955, 17961, 49687, 3268, 42355, 1268, 49463, 17371, 1897, 296, 1525, 2516, 13650, 286, 1737, 3717, 9564, 18601, 10659, 770, 3348, 28025, 262, 3048, 3117, 1634, 319, 4301, 5316, 14479, 1262, 1366, 329, 749, 2678, 287, 9133, 2253, 13, 8554, 257, 8852, 5526 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Learn something new every day More Info... by email Common effects of food additives include protection against many foodborne diseases, longer product shelf lives, and flavor enhancement. Some types of artificial additives also add brighter colors to some foods. Many processed foods are made with large amounts of preservatives as a matter of convenience to consumers. These foods are often pre-cooked and frozen so that they can be heated quickly in a microwave oven. While these chemical ingredients have benefits, health experts also sometimes point out a few specific negative effects of food additives such as increased weight gain, possible malnutrition, and higher chances of developing food allergies to some of these artificial ingredients. One of the more frequent effects of food additives is a more consistent texture in foods that contain several different ingredients. Separation can often happen in foods such as cakes and some salad dressings, which are prone to this problem if left to settle over time. Some additives known as emulsifiers prevent this problem and keep the mixtures even in these foods. Preservation is also one of the key effects of food additives. Several different chemical ingredients such as sodium nitrate are mixed with some foods to stop the growth of harmful bacteria and prevent the products from spoiling after only a short time in storage. These additives are especially common in cured meats such as sausage and bacon. Various anti-microbial compounds and antioxidants are reported to lower the risks of contracting serious illnesses such as E coli bacterial infections. These types of preservatives are also considered economically sound measures that result in less food waste due to spoilage. Enhanced flavors are additional effects of food additives, and many manufacturers add them to a wide range of products such as snack cakes and potato chips. One common additive is called monosodium glutamate (MSG) that some culinary experts report as the source of a fifth distinctive flavor called umami that is separate from natural salty, sweet, sour, or bitter tastes. Although MSG and similar additives can make many foods taste better, nutritionists often caution that these additives in large amounts can lead to weight gain and reduced ability of the digestive system to absorb needed nutrients. Various dyes are added to processed foods in order to give them a more appealing look. Marketing experts often point out that the most appetizing-looking foods tend to sell more in both grocery stores and restaurants. Some studies have linked excessive consumption of certain food coloring to increased risks of cancer. One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!
<urn:uuid:ea95a29d-b93f-43c3-af74-f044e6180172>
CC-MAIN-2015-06
http://www.wisegeek.net/what-are-the-effects-of-food-additives.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422118108509.48/warc/CC-MAIN-20150124164828-00001-ip-10-180-212-252.ec2.internal.warc.gz
en
0.971756
533
3.609375
4
[ 20238, 1223, 649, 790, 1110, 3125, 14151, 986, 416, 3053, 198, 17227, 3048, 286, 2057, 48348, 2291, 4800, 1028, 867, 2057, 13555, 10040, 11, 2392, 1720, 18316, 3160, 11, 290, 9565, 28554, 13, 2773, 3858, 286, 11666, 48348, 635, 751, 26083, 7577, 284, 617, 9013, 13, 4650, 13686, 9013, 389, 925, 351, 1588, 6867, 286, 906, 35291, 355, 257, 2300, 286, 15607, 284, 7008 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Select menu: Stats | Analysis of Variance | General General Analysis of Variance lets you produce analyses of variance for a wide variety of designs, ranging from simple one-way ANOVA to Latin squares. The General Analysis of Variance option can be used to fit any generally balanced design not included in the more specific selections. Unbalanced data sets can be analysed using the unbalanced treatment design, or alternatively by using regression (single error term) or REML (more than one error term). Each of the designs, with the exception of unbalanced treatment structure, can also be generated using the Generate a Standard Design menu. - After you have imported your data, from the menu select Stats | Analysis of Variance | General. - Fill in the fields as required then click Run. Selects the type of design to be analysed. See the help specific to each design for a description of its features and the information to be entered. - General Analysis of Variance - One-way ANOVA (no Blocking) - One-way ANOVA (in Randomized Blocks) - Two-way ANOVA (no Blocking) - Two-way ANOVA (in Randomized Blocks) - General Treatment Structure (no Blocking) - General Treatment Structure (in Randomized Blocks) - Unbalanced Treatment Structure - Completely Randomized Design - Split-Plot Design - Split-Split-Plot Design - Strip-Plot (or criss-cross) Design - Latin Square - Graeco-Latin Square - Square Lattice Design (Blocks) - Lattice Square Design (Rows and Columns) This lists data structures appropriate to the current input field. The contents of this field will change as you move from one field to the next. You can double-click a name to copy it to the current input field. Set this to the variate containing the data values. Available Data lists variates available for analysis. The treatment structure is specified according to the type of design selected. See the help for the chosen type of design for further details. This will open a menu that lets you set up contrasts providing comparisons of the effects produced at different levels of a treatment factor. The block structure is specified according to the type of design selected. See the help for the chosen type of design for further details. For designs with more than one treatment factor you can specify whether interactions can be fitted in addition to main effects. Select the Covariate check box if you want to perform analysis of covariance. The adjacent field will become enabled to let you supply a list of the covariates for the analysis. If there is more than one, you can separate their names with spaces or commas. Alternatively, you can specify a model formula to define the terms to be fitted in the covariate analysis. This provides a quick way of entering operators in the treatment model formula. Double-click the required symbol to copy it to the current input field. You can also type in operators directly. See model formula for a description of each. This controls display options, enabling you to select the output to be generated initially by ANOVA – you can print this same information after the analysis, using Further Output. This lets you specify data structures in which to save fitted values, residuals and treatment means from the analysis. This lets you display additional results from the analysis of variance and produce graphical output of fitted treatment means and diagnostic plots. |Pin||Controls whether to keep the menu open when you click Run. When the pin is down , then the menu will remain open, otherwise when the pin is up , the menu will close.| |Restore||Restore names into edit fields and default settings.| |Clear||Clear all edit and list boxes.| |Help||Help about this menu.| - Saving Results for further analysis. - Further Output for additional output subsequent to analysis. - Multiple Comparisons menu for specifying multiple comparisons. - Permutation Test menu performing random permutation tests. - Power for ANOVA menu to estimate the power of the analysis of variance. - One and two-way analysis of variance menu. - Parallel ANOVA menu. - Unbalanced analysis of variance, regression and linear Mixed Models for analysing unbalanced data. - ANOVA directive for analysing data using the commands - AUNBALANCED procedure for unbalanced treatment structures
<urn:uuid:53a81df6-ebb4-40cc-8e43-58d286b7ffd5>
CC-MAIN-2019-13
https://genstat.kb.vsni.co.uk/knowledge-base/analysisof-variance/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202924.93/warc/CC-MAIN-20190323181713-20190323203713-00467.warc.gz
en
0.799868
926
2.9375
3
[ 17563, 6859, 25, 20595, 930, 14691, 286, 15965, 590, 930, 3611, 198, 12218, 14691, 286, 15965, 590, 8781, 345, 4439, 13523, 286, 24198, 329, 257, 3094, 4996, 286, 9824, 11, 12897, 422, 2829, 530, 12, 1014, 3537, 41576, 284, 9133, 24438, 13, 383, 3611, 14691, 286, 15965, 590, 3038, 460, 307, 973, 284, 4197, 597, 4143, 12974, 1486, 407, 3017, 287, 262, 517, 2176 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Skyhook balloons were high-altitude balloons developed by Otto C. Winzen and General Mills, Inc. They were used by the United States Navy Office of Naval Research (ONR) in the late 1940s and 1950s for atmospheric research, especially for constant-level meteorological observations at very high altitudes. Instruments like the Cherenkov detector were first used on Skyhook balloons. In the late 1940s, Project Skyhook was conceived of as a means by which plastic balloons could be used to transmit or send instruments into the stratosphere to conduct research. This project carried forward work from an earlier project, Helios, that General Mills and Jean Piccard initiated to use arrays of giant plastic balloons to carry humans aloft. Balloons, long used for collecting meteorological data, now offered the opportunity of collecting highly specialized information and photographs. The first Skyhook balloon was launched on September 25, 1947. The balloon was developed by the Aeronautical Division of General Mills. It carried a 63 pounds (29 kg) payload of nuclear emulsion to over 100,000 feet (30,000 m). At low level immediately after launch, the lifting gas (hydrogen or helium) in the balloons formed a small bubble at the top of the envelope, resulting in the balloon having a "limp" look. At the lower air pressure at higher altitudes, the gas expanded and eventually filled the whole envelope forming a sphere or ovoid. In some models the balloons could reach diameters of more than 30 m. In the succeeding 10 years, over 1,500 Skyhook flights were made for investigations supported by the ONR and for European scientists. These flights were made from locations in the United States, Canada, and naval vessels in the Atlantic, Pacific, Caribbean, and Arctic waters. Both Winzen Research and General Mills participated in these launchings, and in later years, the Atomic Energy Commission joined ONR in support of Project Skyhook. Among significant flights, Project Skyhook launched the first successful three-balloon cluster in 1948. Then in 1949 the first shipboard Skyhook launch took place. It was followed by nearly 300 shipboard launchings over the next 10 years. The first manned plastic balloon flight under ONR contract took place in 1949. Project Rockoon, in 1952, featured a Skyhook balloon that released small Deacon rockets at about 70,000 feet (21,000 m) above arctic waters. One of the first known attempts to carry out an astrophysical measurement from a plastic balloon occurred under the Skyhook program on June 30, 1954. During the solar eclipse on that date two Skyhook balloons were launched by Winzen Research with camera gondolas employing simple orientating systems. The objective was to photograph the eclipse from high altitude. Varied photographic equipment was carried and aimed at the Sun to obtain full coverage for the total period of totality. On September 7, 1956, the University of Minnesota launched a giant Mylar balloon (developed by the G. T. Schejeldahl Corporation of Northfield, MN) to set an unofficial balloon altitude record of 145,000 feet (44,000 m) for unmanned balloons. In 1957 the US Navy began an operational aerology system known as Transosonde (trans-ocean sounding), consisting of almost daily balloon flights across the Pacific Ocean from Japan. On August 19, 1957, an unmanned Skyhook balloon lifted the first Project Stratoscope telescope. Project Stratoscope I was a program developed to research the Sun. Instruments included a 12-inch (30-centimeter) telescope with a special light-sensitive pointing system and a closed circuit television camera that was guided by the scientists on the ground. This was the first balloon-borne telescope. The telescope took more than 400 photographs of sunspots. These were the sharpest photographs taken of the Sun up to that time. The photographs increased scientists' understanding of the motions observed in the strong magnetic fields of the sunspots. In 1948 Skyhook balloons were used to show that in addition to protons and electrons, cosmic rays also include high energy atomic nuclei that are stripped of their electrons. Thirteen stratospheric plastic Skyhook balloons were launched in September 1953 as part of Project Churchy, an Office of Naval Research funded cosmic ray expedition at the geomagnetic equator. Project Churchy was conducted at the Galápagos because high-energy cosmic-ray particles can only be collected at the geomagnetic equator without accompanying low-energy particles found at higher latitudes. Balloons carrying scientific instruments rose to between 90,000 feet (27,000 m) and 105,000 feet (32,000 m) and encountered temperatures as low as -80 °C (-112 °F). Aircraft from Patrol Squadron (VP) 45 ‘Pelicans’ took off an hour after the launch of each balloon and visually tracked the balloon until it released its cargo and deflated. The instruments were observed until splashdown, and marked for destroyers to retrieve. Skyhook as UFO Skyhook balloons may have been the origin of some UFO observations. The most famous case possibly involving a Skyhook mis-sighting was the Mantell UFO incident. (The script of the film Earth vs. the Flying Saucers (1956) mentions "Project Skyhook"). - Gas balloon - Mantell UFO Incident - Project Genetrix - Project Moby Dick - Project Mogul - Project Strato-Lab - Ross, Malcolm D (January 1959). "Basic Research at Record Breaking Altitudes". Exchangite. The Exchange Club: 3–13. - Goodsell, Suzy (August 4, 2011). "The "daddy" of the balloon industry". General Mills blog website. Retrieved 2015-03-15. - Final Report: Project 85012, Report No. 1227, General Mills, Inc, Mechanical Division, Engineering Research & Development Department, September 4, 1953. - 'Sunday Ship History: Skyhooked', EagleSpeak.us website, January 21, 2008. - Technical Information Office, ONR (May 1958). "The Stratolab program of the Office of Naval Research (p3, Background Information on the Upper Atmosphere Research Program)". Press Release, Office of Naval Research, Washington, DC. - Suomi, V. E and Beson, E. E. Astronomical Observations from a Skyhook Balloon. Winzen Research, Inc. Technical report #1150-R, February 1955 - Ross, Malcolm D., Office of Naval Research. Plastic Balloons for Planetary Research. Presented at the Fourth Annual Meeting of the American Astronomical Society. January 31, 1958 - Rogerson, John B. Jr. (January 1958). "Project Stratoscope -- Solar Photographs from 80,000 Feet". Sky and Telescope. 17. p. 112. - "Science: Project Stratoscope". Time. 7 October 1957. Archived from the original on March 26, 2010. - Walt Kelly gave permission to use the name Churchy, the turtle character of his comic strip Pogo, as a nod to the turtles on the Galapagos Islands. - "Project Churchy". Archived from the original on 2008-09-08. Retrieved 2009-12-23. - Freier, P., Lofgren, E. J., Ney, E. P. and Oppenheimer, H. L. 1948. Evidence for heavy nuclei in the primary cosmic radiation. Physical Review 74:213-17 - United States Centennial of Flight. Otto C. Winzen - Childs, Captain Donald R. (22 April 1960). "High Altitude Balloon Research and Development Programs". United States Navy Medical Newsletter. U.S. Navy. Bureau of Medicine and Surgery. 35 (8): 28–35. Retrieved 19 June 2015.
<urn:uuid:247fdbe3-4f0b-4588-b955-5114325ff7d5>
CC-MAIN-2021-43
https://en.wikipedia.org/wiki/Project_Skyhook
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00614.warc.gz
en
0.935078
1,619
4.0625
4
[ 22308, 25480, 35485, 547, 1029, 12, 2501, 3984, 35485, 4166, 416, 30755, 327, 13, 7178, 4801, 290, 3611, 19790, 11, 3457, 13, 1119, 547, 973, 416, 262, 1578, 1829, 8565, 4452, 286, 20818, 4992, 357, 1340, 49, 8, 287, 262, 2739, 16236, 82, 290, 11445, 82, 329, 20938, 2267, 11, 2592, 329, 6937, 12, 5715, 19999, 2770, 13050, 379, 845, 1029, 5988, 10455, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
This is a communicative activity that gets the students speaking in the target language! You can move the desks into two rows and have the students sit in one of the desks. They answer the questions about themselves using the yo form of the verb in the preterite. They then have a few minutes to interview the person in front of them to find out their answers to the questions. They will write down the name of the person and then their answers. They will use the él/ella/Ud. form of the verb in the preterite for their partner's answers.
<urn:uuid:4dbbccf6-11c9-40ff-956c-e2b2e8169ec5>
CC-MAIN-2018-26
https://www.teacherspayteachers.com/Product/Preterite-Tense-Speed-Dating-3459735
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864957.2/warc/CC-MAIN-20180623093631-20180623113631-00226.warc.gz
en
0.964342
120
2.796875
3
[ 1212, 318, 257, 1316, 43058, 3842, 326, 3011, 262, 2444, 5486, 287, 262, 2496, 3303, 0, 198, 1639, 460, 1445, 262, 44301, 656, 734, 15274, 290, 423, 262, 2444, 1650, 287, 530, 286, 262, 44301, 13, 1119, 3280, 262, 2683, 546, 2405, 1262, 262, 27406, 1296, 286, 262, 15942, 287, 262, 662, 353, 578, 13, 198, 2990, 788, 423, 257, 1178, 2431, 284, 2720 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Direct Consultation with Children in the Mediation Process We provide the facility for children to be included in the mediation process. Research indicates that at the time of separation children feel as though they no longer have a voice in the future structure of their family. They have anxieties about how the new arrangements are going to work and how it will impact upon their lives in terms of maintaining friendships, schooling, relationships with extended family group members, etc. Family Mediation South East offer children an opportunity to express their views and wishes about the issues affecting them post separation. Parents are routinely encouraged to consider inviting their children to participate directly in the mediation process. We believe that most children appreciate the opportunity to be heard directly. Parents are assured that: Children will not be asked to make choices or decisions Parental authority is respected Children are seen only with the agreement of both parents We will discuss fully with them the process and purpose of a “listening meeting” before involving children When are children involved? Children can be invited to meet with the mediator At an early stage, to ensure that their issues are included in the parental agenda Once options have been identified and explored, in order to hear their views and take them into account At the end, to communicate and explain proposed future arrangements and to “fine-tune” them in light of children’s response The stage that parents are at in negotiating their future arrangements is likely to be a key factor in deciding when to involve children. With highly conflicted couples, or couples at very different stages in accepting the end of the marriage or relationship, early consultation with children is unlikely. The mediator’s discussion with the parents about the purpose and process of involving children will guide decisions on timing. Children and parents are told that this can be an opportunity for children to talk privately with the mediator. Parents will only be told what children wish them to hear (with the important exception to confidentiality in relation to risk of harm). Kids in the Middle: http://voicesinthemiddle.org.uk/ The Parenting Plan: https://www.cafcass.gov.uk/grown-ups/parenting-plan.aspx
<urn:uuid:8d50e2be-20af-4a6e-9e7e-a8059cc818ed>
CC-MAIN-2020-29
https://www.familymediationltd.co.uk/divorce-mediation-services/27-direct-consultation-with-children-in-the-mediation-process.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00555.warc.gz
en
0.961446
459
2.515625
3
[ 13470, 21651, 341, 351, 8990, 287, 262, 2019, 3920, 10854, 198, 1135, 2148, 262, 6841, 329, 1751, 284, 307, 3017, 287, 262, 41077, 1429, 13, 198, 25104, 9217, 326, 379, 262, 640, 286, 14139, 1751, 1254, 355, 996, 484, 645, 2392, 423, 257, 3809, 287, 262, 2003, 4645, 286, 511, 1641, 13, 1119, 423, 7296, 9545, 546, 703, 262, 649, 14752, 389, 1016, 284 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Meet René Girard (1923—2015) It is not uncommon for academics to spend their careers pursuing narrowly defined areas of research. They become quite expert at things no one can understand except those in their field. René Girard was an academic who shatters that mold by being both interdisciplinary and relevant to a wide range of readers. He began his academic life in his native France as a historian in the 1940’s. His area of interest: private life in the second half of the fifteenth century in Avignon, a perfect example of a narrow field of scholarly study. He had the opportunity to study in the United States at Indiana University and, after earning a PhD in history in 1950 the university offered him a position teaching not history, but French literature. Nevertheless, he accepted the position and what appeared to be an odd personnel decision became a turning point in his career. To prepare for his new teaching assignment, Girard read French novelists with great interest. Cervantes, Stendhal, Flaubert and Proust were all luminaries who were praised for their distinctive styles and contributions to literature. But Girard saw more than their uniqueness. As he read, commonalities emerged that had been previously unobserved by prevailing literary scholars. This historian-turned-literature-professor discovered that each of these writers, along with the Russian novelist, Dostoevsky, was dealing with the same dynamic: the origin of conflict in human desire. Girard’s first book, Desire, Deceit and the Novel, presented his theory that we learn what to desire from one another, and those shared desires lead us into conflict. By continuing to study literature, anthropology, mythology and the Bible, he developed an understanding of how conflict is resolved through the use of scapegoats and the sacrificial mechanism. Girard’s discoveries transcended the disciplines of history and French literature, as well as the limits of academic departmentalization. His theories incorporate such diverse fields as psychology, anthropology, linguistics, theology, and education. Girard defied our idea of the typical academic in another way, too: he was unpretentious and genuinely interested in others. He always insisted that it was not his theory, rather that it belongs to the many great writers and thinkers who came before him who have been trying for centuries to get our attention and communicate their observations. With both clarity and humility, René Girard perceived the import and implications of their insights. Here are some of the many awards and honors Girard received during his lifetime: - Guggenheim Fellow (1960, 1967) - Modern Language Association Award (1965) - Honorary doctor of the Vrije Universiteit Amsterdam (1985) - Honorary doctor of the University of Innsbruck/Austria (1988) - Prix Médicis essai for Shakespeare, les feux de l’envie (1990) - Honorary doctor of the Université d’Anvers/Belgium (1995) - Grand prix de philosophie de l’Académie française pour l’ensemble de son œuvre (1996) - Nonino Literary Prize, Italy (1998) - Honorary doctor of the University of Padova/Italy (2001) - Honorary doctor of the Université de Montréal/Canada (2004) - Prix Aujourd’hui for Les origines de la culture (2004) - Member of the Académie Française (2005) - Leopold-Lucas-Preis, Univerität Tübingen/Germany (2006) - Honorary doctor of the University of St Andrews/UK (2008) - MLA Award for Lifetime Scholarly Achievement (2008) - Comendador de número de la Orden de Isabel la Católica (2013)
<urn:uuid:1f2a6a85-2279-4a48-874b-031b6263cb3d>
CC-MAIN-2017-34
https://www.ravenfoundation.org/meet-rene-girard/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102663.36/warc/CC-MAIN-20170816212248-20170816232248-00002.warc.gz
en
0.952866
823
2.8125
3
[ 29318, 7152, 2634, 23837, 446, 357, 1129, 1954, 960, 4626, 8, 198, 1026, 318, 407, 19185, 329, 22321, 284, 4341, 511, 16179, 15461, 26167, 5447, 3006, 286, 2267, 13, 1119, 1716, 2407, 5887, 379, 1243, 645, 530, 460, 1833, 2845, 883, 287, 511, 2214, 13, 7152, 2634, 23837, 446, 373, 281, 8233, 508, 427, 34387, 326, 15936, 416, 852, 1111, 987, 40625, 290, 5981 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Heavy television viewing has been associated with obesity. Television might lead to obesity through 3 primary pathways: 1) Displacing time that would otherwise be spent in physical activity 2) Promoting eating while viewing, which may foster both lower-quality and higher-quantity food intake; 3) Exposing children to food advertising, this adversely affects their diets. Studies have shown that the third pathway of food advertising has the most impact on causing children to be overweight. Randomized experiments with children in preschool and first grade have shown that children experimentally exposed to a few commercials are more likely than unexposed children to have positive attitudes toward and to choose the advertised foods over alternatives. Furthermore, one study found that children exposed to advertising were also more likely than were participants in a control group to choose non advertised sugary foods. The effect of the advertising was thus not limited to the specifically advertised brands but had a more general adverse influence on their food choices Marketers target very young children, and children start watching television at very young ages. Almost 90% of children begin watching television regularly before age 2, and the average age of initiation is 9 months. Marketing efforts begin with children as young as 2 years, in order to build brand awareness and brand sympathy. The typical first-grade child can already recognize and respond to more than 200 brands. Research tells us that food advertising is highly effective. Food commercials increase children’s preferences for the advertised products and make kids more likely to ask their parents to buy the products for them. Marketers know this and spend billions of dollars a year on advertising campaigns targeted to children. One study found that children between the ages of eight and twelve years old see, on average, more than 7,600 food commercials every year. Food advertising wouldn’t be such a problem if most of the products being marketed were nutritious, but, unfortunately, that’s not the truth. Commercials for candy, snacks and fast food account for more than half of all food ads targeted to children and teenagers, and commercials for fruits and vegetables are almost nonexistent. In 2003, the World Health Organization classified the marketing of unhealthy foods to children as a probable cause of childhood obesity. Eating while watching television is another likely reason why TV viewing can lead to obesity. More than 60% of children usually eat their meals with the TV on, and children regularly snack while watching TV. Research also suggests that children eat less healthy foods in front of the TV. For example, one study found that children eat more salty snacks and fewer fruits and vegetables when they eat with the TV on. In addition to affecting the types of foods children eat, television has an impact on how much food they consume. Kids tend to eat more food while watching TV than during other activities. Researchers have proposed that watching TV interferes with our bodies’ signals that we’re full. In other words, children become so engrossed in what they’re watching that they don’t realize they’ve had enough to eat. The use of television during family dinners has also been examined. Family dinners without television have been shown to be beneficial to the diets of children and adolescents and have been associated with the likelihood of consuming five or more servings of fruits and vegetables daily Increased frequency of consuming family dinners was also associated with significantly higher intakes of several nutrients, including fiber, calcium, folate, iron, vitamins B6, B12, C, and E; and lower intake of saturated and trans fatty acids as a percentage of energy. In a longitudinal study, family meals during adolescence predicted higher intakes of fruits, vegetables, many important nutrients and an overall higher quality diet in young adulthood. Studies have shown that when television is on during family dinners, the positive nutritional consequences of eating together are reduced. For example, in a cross-sectional study, they found that in children of low-income families, servings of fruits and vegetables eaten were inversely correlated with the number of times per week the television was on during dinner. Other research confirmed that in parents, when the television was on during dinner, intake of fat increased, whereas servings of fruits and vegetables decreased. As parents are the gatekeepers of food provided to children, it stands to reason that parental eating behavior will impact children. These studies add further to the idea that diet quality is threatened by television, specifically when it is viewed during meal times. It's also reported that children who frequently ate while watching television had a preference for larger portions of energy dense, nutrient-poor foods.
<urn:uuid:4cc20a8d-5fa8-4fe3-acf9-99fba12bc65a>
CC-MAIN-2018-17
http://laurenwestover27.blogspot.com/2012/02/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945637.51/warc/CC-MAIN-20180422174026-20180422194026-00091.warc.gz
en
0.975333
966
3.828125
4
[ 33210, 5581, 11681, 468, 587, 3917, 351, 13825, 13, 21516, 1244, 1085, 284, 13825, 832, 513, 4165, 22963, 25, 198, 16, 8, 3167, 489, 4092, 640, 326, 561, 4306, 307, 3377, 287, 3518, 3842, 198, 17, 8, 10335, 10720, 6600, 981, 11681, 11, 543, 743, 17016, 1111, 2793, 12, 13237, 290, 2440, 12, 40972, 414, 2057, 10337, 26, 198, 18, 8, 1475, 32927, 1751 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The exhibition aimed to communicate how the Great War had affected Horncastle. A great team of enthusiastic and dedicated volunteers had obviously spent many hours researching all aspects in order to present a full picture of what war time in Horncastle would have been like. From agriculture and food shortages, the use of horses and the roles of women, to the Red Cross Hospital that had been set up in the Stanhope Hall. Extensive and detailed research of all the casualties remembered on the war memorial had been beautifully presented in the form of biographies that many visitors were reading in detail. The newspaper accounts for the war period had all been collected and catalogued and were also creating a lot of interest. As well as the Civic Society's own research they had also worked in partnership with other community groups and individuals to cover some many aspects of the Great War, this meant that displays could be enhanced with original artefacts such as the uniforms and medals and photograph collection brought in by local expert Mike Credland and the tank artefacts and display provided by The Friends of Lincoln Tank. A particular highlight was the use of a local theatre group to provide re-enactments of a recruitment drive and a scene from the trenches. Other local groups involved were the Army Cadets and the Banovallum Brass band and Royal British Legion who closed the exhibition with a Drum Head service. The group had put a great deal of thought into providing an accessible exhibition for all. Children were provided with a trail with things to find in each area. Attention was paid to space and comfort by providing seating where it was anticipated that people would want to spend a considerable time. Film showings and poetry readings were another aspect of the event which were well attended and offered a different medium for learning. All the volunteers who had been involved in the research and the development of the exhibition had dressed in the costume of the period and were on hand to answer questions about their area of interest, providing another layer of engagement for visitors, which was extremely beneficial. There was also a section of the exhibition dedicated to commemoration; with a slide show telling the story of the Centenary Bike ride which had visited the graves of some of the men commemorated on the Horncastle memorial. The Royal British Legion and a local company who are involved in battlefield tours were also present. This was a very successful exhibition, an enjoyable and thought provoking experience. The event was very well attended with many people returning on the second day to carry on looking at things in detail. War Memorials Project Officer Lincolnshire Remembrance: Memories and Memorials 'Horncastle's Great War' by Colin Gascoyne & Mary Silverton |Horncastle's Great War| In 2014 the Society, together with other groups from the town, held an exhibition to mark the beginning of the Great War. This involved a great deal of research into the lives of the men who were remembered on the memorials to the dead in the town and also the effect the war had on Horncastle. It was felt that this research should be used to write the above book as a permanent memorial to the men who died and the people of the town who lived through that period of history. The book tells their stories and, we think, enhances the names on the memorials. It gives an insight into their personalities and their thoughts, and the kind of people they were. It also tells how the people of the town coped with losing so many of their young men, how they coped with food shortages and their generosity in helping the soldiers recovering at the hospital. Copies priced at £16.50 will be on sale from the end of September 2016. They can be obtained from Perkins Newsagents and other local bookstores. To order and pay by cheque please follow the link below and complete the order form, and send with a cheque to the address shown on the order form: To order the book and pay via PayPalplease follow this secure link. (link opens in new browser window) Masons support for Society Olive Union Lodge Sponsors Great War Book Horncastle Freemasons of Olive Union Lodge are pleased to have supported the publication of the town's History & Heritage Society's new book "Horncastle's Great War". Master of the lodge Martin Goodwin presented Chairman and co-author Mary Silverton with a cheque for £500.00 and commented that one of their members, William Collinson Isle died in 1915 of wounds inflicted and was featured in the book. Mary thanked the lodge members for their generosity and support. Co-author, Colin Gascoyne then presented Martin with a signed copy for the lodge archives. Book Presented to Queens Elizabeth Grammar School A copy of the book was presented to the Head Girl and Head Boy on the 9th December. It is hoped that it will provide a good point of reference for future studies of the War and in particular the soldiers from Horncastle who died in the war. It is thought that it will be particularly useful in helping to locate graves and names on memorials when the school visits the battlefields of France & Belgium.
<urn:uuid:57f31e2f-c899-4dbd-86e2-b4ab2c0f31f8>
CC-MAIN-2017-17
http://horncastlecivic.org.uk/history/horncastle-in-the-great-war.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123270.78/warc/CC-MAIN-20170423031203-00068-ip-10-145-167-34.ec2.internal.warc.gz
en
0.980099
1,048
2.796875
3
[ 464, 17127, 8998, 284, 10996, 703, 262, 3878, 1810, 550, 5676, 13549, 18676, 13, 317, 1049, 1074, 286, 21848, 290, 7256, 11661, 550, 6189, 3377, 867, 2250, 24114, 477, 7612, 287, 1502, 284, 1944, 257, 1336, 4286, 286, 644, 1175, 640, 287, 13549, 18676, 561, 423, 587, 588, 13, 3574, 14510, 290, 2057, 28791, 11, 262, 779, 286, 14260, 290, 262, 9176, 286, 1466 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Providing Special Education Resources Timely and accurate information is one of the keys to successful intervention strategies at school. HOPE serves its clients as a valuable special education resource. We evaluate the needs that parents have in working with their children and then recommend the resources relating specifically to the challenges at hand. Many of the special education resources that we recommend are ones that we have found helpful in raising our own children with special needs. These resources include information, web addresses, and literature on the following: - Asperger’s Syndrome - Pervasive Development Disorder - Attention Deficit Hyperactivity Disorder (ADHD) - Anxiety, Depression and other mental health issues - Tourette Syndrome - Down Syndrome - Individual Assistance Plans (IAP or IAT) - Individual Education Plans (IEP) - School & Private Educational Based Assessments - 504 Plans Helping You Through the Maze of Information The sheer volume of information on learning disabilities, mental illness, brain injury, cognitive disabilities, and other special needs can be overwhelming, – especially for a new parent on a steep learning curve. Tapping HOPE’s knowledge and experience shortens the learning process and helps identify exactly the literature that will be most helpful. Educating yourself about your child’s needs can provide insight, encouragement, and information. Here are some recommended books and web sites to get your started. Check back often for new additions!
<urn:uuid:0389a7bc-6011-403a-86ca-4f33a06ccfa7>
CC-MAIN-2018-22
http://www.hopeforlearning.com/patient-info/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867309.73/warc/CC-MAIN-20180526033945-20180526053945-00256.warc.gz
en
0.914466
297
2.8125
3
[ 15946, 2530, 6093, 7868, 13864, 198, 7575, 306, 290, 7187, 1321, 318, 530, 286, 262, 8251, 284, 4388, 9572, 10064, 379, 1524, 13, 367, 32135, 9179, 663, 7534, 355, 257, 8119, 2041, 3707, 8271, 13, 775, 13446, 262, 2476, 326, 3397, 423, 287, 1762, 351, 511, 1751, 290, 788, 4313, 262, 4133, 11270, 5734, 284, 262, 6459, 379, 1021, 13, 198, 7085, 286, 262 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Three main legends surround Saint Sar'h. First, she is a Gypsy Queen who collected alms for the poor in Saintes-Maries-de-le-Mer in the south of France at the beginning of the 1st century. She had a vision that the female saints who were present at Jesus’ death would arrive on their shores. And when they did, around the year 42, Saint Sar'h was the first to lovingly welcome them with open arms, and skirts! The ‘”golden legend” from the 13th century says how Sara'h was an Egyptian who was very beautiful and endowed with healing powers. The third legend is how Saint Sar'h is the daughter of Mary Magdalene and Jesus Christ, who came to France in a small boat with her mother. My understanding of Sara'h is that she is all three of these legends.
<urn:uuid:74aca328-b740-4d53-a917-a930ae8a6b88>
CC-MAIN-2021-21
https://anaiyasophia.com/holy-body/queen-of-the-outsiders-feast-day-of-sar-h
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989614.9/warc/CC-MAIN-20210511122905-20210511152905-00195.warc.gz
en
0.98433
186
2.671875
3
[ 12510, 1388, 24901, 4573, 9281, 6866, 6, 71, 13, 3274, 11, 673, 318, 257, 18488, 13764, 7542, 508, 7723, 435, 907, 329, 262, 3595, 287, 9281, 274, 12, 44, 3166, 12, 2934, 12, 293, 12, 13102, 287, 262, 5366, 286, 4881, 379, 262, 3726, 286, 262, 352, 301, 4289, 13, 1375, 550, 257, 5761, 326, 262, 4048, 31728, 508, 547, 1944, 379, 5803, 447 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
With the world's food security facing a looming "perfect storm", GM food crops need to be part of the solution, argues Professor Jonathan Jones. In this week's Green Room, he wonders why there is such a fuss about biotechnology when it can help deliver a sustainable global food system. In the US, where many processed foods contain ingredients derived from GM maize or soy, in the most litigious society in history, nobody has sued for a GM health problem A billion humans do not have enough to eat. Water resources are limited, energy costs are rising, the cultivatable land is already mostly cultivated, and climate change could hit productive areas hard. We need a sustainable intensification of agriculture to increase production by 50% by 2030 - but how? Food security requires solutions to many diverse problems. In the US or Europe, improved seeds could increase yields by 10% or more, reduce pesticide use and give "more crop per drop". However, improved seeds can only help impoverished African farmers if they also have reliable water supply, roads to take crops to market, and (probably most important) fertiliser. Better farming methods are also part of the solution; these require investment in technology and people. Fortunately, after 25 years of "food complacency", policymakers are taking the issue seriously again. I want to reduce the environmental impact of agriculture while maintaining food supply. The best thing we can do is cultivate less land, leaving more for wildlife, but if we are still to produce enough food, yields must go up. There are many contributors to yield; water, fertiliser, farming practice, and choice of seed. We can improve crop variety performance by both plant breeding (which gets better every year with new genetic methods), and by genetic modification (GM). Droughts caused wheat prices to rocket as global harvests failed Ouch; yuck - GM. Did you recoil from those letters? Why? I started making GM plants (petunias, as it happens) in 1983, working at a long defunct agbiotech company in California called Advanced Genetic Sciences. In the early 80s, we did wonder about - in Rumfeldspeak - "unknown unknowns; the unknowns we didn't know we didn't know about", but 27 years later, nothing alarming has been seen. The method (GM is a method not a thing) is simple. We take a plant, which typically carries about 30,000 genes, and add a few additional genes that confer insect resistance, or herbicide resistance, or disease resistance, or more efficient water use, or improved human nutrition, or less polluting effluent from animals that eat the grain, or more efficient fertiliser uptake, or increased yield. We could even (heck, why not?) do all of the above to the same plant. The result is increased yield, decreased agrochemical use and reduced environmental impact of agriculture. In commercial GM, many hundreds of independent introductions of the desired new gene (the "transgene") are made, each in a different individual plant that is selected and tested. Most lines are discarded. To be commercialised, a line must carry a simple, stable and well-defined gene insertion, and show heritable and effective transgene function, with no deleterious effects on the plant. GM is the most rapidly adopted, benign, effective new technology for agriculture in my lifetime. Fourteen million farmers grow GM crops on 135 million hectares; these numbers increased by about 10% per year over the past decade, and this rate of growth continues. More than 200,000 tonnes of insecticide have not been applied, thanks to built-in insect resistance in Bt crops; how could anyone think that's a bad thing? Bt maize is safer to eat because of lower levels of mycotoxins from fungi that enter the plant's grains via the holes made by corn-borer feeding; no insects, no holes, no fungal entry, no toxins in our food. There are not enough fish in the sea to provide us all with enough omega 3 fatty acids in our diet, but we can now modify oilseeds to make this nutrient in crops on land. Protection from rootworm means maize crops capture more water and fertiliser, so less is wasted. Farmers must always control weeds; herbicide tolerant (HT) soy makes this easier, and has enabled replacement of water-polluting persistent herbicides with the more benign and rapidly inactivated glyphosate. HT soy has enabled wider low-till agriculture, reducing CO2 emissions. And yet in Europe, we seem stuck in a time warp. Worldwide, 135 million hectares of GM crops have been planted; yet in Norfolk, I needed to spend £30,000 of taxpayers' money to provide security for a field experiment with 192 potato plants, carrying one or another of a disease resistance gene from a wild relative of potato. It boggles the mind. What are people afraid of? Some fear the domination of the seed industry by multinationals, particularly Monsanto. We need smart, sustainable, sensitive science and technology, and we need to use every tool in our toolbox, including GM Monsanto is certainly the most determined and successful agbiotech company. In their view, they had to be; they bet the company on agbiotech because unlike their rivals (who also sell nylon or agrichemicals) they had nothing else to fall back on. But monopoly is bad for everyone. Here's a part solution; deregulate GM. If it costs more than $20m (£13m) to get regulatory approval for one transgene, lots of little GM-based solutions to lots of problems will be too expensive and therefore not deployed, and the public sector and small start-up companies will not make the contribution they could. Never before has such excessive regulation been created in response to (still) purely hypothetical risks. The cost of this regulation - demanded by green campaigners - has bolstered the monopoly of the multinationals. This is a massive own-goal and has postponed the benefits to the environment and to us all. Some fear GM food is bad for health. There are no data that support this view. In the US, where many processed foods contain ingredients derived from GM maize or soy, in the most litigious society in history, nobody has sued for a GM health problem. Some fear GM is bad for the environment. But in agriculture, idealism does not solve problems. Farmers need "least bad" solutions; they do not have the luxury of insisting on utopian solutions. It is less bad to control weeds with a rapidly inactivated herbicide after the crop germinates, than to apply more persistent chemicals beforehand. It is less bad to have the plant make its own insecticidal protein, than to spray insecticides. It is better to maximise the productivity of arable land via all kinds of sustainable intensification, than to require more land under the plough because of reduced yields. Some say GM is high risk, but they cannot tell you what the risk is. Some say GM is causing deforestation in Brazil, even though if yields were less, more deforestation would be required to meet Chinese and European demand for animal feed. Some say we do not need GM blight resistant potatoes to solve the £3.5bn per year problem of potato blight, because blight resistant varieties have been bred. But if these varieties are so wonderful, how come farmers spend £500 per hectare on spraying to protect blight sensitive varieties? The answer is the market demands varieties such as Maris Piper, so we need to make them blight resistant. I used to be a member of a green campaign group. They still have campaigns I support (sustainable fishing, save the rainforests, fight climate change), but on GM, they are simply wrong. Even activists of impeccable green credentials, such as Stewart Brand, see the benefits of GM. Wishful thinking will not feed the planet without destroying it. Instead, we need smart, sustainable, sensitive science and technology, and we need to use every tool in our toolbox, including GM. Professor Jonathan Jones is senior scientist for The Sainsbury Laboratory, based at the John Innes Centre, a research centre in plant and microbial science The Green Room is a series of opinion articles on environmental topics running weekly on the BBC News website UPDATE (19 July): Following a request from Professor Jones, we have updated his affiliation details. In 1997, he also co-founded the California company Mendel Biotechnology (www.mendelbio.com), which carries out contract research with Monsanto, Bayer and BP, and he is still a member of the Mendel science advisory board. Do you agree with Professor Jones? Why are people in Europe so fearful of GM food crops? Is it part of the solution to deliver a sustainable supply of food for future generations? Or does it have the potential to do more harm than good? GM foods are given an awful hard time by general public ignorance. Nanotechnology is yet another candidate, just most people do not realise that they use so much of it in daily life. Corporations do have the chance to exploit this technology- but as Prof Jones rightly states- deregulation will solve this. A government led review of that patent and IP law would also be needed to prevent corporate monopoly- but don't forget that GM will always have to compete with the natural stuff- the consumer is not likely to be hurt in the wallet. In the "age of austerity," and with food poverty still a huge global issue and only set to get worse, surely NOT utilising technologies such as this is the most selfish and evil thing we westerners can do. As for "It hasn't been proven safe" well, sorry. Science has always experimented with the unsafe. Detection methods and safety this century are millions of times better than previous scientists have had, and whilst that doesn't preclude the fact that things can and do go wrong, progress will never be made with such an attitude. If it is proven dangerous, then I will listen, It may take just one experiment to prove something to be dangerous, but you cannot prove anything to be safe, no matter how many experiments you do. Only that it hasn't been discovered to be dangerous YET. Stu Haynes, Coventry, UK As regards the economics of GM, it is worth remembering that Monsanto and others were perfectly happy to produce plants which had fertile seeds. The reason GM plants do not have fertile seeds is solely due to the green lobby insisting that GM plants must be infertile, so that GM traits cannot find their way into the wider ecosystem. Anti-GM campaigners are therefore criticising agribusiness for doing precisely what anti-GM campaigners asked them to do! It's also important to note that whilst distribution is indeed a problem in the third world, better distribution networks will simply have the result of destroying third-world farming, since it'd be cheaper to buy grain farmed on American prairies on an industrial scale than to grow it yourself in Africa. This is already happening on a significant scale, and only the lack of infrastructure is currently holding it back. Graham Bartlett, Cambridge, Uk I think GM has missed the boat, none of the current projects appear to work but do damage the environment. It appears similar to the green revolution of the sixties, now held responsible for destroying whole agricultural areas of India and eslewhere. I do not believe that the risk is still hypothetical, where it has been implimented there is far greater damage than expected and it appears that the crops themselves just help the problems they were designed to combat evolve. The plan was to make lots of money by having complete control over crop production, it has not paid off and appears far less useful than modern methods like no til farming. Craig, Edinburgh, UK Agree in principle with the good Prof. Deregulate and focus on method are key. Besides GM, employing and enhancing farming and harvesting methods for increased yields need be taught and encouraged. Crop rotation, soil restoration and reintroduction of grazing animals onto crop farms will all help. James Doerfel, Redmond, Wa How could the BBC publish an article so pro-GM, written by someone with ties to Monsanto without full disclosure of this obvious interest? Do not allow my licence fee to be spent furthering the greed of an organisation intent on making us dependent on them for our food-supply. Dan B, London A big problem is lack of science education or knowledge on the part of otherwise educated people about how food gets to their tables. For example, Darren of Ottawa says that companies make GM crops sterile so that farmers have to buy new seed. He is confusing genetic engineering with hybrid varieties, and in the latter case farmers buy fresh seed each crop season (rather than re-sowing saved seed) not because of sterility, but because the progeny of re-sown hybrids lose their "hybrid vigor" and uniformity, and grow as a very heterogenous stand of individual plants that will yield much less on average. This lack of understanding makes it hard for people to evaluate information from diverse sources and easy for anti-GM groups to mix fact with supposition, as they often do so well! Mike Listman, Texcoco, Mexico Interestingly, Professor Jones is on the scientific advisory board of Mendel Biotechnology, a company that counts Monsanto as their most important customer and collaborator. This article smacks more of corporate propaganda than reasoned argument. Jack Judge, Reigate,UK I agree heartily with Jonathan Jones. Improved crop varieties have a part to play in increasing yields to get more food to the poor. Plant breeders can do this and it is wrong to deny them one particular modern technique - genetic engineering - just because there is irrational opposition. All crops have been greatly modified genetically by selection and breeding (a good book for general readers is Hybrid by Noel Kingsbury, 2009) so GM has always been an unfortunate term, implying that other crops have not been modified. Most arguments by the opposition arise from incomplete knowledge of the current situation. For example, farmers are perfectly familiar with buying seed each year for new varieties of crops when they are F1 hybrids that do not breed true (half the rice in China and most maize worldwide are F1 hybrid varieties). They make a judgement that the increased cost is covered by the better yields, improved pest resistance, etc. Much plant breeding in the developing world is carried out by national and international research centres, such as the International Rice Research Institute, with varieties released without restrictions, for the public good. Peter Mitchell, Sheffield, U.K. I fully support the article. The arguments against in comments are common but not valid. We are reliant on corporations for many things in life. The state is a corporation, with a monopoly on the use of force over a territory. I would rather be reliant on a private corporation than the state. Farmers buy the seeds voluntarily every year because they save time and money. The best way to control population is through development-not starvation. There is no proof that anything you can imagine won't have a side effect down the road because you cannot prove a negative-you deal with it if it arises. Brendan Trainor, Reno USA You are treating the symptom not the cause. We do not need GM crops. Every single Human world resource issue we currently have is down to one thing. Our population growth as a species is what needs to be dealt with. There are simply too many people in the world and the problem will keep getting worse until we tackle this very thorny issue. Danny Coombs, Calgary, Canada I dont know about any studies, but I do know that my son is violently allergic to soy oil and any derivatives of soy products made from GM soy. No I have no scientific evidence and as far as I know no one has done a study ( these cost time and money) as they say the proof is in the pudding. He can eat anything cooke din soybean oil when it is from European origin , but gets a strong reaction when its US originsoy products.... which are all contaminated by GM prodicts. I think that says a lot for being anti GM G, Mississauga , Canada Interesting to see so many adverse comments here about the main problem with GM technology being corporate ownership. The author of the article is a public servant who works for a publicly-funded institution in the UK. We can all own this technology - we don't have to sell it to any corporates. Also some misunderstandings about realities of agriculture displayed here - modern conventional seed varieties are usually owned by the breeders, which means that if we want to plant them again we have to pay for the right. This is far from exclusive to GM technology, and high-yielding F1 hybrid varieties cannot be farm-saved year to year as they don't breed true. Dr Jim Dimmock, Bodelva, Par, Cornwall, UK Hardly a balanced argument, is it? Whenever I hear an argument that states "I am right and you are wrong" it makes me very suspicious. Life is very rarely that simple, and in this area, cannot be that simple. Professor Jones completely ignores the topics of improved storage and biological control of pests and pathogens. Personally, I wouldn't give this paper a pass grade. Michael Papworth, Pershore GM foods will never solve famine problems and it is naive to suggest otherwise. The vast majority of GM research is done by commercial companies and not charities. How can people incapable of affording traditional varieties (that can be resown year after year), afford the cost of GM crops that cost five times more and cannot be resown? Carl Thomas, Melbourne, Australia I agree there are monopolistic dangers of Monsanto's round-up-ready GM crops. But as to dangers of GM crops.... If only the public realised that conventional breeding, with it's lack of regulation can actually result in toxic varieties that will remain undiscovered until consumed. Just look at potato breeding early last century, a brand new, blight resistant variety made it to market, but made thousands of people seriously ill including some recorded deaths. This could still happen today, with conventional breeding, but not GM. By using GM, BASF have moved blight resistance from a wild potato into a modern potato that does not also cause humans harm. Yes this could have been done with conventional breeding but would have taken decades and has far more serious risks to human health. Dr Richard Hayes, Aberystwyth, Uk So you've modified a few petunias and there has been no problem that you've noticed. Big deal. That is not proof that there will not be an unforeseen problem in decades to come if GM crops are grown globally. We do not have a complete understanding of the way everything in the environment co-exists. With reference to your comments about Bt maize being resistant to insects, how do you know that another species further up the food chain does not reply on that insect? Use of GM may cause the population of that insect to plummet causing other species to fall in numbers. It may appear to be completely unrelated, but it could cause the collapse of another species we rely upon. There are too many variables to be absolutely sure that GM will have no ill effects or cause no problem. It can often take a long time before we realise what problems scientific advances cause, e.g. lead in petrol, CFCs. Ian Beckett, Manchester, Uk It's laudable - we'll genetically modify a baby to rid it's chances of diseases, get a preferred eye colour and choose it's sex. But a plant? Oh no! We are all talking about preserving the environment, aint we?? Then, what about the traditional form of agriculture where tons of chemical are being used as pesticide or herbicides!!What about all those fertile lands being converted to arid one due to extensive farming???What about the unsustainable exploitation of the oceans to satisfy the growing needs?? I believe we have to stop being selfish!!!The one opposing to GM are the same who voiced out against exploitation of whales n others marine organsim!! In the end, whether we want it or not we have to sacrifice something for something whether we want it or not!!! If we are to opt for taditional agriculture, surely, we are to destroy our environment in some way. Concerning GM production, we are unsure about their long-term effects! In either way we are sure to make considerable impacts! A common feature between the pro and anti-GM propaganda is the artificial dichotomy: the idea that either a crop is GM or it is non-GM. All GM means is we spliced in some different proteins. So I could splice some toxic compound into corn to produce corn that it is fatal to consume. This would be an example of a non-safe GM product. Likewise, I could splice something that increases the vitamin C content into corn, which would be very unlikely to be dangerous. We need to stop dealing with this on a BS vested interest level and start looking into the details of the issue: some crops are safe, some aren't and most are unclear. If we splice a pesticide directly into a crop, that doesn't make it safe. There are also more complex cases: what if we splice resistance to a pesticide into a crop, which then increases pesticide use, indirectly making it less safe? All that said, this piece reads like a few pages of Monsanto press release. Alex, Mountain View, CA Being from the USA where GM foods are almost all we have, we are facing serious problems from mono-cultures and the "trademarking" of these wonderful GM seeds as companies like Monsanto seek to eliminate any non-trademarked seeds so all farmers are indebted to them. This topic is not about picky eaters it is about global corporate take-over. I spent years in the farmland of the midwest USA where farmers were permanently in debt to Monsanto....WTO anyone?!?!? This was a misleading article BBC!! Lisa Anthony, Seattle, USA It's not the supposed health issues which GM food may or may not pose to humans that most are worried about. It's detrimental affects to the encompassing environment (soil and water from applied pesticides, and threat to native plants). We need to keep a variety of species to assure food security. Harmony Farnsworth, Reno, USA Cows may need 18 lb plant food for 1 lb beef, pork 8 lb for 1 lb, Chickens 4 lb for 1 lb. If we eat the plant food, that means agricultural production can feed 4 or 8 or more times as many people. We don't need livestock or milk or eggs for health. As is becoming very clear in Asia, "Diseases of Affluence" heart disease, diabetes, cancer, dementia, ... directly follow the heavily animal food based "Diet of Affluence". Read "The China Study" by T. Colin Campbell, phd, Cornell nutrition researcher, Jane Plant CBE's many books, ... Global warming from global livestock production has been calculated to exceed global warming from all of transportation. Jerry Amos, Hollis, NH U.S.A. Quite apart from the dubious benefits of GM food, is no-one concerned about handing over monopoly rights to the production of food to a handful of multinational corporations? GM food is patented food; the patent holder has an exclusive monopoly on the production of that food. That's the whole point of GM food as far as the corporation is concerned. Despite being patented the crops will spread into non-GM areas whereupon the corporation will sue the pants off any anyone unfortunate enough to find the stuff growing on their land (yes, Monsanto, I'm talking about you.) You do have to admit it is genius: develop a food which gives you a monopoly right to sell AND spreads itself to non-customers who are then forced to become customers. William Wybourne, Wellington, New Zealand How about making GM food/crops non-propietary for individuals or small farmers and only applying IP rules for companies/groups motivated by greed and not need? That is, develop non-terminal, stress tolerant GM seeds for the hungry but hardworking folks of the developing world but at the same time ensure that the greedy business folks of the same developing world as well as the developed nations don't infringe upon the GM patents through unique seed markers? As a scientist, this appears feasible to me and the big GM companies certainly could use some good 'karma' in their business practices -- do each of their well-intentioned presidents, scientists and inspectors really want to keep increasing the exorbitance of their meals at the expense of millions of the famished poor at the brink of death? GS, Merced, California, USA There is not a food shortage. There is a surplus of food actually. Unfortunately, all the food resources are concentrated in the wealthier nations and the people that are starving don't see any of it. Producing more food is definitely not the answer and even further from the answer is resorting to GM foods. GM corn and soy products have been shown to cause cancer and kidney failure in rats. Imagine what it is doing to us which will likely not show up for generations. The FDA does not take the responsibility of regulating GM foods seriously and they are the ones supposed to ensure safety of the general population. At least in the UK they regulate GM foods. In the US we are all lab rats for the machine. Cortney, Indianapolis, IN, USA GM technology simply represents an intensification of agricultural practices and associated environmental and socio-economic problems. Environmental problems include biodiversity loss, soil erosion and pollution of water bodies. Of particular concern is the potential for gene transfer between crops and non crop species, resulting in super-weeds that are more difficult to control. Unfortunately, the potential long term environmental effects of GM crops have been poorly studied due to the short term nature of research grants (Typically 3-5 years). On a socio-economic level, GM technology is unlikely to result in an end to world hunger. The post war 'green revolution' was also promoted as a means to ending world hunger, but has instead resulted in a population boom (also thanks to advances in healthcare). Food inequality remains, and and many of the poorest and hungriest nations continue to have high levels of population growth. Continuous population growth is unsustainable and impossible due to limited natural resources. Ironically GM technology could result in greater food insecurity, as world agriculture becomes dominated by a small number of varieties offered by large multinationals. The idea of deregulation of GM is to me wholly irresponsible, particularly when the technology is so new. Promotion of the technology has generally been by those that have the most to gain from it financially such as Prof. Jones. Colm, Dublin, Ireland There is really only one thing to say. It is obviously Monsanto propaganda since the author, Jonanthan Jones, works for Mendel Biotechnology. A quote from the Mendel website, "Mendel's most important customer and collaborator for our technology business is Monsanto". Come on BBC and professor Jones! Michael Eck, Richmond,Va. We're always being told how GM crops "will" help poor people in the developing world. But how can this be when the seeds cost money? If people can't buy food, which they can consume immediately, how the heck are they going to be able to pay for GM seeds? Maybe in Utopia they will be free, but not here on planet earth. Two things that will help the developing world out of poverty: contraception and education, especially about appropriate agriculture. North, London, UK Great article. I wonder, in a world without media hype what people would think about the food they eat and other household products they use. I stagger when smoking friends start a tirade against "GM" saying they only eat organic (with all those nice fungal toxins) while pumping their kids lungs full of the great pesticide nicotine. On question does pop to mind though. The statement related to Monsanto; "because unlike their rivals (who also sell nylon or agrichemicals) they had nothing else to fall back on" doesn't quite fit. Glyphosate was held by Monsanto patent until 2000 and we all know it's most famous trade name- Roundup (a Monsanto product). Whatever the motive for development of transgenic crops I for one welcome their use. For those asking for the source of Jones' funding, he is involved with Mendel Biotechnology, which has close ties to Monsanto. From Mendel: "The interests of Mendel and Monsanto are highly aligned and the companies have established very effective mechanisms of collaboration" - I would certainly agree! Jones seems to be helping quite a bit! It's a pity that he can't be more creative than reciting the same list of refuted arguments we have seen from Monsanto. LOL,Obviously greased by the mentioned companies that fund his research be it indirectly and can this prof really be so baised, if not naive? GM is commercial and clearly for the benefit of these companies. The problem is distribution, logistics, always has been. Better farming Techniques and metereological accuracy are whats needed, just to mention a couple. Feeding humans directly instead of animals will dramatically increase the world food supply, as will reducing food wastage - GM is a risk like a lit match in a dry field - easier to ignite than to put out. An infection that could kill the world's grain crops is a risk too far. It is totally unnecessary. Malcolm Hunter, Vancouver, BC, Canada The problem with GM foods is that we don't have long-term studies done as to what the changes in the food does. It has been shown that after three generations of eating only GM food, hamsters go completely sterile. This is a problem. Not today, not tomorrow, but the day after that. If the companies that made GM grain seeds didn't also make the plants sterile, you would see many more people using them. As it goes right now, farmers can't use the seeds they gather from their own plants for next year's crop. They have to turn around and buy new seeds from the supplier. GM foods have a good potential, but they need more study done, and the companies that create them would need to take a checkbook hit by providing plants that can grow again next year. Daren, Ottawa, Canada I remember a few years ago a frozen food company was calling it Frankenstein food and handing out cards saying how bad it was. The only reason i could come up with is if things have a longer shelf life then it would remove the need to buy a lot of frozen food point been its not just the general populace that needs to be convinced. Plus people will never understand the problems unless it is actually happening to them how quickly would they change there minds about gm foods if we had rationing for some reason i wonder? GM won't solve the issue of food security. All that will happen is that populations will expand even further and we'll be in an even more unsustainable position than we are now. For a species like humans, who are generally incapable of self regulation, famine is a good thing. Luke Forbes, Leicester, Uk Research is not conclusive that GM is safe in the long term-there are some serious questions. You do not state who funds the professor's research-it sounds like Monsanto propaganda. Monsanto's claim to infamy was the production of agent orange. If the safety of GM is so self-evident then why is Monsanto so paranoid about not labelling foods GM and why irradiate the foods so the seeds can not be used used but must be purchased each year-what is the point of theis practice if not profit. If there is a strong suspicion that something may be harmful then it should be stopped until proven safe or not(compare the tobacco industry's decades of lies) and not continued with immense propaganda campaigns to tout its safety while serious questions remain. If GM is detrimental to the gene pool of humans-in long term- then we are in 'grave' trouble.Experiments with animals show that this may be so. When you get govt. monisters swearing on a stack of bibles that something is safe, I am immediately suspicious that the opposite may be true. Brian Barnett, Tucson AZ Monoculture extends to food crops by agribusiness suppliers simply deciding to widely offer varieties for cultivation which out perform traditional rivals. This has led for instance to local peoples of South America switching to growing few varieties instead of the wide number of types from the wilds which had been hardened with time by years of small scale cultivation. The danger of introducing genetic traits to plants so they incorporate medicine or pesticide production as part of their growth cycle is frightening. Alterations of genetic code can be applied to pathogens as well and the potential of uncontrolled reproduction in natural settings is like the oil spill that shouldn't have happened. Alterations of code can be applied to creatures including humans as well. Corporations, limited liability corporation, corporations too big to fail making decisions about what patents they hold and how to splice the sequence of life and market it with assurances it won't escape into the fabric of Nature to do harm.. Perhaps a serious topic of discussions this Fall in Cancun can be international oversight of genetic engineering with the gold standard to do no harm. Dale Lanan, Longmont, Colorado USA Perhaps permaculture techniques involving standard crop rotation practices combined with improved storage & reduced loss to vermin, is a safer and more effective approach? Soil health and productivity increases and is adaptable. GM suits industrial farmers, not the small holdings of the rural poor whose plight is overlooked by the same GM scientists who claim to want to feed the world. The inadvertent unleashing of any more, now seemingly unbeatable, superweeds (glyphosate-resistant) from the "round up ready" crops and should be halted. Patrick, Vancouver Canada I whole heartedly agree with Professor Jones. It is all very well for those in developed countries to exercise their prejudices but people in poor countries are suffering and if GM can help to alleviate that then lets do it. Philip S Hall, Northampton England Excellent article, well written, honest and fully grounded in reality. A great antidote to the usual disinformation peddled by dogmatic fantasists whom for some reason the BBC invariably offers a right of reply to. Why should Friends of the Earth, Greenpeace or the Soil Association be entitled to present extremist, ill-judged and poorly researched minority views at license payers expense? I have a PhD in crop science and many years of professional agronomic experience and know for a fact that Prof Jones is spot on in his observations - giving a balanced view does not mean offering equal time to pressure group spokespeople who are utterly ignorant of our subject and wish to scaremonger at the expense of humanity. Dr Jim Dimmock, Bodelva, Par, Cornwall, Uk We need to use every tool in the toolbox to control population growth and actually reduce the number of people on this planet. The world is already grossly overpopulated, unsustainably so. Overpopulation is the root cause of most of the worlds problems from imminent extinction of so many of the worlds plant, bird and animal species to over exploitation of resources and pollution. As with climate change ( yet another consequence of overpopulation ) we need to act, and we need to act now. Neil Beever, Tavira, Portugal The benefits of GM crops in terms of quantity and reliability of yield are without doubts and could indeed contribute to solving some problems. But there is more than yields and environmental issues to the whole GM story. In fact it is the economics of GM which are the particularly obnoxious. Two questions: What about the infertility of the seeds, which requires farmers to re-order seeds year in year out from the same company? What about the exclusivity of the seeds, which requires farmers to only use specific pesticides and fertilisers, produced by you know who? GM seeds-producing companies lock farmers and countries into a monopolistic business model which is damaging for local and national economic development, particularly in the developing world, where farmers are already among the poorest workers. In other words, from a socio-economic perspective, the use of GM crops are very destructive of local livelihoods. And destroyed livelihoods are much more conducive to famines than low yield crops. Nick S., Torino, Italy The main argument against GM foods is that it is "unnatural". People need to remember that natural is not always better (and is frequently worse). Natural is dying of some infection at the age of 30 (on the off chance you managed to make it past infancy). It has been ages since humans lived naturally and I hope this reminds people of all the unnatural benefiets we already enjoy in our society. Carl de Boer, Toronto, Canada I and hundreds of thousands of EU citizens (to judge by the Avaaz EU GMO Petition ~ just search with those terms) certainly do not agree with Prof. Jones. Siobhan Winter-Smith, Fairford, Uk Some fear GM food is bad for health / environment. I fear a monoculture, thousands of acres of the same plant, flowering at the same time, leaving thousands of acres of barren desert once it is cropped. An annual cycle of monotony. The impact on nature and wildlife by the individual plant might not be great, but the process leads to a potentially devestating impact. As to health, in the US, everybody subsists on corn starch or animals fed on corn starch, in the UK its a fairly standard wheat variety. Again, the individual plant might not be the problem, but if that's all that is eaten - presented in many and various ways - no wonder we are so unhealthy. So, GM plant, no problem, GM crop, potential disaster! There are no data that support this view. simon Mallett, Lenham Kent The pro GM argument relies on the concept that somehow there is not already enough food for everyone, and forgets entirely that the problem is distribution and that few people hold the highest percentage of food, while others go hungry. There's no proof as of yet that GM foods will solve any fuel or food crisis, and since GM foods are owned by a few companies and not the people, history will show that it will remain a problem controlled by greed and not need. GM will always be a divisive issue and the reason is clear: some people do not want to be reliant on corporations. They would rather be people-centred and promoting self-sufficiency, not profit-centred. Professor Jones states "But in agriculture, idealism does not solve problems". I can think of nothing more idealistic than market capitalism. Nicholas Hemley, Bristol
<urn:uuid:a19481d7-91a8-4c59-9eab-9353de507770>
CC-MAIN-2014-15
http://news.bbc.co.uk/2/hi/8789279.stm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538787.31/warc/CC-MAIN-20140416005218-00133-ip-10-147-4-33.ec2.internal.warc.gz
en
0.957664
8,042
3.109375
3
[ 3152, 262, 995, 338, 2057, 2324, 6476, 257, 28236, 366, 25833, 6388, 1600, 6951, 2057, 14450, 761, 284, 307, 636, 286, 262, 4610, 11, 11673, 8129, 11232, 5437, 13, 554, 428, 1285, 338, 3469, 10096, 11, 339, 19294, 1521, 612, 318, 884, 257, 34297, 546, 3182, 31201, 618, 340, 460, 1037, 5203, 257, 13347, 3298, 2057, 1080, 13, 198, 818, 262, 1294, 11, 810 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Why is this subject important to listeners? Because farmers and processors handling fresh mangoes after harvesting should know: - When a mango is ready for harvesting. - The right times of day to harvest mangoes to minimize the latex flow that stains fruits, causing rejection in high-end and export markets. - Best practices for harvesting and placing mangoes in collecting containers without injuring the fruits. - How to minimize damage of harvested mangoes in the field and during transport. - How to conduct postharvest handling of harvested mangoes to satisfy market requirements. - How to treat harvested mangoes to prevent postharvest diseases. - The right methods and materials for storing and packing mangoes. What are some key facts? - Mangoes mature 4-5 months after flowering. Ripe mangoes have a pale green, yellow, or red skin colour, depending on the variety. - Washing hands before harvesting mangoes prevents cross contamination. - When harvesting mangoes, maintain a 2-3 centimetre stem on the fruit to ensure that oozing latex does not stain the fruit. - Pour harvested mangoes onto a clean, soft surface like a tarpaulin. Do not place on the ground to avoid infection, contamination, and bruising. - Line baskets for harvesting mangoes with newspaper, banana leaves, or soft padding to protect mango peels from scarring, which can hasten decay. - Treating mangoes with hot water prevents postharvest diseases like stem end rot and anthracnose. - Separate wounded mangoes from healthy fruit because wounded mangoes emit a gas that hastens ripening. - Do not expose harvested mangoes to direct sunlight. - Latex sap stains on mangoes indicate that they were harvested prematurely or were mishandled after harvest. What are the big challenges with reducing postharvest loss in mango? - Lack of knowledge of the right time to harvest mangoes. - Failure to detect diseases in immature mangoes—which then appear during ripening. - Lack of skills or use of best practices by harvesters. - Poor hygiene and handling of mangoes after harvesting. - Transporting mangoes poorly and lack of good handling and storage facilities to protect mangoes from spoiling. Gender aspects of reducing postharvest loss in mango - In Kenya, women collect and sell mangoes by the roadside and in local markets. - Research found that, in parts of eastern Kenya, men are in charge of decision-making in mango production and marketing in about three-quarters of households. - In Tanzania, men traditionally own mango trees while women are responsible for selling the fruits. - In Tanzania, men dominate the large-scale trading of mangoes. But both genders are present among small-scale mango traders. - In eastern Kenya, women dominate mango production and sales, but men dominate the mango farming groups in their communities. For further information, please see documents 2, 3, and 4. Key information about reducing post-harvest loss in mango The quality of harvested mangoes is mainly determined by the pre-harvest practices a farmer uses as the fruit gradually matures. These include the following: - Pruning allows maturing mangoes to better access sunlight, enhancing the colour of the fruit. If pruning is done soon after harvesting, it synchronizes shoot growth, which causes flowering to be uniform. - You can protect a maturing mango fruit from fruit flies, diseases, and injuries by enclosing the fruit entirely with a brown paper bag or glossy paper bag. The recommended time to bag is about 40 days after the fruit sets (appears). - Thinning removes small-sized fruits so that the remaining mangoes attain the standard market size. It also stops smaller fruits from competing for sunlight and nutrients with market-sized mango fruits. Note that this is more important for export markets than for fresh local market sales. Irrigate infrequently when mango trees are flowering to prevent vegetative growth that interferes with flowering. For further information, please see document 9. Harvest mangoes 4-5 months after flowering. Ripe mangoes have a light creamy yellow pulp, and the skins have a white powdery substance on their surface. The skins of some varieties change from dark to light green when ripe. Picking and handling ripe mangoes requires caution to avoid spoilage. - Before harvesting, mango farmers should wash their hands to avoid cross contaminating the fruits. - To harvest, use a sharp blade to cut the mango from the branch, then place the fruits in a picking pole with a net at the end. - When harvesting mangoes, farmer can stand on lightweight movable racks. - The best time to harvest mangoes is from 9a.m. to 3p.m. to minimize the flow of latex sap from the small stem left on the fruit. - Flowing latex burns and stains the mango skin, making fruits visually unappealing to buyers and exporters, though the mango is not damaged on the inside. - To harvest, cut the fruit from the branch but retain 2-3 centimetres of the stem to drain the latex, and to ensure it doesn’t touch the skin of the mango. - Place harvested mangoes on banana leaves, dry grass, or racks for up to half an hour after picking to allow the latex sap to drain off the fruit. - After the latex sap has completely drained, trim the remaining stem off the fruits. - After trimming the stem, place the fruit upside down on mesh for around 30 minutes to allow any remaining latex to flow out completely. - To remove latex sap on the peel, dip the mangoes for 10 minutes in water heated to 52-55 degrees centigrade to clean them, and then cool to room temperature.Store mangoes in rigid containers like crates that prevent mangoes from being crushed or from pressing against each other and getting bruised due to compression. - Add soft padding to the base of the crates, for example, newspaper, before packing the mangoes. For further information, please see document 3. - Anthracnose is a fungal disease that affects mangoes during flowering and early fruit development, causing significant postharvest losses. In ripe mangoes, it causes decay. - Hot water treatment reduces anthracnose and stem end rot infections. Dip freshly harvested mangoes for approximately 10 minutes in water heated to 52-55 degrees centigrade. For further information, please see document 1. - To avoid contaminating mangoes, ensure that whatever kind of vehicle is used to transport the mangoes is clean and hygienic. - Handle containers of mangoes gently during transport, and do not drop or press containers against each other if you use soft containers such as baskets or cartons. - When stacking mango containers, ensure that the upper part of the crate is spacious enough for air to circulate between the crates. - Cover the transport vehicle with a light-coloured material to reflect heat away from the mangoes. - The canvas covering the transport vehicle should leave space for air to circulate in the packed mango containers. - Mangoes for export can be coated with carnauba wax to enhance their appearance and shield them from water loss during packing. For further information, please see documents 3 and 5. Drying is a form of preservation and processing that removes water from mangoes and stops the growth of microorganisms like moulds. Drying reduces the weight and bulkiness of mangoes, thereby reducing transport and storage costs and postharvest losses. - Drying is the most basic form of processing for mangoes. - Sun drying is the cheapest method, but the processor has little control over drying conditions, and the mangoes can easily be contaminated. - Solar drying of mangoes involves using energy tapped from the sun to power a drying machine that can be regulated and the fruits protected from contamination. - In drum drying, the pulp is dehydrated by passing it through drums containing heated air. Drum drying mango pulp produces mango powder. - Hot air drying of mangoes involves passing warm air across mango slices. - To efficiently dry mangoes, slice them into 2-3 mm pieces. - Well-dried mango slices should not stick to each other. - After drying the mangoes, wait for 30-60 minutes before packing to prevent moisture build-up in packing containers. For further information, please see document 8. Mangoes can be processed in the household into products such as juices, jams, pickles, mango powder, nectars, yoghurts, chutney, and murabba, a sweet fruit preserve. - You can make mango pickle by cutting up a raw mango and mixing it with salt and turmeric powder and sun drying the mixture, then mixing it with edible oil and spices. - Make mango chutney by cutting up a mango and cooking it with salt and vinegar. - You can make mango murabba by soaking a raw mango in lemon water, washing it, cooking it with sugar at 60 degrees centigrade, and then cooling the mixture. For further information, please see document 2. Mangoes should be stored in a hygienic environment to prevent contamination and spoilage. - Mangoes stored at 12 degrees centigrade and a relative humidity of 85-90 percent can last 1-2 weeks. - Clean mango storage crates well with soap before use. - Clean rooms where mangoes will be stored to avoid pest and rodent infestation. - Do not store mangoes in a room with chemicals to avoid contamination. - Unspoiled mangoes can spoil if mixed with spoiled mangoes. - Store mangoes in a well-ventilated room. - Sort and store mangoes according to their size. - Store ripe mangoes in 10 degrees centigrade and green mangoes at 12.2 degrees centigrade. For further information, please see document 3. - There are local and improved mango varieties available, and they offer different market opportunities to the farmers who grow them. Local varieties that grow in Kenya are Ngowe, Boribo, Batawi, Sabre, and Dodo. Improved varieties are Tommy Atkins, Kent, Van Dyke, Apple, Sabine, Sensation, Pafin, Maya, Kenston, Gesine, and Haden. - In Kenya, a typical mango season lasts from November to March of the following year. Ngowe and Apple varieties are unavailable only in April. - The Apple variety is popular in local and export markets for direct consumption due to its sweetness, aroma, and yellow colour when ripe. - Processors prefer the Ngowe variety because of its large size and the high quality and quantity of pulp and the fact that it has a better conversion rate. - In Kenya, Ngowe is the only variety available on farms and markets from May to July, when all other varieties are offseason. - The Kent variety has a shelf life of 9-10 days, while the Ngowe and Apple varieties have shelf lives of 6-7 days. - The Kent variety matures late and does not easily fall off the tree even when mature. - Exporters prefer the apple variety as it has a bigger export market. For further information, please see document 7. Where can I find other resources on this topic? 1) Bayer Crop Science, undated. Managing anthracnose in mangoes. http://www.bayerresources.com.au/resources/uploads/brochure/file7570.pdf (428 KB) 2) J. De La Cruz Medina and H.S. García. Mango post-harvest operations. In FAO, 2012. Post-harvest Compendium. INPho – Information Network on Post-harvest operations. http://www.fao.org/3/a-av008e.pdf (1.9 MB) 3) Elda B. Esguerra and Rosa Rolle, 2018. Post-Harvest Management of mango for quality and safety assurance. http://www.fao.org/3/I8239EN/i8239en.pdf (1.49 MB) 4) Jurgen Griesbach, 2003. Mango Growing in Kenya. http://www.worldagroforestry.org/downloads/Publications/PDFS/97_Mango_growing_in_kenya.pdf (2.74 MB) 5) Adel Kamer et al, undated. Post harvest handling of mango. National Mango Board (USA). http://ucce.ucdavis.edu/files/datastore/234-1344.pdf (727KB) 6) Donald G. Mercer. 2012. A Basic Guide to Drying Fruits and Vegetables. http://iufost.org/iufostftp/Guide%20to%20Drying-Full.pdf (15.76 MB) 7) AP Mnkeni, P Soundy and MO Brutsch, 2008. Solar drying of fruit and vegetables. http://www.daff.gov.za/docs/Infopaks/Solardrying.pdf (1.52 MB) 8) Tom Olunga Owuor, 2015. ITC Guide to export of fresh and processed mango from Kenya.http://www.intracen.org/uploadedFiles/MANGO%20EXPORT%20GUIDE%20Final.pdf (3.09 MB) 9) M. Poffley and G. Owens. 2006. Mango pruning in the Top End. https://dpir.nt.gov.au/__data/assets/pdf_file/0018/232920/598.pdf (79.9 KB) 10) World Agroforestry Centre, undated. Mango Planting Manual.https://www.worldagroforestry.org/sites/default/files/users/admin/mango-planting-manual.pdf (6.16MB) Contributed by: James Karuga, Agricultural journalist, Kenya Reviewed by: Oesmus Mbati Kinene, Business Advisor, Technoserve This resource is supported by The Rockefeller Foundation through its YieldWise initiative.
<urn:uuid:bb2f23f7-8d4b-46d6-a38d-66ad03567cfd>
CC-MAIN-2018-43
http://scripts.farmradio.fm/radio-resource-packs/109-farm-radio-resource-pack/backgrounder-reducing-post-harvest-losses-mango/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516892.84/warc/CC-MAIN-20181023174507-20181023200007-00115.warc.gz
en
0.874556
3,012
3.171875
3
[ 5195, 318, 428, 2426, 1593, 284, 22054, 30, 198, 8128, 9818, 290, 20399, 9041, 4713, 49364, 274, 706, 34102, 815, 760, 25, 198, 12, 1649, 257, 49364, 318, 3492, 329, 34102, 13, 198, 12, 383, 826, 1661, 286, 1110, 284, 13222, 49364, 274, 284, 17775, 262, 47038, 5202, 326, 43329, 15921, 11, 6666, 17927, 287, 1029, 12, 437, 290, 10784, 5939, 13, 198, 12 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
From the editors of the Twister questions TeachersFirst's Twister questions are intended to stretch your students’ thinking. Of course, elementary and middle school curriculum content varies from location to location. It is unlikely that every question will fall within the scope of your school’s curriculum. As the point value increases, it becomes more likely that the answers may fall outside standard classroom fare. Five point questions tend to be at the knowledge/comprehension/application level of Bloom’s taxonomy and closer to “normal” content. Ten pointers are more likely cross-curricular application/analysis, and twenty pointers require analytical thinking and a wider experience level, such as knowledge of current events or information beyond normal curricula. Twenty pointers may require more than one student’s input. Some strategies for using the Twisters: 1. Do the questions as a whole-class activity (such as on a multimedia projector attached to your computer) with students contributing the portions of knowledge they do know toward solving the question. Using teamwork and thinking aloud can often help the group reach a conclusion that no single member could do on his/her own. For example, the groups can narrow the possibilities for geography questions if one student knows where one of the countries is located or can eliminate one possibility. They can each test different math answers to see which one is correct. This process will not only foster thinking aloud and group communication, but also model test-taking skills for multiple choice. 2. Do the questions in small groups, with one student as answer entry but others as researchers on neighboring computers to find out what the group does not know. This will develop group skills and research skills. It may be helpful to assign roles: moderator (assigns what to find out and helps the group reach consensus) , keyboarder (enters responses, may conduct research in a new window), researchers (find information as assigned). 3. It may be helpful to first model the “research” needed to find an answer as a whole class with the teacher thinking aloud to show how to search for the necessary information. This could be a valuable way to teach about Internet searching in a high-motivation activity. 4. Provide the twisters as an enrichment challenge or extra credit option for students to do at home. Ask parents to be on the honor system to sign a note indicating the score their child achieved. Since parents may be overly interested in helping, you may want to simply give extra credit for anyone completing the quiz, no matter the score. 5. Use the Brain Twister to address individual needs—both affective and academic, as this Twister-using teacher explains: I work in an alternative learning center where students who are considered to be "at-risk" attend. A colleague and I work with about 20 kids (8th and 9th graders) and on Fridays, while he and I have individual conferences with the kids, the rest of the kids—either alone or in pairs—work on the Brain Twisters. When they first start, they just kind of zip through the answers, but after several attempts, they begin to take their time, trying to actually figure them out—with the resources they have. We talk about how problem-solving requires both thinking AND perseverance, and slowly but surely, both begin to unfold. If they get a perfect score, we give them something—tickets, a can of soda, etc. Kind of fun—and really fun to see them progress as problem-solvers as well. (Also, during the week, the staff members often go through the answers per their subject area, so they can learn how the problems can be solved.) We hope you enjoy the questions, and we thank those of you who keep us honest by catching our occasional mistakes. Two heads really are better than one! © 2006-2019 by The Source for Learning, Inc. All rights reserved.
<urn:uuid:48835eb2-bcaa-42aa-b72b-cb0fd59b4c5c>
CC-MAIN-2019-39
https://teachersfirst.com/twister/about.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575513.97/warc/CC-MAIN-20190922114839-20190922140839-00049.warc.gz
en
0.954525
808
4.21875
4
[ 4863, 262, 15719, 286, 262, 1815, 1694, 2683, 198, 6767, 17892, 5962, 338, 1815, 1694, 2683, 389, 5292, 284, 7539, 534, 2444, 447, 247, 3612, 13, 3226, 1781, 11, 19823, 290, 3504, 1524, 20583, 2695, 17806, 422, 4067, 284, 4067, 13, 632, 318, 7485, 326, 790, 1808, 481, 2121, 1626, 262, 8354, 286, 534, 1524, 447, 247, 82, 20583, 13, 1081, 262, 966, 1988 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
November 16, 2009 Prioritizing Low-Cost, Simple Health Measures Would Save 2.5 Million Child Lives A Year Almost a third of the children under age five who die each year could be saved if governments rebalance health spending to ensure low-cost, simple interventions such as safe water and hygiene, bed nets and basic maternal and newborn care, leading aid agency World Vision said today. Currently, 8.8 million children a year die before age five, most of preventable causes. A new report by the Christian humanitarian agency calls for scaling up simple preventive health measures for mothers and children, particularly at the community level. This must be a priority to make rapid progress against the top child killers of pneumonia, diarrhea and malaria, the international analysis shows. Citing interventions that can cost pennies, the study concludes that more strategic use of funding and resources would keep millions of children from dying before they reach their fifth birthdays."Our world is in the grip of a chronic humanitarian crisis with more than 24,000 children dying each day," said World Vision International's President Kevin Jenkins. "Yet we know that even in the poorest countries, most child deaths are not inevitable." "The truth is politics, not poverty, is what is killing these children. For many politicians, saving infants and children from illness and death is simply not a priority. Our campaign will mobilize and equip people worldwide to hold their leaders to account for ensuring child health now," said Jenkins. The report comes as World Vision launches Child Health Now, its first global advocacy campaign, for the 100 countries in which it works. The five-year initiative aims to help reduce child mortality by two-thirds by 2015 through ensuring government leaders deliver on their commitments to help meet this goal.* "At least 2.5 million children's lives could be saved each year by implementing low-cost, simple interventions such as water and hygiene, bed nets, and basic maternal and newborn care," said World Vision's Jenkins. "As many as six million children could be saved yearly by combining these approaches with more strategic allocation of resources to meet needs at the community level, and by fulfilled global donor commitments." In the U.S., government leaders have the opportunity to build on the country's global health funding leadership by appropriating the resources promised in last year's Global AIDS, TB and Malaria bill, and moving on to pass the newly introduced Global Child Survival Act of 2009, which calls for a clear, coordinated strategy to save the lives of newborns, infants and children in developing countries. Recent history shows substantial progress is achievable: child deaths have been cut by more than half since 1960, when 20 million children died from preventable causes. Child mortality has decreased in all regions of the world because of increased access to interventions such as oral rehydration therapy and immunizations "“ and further progress can be made by expanding those approaches, emphasizing hand washing with soap and providing needed vitamins, among other basic steps Report author Regina Keith, World Vision's senior health campaign adviser, said much health funding "“ both from donor nations and developing countries' budgets -- is spent in ways that fail to have the greatest impact. "Prevention is better, and cheaper, than treating children once they get ill," said Keith. "Yet an estimated 270 million children live in what amounts to a health care desert, lacking access to even the most basic provision, while millions more face patchy, low-quality systems they can't afford. If countries want to ensure the survival of their next generation, they must focus on providing low-cost, simple interventions to keep these young children healthy." On the Net:
<urn:uuid:58b7edea-3525-4473-9b59-bb3440ffabc9>
CC-MAIN-2016-44
http://www.redorbit.com/news/health/1786615/prioritizing_lowcost_simple_health_measures_would_save_25_million_child/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00261-ip-10-171-6-4.ec2.internal.warc.gz
en
0.95795
742
2.640625
3
[ 21159, 1467, 11, 3717, 198, 22442, 270, 2890, 7754, 12, 13729, 11, 17427, 3893, 45040, 10928, 12793, 362, 13, 20, 23425, 5932, 18965, 317, 6280, 198, 23379, 257, 2368, 286, 262, 1751, 739, 2479, 1936, 508, 4656, 1123, 614, 714, 307, 7448, 611, 6905, 3405, 282, 590, 1535, 4581, 284, 4155, 1877, 12, 15805, 11, 2829, 19901, 884, 355, 3338, 1660, 290, 33306, 11 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
President Dwight D. Eisenhower Dwight D. Eisenhower was the 34th President of the United States (1953-61), President of Columbia University (1948-53), U.S. Army chief of staff (1945-48), Supreme Commander of World War II European Allied Forces (1943-45), and a five star U.S. General. Following a distinguished military career, he served two terms as U.S. President. He is credited with bringing the Korean War to an end and ushering in a lengthy period of economic growth, low inflation, low taxes, peace and prosperity. Dwight D. Eisenhower Biographical fast facts Full or original name at birth: David Dwight Eisenhower * Date, time and place of birth: October 14, 1890, at 5:19 p.m., at the corner of Lamar Avenue and Day Street, Denison, Texas, U.S.A. Date, time, place and cause of death: March 28, 1969, at 12:35 p.m., Walter Reed Medical Center, Washington D.C. (Heart failure) Spouse: Mamie Geneva Doud (m. July 1, 1916 - March 28, 1969) (his death) Wedding took place at 12 noon, in the first-floor music room of the Doud family home at 750 Lafayette Street, Denver, Colorado, U.S.A. ** Sons: Doud Dwight "Icky" Eisenhower (b. September 24, 1917, Denver, Colorado - d. January 2, 1921, Camp Meade, Maryland, of scarlet fever) John Sheldon Doud Eisenhower (b. August 3, 1922, Denver, Colorado - present) Siblings: Arthur Bradford Eisenhower (b. November 11, 1886, Hope, Dickinson County, Kansas - d. January 26, 1958, Kansas City, Missouri) Edgar Newton Eisenhower (b. January 19, 1889, Hope, Dickinson County, Kansas - d. July 12, 1971, Tacoma, Washington) Roy Jacob Eisenhower (b. August 9, 1892, Abilene, Dickinson County, Kansas - d. June 17, 1942, Junction City, Geary County, Kansas) Paul Eisenhower (b. May 12, 1894, Abilene, Dickinson County, Kansas - d. March 16, 1895, Abilene, Dickinson County, Kansas, of diphtheria) Earl Dewey Eisenhower (b. February 1, 1898, Abilene, Dickinson County, Kansas - d. December 18, 1968, Scottsdale, Arizona) Milton Stover Eisenhower (b. September 15, 1899, Abilene, Dickinson County, Kansas - d. May 2, 1985, Baltimore, Maryland***) (brothers) Father: David Jacob Eisenhower (b. September 23, 1863, Elizabethville, Dauphin County, Pennsylvania - d. March 10, 1942, Hope, Dickinson County, Kansas) (a mechanic/railroad worker/shopkeeper/gas company manager) Mother: Ida Elizabeth (Stover) Eisenhower (b. May 1, 1862, Mount Sidney, Virginia - d. September 11, 1946, Abilene, Dickinson County, Kansas) Burial site: Place of Meditation, Eisenhower Library, Abilene, Kansas, U.S.A. Error corrections or clarifications * President Eisenhower was born David Dwight Eisenhower, not Dwight David Eisenhower as some sources report. His family had always addressed him by his middle name (Dwight) to differentiate him from his father, who was also named David, and later came to be known as Dwight David Eisenhower. Birth records, the Eisenhower family bible, and the Eisenhower's themselves, all confirm he was born David Dwight Eisenhower, and later transposed his first and middle names. ** A newspaper marriage announcement reversed the last two digits of the Doud family's home address, erroneously reporting Lieutenant Eisenhower married Mamie at "705 Lafayette" in Denver, instead of the correct address of 750 Lafayette Street, Denver, Colorado, U.S.A. *** A couple of sources have confused Earl Dewey Eisenhower's year and place of death with both Milton Eisenhower and John Sheldon Doud Eisenhower. Consequently, you may find both John and Milton erroneously listed as having died in 1968, when, in point of fact, they both lived many years beyond that. One final clarification: Doud Dwight Eisenhower's nickname was originally "Little Ike" but it was changed within a few days of his birth to "Ikey" then changed again to "Ikky" and was spelled that way throughout his short life. Years later, "Icky" became the preferred spelling, and even former President Eisenhower began offering that spelling in his memoirs. Biography - Selected writing credits - Hobbies David Dwight Eisenhower (later changed to Dwight David Eisenhower) was the third of seven sons. In his book The White House Years, Volume I: Mandate for Change, 1953-56, Ike described his childhood: "The life we had together - my father, mother, brothers and I had been complete, stimulating, and informative, with opportunity available to us for the asking. We had been poor, but one of the glories of America, at the time, was that we didn't know it. It was a good, secure, small-town life, and that we wanted for luxuries didn't occur to any of us." The future 34th President of the United States graduated from Abilene High School in 1909. In 1911 he obtained an appointment to the West Point Military Academy, graduating June 12th, 1915. He was commissioned a second lieutenant and assigned to the 19th Infantry, San Antonio, Texas. It was there in October 1915, that he met his future wife. Dwight D. Eisenhower's courtship of young Mamie was brief. They were formally engaged Valentine's Day 1916. The couple had originally planned a November wedding, but circumstances forced them to move the date up several months. At 12 noon on July 1st, 1916, they were wed in the first-floor music room of the Doud family home at 750 Lafayette Street, Denver, Colorado. The ceremony was performed by the Reverend William Williamson, visiting from Leicester, England. The newlyweds set up housekeeping in Ike's bachelor quarters at Fort Sam Houston. Mrs. Eisenhower, who had been raised in prosperous surroundings, admitted that it was actually Ike who taught her to cook. It would be the first of more than thirty homes they would share, as necessitated by his military and political career. She often moved with Ike to various Army posts around the world as he quickly worked his way up in the ranks. Conditions during the early years were sometimes less than ideal. One good example was their "home" in the Panama Canal Zone, which leaked during the frequent rains, and was infested with bats. They had two sons, Doud Dwight Eisenhower, born September 24th, 1917, and John Sheldon Doud Eisenhower, born August 3rd, 1922. Tragically, their first son died of scarlet fever at the age of three. His death remained an open wound from which the couple would never fully recover. His distinguished military career included assignments such as assistant executive to the assistant Secretary of War (1929-33), assistant to General Douglas MacArthur (1935-39), and supreme commander of European Allied Forces (1943-45). Following the defeat of Nazi Germany in 1945, Eisenhower became one of the most decorated military men in history. Not only were numerous prestigious honors bestowed upon him by the United States, but grateful nations around the world lined up to confer their highest honors on him. General Dwight D. Eisenhower next served as U.S. Army chief of staff (1945-48), and President of Columbia University (1948-53). December 19th, 1950, he was granted a leave of absence from Columbia University to serve as commander of North Atlantic Treaty Organization (NATO) forces in Europe. May 31st, 1952 he retired from active service, and in July of '52, resigned from the Army to run for President. Ending the war in Korea was one of his principal campaign promises. After his victory over Democratic challenger Adlai Stevenson, he set about fulfilling that promise. Ike laid the groundwork for ending the war, before he'd even taken office. In July of 1953, just months after his inauguration, he delivered on his campaign pledge, bringing the Korean War to an end. Despite suffering a heart attack September 24th, 1955, President Eisenhower was easily reelected in 1956. While serving his second term in office, he suffered a stroke (November 25th, 1957), but made a quick recovery. Under his leadership, the United States experienced an extended period of economic growth, low inflation, low taxes, peace and prosperity. Both in his military and political career, Eisenhower was known as a superb administrator. He was a natural leader with an exceptional ability to organize, delegate authority, and mediate. Eisenhower was responsible for signing legislation authorizing funding for the modernization and integration of American roads into a national interstate highway system. It was a massive public works program that ranked amongst the largest in September 11th, 1956, President Eisenhower founded People to People International to promote "international understanding and friendship through educational, cultural and humanitarian activities involving the exchange of ideas and experiences directly among peoples of different countries and diverse cultures. People to People International is dedicated to enhancing cross-cultural communication within each community, and across communities and nations. Tolerance and mutual understanding are central themes. While not a partisan or political institution, PTPI supports the basic values and goals of its founder, President Dwight D. Eisenhower." The organization is also known for its presentation of the prestigious Eisenhower Medallion. The Eisenhower Medallion is presented to an internationally known individual or organization in recognition of their exceptional contribution to world peace and understanding. Following two terms in the White House, the former President retired to his Gettysburg farm. Mamie had overseen the major reconstruction of the home, and they were finally able to actually enjoy some quiet time alone. They traveled extensively, Ike was able to really enjoy his golf, and they were both doting grandparents. While golfing February 6th, 1968, in Palm Springs, California, 77-year-old former President Eisenhower achieved every golfer's dream. He scored a hole-in-one on the par 3, thirteenth hole at the Seven Lakes Country Club. Ike's health worsened as the 1960s progressed. He died March 28th, 1969, and Mamie died ten years later, November 1st, 1979. Businessman Albert Pick, Jr. said of him: "Mr. Eisenhower lived life to its fullest and left behind him an enviable record of greatness. He was a man of courage, a man of the highest integrity, a religious man, and a man of peace--truly a man of all seasons." Selected writing credits: Crusade in Europe (1948) Peace with Justice: Selected Addresses (1961) The White House Years, Volume I: Mandate for Change, 1953-56 (1963) The White House Years, Volume II: Waging Peace, 1956-61 (1965) At Ease: Stories I Tell to Friends (1967) In Review, Pictures I've Kept: A Concise Pictorial "Autobiography" (1969) Golf, oil painting, fishing, hunting, skeet shooting, cooking, and in his youth, football. Eisenhower took up painting late in life, and actually became quite skilled. He had a long-term correspondence with British Prime Minister Winston Churchill who also enjoyed painting. One of Ike's most famous paintings was of Churchill, which demonstrated he'd become quite an accomplished artist in a very short time. The most in-depth of more than four dozen sources consulted in preparing this Crusade in Europe, by Dwight D. Eisenhower (1948) In Review, Pictures I've Kept, by Dwight D. Eisenhower (1969) Mrs. Ike: Portrait of a Marriage, by Susan Eisenhower (2002) Dwight D. Eisenhower: Soldier, President, Statesman, edited by Joann P. Krieg (1987) Eisenhower: A Centennial Life, by Michael R. Beschloss (1990) Eisenhower, by Stephen E. Ambrose (1990) Dwight D. Eisenhower: A Man Called Ike, by Jean Darby (1989) Ike and Mamie: The Story of the General and His Lady, by Lester and Irene David. If you find the above data useful, please link to this page from your webpage, blog or Alternatively, consider recommending us to your friends and colleagues. Thank you in Copyright © 2005-2012 INTERNET ACCURACY PROJECT. All rights reserved. All content, is the exclusive property of Internet Accuracy Project and may not be reproduced (on the Web, in print, or otherwise) without the express written permission of our organization. BY ACCESSING THIS SITE YOU ARE STATING THAT YOU AGREE TO BE BOUND BY OUR TERMS AND CONDITIONS regardless of whether you reside in the United States of This page was last updated January 1, 2012. |
<urn:uuid:989c14e8-9de2-4e41-92a4-88c6b7b00d90>
CC-MAIN-2021-17
https://www.accuracyproject.org/cbe-Eisenhower,DwightD..html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038862159.64/warc/CC-MAIN-20210418224306-20210419014306-00242.warc.gz
en
0.95814
2,978
3.0625
3
[ 10364, 29902, 360, 13, 35015, 198, 35, 86, 432, 360, 13, 35015, 373, 262, 4974, 400, 1992, 198, 1659, 262, 1578, 1829, 357, 1129, 4310, 12, 5333, 828, 1992, 198, 1659, 9309, 2059, 357, 1129, 2780, 12, 4310, 828, 471, 13, 50, 13, 5407, 198, 17351, 286, 3085, 357, 41931, 12, 2780, 828, 5617, 13353, 198, 1659, 2159, 1810, 2873, 3427, 28234, 12700, 198 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Several species of previously unknown marine animals have been discovered thriving in one of the strangest habitats on Earth - next to hydrothermal vents on the ocean floor near Antarctica, in an environment that is too hot, too dark, and too toxic to support most other sea life. The Britain-based researchers who made the discovery say the newly-found species include predator sea stars, yeti crabs, fields of stalked barnacles, sea anemones, and a very pale octopus. The scientists used a remote-controlled vehicle to explore the vents, which protrude from the ocean floor almost 2,400 meters beneath the surface of the Southern Ocean, at a site near Antarctica. Absent from these Southern Ocean vents were communities of the many species found at hydrothermal vents in the Pacific, Atlantic and Indian Oceans. The researchers say the difference between the separate groups of animals suggests the Southern Ocean may act as a barrier to some vent species. The first hydrothermal vents were discovered in the Pacific Ocean along the Galapagos Ridge in 1977. They provide an extremely low-oxygen habitat that is completely devoid of sunlight. The temperature of continuously billowing plumes of gases and fluid flowing out of the vents can top 400 degrees Celsius. The animals that call these vents home are found nowhere else on Earth. Instead of depending on sun-driven energy, vent-dwelling creatures get their energy by breaking down chemicals in the nutrient-rich mixture forced up through the ocean floor from deep within the planet’s interior. Chemical compounds, such as hydrogen sulfide, that sustain these enigmatic animals are highly toxic, or even deadly, to most other aquatic and terrestrial life, including humans. The new Oxford University-led study is published in the journal, PLoS Biology. The study’s lead co-author, Professor Alex Rogers of Oxford University, was part of an international panel of scientists who issued a report in June 2011 warning that marine species throughout the world’s oceans are facing an unprecedented extinction risk. Rogers says the new species he and his team discovered on the floor of the Southern Ocean provide another example of a unique aquatic ecosystem that needs to be understood and protected.
<urn:uuid:7baee3a4-d229-476a-ba8c-403c4b9f1c98>
CC-MAIN-2017-22
http://www.voanews.com/a/new-marine-life-species-discovered-in-antarctic-thermal-vents--136771683/169707.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609610.87/warc/CC-MAIN-20170528082102-20170528102102-00276.warc.gz
en
0.946457
449
3.984375
4
[ 14945, 4693, 286, 4271, 6439, 16050, 4695, 423, 587, 5071, 27723, 287, 530, 286, 262, 36666, 395, 35308, 319, 3668, 532, 1306, 284, 17173, 490, 7617, 42777, 319, 262, 9151, 4314, 1474, 30185, 11, 287, 281, 2858, 326, 318, 1165, 3024, 11, 1165, 3223, 11, 290, 1165, 11422, 284, 1104, 749, 584, 5417, 1204, 13, 198, 464, 5491, 12, 3106, 4837, 508, 925, 262 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Dermatomyositis, a rare subacute or chronic disease of protean clinical and pathologic manifestations, was first described in 1863.1 The disease is characterized by erythematous skin eruptions, edema of the skin and subcutaneous tissues, muscle pain and degeneration of many of the muscles of the body, together with a nonsuppurative inflammation of the skin and mucous membranes. There may be biochemical alterations, especially in the albumin-globulin and in the urinary creatine-creatinine ratios. While the disease is commonest in middle-aged persons, approximately 15 per cent of the patients are children. As late as 19442 it was stated that the disease affects only members of the white race. However, Irgang3 described 2 cases of its occurrence in Negroes, but to our knowledge there have been no reports of cases in Negro children. REPORT OF A CASE E. C., a 7 year old Negro girl, was admitted to the pediatric service BRADLEY JE, DRAKE ME, MACK HP. DERMATOMYOSITIS WITH NEPHRITIS IN A NEGRO GIRL. AMA Am J Dis Child. 1951;81(3):403-407. doi:10.1001/archpedi.1951.02040030413007
<urn:uuid:1b2f9dcb-7dd1-46b5-b676-2ac4da558ccf>
CC-MAIN-2016-44
http://jamanetwork.com/journals/jamapediatrics/article-abstract/494804
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00451-ip-10-171-6-4.ec2.internal.warc.gz
en
0.911471
279
2.875
3
[ 28532, 6759, 9145, 7434, 271, 11, 257, 4071, 850, 330, 1133, 393, 10726, 4369, 286, 5915, 272, 8668, 290, 3108, 20781, 38538, 11, 373, 717, 3417, 287, 47072, 13, 16, 383, 4369, 318, 16264, 416, 220, 1924, 1169, 6759, 516, 4168, 13724, 8544, 11, 1225, 19687, 286, 262, 4168, 290, 850, 8968, 11655, 21379, 11, 8280, 2356, 290, 25419, 341, 286, 867, 286, 262 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Editor’s Note: This article is written by guest contributor Shanna Groves. She is a mother of three with hearing loss who writes extensively about living with hearing loss and various hearing loss issues. As a hard of hearing (HOH) mother of three, I can become frustrated with not hearing my children's voices well. And I am not alone. According to the Deafness Research Foundation, 17 percent of American adults report some degree of hearing loss. Many are parents or grandparents. Among them is Mary Butler of Tennessee, a hard of hearing mother of a 9 month-old child. Because of the challenges of understanding a child’s delicate voice, Butler said she would think twice before watching other people’s children. “It is very difficult, if next to impossible, to discern what they are saying,” Butler said. “I’ve met children who became very frustrated with me because they thought I wasn’t paying attention to them. Let’s just say I am happy to baby sit a newborn, but once they reach the age where they start talking, I’ll pass.” Among the communication difficulties noted by Deborah Wolter and Kathleen Quinn in their article “Young Children in Families with a Parent with Hearing Loss” (Hearing Loss, July/August 1999) are: - Lack of dialogue between kids and their HOH parents - HOH adults using older children as interpreters for younger kids - Failure to hear a child’s night crying and identify its cause - Tantrums, whining or frustration among children when unable to get the adult’s attention - Younger kids gesturing, pointing or leading the HOH adult instead of talking In a perfect world, all children would come with captioning devices attached to them so hard of hearing folks could understand their words. Until that day, these communication and technology strategies may help. Make Eye Contact Susan Baird of Ontario has lived with hearing loss since age 13. Her son, who lives at home, is also has hearing loss. Because her kids become frustrated with repeating things, she asks them to tap her shoulder and clearly say “Mom” first. She then makes eye contact, and they begin speaking. “I tell them always to face me when talking, be close to me when talking and talk slowly to me,” Baird said. If it is an important conversation topic, Baird takes them to a quiet room to talk so that she and the kids can pay attention. “Sometimes if they don't do these things, I just don't answer as I have only heard part of the story,” she said. Consider Technology and Hearing Dogs |Shanna Groves with her family| Hearing our children when in another room of the house is challenging if not impossible for HOH adults. In addition to wearing hearing aids or cochlear implants, some parents and grandparents rely on hearing assistive technologies. To hear her baby’s middle-of-the-night cries, Butler initially opted for the AlertMaster wireless notification system, which flashed a connected lamp and shook her bed to alert her. One drawback was that her youngster had to wail loudly for several seconds for the monitor to be activated. She now uses a simple Fisher Price Lights and Sounds monitor that features illuminated red dots as the crying intensifies. As a back-up, Butler sleeps with her hearing aids on. While the hearing aids are uncomfortable to wear while sleeping, she insists that they are crucial in alerting her to her baby’s sobs. Vibrating and strobe-flashing monitors can be programmed to alert a parent or grandparent of noise coming from a child’s room. A video monitor is another option, but only for daytime use as there is no guarantee of it waking up a HOH person in the middle of the night. A frequency modulated (FM) system can assist with hearing a child in a noisy car or restaurant. The HOH adult attaches a FM system loop to hearing aids, and the child wears a microphone receiver. The child’s voice is transmitted directly to the adult’s aids via the FM system. For the animal lover, a trained hearing assistance dog may work just as well or better than assistive technology. Denise Portis of Maryland acquired a hearing dog as her kids got older. Canine helper “Chloe” alerts Portis to various sounds and provides balance support due to the Meniere’s Disease Portis has dealt with for five years. “When Chloe is with me, I don’t feel as ‘deaf’ or as ‘helpless,’” Portis shared recently on her site, HearingElmo.com. “She makes me feel more ‘normal’ in providing things I cannot do for myself.” Have Fun with Communication Portis began losing her hearing after the birth of a son. Her daughter was barely a year old. To teach such young children how to communicate with her, Portis devised age-appropriate games. As toddlers, they played a variation of Peek-a-boo. Portis covered her eyes with her hands and remained quiet. Then she lowered her hands, made eye contact and spoke to them. “If they grew impatient and said something while I was ‘covered,’ I’d say, ‘Oh... What? Wait I can't see you. I can't hear you!’” Portis said. “They soon learned to mimic me and would be very quiet and serious when their chubby little baby hands covering their eyes. Then they’d ‘pop’ out and laugh and say, ‘I see you... I see you.’” The “Guess What? Face” game became popular as the kids grew older. Portis would run over to them and in an excited voice say, “I’ve got my Guess What? Face on!” Then, kneeling at eye level and with her hands on their cheeks, she would tell them something. Turn Noises Off Sometimes a parent or grandparent with hearing loss needs a hearing rest. Whether it is a nap or a few minutes of quiet time, we should encourage children to accommodate us in our need for minimal noise. Russell Barr’s hearing loss is selective. He can understand most men’s voices, but he struggles to hear children. When his two-year-old granddaughter visits, the TV is off and other background noise is reduced. “This translates into more immediate and intimate time with her. And in overcompensating, I actually pay more attention to her”, said Barr, of Kansas. “Who doesn't like to be the center of the universe even for a couple of minutes?” One part of the day can be declared “Take My Ears Out” time. Portis let her kids know when her hearing aids or cochlear implant was taken out, and they would have to write her a note if they wanted to discuss something. “Now that we have our own computers,” Portis said, “they often IM me during the day even though they are only downstairs. I've even received text messages from my son who prefers not having to come find me!” Educate Your Child Often As our children grow, there is much we can teach them about hearing loss. Besides facing us when they talk, kids should be educated about good speech habits, such as enunciating words, speaking slowly, and standing no more than a few feet away when talking to an adult with hearing loss. Eric Wright of Kansas has a newly diagnosed hearing loss. Both he and his family, which includes an eight-year-old daughter and six-year-old son, are learning the best communication strategies through trial and error. When Wright doesn’t catch what his daughter says, even though she is facing him, he asks her to speak clearly into his hearing aided ear. “I have lost those pitches that include small children's voices,” he said. “I also have a hard time when people are talking fast because they are excited. I have to ask people to slow down sometimes.” Other helpful tips for parents and grandparents with hearing loss: - Encourage your children to speak clearly by teaching them proper word pronunciation. Emphasize each vowel and consonant sound, particularly the “softer” consonant sounds of “t,” “s” “f” and “v.” - Ask the child to turn off any toys or music before speaking, since both create background noise. - When your kids are in the backseat while you are driving a car, ask them to wait until you are at a stoplight to communicate with you, if at all possible. Try not to respond to comments from children unless the car is stopped. The FM hearing device (mentioned above) may help with hearing their voices. - In other situations, respond to a child’s question or comment only if he or she is facing you. Eventually, the child will understand the importance of eye contact in communicating with a HOH person. - If you don’t understand what a child said, resist the urge to pretend you did. Instead say, “My ears didn’t hear you. Please tell me again.”
<urn:uuid:8a678eda-dac2-4e1b-aee3-32347e53325b>
CC-MAIN-2015-11
http://www.healthyhearing.com/content/articles/Hearing-aids/Children/38856-Parents-hearing-loss-tips
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00270-ip-10-28-5-156.ec2.internal.warc.gz
en
0.972173
1,986
2.578125
3
[ 17171, 447, 247, 82, 5740, 25, 770, 2708, 318, 3194, 416, 8319, 18920, 911, 7697, 10299, 1158, 13, 1375, 318, 257, 2802, 286, 1115, 351, 4854, 2994, 508, 6797, 20823, 546, 2877, 351, 4854, 2994, 290, 2972, 4854, 2994, 2428, 13, 198, 1722, 257, 1327, 286, 4854, 357, 39, 12096, 8, 2802, 286, 1115, 11, 314, 460, 1716, 14718, 351, 407, 4854, 616, 1751 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Texas History Series by Texas Historian, Len Kubiak of Rockdale, Texas. BATTLE OF SAN JACINTO(1836) The actual battle of San Jacinto lasted less than twenty minutes, but events leading to the battle had long been in the making since the oppressive Mexican edict of April 6, 1830, prohibiting further emigration of Anglo-Americans from the United States to Texas. Next came the disturbance at Anahuac and the battle of Velasco, in 1832. Then the imprisonment of Stephen F. Austin, the "Father of Texas," in Mexico in 1834. Prior to San Jacinto, the Texans and the Mexicans skirmished at Gonzales over a cannon; then again with the Mexican army capturing and excuting the Texans at Goliad; the "Grass Fight," and the siege and capture of San Antonio . . . all in 1836. The Texas Declaration of Independence at Washington-on-the-Brazos on March 2, 1836, officially marked the beginning of the Texas revolution. On April 21, 1836, General Sam Houston and his valiant Texas Army attacked Santa Anna's superior force and won a glorious victory for the Republic of Texas. This is the story of that great battle and the gallant Texian army. SAM HOUSTON LEARNS OF THE SIEGE AT THE ALAMO Four days after the Declaration of Independence, a rider brought the news to the convention on the Brazos that Colonel William Barret Travis, and his men were under siege at the Alamo in San Antonio. Sam Houston, commander-in-chief of the Texas Army, left Washington for Gonzales to take command of the Texian troops there and go to the aid of Travis. Houston arrived arrived at Gonzales on the 11th, and at about dark learned from two Mexicans who had just arrived from San Antonio that the Alamo had fallen and its 183 brave defenders massacred. The shocking news of the fall of the Alamo was confirmed two days later by Mrs. Almeron Dickinson who had been released by the Mexicans after seeing her lieutenant husband killed in the old mission. She was trudging toward Gonzales with her baby in her arms when the Texas army scouts found her. THE RUNAWAY SCRAPE The reports of the Alamo slaughter terrified the people of Gonzales. They were panic-stricken at the thought that Santa Anna was sweeping eastward with a well-trained army to kill all Texans. The frantic settlers packed what belongings they could take in wagons and carts, on horseback, or on their own backs, and fled their homes racing for the Louisiana border to escape the wrath of the blood-thirsty Santa Anna. General Houston, realizing that his few hundred green troops were no match for the well-drilled hordes from Mexico, evacuated Gonzales and had the rear guard put the town to the torch. The Texans crossed the Colorado River on the 17th at Jesse Burnam's, and camped there for two days. Then the army resumed its march down the east bank to Benjamin Beason's crossing, some twenty miles below, near the present town of Columbus. Camp was pitched at Beason's on the 20th. Had the retreating column been fifty miles farther south, the troops might have heard the distant rumble and crackle of gunfire. On March 19, Colonel James Walker Fannin Jr., commanding about 450 volunteers withdrawing from Goliad toward Victoria, was defeated in battle on Coleto Creek by General José Urrea's forces (photo at left) of 1200 infantry and 700 cavalry. Fannin surrendered. On Palm Sunday, March 27, he and 352 of his men were marched out on the roads near Goliad and brutally shot down, by order of Santa Anna. MEXICAN ARMY PURSUIT UNDER GEN. SANTA ANNA After their victory at the Alamo, the Mexican forces continued to follow the colonists. Houston's scouts reported that General Ramirez Sesma and General Adrian Woll (left) were on the west side of the Colorado with approximately 725 troops and General Eugenio Tolso with 600. By this time, recruits and reinforcements had increased Houston's army to a strength estimated as high as 1200. The chilling news of Fannin's defeat reached the Texas forces on March 25 causing many Texians to leave the ranks, to remove their families beyond the Sabine. The remaining soldiers remaining clamored for action, but Houston decided to continue his retreat. On the 26th, Houston marched his army five miles. By the 27th of March, Houston's army reached the Brazos River bottoms, and at San Felipe de Austin, on the west bank of the Brazos on the 28th of March. On the 29th the army marched six miles up the river in a driving rain, and camped on Mill Creek. On the 30th after a fatiguing tramp of nine miles, the army reached a place across the river from "Bernardo," on one of the plantations of the wealthy Jared E. Groce, and there camped and drilled for nearly two weeks. When the interim Texas government members at Washington-on-the-Brazos learned of the approaching Mexican army in mid-March, they fled to Harrisburg. President David G. Burnet sent the General Houston a caustic note, prodding him to stop his retreat and fight. Secretary of War Thomas J. Rusk arrived at the camp April 4 at Burnet's direction, to urge Houston to a more aggressive course. SANTA ANNA SPLITS OUP HIS ARMY TO STOP THE RETREATING SAM HOUSTON Since General Houston was showing a disposition to run, Santa Anna decided to take possession of the coast and seaports, as a step in his plan to round up the revolutionists. Crossing the Brazos at Fort Bend (now called Richmond) on the 11th, the Mexican general proceeded on April 14 on the road to Harrisburg, taking with him about 700 men and one twelve-pounder cannon. Urrea was at Matagorda with 1200 men: Gaona was somewhere between Bastrop and San Felipe, with 725; Sesma, at Fort Bend, with about 1,000, and Vicente Filisola between San Felipe and Fort Bend, with nearly 1800 men. Santa Anna arrived at Harrisburg on the 15th. There he learned that the Burnet government had gone down Buffalo Bayou to New Washington (now Morgan's Point), about 18 miles southeast. Burning Harrisburg, Santa Anna and his army set out after them. On the 19th when he arrived at New Washington he learned that the new Texas government had fled to Galveston. Santa Anna then set out for Anahuac via Lynchburg. THE ROAD TO SAN JACINTO Meanwhile, on April 11th, the Texans at Groce's received two cannon(the "Twin Sisters"), a gift from the citizens of Cincinnati, Ohio. Fortified with the cannon, General Houston decided to move on to the east side of the Brazos. Since the spring rains had swollen the Brazos River, the steamboat "Yellow Stone" and a yawl were used to ferry the army, horses, cattle and baggage across the river. The movement began on the 12th and was completed at 1 p.m. on the 13th. On the 13th Houston ordered Major Wyly Martin, Captain Mosely Baker, and other commanders of detachments assigned to delaying actions, to rejoin the main army at the house of Charles Donoho, about three miles from Groce's. At Donoho's the road from San Felipe to eastern Texas crossed the road south from Groce's. On April 16 the army marched twelve miles to the home of Samuel McCurley on Spring Creek, in present Harris county. The creeks formed the boundary line between Harris and Montgomery counties. Three miles beyond McCurley's was the home of Abram Roberts, at a settlement known as "New Kentucky." At Roberts' two wagon trails crossed, one leading to Harrisburg and the other Robbins' Ferry on the Trinity and on to the Sabine. Many of his officers and men, as well as government officials, believed that Houston's strategy was to lead the pursuing Mexicans to the Sabine River, the eastern border of Texas. There, it was known, were camped United States troops under General Pendelton Gaines, with whose help the Texans might turn on their foes and destroy them. However, on April 17, when Roberts' place was reached, Houston took the Harrisburg road instead of the one toward the Louisiana line, much to the gratification of his men. They spent the night of the 17th near the home of Matthew Burnett on Cypress Creek, twenty miles from McCurley's. On April 18 the army marched twenty miles to White Oak Bayou in the Heights District of the present city of Houston, and only about eight miles from Harrisburg, now a part of Houston. From two prisoners, captured by Erasmus "Deaf" Smith, the famous Texas spy (left), Houston first learned that the Mexicans had burned Harrisburg and had gone down the west side of the bayou and of San Jacinto River, and that Santa Anna in person was in command. In his march downstream Santa Anna had been forced to cross the bridge over Vince's Bayou, a tributary of Buffalo Bayou, then out of its banks. He would have to cross the same bridge to return. Viewing this strategic situation on the morning of the 19th, Houston told his troops it looked as if they would soon get action. And he admonished them to remember the massacres at San Antonio and at Goliad. "Remember the Alamo!" The soldiers took up the cry. "Remember Goliad!" [Thomas J. Rusk, Secretary of War, and other Texans who were in the battle said the battle cry was 'Remember the Alamo' 'Remember La Bahia!'] In a letter to Henry Raguet he said: "This morning we are in preparation to meet Santa Anna. It is the only chance for saving Texas." In an address "To the People of Texas" he wrote: "We view ourselves on the eve of battle. We are nerved for the contest, and must conquer or perish…We must act now or abandon all hope." Houston's force crossed Buffalo Bayou to the west side, near the home of Isaac Batterson, two and a half miles below Harrisburg, on the evening of the 19th. Some 248 men, mostly sick and non-effective, were left with the baggage at the camp opposite Harrisburg. The march was continued until midnight. ON THE EVE OF BATTLE At dawn April 20 the Texans resumed their trek down the bayou, to intercept the Mexicans. At Lynch's ferry, near the juncture of Buffalo Bayou and San Jacinto River, they captured a boat laden with supplies for Santa Anna. This probably was some of the plunder of Harrisburg or New Washington. Ascertaining that none of the enemy forces had crossed, the Texans drew back about a mile on the Harrisburg road, and encamped in a skirt of timber protected by a rising ground. That afternoon, Colonel Sidney Sherman (left) with a small detachment of cavalry engaged the enemy infantry, almost bringing on a general action. In the clash two Texans were wounded---one of them, Olwyn J. Trask, mortally---and several horses were killed. In this preliminary skirmish Mirabeau B. Lamar, a private from Georgia (later President of the Republic of Texas), so distinguished himself that on the next day he was placed in command of the cavalry. Santa Anna's blue-uniformed army made camp under the high ground overlooking a marsh, about three-fourths of a mile from the Texas camp. They threw up breastworks of trunks, baggage, pack-saddles and other equipment. Both sides prepared for the expected conflict. The Texans awoke to find Thursday, April 21, a clear fine day. Refreshed by a breakfast of bread made with flour from the captured supplies and meat from beeves slaughtered the day before, they were eager to attack the enemy. They could see Santa Anna's flags floating over the enemy camp, and heard the Mexican bugle calls on the crisp morning air. It was discovered at about nine o'clock that General Martín Perfecto de Cos had crossed Vince's bridge, about eight miles behind the Texans' camp, with some 540 picked troops, swelling the enemy forces to about 1265. General Houston ordered "Deaf" Smith and a detail to destroy the bridge and prevent further enemy reinforcements. This also would prevent the retreat of either the Texans or the Mexicans toward Harrisburg. In dry weather Vince's Bayou was about fifty feet wide and ten feet deep, but the excessive April rains bad made it several times wider and deeper. [With "Deaf" Smith in the detail that destroyed the bridge were Young P. Alsbury, John Coker, John Garner, Moses Lapham, Edwin R. Rainwater and Dimer W. Reaves.] Shortly before noon, General Houston held a council of war with Colonels Edward Burleson and Sidney Sherman, Lieutenant Colonels Henry Millard, Alexander Somervell and Joseph L. Bennett, and Major Lysander Wells. Two of the officers suggested attacking the enemy in his position, while the others favored awaiting Santa Anna's attack. Houston withheld his own views, but later, after having formed his plan of battle, submitted it to Secretary of War Rusk, who approved it. THE BATTLE OF SAN JACINTO General Houston disposed his forces in battle order at about 3:30 in the afternoon. Over on the Mexican side all was quiet; many of the foemen were enjoying their customary siesta. The Texans' movements were screened by the trees and the rising ground, and evidently Santa Anna had no lookouts posted. Big, shaggy and commanding in his mud-stained unmilitary garb, the chieftain rode his horse up and down the line. "Now hold your fire, men," he warned in his deep voice, "until you get the order!" At the command, "Advance," the patriots, 910 strong, moved quickly out of the woods and over the rise, deploying. Bearded and ragged from forty days in the field, they were a fierce-looking band. But their long rifles were clean and well oiled. Only one company, Captain William Wood's "Kentucky Rifles," originally recruited by Sidney Sherman, wore uniforms. [In his official report of the battle, April 25, 1836, Houston said 783 Texans took part. Yet in a roster published later he listed 845 officers and men at San Jacinto, and by oversight omitted Captain Alfred H. Wyly's Company. In a Senate speech February 28, 1859, Houston said his effective force never exceeded 700 at any point. Conclusive evidence in official records brings the total number at San Jacinto up to 910.] The battle line was formed with Edward Burleson's regiment in the center; Sherman's on the left wing; the artillery, under George W. Hockley, on Burleson's right; the infantry, under Henry Millard, on the right of the artillery; and the cavalry, led by Lamar, on the extreme right Some of the officers of the Texian Army present at San Jacinto; General Sam Houston, Col. Sidney Sherman, Col. Edward Burleson, General and Secretary of War, Thomas J. Rusk (shown left to right). The main groups of the Texas army included the cavalry on the right, commanded by Mirabeau B. Lamar; next, the Infantry under Lieutenant Colonel Henry Millard and the "Twin Sisters" cannon under Colonel George W. Hockley; the 1st Regiment in the center under Colonel Edward Burleson; the 2nd Regiment, the left wing, under Colonel Sidney Sherman. Silently and tensely the Texas battle line swept across the prairie and swale that was No Man's land, the men bending low. A soldier's fife piped up with "Will You Come to the Bower,"' a popular tune of the day. That was the only music of the battle. [Several veterans of the battle said the tune played was "Yankee Doodle."] As the, troops advanced, "Deaf" Smith galloped up and told Houston, "Vince's bridge has been cut down." The General announced it to the men. Now both armies were cut off from retreat in all directions but one, by a roughly circular moat formed by Vince's and Buffalo Bayous to the west and north, San Jacinto River to the north and cast, and by the marshes and the bay to the east and southeast. At close range, the two little cannon, drawn by rawhide thongs, were wheeled into position and belched their charges of iron slugs into the enemy barricade. Then the whole line, led by Sherman's men, sprang forward on the run, yelling, "Remember the Alamo!" "Remember Goliad!" All together they opened fire, blazing away practically point-blank at the surprised and panic-stricken Mexicans. They stormed over the breastworks, seized the enemy's artillery, and joined in hand-to-hand combat, emptying their pistols, swinging their guns as clubs, slashing right and left with their knives. Mexicans fell by the scores under the impact of the savage assault. General Manuel Fernández Castrillón, a brave Mexican, tried to rally the swarthy Latins, but he was killed and his men became crazed with fright. Many threw down their guns and ran; many wailed, "Me no Alamo!" "Me no Goliad!" But their pleas won no mercy. The enraged revolutionists reloaded and chased after the stampeding enemy, shooting them, stabbing them, clubbing them to death. From the moment of the first collision the battle was a slaughter, frightful to behold. The fugitives ran in wild terror over the prairie and into the boggy marshes, but the avengers of the Alamo and Goliad followed and slew them, or drove them into the waters to drown. Men and horses, dead and dying, in the morass in the rear and right of the Mexican camp, formed a bridge for the pursuing Texans. Blood reddened the water. General Houston tried to check the execution but the fury of his men was beyond restraint. Some of the Mexican cavalry tried to escape over Vince's bridge, only to find that the bridge was gone. In desperation, some of the flying horsemen spurred their mounts down the steep bank; some dismounted and plunged into the swollen stream. The Texans came up and poured a deadly fire into the welter of Mexicans struggling with the flood. Escape was virtually impossible. General Houston rode slowly from the field of victory, his ankle shattered by a rifle ball. At the foot of the oak where he bad slept the previous night be fainted and slid from his horse into the arms of Major Hockley, his chief of staff. As the crowning stroke of a glorious day, General Rusk presented to General Houston as a prisoner the Mexican general Don Juan Almonte, who had surrendered formally with about 400 men. The casualties, according to Houston's official report, numbered 630 Mexicans killed, 208 wounded, and 730 taken prisoner. As against this heavy score, only nine Texans were killed or mortally wounded, and thirty wounded less seriously. Most of their injuries came from the first scattered Mexican volley when the attackers stormed their barricade. The Texans captured a large supply of muskets, pistols, sabers, mules, horses, provisions, clothing, tents and paraphernalia, and $12,000 in silver. THE CAPTURE OF SANTA ANNA Santa Anna had disappeared during the battle, and next day General Houston ordered a thorough search of the surrounding territory for him. In the afternoon Sergeant J. A. Sylvester spotted a Mexican slipping through the woods toward Vince's Bayou. Sylvester and his comrades caught the fugitive trying to hide in the high grass. He wore a common soldier's apparel round jacket, blue cotton pantaloons, skin cap and soldier's shoes. [With Sylvester in the capture of Santa Anna were Joel W. Robison, Joseph D. Vermillion, Alfred H. Miles and David Cole.] They took the captive to camp, and on the way, Mexican prisoners recognized him and cried, "El Presidente!" Thus his identity was betrayed; it was indeed the dictator from below the Rio Grande. He was brought to General Houston, who lay under the headquarters oak, nursing his wounded foot. The Mexican President pompously announced, "I am General Antonio Lopez de Santa Anna, and a prisoner of war at your disposition." General Houston, suffering with pain, received him coldly. He sent for young Moses Austin Bryan and Lorenzo de Zavala Jr. to act as interpreters. Santa Anna cringed with fright as the excited Texas soldiers pressed around him, fearing mob violence. He pleaded for the treatment due a prisoner of war. "You can afford to be generous," he whined; "you have captured the Napoleon of the 'West." General Houston responded, "What claim have you to mercy when you showed none at the Alamo or at Goliad?" They talked for nearly two hours, using Bryan, de Zavala and Almonte as interpreters. In the end Santa Anna agreed to write an order commanding all Mexican troops to evacuate Texas. Later, treaties were signed at Velasco, looking to the adjustment of all differences and the recognition of Texas independence. Thus ended the revolution of 1836, with an eighteen-minute battle which established Texas as a free republic and opened the way for the United States to extend its boundaries to the Rio Grande on the southwest and to the Pacific on the west. Few military engagements in history have been more decisive or of more far-reaching ultimate influence than the battle of San Jacinto. According to Mirabeau Lamar's account of the battle: "Colonel Sherman, with his regiment, having commenced the action upon our left wing, the whole line, at the center and on the right, advancing in double quick time, rung the warcry, 'Remember the Alamo!' received the enemy's fire, and advanced within point blank shot, before a piece was discharged from our lines. Our lines advanced without a halt, until they were in possession of the woodland and the enemy's breastwork, the right wing of Burleson's and the left of Millard's taking possession of the breastwork; our artillery having gallantly charged up within seventy yards of the enemy's cannon, when it was taken by our troops. The conflict lasted about eighteen minutes from the time of close action until we were in possession of the enemy's encampment, taking one piece of cannon (loaded), four stand of colors, all their camp equipage, stores and baggage. Our cavalry had charged and routed that of the enemy upon the right, and given pursuit to the fugitives, which did not cease until they arrived at the bridge which I have mentioned before---Captain Karnes, always among the foremost in danger, commanding the pursuers. The conflict in the breastwork lasted but a few moments; many of the troops encountered band to hand, and, not having the advantage of bayonets on our side, our riflemen used their pieces as war clubs, breaking many of them off at the breech. The rout commenced at half past four, and the pursuit by the main army continued until twilight. A guard was then left in charge of the enemy's encampment, and our army returned with our killed and wounded. In the battle, our loss was two killed, and twenty-three wounded, six of them mortally. The enemy's loss was 630 killed….wounded 208 . . . prisoners 730." ACCOUNT OF THE BATTLE FROM THE MEXICAN ARMY'S PERSPECTIVE Colonel Pedro Delgado, of Santa Anna's staff, gave a detailed and accurate Mexican version of the battle. He told how Santa Anna, his staff and most of the men were asleep when the bugler sounded the alarm of the Texan advance. Some of the men were out gathering boughs for shelter; cavalrymen were riding bareback, to and from water. "I stepped upon some ammunition boxes the better to observe the movements of the enemy. I saw that their formation was a mere line of one rank, and very extended. In their center was the Texas flag; on both wings, they had two light cannons, well manned. Their cavalry was opposite our front, overlapping our left. In this disposition yelling furiously, with a brisk fire of grape, muskets and rifles, they advanced resolutely upon our camp. There the utmost confusion prevailed. General Castrillon shouted on one side; on another Colonel Almonte was giving orders; some cried out to commence firing; others to lie down and avoid the grape shot. Among the latter was His Excellency. Then already, I saw our men flying in small groups, terrified, and sheltering themselves behind large trees. I endeavored to force some of them to fight, but all efforts were in vain---the evil was beyond remedy; they were a bewildered and panic-stricken herd. The enemy kept up a brisk cross-fire of grape on the woods. Presently we heard, in close proximity, the unpleasant noise of their clamor. Meeting no resistance they dashed, lightning-like upon our deserted camp. Then I saw His Excellency running about in the utmost excitement, wringing his hands, and unable to give an order. General Castrillon was stretched on the ground, wounded in the leg. Colonel Trevino was killed, and Colonel Marcial Aguirre was severely injured. I saw also, the enemy reaching the ordnance train, and killing a corporal and two gunners who had been detailed to repair cartridges which had been damaged on the previous evening. " In a grove on the bayshore, Colonel Delgado said, the Texans wrought the worst carnage of the battle. "There they killed Colonel Batres; and it would have been all over with us had not providence placed us in the hands of the noble and generous captain of cavalry, Allen, who by great exertion, saved us repeatedly from being slaughtered by the drunken and infuriated volunteers." For questions or comments, send me an Email at
<urn:uuid:badb0bf7-909b-4c0b-a963-5f0816004879>
CC-MAIN-2017-34
http://www.forttumbleweed.net/sanjacinto.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105927.27/warc/CC-MAIN-20170819220657-20170820000657-00572.warc.gz
en
0.971977
5,539
3.515625
4
[ 21607, 7443, 7171, 416, 3936, 5590, 22618, 11, 12592, 24921, 32994, 286, 4631, 14597, 11, 3936, 13, 198, 33, 35455, 3963, 37376, 449, 2246, 1268, 10468, 7, 1507, 2623, 8, 198, 464, 4036, 3344, 286, 2986, 8445, 20424, 15436, 1342, 621, 8208, 2431, 11, 475, 2995, 3756, 284, 262, 3344, 550, 890, 587, 287, 262, 1642, 1201, 262, 30983, 10816, 1225, 713, 286, 3035 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The key to capturing your readers’ interest is a great ‘lede.’ Sometimes referred to as a “lead,” a “lede” is the first sentence or paragraph of a news article. Secondary only to the headline, the lede describes the most important parts of the article. Read some newspaper articles and observe how the author tries to hook your interest with the first sentence. You can use this in your blog, as easily as in a news article. A good lede highlights what’s important and encourages the reader to continue. It also directs the reader to the thoughts you want them to have. Just like with a news article, you only have a few seconds to interest your audience. A lede helps you do that so people are less likely to click on by. I recently wrote an article where I was trying to lead the readers to a conclusion – but made the mistake of doing that in a high volume venue where everybody skims things. My plan backfired because everyone read part of the first paragraph, responded to that, and moved on. I should have picked a good lede, one that indicated the direction I wanted things to go in. For example, in a blog entry about a famous badger race, this might be a good lede: Sir Fluffbottom is the new world champion in the exciting Beetle Cup race! Much better than: I think you’ll love finding out who one the latest edition of the Beetle Cup! The second lede has no real information, isn’t specific about the Beetle Cup being a race, and makes the reader work for their answers. Many will move on – or click by. Better to be short, punchy, specific, and work into the details in the body of the work, after the reader knows why the article is relevant and interesting to them. If you haven’t done this yet, try it out. Also, practice picking out ledes in news articles. It can be fun and educational. And who knows, you just might get more people reading your blog.
<urn:uuid:ce9a60cc-8c49-4b87-8cec-4c7115b596bb>
CC-MAIN-2019-43
https://mind-flight.org/tag/blog-tip/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987798619.84/warc/CC-MAIN-20191022030805-20191022054305-00396.warc.gz
en
0.953695
437
2.5625
3
[ 464, 1994, 284, 21430, 534, 7183, 447, 247, 1393, 318, 257, 1049, 564, 246, 992, 68, 13, 447, 247, 198, 15468, 6412, 284, 355, 257, 564, 250, 28230, 11, 447, 251, 257, 564, 250, 992, 68, 447, 251, 318, 262, 717, 6827, 393, 7322, 286, 257, 1705, 2708, 13, 29521, 691, 284, 262, 16534, 11, 262, 2957, 68, 8477, 262, 749, 1593, 3354, 286 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Lightning Literature and Composition Hewitt's Lightning Lit guides use full-length novels, autobiographies, plays, essays, short stories, and poems to teach deep reading and composition skills. Unlike some literature programs that take a scatter-shot approach (where none of the literature seems connected) or that try to include too much into one book, Lightning Literature guides focus on a few classics in depth, in a systematic manner. NEW! Elementary School Read a wonderful picture book with your child each week from award-winning children's authors like Dr. Seuss, Crockett Johnson, Ezra Jack Keats, Margaret Wise Brown, Beatrix Potter, Arnold Lobel, Robert McCloskey, Kevin Henkes, Tomie DePaola, Bill Peet and many more. The Teacher Guide provides questions and discussion tips for each book, grammar instruction and answers, help to guide your student through a writing composition every week (personal essays, research papers, short stories, etc.), and suggestions for further activities. The student workbook is consumable and covers first-grade grammar (including an introduction to diagramming sentences). We will introduce a new grade each year through Grade Six. The following courses are available as either packs (which include all the required books) or the guides can be puchased alone. Samples are included on individual product pages.
<urn:uuid:7013bdf5-c4a6-4428-9f15-bfe8d3d8a9ad>
CC-MAIN-2016-44
https://www.hewitthomeschooling.com/Elem/eLightning.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719877.27/warc/CC-MAIN-20161020183839-00556-ip-10-171-6-4.ec2.internal.warc.gz
en
0.91652
287
3.5
4
[ 15047, 768, 33818, 290, 955, 9150, 198, 39, 413, 715, 338, 12469, 25659, 17555, 779, 1336, 12, 13664, 16122, 11, 33136, 41480, 11, 5341, 11, 198, 408, 592, 11, 1790, 3923, 11, 290, 31888, 284, 4545, 2769, 3555, 290, 11742, 4678, 13, 12101, 617, 9285, 4056, 198, 5562, 1011, 257, 41058, 12, 9442, 3164, 357, 3003, 4844, 286, 262, 9285, 2331, 5884, 8, 393 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Data breaches happen all the time. It doesn’t necessarily have to be a cybercriminal hacking into your organisation’s computer systems; anyone, including your employees, can be a reason for a breach. Aside from hacks, several ways and methods can be used to compromise company-sensitive data and computer systems. Your business can employ a data protection consultant to help tackle this. Here are some of the ways your computer systems and data can be breached. 1. An Employee’s Mistake A simple mistake by your employee(s) can cause a massive, though unintended, data breach. Although you might know this already, your company is only one click away from having your systems and valuable data hijacked. Some of these mistakes occur when the employee doesn’t follow laid out procedures, thus leaking information in the end. You can discover and curb this problem if you use time tracking projects solution to track employees’ activities and processes in more detail. An excellent example of an unintended (but irreversible) mistake is when one bulk emails with recipients listed in the Cc field stead of Bcc. Unless he/she notices the mistake before hitting the send button, the recipients will be able to see every other person’s email address that the email was intended for. While this may not be a problem for some instances, it can be disastrous if the mailing list was from a subscription or if it reveals sensitive data such as political affiliations and medical status. 2. A Cyber Attack You can’t be too prepared for a cyber-attack. Malicious hackers may target your company accessing vast amounts of sensitive data and even taking control of your computer systems. Cyber attacks are classified into 3 categories: a. Exploits: This is a method in which an attacker (hacker) uses things such as brute-force password hacks to log-in to an account. The hacker will use a tool capable of generating millions of possible passwords in an attempt to look for the correct credentials. This is one of the reasons why it is advisable to create a strong password for your accounts. b. Malware: Some hackers will use various types of malware to gather information about your business, and cause disruptions with the same. Your computer system can be infected through a script which is injected to help collect data for the hacker. The program monitors everything from browsing habits to the user’s private and confidential data. More destructive forms of malware, including Ransomware, adware, and viruses, may even infect your systems, deleting and also corrupting all the files. c. Social Engineering: This type of attack is a lot different from the other two. It is so advanced that it warrants a discussion on its own. 3. Social Engineering This type of hack involves the attacker masquerading as a legitimate organisation or person. The attacker will trick you or your employees to: a. Hand over sensitive data by either downloading an infected attachment into the computer; b. Give the hacker access to restricted areas with either admin login details or giving them physical access to the organisation’s premise. Most hackers will use phishing to trick you into providing them with such sensitive information. This can be in the form of an email that seems legitimate and contains urgent requests. The request can be to provide user login details, to click a link, or to trick one into believing there’s something wrong with their systems. While phishing attacks are frequent in the form of email messages, text messages and social media can also be used. 4. A Malicious Insider As explained earlier on, your employees are the most significant security threat to the company. While an employee might unknowingly cause a data breach, some of them will do it willingly. An employee may collaborate with a fraudster giving them access to systems and sensitive information. These are known as malicious insiders. Some of the reasons an employee may do this include: a. Revenge: If the employee had/has been laid off or feels unappreciated; b. Financial gain: An employee with/without a financial strain may choose to sell company data to get some money. They may make copies of sensitive emails to sell them to rival companies or in the dark web. 5. Physical Theft The data breach doesn’t necessarily have to involve digital information. Paper records can be stolen from the company as well. This is one of the reasons you need to be particularly careful with physical data theft. Some of the best ways to prevent paper record theft are by having them disposed of rightly, shredding anything that requires shredding, and keeping them under lock and key. You also need to be careful when disposing of digital devices such as old computers, hard disks, and USB drives. Have them all wiped clean before disposing of them.
<urn:uuid:295c21c5-471a-47c0-a6ca-2de93931a0ae>
CC-MAIN-2022-27
https://www.ibusinessangel.com/how-your-organisations-data-can-be-breached/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103360935.27/warc/CC-MAIN-20220628081102-20220628111102-00641.warc.gz
en
0.92966
987
2.5625
3
[ 6601, 31523, 1645, 477, 262, 640, 13, 632, 1595, 447, 247, 83, 6646, 423, 284, 307, 257, 10075, 45955, 15656, 656, 534, 12684, 447, 247, 82, 3644, 3341, 26, 2687, 11, 1390, 534, 4409, 11, 460, 307, 257, 1738, 329, 257, 13694, 13, 28470, 422, 30445, 11, 1811, 2842, 290, 5050, 460, 307, 973, 284, 13110, 1664, 12, 30176, 1366, 290, 3644, 3341, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Asthma is a chronic allergic lung disease, manifested by attacks of wheezing or breathlessness, from time to time, dry cough, in response to an allergen, or colds in the long term illness, physical overload of sensory stress. Bronchial asthma affects people of all ages. Worldwide, there are more than 250 million patients. Among the large arsenal of ways to deal with asthma, medicine prefers hormone treatment. However, studies show that including long-term use of inhaled non-hormonal substances can cause serious side effects amongst adults and children. The whole intrigue of the disease is the fact patient is able to notice any signs of it many years after the disease has began to develop, when the abnormal configuration has already been formed and transformed into a chronic process. The reasons for the origin of asthma are very different – a family history, smoking, frequent colds and illnesses, hazardous working conditions and environmental aspects, tightened psychotrauma and so on. All of the above mentioned aggressors have negative impact on the protective power of a human body – immunity. Long action of these circumstances leads to chronic inflammation, in consequence of which the lumen of the bronchi gradually narrows, and the lung tissue loses its flexibility. The narrowing (obstruction), bronchial inflammation, and congestion in their viscous sputum are the main symptom of asthma. Very often, rhinosinusitis precedes development of asthma, as well as respiratory allergosis. Treatment of asthma is strictly individual, because the causes for it may be different and. Besides, along with the disease, some other abnormalities tend to occur in the body. In any case, when the first signs of asthma appear, one should immediately consult a doctor, and even after having been diagnosed, apply some methods of treatment. The disease may worsen in certain seasons: some – in spring and fall, others – in autumn and winter, the third – in spring, autumn and winter, and the fourth – are observed all year round. The emergence of asthma may be caused by allergic diseases, inflammatory processes in the organs of respiration, fungal lesions of skin and mucous membranes, and allergic rhinitis. The majority of patients with asthma have previously suffered viral infection diseases, which led to a change in bronchial reactivity. In some cases, an allergic predisposition to asthma provoked the emergence of diseases of the gastrointestinal tract. To treat asthma one needs to constantly use different methods and techniques, both traditional and non-traditional. To achieve the desired result, you must develop patience and steadiness by regularly taking the necessary preparations and applying the necessary treatment. Among the methods of alternative medicine Apitherapy (treatment with bee products), phytotherapy (treatment with herbs and fees), manual therapy, and acupressure, hirudotherapy (treatment with leeches) can be distinguished.
<urn:uuid:83a3dfa7-5129-4381-b4b3-969524071fa2>
CC-MAIN-2020-16
https://www.pocketdrugguide.com/asthma
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371620338.63/warc/CC-MAIN-20200406070848-20200406101348-00407.warc.gz
en
0.942199
591
3.546875
4
[ 33751, 21720, 318, 257, 10726, 31856, 12317, 4369, 11, 34300, 416, 3434, 286, 483, 8471, 278, 393, 8033, 17587, 11, 422, 640, 284, 640, 11, 5894, 22094, 11, 287, 2882, 284, 281, 477, 263, 5235, 11, 393, 4692, 82, 287, 262, 890, 3381, 8526, 11, 3518, 31754, 286, 23326, 5503, 13, 198, 18760, 354, 498, 28438, 10975, 661, 286, 477, 9337, 13, 33140, 11 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
A publication of the Archaeological Institute of America News and Notes from the World of Archaeology Catch a Pithecus by the ToeA 4.4-million-year-old skeleton found in Ethiopia belonged to a primate that may have walked upright and had teeth similar to humans. But is she our ancestor? BluestonehengeOver the past two years, archaeologists have unearthed evidence of a previously unknown stone circle less than two miles from Stonehenge. Gem of a FindA tiny gemstone etched with Alexander the Great's portrait was found at the Hellenistic port of Tel Dor in Israel. Bamiyan Now Mine-FreeAfghans hope that archaeologists will return to the sites to conserve them and conduct further research. World RoundupRecent discoveries around the globe Off the GridNorthwestern University archaeologist Mark Hauser suggests you see the ruins of Bois Cotlette, a seldom-visited plantation site on the small island of Dominica, between Guadeloupe and Martinique. Egypt's Model Afterlife Copper Age Thinkers The Spy Who Loved Old Stones
<urn:uuid:2e619b81-85d0-46bc-95a9-fc482440ef3f>
CC-MAIN-2017-22
http://archive.archaeology.org/1001/trenches/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00279.warc.gz
en
0.906272
230
2.546875
3
[ 32, 9207, 286, 262, 32187, 2770, 5136, 286, 2253, 198, 9980, 290, 11822, 422, 262, 2159, 286, 32187, 1435, 198, 34, 963, 257, 16889, 258, 9042, 416, 262, 1675, 68, 32, 604, 13, 19, 12, 14100, 12, 1941, 12, 727, 18328, 1043, 287, 31592, 19611, 284, 257, 778, 1920, 326, 743, 423, 6807, 24826, 290, 550, 9941, 2092, 284, 5384, 13, 887, 318, 673 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Black Skin Disease, also known as Alpocia X, is a horrible affliction that is affecting a large majority of pomeranians. Currently there is no test for this. That makes it even harder to try to 'breed it out' of the breed. There are many things we now know about the disease, but many things we do not know as well. Much of what is posted on the net is speculation, hypothosis', and opinioins. When you want answers, its hard to find any real facts since so many seem to differ on their personal experiences with the disease and differ in opinions greatly and argumenitivley. Because there is not test available to breeders, this disease has unkowingly and unitentionally been woven so deeply into the pomeranian breed it seems to affect all breeders at asome time in their breeding programs. It is difficult to avoid BSD in a bloodline since it may not show in the lines for up to 6 years later after the original carriers have produced possibly several generations by that the time it is discovered it was in the lines. At that time, those produced may have produced several litters, and those several more. Essentially by the time one knows BSD is in their bloodlines, 3 or more generations may be in other breeding programs, not showing symptoms, but producing carriers. Many carriers will not show any symptoms themselves but may produce affected dogs. This is a very difficult health concern for teh pomeranians breed. What is it?? The Facts Black skin disease is a condition that causes hair loss in Pomeranians. It can affect pomeranians ages 1-6 years of age. It can come on suddenly. It is often reffered to as Alopecia X meaning -hair loss for no known medical reason. Dogs are diagnosed with this when other things such as thyroid, and cushings tests come out negative. It cause dogs to lose fur mostly on the saddle area, hind quarters, and tail. Fur usually remains on face and legs. It dos not cuase health issues, it appears to be simply a cosmetic condition. There is no tests as of yet, to test dogs for BSD. There is no tangible or guaranteed way for breeders to avoid producing this disease despite their best efforts Its seem to affect males more often then females.. There is no known 100% effective treatment or cure at this time . What is it?? The arguments, hypothosis, and opinions Some believe both parents must be carriers. Some blieve it may be passed on from just one carrier/parent. Some believe if a puppy has a cottony baby coat, and does not go through a proper puppy shed (uglies) it will be affected with BSD. Some however have expressed they have had puppies who went through a complete puppy shed who were still affected with BSD. Some argue it is a hormone imbalance, while some maintain it is not. There are many great articles written on this subject. Here are a few I found helpful.
<urn:uuid:284a51b8-a09a-4cd5-9222-a98027d94f69>
CC-MAIN-2014-52
http://www.thebombpoms.com/Blackskindiseaseinpoms.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802773864.47/warc/CC-MAIN-20141217075253-00163-ip-10-231-17-201.ec2.internal.warc.gz
en
0.97511
642
2.828125
3
[ 9915, 17847, 17344, 11, 635, 1900, 355, 978, 79, 420, 544, 1395, 11, 318, 257, 12361, 1527, 41101, 326, 318, 13891, 257, 1588, 3741, 286, 279, 12057, 272, 1547, 13, 16888, 612, 318, 645, 1332, 329, 428, 13, 1320, 1838, 340, 772, 7069, 284, 1949, 284, 705, 4679, 276, 340, 503, 6, 286, 262, 15939, 13, 1318, 389, 867, 1243, 356, 783, 760, 546 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Published on November 29th, 2012 | by Leon Harris0 The Impact of Climate Change on Europe For quite some time now, we have been hearing about how the climate changes across the globe are affecting so many different countries on virtually every continent. One of the latest places to capture the attention of both scientists and the media alike would be Europe. Europe, one of the favorite destinations of tourists year-round, is currently experiencing some detrimental consequences due to the transitions within its atmospheric conditions. As a matter of fact, according to a recent assessment that was issued by the European Environment Agency that featured findings from 50 different authors, Europe is in dire straits due to the melting of glaciers, the shrinking of Greenland’s ice sheets, the decreasing of snow coverings and the warming of its permafrost soil. A big part of the cause of these conditions is due to the fact that Europe has had a significant increase in temperatures (much higher than average), along with a big decrease in precipitation among the southern regions. Plus, according to Jacqueline McGlade, the executive director of the European Environment Agency, one of the main things that these results are showing the world is that the climate is not just changing, but it’s doing so at a really rapid pace. Therefore, in order to brace ourselves for what some of those transitions will bring forth, every household on the globe needs to do their proactive part in reducing the amount of emissions that go out into the air. Just due to things such as heat waves, droughts and floods alone, Europe has found itself dealing with a great increase as it directly relates to damage costs. Also reportedly, the future doesn’t show signs of things improving any time soon. There is actually a lot of data that supports the fact that extreme weather events are only expected to become more intense and severe over the next several years, which will make Europe just that much more vulnerable. Plus, if the societies within Europe do not prepare to make some drastic adjustments, damage costs will only continue to soar as well. As more and more experts are exploring what is science in the sense of what can be done to alter some of these climate changes, one thing that all of them are certain about is that as the weather becomes more aggressive, it will affect far more than the environment; it will put human lives at risk as well. Already the increase in heat waves have caused thousands of deaths across the continent and over the next few decades, the fatalities in Europe due to even more heat waves that are on its way, are only expected to rise. Climate changes will also encourage various virus-carrying species to grow including ticks, mosquitos and sandflies. Plus, those who are sensitive to allergies will experience longer pollen seasons (reportedly in Europe, the pollen season is 10 days longer than it was just 50 years ago). Although these findings do seem bleak, the benefit in having this kind of data is that it prepares individuals to make wiser personal choices as it relates to living a more eco-friendly lifestyle. For more information on The European Climate Adaptation Platform and what you can do to help, visit Climate-Adapt.EEA.Europa.Eu.
<urn:uuid:f89d0bb9-671f-4908-8a91-a9e4db9b0a01>
CC-MAIN-2015-22
http://ecopreneurist.com/2012/11/29/the-impact-of-climate-change-on-europe/
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928114.23/warc/CC-MAIN-20150521113208-00259-ip-10-180-206-219.ec2.internal.warc.gz
en
0.966785
654
3.09375
3
[ 24492, 319, 3389, 2808, 400, 11, 2321, 930, 416, 10592, 10026, 15, 198, 464, 17677, 286, 13963, 9794, 319, 2031, 198, 1890, 2407, 617, 640, 783, 11, 356, 423, 587, 4854, 546, 703, 262, 4258, 2458, 1973, 262, 13342, 389, 13891, 523, 867, 1180, 2678, 319, 9826, 790, 15549, 13, 1881, 286, 262, 3452, 4113, 284, 8006, 262, 3241, 286, 1111, 5519, 290, 262 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The executive order provides that commercial partners participate in an “innovative and sustainable programme” headed by the US to “lead the return of humans to the Moon for long-term exploration and utilisation, followed by human missions to Mars and other destinations.” The document says that successful long-term exploration of space will require commercial entities to recover and use resources, including certain minerals, in outer space. The US, along with the world’s other spacefaring countries, does not recognise the 1979 Moon Treaty, which stipulates that states will not mine resources in outer space. The executive order clarifies that the US does not view space as “global commons” – paving the way for mining activities to take place outside the Earth’s atmosphere without any international treaty to permit it. Trump has directed the US Secretary of State to lead the effort to develop joint statements, bilateral agreements, and multilateral instruments with like-minded foreign states to enable “safe and sustainable operations” for the recovery and use of space resources for commercial purposes. The US is also keen to work with foreign states to object to attempts to treat the 1979 Moon Treaty as valid international law. The 1979 Agreement Governing the Activities of States on the Moon and Other Celestial Bodies – known better as the Moon Treaty – has not been adopted by any nation that engages in human spaceflight or plans to do so. The US, Russia, China, Japan and most members of the European Space Agency have not signed up to the treaty, and it is not regarded as having much relevance in international law. NASA, the US space agency, announced plans in 2018 to return astronauts to the Moon’s surface by 2024, something it hasn’t done since 1972. With the renewed interest in landing on the Moon, and the eventual goal of reaching Mars in conjunction with private enterprises, this latest move by Trump will no doubt be a boon to burgeoning space mining companies. More than 12,000 asteroids within around 45 million km of Earth have been identified by NASA. It’s believed these asteroids could hold iron ore, nickel, and precious metals in much higher concentrations than are found on Earth. While space mining remains a little way down the road in terms of practicality, some companies have been founded in anticipation of the sector booming. Some analysts predict that the first trillionaire will build their fortune by mining celestial bodies. Trump’s encouragement of Moon mining seems to combine two of his major presidential pursuits. He has consistently backed mining on US soil and has lifted Obama-era regulations that hindered mining projects in the country, and he’s also taken a keen interest in outer space – in 2019 the US became the only country to have an independent space force. Trump signing this latest executive order may be paving the way for the US ambition to dominate the final frontier economically as well as militarily.
<urn:uuid:eda7b14a-5ab4-454c-8cfb-2158acce0d65>
CC-MAIN-2023-40
https://www.mining-technology.com/features/trump-wants-us-companies-to-mine-the-moon/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00174.warc.gz
en
0.952352
592
3.34375
3
[ 464, 4640, 1502, 3769, 326, 5068, 4887, 8277, 287, 281, 564, 250, 3732, 709, 876, 290, 13347, 11383, 447, 251, 9153, 416, 262, 1294, 284, 564, 250, 28230, 262, 1441, 286, 5384, 284, 262, 6869, 329, 890, 12, 4354, 13936, 290, 7736, 5612, 11, 3940, 416, 1692, 10566, 284, 8706, 290, 584, 23982, 13, 447, 251, 383, 3188, 1139, 326, 4388, 890, 12, 4354 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Urease inhibitors are specialized substances used to reduce urease activity. It can inhibit the activity of microbial urease in the rumen of ruminants, slow down the decomposition rate of urea, and make the rumen microorganisms have a balanced supply of ammonia nitrogen, thereby improving the utilization rate of urea by ruminants. The substances that can be used as urease inhibitors generally have the following types: 1. Acetohydroxamic acid (abbreviated AHA) is a white or pale yellow crystalline material obtained by chemical synthesis. The melting point is 88 to 92 °C.The aqueous solution is slightly acidic. It is easy to absorb moisture, and it is easy to change color when exposed to light. It is easily soluble in water, ethanol, ether and the like. Acetylhydroxamic acid (AHA) is a very effective urease inhibitor. It can inhibit rumen microbial urease activity in ruminants, regulate rumen microbial metabolism, increase microbial protein synthesis (25%) and cellulose digestibility, and reduce urea decomposition rate in rumen. 2. Hydroquinone (HQ), also known as hydroquinone. The molecular weight is 10.10. It is a white crystal. The boiling point is 286.2 °C. It is soluble in water and is compatible with alcohol in any proportion. Its role is mainly to inhibit the activity of urease in the soil. 3. Benzoquinone, molecular weight 108.10. This product is yellow crystal; it has a special smell and can sublimate. It dissolves in ethanol or ether and is slightly soluble in water. 4. Sodium tetraborate (Na2B4O7•10H2O), also known as borax, is a colorless translucent crystal or a white monoclinic crystalline powder. It is odorless and salty. The relative density is 1.73. Crystal water is lost at 60 ° C, and all crystal water is lost at 350-400 ° C. It is easily soluble in water, glycerin, slightly soluble in alcohol, and the aqueous solution is weakly alkaline. 5. Heavy metal salts generally include heavy metal ions such as Mn2+, Ba2+, Co2+, Cu2+, and Fe2+. Among them, Mn2+ and Ba2+ have the best effects, but these ions also inhibit the activity of other enzymes. Mechanism of action of urease inhibitor The type of urease inhibitor is different, and the mechanism of inhibition of urease is also different. At present, hydroxamic acid compounds (especially acetohydroxamic acid) are considered to be the most effective inhibitors of urease (Mapadevan, 1976). The name of acetohydroxamic acid is N-hydroxyacetamide, which has the formula CH3-CO-NHOH and a molecular weight of 75.05. There is a hydroxylamine structure (-NHOH) in the molecule of acetohydroxamic acid, and its active hydrogen and hydroxyl groups combine with the sulfhydryl group (-SH) of the adjacent metal nickel (Ni) in the urea structure to form a urease inhibitor-urease binary complex. As a result, the activity of urease was inhibited. The urease inhibitor does not bind to the binding group of the urease active center, but binds to the catalytic group of the urease active center, and inhibits the activity of the enzyme by changing the conformation of the urease. It can be seen that the inhibitory effect of acetohydroxamic acid urease inhibitor on urease production is a reversible non-competitive inhibition. That is, the inhibitor does not affect the binding of urease to the substrate (urea), does not change the Michaelis constant (Km) of the urease (ie, does not change the affinity of the enzyme to the substrate), but only reduces the reaction rate (V) of the urease-catalyzed substrate. This will ensure that urea (exogenous urea and endogenous urea) can still be hydrolyzed by urease in the rumen, slowly releasing ammonia to meet the nitrogen needs of rumen microbial proliferation. Lianyungang JM Bioscience NBPT Manufacturer supplies urease inhibitor. If you need, please contact us.
<urn:uuid:159d2851-0786-47c7-a54e-3109bfa1bde7>
CC-MAIN-2019-43
https://www.mricc.com/types-urease-inhibitor.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987756350.80/warc/CC-MAIN-20191021043233-20191021070733-00398.warc.gz
en
0.925972
933
2.75
3
[ 52, 260, 589, 40272, 389, 16976, 15938, 973, 284, 4646, 334, 260, 589, 3842, 13, 632, 460, 26776, 262, 3842, 286, 36603, 334, 260, 589, 287, 262, 7440, 268, 286, 374, 7230, 1187, 11, 3105, 866, 262, 26969, 9150, 2494, 286, 334, 21468, 11, 290, 787, 262, 7440, 268, 4580, 45165, 423, 257, 12974, 5127, 286, 44957, 23417, 11, 12839, 10068, 262, 32121, 2494 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The Pacific War Online Encyclopedia |Previous: Yokkaichi||Table of Contents||Next: Yokoi Tadamichi| Yokohama during visit of U.S. "Great White Fleet" in 1908. Naval History and Heritage Command #NH 1567 35.463N) is a major port city on the west side of Tokyo Bay. The port was opened in 1859 to export silk, and the city was incorporated on 1 April 1889. The city was almost completely destroyed in the great earthquake of 1923 and was rebuilt to modern standards. Yokohama was built on the estuary of the Tsurumi River, but this was reclaimed in 1931 and the new coastline became an industrial belt. The population in October 1940 was 968,091 persons. Nippon Hikoki K.K. The production schedule of this factory complex was approximately as follows: |Aircraft Type||Average Airframes Per Month||Starting Month||Ending Month| The shipyards of Yokohama produced mostly merchant shipping and minesweepers, escorts, and other small warships, though Ryujo was also completed here prior to war. ||Building Way Length U.S. Army. Via ibiblio.org The city was bombed by a single Doolittle Raider on 18 April 1942 that did negligible damage. It was among the first six Japanese cities selected for massed incendiary attack, and was first raided by 517 B-29s escorted by 101 P-51s on 29 May 1945. Some 2,570 tons of bombs were dropped, burning out 6.9 square miles (17.9 km2). By then the port was already out of operation, and by July the industrial heart of the city was almost completely destroyed. Craven and Cate (1952; accessed 2011-10-2) Hansell (1986; accessed 2011-10-2) The Pacific War Online Encyclopedia © 2007, 2011 by Kent G. Budge. Index Comment on this article
<urn:uuid:11493b68-b9aa-4bff-8988-df575718d69c>
CC-MAIN-2017-17
http://pwencycl.kgbudge.com/Y/o/Yokohama.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123270.78/warc/CC-MAIN-20170423031203-00630-ip-10-145-167-34.ec2.internal.warc.gz
en
0.933806
429
3.140625
3
[ 464, 8211, 1810, 7467, 36732, 198, 91, 21448, 25, 45138, 4914, 16590, 15886, 10962, 286, 26714, 15886, 10019, 25, 575, 16044, 72, 50077, 321, 16590, 91, 198, 56, 482, 1219, 1689, 1141, 3187, 286, 471, 13, 50, 13, 366, 13681, 2635, 20001, 1, 287, 40417, 13, 198, 45, 9226, 7443, 290, 18518, 9455, 1303, 33863, 1315, 3134, 198, 2327, 13, 38380, 45, 8, 318 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
“Astrophysicists have recently begun hatching plans to find out just how weird Planet Nine might be,” reports the New York Times. Long-time Slashdot reader fahrbot-bot shares their report: Although it is probably wishful thinking, some astronomers contend that a black hole may be lurking in the outer reaches of our solar system. All summer, they have been arguing over how to find it, if indeed it is there, and what to do about it, proposing plans that are only halfway out of this world… Earlier this year, Edward Witten, a theoretical physicist at the Institute for Advanced Study in Princeton, chimed in… Dr. Witten suggested borrowing a trick from Breakthrough Starshot, the proposal by Russian philanthropist Yuri Milner and Dr. Hawking to send thousands of laser-propelled microscopic probes to the nearest star system, Alpha Centauri. Dr. Witten suggested sending hundreds of similarly small probes outward in all directions to explore the solar system. By keeping track of incoming signals from the probes, scientists on Earth would be able to tell if and when each one sped up or slowed down as it encountered the gravitational field of Planet Nine or anything else out there. Key to this plan would be the ability of the probes to keep pinging Earth precisely every hundred-thousandth of a second. In May, astronomers Scott Lawrence and Zeeve Rogoszinski of the University of Maryland suggested instead monitoring the trajectories of the probes with high-resolution radio telescopes, which would obviate the need for high-precision clocks on the probes. Another idea came from Avi Loeb, chair of the astronomy department at Harvard and leader of a scientific advisory board for Breakthrough Starshot: in July Dr. Loeb was back, with a student, Amir Siraj, and a new idea for finding the Planet Nine black hole. If a black hole were out there, they argued, it would occasionally rip apart small comets, causing bright flares that could soon be spotted by the new Vera C. Rubin Observatory, previously known as the Large Synoptic Survey Telescope, now under construction in Chile. The observatory’s mission, starting in 2021, is to make a movie of the universe, producing a panorama of the entire southern night sky every few days and revealing anything that has changed or moved. Such flares should occur a few times a year, they noted. “Our calculations show that the flares will be bright enough for the Vera Rubin Observatory to rule out or confirm Planet Nine as a black hole within one year of monitoring the sky with its L.S.S.T. survey,” Dr. Loeb wrote in an email. Moreover, because the Rubin telescope examines such a large swath of sky, it could detect or rule out black holes of similar size all the way out to the Oort cloud, a vague and diffuse assemblage of protocomets and primordial, frozen riffraff a trillion miles from the sun, they said. The prospect of finding a black hole in our own solar system “is as startling as finding evidence that someone might be living in the shed in your backyard,” Dr. Loeb said in the email. “If so, who is it, and how did it get there?” Read more of this story at Slashdot.
<urn:uuid:989fbcd4-18b1-4f9c-8c4b-74f8e2d8182c>
CC-MAIN-2021-25
https://www.4boca.com/nralink/is-planet-nine-a-black-hole/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626465.55/warc/CC-MAIN-20210617011001-20210617041001-00264.warc.gz
en
0.941715
687
3.296875
3
[ 447, 250, 33751, 10051, 893, 291, 1023, 423, 2904, 9258, 289, 19775, 3352, 284, 1064, 503, 655, 703, 7650, 11397, 16431, 1244, 307, 11, 447, 251, 3136, 262, 968, 1971, 3782, 13, 5882, 12, 2435, 26616, 26518, 9173, 277, 993, 81, 13645, 12, 13645, 7303, 511, 989, 25, 4900, 340, 318, 2192, 4601, 913, 3612, 11, 617, 33162, 24351, 326, 257, 2042, 7604, 743 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Sinclair FTV1/TV80 flat-screen pocket television, 1981. © National Media Museum / Science & Society Picture Library Designed by British inventor Clive Sinclair (b 1940), this flat-screen, multi-standard UHF pocket television measures just three and a half inches high by five and a half inches long and is only one inch wide (9cm x 14cm x 2.5cm). It used a specially designed cathode ray tube (CRT) in the side of the television. A strong electric field deflected the electron beam through 90 degrees to create a picture on the two inch (4.7cm) phosphor screen. The TV80 (so named because of its retail price of £80) was released in the UK in 1981 but was not a commercial succes. Although the technology was impresive, its narrow viewing angle made it awkward to watch and only about 15,000 were sold.
<urn:uuid:7c94e25d-3b9b-48c4-8764-048c91d1d640>
CC-MAIN-2016-44
http://www.ssplprints.com/image/92334/sinclair-ftv1-tv80-flat-screen-pocket-television-1981
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.54/warc/CC-MAIN-20161020183841-00073-ip-10-171-6-4.ec2.internal.warc.gz
en
0.949271
190
3.046875
3
[ 46200, 27659, 376, 6849, 16, 14, 6849, 1795, 6228, 12, 9612, 10000, 5581, 11, 14745, 13, 198, 16224, 2351, 6343, 9594, 1220, 5800, 1222, 7023, 17741, 10074, 198, 5960, 3916, 416, 3517, 33475, 47722, 34927, 357, 65, 16236, 828, 428, 6228, 12, 9612, 11, 5021, 12, 20307, 471, 29567, 10000, 5581, 5260, 655, 1115, 290, 257, 2063, 8331, 1029, 416, 1936, 290, 257, 2063 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SpeQ is a small, extensive mathematics program with a simple, intuitive interface. You can freely add, edit and execute calculations and plot graphs of your functions. GCSE chemistry website Best for College Prep and Chem 115 students GCSE Chemistry from the BBC Best for College Prep and Chem 115 Search millions of out-of-print books offered by thousands of booksellers all over the world. New Scientist - a weekly general The Journal of Visualized Experiments showing how scientists did their experiments The science of living longer - a video A boy who knows π to 25000 decimal places. by Bob Park - exposes bad science Evolution v. Creationism Is evolution a blind watchmaker? Physics and Human Behaviour Can physics be used to predict human behaviour? Weird things with Sound and Starch This Parrott Can Count! When rockets go wrong they go wrong big time! British comedy actor interviews a panel of scientists. How do electrons get across nodes?
<urn:uuid:0a6b70a7-e974-412d-8a01-56dad083fc06>
CC-MAIN-2018-47
http://fbanks.info/links.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744803.68/warc/CC-MAIN-20181119002432-20181119024432-00167.warc.gz
en
0.777753
221
3
3
[ 5248, 48, 318, 257, 1402, 11, 7667, 19473, 1430, 351, 257, 2829, 11, 19933, 198, 39994, 13, 921, 460, 12748, 751, 11, 4370, 290, 12260, 16765, 290, 7110, 198, 34960, 82, 286, 534, 5499, 13, 198, 15916, 5188, 16585, 3052, 198, 13014, 329, 5535, 19141, 290, 12870, 12279, 2444, 198, 15916, 5188, 27867, 422, 262, 7823, 198, 13014, 329, 5535, 19141, 290, 12870, 12279 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The following post comes from a new eBook, Blockchains in the Mainstream, which features 33 of the top thinkers, entrepreneurs, and investors in the world of decentralized systems. You can read all of the entries from the “Blockchain Dream Team” in the FREE PDF here. Blockchain technology is an interesting social phenomena. How Bitcoin, an open source project with an anonymous creator, combined several ideas together and built an alternative financial system that challenges banks and proved to be more resilient and secure than they first realized. That sparked a discussion across industries and provided a glimpse of how companies can use the public internet rails to move value and investments soon followed. For a lot of people this reminds them of the early days of the Internet where investments poured into companies that worked on applying Internet technology for existing players in industries like Telcos. But as the 2000’s bubble burst, it was apparent that Internet companies didn’t reach the anticipated mass adoption and couldn’t meet their earning expectations. This only came several years later, when companies like Facebook and Google showed us how to make money from information and billions of dollars started pouring into new Internet companies. Telecom companies became ISP’s. Retailers moved online and newspapers became blogs. This came from a deep understanding of the long term underlying benefit of the technology, to connect people together on open platforms. Like with the Internet, blockchain technology is a simple idea – Choose an open source standard for a specific use-case, build a shared ledger, and bring all the participants to use the ledger. The tipping point for blockchain technology, is when it will create new business models like the Internet did. The first companies that will prove those models to work will create a huge shift in the business world – from ledger operators that independently control centralized silos of information to a world where outdated business models just don’t work because technology has surpassed them. But this won’t be an overnight change – blockchain currently lives in an intersection between coders, governments and corporations. Each stakeholder needs to be an active player in the debate in order for the technology to evolve and it requires a fresh realization that those who won’t be a part of the discussion are going to be replaced. So my suggestion for startups is to work towards getting a seat at this table and focus on the long term benefits of this technology – changing old business models.
<urn:uuid:c299071f-1129-4da6-b23d-ee9e56a682c8>
CC-MAIN-2017-22
https://www.neverstopmarketing.com/new-business-models-tipping-point/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609605.31/warc/CC-MAIN-20170528062748-20170528082748-00095.warc.gz
en
0.937214
493
2.546875
3
[ 464, 1708, 1281, 2058, 422, 257, 649, 46566, 11, 9726, 38861, 287, 262, 8774, 5532, 11, 543, 3033, 4747, 286, 262, 1353, 30504, 11, 17038, 11, 290, 7713, 287, 262, 995, 286, 26512, 3341, 13, 198, 1639, 460, 1100, 477, 286, 262, 12784, 422, 262, 564, 250, 12235, 7983, 7610, 4816, 447, 251, 287, 262, 17189, 12960, 994, 13, 198, 12235, 7983, 3037, 318 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
The jersey is sometimes called a sweater because, during hockey's early years, players actually wore sweaters and not the mesh-like jerseys of today. How are the markings applied to the ice? The markings (lines, circles, creases, etc.) are painted onto a half-inch thick sheet of ice, which is sprayed onto a concrete floor that has frozen pipes imbedded. An additional coating is applied to secure the markings and build the ice up to the prescribed thickness. Why is the red line broken? In the days of black and white television it was difficult to differentiate between the red and blue lines, hence the broken red line. Rickard was told that the French players on the team came from the farms and that they were therefore "habitants" or "habs". At the time, the Canadiens were recognized as the French team of Montreal as opposed to the Montreal Maroons, the English team. On a side note, the Montreal logo of the C wrapped around the H stands for Club de Hockey Canadien. In 1917, at the founding of the NHL, the Canadiens changed their name to that from the previous Club Athletique Canadien. The survivors of a league that had grown at times to as many as 10 franchises, and had seen teams change names and cities with regularity in the 1920's and 30's, would settle in an era of stability, known as the age of the "Original Six." The Red Wings, the Blackhawks, the Rangers, the Canadiens, the Bruins, and the Leafs; these few teams would symbolize hockey for fans across North America. Games in the NHL The first NHL games were played on December 19, 1917. The Montreal Wanderers defeated the Toronto Arenas, 10-9, and the Montreal Canadiens defeated the Ottawa Senators, 7-4. |Billy Smith, NYI||Nov 28, 1979||@ Colorado||NYI 4, COL 7| |Ron Hextall, PHI||Dec 8, 1987||vs Boston||BOS 2, PHI 5| |Ron Hextall, PHI||Apr 11, 1989 *||@ Washington||PHI 8, WAS 5| |Chris Osgood, DET||Mar 6, 1996||@ Hartford||DET 4, HFD 2| |Martin Brodeur, NJD||Apr 17, 1997 *||vs Montreal||MTL 2, NJD 5| |Damian Rhodes, OTT||Jan 2, 1999||vs New Jersey||NJD 0, OTT 6| |Martin Brodeur, NJD||Feb 15, 2000||vs Philadelphia||PHI 2, NJD 4| |Jose Theodore, MTL||Jan 2, 2001||@ NY Islanders||MTL 3, NYI 0| |Evgeni Nabokov, SJS||Mar 10, 2002||@ Vancouver||SJS 7, VAN 4| |Mika Noronen, BUF||Feb 14, 2004||@ Toronto||BUF 6, TOR 4| |Chris Mason, NAS||Apr 15, 2006||vs Phoenix||NAS 5, PHX 1| Goalie with a mask Clint Benedict was the first goalie to ever wear a mask, after a shot by Howie Mornez knocked him unconscious back in 1927. The mask was made out of leather, but when wearing it he could not see low shots, so it didn't last. It wasn't until November 1, 1959, when Jaques Plante of the Montreal Canadians became the second goalie to put on a mask. Plante had been using his self made creations during practice but knew it wasn't an accepted idea to use one in a real game. However, when Andy Bathgate's shot clipped him in the head, Plante refused to go back on the ice without a mask. After a long fight Toe Blake, the Canadians' coach, let him wear it and the rest is history. Goalie without a mask Andy Brown, then with the Pittsburgh Penguins, 1973-74. Goalie and team captain to win the Cup Charlie Gardiner, Chicago Black Hawks, 1933-34. Player from the U.S.A. The first United States-born NHL player was Billy Burch, who was born in Yonkers, NY, on November 20, 1900. He played for the Hamilton Tigers, the New York Americans,the Boston Bruins, and the Chicago Blackhawks. Pulling the goalie It was the New York Rangers who first pulled their goaltender for an extra skater, either 1939-40 or 1940-41. Frank Boucher, the club's coach at the time is generally credited with the innovation. Sudden death overtime Sudden death OT was a regular feature of the NHL going back as far as the 1930s. Because of wartime restrictions on train travel, it was discontinued in 1942. Modern day overtime was re-introduced for the 1983-84 season. Woman to play an NHL game On Wednesday, September 23rd, 1992, Manon Rheaume made sports history by being the first woman to play in one of the four major sports leagues in the United States. She goaltended for the Tampa Bay Lightning of the National Hockey League in a pre-season game against the St. Louis Blues. Two Detroit brothers, Pete and Jerry Cusimano, who were fishmongers in the Eastern Market, threw one on the ice at Olympia Stadium. Each tentacle of the octopus was symbolic of a win in the playoffs. Back then, the NHL consisted of just the original six teams, and eight wins (two best-of-seven series) were needed to win the Stanley Cup. The Red Wings swept the series that year, and the octopus has come to be the good luck charm ever since. The tradition carried over to Joe Louis Arena on opening night in 1979 when several of the cephalopods found their way onto the ice. During the 1995 playoffs, Bob Dubisky and Larry Shotwell, co-workers at a meat and seafood retail company near Detroit, tossed a 38-pound octopus onto the ice during the National Anthem prior to Game 1 of the Western Conference Finals. The year after, the duo struck again with a 50-pounder in the Conference Finals. Although the feat received no air time on the nationally broadcast game, the octopus was proudly displayed on the hood of the Zamboni between periods. When a player scores his third goal of a game, fans usually throw hats on the ice. Rumor has it that a Toronto haberdasher gave players in the 1940s free hats if they would score three goals in a game. The term however, probably evolved from cricket. In 1858 a cricket player in England took three wickets with consecutive balls, an incredible trick. As a reward, his club gave the bowler a new hat, hence the name "hat trick". A natural hat trick is when a player scores three goals in a game, in a row. That is to say that no other player on either team scores in between. The Stanley Cup The Stanley Cup, the oldest trophy which professional athletes in North America vie for, is hockey's crown jewel, and some say, the Holy Grail of sports. It contains the names of every team -- and most of the players -- who have won since 1893. The Cup weighs 36 pounds and stands 35 1/4 inches high.
<urn:uuid:72b03763-fb0b-425a-9b28-183a34be5cb7>
CC-MAIN-2014-10
http://www.nhl.com/ice/page.htm?id=26376
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010779425/warc/CC-MAIN-20140305091259-00067-ip-10-183-142-35.ec2.internal.warc.gz
en
0.966684
1,534
2.796875
3
[ 464, 22383, 318, 3360, 1444, 257, 35685, 780, 11, 1141, 12217, 338, 1903, 812, 11, 1938, 1682, 12408, 3490, 8605, 290, 407, 262, 19609, 12, 2339, 36354, 286, 1909, 13, 198, 2437, 389, 262, 30390, 5625, 284, 262, 4771, 30, 198, 464, 30390, 357, 6615, 11, 13332, 11, 1126, 1386, 11, 3503, 2014, 389, 13055, 4291, 257, 2063, 12, 8589, 6546, 9629, 286, 4771 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
We have come at the end. The last hanja of the 8th Hanja level we will discuss is 長 [장]. It is one of the hanja characters that has two very different uses. One of those uses will remind you in a way of the character 人 [인] (person). Let’s take a gander at our final hanja, shall we? Hanja #50: 長 – 길 장, 어른 장 長 [장] is a hanja that has two distinct meanings and as such it has two 음훈. The first meaning it can represent is ‘length’ and the second meaning is ‘adult’. Because of those meanings the vocabulary that uses the hanja can have completely different meanings. One group will have to do with the length of things, while the other group of vocabulary are all persons, many of them occupations. So as you can imagine it is an interesting character to know. With this we have come at the end of our journey through all 50 hanja that make up the 8th hanja level. These hanja are in a way important to know as it can help you understand words you do not actively know. However, the vocabulary we give with each hanja in hangeul is, of course, always more important. If you happen to know any other word you think has this hanja, let us know in the comments. Our 長 Vocabulary List *Meanings written in italics are the meanings when you use the noun as a 하다 verb. |생장||Growth and development||生長|
<urn:uuid:47c2246e-09de-4eb1-9a0e-0b573c7373ea>
CC-MAIN-2019-43
https://www.morninglands.com/hanja-word-drill-%E9%95%B7-%EA%B8%B8-%EC%9E%A5-%EC%96%B4%EB%A5%B8-%EC%9E%A5/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986648481.7/warc/CC-MAIN-20191014003258-20191014030258-00169.warc.gz
en
0.949546
381
3.0625
3
[ 1135, 423, 1282, 379, 262, 886, 13, 383, 938, 289, 272, 6592, 286, 262, 807, 400, 9530, 6592, 1241, 356, 481, 2112, 318, 16268, 243, 115, 685, 168, 252, 98, 4083, 632, 318, 530, 286, 262, 289, 272, 6592, 3435, 326, 468, 734, 845, 1180, 3544, 13, 1881, 286, 883, 3544, 481, 7101, 345, 287, 257, 835, 286, 262, 2095, 220, 21689, 685, 35975 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Black Lives Matter in Teaching Mathematics for Social Justice Prior to becoming a mathematics educator, I was a teacher in Prince George’s County, Maryland. Because of the success I experienced with culturally relevant pedagogy (CRP), it became part of my research agenda along with teaching mathematics for social justice (TMfSJ). Databases like 23andme and Ancestry can be used as a context for CRP and TMfSJ. Data related to education, occupation, military service, and voting records can be accessed online. Our ancestors’ experiences can shape our identity and serve as powerful tools for contextualizing mathematics. The stories and counterstories of African Americans can be problematized to show Black lives matter. Akom, A. (2011). Eco-apartheid: Linking environmental health to educational outcomes. Teach-ers College Record, 113(4), 831–859. Gutstein, E. (2013). Understanding the mathematics of neighborhood replacement. In E. Gutstein & B. Peterson (Eds.), Rethinking mathematics: Teaching mathematics by the numbers (2nd ed., pp. 101–109). Rethinking Schools. Haley, A. (1976). Roots: The saga of an American family. Doubleday. Hill, M. L. (2016). Nobody: Casualties of America’s war on the vulnerable from Ferguson to Flint and beyond. Atria Books. Himmelstein, K. (2013). Racism and Stop-and-Frisk. In E. Gutstein & B. Peterson (Eds.), Re-thinking mathematics: Teaching mathematics by the numbers (2nd ed., pp. 122–128). Re-thinking Schools. Ladson-Billings, G. (2017). “Makes me wanna holler”: Refuting the “culture of poverty” dis-course in urban schooling. The ANNALS of the American Academy of Political and Social Science, 673(1), 80–90. https://doi.org/10.1177%2F0002716217718793 Leonard, J. (2019). Culturally specific pedagogy in the mathematics classroom: Strategies for teachers and students (2nd ed.). Routledge. https://doi.org/10.4324/9781351255837 Rothstein, R. (2017). No Blacks allowed. The Crisis Magazine, 124(3), 12–17. Taylor, K-Y. (2016). From #BlackLivesMatter to Black liberation. Haymarket Books. Copyright (c) 2020 Jacqueline Leonard This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. The copyright for articles in JUME is held by the individual. By virtue of their appearance in this open access journal, articles are free to use with proper attribution in educational and other non-commercial settings.
<urn:uuid:102b73d5-de7f-4b6c-a560-8805518f6a69>
CC-MAIN-2020-50
https://jume-ojs-tamu.tdl.org/jume/index.php/JUME/article/view/404
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176922.14/warc/CC-MAIN-20201124170142-20201124200142-00443.warc.gz
en
0.843193
610
3.28125
3
[ 9915, 18965, 16900, 287, 38094, 39448, 329, 5483, 4796, 198, 22442, 284, 5033, 257, 19473, 45562, 11, 314, 373, 257, 4701, 287, 9005, 4502, 447, 247, 82, 3418, 11, 10769, 13, 4362, 286, 262, 1943, 314, 5924, 351, 30573, 5981, 7190, 363, 9868, 357, 9419, 47, 828, 340, 2627, 636, 286, 616, 2267, 8666, 1863, 351, 7743, 19473, 329, 1919, 5316, 357, 15972, 69 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
- NEW YORK (Reuters Health) - The elements copper and zinc may prompt prions -- the infectious proteins that cause "mad cow disease" and similar fatal neurological diseases -- to change shape, leading to the generation of different strains of prions. - The finding, from a study conducted by Dr. Jonathan D.F. Wadsworth of the Imperial College School of Medicine at St. Mary's in London, UK, and colleagues, suggests that drugs that control copper levels in the brain might be useful in treating prion disorders, such as Creutzfeldt-Jakob disease (CJD), which currently have no known treatment or cure, according to the report in the May issue of Nature Cell - Prion disorders -- including bovine spongiform encephalopathy, or "mad cow disease" in cattle, CJD in humans, and scrapie in sheep -- are all characterized by progressive neurological degeneration resulting in death. - These diseases are caused by a prion, an abnormal version of a naturally-occurring protein, but researchers have recognized different strains of prions that differ in incubation times, symptoms, and severity of illness. - The researchers came to the conclusion by studying two different human prion types that result in subtypes of CJD. There are four different types of CJD, including a new variant that has appeared in young adults in recent years in the UK and France, and is believed by some experts to be linked to consumption of cattle infected with bovine spongiform encephalopathy. - Wadsworth's team studied types 1 and 2 of classical CJD -- rare disorders that tend to strike in middle-age or later, causing dementia, muscle wasting, and involuntary movements. Type 1 tends to be more aggressive and death often occurs about 2 months after symptoms begin, while people with type 2 tend to survive for about - In laboratory studies, the researchers found that one prion type could be converted into another in the presence of the copper or zinc ions. - The finding has "widespread implications" for both the classification and the study of prion diseases in humans and animals, the authors conclude. - SOURCE: Nature Cell Biology 1999;1:55-59.
<urn:uuid:cc0bc931-28a1-4b05-b5ac-fce665064f39>
CC-MAIN-2016-44
http://rense.com/health2/Copper.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.65/warc/CC-MAIN-20161020183838-00133-ip-10-171-6-4.ec2.internal.warc.gz
en
0.916818
489
3.5
4
[ 12, 12682, 28154, 357, 12637, 3893, 8, 532, 383, 4847, 15317, 290, 31861, 743, 6152, 778, 507, 198, 438, 262, 25246, 15568, 326, 2728, 366, 9937, 9875, 4369, 1, 290, 2092, 198, 69, 10254, 30232, 10040, 1377, 284, 1487, 5485, 11, 3756, 284, 262, 5270, 198, 1659, 1180, 21245, 286, 778, 507, 13, 198, 12, 383, 4917, 11, 422, 257, 2050, 5952, 416, 198 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
What is Photoshop? Photoshop is a photo editing and graphic design software. It is developed by Adobe Systems for MacOS and Windows. This is a photoshop basics for designers in the latest version of adobe photoshop CC with Guru99. We are going to cover a lot of features which are commonly used by each and every designers to create some composites or any design or to make any illustrations or even just doing some simple retouching. So we are going to cover some most common features like workspace, layers, smart objects, blend modes, selections techniques, filters and much more necessary features that every designers use to work on photoshop. Now we will go to start with the first topic about workspace. We will see in this how we can setup our photshop to our best useful workflow, because there are so many industries which use photoshop in so many different ways for their specific purpose. So let's get started and talk about workspace in photoshop CC. Learn more about Photoshop CC Click here if the video is not accessible
<urn:uuid:ad1772d2-4fba-48a0-9ea2-027176544446>
CC-MAIN-2019-04
https://www.guru99.com/introduction-to-photoshop-cc.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583728901.52/warc/CC-MAIN-20190120163942-20190120185942-00113.warc.gz
en
0.953547
217
2.609375
3
[ 2061, 318, 29153, 30, 198, 27248, 25444, 318, 257, 4590, 12857, 290, 13028, 1486, 3788, 13, 632, 318, 4166, 416, 21771, 11998, 329, 4100, 2640, 290, 3964, 13, 198, 1212, 318, 257, 2825, 25444, 19165, 329, 15441, 287, 262, 3452, 2196, 286, 512, 5910, 2825, 25444, 12624, 351, 38749, 2079, 13, 198, 1135, 389, 1016, 284, 3002, 257, 1256, 286, 3033, 543, 389, 8811 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Institutional accreditation can seem daunting, but becoming involved in your school’s accreditation process is a great way to demonstrate how information literacy initiatives support institutional student learning outcomes. If you’ve ever tried to find a library self-study or institutional report, you know that locating these documents can be challenging and time consuming. To solve this problem, the ACRL Student Learning and Information Literacy Committee has collected a set of resources and examples to aid librarians in documenting and reporting their information literacy work for inclusion in self-study reports that serve as the basis for accreditation (and re-accreditation). Resources are grouped by regional accreditation agency, and include links to accreditation documents submitted by various institutions and, in some cases, contact information for individuals who are willing to answer library-related accreditation questions. By providing examples and support, we hope to inspire instruction librarians to use the accreditation process to showcase the alignment of library and institutional missions. Please help the ACRL Student Learning and Information Literacy Committee expand this collection of resources. If you have documentation to contribute or would like to be listed as a resource, please contact Sharon Holderman at firstname.lastname@example.org.
<urn:uuid:0417e60e-d858-4cab-b798-c35ca8dfe8f0>
CC-MAIN-2019-04
https://www.acrl.ala.org/acrlinsider/archives/10998
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662863.53/warc/CC-MAIN-20190119074836-20190119100836-00286.warc.gz
en
0.929268
250
2.515625
3
[ 6310, 5677, 697, 42845, 460, 1283, 30496, 11, 475, 5033, 2950, 287, 534, 1524, 447, 247, 82, 697, 42845, 1429, 318, 257, 1049, 835, 284, 10176, 703, 1321, 31231, 15446, 1104, 15855, 3710, 4673, 10906, 13, 1002, 345, 447, 247, 303, 1683, 3088, 284, 1064, 257, 5888, 2116, 12, 44517, 393, 15855, 989, 11, 345, 760, 326, 42139, 777, 4963, 460, 307, 9389, 290 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
A bond is an investment that is actually used to borrow money from investors with the promise of a return. A bond has a pre-determined term and the value of that bond can fluctuate over time. When investors attempt to get an accurate view of the value of a bond, they use the yield to maturity (YTM). There are many calculations used to determine the rate of return on a bond, but YTM gives investors a more accurate figure to go by. Yield To Maturity Since bonds are long-term investments, most investors use yield to maturity (YTM) to establish a more accurate idea of the return they will get. The YTM shows how much the bond will yield if it is allowed to go to maturity and all payments are made. To calculate the actual YTM, you would have to use a long formula that does an individual calculation for each year and then brings those numbers together into one percentage. But financial experts have created an approximate YTM formula that is widely used throughout the financial industry. That formula is: Approximate YTM = (Monthly Payment + (Face Value – Price Paid) / Full Term)) / ((Face Value + Price Paid) / 2) If we had an annual payment of $5.00 for the bond example we used earlier, the formula would be: ($5.00 + ($50.00 – $38.90) / 10)) / ((50.00 + 38.90) / 2) = 13.74 percent. The YTM is much higher than the current yield because the YTM takes into account the entire yield of the bond. The YTM also shows the real reward for being able to buy a bond at such a discount off of its face value. Why Use YTM? The YTM takes into account price fluctuations and changes in interest income over the full life of the bond. The long-term nature of a bond investment makes calculating annual returns misleading. When an investor chooses to reinvest their interest back into their bond each year, which most do, then the annual calculations become unreliable. For a bond, the face value is not going to change throughout its life. A bond can be a very steady and reliable investment, but investors always want to see how their money will do in the future based on current projections. The YTM offers the clearest picture for investors to show potential future performance based on the information currently known. Investors use several complicated mathematical formulas to determine the true yield of bonds, but the YTM remains the one number that helps investors to get a better feel for how well their investment will truly do.
<urn:uuid:e7038f83-829d-4eaa-af59-7894e5f1df6f>
CC-MAIN-2018-26
https://www.encyclopedia.com/articles/how-to-calculate-bond-yields-to-maturity/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864172.45/warc/CC-MAIN-20180621133636-20180621153636-00072.warc.gz
en
0.948536
540
3.40625
3
[ 32, 6314, 318, 281, 4896, 326, 318, 1682, 973, 284, 8804, 1637, 422, 7713, 351, 262, 6991, 286, 257, 1441, 13, 317, 6314, 468, 257, 662, 12, 67, 23444, 3381, 290, 262, 1988, 286, 326, 6314, 460, 19180, 4985, 625, 640, 13, 1649, 7713, 2230, 284, 651, 281, 7187, 1570, 286, 262, 1988, 286, 257, 6314, 11, 484, 779, 262, 7800, 284, 24841, 357 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
We are searching data for your request: Upon completion, a link will appear to access the found materials. O bulb (or ablonga medulla) is the organ that is in direct contact with the spinal cord, is the passageway of nerves to the organs located higher up. In the bulb are located cell bodies of neurons that control vital functions, like the heart beats, O breathing rhythm and the blood pressure. It also contains cell bodies of neurons related to swallowing, coughing and vomiting control. Organ that regulates balance and the body posture in the environment. It is linked to peripheral receptors located in the inner ear (maze) that send messages to the balance control center located in the cerebellum. The success of a tightrope walker who crosses two buildings, supported by a simple wire stretched between them, depends on good cerebellar activity. Attention! Alcohol interferes with cerebellar activities, which is easy to notice in people who abuse alcohol. Brain organ formed mainly by the thalamus and hypothalamus. The hypothalamus contains control centers of the body temperature, of appetite, gives thirst, sleep and certain emotions. Main intermediate between the nervous system and the hormonal system, the hypothalamus is linked to the pituitary gland, the main endocrine gland. When the hypothalamus detects changes in the body, it releases neurotransmitters that act on the pituitary gland. In turn, it releases or inhibits the secretion of its own hormones that regulate various metabolic activities. It's the center of intellect, gives memory, gives consciousness and from language. It controls our sensations and motor functions. About 70% of brain nerve cells are located in the brain, the most developed part of our nervous system and is separated into two hemispheres, joined together by a region known as the corpus callosum. Each cerebral hemisphere, in turn, has innumerable invaginations called grooves. Deeper grooves divide each hemisphere into four regions called lobes: the frontal, the parietal, the temporal, and the occipital. The central groove is the most pronounced and separates the frontal and parietal lobes. The surface of the brain, from 2mm to 4mm thick, is known as the cerebral cortex, and consists of several layers of cell bodies of millions of neurons, giving this region a grayish color from which it dominates. gray matter of the brain. At fibers (axons and dendrites) of neurons that leave and reach the cerebral cortex are located more internally, and constitute the white matter of the brain, due to the existence of myelin that surrounds these fibers.
<urn:uuid:f2373980-109d-440b-8d31-2eb17712c3de>
CC-MAIN-2022-21
https://au.standardtoday.co.uk/494-main-organs-of-central-nervous-system.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662552994.41/warc/CC-MAIN-20220523011006-20220523041006-00673.warc.gz
en
0.940797
562
3.46875
3
[ 1135, 389, 10342, 1366, 329, 534, 2581, 25, 198, 23792, 11939, 11, 257, 2792, 481, 1656, 284, 1895, 262, 1043, 5696, 13, 198, 46, 28287, 357, 273, 450, 6511, 64, 1117, 47972, 8, 318, 262, 1618, 326, 318, 287, 1277, 2800, 351, 262, 26234, 15050, 11, 318, 262, 1208, 363, 16172, 286, 25377, 284, 262, 16613, 5140, 2440, 510, 13, 198, 818, 262, 28287 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Violent conflict has enormous human, environmental and material costs, affecting those within disputing areas and impacting stability across borders. Once violence breaks out, the chances for successful diplomatic engagement diminish, leaving costly and more unpredictable alternatives. Effective prevention requires early action to address the root and proximate causes of conflict. Root causes of conflict are the underlying socio-economic, cultural, and institutional factors which create conditions for tensions, group mobilisation and potential violence. Recurring root causes include poor governance, systematic discrimination, lack of political participation, unequal economic opportunity, and grievances over natural resource allocation Proximate causes contribute to the escalation of tensions and create an immediate enabling environment for violence. They are usually symptoms of deeper (i.e. root) problems. Examples include human rights abuses, small arms proliferation, worsening economic conditions, aggressive rhetoric, and violent incidents. Specific triggers can include elections, military coup, assassination, or legislative reform which negatively affects particular groups.
<urn:uuid:4fdb1c96-3a90-4d4d-b4c4-198f6f960a6f>
CC-MAIN-2015-22
http://www.iqdiplomacy.org/iqd-approach/prevention
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928817.29/warc/CC-MAIN-20150521113208-00055-ip-10-180-206-219.ec2.internal.warc.gz
en
0.89979
192
3.578125
4
[ 33894, 298, 5358, 468, 9812, 1692, 11, 6142, 290, 2587, 3484, 11, 13891, 883, 1626, 595, 48074, 3006, 290, 40288, 10159, 1973, 11637, 13, 4874, 3685, 9457, 503, 11, 262, 8395, 329, 4388, 13093, 12352, 29889, 11, 4305, 16378, 290, 517, 22900, 14693, 13, 29455, 14196, 4433, 1903, 2223, 284, 2209, 262, 6808, 290, 14793, 1920, 5640, 286, 5358, 13, 198, 30016, 5640, 286 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Prof. Hensinger (right) and Dr Lekitsch (left) with a quantum computing blueprint model behind a quantum computer prototype at the University of Sussex. Credit: University of Sussex An international team, led by a scientist from the University of Sussex, have today unveiled the first practical blueprint for how to build a quantum computer, the most powerful computer on Earth. This huge leap forward towards creating a universal quantum computer is published today (1 February 2017) in the influential journal ‘Science Advances’. It has long been known that such a computer would revolutionise industry, science and commerce on a similar scale as the invention of ordinary computers. But this new work features the actual industrial blueprint to construct such a large-scale machine, more powerful in solving certain problems than any computer ever constructed before. Once built, the computer’s capabilities mean it would have the potential to answer many questions in science; create new, lifesaving medicines; solve the most mind-boggling scientific problems; unravel the yet unknown mysteries of the furthest reaches of deepest space; and solve some problems that an ordinary computer would take billions of years to compute. The work features a new invention permitting actual quantum bits to be transmitted between individual quantum computing modules in order to obtain a fully modular large-scale machine capable of reaching nearly arbitrary large computational processing powers. Previously, scientists had proposed using fibre optic connections to connect individual computer modules. The new invention introduces connections created by electric fields that allow charged atoms (ions) to be transported from one module to another. This new approach allows 100,000 times faster connection speeds between individual quantum computing modules compared to current state-of-the-art fibre link technology. Find your dream job in the space industry. Check our Space Job Board » The new blueprint is the work of an international team of scientists from the University of Sussex (UK), Google (USA), Aarhus University (Denmark), RIKEN (Japan) and Siegen University (Germany). Prof Winfried Hensinger, head of Ion Quantum Technology Group at the University of Sussex, who has been leading this research, said: “For many years, people said that it was completely impossible to construct an actual quantum computer. With our work we have not only shown that it can be done but now we are delivering a nuts and bolts construction plan to build an actual large-scale machine.” Lead author Bjoern Lekitsch, also from the University of Sussex, explains: “It was most important to us to highlight the substantial technical challenges as well as to provide practical engineering solutions”. As a next step, the team will construct a prototype quantum computer, based on this design, at the University. The effort is part of the UK Government’s plan to develop quantum technologies towards industrial exploitation and makes use of a recent invention by the Sussex team to replace billions of laser beams required for quantum computing operations within a large-scale quantum computer with the simple application of voltages to a microchip. Prof Hensinger said: “The availability of a universal quantum computer may have a fundamental impact on society as a whole. Without doubt it is still challenging to build a large-scale machine, but now is the time to translate academic excellence into actual application building on the UK’s strengths in this ground-breaking technology. I am very excited to work with industry and government to make this happen.” The computer’s possibilities for solving, explaining or developing could be endless. However, its size will be anything but small. The machine is expected to fill a large building, consisting of sophisticated vacuum apparatus featuring integrated quantum computing silicon microchips that hold individual charged atoms (ions) using electric fields. The blueprint to develop such computers has been made public to ensure scientists throughout the world can collaborate and further develop this brilliant, ground-breaking technology as well as to encourage industrial exploitation. Source: University of Sussex
<urn:uuid:17ac4623-7f03-4e41-a224-e1f66ce96a93>
CC-MAIN-2021-49
https://sciencebulletin.org/first-ever-blueprint-unveiled-to-construct-a-large-scale-quantum-computer/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362999.66/warc/CC-MAIN-20211204154554-20211204184554-00206.warc.gz
en
0.92067
816
3.625
4
[ 15404, 13, 367, 641, 3889, 357, 3506, 8, 290, 1583, 406, 988, 48279, 357, 9464, 8, 351, 257, 14821, 14492, 30881, 2746, 2157, 257, 14821, 3644, 14879, 379, 262, 2059, 286, 41588, 13, 10504, 25, 2059, 286, 41588, 198, 2025, 3230, 1074, 11, 2957, 416, 257, 11444, 422, 262, 2059, 286, 41588, 11, 423, 1909, 18475, 262, 717, 8472, 30881, 329, 703, 284, 1382 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
Boiler room at Jay Peak, slated for conversion to compressed natural gas / GLENN RUSSELL/Free Press File Natural gas lines, Burlington / JOEL BANNER BAIRD/Free Press Flurries, gas meters in Burlington / JOEL BANNER BAIRD/Free Press Late last year, New York and six other states sued the U.S. EPA, demanding the agency set standards for methane, the volatile greenhouse gas that is released by a practice heralded by the fuels industry as a climate change solution: hydraulic fracturing or “fracking.” The states sued for standards on methane emissions from fracking and related operations connected with extracting and transporting natural gas located deep underground. In 2014, the EPA faces a choice: It can either defend its decision not to set standards for methane in court or agree to a settlement that would establish a timetable for developing regulations to strictly limit and monitor methane emissions. Its decision could have major consequences for the gas industry as well as the climate. News that the planet’s atmosphere surpassed 400 ppm carbon dioxide for the first time in 3 million years has intensified calls from climate scientists to “decarbonize” the energy sector as fast as possible. Even marginal attempts to lower CO2 emissions, including “bridge technologies” — fuels that produce less CO2 that might displace dirtier coal while cleaner sources including wind and solar are brought on line — have become attractive. Natural gas, which burns cleaner than oil and coal, is regarded by experts as the perfect bridge fuel. Technological innovations have greatly increased the efficiency and cost-competiveness of fracking, allowing natural gas extraction from deep shale formations previously considered not profitable. The Energy Information Administration predicts that 46 percent of the United States’ natural gas supply will come from shale gas by 2035. However, an over-reliance on gas creates very real risks to the goal of avoiding the worst consequences of climate change this century. First, methane leaks, the issue in the multi-state litigation, pose a major threat because methane has a global warming potential 32 times greater than carbon dioxide over a 100-year period and 86 times over a 20-year period. Small differences in leakage rates make a huge difference in the climate impacts of gas. Unfortunately, as demonstrated in a recently published study in the Proceedings of the National Academy of Science (PNAS), we do not have a good handle on actual leakage rates for methane. According to the PNAS study, actual emissions may be twice as high as the EPA estimates. Various studies using different methodologies have calculated rates, with results ranging from 1.5 percent to 9 percent. At an 8 percent leakage rate, natural gas’s contribution to climate change is actually worse than coal’s. There is not only a need for better data, but also a need for better regulation. The EPA has the authority under the Clean Air Act to regulate methane emissions from oil and gas operations but it has so far declined to exercise it, opting instead to set standards for volatile organic compounds that will have the incidental benefit of reducing methane at new wells. Unfortunately, existing natural gas wells, including those built recently for the purpose of fracking (which number in the hundreds of thousands), are not covered. Even if methane leaks are contained, natural gas could do more harm than good by delaying the transition to cleaner, more efficient forms of energy. Cutting emissions by a factor of three or four hardly makes any difference in terms of preventing dangerous increases in global temperature. According to respected climate scientists like Ken Caldeira, emissions must be cut by a factor of ten or twenty times to avoid a significant amount of warming this century. At best, natural gas is a short-term transitional fuel that should see peak use no later than 2030. A major investment in gas threatens to create yet another carbon lock-in unless steps are taken to use gas as leverage. Encouraging utilities to replace aging, dirty coal plants with cleaner, more efficient gas plants is a net benefit for the environment, but this must be accompanied by more aggressive investments in energy efficiency and renewables. Gas may seem cheap today, but gas prices are notoriously volatile. Renewable energy’s zero-fuel-cost operates as a hedge against price fluctuations. Power systems must balance gas and renewables to take advantage of cheap gas while simultaneously ensuring against fuel price spikes. Aside from potential climate impacts, fracking raises more immediate issues, including local air pollution, groundwater contamination, earthquakes and habitat fragmentation. These effects can be managed through effective regulation and best practices. However, fracking is currently exempted from eight different federal environmental laws, and state regulations vary widely across the country. New York and its fellow litigants point to a plethora of independent studies, recommending more consistent and comprehensive regulatory approaches to the expanded scope of fracking. The arrival of cheap natural gas poses opportunities and risks. It can be used to build a more sustainable energy system, but there is a risk cheap natural gas will perpetuate our economy’s dependence on fossil fuels. The EPA should agree to establish a schedule under the Clean Air Act for setting a methane standard balancing the short-term benefits of bridge fuels and long-term advantages of renewables. Law professor Patrick Parenteau is senior counsel to the Environmental and Natural Resources Law Clinic; David Scott is a JD ’15 candidate.
<urn:uuid:1cc4239a-b1d8-4935-bd4d-1e7280c1ddcb>
CC-MAIN-2015-18
http://www.burlingtonfreepress.com/article/20140119/GREEN01/301190010/No-2-Natural-gas-what-part-solution-what-part-problem-
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246636255.43/warc/CC-MAIN-20150417045716-00070-ip-10-235-10-82.ec2.internal.warc.gz
en
0.940043
1,089
3.234375
3
[ 16635, 5329, 2119, 379, 9180, 23974, 11, 23488, 329, 11315, 284, 25388, 3288, 3623, 1220, 10188, 34571, 371, 2937, 5188, 3069, 14, 11146, 4332, 9220, 198, 35364, 3623, 3951, 11, 37090, 1220, 32357, 3698, 347, 1565, 21479, 23715, 46833, 14, 11146, 4332, 198, 7414, 333, 1678, 11, 3623, 10700, 287, 37090, 1220, 32357, 3698, 347, 1565, 21479, 23715, 46833, 14, 11146, 4332, 198, 26302 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]