Datasets:
text
stringlengths 1k
264k
| meta
dict |
|---|---|
Details of Glycemic Index (GI)
The GI Scale
The glycemic index uses a scale from 1 to 100, which indicates the rate at which 50 grams of carbohydrate in a particular food is absorbed into the bloodstream as blood-sugar. The main reference food (rated 100) is glucose.
GI Rating Categories
The glycemic index divides carbohydrate
foods into three categories:
GI Food Testing is Ongoing
Not all foods have been given a GI value, although most food-types are covered. However, due to the way GI is measured using volunteer subjects, results can vary, so GI values for some specific foods are not yet uniformly established.
GI - Diabetes and Weight Control
Although the glycemic index was first designed to assist diabetes patients manage their blood-sugar levels, dietitians and weight experts now use it as a tool to help treat obesity, food cravings and appetite swings, and improve eating habits.
Both the type AND quantity of carbohydrate in our food influence the rise in blood glucose. But the glycemic index only rates a standard 50 gram serving size of digestible carbohydrate in a particular food, which may not be appropriate for all foods. For example, foods whose serving size contains only a small amount of carbohydrate may in practice be better for blood sugar control than foods whose normal serving size contains a large amount of carbs. Therefore, to provide a more meaningful GI-rating system, researchers at Harvard University invented the term Glycemic Load, which applies the glycemic index to normal food serving sizes.
OBESITY, OVERWEIGHT and
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1563
}
|
THE HISTORY OF
NEW YORK STATE
& HOW A BILL
BECOMES A LAW
New York State History
New Yorkers are rightfully proud of their state’s many achievements and contributions. This synopsis is adapted from a brief history previously printed in the Legislative Manual.
The New York harbor was visited by Giovanni da Verrazano in 1524, and the Hudson River was first explored by Henry Hudson in 1609. The Dutch settled here permanently in 1624 and, for 40 years, they ruled over the colony of New Netherland. It was conquered by the English in 1664 and was then named New York in honor of the Duke of York. Existing as a colony of Great Britain for over a century, New York declared its independence on July 9, 1776, becoming one of the original 13 states of the Federal Union. The next year, on April 20, 1777, New York’s first constitution was adopted.
In many ways, New York state was the principal battleground of the Revolutionary War. Approximately one-third of the skirmishes and engagements of the war were fought on New York soil. The Battle of Saratoga, one of the decisive battles of the war, was the turning point of the American Revolution leading to the French alliance and thus to eventual victory. New York City, long occupied by British troops, was evacuated on November 25, 1783. There, on December 4 at Fraunces Tavern, Gen. George Washington bade farewell to his officers.
The first government of New York state grew out of the Revolution. The state convention that drew up the state constitution created a "Council of Safety" that governed for a time and set the new government in motion. In June 1777, while the war was going on, an election for the first governor took place. Two of the candidates, Philip Schuyler and George Clinton, were generals in the field. Two others, Col. John Jay and Gen. John Morin Scott, were, respectively, leaders of the aristocratic and democratic groups in the convention. On July 9, Clinton was declared elected, and he was inaugurated as governor at Kingston on July 30, 1777. Albany became the state capital in January 1797.
Alexander Hamilton was a leader in the movement that resulted in development of the U.S. Constitution, and he was active in its ratification. New York City became the first capital of the new nation, and it’s where President George Washington was inaugurated on April 30, 1789.
In the following years, New York’s economic and industrial growth made appropriate the title, "The Empire State," an expression possibly originated by George Washington in 1784. In 1809, Robert Fulton’s "North River Steamboat," the first successful steam-propelled vessel, began a new era in transportation. The Erie Canal, completed in 1825, greatly enhanced the importance of the port of New York and caused populous towns and cities to spring up across the state. The Erie Canal was replaced by the Barge Canal in 1918, and the system of waterways was further expanded by construction of the St. Lawrence Seaway. Overland transportation grew rapidly from a system of turnpikes established in the early 1880s to the modern-day Governor Thomas E. Dewey New York State Thruway. By 1853, railroads that had started as short lines in 1831 crossed the state in systems like the Erie and New York Central.
During the 19th century, America became a haven for many of the oppressed people of Europe, and New York City became the "melting pot." The Statue of Liberty (dedicated in 1886 in the harbor), with its famous inscription, "Give me your tired, your poor, your huddled masses yearning to breathe free," was the first symbol of America’s mission. The international character of New York City, the principal port for overseas commerce, and later for transcontinental and international airways, has been further enhanced by becoming the home of the United Nations, capital of the free world. Here, people of all nations and races come to discuss and try to solve world problems in a free and democratic climate.
As one of the wealthiest states, New York made tremendous strides in industry and commerce. The New York Stock Exchange, founded in 1792, has become the center of world finance. Diversified and rich natural resources, together with unmatched facilities for transportation produced phenomenal growth in manufacturing and industry. Research and inventive genius have been extensive, especially in the field of electronics, power and the peaceful and productive use of atomic energy. New York City also became a leading national center for art, music and literature, as exemplified by the Metropolitan Museum of Art, the Metropolitan Opera Company and large publishing houses.
The state has supplied more than its share of national leaders, beginning with Alexander Hamilton, the first treasury secretary, and John Jay, the first chief justice. Aaron Burr and George Clinton served as vice presidents. Martin Van Buren, Chester A. Arthur and Grover Cleveland went from New York politics to the presidency. In the 1900s, Theodore Roosevelt and Franklin D. Roosevelt achieved the presidency, and Nelson Rockefeller served as vice president. Governors Charles E. Hughes, Alfred E. Smith and Thomas E. Dewey all were presidential candidates.
|NEW YORK STATE: "EVER UPWARD"|
Know how a bill becomes a law...1.
Your Assembly member gets an idea for a bill from constituents and organized interest groups, or by perceiving local or statewide needs. Bills can create new laws or repeal or amend existing ones.
After deciding to sponsor a bill, the Assembly member has bill-drafting specialists write it. Then, the bill is filed and gets an official number. Many bills are co-sponsored by several Assembly members.
The speaker of the Assembly, who is elected by the 150 Assembly members, assigns the bill to the appropriate committee. For example, a bill concerning tenants is assigned to the Housing Committee. The committee members (every Assembly member sits on several committees) study the bill and vote on whether to defeat, or "kill," it, hold it for further study or send it on to the full Assembly for a vote. Before going to the Assembly floor for a vote, bills may be examined by other committees as well.
On the floor of the Assembly, the bill’s sponsor explains and defends it in the event there is debate. A vote on the bill is taken. If it passes, it goes to the Senate, where it undergoes a similar process.
If both houses (Assembly and Senate) pass the bill, it goes to the governor, who can either sign it into law or veto it. If the governor vetoes it, the Legislature can override the veto by a two-thirds vote in favor, thus making the bill a law.
|***Click here for printable view.***|
How to Contact
224 Seventh Street
Garden City, NY 11530
Legislative Office Building
Albany, NY 12248
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 6755
}
|
Significance and Use
Accurate definition of boundary conditions is an essential part of conceptualizing and modeling groundwater flow systems. This guide describes the properties of the most common boundary conditions encountered in groundwater systems and discusses major aspects of their definition and application in groundwater models. It also discusses the significance and specification of boundary conditions for some field situations and some common errors in specifying boundary conditions in groundwater models.
1.1 This guide covers the specification of appropriate boundary conditions that are an essential part of conceptualizing and modeling groundwater systems. This guide describes techniques that can be used in defining boundary conditions and their appropriate application for modeling saturated groundwater flow model simulations.
1.2 This guide is one of a series of standards on groundwater flow model applications. Defining boundary conditions is a step in the design and construction of a model that is treated generally in Guide D5447.
1.3 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.
1.4 This guide offers an organized collection of information or a series of options and does not recommend a specific course of action. This document cannot replace education or experience and should be used in conjunction with professional judgment. Not all aspects of this guide may be applicable in all circumstances. This ASTM standard is not intended to represent or replace the standard of care by which the adequacy of a given professional service must be judged, nor should this document be applied without consideration of a project's many unique aspects. The word “Standard” in the title of this document means only that the document has been approved through the ASTM consensus process.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
D653 Terminology Relating to Soil, Rock, and Contained Fluids
D5447 Guide for Application of a Groundwater Flow Model to a Site-Specific Problem
aquifers; boundary condition; groundwater model: Aquifers; Boundary conditions; Ground-water model; Stress-dependency; Water table;
ICS Number Code 07.060 (Geology. Meteorology. Hydrology); 13.060.10 (Water of natural resources)
ASTM International is a member of CrossRef.
Citing ASTM Standards
[Back to Top]
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2660
}
|
Lox/Kerosene propellant rocket stage. Loaded/empty mass 5,000/700 kg. Thrust 122.50 kN. Vacuum specific impulse 280 seconds. All values except thrust estimated.
Status: In development.
More... - Chronology...
Gross mass: 5,000 kg (11,000 lb).
Unfuelled mass: 700 kg (1,540 lb).
Height: 9.60 m (31.40 ft).
Diameter: 1.00 m (3.20 ft).
Span: 1.00 m (3.20 ft).
Thrust: 122.50 kN (27,539 lbf).
Specific impulse: 280 s.
Specific impulse sea level: 240 s.
Burn time: 95 s.
Number: 1 .
Korea South South Korea became familiar with large-scale rocketry through maintenance and modification activities on American-supplied Honest John and Nike Hercules tactical missiles. By the 1990's Korea had developed an independent capability to manufacture solid propellant rocket motors of up to one tonne mass. In 1990 KARI was funded to build the first indigenous sounding rockets, flown as the KSR-I and KSR-II. In December 1997 KARI was allowed to proceed with development of liquid oxygen/kerosene rocket motor for an orbital launcher, but this was abandoned when the South Korean government decided it wanted to be among the top ten spacefaring nations by 2015. The existing program was too limited in growth potential to allow that. Therefore it was decided to leapfrog the technology by contracting with Russian companies. First launch of the KSLV-I launch vehicle from the new space centre took place in 2010. More...
KSR-3 Korean Lox/Kerosene rocket engine. In development. Launch thrust 122.5 kN. Pressure-fed indigenous design. First flight 2002. More...
Associated Launch Vehicles
KSR-III South Korean sounding rocket. Test bed for development of an orbital launch vehicle, powered by the liquid oxygen/kerosene engine planned for the KSLV-I. However flown only once in 2002. More...
KSLV-I 2002 South Korean orbital launch vehicle. In 2002 South Korea announced it was planning to develop a small satellite launch vehicle by 2005, based on technology flown on the KSR-III test vehicle. By 2005 this was replaced by a completely different design, based on the Russian Angara space booster. More...
KSLV-III South Korean launch vehicle, to consist of a Russian Angara first stage, a South Korean liquid propellant second stage, and a South Korean solid propellant apogee kick motor. Scheduled for first flight by 2015. In August 2006 the Korean press reported that the first and second stages would both be Angara-UM modules... how this configuration would work (stacked versus parallel) was unclear. More...
KSLV-II South Korean launch vehicle, originally scheduled for first flight by 2010. Evidently it would have consisted of a Russian Angara first stage and a South Korean liquid-propellant second stage. In August 2006 it was reported in the Korean press that this launcher configuration was cancelled. More...
Lox/Kerosene Liquid oxygen was the earliest, cheapest, safest, and eventually the preferred oxidiser for large space launchers. Its main drawback is that it is moderately cryogenic, and therefore not suitable for military uses where storage of the fuelled missile and quick launch are required. In January 1953 Rocketdyne commenced the REAP program to develop a number of improvements to the engines being developed for the Navaho and Atlas missiles. Among these was development of a special grade of kerosene suitable for rocket engines. Prior to that any number of rocket propellants derived from petroleum had been used. Goddard had begun with gasoline, and there were experimental engines powered by kerosene, diesel oil, paint thinner, or jet fuel kerosene JP-4 or JP-5. The wide variance in physical properties among fuels of the same class led to the identification of narrow-range petroleum fractions, embodied in 1954 in the standard US kerosene rocket fuel RP-1, covered by Military Specification MIL-R-25576. In Russia, similar specifications were developed for kerosene under the specifications T-1 and RG-1. The Russians also developed a compound of unknown formulation in the 1980's known as 'Sintin', or synthetic kerosene. More...
Home - Browse - Contact
© / Conditions for Use
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 4103
}
|
An English editor is a person who is engaged in the work of editing the manuscript or the written text that has to be published. The editor is an expert in the language and has good command over the language in which he is doing the work of editing.
In the modern days English is developing as the common language that is being used in writing and in the corporate world. An editor is needed in both the sectors that is, in creative writing and for editing the written documents, mails and other texts which are commonly used in business dealings.
Importance of English Editor
The editor plays an important role in the publication and business sector as it is in his hand to detect all the errors that occur during writing and rectify them before it is finally published or sent to the concerned recipient. The editor has to do to two types of editing.
One is copyediting which is commonly known as proofreading and the other is content editing which is related to higher level of editing as the editor makes major changes in the original manuscript so that the ideas of the writer is brought to a level which can be easily understood by the reader.
A good editor must have good command over English language and through knowledge of grammar as he has to ensure that the final copy that is sent after editing is correct, comprehensible, the ideas are clear, there is a consistency in the text and the text is concise. Professional English editors are very helpful for people who use English as a second language.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1512
}
|
Wikipedia sobre física de partículas
Rapidinho. Me falaram que a definição de física de partículas da Wikipedia era muito ruim. E de fato, era assim:
Particle physics is a branch of physics that studies the elementary particle|elementary subatomic constituents of matter and radiation, and their interactions. The field is also called high energy physics, because many elementary particles do not occur under ambient conditions on Earth. They can only be created artificially during high energy collisions with other particles in particle accelerators.
Particle physics has evolved out of its parent field of nuclear physics and is typically still taught in close association with it. Scientific research in this area has produced a long list of particles.
Mas hein? Partículas que só podem ser criadas em aceleradores? Física de partículas é ensinada junto com física nuclear? A pesquisa produz partículas (essa é ótima!)?
Em que mundo essa pessoa vive? Reescrevi:
Particle Physics is a branch of physics that studies the existence and interactions of particles, which are the constituents of what is usually referred as matter or radiation. In our current understanding, particles are excitations of quantum fields and interact following their dynamics. Most of the interest in this area is in fundamental fields, those that cannot be described as a bound state of other fields. The set of fundamental fields and their dynamics are summarized in a model called the Standard Model and, therefore, Particle Physics is largely the study of the Standard Model particle content and its possible extensions.
Eu acho que ficou bem melhor. Vamos ver em quanto tempo algum editor esquentado da Wikipedia vai demorar para reverter. Atualmente está um saco participar da Wikipedia por causa dessas pessoas.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1797
}
|
Charles Benedict DavenportArticle Free Pass
Charles Benedict Davenport, (born June 1, 1866, Stamford, Conn., U.S.—died Feb. 18, 1944, Cold Spring Harbor, N.Y.), American zoologist who contributed substantially to the study of eugenics (the improvement of populations through breeding) and heredity and who pioneered the use of statistical techniques in biological research.
After receiving a doctorate in zoology at Harvard University in 1892, Davenport taught there until 1899, when he left to join the faculty of the University of Chicago, where, from 1901 to 1904, he was curator of the zoological museum. He directed the department of genetics (1904–34) for the Station for Experimental Evolution at Cold Spring Harbor, N.Y., and also founded and directed the Eugenics Record Office (1910–34).
While teaching experimental morphology at Harvard, he used statistical methods in population studies. Partly as a result of breeding experiments with chickens and canaries, he was one of the first, soon after 1902, to recognize the validity of the newly discovered Mendelian theory of heredity. In Heredity in Relation to Eugenics (1911), he compiled evidence concerning the inheritance of human traits, on the basis of which he argued that the application of genetic principles would improve the human race.
Davenport was editor of Genetics (from 1916) and the Journal of Physical Anthropology (from 1918). Davenport’s other important works include Statistical Methods with Special Reference to Biological Variation (1899), Eugenics (1910), and Body Build and Its Inheritance (1923).
What made you want to look up "Charles Benedict Davenport"? Please share what surprised you most...
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1682
}
|
What is a Laparoscopic Cholecystectomy?
Laparoscopic Cholecystectomy is a minimally invasive surgical procedure for the removal of the gallbladder.
How is it done?
Laparoscopic Cholecystectomy is generally performed using a general anesthesia. During the procedure the abdomen is inflated with carbon dioxide to provide room for the procedure. Through a small incision made at the navel, a laparoscope is inserted into the abdomen. Three small additional holes are made to allow the entry of the instruments. The gallbladder is located and the cystic duct and artery are tied off. The gallbladder is removed and the incision is closed. Sometimes an x-ray is taken on the operating table (cholangiogram) to look for stones or abnormalities in the common bile duct.
Why is it done?
Gallbladder removal is usually done to treat the following conditions:
- Gallbladder disease, such as gallstones
- Infection and inflammation of the gallbladder
- Gallbladder polyps
Laparoscopic surgery is associated with less postoperative pain, a shorter hospital stay, and better cosmetic results than the open surgical procedure.
Risks & complications
There are possible risks and complications associated with anesthesia, including respiratory or cardiac malfunction. Other complications include:
- Injury to the bile duct, blood vessels or other abdominal organs
- Minor shoulder pain (from the carbon dioxide gas)
- Post operative bleeding
Risks can be reduced by following the surgeon's instructions before and after surgery.
Open surgery (laparotomy) may have to be performed in patients with bleeding; if there is abnormal anatomy resulting from acute infection; or where scarring from previous surgeries or infections prevent a clear view of the anatomy.
The surgeon will make the final determination of each patient’s eligibility for the procedure after an examination and consultation with the patient.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1895
}
|
How To Win At Science Fairs (Dec, 1960)
How To Win At Science Fairs
by Ronald Benrey
YOU CAN WIN at a Science Fair as long as one thing interests you more than winning does. This is your project itself. It is going to be judged on scientific thought, creative ability, and presentation. You will really have to know the field your project is concerned with. This takes effort. Since you lack the means of a professional laboratory, you will have to do much with little. This takes trial and error and just plain work. Your presentation must be attractive and clear. This means good workmanship, which takes time and care. You are going to have to show some originality. After all, there is no use doing what everybody else is doing: be different. For this, you have to have the other three under control. By the way, the “laymen” who see your exhibit will ask all kinds of questions. Have good answers at your fingertips. The judges won’t be laymen, and any double-talk will scream to them that you don’t know your subject. It may also make them suspect that the best parts of your project are not your work. This would be unjust, perhaps, but deadly. Now, whether your entry covers a large table top or can just be tucked under your arm, it is going to be a big job. It can’t be left for a “crash program” in the last few weeks before the Fair. It is going to eat up big portions of your time, energy, and spending money for the next several months. All this demands your interest. But it isn’t simply a matter of “fun. ” Licking this challenge may be a turning point in your life. With or without a scholarship prize, your career may begin with it.
As a reader of Electronics Illustrated your project will probably deal with electronics or applied physics rather than with biological or earth sciences. Select your topic carefully from a broad subject that really interests you. A massive effort in the direction of a passing fancy will result in a mediocre project at best. Take a limited subtopic that you think worth investigating and that you feel able to handle.
To ease financial strain, plan now to build your project over a long period of time, say six months, on a pay-as-you-build basis.
Once you have a rough idea of your project’s general form, don’t dash into construction.
Visit technical libraries and learn all you can about current professional work in the field, and its technical jargon. This will give you much important information and helpful hints, and when you finally face the judges, you will know your subject.
Here is a prickly question. It is up to you to be realistic and honest with yourself when you choose a topic. Your science teachers and advisers will certainly be helpful, but the final decision must be yours. In other words, if you have never handled a soldering iron before, don’t take on a project requiring elaborate electronic instrumentation. If you have enough time you can work up to a complex project by building a few simpler devices, like many described in EI. This is another reason for starting NOW. – Why not get your feet wet by assembling some test equipment from kits? You will certainly need a multimeter anyway, for any project, and it will be something you can use “forever. ”
Another touchy subject: discussion of this often scares off good potential science fairers. Nobody requires or expects a science fair project to produce a radical new scientific discovery. However, this does not imply that an entrant can’t find a new angle on an old problem. Merely duplicating a project described in a magazine shows the judges only one thing: the builder can follow directions. The main benefit of entering a science fair is the challenge of thinking a real problem out, all the way through. Your project can be for “demonstration” rather than “research, ” but make sure you come up with fresh, clear, meaningful ways to present your material. Stay away from last year’s winning project: it was good last year. Avoid “staples” (like Tesla coils) unless they are only part of a ‘wider original project.
Your project should be well presented and look impressive, but impressive need not mean expensive. Judges seldom look twice at an exhibit loaded down with excess and borrowed equipment when the same results could have been obtained more economically and without false show. Novel use of common materials shows creative ability, and this is an important judging criterion. Remember, how you solved your problem is what counts at a science fair, and not merely that you solved it. Also, neatness counts! Aside from being impossible to troubleshoot, a rat’s nest of wiring is typical of losing projects. Time spent color-coding leads, installing wire harness and cable clamps will result in a much more attractive and more reliable project. But know what you are doing! Don’t harness leads in a circuit that demands point-to-point wiring, or cable grid and plate leads together in an amplifier circuit. Read up on layout and construction techniques, and allow yourself time to make and correct mistakes. Prior planning will also pay off in dollars and cents, since you can save by purchasing some components (like resistors) in quantity, and if you live near a big city you can shop around for some items in the military surplus stores, modifying your design if necessary to take odd-value components. Now, sit back and start your thinking. The time to start is right now.
IS YOUR WINNING PROJECT HERE?
RADIO TELESCOPE: Home-built sensitive low-noise receiver, simple antenna system. Try to make simple “radio map.”
GUIDANCE SYSTEM: For model ear. Can be programmed to run around science fair grounds without hitting anything, or to reach pre-chosen destination.
SOLAR CELLS: Home-built unit as part of demonstration of basic physics of solar cells: display on recent professional research results: off-beat practical applications (eyeglass type hearing aid?).
MOON MOUSE: “To be landed on the Moon. ” Self-propelled, radio controlled from Earth, instrumented and transmitter equipped. Some functions solar powered ?
These are only suggestions. You may come up with ideas regarding fuel cells, space communications, navigation, etc.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 6187
}
|
Nouns wanting in the Plural
Some nouns are ordinarily found in the Singular number only (singulria tantum). These are
1. Most proper names: as, Caesar, Csar; Gallia, Gaul.
2. Names of things not counted, but reckoned in mass: as, aurum, gold; r, air; trticum, wheat.
3. Abstract nouns: as, ambiti, ambition; fortitd, courage; calor, heat. [p. 41]
Many of these nouns, however, are used in the plural in some other sense.
The plural of a proper name may be applied to two or more persons or places, or even things, and so become strictly common:
duodecim Caesars, the twelve Csars.
Galliae, the two Gauls (Cis- and Transalpine).
Castores, Castor and Pollux; Iovs, images of Jupiter.
The plural of names of things reckoned in mass may denote particular objects: as, aera, bronze utensils, nivs, snowflakes; or different kinds of a thing: as, ers, airs (good and bad).
The plural of abstract nouns denotes occasions or instances of the quality, or the like:
quaedam excellentiae, some cases of superiority; tia, periods of rest; calrs, frgora, times of heat and cold.
Nouns wanting in the Singular
Some nouns are commonly or exclusively found in the Plural (plrlia tantum). Such are
1. Many names of towns: as, Athnae (Athens), Thri, Philipp, Vi.
2. Names of festivals and games: as, Olympia, the Olympic Games; Bacchnlia, feast of Bacchus; Qunqutrs, festival of Minerva; ld Rmn, the Roman Games.
3. Names of classes: as, optimts, the upper classes; mirs, ancestors; lber, children; pents, household gods; Quirts, citizens (of Rome).
4. Words plural by signification: as, arma, weapons; arts, joints; dvitiae, riches; sclae, stairs; valvae, folding-doors; fors, double-doors; angustiae, a narrow pass (narrows); moenia, city walls.
NOTE 1.Some words, plural by signification in Latin, are translated by English nouns in the singular number: as, dliciae, delight, darling; faucs, throat; fids, lyre (also singular in poetry); nsidiae, ambush; cervcs, neck; viscera, flesh.
NOTE 2.The poets often use the plural number for the singular, sometimes for metrical reasons, sometimes from a mere fashion: as, ra (for s), the face; scptra (for scptrum), sceptre; silentia (for silentium), silence.
Some nouns of the above classes ( 101. 1-4), have a corresponding singular, as noun or adjective, often in a special sense:
1. As noun, to denote a single object: as, Bacchnal, a spot sacred to Bacchus; optims, an aristocrat.
2. As adjective: as, Cat Mior, Cato the Elder.
3. In a sense rare, or found only in early Latin: as, scla, a ladder, valva, a door; artus, a joint.
Nouns Defective in Certain Cases
Many nouns are defective in case-forms:
Indeclinable nouns, used only as nominative and accusative singular: fs, nefs, nstar, nihil, opus (need), secus.
NOTE 1.The indeclinable adjective necesse is used as a nominative or accusative.
NOTE 2.The genitive nihil and the ablative nihil (from nihilum, nothing) occur.
Nouns found in one case only (monoptotes):
1. In the nominative singular: gls (F.).
2. In the genitive singular: dicis, nauc (N.).
3. In the dative singular: dvsu (M.) (cf. 94. c).
4. In the accusative singular: amussim (M.); vnum (dative vn in Tacitus).
5. In the ablative singular: pond (N.); mne (N.); ast (M.), by craft; iuss, iniuss, nt, and many other verbal nouns in -us (M.) ( 94. c).
NOTE.Mne is also used as an indeclinable accusative, and an old form mn is used as ablative. Pond with a numeral is often apparently equivalent to pounds. A nominative singular astus and a plural asts occur rarely in later writers.
6. In the accusative plural: nfitis.
Nouns found in two cases only (diptotes):
1. In the nominative and ablative singular: fors, forte (F.).
2. In the genitive and ablative singular: spontis (rare), sponte (F.).
3. In the accusative singular and plural: dicam, dics (F.).
4. In the accusative and ablative plural: fors, fors (F.) (cf. fors), used as adverbs.
Nouns found in three cases only (triptotes):
1. In the nominative, accusative, and ablative singular: impetus, -um, - (M.)
50 ; lus, -em, - (F.).
2. In the nominative, accusative, and dative or ablative plural: grts, -ibus (F).
3. In the nominative, genitive, and dative or ablative plural: igera, -um, -ibus (N.); but igerum, etc., in the singular (cf. 105. b).
Nouns found in four cases only (tetraptotes):
In the genitive, dative, accusative, ablative singular: dicinis, -, -em, -e (F.).
Nouns declined regularly in the plural, but defective in the singular:
1. Nouns found in the singular, in genitive, dative, accusative, ablative: frgis, -, -em, -e (F.); opis, - (once only), -em, -e (F.; nominative Ops as a divinity).
2. Nouns found in the dative, accusative, ablative: prec, -em, -e (F.).
3. Nouns found in the accusative and ablative: cassem, -e (F.); sordem, -e (F.).
4. Nouns found in the ablative only: ambge (F.); fauce (F.); obice (C.).
Nouns regular in the singular, defective in the plural: [p. 43]
1. The following neuters have in the plural the nominative and accusative only: fel (fella), far (farra), hordeum (hordea), is, broth (ira), mel (mella), murmur (murmura), ps (pra), rs (rra), ts or ths (tra).
NOTE.The neuter is, right, has only ira in classical writers, but a very rare genitive plural irum occurs in old Latin.
2. calx, cor, cs, crux, fax, faex, lanx, lx, nex, s (ris),
51 os (ossis),
52 px, pix, rs, sl, sl, vas (vadis), want the genitive plural.
3. Most nouns of the fifth declension want the whole or part of the plural (see 98. a).
Nouns defective in both singular and plural:
1. Noun found in the genitive, accusative, ablative singular; nominative, accusative, dative, ablative plural: vicis, -em, -e; -s, -ibus.
2. Noun found in the genitive, dative, accusative, and ablative singular; genitive plural wanting: dapis, -, -em, -e; -s, -ibus.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 5773
}
|
Czech Christmas Songs
Early Medieval Bohemia, a historically defined space that today
falls under the Czech Republic, gave birth to many carols, the
earliest of which are found in manuscripts dating back to the 11th
century. These chants, however, were not Christmas carols as we
know them today but rather Christian songs meant to be sung in
churches and monasteries to celebrate the birth of Christ.
Though secluded at first, these songs spread very quickly and
were received with open arms. Many of them became part of the
traditional folklore and were sung during caroling, which took
place on various occasions throughout December and January (from
St. Nicholas's day on December 6th to Candle Mass on February 2nd).
Although the ritual of going from house to house with a song was an
important part of Christian folklore, the Czech name for 'caroling'
and 'carol' - koleda - links its origins back to the pre-Christian
festivities that took part during the calendas, the first days of
the new year. While caroling was still a popular pastime some
decades ago, today the tradition has usually dwindled down to the
singing of carols in the family circle.
It did not take long for proper carols to start being composed,
and one of the oldest and most popular ones is first mentioned in
the 14th century. It is called Narodil se Kristus Pán (Christ Our
Lord Has Been Born), has a long list of strophes that no one ever
seems to remember, and is easily one of the most played and
well-known carols in the country. Interestingly, it is also the
only Christmas song that people tend to rise up to, as a mark of
respect, even though most Czechs today proclaim themselves
Most of the carols sung today come from a later era, and often
have the name of a 17th-19th century composer attached to them.
They include a wide variety of compositions, from Christmas
oratorios and masses, of which the most famous is the Bohemian
Christmas Mass by Jakub Jan Ryba, to shorter and very melodious
songs which quickly became common. An example would be a lullaby
that Mary sings to Baby Jesus, called Chtíc, aby spal (Wanting Him
to Sleep), or a long, mournful song known as Byla cesta, byla
ušlapaná (The Road was Travelled), about a conversation between
Mary and Elizabeth, mother of John the Baptist.
Modern Christmas songs have taken a wide step away from the
traditional Christian take on the subject and tend to have either
an ironic or a more depressing approach to the holiday than the
joyful and straightforward carols of the older days. While many of
the modern songs are little but variations on popular world music
with Czech lyrics, such as Rolničky (Jingle Bells), original songs
have been composed as well. Starting in the 70s with the production
of a band called Golden Kids, local musicians - at least the ones
that managed to perform under the Communist regime - started coming
up with modern songs on the theme of Christmas. To this day, Karel
Gott's Vánoce ve Zlaté Praze (Christmas in a Prague of Gold)
remains a well-known collection, Jiří Suchý's Purpura has managed
to reach the status of a traditional carol, and the iconic single
Vánoce, Vánoce (Christmas, Christmas) by the musical duo Josef
Vomáčka and Zdeněk Borovec is, even today, played over and over.
The mass popularity of this particular song probably stems from the
fact that it takes an ironic view of traditional celebrations and
recounts a series of unfortunate events that have befallen an
unlucky family determined to celebrate their Christmas in a
As a fun trivia fact, the popular English carol Good King
Wenceslas, sung usually on the feast of Stephen (December 27th),
tells the tale of a notable personage from Czech history, a
Bohemian prince called Wenceslas, one of the first Christians in
the land. He was murdered by his brother Boleslaus and later
canonized and proclaimed a patron of the country - it is thought
that he was introduced to the Brits by the Bohemian princess Anne,
who was married to Richard II.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3996
}
|
Efforts to incorporate Bowmanstown as a borough occurred as early as 1892. The village contained about 300 inhabitants in 1896 but the nearby New Jersey Zinc Company soon added to its growth. Bowmanstown was incorporated as a Borough on November 29, 1913 for the purpose of providing general local government services to residents of the community. Upon incorporation of Bowmanstown as a borough its boundaries encompassed lands measuring 0.75 square mile. The borough's assessed valuation in 1918 was $279,000.00. The population of 834 in 1920 remained relatively constant for decades. The Bowmanstown Borough Municipal Building (Borough Hall) is a converted school building that was constructed in 1903 to serve the youths of the community. In 1958, the Palmerton School District was established and combined several local schools in order to create a regional school thus making the Bowmanstown campus obsolete. In 1964, the Borough acquired the old brick school building and has been using it as offices ever since. The borough kept the building in its original condition.
The Bowmanstown Borough Authority was incorporated August 24, 1997 and was created for the purpose of owning and operating the Bowmanstown Public Water System. On February 11, 2002 the Authority began construction of its water system improvement project which included a new chlorine building, looping numerous water mains, installing new services, erection of a new 250,000 gallon Standpipe and a new liner to the one Reservoir. In 2009, the Authority replaced their two roofs at the Reservoirs with metal roofs. Ongoing water projects will continue to transpire throughout the years.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1662
}
|
Public Papers - 1991
White House Fact Sheet on The Strategic Arms Reduction Treaty (START)
Today, the United States and the Soviet Union signed the Strategic Arms Reduction Treaty. This treaty marks the first agreement between the two countries in which the number of deployed strategic nuclear weapons will actually be reduced. Reductions will take place over a period of 7 years, and will result in parity between the strategic nuclear forces of the two sides at levels approximately 30 percent below currently deployed forces. Deeper cuts are required in the most dangerous and destabilizing systems.
START provisions are designed to strengthen strategic stability at lower levels and to encourage the restructuring of strategic forces in ways that make them more stable and less threatening. The treaty includes a wide variety of very demanding verification measures designed to ensure compliance and build confidence.
The treaty sets equal ceilings on the number of strategic nuclear forces that can be deployed by either side. In addition, the treaty establishes an equal ceiling on ballistic missile throw-weight (a measure of overall capability for ballistic missiles). Each side is limited to no more than:
-- 1600 strategic nuclear delivery vehicles (deployed intercontinental ballistic missiles [ICBM's], submarine launched ballistic missiles [SLBM's], and heavy bombers), a limit that is 36 percent below the Soviet level declared in September 1990 and 29 percent below the U.S. level.
-- 6000 total accountable warheads, about 41 percent below the current Soviet level and 43 percent below the current U.S. level.
-- 4900 accountable warheads deployed on ICBM's or SLBM's, about 48 percent below the current Soviet level and 40 percent below the current U.S. level.
-- 1540 accountable warheads deployed on 154 heavy ICBM's, a 50-percent reduction in current Soviet forces. The U.S. has no heavy ICBM's.
-- 1100 accountable warheads deployed on mobile ICBM's.
-- Aggregate throw-weight of deployed ICBM's and SLBM's equal to about 54 percent of the current Soviet aggregate throw-weight.
Ballistic Missile Warhead Accountability
The treaty uses detailed counting rules to ensure the accurate accounting of the number of warheads attributed to each type of ballistic missile.
-- Each deployed ballistic missile warhead counts as 1 under the 4900 ceiling and 1 under the 6000 overall warhead ceiling.
-- Each side is allowed 10 on-site inspections each year to verify that deployed ballistic missiles contain no more warheads than the number that is attributed to them under the treaty.
Downloading Ballistic Missile Warheads
The treaty also allows for a reduction in the number of warheads on certain ballistic missiles, which will help the sides transition their existing forces to the new regime. Such downloading is permitted in a carefully structured and limited fashion.
-- The U.S. may download its three-warhead Minuteman III ICBM by either one or two warheads. The Soviet Union has already downloaded it's seven warhead SS - N - 18 SLBM by four warheads.
-- In addition, each side may download up to 500 warheads on two other existing types of ballistic missiles, as long as the total number of warheads removed from downloaded missiles does not exceed 1250 at any one time.
The treaty places constraints on the characteristics of new types of ballistic missiles to ensure the accuracy of counting rules and prevent undercounting of missile warheads.
-- The number of warheads attributed to a new type of ballistic missile must be no less than the number determined by dividing 40 percent of the missile's total throw-weight by the weight of the lightest RV tested on that missile.
-- The throw-weight attributed to a new type must be no less than the missile's throw-weight capability at specified reference ranges (11,000 km for ICBM's and 9,500 km for SLBM's).
START places significant restrictions on the Soviet SS - 18 heavy ICBM.
-- A 50-percent reduction in the number of Soviet SS - 18 ICBM's; a total reduction of 154 of these Soviet missiles.
-- New types of heavy ICBM's are banned.
-- Downloading of heavy ICBM's is banned.
-- Heavy SLBM's and heavy mobile ICBM's are banned.
-- Heavy ICBM's will be reduced on a more stringent schedule than other strategic arms.
Because mobile missiles are more difficult to verify than other types of ballistic missiles, START incorporates a number of special restrictions and notifications with regard to these missiles. These measures will significantly improve our confidence that START will be effectively verifiable.
-- Nondeployed mobile missiles and non-deployed mobile launchers are numerically and geographically limited so as to limit the possibility for reload and refire.
-- The verification regime includes continuous monitoring of mobile ICBM production, restrictions on movements, on-site inspections, and cooperative measures to improve the effectiveness of national technical means of intelligence collection.
Because heavy bombers are stabilizing strategic systems (e.g., they are less capable of a short-warning attack than ballistic missiles), START counting rules for weapons on bombers are different than those for ballistic missile warheads.
-- Each heavy bomber counts as one strategic nuclear delivery vehicle.
-- Each heavy bomber equipped to carry only short-range missiles or gravity bombs is counted as one warhead under the 6000 limit.
-- Each U.S. heavy bomber equipped to carry long-range nuclear ALCM's (up to a maximum of 150 bombers) is counted as 10 warheads even though it may be equipped to carry up to 20 ALCM's.
-- A similar discount applies to Soviet heavy bombers equipped to carry long-range nuclear ALCM's. Each such Soviet heavy bomber (up to a maximum of 180) is counted as 8 warheads even though it may be equipped to carry up to 16 ALCM's.
-- Any heavy bomber equipped for long-range nuclear ALCM's deployed in excess of 150 for the U.S. or 180 for the Soviet Union will be accountable by the number of ALCM's the heavy bomber is actually equipped to carry.
Building on recent arms control agreements, START includes extensive and unprecedented verification provisions. This comprehensive verification regime greatly reduces the likelihood that violations would go undetected.
-- START bans the encryption and encapsulation of telemetric information and other forms of information denial on flight tests of ballistic missiles. However, strictly limited exemptions to this ban are granted sufficient to protect the flight-testing of sensitive research projects.
-- START allows 12 different types of on-site inspections and requires roughly 60 different types of notifications covering production, testing, movement, deployment, and destruction of strategic offensive arms.
START will have a duration of 15 years, unless it is superseded by a subsequent agreement. If the sides agree, the treaty may be extended for successive 5-year periods beyond the 15 years.
Noncircumvention and Third Countries
START prohibits the transfer of strategic offensive arms to third countries, except that the treaty will not interfere with existing patterns of cooperation. In addition, the treaty prohibits the permanent basing of strategic offensive arms outside the national territory of each side.
Air-Launched Cruise Missiles (ALCM's)
START does not directly count or limit ALCM's. ALCM's are limited indirectly through their association with heavy bombers.
-- Only nuclear-armed ALCM's with a range in excess of 600 km are covered by START.
-- Long-range, conventionally armed ALCM's that are distinguishable from nuclear-armed ALCM's are not affected.
-- Long-range nuclear-armed ALCM's may not be located at air bases for heavy bombers not accountable as being equipped for such ALCM's.
-- Multiple warhead long-range nuclear ALCM's are banned.
Sea Launched Cruise Missiles (SLCM's)
SLCMs are not constrained by the treaty. However, each side has made a politically binding declaration as to its plans for the deployment of nuclear-armed SLCM's. Conventionally-armed SLCM's are not subject to such a declaration.
-- Each side will make an annual declaration of the maximum number of nuclear-armed SLCM's with a range greater than 600 km that it plans to deploy for each of the following 5 years.
-- This number will not be greater than 880 long-range nuclear-armed SLCM's.
-- In addition, as a confidence building measure, nuclear-armed SLCM's with a range of 300 - 600 km will be the subject of a confidential annual data exchange.
The Soviet Backfire bomber is not constrained by the treaty. However, the Soviet side has made a politically binding declaration that it will not deploy more than 800 air force and 200 naval Backfire bombers, and that these bombers will not be given intercontinental capability.
The START agreement consists of the treaty document itself and a number of associated documents. Together they total more than 700 pages. The treaty was signed in a public ceremony by Presidents Bush and Gorbachev in St. Vladimir's Hall in the Kremlin. The associated documents were signed in a private ceremony at Novo Ogaryevo, President Gorbachev's weekend dacha. Seven of these documents were signed by Presidents Bush and Gorbachev. Three associated agreements were signed by Secretary Baker and Foreign Minister Bessmertnykh. In addition, the START negotiators, Ambassadors Brooks and Nazarkin, exchanged seven letters related to START in a separate event at the Soviet Ministry of Foreign Affairs in Moscow.
Magnitude of START -- Accountable Reductions
Following is the aggregate data from the Memorandum of Understanding, based upon agreed counting rules in START. (Because of those counting rules, the number of heavy bomber weapons actually deployed may be higher than the number shown in the aggregate.) This data is effective as of September 1990
(TABLE START)and will be updated at entry into force:
Delivery Vehicles .... 2,246 .... 2,500
Warheads .... 10,563 .... 10,271
Ballistic Missile Warheads .... 8,210 .... 9,416
Heavy ICBM's/Warheads .... None .... 308/3080
Throw-weight (metric tons) .... 2,361.3 .... 6,626.3
As a result of the treaty, the above values will be reduced by the following percentages:
Delivery Vehicles .... 29 percent .... 36 percent
Warheads .... 43 percent .... 41 percent
Ballistic Missile Warheads .... 40 percent .... 48 percent
Heavy ICBM's/Warheads .... None .... 50 percent
Throw-weight (metric tons) .... None .... 46 percent
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 10493
}
|
Common Core Catholic Identity Initiative
A national working group has begun the Common Core Catholic Identity Initiative (CCCII) to develop and disseminate resources and guidelines to assist Catholic elementary and secondary schools in integrating elements of Catholic identity (Catholic values, Scripture, Church social teachings, encyclicals, etc.) into curriculum and instruction based on the Common Core State Standards.
The initial phase of CCCII focuses on K-8 English/Language Arts/ Literacy. Resources for other subjects and for 9-12 curriculum will be developed in later phases.
Forty-six states have agreed to adopt the Common Core State Standards, a set of high quality K-12 learning standards that includes rigorous content and application of knowledge using higher-order thinking skills, leading students to college and career readiness. Currently, Catholic schools are assessing what the implications of the standards and accompanying assessments may be for them.
While Catholic schools have their own local or diocesan standards, their ability to continue to provide high-quality education for their students is compelling them to consider adoption of the common core standards. Catholic schools will be impacted as curriculum resources and professional development opportunities become aligned with Common Core State Standards by producers of instructional materials, college teacher preparation programs, or regulations for participation in the federal programs that currently benefit their students and teachers. Within this environment, maintaining the uniqueness and integrity of the Catholic school will require integrating the demands of their mission and the academic expectations of their constituents and the wider education community.
To assist Catholic schools with enhancing Catholic identity integrated into the curriculum, the Common Core Catholic Identity Initiative (CCCII) has been launched as a collaborative project involving Catholic universities, corporations and sponsors invested in Catholic education, and the National Catholic Educational Association (NCEA).
The Common Core Catholic Identity Initiative has two goals:
- to empower Catholic schools and dioceses to design and direct the implementation of the Common Core standards within the culture and context of a Catholic school curriculum
- to infuse the Common Core standards with the faith/principles/values/social justice themes inherent in the mission and Catholic identity of the school.
The CCCII project aims to accomplish its goals by creating a process and a product:
Phase 1: Gather approximately 35 practitioners and curriculum and catechetics experts to pilot a CCCII ELA Unit development process to be shared with the larger Catholic educational community. (June 2012)
Phase 2: Revise and refine the unit development process so that it can be replicated in dioceses around the country.
Phase 3: Invite participation in development of additional CCCII ELA Units by Catholic educators around the country.
Phase 1: Utilize the expertise and strength of experienced and innovative teachers to develop complete units/exemplars that join Catholic identify with the Common Core curriculum standards. Utilize the expertise of CCCII leaders to develop supporting resources and guidelines. (June 2012)
Phase 2: Post exemplar units, guidelines, and resources developed in for the June 2012 launch for open access by Catholic educators on the Catholic School Standards Project Website www.catholicschoolsstandards.org) . (July 2012)
Phase 3: Expand exemplar units and Catholic Identity resources available for use by local Catholic schools.
Tailor the CCCII Unit development process for Catholic secondary schools.
Expand CCCII to include additional subject areas.
Meet the CCCII Leadership and Planning Teams
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3806
}
|
Replication and control of circular bacterial plasmids.
An essential feature of bacterial plasmids is their ability to replicate as autonomous genetic elements in a controlled way within the host. Therefore, they can be used to explore the mechanisms involved in DNA replication and to analyze the different strategies that couple DNA replication to other critical events in the cell cycle. In this review, we focus on replication and its control in circular plasmids. Plasmid replication can be conveniently divided into three stages: initiation, elongation, and termination. The inability of DNA polymerases to initiate de novo replication makes necessary the independent generation of a primer. This is solved, in circular plasmids, by two main strategies: (i) opening of the strands followed by RNA priming (theta and strand displacement replication) or (ii) cleavage of one of the DNA strands to generate a 3'-OH end (rolling-circle replication). Initiation is catalyzed most frequently by one or a few plasmid-encoded initiation proteins that recognize plasmid-specific DNA sequences and determine the point from which replication starts (the origin of replication). In some cases, these proteins also participate directly in the generation of the primer. These initiators can also play the role of pilot proteins that guide the assembly of the host replisome at the plasmid origin. Elongation of plasmid replication is carried out basically by DNA polymerase III holoenzyme (and, in some cases, by DNA polymerase I at an early stage), with the participation of other host proteins that form the replisome. Termination of replication has specific requirements and implications for reinitiation, studies of which have started. The initiation stage plays an additional role: it is the stage at which mechanisms controlling replication operate. The objective of this control is to maintain a fixed concentration of plasmid molecules in a growing bacterial population (duplication of the plasmid pool paced with duplication of the bacterial population). The molecules involved directly in this control can be (i) RNA (antisense RNA), (ii) DNA sequences (iterons), or (iii) antisense RNA and proteins acting in concert. The control elements maintain an average frequency of one plasmid replication per plasmid copy per cell cycle and can "sense" and correct deviations from this average. Most of the current knowledge on plasmid replication and its control is based on the results of analyses performed with pure cultures under steady-state growth conditions. This knowledge sets important parameters needed to understand the maintenance of these genetic elements in mixed populations and under environmental conditions.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2721
}
|
Young Kids May Be Able to Unbuckle Car Seats
Survey of Parents Finds Some Kids May Be Unbuckling While Car Is in Motion
May 2, 2011 -- Children as young as 1 year old can unbuckle themselves from car safety seats, a new survey of parents finds.
"We found that children can unbuckle from their child car safety seats by their fourth birthday, and there is an alarming 43% who do so when the car is in motion," says researcher Lilia Reyes, MD, a clinical fellow in pediatric emergency medicine at the Yale School of Medicine in New Haven. "It was reported as early as 12 months."
The findings are being presented at the Pediatric Academic Societies annual meeting in Denver.
Child Car Seats: How Secure?
While working in the pediatric emergency room at Yale, Reyes encountered two different mothers who had minor car accidents. They told her it happened when they turned their heads around after discovering their kids had unbuckled themselves.
Trying to determine how frequently it happened, she and her colleagues from Yale surveyed 378 parents of young children. Among the other findings:
- 51% or about 191 families reported that at least one of their children had unbuckled their car seats. Of these, 75% were age 3 or younger. The youngest was 12 months old.
- Boys unbuckled more than girls; 59% of the kids who unbuckled were boys.
Parents were not asked if they were sure they had buckled correctly, Reyes tells WebMD. So there is a possibility the children weren't buckled in correctly. But parents do typically hear a click, like a seat safety belt, when the buckle latches, she says.
The problem, she says, is that while children may be able to physically unbuckle the seat, they are just beginning, at around age 3, to develop reasoning skills to appreciate the consequences of unbuckling.
Parents used seats of various types. They included the five-point harness, convertible seats, and booster seats, depending on their child's age and weight.
Are Car Seats Really Buckled?
''This study raises questions about how the child restraint was used," says Lorrie Walker, training manager and technical advisor for Safe Kids USA, an advocacy group.
"Federal motor vehicle safety standard 213 requires the buckle to release using between 9 and 14 pounds of pressure," she says. "It is often challenging for an adult to unbuckle the harness."
She wonders if the buckle was not adequately locked in some cases.
"A buckle may give the appearance of being buckled when it has not completely latched," she tells WebMD.
Among the mistakes many parents make when placing a child in a car seat she says, is to loosely attach the harness straps or place the straps in the wrong harness slots.
If these mistakes occur, she says, it makes it easy for a child to climb out.
The finding that a child as young as age 1 could unbuckle the seat is a surprise to Jennifer Stockburger, program manager of vehicle and child safety for Consumer Reports. She reviewed the findings for WebMD but was not involved in the study.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3009
}
|
LeitnerBox is a technique for learning with more & better effect.
We should learn the things by heart in 5 steps (30 days) with Leitner Box.
This application was created for learning English words or words of another language.
I've created this project with .NET Framework 3.5 SP1, so you have to install it to use the project.
Leitner Box's Algorithm
According to Leitner's Algorithm, we have to study our questions everyday like this :
1 : Answer all questions in Box 5 -> Part 1
If your answer was True the question goes to the Data Base
else it goes to Box 1.
2 : Shift all parts of Box5 to the left ( In the application use Shift up button )
3 : Answer all questions in Box 4 -> Part 1
4 : Shift all parts of Box4 to the left
5 : And so on ...
10 : Add new questions to Box 1
I've implemented this algorithm in this project.
Using the Application
At first you have to create a user, so you will see this form :
Notice: You can use A-Z and a-z for the name.
Press the button to create new user, new user will save in a folder beside the main EXE file.
If there are multiple users, you will see this form:
Appending a Word
You have to select a destination box or a part and then add a question.
Notice: You can't add two words with the same questions.
Whenever you type a word into 'Add Questions' textboxes, it searches for the inserted word in former words (in all boxes and database). If something is found, it will show a list of them below the textbox. Now you can choose it by pressing Enter on it.
This is a good way to avoid duplication.
- 2nd March, 2009: First post
- 14th March, 2009: Updated source and demo files - fixed some bugs
- 25th March, 2009: Updated source and demo files
- 2nd April, 2009: Updated source and demo files - fixed some bugs
- 11th April, 2009: Auto Complete added
- 22nd March, 2010: Updated source and demo files
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1853
}
|
Tornadoes are the most intense storms on the planet, and they’re never discussed without at least some mention of the term wind shear. Many of us sitting at home, though, have no idea what wind shear is, or if we do, how it affects tornado production.
What is Wind Shear
Wind shear, although it might sound complex, is a simple concept. Wind shear is merely the change in wind with height, in terms of wind direction and speed. I think that we all understand that the wind is generally stronger in the atmosphere over our heads than it is here on the ground, and if we think of the atmosphere in terms of the three dimensions that it has, it should not be surprising that the wind above us might also be blowing from a different direction than the wind at the ground. When that happens–the wind speed and direction vary with height–wind shear is occurring.
Wind Shear and Supercell Thunderstorms
This wind shear is an important part of the process in the development of a supercell thunderstorm, from which the vast majority of strong tornadoes form.
All thunderstorms are produced by a powerful updraft–a surge of air that rises from the ground into the upper levels of the atmosphere, and when this updraft forms in an area where wind shear is present, the updraft is influence by this speed and different direction of the wind above, pushing the column of air in the updraft into a more vertical alignment.
Rain’s Influence on Tornado Production
Needless to say, thunderstorms typically produce very heavy rain, and rain-cooled air is much heavier than the warm air of the updraft, so the rain-cooled air, produces a compensating downdraft (what comes up, must come down). This downdraft pushes the part of the rotating air that was forced in its direction by the stronger wind aloft downward, and the result is a horizontal column of rotating air.
That’s Not a Tornado!
I know what you’re thinking that you’ve seen enough TLC or Discovery Channel shows to know that a horizontal column of air is NOT a tornado; you need a vertical column of air.
This Can Be a Tornado
You’re right, but remember the updraft that is driving the thunderstorm is still working, and it’s able to pull the horizontal, spinning column of air into the thunderstorm, resulting in a vertical column of spinning air.
(NOAA image showing vertical column of air in a supercell thunderstorm)
The result is a rotating thunderstorm capable of producing a tornado, and it would not be possible without wind shear.
(NOAA image showing tornado formation in supercell thunderstorm)
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2549
}
|
Get News & Views Updates
Most Popular This Week
Today's Top News
Bush's Dangerous Liaisons
MONTREAL -- MUCH as George W. Bush's presidency was ineluctably shaped by Sept. 11, 2001, so the outbreak of the French Revolution was symbolized by the events of one fateful day, July 14, 1789. And though 18th-century France may seem impossibly distant to contemporary Americans, future historians examining Mr. Bush's presidency within the longer sweep of political and intellectual history may find the French Revolution useful in understanding his curious brand of 21st- century conservatism.
Soon after the storming of the Bastille, pro-Revolutionary elements came together to form an association that would become known as the Jacobin Club, an umbrella group of politicians, journalists and citizens dedicated to advancing the principles of the Revolution.
The Jacobins shared a defining ideological feature. They divided the world between pro- and anti-Revolutionaries - the defenders of liberty versus its enemies. The French Revolution, as they understood it, was the great event that would determine whether liberty was to prevail on the planet or whether the world would fall back into tyranny and despotism.
The stakes could not be higher, and on these matters there could be no nuance or hesitation. One was either for the Revolution or for tyranny.
By 1792, France was confronting the hostility of neighboring countries, debating how to react. The Jacobins were divided. On one side stood the journalist and political leader Jacques-Pierre Brissot de Warville, who argued for war.
Brissot understood the war as preventive - "une guerre offensive," he called it - to defeat the despotic powers of Europe before they could organize their counter-Revolutionary strike. It would not be a war of conquest, as Brissot saw it, but a war "between liberty and tyranny."
Pro-war Jacobins believed theirs was a mission not for a single nation or even for a single continent. It was, in Brissot's words, "a crusade for universal liberty."
Brissot's opponents were skeptical. "No one likes armed missionaries," declared Robespierre, with words as apt then as they remain today. Not long after the invasion of Austria, the military tide turned quickly against France.
The United States, France's "sister republic," refused to enter the war on France's side. It was an infuriating show of ingratitude, as the French saw it, coming from a fledgling nation they had magnanimously saved from foreign occupation in a previous war.
Confronted by a monarchical Europe united in opposition to revolutionary France - old Europe, they might have called it - the Jacobins rooted out domestic political dissent. It was the beginning of the period that would become infamous as the Terror.
Among the Jacobins' greatest triumphs was their ability to appropriate the rhetoric of patriotism - Le Patriote Français was the title of Brissot's newspaper - and to promote their political program through a tightly coordinated network of newspapers, political hacks, pamphleteers and political clubs.
Even the Jacobins' dress distinguished "true patriots": those who wore badges of patriotism like the liberty cap on their heads, or the cocarde tricolore (a red, white and blue rosette) on their hats or even on their lapels.
Insisting that their partisan views were identical to the national will, believing that only they could save France from apocalyptic destruction, Jacobins could not conceive of legitimate dissent. Political opponents were treasonous, stabbing France and the Revolution in the back.
To defend the nation from its enemies, Jacobins expanded the government's police powers at the expense of civil liberties, endowing the state with the power to detain, interrogate and imprison suspects without due process. Policies like the mass warrantless searches undertaken in 1792 - "domicilary visits," they were called - were justified, according to Georges Danton, the Jacobin leader, "when the homeland is in danger."
Robespierre - now firmly committed to the most militant brand of Jacobinism - condemned the "treacherous insinuations" cast by those who questioned "the excessive severity of measures prescribed by the public interest." He warned his political opponents, "This severity is alarming only for the conspirators, only for the enemies of liberty." Such measures, then as now, were undertaken to protect the nation - indeed, to protect liberty itself.
If the French Terror had a slogan, it was that attributed to the great orator Louis de Saint-Just: "No liberty for the enemies of liberty." Saint-Just's pithy phrase (like President Bush's variant, "We must not let foreign enemies use the forums of liberty to destroy liberty itself") could serve as the very antithesis of the Western liberal tradition.
On this principle, the Terror demonized its political opponents, imprisoned suspected enemies without trial and eventually sent thousands to the guillotine. All of these actions emerged from the Jacobin worldview that the enemies of liberty deserved no rights.
Though it has been a topic of much attention in recent years, the origin of the term "terrorist" has gone largely unnoticed by politicians and pundits alike. The word was an invention of the French Revolution, and it referred not to those who hate freedom, nor to non-state actors, nor of course to "Islamofascism."
A terroriste was, in its original meaning, a Jacobin leader who ruled France during la Terreur.
François Furstenberg, a professor of history at the University of Montreal, is the author of "In the Name of the Father: Washington's Legacy, Slavery and the Making of a Nation."
Copyright 2007 The New York Times Company
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 5704
}
|
Website Detail Page
written by David McIntyre
Spins is an interactive computer program that simulates Stern-Gerlach measurements on spin 1/2 and spin 1 particles. This software is used as part of the "Paradigms in Physics" curriculum. This can be used as an example to study general problems in quantum measurement and time dependence.
ComPADRE is beta testing Citation Styles!
Disclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications.
Citation Source Information
The APA Style presented is based on information from APA Style.org: Electronic References.
The Chicago Style presented is based on information from Examples of Chicago-Style Documentation.
The MLA Style presented is based on information from the MLA FAQ.
SPINS Java Homepage:
Is Required By PH425: Spin and Quantum Measurement
The SPINS Java software is the foundation of the PH425 course.relation by Bruce Mason
Is Based On A computer-simulated Stern–Gerlach laboratory
The SPINS Java software is based on an earlier application written for the Macintosh computer.relation by Bruce Mason
Is the Basis For QM Spins Program
The SPINS program is the basis for the QM Spins program.relation by Mario Belloni
References The Nobel Prize in Physics 1943 - Otto Stern
The SPINS Java software can be used to build virtual experiments based on the work initially done by Stern and Gerlach.relation by Bruce Mason
Covers the Same Topic As Quantum Physics Online: Spin 1/2
"Spin 1/2" explores the dynamics of a single spin in static and time-dependent magnetic fields.relation by Bruce Mason
Know of another related resource? Login to relate this resource to it.
Is Required By
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1810
}
|
First - you might want to redefine you search. Are you looking for happiness or rather positive affect? Happiness is fairly ambigious term, and it's much more associated with positive psychology studies on well-being. If you are interested in more global definition of happiness, check the work of Mihaly Csikszentmihalyi.
On the other hand, there is a large number of studies on physiological measurements of positive affect.
One such physiological measurement is Electromyography (EMG) - recording the electrical activity produced by skeletal muscles. EMG will detect very brief smiles or higher activity in cheek muscles (zygomaticus major) which are correlated with positive affect. There is quite classic (but very quoted) paper on that:
Cacioppo JT, Petty RE, Losch ME, Kim HS. (1986) Electromyographic
Activity Over Facial Muscle Regions Can Differentiate the Valence and
Intensity of Affective Reactions. J Pers Soc Psychol., 50(2):260-8. download
Another simple physiological assesment is heart rate measured by the interbeat interval (IBI). For example, study by Brosschot & Thayer (2003) shows that heart rate response is longer after negative emotions than after positive emotions.
Brosschot JF, Thayer JF. (2003) Heart rate response is longer after
negative emotions than after positive emotions. Int J Psychophysiol.,
In fact, the full spectrum of somatic measurements have been used along heart rate including pulse transmission time to the finger, skin conductance level or pupil dilation (Partala, 2003). All those are a bit less reliable methods and usually they detect arousal rather then indicate physiological differences between positive and negative affect.
Partala T.; Surakka V. (2003) Pupil size variation as an indication of
affective processing. International Journal of Human-Computer Studies,
Finally, I would advise browsing literature on measurements of negative affect. You are likely to find some interesting methods there, like in this paper on the psychophysiology of crying (Gross et al., 1994).
Gross JJ, Frederickson BL, Levenson RW. (1994) The psychophysiology of
crying. Psychophysiology, 31(5):460-8. download
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2151
}
|
The plant collections of the Smithsonian Institution began with the acquisition of specimens collected by the United States Exploring Expedition (1838-1842). These formed the foundation of a national herbarium which today numbers 4.8 million historical plant records, placing it among the world's largest and most important.
Nearly 800,000 specimen records (including over 90,000 type specimens with images) are currently available in this online catalog.
Select a tab on this page to search by Keyword or Selected Fields. If you don't know what you want to see, you may want to look at the sample records in the Quick Browse section below. Searches are limited to 2000 records and the results are sorted by taxonomic group. If you need to retrieve a larger record set, contact the Department of Botany's Data Manager.
See the Help tab to learn more about searching and then exploring your returned results (sorting, exporting, etc.).
||Sample Records from the DC Flora Collection
||2205692 2197595 2191752 2175968 2213272 2196389 2200318 2192830 2219158 2200909 2208745 2223985 2175937 2192264 2220376
||Sample Records from the Botanical Type Register
||2119407 2149872 2161549 2790611 2105614 2099734 2134596 2116358 2166713 2151580 2158541 2143664 2097212 2076608 2167306 2121665 2095940 2075490
||Sample Records from the Wilkes Expedition
||2524597 2705372 2705371 2743367 2699717 2741233 2741229 2733613 2741227 2680776 2741226 2741217 2741216 2687168 2702446 2684992 2680753 2680752 2741176 2741175 2693758 2680751 2678261
Enter your keywords separated by spaces and click Search. Records that match your search terms will be returned.
- Using parentheses to clarify the logic, you can create complex queries with OR and NOT (here capital letters are required, otherwise they will be treated as keyword terms).
- You can also use double-quotes to specify terms that should be treated as one.
- Lastly, you can include the terms image(s) or type(s) to find records that have images or that are type specimens.
Note that searching for common (vernacular) names may not yield the expected results. Associating common names with specimen records is a work in progress.
Keyword search example: marantaceae ("new guinea" OR australia) images
Use the By Field search to find specimen data that match values in specific database fields. Enter a value or choose one from the dropdown lists.
- Click the Search button to initiate a search. Clear resets all fields.
- Some lists are linked, so for example, choosing a Country narrows the choices for Province/State/Territory, and District/County. Dropdown choices also narrow as you type, for example, typing zing in the Family field might narrow the choice to Zingiberaceae.
- Note that the Province/State dropdown is populated only after you have chosen a Country. You can type a Province/State without selecting a Country.
- Check Only Records with Images if you want to restrict the search to records with multimedia content.
- You will receive a warning when you enter invalid information in the text fields. For example, Catalog Numbers are composed strictly of letters and numbers; other characters will raise a warning.
The results of your searches can be displayed in Grid (a sortable, customizable table)
or Gallery View (best for reviewing images). Use the Switch button to cycle between these views.
- You can choose whether to display 5, 10, 20, 50, or 100 records at a time.
In Sheet View:
- Click on the scientific name to view the full record.
- Click on the thumbnail to view larger resolutions of the image. Use Control+Click (Command+Click) to open a new browser tab.
In Grid View:
- You can choose the columns to display from any column's dropdown menu (mouse into a column header and click the dropdown icon). Under Columns, click the name to display or hide the field (you do not need to click the checkbox specifically).
- You can drag a column header to change its order of appearance in the grid.
- You can also drag the edge of a column to make it wider or narrower.
- Click in the expansion () column to view the full record.
In Gallery View:
- Click the image to view the full record.
See Exporting Results for information on downloading results to, for example, Excel or Google Earth.
Open the full collection record by clicking the expansion button () in Grid View,
on the scientific name in Sheet View,
or anywhere within the image frame in Gallery View. Inverse expansion buttons () indicate records with multimedia (typically, images).
- In the Record window, metadata for the multimedia content is available when you mouseover the thumbnail.
- Clicking the thumbnail opens the content in your browser or other appropriate application.
- Record windows may be resized or moved within the browser window.
- You may have up to ten Record windows open at any one time.
Sort results in Grid View by clicking the column header (or by choosing Sort from the column's dropdown menu).
- Sort on multiple columns by consecutively sorting columns in reverse order. For example, to view results sorted by Country and Province/State, first sort by Province/State and then sort again by Country.
- For any column you can choose to sort in Ascending or Descending order.
Export all or selected results by clicking the Export Results as CSV button in the bottom toolbar in Grid,
or Gallery View.
- Select individual records for Export by checking the export selection box (along the left edge of the Grid View grid).
- Clear all selections with the Clear Selections button in the bottom toolbar.
- Results are exported as comma-separated-values, one record per line, which can be saved to disk or opened directly with applications such as Microsoft Excel.
You can also export all or selected results to a KML file for viewing with Google Earth or other KML viewers, by clicking the Export as KML button. This button is grayed when all or selected results lack latitude/longitude values.
To create a link to specific records at NMNH provide the appropriate unit and querystring to:
where UNIT is:
- anth, birds, botany, ento, fishes, herps, iz, mammals, ms, or paleo
and QUERYSTRING is (use a plus-sign to separate words):
- One or more CATALOG NUMBERS, e.g.
- One or more BARCODES, e.g.
- The NAME of a TYPE specimen, e.g.:
- The NAME of a specimen or object, e.g.:
- The NAME (qn) and/or TYPE STATUS (qt) of a specimen, and/or its COLLECTOR (co), and/or the COLLECTION (cn) it is part of, e.g.:
(Holotypes whose name includes Torre and Bartsch collected by Webb and part of the Henderson Collection)
- To open the Collections Search to a specific search tab, e.g.
Tabs are numbered left to right, beginning with zero.
- iz/?ti=1 (Invertebrate Zoology Keywords Search)
- mammals/?ti=3 (Mammals Whale Collection Search)
There are ways to speed up your queries (or slow them down!) and to find specific information.
- The more specific you make your queries the faster they will execute. Using more, rather than fewer, terms will very likely speed up your search.
- These following special characters modify the interpretation of search terms (use with as many other terms as possible to avoid slowing your search):
- * matches any number of characters, e.g. *pseudo*
- ? matches a single character, e.g. young?lus frank?
- ! negates the presence of a term, e.g. !new
- ~ matches all terms with the given stem, e.g. ~spear for spear, spears, spearing, etc.
- = match is case-sensitive, e.g. =Paris
- Query results are typically limited to 5000 records. Avoid general queries, when you can, that are likely to bring back very large numbers of records, e.g. searching for poaceae.
- Long running queries are automatically terminated, with no results returned.
Please use the Feedback page to report back any problems you find with the data, or with using these search pages.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 7833
}
|
Coyotes spend a good deal of their day sleeping. Members of a pack or family may sleep within close proximity of each other, or they may sleep much further apart, but probably within the same couple of acres of each other. They have amazing built-in time clocks, but they also are influenced by circumstances of the moment. My own dog could tell the time and knew what was to be done at that time. For example, I always set off, with my dog, at exactly 2:40 to pick up one of my kids at school. But one day I fell asleep — I would not have made it on time except that my dog began poking me with her muzzle at exactly 2:40. Needless to say, I was amazed. The same is true for coyotes — they seem to know when it is time to meet up, but if people or dogs are around, they will delay.
Most coyotes I know like to go trekking alone. After all, their staple diet consists of voles and gophers — animals that really can’t be divvied up very well. Might as well hunt alone. But some coyotes do enjoy trekking together, usually in pairs. When they hunt in pairs, there is usually a rendezvous beforehand.
Rendezvous locations can remain the same for a while, or they can change drastically from day to day, but coyotes seem to have various favorite meeting spots which they alternate between for a while, before changing these altogether . This is where they congregate to then move together for their foraging.
In this case here, the older female had spent her day sleeping in the sun quite some distance from where the young male had been also sleeping in the sun. The female was the first to move around — she disappeared into some bushes. In the meantime, I watched the male who moved from where he had been sleeping to a new location where he curled up and then dozed a while longer. Finally, he got up, stretched, scratched, and began to forage. I watched him catch a vole and toy with it. He continued searching for voles and then looked up ahead. He must have seen the female approaching, because he sat down and watched intently. She trotted over, and arrived on the scene.
The ritual began with hugs and kisses. They are hidden in the grass in these photos, but you can see what is going on. It was intense, but lasted only about a minute. That was the first phase of the meeting. Then there was a pause where all activity ceased. I think the male was waiting for something, but since nothing happened he turned around and backed into her — it looked like a request. He did it again and then looked over his shoulder: “well?”. The older female was obliging. She began grooming the young fellow, pulling off burrs and bugs. He accepted this, repeatedly laying his ears back against his head — he seemed to melt with the attention. There was care, affection, and intensity here which few animals that I have seen show each other. The next phase of the meeting involved trotting off together. From what I have seen in the past — though I did not follow them this time — they will spend their time together trekking, marking their territory, hunting, playing, exploring and maybe even meeting up briefly with a couple of lone coyotes who live adjacent to this territory, before again returning to separate localities to rest.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3224
}
|
In the January 1994 earthquake in Northridge, California, it was reported that there were at least 50 gas-related fires in structures above ground, where rigid pipe had been the predominant gas piping material for decades. In the 1995 Kobe earthquake in Japan, where flexible gas piping had been in general use for more than 25 years, there were a negligible number of gas leaks reported in CSST piping systems compared to those reported in threaded rigid pipe. In the larger cities in Japan, CSST is now mandatory for house gas piping.
In the U.S., Factory Mutual Research (Approval Guide May 2001 Section 7-7) approved CSST gas piping systems based upon demonstrated ability in the laboratory to withstand the stresses imposed by shifting or tipping appliances and/or by damage to structural framing caused by earthquakes, without fracture or leakage. Factory Mutual approval is based upon testing side-by-side with black iron piping components by a nationally recognized seismic laboratory.
It is now documented that conventional rigid piping systems with threaded joints are more prone to breakage under seismic loading than flexible systems. This testing demonstrates that CSST has the ability to withstand the same motions that cause threaded rigid pipe to leak.
This was demonstrated in a recent fire in Pennsylvania. A lightning strike to the house at the electrical meter caused extensive damage and fire to the house. The home was originally built in the 1950s, but a master bedroom suite and garage were added in the late 1990s, and CSST was used in the addition because of its ease of installation. As a result of the fire, the addition was completely destroyed, and the roof and walls caved into the master bedroom and garage area below.
Upon examination, it showed that the CSST installed in the addition withstood the falling roof and walls, and that the CSST line was still intact after the fire. The loads placed on the CSST lines were so severe, that it stretched the corrugations out of the CSST until the pipe was almost smooth. There is no question that if rigid steel pipe were installed in that addition, it would have cracked and leaked natural gas in the fire, causing much more damage. Thanks to CSST, that danger was averted.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2252
}
|
Media Advice: Letters to the Editor
There are a number of reasons why you might want to write a letter to the editor of a newspaper or broadcast program. You might wish to raise an issue which you feel has gone under-reported; respond to an article or to notify them of any errors they may have made.
Whether dealing with the editor of a local free paper, or the BBC News, there are certain principles which it pays to follow. Firstly, it is absolutely vital that your letter is well written, professional, and does not come across as a rant. A badly written, ranting letter will do your campaign no end of trouble - undoing any good relationships that you may have built up with various journalists.
It is worth noting that there are two different types of 'letter to the editor'. The first is (rather obviously) a personal letter written to the editor; the second is a letter written for publication. There are slightly different guidelines to follow:
- If you are writing directly to the editor, then try to find out his or her name. If you can, then use it.
- If you are writing a letter for publication, then it is customary to begin your letter with "Sir," rather than addressing the editor directly. Be sure to check whether there is a seperate address or email for letters (often email@example.com).
- Give a daytime phone number where you can be contacted. Be sure to be available for comment.
- Make your first paragraph count.
- Keep your letter simple and short. Editors are pressed for time, and are unlikely to struggle through a long, rambling letter. Also, if you are writing for publication, then you are more likely to get published if there is little or no editing to be done.
- If writing for publication, remember that your letter can be edited. Make sure that you stick to one point, so that your words cannot be twisted or misinterpreted if cut down.
- Avoid point scoring and piety. It looks petty. Be calm, rational and authoritative.
- React quickly, particularly if writing for publication. Newspapers have deadlines, and the letters section's is normally about 2pm for a daily. What was relevant today may not be relevant tomorrow.
- If commenting on an article, be sure to mention the title and date of the piece. This will make it easier for the letters editor to know what you are talking about.
- It is also worth reading a few examples of published letters to get an idea of the house style. Tabloids are more acceptable of slang; broadsheets tend towards dry, academic responses.
- Some groups have written letters opposing their own demands (under a pseudonym) to keep a debate going. This can work well, but can also backfire. Be sure to make your fake letter less convincing than your real one, or you might lose the argument!
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2763
}
|
End statistics with hammer
- 2+: Ends where the team scored at least two points (i.e. the team was able to capitalize the hammer).
- 1: Ends where the team scored one point (i.e. opponent forced the team to take only one point with hammer).
- 0: Ends that the team blanked with hammer.
- Steal: Ends where the opponent scored at least one point (i.e. opponent stole points without hammer).
End statistics without hammer
- Steal: Ends where the team scored at least one point (i.e. the team managed to steal points without hammer).
- 0: Ends where the opponent blanked the end with hammer.
- 1: Ends where the opponent scored one point (i.e. the team managed to force the opponent to take only one point with hammer).
- 2+: Ends where the opponent scored at least two points (i.e. the opponent managed to capitalize the hammer).
- Result avg: Average result (points for - points against)
- Hammer avg: Averate points / end in those ends where the team played with hammer.
- Without hammer avg: Average points / end where the team played without hammer.
- Hammer value: Describes the value of hammer to the average points the team scored in an end.
Remarks about statistics
Apart from the result average, last end scores have been ignored in those cases where the losing team scored points. The purpose of this is to clean the data from distortions so the statistics would describe how teams have played in "normal" situations.
Example: the winning team has given a steal of one point in the last to guarantee a victory. This end has been ignored because the situation in the game is not "normal"
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1594
}
|
| Recommend this book || Back |
|Title Review |
Manipuri is one of the scheduled languages of India. The outcome of a series of workshops, the volume presents a total of 60 lessons, meant primarily for the Manipuri teacher trainees who were not acquainted with the language earlier, which constitute the Basic Course of learning Manipuri in the North East Regional Language Centre, Guwahati of the Central Institute of Indian Languages. The Basic Course is a three-phase ten-month course of 1100 hours of instruction. The Basic Course is intended to help readers perceive and reproduce sounds and their meaningful sequences, form sentences orally from given patterns and lexical items, narrate specific events orally, and converse with the teachers and fellow trainees on specific topics.
The lessons in the book comprise dialogue, drills, exercises, vocabulary and notes. The language variety used for the dialogues and other purposes is the standard colloquial as spoken by educated Manipuris in the valley districts of Manipur. Some of the lessons in the book are provided with literature on Parivardhit Devanagari using extra symbols to represent the different Manipuri sounds.
To make the teaching much more relevant, the work contains characters and situations that are not typical of the Manipur environment and context but are essentially relevant to the use of Manipuri language by the adult second language learners. Though the book is the prescribed text for the Basic Course phase of learning Manipuri, it may also be used for any generalised second language programme in Manipuri by adult learners and their teachers.
| Similar Books |
| 1. Learning Hindi through English / |
| 2. A glimpse of Santali phonology / |
| 3. A glimpes [i.e. glimpse] of Santali grammar / |
| 4. An intermediate course in Malayalam / |
| 5. A programmed course in Tamil / |
|Related Subjects |
| 1. Linguistics|
| 2. Languages|
| 3. Himalayan And North East Indian Studies|
An intensive course in Manipuri
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1996
}
|
How Much Potential Energy Do Different Nuts Have?
It seems that at least once a year California has another energy crisis, and almost as often, someone wonders what will happen when California runs out of energy sources. Christopher Crews, knowing that all living things contain energy, set out to prove that different varieties of nuts have energy stores that can be released by burning.
I believe that burning different varieties of nuts will produce energy, and that peanuts will produce the most energy.
Amount of heat produced
- Number of nuts tested
- Amount of water
- Ten each whole, raw, unshelled nuts:
- 32-ounce coffee can
- Two 10-ounce soup cans
- Drill and bits
- Kitchen scale
- Fill large coffee can with water.
- Measure nut.
- Weigh water on kitchen scale.
- Measure and record starting water temperature.
- Drill hole through nut.
- Insert skewer through hole in nut.
- Heat nut with lighter and let the nut burn fully.
- Measure and record ending water temperature.
- Calculate BTU (starting temperature minus ending temperature divided by the weight of the water). BTU stands for British Thermal Unit, the energy necessary to raise the temperature of one pound of water by 1@dgsF. One BTU equals approximately 1,055 joules (or 1,055 watt-seconds).
- Repeat Steps 1 through 9 for each nut.
The average BTU for each type of nut is as follows:
Cashews 15.75 BTU
Almonds 13.76 BTU
Peanuts 10.77 BTU
The hypothesis was that burning different varieties of nuts would produce energy, with peanuts producing the most energy. That’s partially correct because all the nuts produced energy. However, the hypothesis was incorrect because the cashews produced the most energy, and peanuts produced the least.
Warning is hereby given that not all Project Ideas are appropriate for all individuals or in all circumstances. Implementation of any Science Project Idea should be undertaken only in appropriate settings and with appropriate parental or other supervision. Reading and following the safety precautions of all materials used in a project is the sole responsibility of each individual. For further information, consult your state’s handbook of Science Safety.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2175
}
|
Referrals & Appointments
CT Lung Scan
Edward Cancer Center offers a CT Lung Screening for at risk patients. This lung screening, designed to assist in early detection, can give those at risk the opportunity for a healthier lifestyle.
Why should I have a CT Lung Screen?
Lung cancer is the No. 1 cancer killer in the United States, with 222,520 people expected to die from it this year. In part, this is because there has been no reliable way to detect lung cancer in its earliest, most treatable stage. Now, new research suggests a way to screen people at high risk for lung cancer and reduce the number of deaths from this disease.
Who should have a CT Lung Screen?
The National Comprehensive Cancer Network (NCCN) has recommended screening for high-risk individuals ages 55 to 74 who have smoked a pack or more of cigarettes a day for 30 years or more, and who are still smoking or who quit less than 15 years ago. The NCCN also recommends screening for those 50 and older who have smoked a pack a day or more of cigarettes for 20 years or longer and have one additional risk factor for lung cancer. This could include a history of exposure to radon or occupational exposure to certain chemicals.
Does the CT Lung Screen hurt or is it uncomfortable?
No, the screen is simple and painless. You simply lay on the screenning table, which slides under a large open cylinder, and hold your breath for a few seconds.
It is a quick procedure – about 15 minutes including prep time.
Are there any risks?
A CT Lung Screening finds abnormalities in about 20 to 60 percent of smokers and former smokers, but most of these abnormalities are scars from inflammation or other noncancerous conditions. In some cases, screenings may lead to biopsy, causing anxiety for those getting screened and their loved ones. Often the spot is found to be benign, but that can only be determined through an invasive procedure.
CT screens are so good at seeing nodules or spots on the lung that they can see very small nodules that don't need immediate testing, but do need follow-up CT screenings to detect any changes, and CT screens expose you to a small dose of radiation. Compared with some other parts of the body, such as the breast, lungs have greater potential for developing radiation-induced cancer. The risk of developing cancers from CT screens is small, but it's a reminder of the importance of weighing the risk versus the benefit of any medical test.
Why should I have my CT Lung Screen at Edward?
Unlike other centers that simply screen and provide your results, the Edward Cancer Center has a Multidisciplinary Thoracic Oncology Clinic made up of a team of cancer experts. Once you are screened, you will automatically be enrolled in our Multidisciplinary Clinic and our experts will actively follow up with you on a yearly basis to monitor your lung health.
In the event a nodule is found to be cancerous, our team will notify you immediately and schedule you to meet with the physicians who make up our Multidisciplinary Clinic. These physicians gather with you to review and discuss your case and develop an individualized treatment plan. The result is coordinated, faster, and more efficient treatment. With our Clinic, patients are able to start treatment within weeks, whereas at other facilities, it can take up to a month just to coordinate the treatment plan.
In addition, we have a nurse navigator who helps guide patients and families with anything and everything – from answering treatment questions to lending a supportive ear.
While our team will track and closely monitor your care, we will also keep your primary care physician informed of any tests, treatments, and results in order to enhance communication and coordination of care.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3741
}
|
When Someone Dies
A Practical Guide to Holistic Care at the End of LifeBy
- Hannah Cooke, BSc(Hons), MSc(Econ), MSc(Nursing Studies), RGN, DN, RNT, Lecturer in Nursing, University of Manchester School of Nursing Studies, Manchester, UK
Caring for patients who have been diagnosed with terminal illness provides a challenge to all healthcare professionals, as confronting the possibility of death and discussing it openly and supportively with the patient and their family is not easy. To ensure death with dignity, patients need holistic care: practical, social, emotional as well as spiritual needs must be met. This new book by Hannah Cooke links all these areas to provide practical support and advice on areas such as choices of treatment (including the use of complementary therapies), pain control, counselling and religious beliefs. There is also a section on the care of the bereaved with a list of helpful organisations that can be contacted.
'When Someone Dies' will help nurses and other healthcare professionals implement a partnership of care that will ensure that their patients live until they die.
Paperback, 192 Pages
Published: June 2000
Imprint: Butterworth Heinemann
- Part One: Caring for the Dying Patients and their Families: Communicating with dying patients and their families; Choices for dying people; Patient comfort and control of symptoms; Wills and end of life decisions; Part Two: Care of the patient after death; Organ donation and donation of bodies; Part Three: Care of the Bereaved: Supporting the bereaved; Practical matters following a death; Part Four: Caring of the Religious Needs of the Dying: Meeting religious needs in the hospital setting; Religious traditions and healthcare; Index
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1727
}
|
How hot is it where you are? Tell your stories at CNN's iReport.
(CNN) -- For many Americans, this summer has been miserably hot.
Heat advisories and warnings have been issued from coast to coast, with high temperatures often reaching into the triple digits, and July went into the record books as the hottest month ever for the continental United States.
But in certain parts of the world, this is the norm -- or maybe even on the cool side.
Try Kuwait City, for instance. In July, its average high temperature is 116 degrees Fahrenheit.
Or Timbuktu in Mali, where the highs average 108 in May and was once recorded at 130. 130! That ranks fifth on the all-time list.
The highest temperature ever recorded on the planet was in 1922, when a thermometer in El Azizia, Libya, hit 136. Some dispute that mark, saying it was improperly measured. If that's true, the record would be the 134, reached nine years earlier in Death Valley, California.
But the world's hottest place might not be any of these, according to a team of scientists from the University of Montana. It says the highest temperatures on Earth are found in areas that don't even have weather stations.
"The Earth's hot deserts -- such as the Sahara, the Gobi, the Sonoran and the Lut -- are climatically harsh and so remote that access for routine measurements and maintenance of a weather station is impractical," said David Mildrexler, lead author of a recent study that used NASA satellites to detect the Earth's hottest surface temperatures.
The satellites detect the infrared energy emitted by land. And over a seven-year period, from 2003 to 2009, they found Iran's Lut Desert to be the hottest place on Earth.
The Lut Desert had the highest recorded surface temperature in five of the seven years, topping out at 159 degrees in 2005. Other notable annual highs came from Queensland, Australia (156 degrees in 2003) and China's Turpan Basin (152 degrees in 2008).
It's important to stress that surface temperatures are naturally higher than the air temperatures measured by weather stations. Air temperatures have to be measured by thermometers placed off the ground and shielded from sunlight, according to global meteorological standards.
But the study shows that today's modern records might not necessarily be the most accurate.
"Most of the places that call themselves the hottest on Earth are not even serious contenders," co-author Steve Running said.
The world's highest recorded air temperatures 1. El Azizia, Libya (136 degrees Fahrenheit) 2. Death Valley, California (134) 3. Ghadames, Libya (131) 3. Kebili, Tunisia (131) 5. Timbuktu, Mali (130) 5. Araouane, Mali (130) 7. Tirat Tsvi, Israel (129) 8. Ahwaz, Iran (128) 8. Agha Jari, Iran (128) 10. Wadi Halfa, Sudan (127)
Highest recorded air temperature (by continent) Africa: El Azizia, Libya (136) North America: Death Valley, California (134) Asia: Tirat Tsvi, Israel (129) Australia: Cloncurry, Queensland (128*) Europe: Seville, Spain (122) South America: Rivadavia, Argentina (120) Antarctica: Vanda Station, Scott Coast (59)
Sources: NOAA, World Meteorological Organization
* This temperature was measured using the techniques available at the time of recording, which are different to the standard techniques currently used in Australia. The most likely Australian record using standard equipment is an observation of 123 degrees, recorded at Oodnadatta, South Australia.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3412
}
|
is a lightweight, openwork fabric, patterned with open holes in the work, made by machine or by hand. Lace-making is an ancient craft. True lace was not made until the late 15th and early 16th centuries. A true lace is created when a thread is looped, twisted or braided to other threads independently from a backing fabric.
Originally linen, silk, gold, or silver threads were used. Now lace is often made with cotton thread. Manufactured lace may be made of synthetic fiber. A few modern artists make lace with a fine copper or silver wire instead of thread.
There are many types of lace, defined by how they are made. These include:
*Needle lace: made using a needle and thread. This is the most flexible of the lace-making arts.
*Cutwork, or whitework; lace constructed by removing threads from a woven background, and the remaining threads wrapped or filled with embroidery.
*Bobbin Lace: as the name suggests, made with bobbins and a pillow.
*Tape lace: makes the tape in the lace as it is worked, or uses a machine- or hand-made textile strip formed into a design, then joined and embellished with needle or bobbin lace.
*Knotted lace: including Macramé and Tatting.
*Crocheted lace: including Irish crochet, pineapple crochet, and filet crochet.
*Knitted lace: including Shetland lace, such as the "wedding ring shawl", a lace shawl so fine that it can be pulled through a wedding ring.
*Machine-made: any style of lace created or replicated using mechanical means. The machine is used to tie up the 'M' point together.
is most typically a closely-woven unbleached or white cloth, produced from corded cotton yarn. Wide muslin is called "sheeting". It is often used to make dresses or curtains but may also be used to complement foam for bench padding. Muslin breathes well, and is a good choice of material for clothing meant for hot, dry climates.
is a natural protein fiber, some forms of which can be woven into textiles. The best-known type of silk is obtained from cocoons made by the larvae of the silkworm Bombyx mori reared in captivity (sericulture). The shimmering appearance for which silk is prized comes from the fibers' triangular prism-like structure which allows silk cloth to refract incoming light at different angles.
is a soft fibre that grows around the seeds of the cotton plant (Gossypium sp.), a shrub native to tropical and subtropical regions around the world, including the Americas, India, and Africa. However, virtually all of the commercial cotton grown today worldwide is grown from varieties of the native American species Gossypium hirsutum and Gossypium barbadense. The fiber is most often spun into yarn or thread and used to make a soft, breathable textile, which is the most widely used natural-fiber cloth in clothing today.
is fiber with strands less than one denier. Microfiber is the perfect blend of polyester and polyamide. Fabrics made with microfibers are exceptionally soft and hold their shape well. When high quality Microfiber is combined with the right knitting process, it creates an extremely effective cleaning material. This material can hold up to seven times its weight in water. They are also used for some cleaning applications, because of their exceptional ability to absorb oils.
is a manufactured regenerated cellulosic fiber. Rayon is produced from naturally occurring polymers and therefore it is not a truly synthetic fiber, nor is it a natural fiber.
is a synthetic fiber known for its exceptional elasticity (stretchability). It is stronger and more durable than rubber, its major non-synthetic competitor.
is a cloth that typically has a glossy surface and a dull back. It is a warp-dominated weaving technique that forms a minimum number of interlacings in a fabric. If a fabric is formed with a satin weave using filament fibers such as silk, nylon, or polyester, the corresponding fabric is termed a "satin".
The popularity of stockings increases and decreases with fashion. It was formerly made of woven cloth but now of knitted wool, silk, cotton or nylon.
The most common and well-known use of corsets is to slim the body and make it conform to a fashionable silhouette. For women this most frequently emphasizes a curvy figure, by reducing the waist, and thereby exaggerating the bust and hips. However, in some periods, corsets have been worn to achieve a tubular straight-up-and-down shape, which involves minimizing the bust and hips.
A wide variety of types of panties exist. Bikini panties are designed so that the hip connectors are small, like on those of swim wear. String bikini panties are the most commonly worn type in the United States by high school and college age women, and are similar to regular bikini panties, but instead of a thin hip grip, they have a small string, which sometimes ties around the waist rather than being pulled up over them. String bikini is considered more revealing. String bikini are usually made of satin or silk, but occasionally from other fabrics. High-cut, or control top, are cut higher on the hip to slightly pull in and shape the stomach to conceal obesity. High-cut are usually worn by older women and are often shunned by younger women. Boyshorts describe a type of female underwear that has a lower, thicker cut of material around the hips, making them appear as shorts that men would wear. They are sometimes by men and women alike criticized as not being feminine, although some women do wear them. The g-string is a thong panty with a string running between the buttocks. It is often jokingly referred to as "floss" by critics and some comedians.
Panties are made of a variety of materials and fabrics including satin, silk, pvc, cotton, nylon, mesh, lace, rawhide, leather, lycra, and/or polyester.
In British English, and in places such as Great Britain, Wales, Australia, New Zealand, Scotland, Ireland, South Africa and India, panties are often referred to as knickers. The term knickers is not generally used in The United States and Canada, where the term "panties" is usually favored.
A G-string (alternatively gee-string or gee string) is a type of thong is a narrow piece of cloth, leather, or plastic that covers or holds the genitals, passes between the buttocks, and is attached to a band around the hips, worn as swimwear or underwear by both men and women.
is an article of clothing that covers, supports, and elevates the breasts. The bra is considered a foundation garment, as well as an undergarment, because of its role in shaping the wearer's figure. It was originally developed in the late nineteenth and early twentieth centuries to replace the corset, and has now become, in many parts of the world, the most popular form of undergarment for the upper body, although camisoles and chemises are becoming more popular.
The bra may be worn to support and enhance breast shape during everyday activities and a specialized bra, the sports bra to support and restrain breasts during exercise. Some wearers believe that wearing it will prevent their breasts from sagging later in life
A wide range of styles of brassieres now exists, to be worn in a variety of situations, and with a variety of outergarments. For instance strapless, backless and multiway bra styles specialise in being invisible underneath less than full coverage garments whereas push up and plunge focus on shaping the bust and cleavage. The degree of shaping and coverage of the breasts varies between styles, as do functionality and fashion, fabric, and colour. Styles range from the purely utilitarian to the sensual. Others include various accessory structures such as padding and underwiring.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 7622
}
|
Some operations are difficult or even impossible to obtain with an expression, or the operation could become too complex to achieve. The alternative is to create a function that would take care of performing the operation and supplying the result to the table. Of course, as you may know already, a function is its own object. This means that, after creating it, to use its result in a table, you must call it. For example, you can create a function that returns a value, then call that function and assign its returned value to a column. You can create your own function and use it, or you can use one of the built-in functions of Transact-SQL.
In order to involve a function with your data entry, you must have one. You can create your own function using the techniques we learned already. To make the function easily accessible, you should create it as part of the database that would use it. Here is an example:
-- ============================================= -- Author: FunctionX -- Create date: Saturday 22 December 2007 -- Description: Used to calculate the greatest common divisor -- ============================================= CREATE FUNCTION GCD ( @a int, @b int ) RETURNS int AS BEGIN DECLARE @Remainder int; WHILE @b <> 0 BEGIN SET @Remainder = @a % @b; SET @a = @b; SET @b = @Remainder; } RETURN @a }
When calling the function, follow the normal rules. Here are examples:
INSERT INTO Calculations VALUES(345, 135, dbo.GCD(345, 135)); GO INSERT INTO Calculations VALUES(40, 6, dbo.GCD(40, 6)); GO INSERT INTO Calculations VALUES(16, 28, dbo.GCD(16, 28)); GO
You can use one of the built-in functions of Transact-SQL. Probably the best way to be familiar with the built-in functions is to check the online documentation to find out if the assignment you want to perform is already created. Using a built-in functions would spare you the trouble of creating your own function. For example, imagine you have a database named AutoRepairShop and imagine it has a table used to create repair orders for customers:
CREATE TABLE RepairOrders ( RepairID int Identity(1,1) NOT NULL, CustomerName varchar(50), CustomerPhone varchar(20), RepairDate DateTime ); GO
When performing data entry for this table, you can let the user enter the customer name and phone number. On the other hand, you can assist the user by programmatically entering the current date. To do this, you would call the GETDATE() function. Here are examples:
INSERT INTO RepairOrders(CustomerName, CustomerPhone, RepairDate) VALUES('Annette Berceau', '301-988-4615', GETDATE()); GO INSERT INTO RepairOrders(CustomerPhone, CustomerName, RepairDate) VALUES('(240) 601-3795', 'Paulino Santiago', GETDATE()); GO INSERT INTO RepairOrders(CustomerName, RepairDate, CustomerPhone) VALUES('Alicia Katts', GETDATE(), '(301) 527-3095'); GO INSERT INTO RepairOrders(RepairDate, CustomerPhone, CustomerName) VALUES(GETDATE(), '703-927-4002', 'Bertrand Nguyen'); GO
You can also involve the function in an operation, then use the result as the value to assign to a field. You can also call a function that takes one or more arguments; make sure you respect the rules of passing an argument to a function when calling it.
If none of the Transact-SQL built-in functions satisfies your requirements, you can create your own.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3282
}
|
Menezes, Pradeep L and Kishore, * and Kailas, Satish V (2006) Studies on friction and transfer layer using inclined scratch. In: Tribology International, 39 (2). pp. 175-183.
Restricted to Registered users only
Download (562Kb) | Request a copy
Friction influences the nature of transfer layer formed at the interface between die and sheet during forming. In the present investigation, basic studies were conducted using 'Inclined Scratch Test' to understand the mechanism of transfer layer formation during sliding of pins made of an Al-Mg alloy on EN8 steel flats of different surface roughness under dry and lubricated conditions. The surfaces produced can be categorized into three different types: (a) uni-directional (b) 8-ground and (c) random. Rubbing the EN8 flat in a uni-directional manner and a criss-cross manner on emery sheets produced the uni-directional and 8 ground surfaces. The random surfaces were produced by polishing the EN8 flats using various abrasive powders. The influence of the 'nature of surface roughness' on material transfer and coefficient of friction were investigated. Scanning Electron Microscopy studies were performed on the contact surfaces of the Al-Mg alloy pins and EN8 steel flats to reveal the morphology of the transfer layer obtained. It was seen that the transfer layer is dependant on the coefficient of friction. The coefficient of friction, which has two components-the adhesion component and the plowing component, is controlled by the 'nature of surface'. A surface that promotes plane strain conditions near the surfaces increases the plowing component of friction.
|Item Type:||Journal Article|
|Additional Information:||Copyright for this article belongs to Elsevier.|
|Keywords:||Friction; Nature of surface; Inclined scratch|
|Department/Centre:||Division of Mechanical Sciences > Materials Engineering (formerly Metallurgy)
Division of Mechanical Sciences > Mechanical Engineering
|Date Deposited:||19 Jan 2006|
|Last Modified:||19 Sep 2010 04:23|
Actions (login required)
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2032
}
|
- Futurity.org - http://www.futurity.org -
On sale! But does inexpensive mean cheap?
Posted By Amy Wolf-Vanderbilt On November 27, 2012 @ 10:32 am In Society & Culture | No Comments
VANDERBILT (US) — The holidays usher in the biggest shopping season of the year, but sellers need to beware: sale prices can mean different things to different consumers.
New research shows that consumers often make inferences to fill in gaps in knowledge when they don’t have complete information regarding products. To some, price denotes quality. For others, a low price means a good value.
New research by Vanderbilt Owen Graduate School of Management professor Steve Posavac and his co-authors finds that in some consumers’ minds, price denotes quality. For others, low price leads a consumer to believe he or she is getting a good value.
“The bottom line of our research is that people can hold two opposing beliefs about a product. In the case of price, most people simultaneously believe that low prices mean good value and that low prices mean low quality. But these two beliefs are not equally present in consumers’ minds all the time,” says Steve Posavac, professor in marketing at Vanderbilt University.
Published in a forthcoming Journal of Consumer Research , the study finds that consumers use a series of theories when considering value and price. And how they size up a possible purchase depends on what’s on their mind when they’re thinking about a given product.
“Consumers rarely have complete information and use various strategies to fill the gaps in their knowledge as they consider and choose products. One of these strategies involves using naive theories: informal, common sense, explanations that consumers use to make sense of their environment,” write Posavac and his co-authors Hélène Deval, Susan P. Mantel, and Frank R. Kardes.
For example, consumers may believe that popular products that are well advertised are high in quality while also believing that scarce or rarely heard of products are high in quality.
Price vs. quality
The researchers conducted eight experiments that tested marketing techniques that leaned toward price or quality. In one experiment, consumers were shown an ad for a bottle of wine with either a high or low price. When subtly reminded of quality, consumers evaluated the expensive wine more favorably than the cheap wine. However, when subtly reminded of value, they rated the cheap wine more favorably.
When marketing backfires
Sales promotions succeed when consumers perceive that they are getting a good deal, but they can also backfire if consumers perceive that lower prices indicate poor quality. Posavac uses department store J.C. Penney as an example.
“A company may implement an everyday low-pricing strategy that manages to reduce brand value and alienate consumers if many of them believe that low prices equal low quality. Over the years, J.C. Penney customers had become so used to sales that they no longer believed they were getting a good deal,” says Posavac.
Because consumers use multiple “naïve theories” when analyzing a product, a company’s subtle marketing tactics toward price or quality may attract one consumer while easily turning another consumer off.
“[Companies] design a strategy by assuming that a certain naive theory is going to drive consumer evaluation and choice when, in fact, several naive theories are available to the consumer,” the authors conclude.
Source: Vanderbilt University
Article printed from Futurity.org: http://www.futurity.org
URL to article: http://www.futurity.org/society-culture/on-sale-but-does-inexpensive-mean-cheap/
URLs in this post:
Read the original study: http://www.jstor.org/userimages/ContentEditor/1351717003127/DevalRelease.pdf
Vanderbilt University: http://news.vanderbilt.edu/2012/11/cheap/
Copyright © 2009 Futurity.org. All rights reserved.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 3861
}
|
FAUZIAH, CATUR KHUROTUL (2007) HUBUNGAN ANTARA RELIGIUSITAS DENGAN KEPUASAN HIDUP PADA LANJUT USIA. Other thesis, University of Muhammadiyah Malang.
Download (58Kb) | Preview
Religiosity is an appreciation, confidence, experience or individual conscience against religious teachings are realized in practice worship and religious rituals. Terbinanya religiosity properly, can raises life satisfaction for the elderly. Where life satisfaction is a state which includes feelings of passion in it, have assertiveness and tough or resilient, the match between the desire to achievement of goals, have positive self concept, and mood calm. The purpose of this study was to determine the relationship between religiosity to life satisfaction in elderly. This study uses a quantitative approach. The subject of this research is the elderly who followed the routine recitation in boarding school Nurul Ulum. The sampling technique used is total sampling. With number of study subjects 50 people. Data collection methods used there are 2 kinds of scales are scales of religiosity and life satisfaction scale. Data collected and then analyzed by using correlation product moment using the computer program SPSS for Windows version 10. Results obtained from this study indicate that there is a relationship positive and highly significant correlation between religiosity to life satisfaction in advanced age (r = 0.419 p = 0.002). This means that the higher the religiosity which is owned the higher the person's life satisfaction, and vice versa the lower the religiosity of a person will get low life satisfaction. The effective contribution of religiosity to the satisfaction living elderly by 17.6%, while 82,4% influenced by other variables had not been examined.
|Item Type:||Thesis (Other)|
|Subjects:||B Philosophy. Psychology. Religion > BF Psychology|
|Divisions:||Faculty of Psychology > Department of Psychology|
|Depositing User:||Zainul Afandi|
|Date Deposited:||29 May 2012 09:29|
|Last Modified:||29 May 2012 09:29|
Actions (login required)
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2045
}
|
Click chemistry is a term introduced by Professors Valery V. Fokin and Nobel laureate K.B. Sharpless to describe chemistry tailored to generate substances quickly and reliably by joining small units together similar to the modular strategy adopted by Mother Nature. The term “click chemistry” implies that the reactions are highly efficient, wide in scope, product isolation is easy, stereospecific, simple to perform using inexpensive reagents, and can be conducted in benign solvents such as water. The copper-catalyzed variant of Huisgen azide-alkyne cycloaddition (CuAAC) fits the concept well and is one of the most popular prototype click reactions to date. Click chemistry is finding a number of applications in the areas of drug discovery, bioconjugation, and material science. It has been successfully utilized in the synthesis of peptides, particularly in peptide cyclization and modifications.
CuAAC click reaction between an azide and alkyne takes place in presence of a Cu (I) catalyst under mild conditions, resulting in the formation of a triazole link connecting the two molecules. In peptide chemistry the increasing popularity of the CuAAC is largely a result of the unique properties of both azides and the resulting triazoles. Azide groups are easy to introduce, stable to water and oxidative conditions, and orthogonal to many functional groups in peptide synthesis. For applications in vitro and in vivo, azides are virtually absent from any naturally occurring species (bioorthogonal). Interestingly, the triazole moiety formed by click reaction has unique similarity to an amide bond. The relative planarity, strong dipole moments, and hydrogen bonding ability of triazole linkage make it as attractive as an amide bond with the added advantage that it is less prone to hydrolytic cleavage.
Click chemistry provides a number of avenues for peptide synthesis and modifications and could be combined with other techniques to make complex structures and multicomponent functionalized systems with ease. For example, peptides can be converted postsynthetically to an azido derivative which can be clicked with an appropriate substrate containing a clickable alkynyl group or vice versa. Peptides can also be made by inter- and intramolecular click reactions using azide or alkyne containing amino acids or building blocks during peptide synthesis. Building blocks containing clickable moieties are instrumental in constructing side-chain modified peptides, interside-chain peptide chimera, peptide small molecule conjugates, and cyclic peptides. Solid phase resins modified with clickable groups can also be used for making clickable/modified peptides. Click chemistry is compatible with various protected amino acid side chains used in peptide synthesis.
A number of reagents and building blocks can be utilized for peptide click chemistry. These include azido-amino acids (e.g. Fmoc- protected for solid phase synthesis), propargyl amino acids, PEG azide and alkynes (Maleimide-PEG3-Azide and acetylene PEG maleimide for pegylation), alkyne and azide containing chemical modification reagents (propargyl amine, 1-(2-nitrophenyl) propargyl alcohol, succinidyl-hex-5-ynoate, succinimidyl-4-azovalerate, pentynoic acid, 2-azido-3-methyl propanoic acid) and Diazo transfer reagents (imidazole-1-sulfonyl azide).
Synthesis of Cyclic Peptides
A variety of macrocyclization methods are available to increase the clinical efficacy and bioavailability of peptide drugs. Cyclization stabilizes the peptide molecule by locking its conformation, thus increasing potency and in vivo half-life. Introduction of azide and alkyne moieties into structurally diverse peptide side chains, combined with on-resin macrocyclization conditions, is used to design structurally constrained peptides.
Click reaction has been exploited in a number of different peptide cyclization reactions such as the cyclization of a disulfide-containing peptide on the resin with or without protecting groups on; the preparation of novel heterodetic cyclopeptides by an intramolecular side chain-to-side chain click reaction, forming a 1,4-disubstituted [1,2,3] triazolyl-containing bridge; cyclization of tripeptides for making vancomycin-inspired mimics; on-resin cyclization of peptide ligands of the vascular endothelial growth factor receptor 1, etc. Formation of macrocyclic heterodimers were observed in many cases in high yield during click-mediated macrocyclization reactions, opening up the prospects of synthesizing complex peptide structures, which are otherwise difficult to make. Side chain-to-side chain cyclization, e.g., by ring-closing olefin metathesis, known as stapling, is one approach to increase the biological activity of short peptides that has shown promise when applied to 3(10)- and α-helical peptide. A novel stapling methodology for 3(10)-helical peptides using CuAAC click reaction in a model aminoisobutyric acid (Aib) rich peptide resulted in a more ideal 3(10)-helix than its acyclic precursor.
Chemical Ligation of Peptides
Joining two or more peptide fragments together to make a larger peptide chain is called ligation. Click chemistry can be conveniently utilized to make peptide–peptide linkages. A peptide fragment functionalized with an alkyne group could be ligated to another peptide with an N-terminal azide moiety resulting in a triazole linker (similar to an amide bond as explained earlier) holding two peptide units together. Similarly, multimeric peptides can be made by orthogonal side chain–protecting groups such as Ivdde or Aloc (e.g. side chain of Lys) followed by deprotection, attachment of an alkyne function and clicking with N-terminal azide peptides.
Several examples of peptide ligation is available, such as: the synthesis of a clickable RGD peptide (made by reacting Lys side chain with azido acetic acid) that can be clicked to another peptide fragment; synthesis of cell-permeable peptide by ligating a therapeutic alkynyl-modified peptide (using inexpensive propargylamine or 1-(2-nitrophenyl) propargyl alcohol) with nona-arginine modified with an azide group; synthesis of neurotensin (8–13) containing heterodimers by clicking alkyne-neurotensin (made by reacting with succinidyl-hex-5-ynoate) with azide of a Plk1-PBR binding phosphorylated hexapeptide (made by reacting with succinimidyl-4-azidovalerate). Click triazole-based oligopeptides were also found to self-dimerize in a head-to-tail fashion.
Synthesis of Modified Peptides
Modification of peptides by pegylation has been achieved by click chemistry. For example a lipopeptide was assembled on a solid phase resin followed by an on-resin pegylation reaction (using azido-peg) and cleavage of the pegylated peptide off the resin. Such molecules are ideally suited for functionalization of solid-supported lipid bilayers and liposomal drug delivery systems, and are particularly valuable in enzyme activation strategies. There is a tremendous potential for click chemistry for various chemical modification of peptides and proteins (e.g., attaching ligands, lipophilic or liphophobic groups, hydrophilic and hydrophobic linkers etc.) and a number of clickable substrates can be designed for this purpose.
Arginine-rich TAT peptides (capable of penetrating plasma membrane directly) modified with clickable azido group can be conjugated to oligonucleotides, cytotoxic drugs, kinase inhibitors etc. to facilitate cell penetration for therapeutic applications. Alkyne or azido containing prosthetic groups of radioisotopes could be used for labeling modified peptides.
In conclusion, click chemistry is a powerful technique for the synthesis and modification of peptides. In the future, the applications of click chemistry to peptides will grow drastically due to the potential of these molecules in drug development, diagnostics, cosmetics, and material science combined with the simplicity and efficiency of click reactions. It will be possible to overcome difficulties in making complex peptides employing this elegant chemistry.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 8039
}
|
Glanford Brigg Poor Law Union
- As a result of the Poor Law Amendment Act reform of 1834, 50 Brigg-area parishes covering 252 square miles in Lincolnshire, just south of the River Humber, became part of the Glanford Brigg Poor Law Union which was formally constituted on 18 January 1837. The count of parishes increased over the years as new parishes formed in the district. See an expanded history at the Peter Higganbotham site.
- This Poorlaw region covered 165,470 acres of land.
- The Registration District had three subdistricts: Brigg, Barton and Winterton. The Winterton subdistrict was originally called the Messingham subdistrict (this changed between 1842 and 1872).
- A workhouse was built on Wrawby Street, at the entrance to the town from Wrawby parish. It was built in 1835-37 of white brick, designed to hold 220 inmates. It had a detached fever ward. A new infirmary was erected in 1914-15. A photo of the infirmary is at: Workhouse Infirmary
- The Board of Guardians met on alternate Thursdays at the workhouse.
- The workhouse later became "Glanford Hospital". This closed in 1991. The buildings were later demolished, with the exception of the infirmary.
- The Lincolnshire Archives has the Guardians' minute books 1920-1930; the Minutes of Committees 1912-30, Register of Inmates 1928-37; Register of Births 1914-1944; Boarding out 1912-30; etc. All records are subject to 100-year closure for privacy.
- For a map of the area, see: Alan Godfrey maps.
- For more on what the LFHS and the Lincoln Archives have on Lincolnshire Poor Law records, see our Poorhouses page.
||H.O. 107 / 2116
- 1842: Relieving officer: Charles CAPES.
- 1856: Sir Robert SHEFFIELD, baronet, Chairman of the Board of Guardians; John HETT, clerk; Rev. J. R. WEST, chaplain; George EMPRINGHAM, workhouse master; Mrs. EMPRINGHAM, matron. Relieving officers: Thomas JAMESON, William MASON and Charles CLAY.
- 1872: Rowland WINN, Chairman of the Board of Guardians; John HETT, clerk; Rev. J. R. WEST, chaplain; George EMPRINGHAM, workhouse master; Mrs. EMPRINGHAM, matron. Relieving officers: George WRIGHT, William MASON and Charles CLAY.
- 1881: Henry GIBSON, workhouse master; Mrs. Caroline Hall GIBSON, matron. Miss Emily OWENS, schoolmistress; Miss Charlotte GRADY, Nurse; Miss Harriet ANDREWS, Nurse; Thomas HILL, Porter.
- 1913: Rev. George GODFREY, Chairman of the Board of Guardians; John BEAULAH, Vice Chairman; Richard Fox SMITH, Vice Chairman; Frank C. HETT, clerk; Alexander S. L. MELVILLE, Treasurer; Rev. A. N. CLAYE, chaplain; H. F. GIBSON, workhouse master; Mrs. GIBSON, matron. Relieving officers: Elwood Alfred ELWOOD, Walter Arnold TAYLOR, Joseph H. KENDALL.
Find help, report problems, or contribute information.
[Last updated: 30-April-2007 - Louis Mills]
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2769
}
|
US 7278346 B2
A cutting device holds an article to be cut stationary while a blade is traversed along a curved guide to peel or slice away material from the article. The article may be rotated using an indexing mechanism to realign the article with respect to the blade. The cutting device is especially configured to cut complex shapes, such as a seven-sided tourné. Portions of the cutting device may be separated for storage or travel, and a storage container may be provided to protect the device as well as to keep the separated pieces together.
1. A cutting device for cutting an article, comprising:
a cutting portion comprising a curved blade guide having a top portion and a bottom portion, a support arm attached to the blade guide, and a needle-shaped first holder contacting the support arm; and
a base portion connectable to the cutting portion, the base portion comprising a second needle-shaped holder and an indexing mechanism, wherein the first and second holders hold the article stationary relative to the base portion when cutting said article with a blade that travels along the curved blade guide from the top portion to the bottom portion, and wherein the indexing mechanism permits rotation of the article relative to the cutting portion before executing a cut with the blade.
2. The cutting device of
3. The cutting device of
4. The cutting device of
5. The cutting device of
6. The cutting device of
7. The cutting device of
1. Field of the Invention
The present invention relates generally to the art of slicing, and more particularly to the art of cutting food items into desired shapes.
2. Description of the Related Art
Slicing shapes in vegetables is generally well known in the culinary art. In particular, the tourné shape is highly regarded for its uniqueness. As shown in
The tourné shape is unique because it has an uneven number of curved or arced sides. Such shape is desired for food items, such as vegetables and roots, particularly potatoes. However, the unusual shape is difficult to accurately produce by manual cutting. Thus, recreating the tourné shape typically requires a great deal of effort, time, and skill. It would be very desirable to form the tourné shape quickly and efficiently using a device that is simple, portable, and easy to clean.
U.S. Design Pat. No. 397,921 to Joergensen shows a manual potato peeler with a handle and blade. Such peelers and blades are well known in the art, but require great skill to create complex designs.
Peeling apparatuses that hold an article during peeling are generally well known in the culinary art. For example, U.S. Pat. Nos. 1,006,621; 2,130,980; 2,521,987; 4,738,195; 4,765,234; 5,950,528; 5,957,045 and 6,408,520 teach various peeling, slicing and coring machines. However, these devices are incapable of shaping an article into a tourné, i.e., a three-dimensional shape with seven arced sides.
U.S. Pat. 5,582,096 to Marton illustrates a more complex vegetable peeling and shaping machine. A potato is held in a chute or tube as blades are fed into and out of slots through the tube or chute to cut portions of the potato away. Similarly, Japanese publication JP 06141991 A illustrates a vegetable cutter, comparable to Marton, that utilizes cutting edges that travel through guides 3 to form curved surfaces. These devices permit the creation of complex shapes, such as the symmetrical “Chateau” shape. However, these devices are complex, relatively expensive, difficult to clean, and relatively difficult to move about or use in a typically crowded kitchen.
Commercial and home chefs still seek a device for forming complex cut shapes, such as a tourné, that is simple, portable, handheld, and easy to clean.
In a first aspect of the invention, a cutting device is provided that holds an article stationary while a blade is traversed along a curved track or blade guide to peel or slice away material from the article. The article may be rotated using an indexing mechanism to re-align the article with respect to the blade and form a shaped article, such as a seven sided tourné. The article to be cut may be a root or vegetable, such as a potato. Additionally, portions of the cutting device may be separated for storage or travel, and may have a container to protect the device as well as to keep the separated pieces together.
In a second aspect of the invention, a cutting method includes the steps of fixing an article to be cut to a base portion of a cutting device and to a cutting portion of the cutting device, where the cutting portion includes a blade guide or track. After fixing the article, a blade is moved along the blade guide from a start position to slice through a portion of the article with a first pass of the blade along the blade guide. The article is indexed to a new cutting position, such as by rotating, and the blade is returned to its start position within the blade guide in preparation for a second cutting pass along the blade guide. Preferably, indexing the article is by disengaging an engagement mechanism that fixes the position of the article relative to the cutting portion and rotating the article to a new position. Preferably, the engagement mechanism has seven indexed positions to permit cutting portions from the article to form a seven-sided tourné. The base portion may be handheld when carrying out the cutting method.
Novel features and advantages of the present invention in addition to those mentioned above will become apparent to persons of ordinary skill in the art from a reading of the following detailed description in conjunction with the accompanying drawings wherein similar reference characters refer to similar parts and in which:
As shown in
Article 20 can be fixed relative to cutting portion 16 and base portion 18, as shown in
A second holder 30, which may be a needle or double needle (a single needle is shown in
The blade guide 22 may be aligned relative to article 20 for cutting a first side of a tourné shape 10 simply by virtue of the fact that article 20 is fixed relative to the joined cutting portion 16 and base portion 18. Preferably, blade guide 22 permits blade 24 to travel along the guide without binding or other interruption to slice a side of article 20 into a predetermined shape, such as an arc in the case of the tourné shape. As shown in
As shown in
As shown in
To prevent debris, fingers, or other foreign objects from entering the indexing mechanism, an upper mounting plate 38 and lower control plate 40 may be joined to at least partially enclose the indexing mechanism. In the embodiment of
Article 20 may be elevated from the upper mounting plate 38 by platform 50 to reduce friction while advancing article 20 through the rotating and slicing process. Upper mounting plate 38, lower control plate 40, screws 42, feet 44, and any portion of base 18 may comprise metal, plastic, wood or other suitable material.
The cutting device may be handheld, and its component parts may be separated for cleaning, transportation, or storage. As shown in
This stacked arrangement may also be inserted into a container 60 that may have a lid 64 with a flap 62 or other fastening or securing means (see
The foregoing description of the invention illustrates and describes the present invention. Additionally, the disclosure shows and describes only the preferred embodiments of the invention, but it is to be understood that the invention is capable of use in various other combinations, modifications, and environments and is capable of changes or modifications within the scope of the inventive concept as expressed herein, commensurate with the above teachings, and/or the skill or knowledge in the art of article shaping, particularly the shaping and cutting of items.
The embodiments described hereinabove are further intended to explain the best modes known of practicing the invention and to enable others skilled in the art to utilize the invention in such, or other, embodiments and with the various modifications required by the particular applications or uses of the invention. Accordingly, the description is not intended to limit the invention to the form disclosed herein. Also, it is intended that the appended claims be construed to include alternative embodiments.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 8266
}
|
| Welcome to the lava tube
portion of the Virtual Cave. Lava tube caves are found throughout the
world in places where fluid lava has flown over the surface. The longest
and most vertically extensive lava tubes known are on the Big Island of
Hawai`i. Our idealized lava tube cross-section is based on
the tubes there, and most of the photos are from there. Lava tubes are
found in the western U.S.A. (Washington, California, Oregon, Nevada, Idaho,
New Mexico, Utah, and Arizona), the Canary Islands, Galapagos Islands,
Italy, Japan, Korea, Kenya, Mexico, and many other volcanic regions. Most
tubes form when fluid lava flows down the sides of volcanoes, the upper
layer begins to cool, and the lava beneath continues to flow in tubular
conduits beneath the surface. Due to the insulating effects of the hardened
lava above, molten lava is able to travel a considerable distance underground
with very little cooling. In Hawaii, lava tubes have carried fluid lavas
50 or more miles from their source! Tubes may also form when lava
follows trenches or gulleys on the surface, which then roof over as lava
accumulates along the top edges.
Lava tubes contain many features similar to those in limestone caves, such as stalactites and stalagmites, helictites, and a sort of flowstone. Most of the features in the diagram were made when the cave was active and during the early cooling stage. Secondary minerals may be deposited in the tubes later, such as gypsum or calcite crystals, but these tend to be on a much smaller scale than you can find in limestone caves.
To take a tour of the wondrous world of lava tubes, select a feature in context on our very cool Virtual Lava Tube Map (drawn by master lava tube cartographer Carlene Allred) or choose from the list above it. Not all of the items in the text list are represented on the image map. Those are shown in all capital letters, so be sure to check these newer pages out.
Start here: BIRTH of a LAVA TUBE
Check out my new book on lava tubes, based on the Virtual Lava Tube, called CAVES OF FIRE: INSIDE AMERICA'S LAVA TUBES.
It is both a guide to lava tube features (with many more examples of each than shown here on the website) and describes and pictures many lava tubes that you can easily find and visit in national, state, and county parks and forests. It has 128 pages with 345 color images.
Now available through the National Speleological Society Bookstore
|Created: August 4, 2000
Last update: December 11, 2008
Author: Dave Bunnell
Reviewed by Kevin & Carlene Allred
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2531
}
|
Question from Amanda: Where and what acids are found in wine. Which wines have more acid (dry or sweet) and why due to the climate. Explain why and how titration can be used to determine the relative acid content of wine. If you could help answer my question i would be very grateful.
Answer: Hi, Amanda! Thanks for your question! I’ll do my best….
The main grape acid is tartaric, a relatively strong acid, unlike most fruits. It’s followed by malic (found in lots of fruits and vegetables) and there are trace amounts of lots of different acids. We have an article on wine components, including acid, at goosecross.com.
Generally, white wines are higher in acid than reds, for aesthetic reasons. Sweet wines should be the highest of all, to offset the sweetness, or the wine will be cloying.
Cool climates usually produce wines of high acid compared to warm climates because heat causes the sugar to go up and the acid to go down. A Chardonnay from Burgundy, France is almost always higher in acid than a Napa Valley Chardonnay because of the difference in climate. Imagine trying to ripen tomatoes in a cold climate–they will be quite tart!
Titration is a simple color-change test. I’ve paraphrased this from a wine text: Titration is the process of determining the concentration of a substance, such as acid, in a solution by adding a carefully measured standard reagent (usually sodium hydroxide) until a reaction (change in color) occurs due to the presence of an indicator (phenolphthalein). Most home winemakers buy inexpensive kits to do this.
I hope this helps you. Are you studying wine making?
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1605
}
|
The basics of heat stress
When the thermometer rises, it can-and often does-create a multitude of problems. Anyone, given the right (or wrong) conditions, can get heat stress. Some are lucky enough to suffer only from heat cramps, while those who are less fortunate may be laid up by heat exhaustion or devastated by heat stroke. As the long, hot days of summer approach, it is helpful to review the effects of warm weather on the human body, the illnesses that may result and what you can do.
How the body stays cool Unknowingly, you constantly engage your body in the life-and-death struggle to disperse the heat it produces. If allowed to accumulate, this heat would quickly increase your body temperature beyond its comfortable 98.6oF. This does not normally happen because your body is able to lose enough heat to maintain a steady temperature. You become aware of this struggle for heat balance during hard labor or exercise in hot environments, when your body produces heat faster than it can lose it. Under certain conditions, your body may build up too much heat, your temperature may rise to life-threatening levels, and you may become delirious or lose consciousness. This is called heat stroke, and it is a serious medical emergency. If you do not rid your body of excess heat fast enough, it cooks the brain and other vital organs. It often is fatal, and those who survive may have permanent damage to their vital organs. Before your temperature reaches heat-stroke levels, however, you may suffer heat exhaustion with its flu-like symptoms, and while treating its symptoms you avoid heat stroke.
How does your body dispose of excess heat? Humans lose heat largely through their skin, similar to how a car loses heat through its radiator. Exercising muscles warms the blood, just as a car's hot engine warms its radiator fluid. Warm blood travels through the skin's dilated blood vessels losing heat by evaporating sweat to the surrounding air, just like a car loses engine heat through its radiator.
When blood delivers heat to the skin, two of the most important ways the body loses heat are radiation and evaporation (vaporization of sweat). When the temperature is 70oF or less, the body releases its heat by radiation. As environmental temperatures approach your body temperature, you lose less heat through radiation. In fact, people working on hot summer days actually gain heat through radiation from the sun. This leaves evaporation as the only way to effectively control body temperature.
Water loss Your body is about half water. You lose about 2 quarts every day (breathing, urinating, bowel movements and sweat). A working adult can produce 2 quarts of sweat per hour for short periods and up to 15 quarts per day. Because the body's water absorption rate of 1.5 quarts per hour is less than the body's 2 quarts per hour sweat rate, dehydration results. This happens because you cannot drink enough water to keep up with your sweat losses.
If you drink only when you are thirsty, you are dehydrated already. Thirst is not a good guide for when to drink water. In fact, in hot and humid conditions, you may be so dehydrated by the time you become thirsty that you will have trouble catching up with your fluid losses. One guideline regarding your water intake is to monitor your urine. You are getting enough water if you produce clear urine at least five times a day. Cloudy or dark urine, or urinating less than five times a day, means you should drink more.
In the Gulf War, American armed forces followed the practice of the Israeli army: drinking a minimum of 1 quart of fluid per hour. This tactic resulted in zero deaths from heat illness. In contrast, during the Six Day War of 1967, more than 20,000 Egyptian soldiers died3/4with no visible wounds3/4most likely from dehydration and heat illness because they were restricted to 3 quarts daily.
While working in hot weather, drink 8 ounces of water every 20 minutes. Generally, 16 ounces is the most a person can comfortably drink at once. You cannot "catch up" by drinking extra water later because only about 1 quart of water per hour can pass out of the stomach. Therefore, if possible, workers should begin drinking water before they start work.
Cool water (50oF) is easier for the stomach to absorb than warm water, and a little flavoring may make the water more tasty. The best fluids are those that leave the stomach fast and contain little sodium and some sugar (less than 8 percent). You should avoid coffee and tea because they contain caffeine, which is a diuretic that increases water loss through urination. Alcoholic beverages also dehydrate by increasing urination. Soda pop contains about 10 percent sugar and, therefore, your body does not absorb it as well as water or commercial sports drinks. The sugar content of fruit juices ranges from 11 to 18 percent and has an even longer absorption time. Commercial sports drinks contain about 5 to 8 percent sugar.
Electrolyte loss Sweat and urine contain potassium and sodium, which are essential electrolytes that control the movement of water in and out of the body's cells. Many everyday foods contain these electrolytes. Bananas and nuts are rich with potassium, and most American diets have up to 10 times as much sodium as the body needs. Getting enough salt is rarely a problem in the typical American diet. In fact, most Americans consume an excessive amount of sodium-averaging 5 to 10 grams of sodium per day-although we probably require only 1 to 3 grams. Therefore, sodium loss is seldom a problem, unless a person is sweating profusely for long periods and drinking large amounts of water.
Commercial sports drinks can be useful if you are participating in vigorous physical activity for longer than 1 hour (some experts say longer than 4 hours). Most of the time, however, people merely require water to remain hydrated. The truth is that excessive sodium can draw water out of the body cells, accentuating the dehydration. In addition, drinking large amounts of water (more than 1 quart an hour) can cause water intoxication, a condition that flushes electrolytes from the body. Frequent urination and behavior changes (irrationality, combativeness, coma, seizures, etc.) are signs of water intoxication.
Effects of humidity Sweat can only cool the body if it evaporates. In dry air, you will not notice sweat evaporating. However, sweat cannot evaporate in high-humidity conditions; it just drips off the skin. At about 70-percent humidity, sweating is ineffective in cooling the body.
Because humidity can significantly reduce evaporative cooling, a highly humid but mildly warm day can be more stressful than a hot, dry one. Therefore, the higher the humidity, the lower the temperature at which heat risk begins, especially those who are generating heat with vigorous work.
Who is at risk? Everyone is susceptible to heat illness if environmental conditions overwhelm the body's temperature-regulating mechanisms. Heat waves can set the stage for a rash of heat-stroke victims. For example, during the 1995 summer heat wave in Chicago, the death toll reached 590.
People who are obese, chronically ill or alcoholics have an increased risk. The elderly are at higher risk because of impaired cardiac output and decreased ability to sweat. Infants and young children also are susceptible to heat stroke, as well.
The fluid loss and dehydration resulting from physical activity puts outdoor laborers at particular risk. Certain medications predispose individuals to heat stroke, such as drugs that alter sweat production (antihistamines, antipsychotics, antidepressants) or interfere with thermoregulation.
Heat illnesses Several disorders exist along the spectrum of heat illnesses. Heat cramps, heat exhaustion and heat stroke are on the more serious side of the scale, whereas heat syncope, heat edema and prickly heat are less serious (see "Heat illnesses," page C 18). Only heat stroke is life-threatening. Untreated heat-stroke victims always die.
* Heat cramps are painful muscular spasms that occur suddenly. They usually involve the muscles in the back of the leg or the abdominal muscles. They tend to occur immediately after exertion and are caused by salt depletion. Victims may be drinking water without adequate salt content. However, some experts disagree because the typical American diet is heavy with salt.
* Heat exhaustion is characterized by heavy perspiration with normal or slightly above-normal body temperatures. A depletion of water or salt3/4or both3/4causes this condition. Some experts believe severe dehydration is a better term because it happens to workers who do not drink enough fluids while working in hot environments. Symptoms include severe thirst, fatigue, headache, nausea, vomiting and diarrhea. The affected person often mistakenly believes he or she has the flu. Uncontrolled heat exhaustion can evolve into heat stroke.
* Heat stroke is classified in two ways: classic and exertional. Classic heat stroke, also known as the "slow cooker," may take days to develop. This condition is prevalent during summer heat waves and typically affects poor, elderly, chronically ill, alcoholic or obese persons. Because the elderly often have medical problems, heat stroke exacerbates the problem, and more than 50 percent of elderly heat-stroke victims die3/4even with medical care. Death results from a combination of a hot environment and dehydration. Exertional heat stroke also is more common in the summer. You see it frequently in athletes, laborers and military personnel who sweat profusely. Known as the "fast cooker," this condition affects healthy, active individuals who strenuously work or play in a warm environment. Exertional heat-stroke victims usually are sweating when stricken, while the classic victims are not sweating. Its rapid onset does not allow enough time for severe dehydration to occur.
Because uncontrolled heat exhaustion can evolve into heat stroke, you should know how to tell the difference between them. If the victim feels extremely hot when touched, suspect heat stroke. Another mark of heat stroke is that the victim's mental status (behavior) changes drastically3/4ranging from being slightly confused and disoriented to falling into a coma. In between these conditions, victims usually become irrational, agitated or even aggressive and may have seizures. In severe cases, the victim can go into a coma in less than 1 hour. The longer a coma lasts, the lower the chance for survival, so rescuers must be quick.
A third way of distinguishing heat stroke from heat exhaustion is by rectal temperature. Obviously, this is not very practical because conscious heat-stroke victims may not cooperate. Taking a rectal temperature can be embarrassing to both victim and rescuer. Moreover, rectal thermometers are seldom available, and the whole procedure of finding the appropriate thermometer and then using it wastes time and distracts from important emergency care. In most cases, an ambulance arrives within 10 to 20 minutes.
* Heat syncope, in which a person becomes dizzy or faints after exposure to high temperatures, is a self-limiting condition. Victims should lie down in a cool place when it occurs. Victims who are not nauseated can drink water.
* Heat edema, which is also a self-limiting condition, causes ankles and feet to swell from heat exposure. It is more common in women unacclimated to a hot climate. It is related to salt and water retention and tends to disappear after acclimation. Wearing support stockings and elevating the legs often helps reduce swelling.
* Prickly heat, also known as a heat rash, is an itchy rash that develops on skin that is wet from sweating. Dry and cool the skin.
Cooling methods Sometimes the only way to stop possible damage is to cool the victim as quickly as possible. However, it is important to pay attention to both the cooling methods and cautions.
* Ice baths cool a victim quickly but require a great deal of ice3/4at least 80 pounds3/4to be effective. Needing a big enough tub also limits this method. Cool-water baths3/4(less than 60oF)3/4can be successful if you stir the water to prevent a warm layer from forming around the body. This is the most effective method in highly humid conditions (greater than 75-percent humidity).
* Spraying the victim with water combined with fanning is another method for cooling the body. The water droplets act as artificial sweat and cool the body through evaporation. However, this method is not effective in high humidity3/4greater than 75 percent.
* Ice bags wrapped in wet towels and placed against the large veins in the groin, armpits and sides of the neck also cool the body, though not nearly as quickly as immersion.
Cautions to remember when employing any cooling method include: * Do not delay the onset of cooling while waiting for an ambulance. Doing so increases the risk of tissue damage and prolonged hospitalization. * Stop cooling when the victim's mental status improves to avoid hypothermia. * Do not use rubbing alcohol to cool the skin. It can be absorbed into the blood, causing alcohol poisoning. Its vapors are a potential fire hazard. * Do not use aspirin or acetaminophen. They are not effective because the brain's control-center temperature is not elevated as it is with fever caused by diseases.
Adjusting to heat Most heat illness occur during the first days of working in the heat. Therefore, acclimation (adjusting to the heat) is the main preventive measure. To better handle the heat, the body adjusts by decreasing the salt content in sweat and increases the sweating rate. Year-round exercise can help workers prepare for hot weather. Such activity raises the body's core temperature so it becomes accustomed to heat. Full acclimation, however, requires exercise in hot weather. You can do this by exercising a minimum of 60 to 90 minutes in the heat each day for 1 to 2 weeks.
The acclimated heart pumps more blood with each stroke than a heart unused to working in the heat. Sweating earlier and doubles the amount of sweat per hour from 1.5 quarts to 3 quarts or more.
When new workers are exposed to hot weather, team them with veterans of the heat who know how much water to drink. Heat illnesses are avoidable. With knowledge, preparation, fluid replacement and prompt emergency care, heat casualties need not be a factor for those working in warm weather.
Dr. Alton Thygerson is a professor of health science at Brigham Young University, Provo, Utah. He also serves as the technical consultant for the National Safety Council's First Aid Institute.
Want to use this article? Click here for options!
© 2013 Penton Media Inc.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 14699
}
|
Contemporary full brown calf. Small paper spine label. Boards triple ruled in blind. edges speckled red. Boards and joints rubbed and bumped. Head and tale of the spine chipped. Some toning and browning throughout, but mainly to preliminary and final leaves. Leaves A2 and A3 with some chipping along fore-edge, not affecting text. A bit of marginal worming, not affecting text. Previous owner's old ink signature on title-page and some instances of marginalia and text corrections in the same hand. Overall a very good copy.
“Bacon’s major contribution to the development of science lies in his natural philosophy, his philosophy of scientific method, and in his projects for the practical organization of science. During the last years of his life, he expounded these ideas in a series of works, of which the Twoo bookes was the first. The only work Bacon ever published in English, it was later expanded and latinized into De augmentis scientiarum (1623). In the Twoo bookes, Bacon concerned himself primarily with the classification of philosophy and the sciences and with developing his influential view of the relation between science and theology. While preserving the traditional distinction between knowledge obtained by divine revelation and knowledge acquired through the senses, Bacon saw both theoretical and applied science as religious duties, the first for a greater knowledge of God through his creation, and the second for the practice of charity to one’s fellows by improving their condition. This view of science as a religious function maintained its authority throughout the seventeenth and early eighteenth centuries, and was an important factor in the public success of the scientific movement” (Norman Library).
Gibson 82. STC 1165.
HBS # 65822 $850
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 1774
}
|
Gallery: Huntington State Hospital fire, Nov. 26, 1952
On Nov. 26, 1952, a ward building at Huntington State Hospital, now Mildred Mitchell-Bateman Hospital, caught fire, killing 17 people. Some readers may find these images (and the news story below) disturbing.
Established on a 33-acre tract in 1899 as the West Virginia Asylum, the state-supported hospital has evolved from the dark ages when as many as 1,800 patients were crammed into open wards and the staff included a superintendent and seven or eight physicians. Today, it is a 90-bed facility.
In 1958, West Virginia had 5,500 patients placed in a half-dozen mental health facilities scattered over the state. Because of improved treatment and drugs, that number had decreased to 2,400 in 1976.
The Hartley Act, which was brought on by a class action suit, caused more dramatic changes in the 1980s. The act mandated that all state hospitals eliminate open wards and provide only two-bed, semi-private rooms for mentally ill patients.
West Virginia now operates just two psychiatric care hospitals, Huntington and Weston, W.Va.
In 1999, Gov. Cecil Underwood announced that Huntington State Hospital would be renamed the Mildred Mitchell-Bateman Hospital in honor of the retiring doctor and her dedication to bringing mental health issues to the state's attention.
This old Associated Press story about the fire was found on the GenDisasters website.
HUNTINGTON HOSPITAL FIRE KILLS 14 PATIENTS.
NINE WOMEN, 5 YOUNG GIRLS ARE VICTIMS.
ATTENDANTS ARE CREDITED WITH 'HEROIC JOB' BY FIREMEN.
Huntington, Nov. 26 -- (AP) -- Fourteen women and children perished tonight in a fierce blaze that swept a three-story building at the Huntington State Hospital, a mental institution.
President Joe F. Burdett of the State Board of Control, which supervises the state's institutions, announced the death toll as complete and official.
Two hours after the fire roared through the 56-year-old building, Burdett said the blaze took 15 lives. After a thorough recheck, he brought the figure down one.
Five of the victims were young girls, 15 or younger. The others were women, the oldest 89.
There were about 275 patients in the three-story brick structure.
The fire broke out in the basement shortly after 7 p.m. and burned for about two hours. The flames were confined to the first two floors but the thick acrid smoke played havoc with the youngsters trapped on the top level.
Firemen had to cut through heavy wire mesh with acetylene torches to get inside the building when the front entrance became an inferno. The screaming patients had to be removed by means of an old wrought iron circular stairway at the rear of the building.
The rescuers couldn't use stretchers on the narrow escapeway, so they bundled the patients --some alive, some dead -- in blankets and carried them down on their shoulders.
Fire Capt. C. C. Martin credited attendants on duty with a "heroic job" in getting the most of the patients out of the building.
He said they tripped the latches on the ward doors so the patients could flee by themselves.
The kitchen, one of the several buildings nearby, was turned into a hasty receiving station for the screaming, weeping, vomiting victims.
One reporter called it a "sorry sight." The patients were sprawled on the kitchen floor, some of them dead, most with only a blanket covering them, reeking with the strong smell of smoke.
One fireman said the blaze started in the basement. A staff physician who refused to be quoted said some of the patients sometimes went to the basement to smoke during off hours, which was against the rules.
The hospital built in 1896, has been under recent scrutiny both through the press and the state legislature for its condition.
"I know it's too late to say this," Burdett said, "but we submitted to the budget director a recommendation for one million dollars for fireproofing all this -- ward buildings one, two, three and four."
It was ward building four which burned.
Burdett said the requested appropriation was cut out somewhere along the line in the last legislative session.
A new building was being constructed on the grounds nearby which was to house the patients in the structure which burned. They would have been transferred into the quarters withing a few weeks.
Two other fires have occurred at the state hospital within the last two years -- one in a third floor sewing room and the other in a basement storage bin. Both were extinguished quickly.
"The same situation exists at Spencer and Weston State (two other state mental institutions).
Recommendations for fireproofing those two hospitals and Huntington have been approved by the budget director for submission to the 1953 legislature."
He added that part of Spencer and Weston State Hospitals already have been fireproofed.
Two elderly women were listed as in serious condition from burns.
The only other person listed as injured was a Huntington fireman who suffered a broken foot when a battering ram fell on him.
All three members of the State Board of Control were at the hospital during cleaning-up operations. They are, besides Burdett, L. Steele Trotter, treasurer, and Dell White, Secretary.
State Fire Marshal C. A. Raper, also at the scene, said he had not had a chance to make an inspection or estimate of the damage.
Here's List of Dead In Huntington Fire.
Huntington, Nov. 26 -- (AP) -- Here is the list of dead in tonight's fire at Huntington State Hospital as released by Chief of Detectives Herman A. Frazier of the city police.
ADA CARVER, 89, Huntington.
JOYCE TUCKER, 20, Fairmont.
ELIZABETH BRIGHT, 31, Wellsburg.
EVANGELINE ELZY, 15, Dunbar.
PATRICIA LONG, 15, Sutton.
LENA WENTZ, 11, Cabell County.
LILLIAN GOULD, 36, Huntington.
GERALDINE CURRY, 26, Mingo County.
CASSIE SUMMERFIELD, 44, Huntington.
AVANELE KEIFER, 15, Huntington.
ETHEL MUNDAY, 68, Charleston.
HELEN FINDLEY, 33, Sistersville.
PATRICIA CLARK, 14, Vallscreek, McDowell County.
MADALINE PRESTON, 24, Maidsville, Monongalia County.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 5997
}
|
There are many aspects to learning the creation of interactive fiction. Here we mostly undertake to explain approaches to using Inform, and leave the larger questions of craft and design for elsewhere.
The two manuals
There are two interlinked manuals built into every copy of the Inform application: if you've downloaded Inform, you already have them. But they are also available to read or download separately from this website.
Writing with Inform is an overview of the language, beginning with the simplest kinds of construction (such as building a map of rooms, objects, and doors) and working its way up to more advanced tasks. It is meant to be read more or less sequentially, since later chapters build on the ideas in earlier ones; though some of the late chapters (such as those covering numbers, activities, or advanced text) might reasonably be read out of order.
The Recipe Book approaches the problem of authorship from a different perspective. Instead of trying to teach the language from start to finish, it is organized for the author who wants to accomplish something specific, such as asking the player's name at the start of play or implementing a system of measured liquids. It shares the same set of examples that are keyed to Writing with Inform, but organizes them into a new order and accompanies them with text about design problems in creating interactive fiction, rather than explanation of language features.
Following requests from partially sighted Inform users, we've also made two plain vanilla versions of the manual available - they have as little decoration or web design as possible, which means less clutter for screen-reading software to cope with. We offer a choice of:
Minimally tagged HTML provides an archive containing the pages of the manuals and examples as vanilla-flavoured HTML files.
Writing with Inform in plain text format is just what it claims to be - one single file containing only text, with no marking-up of any kind. This contains all of the examples, following the text in numerical order, but not the Recipe Book. (The whole idea of two interleaved manuals can't really be achieved in one flat text file.)
We receive occasional questions about publishing a printed form of the manuals. The answer is that we intend to do exactly that, in due course, but that we expect the current text will be revised wholesale once the system is more mature. (The same thing happened with Inform 6, with the appearance of the printed Designer's Manual in 2001 essentially marking the end of its design cycle.)
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2555
}
|
From: Rolf Furuli (email@example.com)
Date: Sun Sep 28 1997 - 04:29:51 EDT
Rod Decker Wrote:
EIS TON AIWNA (or the plural, EIS TOUS AIWNAS) is a common NT idiom; I had
assumed that this reflected the Jewish concept of the age to come, but was
somewhat surprised to note that BAGD lists a number of classical references
to the same phrase (p. 27).
Any observations as to how extensive this phrase is in classical literature
and or the relationship of the classical use to the Jewish and/or biblical
(Neither TDNT nor NIDNTT have much to say about AIWN in classical--less
than they usually provide--and neither one comments on the idioms EIS TON
>From the posts of Michael, Carl and Will it appears that Classical Greek
contributes little to the use of AIWN in the NT. I would like to give some
comments from the OT.
The Hebrew verb Ťalam has the basic meaning "to concel, to hide". Thus the
noun Ťolam came to mean "a time span with no fixed endpoint", in some cases
it was used absolutely with the meaning "eternity", but in most cases it
was used of a shorter and at the point of writing, indefinite time period.
In Aramaic the noun Ťalam was used with the same meaning as in Hebrew but
in time it was also used for "the environment in which people live" (world)
or for "people".
In the NT the two words KOSMOS and AIWN have some similarity. There is no
Hebrew/Aramaic word corresponding to KOSMOS, but it seems that different
sides of the Aramaic Ťalam were cultivated in the words KOSMOS and AIWN.
(1) KOSMOS and AIWN are clearly different. In Matt 13:38,39 KOSMOS is "the
world" (of mankind) but AIWN is the "world-age" (I like Carl`s "world-age"
because "age" is too weak). When KJV has "end of the world" in v 39, the
only possible conclusion is that the harvest is the end of the field, which
is not what the writer intended to convey. According to John 17:15 Jesus
did not request his father to take his followers EK TOU KOSMOU (which would
mean a translation to heaven), but it sees that according to Gal 1:4 the
followers of Jesus already had experienced a deliverance EK TOU AIWNOS TOU
ENESTWTOS just as people were admonished to get saved from THS GENEAS THS
SKOLIAS TAUTHS (Acts 2:40)
(2) To use the English word "world" to signal the concept behind Greek
KOSMOS is excellent (Even TEV uses "world" in 96% of the instances). I find
the following principal sides of the concept KOSMOS illuminated: (a) "the
human family" (John 3:16), (b) "the human family separated from the Church"
(John 17:14), (a) "the environment in which the human family lives" (John
16:21) (d) "the universe" (Acts 17:24) This is the only place where I find
this classical meaning, and (e) "adornment" (1 Pet 3:3). Nowehere in the NT
is it said that a new "KOSMOS" will come; the human family is in all
generations the same. If these points be correct, the Greek KOSMOS has
aquired and cultivated the "world/people"-side of the Aramaic Ťolam.
(3) While KOSMOS is stable and "local", AIWN is changing, the word being
applied to different ages characterized by different circumstances and
things. In many instances in the NT, AIWN has the normal Hebrew and Aramaic
meaning "eternality" (1 Tim 1:17; 1 Pet 5:10) without any extra stress. In
other instances, the element of "a shorter indefinite time" is stressed,
and in these cases, not only is time as an abstract element focussed upon,
but rather a period of time which has a particular stamp, which is
characterized by something. The term "age" just covers "time" and is too
weak. Christians are hardly taken out of "an age" (Gal 1:4) but may be
taken out of a "wicked age-system" or a "wicked world-age". And similarly,
Christians will not in the future experience a "new age" (Luke 20:35) but a
new period characterized by completely different things. So the time
element is evident in this use of AIWN but the QUALITY of life experienced
in the particular AIWN is more important. This use of AIWN seems to be
somewhat different from the biblical use of `olam/Ťalam (Hebrew/Aramaic),
and more in line with the later rabbinical use of the word.
The conclusion therefore seems to be that the NT use of AIWN is not rooted
in the Classical use of the word but rather in the Hebrew/Aramaic use.
While KOSMOS is more "local", related to the human family, AIWN is more
transitory, being applied to shorter or longer periods of time with
particular qualities and characteristics. A translation should always use
different English words to represent KOSMOS and AIWN.
University of Oslo
This archive was generated by hypermail 2.1.4 : Sat Apr 20 2002 - 15:38:30 EDT
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 4594
}
|
Milestones:First Intelligible Voice Transmission over Electric Wire, 1876
First Intelligible Voice Transmission over Electric Wire, 1876Alexander Graham Bell called out to his assistant Thomas Watson, “Mr. Watson, come here! I want to see you.” This transmission took place in their attic laboratory located in a near here at 5 Exeter Place.
The milestone plaque may be viewed close to Lafayette Place, near where Avenue de Lafayette and Essex Streets intersect. There is an existing historical marker close by commemorating the site of the original laboratory where Watson and Bell constructed their telephone equipment at 109 Court Street.
A pioneer in the field of telecommunications, Alexander Graham Bell was born in 1847 in Edinburgh, Scotland. He moved to Ontario, and then to the United States, settling in Boston, before beginning his career as an inventor. Throughout his life, Bell had been interested in the education of deaf people. This interest led him to invent the microphone and, in 1876, his “electrical speech machine,” which we now call a telephone.
The first transmission of voice over electric wires was from Alexander Graham Bell to his laboratory assistant Thomas Watson on March 10, 1876. This historic event was marked by Bell’s famous phrase, “Mr. Watson, come here! I want to see you.” This first telephone transmission took place at the Bell & Watson laboratory located at 5 Exeter Place in Boston. News of Bell’s invention quickly spread throughout the country, even throughout Europe. The first long distance telephone call was made on August 10, 1876 by Bell from the family home in Brantford, Ontario to his assistant located in Paris, Ontario, ten miles away. By 1878, Bell had set up the first telephone exchange in New Haven, Connecticut. Long distance connections were made between Boston, Massachusetts and New York City by 1884, (the year IEEE was founded.)
In 1876, Bell got a patent for the telephone and started the Bell Telephone Company with others in July, 1877. Two years later, this company joined the New England Telephone Company to form the National Bell Telephone Company. In 1880, they established the American Bell Telephone Company, and in 1885, American Telephone and Telegraph Company (AT&T), still a large enterprise today.
Electric communication has had a long evolving history. It began with early telegraph inventions by Wheatstone, Morse, Hughes, Henry, and has continued with the submarine cable, and with pioneers like Marconi and Popov. These early telegraphic innovations and Marconi’s wireless system were improvements in the way people communicated with each other. Yet, the invention of the telephone was a quantum leap over all previous technologies. By allowing individuals to communicate remotely and instantly from the safety of their home, the telephone has had global, pervasive, and profound impacts on mankind.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 2887
}
|
The history of the Irish Soft Coated Wheaten Terrier has been somewhat obscured by its closeness to the other Irish Terrier breeds. The Wheaten is probably the oldest of the four breeds. Its existence for at least 200 years can be inferred from textual references to "soft-coated" dogs. The relation of the modern Irish Terrier to the Wheaten, though less well documented, appears to have been the result of deliberate breeding experiments. So the humble Wheaten probably has a fairly mixed ancestry. Despite the long history of the Wheaten, it wasn't until 1937 that the Soft Coated Wheaten was officially recognised by the Irish Kennel Club. The breed has grown steadily in popularity since and is now well known world-wide.
FCI Standard No. 40 Origin – Ireland
Wheaten Terriers were always used by small farmers to kill vermin or help with the work about the farm. They were used for a long time in the difficult job of hunting badgers and otters.
CLASSIFICATION F.C.I.: Group 3 Terriers
Section 1 Large and medium sized Terriers
Without working trial.
IRISH CLASSIFICATION: Terrier Group
BRIEF HISTORICAL SUMMARY:
The history of the Irish Soft Coated Wheaten Terrier has been somewhat obscured by its closeness to the
other Irish Terrier breeds. The Wheaten is probably the oldest of the four breeds. Its existence for at least
200 years can be inferred from textual references to "soft-coated" dogs. The relation of the modern Irish
Terrier to the Wheaten, though less well documented, appears to have been the result of deliberate
breeding experiments. So the humble Wheaten probably has a fairly mixed ancestry. Despite the long
history of the Wheaten, it wasn't until 1937 that the Soft Coated Wheaten was officially recognised by the
Irish Kennel Club. The breed has grown steadily in popularity since and is now well known world-wide.
A hardy, active, short coupled dog, well built, giving the idea of strength. Not too leggy nor too low to the
Spirited and game. Good tempered. Most affectionate and loyal to his owners. Most intelligent. A trusty,
faithful friend, defensive without aggression.
HEAD: In general powerful without being coarse. Long, in good proportion to the body. Hair same colour
as on body.
Skull: Flat and clean between ears, not too wide.
Nose: Black and well developed.
Muzzle: Foreface not longer than skull.
Jaws: Jaws strong and punishing.
Teeth: Teeth large, regular; scissor or level bite, (i.e. edge to edge) neither undershot nor overshot.
Cheeks: Bones not prominent.
Eyes: Dark, dark hazel, not too large, not prominent, well placed.
Ears: Small to medium, carried in front, level with skull. Dark shading on base of ear allowed, and not
uncommon, accompanied by a light wheaten coloured overlay. This is the only area of the dog where
under-coat is allowed. "Rose" or "Flying" ears are objectionable.
NECK: Moderately long and strong but not throaty.
BODY: Compact. Not too long. Length from withers to base of tail approximately the same as from
ground to withers.
Back: Strong and level with even top line.
Loins: Short, powerful.
Chest: Deep, ribs well sprung.
TAIL: Well set, not too thick. Carried gaily but never over the back. The tail is docked so that two thirds of its original length remains assuming it is in proportion to the dog. An undocked tail is permitted.
Shoulders: Fine, well laid back, muscular
Forelegs perfectly straight viewed from any angle. Good bone and muscle.
Well developed with powerful muscle.
Thighs: Strong and muscular.
Hocks: Well let down, turned neither in nor out. Hind dewclaws should be removed.
FEET: Small, not spreading. Toenails preferably black but varying dark colours allowed.
Straight action fore and aft, going and coming. Elbows tucked in. Side view : free, light co-ordinated movement.
A single coated dog. Texture soft and silky to feel and not harsh. Young dogs excluded from this. Trimming permitted.
Coat cut close at neck, chest and skull, and left especially long over eyes and under jaw. Whiskers encouraged. Profuse feathering on legs. Body coat trimmed to follow the outline of the dog but not
sculpted. Tail trimmed close and neatly tapered.
The coat at its longest not to exceed five inches (12.7 cm). Soft, wavy or loosely curled with the sheen of silk. Under no circumstances should the coat be "fluffed out" like a Poodle or an Old English Sheepdog.
Dogs shown in this condition should be heavily penalised as they give a wrong impression of type and breed. Special attention is drawn to puppy coat development. Pups are seldom born with the correct coat of maturity, care must be taken when assessing this point. They go through several changes of colour
and texture before developing the mature adult coat. This usually occurs between 18 months and 2½ years.
Are seldom born with the correct colour or texture of coat. They come reddish, greyish and sometimes
clear wheaten. The masks are generally black. Sometimes there is a black streak down the centre back
or black tips to the body coat. These dark markings clear away with maturity.
A good clear wheaten of shades from light wheaten to a golden reddish hue.
SIZE (Height & Weight)
Height at the withers: Dogs 18-19 ins (46-48 cm).
Bitches somewhat less.
Weight: Dogs 40-45 lbs (18 – 20.5kg).
Bitches somewhat less.
Any departure from the foregoing points should be considered a fault and the seriousness with which the
fault should be regarded should be in exact proportion to its degree.
• Nose any colour other than black.
• Undershot mouth. Overshot mouth.
• Overall mature coat not clear wheaten colour.
• Nervousness. Viciousness.
• Yellow eyes.
• Dull, thick, woolly or cottony textured hair.
• White coat. Brown coat.
Dogs carrying any of the above eliminating faults should never be bred from.
NB. Male animals should have two apparently normal testicles fully descended into the scrotum.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 5865
}
|
May 23, 2012
Survivor: Jack Seror
Jack Seror didn’t know what to do. He was 25 and knew he had to leave Salonika; it wasn’t safe for Jews. And now a contact from the Greek resistance had come to fetch him. Jack stood with his parents in their living room, crying. They hugged, kissed and hugged some more. “We have to leave,” the contact said. Half of Jack wanted to stay with his parents; the other half wanted to escape. Finally, his father, with tears in his eyes, said, “Go. And remember, if you survive, to say Kaddish for us.”
Jack was born Oct. 15, 1917, in Salonika, Greece, the fifth of six children of David, a milk wholesaler, and Mazeltov Seror. The family was religious. On Friday nights, after Shabbat dinner and singing, Jack recalls that his father always told a new story about a character he remembers as Johah.
Jack attended an Alliance Israelite Universelle school through seventh grade. After that he worked in his uncle’s dry goods store and then for an insurance company. But in March 1940, he was drafted into the Greek army. Eight months later, Italy invaded Greece. Then, as the Greeks drove the Italians back into Albania, Jack’s unit was sent to the Bulgarian border, where the Germans were advancing.
After the Germans took control of Salonika, on April 9, 1941, Jack’s unit was sent to southern Greece to continue fighting. The Greek army, however, was soon disbanded, and Jack returned home, mostly walking and occasionally riding a bus, from Thebes to Salonika. The trip took five weeks.
In Salonika, Jack just tried to survive. His older brother Albert had been killed fighting the Italians. His father, no longer a milk wholesaler, was working as a deliveryman. Jack sold carob syrup.
The situation worsened. On Feb. 6, 1943, Jews were ordered to wear yellow stars. On the streets, Jack witnessed Nazi round-ups. He also saw photos of cattle cars carrying Jews in a Belgian magazine that was soon confiscated from the newsstands by the Nazis. He told his parents the Nazis were planning to kill the Jews. His father answered, “Passover will be here in a couple of months, and God will not let us perish.” Jack didn’t believe it.
In March, the Nazis enclosed the area adjacent to Salonika’s railroad station with barbed wire, calling it the Baron Hirsch camp or ghetto, and transferring Jews there. A few days later, cattle cars arrived, and on March 15, the first transport left for Auschwitz. Two days later, another transport departed. At that point, Jack knew he had to leave.
Jack and his contact from the resistance picked up Jack’s sister Katy from a neighboring village, and they made their way to Grevena, a small city in the mountains of northwestern Greece. Jack’s resistance group, about 35 men, was headquartered there.
Katy and the other women stayed near Grevena. Katy’s job was to sew shirts out of the parachutes used by British soldiers who were dropped into the mountainous area to assist the resistance fighters.
Jack’s group trekked from village to village, from one hill to another. “We were scared. We were always thinking about what we left back home,” Jack said. But they never talked about their personal lives. Instead, everyone had a fake name, including Capt. Bourna, the leader, rumored to be a Greek army officer. Jack was Alekos Saridis.
Every morning, Jack’s group did aerobic exercises, followed by chores — including fetching water, cooking the ever-present lentils, helping villagers — and then combat training. Plus, they were always watching for enemy soldiers. “We went there to survive, but we also knew we had to fight the Germans.” Jack said.
Jack’s group didn’t directly encounter any Germans, though one man, sent to deliver shoes, never returned. And Jack’s younger brother Haim, in a different resistance group, was killed fighting Germans.
Finally, in October 1944, the Germans retreated from Greece. Jack’s resistance group disbanded soon after, and he and Katy slowly made their way back to Salonika, arriving in early 1945.
Jack and Katy were the only survivors in their immediate family. Overall, 96 percent of Salonika’s almost 60,000 Jews perished.
Jack secured an accounting job at a social club for British troops. “It was very good to be able to be human again,” he said. There he met Katie Zinda, who worked in the gift shop. After a six-month friendship, they fell in love and decided to marry. Katie, who wasn’t Jewish, converted, taking the formal name Sarah.
Jack and Katie were married on Sept. 9, 1949, with 10 people in attendance. “People were so sure the marriage wasn’t going to last that we didn’t get any presents,” Jack said.
On July 9, 1950, their son David was born. Just over a year later, destitute and wanting to start over, they immigrated to the United States, settling in Boston in October 1951, where they were helped by Jewish Family & Children’s Service. Jack found temporary bookbinding work at Houghton Mifflin and also worked at a warehouse. Their son Marc was born Aug. 16, 1952.
But the winters were brutal, and the family moved to Los Angeles in February 1952. Jack took a warehouse job for a year and then worked for a calendar company. In 1959, he and Katie purchased a small grocery store, Quinn’s Market, near Glendale. In 1966, they sold it and purchased another grocery store in Venice. “We worked hard, six and sometimes seven days a week,” Jack said. They sold the store in 1979.
Jack and Katie also worked hard for Sephardic Temple Tifereth Israel. “Jewish Family Service was very good to us. We wanted to pay back for what the Jewish people did for us,” Jack said.
Katie died in May 2010. Today Jack, 94 and legally blind, walks, listens to tapes from the Braille Institute and visits with his grandchildren every week. He also travels by bus every Saturday from his Culver City home to the Westside Pavilion, where he visits with other Greek survivors. Of the original group of 30, four remain.
“I am thankful for what we accomplished,” Jack said.
|
{
"model": "Alibaba-NLP/gte-large-en-v1.5",
"type": "fast_golden_8k",
"length": 5978
}
|
End of preview. Expand
in Data Studio
GPT-OSS Calibration Data (SWA/Full Splits)
This dataset contains high-quality calibration artifacts for converting GPT-OSS-20B (and larger MoE models) from GQA to Multi-Head Latent Attention (MLA).
It was generated using GTE-Large-v1.5 (8192 context window) on an L40S GPU to ensure long-range dependencies are preserved, addressing the "V_latent compression" quality gap.
Files
| File | Description | Target Layers |
|---|---|---|
calib_swa_golden.jsonl |
Dense local coherence data (< 2048 tokens). | Sliding Window Attention Layers |
calib_full_golden.jsonl |
Long-range dependency outliers (> 4096 tokens). | Full Attention Layers |
calib_mixed_golden.jsonl |
A diverse mix of both (General purpose). | Fallback / Baseline |
Methodology
- Source: FineWeb-Edu (SOTA reasoning/academic text).
- Embeddings:
Alibaba-NLP/gte-large-en-v1.5(8k context) used to encode documents. - Filtering:
- Clustering: MiniBatchKMeans to find representative centroids.
- Hard Negatives: Top 5% outliers (highest distance from centroids) selected to maximize gradient signal during distillation.
- Splitting: Data strictly stratified by length to match GPT-OSS SWA/Full layer requirements.
Usage
Intended for Knowledge Distillation (Teacher -> Student) to repair Perplexity degradation during MLA conversion.
- Downloads last month
- 28