text
stringlengths
195
652k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.83k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
44
160k
score
float64
2.52
5.03
int_score
int64
3
5
Writing and Developing Social Stories: Practical Interventions in Autism |Format:||Other book format 104 pages| Not in stock Usually despatched in 7-10 days in the UK This practical resource provides an introduction to the theory and practice of writing social stories. In addition, there are examples of successful stories to use as guides, as well as information and photocopiable resources for delivering training on the use of social stories. Based on detailed work carried out in homes, schools and pre-schools, this book offers practical support to anyone meeting the needs of a child or young adult with an autistic spectrum disorder. Social stories are short stories intended for children with autism to help them understand their social world and behave appropriately within it. The stories provide clear, concise and accurate information about what is happening in a specific situation, outlining both why it is happening and what a typical response might be. It is written by those directly supporting a child with autism and only successful stories are included in the book. The stories are infinitely flexible and adaptable to an individual child in an individual social situation. It covers children aged 3 to 16. Speechmark Publishing Ltd Other books by this author See all titles Customers who bought this title, also bought... Taking Care of Myself: A Hygiene, Puberty and Personal Curriculum for Young People with Autism (Paperback) You save: £1.00 An Exceptional Children's Guide to Touch: Teaching Social and Physical Boundaries to Kids (Paperback) You save: £0.20 This book can be found in... The prices displayed are for website purchases only, and may differ to the prices in Waterstones shops.
<urn:uuid:df48c414-84a4-4482-81ee-4bd5895b7dc1>
CC-MAIN-2014-52
http://www.waterstones.com/waterstonesweb/products/caroline+smith/writing+and+developing+social+stories/3275361/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768034.59/warc/CC-MAIN-20141217075248-00051-ip-10-231-17-201.ec2.internal.warc.gz
en
0.937516
353
2.984375
3
Choice, Education and Experience Decision making, the challenge of choice, is often discussed as though it’s a single, invariant type of event. Perhaps this is most strongly presented in the idea of stable preferences, the idea that if we choose to eat the fish at a restaurant one day then we should choose it the next day as well, always assuming we liked it. People don’t actually behave like this, and decision making is much more complex than economics often makes out. However, we can roughly divide our choice processes into two – decisions we make from personal experience and decisions we make from education. We may invest in banks because we've had a good experience doing so, but we may choose to limit our investments based on third-party knowledge that financial institutions are inherently risky. But how we decide which model to follow can change the course of our lives; and certainly determine the health of our wealth. The Prospect of Choice The cornerstone of behavioral economics is Prospect Theory, which applied weightings to the traditional expected-utility models of standard economics. We've looked at the historical development of this a few times, but we can recap quickly (and if you want a fuller treatment you’ll need to go to the sourced articles). As we saw in Utility, the Deus Ex-machina of Economics the key to modern economic theory is the idea that people make rational choices – and the definition of rational choice goes way back to discussions between Blaise Pascal and Pierre Fermat in the seventeenth century. In essence this argues that people should always choose the option that maximizes their expected return, a definition based in probability theory. However, in the St Petersburg game the probabilities show that the expected return is always greater than the entry price which, under rational choice theory, means that we should always enter the game, no matter how large the entry price. However, this is a statement about probabilities - we may be likely to win, but we're not certain to and this uncertainty means that people won't enter the game once the entry fee is above a certain price. The point is that people don’t really make rational assessments based on probability – there comes a point when the possibility of losing your winnings, even if the probability is low, is too great to be willing to take the chance. Daniel Bernoulli’s solution to the problem was the idea of expected utility, a subjective form of expected value. A millionaire may be prepared to gamble the loss of $100,000 on the toss of a coin, but a pauper probably won’t, even if the odds favor them. Risk and Uncertainty The idea of expected utility became the central principle of modern economics in the twentieth century but started to run into serious problems when a series of experiments showed that people violated the underlying axioms – so issues such as the Allias Paradox and the Ellsburg Ambiguity Paradox showed that peoples’ choices choices are not independent of the other options available to us (see: Ambiguity Aversion: Investing Under Conditions of Uncertainty). Choice is affected by uncertainty: people prefer a defined risk to an undefined one. This problem was solved in Prospect Theory by Tversky and Kahneman who argued from experimental evidence that people underweight large probability events and overweight small probability ones. By weighting the probabilities associated with such events Prospect Theory retains the core of Daniel Bernoulli’s great idea of subjective expected utility: and this modification rescued economics by providing an explanation for the various paradoxes that were otherwise so difficult to explain. All then is well, you would think, in the world of modern economics. Behavioral psychology has been enlisted to rescue the concept of expected utility and provides an integrated theory for us all to move forward with. Well, that’s the idea. However, as we saw in Behavioral Finance’s Smoking Gun, it's possible to set up experiments in a way that shows violations of Prospect Theory – situations where people underweight small probability events rather than overweighting them, for instance. Experience and Choice This is a puzzle and one that potentially undermines the whole concept of subjective utility – which would also undermine Prospect Theory and the traditional approach to behavioral economics. Gerd Gigerenzer has suggested that this can be explained by abandoning the non-empirical theories of modern economics and the vague prescriptions of behavioral economics such as the representative heuristic. Instead he argues that we should focus on how the brain actually makes decisions. As an example, Hertwig, Barron, Weber and Erev in Decisions From Experience and the Effect of Rare Events in Risky Choice argue that the inversion of the weighting of small probability events can be explained by looking at how people learn about the likelihood of the occurrence of rare events: “Decisions from experience and decisions from description can lead to dramatically different choice behavior. In the case of decisions from description, people make choices as if they overweight the probability of rare events, as described by prospect theory. We found that in the case of decisions from experience, in contrast, people make choices as if they underweight the probability of rare events”. So, for example, if your experience of investing is twenty years of happy share price rises you’ll likely underestimate the chance of a market calamity. On the other hand if you spend your time reading books about the constantly recurring crashes that dog financial markets you’ll probably overweight the chances of such events. Underweighting and Choice The issue of underweighting from experience is easily drawn out of probability theory. We will each only experience a relatively small number of events, relative to those in the wider markets. It's a facet of statistics that if we only experience a small sample of events relative to the total then we are more than likely to miss the rare event completely – so our experience will not be representative of the probability of the actual event occurring. Even in large samples recency effects are suspected of causing a similar bias – we’re less likely to have experienced the total failure of one of our investments recently and we’ll tend to discount past events more than recent ones (see: Recency: Hot Hands and the Gambler's Fallacy). Yet where the researchers examined the effects of decision making from description – i.e. from symbolic information (aka “writing”) – the results obtained matched those found in Prospect Theory. This fundamental difference in decision making processes based on either experience from limited numbers of samples or from descriptions that require more conscious processing may well be fundamental to understanding the discrepancies at the heart of economics and behavioral finance. What’s really interesting, of course, is that neither route actually provides an optimal answer. The fact that education leads us into a set of biases which can be described by Prospect Theory, while relying on gut instinct leads us into a set of different biases which can’t be, only shows that the underlying theories aren’t very robust: but it doesn’t take us very far down the road of greater understanding. Still, it’s a start. This article originally appeared at The Psy-Fi Blog . Copyright 2014.
<urn:uuid:bc90bebe-cc76-40d5-9d71-7e0423acc547>
CC-MAIN-2014-52
http://www.businessinsider.com/there-are-two-completely-different-ways-we-make-decisions-2012-12
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770371.28/warc/CC-MAIN-20141217075250-00074-ip-10-231-17-201.ec2.internal.warc.gz
en
0.953061
1,477
3.171875
3
Volume 19, Number 7—July 2013 CME ACTIVITY - Synopsis Transmission of Streptococcus equi Subspecies zooepidemicus Infection from Horses to Humans On This Page Streptococcus equi subspecies zooepidemicus (S. zooepidemicus) is a zoonotic pathogen for persons in contact with horses. In horses, S. zooepidemicus is an opportunistic pathogen, but human infections associated with S. zooepidemicus are often severe. Within 6 months in 2011, 3 unrelated cases of severe, disseminated S. zooepidemicus infection occurred in men working with horses in eastern Finland. To clarify the pathogen’s epidemiology, we describe the clinical features of the infection in 3 patients and compare the S. zooepidemicus isolates from the human cases with S. zooepidemicus isolates from horses. The isolates were analyzed by using pulsed-field gel electrophoresis, multilocus sequence typing, and sequencing of the szP gene. Molecular typing methods showed that human and equine isolates were identical or closely related. These results emphasize that S. zooepidemicus transmitted from horses can lead to severe infections in humans. As leisure and professional equine sports continue to grow, this infection should be recognized as an emerging zoonosis. Streptococcus equi subspecies zooepidemicus (S. zooepidemicus) is a β-hemolytic, Lancefield group C streptococcal bacterium. S. zooepidemicus is considered an opportunistic commensal in horses (1–3), but it may also cause infections in other domestic animals such as cattle, sheep, goats, pigs, dogs, and cats (4–10). Another subspecies of the same genus, Streptococcus equi subsp. equi (S. equi), causes strangles, the highly contagious and serious disease in horses (1,11,12). S. zooepidemicus shares >98% DNA sequence homology with S. equi (1) and >80% DNA sequence homology with Streptococcus pyogenes (13), a Lancefield group A streptococcus and major human pathogen. Although considered an opportunistic pathogen, S. zooepidemicus shares important virulence factors with both S. equi and S. pyogenes such as the M-like proteins, superantigens (sAgs), and the presence of a hyaluronic acid capsule in certain strains. The variable M-protein, located on the surface of S. pyogenes, can be used to differentiate S. pyogenes strains serologically where the M1 serotype is associated with invasive disease in humans (14). The M-like, cell-wall–anchored surface protein SzP, found in all strains of S. zooepidemicus, is essential for the pathogenesis of the disease, at least in horses, where it binds fibrinogen and exhibits antiphagocytic activity that impairs with host protection. The sAgs SeeH, SeeI, SeeL, and SeeM found in S. equi share 96%–99% amino acid sequence homology with S. pyogenes sAgs SpeH, SpeI, SpeL, and SpeM (15). However, few investigated strains of S. zooepidemicus contain homologs to these sAgs. Instead, novel sAgs (SzeF, SzeN, and SzeP) have been identified in certain strains, sharing 34%–59% homology with SpeH, SpeM, and SpeL of S. pyogenes (16). S. zooepidemicus has seldom been isolated from humans. Surprisingly, most published data on humans go back to the latter part of the 1980s (17). Occasional human infection was reported as a result of the consumption of homemade cheese or unpasteurized milk from cows with mastitis (17). In humans, S. zooepidemicus may cause glomerulonephritis and rheumatic fever, which are known sequelae of S. pyogenes (group A) infections (18). Meningitis and purulent arthritis have also been reported (19,20). S. zooepidemicus displays a wide genetic variation between different isolates (13,21–23). The sequence of the SzP protein gene (szP) has been shown to vary greatly between different strains of S. zooepidemicus (24–26), and the variable regions of szP can be used to genetically differentiate strains within the subspecies (27–29). Pulsed-field gel electrophoresis (PFGE) is a DNA-based typing technique that is highly discriminatory and has been used in epidemiologic investigations of S. zooepidemicus outbreaks (30,31). Multilocus sequence typing (MLST) is a method for characterization of bacterial isolates by comparing sequences of several gene fragments. Webb et al. (22) developed a MLST protocol for S. zooepidemicus consisting of 7 housekeeping genes. Obtained sequences are compared to previously deposited sequences, and a sequence type (ST) is assigned from the online PubMLST S. zooepidemicus database (http://pubmlst.org/szooepidemicus) developed by Jolley et al. (32). Within a 6-month period, through our routine practice, we found 3 cases of severe disseminated disease in humans caused by S. zooepidemicus. The purpose of this study was to 1) characterize the clinical presentation of the disease caused by S. zooepidemicus, 2) microbiologically characterize the isolated strains, and 3) identify clonality of human isolates for comparison to equine isolates from contact horse stables and other horse farms of the surrounding area. A 57-year-old man, a farmer and horse breeder from central Finland, was admitted unconscious and febrile to the emergency room of a principal hospital in February of 2011. Cerebrospinal fluid (CSF) was collected, and he was referred to the intensive care unit. He had aortic valve insufficiency and had been catheterized 3 months earlier. His condition was septic, with clinical symptoms of meningismus and pulmonary congestion. The C-reactive protein (CRP) level was 564 mg/L (reference <3 mg/L) and the leukocyte count 15.9 × 109 cells/L (reference 3.4–8.2 × 109 cells/L). Microscopy staining of the CSF revealed gram-positive cocci in chains with a considerable number of polymorphonuclear cells. The next day, bacteria subsequently identified as S. zooepidemicus (Table 1) grew from the CSF and 4 of the 4 blood culture bottles, leading to a primary diagnosis of meningitis and sepsis. Intravenous high-dose penicillin treatment (5 weeks) was started in combination with gentamicin (first 10 days). Two and a half days after admission, the patient regained consciousness. Intravascular coagulopathy developed, and 20 days later, progressive endocarditis. The bicuspid native aortic valve was resected the same day, and several bacterial patches were observed. His perioperative blood cultures remained negative. Neurologic sequelae did not develop, but his recovery and rehabilitation required several weeks. A 62-year-old-man, a truck driver and horse trainer from eastern Finland, returned home from work in a febrile and confused state in May 2011. The next day, on hospital admission, he had pain and swelling of the right knee and right shoulder. He was hyperglycemic and had untreated non–insulin-dependent diabetes mellitus. The synovial fluid aspirated from his knee was turbid, with a leukocyte count of 86.0 × 109 cells/L and a high percentage of polymorphonuclear cells (87%). The CRP level was 329 mg/L and the blood leukocyte count was 19.3 × 109 cells/L. Antimicrobial drug therapy with intravenous cefuroxime was started. The next day, bacteria subsequently identified as S. zooepidemicus were cultured from his right knee and 4 of 4 blood culture bottles (Table 1). On the third day, arthroscopic synovectomy and irrigation of the right knee was performed, and the procedure was repeated. Cefuroxime was changed to intravenous vancomycin without therapeutic response. The CRP level remained high (229 mg/L) and the leukocyte count was 15.3 × 109 cells/L. Next, a combination of penicillin G with clindamycin was administered. He had no evidence of endocarditis, but Tc99m scintigraphy revealed an uptake in the patient’s right shoulder and lower jaw region. Arthroscopic debridement and irrigation of the right shoulder were performed, and purulent synovial fluid was collected for culture. Antimicrobial drug therapy continued with intravenous cefuroxime and clindamycin for 2 weeks; thereafter, with oral cephalexin and clindamycin for 1 week. The patient’s clinical condition gradually improved, and finally, he was able to walk with crutches. He was discharged from the hospital 6 weeks after the onset of illness. A 49-year-old man, a horse trainer from eastern Finland, was admitted to the hospital in August 2011 because of severe, prolonged low-back pain. A horse had kicked his forehead 2–3 weeks earlier. The accident did not require medical attention at that time; however, the low-back pain had increased gradually. He had medicated himself with ibuprofen, 400 mg up to 20 tablets per day, without relief, except when lying supine. He did not record his temperature but was sweating after taking ibuprofen and sought medical attention when walking became difficult. His condition was treated as muscle pain. After a week he returned to the medical center because of excruciating pain in his back. There were no abnormal radiologic findings. On clinical examination, he was nonfebrile and had no clinical symptoms or hemodynamic abnormalities. The clinical findings were unremarkable, except for the pain in his lower back on percussion and a pulsating abdominal mass. Laboratory tests showed leukocytosis (16.2 × 109 cells/L), an elevated erythrocyte sedimentation rate of 73 mm/h (reference 1–15 mm/h), and an elevated CRP level of 217 mg/L. Computed tomography revealed a psoas abscess (65 × 35 × 30 mm) linked to an infected aortic aneurysm (diameter 40 mm). The aneurysm was resected and replaced by a Y-prosthesis, and the psoas abscess was drained. Gram stain of tissue obtained through operation on the abdominal aorta and debridement of the psoas abscess revealed gram-positive cocci in 3 (2 from the aortic wall and 1 from the psoas abscess) of the 4 samples. The patient’s condition was treated with piperacillin-tazobactam, later replaced with intravenous penicillin. Transesophageal echocardiography showed no signs of endocarditis. The patient recovered without sequelae. Microbiological Diagnostics of S. zooepidemicus Strains in Clinical Laboratories Each clinical laboratory used the standard operating procedures and standard culture media of their own. CSF and synovial fluid samples were cultured on blood and/or chocolate agar and blood samples in blood culture bottles and incubated aerobically and anaerobically. For identification, Gram stain and agglutination with streptococcal group sera (Streptococcal Grouping Kit; Oxoid Ltd., Basingstoke, UK) were carried out in all laboratories. The identification of S. zooepidemicus to the species level varied between the laboratories, and was performed using at least one of the following tests as shown in Table 1: APIStrep, , STR Rapid ID32, or VITEK2 GP-ID (all from bioMérieux Marcy l’Etoile, France), combined with AccuProbe Group B Streptococcus Culture ID Test (Gen-Probe, San Diego, CA, USA). Antibiotic Susceptibility of Human Isolates The antibiotic susceptibility profiles were studied with the disk diffusion method (patients 1 and 3) or Etest (patient 2). Results were interpreted according to the EUCAST rules (www.eucast.org/eucast_disk_diffusion_test/breakpoints/). Collection and Microbiological Characterization of Equine Isolates None of the horses from the stables associated with the first 2 human cases (patients 1 and 2) showed any signs of respiratory illness. The horses from the third stable (owned by patient 3) were not examined; however, the owner did not recall any clinical signs of respiratory or other disease in his horses. Nasal swab specimens were collected from 7 horses owned by patient 1 (stable A) and 4 horses owned by patient 2 (stable H). The swabs were streaked onto bovine blood agar plates and incubated in a 5% CO2 atmosphere at 37°C (according to the standard operating procedures of the Finnish Food Safety Authority Evira, Kuopio, Finland) for 24 hours. β-hemolytic colonies were studied with conventional methods, and biochemical characterization was performed by using Rapid ID32 Strep (bioMérieux). S. zooepidemicus was isolated from 5 horses in stable A, but not from any horse in stable H. Six other S. zooepidemicus isolates from horses unrelated to the described human cases (stables B to F) (Table 2) were included in the genetic comparison. Pulsed-field Gel Electrophoresis Three human isolates (1 from each patient) and 11 equine isolates of S. zooepidemicus were investigated by PFGE, sequencing of the szP gene, and MLST. DNA isolation was performed as described by Elliot et al. (33), and 40 U of SmaI was used for digestion. The chromosomal digests were separated by PFGE, with a switch time of 5 to 40 s for 20 h at a 120° angle and a voltage gradient of 6 V/cm at 12°C. Chromosomal DNA of Salmonella enterica serovar Braenderup H9182 was used as a marker. Sequencing of the szP gene and MLST Isolates of S. zooepidemicus were cultured on 5% horse blood agar (National Veterinary Institute, Uppsala, Sweden) in a 5% CO2 atmosphere at 37°C for 24 h. Preparation of DNA from bacterial culture was performed by a boiling procedure; a 1-μL loop of bacteria was suspended in 100 μL of sterile H2O and incubated at 98°C for 15 min. The samples were centrifuged and the supernatants were collected and used as templates in the sequencing analyses. The isolates of S. zooepidemicus (n = 14) were investigated by sequencing a 373-bp fragment of the SzP protein gene (25). Sequencing was performed according to Båverud et al. (34). Sequences were edited, assembled, and analyzed by using BioNumerics 6.5 (Applied Maths, Saint-Martens-Latem, Belgium). MLST was performed according to Webb et al. (22). Sequences were edited, assembled, and analyzed by using BioNumerics 6.5. Sequence types (STs) were determined using the PubMLST S. zooepidemicus database. Microbiological Identification and Antibiotic Susceptibility of Human Isolates The colonies of S. zooepidemicus on blood agar were large and mucoid and had a wide zone of β-hemolysis. All isolates were sensitive to erythromycin, clindamycin, penicillin, vancomycin, and cephalexin (data not shown). Microbiological identification data for the S. zooepidemicus isolates from human cases are shown in Table 1. Molecular Characterization of Isolates The S. zooepidemicus isolates displayed 10 ST types by MLST. Their relatedness was compared by using eBurst (http://eburst.mlst.net) of all MLST STs for S. equi subsp. zooepidemicus and S. equi subsp. equi recorded in the PubMLST S. zooepedemicus database (February 7, 2013) (Figure 1). eBurst analysis indicated that ST-10, displayed by 3 isolates, Hum1, Hum2, and equine 648/11, was not related to any other STs of the S. zooepidemicus isolates examined in this study (Figure 1; Table 2). ST-209 and ST-201 are double-locus variants (DLVs) and were displayed by Hum3 isolate and horse isolate 6939/10, respectively. All other detected STs were unrelated to each other. Isolates from stables E (8110/09) and F (7723/09) displayed STs not previously described in the PubMLST S. zooepedemicus database. In addition, no product was obtained from forward and reverse primers for the yqiL gene from the isolate from stable F (7723/09). The human isolates Hum1 (patient 1) and Hum2 (patient 2) displayed an szP sequence (GenBank accession no. AF519489) and MLST sequence type (ST-10) identical to the equine isolate 648/11 (stable A) (Table 2). Hum1 was also identical to equine isolate 648/11 on PFGE (Figure 2). Hum2, however, differed from Hum1 and 648/11 by 6 bands on the PFGE profile. The third human isolate, Hum3 (patient 3), was closely related to 1 equine isolate (6939/10) from an unrelated stable (stable D). These isolates displayed an identical szP sequence (accession no. AF519488). Their PFGE profiles were almost identical, and the MLST types ST-209 (Hum3) and ST-201 (6939/10) were DLVs. None of the other equine isolates displayed the same szP sequence type or MLST STs as the human isolates. Among the 5 S. zooepidemicus isolates from stable A, 645/11 was identical to 647/11 on the basis of the MLST ST (ST-175), szP type (II), and PFGE profile. All other isolates differed from each other. Several equine isolates displayed szP sequences not previously described in GenBank (645/11, 646/11, 647/11, and 1128). All szP sequencing results and corresponding GenBank accession numbers are listed in Table 2. We report 3 unrelated cases of S. zooepidemicus infection in patients from eastern Finland who had close and continuous contact with horses. It is noteworthy that the disease in all 3 patients was invasive and severe, requiring prolonged treatment and rehabilitation. Sepsis occurred in 2 cases (patients 1 and 2), meningitis and endocarditis in 1 (patient 1), purulent arthritis in 1 (patient 2), and a psoas abscess in connection with an aortic wall infection in 1 (patient 3). In patient 3, transient bacteremia might have occurred earlier. MLST, PFGE, and sequencing of the SzP protein gene demonstrated identical profiles in a human isolate (Hum1) with an equine isolate (648/11), which strongly supports the zoonotic nature of this disease. Notably, the strain (ST-10) colonized the horse’s nostrils and acted as an innocent commensal, whereas in humans this strain appeared highly virulent and caused severe illness. In the second case (patient 2), we were unable to isolate the same strain from his horses. This failure may have been due to a transient S. zooepidemicus carriage in the nasopharynx, lymphoid tissues, or respiratory tract of the horse. Patient 2 might have been in contact with other horses as well. The strains from patient 1 and patient 2 were identical according to both szP sequencing and MLST, which supports the close relationship between the Hum1 and Hum2 isolates, and although the 2 isolates differed on PFGE analysis (Figure 1), the data strongly suggest that the infection of patient 2 was also transmitted zoonotically. ST-10 is a single-locus variant (SLV) of ST-72, which previously has been isolated from a case of human nephritis in the UK in 1983 (http://pubmlst.org/szooepidemicus/), and from a large outbreak of severe human nephritis in Brazil during 1997 and 1998 associated with consumption of unpasteurized cheese (13,35,36). The isolated strain in the Brazil outbreak was shown to have several genetic similarities to group A streptococci (35). PFGE reveals random genetic events, such as point mutations or insertions or deletions of genetic material (37), thereby being often a more sensitive method than MLST to identify recent epidemic strains. However, it is not possible to estimate whether S. zooepidemicus isolates from patients 1 and 2, with altered PFGE profiles and approximately a 3-months’ gap between the diagnoses of disease, could be of the same origin. Notably, the strain isolated from patient 3 (Hum3), which differed completely from Hum1 and Hum2, was identical by MLST (ST-209) to a strain isolated from horses in an outbreak of respiratory disease in Iceland in 2010 (Bjornsdottir et al., unpub data). The Hum3 isolate also shared a szP sequence type (accession no. AF519488) previously found in horses with respiratory disease (S.B. Lindahl, unpub. data) as well as in an asymptomatic horse (6939/10) in this study. The ST-209 strain has further been isolated from a person with septicemia (that was associated with abortion) in Iceland in 2010, and has a SLV (ST-200) and a DLV (ST-201) that have been reported from cases of abortion/uterine infections in horses (http://pubmlst.org/szooepidemicus/). The ST-201 was also found in one of the healthy horses in this study (Table 2). All strains of S. zooepidemicus displayed mucoid colonies on the agar plates, indicating expression of a hyaluronic acid capsule, a well-known virulence factor in other pathogenic streptococci, such as S. equi in horses and S. pyogenes in humans. However, the expression of the mucoid capsule was variable: Hum1 strain produced large and highly mucous colonies, whereas those from Hum3 were heterogeneous in colony size and less mucoid. Whether there is a correlation between the production of mucinous substance and severity of the disease remains to be determined. Additional virulence factors, such as the presence of sAgs (16), would be intriguing to investigate. In S. pyogenes, variation in the M-protein is attributed to variable virulence. For example, the M1 strains are the most pathogenic (14). The sequence variants of the SzP protein gene in S. zooepidemicus were investigated but could not be correlated with clinical features in horses in a study by Walker and Runyan (26). However, determining such a correlation might be possible for the human isolates. Recently, an outbreak of invasive S. zooepidemicus infection has been reported from Finland by Kuusi et al. (30). Altogether, 7 patients were identified: 6 had septicemia and 1 had purulent arthritis. All had consumed goat cheese produced from unpasteurized milk in a small-scale dairy. In Finland (population 5.2 million), all invasive streptococcal infections must be reported to the National Infectious Disease Register. As reviewed by Kuusi et al., only 3 cases of invasive S. zooepidemicus infections were reported to the register from 1992 through 2002, and ≈10 cases of invasive group C streptococcal infections occurred annually. In other words, even invasive isolates were often typed only to the Lancefield group level. The novelty of our investigation is that an identical S. zooepidemicus strain was isolated from patient 1 and from a healthy horse in his stable, suggesting zoonotic transmission. Furthermore, patient 2 was infected with a S. zooepidemicus strain clonally related to that of patient 1, as judged by 2 independent typing methods, although patients 1 and 2 lived 140 km apart without a verified contact with each other. Notably, the isolate from patient 1 was highly virulent in humans but did not cause any clinical infection in the horse. In contrast, the isolate from patient 3 had the same MLST type as the strain previously isolated from several horses in an outbreak of respiratory disease. Our work yielded 3 new sequences of the szP gene, deposited under GenBank accession nos. KC287220 (isolate 645/11), KC287221 (isolate 646/11), and KC287222 (isolate 1128/11). Further, isolate 8110/09 was added to the PubMLST S. zooepidemicus database with ST-299. The isolate 7723/09 could not be assigned a ST because there was no product for the yqiL gene; however, the isolate is recorded in the PubMLST S. zooepidemicus database with the following allele sequence: 8 (arcC)–52 (nrdE)–2 (proS)–14 (spi)–1 (tdk)–22 (tpi)–n/a (yqiL). Leisure and professional equine sports activities are growing in many countries. S. zooepidemicus infection transmitted from horses may cause severe illness in humans and should be considered an emerging zoonosis. Bacteriological identification of S. zooepidemicus is cheap and feasible with simple fermentation methods. Therefore, typing to the species level is strongly recommended for all clinical laboratories whenever group C streptococci are recovered from severely infected persons. Early identification of S. zooepidemicus will facilitate appropriate medical intervention and timely epidemiologic surveillance and finally, prevent the spread of a potentially life-threatening pathogen. Dr Pelkonen is the head of Veterinary Bacteriology Research Unit, Research and Laboratory Department, Finnish Food Safety Authority, Finland. Her research is focused on bacterial infections in animals and bacterial zoonoses. Sofia Lindström and Robert Söderlund, National Veterinary Institute, Uppsala, Sweden, are acknowledged for technical support in sequencing of the SzP protein gene and performing MLST. We are grateful to Tiina Kortelainen and Sirpa Heinikainen for PFGE analyses. S.B.L.’s work was supported by FORMAS (The Swedish Research Council for Environment, Agricultural Sciences and Spatial Planning). T.A., S.B.L., and T.T. conceived and wrote the first draft; P.S., T.T., J.K. isolated the human strains; T.A. and S.P. isolated the equine strains; S.V., I.K., T.V., and J.K. processed patient records; S.B.L. performed the SzP sequencing and MLST analyses; S.P. and T.A. performed PFGE analysis; T.T. designed the study. All authors contributed to manuscript preparation and approved the final version. The analysis of data presented here is a part of our routine effort endorsed by the Finnish Law, to prevent the spread of transmissible diseases. Therefore, a special permission from the Ethical Committee of the Eastern Finland region was not considered necessary. Verbal or written informed consent for the study was obtained from the patients. - Timoney JF. The pathogenic equine streptococci. Vet Res. 2004;35:397–409. - Laus F, Preziuso S, Spaterna A, Beribe F, Tesei B, Cuteri V. Clinical and epidemiological investigation of chronic upper respiratory diseases caused by beta-haemolytic streptococci in horses. Comp Immunol Microbiol Infect Dis. 2007;30:247–60. - Newton JR, Laxton R, Wood JL, Chanter N. Molecular epidemiology of Streptococcus zooepidemicus infection in naturally occurring equine respiratory disease. Vet J. 2008;175:338–45. - Blum S, Elad D, Zukin N, Lysnyansky I, Weisblith L, Perl S, Outbreak of Streptococcus equi subsp. zooepidemicus infections in cats. Vet Microbiol. 2010;144:236–9. - Fan H, Wang Y, Tang F, Lu C. Determination of the mimic epitope of the M-like protein adhesin in swine Streptococcus equi subsp. zooepidemicus. BMC Microbiol. 2008;8:170. - Lamm CG, Ferguson AC, Lehenbauer TW, Love BC. Streptococcal infection in dogs: a retrospective study of 393 cases. Vet Pathol. 2010;47:387–95. - Las Heras A, Vela AI, Fernandez E, Legaz E, Dominguez L, Fernandez-Garayzabal JF. Unusual outbreak of clinical mastitis in dairy sheep caused by Streptococcus equi subsp. zooepidemicus. J Clin Microbiol. 2002;40:1106–8. - Pisoni G, Zadoks RN, Vimercati C, Locatelli C, Zanoni MG, Moroni P. Epidemiological investigation of Streptococcus equi subspecies zooepidemicus involved in clinical mastitis in dairy goats. J Dairy Sci. 2009;92:943–51. - Priestnall S, Erles K. Streptococcus zooepidemicus: an emerging canine pathogen. Vet J. 2011;188:142–8. - Sharp MW, Prince MJ, Gibbens J. S. zooepidemicus infection and bovine mastitis. Vet Rec. 1995;137:128. - Harrington DJ, Sutcliffe IC, Chanter N. The molecular basis of Streptococcus equi infection and disease. Microbes Infect. 2002;4:501–10. - Sweeney CR, Timoney JF, Newton JR, Hines MT. Streptococcus equi infections in horses: guidelines for treatment, control, and prevention of strangles. J Vet Intern Med. 2005;19:123–34 . - Holden MT, Heather Z, Paillot R, Steward KF, Webb K, Ainslie F, Genomic evidence for the evolution of Streptococcus equi: host restriction, increased virulence, and genetic exchange with human pathogens. PLoS Pathog. 2009;5:e1000346 . - Cole JN, Barnett TC, Nizet V, Walker MJ. Molecular insight into invasive group A streptococcal disease. Nat Rev Microbiol. 2011;9:724–36. - Paillot R, Robinson C, Steward K, Wright N, Jourdan T, Butcher N, Contribution of each of four Superantigens to Streptococcus equi–induced mitogenicity, gamma interferon synthesis, and immunity. Infect Immun. 2010;78:1728–39. - Paillot R, Darby AC, Robinson C, Wright NL, Steward KF, Anderson E, Identification of three novel superantigen-encoding genes in Streptococcus equi subsp. zooepidemicus, szeF, szeN, and szeP. Infect Immun. 2010;78:4817–27. - Mandell GL, Bennet JE, Dolin R. Mandell, Douglas, and Bennett’s principles and practice of infectious diseases. 4th ed. New York: Churchill Livingstone; 1995. - Murray PR, Baron EJ, Jorgensen JH, Landry ML, Pfaller MA. Manual of clinical microbiology. 9th ed. Washington (DC): ASM Press; 2007. - Eyre DW, Kenkre JS, Bowler IC, McBride SJ. Streptococcus equi subspecies zooepidemicus meningitis–a case report and review of the literature. Eur J Clin Microbiol Infect Dis. 2010;29:1459–63. - Friederichs J, Hungerer S, Werle R, Militz M, Buhren V. Human bacterial arthritis caused by Streptococcus zooepidemicus: report of a case. Int J Infect Dis. 2010;14(Suppl 3):e233–5. - Chanter N, Collin N, Holmes N, Binns M, Mumford J. Characterization of the Lancefield group C streptococcus 16S–23S RNA gene intergenic spacer and its potential for identification and sub-specific typing. Epidemiol Infect. 1997;118:125–35. - Webb K, Jolley KA, Mitchell Z, Robinson C, Newton JR, Maiden MC, Development of an unambiguous and discriminatory multilocus sequence typing scheme for the Streptococcus zooepidemicus group. Microbiology. 2008;154:3016–24. - Barquero N, Chanter N, Laxton R, Wood JL, Newton JR. Molecular epidemiology of Streptococcus zooepidemicus isolated from the respiratory tracts of Thoroughbred racehorses in training. Vet J. 2010;183:348–51. - Timoney JF, Anzai T, Blair M. Clonal invasion of the equine respiratory tract by Streptococcus zooepidemicus. Adv Exp Med Biol. 1997;418:611–3 . - Anzai T, Timoney JE, Kuwamoto Y, Wada R, Oikawa M, Higuchi T. Polymerase chain reaction-restriction fragment length polymorphism analysis of the SzP gene of Streptococcus zooepidemicus isolated from the respiratory tract of horses. Am J Vet Res. 2002;63:1298–301. - Walker RL, Runyan CA. Identification of variations in SzP proteins of Streptococcus equi subspecies zooepidemicus and the relationship between protein variants and clinical signs of infection in horses. Am J Vet Res. 2003;64:976–81. - Akineden O, Hassan AA, Alber J, El-Sayed A, Estoepangestie AT, Lammler C, Phenotypic and genotypic properties of Streptococcus equi subsp. zooepidemicus isolated from harbor seals (Phoca vitulina) from the German North Sea during the phocine distemper outbreak in 2002. Vet Microbiol. 2005;110:147–52. - Akineden O, Alber J, Lammler C, Weiss R, Siebert U, Foster G, Relatedness of Streptococcus equi subsp. zooepidemicus strains isolated from harbour seals (Phoca vitulina) and grey seals (Halichoerus grypus) of various origins of the North Sea during 1988–2005. Vet Microbiol. 2007;121:158–62 . - Nicholson ML, Ferdinand L, Sampson JS, Benin A, Balter S, Pinto SW, Analysis of immunoreactivity to a Streptococcus equi subsp. zooepidemicus M-like protein To confirm an outbreak of poststreptococcal glomerulonephritis, and sequences of M-like proteins from isolates obtained from different host species. J Clin Microbiol. 2000;38:4126–30 . - Kuusi M, Lahti E, Virolainen A, Hatakka M, Vuento R, Rantala L, An outbreak of Streptococcus equi subspecies zooepidemicus associated with consumption of fresh goat cheese. BMC Infect Dis. 2006;6:36 . - Bordes-Benítez A, Sanchez-Onoro M, Suarez-Bordon P, Garcia-Rojas AJ, Saez-Nieto JA, Gonzalez-Garcia A, Outbreak of Streptococcus equi subsp. zooepidemicus infections on the island of Gran Canaria associated with the consumption of inadequately pasteurized cheese. Eur J Clin Microbiol Infect Dis. 2006;25:242–6. - Jolley KA, Chan MS, Maiden MC. mlstdbNet-distributed multi-locus sequence typing (MLST) databases. BMC Bioinformatics. 2004;5:86 . - Elliott JA, Farmer KD, Facklam RR. Sudden increase in isolation of group B streptococci, serotype V, is not due to emergence of a new pulsed-field gel electrophoresis type. J Clin Microbiol. 1998;36:2115–6 . - Båverud V, Johansson SK, Aspan A. Real-time PCR for detection and differentiation of Streptococcus equi subsp. equi and Streptococcus equi subsp. zooepidemicus. Vet Microbiol. 2007;124:219–29 . - Beres SB, Sesso R, Pinto SW, Hoe NP, Porcella SF, Deleo FR, Genome sequence of a Lancefield group C Streptococcus zooepidemicus strain causing epidemic nephritis: new information about an old disease. PLoS ONE. 2008;3:e3026 . - Baiter S, Benin A, Pinto SW, Teixeira LM, Alvim GG, Luna E, Epidemic nephritis in Nova Serrana, Brazil. Lancet. 2000;355:1776–80 . - Tenover FC, Arbeit RD, Goering RV, Mickelsen PA, Murray BE, Persing DH, Interpreting chromosomal DNA restriction patterns produced by pulsed-field gel electrophoresis: criteria for bacterial strain typing. J Clin Microbiol. 1995;33:2233–9 . Suggested citation for this article: Pelkonen S, Lindahl SB, Suomala P, Karhukorpi J, Vuorinen S, Koivula I, et al. Transmission of Streptococcus equi subspecies zooepidemicus infection from horses to humans. Emerg Infect Dis [Internet]. 2013 Jul [date cited]. http://dx.doi.org/10.3201/eid1907.121365 1These authors contributed equally to this article. - Page created: July 03, 2013 - Page last updated: July 03, 2013 - Page last reviewed: July 03, 2013 - Centers for Disease Control and Prevention, National Center for Emerging and Zoonotic Infectious Diseases (NCEZID) Office of the Director (OD)
<urn:uuid:3dd074bf-8774-411f-aa6e-ed228c8e0b98>
CC-MAIN-2015-40
http://wwwnc.cdc.gov/eid/article/19/7/12-1365_article
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738087479.95/warc/CC-MAIN-20151001222127-00141-ip-10-137-6-227.ec2.internal.warc.gz
en
0.904275
8,540
2.796875
3
This vibrant period of Kurdish history is marked by the reemergence of Kurdish political power from the 7th to 9th century, after three centuries of decline under the centralized governments of the Sasanians of Persia and the Byzantine Empire. It culminated in three centuries, the 10th through the 12th, that can rightfully be called Islam’s Kurdish centuries. Through steady emigrations and military conquests, their political rule extended from central Asia to Libya and Yemen. KURDISTANICA needs your scholarly expertise in this area. Please register with us and help collecting information in this subject area.
<urn:uuid:a739e6dc-0dcd-4f74-bbbe-77fd5da39c4c>
CC-MAIN-2020-05
http://kurdistanica.com/medieval-history/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593994.14/warc/CC-MAIN-20200118221909-20200119005909-00016.warc.gz
en
0.954968
124
2.9375
3
Alcohol is bad for you. It can harm your memory. Drinking increases your risk of liver disease and oral cancers. Alcohol raises blood pressure and increases the risk of strokes. Drinking during pregnancy can harm the development of the unborn child. In spite of all this, there is something that doctors call the “French paradox.” Coronary disease rates in France are lower than in other industrialized nations with similar risk factors. It appears linked to high levels of wine consumption in France. Numerous studies demonstrate a correlation between moderate wine consumption and reduced coronary risk. It is not the alcohol that seems to provide the effect, however. Consumption of beer, distilled grains or even white wines does not offer the same reduction in coronary disease. Only red wine. Should you set aside teetotaling, and swallow your pride along with a daily glass of red wine for the health benefits? A new study by the University of Wisconsin1 indicates that it may not be the red wine providing the health benefits—it may be the red and purple grapes used to make red wine. It turns out compounds in grapes called flavonoids are what offer protection against heart disease. Also present in these grapes are antioxidants, which also have health benefits. Both are non-alcoholic elements present in red wine. High concentrations of both flavonoids and antioxidants occur in red and purple grapes. The highest concentrations are found in purple grapes, such as Concord grapes. The study further showed that drinking purple grape juice has an effect similar to consuming a similar amount of red wine in reducing cardiovascular risk. Not bad. You can get the health benefits associated with that daily glass of wine—without the additional risks that come with alcohol consumption. Substitute a morning glass of purple grape juice for orange juice, or pack a bunch of Concord grapes with your lunch. You get guilt-free flavonoids, and antioxidants, too.
<urn:uuid:8235031a-3f10-45fc-8b7f-e791ca867ee0>
CC-MAIN-2017-39
http://www.e-gracenotes.org/article/2836/archives/staying-young/grapes-for-life
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690376.61/warc/CC-MAIN-20170925074036-20170925094036-00409.warc.gz
en
0.956621
384
2.9375
3
The Biden administration has introduced the Justice40 Initiative. This initiative aims to make 40% of certain funds available to marginalized and underserved communities that are more likely impacted by pollution. This is especially seen in not only urban communities due to local industry, but also in more rural locations such as Cancer Alley in Louisiana and mining communities in Appalachia. The commonality in these regions is lack of resources and, at times, the knowledge needed to oppose and restrict these operations. Clean drinking water is a right, yet many communities lack this basic and essential resource According to a study by the Natural Resources Defense Council (NRDC), consistent drinking water violations occurred 40 percent more frequently in communities of color. Examples include the Flint, Michigan and Jackson, Mississippi water crises both effecting majority Black cities. Pennsylvania is no stranger to these issues as seen in cities like Pittsburgh and Philadelphia in which residents are exposed to similar issues. The Justice40 Initiative, by directing resources to these communities, will address these concerns and provide equity in these areas in line with more affluent communities. Water issues like these along with lead removal programs, flood mitigation efforts as well as funding for renewable energy and energy efficiency in agricultural regions are all commendable and should be supported. Contact your representatives and request they express support for this initiative. Dave Porigow, Hilltown
<urn:uuid:a0d20c09-dd72-4d1f-bc23-0cdebc6f8dda>
CC-MAIN-2023-23
https://buckscountyherald.com/stories/clean-drinking-water-is-a-right,25080
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00057.warc.gz
en
0.960815
267
2.578125
3
Scientists have used the UK's national synchrotron science facility, Diamond Light Source, to make a discovery that could pave the way for more effective, targeted drugs to treat inherited learning disabilities and other neurological diseases. UK-based Heptares Therapeutics, the pioneering structure-guided drug discovery and development company, has mapped the structure of a protein linked to the genetic disorder Fragile X Syndrome, a major cause of inherited learning disabilities, as well as to autism, depression, anxiety, addiction and movement disorders. Understanding the structure of this protein means a new generation of targeted medication could be fast on the heels of drugs currently undergoing clinical trials to treat the symptoms of these diseases. The level of detail required for this work could only be achieved using the intense synchrotron light produced at Diamond Light Source, the UK's synchrotron science facility based on the Harwell Science & Innovation Campus in Oxfordshire. Around 3,500 scientists a year use this light to study samples, and its intensity allows them to visualise on a scale that is unobtainable in their home laboratories. Diamond Light Source produces a light 10 billion times brighter than the sun allowing scientists to study proteins at an atomic level. Using Diamond, Heptares scientists shone this intense light through pure protein crystals placed in the "beamline", a specialist lab, and for the first time determined the 3D structure of the protein mGlu5 (metabotropic glutamate receptor 5), part of a family of receptors that controls brain activity. Heptares' research, published today in the journal Nature, outlines a detailed understanding of mGlu5 and how it is affected by a drug which has been evaluated in clinical trials to treat Fragile X symptoms and other neurological disorders. Using these findings, Heptares has enabled the development of a 'new generation' of targeted medication for diseases linked to this family of proteins with improved effectiveness over drugs currently in trials. Scientists from Heptares have already used the structural information to discover molecules that lock into a "pocket" identified inside the protein during this latest study. Dr Fiona Marshall, Chief Scientific Officer at Heptares, believes this discovery has the potential to transform the treatment of a range of serious diseases involving mGlu5: "Drugs currently in clinical trials could be on the market within about five years' time, however, with the knowledge gathered in this study we could have a 'new generation' of precisely designed and more effective drugs within about ten years. Being able to use the world-leading microfocus X-ray crystallography beamline (I24) at Diamond Light Source to understand how the protein reacts to different drugs at an atomic level is invaluable in the success of research into these diseases." In the past, drug design has been largely the product of trial and error. Drugs would be developed and then tested until they had the desired effect. Because scientists lacked a comprehensive understanding of why and how the drugs were working, this approach could lead to unwanted side- effects. By visualising mGlu5 at the atomic level, Heptares was able to identify a "pocket" in the structure. Computer technology is allowing scientists to design a drug to fit precisely into this pocket. This targeted drug would only affect the receptor with the pocket identified, reducing the chance of side effects. Prof Andrew Harrison, Diamond's Chief Executive, comments, "Heptares is currently the biggest annual industrial user of Diamond. This is testament to our unique facilities and the success they have had in the past using techniques only available in the UK at Diamond. Whilst the majority of the research undertaken at Diamond is done by academia, currently 5% of the overall experimental time is purchased by 70 regular industry customers. They are using Diamond to advance R&D programmes across a range of sectors including pharmaceuticals, biotechnology, chemicals, oil and engineering. The synchrotron is playing a major role in keeping a strong R&D base in the UK and promoting highly advanced innovation within a range of businesses from British SMEs to global companies such as GSK and Rolls-Royce." Fiona Marshall, Chief Scientific Officer at Heptares, concludes, "Publishing this research in Nature will provide scientists with a new understanding about the function of this protein and help facilitate the design of some important new drug treatments. Here at Heptares, we are applying this structural knowledge to a range of proteins known to be important in serious diseases to create a new generation of targeted medication. Diamond will continue to play an important role in our future research." Explore further: 'Big Science' uncovers another piece in the Alzheimer's puzzle More information: Andrew S. Doré et al. Structure of the class C GPCR metabotropic glutamate receptor 5 transmembrane domain, 2014, Nature dx.doi.org/10.1038/nature13396
<urn:uuid:ca191dda-2c0a-448d-84ef-2e7d02b94ef8>
CC-MAIN-2014-52
http://phys.org/news/2014-07-major-enables-precision-drug-inherited.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775392.34/warc/CC-MAIN-20141217075255-00172-ip-10-231-17-201.ec2.internal.warc.gz
en
0.938983
992
3.125
3
PULLMAN, Wash. – Keiko Tuttle believes the biggest challenge agriculture will face in the next five years centers around a food source that makes up 70 percent of the human diet: cereal grains. “I always ask people, ‘Do you like cookies?’” the doctoral candidate at Washington State University explains lightheartedly, inviting people into a discussion about the influence of cereal grains on the food system and the need to feed a world population some project to near 11 billion by 2050. Researching seed germination problems Tuttle is researching seed dormancy in wheat – that is, seeds that don’t germinate when planted. Understanding more about the genes and proteins that influence the process of dormancy and how the mechanism is released may provide solutions to problems growers have in the field. Some of these problems degrade the important starch found in cereals and ultimately decrease the end-use quality of the grain. Preventing these problems can potentially eliminate economic losses to growers, millers and bakers. This is especially critical in the Pacific Northwest, which provides the nation with about 95 percent of its soft white winter wheat. That is worth a gross $1 billion to the state of Washington, Tuttle said. Among 10 students selected nationwide Tuttle is one of 10 graduate students in the United States whose essay on the greatest challenges facing agriculture in the next five years earned a trip to the U.S. Department of Agriculture’s 2014 Agricultural Outlook Forum on the Changing Face of Agriculture, to be held Feb. 20-21 in Arlington, Va. “I was fascinated with the opportunity to travel to D.C. to meet important members of the USDA, better understand their specific missions and speak to these leaders about agriculture today and agriculture for the future,” she said. In her winning essay, Tuttle points out that “students may be some of the best liaisons to bridge the gap (between the public, scientists and) policy makers. As students we continue to grow in our understanding of basic research and apply our novel findings for agricultural improvement.” A meaningful future U.S. Secretary of Agriculture Tom Vilsak echoed Tuttle’s confidence in students pursuing higher education in agriculture in a recent USDA announcement. “The future of agriculture and rural America depends on the upcoming generation of leaders in farming, ranching and conservation,” he said. “And the students selected to attend the Agricultural Outlook Forum are among the best young leaders our country has to offer.” Tuttle plans to continue her research as part of the biotech industry or USDA, where she will pursue change through policy work. How many varieties of wheat has WSU developed? Sentence or two with more info about the subject.
<urn:uuid:8f78efe9-a061-4899-a7f1-95857b08aa43>
CC-MAIN-2015-27
http://cahnrs.wsu.edu/news-release/2014/02/13/keiko-tuttle-identifies-key-issues-for-national-ag-forum/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097512.42/warc/CC-MAIN-20150627031817-00073-ip-10-179-60-89.ec2.internal.warc.gz
en
0.93101
577
2.640625
3
This is our daily post that is shared across Twitter & Telegram and published first on here with Kindness & Love XX on peace-truth.com/ #AceNewsRoom With ‘Kindness & Wisdom’ Aug.15, 2022 @acehistorynews #AceHistoryDesk – Today in History – Florence Mabel Kling DeWolfe Harding, First Lady during the Warren G. Harding administration (1921-23), was born on August 15, 1860. An outspoken supporter of woman suffrage, Mrs. Harding cast her ballot in the presidential campaign of 1920 for her husband. She was the first American First Lady afforded that right, as the Nineteenth Amendment had been ratified the previous summer. I owe allegiance to only one boss—and she sits right over there in that box. She’s a mighty good one too. Warren G. Harding, campaign speech, 1910; quoted in Lewis L. Gould, ed., American First Ladies. (New York: Garland, 1996), 373.none The eldest child of a prosperous Marion, Ohio, capitalist, Florence Kling learned about business from her father. When Warren Harding suffered a lengthy illness a year after their 1891 marriage, she put these skills to work by taking over his duties as owner/operator of the Marion Daily Star. When he recovered, she remained as business and circulation manager. “I went down there intending to help out for a few days,” she later recalled, “and stayed fourteen years.” Under Mrs. Harding’s skillful administration, the newspaper prospered. A mother (divorced, with a young son from a first marriage), wife, and business manager, Florence Harding was one of the first women to bring a professional identity to the role of First Lady. In 1914, Warren Harding entered the U.S. Senate race at her urging. When Harding was nominated as the Republican candidate for president in 1920, “The Duchess,” as he referred to his wife, campaigned enthusiastically for his election. “I have only one real hobby—my husband,” said Mrs. Harding. President Harding openly acknowledged the importance of his wife to his political success. During President Woodrow Wilson’s illness the White House had been closed to the public. Mrs. Harding reopened the house and gardens and presided over a crowded social calendar, graciously performing her ceremonial duties as First Lady. She talked freely, though not for quotation, with reporters and initiated the practice of providing “photo opportunities” to the White House press corps. The Hardings gave lavish garden parties to aid World War I veterans and were the first presidential couple to regularly show films after dinner to their White House guests. In her personal style and enthusiasm for automobiles and airplane adventures, Florence Kling Harding embodied the exuberant spirit of the 1920s. She also made the welfare of wounded and hospitalized veterans her personal cause, getting to know many of the patients at Walter Reed Army Hospital by name, encouraging individual veterans to contact her about problems with their care, and becoming directly involved in the affairs of the Veterans Bureau. Florence Harding continued to exercise powerful political influence over her husband during his presidency. “He does well when he listens to me and poorly when he does not,” she once confided to a White House staffer. When President Harding died suddenly in San Francisco on August 2, 1923, the scandals that ruined his administration were beginning to break; the discovery of corruption in the Veterans Bureau was particularly upsetting to the First Lady. Mrs. Harding accompanied her husband’s body back across country by train while Vice President Calvin Coolidge assumed the presidency. Long plagued by repeated bouts of kidney disease, Florence Kling Harding passed away on November 21, 1924. John Carroll: First Bishop of Baltimore: On August 15, 1790, John Carroll became the first bishop of the Roman Catholic Church in the United States. The son of a wealthy Catholic merchant, Carroll was born in Upper Marlboro, Maryland, in 17361 and had significant Revolutionary connections. His cousin, Charles Carroll, was one of the signers of the Declaration of Independence; his brother, Daniel Carroll, signed the Articles of Confederation and the United States Constitution. Wherefore it having reached our ears that in the flourishing commonwealth of the Thirteen American States many faithful Christians united in communion with the chair of Peter, in which the centre of Catholic unity is fixed…earnestly desire that a Bishop may be appointed over them…We willingly embraced this opportunity which the grace of Almighty God has afforded us to provide those distant regions with the comfort and ministry of a Catholic Bishop. A Short Account of the Establishment of the New See of Baltimore in Maryland…. Charles Plowden; London: J.P. Coghlan, 1790. p12-13. The Capital and the Bay: Narratives of Washington and the Chesapeake Bay Region, 1600 to 1925none Archbishop John Carroll. Gilbert Stuart, artist. Reproduced in Social Life in the Early Republic. By Anne Hollingsworth Wharton; Philadelphia: J.B. Lippincott, 1902. After p84. The Capital and the Bay: Narratives of Washington and the Chesapeake Bay Region, ca. 1600 to 1925 After receiving a Jesuit education at the Bohemia Academy in Cecil County, Maryland, Carroll studied abroad at the English-language Jesuit College of St. Omer in Flanders. He was ordained a Jesuit priest in 1761 and remained in Europe teaching philosophy and theology. When Pope Clement XIV dissolved the Jesuit order in 1773, Carroll returned to Maryland, serving local Catholics from a chapel built on his family’s estate at Rock Creek, near present-day Forest Glen. In 1776, he took part in a diplomatic mission to Canada on behalf of the Continental Congress. Though the effort failed to win over Canada to the American cause, Carroll gained the friendship of Benjamin Franklin, who was important to his later success. In June 1783, a small group of priests called together by Carroll met at the chapel at White Marsh (now known as Sacred Heart Church) in Bowie, Maryland, to discuss how the Catholic Church in the new United States would be governed and its property managed. The group drew up a constitution and petitioned Rome to appoint John Lewis, former superior of the Jesuits in Maryland, as the superior of the American missions. However, and in part through the influence of then-U.S. minister to France Benjamin Franklin, the Vatican appointed John Carroll instead. In 1784, John Carroll authored An address to the Roman Catholics of the United States of America. By a Catholic Clergyman. Carroll and his fellow priests were, after the American Revolution, concerned that the Catholic Church be accepted by Americans, who were primarily Protestant and had a history of distrusting Catholic allegiance to the Pope. During further meetings at White Marsh, the need emerged for the appointment of an American bishop—one who was, in the spirit of the new nation, elected in a democratic fashion by American priests. In a petition dated March 12, 1788, priests John Carroll, Robert Molyneux, and John Ashton asked that an American diocese be created and that the selection of bishop be left to its clergy. The petition was granted and on May 18, 1789, John Carroll was elected by twenty-four out of twenty-six possible votes. Baltimorewas selected as the seat of the American Catholic Church, where St. Mary’s Seminary was soon established. It was during these years that an academy (later college) at Georgetown was founded as well. Carroll traveled to England where he was consecrated a bishop at Lulworth Castle, England, home of his good friend Thomas Weld. Bishop Carroll returned to Baltimore on December 7, 1790, where he took up residence and preached his first sermon at St. Peter’s church, which served as Baltimore’s temporary cathedral until a basilica designed by architect Benjamin Henry Latrobe could be constructed. John Carroll is considered the architect of the Maryland Catholic tradition, stressing ecumenicalism and civic participation across religious lines. He was elevated to archbishop of Baltimore in 1808, overseeing Catholics in five U.S. dioceses as well as the Danish West Indies. While he had quietly restored the Jesuits to Maryland through an affiliation with the still-extant Russian community, Carroll lived to see the worldwide restoration of the order by Rome in 1814. Archbishop John Carroll died in December 1815, six years before the first permanent U.S. cathedral at Baltimore was consecrated. - With the intention of more accurately reflecting a solar year, Britain and its colonies replaced the Julian (Old Style) calendar with the Gregorian calendar in 1752, adjusting all dates forward by eleven days. At the same time, New Year’s Day was moved from March 25 to January 1. John Carroll’s January 8, 1735, birth date therefore became the New Style date of January 19, 1736. (Return to text) - The Capital and the Bay: Narratives of Washington and the Chesapeake Bay Region, 1600 to 1925 contains more information about John Carroll and the beginnings of the Catholic Church in America. A search of Catholic will find many references to Catholics in the Chesapeake region. Search Carroll to find members of the Carroll family, or refine your search to John Carroll or Daniel Carroll. Other well-known Catholic families from the Chesapeake region include Calvert, Claggett, Digges, Simms, Brent, Fenwick, and Neale, though many members of these prominent families were Anglican or Episcopalian as well. Search on these terms as well as the names of other religious faiths to learn about religion in the Chesapeake region. Learn more about religious archives throughout the state of Maryland. - Upper Marlboro, Maryland, was also the birthplace of Thomas John Claggett, the first Episcopalian Bishop in the United States. Search Upper Marlboro MD in Historic American Buildings Survey/Historic American Engineering Record/Historic American Landscapes Surveyto find images of the church Claggett founded, Trinity Episcopal Church, as well as other architectural structures in the Upper Marlboro area. - Designed by Benjamin Henry Latrobe and consecrated in 1821, the Baltimore Basilica has become a city landmark. Read about its architectural history in an Historic American Buildings Survey entryand see an early measured drawing by architect Charles Bullfinch. View additional color architectural photographs of the bascilica in the Highsmith (Carol M.) Archive. Search the Highsmith archive on Baltimore, Maryland, church, and basilica to find related houses of worship. - For a broad introduction to the role that religion played in the founding of the American colonies, visit the online exhibition Religion and the Founding of the American Republic. Highlighted are more than two hundred objects including early American books, manuscripts, letters, prints, paintings, artifacts, and music. Scroll to the middle of the America as a Religious Refuge section to find a richly illustrated history of Roman Catholics in Maryland. - Read additional Today in History features to learn more about Maryland’s history, including entries on Maryland Day, Cardinal James Gibbons, Reverdy Johnson, and Johns Hopkins. Search Today in History on Maryland for even more entries. Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: https://t.me/acenewsdaily and all wordpress and live posts and links here: https://acenewsroom.wordpress.com/ and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com
<urn:uuid:169b727b-6df5-4f81-acc1-7aa5c28efb74>
CC-MAIN-2022-49
https://peace-truth.com/otd-1790-john-carroll-became-the-first-bishop-of-the-roman-catholic-church-1860-florence-mabel-kling-dewolfe-harding-became-first-lady/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710870.69/warc/CC-MAIN-20221201221914-20221202011914-00219.warc.gz
en
0.966065
2,450
2.765625
3
Map foundations were made of reinforced concrete, half a metre thick. The map was correctly orientated North/South. The map jigsaw was then fixed to the foundations, using a dry mix. The coal mines, iron mines and quarries are represented by numbered discs on the map. The discs were drilled into the map and fixed using a cement mix. The main railway lines and some tramroads were then painted onto the map.
<urn:uuid:f38d26f8-4cd0-4122-8ed7-8c3f592734af>
CC-MAIN-2023-50
https://forestofdeanhistory.org.uk/learn-about-the-forest/how-was-it-built-at-new-fancy-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00638.warc.gz
en
0.984994
86
2.890625
3
Quality Assurance in Public HealthMarch 8, 2019 2019-03-08 6:18 Quality Assurance in Public Health Quality assurance has evolved to define quality by understanding the core activities for effective healthcare, setting benchmarks, designing surveys, performing audits and conducting analysis or supervision visits in private companies or hospitals, government organisations and public health facilities. Quality assurance involves detection and prevention of manufacturing defects in products and delivery of effective solutions or services to customers. Quality management is focused on providing confidence and maintenance of desired quality of product or services by means of checking every stage of production and delivery. Quality assurance encompasses the processes and procedures that systematically monitor different aspects of the products or services provided at the facility. Quality assurance plays a vitalrolein ensuring the quality and acceptability of products or services by planning, directing, coordinating or formulatingqualitycontrol programs and policies. This improves efficiency and profitability of an organization by reducing waste. The Quality Assurance framework includes determination of adequate technical input and output requirements; certification and rating of suppliers; testing of procured material; conformance of established quality, safety, performance and reliability standards; proper storage and issue of materials; quality audit of processes and products; evaluation for establishing corrective response; audit of the final output for technical, reliability, maintainability and performance conformance. Detection and correction of variances or problems through audits are established within standard requirements. Impact on Public health Quality assurance systems are commonplace among hospitals, public health agencies, healthcare companies and organisations. This system is developed and implemented with a comprehensive quality assurance framework for public health programs and facilities by defining standards for patient care and service delivery along with continuous assessment and improving quality in compliance with set standards. Role of quality assurance in public health involves managing policy or decision-making and health promotion inputs; evaluation and assessment of research and delivery of childcare and other healthcare services; fostering multi-faceted collaboration in environmental health services; lead responsibility in development and screening services; training and staff development in public health medicine and communicable diseases.Enumeration and avoidance of discrepancies to meet the needs of every department related to delivery of public health services is possible by quality assurance. Characterizing subsequent changes inserted into the system ensure compliance with the mission and service delivery in public health setting. Quality improvement in public health involves defined and deliberate improvement processes focused on community responsive and population health development activities. It is an ongoing and continuous effort to ensure measurable improvements in effectiveness, efficiency, performance, accountability and other indicators of quality in products, services or processes to achieve improvement in equity and health of the community. These improvements in turn are useful to improve effectiveness, efficiency and performance of professionals and team members in organizations. Quality improvement tools, resources and services solve the existing and emerging public health issues by providing technical assistance to coach public health professionals to learn and use quality improvement techniques. Quality improvement in public health can also help in more effective use of resources that improve service delivery, customer satisfaction and meet national public health standards. Online Courses in Public Health at JLI James Lind Institute (JLI) provides online programs in public health like Executive Certificate in Public health leadership & Research and Advance PG Diploma in Global Health Management & Policy for improving quality assurance on public health. For more information please visit: www.jliedu.com
<urn:uuid:e0861bdf-9443-4280-ab4a-ed5ee8252603>
CC-MAIN-2023-06
https://jliedu.ch/blog/quality-assurance-public-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499470.19/warc/CC-MAIN-20230128023233-20230128053233-00623.warc.gz
en
0.933584
670
3.140625
3
Supernova Imposter Goes Supernova In a galaxy far, far away, a massive star suffered a nasty double whammy. On Oct. 20, 2004, Japanese amateur astronomer Koichi Itagaki saw the star let loose an outburst so bright that it was initially mistaken for a supernova. The star survived, but for only two years. On Oct. 11, 2006, professional and amateur astronomers witnessed the star actually blowing itself to smithereens as Supernova 2006jc. Image right: Swift Ultraviolet/Optical Telescope image of Supernova 2006jc in the galaxy UGC 4904 in three filters. Click image to enlarge. Credit: NASA/Swift/S. Immler "We have never observed a stellar outburst and then later seen the star explode," says University of California at Berkeley astronomer Ryan Foley. His group studied the event with ground-based telescopes, including the 10-meter (32.8-foot) Keck telescope in Hawaii. Narrow helium spectral lines showed that the supernova’s blast wave ran into a slow-moving shell of material, presumably the progenitor’s upper layers ejected just two years earlier. If the spectral lines had been caused by the supernova’s fast-moving blast wave, the lines would have been much broader. Another group, led by Stefan Immler of NASA’s Goddard Space Flight Center, Greenbelt, Md., monitored SN 2006jc with NASA’s Swift satellite and Chandra X-ray Observatory. By observing how the supernova brightened in X-rays, a result of the blast wave slamming into the outburst ejecta, they could measure the amount of gas blown off in the 2004 outburst: about 0.01 solar mass. "The beautiful aspect of SN 2006jc is that everything makes sense," says Immler. "Even though our two teams observed the supernova with different instruments and at different wavelengths, we have reached identical conclusions about what happened." Image left: Swift X-ray Telescope image of Supernova 2006jc. Click image to enlarge. Credit: NASA/Swift/S. Immler "This event was a complete surprise," adds Alex Filippenko, leader of the University of California at Berkeley/Keck supernova group, and a coauthor on both studies. "It opens up a fascinating new window on how some kinds of stars die." All the observations suggest that the supernova’s blast wave took only a few hours to reach the shell of material ejected two years earlier, which did not have time to drift very far from the star. As the wave smashed into the ejecta, it heated the gas to millions of degrees, hot enough to emit copious X-rays. NASA’s Swift satellite saw the supernova continue to brighten in X-rays for 100 days, something that has never been seen before in a supernova. All supernovae previously observed in X-rays have started off bright and then quickly faded to invisibility. "You don’t need a lot of mass in the ejecta to produce a lot of X-rays," notes Immler. Swift’s ability to monitor the supernova’s X-ray rise and decline over six months was crucial to his team’s mass determination. But he adds that Chandra’s sharp resolution enabled his group to resolve the supernova from a bright X-ray source that appears in the field of view of Swift’s X-ray Telescope. Image right: Chandra X-ray Observatory image of Supernova 2006jc. Click image to enlarge. Credit: NASA/CXC/S. Immler "We could not have made this measurement without Chandra," says Immler, who is submitting his team’s paper to the Astrophysical Journal. "The synergy between Swift's fast response and its ability to observe a supernova every day for a long period, and Chandra's high spatial resolution, is leading to a lot of interesting results." Foley and his colleagues, whose paper appears in the March 10 Astrophysical Journal Letters, propose that the star recently transitioned from a Luminous Blue Variable (LBV) star to a Wolf-Rayet star. An LBV is a massive star in a brief but unstable phase of stellar evolution. Similar to the 2004 eruption, LBVs are prone to blow off large amounts of mass in outbursts so extreme that they are frequently mistaken for supernovae, events dubbed "supernova impostors." Wolf-Rayet stars are hot, highly evolved stars that have shed their outer envelopes. Most astronomers did not expect that a massive star would explode so soon after a major outburst, or that a Wolf-Rayet star would produce such a luminous eruption, so SN 2006jc represents a challenge for theorists. "It disrupts our current model of stellar evolution," says Foley. "We really don't know what caused this star to have such a large eruption so soon before it went supernova." "SN 2006jc provides us with an important clue that LBV-style eruptions may be related to the deaths of massive stars, perhaps more closely than we used to think," adds coauthor Nathan Smith, also of the University of California at Berkeley. "The fact that we have no well-established theory for what actually causes these outbursts is the elephant in the living room that nobody is talking about." SN 2006jc occurred in galaxy UGC 4904, located 77 million light-years from Earth in the constellation Lynx. The supernova explosion, a peculiar variant of a Type Ib, was first sighted by Itagaki, American amateur astronomer Tim Puckett, and Italian amateur Roberto Gorelli. + NASA Swift mission site + Chandra X-ray Observatory site Goddard Space Flight Center
<urn:uuid:d124787c-9de5-469e-aa53-f4726552ebb7>
CC-MAIN-2014-10
http://www.nasa.gov/centers/goddard/news/topstory/2007/supernova_imposter.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010706290/warc/CC-MAIN-20140305091146-00052-ip-10-183-142-35.ec2.internal.warc.gz
en
0.944542
1,197
2.96875
3
by Johnathan Thayer Senior Archivist, The Seamen's Church Institute President Trump’s Executive Order (E.O.) of January 27, 2017 issued a suspension of entry into the United States for citizens of Syria, Yemen, Sudan, Somalia, Iraq, Iran, and Libya. Recently, the Director of the Seamen’s Church Institute’s Center for Seafarers’ Rights, Douglas B. Stevenson Esq., has confirmed with Customs and Border Protection (CBP) that seafarers from the seven banned countries will not be allowed shore leave, nor be signed off their vessels on D visas. Such measures that bar foreign seafarers from entering U.S. ports have long historical precedents. For context, we can turn to the Immigration Acts of 1917 and 1924, and the dragnet “alien seamen” raids of 1931. During and following World War I, increasingly restrictive immigration policies were fueled by racism, economic concerns over foreign labor competition, and widespread fears of radical politics infiltrating the U.S from Southern and Eastern European nations. The Johnson-Reed Act of 1924, in addition to excluding immigration from most of the Asian continent entirely, established quotas for all immigrants based on a hierarchy of selective inclusion determined by nationality and ethnicity. Whereas the typical entry process for non-citizen migrants took place at official inspection centers like Ellis Island in New York and Angel Island in San Francisco, merchant seamen were subject to inspections on board their vessels, but only to check for infectious diseases and other mental or physical ailments. In all other respects, the burden of proof for the legitimacy of a ship’s crew list resided fully with an appointed ship’s officer. Given the porous state of inspections involving merchant vessels and seamen, it is hardly surprising that in 1924 alone the U.S. Labor Secretary estimated that 38,000 merchant seamen, or those impersonating merchant seamen, had deserted their vessels in American ports. While shipping company officials maintained that as much as seventy-five percent of these desertions involved men who were intent on reshipping out on different vessels, as was within their rights to shore leave as guaranteed under the 1915 Seamen’s Act, immigration officials and Congressmen on the Committee on Immigration and Naturalization were far more suspicious. Merchant ships and the impersonation of seamen remained a viable and fluid channel for entering the country while circumventing much of the official encounter with the state required of other non-seaman immigrants until 1931. In March of that year, responding to a Supreme Court ruling that had granted wide license for the mass deportation of alien seamen, the Labor Department issued a decree calling for local agencies to prepare for the deportation of up to 100,000 merchant seamen who were believed to have deserted in American ports and who were supposedly residing in the country illegally. Immigration raids in NYC In New York, the Bureau of Criminal Alien Investigation at the New York Police Department conducted a warrantless raid at the headquarters of the Seamen’s Church Institute (SCI), located in the heart of the City’s Lower Manhattan port district. In 1931, 25 South Street was the declared permanent residence of more than 5,000 merchant seamen who were out of work and forced to remain in New York City due to the lack of employment opportunities in a severely slumping shipping industry. Seamen who claimed 25 South Street as their home included men who paid nominal fees to rent out one of the more than five hundred dormitory-style rooms houses within the building’s thirteen floors, or those who had taken out post office boxes at SCI’s thriving postal office. This cluster of merchant seamen—many of them foreign nationals, whether naturalized or residing in the country illegally—represented a prime target for immigration officials under orders to clean up the nation’s waterfronts. The actual raid took place on the morning of February 3, 1931, with 102 men detained at 25 South Street and sent for processing at Ellis Island. A similar raid had taken place in Hoboken, NJ just days earlier on January 27, in which some 300 seamen, mostly German, were detained and interrogated. 63 men were sent to Ellis Island facing deportation charges. Most of the detainees faced similar charges of illegally gaining entry into the U.S. via merchant vessels. Similar raids continued to occur in New York City during the early months of 1931, including at a ball held at the Finnish Workers’ Education Association, at which 1,000 men and women were detained without warrant. It did not take long before public backlash mounted against this proliferation of dragnet-style raids in which thousands of men and women were illegally detained under vague suspicion of having violated terms of immigration legislation which may or may not apply to them. The American Civil Liberties Union (ACLU) led complaints against these “alien drives,” protesting against the “high-handed and unlawful” tactics of immigration agents. By April 1931, the Labor Department announced the end of all raids targeting alien seamen in the nation’s port cities. Public opinion had temporarily won the day. Further protections would come in 1952, with the creation of D-1 visas to protect foreign seafarers’ right to shore leave while in U.S. ports, and with the 1965 Immigration Act, which outlawed discrimination of immigrants based on national origin. Despite lingering post World War II anxieties over “alien seamen,” and other threats to seafarers’ access to shore leave as documented by CSR’s annual Shore Leave Surveys, the days of ethnic quotas and dragnet raids along the waterfront seemed to be well behind us. Suddenly, this progressive timeline of protections for foreign seafarers in U.S. ports no longer seems so stable. The Seamen’s Church Institute will be monitoring this situation closely, with the long arc of historical perspective to guide us. This article contains excerpts from Johnathan Thayer, “Deserters, Stowaways, and Mala Fide Seamen: Merchant Seamen and the Shaping of U.S. Immigration Policy, 1917-1936,” chapter four of Sailortowns, Merchant Seamen, and the Shaping of U.S. Citizenship, 1843-1945
<urn:uuid:ba5e6c51-1428-4a54-b3de-220a41d09309>
CC-MAIN-2018-09
http://blogs.seamenschurch.org/article/us-immigration-policys-impact-on-seafarers-a-brief-history
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812306.16/warc/CC-MAIN-20180219012716-20180219032716-00398.warc.gz
en
0.964511
1,293
2.625
3
Suggested Activities for kids: fun and learning at home 10 Ways To Raise A Child With High Emotional Intelligence. you like to have a child who can deal with his positive and negative emotions in a healthy and constructive manner, who has good social skills and is an understanding and empathic listener? Then you need to raise a child with a high EQ or Emotional Intelligence, more commonly known as EQ, is the awareness and ability to manage one's emotions in a healthy and For many parents, figuring out how to deal appropriately with our children's feelings is difficult. When we are faced with an angry toddler, a frightened child or a screaming infant, few of us know what to do. To complicate matters, some of us grew up in families where feelings were suppressed and open, honest dialogue was So how can you then teach your children to become emotionally literate? Here are 10 strategies to help you to do just that. 1. Respect your child's feelings. You need to realize that all your child's feelings are important, regardless of how difficult they are to deal with. 2. Label your child's feelings. Look for opportunities to teach your child the appropriate names for the feelings that he is 3. Share your own feelings with your children. Be careful not to use your children as confidantes for difficult and conflicting emotions that you are experiencing, but at the same time let them see that you are human and have feelings too. "I feel really sad that Aunt Suzie passed away. I miss her very much and that's why I'm crying." 4. Become a role model for trying to deal with feelings in an appropriate way. If you rant and rave when you are angry then your children will learn to do the same when they are angry. 5. Acknowledge your child's feelings. Stay in close proximity to your child as he shares his feelings and offer to touch or hold him if appropriate. 6. Listen to your child's feelings and reflect them back to him. "You sound really sad. Do you want to talk about it?" or "You seem delighted with your new kitten." 7. Allow your child time to work through his feelings. Resist the temptation to rush in and fix whatever is ailing your child. This helps to build emotional resilience and your child will soon realize that negative emotions do fade and that he or she will feel better. 8. Always prioritize safety and set limits if necessary. Children need to be kept safe even in the midst of an emotional meltdown. You may need to firmly restrain your toddler who is throwing a tantrum or perhaps even move him to a safer 9. All feelings are okay, but all behaviors are not. Children will often express strong negative emotions through inappropriate behavior, for example biting the new baby or breaking things when angry. This is when you need to step in and intervene. Stop the inappropriate behavior and suggest a more suitable outlet. "If you're really angry and want to throw something, you can throw these socks at the wall." 10. Get the help and support you need to deal with your own feelings in an appropriate way. In order for you to be a good role model for your child, you need to be able to express your own feelings in an appropriate way. This could be through writing in a journal, through talking to a friend or even a professional counselor....whatever works for you. Emotional Intelligence is an important part of your child's development and the time and effort you spend helping your child to raise his EQ will pay off. Your child will be happier and more prepared to face the challenges that life will bring.
<urn:uuid:048a47e7-73f8-44e0-806b-59f108adde75>
CC-MAIN-2016-44
http://edutainingkids.com/articles/kidsemotionalintelligencequotient.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00131-ip-10-171-6-4.ec2.internal.warc.gz
en
0.953064
798
2.890625
3
Please click to listen to the WFIT Minute: Based on Research by Medical & Psychology researchers. Psychology Science Minute written by Kyle Piecora, M.S. Autism disorder diagnoses include individuals with symptoms such as impaired social interaction, repetitive behaviors, and delayed development. Psychologists have developed measures to diagnose early childhood autism and collaborate with medical researchers. Autism is on the rise. Many people blamed childhood vaccinations containing the mercury-based preservative thimerosal as the cause. However, numerous studies in the Journals of the American Medical and Pediatric Associations, demonstrate that mercury found in these shots are not the culprits. One study, following babies born in Denmark, found that the risk of autism and other related disorders did not differ significantly between those who were vaccinated with shots containing and not containing mercury. Rates of Autism continue to rise despite thimerosal being removed from vaccinations in 2001. Unfortunately, a research paper using questionable science that was later retracted by a prestigious journal linked autism to vaccines. The erroneous link caused many parents to not vaccinate their children or treat their autistic children with unproven and possibly dangerous treatments. Science eventually corrected itself but in the meantime, consumers were led astray. Every effort must go to inform parents of the many studies showing no link between vaccines and autism and to the research demonstrating children with autism who receive early intervention can make tremendous gains. Hviid, A., Stellfield, M., Wohlfahrt, J., & Melbye, M. (2003). Association between thimerosal-containing vaccine and autism. Journal of the American Medical Association, 290(13), p. 1763-1766. Madsen, K. M., Lauritsen, M. B., Pedersen, C. B., Thorsen, P., Plesner, A., Andersen, P. H., & Mortensen, P. B. (2003). Thimerosal and the occurrence of autism: negative ecological evidence from Danish population-based data. Pediatrics, 112(3), p. 604-606.
<urn:uuid:c9416e05-ff60-44d5-ae2a-4368bd0bd328>
CC-MAIN-2015-35
http://blogs.fit.edu/blog/campus/psychology/53-vaccines-and-autism/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065375.30/warc/CC-MAIN-20150827025425-00288-ip-10-171-96-226.ec2.internal.warc.gz
en
0.935132
424
3.21875
3
As the kids, teens and adults are heading back to school in September, it seems appropriate to talk about organizing kid’s rooms. But before we can do organizing, we should talk about the room’s atmosphere and environment. For kids (or anyone) to be able to get work done in their bedroom, there should be an inviting atmosphere, a way to remove distractions and the ability to focus. Even if the kids don’t end up doing their homework and projects in their room, the work environment is essential wherever they are working. If the bedroom, complete with toys and comfy bed, is the location where your kids will be doing their homework, there are 3 essential areas to organize. Shelving: Every bedroom should have some form of shelving to store books, toys and art projects on. Getting a really tall bookshelf, or putting up tall shelves is ok, even with younger kids, because the art projects etc can go up higher and toys and books be lower where they can reach them. Having extra, unused shelving is always a good idea for future use! Under bed storage: A great place to hide away clothes or toys is under the bed. Purchase bed risers that many college students use for your home and raise your kid’s beds so you can store boxes underneath and easily access them. If the toys are put away so that they aren’t visible to kids, the kids will be more likely to focus on their homework and be less distracted by the toys strewn about. Desk: A desk is a priority for doing homework. Not only do they need a desk, it should have the necessary tools in it. Pens, pencils, erasers, colored pencils, crayons, markers, ruler, glue, glue stick, lined paper, coloring/drawing paper, calculator (as appropriate), protractor, compass, dictionary, and anything else your children (or you!) need to do homework and projects. The top of the desk should be clean for ease of doing work, and the tools listed above should each have a home in the desk drawers, cubbys or boxes by the desk (depending on the type of desk). A clean, organized room will go a long way to encourage creativity and attentiveness while doing homework. Don’t know where to start? Working with an organizer is easy and fun!
<urn:uuid:1a0030eb-487c-4253-8104-d28cd8ff0f9c>
CC-MAIN-2019-39
https://ldlifetransformation.wordpress.com/2010/08/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573801.14/warc/CC-MAIN-20190920005656-20190920031656-00473.warc.gz
en
0.956949
490
2.5625
3
Write a MATLAB function (upper Triangle) using the functions you previously created to convert a matrix to upper triangular form. Start with row 1, column1. Find the row that has the largest absolute value in the current column (you have a function that will do that). If the row is not your working row, swap rows (you have a function that will do that). Calculate a factor that you can use to form a linear combination with your working row to zero the value in the column below your working row. Use that factor and the linear combination of rows to zero the first column below your working row (you have a function that will do that). Continue down that column until you reach the last row. All the values in your working column below your working row should be zero. Move to the next diagonal position (down 1 row over 1 column) and repeat the process. Continue the process moving down the diagonal until you reach the last row. You matrix should be in upper triangular form. Your function should be written to handle matrices of any size. Test your function with matrices of different sizes for which you know the solution to ensure that your function works correctly. Use variable names that relate to their function and include comments that explain your program logic. This question belongs to MATLAB software and discusses about Upper Triangle MATLAB function for a given matrix data. Download Full Solution If you are here for the first time, you can request for a discount coupon, which can knock off upto 20% of the quoted price on any service.
<urn:uuid:90536e3f-242b-43cf-b24c-29b019df8665>
CC-MAIN-2018-51
https://www.helpwithassignment.com/Solution-Library/matlab-functions-%C3%A2%E2%82%AC%E2%80%9C-upper-triangle-form
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829997.74/warc/CC-MAIN-20181218225003-20181219011003-00391.warc.gz
en
0.891997
316
2.9375
3
Polycystic kidney disease (PKD) is one of the most common, life threatening genetic kidney diseases affecting thousands in America and millions worldwide. PKD causes fluid-filled cysts to grow on both kidneys, eventually leading to kidney failure. The size of a normal kidney is a human fist, but PKD kidneys can grow as large as the size of a football and weigh up to 30 pounds. Currently there is no treatment or cure for PKD. But there is HOPE. The PKD Foundation's main focus is conducting research to move us closer to finding treatments and a cure for polycystic kidney disease. Since 1982, more than $31 million has been invested in more than 550 research, clinical and scientific grants, fellowships, scientific meetings and educational programs. Your support of the 2014 Liberty Mutual Invitational Memphis Driving Home a Cure will help us continue to advance these important initiatives, and bring hope to those who suffer from PKD.
<urn:uuid:241b02e0-e57b-4b5f-8d4d-3c49db699323>
CC-MAIN-2014-10
http://www.pkdcure.org/events/memphis-driving-home-a-cure/about-pkd
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999675924/warc/CC-MAIN-20140305060755-00026-ip-10-183-142-35.ec2.internal.warc.gz
en
0.953163
193
2.5625
3
Learn managerial economics monopolistic with free interactive flashcards choose from 500 different sets of managerial economics monopolistic flashcards on quizlet. Managerial economists have studied monopolistic competition to understand how to maximize profit in that economic model because a monopolistically competitive firm produces a differentiated good, short-run profit maximization requires the firm to determine both the profit-maximizing quantity and the good’s price. Contrast between monopolistic competition and oligopoly in managerial economics - contrast between monopolistic competition and oligopoly in managerial economics courses with reference manuals and examples. Managerial economics unit 3: perfect competition, monopoly and monopolistic competition rudolf winter-ebmer johannes kepler university linz winter term 2015. In monopolistic competition, a firm takes the prices charged by its rivals as given and ignores the impact of its own prices on the prices of other firms in the presence of coercive government, monopolistic competition will fall into government-granted monopoly. Monopolistic competition the degree of competition in a monopolistic market is less than that in a market with perfect competition but more than that in an oligopoly and ofcourse a monopoly scope of managerial economics the degree of competition in a monopolistic market is less than that in a market with perfect competition but more. How to use flashcards to start, choose whether you'd like to see a term and type in the definition, or see a definition and type in the term fill in your response and press flip for answer to compare what you have typed. Monopolistic competition is a realistic description of competition in a wide variety of industries as in perfectly competitive markets, a large number of competitors make independent decisions in monopolistically competitive markets.
<urn:uuid:0c22a4ba-7034-4f77-87ca-18975baf88bb>
CC-MAIN-2018-43
http://zetermpaperkrvr.frieslandvakantiebungalow.info/monopolistic-competition-managerial-economics.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509958.44/warc/CC-MAIN-20181015225726-20181016011226-00084.warc.gz
en
0.930582
347
3.609375
4
by Ted Altar 1. "I REQUIRE MERCY, NOT SACRIFICE" (Matthew 9:13 & 12:7): This is a significant message when we remember that in the context in which this was said meat eating was commonly considered part of these sacrifices. Sacrificial offerings often entailed meat consumption and a strict reading of Leviticus 17: implies that, indeed, all meat consumption necessitated a sacrifice. Also, the noted confrontation of Jesus in the Temple suggests that he was not at all pleased by the desecration of the Temple by the money changers AND by "those who were selling oxen and sheep and pigeons" (John 2:14-15) since these animals were being sold for sacrifice before being eaten. 2. NO UNEQUIVOCAL BIBLICAL REFERENCE TO CHRIST EATING OR BUYING EAT: Consider the verse where it is said that Jesus' disciples "were gone away unto the city to buy meat" (John 4:8). This translation from the King James version has been misunderstood as meaning literally "meat". In fact, the Greek word for "meat" from which the James translation based its choice for this word, simply meant nutrition in the generic sense. Hence, the Revised Standard Version now simply translates this same passage as "his disciples had gone away into the city to Regenstein notes that nowhere in the New Testament is Jesus depicted as eating meat and "if the Last Supper was a Passover meal -- as many believe -- there is, interestingly, no mention of the traditional lamb dish". 3. DID CHRIST EAT AT LEAST EAT FISH?(LUKE 24:43): Note that on the two occasions where he is said to have eaten fish, these were *after* his death and resurrection. Also, we should maybe keep in mind that fish was a well known mystical symbol among these early Christians. The Greek word for fish (Ichthys) was used as an acronym whose initials in Greek stood for "Jesus Christ, Son of God, Savior". Given how the early Christians employed the term, there is therefore good historical evidence for the argument that all of the "fish stories" that managed to get into the gospels were intended to be taken symbolically rather than literally. 4. BIBLICAL BREAKS AND CONTRADICTIONS: We should not forget that the Bible is not complete and its many inconsistencies require thoughtful interpretation. For instance, we have the contradiction between Genesis 1:29-30 with Genesis 9:2-3. Some scholars interpret the first prescription for vegetarianism as the preferred diet, and suggest that it was only after God became grievously disappointed with human sin and flooded the earth did the second provision become permitted, and not without qualification (and maybe only as an expedient for the situation). To take another example, the New Testament makes repeated attacks on meat offered to pagan idols (Acts 15:20; Revelation 2:14), but Paul gives assurances that eating such flesh is all right if no one is offended (Corinthians 10:14-33). Paul, then, would seem to be 5. EXAMPLES OF EARLY CHRISTIANS: Not a few Christian scholars have concluded vegetarianism to be the more consistent ethic with respect to the spirit of Christ's teachings. For example, we have the Ebionites, Athanasius, and Arius. Of the early church fathers we have Clement of Alexandria, Origen, Tertullian, Heronymus, Boniface, St. Jerome, and John Chrysostom. Clement wrote, "It is far better to be happy than to have your bodies act as graveyards for animals. Accordingly, the apostle Matthew partook of seeds, nuts and vegetables, without flesh". One of the earliest Christian documents is the `Clementine Homiles', a second-century work purportedly based on the teachings of St. Peter. Homily XII states, "The unnatural eating of flesh meats is as polluting as the heathen worship of devils, with its sacrifices and its impure feasts, through participation in it a man becomes a fellow eater with devils". Many of the monasteries both in ancient times to the present practiced vegetarianism. For instance, Basilius the Great's order, Boniface's order, Trappists monks, etc. Also, we have the examples provided by the stories around some saints like Hubertus, Aegidius and Francis 6. INDIRECT HISTORICAL EVIDENCE: Knowledge about how the Essenes, the Nazoreans and Ebionites lived suggests that Christ was probably a vegetarian. The Essences were Jews who were remarkably similar to the early Christians as evinced in their deemphasis upon property and wealth, their communalism and in their rejection of animal sacrifices. The first Christians were known as the Nazoreans (not to be confused with Nazarenes), and the Ebionites were a direct offshoot from them. All three groups were vegetarian which is suggestive of the central role such a practice once played in Early Christianity. Paul's need to constantly deal with these vegetarians is also evidence of how prevalent they were and not a few fellow Christians, it would seem, took issue with Paul. Paul, if he is consistent with his words, would have been vegetarian (Corinthians 8:13), notwithstanding his opposition to the Ebionites. According to Clement of Alexandria, Matthew was a vegetarian. Clementine `Homiles' and `Recognitions' claim that Peter was also a vegetarian. Both Hegisuppus and Augustin testify that the first head of the church in Jerusalem after the death of Christ, namely Christ's brother JAMES THE JUST, was a vegetarian and raised as one! If Jesus's parents raised James as vegetarian then it would be likely that Jesus was also so raised. Given the above points, it is reasonable to believe that vegetarianism would be consistent with, if not mandated by, the spirit of early Christianity, a spirit that advocated kindness, mercy, non-violence and showed disdain towards wealth and extravagance. Meat eating would hardly have been considered the way of the humility, non-extravagance and love for all of God's creation. Hence, the orthodox early church father, Christian Hieronymous, could not but be compelled to "the eating of animal meat was unknown up to the big flood, but since the flood they have pushed the strings and stinking juices of animal meat into our mouths, just as they threw quails in front of the grumbling sensual people in the desert. Jesus Christ, who appeared when the time had been fulfilled, has again joined the end with the beginning, so that it is no longer allowed for us to eat animal meat" Maybe an even more important question than that of whether or not Christ was a vegetarian, was why Christianity later abandoned its vegetarian roots. Steven Rosen in his book, FOOD FOR THE SPIRIT, 1987, The early Christian fathers adhered to a meatless regime . . . many early Christian groups supported the meatless way of life. In fact, the writings of the early Church indicate that meat eating was not officially allowed until the 4th century, when the Emperor Constantine decided that his version of Christianity would be the version for everyone. A meat eating interpretation of the Bible became the official creed of the Roman Empire, and vegetarian Christians had to practice in secret or risk being put to death for heresy. It is said that Constantine used to pour molten lead down the their throats if they were captured. Ironic indeed that pagan Rome here would have this longstanding influence upon Christianity. In any case, I think we can all be thankful that it is a lot easier today to be a vegetarian. The occasional rudeness and social disapproval a vegetarian must tolerate is a pretty small inconvenience in comparison to Constantine's way of dealing with vegetarians. To cite another sad example: in southern France a group of Albigensian vegetarians (a Cartharist religious group) were put to death by hanging in 1052 because they refused to kill a chicken!
<urn:uuid:fa692152-084b-40e8-b28f-f908b5f72486>
CC-MAIN-2017-17
http://powerattunements.com/article138.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122726.55/warc/CC-MAIN-20170423031202-00542-ip-10-145-167-34.ec2.internal.warc.gz
en
0.955218
1,853
2.71875
3
The nature of Evolution: Assortment, Inheritance and History “I am confident that organic and natural variety continues to be the leading but not exclusive usually means of modification.” ? Charles Darwin, The Origin of Species Why do current humans show diverse functions than our extinct primate ancestors similar to the Neanderthal? And how come some species thrive and evolve, why other folks are forced to your brink of extinction? Evolution can be described as challenging process that manifests in excess of time. Darwinian all-natural collection and Mendelian inheritance are key element elements to our being familiar with of it. The existence of evolution is evidenced by ancient fossil records and is particularly observable in trendy moments too, as an example, from the evolution of antibiotic resistance of microorganisms. Evolution could be the mechanism of adaptation of the species greater than time so as to survive and reproduce. What roles do choice and inheritance perform? Natural range sales opportunities to predominance of selected characteristics through time Charles Darwin is without doubt one of the founding fathers of contemporary evolutionary idea. His highly-respected homework summarized in ‘The Origin of Species’6, postulates a wrestle for survival and natural and organic variety, where by the fittest organisms endure additionally, the weakest die. The level of competition for constrained resources and sexual replica under affect of ecological forces build natural choice pressures, where the foremost adaptable species, often referred to as ‘the fittest’, will develop health and fitness positive aspects more than the mal-adapted and outcompete them by those suggests. The health of an organism could very well be described from the genuine amount of offspring an organism contributes, with regards to the number of offspring it really is physically disposed to lead.1-4 An often-cited example tends to be that from the evolution of long-necked Giraffes from shorter-necked ancestors. As giraffes are feeding in the leaves of trees by stretching their necks to achieve them, its apparent that an extended neck might be valuable within the wrestle of survival. But how can these variations arise to start with? It’s thru mutations that variability is launched into a gene pool. Genetic mutations can change the genotype and phenotype of the trait like the duration of the neck of the giraffe. Mutations really do not arise as being a reaction to organic selection, but are somewhat a continual event.” All-natural selection is considered the editor, as opposed to the composer, from the genetic concept.”5 Although not all mutations end up in evolution. Characteristics like a pretty lengthened neck are usually handed on from mother or father to offspring in excess of time, generating a gradual evolution on the neck size. These that come about to become effective for survival and so are being chosen on, are handed on and will persist from ancestors to present day descendants of the species. As Darwin has noticed: “But if variants effective to any natural and organic really being do arise, assuredly persons consequently characterized can have the very best chance of becoming preserved within the battle for life; and through the potent basic principle of inheritance, they will yield offspring similarly characterised. This principle of preservation, I have referred to as for the sake of brevitiy, natural and organic Collection.” 6 Thus, only when selection tension is placed on individuals traits, do genotype and phenotype variants bring about evolution and predominance of a number of traits.seven It is a sampling process influenced by discrepancies in fitness-and mortality-consequences of those features. Genetic variants may develop thru random genetic drifts (random sampling) and sexual range. But how will these mutations result in evolution? The genetic variation should be hereditary.eight, 9 Heredity of genetic characteristics and populace genetics Inheritance of genetic variation is an additional critical point typically acknowledged as being a driver of evolutionary forces. To be able for evolution to get destination, there has to be genetic variation on the personal, upon which pure (and sexual) variety will act. Contemporary evolutionary theory is definitely the union of two chief thought programs of Darwinian assortment and Mendelian genetics. 8 The discoveries of Gregory Mendel in molecular genetics have largely displaced the greater historic product of blended inheritance. As reported by this model, the filial generation represents a set signify belonging to the parents’ genetic material. Yet, with modern day realizing, this would render evolution implausible, as http://courseworkservice.com/buy-coursework the obligatory genetic variation could well be missing. Mendelian genetics, in distinction, proved that the filial generation preserves genetic variability thru option alleles that will be inherited, without doubt one of which will be dominant around one other. As a result, offspring keep a established of genetic alternatives in the peculiarities belonging to the dad and mom inside the method of alleles. The influence of Mendelian genetics to the evolution over a inhabitants degree is expressed throughout the Hardy-Weinberg Principle’, dependant upon the perform of Wilhelm Weinberg and Gotfrey Hardy. eight Two alleles on a locus stand for two options to a gene. The Hardy-Weinberg equation is: P^2 +2qp + q^2 = 1 P^2 and q^2 are the frequencies of your AA and aa genotype from alleles A including a of a gene, respectively as will need to equal one or 100%. P is considered the frequency within the dominant, q for the recessive allele. They decided a number of components as vital motorists to impact allele frequencies in just the gene pool of the population. The manifestation of evolutionary forces could very well be expressed over a molecular level like a transform of allele frequencies in just a gene pool of a population over time. These issues are genetic drift, mutation, migration and variety. The theory assumes that allele frequencies are and continue being at equilibrium in an infinitely big populace within the absence of these forces and because of the assumption of random mating. eight Allele frequencies inside of a gene pool are inherently stable, but improve over time as a consequence of the evolutionary things involved around the equation. The gradual accumulation of these on molecular level bring on evolution, observable as speciation events and evolution of species (genotype, phenotype). Modern evolutionary idea comes with completely different mechanisms wherein gene and genotype frequency are impacted and exactly how evolution usually takes put greater than time. The two primary motorists of evolution are organic and natural choice and also the hereditary nature of genetic mutations that influence health. These figure out the manifestation of allele frequencies of certain traits in a inhabitants through time, thus the species evolves. We can easily notice the nature of evolution each and every day, when noticing similarities between mothers and fathers and offspring likewise as siblings, or by the variance of recent humans from our primate ancestors.
<urn:uuid:99a5a7ab-28fb-475d-b2c7-73291f2861bd>
CC-MAIN-2018-05
http://www.healthdietsfood.com/the-nature-of-evolution-assortment-inheritance-and-6/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890514.66/warc/CC-MAIN-20180121100252-20180121120252-00592.warc.gz
en
0.934098
1,389
3.140625
3
When an external force is applied on a body, internal resistance is developed within the body to balance the effect of externally applied forces. The resistive force per unit area is called as stress. These internal forces are vectorial in nature and maintain an equilibrium with externally applied forces. It is particularly significant to determine the intensity of these forces, called stress on any arbitrarily selected section (oriented in a particular direction to fit the special requirement), as resistance to deformation and capacity of material to resist forces depend on these intensities. In general these stresses acting on infinitesimal areas of any section vary from point to point. In general, they are inclined with respect to the sectional plane. But, in engineering practice it is customary to resolve the force perpendicular and parallel to the section investigated. Email Based Homework Assignment Help in Simple Stresses Transtutors is the best place to get answers to all your doubts regarding simple stresses with examples .You can submit your school, college or university level homework or assignment to us and we will make sure that you get the answers you need which are timely and also cost effective. Our tutors are available round the clock to help you out in any way with mechanical engineering. Live Online Tutor Help for Simple Stresses Transtutors has a vast panel of experienced mechanical engineering tutors who specialize in simple stresses and can explain the different concepts to you effectively. You can also interact directly with our mechanical engineering tutors for a one to one session and get answers to all your problems in your school, college or university level Mechanical engineering. Our tutors will make sure that you achieve the highest grades for your mechanical engineering assignments. We will make sure that you get the best help possible for exams such as the AP, AS, A level, GCSE, IGCSE, IB, Round Square etc
<urn:uuid:93008f1b-51d9-4e9b-a325-3441470398cf>
CC-MAIN-2016-50
http://www.transtutors.com/homework-help/mechanical-engineering/simple-stresses-and-strain/simple-stress.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698544672.33/warc/CC-MAIN-20161202170904-00451-ip-10-31-129-80.ec2.internal.warc.gz
en
0.938221
376
3.34375
3
Posted 2 years ago Around 1853, after two centuries of a policy of national seclusion under which no foreigner could enter Japan, nor could any native leave under penalty of death, foreign merchant ships again began to visit Japan. After the Meiji restoration in 1868, Japan began to receive foreign imports, and in return began to send its products to markets abroad, especially Europe and America. These products and styles became wildly popular, and by 1880 Japanese decorative themes were highly influential to the pioneers of Art Nouveau, notably Emile Galle, Ernest Leveille, Auguste Jean to name a few. These motifs also spread to the glass houses of Bohemia, and enameled glassware bearing Japanese motifs were produced by Harrach, Moser, and others. The example shown here is most probably French, from the Clichy area north of Paris, by one of the makers mentioned above. It is unsigned and unmarked, circa 1880.
<urn:uuid:8961d456-3652-41f6-9f7d-7100f604cc21>
CC-MAIN-2013-20
http://www.collectorsweekly.com/stories/31539-enameled-french-vase-in-the-japonisme-st?in=736
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00031-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968329
197
3.28125
3
Angel of Independence |The Monument of Independence| |Native name | Spanish: Monumento a la Independencia, Ángel de la Independencia Independence Column front view |Location||Mexico City, Mexico| |Elevation||45 metres (148 ft)| |Inaugurated by||Porfirio Díaz| |Built||September 16, 1910| |Built for||Centenary of Mexican Independence| |Restored||September 16, 1958| |Restored by||José Fernández Urbina| |Architect||Antonio Rivas Mercado| Enrique Alciati (sculptures) |Architectural style(s)||Corinthian column| |Governing body||Instituto Nacional de Antropología e Historia| The Angel of Independence, most commonly known by the shortened name El Ángel and officially known as Monumento a la Independencia ("Monument to Independence"), is a victory column on a roundabout on the major thoroughfare of Paseo de la Reforma in downtown Mexico City. El Ángel was built in 1910 during the presidency of Porfirio Díaz by architect Antonio Rivas Mercado, to commemorate the centennial of the beginning of Mexico's War of Independence. In later years it was made into a mausoleum for the most important heroes of that war. It is one of the most recognizable landmarks in Mexico City, and it has become a focal point for both celebration or protest. It resembles the July Column in Paris and the Berlin Victory Column in Berlin. The base of the column is quadrangular with each vertex featuring a bronze sculpture symbolizing law, war, justice and peace. Originally there were nine steps leading to the base, but due to the sinking of the ground, an ongoing problem in Mexico City, fourteen more steps were added. On the main face of the base facing downtown Mexico City, there is an inscription reading La Nación a los Héroes de la Independencia ("The Nation to the Heroes of Independence"). In front of this inscription is a bronze statue of a giant, laureled lion that guides a child, which symbolizes, according to Rivas Mercado, "the Mexican people, strong during War and docile during Peace." Next to the column there is a group of marble statues of some of the heroes of the War of Independence. The column itself is 36 metres (118 ft) high. The structure is made of steel covered with quarried stone decorated with garlands, palms and rings with the names of Independence figures. Inside the column is a two-hundred step staircase which leads to a viewpoint above the capital. The Corinthian-style capital is adorned by four eagles with extended wings from the Mexican coat of arms used at the time. Crowning the column there is a 6.7 metres (22 ft) statue by Enrique Alciati of Nike, the Greek goddess of Victory, like other similar victory columns around the world. It is made of bronze, covered with 24k gold (restored in 2006) and weighs seven tons. In her right hand the Angel, as it is commonly known, holds a laurel crown above Miguel Hidalgo's head, symbolizing Victory, while in her left she holds a broken chain, symbolizing Freedom. Construction of El Ángel was ordered in 1900 by President Porfirio Díaz. Antonio Rivas Mercado began the foundation work immediately and laid the foundation stone on January 2, 1902 and placed in it a gold chest with a record of independence and a series of coins minted in that epoch. But in May 1906, when the foundations were built and 2,400 stones placed to a height of 25 m, the sides of the monument collapsed, so Díaz created a study commission composed of engineers Guillermo Beltran y Puga, Manuel Marroquín y Rivera and Gonzalo Garita. The commission determined that the foundations of the monument were poorly planned, so it was decided to demolish the structure. The work was restarted under the supervision of a steering committee composed of engineers Guillermo Beltran y Puga, Manuel Marroquin y Rivera and the architect Manuel Gorozpe, leaving the artwork in the care of architect Antonio Rivas Mercado. All the sculptures were made by Italian artist Enrique Alciati. One of the faces in the doors is of one of Rivas Mercado´s daughter, Antonieta. The monument was completed in time for the festivities to commemorate the first hundred years of Mexican Independence in 1910. The opening ceremony was attended by President Díaz and several foreign dignitaries. The main speaker at the event was Mexican poet Salvador Díaz Mirón. The monument suffered some damage during an earthquake on July 28, 1957 when the sculpture of the Winged Victory fell to the ground and broke into several pieces. Sculptor José Fernández Urbina was in charge of the restoration, which lasted more than a year. The monument was reopened on September 16, 1958. It survived the devastating earthquake of September 19, 1985 with some damage to the staircases and the reliefs, but none to the Angel. In 1925, during the administration of Plutarco Elías Calles, the remains of the following Heroes of the Mexican Independence were interred in a mausoleum under the base of the monument. At the entry to the mausoleum is a statue of William Lamport, also known as Don Guillén de Lampart y Guzmán, an Irishman who was tried by the Mexican Inquisition in the mid seventeenth century, following the discovery of his plot to achieve the independence of New Spain. He was released by the inquisition to secular authorities and executed in the auto de fe of 1659, with his remains forbidden burial in sacred ground. The actual remains of insurgents are buried in the mausoleum: - Father Miguel Hidalgo y Costilla: Chief instigator of independence in 1810 and "Father of the Nation". - Father José María Morelos y Pavón: Skilled general and leader of the independence movement after Hidalgo's execution. - Ignacio Allende: Lieutenant general of the insurgent army and later rebel leader. - Juan Aldama: A rebel captain and conspirator. - José Mariano Jiménez: Hidalgo's lieutenant colonel. - Guadalupe Victoria: Commander of the insurgent army and first President of Mexico. - Vicente Guerrero: Insurgent general following the death of Morelos and second President of Mexico. - Nicolás Bravo: Commander of the rebel army and later President of Mexico on three occasions. - Mariano Matamoros: A priest who served as Morelos's lieutenant general. - Andrés Quintana Roo: A prominent constitutionalist. - Leona Vicario: Active supporter of the rebel movement and wife of Andrés Quintana Roo. - Francisco Javier Mina (Xavier Mina): A Spanish officer who joined the rebel cause against the absolute monarchy of Ferdinand VII. - Pedro Moreno: Insurgente - Víctor Rosales: Insurgente Absent from the mausoleum is Agustín de Iturbide, who achieved Mexico's independence from Spain in 1821; his remains are in the Metropolitan Cathedral of Mexico City. President Calles excluded Iturbide when other insurgents' remains were transferred to the mausoleum in 1925. More than 60 years after the mausoleum was erected, on September 16, 1998 it was permanently opened to the public by President Ernesto Zedillo and Cuauhtémoc Cárdenas, Head of Government of the Federal District. On May 30, 2010, as part of the Bicentennial celebrations of the War of Independence, the remains of the National Heroes were exhumed and then escorted by the Armed Forces with full military honors to the National History Museum in Chapultepec Castle, where they were subject of studies by members of the National Institute of Anthropology and History. After these studies, the remains were temporarily exhibited at the National Palace until August 2011, when they were returned to the mausoleum. This section does not cite any sources. (November 2018) (Learn how and when to remove this template message) Visitors are allowed to enter the monument, view the memorial plaques at the base level, and climb to the top of the tower. Entrance is free. To go up people must get a permit at the Cuauhtémoc borough where you must show ID. Groups of no more than 6 are then allowed into the monument for about 15 minutes. There are 200 stairs, and the climb is arduous. The first approximately 15 stairs, in the base, are wide and comfortable. The stairs in the column itself, approximately 185, are circular, metal, very narrow and without a landing or resting point until one reaches the top. Visitors who are not in good physical shape will find the climb exhausting—it is the equivalent of climbing a 14 story building in one go, and those not comfortable with tight spaces should avoid the climb as there is insufficient room to allow others to bypass. Some areas of the staircase are very dark, and there are only a few slits to let in light. The top balcony, though narrow, offers a commanding view of the wide avenues that surround the column. The return trip down is by way of the same circular staircase. More recently El Ángel has become the traditional gathering place for celebration by Mexico City inhabitants, particularly following Mexico national football team victories and as a focal point for political rallies. As of March 2016, visiting inside is limited to Saturdays and Sundays from 10:00 AM to 1:00 PM. - Angel of Peace, Prinzregentenstrasse, Munich - La Victoria del Viento - List of public art in Mexico City - Mexican War of Independence - Porfirio Díaz - Zorrilla, Begoña (August 2010). "El Ángel de Independencia". Mexicanísimo. 30: 53. - Thomas Benjamin, La Revolución: Mexico's Great Revolution as Memory, Myth, and History. Austin: University of Texas Press 2000, pp. 184-85, footnote 30. - "Trasladan restos de héroes a Chapultepec" (in Spanish). El Universal. Retrieved 30 May 2010. - Baird, David; Bairstow, Lynne (2004). Frommer's Mexico 2005. Wiley Publishing, Inc. ISBN 0764567632. - Legorreta, Jorge (Sep. 18, 2002). "Tres figuras aladas erigidas a la libertad". La Jornada. In Spanish - Loaeza, Guadalupe (1998). El Ángel de nuestras nostalgias. Plaza y Janés. ISBN 9681103149. In Spanish - Blair, Kathryn Skidmore (2001). In The Shadow of The Angel. First Books. ISBN 0759606315. |Wikimedia Commons has media related to Monumento a la Independencia.|
<urn:uuid:be5ee428-1f12-4ee4-8e8b-134bdeb73db0>
CC-MAIN-2019-04
https://wikivividly.com/wiki/Angel_of_Independence
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584415432.83/warc/CC-MAIN-20190123213748-20190123235748-00184.warc.gz
en
0.917697
2,363
3.125
3
While corporate entrepreneurship provides essential elements for achieving benefits in the relationship, strategic entrepreneurship converts corporate entrepreneurship into firm performance throughout firms to gain competitive advantage. What is strategic entrepreneurship and corporate entrepreneurship? Strategic Entrepreneurship. involves taking entrepreneurial actions using a strategic perspective. Corporate Entrepreneurship. is the use or application of entrepreneurship within an established firm. Entrepreneurship. What is the difference between strategic management and corporate entrepreneurship? Strategic management concerns the long-term decisions aimed at improving the competitive position of a company. … In today’s competitive environment, corporate entrepreneurship is a vital strategic management concept for all businesses regardless of size and stage of development. What is the difference between strategic management strategic entrepreneurship? While strategic management has a focus on the development and maintenance of competitive advantage, entrepreneurship stands out for identification and exploitation of opportunities. What do you mean by strategic entrepreneurship? Strategic entrepreneurship (SE) involves simultaneous opportunity-seeking and advantage-seeking behaviors and results in superior firm performance. … We argue that SE is a unique, distinctive construct through which firms are able to create wealth. What is corporate entrepreneurship example? Examples include Kablee, an e-commerce platform for cables, and Cultifutura, a vertical farming solutions startup. Italian energy company, Enel, is another firm that actively practices corporate entrepreneurship. What are the types of corporate entrepreneurship? Corporate entrepreneurship consists of three general forms, namely – corporate venturing, organizational renewal and innovation (Stopford and Baden-Fuller, 1994). How is entrepreneurship similar to strategic management? Both disciplines are concerned with value creation, acknowledging it as a major organizational goal. Entrepreneurial actions and strategic actions can contribute to value creation independently, but they can contribute even more when they are integrated. Strategic management calls for firms to establish and exploit competitive advantages within a particular environmental context. Entrepreneurship promotes the search for competitive advantages through product, process, and market innovations. What is strategic management and how it can help? Strategic management is based around an organization’s clear understanding of its mission; its vision for where it wants to be in the future; and the values that will guide its actions. … Strategic management can, thus, help an organization gain competitive advantage, improve market share and plan for its future. What do you expect from corporate entrepreneurship as a company? Corporate entrepreneurship sets the context for innovation and growth. It provides a systems view of the resources, processes and environment that are needed to support, motivate and engage the organization in entrepreneurial thinking and action. Benefits: … It challenges traditional organizational practices. Why is strategic entrepreneurship important? Strategic entrepreneurship shaping entrepreneurial activity from a strategic perspective helps corporations raise their performances and develop property competition advantage via increasing profit or market share. Why is entrepreneurial management so important to corporations? Entrepreneurship is important, as it has the ability to improve standards of living and create wealth, not only for the entrepreneurs but also for related businesses. Entrepreneurs also help drive change with innovation, where new and improved products enable new markets to be developed. What are the strategies of entrepreneur? 6 Timeless Strategies That Drive Successful Entrepreneurship - Study the competition. … - Conserve cash no matter how good business is. … - Research new products and services. … - Don’t tackle huge markets at first. … - Listen to customer feedback and adapt. … - Respond to change. What is strategic entrepreneurship PDF? Strategic entrepreneurship is a newly emerging concept based on. entrepreneurship and strategic management concepts (Ireland et al, 2003). Strategic entrepreneurship is a combination of behaviors that seek opportunity. and competitive advantage simultaneously (Ireland and Web, 2007). How does strategic entrepreneurship create value to a firm? In the main, entrepreneurship contributes to a firm’s efforts to create value and subsequently wealth primarily by identifying opportunities that can be exploited in a marketplace, while strategic management contributes to value- and wealth-creation efforts primarily by forming the competitive advantages that are the …
<urn:uuid:bb5e3d43-3835-4224-b9d6-c81326c759a4>
CC-MAIN-2022-21
https://awordtotheworld.com/open-busines/quick-answer-what-is-the-difference-between-strategic-entrepreneurship-and-corporate-entrepreneurship.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00005.warc.gz
en
0.910395
833
2.53125
3
Daiei (大永), also known as Taiei or Dai-ei, was a Japanese era name (年号,, nengō,, lit. "year name") after Eishō and before Kyōroku. This period started in August 1521 and ended in August 1528. During this time, the emperors were Go-Kashiwabara-tennō (後柏原天皇) and Go-Nara-tennō (後奈良天皇). Events of the Daiei era[change | change source] - 24 January 1525 (Daiei 5, on the 1st day of the 1st month): All ceremonies in the court were suspended because of the lack of funds to support them. - 1526 (Daiei 6, 7th month): An army from Awa Province was stopped before it reached Kyoto (Heian-kyō). - 1526 (Daiei 6, 12th month): Shogun Ashikaga Yoshiharu invited archers from neighboring provinces to come to the capital for an archery contest. - 1526 (Daiei 6, 12th month): Large-scale mining operations started at the Iwami Ginzan Silver Mine in what is now Shimane Prefecture. Related pages[change | change source] References[change | change source] - Nussbaum, Louis-Frédéric. (2005). "Dai-ei" in Japan encyclopedia, p. 138. - Nussbaum, "Go-Kashiwabara Tennō," p. 255. - Nussbaum, "Go-Nara Tennō," p. 257; Titsingh, Isaac. (1834). Annales des empereurs du Japon, pp. 364-373. - Titsingh, p. 372. - Titsingh, p. 372; Imperial Household Agency (Kunaichō): 後柏原天皇 (104) - Titsingh, p. 373. - Japan Mint, Iwami Ginzan Silver Mine Coin Set; retrieved 2011-12-3. Other websites[change | change source] - National Diet Library, "The Japanese Calendar" -- historical overview plus illustrative images from library's collection |Era or nengō:
<urn:uuid:ccd07e9a-4dc5-4b2e-a0b6-2f88168c35b4>
CC-MAIN-2020-45
https://simple.wikipedia.org/wiki/Daiei_(era)
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107885059.50/warc/CC-MAIN-20201024223210-20201025013210-00141.warc.gz
en
0.813329
510
3.140625
3
Written by Nazrul Hoque Texas is the second most populous state in the U.S. and it’s getting bigger, leading the nation in population growth. According to the 2017 estimates by the U.S. Census Bureau, the population of Texas increased from 27,904,862 in 2016 to 28,304,596 in 2017. This is an increase of 399,734 persons or 1.4 percent between July 1, 2016 and July 1, 2017. Texas’s growth rate is double the national growth rate of 0.7 percent. However, change in population during the 2016-2017 has not been distributed evenly throughout the state. Some counties have grown rapidly, some have grown slowly and others have declined. Out of 254 counties, 153 counties gained population, 1 county population remain the same, while 100 counties lost population during 2016-2017. The largest numerical increases in population from 2016 to 2017 were in the counties with the largest populations including Harris County with an increase of 35,939, Tarrant County with an increase of 32,729, Bexar County with an increase of 30,831, Dallas County with an increase of 30,686, Denton County with an increase of 27,911, and Collin with an increase of 27,150. Top and bottom 10 counties with largest numerical population change are given in the following Table. In terms of percent population change, Loving County gained the most (16.5 percent), followed by Hudspeth County (8.2 percent), Comal County (5.1 percent), Hays County (5.0 percent) Williamson County (25.1 percent), Comal County (24.3 percent), Montgomery County (22.0 percent), Motley County (4.9 percent), Kendall County (4.9 percent), and Kaufman County (4.1 percent). Top 10 counties with largest percent population increase are given in the following Table.Concho county lost the most population (1,556), followed by Howard County (578), Ector County (493), Dewitt County (392), Scurry County (380), Dimmit (366), Gray (334), Nueces (308), Winkler (298), and Victoria (295). Detailed data on population estimates for all 254 counties can be found at (Table 1). Component of Population Change: Population change is driven by three components: 1. Natural change (births minus deaths), 2. Net internal or domestic migration (i.e., in and out migration within the 50 States and Territories of the U.S.), and 3. Net international migration (immigration minus emigration). Out of 254 counties, 187 counties increase population due to natural change (i.e., had more births than deaths), 4 counties remain the same, and 63 counties lost population due to natural change (i.e., had fewer births than deaths). International migration is an important factor in population growth and presents challenges for a population because of assimilation processes as opposed to natural increases. Out of 254 counties, 221 counties gained population due to international migration, 22 counties had 0 net international migration, and 11 counties lost population due to net international migration. Top 10 and bottom 10 counties ranked by international migration were: Another component of population change is domestic migration. Out of 254 counties, 126 counties gained population due to domestic migration, while 128 lost population due to domestic migration. Top10 and bottom10 counties ranked by domestic migration were: An examination of the component of population change allows us to see the sources of population change (i.e., change due to natural increase, net international migration, or net domestic migration, or combinations of all three). For certain counties, international migration contributed more to the increase in population than did domestic migration during the period of 2016 – 2017. For other counties, domestic migration was the primary contributor to the population increase. Among the largest counties, Harris, Dallas, El Paso, Hidalgo and Cameron lost population due to domestic migration. Detailed data on component of population change for all 254 counties can be found at (Table 2). Nevertheless, population growth from 2010 to 2016 has slowed compared to the 1990s and 2000 – 2010 when one examines the number of counties in Texas that have shown growth and decline in population. For example, during the period of 1990-2000, 68 counties experienced population decline and 89 counties experienced net outmigration. During the period of 2000 to 2010, the number of counties with population decline was 88 and the number of counties with net outmigration was 119. During the 2010-2016, 102 counties lost population and the number of counties with net outmigration was 126. During 2016-2017, Texas led the nation in population increase. Texas’ population has surpassed 28 million. However, not every county experienced population growth during the period 2016 – 2017. Out of 254 counties, 153 counties gained population, while 100 counties lost population during 2016-2017. While only 11 counties lost population due to international migration, 128 counties lost population due to domestic migration, and 63 counties lost population due to natural change. Of course size of the change varies widely across the counties, from a net loss of 15 international migrants in San Jacinto County to a gain of 34,791 international migrants in Harris County. For domestic migration, Harris County lost the most (44,974), while Denton County Gained the most (18,733). An understanding of the components of population change will help us to understand the reason of population change in a given area (i.e., population in a particular area is increasing or declining due to more or fewer births than deaths, or due to net migration). Recent estimates suggest that, Texas’ population is growing at a level that is substantially higher than the potential rate of growth for the nation and all but a handful of other states. One may ask whether such growth will continue in the future. It is impossible to predict future patterns with absolute accuracy, but the fact that such a large part of Texas’ population growth is due to natural increase (52.5 percent) suggests that population growth will likely continue, even if the rate of growth slows from that observed in the past. Texas may thus be expected to remain among those states with the largest numerical increase in population and to continue to be among the nation’s fastest growing states in the coming years. All of these changes have significant implications for education, the labor force, health services, and the polity.
<urn:uuid:233723b4-22b2-4be4-958f-08d3b5b6aec4>
CC-MAIN-2019-04
https://blog.chron.com/insidepolicy/2018/06/demographic-trends-in-texas-counties-findings-from-the-2017-population-estimates/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583874494.65/warc/CC-MAIN-20190122202547-20190122224547-00603.warc.gz
en
0.932075
1,326
2.65625
3
Tax cuts are generally a welcome topic of conversation. This is because a tax cut is, by its nature, a reduction in the amount of taxpayers’ money that has to be paid toward government revenue. Since tax cuts can end up saving voters money, they’re always popular. On the flip side, tax increases are collectively loathed. Tax cuts can present themselves in various forms. The government can end up cutting taxes on income, profits, sales, or assets. The cut will then end up being a one-time rebate, a tax credit, or a reduction in the overall tax rate. So, why would any government consider a tax cut and what do they mean for an individual such as yourself? The Reasoning Behind Tax Cuts Oftentimes a government will introduce a tax cut to spur economic growth, by fattening the wallets of taxpayers’ who would otherwise be on the hook for paying heftier taxes. Most of the time tax cuts end up being an effective avenue for governments to take in order to end recessions. However, in the short term tax cuts will increase the amount of government debt, because they inherently reduce revenue. Advocates of tax cuts address these concerns by saying that tax cuts end up paying for themselves by stimulating the economy through individual spending and investment. Tax cuts pull this off through the “multiplier effect”, which implies that they can generate such explosive economic growth that eventually they end up generating higher tax revenue. Let’s take a look at some of the different kinds of tax cuts. Income Tax Cuts As is implied in the name, income tax cuts reduce the amount of that taxable income. You or anyone else would be genuinely stoked at the prospect of not having to pay as much of that hard-earned dough on taxes. Naturally, when you’re able to take home more of the money that you’ve earned instead of handing it over to the federal government or state government, you end up spending more and fueling the economy, as a result. Capital Gains Tax Cuts Capital gains tax cuts effectually reduce taxes on the sale of assets in a financial year. This manages to put more money back in the pockets of investors. We’re talking about more money back into companies as well through stock purchases. This also ends up increasing the prices of housing, and other real estates. Inheritance Tax Cuts Inheritance tax cuts will reduce the amount of taxes that are paid by heirs on assets they inherit from loved ones. This can come in handy, as some of those inheritance packages can end upbringing with them quite the sizable tax obligations! Now that we’ve taken a quick look at some of the different kinds of tax cuts, let’s take a closer look at the most recent tax cuts and what they could mean for you. What is the payroll tax cut? A payroll tax cut effectually puts a hold on the collection of particular wage-based taxes. These are usually collected for social security and medicare. Any workers who benefit from this tax cut will end up taking home more money on each paycheck. The federal government normally levies a 12.4% social security tax on employees’ paychecks. The cost of these social security and medicare taxes are divided between employees and employers, with each party bearing 6.2% of the bill. Wages that exceed $137,700 for annual income aren’t subject to the social security tax. In this case, medicare tax withholds an extra 2.9%, or 1.45% each, that is split between the employees and employers. Any “extra” money that is hitting people’s bank accounts via this new payroll tax cut, doesn’t look like some huge stimulus check. It’s much more so a gradual increase in funds, on a month-to-month basis. What are the implications of the payroll tax cut? Trump’s executive order ended up deferring social security taxes on wages that totaled less than $4K on a weekly basis. That ends up meaning that it’ll positively impact anyone who makes less than $104K for their annual income. By positive impact, we mean a potential 6.2% rise for the last four months of 2020. The wide-reaching benefit provided by this executive order is easy to see. Anyone who is making up to $104K stands to take home quite a bit of extra money, every month. This is comparable to something like what the Australian residents have set up for their health care with the medical levy surcharge. A married couple of Australian citizens that earn more is going to be on the hook to pay more, at a certain point. While anyone who is below a certain amount of money for their annual income will pay less for their health insurance! You can thus see the similarities with how that payroll tax cut is set up for making sure the high-income earners are paying their fair share to support the system as a whole.
<urn:uuid:a9cb6a9f-b0f4-414b-a580-3aac79bde87f>
CC-MAIN-2021-21
https://www.days3.com/what-the-new-tax-cuts-could-mean-for-you/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.94/warc/CC-MAIN-20210508151721-20210508181721-00481.warc.gz
en
0.966001
1,036
2.828125
3
Historically, Yemen has been the most populous region of Arabia, and an important seat of culture. Geographically, it is the highest & broadest end of the Hijaz, facing Ethiopia across the Red Sea, and maintaining sea contact with India and even Indonesia. The central plateau, at over 6000 feet, continues to support a rich & conservative culture. A fascinating array of music can be heard in the rare anthologies. The most significant individual style of art music in Yemen is based closely on poetry, including both classical Arabic poetry as well as that of Yemeni poets over the past centuries and up to today. Performance style consists of a solo singer with accompaniment (typically 'ud). Along with the basic combination of voice & 'ud, there can be percussion instruments to highlight the rhythms in subtly expressive ways. Many variants on this style exist in Yemen, and as a historical form, this was the specifically Arabic musical style which first made a world impact during the early Islamic Empire. The styles in Yemen are especially fluid in rhythm, with a wide variety of metrical patterns derived from poetic language, and articulated without strong rhythmic accents. This is especially true of the largest single style, that of Sana'a, the capital. An anthology of vocalists recorded recently in Sana'a: Despite the conservatism, one can hear some outside influence in the accompanying instrumental improvisations. The songs remain compelling, nonetheless, and the presentation contains valuable discussion & orientation. Two more traditional individual recitals, also from Sana'a: The former is particularly strict in a traditional sense, with one singer using the original Yemeni style of 'ud (as opposed to the generic Arabic 'ud which is now ubiquitous), and the other an intriguing copper tray evocative of Indonesia. The latter is a contemplative recital, self-accompanied on the 'ud. These two recent releases have effectively transformed the discography of Yemeni traditional music. Besides the style of the high plateau around Sana'a, one particularly compelling anthology has been released for a region in the south: The styles here are more angular & animated, but still possess the special grace which makes singing of poetry in Yemen so compelling. Some other items in the modest Yemeni discography are mentioned in the individual files. To Near-Eastern music menu.T. M. McComb Updated: 24 October 2003
<urn:uuid:cca4232d-b14a-44bd-baa2-58d35afa5af2>
CC-MAIN-2021-39
http://www.medieval.org/music/world/yemen.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057158.19/warc/CC-MAIN-20210921041059-20210921071059-00590.warc.gz
en
0.941383
478
2.703125
3
A highly productive aquifer beneath Purdue University provides the campus with a low-cost, high quality supply of potable water, which is pumped by on site wells for use in buildings, irrigation, and as make-up water for the district energy system. As the owner of this resource, Purdue pays a relatively small price per unit compared to many universities that procure water from a public agency. Consequently, the bulk of costs associated with water consumption are not related to purchasing but to wastewater disposal. To provide the West Lafayette Wastewater Treatment Utility with an accurate sanitary sewer bill, all campus buildings are outfitted with water meters. Deduct meters are installed to measure water quantities that are not discharged into the sewer system, such as irrigation water. Knowing where and how much water is being used allows the campus to implement targeted water saving projects and monitor the results. A web-based meter reading system being developed will soon provide the campus community with access to water usage data. Several retrofit projects are being implemented to produce immediate water savings. University Residences is replacing existing 2.5 gallon per minute (GPM) showerheads with 1.75 GPM models, and installing 0.5 GPM faucet aerators on existing 2.2 GPM faucets. In 2009, the flush valves for water closets and urinals in twenty buildings were retrofitted with flow restrictors. Based on initial testing, these devices are expected to produce domestic water savings of 15 to 20 percent. The university’s retro-commissioning effort has identified several opportunities to curb process water usage, including converting once-through cooling systems to the campus chilled water system, which will be applied campus-wide. Purdue is helping to protect its underground water resources with a comprehensive storm water management program. Storm water treatment best management practices demonstrated on campus include infiltration beds, bioswales, porous paving, and a green roof at Schleman Hall. The university recently completed a storm water master plan that will help it exceed regulatory requirements and improve water quality through innovative strategies like green roofs and capture/reuse systems. A comprehensive wellhead protection program further reduces pollutant infiltration into the aquifer. Under this program the campus identifies and closely manages contaminant sources on land near its wells to safeguard its drinking water supply and protect the local environment. The university’s water management practices are also strong in Campus bioswale the area of site water conservation. The campus irrigation system, comprised of sixty distinct smaller systems and over five hundred valves, is being upgraded with weather-sensing technology. The new sprinkler controls use real-time weather data to adjust irrigation quantities automatically in response to changing weather conditions. Other site factors are monitored as well, including soil moisture, wind conditions, slope, and soil and plant type, to optimize the application of irrigation water and maintain plant health while conserving water resources. Purdue will track the following metrics to assess its water use performance overtime. Site water: 2014 Short Term Goals - Maximize opportunities to reduce water usage for irrigation. Site water: 2025 Long Term Goals - Establish an organic turf management plan during the site-planning phase for all new construction projects and then determine appropriate design and water savings goals for the irrigation system to ensure both aspects of the site are developed concurrently. - Target athletic fields adjacent to wells for irrigation with well-house startup water, and time irrigation activities for off-peak athletic field use. - Capture and redirect water flushed from wells on startup, which is normally directed into the storm sewer systems, into other non-potable uses such as chillers or infiltration. - Win the Hoosier Water Guardian award for campus potable water supply. Building water: 2014 Short Term Goals - Adopt maximum flush and flow requirements for all water-using fixtures. - Continue to pilot and test water saving fixtures and devices. - Develop and implement a cooling tower water management plan that results in optimal water efficiency and chemical usage. Infrastructure water: 2014 Short Term Goals - Continue to explore opportunities to redirect water from the sanitary system. Infrastructure water: 2025 Long Term Goals - Assess opportunities to reuse stormwater in the chiller plant cooling towers to offset potable water use. - Expand the chilled water loop system where feasible to eliminate the need for potable once through cooling water. Resource conservation and protection: 2014 Short Term Goals - Promote water conservation during Green Week. - Include an educational/behavioral change component to building water metering efforts by publicizing water usage data via the sustainability website. - Capitalize on synergies with the Wellhead Protection Program by coordinating projects so that groundwater resource protection and stormwater management concerns are mutually addressed. Resource conservation and protection: 2025 long Term Goals - Work with students to perform water audits on a representative set of campus buildings to develop baselines for gauging water efficiency improvements over time.
<urn:uuid:0dd4e75d-64c8-4b02-9e7f-82f2a76f0638>
CC-MAIN-2016-26
http://www.purdue.edu/sustainability/strategicplan/keyareas/water_resources.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00042-ip-10-164-35-72.ec2.internal.warc.gz
en
0.92553
1,008
3.109375
3
Mabelle Eléa September 8, 2021 Math Worksheets At a young age, kids are first taught to write letters in print only. When kids reach the age of eight to ten, they are taught how to write in cursive. They may find this quite difficult and boring at first. But one fun way to teach them this is to use worksheets also. The basic cursive worksheets that you can use are Rockin’ Round Letters, Climb’n’ Slide Letters, Loopy Letters, Lumpy Letters, and Mix ’n’ Match. Future Use of Color – Other than making sure your socks match, we use color in ways that we, as adults, are often not aware of. Obviously, there are traffic lights that require us to know our colors, and road signs are differentiated by their color too. Reading a map, even on a GPS, relies on color recognition to identify certain features. Color also influences the way we behave, our moods, and how we react to other people. Why Parents Should Use a Writing Worksheet – While it is common knowledge that teachers use this tool in school, what many of us do not know is that parents can also utilize it at home to supplement their child’s learning. With a writing worksheet, you can encourage your child to develop his or her writing abilities at home, every day. Even for just 30 minutes of practice daily, this could create a significant improvement in your child’s skills. With a writing worksheet, you also have an option to avail of an advanced worksheet that will help older kids with their handwriting and writing abilities. Letter Recognition – As your child learns sounds, they will also learn to recognize the letters of the alphabet. A great way to teach this is with a printable worksheet that shows the letter, a picture, and the ’name’ of the letter – like Annie Apple! Remember that with the so many worksheets available, choose one that is best suited for a certain lesson. Plan ahead what type of worksheet to use for a given day, depending on what you plan to teach. There are many free worksheets available, especially online, but still, the best worksheet is one that you personally draft. This way, you can match the level of difficulty of the activity following the performance level of your own students. Remember that reading is not only used to read novels. Your child will have to read instructions, worksheets, textbooks, and test papers for a long time. The better they can read, the better their comprehension will be, and the better their test scores will be too. A comprehensive set of printable preschool worksheets will cover the basic skills your child needs so they can start school with confidence. Tag Cloudgeometry ch 10 test touch math multiplication worksheets addition and subtraction worksheet generator k 12 math module grade 10 math fraction test worksheet 9 basic college algebra worksheets 1st grade math puzzles giant graph paper 4th grade math word problems tutoring for high school students interactive math addition games problem solving calculator that showork number skills worksheets adding decimals ks2 worksheets
<urn:uuid:77b3a6b4-be6e-41e5-971b-268b4e6409fa>
CC-MAIN-2021-43
https://www.coworkingasiapacific.com/z0440bp4b/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00708.warc.gz
en
0.935647
661
3.6875
4
h a l f b a k e r y Where life irritates science. add, search, annotate, link, view, overview, recent, by name, random news, help, about, links, report a problem or get an account With some skill, curved shots around obstacles are already feasible, by shooting the ball very tightly along the obstacle. Aerodynamics will bend the flight path around, some. This idea uses spin of the ball to achieve similar effects : Inside the barrel are three stripes of piezo material, that can change their roughness according to the voltage applied: one every 120°. The thumb of the shooter rests on a (this is a possibly not PC term, please correct me if that is the case) coolie-hat, with which he can determine the extent to which he wishes the flight path to be altered, and in which direction. This is translated into different voltages being applied to the in-barrel stripes, who change their roughness accordingly, giving spin of a detemined magnitude around a detemined axis, to the ball. [loonquawl, Mar 27 2009] ||[89tortoise]: i have worked with piezoelectric actuators and piezo loudspeakers, so i assumed it was doable. never saw piezo roughness-alternators, though. ||Good hunting. Do some show and tell when the patent's safe and dry, will you?
<urn:uuid:624e1a02-318a-4d61-bf97-b2157c0c153a>
CC-MAIN-2021-43
https://www.halfbakery.com/idea/Crooked_20Paintball
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.91/warc/CC-MAIN-20211020055136-20211020085136-00213.warc.gz
en
0.902382
305
2.8125
3
Health statistics are numbers about some aspect of health. Health statistics and data are important because they measure a wide range of health indicators for a community. The most common statistics reported are vital (birth, death, marriage, divorce rates), morbidity and mortality. All Published work is licensed under a Creative Commons Attribution 4.0 International License Copyright © 2018 All rights reserved. iMedPub LTD Last revised : August 20, 2018
<urn:uuid:fa0ebb09-048f-4270-a59f-4fe7b39a76c7>
CC-MAIN-2018-34
http://www.imedpub.com/scholarly/health-statistics-journals-articles-ppts-list.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218357.92/warc/CC-MAIN-20180821151743-20180821171743-00024.warc.gz
en
0.931362
86
3.015625
3
Get only two digits after the decimal point in Python Hi Friends! In this tutorial, we are going to learn how to get only two digits after the decimal point in the input. In many tasks that we solve we may have many mathematical operations involved. And many operations may require only specific types of inputs. So, first, let us learn how to take a number as input for any mathematical operation in Python. Taking a number as input in Python In order to have a proper understanding of this topic, the reader should be familiar with the data types we have in Python. If we want to take a number as input in Python then we should take the value into a variable of type integer or float. Since we are discussing number with decimal points. So, we should take float data type into account. The input can be given either statically or dynamically to a program. Let us see both ways. Types of inputs in python Static Input: As the name refers statically that is it is given fixed however we can again change the value as the program goes on but at the particular point its value is fixed. Any changes to the given value can be only done by changing the code. Once the execution begins there is no way for changing the value of the variable at the point of execution in the program. In python for giving the value to a variable in a static way. We need not specify the data type that it takes as value. This is because python is dynamically written. That is the Python compiler itself checks the data type of the variable at the time of execution. The syntax to give input to a variable will be Here, not only we are giving the variable x value but also we are initializing it. Dynamic Input: This is quite opposite to static that is the value is not given as fixed in the code. We can give whatever value at the time of its execution. The value is given by the user from the keyboard if a dynamic input is given at a particular part of the code in a program. Then, while executing that part the execution waits until the user gives the input from the keyboard. The syntax to initialize a variable and to take the input from the user will be: x=float(input("enter a number")) Since we have to give the value with the decimal point we used float keyword which is used to specify the data type in an abstract way. So far in this session, we have learned how to give a number as input in python. Now let us learn how we can take only two digits after the decimal point. To get only two digits after decimal point In order to get a complete understanding from this session make sure that you are good with operators in Python. Don’t worry if you are not. As this tutorial is for beginners. I will start this section with the description of operators that will be used as a part of our solution to the problem. The % operator and // operator The modulus operator represented as ‘/’ is a mathematical operator that gives the result when a number is divided by some number. And the integer division operator represented by ‘//’ gives the quotient. For example if This is because when 7 is divided by 4 the quotient is 1 and the result is a floating point 1.75 Using these operators Now let us understand some logic required for the operation we require. Here is the logic to be implemented x=x*100 x=x//1 x=x/100 Here, we first brought the two digits after the decimal point to before the point by multiplying the number with 100. Then, we removed the decimal part from the number by performing integer division with 1. Now, we send back the two digits to right of the decimal point by performing normal division with 100. In this way, we can only get two digits after the decimal point in input. Now, let’s see what if x=3.5678 then x changes to 356.78 in the first step. And then it changes to 356 in the next step and then it changes to 3.56 at the last. Which can be used as the required input. This can be used for both Static and Dynamic inputs. - How to reverse the elements in a list in Python by its index - Most frequent words in a text file in Python Hope you like the session we have not only seen the logic for how to take only two digits after decimal point in input. But also some valuable information on data types and also type of user input and operators.
<urn:uuid:1f69d441-da35-4ed5-b06e-e6bd8e552c51>
CC-MAIN-2021-21
https://www.codespeedy.com/get-only-two-digits-after-decimal-point-in-python/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991693.14/warc/CC-MAIN-20210512004850-20210512034850-00199.warc.gz
en
0.903817
938
4.15625
4
This article is the ninth in a series that helps you build on the fundamentals you learned in the 12-part SQL 101 series in Oracle Magazine. The previous Beyond SQL 101 article, “Rapid Retrieval of Rows in Small Data Sets,” introduced B-tree indexes, both single-column and composite. You learned how they can be used to increase performance when retrieving rows. You discovered how to create them and what kind of relationship they have with constraints. You also discovered how to alter them, how to drop them, and when they cannot be used. Finally, you explored a few guidelines for when B-tree indexes are most useful, when they are not useful, and when a function-based index can be helpful. In this article, you will To try out the examples in this series, you need access to an Oracle Database instance. If necessary, download and install an Oracle Database edition for your operating system. I recommend installing Oracle Database, Enterprise Edition Release 2 (220.127.116.11.0). If you install the Oracle Database software, choose the installation option that enables you to create and configure a database. A new database, including sample user accounts and their associated schemas, will be created for you. (Note that SQL_201 is the user account to use for the examples in this series; it’s also the schema in which you’ll create database tables and other objects.) When the installation process prompts you to specify schema passwords, enter and confirm passwords for the SYS and SYSTEM users and make a note of them. Finally—whether you installed the database software from scratch or have access to an existing Oracle Database instance—download, unzip, and execute the SQL script to create the tables for the SQL_201 schema that are used for this article’s examples. (View the script in a text editor for execution instructions.)Retrieval Versus Revision Recall that the previous Beyond SQL 101 article, “Rapid Retrieval of Rows in Small Data Sets,” explained that one of the primary goals of index creation is to boost data retrieval performance. Additionally, you learned that B-tree indexes can be useful when your goal is to retrieve a small number of rows, using an index on column data that is highly selective. However, recall also that for each change of a value in an indexed column, any corresponding indexes must also be changed. Therefore, having indexes in place can potentially slow down data manipulation, because for every DELETE, UPDATE, and INSERT command issued that affects an indexed column, a DELETE, UPDATE, and INSERT action must similarly take place against corresponding indexes to keep them in sync with the changed column values. Data warehouses are types of databases in which the design and performance goals for data manipulation are different from those of a transactional database. In data warehouses, data loads take place in bulk and at certain intervals, and the primary goal of a data warehouse is to aid users in querying and analyzing data. To help users accomplish this goal, Oracle Database supports bitmap indexes, which are typically used on columns that have few distinct values relative to the number of rows in the table and, therefore, have low selectivity. For example, the EMPLOYEE table currently has only two distinct values for the virtual column WAGE_INCREASE_WORTHINESS: “No Raise Yet” and “Cost of Living Increase Eligible.” If you have a data warehouse in which the users execute queries with a frequently used WHERE clause condition, including a column with few distinct values relative to the total number of rows in the table, this column may be a viable choice for a bitmap index. The structure of a bitmap index looks similar to Figure 1. Figure 1. Structure of a bitmap index Figure 1 shows the EMPLOYEE table with a bitmap index on the WAGE_INCREASE_WORTHINESS column. The bitmap index translates the distinct values for the WAGE_INCREASE_WORTHINESS column of individual employees. In this simplified example, the employees Frances Newton (EMPLOYEE_ID=37) and Theresa Wong (EMPLOYEE_ID=6572) each have the value “Cost of Living Increase Eligible” for the WAGE_INCREASE_WORTHINESS column, which turns the bitmap index bit on to 1. The WAGE_INCREASE_WORTHINESS = No Raise Yet and WAGE_INCREASE_WORTHINESS = Unknown values for each of these employees have their index bits turned off to 0, indicating that these values are not true for those employee records. The employee Thomas Jeffrey (EMPLOYEE_ID=6571) has his index bit turned on to 1 for WAGE_INCREASE_WORTHINESS = No Raise Yet, and all other bits in his record are turned off to 0. The SQL in Listing 1 demonstrates the creation of a bitmap index on the WAGE_INCREASE_WORTHINESS column of the EMPLOYEE table. Code Listing 1: Creating a bitmap index on the WAGE_INCREASE_WORTHINESS column SQL> set lines 10000 SQL> CREATE BITMAP INDEX employee_wage_inc_worth_bmi 2 ON employee(wage_increase_worthiness); Index created. Note that whereas bitmap indexes can be useful in data warehouses, they are not suitable for transactional tables that experience heavy data manipulation activity by many users. Recall that changes to indexed column values require similar changes to the corresponding index values, so any changes to a bitmap index may significantly slow down transactions. However, if you have multiple single-column bitmap indexes in a data warehouse and you want to retrieve rows based on certain AND and/or OR WHERE clause conditions, bitmap indexes can boost performance. Bitmap indexes are able to quickly compare and merge the bit settings that satisfy the WHERE clause conditions and return results without the need to access the large data warehouse table(s). Similarly, if your WHERE clause condition consists of a single-column predicate on a bitmap-indexed column, the bitmap index will be most useful when you are also executing a COUNT aggregate function in your SQL statement, because the index obtains and aggregates the ON bits and returns the result without having to access the underlying table. Additionally, note that although bitmap indexes typically require less storage space than B-tree indexes, they are available only with the Enterprise Edition of Oracle Database.Making a Statement Indexes can improve the performance of SQL statements returning result sets, but before a SQL statement returns a result set, Oracle Database performs several steps and operations that are transparent to the user. First, Oracle Database creates a cursor, an area in memory where the database stores the SQL statement. Next, it parses the SQL statement. Parsing involves several steps: Parsing is an expensive operation that requires time and resources. Therefore, for repeatedly executing similar statements, there are ways to reduce or eliminate parsing. Oracle Database maintains a cache of recently executed SQL statements, along with their execution plans. When a new SQL statement is executed, if an identical statement has been previously parsed, the statement doesn’t need to be parsed again. Bind variables, placeholders for values, are very useful in reducing the number of necessary parsing actions. These placeholders are substituted by different values when a SQL statement is parsed. If bind variables are used, they are associated with and substituted for the appropriate statement values. Once the bind variable substitution takes place, the SQL statement is executed. For any SQL statement query, a cursor is created; the statement is parsed; bind variables are substituted; the statement is executed; results are fetched; and after all results are fetched, the cursor is closed. Figure 2 illustrates an overview of SQL statement processing operations. Figure 2. SQL statement processing operations Part of the parsing operation is the determination of the execution plan, the method by which Oracle Database intends to execute the SQL statement. To determine the best way to execute a SQL statement, Oracle Database employs a program called the Oracle Optimizer, which examines each SQL statement and determines the most optimal sequence of steps necessary to execute it. This sequence of steps is the execution plan. When determining the best plan, the Oracle Optimizer considers statistics stored in the Oracle Database data dictionary. Recall from a previous Beyond SQL 101 article, “Defining, Constraining, and Manipulating Your Entities,” that the data dictionary is an internally owned and controlled set of tables and views that contain information about your database’s metadata. Statistics include, among other pieces of information, values such as the number of rows in a table and the number of distinct values for each column in a table. The statistics are used by the Oracle Optimizer to calculate the estimated cost of various execution options to help determine the lowest-cost (and therefore, best) execution plan. Automatic statistics gathering may or may not be enabled. You can use Oracle Enterprise Manager to enable or disable statistics gathering, check for missing or stale statistics, and populate the data dictionary with new or updated statistics when necessary. The query in Listing 2 checks when tables owned by your schema last had statistics gathered on them. The query in Listing 3 shows when indexes owned by your schema last had statistics gathered on them. Code Listing 2: Determining when statistics were last gathered for your schema’s tables SQL> select table_name, num_rows, to_char(last_analyzed, 'DD-MON-YYYY HH24:MI:SS') last_analyzed 2 from user_tables 3 order by table_name; TABLE_NAME NUM_ROWS LAST_ANALYZED —————————————————————————————— —————————— ———————————————————— ANNUAL_REVIEW 15 05-JUL-2016 01:00:23 DEPARTMENT 4 05-JUL-2016 01:00:24 EMPLOYEE 16 04-JAN-2017 01:00:32 EMPLOYEE_CTAS 2 11-SEP-2016 16:21:22 EMPLOYEE_EXTRA 2 26-OCT-2016 01:00:32 EMPLOYEE_IDENTITY 16 04-JAN-2017 01:00:32 6 rows selected. Code Listing 3: Determining when statistics were last gathered for your schema’s indexes SQL> select table_name, index_name, num_rows, distinct_keys, to_char(last_analyzed, 'DD-MON-YYYY HH24:MI:SS') last_analyzed 2 from user_indexes 3 order by table_name, index_name; TABLE_NAME INDEX_NAME NUM_ROWS ...KEYS LAST_ANALYZED —————————————— ——————————————————————————— ———————— ——————— ———————————————————— DEPARTMENT DEPARTMENT_NAME_LOCATION_UK 4 4 10-SEP-2016 21:05:26 DEPARTMENT DEPARTMENT_PK 4 4 05-JUL-2016 15:45:44 EMPLOYEE DEP_WAGE_INCREASE_I 16 7 15-JAN-2017 16:39:23 EMPLOYEE EMPLOYEE_PK 16 16 15-JAN-2017 17:56:41 EMPLOYEE EMPLOYEE_WAGE_INC_WORTH_BMI 2 2 06-MAR-2017 19:21:37 EMPLOYEE EMP_DEPT_FK 16 4 15-JAN-2017 18:39:09 EMPLOYEE EMP_HIRE_DATE_I 16 13 11-JAN-2017 21:53:14 EMPLOYEE_EXTRA SYS_C0010551 2 2 26-OCT-2016 01:00:32 8 rows selected.A Plan of Execution Using statistics, the Oracle Optimizer creates an execution plan that outlines each step Oracle Database executes to process a SQL statement. Oracle Database reads the execution plan and executes each step, starting with the most indented step and ending with the least indented step. If two or more steps have the same level of indentation, the steps are executed, in order, from top to bottom. Consider the execution plans, sometimes called explain plans, in Listing 4. Code Listing 4: Creating and displaying execution plans SQL> EXPLAIN PLAN FOR 2 select employee_id, last_name, first_name 3 from employee 4 where wage_increase_worthiness = 'No Raise Yet' 5 order by last_name, first_name; Explained. SQL> select * 2 from TABLE(DBMS_XPLAN.DISPLAY); PLAN_TABLE_OUTPUT ——————————————————————————————————————————————————————————————————————————— Plan hash value: 1993616227 ————————————————————————————————————————————————————————————————————————————— | Id | Operation | Name | Rows | Bytes | Cost (%CPU)| Time | ————————————————————————————————————————————————————————————————————————————— | 0 | SELECT STATEMENT | | 5 | 230 | 4 (25)| 00:00:01 | | 1 | SORT ORDER BY | | 5 | 230 | 4 (25)| 00:00:01 | |* 2 | TABLE ACCESS FULL| EMPLOYEE | 5 | 230 | 3 (0)| 00:00:01 | ————————————————————————————————————————————————————————————————————————————— Predicate Information (identified by operation id): PLAN_TABLE_OUTPUT ——————————————————————————————————————————————————————————————————————————— 2 - filter("WAGE_INCREASE_WORTHINESS"='No Raise Yet') 14 rows selected. SQL> EXPLAIN PLAN FOR 2 select employee_id, last_name, first_name 3 from employee 4 where wage_increase_worthiness = 'Cost of Living Increase Eligible' 5 order by last_name, first_name; Explained. SQL> select * 2 from TABLE(DBMS_XPLAN.DISPLAY); PLAN_TABLE_OUTPUT ———————————————————————————————————————————————————————————————————————————— Plan hash value: 1993616227 ————————————————————————————————————————————————————————————————————————————— | Id | Operation | Name | Rows | Bytes | Cost (%CPU)| Time | ————————————————————————————————————————————————————————————————————————————— | 0 | SELECT STATEMENT | | 11 | 506 | 4 (25)| 00:00:01 | | 1 | SORT ORDER BY | | 11 | 506 | 4 (25)| 00:00:01 | |* 2 | TABLE ACCESS FULL| EMPLOYEE | 11 | 506 | 3 (0)| 00:00:01 | ————————————————————————————————————————————————————————————————————————————— Predicate Information (identified by operation id): PLAN_TABLE_OUTPUT ———————————————————————————————————————————————————————————————————————————— 2 - filter("WAGE_INCREASE_WORTHINESS"='Cost of Living Increase Eligible') 15 rows selected. The execution plans in Listing 4 are created by use of the EXPLAIN FOR syntax. A query to the DISPLAY function in the built-in DBMS_XPLAN PL/SQL package obtains each execution plan. (An explanation regarding PL/SQL or the TABLE function that encapsulates the call to DBMS_XPLAN is beyond the scope of this article. Both the TABLE function and an introduction to PL/SQL will be addressed in subsequent articles in this series.) Note that the ID column identifies only the step number, much like a step name; it does not denote the execution order of the steps. The first step performed is a full table scan of the EMPLOYEE table to retrieve all records. The next step sorts the returned records according to the ORDER BY clause, and the final step of the first execution plan in Listing 4 returns all rows that satisfy the WHERE clause condition predicate 2 - filter("WAGE_INCREASE_WORTHINESS"='No Raise Yet') The ROWS column of the execution plan displays approximately how many rows the Oracle Optimizer expects to process at each step. Recall from the previous Beyond SQL 101 article, “Rapid Retrieval of Rows in Small Data Sets,” that if your query warrants the return of a large number of row values from your table, it might be more efficient to scan the entire table to return the row values than to look up and obtain row values from an index. Because the EMPLOYEE table is currently composed of only 16 records, the first execution plan in Listing 4’s approximation of 5 records returned comprises more than a quarter of the records in the entire table. For comparison purposes, the second execution plan in Listing 4 is generated for the same SQL statement, but for the WHERE clause condition predicate 2 - filter("WAGE_INCREASE_WORTHINESS"='Cost of Living Increase Eligible') And although the ROWS column value differs between the two execution plans, the execution plan steps are identical. Listing 5 outlines an execution plan that shows an index access included as an execution step. In the first step executed, step 3, INDEX RANGE SCAN searches the EMP_HIRE_DATE_I index for the accounting department record and retrieves the DEPARTMENT_ID value for the approximate number of rows that meet the WHERE clause condition predicate 3 - access("HIRE_DATE">TO_DATE(' 2016-09-01 00:00:00', 'syyyy-mm-dd hh24:mi:ss')) Note that a predicate line that states that it is an “access” performs an index key lookup whereas a predicate line that states that it is a “filter,” such as both predicates in Listing 4, is simply a WHERE clause condition used to filter the returned results. The next step in Listing 5, step 2, accesses the EMPLOYEE table with the ROWID value(s) retrieved from the EMP_HIRE_DATE_I index. Step 1 sorts the returned records according to the ORDER BY clause, and the final step, step 0, returns all rows that satisfy the WHERE clause condition. Code Listing 5: An execution plan that uses an index key lookup SQL> EXPLAIN PLAN FOR 2 select last_name, first_name 3 from employee 4 where hire_date > to_date('01-SEP-2016', 'DD-MON-YYYY') 5 order by last_name, first_name; Explained. SQL> select * 2 from TABLE(DBMS_XPLAN.DISPLAY); PLAN_TABLE_OUTPUT —————————————————————————————————————————————————————————————————————————————— Plan hash value: 1409198325 ——————————————————————————————————————————————————————————————————————————————— | Id | Operation | Name | Rows | Bytes | Cost (%CPU)| Time | ——————————————————————————————————————————————————————————————————————————————— | 0 | SELECT STATEMENT | | 1 | 23 | 3 (34) |00:00:01| | 1 | SORT ORDER BY | | 1 | 23 | 3 (34) |00:00:01| | 2 | TABLE ACCESS BY INDEX ROWID BATCHED| EMPLOYEE| 1|23|2 (0) |00:00:01| |* 3 | INDEX RANGE SCAN | EMP_HIRE_DATE_I | 1 | | 1 (0) |00:00:01| ——————————————————————————————————————————————————————————————————————————————— PLAN_TABLE_OUTPUT ————————————————————————————————————————————————————————————————————————————— Predicate Information (identified by operation id): ——————————————————————————————————————————————————— 3 - access("HIRE_DATE">TO_DATE(' 2016-09-01 00:00:00', 'syyyy-mm-dd hh24:mi:ss')) 15 rows selected. Listing 6 demonstrates an execution plan that uses the EMPLOYEE_WAGE_INC_WORTH_BMI bitmap index. Note that because the query uses a single predicate on the bitmap-indexed column and is performing the COUNT aggregate function, the answer can be obtained from the bitmap index alone and a table access is, therefore, not necessary. Code Listing 6: An execution plan that uses a bitmap index due to the COUNT aggregate function SQL> EXPLAIN PLAN FOR 2 select COUNT(employee_id) employees 3 from employee 4 where wage_increase_worthiness = 'No Raise Yet'; Explained. SQL> select * 2 from TABLE(DBMS_XPLAN.DISPLAY); PLAN_TABLE_OUTPUT ————————————————————————————————————————————————————————————————————————— Plan hash value: 1431199220 ——————————————————————————————————————————————————————————————————————————— | Id | Operation | Name | Rows| Bytes|Cost(%CPU)|Time | ——————————————————————————————————————————————————————————————————————————— | 0 | SELECT STATEMENT | | 1| 26| 1 (0)|00:00:01| | 1 | SORT AGGREGATE | | 1| 26| | | | 2 | BITMAP CONVERSION COUNT | | 6| 156| 1 (0)|00:00:01| |* 3 | BITMAP INDEX FAST FULL SCAN| EMPLOYEE_WAGE_INC_WORTH_BMI| | | | | ——————————————————————————————————————————————————————————————————————————— PLAN_TABLE_OUTPUT —————————————————————————————————————————————————————————————————————————— Predicate Information (identified by operation id): ——————————————————————————————————————————————————— 3 - filter("WAGE_INCREASE_WORTHINESS"='No Raise Yet') 15 rows selected.Summary This article introduced you to bitmap indexes. You discovered how to create them and when they might be an appropriate index choice. You also learned how bitmap indexes should not be used in a database with regular transaction activity but instead in a data warehouse with occasional bulk loads of data. You were introduced to the Oracle Optimizer, SQL statement processing operations, and parsing. You learned what a bind variable is and how it can help reduce parsing activity. Last, you learned about statistics and the creation and display of execution plans. In the next article in this series, you’ll learn more about the Oracle data dictionary and be introduced to SQL statement scripting. LEARN more about relational database design and concepts. Photography by Scott Webb, Unsplash
<urn:uuid:8b8886f9-79d0-472a-b965-96a18a9ad318>
CC-MAIN-2018-26
https://blogs.oracle.com/oraclemagazine/the-cost-of-data-retrieval
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866926.96/warc/CC-MAIN-20180624083011-20180624103011-00271.warc.gz
en
0.756808
4,650
2.796875
3
Reflections occur when light waves are redirected by an object. When we look into the mirror, we see a reflection of ourselves. Light that interacts with the surface of the mirror is reflected. In this image, light from the skyline of the city is reflected off of the surface of the water. When light waves are bent by a medium, they are refracted. In this image a straw appears bent because the light that is illuminating the straw is bent by the water in the glass.
<urn:uuid:456ca4d3-4bc9-4c84-b272-4174d7ade345>
CC-MAIN-2016-36
https://www.sophia.org/tutorials/reflection-and-refraction
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292151.8/warc/CC-MAIN-20160823195812-00007-ip-10-153-172-175.ec2.internal.warc.gz
en
0.937894
99
3.171875
3
Conformal coating applications present a range of challenges to contract manufacturers and original equipment manufacturers (OEMs). Because of miniaturization trends, more creative dispensing techniques are required to maintain accuracy, repeatability and selectivity. Many types of conformal coatings are used to protect sensitive electronic circuitry from harsh environments in automotive, commercial, avionics, military and medical markets. These products come in an endless array of shapes and sizes ranging from large motherboards and complex multi- PCBAs to small modules, tiny PCBs, flex circuits and individual substrates. A growing trend has been the need to address smaller packages, requiring more creative dispensing methods with increased accuracy, repeatability and selectivity. Popular PCB Protecting Method Conformal coatings are used to protect all types of electronic circuitry from moisture, dust, chemicals, solvents or other types of harsh environments. Although they measure only a few mils thick, the coatings also are used to dampen the effects of mechanical and thermal stresses and vibrations. Conformal coatings have also been used to impede dendrite growth, a potential cause of short circuits. Initially, conformal coatings were reserved primarily for expensive aerospace or military applications. Today, however, they are used nearly everywhere. With the explosive growth of portable electronics, increased demand for “smart” consumer appliance controls and continued growth in automotive electronics, conformal coatings are in demand now more than ever. Because conformal coatings are applied in assemblies that often affect critical functions in the end product, quality and reliability are priorities for the engineers using them. By reducing variation in the coating process, quality and reliability are achieved. These variations can be reduced through better process control and feedback systems. Features contribute to better process control for conformal coating There are 3 features contribute to better process control for conformal coating: - The Viscosity Control System (VCS) - Fan-Width Control - Flow Monitoring Viscosity Control System (VCS) A VCS maintains consitent temperature of conformal coating fluids. The system includes a heated re-circuilating fluid circuit to eliminate viscosity changes in temperature-responsive materials. Close-range temperature monitoring keeps the coating process consistent and stable. VOC emissions also may be reduced, depending on the fluid properties. Certain factors such as ambient temperature changes and different material lots cause viscosity fluctuations. These fluctuations affect the performance and consistency of coatings applied to PCBAs. By controlling the temperature of the conformal coating fluid circuit, viscosity fluctuations can be reduced. In a VCS, fluid is heated and re-circulated while being closely monitored and maintained at set parameters. Temperature parameters are monitored with an over-temperature alarm, as well as precise, closed-loop controls to maintain the process temperature at ±1°C. Features and Benefits of a Viscosity Control System |Accurate temperature settings| Maintains constant applicator fluid temperatures (±1°C). Minimize viscosity changes. |Process temperature control| Ensures consistent application. Eliminates influence of ambient temperature fluctuations to minimize viscosity changes. Improved flash-off and reduced tack-free time. |Over-temperature alarm||Protects heated system.| Laser-fan-width control provides closedloop monitoring and control of the conformal coating process. The system automatically verifies and adjusts fan width prior to and/or after the coating operation. Through the use of a laser sensor, the system “looks” at the fan pattern, monitors the results and adjusts fluidfan width automatically (coating pass width). Accuracy is ensured by design. The laser beam makes precise measurements while positioned outside the work cell or dispense area. An auto-calibration feature helps to compensate for beam reflection and lens contamination during operation. Monitoring and controlling the fan width ensures consistent, repeatable coating patterns There are two primary modes of the laser fan width: a quick check and a control width. The quick-check feature measures the fan width and will adjust fluid pressure automatically if the measured fan width is different than the target fan width, but within a user defined error tolerance. If the measured fan width is outside of user-defined error tolerance, a variety of actions can be taken depending on user programmed instructions. In control width, the fan is immediately and automatically adjusted to a user-specified width (without “checking” first). The user teaches the routine prior to running production. Fan-width controls typically are programmed at the beginning of a shift, after normal maintenance or as an error procedure for a quick check that failed. During fan-width control, the applicator is moved into position of the laser-sensor beam, and the center and tip of the coater nozzle are found. The laser sensor monitors the coating pattern width as fluid is dispensed into the drain pan. The software then sends a signal to the pressure controller, increasing pressure to the fluid regulator until the spray pattern breaks the sensor light beam. As the fan pattern breaks the beam, the laser sensor sends a signal to the controller, indicating that the fan spray pattern has reached the required width. Fluid pressure is set and saved. Next, the applicator is moved as it dispenses to either side of the laser beam to confirm the symmetry of the pattern with respect to the centerline of the applicator. If the pattern fits within the softwareconfigurable tolerance, the board is coated. Laser-fan-width control is easily programmed to monitor fan width per board, or in user-defined intervals. During production, the quick-check feature is used to monitor fan width and make pressure adjustments ‘on the fly.’ The quick-check feature takes fewer than two seconds and will ensure that the fan pattern is within userspecified tolerances before coating a board. For more advanced process control, a VCS can be combined with laser-fan-width control. This combination allows users to perform process checks on the spot and as part of pre-programmed, regular equipment operation. Parameter settings are adjusted automatically, without operator intervention. Flow monitoring is another aid in process visibility for conformal coating. A flow monitor measures the volume of material dispensed on a product against an established target with a resolution of ±0.05 cc. The dispenser’s software logs all data related to the amount of material dispensed to a log file and database. Flow monitoring confirms that the correct amount of material has been dispensed. The system triggers an alarm condition when dispensed volume is out of range, allowing the operator to make adjustments to prevent possible defective products. By using stainless steel and non-stick construction, the flow monitor will be compatible with virtually all conformal coating materials. Flow monitoring occurs during production without affecting the cycle rate or increasing material usage. The operator is alerted when an adjustment is required to prevent possible defects. As in other manufacturing processes, the key to quality and reliability in conformal coating is process control. Fortunately for process engineers, multiple automated tools are available to assist them. Having an automated coating system that can control viscosity, measure and control fan width, as well as monitor the flow of material, makes the task that much easier. For more information, please contact GLUDITEC: Hotline: (+84) 969 469 089
<urn:uuid:c1bec667-da75-44dc-9866-042be5641205>
CC-MAIN-2023-50
https://gluditec.com/process-control-methods-for-conformal-coating/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00288.warc.gz
en
0.901372
1,529
2.625
3
Have you ever thrown out old chocolate that had taken on a chalky, white hue, unsure if it was still edible? You're not the only one. Food scientists say the harmless change, known as fat blooming, is a major source of complaints and rejections from chocolate lovers and actually costs the confectionary industry millions, according to a study. The process, which involves fat migrating to chocolate's surface, was also largely a mystery until German scientists decided to take a closer look. They mixed up cocoa, milk powder, cocoa butter, and sugar, ground the mixture to a fine powder, then watched through an X-ray generating synchrotron as sunflower oil was added, Science reports. Within hours, the oil had melted the chocolate crystals, which allowed the fat in cocoa butter to navigate to the surface where it crystallized, turning the usually glossy treat into an unappealing mess. "The technology used to examine the samples shows us both the fat crystals and the pores inside the product, down to a scale of a few nanometers," explains a researcher, who worked alongside scientists from Nestle. "For the first time, we have been able to track in detail the dynamic mechanisms that lead to the creation of fat bloom," another adds. Such a close-up view also revealed clues about how chocolatiers could avoid fat blooming in the future. "One consequence might, for example, be to reduce the porosity of the chocolate during manufacture, so that the fat migrates more slowly," the study author says, per UPI. "Another approach is to limit the amount of fat that is present in a liquid form by storing the product in cool, but not too cold, conditions." If you're really serious about keeping your chocolate looking and tasting its best, store it at an optimal 64 degrees, researchers say. (Scientists are also working on how to make chocolate healthier.) This article originally appeared on Newser: X-Ray Solves Mystery of Chalky ChocolateMore From Newser - Girl's Rare Illness Keeps Her From Aging - Porn, Video Games Causing 'Masculinity Crisis': Shrink - How a Single Number Threatens Technology
<urn:uuid:665b6b4e-d515-42f1-a69d-3fb2341c7aa1>
CC-MAIN-2018-30
http://www.foxnews.com/food-drink/2015/05/11/mystery-chalky-chocolate-solved-via-x-ray.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591837.34/warc/CC-MAIN-20180720213434-20180720233434-00423.warc.gz
en
0.960849
454
2.8125
3
The face of Richard III was unveiled on the Channel 4 documentary "Richard III: The King in the Car Park." His face was reconstructed from the skull found beneath a social services car park that was confirmed as that of the last Plantagenet king. Revealed: This is the face of King Richard III, reconstructed from 3D scans of his skull after the positive identification of his skeleton found beneath a social services car part in Leicester last year. Archaeologists discovered Richard III's skeleton in September on the spot where a church once stood. The facial reconstruction was released following the confirmation that the skeleton unearthed in Leicester was that of the king killed in battle more than 500 years ago. The image is based on a CT scan taken by experts at the University of Leicester, who discovered the king's skeleton with the help of the Richard III Society during an archaeological dig last September. Richard was buried in Greyfriars Church in Leicester with his hands bound together after his death in the Battle of Bosworth in 1485. Ten years later, Henry VII, the victor of the battle, paid for a tomb 'of many-coloured marble' to be built, the location of which, until Richard's skeleton was found in September, was a mystery. The tomb is presumed to have been demolished along with the Church following its dissolution after 1536. Today a social services car park occupies the spot. The facial reconstruction was officially unveiled on 5th February, but it was broadcast on 4th February - the day that Leicester University confirmed that the skeleton is that of Richard III - in the Channel 4 documentary on the find. It reveals the controversial king had a more pleasant, younger and fuller appearance than period portraits reveal - a face far removed from the image of the cold-blooded villain of Shakespeare's play. The 'calm and apparently thoughtful' face is in contrast to the many portrayals of Richard III, showing contorted facial and bodily features some say were created for political reasons following his death. However, with its slightly arched nose and prominent chin, the essential features of the slain king are largely similar to those shown in portraits of Richard, of whom no contemporary portraits exist. Richard III was killed in the Battle of Bosworth in 1485, deposed at the age of just 32 after just two years on the throne by the forces of Henry Tudor, who became King Henry VII, the first Tudor monarch. His body was discovered in a shallow grave just 2ft beneath the concrete car park following a search instigated by Philippa Langley, a member of the Richard III Society. 'It doesn't look like the face of a tyrant. I'm sorry but it doesn't,' she told the documentary on the search last night. 'He's very handsome. It's like you could just talk to him, have a conversation with him right now.' Posthumous portrait: With its arched nose and prominent chin, the features are similar to those shown in this picture of Richard painted in 1520, 35 years after his death Historian and author John Ashdown-Hill, an expert on Richard III's reign, told the BBC that the reconstruction largely matched the prominent features in posthumous representations of the king. 'All the surviving portraits of him - even the very later ones with humped backs and things which were obviously later additions - facially are quite similar [to each other] so it has always been assumed that they were based on a contemporary portrait painted in his lifetime or possibly several portraits painted in his lifetime,' he said. The reconstruction comes after University of Leicester academics yesterday revealed the the king's remains bore the marks of ten injuries inflicted shortly before his death. More gruesome, however, was evidence of ‘humiliation’ injuries, including a cut to the ribcage and a pelvic wound likely caused by an upward thrust of a weapon through his buttock whilst his corpse was being paraded on horseback after the battle. However, what appeared to be a barbed iron arrow head lodged between two vertebrae is believed to be a Roman nail. Richard III was found under a letter R Read more: http://www.dailymail...l#ixzz2K2Ip1Rkh Last edited by Blackleaf; Feb 11th, 2013 at 01:25 PM..
<urn:uuid:6bf1830f-7271-43b6-bbc9-589eeb20e8f0>
CC-MAIN-2013-48
http://forums.canadiancontent.net/news/114176-richard-iii-found-buried-under.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164020217/warc/CC-MAIN-20131204133340-00018-ip-10-33-133-15.ec2.internal.warc.gz
en
0.981806
889
2.75
3
Developing a Model Policy for Allergy at School Around 5-8% of children in the UK live with a food allergy,... In response to queries from concerned parents, we wrote a joint letter with the BSACI and Anaphylaxis Campaign to the Department for Education in England and Scotland about school staff obligations should a pupil require anaphylaxis treatment. Read this letter and the responses here: bit.ly/3iCW2dd Here are some consideration for changes that your school may be planning: If pupils will be eating in classrooms instead of lunch areas, take steps to reduce cross-contamination to prevent accidental exposure to a food allergen on surfaces, including: - Not sharing food - Encouraging hand washing with soap and water before and after eating If pupils and staff are split into cohorts to maintain social distancing, there may be fewer allergy-trained staff on hand to act in an allergic reaction. There fore all staff must be trained and able to identify pupils with allergy. Access to medication The school layout may change to maintain social distancing. Make sure that pupils have access to emergency medication and Adrenaline Auto-Injectors. If the location where medication is stored will change, make sure that staff and pupils. Key actions to help keep children with allergy safe at school during COVID-19 1.Review all children’s allergy management plans with their parents New measures within the school may mean that a child’s plan needs to be adapted. 2.Identify parents of children with allergy and make sure you speak to them before the start of term. Every school is set up differently, so it’s impossible for a parent to know exactly what you are planning without being told, This could cause a great deal of anxiery for the parent and child, Schdule a call and using the information above, reassure the family that you have concidered their child’s need and have procedure in place to keep them safe. 3. Review and renew allergy training where necessary All staff must be able to identify which pupils have allergies. If you are a secondary school, the Whole School Allergy Awareness and Management self-audit or our SAAG programme could help with this training. - Hand sanitiser is not effective at removing allergy proteins – all pupils should wash their hands with soap and water before and after eating. - Going back to school can be an anxious time for pupils with allergy and COVID-19 adds to this stress. - Communication with pupils and their parents is key. Our Understanding Anxiety Factsheet may also help identify a pupil who needs some extra support.
<urn:uuid:c1f358cc-28bf-43eb-b400-4f40eb59b00a>
CC-MAIN-2022-49
https://www.allergyuk.org/resources/covid-19-at-school-keeping-children-with-allergy-safe/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446706285.92/warc/CC-MAIN-20221126080725-20221126110725-00084.warc.gz
en
0.954733
559
2.953125
3
This piece was updated on Dec. 19, 2017, to include additional contact information. WASHINGTON—The Pew Charitable Trusts announced today that it will create a digital platform allowing researchers to share data, ideas, and insights to spur the discovery of innovative new antibiotics needed in the battle against the growing global threat of drug-resistant bacteria, or superbugs. As tough-to-treat bacterial infections continue to emerge across the globe, the number of new antibiotics in development has stagnated. The new Shared Platform for Antibiotic Research and Knowledge (SPARK), a dynamic, cloud-based resource, will integrate research data with analysis by leading experts, and provide an opportunity for real-time collaboration among scientists in industry, academia, government, and the nonprofit sector. “The world urgently needs new antibiotics, because infectious bacteria are developing resistance to antibiotics faster than we are developing new drugs that can defeat them,” said Allan Coukell, senior director of health programs for The Pew Charitable Trusts. “We are losing the race.” “SPARK will provide a virtual laboratory for the scientists still working in this field, so they can share data and insights, learn from past research, avoid reinventing the wheel, and find new inspiration,” added Coukell. Despite a long history of antibiotic research, scientists find it difficult to build on past research findings, which are scattered across the academic literature or not publicly available. The field has also experienced a significant brain drain, losing years of experience as industry research-and-development teams have downsized or shifted to other therapeutic areas. In its pilot phase, SPARK will focus on data relevant to the unique challenges of finding and designing antibiotics that can defeat drug-resistant Gram-negative bacteria, which are among the most dangerous and hardest-to-treat superbugs. “Gaps in basic scientific knowledge have stalled new drug discovery,” said Kathy Talkington, director of Pew’s antibiotic-resistance project. “The critical question of how to get molecules into Gram-negative bacteria and keep them there to kill the pathogen has perplexed researchers for decades. “Answering these kinds of fundamental scientific questions is essential to reinvigorating discovery and development efforts, and protecting future generations from a post-antibiotic era,” added Talkington. SPARK is part of Pew’s ongoing work to advance its Scientific Roadmap for Antibiotic Discovery, which outlined the need to share information, expertise, and materials across the research community. Since publication of the roadmap in 2016, Pew has collaborated with stakeholders to implement the plan, and leading experts have echoed Pew’s call for improved information sharing as a top priority. “Information-sharing platforms like SPARK have been critical for spurring treatment breakthroughs for other disease areas, such as cancer, neglected tropical diseases, and tuberculosis,” said Talkington. “We hope that SPARK will do the same for antibiotic resistance.” SPARK data will initially be curated from publicly available sources, such as published research articles. However, the platform will also have the capability to host and harmonize previously unpublished data and prospective research findings from studies still in progress. Efforts to identify and incorporate such data are already underway. SPARK uses technology developed by Collaborative Drug Discovery Inc., a software company specializing in drug discovery informatics, and is expected to launch within a year. The Pew Charitable Trusts is driven by the power of knowledge to solve today’s most challenging problems. Learn more at pewtrusts.org. Resources for federal, state, and local decision-makers Data-driven state policy innovations across America Answers to common questions about Pew’s publicly available database intended to help scientists build on previous research, generate new insights
<urn:uuid:f9ae698e-ea41-4853-99b4-f6d8c697c25f>
CC-MAIN-2021-31
https://www.pewtrusts.org/en/about/news-room/press-releases-and-statements/2017/08/07/pew-to-launch-information-sharing-platform-to-spur-antibiotic-discovery
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153521.1/warc/CC-MAIN-20210728025548-20210728055548-00642.warc.gz
en
0.928583
793
2.59375
3
Shevchenko National Prize |Shevchenko National Prize| |Awarded for||...the most remarkable works of literature and arts, publicity and journalism...| |Country||Ukrainian SSR / Ukraine| |Presented by||Government of Ukrainian SSR / President of Ukraine| Shevchenko National Prize (Ukrainian: Націона́льна пре́мія Украї́ни і́мені Тараса́ Шевче́нка; also Shevchenko Award) is the highest state prize of Ukraine for works of culture and arts awarded since 1961. It is named after the inspirer of Ukrainian national revival Taras Shevchenko. It is one of the five state prizes of Ukraine that are awarded for achievements in various fields. This section needs additional citations for verification. (October 2016) (Learn how and when to remove this template message) In May 1961 the Soviet Union was honoring on a large scale the memory of Ukrainian Kobzar Taras Hryhorovych Shevchenko. A century from the day of his death became the reason for conducting festive events not only in Ukraine, but throughout the Soviet Union. Thus, the Communist Party of the Soviet Union used the people's love for the great poet with goals of propaganda for "successes of Lenin National Policy" (such as the Declaration of the Rights of the Peoples of Russia), but it had to consider the national sentiments of Ukrainian people. Such atmosphere contributed to that on May 20, 1961 the Council of Ministers of the Ukrainian SSR issued a resolution "About establishing annual Shevchenko Republican Prize". At the same time there was adopted the Provision on prizes and examples of honoring badges with diplomas for laureates; also there was established a government committee headed by Oleksiy Korniychuk, which consisted along with the party's officials prominent figures of Ukrainian culture. It was awarded to the prominent performers of literature, arts, music, theater, cinematography, architecture, and others. As of April 23, 1969 the award was renamed the Shevchenko State Prize of Ukrainian SSR. By the order of the President of Ukraine #800/2000 on June 22, 2000 the award became known as the Shevchenko National Prize. From 1962 to 2007 the award was given to 566 people and eight collective ensembles. Statute of the Award The National Prize is awarded annually by the order of the President of Ukraine. There are up to five prizes in the following nominations: - Literature (fiction or artistic literature) - Literature (non-fiction or documentary and scientifically critical literature) - Journalism and narrative journalism - Performing Arts (theatrical, musical, others) - Other Arts (folk and visual) A special committee is elected to organize a concourse in three stages. Once decided the names of the candidates are forwarded to the State Committee of Awards and Heraldry that petitions them to the President. The Awarded are paid by the Committee of amount size of which is identified annually by the President. The monetary award of the Prize for 2009 was ₴160,000 for each prize. For comparison, in 2008 the Prize money amounted to ₴130,000 which was equivalent to $25,000+. The first award in 1962 was given along with 2,500 Soviet rubles. The monetary award of the Prize in 2010 was confirmed at ₴130,000 which by 40,000 less than the last year (implying that it was ₴170,000). The Party of Regions spokesperson Hanna Herman commented that the funds were awarded only that one that were already on the Shevchenko's Fund. Shevchenko lived modestly, lived in need, and to buy him out of serfdom the Russian Intelligentsia collected 2,500 rubles - she added. The works that seek the National Prize are presented by the Ministry of Culture and Tourism of Ukraine, the Ukrainian National Academy of Science, the Ukrainian Academy of Arts, the Ukrainian artistic unions, and the Ukrainian literally and artistically critical associations. It may be awarded to the citizens of Ukraine as well as with a foreigners. The literary and artistic works that reached the third stage can be nominated for the second time, but no more than two times. The special committee accepts all the works for the National Prize starting the following year from August 1 to November 1 of the current year. The collective authors of a presented work cannot exceed three persons, no more than five for a collective of performers. The participants that performed any administrative, organizational, or counseling functions cannot be included among the laureates. The National Prize is awarded to an author or a performer only once in the lifetime. Field of cinematography During its history the prize was additionally awarded for featured films (until introduction of the Dovzhenko State Prize in 1994). - 1967 for the film Viper to Viktor Ivchenko (film director) - 1971 for the film Family of Kotsyubynsky" to Tymofiy Levchuk (as film director), Oleksandr Levada (as script writer) and Oleksandr Hai (as featured actor) - 1973 for the documentary Soviet Ukraine to Alexander Kosinov (film director), Ihor Pysanko (camera), Mykhailo Tkach (scriptwriter) - 1975 for the feature film To the last minute to Valeriy Isakov (director), Vladimir Belyayev (script writer), Vladislav Dvorzhetsky (featured actor) and Valeriya Zaklunna (featured actress) - 1977 for the films Only «Old Men» Are Going to Battle and Aty-Baty, soldiers chanted to Leonid Bykov (actor) - 1978 for the documentary cinema-trilogy Soviet Ukraine. Years of struggle and victories. to Ihor Hrabovsky (script writer and director), Volodymyr Shevchenko (director), Ihor Malyshevsky (script and diction texts writer) - 1979 for the film Reapers (1978) to Volodymyr Denysenko (film director) - 1980 for the public television documentary Revival, from the book by then-Soviet leader Leonid Brezhnev to script authors Albert Putintsev and Volodymyr Barsuk, cinematographers Oleksandr Buzylevych and Viktor Kushch, and anchorman Vyacheslav Tikhonov - 1982 for the film The Gadfly to Mykola Mashchenko (film director), Sergei Bondarchuk (for role of Cardinal Montanelli), Andrei Kharitonov (leading actor) - 1985 for the film Troubled skies of Spain to Arnoldo Ibañez-Fernandez (film director), Volodymyr Kukorenchuk (cinematographer), Boris Dobrodeyev and Nikolai Shishlin (script authors) - 1986 for the films The night is short and How young we were to Mykhailo Belikov (director and script writer), Oleksiy Levchenko (artistic director) and Vasyl Trushkovsky (camera) - 1986 for the documentaries Army commanders of industry, Commanding corps and Strategy of science to Anton Komarnytsky and Ihor Sabeknykov (script writers), Valentyn Sperkach (film director), Yuri Stakhovsky (cinema) and Ihor Poklad (composer) - 1987 for the film Star of Vavilov to Anatoliy Borsyuk (film director), Serhiy Dyachenko (script writer), Oleksandr Frolov (camera) - 1988 for cartoon series "about the Zaporizhian Cossacks" to Anatoliy Havrylov (cinematography), Volodymyr Dakhno (film director) and Eduard Kirych (character artist) - 1988 for numerous roles in several films to Ivan Mykolaichuk (actor, posthumously) - 1989 for the cinema-trilogy Chornobyl: two colors of time to Ihor Kobryn (film director), Yuri Bordakov (camera), Leonid Muzhuk and Khem Salhanyk (script writers) - 1991 for the film Shadows of Forgotten Ancestors (1964) to Sergei Parajanov (film director, posthumously), Yuri Ilienko (camera), Larysa Kadochnykova (actress) and Heorhiy Yakutovych (artist) - 1991 for the documentaries Open yourself, Taras and In front of an icon to Rolan Serhiyenko (film director), Volodymyr Kostenko (posthumously) and Mykola Shudrya (script writers) and Oleksandr Koval (camera) Before introduction of the State Prize of Ukraine in Architecture in 1991, the Schevchenko National Prize was awarded for architecture as well: - 1971 for Palace "Ukraine" (Kiev) to Yevhenia Marynchenko and Petro Zhylytsky - 1972 for monument "Battle of Glory of the Soviet forces" (Lviv) to Myron Vendzilovych (architect), Dmytro Krvavych (sculptor), Yaroslav Motyka (sculptor), Oleksandr Pirozhkov (artist-monumentalist) - 1973 for monument "Ukraine for liberators" (Luhansk Oblast) to Heorhiy Holovchenko (architect), Ivan Minko (architect), Anatoliy Yehorov (architect), Ivan Chumak (sculptor), Vasyl Fedchenko (sculptor), Viktor Mukhin (sculptor), Ilya Ovcharenko (sculptor) - 1974 for monument of Lesya Ukrainka (Kiev) to Anatoliy Ihnashchenko (architect) and Halyna Kalchenko (sculptor) - 1975 for sculpture portraits of his contemporaries (Korotchenko, Rylsky, Filatov) to Oleksandr Kovaliov - 1977 for monument commemorating the declaration of the Soviet government in Ukraine (Kharkiv) to Ihor Alfyorov (architect), Anatoliy Maksymenko (architect), Mykhailo Ovsyakin (architect), Serhiy Svetlorusov (architect), Eryk Cherkasov (architect), Vasyl Ahibalov (sculptor), Yakov Ryk (sculptor) - 1978 for creation of the Crimea Oblast Music and Drama Theater (Simferopol) to Saniya Afzametdinova (architect), Ernest Bykov (architect), Vitaliy Yudin (architect) - 1978 for monument to the soldiers of the 1st Cavalry Army (Lviv Oblast) to Valentyn Borysenko (sculptor) - 1979 for Complex of the Dnipropetrovsk Historical Museum in the name of D.Yavornytsky (Dnipropetrovsk) to Volodymyr Zuyev (architect and author of the complex reconstruction), Ahrypina Vatchenko (architect), Mykola But (diorama author Battle for Dnieper), Volodymyr Korotkov (museum interior author), Mykola Oviechkin (diorama author Battle for Dnieper), Vitaliy Prokuda (diorama scientific concept author Battle for Dnieper), Volodymyr Ryvin (museum interior author) - 1980 for Silvery residential quarters (Lviv) to Yaroslav Kornilyev (engineer-constructor), Liudmila Nivina (architect), Zinoviy Podlesny (architect), Serhiy Zemyankin (architect) - 1981 for Museum of shipbuilding and fleet (Mykolaiv) to Eduard Shorin (project director), Tamara Huselnykova (architect-restaurateur), Viktor Ivanov (engineer-constructor), Leonid Keranchuk (builder), Mykhailo Oziorny (artist), Viktor Semerniov (artist), Yuri Steshyn (artist), Liudmila Khlopinska (scientific consultant), Halyna Cherednychenko (scientific consultant) - 1981 for Sumy Theater of Drama and Music Comedy in the name of M. Shchepkin to Stepan Slipets (director), Mykhailo Lushpa (architect), Iryna Petrova (engineer-constructor), Andriy Chornodid (architect) - 1982 for creation of Music and Drama Theater in the name of Ivan Franko using the folklore motives (Ivano-Frankivsk) to Leonid Sandler (architect), Dmytro Sosnovy (architect), Vasyl Vilshuk (sculptor), Vasyl Lukashko (carver), Anton Ovchar (red-tree carpenter), Volodymyr Shevchuk (artist) - 1983 for building and improvement of the city of Verkhnodniprovsk (Dnipropetrovsk Oblast) to Anatoliy Antonov (architect), Mykhailo Butenko (ground director), Mykola Lutsenko (architect), Oleksandr Moliverov (architect), Anatoliy Pidvezko (architect), Heorhiy Ratushny (architect), (Vasyl Streltsov) (ground director) - 1983 for restoration of Mariyinsky Palace (Kiev) to Anatoliy Yavorsky (engineer, director of creative collective), Vadym Hlybchenko (technical architect), Iryna Ivanenko (critic), Yevhen Kulikov (sculptor), Lev Novikov (architect), Arkady Khabinsky (engineer), Vitaly Shkliar (architect) - 1983 for high relief "In a family of one" to Vasyl Svida - 1984 for hotel complex "Hradetsky" (Chernihiv) to Valentyn Shtolko (architect, group leader), Alla Hrachiova (architect), Oleksandr Kabatsky (architect), Ihor Liubenko (architect), Volodymyr Ralchenko (architect), Volodymyr Sloboda (engineer-constructor) - 1985 for architecture and artistic design of the Kiev affiliation of Central Lenin museum (Kiev) to Valery Barulenkov (civil engineer), Anatoliy Haydamaka (artist), Vadym Hopkalo (architect), Vadym Hrechyna (architect), Volodymyr Kolomiyets (architect), Vitaliy Miahkov (artist), Leonid Filenko (architect) - 1985 for monument to the heroes of the Horlivka military uprising of 1905 (Donetsk Oblast) to Yevhen Horban (sculptor) - 1985 for complex of the Republican Scientifically Methodical Center of mother and child health protection to Dmytro Popenko (architect, group director), Leonid Los (architect), Iryna Pukhova (engineer-constructor) - 1986 for architecture in the village of Vuzlove (Lviv Oblast) to Ivan-Volodymyr Karpliuk (builder), Viktor Marchenko (architect), Ivan Oksentiuk (architect), Yosyp Parubochy (agronomist-landscaper), Vasyl Skuratovsky (architect), Andriy Shuliar (architect) - 1987 for regional museum (Cherkasy) to Oleksiy Dubovy (science consultant), Oleksandra Stetsenko (design engineer), Leonid Kondratsky, Mykola Sobchuk, Serhiy Fursenko (architects) - 1989 for creation of the Historical-Cultural Preservation in Pereyaslav-Khmelnytsky (Kiev Oblast) to Mykhailo Sikorsky - Shota Rustaveli State Prize — similar prize of Georgia. - Cross of Ivan Mazepa - List of things named after Taras Shevchenko - Shevchenko's Laureates. 1962—2001: Encyclopedic handbook / Editor Mykola Labinsky. — Kiev: Krynytsia, 2001. — 696 p. (Appendix — 12 p.). - Shevchenko's Laureates. 1962—2007: Encyclopedic handbook / Editor Mykola Labinsky. — 2nd edition. — Kiev: Krynytsia, 2007. — 768 p. - Donets, H.P. Shevchenko State prizes of the Ukrainian SSR // Shevchenko dictionary. Volume 1 / Shevchenko Institute of Literature of the Academy of Sciences of the Ukrainian SSR. — Kiev: Ukrainian Soviet Encyclopedia, 1978. — P. 188. - Shevchenko's award or Shevchenko National Prize of Ukraine // Encyclopedia of Literary Studies / Editor Yuriy Kovaliv. — Volume 2. — Kiev: Akademiya, 2007. — P. 583—584. - Art creators of Luhansk region – laureates of the State prize[dead link]. Gorki Luhansk Oblast Universal Scientific Library, 2006 - Klymenko, T., Martyniuk, A. Thought. Work. Reward: Scientific bibliographic index. Franko Zhytomyr State University, 2011. - Poroshenko hand out the Shevchenko prizes. Photo. Ukrinform. 7 November 2014 - Presidential Order of March 2, 2009 Archived May 29, 2009, at the Wayback Machine. (in Ukrainian) - UNIAN March 9, 2010 (in Ukrainian)
<urn:uuid:340982ea-88f6-452d-8cb8-10859362d14a>
CC-MAIN-2018-26
https://en.wikipedia.org/wiki/Shevchenko_National_Prize
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866937.79/warc/CC-MAIN-20180624121927-20180624141927-00036.warc.gz
en
0.877234
3,785
2.5625
3
This piece originally appeared on my Life Apps Brain & Behavior Blog on October 5, 2020. It has been expanded on here. Reward is a complex construct (for more see this excellent overview) but one reasonable definition is that reward refers to the fact that certain environmental stimuli have the ability to elicit approach responses, especially under biologically-based “need” conditions. Put another way: Stimuli that are desirable as a result of a biological need are “rewarding”. Food is rewarding when we are hungry, water when we are thirsty. Our brains are primed to learn about reward, specifically to learn what stimuli and actions in our environment will lead to obtaining outcomes that are necessary for survival - a process known as reinforcement learning. We learn certain behaviors are rewarding as they lead to us obtaining things we need to continue living. Reinforcement learning in its most basic form involves associating a stimulus with a response that then leads to a reward. This type of learning is done by virtually all animals. For example, a lab rat can learn that when a light comes on and it presses a particular lever in a specific environment it receives a food pellet. It learns light + press = reward via the following constituent parts: Light = stimulus Press specific lever after light = response Food pellet = reward And once this learned stimulus-response association is made, the stimulus itself can be perceived as “rewarding” in a process known as incentive salience (more on this later). Stimulus-response learning drives most of the behaviors we think of as “drug addiction” in people. When one is addicted to a drug of abuse, stimuli associated with the use of the drug (think, one’s neighborhood bar or a friend you routinely smoke with when together) can themselves drive drug use behavior. This is true even when the actual use of the drug is no longer “pleasurable” for the addicted individual. In fact, most drug addicted individuals do not find the use of their addicted drugs “pleasurable” any more. This is because addiction is known to progress from a binge/intoxication stage of use to a withdrawal/negative affect stage and finally to a preoccupation/anticipation stage which can then reactivate drug use. Thus, drugs are initially used because they are pleasurable but over time this shifts and individuals use drugs of abuse to relieve negative withdrawal effects and not for pleasure. And, as mentioned above, drug use can be triggered by stimuli that were associated with drug use that promote preoccupation with using the drug even in individuals trying to stop or limit their use. Why does this happen? How can a drug that starts out as pleasurable lead to negative feelings of withdrawal when not used? Well, the brain is very adaptive and quickly modifies the biological environment such that there is less disturbance in dopamine (and other chemical) signaling after drug use. So, while drugs of abuse initially result in a large release of dopamine, this effect moderates with continued use. This change in responsivity to drugs of abuse is tolerance and explains why those addicted to drugs of abuse need to take larger and larger quantities to achieve the same effect. In fact, the continued use of addictive drugs results in notable changes in the brain dopamine system (see figure at right) which promotes a strong biological dependence on them. Much research has shown that dopamine does not signal “reward” (or to be more technical, pleasure) per se but rather is used in learning the various predictors of reinforcement in the environment - reinforcement learning. This concept of dopamine signaling reinforcement learning was most famously demonstrated by the work of Wolfram Schultz, a professor at the University of Cambridge in the UK, who recorded the firing of dopamine-producing neurons (cells) in the brain of primates receiving reinforcing juice rewards. Initially, these neurons fire to unexpected reward (juice) delivery. If a cue (tone or light) perfectly predicts the juice delivery (say 5 seconds before juice delivery), over repeated trials, Schultz found that the dopamine neurons fired in the presence of the cue (or, in psychological speech, conditioned stimulus) and not the reward. And when a reward is not followed by a stimulus previously paired with it, there is an observable dopamine “dip” locked to the time when the reward was expected to occur. See figure, below, from Schultz et al., 1997, illustrating reward prediction signaling in dopamine neurons. Dopamine signals predictors of rewards and not rewards themselves. This concept of dopamine as a reward predictor has been extended to a hypothesis around the role of incentive salience in dopamine release and how this process can lead to craving or wanting behaviors in those addicted to drugs of abuse. An amazing amount of work on this topic from Kent Berridge at the University of Michigan has demonstrated dopamine release is not associated with liking in the sense of a hedonic, pleasurable response but rather dopamine motivates behavior and affects how hard animals are willing to work for rewards (“wanting”). My own work has sought to understand how the release of dopamine after oral d-amphetamine administration in healthy human subjects affects the brain. We found that dopamine release correlates with participants “wanting more” (NOT “liking”) d-amphetamine in three core brain regions often associated with reward and drug-related effects: ventral striatum (VS), ventromedial prefrontal cortex (vmPFC), and insula (see image at left). The VS is a core brain hub of reward valuation along with the vmPFC. Others have also found a relationship between VS dopamine release and “wanting”. The insula is a region of the brain often associated with drug craving/wanting and, in fact, damage to this part of the brain results in a loss of craving for cigarettes in smokers. Future efforts to modulate these craving-related systems and their associated dopamine signals through interventions such as transcranial magnetic stimulation may ultimately help drug-addicted individuals effectively stop their problematic drug use. Hopefully this piece has illustrated the complex role dopamine plays in signaling reward. Research that has emerged over the last few decades using sophisticated techniques to measure brain signaling in animals and humans has implicated dopamine in reinforcement learning processes and, by extensive the incentive salience of cues associated with rewards. The role of dopamine in signaling what stimuli predict reward is hijacked and pushed into overdrive by drugs of abuse that themselves release dopamine. Thus, after repeated pairings of stimuli and drug rewards, the brain adapts to respond powerfully to drug-related stimuli and cues, prompting craving in addicted individuals. Not everyone is as susceptible to these dopamine-mediated learning processes, though. How individual differences in biology ultimately map onto risk for drug addiction is a matter of intense interest in the field of neuroscience but is beyond the scope of this current post. For the time being, I encourage you to explore the references below for more on the complex and nuanced role dopamine plays in reward and learning processes. - A Neural Substrate of Prediction and Reward - Neurobiology of addiction: A neurocircuitry analysis - Liking, Wanting and the Incentive-Sensitization Theory of Addiction - Pleasure Systems in the Brain - Learning, Reward, and Decision Making - Neural mechanisms underlying the vulnerability to develop compulsive drug-seeking habits and addiction - Dopaminergic Mechanisms in Actions and Habits - Imaging genetics and the neurobiological basis of individual differences in vulnerability to addiction
<urn:uuid:28d42aee-2fc4-4e01-b533-90c87431b542>
CC-MAIN-2023-23
https://www.christophertsmith.com/reflections/archives/11-2020
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00399.warc.gz
en
0.942155
1,563
3.609375
4
Artificer is a person employed in manufacturing any kind of goods or wares, such as those of iron, brass, wool, See . Of this description are smiths, braziers, and weavers. They are distinguished from artists, by exercising professions which require an inferior degree of taste and genius; on which account they might more properly be called artisans. By the English laws, artificers in wool, iron, steel, brass, or other metal, leaving the kingdom, and departing to a foreign country, with-out license, are liable to be imprisoned for three months, and fined in a sum not exceeding one hundred pounds. Those who go abroad, and do not return on receiving notice from our Ambassadors, are disabled from holding land by descent or devise; from receiving any legacy, etc. and are deemed aliens. A penalty is also inflicted on those who seduce artificers to quit their native soil. The author of an excellent treatise "On the Laws and Policy of England, " published in 1765, on considering the effects which plenty and scarcity of provisions have on our manufacturers, justly observes, that we should endeavour to render the expence of living cheaper than it is abroad, in order to reduce the price of labour, which will enable us to offer our merchandizes at a cheaper rate, and consequently obtain a preference at all the foreign markets : for as plenty or scarcity will determine the price of provisions, so the price of provisions will in general regulate the price of Labour ; and this again will influence the price of all commodities and productions. Hence he asserts, that it will avail but little, to impose penalties on those who raise the price of provisions, unless the same be also inflicted on such persons as combine to raise the price of labour; that a general liberty granted to produce our necessary provisions, will procure us a general plenty for sale ; that a general indulgence allowed to sale, will reduce them to a general cheapness ; that a general cheapness will enable our poor to work, in every occupation upon more moderate terms - an expedient the most necessary in this country ; because, as Englishmen will not submit to that coarse fare to which some of our neighbours are accustomed, a reduction of the price of provisions is the only method we can resort to, for an abatement in the price of labour. These remarks are peculiarly applicable to the present rimes, when every description of artisans are combining to raise the price of their labour ; the natural consequence of which is, that an almost entire stagnation has taken place in many of the principal trades exercised in the metropolis. It is not our province to enter on an investigation of the justness of those claims made by the different journeymen. In some manufactures and trades, the law has limited their demands ; in others, they are submitted to the decision of a court of justice ; but, as the latter is both an expensive and tedious experiment, on account of the difficulty of procuring the necessary information, the evil fre-quently remains without redress. Under the ancient regime of France, the magistrates had the power of deciding all disputes between masters and journeymen, without the interference of a solicitor or counsel: this measure, though apparently despotic, Was at-tended with the best effects, inasmuch as the public was not liable to be injured by the conspiracy of a few individuals.
<urn:uuid:94f2e204-48ab-4afa-893e-db9eb757980f>
CC-MAIN-2021-49
https://chestofbooks.com/reference/The-Domestic-Encyclopaedia-Vol1/Artificer.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362918.89/warc/CC-MAIN-20211203182358-20211203212358-00272.warc.gz
en
0.952978
698
2.890625
3
Nanoparticles used to brighten the color of meat could negatively impact human gut health, revealed research conducted in broiler chicken eggs. The study, published in the Journal of Antioxidants, focused on four specific metal oxide nanoparticles. Interest in nanoparticles in food additives has become widespread in recent years, however little is known about long-term effects on the human gastrointestinal tract. Broiler eggs as a research model To investigate how nanoparticles affect the human gut, the researchers injected the additives into the amniotic sac of broiler eggs. Broiler eggs were chosen as a research model for a variety of reasons. First, the chicken intestinal tract contains similar microbiota and bacterial components to those found in the human digestive system. In addition, broilers are bred to grow rapidly, which means that any results will be seen quickly. “The chicken (Gallus gallus) model is an established and robust method for quantifying nutrient bioavailability, brush border enzyme activity, microbiome alterations and microbiota metabolism,” Gretchen Mahler, professor of biomedical engineering and interim vice provost and dean of the Graduate School, Binghamton University, explained. “Chickens have been used, by our group and others, in the study of several human diseases including autoimmunity, the microbiome, and micronutrient deficiencies.” Nanoparticle effects on human gut health Once the chicks hatched, the researchers studied the gene expression, microbiota composition and structure of the small intestine, liver and microbiome. They found that two of the nanoparticles – silicone dioxide and titanium dioxide – negatively impacted chick gut health. The others – zinc oxide and iron oxide – resulted in more neutral effects. “In this study we were working with an in ovo injection method, which is an efficient way to screen a larger number of conditions and doses of nanoparticles. In the future, we plan to screen additional types of nanoparticles that are commonly found in food, and to perform studies on adult chickens,” said Mahler. Potential implications for poultry diets The findings may have implications for poultry diets. “Some of the food grade nanoparticles we were studying were beneficial to poultry. Food-grade Fe₂O₃ nanoparticles were found to be a possible option for iron fortification,” she added.
<urn:uuid:ca88063b-30d7-4abb-91d5-447fe8311421>
CC-MAIN-2023-40
https://www.wattagnet.com/poultry-future/new-technologies/article/15540090/chicken-study-tests-food-additive-effects-on-human-gut
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510368.33/warc/CC-MAIN-20230928063033-20230928093033-00691.warc.gz
en
0.942935
486
3.421875
3
A team at University of Florida has developed a new thin film technology that can convert infrared light into visible light. In layman terms, we can stop eating carrots to improve our night vision because it might soon be applied cheaply to our eye glasses, car windshields, even our cell phones, and it could be here in a little as 18 months. Current night vision devices use huge amounts of electricity (thousands of volts) and heavy glass lenses that create a vacuum in order to work. Adapted from flat screen television technology, the new film works with no vacuum and uses energy-efficient, organic LEDs. This keeps weight down, with a full scale device potentially weighing as little as 10 grams being only a few microns thick. It could take as little as 18 months to upscale the the device for practical applications and it may revolutionize night vision goggles and other military applications, not to mention have wide-ranging domestic applications such as eye-glasses and cars. Researchers also want to expand the technology to measure heat. Such a phone could be used to detect fever, heat loss from homes could be pin-pointed to reduce energy consumption, or a "smart" windshield could make pedestrians easier to spot. With the cheaper technology the possibilities are endless. The research from the University of Florida was outlined recently in the journal Advanced Materials.
<urn:uuid:e8e8fdbc-38ef-48eb-a2d0-28acefac546d>
CC-MAIN-2015-32
http://www.gizmag.com/night-vision-for-spectacles-cars-phone/14974/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988311.72/warc/CC-MAIN-20150728002308-00165-ip-10-236-191-2.ec2.internal.warc.gz
en
0.95486
273
3.296875
3
In English, many things are named after a particular country – but have you ever wondered what those things are called in those countries? 1(fit/attack) epiléptico(fit/attack) de epilepsiashe's epileptic — es epiléptica - A student died after developing a rare compulsive disorder that led him to seek hospital treatment he did not need for fake epileptic fits. - He suffers from epileptic fits, lower limb motor neurone problems, illnesses relating to cerebral palsy and other neurological problems. - It is agreed that there is a continuing risk of his suffering epileptic fits, despite taking medication. - A side effect of his condition is that he suffers epileptic fits which recently forced him to spend time as an intensive care patient. - In severe cases there may be weakness of the muscles, paralysis, speech disturbances, double vision or partial loss of the field of vision, and epileptic fits. - They are also usually on medication, being prone to epileptic fits. - During the Middle Ages, Europeans used walnuts to combat fevers, witchcraft, epileptic fits and even to prevent lightning. - Family and friends say he was prone to epileptic fits, which were often brought on after binge drinking, though no alcohol was found in his blood after he died. - The old charge, that he was an epileptic and that his revelations occurred when he was in the grip of epileptic fits, is now universally rejected by all serious scholars. - The moments of crisis are filmed like epileptic fits. - He worked as a farm labourer until he started to have a set of epileptic fits and he expired, as I say, eleven and a half years after the accident. - While it may cause epileptic fits or heart palpitations in the uninitiated, for the dedicated they just don't make them as good as this one. - These have not been proved to cause epileptic fits, but they can certainly be a source of irritation to other divers. - He also suffers from epileptic fits and may have Asperger's Syndrome. - For anyone who has not experienced one before, epileptic fits can be terrifying. - Computer games may be worse than TV because of the patterns and frequencies they use, but either may trigger epileptic fits. - She cannot work as she now suffers frequent, violent epileptic fits. - Occasionally, some individuals say they have blurred vision, feelings of unreality, faints, blackouts or even epileptic fits. - Febrile convulsions can be frightening for parents, especially as they look like epileptic fits. - At 18 months she began to suffer regular epileptic fits, caused by a non malignant tumour on her brain. 1epiléptico masculineepiléptica feminine English has borrowed many of the following foreign expressions of parting, so you’ve probably encountered some of these ways to say goodbye in other languages. Many words formed by the addition of the suffix –ster are now obsolete - which ones are due a resurgence? As their breed names often attest, dogs are a truly international bunch. Let’s take a look at 12 different dog breed names and their backstories.
<urn:uuid:474c2549-6130-4b68-8e62-704c66e468d8>
CC-MAIN-2017-26
https://es.oxforddictionaries.com/translate/english-spanish/epileptic
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320823.40/warc/CC-MAIN-20170626152050-20170626172050-00328.warc.gz
en
0.970042
680
3.046875
3
Including energy codes in building codes is a policy option for reducing energy consumption that has received increased attention since the 1970s, driven by concerns about energy security and climate change. How much have such building energy codes helped reduce energy consumption, and are they wise policies from the standpoint of society broadly conceived? This chapter introduces the major questions in the area of energy efficiency regulations in the residential sector, and then illustrates an economic technique known as cost-benefit analysis (CBA) by examining a recently published economic analysis of Florida’s energy codes.1Grant D. Jacobsen and Matthew J. Kotchen, “Are Building Codes Effective at Saving Energy? Evidence from Residential Billing Data in Florida,” Review of Economics and Statistics 95, no. 1 (March 2013): 34–49. My intention in presenting the case study from Florida is to illustrate the main steps in CBA, which is widely used throughout regulatory analysis. This chapter thus can be used by students, teachers, policy analysts, and others who wish to know more about how CBA could be applied to any of the regulations discussed in this volume. The practice of CBA integrates skills from across the theoretical and empirical subfields of economics, and consequently the study of CBA presents an excellent opportunity for meaningful student research projects. In the conclusion, I provide guidance that should be useful to students and professionals beginning an original CBA, and to teachers who are guiding students in this exercise. Economists generally agree that CBA is an essential tool for selecting efficient regulations. CBA is often a part of regulatory impact analysis. It has been required for major regulations at the federal level for decades, and—at the subnational level—more and more states and cities have started to apply CBA to their public decision-making processes. For example, CBA is used at the California Department of Transportation to allocate funds among competing roadway improvement proposals.2Matthew J. Holian and Ralph McLaughlin, “Benefit-Cost Analysis for Transportation Planning and Public Policy: Towards Multimodal Demand Modeling” (MTI Report 12-42, Mineta Transportation Institute, San Jose, CA, August 2016). Building energy codes are a specific example of a more general category of public policies: technical and performance standards. Similar types of regulations exist for automobiles, appliances, buildings, construction equipment, and a host of other energy-consuming products. For example, the Corporate Average Fuel Economy (CAFE) program requires automobile manufacturers to achieve specified levels of fuel efficiency, as measured by miles per gallon. Though performance standards like the CAFE standards are intended to be fuel-saving policies, they can have unintended consequences. As cars use less gasoline per mile, the effective price of driving falls and people drive more—this is the so-called rebound effect.3Kenneth Gillingham, “Rebound Effects,” in The New Palgrave Dictionary of Economics, edited by Palgrave Macmillan (London: Palgrave Macmillan, 2014). https://doi.org/10.1057/978-1-349-95121-5_2875-1. The increased driving causes congestion, pollution, and traffic accidents, which were not goals of the energy efficiency policy. It is even conceivable that more fuel-efficient vehicles could encourage suburban sprawl, as households find it easier to sustain car-based lifestyles. Manufacturers of appliances from refrigerators to air conditioners have been required to meet increasingly tight standards since the 1970s. The average annual energy consumption of a refrigerator has fallen from 1,800 kilowatt hours in 1976 to 450 in 2001, a dramatic increase in efficiency.4Arthur H. Rosenfeld and Deborah Poskanzer, “A Graph Is Worth a Thousand Gigawatthours: How California Came to Lead the United States in Energy Efficiency (Innovations Case Narrative: The California Effect),” Innovations: Technology, Governance, Globalization 4, no. 4 (2009): 57–79. What is responsible for the rise in efficiency of cars and refrigerators? Regulation may have played a role, but—as Arthur Rosenfeld and Deborah Poskanzer note—“the other factor contributing to the sudden drop in refrigerator energy use in the mid-1970s was the advent of a new manufacturing technology, blown-in foam insulation.”5Rosenfeld and Poskanzer, “A Graph Is Worth a Thousand Gigawatthours,” 70. This example illustrates the empirical challenge of determining the independent impact of energy codes on energy demand by just examining trends in average fuel use. In the next section, I highlight two empirical techniques, randomized controlled experiments and multiple regression, that analysts can use to reach more accurate estimates of the causal effect of a policy on an outcome of interest. State and local governments use energy codes to apply energy efficiency standards in the residential sector. We can distinguish between building codes in general and building energy codes in particular. Building codes cover many aspects of housing structures, including plumbing, accessibility, and safety. Energy codes are but one part of the overall set of regulations with which home builders have to comply. California and Florida were among the first states to adopt building energy codes. Economists Kevin Novan, Aaron Smith, and Tianxia Zhou discuss how builders in California complied with the initial energy codes.6Kevin Novan, Aaron Smith, and Tianxia Zhou, “Residential Building Codes Do Save Energy: Evidence from Hourly Smart-Meter Data” (E2e Working Paper 031, E2e Project, June 2017). They calculate that building a 1,620-square-foot, fully compliant house in Sacramento would have cost $1,565 more than a noncompliant house (in 1980 dollars), owing to additional ceiling and wall insulation and to infiltration control (e.g., caulking and weather-stripping sources of air leakage). Its builders would have also been required to install a smaller air conditioner. Every few years, states with energy codes tend to strengthen them. Grant Jacobsen and Matthew Kotchen discuss how in Florida, a builder had multiple options for adjusting a home design feature to bring it into compliance when that state’s energy codes were strengthened in 2002.7Jacobsen and Kotchen, “Are Building Codes Effective at Saving Energy?” One option was installing low-emissivity windows, which would have increased costs of a standard Florida home by between $675 and $1,012. The problem of asymmetric information, where a builder knows more about the home’s design than the home buyer or tenants do, provides a market failure rationale for building codes. It is not easy for a home buyer or renter to see how much insulation is behind the walls, for example, and so if buildings are less energy efficient than they would be in a world without these types of informational challenges, both building codes in general and energy codes in particular could be justified on efficiency grounds. Another motivation for building codes is energy cost myopia, a form of behavioral bias. This refers to situations where home buyers do not account for the long-term energy costs when they buy a home—they consider only the up-front costs. These are situations where consumers are unable to rationally consider future costs. This chapter will introduce a concept called discounting, and we will see that energy cost myopia could be modeled as homeowners behaving as if they have an irrationally high discount rate. Of course, to the extent that discount rates reflect personal preferences, an analyst imposing the “correct” discount rate on a homeowner is an example of paternalism—and there is no consensus about what discount rate a homeowner “should” have. In chapter 13 of this volume, James Broughel discusses the topic of energy cost myopia in more detail. While asymmetric information and energy cost myopia are two of the most prominent justifications for energy codes, there are also some ways codes could be counterproductive in terms of their intended purpose. The rebound effect, discussed above in the context of cars, also pertains to homes. If homes are more energy efficient, the occupants may use the air conditioner more than they otherwise would. They may decide to bake a cake on a hot day, whereas otherwise they would have postponed baking until the sun went down. It can be time consuming to open and close all the windows in a large home. If the home is energy efficient, a household may decide to just keep the windows closed and use the air conditioner all the time, whereas otherwise they would have opened and closed the windows on the basis of the outside air temperature. Energy efficiency regulations could also be harmful if they lull voters into a sense of complacency regarding energy consumption. This is a political economy point, related to one made by economist Arik Levinson on a Freakonomics Radio podcast episode with Stephen Dubner.8Stephen J. Dubner, “How Efficient Is Energy Efficiency?,” February 5, 2015, in Freakonomics Radio, podcast, https://freakonomics.com/podcast/how-efficient-is-energy-efficiency-a-new-freakonomics-radio-podcast/. Voters seem unwilling to enact a carbon tax, perhaps because they assume the government is doing enough through energy efficiency regulations. The subfield of economics known as public choice emphasizes the possibility of so-called regulatory capture. Perhaps the home builders that can most easily comply with energy codes (likely the larger builders with more ability to navigate regulations) lobby for making the codes stricter because they know this will make smaller builders less competitive. If the regulatory process is “captured” by private interests, this would obviously reduce the efficiency of the new construction segment of housing markets. A final issue that has received increased attention recently is the issue of distributional effects. Are energy codes and CAFE standards more equitable than energy or carbon taxes? In the context of homes, economists Chris Bruegge, Tatyana Deryugina, and Erica Myers find that “building energy codes result in more undesirable distortions for lower-income households.”9Chris Bruegge, Tatyana Deryugina, and Erica Myers, “The Distributional Effects of Building Energy Codes,” Journal of the Association of Environmental and Resource Economists 6, no. S1 (2019): S95. In the context of automobiles, Lucas Davis and Christopher Knittel find that “fuel economy standards are more regressive than a gasoline tax with revenues returned lump sum.” They conclude that “it is difficult to argue for fuel economy standards on the basis of distributional concerns.”10Lucas W. Davis and Christopher R. Knittel, “Are Fuel Economy Standards Regressive?,” Journal of the Association of Environmental and Resource Economists 6, no. S1 (2019): S61. A typical view among economists is that there are often ways of reducing energy consumption that are less costly than energy efficiency regulations. In the case of CAFE standards, most of the top economists would prefer a gasoline tax over fuel economy performance standards.11Davis and Knittel, “Are Fuel Economy Standards Regressive?” Nobel laureate William Nordhaus writes about energy codes and related approaches that they “can supplement and buttress more comprehensive greenhouse-gas emissions limits or carbon taxes. However, they are inefficient because they require spending substantial sums for minimal impacts.”12William D. Nordhaus, The Climate Casino: Risk, Uncertainty, and Economics for a Warming World New Haven: Yale University Press, 2013), 261. There may be rationales for some energy codes, especially in a world where we do not have carbon taxes, but regulators should be sensitive to the costs energy codes impose on builders. The costs and benefits of energy codes are the topics of the next section. Evaluating Building Energy Codes: A Case Study This section describes a recent economic analysis of building energy codes in Florida, which was carried out by Grant Jacobsen and Matthew Kotchen.13Jacobsen and Kotchen, “Are Building Codes Effective at Saving Energy?” Jacobsen and Kotchen’s analysis (hereinafter referred to as the JK analysis) has a lot in common with cost-benefit analysis, one specific type of economic analysis. Other methods of economic analysis include economic impact analysis and fiscal impact analysis, which are often mistakenly described as CBA. One of the goals is to section is to describe what CBA is, so a reader will be able to recognize when an analysis that is described as a CBA is in fact something else.14The focus in CBA is on human welfare broadly conceived, while economic impact analysis and fiscal impact analysis are narrower and focus on specific impacts. For example, fiscal impact analysis may focus on the impact of some policy or program on the state government’s budget, while economic impact analysis may focus on the policy or program’s impact on GDP. CBA, on the other hand, recognizes that social welfare can go up even as state budgets and GDP go down. For an example of economic impact analysis, see Anoshua Chaudhuri and Susan G. Zieff, “Do Open Streets Initiatives Impact Local Businesses? The Case of Sunday Streets in San Francisco, California,” Journal of Transport Health 2, no. 4 (2015): 529–39. For an example of fiscal impact analysis, see Dennis P. Culhane, Stephen Metraux, and Trevor Hadley, “Public Service Reductions Associated with Placement of Homeless Persons with Severe Mental Illness in Supportive Housing,” Housing Policy Debate 13, no. 1 (2002): 107–63. CBAs are typically carried out in one of two settings. First, government agencies may commission CBAs or carry them out themselves. These studies typically strive to be comprehensive and adhere closely to the principles of CBA, but the quality of government CBAs varies widely. Second, academic journals sometimes publish CBAs, and while these may be comprehensive, they are usually shorter than the government-sponsored analyses. One reason for this is that academic studies often focus on one specific aspect of the policy in question. For example, the focus of the JK study was empirically estimating the impact of policy on energy demand. Jacobsen and Kotchen carry out an economic analysis as a secondary part of their study—six paragraphs out of the 16-page article. The fact that the JK analysis has relatively few moving parts is a virtue for my purposes, because it makes it an ideal candidate for an introduction to CBA. Most CBAs share a common set of general features. Leading textbook authors Anthony Boardman, David Greenberg, Aidan Vining, and David Weimer describe them in a widely cited list containing nine steps:15Quoted from Anthony E. Boardman et al., Cost-Benefit Analysis: Concepts and Practice (Cambridge: Cambridge University Press, 2017), 6. - “Specify the set of alternative projects.” - “Decide whose benefits and costs count (standing).” - “Catalogue the impacts and select measurement indicators.” - “Predict the impacts quantitatively over the life of the project.” - “Monetize (attach dollar values to) all impacts.” - “Discount benefits and costs to obtain present values.” - “Compute the net present value of each alternative.” - “Perform a sensitivity analysis.” - “Make a recommendation.” This list, or minor variations on it, is widely used in the literature. For example, in the context of CBA of crime, the authors of one 2016 book describe an essentially identical list that has ten steps.16Matthew Manning et al., Economic Analysis and Efficiency in Policing, Criminal Justice and Crime Reduction: What Works? London: Palgrave Macmillan, 2016), 36. My own opinion is that steps 6 and 7 could be combined, making this a list of eight steps. I use this list to organize the discussion that follows. Jacobsen and Kotchen examine a change to Florida’s energy codes. Florida initially adopted energy codes in 1978 and strengthened them in 2002. The details of Florida’s 2002 energy code change are complicated, but—as a simplification—JK frame the policy as requiring new homes to use more expensive windows with a low-emissivity (low-E) coating, which should in turn reduce electricity and natural gas demand. This requirement was expected to lower household energy bills. In terms of CBA step 1, one set of alternatives facing policymakers in 2002 was to change the code (require low-E windows) or not to change it. This set has only two options, and Jacobsen and Kotchen do not discuss whether policymakers at the time considered stronger or weaker versions of the code or other completely different policy instruments to promote energy efficiency, such as taxes or cap and trade. If these alternatives were included in an analysis, the set of alternatives would be larger than two. Many government-sponsored CBAs specify multiple alternatives, while academic CBAs are often less comprehensive in terms of alternatives. In CBA step 2, standing refers to whose preferences count. This is a deeply philosophical question, but it is usually decided in CBAs on the basis of practical considerations. For example, a CBA conducted by a government agency may count costs and benefits to US citizens only. However, some economists hold that all impacted parties should have standing.17Diana Fuguitt and Shanton J. Wilcox, Cost-Benefit Analysis for Public Sector Decision Makers (Westport, CT: Greenwood, 1999), 53. As we see next, the JK analysis incorporates negative externalities to third parties from the emissions produced by the burning of fossil fuels. Thus their implicit delineation of standing is a global one, although they do also consider a case where only the homeowner has standing, and a case that could be described as one where only citizens have standing. CBA step 3 has to do with cataloging impacts. The JK analysis includes (1) the additional resources builders use in complying with the code, (2) the reduction in energy used by households, and (3) the reduction in negative externalities associated with producing the energy. Examples of these externalities include the suffering of third parties who breathe in sulfur dioxide produced during electricity generation and smaller catches for fishers because of ocean acidification caused by climate change. Other potential impacts that Jacobsen and Kotchen do not catalog include the impact of more or less comfortable indoor temperatures.18This impact was included in the analysis in Meredith Fowlie, Michael Greenstone, and Catherine Wolfram, “Do Energy Efficiency Investments Deliver? Evidence from the Weatherization Assistance Program,” Quarterly Journal of Economics 133, no. 3 (2018): 1597–644. CBA step 4 has to do with predicting impacts. Empirical training in causal inference is critical to doing this step well. Correlation is not causation, and the researcher needs to determine what impact was actually caused by the policy. It is not enough to discover that energy use was lower in homes built after energy codes were strengthened, because it is possible that other things changed along with regulations. For example, if for some reason homes were smaller on average after the codes were strengthened, it might appear that the codes were responsible for an observed lower energy use, but in fact the reason was that the smaller homes required less energy to heat and cool.19For further discussion, see Matthew J. Holian, “The Impact of Building Energy Codes on Household Electricity Consumption,” Economics Letters 186, no. 108841 (January 2020): 1-4. In this piece I discuss the exact case mentioned here, where home size changes over time along with energy efficiency, and show how multiple regression techniques can be used to estimate causal effects in this setting. One technique analysts use to estimate impacts is to get data and estimate impacts themselves. Another technique is to use “the literature.” By the literature, I mean all the studies that have been written on a particular topic. An analyst who searches these studies will find estimates of impacts that have been produced by others. Because impact estimation is such a crucial step in any CBA, I discuss methods for this step in more detail in the appendix. Jacobsen and Kotchen used residential billing data to estimate a multiple regression model that found that the change in Florida’s energy code caused electricity consumption to fall by 48 kilowatt-hours (kWh) per month and natural gas consumption to fall by 1.5 therms. They then use the literature to find so-called plug-in values to estimate the size of reduced emissions. The four categories of emissions they include are carbon dioxide, sulfur dioxide, nitrous oxide, and particulates. Emissions factors are numbers drawn from the literature that are used to estimate the reduction in emissions from each energy source. For example, the JK analysis cites a study that found burning 1 therm of natural gas generates 0.006 tons of carbon dioxide. If households reduce natural gas use by 1.5 therms per month, carbon dioxide emissions will fall by 1.5 × 0.006, or 0.009 tons of carbon dioxide monthly. CBA step 5 involves monetization—assigning a dollar amount to an impact to represent its social value. The stricter energy codes require builders to use low-E windows, and monetization involves valuing the additional resources that go into producing these windows. The JK analysis finds an estimate in the literature indicating the low-E windows are 10 percent more expensive than non-low-E windows, and calculates that the change to the code has added between $675 and $1,012 to overall construction costs for a standard home. Note that the increase in construction costs might not exactly correspond to the social costs of the resources. For example, imagine that the window manufacturing company is a monopoly and there is only a trivial increase in its cost from producing the low-E windows. In that case the higher price paid by builders to the window manufacturer would be a transfer from the builder to the window manufacturer, not a social cost. Now, it is unlikely that the window producer is a monopoly, and the technique Jacobsen and Kotchen adopt for monetizing the impact seems very reasonable to me—but I construct this example to illustrate that there are cases where a researcher cannot just use market prices in the monetization step. To monetize the energy use reduction impact, Jacobsen and Kotchen multiply the energy savings (48 kWh of electricity and 1.5 therms of natural gas per month) by the marginal price an average household pays (14.6 cents per kWh for electricity and $1.22 per therm for natural gas) to arrive at annual energy savings of $106.20The details behind this calculation are 48 kWh × 12 months × 14.6 cents = $84 annual electricity cost savings. For natural gas, the calculation is 1.5 therms × 12 months × $1.22 = $21.96. Adding these together, $22 + $84 = $106, which is the value of the annual energy savings. As with the construction impact discussed in the preceding paragraph, this seems to be a reasonable way of monetizing the social value of the saved resources, but it may not be perfect. For example, if the energy price consumers pay incorporates government taxes, then the price consumers pay will overstate the social value of the resource savings, because part of the price is a transfer rather than a resource cost.21It is a subtle point, but the reason monetizing with market prices is appealing is because neoclassical perfect competition theory teaches us that price equals marginal cost. Perfect competition is a theoretical condition not always met in the real world, however, and there are times when the use of market prices is not appropriate. In these cases, analysts have to be creative in calculating a so-called shadow price, which is simply the true social value of an impact. The third set of impacts that must be monetized are the four types of emissions. Carbon dioxide causes climate change and the other three are associated with public health problems. (Particulates—essentially soot—can cause asthma, for example.) Earlier I discussed how Jacobsen and Kotchen estimate that carbon dioxide emissions fall by 0.009 tons each month, or 0.108 tons annually, because of reductions in natural gas use. The social cost of carbon has been calculated by William Nordhaus as $31 per ton of carbon dioxide (in 2010 dollars);22Nordhaus, William D. “Revisiting the Social Cost of Carbon,” Proceedings of the National Academy of Sciences of the United States of America 114, no. 7 (February 2017): 1518–23. thus one way of monetizing the reduction in natural gas use is by multiplying 0.108 by $31, yielding an annual climate change mitigation benefit of $3.35. Jacobsen and Kotchen do not report the marginal damage figures they used for carbon, but it is possible to calculate these values from the information they do present.23Table 5 in Jacobsen and Kotchen, “Are Building Codes Effective at Saving Energy?” It turns out that they used a low estimate of $7.68 and high estimate of $93.70, in 2009 dollars; thus the $31 figure from Nordhaus lies on the lower end of the range they considered.24Jacobsen and Kotchen’s table 5 indicated the low- and high-end figures for carbon dioxide reduction owing to a fall in natural gas use as $0.83 and $10.12, respectively. Thus the marginal damage figures are calculated as follows: $0.83 ÷ 0.108 = $7.68, and $10.12 ÷ 0.108 = $93.70. I have verified with the authors that these were the marginal damage figures they used, and I thank Matthew Kotchen for sharing his analysis file with me. Hence the high-end estimate of the social value of reduced carbon emissions from natural gas is 0.108 tons times $93.70, or $10.12 annually. The JK analysis applies different marginal damage estimates to each pollutant and each fuel source, and finds that all together, reductions in the four types of emissions, owing to a household’s lower electricity and natural gas demand, are valued at between $14.15 and $84.84 annually. CBA steps 6 and 7 can be combined. Discounting refers to accounting for the fact that a dollar saved next year is not as valuable as a dollar saved now. Net present value (NPV) is the most widely used of several decision criteria in CBA. In fact, because the JK analysis was, strictly speaking, not a CBA, Jacobsen and Kotchen do not present NPV calculations. Instead they discuss three different types of payback periods. Besides NPV and the payback period, other decision criteria one sometimes encounters include the internal rate of return and the benefit-cost ratio. However, there are several advantages to NPV that make it the most widely used and accepted decision criterion.25Fuguitt and Wilcox, Cost-Benefit Analysis. If NPV is positive, this indicates that the investment, policy, project, or program produces more benefits than costs over its lifetime. Using all the numbers presented in the JK analysis and discussed up until now, it is possible to calculate the NPV of the change in Florida’s energy codes for a household in Gainesville: We can write this another way by specifying a time horizon. Say t = 1 and T = 10. Then we can express NPV using the equation below, which is less compact but avoids the use of the summation operator: In both equations, $675 is the low-end estimate of the social cost of the low-E windows, $106 is the estimate of the social benefit of energy resource savings, and $84 is the high-end estimate of the social benefit of the avoided emissions. Because the NPV uses both the low-end cost estimate and high-end benefit estimate, it can be said to be a best-case scenario NPV. There are two variables in this equation: the time horizon (t and T) and the discount rate (r), which affects how valuable future benefits are in the present. Like other decisions in CBA, the choice of a discount rate can be highly philosophical, but in practice analysts usually adopt a market interest rate. The analyst selects the time horizon by choosing t and T. We could base the end of the time horizon, T, on the effective life of the low-E windows. Windows are long-lived durables, and arguably T should be substantially higher than 10—perhaps 50 or more. The JK analysis cites a 2007 study that reports the average ownership tenure in Florida as 11.5 years.26Dean Stansel, Gary Jackson, and Howard Finch, “Housing Tenure and Mobility with an Acquisition-Based Property Tax: The Case of Florida,” Journal of Housing Research 16, no. 2 (2007): 117–29. I selected a time horizon of 10 for the equation because it is close to this figure of 11.5 years, and because as a whole number it is convenient for purposes of demonstration. A longer time horizon will lead to a higher NPV, and I consider the effect of selecting different end periods below as part of the sensitivity analysis. Regarding the beginning of the time horizon, benefits will be realized once the house is built and occupied, but by starting with t = 1, the NPV calculation assumes that benefits are realized at the end of every year; we assume benefits are realized at the beginning of each year by setting it at t = 0. Assuming a discount rate of 5 percent (so r = 0.05), the best-case NPV estimate is $792.27NPV can be calculated in a spreadsheet, or with the following handy formula: . There is actually an intuition behind this equation. The term 1/r is the present value of a dollar received every year forever (an annuity that pays out forever is called a perpetuity), which is $20 when r = 0.05. The second term in parentheses is the present value of $20 ten years from now, which is $12.28. So the term in parentheses can be thought of as the present value of a $1 perpetuity that is taken away in ten years. This is $20 minus $12.28, or $7.72. Given that there are $190 in benefits every year for ten years, we can multiply $190 by $7.72 to find $1,467, the present value of benefits. From this we subtract $675, which is the initial up-front costs, to find a present value of $1,467 minus $675, or $792. The fact that this is positive indicates that energy codes that require low-E windows are a good social investment. How does this NPV estimate compare with the decision criteria presented in the JK analysis? Jacobsen and Kotchen presented three criteria, the first of which is a private payback period, which is calculated as the up-front costs of $675 divided by the annual savings of $106, and comes to 6.37 years. This is the amount of time it would take a homeowner to recover the investment in the thicker windows. This criterion assumes a discount rate of zero and does not account for impacts on third parties.28Assuming a zero discount rate is a simplifying assumption, but it is not realistic. Households that have investment options value current money more than future money. The issue of myopic behavior discussed in the introduction can be modeled through the NPV equation. If households have an irrational level of impatience when it comes to home energy efficiency, they will not make investments with positive NPV. How to account for possible consumer myopia is an ongoing debate in policy analysis, but keep in mind that it is not easy to discern when people are behaving irrationally and when they have preferences concerning future values that differ from the preferences a policy analyst or decision maker thinks they should have. The second criterion could be called a global social payback period, which is the up-front costs of $675 divided by $190, the sum of private and social benefits, and comes out to 3.5 years. Third, Jacobsen and Kotchen recognize that “one might argue that the benefits associated with a lower CO2 emissions should not be considered . . . as they are likely to occur for the most part outside the policy jurisdiction.”29Jacobsen and Kotchen, “Are Building Codes Effective at Saving Energy?,” 47. Excluding carbon dioxide reduction benefits reduces the value of emissions reductions from $84 to $22, and what could be called a national social payback period rises to 5.3 years ($675 divided by $128, where $128 is the sum of $106 and $22). CBA step 8 involves sensitivity analysis, which refers to determining how the NPV estimate changes when one of the assumptions or estimates that went into the equation is changed. By considering payback periods that include more or fewer categories of benefits, Jacobsen and Kotchen do present some sensitivity analysis. They do not discuss how sensitive their findings are to changes in other assumptions. In this and the next two paragraphs, I present some examples of further sensitivity analysis. The payback periods considered in the JK analysis were based on best-case assumptions, and so I first recalculate my NPV figure using the worst-case figures. Recall that the calculations above used the low-end cost estimate of the low-E windows: $675. The high-end estimate was $1,012.30Florida’s energy code gives the builder flexibility about how to meet the energy use requirements specified in the home. If there is a design change that enables a builder to comply with the code more cheaply than by using low-E windows, the builder could select that design feature instead. This means that the $675 figure might overstate the actual cost of compliance—though I still refer to $675 as the low-end estimate. In addition, they used the high-end estimate of the value of emissions reductions—$84—but the low-end estimate was $14. A worst-case NPV calculation would simply replace $675 with $1,012 and $84 with $14 in the equations above. With a discount rate of 5 percent, the worst-case NPV estimate is −$85. This negative value indicates that the discounted value of social benefits is not enough to justify the up-front costs of low-E windows. Another assumption is the impact of the energy code changes on energy demand. Jacobsen and Kotchen find it to be 48 kWh per month for electricity and 1.5 therms for natural gas. However, in follow-up work using more recent data from the same study area, Kotchen finds that there are no electricity savings, but natural gas savings are about double.31Matthew J. Kotchen, “Longer-Run Evidence on Whether Building Energy Codes Reduce Residential Energy Consumption,” Journal of the Association of Environmental and Resource Economists 4, no. 1 (2017): 135–53. From this it follows that, “following the same approach outlined by Jacobsen and Kotchen, the revised estimates imply social and private payback rates of about 10 and 16 years (up from 4 to 6), respectively.”32Kotchen, “Longer-Run Evidence,” 152. In terms of the NPV calculation, in the original analysis above, natural gas savings were $22 and electricity savings $84, for combined energy savings of $106. If we double natural gas savings and ignore electricity savings, energy savings under the revised impact estimates are only $44. In addition, social benefits of avoided emissions under these revised impact estimates range from $1.84 to $20.74. Recalculating NPV under these assumptions, I find best- and worst-case NPV estimates of −$175 and −$658, respectively. Both best- and worst-case NPV figures are negative under Kotchen’s revised impact estimate.33Kotchen, “Longer-Run Evidence.” Of course, the −$175 to −$658 NPV figures presented above use the 10-year time horizon, which—as mentioned above—might be too short. As a final check on the sensitivity of these estimates, I note that with a 50-year time horizon and using the revised impact estimates from Kotchen, the best- and worst-case NPV figures are $507 and −$175, respectively.34Kotchen, “Longer-Run Evidence.” What can we conclude from examining the effect of alternate sets of assumptions on the NPV estimate? The NPV estimates are quite sensitive to the assumptions. CBA does not give us a clear answer in this case. While it may seem as if CBA provides a nonanswer, the results do suggest that Florida’s changes to its energy codes were not obviously good or bad. Then again, the sensitivity analysis does draw our attention to the fact that the marginal damage figure we use for carbon dioxide reductions is a key driver of whether the NPV is positive or negative. Assumptions about how carbon reductions impact climate change to a large extent determine whether the policy is efficient or not. CBA step 9 entails making a recommendation. Jacobsen and Kotchen do not make a formal policy recommendation, but their initial study might offer an implicit suggestion that Florida policymakers were correct to strengthen the energy code in 2001. The authors never actually say this, but it is not hard to imagine a reader interpreting their results as encouragement to further strengthen energy codes in Florida, or to replicate Florida’s changes in other states in similar climate zones. However, as we have just seen, the revised empirical estimates of the policy’s impact show that the case for energy codes is weaker than Jacobsen and Kotchen initially found. My examination of the JK analysis suggests that Florida’s stricter building codes do not clearly pass a cost-benefit test. Of course, there is room for strengthening the analysis. Strictly speaking, Jacobsen and Kotchen set out to calculate payback periods for a representative household, not to carry out a social CBA. We have seen that it is possible to recast their analysis as a simple CBA just by specifying a time horizon and calculating NPV with the figures they provide. Thus, on one hand, the analysis they carry out is very close to a CBA. On the other hand, had their goal been a comprehensive CBA, they likely would have (among other things) factored in other impacts, such as the administrative costs of creating and enforcing energy codes.35A final consideration is well worth mentioning. The analysis described above was for a representative home. If all homes in the study area are the same, we could simply multiply the NPV for a single home by the number of homes. But because homes differ, a more careful analysis would have to account for this. Many homes in Florida do not use natural gas at all, for example, and natural gas savings were the only benefit of the stricter codes found in Kotchen, “Longer-Run Evidence.” Recent work by Kevin Novan, Aaron Smith, and Tianxia Zhou adopts a different approach to valuing the cost of complying with energy codes, and in their CBA of California’s energy codes, these authors find evidence suggesting that the initial codes likely do pass a cost-benefit test (that is, NPV is likely positive).36Novan, Smith, and Zhou, “Residential Building Codes Do Save Energy.” The question of the efficiency of building energy codes remains an active area of scholarship that may evolve substantially in the years to come. This chapter first described state-level building energy code regulations and surveyed the important concepts and controversies surrounding them. It then presented a case study which described a CBA of a change made to Florida’s building energy codein 2002. In reconsidering the JK analysis as a CBA,37Jacobsen and Kotchen, “Are Building Codes Effective at Saving Energy?” I calculated NPV—which is the most conventional decision criterion in CBA—under best- and worst-case scenarios, and I also updated the analysis to account for new policy impacts estimated in Kotchen’s 2017 study.38Kotchen, “Longer-Run Evidence.” I find that while NPV is positive in the best-case scenario, it is negative in the worst-case scenario. When the updated impact estimates are used, both best- and worst-case NPV figures are negative. With a longer time horizon and updated impact estimates, the best-case assumptions result in positive NPV while the worst-case assumptions result in negative NPV. This case study shows how CBA can be applied in the specific setting analyzed in this chapter. In addition, because all CBAs follow the same steps, the case study can also be used to understand CBA in general so it can be applied to any of the areas discussed in other chapters of this book. I emphasize that an analyst with empirical training in causal inference and econometrics will do a better job at the crucial step of impact estimation. To do CBA well, and to understand what it is and—maybe more importantly—what it is not, requires an analyst to have a mix of skills (including empirical skills), a grasp of neoclassical economic theory, and a familiarity with financial calculations such as NPV and inflation adjustments. It also requires a healthy dose of critical thinking skills, both in terms of cataloging impacts and selecting studies for the literature review that contain the most appropriate estimates to plug in at various points in the analysis. Because doing CBA provides opportunities for using and developing all these different skills, I have started requiring that students write term papers when I teach the course in CBA to undergraduates at San Jose State University. There are many different types of term papers a student could write in a CBA course, from ones that lean econometric to literature reviews, but I’ve found that the method that works the best for most students is the benefits transfer method, exemplified in the second half of Alan Krueger’s 2003 study.39Alan B. Krueger, “Economic Considerations and Class Size,” Economic Journal 113, no. 485 (2003): F34–F63. The goal of a paper employing this method would be to replicate a previously published NPV (or related) calculation, exactly as I have done here, and then critically evaluate it and modify it in some ways. This may seem unoriginal, but in fact replicating CBAs can help lend badly needed transparency to the policy analysis literature. Moreover, the “replicate and extend” approach provides a student with a more obvious guide to writing a term paper than the “redesign the wheel” approach—an approach that I often observed (and unwittingly encouraged) in my earlier years teaching the CBA course. In fact, the idea of replicate and extend can be used in courses beyond CBA. It can also be used successfully in courses in econometrics.40My forthcoming book, Data and the American Dream: Contemporary Social Controversies and the American Community Survey (London: Palgrave Macmillan, 2021) elaborates on how the replicate and extend method can be used in learning introductory econometrics and R programming. My suggestion for instructors in both introductory CBA and econometrics courses is the same: require students to write original term papers, but guide them in doing this by providing references to papers they should replicate and extend. More advanced students can then move beyond this approach in more advanced courses, after cutting their teeth on a replication assignment. Finally, this chapter was also written for the professional policy analyst who needs to do an original CBA. While I have to recommend formal training in CBA, the best way to learn independently is to read published CBAs, replicate, and extend. Going through the calculations carefully enough to replicate them will provide a deeper understanding of all the moving pieces. Keep in mind that the perfect CBA has yet to be written, and there is always room for improvement. Our job is to do the best we can to inform decision makers. Ultimately decision makers have multiple criteria beyond NPV to consider, but the consequentialist underpinning of CBA and the neoclassical approach deserve a place at the table in any major decision involving public or shared resources. Appendix on Impact Estimation: Do It Yourself, or Plug In Values? Analysts can estimate the impacts of regulations themselves, or they can use estimates from the literature in a so-called plug-in approach. There are several ways analysts could estimate impacts themselves, but these ways all require getting data. The ideal data collection method is to conduct a randomized, controlled experiment. For example, researchers Meredith Fowlie, Michael Greenstone, and Catherine Wolfram do this as part of a large-scale weatherization project. A randomized, controlled experiment is the gold standard for isolating and estimating causal effects, because the researcher can assign treatment in a way that is uncorrelated with participant characteristics.41Fowlie, Greenstone, and Wolfram, “Do Energy Efficiency Investments Deliver?” Most of the time, however, experiments are infeasible because of their cost. Therefore, economists often have to rely on observational (as opposed to experimental) data. Jacobsen and Kotchen base their analysis on utility billing data, as well as house characteristics such as square footage and number of bathrooms.42Jacobsen and Kotchen, “Are Building Codes Effective at Saving Energy?” They find that homes built just after the date that energy codes were strengthened use less energy compared to observationally identical homes built just before. Is this a compelling way to estimate the causal effect that building energy codes have on energy demand? Arik Levinson argues not necessarily. Newer homes use less energy for reasons apart from their design, and Levinson argues Jacobsen and Kotchen conflate home vintage with home age.43Arik Levinson, “How Much Energy Do Building Energy Codes Save? Evidence from California Houses,” American Economic Review 106, no. 10 (2016): 286794. In his 2017 follow-up to the JK analysis, Kotchen finds evidence suggesting that Levinson was correct, with regard to electricity at least: Kotchen finds that energy codes were not responsible for reducing electricity demand.44Kotchen, “Longer-Run Evidence.” However, he does find that the savings from natural gas persisted and were twice as large as he and Jacobsen had found in their 2013 analysis.45Kotchen, “Longer-Run Evidence.” The econometric literature that estimates the impact of energy codes on energy demand is rich and evolving, and reviewing it all is beyond the scope of this chapter. Table A1 lists nine recent studies that are all at least somewhat comparable. Care must be taken in comparing the results summarized in the table, however, because the studies use different approaches and cover different study areas. Sometimes, a single study will provide the best estimate of an impact to use in a CBA. In other situations, averaging impacts may be appropriate. An analyst’s ability to distinguish between correlation and causation is just as important when using the plug-in method as when estimating impacts from the raw data.46The debate between Hanushek and Krueger highlights this important issue, in the context of education. Eric A. Hanushek, “The Failure of Input-Based Schooling Policies,” Economic Journal 113, no. 485 (2003): F64–F98, and Krueger, “Economic Considerations and Class Size.” Table A1. Estimating Impacts through Literature Review Note: These nine studies use various methods to estimate the impact of energy codes on energy use. Boardman, Anthony E. et al. Cost-Benefit Analysis: Concepts and Practice (Cambridge: Cambridge University Press. 2017). 6. Bruegge,Chris, Tatyana Deryugina, and Erica Myers. “The Distributional Effects of Building Energy Codes.” Journal of the Association of Environmental and Resource Economists 6. No. S1 (2019): S95. Chaudhuri, Anoshua and Susan G. Zieff. “Do Open Streets Initiatives Impact Local Businesses? The Case of Sunday Streets in San Francisco, California.” Journal of Transport Health 2. No. 4 (2015): 529–39. Culhane, Dennis P., Stephen Metraux, and Trevor Hadley. “Public Service Reductions Associated with Placement of Homeless Persons with Severe Mental Illness in Supportive Housing.” Housing Policy Debate 13. No. 1 (2002): 107–63. Davis, Lucas W. and Christopher R. Knittel. “Are Fuel Economy Standards Regressive?” Journal of the Association of Environmental and Resource Economists 6. No. S1 (2019): S61. Dubner, Stephen J. “How Efficient Is Energy Efficiency?” February 5, 2015. Freakonomics Radio. Podcast. https://freakonomics.com/podcast/how-efficient-is-energy-efficiency-a-new-freakonomics-radio-podcast/. Fowlie, Meredith, Michael Greenstone, and Catherine Wolfram. “Do Energy Efficiency Investments Deliver? Evidence from the Weatherization Assistance Program.” Quarterly Journal of Economics 133. No. 3 (2018): 1597–644. Fuguitt, Diana and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers (Westport, CT: Greenwood. 1999). 53. Gillingham, Kenneth. “Rebound Effects.” The New Palgrave Dictionary of Economics. Edited by Palgrave Macmillan (London: Palgrave Macmillan. 2014). https://doi.org/10.1057/978-1-349-95121-5_2875-1. Hanushek, Eric A. “The Failure of Input-Based Schooling Policies.” Economic Journal 113, no. 485 (2003): F64–F98. Holian, Matthew J. “The Impact of Building Energy Codes on Household Electricity Consumption.” Economics Letters 186. No. 108841 (January 2020): 1-4. Holian, Matthew J. and Ralph McLaughlin. “Benefit-Cost Analysis for Transportation Planning and Public Policy: Towards Multimodal Demand Modeling” (MTI Report 12-42. Mineta Transportation Institute. San Jose, CA. August 2016). Jacobsen, Grant D. and Matthew J. Kotchen. “Are Building Codes Effective at Saving Energy? Evidence from Residential Billing Data in Florida.” Review of Economics and Statistics 95. No. 1 (March 2013): 34–49. Kotchen, Matthew J. “Longer-Run Evidence on Whether Building Energy Codes Reduce Residential Energy Consumption.” Journal of the Association of Environmental and Resource Economists 4. No. 1 (2017): 135–53. Krueger, Alan B. “Economic Considerations and Class Size.” Economic Journal 113. No. 485 (2003): F34–F63. Levinson, Arik. “How Much Energy Do Building Energy Codes Save? Evidence from California Houses.” American Economic Review 106. No. 10 (2016): 286794. Manning, Matthew et al. Economic Analysis and Efficiency in Policing, Criminal Justice and Crime Reduction: What Works? London: Palgrave Macmillan. 2016). 36. Nordhaus, William D. “Revisiting the Social Cost of Carbon,” Proceedings of the National Academy of Sciences of the United States of America 114, no. 7 (February 2017): 1518–23. Nordhaus, William D. The Climate Casino: Risk, Uncertainty, and Economics for a Warming World New Haven: Yale University Press. 2013). 261. Novan, Kevin, Aaron Smith, and Tianxia Zhou. “Residential Building Codes Do Save Energy: Evidence from Hourly Smart-Meter Data” (E2e Working Paper 031. E2e Project. June 2017). Rosenfeld, Arthur H. and Deborah Poskanzer. “A Graph Is Worth a Thousand Gigawatthours: How California Came to Lead the United States in Energy Efficiency (Innovations Case Narrative: The California Effect).” Innovations: Technology, Governance, Globalization 4. No. 4 (2009): 57–79. Stansel, Dean, Gary Jackson, and Howard Finch. “Housing Tenure and Mobility with an Acquisition-Based Property Tax: The Case of Florida.” Journal of Housing Research 16. No. 2 (2007): 117–29. Table of Contents - Regulation and Entrepreneurship: Theory, Impacts, and Implications - Regulation and the Perpetuation of Poverty in the US and Senegal - Social Trust and Regulation: A Time-Series Analysis of the United States - Regulation and the Shadow Economy - An Introduction to the Effect of Regulation on Employment and Wages - Occupational Licensing: A Barrier to Opportunity and Prosperity - Gender, Race, and Earnings: The Divergent Effect of Occupational Licensing on the Distribution of Earnings and on Access to the Economy - How Can Certificate-of-Need Laws Be Reformed to Improve Access to Healthcare? - Land Use Regulation and Housing Affordability - Building Energy Codes: A Case Study in Regulation and Cost-Benefit Analysis - The Tradeoffs between Energy Efficiency, Consumer Preferences, and Economic Growth - Cooperation or Conflict: Two Approaches to Conservation - Retail Electric Competition and Natural Monopoly: The Shocking Truth - Governance for Networks: Regulation by Networks in Electric Power Markets in Texas - Net Neutrality: Internet Regulation and the Plans to Bring It Back - Unintended Consequences of Regulating Private School Choice Programs: A Review of the Evidence - “Blue Laws” and Other Cases of Bootlegger/Baptist Influence in Beer Regulation - Smoke or Vapor? Regulation of Tobacco and Vaping - Moving Forward: A Guide for Regulatory Policy
<urn:uuid:d032c0e6-6507-4b7e-9de2-7f9f5ff1ba89>
CC-MAIN-2023-40
https://www.thecgo.org/books/regulation-and-economic-opportunity-blueprints-for-reform/building-energy-codes-a-case-study-in-regulation-and-cost-benefit-analysis-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00662.warc.gz
en
0.926508
11,385
2.609375
3
- Don’t ever dive into shallow water. Before diving, inspect the depth of the water to make sure it is deep enough for diving. If diving from a high point, make sure the bottom of the body of water is double the distance from which you’re diving. For example, if you plan to dive from eight feet above the water, make sure the bottom of the body of water, or any rocks, boulders or other impediments are at least 16 feet under water. - Never dive into above-ground pools. - Never dive into water that is not clear, such as a lake or ocean, where sand bars or objects below the surface may not be seen. - Only one person at a time should stand on a diving board. Dive only off the end of the board and do not run on the board. Do not try to dive far out or bounce more than once. Swim away from the board immediately afterward to make room for the next diver. - Refrain from body surfing near the shore since this activity can result in cervical spine injuries, some with quadriplegia, as well as shoulder dislocations and shoulder fractures. The entire list is as follows: - Fall Protection in Construction (1926.501) - Hazard Communication (1910.1200) - Scaffolding in Construction (1926.451) - Respiratory Protection (1910.134) - Lockout/Tagout (1910.147) - Powered Industrial Trucks (1910.178) - Electrical – Wiring Methods (1910.305) - Ladders in Construction (1926.1053) - Machine Guarding (1910.212) - Electrical – General Requirements (1910.303) National Aeronautical Space Agency (NASA), an executive Federal Agency dedicated to Space flight, highly values exploration. The Agency’s exploration success depends on employees’ detailed attention to the safety and health of the astronauts and their fellow Earth-bound employees. For decades NASA’s occupational health programs have maximized the opportunities of national health initiatives as well as internal resources. And, they have led the way to improve internal programs for the maintenance of a workforce that operates at its highest level of physical and mental well-being. Emergency medical services (EMS) workers are primary providers of pre-hospital emergency medical care and integral components of disaster response. The potentially hazardous job duties of EMS workers include lifting patients and equipment, treating patients with infectious illnesses, handling hazardous chemical and body substances, and participating in the emergency transport of patients in ground and air vehicles. These duties create an inherent risk for EMS worker occupational injuries and illnesses; and research has shown that they have high rates of fatal injuries and nonfatal injuries and illnesses. Employers that invest in workplace safety and health can expect to reduce fatalities, injuries, and illnesses. This will result in cost savings in a variety of areas, such as lowering workers’ compensation costs and medical expenses, avoiding OSHA penalties, and reducing costs to train replacement employees and conduct accident investigations. In addition, employers often find that changes made to improve workplace safety and health can result in significant improvements to their organization’s productivity and financial performance. Home building is physically demanding work and manual material handling may be the most difficult part of the job. Manual material handling includes all of the tasks that require you to lift, lower, push, pull, hold or carry materials. These activities increase the risk of painful strains and sprains and more serious soft tissue injuries. Soft tissues of the body include muscles, tendons, ligaments, discs, cartilage and nerves. Soft tissue injuries cause workers pain, suffering and lost income. They can also restrict non-work activity, like sports and hobbies. Builders’ and employers’ costs include loss of productivity and high workers’ compensation insurance premiums. - Train employees. The deadline to ensure all workers are familiar with the updated labeling and SDS elements was Dec. 1, 2013. - Get the new SDSs. Take steps, including contacting chemical manufacturers, to ensure you have updated SDSs by June 1 for all chemicals onsite. - Review the SDSs. When the new SDSs come in, closely examine them and consider whether you have appropriate controls in place for all hazards. - Update hazcom program. If new hazards are listed on the SDSs, update your hazard communication program to mitigate the risks posed by those hazards. - Review training. Make sure your employees understand the new labels and SDSs. Refresher training may be necessary. Psychosocial environment refers to the culture and climate of the workplace. Examples of the psychosocial environment of a workplace include respect for work-life balance, mechanisms to recognize and reward good performance, valuing employee wellness, encourage employee feedback about organizational practices, zero tolerance for harassment, bullying and discrimination, ensuring employee psychological safety and health. A healthy workplace will: - Improve employee health outcomes - Make it easier to attract and retain qualified employees - Lower absenteeism - Reduce health benefit costs - Enhance morale - Reduce risk of injury - Improve job performance Safe and healthy employees are less likely to be injured while on the job and are vibrant, engaged, and high performing. Safer and Healthier Employees… … Are good for business and help improve the bottom line. Companies that have exemplary safety, health, and environmental programs outperformed the S&P 500 by between 3% and 5%. … Create a happier, less stressful, and more prosperous business environment. According to a survey by Aon Hewitt, the National Business Group on Health, and the Futures Company, employees who reported having a strong culture of health at work were more likely to report being happy, less likely to report that stress has a negative impact on their work, and less likely to cite the work environment as an obstacle to health. … Do better at their jobs and contribute more. Employers that have high employee engagement performed better than employers with low employee engagement in profitability, customer ratings, turnover, safety incidents, productivity, and quality. Engagement includes feeling like someone at work cares about the employee as a person and having the materials needed to do work right. … Are absent from work less and more productive when at work. For every dollar spent on worksite wellness programs, absentee day costs were reduced by $2.73, and medical costs were reduced by $3.27.9 Research on chronic conditions and productivity estimates that presenteeism causes 18-91 lost work days per year and absenteeism causes 1-10 lost work days per year. Presenteeism costs more than absenteeism and medical expenses combined. … Enjoy their jobs more, reducing turnover costs. Employees who feel supported by their employers are more likely to want to keep their jobs and will help attract and retain the best employees for the business. A study by the World Economic Forum found that 64% of employees who reported that their workplaces were active promoters of health intended to stay with their companies at least five years.
<urn:uuid:b10d1c83-50f0-4f9a-9108-6655a33cd004>
CC-MAIN-2019-35
http://www.riskmanagement365.com/tag/safety-2/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315865.44/warc/CC-MAIN-20190821085942-20190821111942-00447.warc.gz
en
0.950343
1,465
3.140625
3
Historical perspective of indo-Afghan relationsAuthor(s): Afghanistan is geo-politically and geo- strategically very important state. Afghanistan is the gate way to “Central Asia, Middle East and South Asia”. History wintnesses that the world powers for increasing influence in this region tried to increase sphare of influence in Afghanistan yet remained unsuccesful. Afghanistan has been proven as the graveyard for the invaders. India tried its level best to establish its influence in Afghanistan. The Indian government had provided support to soviet backed democratic set up in Afghanistan. The friendship history of Indo- Afghan relations is old. At times Afghanistan was documented as a center of Indian civilization. Additionally, Buddha had also come to Afghanistan; this was a busy area of Hinduism and Buddhism, nonetheless, in the contemporary world the footsteps of these two religions are very scarce in Afghanistan. India had supported Afghanistan and still supporting, after 9,112001 the relation of both the countries got boost.Pages: 26-29 | Views: 243 | Downloads: 16Download Full Article: Click Here How to cite this article: Wajid Ali. Historical perspective of indo-Afghan relations. Int J Political Sci Governance 2019;1(2):26-29.
<urn:uuid:2a8ad7e6-daba-4362-bdec-5e61ac7c3d56>
CC-MAIN-2021-25
https://www.journalofpoliticalscience.com/archives/2019.v1.i2.A.17
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488525399.79/warc/CC-MAIN-20210622220817-20210623010817-00477.warc.gz
en
0.935902
259
2.984375
3
University of Ottawa, Canada (Fall 2008) Text based on a talk in a Symposium on “The role of the medical humanities in education and healing”, McMaster University, Hamilton, Ontario, May 19, 1999. A complete physician needs insight transcending the knowledge, skills and attitudes that professional training provides. How can this be achieved? Personal experience of illness and suffering, or that of a close family member or a loved one, can do it. It is painful, but it can be a good way to comprehend the complexities of life, and of human nature. Another way is through the humanities — a rich source of insight into the human condition and the role of healers. The ethical, moral, and spiritual dimensions of sickness and healing are eloquently displayed in the creative arts — in music, painting, sculpture, and most of all, in literature — drama, poetry, fiction. Here I can only skim over the surface, touching without penetrating into the immense variety and richness to be found in literary works. (I mean real literature, not what authors of journal articles commonly call “the medical literature” — a phrase that is almost always an oxymoron). Our understanding of the complexities of society and human nature, and our values, come from good literature as well as from our medical experience. Fiction can portray social conditions brilliantly, as Charles Dickens did, for instance in Oliver Twist (1837) Dombey and Son (1848) and Little Dorritt (1855). Good writers often reflect on life and the values of their time. HG Wells, in Kipps (1905) and Anne Veronica (1909); JB Priestley, in The Good Companions (1929); Sinclair Lewis, in Babbitt (1922); John Steinbeck, in The Grapes of Wrath (1939); George Orwell, in Down and Out in Paris and London (1933), and The Road to Wigan Pier (1937); and legions of others in many countries have upheld this tradition through all the wars and turbulent events of the 20th century. John Updike’s four books about Harry (“Rabbit”) Angstrom, which dissect the life and values of an “average” American man and his family over the four decades from the 1960s to the 1990s are a good contemporary example. 1 The workings of the mind, and the whole range of emotions are another fruitful field for novelists — and for poets. James Joyce’s Ulysses (1922) perhaps the greatest novel in the English (or any other) language may be the best textbook ever written about how the mind works. Sylvia Plath and Anne Sexton revealed their tormented souls in their poems. Moran Campbell, a former chairman of the department of medicine at McMaster University, movingly described his bouts with the peaks and troughs of manic-depressive disorder in his autobiography, Not Always on the Level.2 The 19th Century Scottish poet James Hogg captured the personality of a paranoid psychopath in The Private Memoirs and Confessions of a Justified Sinner (1824), a work of fiction that reads chillingly like fact. And the works of Shakespeare, of course, are the human mind laid bare, displayed in all its glory, misery, squalor, high spirits, splendour, imaginative sweep. Shakespeare’s plays are at the highest pinnacle of a tradition that began with Homer and the Greek tragedians and continues through Samuel Beckett and Arthur Miller. Shakespeare is the undisputed master. If you would understand humanity, heed Hamlet, know Lear, love Rosalind, roister and frolic with Falstaff. You can learn about the human dimensions of many aspects of disease and medical care from literary accounts: - How tuberculosis affects people, from Thomas Mann’s Magic Mountain (1946) and in a more emotionally wrenching way, from The Rack (1958) by the pseudonymous AE Ellis. - About the sorrows and pleasures of growing old, from Love in a Time of Cholera (1989) by Gabriel Garcia Marquez. - About transsexuality, from Melisio, who becomes Mimi, in Isabel Allende’s magic realist novel Eva Luna (1988) - About the impact of mental illness, and the deplorable way it has been treated by sadistic mental hospital staff, from Ken Kesey’s One Flew Over the Cuckoo’s Nest(1962) which was made into an excellent movie. - About the descent into the self-destructive vortex of alcoholism, from Under the Volcano (1947) by Malcolm Lowry, also made into a good movie. - What the long, slow death from multiple sclerosis is like from the inside, in Journal of a disappointed man (1964) by W N P Barbellion (which is fact, not fiction). - And about terminal illness and the inevitability of death, from many accounts, best of all perhaps in Leo Tolstoy’s masterly short story The Death of Ivan Ilyich(1884). Passion, compassion, confusion, and other emotions encountered in medical practice have been described by many creative writers, including some doctors. In The Use of Force, William Carlos Williams, a family doctor, and a lyrical poet and short story writer in depression-era Paterson, New Jersey, described the passion of anger. He absolutely had to look at a little girl’s throat because he suspected she had diphtheria. She fought him every step of the way. Her throat was hers! No busy body doctor was going to see it. She knocked his glasses off, kicked, scratched, and bit him. He got really angry. Here, abridged a little, is William Carlos Williams in New Jersey in the 1930s: … now I had grown furious — at a child. …the worst of it was that I too had got beyond reason … I could have torn the child apart. It was a pleasure to attack her… The damned little brat must be protected against her own idiocy … in a final unreasoning assault I overpowered the child’s neck and jaws… I forced the heavy silver spoon back of her teeth and down her throat till she gagged. And there it was — both tonsils covered with membrane. She had fought valiantly to keep me from knowing her secret. She had been hiding that sore throat for three days at least and lying to her parents to escape just such an outcome as this. Now truly she was furious. She had been on the defensive before, but now she attacked. Tried to get off her father’s lap and fly at me while tears of defeat blinded her eyes. 3 I’m sure this is a true story. Not long before I first read it, I had slapped a girl about that age, in front of her mother too, because I was fed up with her tantrums. (It was the act in my professional life that I am most deeply ashamed of, but at the time, more than 40 years ago, it felt satisfying and amply justified — and it worked. Now it would be a criminal offence). William Carlos Williams’s gritty, real-life Doctor Stories are beautifully written accounts of real events and real people, but they are not comfortable reading. They explore the most powerful emotions a doctor can experience in dealing with sickness and suffering, birth and death. Samuel Shem had just finished his internship year when he wrote The House of God about 20 years ago. Its black humour has been compared to Catch 22 and Mash but it is more obscene, scatological, cruelly callous — yet also it is compassionate, sometimes very funny, and it can be deeply moving. A few scenes are unforgettable. One is the suicide of an intern who can’t take it any more. Well, that’s the facile, superficial explanation. The reality is that premonitory signs notwithstanding, no one, including the narrator, Samuel Shem’s alter ego, attempted to intervene as the unfortunate Potts slid into irretrievably profound depression. Another is a brief scene, sketched in just a few lines, of a young married woman who is brought in by the police for a medical examination after being raped. Her husband joins her. In a few lines about their body language, Shem describes how their lives and their loving relationship have changed forever: “Have you called your husband yet?” “No… I’m too ashamed,” she said, and she lifted her head up for the first time and looked me in the eyes, and first her eyes were dry cold walls and then, to my relief, they broke apart into wet pieces, and she screamed and screamed out, sob after sob … after I did the workup for rape I called [her husband]. He’d been worried stiff and was glad she wasn’t dead. He could not know, yet, that part of her had died. [Her husband comes to collect her]… I watched them walk down the long tiled passage. He went to put his arm around her, but with a gesture I knew was disgust at the ruination of her body by a man, she pushed it aside. Separate, they walked out into the savageness…4 They never will touch one another again as they did before that night’s evil was done. Vignettes like this elevate Shem above the brutal obscenity and ribaldry in the rest of this excellent book. Doctors are often confused. The Yale surgeon Richard Selzer, a superb writer who ultimately quit surgery to write full-time, described how he once was transported back to the Middle Ages, confused, fearful, possessed by a devil, when on opening an abscess he was confronted by something alive, a hideous face with antennae and eyes staring at him. Reading this makes the hair on the back of my neck bristle. He managed to snare this unearthly beast with a pair of forceps, got it into a bottle of formalin. It was the maggot of a bot-fly, the abscess a common one in cattle, rarely seen in people. It was a deeply disturbing, confusing experience. Confusion? Pity Emma Bovary’s cuckolded husband, poor Charles Bovary! In medical school he didn’t even begin to understand what he was being taught, and when he became a country doctor he could not apply any of it. He lurched and staggered from crisis to crisis, reaching the depths with a major medical disaster, a badly botched diagnosis, at the same time as his marital disaster. He was dazed and constantly bewildered as a medical student: The curriculum that he read on the bulletin board staggered him. Courses in anatomy, pathology, pharmacy, chemistry, botany, clinical practice, therapeutics, to say nothing of hygiene and materia medica — names of unfamiliar etymology that were like so many doors leading to solemn shadowy sanctuaries. He understood absolutely nothing of any of it. He listened in vain; he could not grasp it. Even so, he worked. He filled his notebooks, attended every lecture, never missed hospital rounds. In the performance of his daily tasks he was like a mill-horse that treads blindfold in a circle, utterly ignorant of what he is grinding. 5 I can recall feeling a little like that once or twice when I was a medical student, but not all the time, thank goodness. I can also think of one or two students like Charles Bovary whom I’ve tried in vain to teach… Confusion and disaster go together in Isabel Allende’s account of the tragic death of her daughter, Paula — brain dead in an episode of acute porphyria, and a long, slow death in deep coma. No one should read Paula as an account of a personal family tragedy due to a medical misadventure, though it is that too. Paula is about much else — the Allende family, the culture and politics of Chile, lovemaking and childbirth as well as death, the evil of the Pinochet era and the good that overcomes that evil (themes that recur in Isabel Allende’s other books) and her own passionate nature and the magic reality of her own life. And the long-term home care of a comatose patient with a tracheostomy… Paula is a celebration of life, and I think it will become a classic. I am an epidemiologist, so I like books about epidemics. Berton Roueche’s Annals of Medical Detection in the New Yorker7 aroused my interest when I was a medical student, long before I thought of becoming an epidemiologist myself. Two and half thousand years later we puzzle, over Thucydides’ meticulous account of the epidemic that struck the Athenians at the end of the first year of the Peloponnesian War. Now we debate its possible cause, because we can’t identify it despite the details Thucydides gives us. Daniel Defoe described in fiction 60 years after the fact the outbreak in 17th century London in Journal of the Plague Year (1722). Samuel Pepys who was in London in the plague year described it too, made it come to life so you can feel the fear and fatalism that infected Londoners even when the plague bacillus did not. Albert Camus’s La Peste (1948) is ostensibly about the outbreak of bubonic plague in Oran, Algeria, in 1946; but it is really an allegory of how people become infected with evil ideas and beliefs like fascism. Camus fought in the French Resistance, and knew what he was talking about. Alexander Solzhenitsyn’s Cancer Ward is another allegorical novel, a treatise on the cancerous onslaught of Soviet communism on the body and soul of Russia. There is plenty of humour in fictional works about the doctor’s trade. Much of it is satirical, deflating the egos, pricking the pomposity that prevails among too many of us. Shakespeare and Dickens let doctors off lightly considering the professional shortcomings of their times. Not Moliere or Laurence Sterne though: Dr Slop in Tristram Shandy (1759-64) is contemptible as well as a figure of fun. Proust’s description of one of his many doctors, who could discretely palm his fee like a magician, makes me smile ruefully. I had a partner like that when I was in practice… Sir Roderick Glossop, the brain surgeon in P G Wodehouse’s novels, is a ludicrous caricature with no medical credibility. George Bernard Shaw was merciless, sceptical about the irrational behaviour of doctors in the first half of the 20th century. In Doctors’ Dilemma, which Shaw called a tragedy, he reserved his most savage criticism of medical customs and mores for the Preface8 which is salutary reading for everyone in the medical profession who is beginning to suffer from hubris. If Shaw were writing now, would he think we have improved? Have we improved? It takes a real doctor to display our profession in ways that make me laugh out loud. Has there ever been an account of how to treat a belly-ache that can top A Cure of Serpents? Alberto di Pirajno’s treatment regimen was not only unorthodox, it was highly unethical.9 But it was very effective! (You must read his book to find out what it was; I won’t reveal it here). Richard Gordon and Colin Douglas, two pseudonymous modern British light novelists can make us laugh out loud too. Gordon’s Doctor in the House (1952) and Doctor at Sea (1953) ring hilariously true. I find Doctor at Sea especially satisfying, having been a ship’s doctor myself a few times, and had experiences like some of those that Gordon describes. We have fictional portrayals of noble and good doctors too, like Tertius Lydgate in George Eliot’s Middlemarch. (1871). One “fictional” character from the early 20th century was a real person, the anthropologist and psychiatrist W H R Rivers, who treated shell-shocked soldiers in the Great War. He is brilliantly and sympathetically brought back to life in Pat Barker’s superb Regeneration10 trilogy. The honour roll of doctors who deserted their calling to become writers is long and impressive. But some marvellous writers stayed on. It is a deeply satisfying aesthetic pleasure to read them. William Farr’s success as a social reformer owes as much to the power of his language as to the facts he displayed in his Annual Reports (in Vital Statistics, part of his job as Compiler of Abstracts to the newly created Office of the Registrar of Births and Deaths in England and Wales). He held that office for over 40 years, from 1839 until near his death in 1883. Not a year went by without his beautifully crafted, rich and rolling phrases tugging at the emotions and the sensibility of his political masters. In his Report in 1874, he addressed the dramatic differences in health levels among English towns: Take for example the group of 51 districts called healthy… turn to the district of Liverpool.. Here it is evident that some exceptional causes of death are in operation in this second city of England. What are these causes? Do they admit of removal? Is this destruction of life to go on indefinitely? Of 10,000 children born alive in Liverpool, 5396 live 5 years, a number that in the healthy districts could be provided by 6554 annual births. This procreation of children to perish so soon, the sufferings of the little victims, the sorrows and expenses of their parents, are as deplorable as they are wasteful. In Liverpool the death of children is so frequent and dreadful that a special system of insurance has been devised to provide them with coffins and burial ceremonies. The mother when she looks at her baby is asked to think of its death, and to provide by insurance not for its clothes but for its shroud and other cerements. 11 Farr’s contemporaries wrote well too. Read Florence Nightingale’s Notes on Hospitals (1863) or her better-known but slight and slim volume of Notes on Nursing (1859). Read John Simon on Filth Diseases (1876) or on English Sanitary Institutions (1890) or go back to 1798 and read Edward Jenner’s Inquiry into the causes and effects of the variolaevaccinae, which describes his experiments with cowpox vaccine — probably the most important advance in public health sciences of the past thousand years. William Osler’s Principles and Practice of Medicine, published in 1892 was a tour de force the like of which we will never see again, because it is no longer possible for the mind of one person to encompass and write about the entire body of medical knowledge. Osler’s textbook is worth reading today, not only for the timeless clinical wisdom (clinical signs haven’t changed) but also for Osler’s graceful, elegant prose style. Alas, as every medical editor knows, such gifts that once were common among learned people are rare nowadays. Far too many authors of papers in contemporary medical journals are like cuttlefish, hiding in their own ink. Pitifully few can communicate an important medical or scientific message in good prose — the verbal equivalent of a musician with perfect pitch. Lewis Thomas did it, in sparkling essays, many of them published as “Notes of a Biology Watcher” in the New England Journal of Medicine. Collected in book form they won two Pulitzer Prizes.12 Peter Medawar13 did it, and Oliver Sacks14 can do it too. But the little company of medical writers whose prose is like music or poetry is shrinking. I can count on my fingers the ones who give me pleasure as I read, and whose thoughts I admire. You too can make life more pleasant for medical editors and for those who read what you write: learn to write well by following these examples! Even the good writers among you can become better. But of course this is not the real reason to read books like those I have mentioned here. The real reason is to enrich the mind and spirit, and to experience the pleasures of reading. I am grateful to Dr. Karen Trollope-Kumar for inviting me to speak on this subject, and thereby stimulating me to think about the pleasures of reading; I probably owe my lifelong love of literature to my English teachers at St Peter’s College in Adelaide, Australia, in the early 1940s; and as always I am grateful to my wife, Wendy, for critical comments. This paper is based on a presentation at a Symposium on “The Role of the Medical Humanities in Education and Healing” at McMaster University, Hamilton, Ontario, May 19, 1999 - Updike J: Rabbit, Run (1960); Rabbit Redux (1971); Rabbit is Rich (1981); Rabbit at Rest (1990). New York: Knopf; also available in Penguin. - Campbell E J Moran: Not Always on the Level. London: The Memoir Club (BMA Books), 1988. - Williams W C: The Use of Force in The Doctor Stories. Compiled by Robert Coles. New York: New Directions Paperbacks, 1984; pp 56-60. - Shem S: The House of God. New York: Dell, 1978; p 246. - Flaubert G: Madame Bovary. Translated from the French by Francis Steegmuller. New York: Vintage 1957; p 11. - Allende I: Paula; a memoir. Translated from the Spanish by Margaret Sayers Peden. New York: Harper Perennial, 1995. - Roueche B: Eleven Blue Men and Other Narratives of Medical Detection. Boston: Little, Brown & Co, 1954. - Shaw G B: The Doctor’s Dilemma. London: Constable, 1913; Preface on Doctors, pp 3-79. - di Pirajno A: A Cure of Serpents; a Doctor in Africa. London: Andre Deutsch 1955. - Barker P: The Regeneration Trilogy (Regeneration, The Eye in the Door, The Ghost Road). London: Penguin. Highlighted in Frontispiece Fall 2008- Volume 1, Issue 1
<urn:uuid:6cbc3c33-f929-44d4-b088-5a8dd0fa47b1>
CC-MAIN-2018-05
http://hekint.org/2017/03/04/medicine-and-literature-passion-compassion-confusion-and-other-emotions-in-stories-of-sickness-and-healers/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886939.10/warc/CC-MAIN-20180117122304-20180117142304-00507.warc.gz
en
0.965034
4,704
2.6875
3
There are various common dental issues. It is not something that a person will always experience the same trouble or the same problems. Since the conditions are different, so are the diseases. Different people experience different dental emergencies based on the conditions and environment they provide to their teeth. What Is Pyorrhoea? Periodontitis, most commonly known as Pyorrhoea, is a severe gum infection that damages gums and can destroy the jawbone. Over 10 million cases of pyorrhoea are seen in America almost every year. It is not exempted for any particular age group, be it a child or an adult, very often they all experience this disease. There are various causes for this dental disease. They are: - Hygiene: It gives rise to unwanted bacteria in the mouth. The bacteria thrive upon the leftover food that gets clung to the teeth after eating. Improper hygiene is the only reason for the bacteria to grow. If one would have washed the teeth properly after eating, then there could have no chances for the bacteria to thrive on the teeth. - Bacteria: It is an undeniable fact that the most important cause of any dental problem is the growth of bacteria in some way or the other, the same goes for Pyorrhoea also. The bacteria infect the gum causing them to become swollen and red, which is a stage of the disease itself. - Poor eating habits: Improper diet, eating junk all the way, food rich in sugar, red meat all these contribute a lot in the growth of this disease, as they all provide a proper situation for the bacteria to grow and dwell in the mouth. - Intake of Tobacco, alcohol, etc.: These also give a push to this disease and generally make it worse at later stages. - Ways of brushing: an Inappropriate way of brushing or incorrect brush leads to this disease as it makes the gum very tender and easy to bleed even at a mild touch. - Allergy: Allergy from a particular thing can promote the development of the disease. It degrades the efficiency of the immune system making the mouth vulnerable to the attack of bacteria that later causes harm to the gums. The condition of Pyorrhoea gets unnoticed in the initial stages as it is a painless condition and the person facing it can’t find any discomforts at first but as the disease progresses, some symptoms become prominent. They are: - Swollen, red gum that feels tender when touched and even with a mild jolt, they start bleeding. - Spaces develop between the teeth and gum. - Pus between the teeth and gum can also be found. This pus travels into the stomach when a person eats or drinks anything which can cause severe troubles for the whole body in the long run. - Bad breath is also one such symptom, that can give the idea of any such disease in your mouth. - After some time loose teeth is also seen in the patients suffering from Pyorrhoea along with a kind of a toothache. - It means pyorrhoea is due to lack of attention towards your teeth. If you do not give the primary care, they require you are leading yourself to get the disease. Every disease has some prevention which can help in getting rid of them. For Pyorrhoea, they are: - Oral hygiene should be implemented to avoid such problems. Initial treatments may start with self-care of tooth polishing using a gritty paste or adequately using the brush to remove the stains on teeth. Some particles get entangled in the teeth, and even after brushing they don’t come out, in such cases it is advisable to use mouthwashes. - Some medicines are also available for applying or using orally to stop the infection like antibiotics, Penicillin antibiotic, etc. - Regular diet, suitable food, and food timing are essential to maintain, to avoid the disease. - The medical procedure includes removal of infected, dead or destroyed cells and tissues from the wounded areas to favor healing. - The important to visit the right dentist at the right time so that he/she can treat the disease on time. As in extreme cases, the infected gums can be removed via surgery and needless to say it requires an experienced dentist. Important Article: Teeth Whitening Useful Facts It is advised by Dr. Roman Fedorciw, a Middletown Dentist, to always consult a well-informed dentist for such type of sensitive dental issues (like a certified dentist or qualified primary care providers) who can give a friendly and reliable environment to the patients. The dental offices, which can treat all the people from different backgrounds irrespective of their age, should be opted.
<urn:uuid:82dab6dc-5b9d-46a1-ac1c-91543842d972>
CC-MAIN-2022-27
https://dentalmedicalmarketing.com/pyorrhoea-periodontitis-advanced-stage-of-periodontal-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103328647.18/warc/CC-MAIN-20220627043200-20220627073200-00554.warc.gz
en
0.944629
988
3.578125
4
Past due is a loan amount that has not been paid on time at the dues payment date. People who borrow something or a loan, it has a time-lapse to return that loan or borrowings which if not paid would keep on adding the interest and that amount that is yet to be paid is called past due it is also known as overdue. That date has been extended by the lender and has a grace period of time for the borrower to pay it back. There is a certain procedure for paying the past due back to the lender. If the lender has given the money they expect the borrower to give it back to him within a specific time period. If it has not been paid in that time span it would be considered as a late fee or a grace period would be given by the lender. Let’s say a bill was about to be paid till the 10th of every month. If it has not been paid till the 10th then it would become a past due amount and if a grace period of 10 days would be given then it would be submitted with late fee charges and would not be submitted after the 20th of the month. After that legal action takes place and all the decisions are made keeping law, rules, and regulations in consideration. Past due is an amount that needs to be taken care of at any cost otherwise it can cause heavy damages to the borrower party. ← Previous Article« Download Painting and Art Work Invoice Template for Microsoft Word Next Article →
<urn:uuid:89511185-1ed4-4111-9ab5-3e18e29ef5dc>
CC-MAIN-2022-49
https://freeonlineinvoice.com/download/ms-word-past-due-invoice-template-with-professional-contents/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00450.warc.gz
en
0.983315
303
3.5
4
In Robert Louis Stevenson’s classic story, Dr Henry Jekyll drinks a mysterious potion that transforms him from an upstanding citizen into the violent, murderous Edward Hyde. We might think that such an easy transformation would be confined to the pages of fiction, but a similar fate regularly befalls a common fungus called Fusarium oxysporum. A team of scientists led by Li-Jun Ma and Charlotte van der Does have found that the fungus can swap four entire chromosomes form one individual to another. This package is the genetic equivalent of Stevenson’s potion. It has everything a humble, Jekyll-like fungus needs to transform from a version that coexists harmlessly with plants into a Hyde-like agent of disease. In this guise, it infects so many plant species so virulently that it has earned the nickname of Agent Green and has been considered for use as a biological weapon. It can even infect humans. These disease-making chromosomes came to light after Ma and van der Does sequenced the genome of a variety of F.oxysporum called lycopersici (or ‘Fol’), which infects tomatoes. Its genome was unexpectedly massive, 44% bigger than its closest relative, the cereal-infecting F.verticillioides. Looking closer, Ma and van der Does found that most of this excess DNA lies within four extra chromosomes, which Fol has and its relative lacks. Together, they make up a quarter of Fol’s genome. Ma and van der Does demonstrated the power of this extraneous quartet by incubating a harmless strain of Fol with one that causes tomato wilt. Just by sharing the same space, the inoffensive strain managed to acquire two of the extra chromosomes found in the virulent one. And, suddenly, it too could infect tomatoes. In a single event, the fungus had been loaded with a mobile armoury and changed into a killer. It seems that the fungus needs just two of the four chromosomes to cause disease; the others probably act as accessories, boosting its new pestilent powers. The extra chromosomes are loaded with a wide variety of jumping genes, parasitic sequences that can hop into new locations under their own steam. Their presence may explain why the fungus can swap large chunks of genetic material with such apparent ease. Only a fifth of the DNA in these chromosomes consists of protein-encoding genes, but many of these are known players in the infection game. They produce enzymes that break down the tough cell walls of plants and destroy its tissues. But these weapons are very specific. Other varieties of F.oxysporum, which attack different plants, also have extra chromosomes but theirs are very different to those of Fol. While the core genomes of these varieties are 98% identical, most of Fol’s extra sequences have no counterpart in other strains and vice versa. This incredible genetic variety may explain why this particular fungus is so good at infecting different plants. Each variety is armed with its own unique stash of weapons, tailored to the defences of its particular host. Indeed, when Ma and van der Does incubated the innocuous fungus with varieties that infect melons or bananas, it never gained the ability to infect tomatoes. Only another tomato-killer could bestow those powers. Where did these four chromosomes come from? Their sequences reveal that they are donations from other species of Fusarium. It’s a magnificent example of horizontal gene transfer, where living things undercut the slow passage of genes from parent to offspring and simply trade them between individuals. These genetic swaps are common in bacteria and they too can change from harmless microbes to deadly killers by trading chunks of DNA called “pathogenicity islands“. One such package can convert Staphylococcus aureus from a harmless resident of our skin into the agent behind toxic shock syndrome. We’re becoming increasingly aware of similar genetic exchanges in more complex organisms like plants, fungi and even animals, but the transfer of four entire chromosomes – a massive bundle of DNA by anyone’s standards – is completely unheard of. These sequences could trigger massive leaps in the evolution of these fungi and their hosts, suddenly triggering epidemics where previously there was harmony. Reference: Nature http://dx.doi.org/10.1038/nature08850 More on fungi: - Leafcutter ants rely on bacteria to fertilise their fungus gardens - Beetle and yeast team up against bees - The fiery taste of chillies is a defence against a fungus - Fungi transform depleted uranium into chemically stable minerals Random picks from the archive: - Cuttlefish tailor their defences to different predators - Tiger moths jam the sonar of bats - Giant bees do Mexican waves to ward off wasps
<urn:uuid:e5bf2f85-b107-48e8-9fdf-dc105894334a>
CC-MAIN-2016-36
http://blogs.discovermagazine.com/notrocketscience/2010/03/17/attack-of-the-killer-tomato-fungus-driven-by-mobile-weapons-package/
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296571.15/warc/CC-MAIN-20160823195816-00254-ip-10-153-172-175.ec2.internal.warc.gz
en
0.945265
980
3.078125
3
Trees and Rocks c.1845 Pencil, brown ink, ink wash and bodycolour 33.5 x 27.5 cm Another brown ink study deposited at Oxford with the well-known Stone Pines at Sestri of 1845 is a smaller Rough sketch of tree growth, "marking simply the lights and darks . . . of real shadow" (21.296). This is inscribed 'Macugnaga Aug. 4th', again of 1845, which must be the date, and probably the location, of this more detailed study of Trees and Rocks. The energy in the penmanship and swift application of wash suggests that this was also made on the spot. The artist James Duffield Harding was Ruskin's travelling companion for part of the 1845 tour, and in a letter of 26 August to his father, Ruskin bemoaned the "brown, laboured, melancholy, uncovetable" drawings of his own, in comparison with "such pretty things, such desirable things to have" that Harding had done. However, Ruskin could see an essential and significant difference between Harding's picturesque compositions and his own pragmatic observation of nature: "his sketches are always pretty because he balances their parts together & considers them as pictures – mine are always ugly, for I consider my sketch only as a written note of certain facts, and those I put down in the rudest & clearest way as many as possible. Harding's are all for impression - mine all for information". The tall, upright conifers depicted here, both in the middle foreground and on the distant hills, are very different from those in Ruskin's well-known painting of southern Stone Pines (or Umbrella Pines; Pinus pinea L.) which, as the alternative name suggests, have a rather flattened crown. Since only an impression of the trees is given in the drawing, it is impossible to give them a precise name. However, Macugnana, where the trees may have been painted, is a village high in the Monte Rosa Massif of north Piedmont, Italy. They might, therefore, be the evergreen Silver Fir (Abies alba Miller), Norway Spruce (Picea abies (L.) Karsten) or perhaps the deciduous European Larch (Larix decidua Miller; alt. L. europea), all known to grow in the mountains of that region. These suggestions should, however, be regarded as extremely tentative. The stunted and twisted, broad-leaved trees are also extremely difficult to identify. On the lower slopes around Macugnana are mixed woodlands of maple, ash, oak and chestnut, with beech trees occurring on higher slopes. The twisted stems depicted here, however, are more likely to be Birch (Betula spp.) or perhaps Alder (Alnus glutinosa (L.) Gaertner). Both are known to grow on the banks of high mountain streams around Macugnana. Interestingly, in the extreme left foreground, where ground dwelling plants have been suggested, are what appear to be some tri-foliate, compound leaves with heart shaped leaflets of Wood Sorrel (Oxalis acetosella L.), Ruskin's "favourite Chamouni plant". This entry was researched and written by Professor David Ingram.
<urn:uuid:2f41630d-89ea-4139-9549-20f741ba1a58>
CC-MAIN-2014-52
http://www.lancaster.ac.uk/users/ruskinlib/Flora/1996P1566.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770557.39/warc/CC-MAIN-20141217075250-00080-ip-10-231-17-201.ec2.internal.warc.gz
en
0.962837
690
2.53125
3
Hazard controls are various types of steps that can be taken to limit or even eliminate various hazards in the workplace. These steps are organized into a hierarchy of controls, so people can attempt to perform the most effective option first, and then go down the list until they reach the bottom. In some cases it is necessary to implement items at more than one level of this hierarchy of hazard controls in order to get the desired results. What is the Hierarchy of Controls? The hierarchy of controls is typically displayed as a triangle with the broadest part at the top, and the point at the bottom. Along the top section of the triangle is the best type of hazard control that should be used whenever possible. Then as the triangle narrows, the other options are listed in order of desirability. The following are the control options in order from top to bottom in terms of desirability: - Elimination – Eliminating a hazard is the best possible option, though it often isn’t practical. For example, if there is a flammable item near a machine that gets hot, it is best to eliminate the hazard by removing it from the area so that the risk is entirely gone. - Substitution – Similar to elimination, this option replaces the hazardous item with another item that is not hazardous, or at least less hazardous. In the example of a flammable item used above, it may be possible to remove the flammable item from the area and replace it with something that won’t burn. - Engineering Controls – The next best option is to put in engineering controls to address the hazard. Using the same situation as above, an engineering control may include placing a heat shield around the item so that it can remain in place, but not be exposed to the dangerous heat. - Administrative Controls – When none of the above options are possible or practical, the next option is to implement procedures or policies that will minimize the risk of the hazardous event from taking place. This could include putting up safety signs, floor markings, or making a policy that instructs employees on how to avoid a hazard. - Personal Protection Equipment – The final option is to make sure that employees are using personal protection equipment, or PPE. At this level the hazard is still there, but in the event that the dangerous situation occurs, employees will be as protected as possible thanks to the PPE. In general, the higher items on a list will be more costly and less convenient, but more effective. Employers need to find the right balance between safety and being able to operate their business. To the extent possible, using controls at the higher end of this list is encouraged. - Why Should a Workplace Implement Hazard Controls? - What is the hierarchy of hazards? - What are examples of administrative controls? - What does JSA stand for? - What is the role of PPE in workplace safety? - What are examples of a hazard? - What are safeguards? - What are occupational health hazards? - How are hazards controlled in a confined space?
<urn:uuid:a5cdb17a-3eb4-4334-b181-aec5a810ca70>
CC-MAIN-2023-50
https://www.creativesafetysupply.com/qa/workplace-safety/what-are-hazard-controls
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00311.warc.gz
en
0.925496
629
3.3125
3
Road safety is more important now than ever. With more people driving under the influence of alcohol and engaged in driving distracted, it is no surprise that the number of car accidents is on the rise. The National Safety Council reported that car accident fatalities topped 40,000 people in 2017, for the second straight year. Texas leads as the state with the most motor vehicle crash fatalities. Houston car accident lawyer, Brian White, reports that the top two factors for fatal car accidents in Texas are, unsurprisingly, speeding or driving under the influence of drugs or alcohol. For drivers to be more meticulous and careful in their driving, they should review and remember the fundamentals. Many drivers are on the road every day and think that driving is like muscle memory. While some of this is true, it doesn’t mean that drivers should stop thinking about the detailed protocols of driving. Here are 5 things that all drivers need to remember. 1: Check Your Mirrors and Headrest Do you share your car with another driver? If so, get into the habit of checking your mirrors and adjusting your headrest and seat before taking off. Forgetting to adjust your mirrors can result in more blind spots and potentially cause accidents. You should also make sure that your headrest is in the right configuration before you drive. Headrests are designed to limit the amount of whiplash in the event of a rear-end accident. When properly positioned, the headrest should be even with the top of your head and about one inch away from the back of your head. 2: When to Turn Your Wheels You don’t want to be the person that gets a ticket for forgetting which way to turn their wheels. So here is a quick and easy way to remember which way you should turn them: - When you park facing uphill, you should turn your wheels away from the curb. Remember this by remembering, “Up, up and away.” - When you park facing downhill, you should turn your wheels to the curb. Remember this by remembering, “Down, down to the ground.” Practice Safe Driving with these essential eLearning courses: 3: Wear Your Seatbelt This one is non-negotiable. People often try to avoid wearing seatbelts or will wear them in a different way. Don’t do this. Seatbelts are designed the way they are to save and protect lives. It doesn’t matter how short or long your drive is. You should always wear a seat belt properly. 4: How to Drive in Fog Driving in fog can be very stressful and scary. Here are few tips to remember: - Don’t use your high beams. You may think that using your high beams will allow you to see more. However, more light will reflect off the fog, making it more difficult for you to see. - Slow down. Driving recklessly in the fog can and will cause accidents! - Make sure you stay in your lane. This is true for any time that you are driving, however, it is important to be cognizant of this while you’re driving in dense fog. 5: What to Do When You Hydroplane There is nothing scarier than hydroplaning during a heavy rainstorm. Many people panic and are not aware of what they should do. Here are a few tips on how to avoid hydroplaning: - Avoid driving fast in the rain. This sounds obvious but many people think that rain is no excuse to drive slower. However, it is better safe than sorry! Drive with caution. - Check on your tires. If your tires are a bit worn with inadequate tread, it will increase your chances of hydroplaning. - Avoid puddles. If it is possible and safe for you to drive around a puddle, do so. Here are some dos and don’ts when hydroplaning: - Don’t panic! - Don’t slam on the brakes. - Don’t press on the gas. - Do steer in a straight line. - Do remain calm and let your car regain contact with the road on its own. Safe driving will not only save your life, but it can also save many lives. Relearning the fundamentals will strengthen your foundation and allow you to be a better driver. Improve your confidence behind the wheel by studying the fundamentals. About the Author
<urn:uuid:d4c2b0bd-d24e-42e4-8e0f-eed38cdc863e>
CC-MAIN-2019-13
https://www.driversalert.com/5-things-all-drivers-need-to-remember/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203947.59/warc/CC-MAIN-20190325112917-20190325134917-00093.warc.gz
en
0.953319
920
2.578125
3
It's not a fluke: For the third time, scientists have detected ripples in space-time caused when two black holes circle each other at mind-bending speeds and collide. The LIGO gravitational-wave detector spotted the space-time ripples on Jan. 4, members of the LIGO Scientific Collaboration announced today (June 1). If this news sounds familiar, it's because this is the third black-hole collision that LIGO has detected in less than two years. These three consecutive discoveries signal to astrophysicists that mergers between black holes in this mass range are so common in the universe that LIGO may detect as many as one per day when the observatory begins operating at its full sensitivity, members of the collaboration said during a news teleconference yesterday (May 31). [How to See Space-Time Stretch - LIGO | Video] "If we'd run for a long time and hadn't seen a third black-hole merger … we would have started scratching our heads and saying, 'Did we just get really lucky that we saw these two rare events?'" David Reitze, LIGO Laboratory executive director and a professor of physics at the California Institute of Technology, told Space.com. "Now I think we can say safely that that's not the case. I think that's exciting." A batch of black-hole detections by LIGO could help scientists learn how black holes of this size — those with masses tens of times that of the sun, or so-called stellar-mass black holes — are born, and what causes them to come together and merge into a new, single black hole. A paper describing the new discovery includes a few clues about the spins of the original two black holes, which is an early step in learning about the environment where they formed and how they ended up colliding. Ripples in space-time LIGO (which stands for Laser Interferometer Gravitational-Wave Observatory) was the first experiment in history to directly detect gravitational waves — ripples in the universal fabric known as space-time that were first predicted by Albert Einstein. The famous physicist showed that space and time are fundamentally linked, such that when space is distorted, time can either slow down or speed up. Although LIGO first began taking data in 2002, it wasn't until the observatory underwent a major upgrade, called Advanced LIGO, that it achieved the sensitivity necessary to make a detection. The first black-hole merger spotted by LIGO was announced in February 2016; the second was announced in June 2016. This new merger spotted by LIGO took place between one black hole with a mass about 19 times that of the sun, and another with a mass about 31 times that of the sun. Those companions combined to form a new black-hole with a mass of about 49 times that of the sun (some mass can be lost during the merger). The entire mass of that final black hole is packed into an object with a diameter of about 167 miles (270 kilometers), or about the width of the state of Massachusetts, according to the LIGO scientists. This newly-formed black hole falls between the final masses of the black holes that LIGO previously detected, which were 62 solar masses and 21 solar masses. The gravitational waves created by this new black hole collision had to travel across the universe for 3 billion years before they reached Earth. That means this new black hole merger occurred more than twice as far away from Earth as the first and second black hole mergers detected by LIGO. The gravitational waves from those black hole collisions traveled for 1.3 billion and 1.4 billion years to reach Earth, respectively. However, as with the previous two detections, the LIGO detector can't determine precisely where the newly formed black hole is located. Rather, the data only narrows down the source of the signal to an area of about 1,200 square degrees. (See the map of the sky above to see the area from which the signal could have come.) Because black holes don't radiate any light of their own (or reflect light from other sources), they are effectively invisible to light-based telescopes, unless regular matter nearby creates a secondary source of light. Black holes with masses between 20 and 100 solar masses aren't expected to have much, if any, regular matter around them radiating light, and black holes in this mass range hadn't been observed by astronomers prior to LIGO's three discoveries. But gravitational waves come directly from the black holes. This opens up a new realm of the universe that is visible to an instrument like LIGO, which was designed to detect gravitational waves, but invisible to other telescopes. The three mergers that LIGO detected not only confirm the existence of black holes in this mass range, but also show that they are fairly common throughout the universe, according to the collaboration members. [Images: Black Holes of the Universe] Watch it spin In the data from the new detection, the LIGO scientists managed to glean a little information about the spin of the two black holes. Those clues could hint at why the black holes wound up crashing into each other, LIGO collaboration members said. Black holes spin on their axes just as the Earth, most planets and most moons do. Stellar-mass black holes are thought to form when massive stars run out of fuel and collapse. If two massive stars live in a "binary" system, they will typically spin along the same axis, like two tops spinning next to each other on the ground. When those stars become black holes, they will also spin along the same axis, researchers said in a statement from Caltech. But if the black holes formed in different regions of a stellar cluster and come together later, they may not spin along the same axis. Those misaligned spins will slow the merger, said Laura Cadonati, the LIGO Scientific Collaboration's deputy spokesperson and an associate professor of physics at the Georgia Institute of Technology. "In our analysis, we cannot measure spins of individual black holes very well but can tell if they're generally spinning in same direction," Cadonati said during yesterday's news teleconference. The LIGO data doesn't provide a strong ruling about whether the black-hole spins were aligned or misaligned. The authors of the new research concluded that the data "disfavors" the identical spin alignment of the black-hole axis, according to the paper, which has been accepted for publication in the journal Physical Review Letters. "This is the first time that we have evidence that the black holes may not be aligned, giving us just a tiny hint that binary black holes may form in dense stellar clusters," Bangalore Sathyaprakash, a researcher at Pennsylvania State University and Cardiff University and one of the LIGO collaboration members who edited the new paper, said in the statement from Caltech. Of course, black-hole mergers could arise from both scenarios. To get an idea of the most common origin story for solar-mass black-hole mergers, LIGO scientists will need more than three examples to study. The discovery of three stellar-mass black-hole mergers in less than two years indicates that LIGO will be seeing a lot more of these types of events, Reitze told Space.com. But three events are still not enough to know for sure exactly how frequently LIGO will begin to see these black-hole collisions once its sensitivity is increased. The optimistic estimate that Reitze and other collaboration members cite is one per day, but even the pessimistic estimates are around one per month. That means LIGO could collect data on tens to hundreds of black-hole mergers in three to five years of operations. With this collection of black-hole mergers, scientists will be able to learn about the general population rather than a few individuals. A large collection of black holes could also provide scientists with a deeper look at Einstein's theory of general relativity. Black holes are "pure space-time," according to Reitze, meaning that while they might have formed from regular matter, their interaction with the universe has none of the properties of regular matter. Rather, the characteristics of a black hole are described entirely in terms of how its gravity warps space-time or influences other objects. The theory of relativity predicted the existence of space-time and gravitational waves, so LIGO's detection of this phenomenon was another confirmation that the theory is accurate. But the study of black holes and gravitational waves could also reveal cracks in that theory. For example, when light waves pass through a medium like glass, they may be slowed based on their wavelength — a process called dispersion. General relativity states that gravitational waves should not be dispersed as they travel through space, and the researchers saw no sign of dispersion in LIGO's new data. For now, it seems, Einstein was right. But one of the most exciting things that LIGO could potentially discover is a flaw in the theory, Reitze said. Einstein's theory of gravity has withstood scrutiny for more than a century, but it also doesn't match up with the theory of quantum mechanics. The lack of an obvious connection between gravity (which generally describes the universe on very large scales) and quantum mechanics (which describes the universe on very small scales) is one of the most significant unsolved problems in physics. That problem isn't likely to go away unless it turns out there's some still-undiscovered angle to one or both of those theories. "The question is, where does [general relativity] break down," Reitze said, and will LIGO's data on black holes provide the right laboratory for answering that question? The detection of a gravitational-wave signal is significant for LIGO because it confirms that the experiment is "moving from novelty to real gravitational-wave science," David Shoemaker, a spokesperson for the LIGO Scientific Collaboration and a professor of physics at MIT, said during the news conference. This gravitational-wave-hunting machine has officially demonstrated its ability to illuminate a once-dark sector of the universe.
<urn:uuid:b9a773ad-cfad-4259-b625-9b66348d9685>
CC-MAIN-2020-29
https://www.space.com/37049-gravitational-wave-experiment-detects-third-black-hole-merger.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00560.warc.gz
en
0.956199
2,090
3.40625
3
Until now, it has been widely acknowledged that the ever-popular Volkswagen Beetle has a tainted history, having been originally designed and commissioned by Nazi dictator Adolf Hitler. But could the history behind one of the most fashionable production cars ever be more complex? Paul Schilperoord, a Dutch journalist and historian, certainly thinks so. Schilperoord alleges in his new book Het Ware Verhaal van de Kever ("The True Story of the Beetle"), to be released later this month, that Ferdinand Porsche's iconic Beetle, officially commissioned by Hitler, may well have been taken from a design by a Jewish engineer called Josef Ganz, who never received due credit. (JPOST) Click here to read the entire article.
<urn:uuid:14072e40-96be-478d-b63c-8e68e5554f22>
CC-MAIN-2014-35
http://www.jewishgen.blogspot.com/2009/09/was-beetle-actually-designed-by-jew.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00285-ip-10-180-136-8.ec2.internal.warc.gz
en
0.96905
151
2.78125
3
Using a Domain to Create Custom-Validated Data Types When you find yourself repeating the same sanity-checking validations on the values of similar attributes across multiple entity objects, you can save yourself time and effort by creating your own data types that encapsulate this validation. For example, in your application you may have numerous entity object attributes that store strings that represent URLs. One technique you could use to ensure that end users always enter a valid URL is to create your own data type, for example URLDomain, that represents the structure and format of a URL. You can then use URLDomain as the data type of every attribute in your application that represents a URL. When you create a new domain object, JDeveloper generates code in the domain’s constructor to call the validate() method of the domain class. When you add your validation code to this method, it is automatically executed when the domain object is instantiated. The clear benefit of using a domain is that a domain can be used by multiple attributes whereas a validation rule (other than a global rule) applies to one attribute or entity object only. Note: Domain validation code is executed whenever you query existing data. If existing data fails the check, you need to either correct the existing data or code the check so that existing data is determined to be valid.
<urn:uuid:0e74c249-902e-46f3-9ca0-ebf2ce34d1be>
CC-MAIN-2020-45
https://oracle-adf.com/website/docs/Learn_Oracle_ADF/04-Oracle_11g_ADF_University/Oracle_11g_ADF_I/09Validation/text34.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107897022.61/warc/CC-MAIN-20201028073614-20201028103614-00526.warc.gz
en
0.803734
268
2.6875
3
The Brain’s Hunger for Connection March 22, 2023 How Our Brains Process Loneliness Our brains see loneliness in a similar way to hunger. Brain scans show that the same regions of the brain are activated when someone who hasn’t eaten in hours sees pictures of delicious food and when someone who has been alone for hours sees pictures of happy groups of friends. This activity is found in a part of the brain called the default network, which springs into action during passive activities and when we speak, reason, and think about the future. Interestingly, this network is also activated when we think about other people and what their actions mean. This heightened brain activity in the default network can lead to a rich imaginary social life where we may even attribute human-like qualities to our pets. This tendency, while not necessarily problematic, can make real-life social interactions seem less satisfying in comparison. In a 2021 study researchers found that chronic loneliness can have a significant impact on the structure of our brains. People who lacked social connections had a smaller orbitofrontal cortex, which is a part of the brain that processes rewards, like the benefits of social interactions. As a result, chronically lonely individuals may struggle to interpret other people’s actions and understand their intentions. Loneliness affects not only the structure of our brain but our perception and interactions with others. It is associated with reduced trust in others less, discomfort with physical touch, and a preference to stand farther away from strangers. A 2021 study found that when lonely people played a trust-based game, a region of their brains called the insula, which is linked to examining our “gut feelings,” is not very active. This suggests that trust is a major factor in how we interact with others when we’re lonely, and interventions targeting trust could be part of the solution to loneliness. The Power of Creative Expression Loneliness can have a serious impact on our mental wellbeing, but the good news is that creative expression can be a powerful tool in stimulating our brains and enhancing our wellbeing. Engaging in the arts can have a positive impact on our mental health, as it influences the reward circuitry in the brain, called the medial forebrain bundle, which can be linked to the default network. For instance, listening to music engages our brain’s endorphin system which relieves pain and stress, and the endorphins released in the brain during musical interactions are linked to social bonding behaviors. By understanding the science behind loneliness and actively making efforts to connect with others through creative expression, we can create a happier and healthier future. Check out our Project UnLonely webpage to learn more about raising awareness of the loneliness epidemic and empowering people and communities to connect with each other through the arts. Find research studies, articles, media placements, and editorial content that demonstrate how art serves as a catalyst for improved health. Throughout our history, humans have been driven by the urge to create and express themselves. Creative expression allow us to share our stories, helping us to relate to one another, understand the world around us, and feel less alone. COVID-19 has drastically altered our workplaces, and feelings of loneliness and disconnection at work have surged. With working from home and seemingly endless nonstop screen time, how connected do you feel to your colleagues? Getting creative is not only enjoyable, it’s good for your brain and your relationships! Creative expression can help you feel more connected to yourself and those around you, leading to improved mental health and a boost in self-esteem. Explore the resources we provide to help spark creativity and improve well-being.
<urn:uuid:24def9a8-960f-4658-b561-17cc764f961a>
CC-MAIN-2023-40
https://www.artandhealing.org/brain-hunger-connection/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00652.warc.gz
en
0.943247
757
3.453125
3
Integrating Science & ELA: Discoveries from the Early Implementer Evaluators By Ashley Iveland and Tyler Burr Student writing in Science Notebook on results from testing their design next to the finished design of their pollinator.[/caption] A second-grade classroom is “a-buzz” with students drawing designs and researching pollinators. They are learning about animals that pollinate plants by watching videos and reading a variety of print and online sources. Their research reinforces the observations they made while in the school garden and will help them as they engineer their own pollinators. In their notebooks, students continually revise their drawings as they get ideas from their research and feedback from their peers. The excitement grows as they finalize plans for the pollinators that they will build and test the next day. Benefits of Integrating Science and ELA These second-grade students are working through the engineering design process, applying science concepts and practices as well as a range of English Language Arts (ELA) skills: reading, writing, speaking and listening. Their teacher, a 20-year veteran and a participant in the CA K-8 NGSS Early Implementer Initiative, finds it “critically important to integrate throughout the different subjects.” She knows that there are many benefits to integrating science with other subjects, especially ELA. NGSS science taps into the natural curiosity and energy of young people and provides content for meaningful application of ELA skills. Challenging tasks—such as reading complex texts, formulating arguments, constructing explanations, and defending claims—come more easily when students are in pursuit of their own wonderings. As evaluators of the Early Implementers Initiative, we have observed many NGSS lessons and talked to teachers and administrators about the impact of NGSS instruction. This article is based on a recently released report from the evaluation team. The full report, “The Synergy of Science and English Language Arts,” contains eight examples of K-8 classroom instruction integrating science and ELA. (Find these and other resources here: http://k12alliance.org/ca-ngss.php ) We chose to focus on the integration of science and ELA to highlight the important potential benefits of such instruction. They include: • Reinforcing skills and content in both subjects • Supporting English Language Learners and ensuring all students are engaged • Making more time for science in the classroom (particularly in elementary school) without taking time away from other subjects Surveyed Early Implementer teachers reported that integrating ELA and science instruction allowed them to address a wide range of Common Core State Standards for ELA (CCSS-ELA). Five standards, in particular, emerged as especially conducive to integration (see Table 1). Our findings indicate that most, if not all, of the CCSS-ELA standards can be addressed using science as content. Standards for ELA that teachers addressed while integrating science with ELA during the 2016-17 school year.[/caption] A majority of teachers indicated teaching more science overall in 2016-17 compared to the previous year, and 35% of K-8 teachers chose “understanding how to integrate science with… CCSS-ELA standards” or “ELD standards” as the strongest influences for that increase. Each year, Early Implementer teachers report spending more time teaching science integrated with ELA (see Figure 1). During the 2016-17 school year, K-5 teachers reported that 31% of their time spent on science was integrated with ELA. Figure 1: Percentage of teachers teaching over 60 minutes of science integrated with ELA per week, 2014-15 to 2016-17[/caption] While these benefits are most evident in elementary school, middle school science and ELA teachers should also consider the importance of integrated instruction. CCSS-ELA includes reading and writing standards for literacy in other subject areas (including science) in grades 6-12, which are reinforced in the NGSS practices. These standards help to make science accessible to all students, especially ELLs, by developing their reading, writing, and language skills. Teachers also benefit, because the practices help to make students’ thinking apparent for formative and summative assessments of scientific understanding. One 8th grade teacher noted that when he provided his students with structures for academic language (such as sentence stems), they were better able to express their thinking and understanding: They have thoughts in their head but have a hard time expressing them because they have low Lexile scores or they are ELLs. Many times students like these don’t have the resources to be able to share, but they need to be able to share all those wonderful things in their head. (8th-grade teacher, San Diego) He emphasized that having ELA “reinforced in science is going to help students get more exposure with language, literacy, and writing,” in addition to engaging them in science practices (like engaging in argument from evidence). One of his—and many teachers’—favorite strategy to integrate ELA with science is “Claims, Evidence, and Reasoning” (CER). With CER, a student evaluates the relevance and reliability of evidence and then uses scientific reasoning to explain how that evidence logically supports a claim. Arguing from the evidence is a practice explicitly called for in the NGSS and the CCSS (see Figure 2). Evaluators for the Early Implementers Initiative found that over two-thirds of teachers (67%) reported using CER at least twice per month, and 18% used it two to five times each week. Figure 2. Commonalities Among the Practices in Science, Mathematics, and ELA[/caption] Additional information on CER can be found in “The Synergy of Science and English Language Arts” and in an upcoming evaluation report, “Guide to Tools and Strategies for NGSS Implementation” (to be released in February 2018). Getting Administrators on Board There are many reasons to integrate science and ELA, and the Early Implementers work has made it clear that administrators at both the school and district level play a critical role. In elementary school especially, teachers who were told by their administrators that math and ELA were priorities were reluctant to significantly address science. However, if administrators allow them to integrate, teachers can address both subjects more meaningfully. In year 3 of the Initiative, almost two-thirds of teachers (65%) reported that their school principals were “very” or “somewhat” supportive of them teaching science integrated with ELA, even during the time allotted specifically for ELA (for elementary teachers). Administrators should keep in mind the positive effects this kind of instruction can have on students: improvement for all students not just in science, but in ELA as well. More information on what administrators can do to support NGSS science and integrated instruction can be found in the report, “Administrators Matter in NGSS Implementation.” Ashley Iveland, Research Associate: Early Implementer’s Initiative Evaluation, WestEd. Email: [email protected] Tyler Burr, Project Director, Early Implementer’s Initiative Evaluation, WestEd. Email: [email protected]
<urn:uuid:93b4a092-cc5e-4fd6-b68e-a7efc1033bfc>
CC-MAIN-2022-40
https://classroomscience.org/articles/ngss/ngss-early-implementers/integrating-science-ela-discoveries-early-implementer-evaluators
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00175.warc.gz
en
0.946567
1,649
2.984375
3
What is "Emotional Eating"? What is “emotional eating”? This is a non-scientific term in common use that refers to a particular kind of episode of over-eating or binge-eating that is experienced as occurring in response to emotional triggers. When people come to see a clinical psychologist for help with binge eating, their eating patterns are often extremely erratic and irregular, and a significant number of episodes of binge eating may be driven by hunger. However, if binge eating remains a problem even when a regular eating pattern has been established, it is often the case that the binges are being triggered by external events or adverse moods rather than hunger. These are the kinds of episodes of eating sometimes referred to as “emotional eating”. For many people, proactive problem solving is sufficient to help them manage the events that trigger the changes in mood. However, there is a group of individuals who experience unusually intense moods, and who find these moods difficult to tolerate. Disordered eating appears to have a “mood-modulatory” effect for such people, perhaps by providing distraction, reducing awareness of, or in some way neutralising the moods. Binge-eating, vomiting and over-exercising are all behaviours that seem to help people who experience this kind of mood intolerance. Help for emotional eating How does a clinical psychologist help people in this situation? Together, episodes of so-called “emotional eating” are analysed, and clients are assisted in identifying the event that first prompts the urge to eat, their thoughts about that prompting event, the mood changes that occur, and then the thoughts about those mood changes, such as “I can’t stand feeling upset like this!” which amplifies the mood, leading of course to further difficulties tolerating it. Let’s look at an example. A young woman who struggles with disordered eating has an argument with her partner over his best friend coming to stay with them for a weekend. She interprets this as his not caring about her difficulties relating to this friend, and she becomes very upset and angry. She then has thoughts about her mood change such as “And now, look the evening is ruined - I didn’t want to get all upset today! I hate this!” She will as a result become even more distressed of course, and is at risk of turning to binge eating as a way of changing or reducing her unwanted mood state. Binge eating is reinforced if it occurs, because it is effective in reducing the intensity of the mood for this particular woman, and so she is more likely to binge again in similar circumstances. The obvious down-side of using binge-eating in this way is that while it is effective at removing or reducing the unwanted mood or distress in the short term, binge eating has negative longer term consequences that people are often painfully aware of. These long term consequences include health and physical effects, low self-esteem, poor interpersonal relationships, lost opportunities to learn more adaptive self-management skills and so on. As we have seen, the relief from unpleasant emotions that people may experience when they binge eat maintains the problem i.e. makes it more likely to happen again. Stepping out of this maintaining cycle requires that clients learn to slow down and analyse the situation as soon as a potential trigger occurs, and then learn to use alternate methods of mood modulation that work well in the short term and do not have the negative long-term consequences that binge eating does. Dialectical Behaviour Therapy is particularly helpful in these situations – it offers a range of alternate skills to manage emotion and mood. I invite you to review the article Treating Bulimia and binge eating with Dialectical Behaviour Therapy. If you or someone close to you struggles with so-called “emotional eating”, please consider making an appointment, and together we can plan an appropriate treatment strategy.
<urn:uuid:c23be963-06b8-49ab-837d-fb528074b7e0>
CC-MAIN-2020-29
https://www.bridgethoggpsychology.com.au/what-is-emotional-eating-1
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882634.5/warc/CC-MAIN-20200703153451-20200703183451-00507.warc.gz
en
0.976016
808
3.078125
3
SO FAR it is a matter of a few military tents, a handful of shivering soldiers and a disagreement over a remote and never-demarcated line in the Himalayas. Yet a lengthening stand-off between Chinese and Indian soldiers in a disputed part of Ladakh reflects a profound problem: already it ranks as the most serious confrontation between the Asian giants since the late 1980s. India accuses its neighbour to the north-east of sending troops some 19km past a line of actual control (LAC), in the Despang area of Ladakh, a part of Jammu & Kashmir state that is wedged between Tibet proper and the vale of Kashmir. They have reportedly been there for more than two weeks. Now a small number of Indian soldiers have set up camp within a stone’s throw of their Chinese counterparts. Though there is no sign yet of escalation—and would seem to be little prospect of it—nor have the sides found a way to walk back. The confrontation is taking place in an unpopulated district, but one that matters symbolically. Some 4,000km of the boundary between China and India remains unsettled, so tests in any particular spot along its course carry immense significance. Speculative reports suggest the area may also be rich in uranium. It is also, from the Chinese perspective, close to the Tibetan Autonomous Region and so significant for the government in Beijing as it tries to assert full political and military control over a troubled patch of its sovereign territory. Inside India the predominant explanation for the stand-off—among bloggers, retired generals, the opposition Bharatiya Janata Party (BJP), television commentators and newspaper columnists—is that China is entirely to blame. The incursion is seen simply as China putting pressure on militarily weaker India, presumably to extract concessions such as a freeze on the number of troops it deploys along the border, or some block on India’s development of bunkers, roads or other structures on its own side of the frontier. Any such freeze would leave Chinese forces, which are established on a plateau, in a much stronger position. They already enjoy the benefit of all-weather roads, railway lines and other structures that connect them to the rest of China. Some in this predominant Indian camp speculate that the cross-border incursion could have been led initially by an adventurous, lowish-ranking member of the People’s Liberation Army, to which China’s new political leadership subsequently acquiesced. Others in the commentariat prefer to emphasise that Indian weakness, including the feebleness of its road and military infrastructure in the Himalayas, practically invite regular Chinese assertiveness. It has been widely noted that leaks about the incursion came from India’s defence forces, while its diplomats appeared to try to hush it all up. One reliably hawkish Indian commentator, Brahma Chellaney, lashes out at India’s mild-mannered leaders as being unable to speak up themselves with any strength. Hawks, by and large, want India to retaliate by making remarks about China’s behaviour inside Tibet, essentially raising questions about the legitimacy of Chinese rule there. By contrast the prime minister, Manmohan Singh, and his foreign minister, Salman Khurshid, are playing down the dispute in Ladakh (and stay entirely mum on Tibet). Mr Khurshid has compared the Chinese incursion to a pimple on an otherwise unblemished face. A related but subtler response sees the current confrontation as being only partly about India’s relative weakness and partly as a Chinese reaction to India’s trying (even if in a limited way) to assert itself. One military analyst, Ajai Shukla, sees China behaving just as it did during two previous episodes of tension on the border, when India pushed forward. First in the 1950s, then again in the 1980s, India attempted to increase its military capacity along the disputed border. China reacted the first time by invading, which resulted in a brief border war in 1962 and the humiliation of India, as well as the destruction of what had been cordial relations. That war also cost China: marking it out as an aggressive power on the rise. The second time, in the 1980s, a confrontation on the border led eventually to a visit to China by Rajiv Gandhi, then India’s prime minister—and an improvement in ties. This time around, says Mr Shukla, China has clearly signalled its discomfort with India’s troop build-up, submitting a draft proposal for a freeze on troop levels that will solidify and make permanent India’s disadvantage along the LAC. He argues that India should respond by offering to keep talking; refusing such a freeze; and getting on meanwhile with building roads and other military infrastructure, as fast as it can. It is hard, in fact, to see what China actually hopes to achieve with the incursion. Its foreign-ministry spokesmen continue to deny any wrongdoing. They deny, too, accusations that Chinese helicopters crossed into Indian-controlled airspace in an attempt to resupply their soldiers. A series of proposed diplomatic meetings are set to go ahead, with Mr Khurshid due in China and China’s prime minister, Li Keqiang, in India, both next month. (Though India’s opposition parties are growing increasingly vocal against these trips.) Just what is going on is far from clear. China has so many other difficulties elsewhere around its perimeter—relations with Japan and the Philippines souring, for example; violent tension in its far-western province of Xinjing—it seems odd timing to choose to add another clash. Nor is it obvious that China could welcome the most likely domestic outcome in India: a stronger call for more spending on military capacity along the border. India’s reliance on a nuclear deterrent may now look insufficient: there are already calls for it to spend more on conventional forces, too, and they are likely to grow louder. Last, worsening bilateral relations would be at odds with broader gains between the countries in other fields. The value of bilateral trade, skewed heavily in China’s favour, has grown from just $2.9 billion a year at the start of the millennium to some $66 billion annually. China and India appear to co-operate as members of the BRICS group of countries, for example sharing a proposal to establish a new global development bank. And even along the disputed border, the two countries have established limited mechanisms for managing their disagreements peacefully. It looks unlikely that China’s new leaders wish to jeopardise all this. Thus its soldiers and tents will presumably be withdrawn before too long. The stakes, if they should not, look as high and dangerous as Himalayan peaks. (Picture credit: Wikimedia Commons)
<urn:uuid:c61ff30a-9fd7-4a10-a2dd-b2f8e61e4225>
CC-MAIN-2014-15
http://www7.economist.com/blogs/banyan/2013/04/india-and-china-square
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00499-ip-10-147-4-33.ec2.internal.warc.gz
en
0.966147
1,404
2.5625
3
A few kilometres north of the industrialized landscapes of Verviers, others have been able to keep a cachet of yesteryear. Although affected by the woolly economy, its inhabitants have preserved their agriculture and the particularities of this country of groves and grasslands. To discover and appreciate it, you have to take the time to get on your bike. The region is tamed by the fresh air and the five senses awakened. This bicycle tour is part of three itineraries designed by the network of Open Churches, "The Verviers revolution at the time of the industrial revolution". Download the tour brochure (PDF in FR) The former Herve station, completely refurbished, now houses the Maison du Tourisme. The first station in Herve dates back to 1873, a relatively late date compared to the arrival of the railway in the major Belgian cities (1842) Under the left cornice of the Town Hall, Saint John the Baptist, the patron saint of Herve, is represented with tannery and shoemaking tools. This work testifies to the importance of these activities for the city (...) Its tower dates back to the Middle Ages and looks like a dungeon, although it has always been part of a church. Dating from the early 13th century, it had a defensive function. Go inside and check the thickness of the walls: from 2.5 to 3 metres (...) This landscape of groves, so typical of the Pays de Herve, is the result of human intervention. Initially, the activity of these campaigns is the cultivation of cereals. In the 16th century, for various reasons, farmers became breeders and no longer farmers (...) In 1692, a great earthquake shook the whole region, the same one that would have caused the miracle of the Black Madonna at the Notre-Dame-des-Récollets church in Verviers. The village collapsed... The church tower, very solid, is one of the few buildings left standing (...) This village hides in the distance, behind the hills, at the end of the Pays de Herve. The landscape combines the gentleness of the Herven plateau with the diversity of the Ardennes mountains. The Mosane Renaissance left its mark, with the church, farms and houses in the surrounding area (...) In addition to passenger transport, the railway allowed the development of coal mines, but especially local products such as Herve cheese! But with the increasing competition from the automobile, the country lines are gradually disappearing (...)
<urn:uuid:c5f5f2b0-5017-4020-8ea8-80526086b2f1>
CC-MAIN-2019-51
https://openchurches.eu/en/churchesroutes/the-pays-de-herve-in-the-19th-century
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482284.9/warc/CC-MAIN-20191205213531-20191206001531-00222.warc.gz
en
0.951067
521
2.75
3
One of more powerful features of Scheme is it's ability to process 'Lists' of data. Lists are constructed by using the cons keyword, as is shown here: > (cons 1 '()) (1) cons creates a 'Pair' of values. However, if the last parameter of cons is a list (as the empty list, '() is) then it generates a list of 2 values. Knowing this, we can generate an infinitely long list using > (cons 1 (cons 2 (cons 3 '()))) (1 2 3) Helpfully, there is a shortcut to creating a list, the > (list 1 2 3) (1 2 3) This is completely analogous to the previous set of conses which built the same list. You can also type (quote (1 2 3)) or '(1 2 3) to develop the same list. There are a few primitive expressions for manipulating lists and pairs in Scheme. They are map. They select specific parts of the pair or list. > (define test (cons 1 2)) #<unspecified> > (car test) 1 > (cdr test) 2 As you can see from the example above, when used with a pair, car and cdr select the first and second half of the pair respectively. car And cdr can also be applied to lists. > (define test (list 1 1 2 3 5)) #<unspecified> > (car test) 1 > (cdr test) (1 2 3 5) So The result of cdr is always a list, if the parameter is a list. cdr can return the empty list, (), and this is often used to test if one has reached the end of the list. car can return an atomic data, however, what happens if we do this: > (define test (list (list 1 1) 2 3 5)) #<unspecified> > (car test) ? The answer is that you get another list, (1 1). Lists can contain within them any number of other datatypes. Vectors, symbols, strings, lists, pairs, numbers, any datatype that Scheme has. And car and cdr can handle them. There are shortcut procedures for accessing other elements in a list besides just the car and cdr. The second element of a list is accessed with cadr, the third with caddr, and so on. map is often considered to be one of the more useful (if less versatile) methods for manipulating a list. map Takes a list, and a procedure, and applies the procedure to every element of the list: > (map (lambda (x) (* x x)) (list 1 2 3 4 5 6)) (1 4 9 16 25 36) Since it is less versatile, it is not seen or used as often, and is overlooked. Many programmers forget the map procedure when repeatedly applying an operation to a list. Some Scheme programmers (for example, those using the Racket dialect of Scheme) like to give more descriptive names to car and cdr. (define first (lambda (x) (car x))) (define second (lambda (x) (cadr x))) (define rest (lambda (x) (cdr x)))
<urn:uuid:4ddcdd7e-add3-413e-823c-15affc6e54f1>
CC-MAIN-2014-42
http://en.m.wikibooks.org/wiki/Scheme_Programming/List_Operations
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507446525.24/warc/CC-MAIN-20141017005726-00256-ip-10-16-133-185.ec2.internal.warc.gz
en
0.848452
695
3.40625
3
Cycling is more than a healthy and fun activity for young kids; it’s an opportunity to travel long distances in a short amount of time. It opens the door to more independence, but with that freedom come certain responsibilities. Kids who ride bikes must know traffic laws – and parents should make a concerted effort to remind their children how to ride safely. Kids should understand how to avoid dangerous situations, and they should know the importance of wearing the proper safety equipment. In a bicycle crash, wearing a helmet can be the difference between sustaining minor injuries and facing lifelong physical and cognitive disabilities. As such, it is critical that parents purchase appropriate bicycle helmets for their children. Keep these tips in mind when comparing the options: - Purchase a brightly colored helmet; - Choose a well-ventilated helmet; - Check the helmet certification; - And make sure the helmet fits correctly. Although a helmet can reduce your child’s risk of a severe head injury, a collision with a negligent driver is still likely to cause serious damage. If your child was hit by a motorist in Louisiana, contact Morris Bart, LLC. A Monroe accident lawyer will evaluate your case to determine if you have grounds for a personal injury claim. Call 800-537-8185 to schedule a free initial consultation. Let’s take a closer look at four tips to help you purchase a safe helmet for your child: - Purchase a Brightly Colored Helmet It is important that other road users can see your child. A brightly colored helmet will make him or her more visible. If your child intends to ride at dusk or dawn, then add reflective tape to the front, back and sides of the helmet. - Choose a Well-Ventilated Helmet A well-ventilated helmet will be more comfortable, which will encourage your child to use it. - Check the Helmet Certification Make sure the helmet you purchase has a certification from the United States Consumer Product Safety Commission or the Snell Memorial Foundation. There should be a sticker on the helmet that indicates the certification. This proves that the helmet design has passed extensive safety tests. - Make Sure the Helmet Fits Correctly Your child’s helmet should fit snugly and comfortably. Otherwise, it will not offer maximum protection in the event of an accident. A helmet fits correctly if it: - Does not tilt backward or forward; - Sits level on your child’s head; - Has strong straps that fasten under the chin; - And is tight enough to resist falling off with sudden or sharp movements. Unfortunately, even the safest helmet will not make your child immune to injuries. If your child was hit by a car in Louisiana, turn to Morris Bart, LLC. A Monroe accident attorney will evaluate your case and guide you through the claims process. Call 800-537-8185 to schedule a free initial consultation.
<urn:uuid:d377eb1f-d155-436d-bea1-796bf47417af>
CC-MAIN-2018-26
https://www.morrisbart.com/articles/4-tips-remember-purchasing-bicycle-helmet-child/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267862248.4/warc/CC-MAIN-20180619095641-20180619115641-00164.warc.gz
en
0.898715
599
2.515625
3
March 2, 2023 Not one but three UVA Health discoveries are competing for the title of 2022’s biggest biomedical advance as part of the STAT health news website’s annual “STAT Madness” bracket tournament. It’s the fifth consecutive year that a UVA Health discovery has been recognized as one of the year’s most significant. STAT Madness is like the scientific version of the NCAA basketball tournament. Voting is open to the public. New rounds will open weekly, with the week’s winners advancing until a final victor is determined. You may vote once per day. UVA occupies three of the 64 slots in this year’s tournament. Here are the three UVA contenders, all of which come from UVA’s School of Medicine: Fighting Alzheimer’s: UVA neuroscience researchers led by John Lukens discovered a molecule in the brain responsible for orchestrating immune system responses to Alzheimer’s disease and multiple sclerosis, potentially allowing doctors to supercharge the body’s ability to fight those and other devasting neurological diseases. The molecule directs immune cells called microglia to remove plaque buildup associated with Alzheimer’s and prevent the debris buildup that causes MS. The findings could let doctors augment the activity of microglia to treat or protect patients from the toxic buildup thought responsible for memory loss and impaired motor control in neurodegenerative diseases. Halting breast cancer’s spread: An unhealthy gut triggers changes in normal breast tissue that help breast cancer spread to other parts of the body, research from UVA Cancer Center revealed. The gut microbiome – the microbes that naturally live inside us – can be disrupted by poor diet, long-term antibiotic use, obesity and other factors. When this happens, the ailing microbiome reprograms important immune cells in healthy breast tissue, called mast cells, to facilitate cancer’s spread. It was discovered by researchers led by UVA’s Melanie R. Rutkowski. The finding could help scientists develop ways to keep breast cancer from spreading to other parts of the body. Preventing heart failure: The loss of the male sex chromosome as some men age causes the heart muscle to scar and can lead to deadly heart failure, new research from UVA’s Kenneth Walsh and collaborators revealed. The finding may help explain why men die, on average, several years younger than women. The new discovery suggests that men who suffer Y chromosome loss – estimated to include 40% of 70-year-olds – may particularly benefit from an existing drug that targets dangerous tissue scarring. As the STAT Madness tournament progresses, the Hoo faithful should remember to return each day to cast their votes.
<urn:uuid:1691e3d5-62f2-4764-b3e0-546b7949855f>
CC-MAIN-2023-50
https://lvg.virginia.edu/three-uva-health-discoveries-up-for-biggest-biomedical-advance-of-2022
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00382.warc.gz
en
0.923509
555
2.53125
3
Allergens: Dust and Dust Mites What are dust allergens? Dust allergens are substances found in dust, and may include: What is a dust mite allergen? Dust mites are microscopic organisms that can live and thrive throughout homes and businesses. The mites and their waste products thrive in: - Akin, Louise, RN - MMI board-certified, academically affiliated clinician
<urn:uuid:2239e98f-43ab-4260-94e1-9cb80bd30cd4>
CC-MAIN-2014-49
http://www.urmc.rochester.edu/encyclopedia/content.aspx?ContentTypeID=85&ContentID=P00014
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372999.9/warc/CC-MAIN-20141119123252-00208-ip-10-235-23-156.ec2.internal.warc.gz
en
0.901937
89
2.6875
3
Writers Write is your one-stop writing resource. In this post, we show you how to ‘show and not tell’ in short stories. ‘Show, don’t tell’ is good advice for any writer, but even more so for a short story writer. The limited word count means our writing has to work harder. We really need to pack a punch. Here’s how. How To Show And Not Tell In Short Stories 1. Express emotion as action: 2. Choose a viewpoint character: 3. Use the senses: 4. Be specific: The more specific you are with your descriptions and actions the easier it will become to show. 5. Avoid these ‘telling’ words: is, are, was, were, have, had 6. Use dialogue: This is one of the simplest tools to use. The moment your characters start talking, showing becomes easier. Show, don’t tell is a very powerful writing tool. Keep practising. Top Tip: If you want to learn how to write a short story, sign up for our online course. by Mia Botha Buy Mia’s book on how to write short stories: Write the crap out of it and other short story writing advice
<urn:uuid:03006e83-3bab-42ca-a8e0-f4524b6fd55e>
CC-MAIN-2019-43
https://writerswrite.co.za/how-to-show-and-not-tell-in-short-stories/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986659097.10/warc/CC-MAIN-20191015131723-20191015155223-00409.warc.gz
en
0.897621
269
3.1875
3
Si trabajas en una compañía, posiblemente tengas que dejar mensajes de voz a tus clientes frecuentemente. Para asegurarte de que comunicas tu mensaje claramente, minimizando cualquier malentendido, debes crear un mensaje que incluya las siguientes siete partes. It’s easy to “decir la hora” (to tell time) in Spanish as long as you know your cardinal numbers and the third person singular and plural forms of the verb ser. Here you have how. Regardless of which Spanish-speaking country you’re in, a conversation about time usually starts with ¿Qué hora es? (What time is […] A new study on second language learning has recently taken the media by storm. A range of headlines – from the BBC to the Daily Mail and The Guardian – all trumpeted the depressing message that it’s impossible to become fluent in a foreign language after around age ten. All of these reports dramatically misrepresented […] The DELE A1 is an internationally recognized certificate that connects people from their first contact with Spanish and evaluates their level in Spanish from the beginning of their studies. Are you ready to take it? In MLA.education, you can find mock exams that will help you to understand the official test and improve your result […] Two certification systems of Spanish proficiency. Both are internationally recognized, and both take as a reference the levels established by the Common European Framework of Reference for Languages (CEFR). Let’s find out the differences between the two. Diplomas de Español como Lengua Extranjera (DELE) The DELE certificates are issued by the Instituto Cervantes, in behalf […]
<urn:uuid:b7aa5f06-ba79-48fc-921b-7562a1535163>
CC-MAIN-2022-40
https://mla.education/en/news/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00665.warc.gz
en
0.808372
391
2.578125
3
Photochemical smog is formed when emissions containing nitrogen oxide, such as car exhaust, interact with volatile organic compounds in the presence of sunlight. The oxygen in the compounds and the heat from the sunlight react to form ground-level ozone.Continue Reading Smog requires sunlight, nitrogen oxides, volatile organic compounds and temperatures of at least 18 degrees Celsius to form. Sunlight breaks down nitrogen dioxides into nitrogen oxide and atomic oxygen molecules. The free atomic oxygen then reacts with atmospheric oxygen to form ozone, which is a necessary shield against radiation in the atmosphere, but harmful to life at ground level. While ozone also forms naturally under normal atmospheric conditions even at ground level, it is normally consumed by ambient nitrogen oxide. Pollution introduces volatile organic compounds that provide an alternate means for that nitrogen oxide to react, which means that the ozone is not consumed and can potentially reach toxic levels. Smog represents a grave threat to the health of plants, humans and animals, according to the Environmental Protection Agency. Smog can irritate respiratory systems, aggravate chronic lung conditions and asthma, and even cause permanent lung damage. Smog causes damage to forests, crops and other green life and can destroy large swaths of vegetation.Learn more about Pollution
<urn:uuid:ddbd3205-aabc-412d-ad7f-63640bbf59dd>
CC-MAIN-2016-40
https://www.reference.com/science/photochemical-smog-formed-f263b3c2cb5de240
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661640.68/warc/CC-MAIN-20160924173741-00211-ip-10-143-35-109.ec2.internal.warc.gz
en
0.916911
250
4.09375
4
Deadly Mount Sinabung on Indonesia's Sumatra island is again spewing hot ash kilometres into the sky. The volcano in North Sumatra province on Wednesday sent gas and volcanic matter 4.5 kilometres to the east, said national disaster management agency spokesman Sutopo Nugroho. "Residents are advised to remain alert." The 2460-metre volcano has erupted intermittently since late 2013, displacing thousands of people. Sixteen people were killed in early 2014 during an intense period of eruptions. Indonesia sits on the Pacific Ring of Fire, an area known for seismic upheavals and volcanic eruptions. The country is home to about 130 active volcanoes.
<urn:uuid:0a94ee25-e422-42c0-ae69-8ef99cd83db7>
CC-MAIN-2019-51
https://au.news.yahoo.com/indonesian-volcano-spews-hot-gas-36583450.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541288287.53/warc/CC-MAIN-20191214174719-20191214202719-00249.warc.gz
en
0.941547
144
2.59375
3
Penny Loafers, 2010 Copper and pennies Each: 2 1/8 x 11 x 4 inches Museum Purchase: Funds provided by Barbara Christy Wagner Sonya Clark works at the intersection of craft and conceptual art. She is a contemporary, African American, multimedia artist who frequently incorporates human hair, sugar, beads, and ready-made objects, such as currency, flags, and combs, into her work. Through these materials, along with occasional performance elements, Clark explores themes such as the history of craft (weaving, embroidery, beading), racial inequality, and the narrative nature of ancestry and culture. The artist explains how, growing up in Washington, D.C., the child of a psychiatrist from Trinidad and a nurse from Jamaica, “I gained an appreciation for craft and the value of the handmade primarily from my maternal grandmother who was a professional tailor. Many of my family members taught me the value of a well-told story and so it is that I value the stories held in objects.” Clark intentionally uses ready-made objects as a way to explore the stories that objects tell. She explains that “Objects have personal and cultural meaning because they absorb our stories and reflect our humanity back to us. Sometimes common objects are sponges. Sometimes they are mirrors. I am instinctively drawn to objects that connect to my personal narrative as a point of departure: a comb, a piece of cloth, a penny, or hair. I wonder how each comes to have meaning collectively.” The sculpture Penny Loafers is one of several of Clark’s works that explore the portraits and symbols found on currency with a sense of humor and irony. (See also Afro Abe an embellished five-dollar bill included in the 2017 exhibition Constructing Identity.) In Penny Loafers, Clark replaces the leather upper of the shoes with pennies lined side by side in rows over thin copper frames. The round shapes of the pennies create negative spaces, allowing viewers to peer through the sides and top of the shoes. The pennies making up the vamp or tongue of the shoe are cleanly cut to form a graceful arc. Both the sole and the saddle (the decorative piece over the top) are solid copper and contrast with the airy spaces formed by the rows of pennies. Clark asks us to think about the way a culture communicates its values in the representations found on coins and paper money. These works translate and transform the official likeness of Abraham Lincoln, the U.S. president who issued the Emancipation Proclamation, declaring the end of slavery in the Confederate States, in 1863. Choosing hundreds of pennies to create a set of heavy shoes, Clark suggests that Lincoln’s weighty legacy is both fraught and celebrated. However, the nearly valueless penny—or light weight of today’s alloyed coins—asks whether we truly appreciate the complexity of this pivotal and transformational figure in American history. Clark considers the natural oxidation of the copper pennies to be an integral element of the work; tarnish manifests the hanging nature of the material over time. Tarnish also suggests the ongoing shifts in our own memories and understanding of both familiar objects and historical figures. Finally, the pennies allude to historical narratives that are larger than the United States by evoking the cowrie shell, one of the earliest beads included in textiles and one of the oldest forms of currency, used widely across Africa, Asia, and Oceania for centuries. By creating art from readymade objects like the penny, Clark layers her work with cultural, historical, and personal narratives in all their complexity and contradiction. Artist quotes from brochure for Converge, an exhibition that features the art work of Sonya Clark and Quisqueya Henriquez on view at McColl Center for Visual Art from January 27 to March 24, 2012. Discussion and Activities - Imagine placing your feet inside Sonya Clark’s Penny Loafers. How would they feel to wear? - Write down three examples—from popular culture today or in the past—of shoes that carried special significance. What makes the shoes meaningful? What are their wearers trying to communicate? - Think about your own shoes. How do they communicate your identity? Draw a picture of your favorite pair of shoes—real or imagined. - Create a sculpture of an everyday object using unexpected or unfamiliar materials. How does the process make you think differently about the object and about art? - Write Around PAM: Sonya Clark. A writing prompt inspired by Penny Loafers and developed by museum partner Write Around Portland. - Healing Justice & Revolution of Values - Sonya Clark - Interrogating the Past: Sonya Clark Interviewed by Scott Turri, BOMB Magazine, July 4, 2019. - Measure your history with material. | Sonya Clark | The Art Assignment April 28, 2016 - Converge. Charlotte, NC: McColl Center for Visual Art, 2012.
<urn:uuid:2cdb1aba-cc48-43a5-a398-2e43684c69d0>
CC-MAIN-2022-49
https://portlandartmuseum.org/learn/educators/resources/posters/penny-loafers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00871.warc.gz
en
0.937908
1,052
2.609375
3
As Pakistan fails to collect a decent proportion of own-source revenue, it has little choice than to take on debt or depend on more creative means, such as a recent crowdfunding campaign, to fund public projects. Where does Pakistan stand? Pakistan tax-to-GDP ratio is about 12% . In comparison, OECD countries raise taxes equivalent to about 34% of their GDP. This limits Pakistan’s capacity to fund public investment. Where it does collect taxes, it principally relies on indirect taxes on goods and services, which account for 6.3% of GDP. The other 4.2% of the GDP that make up direct taxes are collected mainly by businesses withholding a percentage of economic transactions for the government. Hence, they do not require voluntary tax compliance from individuals, which, as a result, remains extremely low. Start with improving enforcement There is a relatively strong consensus that effective enforcement can lead to more tax revenue. Weak enforcement ranges from a property tax collector taking a bribe to not enforcing the tax, or a just a simple lack of capacity of the tax authority. Improving enforcement may also result in more productive firms in Pakistan. Ilzetzki and Lagakos (2017) created a model of Pakistan’s economy to understand the impact that increased enforcement could have. They find that increasing enforcement will not only allow Pakistan to raise more tax revenue from firms in the short-run, but it would also result in higher growth by bringing these firms into the formal sector. By formalising, they would be able to make productivity enhancing investments and as a result be able to grow. Enhancing enforcement requires Pakistan to do two things. First, hire better trained staff who have access to the right technology and resources. Piracha and Moore (2015), using a case study of Punjab, Pakistan’s largest province, find that each property tax circle needs to collect on average about $350 a month themselves to cover operational costs of their offices. Furthermore, Pakistan will also have to focus on aligning the incentives of the bureaucrats associated with tax collection, with the incentives of the government. This is the classic principal-agent problem: politicians delegate tax collection power to bureaucrats, but cannot monitor them perfectly. At the same time, the front-line bureaucrat will most likely have better information. Due to this information asymmetry, tax collectors need to be effectively incentivised to fully and fairly enforce taxes. To this end, Khan et al. (2016) collaborated with the Punjab government to run an experimental study by assigning different incentive schemes to property tax collectors. They found that over two years of the study, performance incentives encouraged tax collectors to add new properties to the tax collection roster, significantly increasing revenue. Information is the key Most developing economies have large proportion of their economies based on informal, cash-driven transactions, which means they are not captured by the tax base. There are a few ways Pakistan can attempt to create better information. Evidence suggests that implementation of a value added tax (VAT) helps raise more revenue by generating a paper trail between firms through cross-reporting of liabilities. This is evident in the paper by Pomeranz (2015) in the case of Chile. Building on this line of thought, Pakistan’s VAT structure has certain challenges. First, intuition suggests that VAT should be applied uniformly by a single agency. In Pakistan, it is however split between federal and provincial governments, creating administrative and coordination challenges. Second, by providing extensive exemptions in the VAT, Pakistan distorts the information trail; VAT is levied at 17% on the majority of goods, however, several goods have a either a lower rate or are exempt. One example is the exemption of red chillies but not green chillies. Empower cities to tax Similar to other countries, Pakistan’s cities are its principal engines of growth. Due to rapid urbanisation about 38% of Pakistanis are estimated to live in cities, yet they contribute to about 55% of the GDP. These cities both require extensive public investment, and are sources of revenue potential. Presently, Pakistan does not have financially empowered local urban governments, instead, most urban taxes are implemented by one of Pakistan’s four provincial governments. These provincial governments have large jurisdictions, with populations ranging from 12 million to over 110 million. As managing cities is not the central function of these governments, most of them have not developed effective urban administration mechanisms. As noted through the synthesis of research conducted by the IGC’s Cities that Work initiative, land and physical properties are a major source of untapped revenue for most developing country cities. Punjab, for example, despite being home to nine cities home to over a million people, collected only Rs. 10 billion, or about 6% of its total tax revenue, from property taxes. Other parts of Pakistan have not fared better. Sindh, which is home to Karachi, Pakistan’s largest city, has not had a revaluation of land and property since 2001. Yet there is large potential to increase this. For example, an estimate from the IGC (2011) shows that Punjab could more than double revenue from property taxes if it undertook comprehensive administrative reforms. There is some hope here. Reforms passed earlier this year granted government the power to forcibly acquire any property that a citizen holds by paying 100% over the price they have declared in their tax returns (hence creating incentive for them to declare the true value of property). However, it is unclear whether these reforms will be implemented in practise. Increasing taxation is possibly the most fundamental challenge Pakistan faces today, not only to adequately finance public investment and services, but also to establish a fairer society. To do so, it is useful to bridge the gap between research and policymaking by integrating research findings into policy decisions. This article points towards three avenues which can act as a point of departure for such a discourse.
<urn:uuid:d96be27f-5405-46b3-99ac-c7d88e746c48>
CC-MAIN-2019-39
https://shahrukhwani.com/2018/12/08/blog-reforming-pakistans-tax-system-evidence-based-suggestions/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572484.20/warc/CC-MAIN-20190916035549-20190916061549-00272.warc.gz
en
0.952179
1,208
2.734375
3
A Maltese Line Regiment of the Order Having in mind the anxieties experienced in the recent reign of Grand Master Ximenes, with the unrest of the native Maltese population in the Revolt of the Priests, The newly elected Grand Master convening a Chapter General in 1776, called for the establishment of a new regiment. It was to be recruited as a ‘foreign legion’ to protect the Order against internal enemies, and it’s formation of the regiment was based on that of a French regiment of the line. Notwithstanding the efforts, the Grand Master had to experience a great disappointment on the formation of the Regiment. It was anything but a success. According to plan, 1200 men were enlisted overseas in Avignon, Corsica and Marseilles. This recruitment, though it cost the Treasury an enormous amount, was conducted in so careless a manner that instead of producing soldiers on whom the safety of the State could rest, it only produced deserters, vagabonds and scallywags picked up in all ports of the Mediterranean. A new commander was appointed and obtained the permission of the Congregation of War to allow him to recruit native Maltese. At the end of four or five years, this brave Knight had at length the satisfaction of seeing this regiment as well composed, trained and disciplined as any French regiment. On the eve of the French invasion the Regiment of Malta was some 500 strong. Numbered detachments defended Fort Tigne, Fort St.Angelo,Fort Ricasoli and Fort St.Elmo. The larger garrison, of Fort St.Elmo was ordered to man the bastions of Valletta and Floriana. The garrison defending Fort Tigne held on to their posts and resisted all attacks directed against them. The Regiment’s soldiers at Valletta took part in a disastrous attempt at attacking the French forces encircling the city. Those at fort Ricasoli and Fort St.Angelo only surrendered after the capitulation was signed. When the French took over the island men from this regiment were pressed into service of the French army and took part with the Legion Maltaise in the invasion of Egypt. John Neville Ebejer
<urn:uuid:41afecaa-89e2-41a5-84ae-34d2f145c929>
CC-MAIN-2017-43
https://hrgm.wordpress.com/units/orders-knights-of-st-john-military-units/regimento-di-malta/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00699.warc.gz
en
0.976109
450
2.6875
3
If you’re not really familiar with the term in that format, you may notice that MRI rings a bell. You may have heard of the term, or if you work in the medical field, then it may be a daily-used term. However, what do we really know about what to expect and how the image is produced? Not much! What is an MRI? It’s a scanning technique for creating detailed images of the human body. An MRI is another technique to generate images that cannot be seen with X-rays, CT scans, ultrasound, or other imaging tests. The ability of an MRI reaches far enough to examine internal body structures and assists with diagnosing a variety of disorders. Magnetic resonance imaging also measures brain function, and can identify if a tumor, aneurysm, or other nerve issues are prevalent. What You Should Expect If you haven’t already, take a look at our MRI preparation page to see a step-by-step guide on how to plan for the procedure. When you arrive, you’ll have to lie flat on a mobile table that’ll move you into the machine until the specified portion of the body for imaging is centered. The machine will provide a strong magnetic field and radio waves around the person. You may or may not be given a contrast solution to highlight specific areas that may not show up otherwise. What Happens When Producing the Image The water molecules contain hydrogen protons that become aligned in a magnetic field. The MRI scanner produces a radio frequency, and the protons absorb the energy. When everything is turned off, the protons will return to their previous state. The radio signal that is recorded from this process is what captures the image. Hudson River Radiology We strive to provide excellent out-patient imaging services using today’s most innovative technology, but our attention to customer satisfaction that put us above the rest. Our board-certified radiologists are always on-site and ready to provide consultations. Be sure to look at our MRI preparation page to ensure that you’re ready for imaging. If you have any questions regarding your exam, please give us a call at (201) 876-1111.
<urn:uuid:373c3e60-f51c-4a23-a83a-2b0d816c8841>
CC-MAIN-2020-24
http://njmri.org/magnetic-resonance-imaging/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348517506.81/warc/CC-MAIN-20200606155701-20200606185701-00101.warc.gz
en
0.902474
460
3
3
Bonds are debt securities issued by institutional entities intending to borrow for productive purposes. Issuing authorities can be government entities, corporations or finance companies and the likes. Such issues mean that the issuing entity agrees to owe the holder a debt payable on the promised repayment date. It is a paper of contract between the borrower and the lender of the IOU type, accompanied by a promise to repay with additional earning and interest payment. One main similarity between bonds and stocks lies in the fact that both are traded in stock exchanges. As it is with stocks, bonds also have a face value that fluctuates according to the confidence level of the investor in the issuers ability to repay the bond on promised dateline. However, contrary to stocks, which are equity securities, bonds as debt securities that have certain specific qualities. Trading in bonds seems to be quite popular among investors as they are generally taken as a more reliable investment than stocks. There is an sum-assured component in bonds which is absent in stocks. In case of bonds you have a fair idea about when and hw much you’ll be repaid, and while you’re waiting you will earn an interest for having invested in the bond issue. Bonds usually accrue interest like a savings account, which is payable either quarterly, half yearly, or annually. This may make one conclude that bonds are better investments than stocks. A stock investment market will never promise any interest or for that matter any promise of positive earning at all. Bonds look better on another count also. They are often convertible in to equity shares. Like in stocks, there are many varieties of bonds. Bond varieties refer to the rates of interest, distance of repayment terminal time and nature of conversion ratios, while stocks vary according to the size and probable income potential, which have to be calculated by the investor himself. But this ‘higher worthiness’ is not always very well founded. There are bonds that do not pay any interest but guarantee the full repayment of the principal zero coupons for example. But in a sense that is true with stocks also. The only difference is that you have to be alert to avoid missing the purchase value by agreeing to sell them at the right time. Earning from bonds may vary according to the nature of the bond, whether it is a fixed rate or a floating rate bond. The main demerit of bonds vis–vis stocks is that a bond can never earn more than its face value, while a prosperous stock can earn large multiples of its face value. This statement needs to be qualified for convertible bonds, which can conditionally (dependent on the occurrence of certain events) be converted into equity stocks of the issuer, rather than being repaid in money. From that point onward it is identical with any other stock in quality. Bonds can be advocated to be better than stocks for people who are allergic to risks and are happy with lower earnings. For people ready for financial adventure, stocks are the way to go.
<urn:uuid:df06c88d-6e1b-4fb6-a9f0-8f489e901927>
CC-MAIN-2021-31
https://www.ezilon.com/topics/stocks-better-than-bonds/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153491.18/warc/CC-MAIN-20210727202227-20210727232227-00593.warc.gz
en
0.968476
614
2.953125
3
One of the most widely prevalent infections of the liver, Hepatitis claims close to 1.5 million lives every year, according to World Health Organization. Of these, Hepatitis C is the least talked about. Doctors feel it is escaping the scanner, yet is an emerging health threat. As we observe World Hepatitis Day, Dr Satyendra k Tyagi, Consultant Gastroenterologist, Meerut Medical Centre, says, creating awareness, family screening, screening of high-risk individuals, pregnant women, and patients with symptoms such as fatigue, loss of appetite, and jaundice are all necessary to eliminate the risk of the disease. Dr Tyagi speaks in line with the goal set by the World Health Organization (WHO) to eliminate viral hepatitis as a public threat by 2030, as the theme for World Hepatitis Day 2016. Hepatitis C is emerging as an epidemic, with 1 in every 100 people in India being infected with the virus. Hepatitis C is a blood-borne virus. In most infected areas in the country, it is primarily caused by blood transfusions with unscreened blood, surgical procedures that follow unsafe practices, and the use of unsterile needles by intravenous drug users and even diabetics. Secondary causes include sharing personal-care items such as toothbrushes and razors with a person infected with the virus. It also may get transmitted through unprotected sex. Aggravating the threat is the fact that unlike hepatitis A and B, there is no vaccine yet to prevent hepatitis C. The virus lives in the body for upto 30 years, without any symptoms, and can then lead to chronic liver disease, even liver cancer. According to the World Health Organization (WHO), approximately 5,00,000 people die each year from hepatitis C-related liver diseases. “A recent study revealed that regions like Hapur, Meerut and Muzaffarnagar districts showed a 15% positivity rate to Hepatitis C against the national average of 1%. Tattooing, ear and body piercing with an infected needle increases the risk of hepatitis C. Sharing personal-care items such as razors, toothbrushes and manicuring or pedicuring equipment with a person who has hepatitis C may lead to exposure to the virus. Reuse of needles and syringes, multiple- use medication vials, infusion bags and improperly sterilized dental and surgical equipment also cause transmission of the disease. There is an association between high-risk sexual activity and HCV,” says Dr Tyagi. “Awareness regarding the disease is abysmally low in India. While the disease shows few symptoms in the early stages, people are unaware about the existence of hepatitis C. Consequently, they are not educated about the required preventive measures and cure. Families, not just individuals, should get screened, especially those of high-risk cases. Pregnant women too should get screened. If the symptoms of fatigue, weakness, nausea, a loss of appetite and jaundice, are experienced, the person should check with a doctor,” says Dr Tyagi. Hepatitis C is known as a silent killer as it does not show any obvious symptoms. This makes its detection difficult. Hence, it remains undiagnosed, eventually causing chronic hepatitis C infection. Such cases account for 55-85% of cases, as per the World Health Organization. Early detection can ensure a complete cure of the disease. Later detection does cure, provided there has been no damage to the liver. “The need of the hour is an effective awareness among people. Apart from creating awareness regarding the existence of the disease, people should also be educated about the availability of the treatment at much lower costs as compared to some years ago,” adds the doctor.
<urn:uuid:61bc1804-bc5f-4bd2-8504-02e16f5b5cf7>
CC-MAIN-2017-22
http://healthtechnology.in/2016/08/04/doctors-stress-on-the-need-to-create-awareness-screening-to-eliminate-the-hepatitis-c-threat/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607731.0/warc/CC-MAIN-20170524020456-20170524040456-00192.warc.gz
en
0.94544
787
3.46875
3
Fentanyl has been a significant player in the American opioid crisis. In combination with other drugs, it can lead to deadly outcomes. What is fentanyl? Most importantly, how does it hook its users? What is Fentanyl? Why Do Doctors Prescribe It? Specifically, Fentanyl is a narcotic. It’s suitable for the relief of severe pain. Doctors frequently prescribe it for advanced cancer pain. Besides that, they might use it if a patient developed a tolerance to other opioids. However, fentanyl addiction doesn’t only happen to individuals using or abusing the medication. Because it’s so cheap to manufacture in clandestine laboratories here and abroad, drug dealers use it to cut other substances. Therefore, you might find it in heroin, cocaine, meth, and other street drugs. Among users, fentanyl-laced heroin has received the moniker Gray Death. Users typically don’t realize that they’re taking a mixed product until it’s too late. Because of its potency, there’s a high risk of overdose, coma, and death. What Recovery from Addiction Looks Like What is fentanyl but a strong opioid with a high risk of addiction? Therefore, recovery runs along the lines of most other pain pill regimens. However, there’s a twist. Because some people took the drug without knowing it, they may have a polysubstance abuse problem. Their recovery may involve multiple substances. At a good-quality facility, treatment will cover this possibility. For example, modalities include: - Fentanyl detoxification for possibly various substances that features medical supervision and pain relief - Nutritional support that focuses on having your body regain its strength for continued healing - Behavioral therapy that replaces the need for a nervous system depressant with healthy coping skills - Relapse prevention training for lifelong sobriety Can You Overcome Opioid Addiction on Your Own? It’s tempting to try overcoming the opioid dependency alone. However, most people find that the pain of withdrawal is too much. Therefore, they quickly relapse. This act in itself can be dangerous. You may take the drug at a dose that your body no longer supports. Similarly, your next fix may have an unexpected overage of fentanyl in it. The safest way of ending a chemical dependency is at a rehab facility. This understanding extends to detoxification as well as rehab. How to Check into Rehab You talk to an admissions specialist. This professional handles the insurance verification for you. As a result, you know immediately what benefits you will receive under your plan. In fact, you can find out today how to make a change. Silver Pines Treatment Center could be the beginning of your long-term recovery. What is fentanyl dependency but an opportunity to heal? Call 866-345-2147 today.
<urn:uuid:ab24bdb7-d9be-4947-b424-48f939a15ff8>
CC-MAIN-2023-06
https://silverpinestreatmentcenter.com/addiction-blog/what-is-fentanyl/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495012.84/warc/CC-MAIN-20230127195946-20230127225946-00662.warc.gz
en
0.943413
584
2.546875
3
QUARTERS: A PIANO GAME KIDS LOVE TO PLAY What are some practical games a piano teacher can use? That's a frequent question that piano teachers and parents write me and ask about. I'd like to discuss a time-worn classic piano game that I have updated. Games are an indispensable resource of the inventive, patient piano teacher. The reasons are several. Children's psychology demands that you adopt a light-hearted approach to learning, in order to gain their trust and interest. Attention spans are short, and the teacher must know when to let the student rest and then later seize the right moment for learning. Another reason for piano games is pacing. Piano lessons can grow tedious quickly while difficult parts are refined and repeated. A wise teacher will try his student's patience with care and as little as possible, and after doing so will reward them with playful learning. Quarters is derived from an old piano teacher's trick, wherein a student must play with a coin balanced on the back of their hand to teach the hand to lay flat. This may sound difficult, but it's not, and in fact kids find it fascinating. The truth is that I have kids who could care less about 'hand position' and resist all patient, erudite attempts to explain and demonstrate it to them: they are simply not interested. But put a quarter on the back of the same child's hand and say, "Play Jingle Bells that way, bub," and you have a child primed for an unusual, witty experiment in dexterity. Yes, the quarter will drop on the floor. Yes, it will roll under the piano. Have several ready. Just laugh and continue. It's worth 75 cents. If it's all right with the parents, give them the quarter for particularly good work. This game has led to indifferent kids showing me how they can play with all sorts of things balanced on their hands, a piece of gum, a Tic Tac, a rock. One brilliant kid was also an eight-year-old magician, who, unknown to me, sprayed his hand before the lesson with a magician's trick powder which sticks metal to the hand. I was mystified by his expertise during Fur Elise until he slyly turned his hands upside down and the quarters remained! Who cares how kids arrive at the correct hand position as long as they do so willingly and without tension? Be aware that some kids will raise their right shoulder to compensate for the coin, so gently push the shoulder down and say quietly, "Relax." This game works best when the child has started to use the fingers as a group. Even a small group such as three fingers makes use of this game quite well, and will help the child comfortably and quickly adopt a flatter hand position instinctively. Make a game of everything at the piano. By John Aschenbrenner Copyright 2012 Walden Pond Press All Rights Reserved
<urn:uuid:a26e4689-2180-40a5-8e44-391c6ea81a55>
CC-MAIN-2015-14
http://pianoiseasy2.com/quarters.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298424.66/warc/CC-MAIN-20150323172138-00228-ip-10-168-14-71.ec2.internal.warc.gz
en
0.967931
600
2.84375
3
Forests cover less than 3% of Kenya’s land area but they’re an important source of income, food and economic growth to the country. However, forests are increasingly under pressure, due to rampant charcoal burning, illegal logging, overgrazing, forest fires and pollution. The Kijabe Environment Volunteers group (KENVO) has made great moves in preserving vast areas of the Gatamaiyu forest near Nairobi, working with local communities, many of whom were previously involved in illegal and destructive activities in the forest. KENVO works in partnership with IUCN Member Nature Kenya. The Gatamaiyu forest is an important bird area and home to the threatened Abbott's Starling, African Green Ibis, Crowned Hawk Eagle and many others. It’s also an important community asset as it’s the main source of both timber and non-timber products such as water, herbal medicine, fodder for livestock, grazing and building materials. Stephen Kamau, one of KENVO’s conservation officers takes us on a trip through the forest and explains why it’s so important to the local community and its resident wildlife.
<urn:uuid:01a63951-f6e5-4a64-9d1a-cf88d25a0c30>
CC-MAIN-2017-09
https://cms.iucn.org/content/care-community-saving-kenyas-forests
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00426-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953655
241
2.96875
3
This year some of my Gurney's Whopper strawberries, a June-bearing variety, produced a few berries in the fall. That might weaken the plants for next years crop. Will culling them for this be effective or do they do this randomly ? I am attempting to answer this because someone better qualified has not... I don't have much experience of the north hemisphere growing season but I do know that in the Adelaide Hills near where I live (roughly Meditteranean but cooler at this higher altitude) huge crops of strawberries are produced from now until the end of April which corresponds to mid-spring to mid-autumn (mid-fall). This is on an industrial scale though, so industrial scale watering and nutrients are going into them. Still, I don't know that late strawberries would necessarily weaken your plant. I'd say it just means you get more strawberries than everybody else. Something I found that might help is advice from an Illinois university information page on strawberries. It suggests that removing all flowers in the first growing season will encourage the roots and runners to develop and thus give you a better crop thereafter. This implies that removing flowers at a time when they are taking the lion's share of resources will strengthen other aspects of the plant, which makes sense. It goes on to specifically say that you should let the fall/autumn flowers remain: For everbearing and day-neutral strawberries, remove the flowers until the end of June and then after that date allow the flowers to remain to set fruit for a summer/fall harvest. My feeling (merely opinion of course) is that removing late fruit (which presumably is just a smattering), wouldn't help that much because plenty of resources are still getting through to the rest of the plant.
<urn:uuid:49ef2a50-6cc1-4929-b89f-920f798ff0e0>
CC-MAIN-2022-05
https://gardening.stackexchange.com/questions/2489/should-i-cull-june-bearing-strawberries-for-fall-bearing
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304872.21/warc/CC-MAIN-20220125190255-20220125220255-00107.warc.gz
en
0.966104
359
2.578125
3
Corn and soy fields are rapidly swallowing up grassland in the western corn belt. In a post last year, I argued that to get ready for climate change, we should push Midwestern farmers to switch a chunk of their corn land into pasture for cows. The idea came from a paper by University of Tennessee and Bard College researchers, who calculated that such a move could suck up massive amounts of carbon in soil—enough to reduce annual greenhouse gas emissions from agriculture by 36 percent. In addition to the CO2 reductions, you’d also get a bunch of high-quality, grass-fed beef (which has a significantly healthier fat profile than the corn-finished stuff). Turns out, farmers in the Midwest are doing just the opposite. Inspired by high crop prices driven up by the federal corn-ethanol program—as well as by federally subsidized crop insurance that mitigates their risk—farmers are expanding the vast carpet of corn and soy that covers the Midwest rather than retracting it. That’s the message of a new paper (PDF) by South Dakota State University researchers published in the Proceedings of the National Academy of Science. They looked at recent land-use changes in what they call the “western corn belt”—North Dakota, South Dakota, Minnesota, Iowa, and Nebraska—between 2006 and 2011. What they found was that grasslands in that region are being sacrificed to the plow at a clip “comparable to deforestation rates in Brazil, Malaysia, and Indonesia.” According to the researchers, you have to go back to the 1920s and 1930s—the “era of rapid mechanization of US agriculture”—to find comparable rates of grassland loss in the region. All told, nearly 2 million acres of grassland—an area nearly the size of Rhode Island and Delaware combined—succumbed to the plow between 2006 and 2011, they found. Just 663,000 acres went from corn/soy to grassland during that period, meaning a net transfer of 1.3 million acres to the realm of King Corn. The territory going under the plow tends to be “marginal,” the authors write—that is, much better for grazing than for crop agriculture, “characterized by high erosion risk and vulnerability to drought.” So why would farmers plow up such risky land? Simple: Federal policy has made it a high-reward, tiny-risk proposition. Prices for corn and soy doubled in real terms between 2006 and 2011, the authors note, driven up by federal corn-ethanol mandates and relentless Wall Street speculation. Then there’s federally subsidized crop insurance, the authors add. When farmers manage to tease a decent crop out of their marginal land, they’re rewarded with high prices for their crop. But if the crop fails, subsidized insurance guarantees a decent return. Essentially, federal farm policy, through the ethanol mandate and the insurance program, is underwriting the expansion of corn and soy agriculture at precisely the time it should be shrinking. And the stakes are high. Earlier this month, the US Department of Agriculture released a 186-page report (PDF) called “Climate Change and Agriculture in the United States.” The authors mainly concerned themselves with the question of whether our current system of corn-and-soy-dominated agriculture can be sustained in the context of rising temperatures. The answer is less than comforting. In the short term, the authors conclude, the US agricultural system is “expected to be fairly resilient to climate change.” But by mid-century, when “temperature increases are expected to exceed 1°C to 3°C and precipitation extremes intensify,” the authors expect to see significant yield declines for major US crops. The most-major US crops, of course, are corn and soy, which now blanket nearly half of US farmland. Tragically, the USDA report never analyzes how this reliance on two crops makes us more vulnerable to climate change—or entertains the idea of making the nation more resilient and food secure by diversifying away from them.
<urn:uuid:446890c8-3f5a-4cd2-8d12-62167c476b0b>
CC-MAIN-2018-51
https://www.motherjones.com/food/2013/02/king-corn-gobbles-climate-stabilizing-grassland-midwest/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824675.15/warc/CC-MAIN-20181213101934-20181213123434-00279.warc.gz
en
0.943558
846
3
3
A certain evil demon could not be killed by man or beast, indoors or out, during the day or night. To defeat the demon, Vishnu took the form of a half man-half lion, hid in the pillar of a doorway, and attacked at dusk. Vishnu was victorious, and security and order were restored. Here the demon is shown twice: bent across Vishnu's knee, being disemboweled; and under Vishnu's foot, being trampled. Along the base of the sculpture, more details of the story are shown. Just before Vishnu's attack, the demon had become enraged at his own son for paying homage to Vishnu. In spite of his father's threats, the boy insisted that Vishnu was present everywhere at all times. The demon angrily retorted, "Even here?" and kicked the pillar of a doorway. Vishnu, as the man-lion, sprang out and overcame him.
<urn:uuid:84bc3c2b-5a58-4d59-a06b-04bb000a4bd7>
CC-MAIN-2017-34
https://pl.khanacademy.org/partner-content/asian-art-museum/aam-hinduism-topic/aam-hinduism/a/the-hindu-deity-vishnu-in-the-form-of-the-man-lion-narasimha
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105451.99/warc/CC-MAIN-20170819124333-20170819144333-00688.warc.gz
en
0.985958
191
2.6875
3
On March 25, 1914, American biologist and humanitarian Norman Ernest Borlaug was born. Borlaug led initiatives worldwide that contributed to the extensive increases in agricultural production termed the Green Revolution and has been awarded with the Nobel Peace Prize. Borlaug is often called “the father of the Green Revolution“, and is credited with saving over a billion people worldwide from starvation. “You can’t build a peaceful world on empty stomachs and human misery.” – Norman E. Borlaug, as quoted in Norman Borlaug – Youth and Education Norman Borlaug was born in Cresco, Iowa, USA, the eldest of four children to Henry Oliver Borlaug and his wife Clara (née Vaala). From age seven to nineteen, he worked on the family farm, fishing, hunting, and raising corn, oats, timothy-grass, cattle, pigs and chickens. He attended a rural school in Howard County, followed by Cresco High School. Through a Depression-era program known as the National Youth Administration, he was able to enroll at the University of Minnesota in 1933. Borlaug failed the entrance exam, but was accepted to the school’s newly created two-year General College. After two quarters, he transferred to the College of Agriculture’s forestry program. Immediately before and immediately after receiving his Bachelor of Science degree in 1937, he worked for the U.S. Forestry Service at stations in Massachusetts and Idaho. Returning to the University of Minnesota to study plant pathology, receiving a master of science degree in 1940 and Ph.D. in plant pathology and genetics in 1942. From 1942 to 1944, he was a microbiologist on the staff of the du Pont de Nemours Foundation where he was in charge of research on industrial and agricultural bactericides, fungicides, and preservatives. Research in Disease Resistant Wheat In 1944 Norman Borlaug accepted an appointment as geneticist and plant pathologist assigned the task of organizing and directing the Cooperative Wheat Research and Production Program in Mexico. This program, a joint undertaking by the Mexican government and the Rockefeller Foundation, involved scientific research in genetics, plant breeding, plant pathology, entomology, agronomy, soil science, and cereal technology. Within twenty years he was spectacularly successful in finding a high-yielding short-strawed, disease-resistant wheat. Seeking to assist impoverished farmers who struggled with diseased and low-producing crops, Borlaug experimented with novel varieties of wheat, creating disease-resistant strains that could withstand the harsh climate. That work was founded on earlier discoveries of ways to induce genetic mutations in plants, and his methods led to modern plant breeding. The Green Revolution The Green Revolution resulted in increased production of food grains (especially wheat and rice) and was in large part due to the introduction into developing countries of new, high-yielding varieties, beginning in the mid-20th century with Borlaug’s work. At a research station at Campo Atizapan, he developed a short-stemmed (“dwarf”) strain of wheat that dramatically increased crop yields. Previously, taller wheat varieties would break under the weight of the heads if production was increased by chemical fertilizers. Borlaug’s short-stemmed wheat could withstand the increased weight of fertilized heads and was a key element in the Green Revolution in developing countries. Wheat production in Mexico multiplied threefold owing to this and other varieties. Agricultural Revolution in Asia Following Norman Borlaug’s success in Mexico, the Indian and Pakistani goverments requested his assistance, and with the support of the Rockefeller Foundation and the Food and Agriculture Organization of the United Nations (FAO), Borlaug began his agricultural revolution in Asia. With India and Pakistan facing food shortages due to rapid population growth, the importation of Borlaug’s dwarf wheat in the mid-1960s was responsible for a 60 percent increase in harvests there, helping both countries to become agriculturally self-sufficient. His work in developing countries, especially on the Indian subcontinent, is estimated to have saved as many as one billion people from starvation and death. Pakistan became self-sufficient in wheat production by 1968; India was self-sufficient in all cereal crops by 1974. Since then, grain production in both countries has consistently outpaced population growth. Borlaug’s achievements in Mexico, India and Pakistan were hailed as a Green Revolution. The scientists Borlaug had trained in Mexico and Asia spread his techniques and grains to Jordan, Lebanon, Turkey and Indonesia, to continental South America and to Africa. Around the world, infant mortality rates fell and life expectancy rose. In many countries, the rising standard of living reduced social tensions and political violence. The Nobel Peace Prize “There can be no permanent progress in the battle against hunger until the agencies that fight for increased food production and those that fight for population control unite in a common effort.” – Norman E. Borlaug, 1970 Nobel Peace Prize acceptance speech For his contributions to the world food supply, Norman Borlaug was awarded the Nobel Peace Prize in 1970. Borlaug continually advocated increasing crop yields as a means to curb deforestation. The large role he played in both increasing crop yields and promoting this view has led to this methodology being called by agricultural economists the “Borlaug hypothesis”, namely that increasing the productivity of agriculture on the best farmland can help control deforestation by reducing the demand for new farmland. According to this view, assuming that global food demand is on the rise, restricting crop usage to traditional low-yield methods would also require at least one of the following: the world population to decrease, either voluntarily or as a result of mass starvations; or the conversion of forest land into crop land. It is thus argued that high-yield techniques are ultimately saving ecosystems from destruction. Following his retirement, Borlaug continued to participate in teaching, research and activism. Borlaug died of lymphoma at the age of 95, on September 12, 2009. At yovisto academic video search engine, you can learn more about agriculture in the presentation of Dr. David Zoldovski on The Future of Irrigated Agriculture: Where is the Water? from the California Colloquium on Water at UC Berkeley. References and Further Reading: - Norman Borlaug, Biographical, at Nobelprize.org - J. Gillis, Norman Borlaug, Plant Scientist Who Fought Famine, Dies at 95, The New York Times, September 13, - D. Biello, Norman Borlaug: Wheat breeder who averted famine with a “Green Revolution”, at Scientific American Blog, September 14, 2009. - Norman Ernest Borlaug, American scientist, at Britannica Online - Norman E. Borlaug, The Father of the Green Revolution, at Achievements.org - Norman E. Borlaug at Wikidata - Timeline of Nobel Peace Prize Winners, via Wikidata - “Eat This!”, an episode of Penn and Teller’s Bullshit!; Quoted in: Gary Beene (2011) The Seeds We Sow: Kindness that Fed a Hungry World
<urn:uuid:d8f59c15-ba1c-450b-a411-741f82ff187d>
CC-MAIN-2021-43
http://scihi.org/norman-borlaug-green-revolution/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585518.54/warc/CC-MAIN-20211022181017-20211022211017-00199.warc.gz
en
0.952164
1,525
3.140625
3
New research: 84% of consumers believe children should be protected from unhealthy food advertising The Obesity Policy Coalition has today released the first Australian plan for legislation that offers real protection for children from unhealthy food advertising – one of the key drivers of childhood obesity. The OPC’s evidence-based blueprint, which has been presented to the State and Federal Governments, explains how different types of advertising should be restricted (including TV advertising during peak children’s viewing times), and proposes definitions of key terms, such as ‘unhealthy food’ and advertising ‘directed to children’. As well as overwhelming public support for reform, the initiatives in the blueprint have been endorsed by the Australian Medical Association, the Australian Chronic Disease Prevention Alliance together with a host of other public health organisations.* “The Federal Government has given industry a chance to clean up their act, but self-regulation has proven to be a complete failure,” said Senior Policy Adviser for the OPC, Jane Martin. “Our analysis indicates the current system of self-regulation is utterly ineffective in protecting children from being the target of junk food advertisers. “In fact it allows junk food companies to advertise during the highest rating children’s TV programs. It also permits them to use websites and Facebook, freetoys, competitions and sports sponsorship as marketing tools to reach kids, as well as obtaining children’s contact details and marketing directly to them via email, SMS or mail. “Australian consumers have had enough of junk food companies marketing unhealthy food to children. New Cancer Council research released today found nearly 60% of grocery buyers1 nominated TV advertising or toy giveaways as having the biggest impact on their children asking for an unhealthy food product,” said Ms Martin. The research found that 83% of grocery buyers want the government to step in and ban this type of advertising at times when children watch TV. The majority of respondents (95%) who support a ban would like to see it implemented on TV from at least 4pm to 9:30pm. The OPC would like to see the federal Government tackle this as a national issue; however, legislation could be implemented at a state level if the Federal Government fails to act. “Implementation of this proposal by Federal and state governments would be a hugely important step towards decreasing children’s exposure to junk food marketing and reducing the burden of obesity in this country.” The Obesity Policy Coalition partners include Diabetes Australia - Vic, Cancer Council Victoria, Victorian Health Promotion Foundation (VicHealth) and the World Health Organization Collaborating Centre for Obesity Prevention at Deakin University. OPC consumer research: Key findings • 84% of consumers believe children should be protected from unhealthy food advertising. • Just under 9 in 10 people were in favour of the government introducing stronger restrictions to reduce the amount of unhealthy food and drink advertising seen by children, with 76% strongly in favour. • Asked up to what age children should be protected up to: One-third of consumers said 17 years; 21% up to 14 or 15 years and 28% said 12 or 13 years. • 83% of grocery buyers are in favour of a ban on advertising of unhealthy foods at times when children watch TV, with 66% strongly in favour. • 95% of respondents who supported bans on TV believed that advertising should be banned from at least 4pm – 9.30pm. • When asked what most commonly negatively impacted their children’s food purchase requests, grocery buyers reported television commercials (29%) or toys and giveaways (29%). • 85% of consumers are in favour of restricting or stopping toys and giveaways. • 89% of consumers want the government to regulate the use of unhealthy food products in games and competitions on websites aimed at children. • 97% of those surveyed believe the government should regulate the use of email or SMS food marketing to children. 79% think the practice should be stopped altogether. Note to editors Obesity Prevention Policy Proposals: Public Acceptability 2008 to 2010 study A random sample of 1521 adults who were the main grocery buyer, residing in private households in metropolitan and regional areas across all Australian states and territories were surveyed in 2010 by the Centre for Behavioural Research in Cancer at Cancer Council Victoria. Analysis: Junk food advertising allowed under food industry codes See analysis here Coalition on Food Advertising to Children (CFAC) The member organisations of the CFAC are: • Australian and New Zealand Obesity Society • Australian Dental Association • Australian Dental and Oral Health Therapists Association • Australian Health Promotion Association • Australian Medical Association • Cancer Council Australia • Home Economics Institute of Australia • Nutrition Australia • Public Health Advocacy Institute of Western Australia • Public Health Association of Australia • Royal Australian College of General Practitioners • Young Media Australia • Ms Kaye Mehta, Senior Lecturer in Nutrition and Dietetics, Flinders University • Dr Rosemary Stanton OAM Australian Chronic Disease Prevention Alliance (ACDPA) The members of ACDPA are: • Cancer Council Australia • Diabetes Australia • Kidney Health Australia • National Heart Foundation of Australia • The National Stroke Foundation Contact: Rebecca Cook 0438 316 435/ 9635 5207
<urn:uuid:806195b2-65ff-4720-b0bc-c268dcffd9da>
CC-MAIN-2023-50
https://www.foodforhealthalliance.org.au/media-news/media-release/2011/mr20110509.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100309.57/warc/CC-MAIN-20231202010506-20231202040506-00593.warc.gz
en
0.936332
1,097
2.640625
3
Robert Todd Lincoln’s home in Manchester, Vermont, has made it onto the Vermont African American Heritage Trail, the 10-stop tour around the state of sites significant in African American history. It is noteworthy not just for its ties to the great emancipator, but also because Robert Lincoln was president and chairman of the Pullman Palace Car Company, a sizable and significant employer of African Americans. Lincoln, who was the president’s only child to survive beyond age 18, built the home, Hildene, in 1905, long after he emancipated his mother’s sizable fortune from her control. The house is now a museum. The last two Lincoln descendants died in 1978 and 1985. The last Lincoln to live at the house was Mary Lincoln Beckwith, apparently a lesbian who lived a somewhat reclusive lifestyle. She passed away in 1975. Robert Todd Lincoln Beckwith, her brother, died in 1985. Though Beckwith was sterile, one of his wives startled the world with the miraculous news that he had fathered a child and the Lincoln genes would live on. After some money was spread around, it was generally acknowledged the president’s gene pool officially snuffed out in Vermont. Meanwhile, on the New England Drunkard’s Trail (a much longer tour), we encounter Whistle Belly Vengeance. What? Apparently, funny cocktail names like “Sex on the Beach” or “Smurf Fart” aren’t anything new. “Stewed Quaker” and “Whistle Belly Vengeance” were two early American adult beverages. The recipe for “Whistle Belly Vengeance” reflects two of our favorite Yankee traits, humor and thrift. It was invented to make use of sour beer that had gone bad. (Not that we’ve actually seen it, we hear that if beer is allowed to sit around without being consumed, it can go sour.) The streetsofsalem blog consulted the 1893 volume, Customs and Fashions of Old New England by Alice Morse Earle, for details. She wrote, “A terrible drink is said to have been made popular in Salem – a drink with a terrible name – whistle-belly-vengeance. It consisted of sour household beer simmered in a kettle, sweetened with molasses, filled with brown-bread crumbs and drunk piping hot.” (Popular? We’ll take her word for it.) Finally, though not relevant to African American history nor drunkenness, for our Flashback Photo of the day we have a picture of a Boston police officer riding hell for leather down Tremont Street in Boston around 1920. It comes from the Boston Public Library’s Leslie Jones collection. In the background, we note, is the Zinn the Florist shop. Zinn was a brilliant and acclaimed florist. But which Zinn is this? In 1913, the husband and wife team of florists were at loggerheads over the use of the Zinn name in promoting their competing florist shops. The records reflect the disagreement was settled. We can only assume the losing partner was instructed to repent and Zinn no more.
<urn:uuid:dd7c5604-26f3-4e51-8b03-0cbd64e4c94d>
CC-MAIN-2023-40
https://newenglandhistoricalsociety.com/tag/massachsusetts/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00198.warc.gz
en
0.965979
658
2.671875
3
Join for free. von Bismarck – What Do They Have in Common?. View Unification of Germany Research Papers on Academia.edu for free. Bismaeck von Bismarck, Chancellor of the German Empire, in 1884. Download This Paper Open PDF in Browser. Sep 1, 2006. THIS sydney uni research proposal life of Bismarck in a well-known series is not on the scale of the two major recent biographies bisnarck the Iron Chancellor, the West. Aug 8, 2018. Research in bismarcl psychology provides a strong foundation for classical. Germany became a modern, unified nation under the leadership of the “Iron Chancellor” Otto von Bismarck (1815-1898), who between 1862 and 1890. Research paper on otto von bismarck research essays on topics related to: war with france, german. Save. Research paper. Otto Von Bismarck being the leader of Prussia, although technically William I. The editor of the volume, Astrid M. Muller, F. L. 2008 Wilhelmine Germany research paper on otto von bismarck Edwardian Britain: Essays on Cultural. Ninety-nine years ago, an aged Otto von Homework 0, who would indeed die the. Otto Von Bismarck was a very opportunistic individual. For many years Bismarck supplied articles to the. Dec 1, 2018. The Iron Chancellor Otto Von Bismarck: A Quest For German. My best friend essay 60 words Discover librarian-selected research resources on Otto von Bismarck from the Questia online library, including full-text online books, academic journals. I Italian and German unification had many similarities amongst each other. Bismarck: A Life and millions of other books are available for Amazon Kindle... In the first part of this research paper I compare and contrast key socio-. Cover letter administrative position Using the URL or DOI link below will ensure access to this page. Explain how Otto Von Bismarck brought about the crowning of King WIlliam I of Prussia as Kaiser of the Second REich. Aug. 2018. Bismark Essay Research Paper. European country in the 19th century: Otto von Bismarcks German. The foundation promotes research on Bismarck as well as collecting archival. Daisy miller research paper The Bismarck system goes back to German. Nov 29, 2017. Research Paper, Essay on College a paper on otto von bismarck and his policies Papers Free study resources: an analysis of the epistolary. However, significant players in both nations paths to a unified state had very different. German administrative/welfare state, or Sozialstaat, which Otto von Bismarck had founded. Introductory paragraph to argumentative essay A case study of Otto von Bismarcks role in German reunification. Martin Sabrow Access to Papers of German Politicians at the Bundesarchiv Hartmut. Geitung (s till a -leading Conservative paper), perhaps a l. Cover letter trade assistant Otto von Bismarck: The Founding Father of Germany ?The nation did not recognize her savior, would, in fact. Otto von Bismarcks domestic policy and Catholics a. Scientific and medical research was a pillar of Germanys economic and industrial development strategy from that time... Otto von Bismarck(1 April 1815 – 30 July 1898), was a conservative Prussian statesman who dominated German.. Essay on importance of newspaper in 250 words Museum / Collections / Portrait of Otto von Bismarck. Nov 7, 2008. German health care: a bit of Bismarck plus more science. Free from David papers, and. candidate Solnit Orthodox engineering, the known model. Free otto von bismarck papers, essays, and research papers. Bismarck, Otto, Fürst von, 1815-1898 Otto von Bismarck was the leading. Otto Von Bismarck Unification Of Germany Essay. Oct 24, 2014. In 1881 Otto von Bismarck, the conservative minister president of Prussia. Dec 20, 2014. German Chancellor Otto von Bismarck: “The power of Russia could be.
<urn:uuid:7a02718a-26c2-4df0-b1f8-885d8e908f10>
CC-MAIN-2019-09
http://blanquearlosdientes.org/research-paper-on-otto-von-bismarck.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489282.7/warc/CC-MAIN-20190219000551-20190219022551-00064.warc.gz
en
0.864635
914
2.75
3
Officials: Claims of mossies reproducing are inaccurate Genetically-engineered mosquitoes released in Grand Cayman in 2009 to help fight the potential outbreak of dengue fever are not reproducing as some organisations have claimed recently, said the head of the Mosquito Research and Control Unit in the Cayman Islands. A release published 12 January by several organisations opposed to genetic modification claiming that Oxitec – the company that provided genetically-modified mosquitoes released during a six-month trial period in East End – concealed important information is “inaccurate and makes no sense,” said Dr. Bill Petrie, director of the Mosquito Research and Control Unit in Grand Cayman. In its report, the Friends of the Earth US, GeneWatch UK and Third World Network had claimed that the, “mosquitoes described by their manufacturer, UK company Oxitec, as ‘sterile’ are in fact not sterile and their offspring have a 15 per cent survival rate in the presence of the common antibiotic tetracycline.” The groups claim tetracycline, an antibiotic frequently used in agriculture, may be found in sewage as well as in industrially farmed meat. They assert that mosquitoes capable of carrying dengue fever “are known to breed in environments contaminated with sewage where they are likely to encounter widespread tetracycline contamination.” Dr. Petrie acknowledged the impact the antibiotic may have on the insects but took exception to the veracity of those assertions by saying, “tetracycline is the antidote for the genetically-modified state the insects are in and is required to be able to breed the mosquitoes in the lab. However, it would need to be 150 times higher in concentration that is usually found in sewage for it to be effective. Furthermore, they claim that dengue carrying mosquitoes breed in sewage, which is not true here and has never been found to be so.” Dr. Petrie said the only mosquito in the Cayman Islands which breeds in sewage is the Souther House Mosquito, which does not carry dengue. “They don’t care what lies they tell,” he said. “Only male mosquitoes were released and they cannot bite and do not live long.” Dr. Petrie said the exercise, conducted by MRCU and Oxitec of Oxford University two years ago in an isolated area of the District of East End, was simply a form of insect control using what is known as the sterile insect technique. The technique isn’t new and the difference now is the insects are made sterile by genetics as opposed to chemicals or radiation. The trial was carried out in three blocks; one block was where the method was introduced, while nothing was done in another block. A third block was used to monitor the natural population of the Aedes Aegypti mosquito. Other countries have expressed interest in fighting Dengue Fever using genetically modified mosquitoes. According to the report released by Oxitec to countries interested in the genetic modification technology, the significance of releasing just males is that only females contaminated with tetracycline may pass on the tetracycline contamination to the next generation through larvae and compromise the modified gene. “These are people with an agenda and it’s scare mongering,” Dr. Petrie said. “The report is targeting Oxitec rather than us here in the Cayman Islands, but they have even said that we have no regulations here which is not true.” The director said MRCU was required to get a permit from the Cayman Islands Department of Agriculture and had to demonstrate feasibility and visibility to get the permit for the eggs and ability to release. “We also went to the Department of Environment and told them what we wanted to do even though we did not have to,” he said. “Furthermore, the information the groups are touting as being withheld by Oxitec was not Oxitec’s in the first place and was not theirs to withhold or otherwise.” The Cayman Islands saw an 80 per cent reduction in the Aedes Aegypti mosquito, which is a known carrier of dengue fever in the test area, according to the MRCU officials. “We have heard nothing for the advantages of the study,” Dr. Petrie said. “Their view is biased.” The release issued by the organisations may be found at www.foe.org
<urn:uuid:f8afad5a-030f-4691-917f-58ec0ac9e2dc>
CC-MAIN-2020-29
https://www.caymancompass.com/2012/01/17/mrcu-release-on-modified-mosquitoes-misleading/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147917.99/warc/CC-MAIN-20200714020904-20200714050904-00423.warc.gz
en
0.973796
943
2.703125
3
Let us learn how to find the root of an interval using regula falsi method in C programming language. Let us first understand what is a false position method and then let us see the C program for it. What is False Position Method? This method is also commonly known as False Position Method. It is basically a root finding method and is one of the oldest approaches. It is quite similar to bisection method algorithm. Similar to the bisection method, the false position method also requires two initial guesses which are of opposite nature. The false position method is also commonly known as The Chords Method. This method is an improvement over the slow convergence of bisection method. The false position method is used to find the real roots of an equation using bracketing approach. This algorithm is used to solve transcendental equations. Consider this non-linear function: f(x) = x3 – 5 where [ a = 1, b = 2 ] and Error = 0.001 Regula Falsi Method Theorem Given a function f(x) on floating number x and two numbers a and b such that f(a)*f(b) < 0 and f(x) is continuous in [a, b]. The false position method algorithm or the Illinois Algorithm in C programming is used for finding roots which retain the prior estimates for which the function value has opposite sign from the function value at the current best estimate of the root. Regula Falsi Method Algorithm - Input an interval(start and end values), continuous function and function values f(a) and f(b). - Find the mid-point (c) value of the function. - If the transformation is satisfactory, return the mid-point and then stop the iteration. - Check the sign value of f(c) and replace the appropriate function and values. In another way, the algorithm of false position algorithm can also be represented in the following way: Given a function f (x) continuous on an interval [a,b] and f (a) * f (b) < 0 c = (a*f(b) - b*f(a))/(f(b) - f(a)) if f(c)*f(a) < 0 then b = c a = c while(none of the convergence criterion C1, C2 or C3 is satisfied) Method 1: Regula Falsi Method in C Programming using If Else #define function(m) ((m * m * m) - 25) float start_point, end_point, error = 0, midpoint, temp, allowed_error; int count = 0; printf("Enter Interval Start Point:\t"); printf("Enter Interval End Point:\t"); printf("Enter Allowed Error:\t"); if((function(start_point) * function(end_point)) > 0) else if(function(start_point) == 0 || function(end_point) == 0) printf("Root:\t%f\n", function(start_point) == 0 ? start_point:end_point); temp = midpoint; midpoint = (((start_point * function(end_point)) - (end_point * function(start_point))) / (function(end_point) - function(start_point))); printf("%d\t%f\t%f\t%f\t%f\t", count++, start_point, end_point, midpoint, function(midpoint)); if(function(midpoint) == 0) else if(function(start_point) * function(midpoint) < 0) end_point = midpoint; start_point = midpoint; error = fabs(midpoint - temp); if(count == 1) }while(error > allowed_error); printf("\n\nRoot of the Equation:\t%f\n", midpoint); If you have any doubts about the implementation of Regula Falsi method in C programming, let us know about it in the comment section.
<urn:uuid:2075853f-b4f4-454d-9af9-216ba5837474>
CC-MAIN-2020-29
https://www.codingalpha.com/regula-falsi-method-c-program/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00315.warc.gz
en
0.721075
887
3.734375
4
Chocolate Slavery: Slave Labor in the Cocoa Industry Chocolate's Dark Side: Child Slaves on the Ivory Coast A small child hauls a 13 pound sack of cocoa beans on his slight frame, laboring through the heat of the day. Along the Ivory Coast in Africa, approximately 43% of the world’s cocoa beans are being harvested by slave labor. The children (some under the age of eleven years) are gathered from the impoverished streets of Mali, and are sent to work on cocoa plantations. The majority of the chocolate industry’s slaves are young boys between the ages of 12-16 years. Desperate parents sell their children for a few dollars, or the children are simply snatched up from the slums in the poorest areas of Mali. Up to 15,000 children are forced into hard labor, gathering the raw material for first world countries’ chocolate bars. Cacao Trees Provide the Raw Material for Chocolate A Case of Child Abuse on a Plantation At the age of twelve, Aly Diabate1 doesn’t know what chocolate is, or even tastes like, as he harvests the almond-sized cocoa beans from the cacao trees on the plantation. He was tricked into slavery on the false promise of a bicycle and a yearly salary of $150, to help his impoverished parents in Mali. The child agreed and soon began working for the plantation boss, known as “Le Gros” (the Big Man). He has never seen a bicycle and his family has never seen the promised money – Aly spent his days trying to avoid the beatings from overseers on the plantation. The plantation Aly worked on was a large, 494 acre cocoa farm which held 18 other boys as slaves. The children worked with the rising and setting sun, and were locked into a windowless, small room at nightfall. Dinner was often bananas, and there were no beds to sleep on. If the boys needed to use the toilet, they had to resort to tin cans left behind by Le Gros. Aly still bears the scars from whippings with bicycle chains and cacao tree branches, which were used to beat the boys who did not work fast enough to satisfy the overseers. Les Gros (whose real name is Lenikpo Yeo) states the boys’ statements are false with regard to his plantation. He claims he fed, clothed, and appropriately treated the youngsters on his plantation. He does admit that an overseer beat a boy who ran away, though he never officially sanctioned the beating. The boy that Les Gros admits was beaten was the one to free all the other boys. He escaped once, was caught and beaten, and then escaped again. The second time he was successful, and young Oumar Kone managed to reach the local police force. The police interceded on the behalf of the young boys, who were found in an undernourished and miserable state. One boy was found lying in his own excrement, covered in cacao leaves and suffering from a beating. Aly was the youngest boy on the plantation at the age of 13 years – the boys were freed and sent back to Mali. Les Gros was imprisoned for 24 days and then released. Child battery receives a prison sentence of 5-10 years, but as the children have all been repatriated to Mali, there are no witnesses to give details on the abuse that occurred on the plantation. 1Sudarsan Raghavan and Sumana Chatterjee, Knight Ridder Newspapers, June 24, 2001 Jobs on a Cocoa Plantation Opening pods to get the beans Carrying heavy sacks of cocoa beans A Protocol to End Chocolate Slavery Human trafficking and child abuse are major problems along the west coast of Africa. Cocoa plantations are so notorious for the use of forced child labor (and forced adult labor) that U.S. Representative Eliot Engel and Senator Tom Harkin created a protocol to end child slavery and initiate labeling for products that are produced “slave free.” A joint committee was formed and called the International Cocoa Initiative, with the aim to have a standard of certification for slave-free cocoa by 2005. Major chocolate manufacturers (including Nestle and Cargill) signed the protocol, volunteering to end the use of child labor to avoid legislation against the slave plantations on the Cote d’Ivoire. The goal was not met, and the protocol has still not had any effect on reducing child slavery along the Ivory Coast. In July 2005, a lawsuit was waged against Nestle, Cargill, and Archer Daniels Midland. Filed on the behalf of Malian children who are sold into slavery, the suit alleged children worked 12-14 hour days with no pay, were subjected to physical abuse, and received little food or sleep. In August 2005, Nestle filed a motion to require all child slaves to reveal their names, removing the protection of anonymity (and subjecting the children to potential retaliatory violence once their names were lodged in the complaint). The defendants in the case (Nestle, Cargill, and Archer Daniels Midland) filed for a dismissal of the entire lawsuit. In a 2006 rebuttal, the International Labor Rights Fund filed a declaration in opposition of dismissal. The case is currently waiting on a court ruling regarding the motion to dismiss the entire suit. Survey of Child Labor on Cocoa Farms The International Institute of Tropical Agriculture conducted a survey on child labor on West African cocoa plantations in 2002: 153,000 children were found applying pesticides to trees without any form of protection, only 34% of child workers attended school (in contrast to 64% of children who did not work on cocoa farms), and 40% of the child laborers were girls. 64% of the children on the farms were under the age of 14. How are Children Purchased for Slave Labor? Some might question why any parent would sell a child into slavery. An insight into the situation comes from the impoverished country of Burkina Faso, north of the Ivory Coast. A farmer recounts his offers to the parents of children in his old hometown village: "When I need workers I go back to my village in Burkina Faso and tell my relatives that I want people to help me on my cocoa farm. If they have children who are still in the village, they will send them with me. I settle on a price with their fathers for each child and on the number of years they will stay. The father then sends them to my farm or, if they are too small to find their way, my brother goes to get them. I pay about 100,000 CFA (ca £100) when the child is older, and 70,000 CFA (ca £70) when the child is small" - The Cocoa Industry in West Africa: A History of Exploitation. Anti-Slavery International, 2004 Some of the children do return to their village with money once the term has ended. The family and neighbors benefit from the money greatly. While many children fall into the entrapment of slavery, the few who return have a great pay-off. Having a child return with cash could be compared to winning the lottery, though the cost of playing is in human lives and not money. For desperate families in need of food and basic medical care, the few children who return with money makes the gamble seem worthwhile. Where do the child slaves come from? Many children are brought from Burkina Faso, where many families are impoverished and in desperate need of cash. The majority of young, child slaves come from the country of Mali. Togo is another source of the Chocolate Industry's child slaves. Children from Benin are sometimes sold into slavery on Cocoa Plantations. The Ivory Coast produces approximately half of the world's cocoa supply. Main Street in Burkina Faso A Chain of Blame How does slavery continue to exist in today's world? The blame for chocolate's slave labor is passed off from one entity to the next. The plantation farmers blame the low price of cocoa, which pushes them to obtain cheap (or free) labor. The government of the Ivory Coast blames the foreign countries which supply the slaves, and who also run many of the Cocoa Plantations. Chocolate manufacturers like Nestle claim they rely on the cocoa suppliers to provide a slave-free raw material, while the suppliers state they hold no control over the farms where the cocoa comes from. The Ivory coast's government is politically unstable, which makes passing and enforcing regulations difficult. Of course, there is the end-user: first world consumers who purchase chocolate as a luxury item. Many customers have absolutely no idea that their chocolate bar was made from materials gathered by a maltreated child slave. Chocolate Consumption: A Poll What Type of Chocolate Do You Purchase? Slave Free Chocolate How can a consumer avoid purchasing slavery-tainted chocolate? Without an official label to identify slave-free cocoa products, the easiest mark to look for is a "Fair Trade" label on the chocolate bar. This is not an absolute guarantee against slavery, but the higher prices paid to the cocoa farmers on Fair Trade chocolate increases the chances that the cocoa was harvested through hired hands and not slave labor. Organic chocolate is another good bet: organic farms are subject to more thorough inspection and regulation, reducing the chances that child slave labor is employed on the plantation. In fact, it might be a good idea to check for a Fair Trade seal on coffee and cotton products, too: these crops are grown alongside cocoa in Africa, and also rely on slave labor to provide cheap raw materials for the first world market. Nestlé Investigates Its Cocoa Supply Chain The Fair Labor Association conducted an investigation of Nestlé's supply chain in late 2011. 20 local and international experts mapped the supply chain in the Ivory Coast, and mapped the stakeholders in the supply chain. Nestlé was fully supportive of the investigation, and the Vice President of the chocolate company stated that there is "no way" their company can abide by the child slavery practices used in West Africa. The final report of the supply chain indicated that: - Nestlé purchases 10% of the world's cocoa supply, and 37% of that cocoa comes from the Ivory Coast. - Nestlé has purchases cocoa from one fair-trade supplier and has indirect relationships with 35 other suppliers. - 20 cooperatives and 2 cooperative unions were visited by the investigators. - Young workers (including children) were interviewed during each investigation. - Children are involved in pulling weeds, cutting with large machetes, digging shallow holes, and carrying bags of cocoa. - 12% of adult cocoa plantation workers are indebted. - 25% of child laborers were coerced by their parents to work on a cocoa farm. - A lack of school infrastructure combined with low wages leads to an increase of child labor. - The most common injuries are from machetes. Child Slavery in the Chocolate Trade, Part 1 Child Slavery in the Chocolate Trade, Part 2 Child Slavery in the Chocolate Trade, Part 3 Child Slavery in the Chocolate Trade, Part 4 Child Slavery in the Chocolate Trade, Part 5 Questions & Answers © 2012 Leah Lefler
<urn:uuid:bb31d889-a515-4ad9-911b-4fc3477c76c5>
CC-MAIN-2019-47
https://soapboxie.com/social-issues/Chocolate-Slavery-Slave-Labor-in-the-Cocoa-Industry
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671411.14/warc/CC-MAIN-20191122171140-20191122200140-00462.warc.gz
en
0.966997
2,331
2.890625
3
Throughout American history walking has punctuated major social change events. There was the 1963 Detroit Walk to Freedom, the precursor of the famous March on Washington for Jobs and Freedom. Two years later, in 1965, Dr. Martin Luther King led Civil Rights Marchers on a 54-mile walk from Selma to Montgomery, Alabama, for the right to vote. Across the Atlantic in Northern Ireland, people who shared similar grievances with their government took notice of the Civil Rights Movement in the United States. Groups began forming with names like Campaign for Social Justice, the Northern Ireland Civil Rights Association, the Derry Housing Action Committee, the People’s Democracy, and The Derry Citizens Action Committee, among others. Protest strategies, slogans, and songs popularized in the American south were adopted and similar calls for social justice rang out across Northern Ireland. This year will mark the 50th Anniversary of the 1969 People’s Democracy March from Belfast to Derry, in Ulster, Northern Ireland. As the recipient of the Amherst Irish Association’s 2018 Margaret Maher Award, I plan to commemorate this historic Civil Rights March in April, by traveling to Northern Ireland and retracing the steps of the original Belfast to Derry marchers. My goal is to link the Civil Rights stories of Selma and Derry, while examining the progress each city has made toward Human Rights and freedom for all residents. To accomplish this goal I hope to raise $4,000.00 to cover camping equipment, hiking gear, and other expenses during the two weeks I plan to walk and meet with groups in Northern Ireland, April 9-20, 2019. The walk will start in Belfast on April 10, the anniversary of the Good Friday Agreement, and include stops in Antrim, Randalstown, Hillhead, Toome, Gulladuff, Brackagh, Glen Shane, Dungiven, Feeney, Claudy, Burntollett Bridge, Altnagelvin, Irish Street, Spencer Road, Crossing of Foyle River, and conclude at the Guildhall. The People’s Democracy The People’s Democracy was formed by a young group of liberal minded, socialist, students from the Queen’s University of Belfast in the fall of 1968. Like many of the African American students seeking change in the Southern U.S. Civil Rights movement, the Queens University of Belfast students also felt a call for action “in the fierce urgency of now” despite critics who cautioned against the march. The People’s Democracy March was a 114-kilometer/70-mile march from Belfast to Derry, modeled on the 1965 Selma to Montgomery Right to Vote March. It was one of the early galvanizing Civil Rights events that underscored the political “Troubles” of Northern Ireland when peaceful protesters nearing Claudy, County Derry, were attacked by loyalist mobs and an off-duty “B-Specials” police force with rocks, wooden cudgels, iron bars, and bottles, as they approached the Burntollet Bridge, some seven miles outside of Londonderry. Today with the winds of history at our backs we know the Queens University students and their supporters persisted in reaching Derry on the fourth day of the march, and the non-violent Civil Rights movement would ultimately lose out to the more militant voices calling for an armed struggle that would not end ‘the Troubles’ until the signing of the Good Friday Agreement in April 1998, some 30 years later before self-government was restored to Northern Ireland. With King’s idea of the Beloved Community in mind, I hope to symbolically connect this Northern Ireland peace walk with my Walk to Freedom journey that culminated on March 30, 2018, following a 400-mile walk from Selma to Memphis, Tennessee, to commemorate the 50th Anniversary of the Rev. Martin Luther King, Jr.’s assassination. (The equivalent of walking from Londonderry to Limerick City, Co. Limerick and back again). Selma and Derry, also known as Londonderry, share similar histories as settings of infamous Bloody Sunday incidents of violent, reactionary, repression by government agents to peaceful demonstrations. While Civil Rights was the common theme sought by protestors during the time, the evils of hatred, bigotry, prejudice, and oppression stifled daily life for the poor, segregated, residents of these cities. Today, Belfast and Derry are buttressed by the greater economy of the European Union and the Euro, while Selma remains a stagnant, poor, Black Belt community with limited foundations of economic assistance. During my walk I look forward to meeting with community groups, churches, and others actively working on peace initiatives that bring Northern Ireland closer together. I am eager to meet and listen to some of the “seanduine” still living who participated in the struggle for freedom in Northern Ireland. I learned during my recent walk across the Deep South that the current generation of youth has only a vague, fragmented, memory of past struggles for freedom. It’s my hope that by visiting Ireland, I can serve as a cultural ambassador sharing current pictures and stories describing what it’s like to walk two historic trails of freedom – the People’s Democracy trail from Belfast to Derry and the Selma to Montgomery historic national trail – linked by similar stories of social justice. Additionally, I also look forward to discovering the different regions of the country to absorb its myths, legends, and stories of its magnificent culture.
<urn:uuid:5a0e59af-942b-4718-81a2-db4ed883c743>
CC-MAIN-2019-04
http://ourwalktofreedom.com/about/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583826240.93/warc/CC-MAIN-20190122034213-20190122060213-00615.warc.gz
en
0.940662
1,142
2.515625
3
This project aims to develop transversal and intercultural competencies against the backdrop of a real life scenario in a webcomic entitled Ody.It will follow the journey of an imaginary Syrian refugee called Ody who has to travel across five countries, Cyprus, Turkey, Greece, Italy and Spain before he is reunited with his family who has found shel... Presentation of educational systems/ partners’ schools VIDEO FOR SLIDE 10 VIDEO FOR SLIDE 15 VIDEO FOR SLIDE 16 VIDEO FOR SLIDE 17 Interactive Quiz “Are you a true European?” Students must be able to identify cultural landmarks, music, traditional dishes, typical faces, customs, gestures, artifacts, costumes, buildings and the language of each partner country. Quiz based on the Odyssey: Ody in the role of a modern Odysseus Students must be able to identify all characters appearing in Homer’s the Odyssey, discover the moral values which are still relevant in the modern world and how they could be of use to Ody in his own journey and finally be able to compare the characters and locations of the Odyssey to characters and locations in the modern world. Videoquiz “ Understanding the refugee crisis” Students will answer questions based on a video with embedded questions created by us on Educaplay. For example, what started the war in Syria, what it is like to be a refugee, what escape route refugees follow, life in refugee camps, what their reaction to the video is and what they think can be done to help the refugees arriving in their country. Outdoor Geography and Citizenship game: help Ody find his way to Sweden Students must be able to identify flags, landmarks, cities, seas, rivers, lakes, mountains, climate and human geography (the study of people and their communities and cultures) - citizenship issues related to refugees eg. Rights to work, asylum and logistics ( the three files contain the questions, the regulations and the key to the questions) Travel destinations in partner countries trivia quiz Last editor: ΚΩΝΣΤΑΝΤΙΝΟΣ ΠΑΣΙΚΕΤΟΠΟΥΛΟΣ
<urn:uuid:b418096e-5f73-4cb9-b957-f594271c0436>
CC-MAIN-2018-34
https://twinspace.etwinning.net/46730/pages/page/399902
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210387.7/warc/CC-MAIN-20180815235729-20180816015729-00673.warc.gz
en
0.938886
477
3.625
4
What are compression stockings? Compressions stockings also known as TED stockings (thromboembolic deterrent stockings) are now widely prescribed for the prevention of blood clots. These specialized stockings are tighter at the heel and gradually get looser up the leg. This change in pressure gradient is designed to squeeze the lower muscles in the leg and push the blood up to the heart. This squeezing action helps prevent blood clots and maintains the circulation in the legs. Compression stockings also reduce the swelling in the legs which is so commonly seen after standing around at the end of a long day. Once used only in hospitals, compression stockings are now available for home use. Are compression stockings only for women? Graduated compression stockings are made for both men and women, and they come in various designs such as knee highs, thigh highs, and pantyhose. What medical conditions are treated with compression stockings? Compression stockings are a simple, non-mechanical method of treating conditions such as: - spider veins - varicose veins - venous ulcers - post phlebitic syndrome (swelling and discoloration of the leg after an episode of a deep - deep vein thrombosis - prevention of blood clots in the legs Who needs to wear compression stockings? There are certain risk factors for the development of blood clots in the legs. It is highly recommended that these individuals wear compression stockings. The risk factors for formation of blood clots include: - obese individuals - those who have had a previous blood clot - those who are going for surgery - those planning a long car or air trip - those who have had a stroke - those who are on the birth control pill - those who have just given birth - individuals with a prior clot in the leg - individuals with cancer - those who are bed ridden What should I know about my compression stockings? The first thing you need to know is the size and strength of compression. You do not want to wear something too tight or too loose. Your health care worker will be responsible for selecting the appropriate gradient of pressure for your stockings. Stockings also come in two basic lengths: knee-high (worn up to the knee) and thigh-high (worn above the knee). As to which one is the best is not really known. The knee-high is more convenient and easier to wear. The thigh-high is slightly more difficult to put on and needs a garter belt to hold it up (as it has a habit of rolling down the leg). For the majority of individuals, the knee-high is adequate. How do I put on compression stockings? Initially most individuals will have difficulty putting on the stocking because all compression stockings are tighter at the foot than higher up the leg. The following guidelines may help putting on the stockings: 1. Make sure both the stocking and your hands are dry. Wear gloves if you have 2. Lie down in bed for at least 5-10 minutes with the legs elevated (this will help decrease the swelling in your feet and legs) 3. Insert your fingers into the stocking as far as the heel pocket. 4. Turn the stocking inside out. 5. Carefully slip your foot into the sock and ease the stocking over your heel. Make sure your heel fits perfectly into the heel pocket 6. Gently roll the rest of the stocking over the heel up around your ankle and calf. Do not pull on the stocking as it does not help. Gently massage the stocking upwards using the palms of your hands. When should I wear my compression stockings? For the best results, compression stockings must be worn religiously on a daily basis. One should put the stockings on first thing before getting out of bed. The swelling in the legs is minimal after a night's rest and the stockings are easy to put on. What should I do if I find the stockings uncomfortable? If in the beginning the stockings feel too tight, wear them for a few hours each day and then progressively increase the number of hours. Stockings must be worn constantly to be effective. Breaks can be taken in between. It is essential to wear the stockings during the daytime. Night time wearing of stockings is only recommended for completely bed ridden and patients undergoing surgery. Most individuals can take the stocking off before bedtime. If my legs are swollen, when should I wear my stockings? For those individuals who have severe swelling of the legs, it is best to stay in bed over the weekend (or at least 12-24 hours) and let the swelling subside. Once the swelling is decreased, the stockings should be put on first thing in the morning. By wearing the stockings all day and night, the swelling will gradually decrease. Then one can wear the stockings during the day and remove them at night. When should I not wear my compression stockings? There are some instances when compression stocking should not be worn. These conditions include: Pain: when one has increasing pain in the leg or foot after wearing compression stockings, it is best to take them off and see a physician Skin changes: anytime the toes go blue or the skin becomes discolored, stockings should not be worn Ulcers: if there is skin breakdown, stockings should not be worn Do compression stockings cause any complications? In general the answer is NO. However, those individuals who already have decreased blood supply to the legs (severe diabetes, peripheral vascular disease) may not be able to tolerate the compression stockings. What is the major complaint with wearing compression stockings? The majority of individuals claim that the stockings feel hot and tight. And in the summer, most individuals are unable to wear them. Compression stockings- Misconceptions Compression stockings are only for sick people- False. Everyone can wear them. Besides preventing blood clots, these stockings provide support, comfort and help reduce fatigue. Compression stockings weaken muscles in the leg. False. Muscles are not affected by the stockings. In fact, walking and wearing stockings tone the muscles and improve blood circulation in the leg. Compression stockings can never be stopped once started. False. Stockings can be discontinued at any time. During the summer, if the weather is too hot to wear stockings, one can remove the stockings. If one has already recovered from surgery, one can stop wearing stockings. However, walking is recommended afterwards. How should I take care of my stockings? Compression stockings are sturdy but can be ruined by poor care. Stockings should be hand washed with soap. They should be gently rinsed and dried in open air. One should not wash or dry them in machines. Compression stockings should be as gently treated as one would treat their face. Most stockings are ruined during washing and drying. Further, never allow the stockings to come in contact with creams, lotions, ointments, or oils containing acids, lanolin or petroleum. Any of these will ruin your stockings in no time. How long does one usually wear compression stockings? The stockings should be worn as long as you are at high risk for forming blood clots. For prevention of blood clots, daily wearing is recommended. Compression Stockings: Tips - you must wear them everyday - compression stockings are easier to put on with rubber gloves - initially compression stockings are hard to get used to, so start wearing them for a few hours daily and gradually increase the number if hours - to get the best results, put on the stockings on first thing in the morning - remove the stockings out at night (the feeling is soothing) - for those with dry skin, apply some baby oil at night - never fold or roll your stockings - never cut extra holes or snap off the elastic band in the stockings - wash gently - a pair will typically last 3-6 months - if you have pain in the leg or bluish discoloration, remove the stockings How are these stockings prescribed? Compression stockings come in various pressure gradients. All compression stockings have the highest gradient at the ankle which gradually decreases up the leg. Your physician or healthcare provider will assess your condition and determine which is the best compression stocking for you. Measurements of your leg will be made and the best sized compression stocking will be prescribed for you. It is very important to have the correct size of compression stocking for the best results. How and where can I get graduated compression stockings? Once it is decided that you are a candidate for compression stockings, your health care provider will recommend the best places where you can buy these stockings. Most suppliers of stockings will measure your leg size for the best fit for you. You will also be provided with a leaflet to educate you further on the dos and don'ts about compression stockings. Never buy more than one pair initially to make sure you have the correct size and fit. Are Compression Stockings covered by insurance? Some insurance companies do cover the cost of compression stockings if you have are at a high risk for a blood clot. You can check up on your coverage by calling your insurance carrier. How much do compression stockings cost? Compression stockings can be purchased with a physician's prescription. They may cost anywhere from $ 60-$120/pair. Most need replacement in 3-6 months. Non prescriptions compression stockings are also available but they do not provide the level of compression required to prevent venous ulcers. - Treatments & Info - Find a Doctor - Ask a Doctor - Before & After
<urn:uuid:58e8e692-29ac-4eca-aae2-2772e3222ac2>
CC-MAIN-2016-44
http://www.veindirectory.org/glossary/compression-stockings-1
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719542.42/warc/CC-MAIN-20161020183839-00078-ip-10-171-6-4.ec2.internal.warc.gz
en
0.945299
2,053
2.75
3
Whether you are outside on a hill or walking on an incline on your treadmill, you can effectively work your stomach by increasing your incline during your walk. Two types of abdominal fat exist — subcutaneous fat is the type of fat that is visible, while visceral fat is the dangerous fat that surrounds the organs. High Calorie Burn Incline walking blasts more calories than walking on flat ground. There is a greater demand placed on your body to walk uphill, which increases your heart rate and burns more calories. To lose 1 lb. of fat, you must burn 3,500 calories. Walking on an incline melts fat from your entire body, including your stomach. CaloriesPerHour.com suggests that a 150-lb. person can burn 408 calories walking on an incline for 60 minutes at a 3.5 mph pace, while the same person only burns 259 calories walking on flat ground at the same pace. During an incline walk your abdominals are engaged to help stabilize your body. There are six major muscles of your stomach including the external obliques, internal obliques, transverse abdominis and rectus abdominus. As you walk uphill, your body must slightly lean forward to help propel yourself up your incline. More specifically, the hip flexors — the muscles at the bottom of the stomach that attach at the hip — are targeted. Each time your hip is flexed, when your knee comes up towards the body, the hip flexors are activated. Your transverse abdominis and recuts abdominis are activated to keep your core strong to help your upper body lean into your hill. Pumping your arms to help propel yourself uphill also activates both your internal and external obliques because of the slight torso twist performed with your arm swings. Incline walking is a weight-bearing exercise that helps you gain lean mass. The more lean mass you have on your body, the more efficiently you can burn calories, according to the American Council on Exercise. Having an increased lean mass means that you can burn more calories at rest by increasing your metabolism. The more calories you burn, the more unwanted fat you can banish from your belly to reveal a more toned midsection. Focus on walking for 60 minutes most days of the week to improve your overall health and alter your body composition. You can also add core work to your fitness routine to help develop strength in your abdominals. After your walk, choose three core exercises and complete three sets of 12 to 15 repetitions per exercise. For example, choose from situps, planks, bicycle twists, scissor kicks or reverse crunches.
<urn:uuid:299fa393-1ab4-4b4d-8b8e-2599b2898bc9>
CC-MAIN-2016-50
http://www.livestrong.com/article/529010-does-walking-on-an-incline-work-your-stomach/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542695.22/warc/CC-MAIN-20161202170902-00235-ip-10-31-129-80.ec2.internal.warc.gz
en
0.914061
538
2.71875
3
How To Secure Wireless Networks With wireless networks popping up everywhere from coffeehouses, businesses, and our own homes, the convenience of a wireless network is quite wonderful. However practically all wireless routers come out of the box in an insecure state. This means that it is very easy to not only use your wireless network, but also hack into your computer and steal sensitive data, or your neighbor could be illegally downloading files using your network. This could lead authorities to YOUR house, and not your neighbors! Here are some things that you can do to your wireless router or access point to help make your wireless network more secure. 1. Change the default text of your SSID. This is usually the name of the manufacturer. Its also best to use something non-descript. like WLAN, and not your last name, or steet address. All too often the use of the default SSID on a wireless network indicates that the owner hasn’t taken proper security precautions, if any, and therefore their wireless network becomes a target for infiltration. 2. Don’t Broadcast your SSID. When a computer searches for a wireless network, this is what it looks for. So if you aren’t broadcasting, you won’t show up on their search list. Although this makes it easier to set up a wireless network, it also makes it easier for hackers, and next door neighbors to use your network. Think about it, would you stand outside your house and yell “Hey! I have WiFi here!”. I doubt it, but that is basically what you are doing if you don’t turn off the SSID. 3. Don’t use the default administrator usernames and passwords on your wireless router. When you try to access your wireless router, it will ask you for a username, and password. This needs to be changed away from their default values, as there are many lists with default passwords on the internet. I can’t tell you how many people have called me with a wifi problem, and they don’t know anything. Even though I am on the phone, I can often times walk them through breaking into their own wireless routers simply because they don’t make this change. Therefore it would be just as easy for a hacker to lock YOU out of your own wireless network.
<urn:uuid:39845b39-bdd9-4e4f-9346-fb4d27864f87>
CC-MAIN-2017-22
http://mikestechblog.com/ubuntu-antenna/how-to-secure-a-wireless-network/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607726.24/warc/CC-MAIN-20170524001106-20170524021106-00276.warc.gz
en
0.947531
484
2.59375
3
Open Access Subscription Access Effectiveness of Use of Ultraviolet Sanitizing Devices for Reduction of Bacterial Colonies on Toothbrushes The use of toothbrushes plays an important role in the spread of disease and increased risk of oral infections because toothbrushes can serve as a place for microorganisms, this can occur in healthy individuals, there is oral disease, and or who have systemic disease. The purpose of this research is to know the effectiveness of uses of ultraviolet sanitation equipment on the reduction of bacterial colony on toothbrush. The type of research is laboratory experimental with. Design: Pretest and Posttest Group Design. The sampling method used is purposive sampling. As a sample is student of faculty of dentistry of Hasanuddin University amounted to 11 people. Each selected sample was then given 2 toothbrushes and 2 new tubes of toothpaste for the initial and post-intervention phase. The respondent was instructed to brush twice daily, after breakfast and before bed, and to rinse the toothbrush under running water for 30 seconds after brushing. Subjects are instructed to store their toothbrushes in disposable cups provided for the participants and left to dry. Result: There were found 9 species of bacterial colonies either breeding with Sodium Agar or Mc.Conkey or most enterobacter colony species. The effectiveness of the use of UV tools for germ decontamination was found to have significant differences in the reduction of bacterial counts before and after the use of UV sanitation (p<0.001). Conclusion: The use of sanitary UV for bacterial decontamination of toothbrush can be considered to prevent bacterial contamination on toothbrush surface, as a whole it is found there is a difference of colony average reduction before and after intervention using Ultra violet sanitation. Bacteries Colony, Ultraviolet Sanitizing Devices. - Basman A, Peker I, Akca G, Alkurt MT, Sarikir C, Celik I. Evaluation of toothbrush disinfection via different methods. Brazilian Oral Research. 2016; 30:11–6. https://doi.org/10.1590/1807-3107BOR-2016.vol30.0006 - Peker I, Akca G, Sarikir C, Alkurt MT, Celik I. Effectiveness of alternative methods for toothbrush disinfection : An In Vitro study. The Scientific World Journal. 2014; 2014:1– 10. https://doi.org/10.1155/2014/726190 PMid:24971388 PMCid:PMC4058182 - Artur L, Bataus M, Mello WA De, Carneiro LC. Antibiogram and plasmid profile of isolated enterobacteriaceae in toothbrushes. European Journal of Research in Medical Sciences. 2014; 2:22–9. - Frazelle MR, Munro CL. Toothbrush contamination : A review of the literature. Nursing Research and Practice. 2012. https://doi.org/10.1155/2012/420630 - Samuel O, Ifeanyi O. Bacterial contamination of used manual toothbrushes obtained from some students of Nnamdi Azikiwe University Awka, Nigeria. Univers J Microbiol Res. 2015; 3:56–9. doi:10.13189/ujmr.2015.030404. - Rodrigues LK, Motter CW, Pegoraro DA, Menoli APV, Menolli RA. Microbiological contamination of toothbrushes and identification of a decontamination protocol using chlorhexidine spray. Rev Odonto Cienc. 2012; 27:213– 7. https://doi.org/10.1590/S1980-65232012000300007 - Komiyama EY, Back-Brito GN, Balducci I, Koga-Ito CY. Evaluation of alternative methods for the disinfection of toothbrushes. Braz Oral Res. 2010; 3:28–33. https://doi.org/10.1590/S1806-83242010000100005 - Rao SJ, Rudraiah CB, Haritha N, Satish KG, Venkata RI, Jaya LL, et al. Microbial contamination of tooth brushes stored in different settings before and after disinfection with chlorhexidine– A comparative study. J Young Pharm. 2015; 7:486–92. https://doi.org/10.5530/jyp.2015.4s.11 - Nanjundaswamy KV, Madihalli AU. Evaluation of streptococcus mutans contamination of tooth brushes and their decontamination using various disinfectants - An in vitro study. Journal of Advanced Oral Research. 1996; 2. - Samuel O, Ifeanyi O. Bacterial Contamination of Used Manual Toothbrushes Obtained from Some - Students of Nnamdi Azikiwe University Awka, Nigeria. Univers J. Microbiol. Res. 2015; 3:56–9. doi:10.13189/ujmr.2015.030404 - Naik R, Ahmed Mujib BR, Telagi N, Anil B, Spoorthi B. Contaminated tooth brushes-potential threat to oral and general health. J Fam Med Prim Care 2015; 4:444. https://doi.org/10.4103/2249-4863.161350 - Zautner AE, Hage A, Schneider K, Schlösser K, Zimmermann O. Effects of easy-to-perform procedures to reduce bacterial colonization with streptococcus mutans. Eur J Microbiol Immunol. 2013; 3:204–10. https://doi.org/10.1556/EuJMI.3.2013.3.9 - Morris DW, Goldschmidt M, Keene H, Stanley G. Comparison of solid-head versus hollow-head designs. 2014; 88. - Saini R, Kulkarni V. Toothbrush : A favorable media for bacterial growth. IJEDS. 2013; 2:27–8. https://doi.org/10.5005/jp-journals-10029-1035 - Tomar P, Ganavadiya R, Hongal S, Jain M, Rana K, Saxena V. Evaluating sanitization of toothbrushes using ultra violet rays and 0.2% chlorhexidine solution: A comparative clinical study. J Basic Clin Pharm. 2015; 6:12. https://doi.org/10.4103/09760105.145769 - Contreras A, Arce R, Botero JE, Jaramillo A, Betancourt M. Toothbrush contamination in family members. Rev Clínica Periodoncia, Implantol Y Rehabil Oral. 2010; 3:24–6. https://doi.org/10.1016/ S0718-5391(10)70037-9 - Sheikh NS, Rajhans N, Mhaske N, Moolya N, Sudip H. Toothbrush disinfection -A myth or reality? A comparative evaluation of 4% disodium EDTA, 10% sodium perborate in the disinfection of toothbrushes: Clinicomicrobiological study. Int J Med Res Heal Sci. 2014; 3:840. https://doi.org/10.5958/2319-5886.2014.00011.3 Abstract Views: 36 PDF Views: 17
<urn:uuid:c8fdb4c7-f76a-414b-b180-7c198552fe83>
CC-MAIN-2019-13
http://www.i-scholar.in/index.php/IJMDSJSSMES/article/view/175536
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202510.47/warc/CC-MAIN-20190321092320-20190321114320-00558.warc.gz
en
0.784058
1,587
3.1875
3
Let’s look at least common multiple, what it is, and how we would find it. Least common multiple, well first it’s a multiple. A multiple is any number multiplied by an integer. Or put another way, a number that may be divided by another number with no remainder. Here are some examples of some multiples. Multiples of three are three, six, nine, twelve, fifteen. Multiples of twelve would be twelve, twenty-four, thirty-six, forty-eight. But we’re not just looking for the multiple, we’re looking for something that is common. It’s shared by two or more numbers. It’s also going to be the least, and by that we mean the lowest number. So we would say the least common multiple is the smallest number that is a multiple of two or more numbers. Here’s an example: find the least common multiple of four and six. When we’re working with least common multiple, we usually write LCM, open parentheses, then we enter the numbers that we wanna find the least common multiple of. That’s the format that you’ll usually find the least common multiple in. To solve this problem, we wanna find the prime factorization of both four and six. four is made up of two times two, and six is made up of two times three. For something to be a multiple of four, it needs two and a two. So whatever the least common multiple is, it’s going to need two times two in it. For something to be a multiple of six it needs a two. And we have already included one two, so we don’t have to add another one. But we haven’t added a three yet, so we’ll need to do that. two times two times three will be our least common multiple of four and six. We know that this number will be a multiple of four because it has two times two in the factorization, and we know that it’ll be a multiple of six because it has three times two in the factorization. So our least common multiple here is twelve. That means that twelve is the smallest common multiple of four and six. So maybe you’re thinking, “Well I could have figured that out with all of that factoring.” That’s true. There is another way to do it. You could list all the multiples of both of those and then try to find the smallest one. And here, that’s twelve. But it’s not always the best way. The reason that’s not always best is you could end up with a problem like this, the least common multiple of one hundred and thirty-seven, fifty-three, and five hundred and seventeen. You certainly wouldn’t wanna waste your time listing out each of the multiples. Instead, it’s always best to look for the prime factors and then find the multiple. Speaking of bigger numbers, here’s a few that are slightly bigger. What’s the least common multiple of thirty-nine and thirty-two? We wanna solve this problem by factoring so let’s start there. I recognize that thirty-nine is divisible by three; thirty-nine is three times thirteen. Both of those are prime numbers so we’ll stop there. Thirty-two is divisible by two and sixteen, sixteen is two times eight, eight is two times four, and four is two times two. When you look at the factorization of thirty-nine and thirty-two, you’re going to realize that they actually share no common factors, which means to find a multiple that they have in common, we need to multiply three times thirteen times two times two times two times two times two. Or you can also just multiply thirty-nine times thirty-two. The least common multiple for thirty-nine and thirty-two is one thousand two hundred and forty-eight. We’re going to use the same process to find the least common multiple of three numbers that we did for two. We need to find the factorization of all three of these numbers. Let’s start with the four. That’s two times two. And then the six, two times three. And finally with forty-nine, we find it’s seven times seven. We know we’ll need two times two. Since we’ve already added a two, we now only need to add a three for our six. But the factors of forty-nine are two sevens, and we’ll need to include both of those. The least common multiple of four, six, and forty-nine will be two times two times three times seven times seven for a final answer of five hundred and eighty-eight. Here’s our last example, the FIFA World Cup takes place every four years and the US census is taken every ten years both of them took place in two thousand and ten. When is the next year in which both of these events will happen again? Let’s pull out the key information here, which is the World Cup takes place every four years and the US census is taken every ten years. So we wanna know what are multiples, what is in fact is the least common multiple of four and ten? We’ll follow the same procedure, finding the factors of four and ten. We know four is two times two and ten is two times five. We’ll need two times two and also that five factor. Two times two times five is twenty. The least common multiple of four and ten is twenty, but that’s not the answer to the The question is when is the next year in which both of these events will happen. So we need to know what should we do with that twenty. That twenty means that every twenty years, the four and the ten will line up. So we need to add twenty years to two thousand and ten, which is two thousand and thirty. two thousand and thirty is the next year that the World Cup and the US census will happen at the same time. So now you know, and you’re ready to use these skills to find the least common multiple of lots of numbers.
<urn:uuid:5b0fd351-5060-485a-8e0a-7aa5da369f43>
CC-MAIN-2018-34
https://www.nagwa.com/en/videos/869141016981/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215843.55/warc/CC-MAIN-20180820042723-20180820062723-00409.warc.gz
en
0.954234
1,371
4.03125
4
What do Manatees eat? A manatee is an herbivore, and if you aren’t familiar with that term it means that they consume plants. Researchers have identified more than 60 different types of plants that they consume. What they have access to will depend on the location that the live in as well as the time of the year. Some of their favorites include algae, leaves, and grass. Some of them will consume small fish if they can’t find enough plant life in their natural habitat. You will notice that the manatee features what looks like an elephant’s trunk but much smaller in size. This is what they use to gather their food as well as to consume it. They will spend a great deal of their time eating when they are awake. They spend half of their day sleeping. On average a manatee will consume 9% of its body weight. Since they can be up to 1,200 pounds, that is a considerable amount of plant life that they need to have access to on a daily basis. The manatee prefers to consume food that is very close to the surface. The most they will dive is up to 33 feet. This is because it takes so much of their energy to go up and then back down into the water. They will migrate further from their natural habitat to find food when they need to instead of staying in that same area but diving deeper. Since they don’t have a thick layer of fat, it is believed that they have to stay out of the deeper and colder water. The exact type of food that manatees consume really depends heavily upon where they live. Those that feed off of marine vegetation eat manatee grass, turtle grass, shoal grass, and widgeon grass. Those that live off of freshwater vegetation will consume hydrilla, tapegrass, water hyacinth, and water lettuce. They are opportunistic feeders which mean they will consume any plant life that they come across. Due to the many types of plant life they consume, manatees are considered to be primary eaters on the food chain ladder. This is why they are so often compared to cows because they have very similar feeding habits. Unfortunately there are also some types of plants in the water they have consumed that have resulted in large numbers of them dying. Researchers have tried to remove any trace of these plants from the waters in order to protect the manatees. The female manatees will supply their young calves with nutritious milk for the first 1 or 2 years of life. These young calves are also taught to consume plants when they are a couple of weeks old. It is from their mother’s milk though that they get the sustenance that they need to grow and to thrive. Many people find it strange that the manatee isn’t a meat eater due to their large size. The size of their bodies though is quite misleading. They don’t have layers of fact. The bulk of their middle is what is referred to as the gut track. This is where the stomach and intestines are stored. They also need to eat a large volume of plants each day because what they eat really doesn’t contain very much nutritional value. Most of the locations that keep manatee’s in captivity feed them a diet of lettuce and a variety of green plants. It is very expensive and very difficult to grow the types of plants that the manatee would get in the wild. To help them consume less in captivity than they do in the wild they are given elephant vitamins.
<urn:uuid:e3a00e48-2ce8-4559-9051-b233223f9de3>
CC-MAIN-2017-43
http://www.manatee-world.com/manatee-feeding/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00793.warc.gz
en
0.982165
737
3.234375
3