text
sequencelengths 1
1
| id
sequencelengths 1
1
| dump
sequencelengths 1
1
| url
sequencelengths 1
1
| file_path
sequencelengths 1
1
| language
sequencelengths 1
1
| language_score
sequencelengths 1
1
| token_count
sequencelengths 1
1
| score
sequencelengths 1
1
| int_score
sequencelengths 1
1
|
---|---|---|---|---|---|---|---|---|---|
[
"The General Data Protection Regulation (2016/679) (GDPR) is the new European Union law that supersedes any previous pan-European legislation\nWhat should we know?\n- The European Union’s General Data Protection Regulation (GDPR) protects the fundamental rights and freedoms of individuals.\n- The new Regulation 2016/679 has been enforced since May 25 2018 in all European countries, without needing to adopt a corresponding national law.\n- It is designed to allow individuals to have more control over their personal data and to impose new obligations on organizations that collect, manage or analyze such data. Therefore, a comprehensive process of adopting regulations that result in a positive declaration of compliance is required by all bodies in Europe.\n- In Greece, the qualified supervisory authority is the PERSONAL DATA PROTECTION AUTHORITY.\nWhat is personal data?\nIs any information concerning an identified or identifiable natural person (‘data subject’); the identifiable natural person is one whose identity can be ascertained, directly or indirectly, in particular by reference to an identifier such as a name, to an identity number, location data, online ID or one or more factors that characterize the physical, physiological, genetic, psychological, economic, cultural or social identity of the individual in question.\nWhat is sensitive personal data?\nOrganizations and companies providing health and social support services, as well as all health professionals, have increased obligations from the implementation of the Regulation. Sensitive personal data, are the data related to\n- Medical history (Diagnoses, prescriptions, references, opinions, laboratory and imaging results)\n- racial or ethnic origin,\n- political beliefs and religious beliefs\n- information on sex life\n- Criminal prosecutions and convictions.\nBasic definitions (Article 4)\n“Processing”: means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction;\n“Processor”: means the natural or legal person, public authority, service or other body that, alone or in conjunction with others, determines the purposes and manner of processing personal data; when its purposes and manner its processing is determined by Union law or the law of a Member State; the controller or the specific criteria for his appointment may be provided for by Union law or the law of a Member State;\n“Controller””: means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law;\n“Filing system”: means any structured set of personal data which are accessible according to specific criteria, whether centralised, decentralised or dispersed on a functional or geographical basis;\nPrinciples governing the processing of personal data “Personal data”:\n- undergo lawful and fair processing in a transparent manner with respect to the data subject (‘legality, objectivity and transparency’)\n- are collected for specified, express and legitimate purposes and are not further processed in a manner incompatible with those purposes; further processing for archiving purposes in the public interest or for scientific or historical research or statistical purposes shall not be considered incompatible with the original Article 89 (1) (‘Limitation of purpose’)\n- are appropriate, relevant and limited to what is necessary for the purposes for which they are processed (‘data minimization’)\n- they are accurate and, where necessary, updated; all reasonable measures should be taken to immediately delete or correct personal data which are inaccurate with regard to the purposes of the processing (‘accuracy’);\n- are kept in a format that allows the data subjects to be identified only for the time required for the processing of personal data; personal data may be stored for longer periods, as long as the personal data will be processed only for the purposes of filing in the public interest, for the purposes of scientific or historical research or for statistical purposes, in accordance with Article 89 (1) and where applicable inappropriate technical and organizational measures required by this Regulation to safeguard the data subject’s rights and freedoms (‘limitation of storage period’),\n- are processed in a manner that guarantees the appropriate security of personal data, including protection against unauthorized or unlawful processing and accidental loss, destruction or damage, using appropriate technical or organizational measures (‘integrity and confidentiality’) .\n- The processor shall be responsible and able to demonstrate compliance with paragraph 1 (“accountability”).\nRight to erasure\nAccording to the right to erasure (‘right to be forgotten’) the data subject shall have the right to obtain the erasure of personal data concerning him or her from the controller without undue delay and the controller shall have the obligation to erase personal data without undue delay (Article 17).\nUpon request, the Controller shall delete data without undue delay if one of the following reasons applies:\n- personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed\n- the data subject withdraws consent on which the processing is based\n- the data subject objects to the processing\n- personal data have been unlawfully processed\n- personal data have to be erased for compliance with a legal obligation in Union or Member State law to which the controller is subject\n- personal data have been collected in relation to the offer of information society services\nViolation of personal data may, where appropriate, result in penal penalties under Articles 370 and 371.\nClerics, lawyers and all kinds of legal counsel, notaries, doctors, midwifes, nurses, pharmacists and others in whom people usually trust private information because of their profession or their status and the assistants of such persons, are punishable by fine or imprisonment up to one year if they reveal private information which they have been trusted with or learned due to their profession or status. Penal code, article 371, paragraph 1 –\nNote: unofficial translation\n-Penal Law The data protection authority has issued several guidelines on the practices for the protection and destruction of personal data. – Safe Data Protection Directive 2005” Other European provisions dealing with the subject are the “Treaty on European Union (Article 6), the” European Convention on Human Rights (Article 8) “and the” Charter of Fundamental Rights of the European Union (Article 8) “. For more information visit the website of the “Greek Data Protection Authority”\nGreenFence and GDPR\nSome things are for our eyes only and we understand this better than anyone else. Personal data is something valuable that every person has made for themselves, usually with great effort and is something that should not fall into the wrong hands. Your trust is of utmost importance to us, and that is why our business carefully selects its employees. All of our employees who come into contact with confidential material that contains personal data at any stage of destruction or recycling, have signed a confidentiality agreement and will not disclose any personal data. We have, however, organized the methodology of confidential destruction and recycling so that no one comes into contact with the contents and data of the materials. We strive to be better in order to make you feel safe with us providing you with the security you DESERVE."
] | [
"<urn:uuid:5f477cd4-e3fa-45d9-864d-18d43b22c974>"
] | [
"CC-MAIN-2023-14"
] | [
"https://greenfence.gr/en/gdpr-laws/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00194.warc.gz"
] | [
"en"
] | [
0.9160762429237366
] | [
1580
] | [
3.15625
] | [
3
] |
[
"When University of Miami linguist Caleb Everett plotted nearly 600 of the world’s languages on a map using Google Earth, he noticed something peculiar: Languages containing a consonant sound known as an “ejective” (found in about one-fifth of the world’s languages) were clustered at or near high-altitude regions. From the Rocky Mountains of North America to the Caucasus of Eurasia to the Ethiopian Highlands, a clear correlation emerged between a specific speech sound and geography. But is it all just a remarkable coincidence? Listen to Mike Vuolo’s conversation with Everett, who offers what he believes to be a couple of plausible explanations.\nYou'll find every Lexicon Valley episode at slate.com/lexiconvalley, or in the player below:\nSend your thoughts about the show to [email protected]."
] | [
"<urn:uuid:a08047e4-8908-4d6b-8f17-7b2b70f45b27>"
] | [
"CC-MAIN-2017-30"
] | [
"http://www.slate.com/articles/podcasts/lexicon_valley/2013/07/lexicon_valley_on_altitude_and_language_development.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423812.87/warc/CC-MAIN-20170721222447-20170722002447-00192.warc.gz"
] | [
"en"
] | [
0.9155547022819519
] | [
179
] | [
2.703125
] | [
3
] |
[
"It would take a short while after the conception of the baby (fetus) for a pelvic exam to reveal or confirm pregnancy. This is because certain internal body changes have to be full-fledged or different enough. On a whole, a visit to the doctor six weeks succeeding conception is usually enough time to detect pregnancy through pelvic examination. It could even be a week less or more for some women.\nPregnant Women Are Unique\nIn answering the question of how soon a doctor can detect pregnancy by pelvic exams, some things need to be first known. One such is that women are unique and this is why we cannot put a defined time. The best that can be done is to use a time frame. This is also why pregnancy-associated weight gain and faster metabolism do not happen at the same time for pregnant women.\nIt is because the internal body parts such as the uterus and cervix are some of the things observed. Changes to parts like the uterus and cervix happen very quickly in some women and a lot later in others. But on a whole, six weeks is usually enough time to detect pregnancy by pelvic examination. This also depends on the doctor or gynecologist’s experience and level of expertise in doing such screening and tests.\nIs a Pelvic Exam the Best Option for Detecting Pregnancy?\nWay before your obvious female weight gain and other symptoms, a pelvic exam are high on the list of the best ways to know if you are pregnant. But to also set the record straight, there are better ways to detect pregnancy. This is because the results of such testing will be more accurate. It is also because such tests can help women find out if they are pregnant very early.\nAn ultrasound and a couple of special blood tests are better ways to detect pregnancy. This is also because they reveal the pregnant state on time and with more guarantees.\nHow Does a Doctor or Gynecologist Detect Pregnancy by Pelvic Exam?\nThere are two notable parts of conducting a pelvic exam by a doctor or gynecologist. In no particular order, one involves a physical examination of the interior of the vaginal cavity.\nThis would allow the doctor to observe abnormal changes that suggest the woman is pregnant. As mentioned above, the uterus and areas around it like the cervix are critically examined for this purpose. Abdominal changes, changes in the normal position of both, internal position, and the forming of the mucous plug can reveal a lot.\nTaking out sufficient samples of Pap smear is the other side of the pelvic exam. The Pap smear sample is taken from the interior parts of the vagina for some examination. As far as Pap smear cross-examination is concerned, it also plays a crucial role in knowing if examined women have sexually transmitted diseases (STDs).\nFor example, women can find out if they have been infected with HPV. Beyond that, it is also possible to know if a woman has cervical cancer by cross-examining the Pap smear (taken out of the vagina cavity.\nShould You Be Worried About Your Pelvic Exam?\nFor the most part, there is nothing to be worried about as the medical examination holds very little or no risk. This is as long as the screening is done by a professional and in a good health care facility or clinic. Here are some tips to ensure the process is as smooth as it can be:\n- Ensuring that you are not pressed before the test – So, pass out urine before the pelvic exam\n- Take deep breaths and do it slowly – Feel at ease and that includes wearing comfortable clothing\n- Tell your doctor how you feel as the procedure is carried out\nYou would be fine by adhering to these tips. This also means that you will not feel any form of pain or discomfort.\nOn a Final Note\nA pelvic exam is high on the list of the best ways to know if a woman is pregnant as mentioned above. But even at that, there are better ways to go about detecting pregnancy. Knowing your pregnancy state early is the right thing. It helps you make the right prenatal decisions on time. You can see the Stop Medical Distancing sexuality page for related information."
] | [
"<urn:uuid:379ad1c0-5c1a-46af-b17f-5a5369c60082>"
] | [
"CC-MAIN-2023-14"
] | [
"https://stopmedicaldistancing.org/how-soon-can-a-doctor-detect-pregnancy-by-pelvic-exam/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00384.warc.gz"
] | [
"en"
] | [
0.9619427919387817
] | [
849
] | [
2.515625
] | [
3
] |
[
"Evergreen live oak trees (Quercus spp.) add liveliness to sandy, coastal and rocky landscapes where they withstand salt spray and drought due to their adaptive root systems. When a live oak acorn sprouts, the tap root begins a quick probe into the soil to find moisture. Top growth remains minimal for the first few years after the acorn sprouts. However, after the tap root grows deep into the soil, lateral roots develop an extensive system and the tree grows much more quickly. Live oak trees can be successfully transplanted until they are 5 to 8 feet tall. During this time, the tap root can be severed without serious harm to the tree.\nMeasure your live oak seedling height in March before you plan to dig your tree in the fall. Calculate the minimum root ball size for your tree by using a sliding scale that ranges from a root ball diameter that is nearly equal to the tree height to a root ball with a measurement that is less than half the tree height. For instance, a 9-inch-tall tree needs a root ball of 8 inches diameter. A tree 48 inches tall requires a minimum root-ball size of 24 inches. Give an 8-foot tree a 52-inch root ball.\nSprinkle flour on the ground to mark the circumference of the proposed root ball.\nDig a trench around the outside edge of your root ball circumference. The trench depth for an 9-inch tree should be 6 inches. Dig a 16-inch-deep trench for a 48-inch-tall tree.\nKeep the subsoil and top soil separate as you dig. Replace the subsoil in the trench first and then add the topsoil.\nWater the tree. Your tree might wilt and lose some leaves, but it should recover in several weeks.\nDig Your Tree\nTie a ribbon or other marker on the north side of your tree.\nDig around your tree in the same area that was trenched in March. Make your trench approximately 12 inches wide and deep enough to allow your spade to slide under the root ball.\nSever the roots under the tree with a sharp spade.\nTilt your tree to one side -- using a helper -- and place burlap under the root ball. Allow the burlap to bunch up where the tree is touching the soil. Tilt the tree to the opposite side and pull the bunched up burlap to the outside. This step is not necessary for small trees, but is important for keeping soil attached to the root ball of a larger tree.\nUse your helper to move the tree to the desired location. Plant your tree so the side marked north faces north in the new location.\nThings You Will Need\n- Measuring tape\n- Garden spade\n- Put oak leaf mold or soil obtained from under a healthy live oak in the planting hole to inoculate your tree against certain fungi, recommends The New Sunset Western Garden Book.\n- Do not change the planting depth of your tree.\n- California Oaks: Oak Tree Care\n- The New Sunset Western Garden Book: Kathleen Norris Brenzel, ed.\n- Clemson Cooperative Extension: Transplanting Established Trees and Shrubs\n- Goodshoot/Goodshoot/Getty Images"
] | [
"<urn:uuid:4fb1915a-ae40-4cd3-b0c6-667fe4871783>"
] | [
"CC-MAIN-2017-26"
] | [
"http://homeguides.sfgate.com/digging-live-oak-tree-64043.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00121.warc.gz"
] | [
"en"
] | [
0.909706711769104
] | [
661
] | [
3.046875
] | [
3
] |
[
"First law of thermodynamics for cyclic process\nInternal energy changes in the cyclic process, dU = 0. Therefore, according to the first law, q = w. Hence from the energy conservation principle, heat is completely converted into work for the cyclic process.\nWork done in isothermal process\nInternal energy change in the isothermal process for the ideal gas, dU = ncvdT = 0. Therefore, q = w. Hence, thermodynamics heat is completely converted into work for the ideal gas in the isothermal process.\nEnergy change in isochoric process\nVolume change in isochoric process, dV = 0. From the energy conservation principle, q = dU = ncvdT. Therefore, energy change to an isochoric process only increases the internal energy or temperature of the system."
] | [
"<urn:uuid:44286f2b-d4b0-4c40-8040-9f819d9497b3>"
] | [
"CC-MAIN-2023-14"
] | [
"https://learnhtml.foobrdigital.com/energy-change-formula/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00364.warc.gz"
] | [
"en"
] | [
0.8876966834068298
] | [
171
] | [
2.921875
] | [
3
] |
[
"FREE Things to Send For...\n“It is wonderful to be able to get the information you need.”\nVan Community Library.\nQEd: Scientific Evidence for Adult Literacy Educators, Issue 1. Kruidenier, John R., Editor (2007). Washington, DC: National Institute for Literacy. This is the first in a five-issue series for the adult education community published by the National Institute for Literacy. The series will cover ideas and information on the expanding scientific research base on how adults learn to read. This first issue tells the story of how researchers are using the high quality, scientific standards that adult literacy deserves and demands. The issue also discusses another publication, Applying Research in Reading Instruction for Adults: First Steps for Teachers (available as a separate title from the Clearinghouse). The series will also offer other useful resources and discussion lists.\nImplications of NCSALL Research for Program Administrators: NCSALL Seminar Guide. NCSALL (April 2006). Cambridge, MA: National Center for the Study of Adult Learning and Literacy. Seminar Guide was created to assist program administrators in accessing, understanding, judging, and using research for themselves and for their staff. Participants explore the “Program Administrators’ Sourcebook: A Resource on NCSALL’s Research for Adult Education Program Administrators” and other training materials available from NCSALL. Professional developers may want to use this seminar in place of a regularly scheduled meeting, such as a statewide training. Seminar design assumes a 3-1/2 hour seminar for between 15 and 25 adult education program administrators/coordinators.\nEnglish Literacy and Civics Education. Center for Adult English Language Acquisition (February 2006). Washington, DC: Center for Adult English Language Acquisition. This brief, written by CAELA staff members, explains the purpose and content of the U.S. Department of Education’s English Literacy and Civics (EL Civics) Education program. The brief also describes some ways that teachers can develop EL Civics classes appropriate for learners at beginning, intermediate, and advanced levels of English proficiency.\nESL GED Civics Curriculum CD , Version 1.0. Simmons, Jane (July 2007). Tyler, TX: Literacy Council of Tyler, Inc. This curriculum promotes civic responsibility while also integrating other instruction for the typical ESL student. Some examples of these skills are sentence structure, parts of speech, and vocabulary building. The GED lessons also cover other instruction needed by the typical GED student. Some examples of these skills are reading comprehension, essay writing, and mathematical analysis. As the curriculum is distributed and used in the field, it will continue to be revised and other lessons added. The CD (available free on request) contains both PDF and Publisher files. The PDF files duplicate the best but cannot be changed; however, the Publisher files allow you to change the names of elected officials to reflect the people serving in your local area.\nProblem-Based Learning and Adult English Language Learners. Mathews-Aydinli, Julie (April 2007). Washington, DC: Center for Adult English Language Acquisition. This brief describes how problem-based learning aligns with research on second language acquisition, gives guidelines for teachers and administrators on implementing problem-based learning in classes or programs for adults learning English as a second language (ESL), and outlines the benefits and challenges of using a problem-based learning approach with adult English language learners.\nUnderstanding Adult ESL Content Standards. Young, Sarah and Smith, Cristine (September 2006). Washington, DC: Center for Adult English Language Acquisition. Adult education programs serve learners who are native English speakers and those whose first, or native, language is not English. Native English speakers attend adult basic education (ABE) classes to learn the skills needed to earn high school equivalency certificates or to achieve other goals related to job, family, or further education. English language learners attend English as a second language (ESL) or ABE classes to improve their oral and written skills in English and to achieve goals similar to those of native English speakers. This brief is written for adult ESL teachers and program administrators, as well as educational researchers, policymakers, and stakeholders who work with adult English language students in ESL classes or in mixed ABE classes (with native English speakers and English language students).\nWorkplace Instruction and Workforce Preparation for Adult Immigrants. Burt, Miriam and Mathews-Aydinli, Julie (September 2007). Washington, DC: Center for Adult English Language Acquisition. Adult educators across the country are seeking ways to ensure that foreign-born adults will be successful in gaining English proficiency and in entering and advancing at the workplace. This brief reviews the three venues in which federally funded instruction to help immigrants become successful at work is offered – at the workplace, in vocational classes, and in adult English as a second language (ESL) classes. Basic program features and the strengths and challenges of each type of program are described, and recommendations are given for addressing the challenges. This information will help program administrators and teachers select, establish, and improve programs for the adult immigrants they serve. Brief is written for adult ESL teachers and program administrators, as well as educational researchers, policymakers, and stakeholders.\nThe Transition from Adult Literacy ESL Programs to Academic Reading and Writing: Next Steps for English Language Learners. Flores, Lisa Gardner and Chlup, Dominique T. (2005). College Station, TX: Texas Center for the Advancement of Literacy and Learning. During her year as a fellow at the Texas Center for the Advancement of Literacy and Learning (TCALL), researcher Lisa Gardner Flores has chosen to research how to successfully transition English language learners into content area classrooms. She began her research work with a sample of teachers at a community college located in Washington State. Her research in Washington State is serving as a pilot study for subsequent work in Texas. In this report, Flores documents the research she conducted in Washington State and her findings after working closely with twenty practitioners to discover how they are addressinging instruction across the language curriculum. While Flores’ research is specific to one state and practitioners at one community college, it is hoped that her findings from this initial pilot study will be useful more broadly for instructors and administrators working with ELL students across the country. Available on the TCALL Website.\nNarrative and Stories in Adult Teaching and Learning: ERIC Digest. Rossiter, Marsha (2002). Columbus, OH: ERIC Clearinghouse on Adult, Career, and Vocational Education. Narrative and stories in education have been the focus of increasing attention in recent years. The idea of narrative is fertile ground for adult educators who know intuitively the value of stories in teaching and learning. Narrative is deeply appealing and richly satisfying to the human soul, with an allure that transcends cultures, centuries, ideologies, and academic disciplines. In connection with adult education, narrative can be understood as an orientation that carries with it implications for both method and content. This Digest presents a brief overview of a narrative orientation to teaching and learning and then explores how stories and autobiographical writing promote learning.\nJournal Writing and Adult Learning: ERIC Digest. Kerka, Sandra (1996). Columbus, OH: ERIC Clearinghouse on Adult, Career, and Vocational Education. Several themes prevalent in adult learning--coming to voice, developing the capacity for critical reflection, and making meaning--are reflected in the way journals can be used in adult education. This Digest focuses on several types of journals, exploring their value in assisting adults through their learning journey and summarizing advice from the literature on effective ways to use journals.\nIntegrating Reading and Writing into Adult ESL Instruction: ERIC Digest. Rabideau, Dan (March 1993). Washington, DC: National Center for ESL Literacy Education. Reading and writing play a larger role in language instruction for adult learners today than they have in the recent past. Reading and writing were never completely removed from adult English as a Second Language (ESL) curricula, but during the early 1980s there was a shift toward oral/aural instructional goals and practices. That shift was motivated by learners’ needs; many adults had a limited amount of time to spend in a program, and their most immediate need seemed to be oral communication. Some learners came to adult programs with very limited formal schooling, and an oral/aural approach allowed them more opportunities to participate in class. In fact, oral communicative ability is still a primary goal of much adult ESL instruction, but the pendulum is swinging back toward a greater emphasis on reading and writing.\nConnecting with Parents in the Early Years: Executive Summary. Mendoza, Jean, et al (December 2003). Champaign, IL: Early Childhood and Parenting Collaborative. This 8-page document summarizes the book Connecting with Parents in the Early Years from the Early Childhood and Parenting Collaborative. (Book is available as a loan item.) This review of interdisciplinary literature concerns parent/teacher connections in the early years. Communication strategies for families that are difficult to reach are highlighted with suggestions to strengthen family connections. School readiness and early childhood programs are discussed with the focus on involving the family.\nMaking a Difference: A Framework for Supporting First and Second Language Development in Preschool Children of Migrant Farm Workers. Stechuk, Robert A. and Burns, M. Susan (2005). Washington, DC: Academy for Educational Development. The authors share the research base, important findings, and recommendations for teaching practices and program policies related to first and second language development in preschool children. Information is presented as responses to four key questions: 1) Can we facilitate children’s acquisition of English without the loss of Spanish (i.e., their first language)? 2) How can we understand the how and when of developmental processes related to first and second language acquisition? 3) Does it matter how adults use English and the children’s home language when they talk to children? 4) When we continue development of the first language and facilitate English, what does it look like day-to-day?\nPromoting ELL Parental Involvement: Challenges in Contested Times. Arias, M. Beatriz and Morillo-Campbell, Milagros (January 2008). East Lansing, MI: The Great Lakes Center for Education Research and Practice. This policy brief analyzes the factors involved with generating effective parental involvement of English Language Learners (ELLs). Parents of ELLs face daunting barriers when they attempt to become informed and involved in their child’s school. This, in turn, limits communication and participation. Given the achievement gap between ELLs and English proficient students, it is critical to identify practices that improve ELL parental involvement and, in turn, student achievement. While diversity speaks to the need for both traditional and non-traditional models, with a dual-model approach variation in language proficiency is acknowledged, communication is facilitated and communities are recognized and integrated within the school culture. The center recommends that policymakers fund the implementation of non-traditional parental involvement programs that reflect a reciprocal involvement in the school/parent community."
] | [
"<urn:uuid:83a51cf0-6f95-4cb8-8726-8b84a0319766>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www-tcall.tamu.edu/newsletr/jul08/jul08ll.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00012-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9294232726097107
] | [
2277
] | [
2.546875
] | [
3
] |
[
"|Bristol Instruments \"Core Technology\"|\n|ㆍ작성일: 2012-05-22 (화) 16:53||ㆍ조회: 115|\nThe primary technology utilized by Bristol Instruments is optical interferometry. Detailed analysis of the interference phenomena, a consequence of the wave properties of light, can result in a variety of precise measurements. In particular, Bristol Instruments employs Michelson and Fizeau interferometer-based technology in its products to accurately characterize the spectral properties of lasers. Such analysis is important for applications such as high-resolution laser spectroscopy, photochemistry, optical remote sensing, and optical fiber communications.\nThe wavelength meters offered by Bristol Instruments use optical interferometry to measure a laser’s absolute wavelength very accurately. Measurements are made in real-time resulting in the ability to automatically report and control laser wavelength. Two types of interferometers are used. These are the Michelson interferometer and the Fizeau etalon.\nA scanning-mirror Michelson interferometer is used to generate information from the interference of two beams that originate from the same source. The optical input is split between a fixed path and a path that is smoothly changing in length. Both beams are reflected and recombined to produce an interference pattern that varies in time as a consequence of the changing phase relationship between the beams. Interference patterns are generated simultaneously from the laser under test and from a built-in HeNe reference laser. By comparing the number of interference fringes generated during the interferometer’s scan, the absolute wavelength of the laser under test can be determined to an accuracy as high as ±0.0001 nm.\nWavelength meters based on the scanning-mirror Michelson interferometer provide the greatest reliability because this technique lends itself to continuous calibration with a built-in wavelength standard. However, its operation is limited to CW lasers because the generation of a temporal interference pattern is incompatible with pulsed lasers. Another advantage of the Michelson interferometer technique is its versatility, resulting in operation from 375 nm to 12 µm.\nThis type of wavelength meter uses multiple fixed-spaced Fizeau etalons to generate spatial interference patterns that are compared to those produced with a built-in HeNe reference laser. Data from the etalons are collected by imaging the interference patterns onto a photodetector array. The spacing between the interference fringes is used to calculate absolute laser wavelength in a stepwise fashion. The results from the low-resolution etalons are used to obtain the high-accuracy measurement from the highest resolution etalon.\nThe Fizeau etalon technique is used for wavelength meters that are intended to measure the absolute wavelength of pulsed lasers. The photodetector array can capture the spatial interference patterns of virtually every laser pulse to a repetition rate as high as 200 Hz. However, operation is limited to lasers that operate at wavelengths less than 5 µm because longer-wavelength photodetector arrays currently are not cost effective.\nBristol Instruments also uses optical interferometry to provide a more complete spectral characterization of CW and high-repetition rate pulsed lasers. The spectrum analyzers offered by Bristol Instruments generate a power versus wavelength spectrum so that laser parameters such as absolute wavelength, linewidth, and longitudinal mode structure can be measured.\nThe spectrum analyzer uses a technique that is similar to a Michelson interferometer-based wavelength meter. However, instead of simply counting interference fringes to calculate wavelength, it uses a fast Fourier transform (FFT) to analyze the interference pattern. That is, the Michelson interferometer generates a temporal interference signal with a waveform that is representative of all the frequency (wavelength) components of the laser under test. By computing an FFT, a conventional optical frequency (wavelength) spectrum can be derived resulting in the desired spectral information.\nBy using this technique, the Bristol Instruments’ spectrum analyzer becomes a high-accuracy wavelength meter and high-resolution spectrum analyzer in one instrument. Absolute wavelength is measured to an accuracy as high as ±0.0001 nm and the laser’s power vs wavelength spectrum is determined to a resolution as high as 2 GHz.\n홈페이지 : www.bristol-inst.com\n홈페이지 : www.bristol-inst.com"
] | [
"<urn:uuid:59d485c1-a744-4a64-b982-aa234b5444ed>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.l2k.kr/l2k_board/board.php?board=pds&command=body&no=208"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00025-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.8929558992385864
] | [
928
] | [
3.0625
] | [
3
] |
[
"Trends in terrorism\nThe National Consortium for the Study of Terrorism and Responses to Terrorism (START) publishes a Global Terrorism Database, creating graphs showing the extent of terrorism in every year from 1970 to 2007. The graph shows a startling trend: terrorism hit a peak in 1992 and collapsed after that. The end of the Cold War coincides with a dramatic decline in terrorism.\nHere in Ireland the 1990s saw the successful peace process that ended most paramilitary terrorism. The GTD allows users to pick specific countries or regions. This is how Northern Ireland looks:\nAnd here is South America:\nSeveral South American countries emerged as stable democracies in this period, Cold War superpower support for rebel groups dried up and terrorism declined.\nThis brings us to an early observation. Today most terrorism that makes the news is by Islamist organisations. In the recent past terrorism was widely employed by nationalist organisations, left wing and right wing groups. The decline in terrorism in the 1990s was a deeply significant process that has improved security for millions of people.\nBut the GTD statistics so far show only the number of attacks, equating any tiny, bloodless attack on property with mass-murder. Europol have observed that European Islamists make up a tiny proportion of all terrorist attacks, but tend to aim for mass carnage, while the Basque, Corsican and Irish terrorist attacks are more common but on a much smaller scale. Unfortunately GTD does not include a graph showing numbers killed every year. They do, however, have this graph, showing how many people died in each attack around the world:\nWe can remove the attacks with 0 or unknown fatalities. It then looks like this:\nThis is still a little misleading. There are so few terrorist attacks with more than 100 victims that they barely appear on the graph, yet these rare, high-impact attacks can cause massive damage, and excite great emotion and political reaction.\nStill, we see that fatalities did seem to drop in the 1990s. Far from a growing risk, by 2001 terrorism was, for most people, a much lower risk than it had been a decade earlier.\nAnother way to look at the risk of terrorism is by examining the prevalence of 'High Casualty Terrorist Bombings'. The Center for Systematic Peace show trends in such deaths as follows:\n1999: 341 dead\n2000: 392 dead\n2001: 3,275 dead. Excluding the 9/11 attacks this is 293 dead.\n2002: 974 dead\n2003: 1,041 dead\n2004: 2,338 dead\n2005: 2,626 dead\nThis continues to worsen, with massive deaths in Iraq, until 2008 when the situation begins to stabilise and Iraq deaths begin to fall. This shows that there was a significant increase in attacks after 9/11, but the increase really took off after the invasion of Iraq.\nNow we can see what regions of the world experienced continued reductions in terrorist attacks, even after the 1990s. This graph shows North America, Central America and Carribbean, South America, East Asia, Central Asia, Western Europe, Eastern Europe, USSR (and newly independent post-Soviet states) and Australasia and Oceania:\nAll these regions show very low numbers of attacks in the 2000s. A caveat of course - this graph shows only the number of attacks, and not their severity. Still, the rest of the world looks quite different. Here are Southeast Asia, South Asia, Middle East and North Africa and Sub-Saharan Africa:\nAll show steep increases in terrorist attacks, after 2003. This brings us to the next observation.\nAfter 2003, consistent declines in terrorism reverse in several regions of the world. 2003 was the year Iraq was invaded. The World Trade Center attacks and the invasion of Afghanistan were in 2001. There are fairly small increases in terrorism in their immediate aftermath.\nThis is an important point in understanding Islamist terrorism since a goal of Al Qaeda was to use 9/11 as a spark to detonate a wider Muslim revolution that would overthrown secular government and establish an Islamic Caliphate. However there is only a small increase in Muslim terrorist activity in the year following 9/11. As political theatre designed to ignite a wider conflict, it failed, although wider conflict did kick in after the invasion of Iraq.\nStill, we need to be careful again here - the world is not so easily understood. An uptick in terrorism in Sub-Saharan Africa begins in 2004. Who knows what reasons are behind this. Terrorism was already increasing in South Asia after 1998, stabilised in the year following the invasion of Iraq and then dramatically increased. Much of the Middle Eastern increase in terrorism is explained by violence in Iraq alone:\nLooking at the aims of war\nAdvocates of the War on Terror point out that there has not been a repeat of 9/11 on American soil. In order to judge whether the struggle has been a success or a failure, we need to know what its stated goals were. On September 20th 2001, President Bush declared his intentions in an address of Congress:\nOur enemy is a radical network of terrorists and every government that supports them. Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated.\nSo far this has not been achieved. The attempting bombing of a transatlantic flight on Christmas Day 2009 was carried out by a Nigerian man, educated in London, trained in Yemen and attempting an attack in Detroit. The Europol Terrorism Situation and Trend Report 2010 includes this map showing external regions influencing EU terrorism:\nTerrorist groups of global reach are still operating, and terrorism in some regions - particularly those with large Muslim popultions - dramatically increased after the invasion of Iraq. The stated aims of the War on Terror have not been achieved yet.\nAnother way to judge this military approach to destroying terrorism is by examining how terrorist groups ended in the past. In 2008 the Rand Corporation did just this, looking at 648 terrorist groups active between 1968 and 2006. They found that 43% of groups move into peaceful politics - Northern Irish nationalists being a good example. 40% are destroyed by policing or intelligence. 10% achieve victory. Only 7% are destroyed by military action.\nRand concluded that Al Qaeda were almost certainly going to fail in their goals, however the military method used by the US government after 9/11 was also failing.\nDespite some successes against al Qa’ida, the United States has not significantly undermined its capabilities. Al Qa’ida has been involved in more attacks in a wider geographical area since September 11, 2001, including in such European capitals as London, than it was before that date. Its organizational structure has also evolved. This means that the U.S. strategy in dealing with al Qa’ida must change. A strategy based predominantly on military force has not been effective. Considering al Qa’ida’s organizational structure and modus operandi, only a strategy based primarily on careful police and intelligence work is likely to be effective.\nThe Sri Lankan experience\nSome supporters of a military solution to terrorism uses Sri Lanka as an example of success. It is beyond the scope of this article, but worth taking a brief look. Sri Lanka suffered a civil war which ended with the military victory of the government last year. The GTD graph goes only to 2007:\nNote the collapse of terrorist attacks in 2002, during a ceasefire. In 2002, only 15 people died of terrorism in Sri Lanka, compared with 3,791 in 2000 and 15,565 in 2009.\nOf those killed in 2009, the majority died during the climax of the war. The Tamil Tigers admitted defeat in May; 17 people died in the months following victory. A few others have died in 2010. If more people die after victory than during the negotiated ceasefire perhaps it is too early to use Sri Lanka as a positive example of a military solution to terrorism.\nThe costs in winning that war were high too, with hundreds of thousands displaced and thousands of civilians killed. This brings us to a final point.\nCosts to coalition of the War on Terror\nThe Iraq war has killed 4,715 coalition military personell, 4,397 of them American. The Afghan war has killed 1,764 troops, 1,071 of them American. Combined the US has suffered 5,468 military fatalities since 2001, far more than died in the 9/11 attacks to start with.\nThe debate is muddied by the Iraqi front; some commentator support the Afghan war and not the Iraq war. This article considers them together, which may be misleading.\nBut so far the War on Terror has not eliminated international terrorism. It coincides instead with a widespread increase of terrorist violence, particularly in Iraq. Either the War on Terror has had no impact, has made things worse, or is thus far incomplete. Declines in Iraqi violence in recent years might render the GTD's data out of date - there might be a happy ending just around the corner. At the moment, though, it does not look good."
] | [
"<urn:uuid:8ba6f1b7-9a5d-4d4a-adc5-ce8af33ad305>"
] | [
"CC-MAIN-2017-30"
] | [
"http://shaneleavy.blogspot.com/2010/05/did-war-on-terror-work.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423764.11/warc/CC-MAIN-20170721082219-20170721102219-00223.warc.gz"
] | [
"en"
] | [
0.96711665391922
] | [
1861
] | [
2.796875
] | [
3
] |
[
"One of the litmus tests of Justin Trudeau’s pledge to renew Canada’s relationship with First Nations will be his handling of resource development.\nThe current flashpoints are pipelines and petroleum. But the issue is bigger than that. It encompasses minerals, forestry, commercial fishing, electricity generation and waste management. These industries account for 20 per cent of Canada’s gross domestic product. They all impinge on the rights, territories and way of life of life of aboriginal communities.\nThe only tool the federal government now has to reconcile these competing interests is a 40-year-old environmental assessment process, which is not meant for this. It was designed to identify and mitigate potential sources of pollution.\nOver the last decade — in the absence of other forums — it has ballooned into a grievance-laden catch-all that sidelines First Nations, drags on for years, and satisfies no one. It pits indigenous communities against corporate lobbyists, scientists, economists and prominent environmentalists who aren’t always on their side. Aboriginal leaders may not hear about a project until it’s too late to change its design or location. They often lack the technical knowledge to make their case effectively.\nIn frustration, they resort to roadblocks, protests, threats and litigation.\nTrudeau will have to do more than untangle this mess to fulfil his commitment to treat Canada’s indigenous peoples as “full partners at those tables where shared decisions about the future of our country are made, from resource development to environmental stewardship.” He will have to go back to square one and carve out a central role for aboriginal communities in deciding how — and whether — Canada’s non-renewable resources should be exploited.\nPresciently, the Macdonald-Laurier Institute drafted a step-by-step workplan.\nThe Ottawa think-tank, which specializes in resource management, just released a report entitled Protectors of the Land. Its authors — a professor of environment assessment at the University of Saskatchewan and a chemical engineer whose PhD research is on aboriginal engagement — argue that it is possible to protect the ecosystem, honour its guardians and get projects moving. But it will take legislative reform, better training for aboriginal negotiators and a lot of bridge building.\n“Tinkering with the current process will not fix all of the enduring challenges” say Bram Noble and Aniekan Udofia. “Before any particular project is being considered, the responsible government departments or agencies should be on the ground working with local communities to identify needs, opportunities and help set expectations. This should happen before project proponents enter the scene.”\nHere are the steps Noble and Udofia recommend:\n- The Canadian Environment Assessment Act should be amended, making it mandatory for the proponent of any resource development to consult any First Nation whose territory or residents will be affected.\n- Government, not industry, should be “the first boots on the ground.” Federal and provincial officials should go into an aboriginal community before any resource project is proposed, explain how the environmental assessment process works and how aboriginal leaders can get their people’s priorities on the table before the die is cast.\n- They should clarify what falls within — and outside — the confines of an environmental assessment. This entails providing more appropriate forums to talk about big-picture issues such as aboriginal rights, commercial development on traditional native lands and resource stewardship that lie beyond the purview of regulators.\n- Ottawa should insist on transparency. All documents should be public, all plans available, all side-deals between stakeholders known to everyone who testifies.\n- Resource companies and government should invest in training aboriginal negotiators. They need courses in land management, hydrology, economics and resource law.\n- In order to gain approval, resource companies should be required to provide post-project funding to affected aboriginal communities, allowing them a continuing say in the development.\nThis can’t all be done overnight. But the Liberals have four years and eight aboriginal MPs. They have — at least for now — the goodwill of First Nations. The minister of indigenous affairs and northern development, Carolyn Bennett, has 18 years of parliamentary experience and a strong commitment to aboriginal justice. And the prime minister has made it a priority.\nNo one wants another decade of head-butting. The Noble-Udofia plan may need refinements, but it would get the Trudeau government off to a promising start.\nCarol Goar’s column appears Monday, Wednesday and Friday."
] | [
"<urn:uuid:a138815f-1c27-44bb-b871-e5132ccc6604>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.thestar.com/opinion/commentary/2015/11/16/end-head-butting-over-resource-projects-goar.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320763.95/warc/CC-MAIN-20170626133830-20170626153830-00093.warc.gz"
] | [
"en"
] | [
0.9296504855155945
] | [
924
] | [
2.765625
] | [
3
] |
[
"How do Underwater Cameras Work?\nUnderwater Cameras are cameras that are specially designed for underwater use or in circumstances that requires protection to prevent any water and pressure damage. There are many types of underwater cameras, depending on your budget and uses.\nThere are underwater cameras that are simply disposed of after use. These are the cheapest type of underwater camera available in the market. They have the capacity to take between 20 to 30 pictures, and photos can easily be developed. They are waterproof enough to be used in harsh rain and snow storms, and are usually tolerant of being fully submerged up to twenty or thirty feet.\nThere are also underwater cameras that are cheap reloadables. These cameras are designed with economy of price in mind. These are very similar to disposable underwater cameras, expect that the user can replace the film and use the camera multiple times. They are usually capable of greater water depths than their disposable counterparts.\nNew generation cameras have resolutions in the 3-4 megapixel range and can take excellent quality pictures underwater.\nThese cameras offer options for every level of diver and snorkeler. For the experienced diver/photographer who wants more control over the camera functions. The Advanced-Dive control system allows users to manipulate resolution, light sensitivity (EV), exposure modes and much more while underwaterwhile the Easy-Dive control system is the perfect choice for divers seeking a simple underwater photo system that produces breathtaking results.\nUnderwater cameras are designed for one-Button-Operation and can be set to Land or Sea modes plus modes that take into account the unique aspects of underwater photography. Cameras also feature three dedicated underwater external flash modes, allowing for more exposure control when using an external flash. For perfectly lit photos in any situation, users can toggle among Macro Flash, Portrait Flash and Far Flash modes, which adjust exposure based on camera-to-subject distance.\nWhile an on-camera flash helps illuminate objects below the surface, cameras are also compatible with external flash units, which ignite the vivid colors of the underwater environment and allows users to illuminate objects from different angles. Because the external flash is a unit activated via the on-camera flash, no sync cord is necessary. Set the camera to \"External Flash,\" and it automatically de-activates the digital pre-flash.\nTo compensate for low-light conditions that naturally occur as divers travel below the water's surface, cameras can adjust the shutter speed and aperture automatically to compensate for difficult light conditions, ensuring vivid images without worry of underexposure.\nPhotos can be composed via a large color LCD monitor on the back of the camera; or users can frame subjects through a top-mounted SportsFinder. Either way, composition is simple, even when viewing subjects through a dive mask. To help conserve power during underwater adventures, users often shut off LCD monitors while the camera is on and compose photos using large top-mounted viewfinders.\nWith the many technological advances of recent years, underwater photographers now no longer have to compromise on quality. Users are almost guaranteed to return to land with a stunning set of images.\nAbout the Author: Nicola Kennedy publishes articles and reports and provides news, views and information about photography and underwater cameras at Underwater Cameras Information.\nThis article may be reprinted in full so long as the resource box and the live links are included intact. All rights reserved. Copyright Under-Water-Camera.info"
] | [
"<urn:uuid:097352df-e8a1-4952-9386-cbe10a23eb41>"
] | [
"CC-MAIN-2017-26"
] | [
"http://articles.whmsoft.com/index.php?get_videos_links=0&videos_subject=Hobbies&identifier=29-article-2700.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00448.warc.gz"
] | [
"en"
] | [
0.9149340987205505
] | [
690
] | [
3.109375
] | [
3
] |
[
"Led Light Therapy\nWe all know that sunlight affects the production of vitamin D and that people in the dark north treat seasonal affective disorder with bright lamps. Civilizations throughout history have acknowledged the healing power of light. The father of modern medicine, Hippocratus, recommended sitting in the sun to treat various illnesses. At the end of 19th century, light therapy was successfully used as a treatment for tuberculosis, after which the first artificial light therapy lamps were invented.\nWith LED technology, specific wavelengths of light can be harnessed to treat the body. Basically the light penetrates the skin to certain depth in which the cells can use it for energy. This and other effects on cellular functions enhance the production of collagen and other proteins. Therefore, led light therapy can reduce inflammation, boost metabolism and aid recovery after performance.\nBodypioneer’s collagen lamp utilises the red light with a wavelength of 620nm. The light is easily absorbed and especially affects the skin’s protein production, which promotes the natural production of collagen as well. This makes the skin firmer, reduces wrinkles and can prevent cellulite.\nRed light therapy has been found to aid in\n- wound healing\n- promoting hair growth in patients with alopecia\n- symptoms of carpal tunnel syndrome\n- symptoms of psoriasis\n- alleviating pain in rheumatoid arthritis\n- enhancing collagen production and reducing wrinkles\n- photoaging skin\n- preventing herpes labialis\n- promoting joint health\n- reducing scar tissue\nWhat is collagen?\nOne third of body’s protein is collagen. It is primarily found in skin, bones and connective tissue and it makes the skin elastic, helps in wound healing and maintains healthy cartilage. It’s fibrous structure forms a strong shield around the internal organs.\nAs we get older, the collagen protein in our bodies starts to decline. This causes wrinkles and sluggish skin and might cause joint pain since tendons and bones won’t be able to move without friction. Because red light therapy activates the production of collagen, it helps with issues connected to it’s decline.\nLed light therapy doesn’t produce harmful radiation or heat and works best on bare skin.\nText: Liisa Oikkonen Photo: Leigh Ewin\nLiisa is Bodypioneer’s energetic customer service person. She holds a degree in arts (dance/movement) and is always interested in exploring new forms of fitness. On her days off, you can find Liisa hiking, climbing or meditating in nature."
] | [
"<urn:uuid:326d496b-9ba5-45c0-85a5-0c24211aaf18>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.bodypioneer.fi/2019/07/13/led-and-red-light-therapy/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145729.69/warc/CC-MAIN-20200222211056-20200223001056-00496.warc.gz"
] | [
"en"
] | [
0.9084776043891907
] | [
528
] | [
2.640625
] | [
3
] |
[
"Science Fair Project Encyclopedia\nPteronura Otters are aquatic or marine carnivorous mammals, members of the large and diverse family Mustelidae, which also includes weasels, polecats, badgers and others. There are 13 species of otter in 7 genera, with a distribution that is almost worldwide.\nOtters have a dense layer 1,000 hairs/mm² (~650,000 hairs/in²) of very soft underfur which, protected by their outer layer of long guard hairs, keeps them dry under water and traps a layer of air to keep them warm. Unlike most marine mammals (seals, for example, or whales), otters do not have a layer of insulating blubber, and even the marine sea otter must come ashore regularly to wash its coat in fresh water.\nAll otters have long, slim, streamlined bodies of extraordinary grace and flexibility, and short limbs; in most cases the paws are webbed. Most have sharp claws to grasp prey but the short-clawed otter of southern Asia has just vestigal claws, and two closely related species of African otter have no claws at all: these species live in the often muddy rivers of Africa and Asia and locate their prey by touch.\nFish is the primary item in the diet of most otters, supplemented by frogs, crayfish, and crabs; some have become expert at opening shellfish, and others will take any small mammals or birds that happen to be available. To survive in the cold waters where many otters live, the specialised fur is not enough: otters have very high metabolic rates and burn up energy at a profligate pace: Eurasian otters , for example, must eat 15% of their body weight a day; sea otters, 20 to 25%, depending on the temperature. In consequence, otters are very vulnerable to prey depletion: in water as warm as 10°C an otter needs to catch 100 g of fish per hour: less than that and it cannot survive. Most species hunt for 3 to 5 hours a day; nursing mothers up to 8 hours a day.\nNorthern River Otter\nThe northern river otter (Lontra canadensis) was one of the major animals hunted and trapped for fur in North America after contact with Europeans. They are one of the mostplayful and active, making them a popular exhibit in zoos and aquaria, but unwelcome on agricultural land because they alter river banks for access, sliding, and defense. River otters eat a variety of fish and shellfish, as well as small land mammals and birds. They are 3 to 4 feet (1 m) in length and weigh from 10 to 30 pounds (5 to 15 kg). They were once found all over North America, but are rare or extinct in most places, although flourishing in some locations.\nOtters are a protected species in some areas and some places have otter sanctuaries. These sanctuaries help sick and hurt otters to recover.\nThe sea otter Enhydra lutris is found along the Pacific coast of North America. Their historic range included shallow waters of the Bering Strait and Kamchatka, and as far south as Japan. Sea otters have 1 million hairs per square inch of skin, a rich fur for which they were hunted almost to extinction. By the time they were protected under the 1911 Fur Seal Treaty, there were so few sea otters left that the fur trade had become unprofitable.\nThey eat shellfish and other invertebrates, and are frequently observed using rocks as crude tools to smash open shells. They are 2.5 to 6 feet (1 to 2 m) in length and weigh 25 to 60 pounds (30 kg). Although once near extinction, they have begun to spread again starting from the California coast.\nA sub-species otter Lutrogale perspicillata maxwelli (Maxwell's otter) is thought to have lived in the Tigris-Euphrates alluvial salt marsh of Iraq. It has been suggested that this may have become extinct as a result of the large scale drainage that has taken place since the 1960s.\nOtters are also found in Europe. In the United Kingdom they were common as recently as the 1950s, but are now rare due to the former use of chlorinated hydrocarbon pesticides and as a result of habitat loss. Numbers reached a low point in the 1980s, but with the aid of a number of initiatives, by 1999 numbers were estimated to have recovered to just below 1,000 animals. Under the UK Biodiversity Action Plan it is hoped that by 2010 the otter will have been reintroduced to all the UK rivers and coastal areas that it inhabited in 1960. Roadkill deaths are now one of the significant threats to their reintroduction.\nList of species\n- European Otter (Lutra lutra)\n- Hairy-nosed otter (Lutra sumatrana)\n- Speckle-throated otter (Hydrictis maculicollis)\n- Smooth-coated otter (Lutrogale perspicillata)\n- Northern River otter (Lontra canadensis)\n- Southern River otter (Lontra provocax)\n- Long-tailed otter (Lontra longicaudis)\n- Marine otter (Lontra felina)\n- Giant otter (Pteronura brasiliensis)\n- African clawless otter (Aonyx capensis)\n- Congo clawless otter (Aonyx congicus)\n- Oriental small-clawed otter (Amblonyx cinereus)\n- Sea otter (Enhydra lutris)\nThe contents of this article is licensed from www.wikipedia.org under the GNU Free Documentation License. Click here to see the transparent copy and copyright details"
] | [
"<urn:uuid:a83949af-ef75-4fdd-8c5c-8930871221fd>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.all-science-fair-projects.com/science_fair_projects_encyclopedia/Lutrinae"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00008-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9519481658935547
] | [
1227
] | [
3.875
] | [
4
] |
[
"In the School of Science and Know-how, much of our work is guided by the notion that folks have a necessary part to play in fashionable engineering and technology. With Applied Science & Expertise Source, customers have access to the world’s largest full-text companion to Inspec, an index to hundreds of science and expertise journals. Secondly, when expertise goes in the improper fingers then it may possibly negatively impression society such as the increasing charge of cyder crime, hacking, stealing of personal info and pornography web sites.\nThe potential benefits of the know-how are nice – however so are the potential drawbacks from misuse or unintended penalties. There are numerous sites stuffed with informative brief articles all over the Web. Usually, it is onerous to estimate the magnitude of the chance from this or different risks, especially as both worldwide relations and know-how can change quickly.\nThe cartoon even goes as far to label them as, Infantile morons.” This cartoon emphasizes how expertise is geared in the direction of a younger era, leaving the aged within the dust. First science gives us an thought, after which completely different experiments are carried out.\nMIT also affords a MIT-WHOI Joint program in oceanography and applied ocean science and engineering. One other solution to educate your child analytical expertise by way of science initiatives are to have discussions. Doing science initiatives might help you and your kids to study new things about science and have enjoyable whereas doing it. You possibly can take issues that your children are studying in science and make more out of it by making a science mission.\nWithin the case of China, Joseph Needham, a leading scholar at Cambridge, made it his life’s work to document China’s historical past of science and technology in over 30 volumes. New fields corresponding to info expertise and genetic engineering drive courts to determine the way to apply laws made before such applied sciences have been contemplated."
] | [
"<urn:uuid:8258bc27-32ee-48d1-8e13-1332652701e9>"
] | [
"CC-MAIN-2020-05"
] | [
"http://mylinuxsupport.com/science-technology-and-struggle.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250624328.55/warc/CC-MAIN-20200124161014-20200124190014-00210.warc.gz"
] | [
"en"
] | [
0.9452623724937439
] | [
390
] | [
2.5625
] | [
3
] |
[
"Home Tags V22n3\nWords are important (Proverbs 18:21; Matthew 12:36–37). Marriage is important (Hebrews 13:4; 1 Timothy 5:14). So words about marriage must be especially important. Which are the most important? The twenty-two spoken at the first wedding: “Therefore shall a man leave his father and his mother, and shall cleave unto his wife: and they shall be one flesh” (Genesis 2:24)."
] | [
"<urn:uuid:6d87d947-d1ca-4a36-994f-dd0d2ee7cfc5>"
] | [
"CC-MAIN-2020-10"
] | [
"https://housetohouse.com/tag/v22n3/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146176.73/warc/CC-MAIN-20200225233214-20200226023214-00080.warc.gz"
] | [
"en"
] | [
0.9352023005485535
] | [
102
] | [
2.515625
] | [
3
] |
[
"Casting and Bracing\nCasts and braces are traditional and surefire tools aimed to help protect, stabilize and heal injured limbs. A cast is a hard, protective shell of plastic, plaster or fiberglass specially molded to fit an injured limb. A brace, by contrast, is a softer and more flexible orthopedic apparatus that similarly holds, aligns and supports injured body parts.\nUnder the supervision of seasoned orthopedic physician Dr. Garrett Tallman, the process of casting and bracing is conducted quickly but cautiously, with all care taken to preserve the comfort and promote the healing of the patient."
] | [
"<urn:uuid:0fcb8151-ee57-4de3-aabb-0eca585728b3>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.garretttallmanmd.net/treatment/casting-and-bracing/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00182.warc.gz"
] | [
"en"
] | [
0.944903552532196
] | [
123
] | [
2.984375
] | [
3
] |
[
"Native American Languages\nNative American Nations\nWhat's new on our site today!\nHokan Language Family\nThe Hokan languages are spoken in the southwestern and west coast US and in northwestern Mexico (Baja California and Sonora).\nThe relationships between the different branches of the Hokan language family are tenuous and this grouping is considered hypothetical.\nSome linguists have proposed a distant relationship between the Hokan, Muskogean and Siouan languages.\nThe Hokan languages are generally\nconsidered to include:\nRiver Yuman Languages\nUpland Yuman Languages\nWestern Pomo Languages\nLowland Chontal of Oaxaca\nSierra Chontal of Oaxaca\nOur Hokan Language Features\nWords in various Hokan languages.\nLinks to Other Hokan Language Resources\nHokan Language Family:\nEthnologue of Hokan languages.\nOverview of the Hokan Indian languages, their history and distribution.\nArticle on the proposed Hokan Siouan linguistic stock, linking the Hokan language family with Muskogean and Siouan.\nHokan Language Materials Available Offline\nCompilation of linguistics papers on the Hokan language family.\nNative Languages of the Americas website © 1998-2015 Contacts and FAQ page\nBack to Amerindian linguistics\nGo on to Native American Indian Cultures\nGo on to our Native Americans Website for kids\nNative American dictionary\nWould you like to help sponsor work on the Hokan languages?"
] | [
"<urn:uuid:dd2fae9e-2557-4e3a-980a-695be672c171>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.native-languages.org/famhok.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00705.warc.gz"
] | [
"en"
] | [
0.7496582865715027
] | [
309
] | [
3.359375
] | [
3
] |
[
"A Noise Gate is used to control the volume of an audio signal, attenuating signals which register below the threshold. They are comparable to a compressor, which attenuates signals above a threshold.\nUsed in recording studios and sound reinforcement. Musicians use small portable units to control unwanted noise from their amplification systems.\nBand-limited noise gates are also used to eliminate background noise from audio recordings by eliminating frequency bands that contain only static."
] | [
"<urn:uuid:1aaf84c9-d463-4827-b32a-0b99cba73b2f>"
] | [
"CC-MAIN-2017-26"
] | [
"http://opamplabs.com/products/opamp-amps-noise-gate.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323842.29/warc/CC-MAIN-20170629015021-20170629035021-00446.warc.gz"
] | [
"en"
] | [
0.9266037344932556
] | [
87
] | [
2.71875
] | [
3
] |
[
"Religion and the Decline of Magic: Studies in Popular Beliefs in Sixteenth and Seventeenth Century England\nAstrology, witchcraft, magical healing, divination, ancient prophecies, ghosts, and fairies were taken very seriously by people at all social and economic levels in sixteenth- and seventeenth-century England. Helplessness in the face of disease and human disaster helped to perpetuate this belief in magic and the supernatural. As Keith Thomas shows, England during these years resembled in many ways today's \"underdeveloped areas.\" The English population was exceedingly liable to pain, sickness, and premature death; many were illiterate; epidemics such as the bubonic plague plowed through English towns, at times cutting the number of London's inhabitants by a sixth; fire was a constant threat; the food supply was precarious; and for most diseases there was no effective medical remedy.\nIn this fascinating and detailed book, Keith Thomas shows how magic, like the medieval Church, offered an explanation for misfortune and a means of redress in times of adversity. The supernatural thus had its own practical utility in daily life. Some forms of magic were challenged by the Protestant Reformation, but only with the increased search for scientific explanation of the universe did the English people begin to abandon their recourse to the supernatural.\nScience and technology have made us less vulnerable to some of the hazards which confronted the people of the past. Yet Religion and the Decline of Magic concludes that \"if magic is defined as the employment of ineffective techniques to allay anxiety when effective ones are not available, then we must recognize that no society will ever be free from it.\"\nResults 1-3 of 82\nThe refugees themselves were liable to receive rough treatment from country folk,\nfrightened they were bringing the disease with them. Further violence\naccompanied popular resistance to the quarantine regulations and restrictions on\nor dysentery - rather than the disease itself. The patient's urine was taken to be\nthe best guide to his condition, and there were some practitioners who even\nthought it enough to see the urine without the patient, though the Royal College\nThey never learned to associate the disease with the black rat, and the plague's\ndisappearance in the later seventeenth century owed little to human agency,\nsave in so far as it may have been helped by an improvement in living conditions.\nWhat people are saying - Write a review\nLibraryThing ReviewUser Review - kukulaj - LibraryThing\nThis is a mighty big book! I don't remember when I started it... probably a couple years ago. I would generally read one chapter at a time, then read another book or two before reading the next ... Read full review\nLibraryThing ReviewUser Review - neilgodfrey - LibraryThing\n\"The real question at issue here is what enables us to read a source ‘against the grain’, and here theory does indeed come in. Theory of whatever kind, whether it is a general set of theses about how ... Read full review\nThe Magic of the Medieval Church\n20 other sections not shown"
] | [
"<urn:uuid:6c435345-98e0-42c8-9dca-b483ea5630d5>"
] | [
"CC-MAIN-2020-05"
] | [
"https://books.google.co.uk/books?id=yQwSAQAAIAAJ&q=disease&dq=editions:ISBN0195213602&output=html_text&source=gbs_word_cloud_r&cad=5"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599789.45/warc/CC-MAIN-20200120195035-20200120224035-00139.warc.gz"
] | [
"en"
] | [
0.9625447988510132
] | [
630
] | [
2.65625
] | [
3
] |
[
"Is the environment a secondary concern behind people’s livelihoods and rights? Should it be? In my opinion the environment should not be secondary. However, I also believe that people’s livelihoods and rights should not be secondary to the environment either. I consider the environment and the sustainability of it to be an integral part of people’s livelihoods and rights.\nIn many developing areas alterations in the environment, whether positive or negative, is often very recognisable and has various effects on people’s lives. It could be a natural change such as lack of rainfall leading to drought or it could be a change in a particular environment due to human influences.\nAn example of this could be damming a river. Controversy has surrounded the construction of dams over the past 50 years because of their potential social, economic, and environmental impact.\nCertain impacts of a dam are sometimes positive. Dams can control flooding, improve irrigation, provide hydroelectric power or regulate water supply. When concerning people’s livelihoods and the environment then the above points are certainly positive.\nHowever, dams can also present negative impacts as highlighted below:\nThe author of “Social Impacts of Brazil’s Turucui Dam”, which was published in the Environmental Management journal in 1999, described how the Turucui dam displaced large numbers of people without adequate compensation and reduced downstream fish catches so much that the fish-dependent economy of Cameta collapsed.\nI imagine many people would agree this infringes on the rights of these people and more than likely damages their livelihoods as well.\nAdditionally, examples of possible negative environmental impacts of dams are also available:\nA 1990 internal survey of World Bank hydroelectric dam projects showed that 58% were planned and built without any consideration of downstream impacts, even when these impacts could be predicted to cause massive coastal erosion, pollution and other problems.\n…along the mouth of the Volta River in Ghana. Akosombo Dam has cut off the supply of sediment to the Volta Estuary, affecting also neighbouring Togo and Benin, whose coasts are now being eaten away at a rate of 10–15 meters per year. A project to strengthen the Togo coast has cost $3.5 million for each kilometre protected.\nNow the construction of dams is just one example of human intervention that can impact the environment. But I would consider that all human interventions on the environment would have a certain amount of impact, whether or not it is for better or worse. Yet I’d like to refer back to my initial statement. This was that, “I believe the environment and the sustainability of it is an integral part of people’s livelihoods and their rights”. I am of the opinion that human beings should harness whatever is possible from the environment to help aid our livelihoods. But in doing so also strive to improve our environment and most certainly not damage it, regardless of whether the damage caused is irreversible.\nThis is where I believe we have failed in the past. In some cases this could be put down to a lack of knowledge about the negative effects we are having. However, these days climate change is a topic many of us are aware of and for this reason I feel we have no excuse to be more sympathetic to our surrounding environment:\nThese recommendations were echoed in the report, “Sharing the benefits of large dams in West Africa”, published by International Institute for Environment and Development (IIED) in 2010. It highlights the areas of conflict that arose in the proposal and subsequent building stages of the Lesotho Highlands Water project. However, few of the financial institutions funding the building of dams, such as the World Bank, have adopted WCD’s recommendations.\nI feel that institutions, such as the World Bank, have a major input on not only the environment but also people’s livelihoods and rights when they embark up on certain development projects. This being the case, I believe they hold a great responsibility for people and the environment. They should, therefore, always endeavour to preserve what is worthy and encourage the introduction of methods that help us to capitalise on our environment in a way that is sustainable and not detrimental to the environment or to human beings. If this is achieved, then the environment would not be a secondary concern to people’s livelihoods and rights. It would be a central concern that, when addressed, would contribute towards the improvement of people’s livelihoods and rights."
] | [
"<urn:uuid:02520d76-b236-4b1c-b131-0659a8b0281f>"
] | [
"CC-MAIN-2020-10"
] | [
"https://dasibatamale.wordpress.com/tag/world-commission-on-dams/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145260.40/warc/CC-MAIN-20200220162309-20200220192309-00043.warc.gz"
] | [
"en"
] | [
0.9623375535011292
] | [
920
] | [
2.75
] | [
3
] |
[
"Flu season is here and avoiding the flu virus can be tricky. In addition to getting a yearly flu vaccine, health officials urge everyone to wash their hands regularly as it may be the best way to stop the virus from spreading. The CDC also recommends the following everyday actions to prevent the spread of germs:\n- Avoid close contact with sick people if possible\n- While sick, limit contact with others\n- If you have flu symptoms, do not go back to work or school for at least 24 hours AFTER your fever is gone\n- Cover your nose and mouth with a tissue when you cough or sneeze. Throw the tissue in the trash after you use it.\n- Wash your hands often with soap and water. If soap and water are not available, use an alcohol-based hand rub.\n- Avoid touching your eyes, nose and mouth. Germs spread this way.\n- Clean and disinfect surfaces and objects that may be contaminated with germs like the flu.\nYour home (and office) has multiple surfaces that are popular areas for viruses and germs to land. Children’s toys, doorknobs, sinks and telephones are all areas to clean and disinfect regularly. The germiest thing in the home, though, is the remote control. The flu virus spreads though touching something a sick person has touched or sneezed on. The remote control is touched by everyone in your house at some point, especially when sick. Disinfect your remote controls! Unfortunately, you may still find yourself exposed to the flu virus be it by co-workers or school-aged children. The good news is that there are further steps you can take to protect your home from the virus taking root in your house.\nTips to Flu-Proof Your Home\nHumidify Your Home\nA 2013 study found that the ability of airborne viruses that cause flu infections was greatly reduced when humidity levels were increased to 43% or above. In fact, low humidity environments resulted in 70-77% of viruses retaining their infectious nature, and that number dropped to only 14% when the humidity was increased to 43% or more. A 2009 study resulted in the same conclusion: humidity limits the transmission of the influenza virus. The fact is bacteria and viruses are not able to travel well in moist air. Adding a humidifier to your home could be the difference between remaining healthy this winter or getting the flu.\nHowever, even with all the humidifier benefits, they can become a source of bacteria and mold if they aren’t cleaned regularly. To make sure the humidifier is working for you and not against you, be sure to:\n- Use demineralized or distilled water. Minerals found in tap water can build up in your humidifier and increase growth of bacteria.\n- Clean once a week. The longer you wait between cleanings, the harder it will be and there’s a higher risk of mold and bacteria build up.\n- Change filters regularly! Not all humidifiers have filters, but if yours does, change it following the manufacturer’s directions. US Home Filter has a FULL selection of humidifier pads!\n- Keep humidity levels ideal. Too much humidity can be just as problematic as not enough humidity. You can measure the humidity in your home with a hygrometer, available at home improvement and electronic stores. The ideal humidity range for your home is between 40-50%.\nUltraviolet Air Cleansing\nAnother option to protect your home from the flu virus and other germs is to add a UV light air purification to your home. A UV light air purification system usually combines a traditional filter with a UV lamp. A traditional HVAC or furnace filter’s main purpose is to trap dust and other particles from the air, not allowing them back into the air you breathe. When you combine a traditional with a UV lamp, both the removal of particulate matter from the air and the killing of germs and bacteria is maximized.\nUV light air purification is by no means a replacement for the regular disinfection in a home or office. However, when used in conjunction with traditional cleaning methods, UV light air purification enhances any system in place that reduces the spread of diseases.\nOrder now from US Home Filter and receive FREE SHIPPING on your order!\nSelecting the filters that are just right for your home can be difficult and confusing at times. At US Home Filter we understand this, which is why we offer an experienced staff to help answer any questions you may have. For personal assistance with your air filter or humidifier pad needs, please contact us now online or call us at (855) 237-1673 and we will do our very best to assist you in selecting the right filter for your individual needs. We carry humidifier filters and pads for all major manufacturers (including Air King, American Standard, Aprilaire, GeneralAire and Honeywell). We want to earn your business and we guarantee your satisfaction! Take advantage of our quality products, vast selection, low prices, and enjoy FREE SHIPPING on every air filter order within the Contiguous USA."
] | [
"<urn:uuid:fb78275b-d6aa-40df-afe1-ecf97a0f7624>"
] | [
"CC-MAIN-2020-05"
] | [
"https://ushomefilter.com/home-flu-protection/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251776516.99/warc/CC-MAIN-20200128060946-20200128090946-00513.warc.gz"
] | [
"en"
] | [
0.9444284439086914
] | [
1047
] | [
3.390625
] | [
3
] |
[
"Slimbridge has numerous nene (also known as Hawaiian geese), the rarest goose in the world.\n|Area||120 acres (49 ha)|\nWWT Slimbridge is a wetland wildlife reserve near Slimbridge in Gloucestershire, England. It is midway between Bristol and Gloucester on the eastern side of the estuary of the River Severn. The reserve, set up by the artist and naturalist Sir Peter Scott, opened in November 1946. Scott subsequently founded the Wildfowl & Wetlands Trust, which has since opened eight reserves around the country. Slimbridge comprises some 800 hectares (2,000 acres) of pasture, reed bed, lagoon and salt marsh. Many water birds live there all year round, and others are migrants on their ways to and from their summer breeding grounds. Other birds overwinter, including large numbers of white-fronted geese and increasing numbers of Bewick's swans.\nBesides having the world's largest collection of captive wildfowl, Slimbridge takes part in research and is involved in projects and internationally run captive breeding programmes. It was there that Peter Scott developed a method of recognising individual birds through their characteristics, after realising that the coloured patterns on the beaks of Bewick's swans were unique. The public can visit the reserve throughout the year. Besides examining the collections, they can view birds from hides and observatories and take part in educational activities.\nThe Wildlife and Wetland Trust at Slimbridge was set up by Peter Scott and opened on 10 November 1946, as a centre for research and conservation. In a move unusual at the time, he opened the site to the public so that everyone could enjoy access to nature.\nThis modest beginning developed in time into the formation of the Wildfowl & Wetlands Trust, the only United Kingdom charity to promote the protection of wetland birds and their habitats, both in Britain and internationally. Although starting out at Slimbridge, the Wildfowl & Wetlands Trust now owns or manages eight other reserves in Britain, and advocates for wetlands and conservation issues world-wide. WWT Consulting is an offshoot of the Wildlife & Wetland Trust and is based at Slimbridge. It provides ecological surveys and assessments, and offers consultancy services in wetland habitat design, wetland management, biological waste-water treatment systems and the management of reserves and their visitor centres. The Queen in later years became Patron to the WWT, and Prince Charles became the President.\nA bust of founder Sir Peter Scott by Jacqueline Shackleton was completed in 1986 and is on display in the grounds. His wife Philippa, Lady Scott, sat for Jon Edgar as part of his Environmental Series of heads, and a bronze was unveiled in the visitor centre in December 2011. A sculpture of Peter Scott's mother by Kathleen Scott is also on display in the grounds.\nThe site consists of 800 hectares (2,000 acres) of reserve, of which part is landscaped and can be visited by the public. At Slimbridge is the largest collection of wildfowl species in the world, and wild birds mingle with these in the enclosures. Some of the captive birds form part of international breeding programmes. The reserve includes a mixture of pastureland, much of which gets flooded in winter, lagoons, reed beds and salt marshes besides the Severn Estuary. Many wildfowl visit the site including greater white-fronted geese, spoonbills, avocets and even common cranes, the latter being birds that were originally bred here and later released on the Somerset Levels. There are also some rare species of plant on the reserve including the grass-poly (Lythrum hyssopifolia) and the wasp orchid, a variant of the bee orchid (Ophrys apifera).\nThe number of ducks, geese and swans is greatest in winter, with large flocks of greater white-fronted geese, sometimes with a rare lesser white-fronted goose amongst them. Bewick's swans are a feature of Slimbridge in winter, arriving from northern Russia to enjoy the milder climate of southern England. Their behaviour has been studied intensively at Slimbridge. Birds of prey such as peregrine and merlin also visit the centre in the winter, as well as wading birds and some woodland birds, and it is a good place to see the elusive water rail.\nSpecies present all year round include little and great crested grebes, lapwing, redshank, tufted duck, gadwall, kingfisher, reed bunting, great spotted woodpecker, sparrowhawk and little owl. In the spring, passage waders visit the pools alongside the estuary; these include whimbrel, common, wood and green sandpipers, spotted redshank, common greenshank, avocet, godwit, little gull and black tern, and other migrants arriving at the reserve include wheatear, whinchat, redstart and black redstart.\nSwans and geese usually start to arrive in late October. Passage waders in the autumn include red knot, godwit, dunlin, ringed and grey plovers, ruff, common greenshank, spotted redshank, curlew sandpiper and common, wood and green sandpipers. Besides Bewick's swan and flocks of white-fronted geese, large waterfowl regularly present in the reserve in winter include the Brant goose, pink-footed goose, barnacle goose and Taiga bean goose. The swans tend to fly off in the day and return to feed in the late afternoon, and another spectacular sight at the end of winter afternoons is the arrival of large flocks of starlings. Smaller wildfowl present in winter include wigeon, Eurasian teal, common pochard, northern pintail, water rail, dunlin, redshank, curlew, golden plover, snipe and ruff.\nBefore the establishment of the WWT reserve at Slimbridge, no Bewick's swans were regularly wintering on the Severn Estuary. In 1948, one arrived at Slimbridge, perhaps attracted by a captive whistling swan. A mate for this bird was acquired from the Netherlands and the pair eventually successfully bred. More wild Bewick's swans joined the group so that by 1964, more than thirty wild swans were present. So that the birds could be better studied, the tame resident swans were relocated to an easily observable lake. Peter Scott realised that every bird had a unique patterning of black and yellow on its beak by which individual birds could be recognised. These were recorded in small paintings with front and side views (rather like \"mug shots\") to aid recognition. By 1989, over six thousand swans had been recorded visiting the site, and by this means, much research was made possible on the birds.\nAn early success story in the 1950s was the saving of the nene (or Hawaiian goose) from extinction. Birds were brought to the site and breeding at Slimbridge was successful. Initial releases into the wild in Hawaii were a failure however, because the nene's natural habitat was not protected from the predators that had been introduced to the islands by man. Once that problem was alleviated, successful reintroduction became possible.\nDuring Princess Elizabeth's 1950 tour of Canada, she was promised a Dominion gift of trumpeter swans, the arrangements to be made by Peter Scott. Canadian officials discovered the only swans tame enough to capture were at Lonesome Lake in British Columbia as they had been fed for decades by conservationist Ralph Edwards. In 1952, with the help of Ralph and his daughter Trudy, five were captured and flown to England, the first time trumpeter swans had ever flown across the Atlantic (although in the 19th century swans had been brought by ship to European zoos). One unfortunately died, but the remaining four thrived at WWT Slimbridge for many years.\nSlimbridge has also been involved in trying to increase population levels of common cranes, which had bred spasmodically in Britain since the late 1970s. A specially built \"Crane School\" is used where the young birds are taught to forage and avoid danger. This project has led to 23 birds being released onto the Somerset Moors and Levels in September 2013, and 93 being released by the end of 2015.\nIn September 2016, a researcher from Slimbridge is planning to become a \"human swan\" and follow migrating Bewick's swans using a powered paraglider. She plans to try to find out the hazards they face during migration and why their numbers have halved in the last twenty years. The 4,500 mi (7,200 km) mission from the Arctic tundra of Russia to Slimbridge is expected to last for ten weeks.\nThe Sloane Observation Tower gives far-reaching views to the Cotswold escarpment in the east and the River Severn and Forest of Dean in the West. The recently opened £6.2m visitor centre has a shop, waterside restaurant, cinema, art gallery and tropical house, and exhibitions are held in the \"Hanson Discovery Centre\". There are sixteen hides that visitors can use for bird watching, as well as several comfortable observatories. Educational visits are available for schools and there is a programme of guided walks, events, talks and workshops.\nVisitors are allowed to feed the captive birds with approved food mixes bought on site, and during the winter, feeding of wild birds near one of the hides takes place at certain scheduled times, including on some floodlit occasions in the evening for visiting groups.\n- \"History of WWT\". Wildfowl & Wetland Trust. Retrieved 20 August 2016.\n- \"WWW Slimbridge Wetland Centre\". Cotswolds.info. Retrieved 20 August 2016.\n- Bell, Catharine E. (2001). Encyclopedia of the World's Zoos. Taylor & Francis. p. 1331. ISBN 978-1-57958-174-9.\n- \"Our nature reserves: Slimbridge\". WWT. Retrieved 21 August 2016.\n- \"WWT Consulting\". Wildfowl & Wetlands Trust (Consulting) Ltd. Retrieved 20 August 2016.\n- \"Royal support for drains that \"work with nature\"\". Latest from WWT. WWT. 19 May 2015. Retrieved 20 August 2016.\n- \"Panoramic tour of Kathleen Scott Sculpture, WWT Slimbridge\". CleVR. 11 October 2006. Retrieved 26 February 2013.\n- Edgar, Jon (2008). Responses – Carvings and Claywork – Jon Edgar Sculpture 2003–2008. Hesworth Press. ISBN 978-0-9558675-0-7.\n- Tipling, David (2006). Where to Watch Birds in Britain and Ireland: Slimbridge. New Holland Publishers. pp. 62–63. ISBN 978-1-84537-459-4.\n- Bell, Catharine E. (2001). Encyclopedia of the World's Zoos. Taylor & Francis. pp. 1186–1187. ISBN 978-1-57958-174-9.\n- Kear, Janet; Berger, A.J (2010). The Hawaiian Goose. A&C Black. pp. 79–114. ISBN 978-1-4081-3758-1.\n- Leland Stowe (1957). Crusoe of Lonesome Lake, Victor Gollancz, Ltd, London, 1958. Chapter 14: \"The Saga of the Trumpeter Swans\", pg.162–178.\n- \"Cranes fighting fit and ready for release\". Birdwatch. 23 August 2013. Retrieved 28 August 2016.\n- \"The Great Crane Project\". Retrieved 28 August 2016.\n- McKie, Robin (4 September 2016). \"\"Human swan\" conservationist takes to skies on 4,600-mile migration\". The Guardian. Retrieved 5 September 2016.\n- \"'Human swan' Sacha Dench to join 4,500-mile migration\". BBC News. 26 April 2016. Retrieved 28 August 2016.\n- Newsome, David; Kingston, Ross; Moore, Susan A. (2005). Wildlife Tourism. Channel View Publications. p. 345. ISBN 978-1-84541-316-3.\nMedia related to Slimbridge at Wikimedia Commons"
] | [
"<urn:uuid:25463934-2b03-4a20-b8e5-1d6c5197e86c>"
] | [
"CC-MAIN-2017-26"
] | [
"https://en.wikipedia.org/wiki/Slimbridge_Wildfowl_and_Wetlands_Centre"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00458.warc.gz"
] | [
"en"
] | [
0.9438413381576538
] | [
2585
] | [
2.765625
] | [
3
] |
[
"This is part 2 of “Getting started with multithreading” series. Click here for part 1.\n1) What are processes?\nA process initializes a program. Programs are nothing but a passive collection of instructions stored in a file on a disk or simply our software.\nA Process contains the program’s code and its activity. It’s the self-contained unit of execution that has all the things necessary to accomplish the mission.\nA program doesn’t consume any memory; it is a passive entity whereas a process consumes some memory (RAM) and gets CPU time. It’s an instance of a program running on a computer.\nA “program becomes a process\" when loaded into memory (RAM) and thus is an active entity or a dynamic entity.\nA program can have several processes; for example, opening several instances of the same program often results in more than one process being executed. Every process has its own memory space or address space.\nTo visualize in simple terms, consider a program as the McDonald company and its restaurants as the processes. The company has a set of rules and regulations for the operation of restaurants and recipes of the food, but the actual implementation of those rules and recipes is run by the restaurant.\nAnd Threads(see below) are the workers in a particular restaurant.\n2) What are threads?\nA thread is a portion of the process. Thread is short for the thread of execution. It is a series of commands (a block of code) that exists as a unit of work.\nA process may have several threads. Each of these threads executes semi-independently while sharing common information. They can run concurrently or in parallel inside the same process.\nEach thread has its executor, and this executor can perform only one thread at a time.\nThreads run in a shared memory space inside its process. If there is no need of sharing the shared resources then tasks can run concurrently inside the same thread, there is no need to run them in different threads. It is cheaper in terms of resources to arrange concurrent execution with time-slicing inside one thread.\nA thread is also known as a lightweight process because of the system resources they consume, as compared with processes.\nI found a very easy to understand analogy for threads on StackOverflow as follows:\nSuppose you’re reading a book, and you want to take a break right now, but you want to be able to come back and resume reading from the exact point where you left off.\nOne way to achieve that is by jotting down the page number, line number, and word number. So your execution context for reading a book is these 3 numbers.\nIf you have a roommate and she’s using the same technique, she can take the book while you’re not using it, and resume reading from where she stopped. Then you can take it back, and resume it from where you were.\nThreads work in the same way. Just like you can share a book with your friend, many tasks can share a CPU.\nIn technical terms, an execution context (therefore a thread) consists of the independent set of values for the processor registers(for single-core).\nThe resources associated with a process include memory pages (all the threads in a process have the same view of memory), file descriptors (e.g., open sockets), and security credentials (e.g., the ID of the user who started the process.\n• What is time slicing?\nA CPU is giving you the illusion that it’s doing multiple computations at the same time. It does that by spending a bit of time on each computation. It can do that because it has an execution context for each computation(Read above to understand “execution context”).\nThe operating system can manage multiple threads and assign a thread a piece (“slice”) of processor time before switching to another thread to give it a turn to do some work.\nAt its core, a processor can simply execute a command, it has no concept of doing two things at one time. The operating system simulates this by allocating slices of time to different threads.\nNow, if you introduce multiple cores/processors into the mix, then things can actually happen at the same time. The operating system can allocate time to one thread on the first processor, then allocate the same block of time to another thread on a different processor. All of this is about allowing the operating system to manage the completion of your task while you can go on in your code and do other things.\nThe “execution inside the threads” can be synchronous or asynchronous but never parallel because of the “single executor per thread”.\n• Process Vs Threads:\nEach process has its own memory space whereas,\nThreads use the memory of the process they belong to.\nCommunication between different processes is slow since processes have different memory addresses whereas,\nCommunications between threads are faster due to sharing of the same memory with the process they belong to.\nProcesses are independent of one another due to separate memory spaces whereas,\nThreads run in shared memory space.\nWhile one process is blocked, no other process can be executed until the first process is unblocked whereas,\nIf one thread is blocked and waiting, a second thread in the same task can run.\nEvery process has at least one thread as they do all the work. There is no such thing as a thread without a process or a process without a thread.\nEach process starts with a thread called the main thread. It can initiate the creation of additional threads inside the application, and every newly created thread can do it as well.\nProcess management is the responsibility of the operating system whereas,\nThread management is the concern of the application.\nCover photo by 8photo\nProcess image by onlyyouqj - www.freepik.com\nThreads image by rawpixel.com - www.freepik.com\nTime-slicing image by Racool_studio - www.freepik.com\nTop comments (0)"
] | [
"<urn:uuid:3b4545f2-40f9-46c1-944b-4dcf0e6c865d>"
] | [
"CC-MAIN-2023-14"
] | [
"https://practicaldev-herokuapp-com.global.ssl.fastly.net/lomas/processes-and-threads-189j"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00153.warc.gz"
] | [
"en"
] | [
0.9536411762237549
] | [
1292
] | [
3.953125
] | [
4
] |
[
"ICT @ BELLBRIDGE\nInformation and Communication Technology (ICT) is a significant feature of our learning and our daily lives in the 21st century, and we are pleased to be able to provide students at our school with a wide range of experiences using a variety of ICT tools. These include the following:\n- An interactive whiteboard is in every classroom.\n- Prep-3 classrooms have a 2:1 ratio of laptop PCs.\n- Our 1:1 Netbook Program ensures all Grade 4-6 students have a netbook.\n- Sets of iPod Touches are used in all Grade 2 and 3 classrooms.\n- Digital cameras are used extensively for photos and filming.\n- A green-screen room is available for Grade 5 and 6 students.\n- A full set of adjustable cameras support Claymation film-making. (Stop-motion using plasticine and props.)\n- iPads are used by students with special needs, with support from integration staff.\n- Strong ICT staffing, with an Assistant Principal as ICT Leader, a teacher as Netbook Program Leader, a full-time ICT Technical Manager on-site, and a part-time DEECD Specialist Technician.\nBelow is an SWPBS Claymation video created by Grade 5 students. Click the double-arrow to go full-screen:\nOur students are members of a generation who have a high degree of technological awareness and demonstrate a capacity to learn effectively and efficiently using technology. We believe it is important that schools offer students opportunities to become skilled in using tools and programs that are going to play a major role in their future learning that will support possible career options. Bellbridge has invested in becoming a well-resourced school in ICT - including hardware, full-time technical support, and professional development for staff. This culminates in an overall ICT culture which:\n- Develops students' ability to become ‘ICT literate’ by being able to transfer knowledge and skills and apply it to new technologies.\n- Develops familiarity with programs and processes to assist in the presentation of work, e.g. Microsoft Office products and online tools.\n- Provides access to interactive learning via web-based programs, e.g. Sumdog, Mathletics and Reading Eggs.\n- Encourages the exploration of creative tools for showcasing their learning styles.\n- Provides communication within and beyond the school as part of an interactive approach to learning, and encourages a connectedness between home and school to support learning for students and families.\nFind our ICT POLICY on our Policies and Forms page.\n1:1 NETBOOK PROGRAM\nThe Grade 4 - 6 teams and the ICT Team work hard to implement our 1:1 Netbook Program for all students in Grades 4-6. Our school has made sure that the program provides parents with the best value for money, as well as having the best possible technical support from our full-time on-site technician.\nStudents in Grades 4-6 use Windows based netbooks on a daily basis to support and enrich their learning in all areas of the curriculum, as well as providing engaging homework tasks. We are very proud of this program because ALL students access a personal netbook to use at school every day, allowing teachers to implement consistent, rich and engaging learning experiences for everyone.\nThe cost of the netbook program:\n$60 per term (x4 terms each year for Grade 4-6)\n$200 up-front (once per year for Grade 4-6)\nTo date, we have been in a position to offer family discounts where siblings are on the program at the same time, using a grant from our supplier.\nInformation sessions are held for Grade 3 parents in late November each year.\nBelow is a Claymation video created by Grade 5 students on netbook computers:"
] | [
"<urn:uuid:1c0289f4-2283-4de4-a488-85926869f210>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.bellbridgeps.vic.edu.au/ict.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251788528.85/warc/CC-MAIN-20200129041149-20200129071149-00173.warc.gz"
] | [
"en"
] | [
0.9472044110298157
] | [
790
] | [
2.734375
] | [
3
] |
[
"People with mental illness are 70 percent more likely to smoke cigarettes than people without mental illness.\n“New data from the Centers for Disease Control and Prevention and the Substance Abuse and Mental Health Services Administration show that one of every three adults with mental illness smokes, compared with one in five adults without mental illness,” reports today’s New York Times\n“Adults with mental illness smoke about a third of all the cigarettes in the United States, and they smoke more cigarettes per month and are significantly less likely to quit than people without mental illness, the report said. There are nearly 46 million adults with mental illness in the United States, about a fifth of the population.\n‘Many people with mental illness are at greater risk of dying early from smoking than of dying from their mental health conditions,’ said Dr. Thomas R. Frieden, director of the Centers for Disease Control, during a press briefing.\n“The report is based on information from the National Survey on Drug Use and Health, which interviewed 138,000 adults in their homes from 2009 to 2011. People were asked 14 questions to assess psychological distress and disability, and were deemed to have mental illness if their responses indicated they had a mental, behavior or emotional disorder in the past 12 months. Those with substance abuse or developmental disorders were not considered people with mental illness. The report did not include patients in psychiatric hospitals or individuals serving in the military.”\nFull story at: http://www.nytimes.com/2013/02/06/health/more-smoking-found-by-mentally-ill-people.html?_r=0"
] | [
"<urn:uuid:0ad2b142-11dc-44f8-a00b-6974dc5a219b>"
] | [
"CC-MAIN-2023-14"
] | [
"https://worlding.org/smoking-and-mental-illness-linked/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00373.warc.gz"
] | [
"en"
] | [
0.9652125239372253
] | [
335
] | [
2.65625
] | [
3
] |
[
"The number of Computers and Devices that are been attacked by computer virus is overwhelming, about 30% to 50% of softwares available on the internet today contains these computer virus. When these softwares containing these virus programs are downloaded to your PC, Phones or other smart gadgets, they get infected right away.\nIf your Computer or other devices have not been infected by a Virus program, we are quite sure you must have heard other people scream about getting infected but what exactly is this computer virus?\nWhat is a Computer Virus?\nAccording to the English mini dictionary “A program which can secretly transmit itself between Computers through networks (especially the internet) or removable storage devices such as CDs, USB drives, Cables etc and they often cause damage to systems and data as they are propagated”.\nWhat a lot of people fail to understand is that, this Computer Virus that a lot people are talking about is actually a computer program or we can also say it’s a set of command codes that are been written by Humans to intercept your data one way or another. Their basic operations can harm your computer and sometimes you might not even be unaware that you have been infected by these programs until it’s too late. One major disadvantage of this virus program is the ability to replicate itself and move from one Device to another. The word “computer virus” was gotten from its biological name “Virus” owing to the fact that it can attach itself to clean files or data and keep on spreading and also infect more clean data on your computer as it keeps propagating.\n- Related Posts…\n- 7 Ways Computer Gets Infected by Virus and Malware\n- 5 Steps To Recover Files From Corrupted or Infected External Storage\n- RansomWare Alert: Android devices are under Attack!\nWhat does a Computer Virus do?\nWe already know that a Computer Virus infects or attack our data but what does this “attack” or “infect” really mean. Below we listed out the major operations of a computer virus.\n- Delete: Some Computer Virus have the ability to delete your personal data, this can be a specific type of file or the entire data contained on your computer or device. They are designed with certain codes to delete files even without the users approval.\n- Modification: Many Virus on the other hand has been known to attach itself with clean softwares which they alter their programming codes by editing or inserting their own set of command codes. This attack can render the clean software inactive or produce random uncomfortable results. Some modifications of these programs by the Virus can even cause these programs to give out private information. This is mostly the aims of some virus programmers to steal certain information from their victim before the launch their major attack.\n- Replication : Another feature of a Virus is replication, this feature of a virus to be able to recreate itself is one of the major attributes that differentiates a virus from other malware programs. When a Virus keeps on replicating itself it fills up your device memory or disk space.\nOperations of a Virus\nThere are certain operations that makes up a Virus, these operations are what enables these programs to function maliciously. For a program to be called a virus, it must be able to perform about 5 stages of routine.\n- Search: The first operation of a virus is to find and locate it’s host. In this case our host can be a computer program, software, video and even an audio. There are many hosts a computer virus can be programmed to search out.\n- Attachment: The second phase of the computer virus is to attach itself to any of the host it was programmed to find and insert it’s malicious coding into them. While awaiting it’s download to your device.\n- Replication: After the search and attachment stage, the virus replicates itself to launch more attacks on other software and programs it can find on your device. Many softwares are not stand alone softwares, due to the fact that they require other softwares and programs to run. For instance, the browsing softwares require the internet connection to run, some other softwares may require the Bluetooth functionality, WiFi, USB and other extensions or ad-dons. When this software connects to others, the virus replicates itself and spreads through these means.\n- Trigger: Remember a virus is an executable program, it has been coded in way that something has to happen before it begins it’s functionality. The trigger in some cases could be time factor, condition, presence of another program, a specific button press, and so on. This highly depends on the attacker.\n- Payload: Now this is the main and obvious purpose of the Virus attack. This is what the Computer Virus programmer had in mind when coding the Virus. Sometimes this is the phase when Virus can be noticed. When the Virus program has been triggered to deliver it’s payload, which can be to delete, edit or corrupt a system.\nOther Related posts you might be interested in\n- HarmonyOS: Huawei Announces Android Replacement\n- MTN Compensates Subscribers with N5000 Airtime\n- The New 100GB and 10GB Bonus Data via AIRTEL Home Broadband\nWe shall be splitting this article to allow further in depth discussion on what is a computer virus and everything it entails."
] | [
"<urn:uuid:9a671a32-d075-4f68-abe2-9207ee7f46d6>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.cybertechguide.com/2019/08/what-is-computer-virus/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251779833.86/warc/CC-MAIN-20200128153713-20200128183713-00388.warc.gz"
] | [
"en"
] | [
0.9444957375526428
] | [
1111
] | [
3.234375
] | [
3
] |
[
"A team of astronomers from the Onsala Space Observatory and Chalmers discovered seven previously unknown in excess of the new stars in the galaxy age of 250 million years. Never before so many new stars above was not detected at the same time and in the same galaxy. Discovery confirmed the long-standing assumption of astronomers that the galaxies that are the most effective plants for the production of stars in the universe are also the birthplace of super novas.\nThe astronomers used a worldwide network of radio telescopes in five countries, including Sweden, in a similar way to create extremely sharp images of the galaxy Arp 220. Scientists observed by nearly 40 radio behind the center of the galaxy Arp 220. These radio sources are hidden behind thick layers of dust and gas and invisible to conventional telescopes. To determine the nature of these radio sources, the scientists made measurements at different wavelengths of radio waves and see how they have changed through the years.\n\"With all these in place, we can now be certain that all seven of these sources are supernovae: stars that have formed in the last 60 years\" - said Fabien Batezhat (Fabien Batejat), the main author of the article about the opening. So many supernovae have never before been found in one galaxy. The number, however, corresponds to how fast the star formed Arp 220.\n\"In Arp 220, we see far more supernovae than in our galaxy. According to our calculations, the star is formed in Arp 220 once every quarter of the year. For the Milky Way, is characterized by only one supernova per century\" - said Rodrigo Parra (Rodrigo Parra), an astronomer from the European Southern Observatory in Chile.\nJohn Conway (John Conway), observational astronomy professor at Chalmers and deputy director of the Onsala Space Observatory said in a statement: \"The galaxy Arp 220 is well known as the place is very efficient formation of stars. Now we have been able to show that star factories like this are also plants for the production of super novas. \"\nRadio sizes also help researchers better understand how radio waves are generated in supernovae and their remnants. \"Our measurements show that the self-magnetic area over the new star itself and causes the radio emission, rather than the magnetic field, located in the galaxy around it\" - said Fabien Batezhat. The results of the study will be published in the October issue of the journal \"Astrophysical Journal\".\nIn a research team of astronomers were Fabien Batezhat, John Conway and Ross Hurley of Onsala Space Observatory at Chalmers, and Rodrigo Parra from the European Southern Observatory (ESO), Philip Diamond, Colin Lonsdale Heystek of the Observatory in the United States. The observations were made using telescopes that belong to the European VLBI Network with a network of VLBA. This network is a set of ten radio telescopes, relaying information from the State of Hawaii to the Virgin Islands in the U.S. and maintained by the National Radio Astronomy Observatory.\nOriginal: Sciencedaily Translation: M. Potter"
] | [
"<urn:uuid:b87ea9a1-90ec-445f-b4bb-bde2a8eedd2f>"
] | [
"CC-MAIN-2017-26"
] | [
"http://decamon.com/text/5/2448/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00109.warc.gz"
] | [
"en"
] | [
0.9301857948303223
] | [
641
] | [
3.921875
] | [
4
] |
[
"The blue-cheeked amazon (Amazona dufresniana), also known as blue-cheeked parrot or Dufresne's amazon, is a parrot found in northeast South America in eastern Venezuela, the Guianas and possibly far northern Brazil. It lives in forest and savanna woodlands up to 1,700 m (5,600 ft).\nIt is about 34 cm (13 in) long. Its coloring is mostly green, with blue cheeks from around the eye to the neck (less on young), a yellow-orange wing speculum, a yellowish crown, and orange lores (the region between the eye and bill on the side of a bird's head).\n- BirdLife International (2012). \"Amazona dufresniana\". IUCN Red List of Threatened Species. Version 2013.2. International Union for Conservation of Nature. Retrieved 26 November 2013.\n|This article relating to parrots is a stub. You can help Wikipedia by expanding it.|"
] | [
"<urn:uuid:4b116b2c-1b90-4a24-9eb2-c7d61e75ccf3>"
] | [
"CC-MAIN-2017-26"
] | [
"https://en.wikipedia.org/wiki/Blue-cheeked_Parrot"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00251.warc.gz"
] | [
"en"
] | [
0.7361293435096741
] | [
214
] | [
3.203125
] | [
3
] |
[
"Topic discussion based on the idea of role models and setting good or bad examples.\nRole Model (good / bad)\nTo admire / look up to someone\nTo set an example (good / bad)\nTo be a good / bad influence\nPut this picture of Paris Hilton on the board.\nWhat do you think of Paris Hilton?\nIs she a good role model? Why? Why not?\nDoes she set a good example for teenagers / children?\nPut the picture of Michelle Obama on the board and ask the same questions.\nBrainstorm language for good / bad role models.\nHere are some examples, give out dictionaries if the students have trouble.\n|Bad Role Models||Good Role Models|\n|Selfish / tight-fisted||Unselfish,|\n|Arrogant / self centred / full of himself||Modest / humble|\n|Bad-tempered / moody||Easy going|\nIn Groups of 3-4 discuss these questions.\nWho was your most important role model when you were a child? Who did you look up to / admire?\nWho is your most important role model now?\nDo you think you are a good role model?\nWho do you think was a good / bad influence on you when you were a child?\nWere you a good / bad influence on your friends?\nStudents report back to teacher.\nPrint a set of the following pictures for each group:\nIn groups students answer the following questions referring to each picture:\nDo people admire or look up to this person?\nIs he or she a good role model? Why? Why not?\nDoes he / she set a good example? Why? How?\nIs he / she a good influence on society?\nOpen the discussion up to the class and see if there are any differences of opinion. Get students to justify their opinions."
] | [
"<urn:uuid:d144a076-6c9f-4014-a3fd-e018198756c3>"
] | [
"CC-MAIN-2017-26"
] | [
"https://freeenglishlessonplans.com/2013/01/29/role-models/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320049.84/warc/CC-MAIN-20170623100455-20170623120455-00361.warc.gz"
] | [
"en"
] | [
0.9027687311172485
] | [
389
] | [
3.75
] | [
4
] |
[
"All About Whole Grains\nDietary guidelines say you need at least 3 servings of whole grains each day. But if you don’t know barley from bulgur, here’s\na guide to versatile grains, from amaranth to wheat berries.\nPhoto: Becky Luigart-Stayner , Text: Deborah Madison\nAmaranth [AM-ah-ranth] was a principle food of the Aztecs. It has a slightly peppery, molasses-like flavor with a faint nuttiness.\nThe grains (or seeds) are tiny, shiny, and can be yellow and black. They’re so small that they seem almost lost when served\nalone as a side dish. But amaranth is good as a thickener in soups because, when cooked, it has a slightly gummy texture,\nlike okra. Try amaranth flour, along with wheat berries, in Wheat Berry Bread"
] | [
"<urn:uuid:bc168098-ce0c-4b9b-99cd-55cca38a34bc>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.cookinglight.com/m/cooking-101/essential-ingredients/all-about-whole-grains-00412000070480/page2.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163066095/warc/CC-MAIN-20131204131746-00054-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9277594089508057
] | [
196
] | [
2.625
] | [
3
] |
[
"International GCSE History\nDiscover our resources for Edexcel International GCSE History, including 11 brand new student books for the new (9-1) specification, for first teaching in 2017.\n- Products start at £16.00\nBrand-new resources for the new 2017 Edexcel International GCSE (9-1) History specification\nRead more →\nOffer comprehensive coverage of the 2017 specification and are designed to provide students with the best possible preparation for the examination."
] | [
"<urn:uuid:00b86ecf-1d24-4b1e-b7af-7fec6771e8a3>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.pearsonschoolsandfecolleges.co.uk/secondary/History/international-gcse/IGCSE.aspx"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144429.5/warc/CC-MAIN-20200219214816-20200220004816-00368.warc.gz"
] | [
"en"
] | [
0.8406918048858643
] | [
98
] | [
2.578125
] | [
3
] |
[
"Year 2 had an amazing visit to Kenilworth Castle. We spent the day exploring the ruins and the grounds, and learning all about the history of the castle. We climbed the tallest towers, visited the Leicester Gatehouse and walked around the beautiful gardens. We are going to be using all the information we learnt on our visit, to write our own reports about castles.\nWhat was your favourite part of the visit to the castle?\nWhat interesting facts did you learn about Kenilworth Castle?"
] | [
"<urn:uuid:ae457c5c-fe69-489e-95b6-d5af86c78f60>"
] | [
"CC-MAIN-2020-05"
] | [
"http://lingsprimaryblogs.net/2018/12/12/a-visit-to-kenilworth-castle/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00112.warc.gz"
] | [
"en"
] | [
0.949925422668457
] | [
100
] | [
2.515625
] | [
3
] |
[
"World’s First Motion Measurement Tool\nThe World’s First Motion Measurement Tool uses the same technology you can find in rocket guidance systems to make measuring stuff infinitely easier.\nMoasure ONE is a small device that can measure distances up to 1000 ft long, surfaces, volume, angles, and even irregular shapes.\nThe measuring happens simply by carrying or shifting Moasure from one point and another. Combined with a handy app, this tool makes measuring a walk in the park.\nSince Moasure doesn’t rely on cameras or laser it gives you an unparalleled level of precision. This is what makes it a must-have gadget when calculating angles or figuring out the inclines on your path.\nIn what situations can you use it? Well, you can instantly find out if the couch you’ve found online would fit in your living room. Know exactly what type of containers your car would be able to handle.\nMeasure cable runs even through obstacles and uneven surfaces. Save time while putting up photos while still keeping them evenly spaced.\nWhen a tool brings space rocket guidance-level of tech into your house, you know it means business."
] | [
"<urn:uuid:834f26fa-532e-4f01-ad49-dae0272a6133>"
] | [
"CC-MAIN-2020-05"
] | [
"https://awesomestuff365.com/worlds-first-motion-measurement-tool/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00013.warc.gz"
] | [
"en"
] | [
0.9034542441368103
] | [
237
] | [
2.8125
] | [
3
] |
[
"Pneumonia and heart disease, which are typical geriatric diseases, are increasing every year, and the number of deaths is also increasing.\n36% increase in elderly pneumonia patients\nPneumonia is the most rapidly increasing disease in recent years. Pneumonia is a disease with a high incidence among the elderly recently, and while the total number of patients decreased slightly from 2011 to 2015, the number of patients aged 65 years and older increased by more than 36%. As a result, the number of deaths is also increasing.\nAmong the causes of death in 2015, pneumonia ranked 4th, significantly increasing from 10th a decade ago. In particular, when the elderly 65 years of age or older are infected with pneumococcus, the mortality rate is up to 60-80%.\nIn the case of pneumonia, it is recommended to get vaccinated because the mortality rate rises to 35-50% in patients over the age of 65. In addition, it is essential to maintain cleanliness by washing hands for at least 40 seconds with soap and cleaning teeth, tongue, and oral mucosa when brushing teeth.\nMore than 80% of deaths due to heart disease\nHeart disease is also a representative disease that threatens the health of the elderly in winter. When the temperature suddenly drops, blood vessels constrict, which in turn raises blood pressure and puts a strain on the heart.\nAccording to data from the National Statistical Office, heart disease ranked second after cancer among the causes of death over the age of 60. In particular, the elderly have a high mortality rate due to ischemic heart disease such as myocardial infarction and angina pectoris.\nIn case of heart disease, excessive drinking and smoking should be avoided. Nicotine, carbon monoxide, and various carcinogens generated during smoking constrict blood vessels and put a strain on the heart, while inducing or exacerbating arteriosclerosis, which increases the risk of cardiovascular disease.\nAlso, if you exercise in the morning when the temperature is low or if you do an exercise that you do not normally do, you should refrain from doing it as much as it can put a strain on your heart. People with regular heart disease should seek the advice of a specialist before making an exercise plan.\nFractures leading to fatal complications\nWhen the temperature drops, muscles and joints stiffen, and wearing thick clothes also slows movement, increasing the risk of falls and fractures. In particular, the elderly are vulnerable to such sudden situations due to their relatively low exercise capacity, and their bone density is also low, increasing the risk of falls and fractures.\nIf the elderly suffer a fracture, the recovery is slow, and as a result, complications such as pressure sores, pneumonia, and urinary tract infection may occur. Exercise is the best way to prevent falls and fractures. Stretching and exercising with bare hands, which can be easily done indoors, increase the flexibility and bone density of the body to prevent falls and reduce the intensity of injuries.\nWhen going out, it is better to keep warm and active by wearing several layers of thin clothes instead of thick ones. It is also advisable to use an assistive device such as a cane. In the case of a fracture, it is also good to take measures such as installing non-slip tiles in the bathroom, which can be slippery, as it can happen inside the house rather than outside.\nAn expert said, “In the case of elderly people suffering from geriatric diseases, even if their physical condition does not improve, they may be mistaken for signs of aging."
] | [
"<urn:uuid:05c62a95-1160-4258-9c16-84d64d4d1c4a>"
] | [
"CC-MAIN-2023-14"
] | [
"https://miasian.com/3-diseases-that-elderly-people-should-be-especially-careful-about-in-winter/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00389.warc.gz"
] | [
"en"
] | [
0.9523889422416687
] | [
726
] | [
3.0625
] | [
3
] |
[
"Economic Study of the Canadian Plastic Industry, Markets and Waste\nEnvironment and Climate Change Canada, 2019\nThe Economic Study of the Canadian Plastic Industry, Markets and Waste commissioned by Environment and Climate Change Canada in 2019 is the first of its kind in Canada. Using national statistics, interviews, and industry reports the study presents the entire value-chain of plastics in Canada from raw material production to end-of-life. Plastics are favourable throughout varying sectors of the market because they are cheap, lightweight, malleable and durable. The study focuses on the following topics: factors creating low recycling rates in Canada, the economic advantages of a zero plastic waste economy by 2030, and opportunities for positive change. This study shows that Canada has low landfill diversion and recycling rates (25% and 9% in 2016, respectively), and 87% of our plastic waste goes to landfills or the environment. Plastic pollution in Canada is a broad and systemic issue, and therefore difficult to address. While some sectors, such as textiles, automotive and construction have lower recycling rates than others, and each sector faces unique challenges, unifying recycling issues are economic problems of demand and supply.\nRecyclers and other businesses in the end-of-life market, such as collectors, are in a vulnerable position in the Canadian market. The price of novel plastic material fluctuates often because it is linked to gas prices. Recycled plastic products compete in the market with virgin resins. For recyclers, the market is unstable and often not viable because the price of virgin resins is so cheap that the demand for recycled plastic material is low. This is a problem for Canada’s recycling rates because the types of plastics that are collected, accepted, and managed by recyclers are highly dependent on end-of-life markets. Across the eight sectors of plastic waste outlined in this study, packaging has the highest recycling rate at 15% in 2016. Recyclers focus on packaging because resins made from most of the plastics used in this sector, such as polyethylene terephthalatePET, are valued highly in the market. On the other hand, the automotive and white goods sectors essentially do not recycle (with recycling rates of 0% in 2016) because the market for the mixed shredded plastics these sectors produce is extremely limited. The viability of end-of-life markets is very important because it determines whether cost-adding actions like collecting and sorting plastic waste is worthwhile.\nFortunately, various levels of government can provide support to recyclers and help create a more stable and viable market for recycled plastics. First of all, policies such as a tax on virgin resins could make recycled resins more attractive in the market, or politicians could ensure a market for recycled resins entirely independent of the price of virgin resins by requiring that recycled plastics be used in certain products. These measures should be implemented at the same time as upstream actions in order to ensure that recyclers can access quantities and qualities of plastic required to meet increased demand. Further, municipalities can enter into long-term contracts with recyclers to provide them with raw materials and the stability to invest in technological developments. Municipalities can also decrease recycler’s operating costs by implementing good systems of collecting and separating plastic waste. Although concerted efforts involving all stakeholders in the plastic value-chain are necessary to increase recycling rates in Canada, governments have an important role to play. When governments clearly and proactively communicate policy changes such as non-voluntary recycling targets, product design regulations, and changes in the cost of disposing of waste into landfills, companies are encouraged to address the problems.\nThe report concludes that many barriers leading to low recycling rates in Canada are economic in nature. In sum, recyclers are vulnerable in the Canadian market due to the low demand for recycled plastic resins and costs related to the collection and contamination of plastics. Governments at various levels can help recyclers gain stability in the market and implement clear policies that encourage changes in various stages of the plastic value-chain such as raw material production, product manufacturing, and end-of-life processing.\nFind the full report here.\n1. Deloitte & ChemInfo Services Inc.. Economic study of the Canadian plastic industry, markets and waste. Environment and Climate Change Canada, 2019, Gatineau, Quebec. Available from http://publications.gc.ca/collections/collection_2019/eccc/En4-366-1-2019-eng.pdf"
] | [
"<urn:uuid:0d318a50-f445-46b4-962d-f96a5e787799>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.shakeuptheestab.org/climate/economic-study-of-the-canadian-plastic-industry%2C-markets-and-waste-environment-and-climate-change-canada%2C-2019"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00782.warc.gz"
] | [
"en"
] | [
0.9403844475746155
] | [
919
] | [
3.015625
] | [
3
] |
[
"You will need\n- - accounting of output per unit of time;\nTo determine the average daily throughput, the quantity surveyor needs to calculate averages. To calculate the average for one day of accounting is very difficult, therefore make the calculation of products in one month. Add up all the figures for the development of the brigade or replaceable composition, producing the same products for one month of work. The result, divide by the number of working days for which the product is produced and on the number of staff or crew shifts. The result will be the average daily production, which is expected to release the employee for one shift of work.\nTo calculate the average hourly production divide the daily average amount of output per worker the number of working hours per shift. The result will be equal to the productivity per unit of working time.\nIf you need to calculate production in a calendar year, multiply the average daily production number in one month by 12 and divide by the number of employees in the team or shift.\nTo calculate output per worker add up all the number of products in one month, divide by the number of working days. This will be the norm, the average daily per employee. If you divide the total average monthly figure by the number of working hours per month, you get an average hourly output.\nIf you are going to put all employees on salary or hourly wage rates for labor of production, the calculation produce not one employee, and on average the brigade or replacement staff. The calculation of output per employee can be a plan that will not be able to do the other or Vice versa will produce several times more output that will affect the cost of the labor."
] | [
"<urn:uuid:649c632a-6699-423e-8e0b-75b5ccd0d4e4>"
] | [
"CC-MAIN-2023-14"
] | [
"https://eng.kakprosto.ru/how-86824-how-to-determine-the-output-per-worker"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00145.warc.gz"
] | [
"en"
] | [
0.9081313014030457
] | [
353
] | [
2.8125
] | [
3
] |
[
"1) There are 12-minutes in an NBA basketball quarter. The scoreboard displays the amount of time remaining in the quarter. The scoreboard says “5:34”, how many minutes have been played at this point in the quarter?\n2) James and Racheal played tennis against each other. Racheal won six games and James won 3 games. How many games did Racheal beat James by?\n3) 30 people go to basketball tryouts for a school team. 3 people are cut the first day, 2 people are cut the second day, and 10 people are cut the last day. How many people are left on the team?\n4) Jj and Logan boxed each other. The judge ruled that Logan won the fight 56-55; however, Logan was given a 2-point penalty. What was the final score? Does this change who won the fight?\n5) Jake had a dozen baseballs in his bag to use during practice. Two of his balls were lost and one was hit outside the park. How many baseballs does Jake have left?"
] | [
"<urn:uuid:2181647a-25bc-4985-96ad-482764e5abe9>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.mathmvp.org/subtraction"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00563.warc.gz"
] | [
"en"
] | [
0.9930505156517029
] | [
237
] | [
2.578125
] | [
3
] |
[
"When Edward Snowden blew the whistle on the NSA spying, the term metadata came up. Metadata is the bits of information attached to a piece of intelligence. For example, a phone call has metadata data attached to it such as the date and time of the call, who was making the call, who received the call, and how long the call was. This information is secondary to the actual intelligence of what was being said, but can sometimes be more valuable.\nTagging is a way to attach metadata to information. These tags can be used to group different bits of information and to facilitate searching later. Twitter users are very prominent in their use of hashtags, which is just a tagging technique. In Twitter, a tag is preceded by the # sign, or hash, hence the term hashtag. Twitter hashtags came about from Internet Relay Chat (IRC) and was not a part of the original idea of Twitter.\nI use tags when I bookmark websites in Delicious. As an example, for sites that I bookmark about Twitter will have the #twitter tag. Later, when I want to recall a website I bookmarked, I just have to remember that it had something to do with Twitter and I can pull up all of my bookmarks with that tag. Delicious makes it even easier by providing a link to all of my Twitter bookmarks by navigating to https://delicious.com/mr.rcollins/twitter. With tags, you can also search for items that may have two or more tags. If I want to find all of my Twitter links that pertain to education, I can search for links with the #twitter and #education tag.\nFinally, GMail uses tags but calls them labels. When GMail was first released, it was hard to understand how the label system worked. After while, I realized that it made sense to view the labels as tags. The reason being that before GMail, I filed email into a particular folder. Now with labels, an email can be in multiple folders at the same time. Although nowadays I really don’t label my emails that much, GMail search is so fast and efficient that it is less efficient to take the time to file away emails than to just rely on search. Google Drive’s folders also can act as tags, allowing files to be in more than one folder at a time, although Google Drive doesn’t make it easy to figure out how to do this (try shift-z sometime)."
] | [
"<urn:uuid:4188fea0-03fe-4e0b-976b-805e9dac95df>"
] | [
"CC-MAIN-2020-05"
] | [
"https://eduk8.me/2016/02/what-is-a-tag/?shared=email&msg=fail"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00453.warc.gz"
] | [
"en"
] | [
0.9532335996627808
] | [
504
] | [
2.875
] | [
3
] |
[
"Download PDF Version\nLast updated 20 February 2013\nEl Salvador’s first civil society organizations (CSOs) engaged in humanitarian aid work during the 1960s. However, the majority of CSOs in El Salvador formed and developed in the late 1980s and early 1990s, when the country endured a civil war and period of post-war reconstruction. During that time many CSOs continued the work initiated in previous decades, but with heightened urgency to provide assistance to individuals who were marginalized from the economic and social system. The 1980s and 1990s also witnessed the emergence of new CSOs dealing with social welfare issues. With the end of the Civil War and the peace accords in 1992, CSOs continued to develop both quantitatively and qualitatively.\nOver time CSOs developed mechanisms for international cooperation and financing and created unions, alliances and networks with other organizations, which are called federations, boards, offices and partnerships. They interact effectively in the public arena by formulating proposals for public policies, laws, and even agreements with state agencies.\nThe legal framework for CSOs is regulated by Article 7 of the Constitution (\"The people of El Salvador have the right to freely associate and assemble peacefully without arms for any lawful purpose. [...]”) and more recently by the Law for Not-for-Profit Associations and Foundations (LAFSL). The LAFSL was enacted in 1996 and its regulations implement a special legal regime for social organizations, defining their rights and responsibilities and also creating a government office as a sanctioning body.\nThe arrival of the FMLN government in 2009 opened channels for citizen participation, but CSOs in El Salvador failed to unify around a national agenda for the country's development, and there is still no policy in place to promote social organizations. In addition, despite the flaws in the government entity that oversees CSOs— primarily related to the bureaucratic procedures that it imposes— little has been done to improve or replace it. This has resulted in insufficient mechanisms for organized participation in decision-making.\n|Organizational Forms||National-level associations,\n|Registration Body||Ministry of Interior||Municipality|\n|Barriers to Entry||Vague grounds for denial,\nexcessive government discretion,\nlimited right to appeal,\nexcessive costs, delays in registration\n|Delays in registration process|\n|Barriers to Activities||None||None|\n|Barriers to Speech and/or Advocacy||None||None|\n|Barriers to International Contact||None||None|\n|Barriers to Resources||None||None|\n|Population||6,071,774 (2011 est.)|\n|Type of Government||Republic|\n|Life Expectancy at Birth||Male: 59.78 years\nFemale: 62.25 years (2011 est.)\n|Literacy Rate||Male: 70.16%\nFemale: 76.87% (2011 est.)\n|Religious Groups||Roman Catholic 57.1%, Protestant 21.2 %, Jehovah's Witnesses 1.9%, Mormon 0.7%, other religions 2.3%, none 16.8% (2003 est.)|\n|Ethnic Groups||Mestizo 90%, White 9%, Amerindian 1%|\n|GDP per capita||$7,600 (2011 est.)|\nSource: CIA World Factbook\n|Ranking Body||Rank||Ranking Scale\n(best – worst possible)\n|UN Human Development Index||105 (2011)||1-182|\n|World Bank Rule of Law Index||22.7 (2010)||100-0|\n|World Bank Voice & Accountability Index||50.2 (2010)||100 – 0|\n|Transparency International||80 (2011)||1-180|\n|Freedom House: Freedom in the World||Status: Free\nPolitical Rights: 2\nCivil Liberties: 3\n|Free/Partly Free/Not Free\n1 – 7\n1 – 7\n|Foreign Policy: Failed States Index\n||Rank: 93 (2012)\nInternational and Regional Human Rights Agreements\n|Key International Agreements||Ratification*||Year|\n|International Covenant on Civil and Political Rights (ICCPR)||Yes||1979|\n|Optional Protocol to ICCPR (ICCPR-OP1)||Yes||1995|\n|International Covenant on Economic, Social, and Cultural Rights (ICESCR)||Yes||1979|\n|Optional Protocol to ICESCR (OP-ICESCR)||No||--|\n|International Convention on the Elimination of All Forms of Racial Discrimination (ICERD)||Yes||1979|\n|Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW)||Yes||1981|\n|Optional Protocol to the Convention on the Elimination of Discrimination Against Women||No||--|\n|Convention on the Rights of the Child (CRC)||Yes||1990|\n|International Convention on the Protection of the Rights of All Migrant Workers and Members of their Families (ICRMW)||Yes||2003|\n|Convention on the Rights of Persons with Disabilities (CRPD)||Yes||2007|\n|Organization of American States (OAS)||Yes||1950|\n|American Convention on Human Rights (ACHR)||Yes||1978|\n* Category includes ratification, accession, or succession to the treaty\nEl Salvador is a unitary state that follows the civil law tradition. The Constitution, as the supreme law of the land, regulates the rights and duties of all of the country’s inhabitants. It protects the rights to freedom of expression and thought, as well as the freedom of association.\nArticle 7 of the Constitution states that:\nThe inhabitants of El Salvador have the right to associate freely and to meet peacefully, without arms, for any lawful purpose. Nobody shall be obligated to belong to an association.\nA person shall not be limited or impeded from the exercise of any licit activity because he does not belong to an association.\nThe existence of armed groups of a political, religious or guild character is prohibited.\nAccording to Article 240(5) of the Constitution, municipalities may approve of the formation of community associations through the authority vested to them to enact local ordinances and regulations.\nSecondary legislation regulates the scope of the rights articulated in the Constitution.\nNational Laws and Regulations Affecting Sector\nTwo systems govern the establishment and operations of CSOs in El Salvador. The first system is the 1996 national-level Law for Not-for-Profit Associations and Foundations [Ley de Asociaciones y Fundaciones sin Fines de Lucro] (LAFSFL), which regulates the establishment, operation, and dissolution of CSOs.\nThe second system governs at the local level and is regulated through the Municipal Code and municipal ordinances issued by each of the country’s 262 municipalities. The goal of the local-level regulation is to promote effective CSO engagement at the local level to address public policy priorities. According to Article 118 of Title IX of the Municipal Code, “Municipal governments are obligated to promote citizen participation, provide public information on municipal management, address matters that residents may request, and those that the Council considers convenient.”\nPending NGO Legislative / Regulatory Initiatives\nPlease help keep us informed; if you are aware of pending initiatives, write to ICNL at [email protected].\nThe Law for Not-for-Profit Associations and Foundations (LAFSFL) addresses two categories of CSOs (Article 1), which may be domestic or foreign (Article 44). The first category of CSOs is the association, a private legal entity formed by two or more natural or legal persons for the ongoing pursuit of any legal not-for-profit activity (Articles 9 and 11). These entities are formally established by means of a public deed from the founding members and are governed by internal by-laws. Their members may be natural or legal persons, whether national or foreign, although the latter must reside in the country (Article 12). The statutes of the association establish the rights and obligations of members within the organization and conditions of membership (Article 14).\nUnder the LAFSFL, federations and confederations, which are made up of legal persons, are also recognized associations (Article 17). As of 2011, the Ministry of Interior reports 15 registered federations and confederations.\nThe second category of CSOs under the LAFSFL is the foundation, which is established by one or more natural or legal persons for the administration of capital intended for purposes of public service (Article 18). A foundation is a non-membership organization, which may be established by nationals or foreigners. An endowment and operating funds are required at the time of establishment (Article 22). The establishment of a foundation is formally recognized in a public instrument or will (Article 19). Foundations are governed by their internal by-laws (Article 23).\nFor both associations and foundations, legal personality is obtained by registering with the Ministry of Interior (Article 26).\nThe Municipal Code (MC) provides two additional categories of CSOs at the local level: municipal associations and community associations. Municipal associations are attached to the municipalities that create them (MC, Article 12). Legal personality is conferred by the municipality in the articles of incorporation.\nThe community association is formed by local residents who come together to address their common needs (MC, Article 118). Community associations must have at least 25 members (MC, Article 120). A decision by a special general assembly is required for their establishment and the relevant municipal council confers legal personality on the association (MC, Article 119).\nChurches do not fall under the application of the LAFSFL (LAFSFL, Article 10), but instead are governed by Title 30 of the Civil Code. Trade unions are regulated under the Labor Code. Neither churches nor trade unions will be examined in the remainder of this report.\nPublic Benefit Status\nSubject to prior certification by the General Directorate of Internal Taxes under the Ministry of the Treasury, associations and foundations can be declared as public interest entities, and therefore be exempt from paying income taxes. This benefit, which virtually all CSOs request, is regulated by the LAFSFL (Articles 6 and 7) and the Income Tax Law (Article 6). The requirements for obtaining public benefit status are set out in the Income Tax Law (Article 7). CSOs established for the purposes of social assistance, the promotion of road construction, charity, education and instruction, and cultural, scientific, literary, artistic, political and sports activities, as well as trade associations and unions, are eligible to receive the certification, as long as their income and assets are used solely to fulfill the institution’s purpose and are not distributed among members (Income Tax Law, Article 6). In practice, however, the process of obtaining this status is lengthy and bureaucratic. Furthermore, a designation as a public interest entity does not exempt the CSO from complying with other formal obligations, such as the submission of reports and other documentation requested by the tax authority.\nThe authorization for public interest status is granted for one year and may be renewed automatically absent a notice of revocation from the tax authority. The public interest designation may be revoked at any time if the grounds on which it was granted cease to exist (LAFSFL, Article 7). Neither the LAFSFL nor the tax laws outline a specific procedure for revocation of eligibility and there are no known cases of revocation.\nBarriers to Entry\nVague Grounds for Denial: Under the LAFSL, the Registry of Not-for-Profit Associations and Foundations (RAF) has the power to deny registration if a CSO’s objectives are contrary to “public order, morals, and good customs.” Such vague terminology invites the exercise of subjective governmental discretion and the RAF is able to impede or delay the establishment and registration of CSOs because those terms have never been clarified. The Constitutional Chamber of the Supreme Court of Justice has, however, ruled unconstitutional the RAF’s refusal to register an association that advocates for the rights of transvestite homosexuals on the grounds that its purposes were contrary to morals and good conduct.\nRAF Exceeding its Authority: The RAF exceeds its authority when it processes CSO registration requests by conducting subjective assessments on all applications in coordination with the line ministry or other public entity responsible for the field of activities of the CSO in question. Moreover, the RAF empowers the ministry or public entity to raise objections to the CSO’s by-laws or other founding documents, and to insist that the CSO modify those documents. While the RAF will not compel changes to the substance of the by-laws, it does make recommendations on the form and style of the documents, which can be burdensome on applicants. The Registry may, for instance, demand further information if the aims set out in the CSO’s by-laws are too general or lack specificity and may require information relating to the origin, allocation, and use of funds for the projects to be implemented. The establishment of requirements beyond those provided in the law is arbitrary and creates a situation of legal uncertainty.\nMinistry of Interior as Final Arbiter: In cases of outright refusal of registration, Article 51 of the LAFSFL provides the right to an administrative appeal. Within three business days of the notification of refusal, the applicant may file a petition for review to the Ministry of Interior, which must decide on the petition within fifteen working days. The Ministry’s decision is final.\nExcessive Costs. There are a number of expenses associated with the registration of a CSO. First, the LAFSFL sets a fixed registration fee of approximately $35 (LAFSFL, Article 69). In addition, a CSO must pay for the following: a notary public who writes the CSO’s constitution for between $300 to $600 (although sometimes this is done for free); an auditor who certifies the CSO’s initial balance, which costs $30; the publication of the CSO’s articles of incorporation in the Official Journal with the price determined by the number of items contained (30 items cost approximately $85); and the order or decree that grants legal personality, which costs on average $30. Altogether, establishing a CSO may cost between $500 and $800.\nNon-adherence to Time Limits. At the time of registration, a written request to be entered into the Registry is submitted for the consideration of the Directorate General of the RAF. It must be accompanied by three copies of the public instrument recording the articles of incorporation and by-laws, the election of the first board of directors or governing board, and other documentation (LAFSFL, Article 65). Should the Registry find that the request contains information that is inadequate, incomplete, formally flawed or in violation of the law, it must notify the organization no more than 90 working days from the date the documentation was received, specifying the errors or violations, and advising the organization to correct them. However, this time period is not always adhered to in practice.\nDelayed Registration at Municipal Level. The Municipal Council must issue a decision approving or rejecting the registration of a community association no later than 15 days following submission of the request. The Council shall verify that the by-laws submitted include the provisions required by the Municipal Code and that they do not contravene any law or ordinance. In case of an objection, the applicant will be notified and will be given a period of 15 days from the date of the notification in which to correct it. Once any objections have been addressed, the Council must issue a decision within 15 days from the date of the new request. Should the Council fail to issue a decision within the 15-day time frame, the association’s legal personality will be automatically recognized, as mandated by law, with its by-laws approved and registered accordingly. The Council will be obligated to enter the association’s registration and immediately order the publication of the approval and the by-laws in the Official Gazette. This compulsory registration is not always observed, however, and some municipalities delay registration. In practice, the registration of community associations with the municipality is less than systematic or standardized.\nBarriers to Operational Activity\nThe law does not prohibit unregistered groups from forming and operating; they must only have legal aims. The Criminal Code provides penalties for associations established for the pursuit of an illicit aim.\nBarriers to Speech / Advocacy\nCSOs are free to criticize the government and advocate for causes that differ from the government’s views. Restrictions on freedom of expression relate to the crimes of defamation, injury and slander, which safeguard other basic rights.\nThe government created the Economic and Social Council, an advisory body under the Executive Branch made up of key sectors of Salvadoran society such as entrepreneurs, social movements, governments, and academia (universities and think-tanks). This Council examines issues of national relevance such as public security, transparency, the fiscal pact, and social development. According to some observers, while the Council has created opportunities for dialogue on key public policy issues, the process for selecting participants has not been informed by transparent criteria, which has led to criticism of its representativeness. As for the selection of CSOs to the Council, there is no generally established legal procedure and in large measure the decision is left to the discretion of government officials.\nBarriers to International Contact\nThe LAFSL governs the registration and incorporation of foreign CSOs and grants them the same rights as Salvadoran CSOs (Article 44). The operations of foreign entities are approved as long as their purposes are lawful, but they are explicitly prohibited from participating in political activities (LAFSFL, Articles 44 and 47). “Political activities” is not defined in the LAFSL.\nBarriers to Resources\nCSOs may participate in any legal activity, whether commercial or economic, related to their purposes or aims. The only limitation is that the funds obtained must be used for the institution itself and not the direct enrichment of its members, founders, and administrators (LAFSFL, Article 9). There are no special rules restricting the ability of CSOs to obtain and manage foreign funds.\nThe law does not establish explicit criteria for certifying public interest status, although it can be inferred that the process includes an examination of the supporting documentation provided with the request. Nonetheless, the law does not specify the criteria that the tax authority will use to certify that any such requirements have been met. This ambiguity leaves room for arbitrary interpretation. The regulations provide no procedure or administrative remedy if a request for certification as a public interest entity is denied, which leaves no other option than protracted and costly legal processes.\n|UN Universal Periodic Review Reports||7th Session 2010|\n|Reports of UN Special Rapporteurs|\n|USIG (United States International Grantmaking) Country Notes||\n|U.S. State Department|\n|Failed States Index Reports||Foreign Policy: Failed States Index 2012|\n|IMF Country Reports||El Salvador and the IMF|\n|International Commission of Jurists||Not available|\n|International Center for Not-for-Profit Law Online Library|\nWhile we aim to maintain information that is as current as possible, we realize that situations can rapidly change. If you are aware of any additional information or inaccuracies on this page, please keep us informed; write to ICNL at [email protected].\nEl Salvador one of only ten states to have ratified the Protocol to the International Covenant on Civil and Political Rights (January 2013)\nPeople who have their economic, social and cultural rights routinely trampled on are set to gain a fresh route to justice via the UN - but once in force it will only immediately apply to citizens of 10 nations. The new complaints mechanism, established by the Optional Protocol to the International Covenant on Economic, Social and Cultural rights (the Protocol), will allow individuals and groups to seek justice from the UN if their rights - including adequate housing, food, water, sanitation, health, work, social security and education - are violated and their government fails to provide justice. The ten states that have ratified so far are Argentina, Bolivia, Bosnia & Herzegovina, Ecuador, El Salvador, Mongolia, Portugal, Slovakia, Spain and Uruguay.\nDr. Tillemann travels to Peru and El Salvador (October 2012)\nOn October 18, Dr. Tomicah Tillemann, Senior Advisor for Civil Society and Emerging Democracies, traveled to San Salvador, El Salvador to meet with government and civil society leaders in preparation for El Salvador’s upcoming presidency of the Community of Democracies (CD). The Community of Democracies is an intergovernmental organization of democracies and democratizing countries established in 2000 with a stated commitment to strengthening and deepening democratic norms and practices worldwide.\nCSOs petition to halt REDD program (August 2012)\nCivil society organizations are asking the World Bank to reject the Salvadoran government’s proposal to join a program for reducing greenhouse gas emissions linked to deforestation on the argument that it will actually harm the environment. They argue that, beyond the praiseworthy aim of preserving forests in developing countries, the mechanism does nothing to enforce reduction of greenhouse gas emissions by the industrialised countries that are the prime causes of the pollution. According to the UN-REDD program’s website, it is “an effort to create financial value for the carbon stored in forests, offering incentives for developing countries to reduce emissions from forested lands and invest in low-carbon paths to sustainable development.\nCivil society speaks out on constitutional crisis (July 2012)\nCivil society in El Salvador has been critical of the National Assembly and its refusal to acknowledge the rulings of the Constitutional Chamber. Currently there is a dispute about who has the last word when there is a constitutional issue. El Salvador's Constitution appears to give that power specifically to the Constitutional Chamber, but the National Assembly has refused to accept this interpretation. As a result, there are now two sets of judges in the country each claiming to be the Supreme Court.\nTrade unionists denounce persecution in El Salvador (June 2012)\nPersecution of trade unionists remains a problem in El Salvador, in spite of the fact that the country is governed by a left-wing party that advocates labour rights, union leaders say.\nProgress can prevail in El Salvador (May 2012)\nEl Salvador is suffering under extraordinary levels of violence fueled by economic desperation, arms supply, organized crime, gang violence, state sponsored violence, banditry, and domestic violence. The companion paper Violence and Poverty Entangled in El Salvador describes these in detail. This paper sets out to suggest simple outlines of solutions, applaud positive developments, and bring models of success from other international development frontiers.\nLegislative blunders and expectations in El Salvador (May 2012)\nEl Salvador has undergone various political events in the past couple of months. Political drama and institutional bickering have been present in daily news. For one, the legislative and municipal elections that took place this past March were fair and clean, while the same cannot be said about other countries in the region—namely Nicaragua. The outcome of El Salvador’s election results was bleak for the ruling Frente Farabundo Martí para la Liberación Nacional (Farabundo Martí Liberation Front, or FMLN) party; FMLN’s largest loss was in the country’s most populous and important municipalities.\nThe foregoing information was collected by the ICNL NGO Law Monitor partner organization in El Salvador."
] | [
"<urn:uuid:1d0c45fc-9796-4eca-9400-7300a176c2be>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.icnl.org/research/monitor/elsalvador.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704658856/warc/CC-MAIN-20130516114418-00056-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9206995964050293
] | [
4871
] | [
2.53125
] | [
3
] |
[
"Since post MBA entrance exams, most of IIMs and Top MBA Institutes are conducting WAT ( Written Abiity Test ) to check language skills which can't be developed overnight hence, practice matters a lot.\nPlease read following topic on WAT and develop your own skills : The Best way to predict your Future is to create it\nThe future is in the now, it’s here. The seed of what transpires at some given point of time in the future is really planted in what one does in the present. Though there is an element of uncertainty associated with events of the future, to a large extent, how you act in the present defines how your future shall be. Therefore, the saying ‘the best way to predict your future is to create it’ holds true.\nIt is a fact that life is uncertain. Nobody can predict with surety what is going to happen few years down the line. It is also life’s unwritten principle that one is constantly engaged in securing one’s future, that all of man’s actions are geared up towards achieving something in the distant future. With this in mind, people work hard with determination in the hope that with their hard work, determination, and a bit of luck, they will be able to eliminate some of the uncertainty and, in fact, be the masters of their future.\nThe first thing one needs to do to create one’s future the way one desires is to not procrastinate. One common trait in all successful people is that they do not procrastinate. For them, each second is an opportunity waiting to be grabbed. In this highly competitive world, an opportunity lost is somebody else’s gain.\nThe Indian business tycoon Ratan Tata is a fine example of a man who created a marvellous future and made the Tata Group a brand to reckon with internationally. During his 21 years at the helm of the Tata Group, revenues grew over 40 times and profit, over 50 times. Steve Jobs, Mark Zuckerberg, Indra Nooyi, Oprah Winfrey and the like, are examples of people, who have held on to their dreams and charted their own path.\nPeople who create their own futures take responsibility and hold themselves accountable for their actions. For them, failure is a stepping stone to success and provides motivation to work with extra vigour. Their persistence and commitment to their dreams is what sets them apart from ordinary people. Former US President, Abraham Lincoln, for instance, one of the most successful and popular leader responsible for playing a defining role in the abolishment of slavery in US, had to face several failures along the way. But his never gave up and learned his lessons from life to become successful.\nIt is important to get rid of the sloth and start right away. Laziness is the precursor to failures and disappointments. One needs to realise that one needs to be an active participant in steering one’s life in the right direction. To stay ahead of the competition, one needs to set up a plan and work diligently towards achieving it.\nThe foundation of the future is laid in the present. Instead of worrying about what will happen in the future, take control of your future in your hands and make it count.\nLatest Wat Topics\n|Education costs money, but then so does ignorance||All the world is a laboratory to the inquiring mind|\n|Maintaining a winning attitude is crucial||I Am Honest|\n|Attitude is crucial for all actions||Application of knowledge is crucial|"
] | [
"<urn:uuid:dbb4d688-12a0-45da-880b-0b915e2bf24b>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.mbarendezvous.com/wat/best-way-to-predict-your-future-is-to-create-it/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145869.83/warc/CC-MAIN-20200224010150-20200224040150-00504.warc.gz"
] | [
"en"
] | [
0.9580940008163452
] | [
724
] | [
2.578125
] | [
3
] |
[
"- Elephant ranges throughout Africa and Asia are increasingly coming into contact with human settlements, leading to the Human-Elephant Conflict (HEC). Each year HEC poses a grave threat to both humans and elephants.\n- Rapid human population growth and development has fragmented many elephant habitats; thereby compressing populations into a smaller areas. Due to the large dietary requirements of elephants, the fragmented habitats may become over-exploited and damaged.\n- Habitat fragmentation reduces breeding opportunity thus decreasing populations and limiting genetic variability.\n- As the human and elephant populations grow closer together in proximity, there are increased occurrences of crop raiding by elephants. Crops provide a dense amount of food in one area and are convenient for elephants. An elephant herd can satisfy all of its dietary requirements for 24 hours by spending just seven or eight hours in a cultivated field.\nAn adult male Asian elephant entering a village in Nepal\nforaging for food.\n- Many field owners can lose an entire year's crop in just one night of these raids in addition to risking starvation for themselves and their families. A herd of 20 elephants can eat and trample down two hectares (five acres) of crops in a single night. Commercial agricultural crops, such as oil palm and rubber, can net millions of dollars in losses annually.\n- There has been significant debate in regards to woodland destruction by elephants. Elephants debark and push over trees for feeding and strength trials. Damaged trees may be susceptible to wood-boring insects and fungi, as well as wind and brushfire damage. There is no consensus as to whether elephant feeding is the sole cause of woodland damage. Other factors such as a rising water table, causing increased soil salinity may result in difficulty for tree roots to absorb water. Additionally, there is evidence that fire caused by drought significantly alters trees' propagation. Therefore the challenge of tree regeneration may not be directly attributed to elephant feeding habits. There is argument not only about what causes woodland damage, but how to solve it and whether or not it is a part of natural elephant vegetation cycles.\nContaminated Water Sources\n- Due to the increasing number of elephant populations in increasingly smaller areas, many elephant populations share limited resources. Overcrowding can lead to contamination of water resources and increased occurrences of parasitic diseases.\n- Culling is the legalized killing of an animal and is a controversial and debated topic. Due to habitat fragmentation, there are increased numbers of elephants in smaller spaces of land; thereby contributing to over-exploitation of natural resources in the area. Elephant culling has been used in areas where there are too many elephants for the habitat to support. Comparisons have been drawn between culling and legal hunting measures that are taken to manage deer overpopulation.\n- Deer, like many animals, if they overpopulate have to go further to search for food. These searches often lead them into cities and highways, which may increase human-conflicts and/or getting injured by vehicles. Legal hunting is a preventative measure that averts deer from becoming overpopulated and reduces instances of starvation and injuries.\n- Overall, African elephant populations are classified as threatened. The justification for culling is generally that the number of individuals has surpassed the habitat's carrying capacity (the amount of available resources that a habitat has to sustain life). Culling is not an indication of the overall conservation status of a species.\n- Entire populations are generally culled within minutes, in order to reduce distress on other herds in the area, prevent abandoned offspring, and minimize trauma.\nRefer to poaching repercussions.\nRefer to poaching repercussions."
] | [
"<urn:uuid:ad3fce3e-f8d5-4525-a251-e3a8ba850d5e>"
] | [
"CC-MAIN-2014-10"
] | [
"http://seaworld.org/en/animal-info/animal-infobooks/elephants/longevity-and-causes-of-death/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999678747/warc/CC-MAIN-20140305060758-00088-ip-10-183-142-35.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9438220858573914
] | [
731
] | [
3.796875
] | [
4
] |
[
"The Chinese society has been shaped over the years by Confucianism and then communism and now by making money. Status (Diwali) is the new all-important thing in China. But hey, China is a quite diverse society and the Chinese are such a diverse group of people. The value, attitude and feeling vary from group to group, region to region and individual to individual are hence pretty hard to make generalizations. The Chinese society has undergone metamorphosis through the years with rapid changes in the daily and economic life, especially in the past decade.\nChina is the largest society and second largest economy in the world, and it’s united by a set of institutions and values that cut across the vast linguistic, sub-cultural and environmental diversity. Residents of the northern and southern regions enjoy making a living from each other’s land. They enjoy each other’s favorite foods despite not understanding each other’s language. Although they at times describe each other with derogatory stereotype they understand that they are the same society and quite different from Koreans or even Vietnamese.\nSince the twentieth Century, the Chinese society has been a subject of a revolution intended to change it in significant ways. During its more radical phase including the Great Leap forward in 1958-60 and the Cultural Revolution in1966-79, it focused more on transforming everything from family life to medicine practice and higher education. The Chinese leaders and intellectuals were not yet satisfied and in the 80s they had more intention of transforming it further into a modernized country.\nConformity and Individualism\nConformity is such a strong force in China and going against the grain is gravely discouraged and to be labeled differently can be quite insulting. Many Chinese people fear exclusion from society or group. They have developed a high sense of an “in-group” or “out-group” and are more likely to do things with friends rather than strangers, unlike westerners. They can be quite rude to people they are not acquainted with. In China, it’s more about maintenance of appearance rather a self expression.\nChina is a collective society and stresses more on contexts and relations. Unlike westerners who would prefer their privacy, the Chinese put more value on their importance and skills in a group. The do value their roots in Confucianism, which puts more emphasis on propriety and harmony. They would argue that relationships are the key to happiness and most people with social networks and friends easily find success in their lives and people with less or zero social bonds tend to face depression and even contemplate suicide.\nThe Chinese society is quite mistrusting due to the immaturity of the market economy and its reiteration on making just money above anything else, the Cultural Revolution and other political and social upheavals which undermined the traditional moral codes, relationship, and Confucian bonds and also a lack of religion and a fair justice system. Since the transformation of the market economy, China has become very competitive, and people would do anything to get the edge. For instance people with connections can easily ignore the rules or skirt them and those without are easily trampled upon.\nRarely would you find the Chinese alone, they walk in crowds, enjoy traveling in groups and keep their home doors very open. They prefer living in proximity to their neighbors without facing significant friction. It is hard to find personal space in China and the privacy concept is more of a state of mind than a condition of being alone. They do not understand the desire of some westerners to be alone and easily interpret it as being arrogant. They were taught by communists to share everything and to eschew secretes. The adaptation of privacy is just a new concept borrowed from the West.\nChinese Economic Society\nIn China, the conversations majorly focus on what they can do to “upgrade and the GDP. In the past, the GDP was kept stable to a large extent by the strength in “made in China” exports. With the progressing industrial society and the opening of their market, they are moving towards developing service-led economy although it still heavily relies on physical labor and infrastructure and people love to work in China.\nChina is also technologically transforming, and it’s now a more technologically connected society than before. There has been such a rapid growth of mobile purchases from almost non-existent in 2009 to commonplace in 2015.China faces the challenge of intellectual property and as a signatory of WTO they are obliged to manage violation of IP and digital providers such as Tencent, Sina and Netease have been asked to take down pirated content since international collaboration and investment largely depends on observing the rules.\nDigital technologies have substantially transformed the relationship between creativity, innovation, and culture with companies such as Baidu, Alibaba, and Tencent taking center-stage. These technologies are changing the people’s way of interaction with information and also the Chinese society and culture.\nThe Chinese Way of Money\nIn the Chinese culture, saving money is just as important as saving face. The Chinese have such a profound saving culture than they Western counterparts. Most of the Chinese appear to be born with the saving culture since children are encouraged from their early ages to put their pocket money in their piggy banks. They grow up with principles such as:\n1. Being frugal is a virtue\nFrugality never started with as a communist propaganda but a concept that has been taught for thousands of years. Dao De Jing, the classic Chinese text states that the three greatest treasures one can ever have are generosity, love and frugality. Frugality is quite an integral part of Chinese culture.\n2. Save as much as possible.\nAccording to a 2006 CNN article, the personal saving of Chinese household is 30% while their American counterparts dipped into their savings. They Chinese have a significant saving culture, and they save up to 50-60% of their income which is quite normal. They give the impression that they are always living for the future.\n3. Pay for things in Cash\nCredit cards are a fairly new thing in China and most people prefer to pay in cash. The Chinese people are wary of debt and they even pay for huge purchases such as houses in cash. The issue of mortgage in China is just trying to pick up.\n4. Bargaining is a must.\nIn China, haggling is the way of life. You always have to ask for at least 50% off the asked price. The Chinese people haggle till it hurts and that behavior earned the cheapskate stereotype.\n5. Your salary is not a secret\nDiscussing one’s salary isn’t prying into somebody’s personal space or even show off but a way of knowing one another. The conversation turns out to be of great help since you might get more advice on how to secure more, invest or save.\n6. Cash gifts are just perfect\nThe Chinese people love money and giving them cash gift is a savior since they will just have more to save. Unlike the Westerners, who consider cashing a less common or less appreciated gift, the Chinese love cash gifts even with the Red envelopes being the standard gifts in China.\nChina has had quite dramatic changes in the last three decades economically, culturally, politically, technologically and even socially. The society has evolved, adapted some western practices and the modern culture has become quite materialistic, putting more value on money than before. It is more of a “money defines you” kind of scenario. In the Chinese society, they truly worship two things: tradition and money. The two are mutually reinforcing paradigms in the Chinese world, and they live and die by them.\n- Lucrative Freelancing Jobs in China (a Complete Guide) - October 1, 2022\n- 5 Recruitment Tips for Hiring During and After the Pandemic - May 20, 2022\n- The Most Demanded Careers for Americans in China - November 27, 2021"
] | [
"<urn:uuid:0a1ee2d0-9691-4e70-a206-5e0a098cb116>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.laowaicareer.com/blog/rolling-deep-chinese-society-money/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00562.warc.gz"
] | [
"en"
] | [
0.96522456407547
] | [
1633
] | [
3.109375
] | [
3
] |
[
"Taking Medications CorrectlyPosted November 26, 2019 in Personal\nAll medications come with directions from the manufacturer, and you need to make sure you follow them carefully.\nBoth over-the-counter and prescription medications can play an important role in your everyday health. However, they can also delay your treatment or even worsen your symptoms if they aren’t used properly.\nAll medications come with directions from the manufacturer, and you need to make sure you follow them carefully. This is especially true for prescription medications, as doctors specifically tailor their dosage and interaction with other chemicals to fit your physical characteristics and medical history.\nHere are some guidelines for taking medications:\n– Be honest about all over-the-counter and prescription medications you’re taking when speaking to a health care professional. Doctors have to account for interactions between medications and other chemicals in order to ensure that a prescription is safe.\n– Make a schedule for your medications or include them in your daily routine so you don’t accidentally miss a dose. If you do happen to miss a dose, never attempt to get back on schedule by “doubling up” on the medication later.\n– Always take the recommended dose of a medication for as long as it’s prescribed to you. Even if you feel better before you finish taking a medication, you may not be fully treated.\n– Don’t be afraid to talk to your doctor. If you’re experiencing negative side effects from your medication or if you’re having trouble following a medication’s directions, your doctor can makes changes to your prescription or dosage in order to best suit your needs.\nHealth and wellness tips brought to you by the insurance professionals at The Hull Group.\n© 2019 Zywave, Inc. All rights reserved."
] | [
"<urn:uuid:5d32333e-34b6-473d-9a69-6a956d8b4ae6>"
] | [
"CC-MAIN-2020-05"
] | [
"https://thehullgroup.com/taking-medications-correctly/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607118.51/warc/CC-MAIN-20200122131612-20200122160612-00287.warc.gz"
] | [
"en"
] | [
0.9344117045402527
] | [
367
] | [
2.703125
] | [
3
] |
[
"Women who had breast reconstruction surgery in European and Latin American countries using the PIP (Poly Implant Prostheses) silicone breast implant are urged to have the implant evaluated by a doctor.\nThe implants, made by a French company that's now out of business, carry the brand names PIP implant or M implant. The implants were taken off the market in 2010 when it was discovered that they had a very high rupture rate and were made with an industrial-grade silicone gel instead of the recommended surgical-grade gel. The implants were not marketed or used in the United States, but they were used in hundreds of thousands of women in Europe and in Latin America.\nHealth authorities in some European countries such as France, Germany, and the Netherlands have recommended that women with PIP implants have them removed to minimize any health risks, even if no problems are found by the doctor evaluating the implants. Some of the governments even have agreed to pay for the implant removal and reconstruction with a new implant. Other countries, such as Britain, Brazil, and Mexico, have recommended that the implant and breast be checked by a doctor and removal be considered if any specific problems are found.\nAbout 75% of women who have mastectomy to treat breast cancer go on to have one or both breasts reconstructed. There are many ways to reconstruct a breast. Tissue from the back, belly, or buttocks can be used to create a new breast. Saline or silicone gel implants are probably the most common choice. Saline and silicone gel implants are also used to improve breast size or appearance in healthy women.\nIn the late 1980s and early 1990s, doctors and women were concerned about possible links between certain health problems and silicone breast implants. Doctors thought the implants might increase the risk of inflammatory autoimmune diseases, such as arthritis and lupus, as well as breast cancer and other health problems. So since the late '80s, the U.S. Food and Drug Administration (FDA) has worked with implant manufacturers to monitor the experiences of women with silicone breast implants. In June 2011, the FDA released the results to date of the silicone implant monitoring program. The FDA found no evidence that silicone implants increase the risk of breast cancer or autoimmune diseases.\nStill, in early 2011, the FDA reported a possible link between breast implants -- saline or silicone -- and a very rare form of lymphoma, called anaplastic large-cell lymphoma (ALCL), in tissue near the implant. Lymphoma is cancer in the lymphatic system. The FDA emphasized that it's not clear if this possible link exists and that even if it does, the risk of breast ALCL in women with breast implants is still extremely low. Currently available FDA-approved breast implants are safe when used as recommended by the manufacturer. The FDA advised \"women with breast implants who are not showing any symptoms or problems, such as pain, lumps, swelling, or asymmetry, require only routine follow-up.\"\nThe PIP implants were a defective product and never approved by the FDA.\nIf you have a breast implant that was placed in the United States, the warning about PIP implants doesn't apply to you. But if you had breast reconstruction with a silicone implant outside of the United States, it's a good idea to talk to a doctor who can help you figure out if your implant is a PIP implant and can evaluate your implant's condition and the health of your breasts. It's good to know that the company that made these defective implants is now out of business. No matter what type of breast implant you have, never hesitate to call your doctor if you're concerned about the condition of your implant and the health of your breasts. Definitely call your doctor if you have symptoms or problems with your implant, such as pain, lumps, swelling, or asymmetry.\nIf you've been diagnosed with breast cancer and are considering reconstruction with an implant, you might want to ask your doctor about the FDA announcement on the possible link between implants and rare ALCL cancer. Still, know that the FDA doesn't think that this possible link should discourage women from implant reconstruction.\nVisit the Breastcancer.org Reconstruction pages to learn more about breast implant surgery and other breast reconstruction options."
] | [
"<urn:uuid:9bc6fb2a-60c6-48a0-bf00-eef6071a8b39>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.breastcancer.org/research-news/20120113"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046947/warc/CC-MAIN-20131204131726-00084-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9659140110015869
] | [
859
] | [
2.640625
] | [
3
] |
[
"If you're looking for a picture book that is not only visually interesting but also has a great message showing how diverse our communities can be, take a look at Say Hello by Rachel Isadora.\nCarmelita and her mother take their dog, Manny on a walk through their neighborhood. Each person they encounter speaks a different language and Carmelita greets each in their native voice: Spanish, Japanese, French, Italian and many more!\nThe text of this book is pretty simple and introduces children to many greetings from around the world. The images are wonderful collages and so engaging! There are store-fronts, restaurants, and a parks. You and your child could talk about all the different things you see on each page, and what types of things were used to make the images. You could also get a globe and show your child where each country/greeting is compared to your current location.\nWritten and Illustrated by Rachel Isadora: She received a Caldecott Honor for Ben's Trumpet and has written and illustrated numerous books for children, including Peekaboo Bedtime, the Lili at the Ballet series, and several classic tales set in Africa. She lives in New York City.\nSource disclosure: This book was sent to me from the Penguin Group unsolicited in hopes that it would be reviewed."
] | [
"<urn:uuid:2629f9bb-7f9f-485c-8298-74522ef7f55c>"
] | [
"CC-MAIN-2013-48"
] | [
"http://hollybooknotes.blogspot.com/2010/07/picture-book-thursday-say-hello-by.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164043900/warc/CC-MAIN-20131204133403-00028-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9753704071044922
] | [
275
] | [
2.65625
] | [
3
] |
[
"A is for:\nThe symptom of an abscess is swelling that occurs in the gums or lip. It usually is caused by an infection in a tooth or the bone around the tooth. Eventually it will ooze or release pus due to pressure. Causes are periodontal or gum infection, tooth decay that has gotten too deep, or trauma due to previous injury or excessive dental work.\nYou can tell when you have an abscess if you experience any swelling or the onset of a sore, dull, throbbing pain, even if it is not constant. If an abscess is not taken care of immediately, the swelling can get worse and seem to \"blow up\" fast enough to not only be a major inconvenience but actually dangerous, and in some cases life threatening.\nLike any abscess it can be drained and usually with the assistance of an antibiotic it can be controlled and reversed, usually as fast as it comes on. After the swelling goes down then the follow up care necessary can be done on a more routine basis.\nThe pain of an abscess is far worse than the discomfort or expense of visiting your dentist. To avoid any such events from catching you by surprise, it is advisable to get a complete dental exam every 1-2 years if you are an adult, depending on your situation.\nIf you are planning to go on a trip and haven't had a recent exam it is strongly recommended that you get things checked. Stress and altitude changes bring on abscesses that were before controlled and walled off by the body. Talking about ruining your trip, an abscess or tooth ache will certainly do that and more.\nSan Diego Cosmetic Dentist Offers\nEncinitas Holistic Dentistry\nLaser Dentistry and Restorative Dentistry\nholistic green cosmetic"
] | [
"<urn:uuid:6177f674-e677-4609-8aac-912991b66734>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.myholisticdentist.com/abcessed_tooth.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00034-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9476954340934753
] | [
365
] | [
2.734375
] | [
3
] |
[
"Particle Physics in the Czech Republic started in the early 1950s when three groups involved in cosmic ray research formed at Charles University, the Czech Technical University in Prague and in the newly established Czechoslovak Academy of Sciences. In the sixties, nuclear emulsions opened the way to bubble chamber and electronic experiments carried out at JINR Dubna and at CERN. Two of them were crucial for the formation of a whole generation of Czech particle physicists: the investigation of antiproton-proton collisions with the hydrogen bubble chamber LUDMILA at Serpukhov, and the NA4 experiment on deep inelastic muon-nucleon scattering at CERN, in which Czech physicists participated as part of the JINR Dubna group. In the 1980s, a strong team joined the H1 experiment at the HERA electron-proton collider at DESY and another team became involved - still as a part the Dubna group - in the DELPHI experiment at LEP.\nIn 1992 the Czech Republic joined CERN as a Member State, initially as a part of Czechoslovakia and since 1993 as an independent state. This was followed by a steady increase of the number of physicists and technicians working in particle physics and by a significant improvement of the basic infrastructure.\nShortly after the decision to build LHC, Czech physicists decided to join the ATLAS experiment. Later on Czech scientists also joined the ALICE and TOTEM experiments at the LHC.\nFor the LHC Computing Grid, Prague operates one of the Tier 2 Centers.\nThis page was last updated on 30 January, 2023\nIndustrial Liaison | Knowledge Transfer | Scientific Computing"
] | [
"<urn:uuid:e8476e87-932f-421e-b690-1d359bd05603>"
] | [
"CC-MAIN-2023-14"
] | [
"https://international-relations.web.cern.ch/stakeholder-relations/states/czech-republic"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00202.warc.gz"
] | [
"en"
] | [
0.9579631686210632
] | [
346
] | [
2.65625
] | [
3
] |
[
"You may want to build your own computer to play games, save money, serve your curiosity, or simply make a unique computer. Whatever the purpose of building your own computer, this is totally worth your time and effort. But what do you need to build a laptop from scratch? How long does it take to build a PC?\nYet, assembling a computer by yourself can be pretty tricky if you have not done it before. But it is not impossible. With our 11-step computer assembly instruction below, building a laptop from scratch is a breeze, even if you are a total beginner. Roll up your sleeves and read on to make your electronic lego.\nEnjoy DIY to make your own mark? Maybe you will love tinkering to create your signature symbols on your own body: DIY Tips On How To Do A Stick And Poke Tattoo On Your Own.\nWhy Should You Build A PC: A Comparison of Buying Vs. Build One\nBy and large, there are many advantages of a homebuilt computer. But make sure they work for you if you do not want to regret later your decision to build your own computer. Let’s take a look at the following table comparing the advantages and disadvantages of these 2 types of computers, then figure out the reasons for building a laptop from scratch on your own:\n|Prebuilt computer||Homebuilt computer|\n|Pros||– There are standards provided by the manufacturer, along with the calculations of expected performance for stable working.|\n– There are warranty policies from the manufacturer.\n– Be aesthetically pleasing and durable with optimal performance.\n– Has undergone a rigorous testing process for the quality and compatibility of its components before shipment.\n– Has built-in copyright Windows.\n|– You can easily upgrade your computer, replace parts to improve performance.|\n– You can choose your own components to best suit your purposes.\n– Cheaper long-term: Initially, building a PC is typically more expensive than buying a prebuilt system, yet it saves your money in the long run.\n– In some cases, you may ensure a faster speed than a prebuilt PC.\n– It is possible to overclock your computer to achieve higher speeds than your components can.\n– You can indulge your passion, the joy of picking parts then assembling them together to make a unique computer with your own identity.\n|Cons||– The price is relatively high in the long run. |\n– It is more challenging to upgrade individual components and find spare parts.\n– There is a limited number of available configurations that manufacturers have provided.\n|– You need to have the knowledge and experience to pick the right components. There will be no quality censorship.|\n|General assessment||Suitable for users:|\n– Who are not tech-savvy: They have little or not enough knowledge and experience to assemble their own computer.\n– Who prefer stability and warranties.\n|Suitable for users:|\n– Who are techies: They have knowledge, experience, and enthusiasm for technology, especially computers.\nHow Long Does It Take to Build A PC?\nFor beginner assemblers, it can be as long as 2 to 4 hours to complete a system. Some people even take 6 hours to complete this machine. This duration includes time for watching YouTube guides and carefully reading manuals.\nBut how long does it take to build a PC with help or experience? It will not take longer than an hour and a half, especially once you truly understand what you are doing. Some people do not even take more than 45 minutes to assemble a PC.\nYou can shorten the process considerably if you take the time to prepare by viewing Youtube tutorials and reading the instructions beforehand.\nWhat Equipment to Prepare? (With 2021 Price Range and Suggestions)\nComputer Case (or Cabinet)\nIt is the enclosure that protects the computer’s internal components and keeps them in a neat structure. Around $100 is the sweet spot for price-to-performance when it comes to purchasing a PC case.\nMotherboard (or Mainboard)\nThe motherboard connects the components of the computer you are assembling. Most of them would be attached or plugged in here.\nIn terms of price, do not puzzle “How much should I spend on a motherboard?” Maybe between $100 and $180 is fair. Overspending on a motherboard may prevent you from spending more on components that directly influence your performance, such as the CPU and the graphics card.\nTo clarify, CPU stands for Central Processing Unit. You will have to choose a CPU compatible with the motherboard, both in terms of manufacturer and socket.\nIn terms of price, around $150 – $200 is reasonable to invest in a CPU.\nRAM (Random Access Memory) is where data is stored as the processor needs it. You need to choose RAM compatible with the motherboard’s RAM slot.\nIf most of your computer time is to compose Word documents, your PC may not require a considerable amount of RAM. The standard 8 GB is enough. On the other hand, if you want to craft the best desktop gaming setup, a 16 GB, or possibly even 32 GB, will do fine. And, of course, more RAM is essential if you prefer to keep dozens of programs open at all times.\nDepending on your budget and needs, you can select between a HDD and a SSD. SSD is much faster than HDD, but HDD is cheaper and has more storage capacity.\nPSU (Power Supply Unit) supplies power to the computer and other components. So you need to connect the PSU to the motherboard, CPU, storage drives, and other additional details.\nPSU can range in price from $40 to $150. The lower end of this range will provide you with a decent supply for anything up to casual gaming. In contrast, you can opt for the high end for more serious rigs.\nMost CPUs come with a built-in graphics card to run common tasks. If you want to build a computer to play games with high-resolution graphics, play 4K UHD videos and movies smoothly, or edit graphics, you will need a discrete graphics card that plugs into the PCI-Express port on the motherboard.\nIn general, PSU’s reasonable price range is from $180 to $500. The $200 to $300 price range will maximize your hardware’s capabilities.\nIf you plan to build a huge gaming PC, run time-consuming tasks, or overclock, you should consider this cooler to improve the efficiency and stability of the system. A CPU cooler would lower CPU temperatures by drawing heat away from the system CPU and other components in the enclosure.\nA quiet CPU cooler can cost somewhere from $15 to more than $100, depending on your processor and how quiet and efficient you want the cooler to be.\nYou can add more hard drives or storage drives as long as the motherboard has enough SATA ports to fit.\nDVD or Blu-ray Drive\nThese days, few people use this drive as they can install Windows with USB, listen to music online, and watch movies on the web. However, having a DVD drive is also a bit more beneficial, such as playing game discs or copyrighted music discs and backing up files. By and large, it is up to you.\nOther Auxiliary Components\nThanks to the PCI-E, SATA, M2 ports on the motherboard, you can install additional CD drives, SD card readers, floppy drives, USB ports, sound cards,…\nBefore proceeding with the assembly, you need to determine a suitable and convenient assembly location. You then need to read the instructions carefully and prepare some essential tools. Building a laptop from scratch will require a lot of different tools that you need to prepare as follows:\n- A set of screwdrivers with different sizes.\n- Tweezers with curved ends and straight ends to pick up small components such as screws, chips and wriggle in narrow slots that cannot be done by hand.\n- Nylon cable ties to fix the wire bundles.\n- 1 USB, CD containing the Windows 10 installer.\n- Screen, keyboard, mouse, speaker for testing after installation.\n- A box or tray holding screws.\n11 Steps to Build a PC On Your Own\nStep 1: Install a CPU Onto the Motherboard – Put the Brain Into Your Computer\n- First, locate the CPU socket on the motherboard.\n- Next, gently unlock and lift the retention arm to open the socket’s levers.\n- The next stage is putting the CPU into the socket. Find the small icon or sign of an arrow to determine which way to install your CPU. Following direction determination, you need to locate pin 1 on the socket and the CPU. To clarify, pin 1 of the CPU is in a beveled corner of the CPU and is missing a pin. On the socket, the hole to plug the CPU into has a beveled corner. Based on pin 1’s location, install the CPU by gently placing the CPU series pins into the socket slots.\n- The final stage in this step is to lock the CPU socket by lowering the socket pin.\nNote: Avoid touching the top of the CPU (here is where your CPU cooler’s thermal paste is, so keep the surface as clean as possible).\nStep 2: Install Cooling Fan for CPU\n- Apply thermal paste to the face of the CPU and the underside of the cooling fan.\n- In the fan holder surrounding the socket on the mainboard, put the fan in. Gently press the fan into the bracket.\n- Plug the fan power into the CPU – FAN pin on the mainboard.\nStep 3: Install RAM on the Motherboard\n- From the RAM slot on the mainboard, you need to determine the correct type of RAM to use to ensure compatibility.\n- Once you already know where your RAM needs to go, open your RAM slots by pressing 2 small clips down.\n- RAM sticks have a gap in the connector to ensure you can only insert them one way. Therefore, line up your RAM so that the gap on the connector matches the RAM slot.\n- With your RAM lined up, gently press it down into the slot to insert the RAM. When you depress the RAM stick entirely, the locking tabs at each side will click back into place.\nStep 4: Insert the Power Supply Into the Case\n- Gently put the power into the case. Be careful to avoid colliding components on the mainboard.\n- Tighten the retaining screws.\nStep 5: Install the Mainboard Into the Case\n- Install I/O Shield (Metal Back Plate): If your motherboard comes with an unattached I/O shield – the metal plate with cutouts for the back connectors and ports, you have to make sure the I/O shield is inserted in the correct direction. I/O shields usually have sharp edges, so watch out for your fingers.\n- Double-check to ensure your cables are all threaded through to the correct location before placing the motherboard (align it with the I/O shield first). Mount the first screw (the center screw) with a Phillips #2 screwdriver to keep the motherboard in place. The number of screws required to mount the motherboard varies depending on the board. In general, a full-size ATX motherboard often takes 9 screws.\n- Fill all available screw holes.\n- Connect the motherboard to the power supply. There are 2 primary connections: An 8-pin CPU connector toward the top of the board and a 24-pin connector from the side.\nStep 6: Install the Hard Drive\n- On the available racks of the case, choose the right place to mount the hard drive and screw the screws on both sides to fix it.\n- Connect the data wire to the IDE and SATA hard terminals on the motherboard.\n- Connect the standard power cord to ATA or SATA on the hard drive.\nStep 7: Install the Optical Drive\n- Remove the plastic cover of the case.\n- Insert the optical drive gently and screw the screws on both sides to fix it.\n- Connect the data and power cables like with a hard drive.\nStep 8: Install Expansion Card\nTypically, the cards will slip right in. But you still need to make sure the notched edge of the mounting bracket slides down into the slot in the case. Sometimes, you need to give it a little push from the outside of the case. Once it is in place, secure it down.\nStep 9: Turn Signal Switch and Complete Wiring\n- MSG, PW LED, POWER LED… connect to the POWER LED wire – the green signal wire of the case.\n- HD, HDD LED connect to the HDD LED wire – the red signal wire indicating that the hard drive is accessing data.\n- PW, PW SW, POWER SW, POWER IN… connect to the POWER SW wire – the power switch wire on the case.\n- RES, RES SW, RESET SW… connect to RESET wire – the reset switch wire on Case.\n- SPEAKER connects to the SPEAKER wire – the signal wire of the speaker on the case.\nStep 10: Install Peripherals\n- Plug the data wire into the video card in the blue port.\n- Then plug the keyboard cord into the dark blue PS/2 port or USB, depending on the keyboard model.\n- Finally, plug the mouse cord into the dark blue PS/2 port or USB depending on the mouse type.\nStep 11: Start the Computer and Start Testing\nThus, you have completely assembled the computer’s components into the case. Do not rush to close the case, but double-check that the power cords, data wires,… are fastened.\nNext, press the “Power” button for the computer to start up and test.\nNote: The above is one of many ways to build a PC yourself. Some people will install the motherboard in the case first, but some choose to put the CPU and cooling fan into the motherboard first. Each order will have its own advantages and disadvantages, sometimes the case you choose will also affect this order.\nIn addition, you can refer to some other assembly methods as follows:\nHow Long Does It Take To Build A PC: Extra Tips and Notes\nIt would help if you take away Reddit’s tips on buying computer parts and installing PCs, with some of the common mistakes to avoid. In addition, we have compiled the 2 most basic notes when self-installing a PC as below:\nUsing Anti-static Bracelets\nElectrostatics can damage your computer hardware. To prevent electrostatic build-up, using anti-static bracelets is a solution. Although experienced builders usually do not need anti-static bracelets, we recommend using them if this is your first time assembling.\nEven when using a bracelet, you should still follow some basic principles. Surely, there will come a time when you have to repair or replace something on your PC without wearing an anti-static bracelet. Therefore, having a comprehensive understanding of the basics of electrostatics will keep you safe.\nExtra Tips to Prevent the Build-up of Electrostatics\nFirstly, place your PC set on a table with no carpet underneath, if possible. This will reduce the possibility of creating a static charge.\nSecondly, do not install the PC on dry days when there is the most static electricity in the air.\nThirdly, touch any metal part on the PC case before touching any components. A simple trick is to rest your arm on the metal case whenever possible.\nFinally, avoid delicate fabrics like silk, glide a wire or metal hanger between your clothing and your body to remove the electric charge. We recommend choosing cotton clothes when installing.\nNeat Cable Management\nThough cable management does not affect the performance, it is still necessary. Proper cable management will keep your PC tidy and good-looking, especially if you use a case with transparent side panels.\nNeat cable management also makes it easier to fix problems when something goes wrong. This step is critical when you have to stare at a machine filled with small computer components, wires, and screws.\nEnjoy the Unique Computer You Have Worked So Hard To Build!\nFinally you did it! It requires a great deal of patience, but it is a great way to spend a day (or a couple of days but it is worth it). No matter how long does it take to build a PC, I guess you had a great experience tinkering with and assembling every little detail. Congratulations on building your first PC, your first big-size lego!\nYou love Gossips and do not want to miss out on any? Check out all the latest updates at our Science section. Visit Jobandedu for more.\nAlso, don’t waste your free time. Instead, indulge in Netflix and Chill Alternatives to Spice Up Your Game Plus Movie Suggestions and Top 50 Fun Things To Do When You Are Bored."
] | [
"<urn:uuid:f72e3a3d-af08-448d-a93c-298b3a2644b1>"
] | [
"CC-MAIN-2023-14"
] | [
"https://jobandedu.com/science/how-long-does-it-take-to-build-a-pc/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949025.18/warc/CC-MAIN-20230329182643-20230329212643-00382.warc.gz"
] | [
"en"
] | [
0.9106561541557312
] | [
3528
] | [
2.65625
] | [
3
] |
[
"The power of (photonic) attraction\nPhotons—particles of light—are not known for their social behavior. Measurements show that even within a highly focused laser beam, it is each photon for itself. But Dr. Ofer Firstenberg, who recently joined the Weizmann Institute’s Department of Physics of Complex Systems, succeeded for the first time, together with his colleagues, to get photons to stick together to make “molecules of light.”\nDr. Firstenberg participated in the experiments that achieved this feat while conducting postdoctoral research at the Harvard Quantum Optics Center in Boston, where he was also a visiting scholar at MIT. He and his colleagues there created a special atmosphere in which photons could acquire mutual attraction: in this case, a thin, ultra-cold cloud of gas and several lasers.\nNow, in his Weizmann Institute lab, Dr. Firstenberg plans to build two experimental systems: One of them will be very cold; the other will work at room temperature. In both, his aim will be to not only create these special molecules of light, but to use them to explore basic properties of quantum physics—the realm in which light particles exist.\nDr. Firstenberg grew up in Rishon LeZion, not far from the Weizmann Institute. His love of physics, he says, comes from a high school teacher who received her degree from the Institute’s Department of Science Teaching, as well as his uncle, Dr. Udi Shafir, who received his PhD from the Institute (and is a visiting scientist this year in the lab of Dr. Barak Dayan).\nDr. Firstenberg completed his BSc in physics at the Hebrew University of Jerusalem within the army’s prestigious Talpiot program. He received his MSc and PhD in physics from the Technion-Israel Institute of Technology. Venturing into industry, he carried out his PhD research in the quantum optics lab at Rafael Advanced Defense Systems Ltd., under the co-supervision of Prof. Amiram Ron of the Technion and Prof. Nir Davidson of the Weizmann Institute, before heading off to Boston. He joined the Institute a year ago, and his wife Michal is a senior intern in the Department of Organic Chemistry. They have two daughters.\nToday, he is building experimental systems using two lasers. The first is relatively strong. It clears out a sort of “transparency tunnel” inside the otherwise very opaque gas. Then he shines a weak laser beam into the tunnel. This is made up of photons that are extremely sluggish: They move at about a millionth of the normal speed of light. And they interact with the gas atoms in the chamber: They hit these atoms and cause the electrons in them to get excited, jumping into orbits that are much larger than normal, so the atoms become thousands of times bigger than the same atom at rest. When the electrons in a pair of atoms are kicked into high orbit, they act like antennas, creating a force between them. This force becomes the power of attraction when it is transferred to the photons, and the two individual particles become a couple. The fact that such extraordinarily independent particles as photons can stick together has raised new questions that Dr. Firstenberg intends to explore. For example: How does the force that holds two photons together compare with the forces that exist within atoms or materials?\nWhat new physical phenomena can be observed by getting photons to interact with atoms and with one another? If the work in his lab is all about mutual attraction—in the atomic world—he takes the theme to heart at home. He and Michal are competitive ballroom dancers, and their forte is the Argentinian tango.\nDr. Ofer Firstenberg is supported by the late Leon and Blacky Broder, Switzerland, and the Sir Charles Clore Research Prize."
] | [
"<urn:uuid:b51e3c72-63c2-40c5-8e23-2a23c6a2fe6a>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.weizmann.ac.il/pages/home/dr-ofer-firstenberg"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322275.28/warc/CC-MAIN-20170628014207-20170628034207-00517.warc.gz"
] | [
"en"
] | [
0.9643806219100952
] | [
791
] | [
2.765625
] | [
3
] |
[
"It uses laser operating in the infrared optical band to communicate digital data through free space. Laser is the acronym for light amplification by stimulated emission of radiation.\nCompared to light emitting-diode (LED) technology, laser communication is more robust and can travel longer distances. This is because laser has high coherence and collimating characteristics, which mean that the signal is more focussed on its target and less subject to signal spreading.\nFSO systems support all types of data transmission including voice and video. It is typically used for short-haul bandwidth-intensive applications where cable systems are not available or too costly to implement.\nWhile the technology has been around for some time, its application in South Africa was limited to connecting buildings on the same site because of South Africa’s “closed sky” policy which only allowed Telkom to provide communication crossing public spaces. This changed when the then Minister of Communication, the late Dr. Ivy Matsepe-Casaburri relaxed the telecommunications policy in the late 1990s.\nFSO systems are increasingly deployed in local loop applications as alternatives to radio frequency (RF)-based systems. Because SFO technology supports much higher data rate than RF-based systems, it is often used in the extension of optic fibre circuits. Systems are available to cover up to 4,4 km, but are typically deployed at distances of 100 m to 1km to provide robust high availability connectivity.\nA FSO transceiver can consist of one or multiple laser transmitters and optical receivers. Once the transmitter and receiver pair is aligned, a full duplex data communication link is established. A laser beam has a Gaussian profile with most of the optical energy concentrated in the centre of the beam. With all electromagnetic signals, the beam will diverge. The beam divergence for an electromagnetic wave is defined as the increase in diameter with distance from the optical aperture from where the electromagnetic signal merges.\nThe laser component in the transmitter is modulated with digital data by on/off keying. For carrier class FSO, an avalanche photo diode (APD) receiver is used as the detector for the optical signals. According to Wietz Joubert, Redline’s engineering manager, using an APD receiver instead of a p-type-intrinsic-n-type (p-i-n) receiver is advantageous since the receiver sensitivity can be increased by up 1o 10dB compared with p-i-n receivers. Using this technology reduces many of the atmospheric challenges experienced with p-i-n receivers.\nAtmospheric influences such as fog, snow, rain, smog, sandstorms cause infrared signal attenuation due to absorption.\nRedline products operate at 808 nm and actively cooled lasers operate at 1550 nm.\nAs for the safety of the laser-based FSO systems, compliance with IEC standards ensures that safety and specifically eye safety standards are adhered to by FSO equipment vendors. The 1550 nm laser technology used in FSO equipment enables longer distances to be achieved as it has been found that the human eye can withstand up to 50 times more optical energy from a 1550 nm optical source compared to a laser beam operating in the 800 nm band. The reason for this is that the 1550 nm optical energy is absorbed in the cornea and the lens of the eye. The optical beam is not focused on the retina as is the case with the 800 nm optical signals.\n“There are many advances using FSO communications,” said Rynier van der Watt, Redline’s MD. It requires no licensing, it is radio frequency interference-immune, quick to install and redeployed if used on a temporary basis. FSO has many applications such as enterprise connectivity, disaster recovery sites; temporary connections, campus networks, last mile connectivity to service provider and security camera connectivity.\nRedline is part of the Parsec group and one of the five top international providers in the world of FSO communication equipment. The company has over 600 systems in the field of which 500 are in Africa and the Middle East. The company operates a state-of-the-art manufacturing plant in Centurion, Gauteng, where most of the FSO units are manufactured.\nFibre over the air << comments and views\nFirst published in EngineerIT"
] | [
"<urn:uuid:f291f8a4-154b-42b3-ab60-27df28e1c638>"
] | [
"CC-MAIN-2013-48"
] | [
"http://mybroadband.co.za/news/telecoms/13425-Fibre-over-the-air.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163879441/warc/CC-MAIN-20131204133119-00092-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9394174218177795
] | [
882
] | [
3.328125
] | [
3
] |
[
"A technical dictionary of printmaking, André Béguin.\nB . INTAGLIO PRINTING.\n1°) GENERAL PRINCIPLES. In intaglio printing there are other problems over and above those caused by the grain of the paper. In order for the paper to pick up the ink lying in the furrows of the plate it is essential that the paper be pushed into these furrows. This means that the paper must he very supple, elastic when packed*, and must resist great pressure. Insofar as the paper is concerned it must be as flexible as a piece of cloth which means that it must he well dampened (much more so than fur relief and planographic printing). Dampening is absolutely necessary even when using the best grade \"pure rag\" paper available on the market. Dampening allows the artist to avoid a high printing pressure which is always bad for engraved lines since pressure tends to clog the lines and crush the grained parts of the plate. Hence the dampening of printing paper allows for clear lines. An easy experiment demonstrates the difference between a dampened sheet and a dry one; just print two sheets (a dry one and a wet one) using an uninked plate. The damp sheet will have followed the lines and furrows of the plate and thus will show up the design perfectly whereas the dry sheet witi barely carry the design of the plate.\nPaper must be dampened in function of the type of printing to be done (wetter for very delicate details than for strongly cut lines), in function of the paper (thick paper and sized paper must be immersed in water while Japan, China, and Dutch papers which react like blotting paper must be dampened with a sponge), and in function of the printing pressure.\nIn any case the sheets of paper must be dampened uniformly before being printed but must be damp enough to exude water when under the press. If the sheet of paper is too dry it will not \"empty\" the inked plate and the result wilt be white printed areas or gray lines.\nA uniform dampening is most important. This might present some problems in overheated studios or in summer, especially if the sheets are large format ones. In fact, if one lets the sheet of paper shed its excess water before wiping the plate (a process that may take quite some time) the top of the sheet will be practically dry whereas the bottom will still be quite wet. The printer must therefore be careful to let the sheet drip only five to ten minutes before printing or else use the \"impregnation\" system described below.\n2°) DAMPENING METHODS.\nBasically there are two different methods for dampening paper: the immersion technique and the impregnation technique.\nThe immersion technique has been used for a long time in intagho engraving. Bosse described it as of the 17th century. The sheet of paper was plunged into a basin that was lust a little bigger than the sheet itself. Depending on the hardness of the paper the sheets were plunged two or three times into the water or even more often [* paper). After this wetting and \"depending on the strength and the sizing of either side of the sheet\" the paper was put on a wooden board next to the basin. The board was just big enough to take the sheet of paper. Each dampened sheet was placed above the preceeding one and at the end the pile was covered with another board and weighed down with a heavy object. The reason for the second board and the weight was to ensure both a uniform dampening and the draining of excess water. This job was usually done the evening before printing, sometimes just before printing. The paper used for intagho printing was what the french engravers called vieux trempé. The printers of the past often put some alum into the water they used for dampening in order to make the paper stronger.\nThe method described above is still valid. One should wet fairly strong papers (more than 200 grams) for about 20 minutes or even a whole night (as in the case of aquatint printing). The water used must be clean and, if possible, one should use rain water. The water should be thrown away after a couple of days of use since it begins to be full of paper threads and dust. Three drops of phenophthalein or a similar product will keep the water aseptic if it must be kept for prolonged periods of time.\nA prolonged immersion of the paper must be followed up by the \"piling up\" method described above. However, one may also let the sheet of paper drain by hanging up to drip dry just before printing on it (5 or 10 minutes before). If this is the system chosen one must hang the sheet (using tongs to grip a corner) up above the basin. As I have already mentioned one must be careful that the draining of the sheet of paper is properly done in hot water. Of course this second method is better if individual prints are made and especially if one is colour printing. The piled up technique is, on the other hand, better if one needs to print a large number of impressions of the same plate.\nWhen a dampened sheet is handled for printing it must always be picked up with tongs in order not to dirty it. It should then be placed on a clean sheet of blotting paper and covered with yet another sheet of blotting paper in order to dry it. Then extract the damp sheet from the blotting paper and brush it with a pig bristle brush (fairly hard grade bristles are best) making sure not to brush too hard. Brushing is done in order to even out the surface of the paper and to eliminate any dust that might have accumulated. Withdraw any extraneous elements which might be incorporated in the paper and which might prejudice the results of the impression.\nImmersion is done with strong and hard papers but I do not recommend the immersion of Japan, China, and Dutch paper (at least the 200 gram weights). In fact such paper is sized very little or not at all and thus absorbs too much water. When paper is well sized but light weight the quantity of water absorbed is still excessive and it is difficult to handle such sheets without ripping them. Furthermore, the drying process is much too slow or then acts like blotting paper (in other words it is uneven).\nIt is therefore best to dampen such types of paper by impregnation. Each sheet should be put between two sheets of damp blotting paper or else dampened with a sponge and then placed between two sheets of blotting paper.\nObviously the degree of dampness affects the size of the sheet of paper and while it dries it will also shrink. This characteristic is particularly troublesome in colour printing done by superimposition. Any shrinking that takes place will throw off the registering. Artists must, therefore, print all of the colours while the sheet is still damp. Actually what this means is that the various runs must be accomplished as fast as possible. Of course one may always repeat the dampening process since the oily inks used in printing will not he disturbed. Nevertheless such dampening only allows for approximations and it will be found that the less steps there are in printing the better [ * registering].\nIndustrial intaglio printing is always done on dry paper which is the reason for which the lines of such plates must be particularly precise. Dry paper is also the reason for which this process uses very fluid inks and is printed at great pressure.\n2. DAMPENING OF TRANFER PAPERS.\nTransfers on stone or metal are done by means of special transfer and autographic transfer papers. Autographic paper allows one to draw or write with autographic ink on a very highly sized sheet of double faced paper. One side of this paper is shiny while the other is mat. At times such paper is transparent and thus allows for tracing. Autographic transfers are used in lithographic work.\nIn order to transfer a design place the sized side of the sheet face down on the stone or metal plate making sure that it is property registered*. Slightly dampen the back side of the sheet with a sponge until it becomes rather mat. Then, after covering the autographic paper with a sheet of set-off* paper, press it down several times, increasing the pressure each time. Carefully lift off the support sheet, wetting the back with a sponge and pulling it up vertically.\nTransfer paper is heavier and stiffer than autographic paper but on the other hand it has a grain that allows for crayon manner work. If need be one can rub out the grain. Apart from such considerations tranfer paper is used in much the same way as autographic paper. The artist draws on the sized and grained side of the sheet with a transfer ink or with a chemical crayon. The back of the sheet is then wetted in the same way as for autographic paper (but remember that it needs to be wetter). The person doing the transfer may need to wet the sheet several times over. Some people prefer to first press the paper transfer down with very little water in order to fix the oily ink to the plate. They then dampen the sheet thoroughly to remove the paper.\n3. DAMPENING OF LIGHT SENSITIVE PAPERS.\nPhotosensitive paper carrying an image can be used to transfer this image onto another surface, usually a metal plate. At present transfers are systematically made in photogravure* but tranfers of drawings and texts can also be made. Furthermore, transfers can be used in photolithography and in various other engraving processes [ * transfer]. In the past gelatine transfer papers were used in photo-engraving and in photolithography. Today photogravure uses pigment paper [ * paper].\nGelatine tranfer sheets are inked with a roller, and since only the image receives the oily ink, the transfer is simply made by pressing the sheet onto the plate. Celatine transfers are therefore done more or less in the same way as for ordinary transfer paper. However, gelatine transfers require more careful handling. Before proceeding put the gelatine sheet into a pile of paper of which every third sheet has been dampened with a sponge. The pile must have been prepared 24 hours beforehand so that the dampness will be uniformly distributed. Leave the gelatine sheet in this pile until it begins to become sticky. Then proceed as with normal transfer paper. The pressure used to transfer the ink onto the stone or plate should be sufficient to avoid dampening the paper any further. A second dampening will, however, be necessary if the ink has dried too much. If this is the case dampen the back side of the gelatine sheet with a sponge and pass the sheet through the press a second time, using a greater pressure.\nIn order to separate the gelatine sheet from the stone or plate wet it on its back with a sponge and pull the sheet off gently, being careful not to damage the transfer.\nIn photogravure the dampening of pigment papers is usually done to ensure the suppleness of such paper. In fact, when such paper is new it contains about 10% of its weight in water. If the atmosphere is too dry the paper becomes hard and brittle. Because of this one must put it in a very damp place (60% humidity) for several hours before using it. Check that the humidity is correct by using a hygrometer. Dampening may be done by hanging sheets or rolls of such paper in a metal cabinet along with some wet rags. Pigment paper must be dampened a second time once it has been exposed and the pigment layer is tranferred to the metal plate. This second dampening is carried out in order to detach the gelatine from its paper support.\nIf its dimensions are not too big the entire plate can be plunged into a basin full of clean water. Then immerse the paper, face up, until it has rolted up. Once it has rolled up turn the paper face down and apply it to the plate, making sure that the sheet is placed correctly on the plate. Remove the plate from the basin, put it on a table and put pressure on the pigment paper with a rubber squeegee. Sponge the result and leave it for some twenty minutes before removing the paper. If the transfer must be made onto a cylinder it will not be possible to do this under water and since the wetting of a large sheet of gelatine would make the sheet swell unevenly one must add some alcohol to the water (as much as 50%). For cylinder transfers the paper is immersed alone and then applied to the cylinder. Pigment paper can, however, also be applied, when dry, to a copper surface by fixing one side of the sheet to the copper cylinder (by means of tape) and then plunging the cylinder into water. The contact between the dry sheet and the wet cylinder will be enough to ensure the transfer. Apply pressure and force the gelatine to stick to the cylinder [* photogravure]."
] | [
"<urn:uuid:601506fe-bf45-4761-82fc-d3dfde5b6fef>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.polymetaal.nl/beguin/mapd/dampening_of_paper.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698554957/warc/CC-MAIN-20130516100234-00002-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9488677978515625
] | [
2706
] | [
2.984375
] | [
3
] |
[
"Chinese eat about three times the amount of salt recommended by the WHO, reveal sources.\nCNSIC General Manager Mao Qingguo said the company would implement an action plan to develop low-sodium salt products and establish a uniform standard for salt substitutes to promote the healthy use of salt.\nAccording to CNSIC data, Chinese directly consume 5.5 million tonnes of salt annually and the salt output reaches about 9 million tonnes, including about 50,000 tonnes of low-sodium salt.\nIn other words, each Chinese person consumes an average of at least 15 grams of salt every day, compared with five grams recommended by the WHO.\nExcess intake of sodium chloride is believed to be greatly associated with cardiovascular diseases, high blood pressure and other chronic diseases, which lead to about 85 percent of deaths in China every year, said Zeng Yixin, president of Peking Union Medical College.\nEarlier last month, the Ministry of Health and other government departments called for reducing China's per capita daily salt consumption to below 9 grams as part of chronic diseases prevention and control efforts."
] | [
"<urn:uuid:80e2c3a8-7947-424e-835d-2ce680a475fe>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.medindia.net/news/chinese-eat-too-much-salt-study-102656-1.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00195.warc.gz"
] | [
"en"
] | [
0.9374808073043823
] | [
220
] | [
2.734375
] | [
3
] |
[
"In this lively and detailed study, Beth Severy examines the relationship between the emergence of the Roman Empire and the status and role of this family in Roman society. The family is placed within the social and historical context of the transition from republic to empire, from Augustus' rise to sole power into the early reign of his successor Tiberius.\nAugustus and the Family at the Birth of the Roman Empire is an outstanding example of how, if we examine \"private\" issues such as those of family and gender, we gain a greater understanding of \"public\" concerns such as politics, religion and history. Discussing evidence from sculpture to cults and from monuments to military history, the book pursues the changing lines between public and private, family and state that gave shape to the Roman imperial system.\n'Full of pertinent and convincing insight.' - JACT\n'This book marks out its own terrain with a claim for uniqueness … the book will be useful to many students.' - BMCR\n'A welcome addition to scholarship on the Augustan Age … nonspecialists as well as scholars can benefit from reading it.' - Classical World"
] | [
"<urn:uuid:18f00327-9138-4ffb-b638-8cb2065bc2bb>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.routledge.com/Augustus-and-the-Family-at-the-Birth-of-the-Roman-Empire/Severy/p/book/9780415588911"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146033.50/warc/CC-MAIN-20200225045438-20200225075438-00442.warc.gz"
] | [
"en"
] | [
0.9402292966842651
] | [
229
] | [
2.671875
] | [
3
] |
[
"Title: Social Construction Of &Quot;Race&Quot;\n|Date:||January 17, 2015|\n|Length:||2 / 315|\n|No of views:||0|\n|Essay rating:||good 0, average 0, bad 0 (total score: 0)|\nE.g Chinese growing up Australian could claim to be ethnically Australian however her race is still Chinese.\nSocial construction - A social construction or social construct is any phenomenon \"invented\" or \"constructed\" by participants in a particular culture or society, existing because people agree to behave as if it exists or follow certain conventional rules...\nShowed first 250 characters\nDo you need an essay?\nHere are the options you can choose from:\n- Order plagiarism free custom written essay\n- All essays are written from scratch by professional writers according to your instructions and delivered to your email on time\n- Prices start from $12.99/page\nDo you need many essays?\nFULL access to essays database\n- This option gives you the immediate access to all 184 988 essays\n- You get access to all the essays and can view as many of them as you like for as little as $28.95/month\nOne example of a social construct is social status.\nResearch studies have challenged the idea of race by presenting evidence that the scientific basis for racial difference rests on shaky ground. A few studies found that \"within group\" differences (genetic variations within same-race groups) were more significant than those found between groups representing different races, and thus concluded that there is truly only one race, the human race...\nShowed next 250 characters\nTotal price: $10.00\nCommon topics in this essay:\n- &Amp;Quot;Good Corporate Governance-Its Importance For Banks And Challenges&Amp;Quot;\n- A Comparison Of The Poems, &Quot;Postcard From Kashmir&Quot; By Agha Shanhid Ali And &Quot;Elena&Quot; By Pat Mora\n- Explain How Social Darwinism And Determinism Are Evident In Jack London'S &Quot;To Build A Fire&Quot;\n- Faulkner'S &Quot;Rose For Emily&Quot; Vs Dubus &Quot;Killings&Quot;\n- Imagery In Sally Croft'S &Quot;Home Baked Bread&Quot;\n- Theme Of Identity In &Amp;Quot;Summer Farm&Amp;Quot; And &Amp;Quot;The Bay&Amp;Quot;\n- Summary Of John C. Calhoun'S &Amp;Amp;Quot;Slavery A Postive Good&Amp;Amp;Quot;\n- &Amp;Quot;Battle Royal'S&Amp;Quot; Ideological Power Of White Supremacy.\n- Global Warming an Enemy for Human Race\n- Is There Racism Within A Race? (Reaction To &Amp;Quot;Wife Of His Youth&Amp;Quot;)\n- &Amp;Amp;Quot;The Historical Relationship Of The Interpol And Counterterrorism, What Other Agencies Can Learn From This.&Amp;Amp;Quot;\n- Analysis: &Amp;Quot;Breaking Vegas&Amp;Quot; (History Channel Documentary)\n- Social Construction Of &Quot;Race&Quot;\n- Social Construction Of Race\n- The Social Construction of Race, Ethnicity, Class, and Gender\n1 pages / 274 words\n1 pages / 204 words\n1 pages / 125 words\n2 pages / 469 words\n2 pages / 499 words\n1 pages / 259 words\n2 pages / 315 words"
] | [
"<urn:uuid:1f155aeb-efa5-4a00-a8b5-c3b4e0f9d111>"
] | [
"CC-MAIN-2020-10"
] | [
"https://manyessays.com/essay/social-construction-of-quot-race-quot-"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147116.85/warc/CC-MAIN-20200228073640-20200228103640-00027.warc.gz"
] | [
"en"
] | [
0.8035210967063904
] | [
809
] | [
2.9375
] | [
3
] |
[
"The fact that birds fly has been long held a mystery.\nDid you know that flight and gliding through the air are not the same thing? Or that all birds do not fly? Since flight takes so much energy bodily changes, a bird will loose it's flight adaptations if it does not need to fly. Birds that live in places that have few or no preditors lose their ability to fly.\nInitially, birds became fliers to escape predators. But, flight evolved since it is so useful in the search for food and finding nesting sites. Birds also fly to locate new habitats or relocate to a better seasonal climate.\nBut, how do birds fly? Well, flight requires a complex set of feathers; the primaries and the secondaries. The primary feathers are the outer wing feathers on parrots and other flighted birds. Primary feathers are moved forward and backward in a figure-eight pattern. This pattern actually acts as a propeller to produce thrust.\nIt is the secondary feathers that prodcuce lift as the bird's body is pulled through the air. These are the inner feathers on the wing.\nBirds with smaller wings have to fly faster while birds with larger wings need more lift to get their bodies off the ground.\nSo, now, what is the difference between flight and gliding? Gliding is when a bird holds its wings out for long periods of time. Gliding helps to avoid fatique. Flighted birds have a tendon that runs along the back of it's ulna wing bone and attaches to the secondary feathers. Remember, the secondary feathers produce lift. This interesting tendon assures that a bird's feathers are spread at the proper distance to maintain lift at all times.\nMost parrots are prey to many animals so wild parrots are adept at flight. That's why we often clip our parrots feathers with Wing Clipping Feathers. But as we are begining to how to offer these fabulous pets the enrichment they need, we are learning that flight may be an important component of enriching our parrots life. There are tradeoff's though. No one want's their precious parrot to fly away.\nOn the other hand, flight provides your parrot with a great workout and a stimulating natural experience contributing to it's happiness and decreasing common parrot behavior problems. You've got to decide if the experience of flight over-rides your personal desires for your parrots safety and it's ability to enjoy the great outdoors. Well, one way to manage this controversy is to get the Aviator Bird Harness\nand Flight Line for your parrot. Talk about the ultimate enrichment!"
] | [
"<urn:uuid:a70bfff3-f0fa-44ca-8715-53abdf9abb0e>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.birdsupplies.com/about-parrots-flight/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708882773/warc/CC-MAIN-20130516125442-00057-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9579208493232727
] | [
532
] | [
3.34375
] | [
3
] |
[
"You can browse all these railguns either by selecting the links below or by using the drop down box under ‘PLASMA RAILGUNS’ at the top right of the screen.\nRailguns, like coilguns, use extremely high currents to create intense electromagnetic fields to propel a projectile. There are two types of railguns, plasma and projectile. The basic railgun has two parallel, conducting rails which are connected by some sort of conducting material which acts as the projectile. Energy is discharged through the rails and projectile creating intense electromagnetic fields around both rails and the projectile which repels all three components from each other. Due to the rails being firmly secured, the projectile is repelled from the gun.\nWhen a relatively thin strip of material is used as the projectile and sufficient power is allowed to pass through the railgun plasma is created. The projectile super-heats into plasma through resistive heating and because it is conductive, accelerates out of the railgun the same way a projectile would. Plasma armatures are so hot and low density that they dissipate into the air shortly after exiting the railgun; the plasma arch/burst can be extended with higher initial velocity, higher temperature, or a denser plasma armature. Although the plasma looks like it would burn through anything, it actually cools too rapidly to be practical. However, it does make for some interesting images."
] | [
"<urn:uuid:9b40a536-46cd-4694-9f34-f40a8ef526e6>"
] | [
"CC-MAIN-2023-14"
] | [
"https://futureexperimentalsystems.wordpress.com/railguns/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00546.warc.gz"
] | [
"en"
] | [
0.9490755796432495
] | [
284
] | [
3.25
] | [
3
] |
[
"- Primordial Earth Goddess — the mother of Ouranos (Heaven), Oceanus (Ocean) and at least 10 other gods and goddesses.\n- Geologic and biological processes that regulate the Earth’s atmosphere and temperature to produce an environment hospitable to life.\nTHE BIRTH OF OCEAN\nIn Greek mythology, Gaia gave birth to Heaven and Ocean. This is also literally true.\nWhen the Earth first formed out of intergalactic dust, almost 5 Billion years ago, the sun was smaller than today and dimmer. Nuclear fusion had recently begun in the sun’s core, the process of converting hydrogen to helium. The Earth’s primordial atmosphere, rich in methane and carbon dioxide had little oxygen. Because of an intense greenhouse effect, Earth was a hot place, averaging 40 C. The moon was closer, and larger. A day measured no more than 6 hours.\nThe early oceans formed with water vapour released from deep inside the Earth. The first life forms were bacteria, soon to form large colonies, stromatolites whose remains we can see today.\nWithout early bacterial colonies, the Earth’s early oceans would have evaporated into space, leaving us a dry planet, as lifeless as Mars.\nThe sun’s ultraviolet rays split water into its constituents, hydrogen and oxygen. Without biological processes hydrogen would escape into space. Iron in oceanic basalts, reacts with carbon dioxide and water, essentially drying out the oceans. However, the early bacteria colonies feed on the free hydrogen to form hydrogen sulphide, and reconstitute water.\nGaia not only gave birth to Ocean but also nourished it.\nThose same bacteria were responsible for generating the oxygen that we breathe today. As the biosphere developed and evolved, it created and regulated the Earth’s environment, to produce one that is conducive to the propagation of life.\n“Gaia’s Children” is a modern fable, set in Scotland 40 years from now when the world is warmer. Wolves have returned to the land and have re-established an ancient relationship."
] | [
"<urn:uuid:fc2d29ba-4423-4f96-9186-4775fbb1802b>"
] | [
"CC-MAIN-2017-26"
] | [
"http://paulkieniewicz.co.uk/?page_id=76"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00000.warc.gz"
] | [
"en"
] | [
0.9465295076370239
] | [
434
] | [
3.390625
] | [
3
] |
[
"ENG401 Assignment 1 Solution Parts of Speech On Assignment Solution\nENG401 Assignment 1 Solution Parts of Speech On Assignment Solution PART OF SPEECH This article is totally based on parts of speech. We will focused on parts of speech. Parts of speech is very important in English language. Every world have a place value if you will not use the suitable word in your sentence then your sentence will be wrong. So, today we are going to teach about parts of speech on assignment solution. Keep in mind your sentence should be meaningful and explain your sentence very nicely. When you will write your sentence then use the parts of speech of speech very carefully, we also hope that you know about parts of speech, but some student will be confused about parts of speech and they forget about it. So, dear student do not worry about it. Just keep in mind a very simple formula of parts of speech. And the formula is I=interjection V=verb A=adverb N=noun C=conjunction A=adjective p=pronoun P=preposition Always remember. Subject + verb + object Like=he eats burger. So always follow the rules when you follow the rules then you have no hesitation about yours sentence making. Need yours attention on your sentence. So dear students What is noun? Noun is the name of a person place, thing are called noun. Like there is an example also. John is a doctor. So john is noun. But dear student, keep in mind this is not just one kind of noun. There are many others types of noun -like 1) Proper noun 2) Common noun 3) Possessive noun 4) Abstract noun 5) Countable noun) What is verb? The verb is also important part of your sentence. A verb or compound verb asserts something about the subject of the sentence and express action, event. There are many courses provides a variety of exercise covering the topics useful for student. Very simple grammatical terms are introduce at appropriate storage together with simple definition and very suitable example .which will be very helpful for our students. Grammar We introduce different topics and explained in a very simple, clear and easy to understand form. Composition easy to understand form. COMPOSITION; Different form of composition are explained with examples to develop skill in writing paragraphs, essay, picture, compositions, autobiographies, letters, reports, invitations, advertisements, summaries, and diary entries. Online download tips, tests and resources for students and interactive tests, games, assignments and exercises for students. Dear students, think about it, that now education is very easy for every person and now, you have no issue and problems about yours studies, as we told you before, we introduce very simple ways of education. You can increase your vocabulary from this way. When you have an idea in your mind then share your ideas with others in English language .you can exchange your ideas and get the ideas of others person which will on other side of your. Discuss the important issue to your Friends: through this activity, you will improve your English language. So we will expecting you that you gives full attention on your language skills through our guidance. There are our so much youngsters which have lack of education, but if they will follow this direction, they can be successful. Always remember, Hard work is the key to success. For more leaning and knowledge, keep visiting assignment solution dot net."
] | [
"<urn:uuid:05e04aee-40b0-4030-9312-411e96da3064>"
] | [
"CC-MAIN-2017-30"
] | [
"http://www.assignmentsolution.net/assignment-solution-solved-quiz-current-past-papers.php?id=10"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424931.1/warc/CC-MAIN-20170724222306-20170725002306-00260.warc.gz"
] | [
"en"
] | [
0.9447817802429199
] | [
688
] | [
3.96875
] | [
4
] |
[
"VOA Learning English Alternatives: The Best English News Learning Resources\nThis just in: there’s a great way to learn English while staying up to date on the latest headlines.\nJust watch English news videos!\nThat’s right. You can learn English by news with the 15 great sites we’ll show in this article. All of them have interesting English news videos (as well as articles and audio clips) covering the latest current events.\nWatching news in English can improve multiple language skills (like listening and speaking), teach you new vocabulary, keep you informed of current events and introduce you to cultural aspects of English-speaking countries.\nSeveral of these news sources are specifically designed for English learners, with built-in transcripts, exercises and other helpful tools.\nWe’ve got the scoop on the best sites to learn English by news. Check out the insider information below!\nDownload: This blog post is available as a convenient and portable PDF that you can take anywhere. Click here to get a copy. (Download)\nTips to Learn English Through News\nBefore you jump into our list of awesome English news resources, consider the following tips to help you get the most out of watching English news videos.\n- Keep a vocabulary journal. This is one of the best ways to remember what you’ve learned and expand your vocabulary. Keep a notebook dedicated to English, and write down any new words you learn while you’re watching news videos.\nYour vocabulary journal can also be used to keep track of words you don’t understand. Look them up after the news video is finished.\n- Watch the same news video more than once. When we rewatch videos in another language, we notice different things each time. Start by watching a video to understand the overall news story, or the main idea. Then, watch it again to see if you can understand specific details, such as when or where a story took place. Watch it a third time to focus on vocabulary, pronunciation or grammar.\n- Download transcripts when you can. If a news video has a transcript (a written version of the video) available, be sure to read it. Seeing the dialogue written out can help you check whether you understood the video correctly. You can always start by listening to the video the first time and then reading the transcript as you listen a second time.\nYou’ll find transcripts with several of the news sources in our list below.\n- Watch news anchors (presenters) with different accents. Take this opportunity to expose yourself to a variety of English accents. Being able to communicate in English anywhere you go will be a huge help, whether you’re traveling, getting a new job or just trying to improve your English skills.\nOur list of English news resources below includes options from across the English-speaking world.\n- Pay attention to background images. Using the images in a news video’s background can provide you with clues about the story. These images can help you understand what the anchor is talking about and what happened in the story.\nYou can apply these tips to any news video you decide to watch. Check out the following resources for some great places to get started!\nLearn English News: The Best News Video Sites for Language Learners\nSteven French’s “News in Simple English” YouTube Series\nSteven French has created tons of videos on how to learn various languages. These include his series of videos entitled “News in Simple English.”\nThis playlist features English news told in 60 seconds. These brief lessons include the transcript displayed on the screen, so you can follow along while listening.\nEach news video briefly covers the biggest world news stories. They’re narrated slowly and clearly and feature language that’s geared toward English learners. That means it’s less difficult than language from authentic news sources.\nThe only downside to this YouTube series is that new videos aren’t uploaded as frequently as the other resources listed in this article. However, new videos do appear from time to time.\nLooking for an overview of the latest English news, all in one place? MSN News is a fantastic option. They gather their news videos from top U.S. news outlets (news sources) such as CNN, CBS, the Associated Press (AP), USA Today, The Washington Post and NBC.\nYou’ll find tons of videos on world news, U.S. news, politics, technology and more. Since their videos come from the major players (top companies) in the news industry, their videos are usually high-quality.\nAccess to the site, along with all of the videos, is completely free, and you can easily sort through the news by topic.\nWith such a wide variety of subjects, you can easily add new vocabulary to your repertoire (set of skills). Plus, you’ll never run out of videos to watch since the site adds new content daily.\nFluentU takes authentic videos—like music videos, movie trailers, news and inspiring talks—and turns them into personalized language learning lessons.\nYou can try FluentU for free for 2 weeks. Click here to check out the website or download the iOS app or Android app.\nFluentU provides language learners with real-world English videos, including tons of news videos.\nThe news videos can be divided by language level, so they’re easy to search through and find one that matches your needs. There are six levels to choose from (Beginner 1, Beginner 2, Intermediate 1, Intermediate 2, Advanced 1 and Advanced 2).\nBut FluentU isn’t just a video player. Every FluentU video comes with built-in learning tools that transform the videos into personalized language lessons.\nFor example, there are interactive subtitles. Just click on any word for an instant definition and grammar info. This means you’ll naturally learn new words while you immerse yourself in English.\nThere are also fun quizzes and flashcards to practice or test your knowledge of words you learned from the news videos.\nNeed a break from news? Watch authentic English music videos, movie trailers, inspiring speeches and lots more fun content—all with the same learning features.\nBest of all, just like a newspaper, you can take FluentU anywhere with the mobile apps for iOS or Android.\nBBC News’ YouTube Channel\nAnother wonderful free resource is BBC News, a division of the British Broadcasting Corporation. Specifically, their YouTube channel is a great place to find useful content. It’s updated with new videos every few hours, providing learners with plenty of fresh content.\nWhat makes them great for English learners is that they have playlists of related news stories. For example, if you wanted to focus on learning more nature-themed English vocabulary, you could simply click on their playlist about saving the Leuser rainforest. That way, you can keep watching similar content and practicing related language without having to search for it.\nAdditionally, BBC News’ YouTube channel offers English news videos in a variety of formats. They have short videos of around one to three minutes for those of you who are in a hurry or just trying to squeeze in a quick English lesson. They also have longer documentaries of around 25 minutes to give you a fuller, more in-depth English lesson.\nA final perk (positive aspect) of watching BBC News’ videos on YouTube is that you won’t have to sort through written news articles to find the videos. Many news sites have both videos and written news articles to read. Since BBC News has a YouTube channel, they can provide all of their videos in one place.\nGlobal News provides the latest English news stories divided into categories, such as entertainment, health, politics, world news and more. There are both English news articles and videos. As you’re browsing, just look for the “Play video” button on the righthand images for the video news stories.\nGlobal News is a Canadian outlet, which gives language learners an opportunity to practice an English accent that’s a bit different from British or American accents.\nWhile they do provide a lot of local and national news, they also have plenty of videos on worldwide current events.\nOne of the best sections on their site is their trending news page. It has tons of popular videos on trending news and covers both serious and cute stories.\nAnother tool to take advantage of is Global News’ live broadcast, where you can watch in real time as the news is reported. This may be one of the best ways to put your English listening skills to the test as you watch the news while it unfolds.\nESL Video is another site made specifically for English learners.\nThey feature a range of English videos including news clips, which are accompanied by content made by teachers.\nThe site is free to use, and the additional content includes quizzes to test your knowledge of the videos.\nThe news videos sometimes have transcripts available as well, so you can read along with what’s being said during the video.\nAs we mentioned above, ESL Video’s content covers a wide range of subjects, and not all of their videos are news videos. However, the ones that are can be divided into categories like “science and technology,” if you want to practice specific vocabulary.\nLearning English with CBC\nThis ESL resource comes from CBC Radio Canada. The site is geared toward English language learners and has plenty of news videos—and some audio clips—from which to choose.\nThe videos are labeled by English level, so you can choose the video that perfectly suits your study needs.\nNews subjects cover everything from Canadian news to sports to children’s news.\nEach video is meant to help learners practice English grammar, vocabulary and pronunciation while learning about current events around the world and cultural facts about English speaking countries.\nIn addition to the many recent news videos, the site also has an extensive archive of stories from 2017 and earlier. These include both news interviews and longer stories.\nPolitico is an American newspaper and journalism company dedicated to sharing political news. They’re non-partisan, which means they tend to stick to the facts rather than twisting the story to suit their political beliefs.\nThey’re one of the top American news sites when it comes to political news, and they’re constantly adding new videos to their website.\nPolitico focuses on American politics, so it’s very specific in terms of subject matter. This makes it a great source to use if you’re looking to become more familiar with how the U.S. government works.\nIt’s also a great place to learn about American politics and foreign policy, which can affect countries around the world.\nAdditionally, you can expect to learn a ton of great vocabulary by studying words related to government, economics, policy, etc.\nGood News Network\nThe Good News Network gives you a break from all of the sad and serious news in the world.\nThis site is dedicated to sharing positive, uplifting (happy) news stories from around the globe. Their news categories include happier options, such as “inspiring” and “laughs.”\nYou can expect to watch videos about animals, families and kids.\nIn addition to getting in your English lesson while watching happy news, the Good News Network typically provides slightly more in-depth written summaries to go along with their news videos.\nIn other words, there’s a longer summary of each video’s content to help you understand what’s happening if you have trouble following the story.\nThe Irish Times\nThe Irish Times offers English learners listening practice with yet another English accent.\nDespite being based in Ireland and focusing on local and national news, The Irish Times also supplies plenty of videos covering international news.\nTheir news covers everything from sports to politics to culture, so there’s something for everyone to enjoy.\nWhat makes these videos nice for English learners is that each news segment is quite short. Videos can last as little as 30 seconds and typically don’t run much past two minutes.\nThis makes them a perfect, bite-sized English lesson for learners who have busy schedules.\nTechCrunch is a great site that specializes in international news related to technology. That includes stories about the latest electronics, cars, apps, robotics and startups.\nThis news site will introduce you to tons of great vocabulary, and the topics covered by the videos are super interesting.\nYou can easily divide news videos by subject, such as interviews, reviews and gadgets (tech tools).\nThe best thing is that some of the videos have captions available in a number of languages, not just English. That means that you may be able to find subtitles in your native language, which can be a big help when it comes to understanding the English videos.\nSome of the caption options I’ve seen include Spanish, Italian, French, Dutch and Japanese.\nCTV News is a Canada-based news site that has tons of videos.\nTheir news videos cover both national and international stories. You’ll have access to just about any type of vocabulary you can think of, as there’s also extensive coverage of lifestyle news, such as pop culture, health and entertainment.\nThe best thing about this news source is that English captions are available with most of the videos. That means that you can check your understanding of pronunciation, learn how to spell a word or use the subtitles to help you know what words to look up in a dictionary.\nSBS News is based in Australia, exposing English learners to yet another unique English accent.\nThis is another resource that provides tons of opportunities to expand your vocabulary, as it covers a wide array of topics like small businesses, sports and cultural news.\nWhile many of SBS News’ videos are focused on Australian news, there are tons of them that talk about world news as well.\nNew videos are added every few hours, so you’ll never run out of stories to watch.\nPlus, just about every story is accompanied by a longer summary and additional photographs to provide you with more insight into what’s happening in the video.\nWhile most videos are short, there are occasionally longer options that provide you with a deeper look at a story, which is perfect if you’re looking for a longer English lesson.\n“The Daily Show”\n“The Daily Show” is an American news TV show with a comical twist.\nThe show is currently hosted by Trevor Noah and pokes fun at current affairs, politicians and various types of news stories.\nWatching “The Daily Show” provides you with a source of news, as well as insight into American comedy. By watching Noah’s intonation and how he sets up jokes, you’ll start to be able to better understand how to deliver humor in English.\nAdditionally, you’ll learn a lot about American culture and how different news is perceived and interpreted by U.S. citizens.\nThe great thing about this site is that there are thousands of shorter video clips to choose from, as well as hundreds of full-length episodes available for free online.\nFinally, if you’re able to follow along with the news videos, you’re sure to have a good laugh!\nNow that you’ve got the inside scoop on where to find the best English news videos, you’re all set to start watching!\nDownload: This blog post is available as a convenient and portable PDF that you can take anywhere. Click here to get a copy. (Download)"
] | [
"<urn:uuid:ee59b5df-9823-4a91-bc6d-1c59bb3a9e16>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.fluentu.com/blog/english/learn-english-news-5/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00588.warc.gz"
] | [
"en"
] | [
0.9377937316894531
] | [
3267
] | [
2.78125
] | [
3
] |
[
"Female surveillance officer for WHO pushes through gender-related obstacles to help end polio in Pakistan\nDr. Ujala Nayyar dreams, both figuratively and literally, about a world that is free from polio. Nayyar, the World Health Organization's surveillance officer in Pakistan’s Punjab province, says she often imagines the outcome of her work in her sleep.\nIn her waking life, she leads a team of health workers who crisscross Punjab to hunt down every potential incidence of poliovirus, testing sewage and investigating any reports of paralysis that might be polio. Pakistan is one of just two countries that continue to report cases of polio caused by the wild virus.\nIn addition to the challenges of polio surveillance, Nayyar faces substantial gender-related barriers that, at times, hinder her team's ability to count cases and take environmental samples. From households to security checkpoints, she encounters resistance from men. But her tactic is to push past the barriers with a balance of sensitivity and assertiveness.\n\"I'm not very polite,\" Nayyar said with a chuckle during an interview at Rotary's World Polio Day last year in Philadelphia, Pennsylvania, USA. \"We don't have time to be stopped. Ending polio is urgent and time-sensitive.\"\nWomen are critical in the fight against polio, Nayyar says. About 56 percent of frontline workers in Pakistan are women. More than 70 percent of mothers in Pakistan prefer to have women vaccinate their children.\nThat hasn't stopped families from slamming doors in health workers' faces, though. When polio is detected in a community, teams have to make repeated visits to each home to ensure that every child is protected by the vaccine. Multiple vaccinations add to the skepticism and anger that some parents express. It's an attitude that Nayyar and other health workers deal with daily.\n\"You can't react negatively in those situations. It's important to listen. Our female workers are the best at that,\" says Nayyar.\nWith polio on the verge of eradication, surveillance activities, which, Nayyar calls the \"back of polio eradication\", have never been more important.\nof front-line workers in Pakistan are female\nof front-line workers in Nigeria are female\nQ: What exactly does polio surveillance involve?\nA: There are two types of surveillance systems. One is surveillance of cases of acute flaccid paralysis (AFP), and the second is environmental surveillance. The surveillance process continues after eradication.\nQ: How are you made aware of potential polio cases?\nA: There’s a network of reporting sites. They include all the medical facilities, the government, and the hospitals, plus informal health care providers and community leaders. The level of awareness is so high, and our community education has worked so well, that sometimes the parents call us directly.\nQ: What happens if evidence of poliovirus is found?\nA: In response to cases in humans as well as cases detected in the environment, we implement three rounds of supplementary immunization campaigns. The scope of our response depends on the epidemiology and our risk assessment. We look at the drainage systems. Some systems are filtered, but there are also areas that have open drains. We have maps of the sewer systems. We either cover the specific drainage areas or we do an expanded response in a larger area.\nQ: What are the special challenges in Pakistan?\nA: We have mobile populations that are at high risk, and we have special health camps for these populations. Routine vaccination is every child’s right, but because of poverty and lack of education, many of these people are not accessing these services.\nQ: How do you convince people who are skeptical about the polio vaccine?\nA: We have community mobilizers who tell people about the benefits of the vaccine. We have made it this far in the program only because of these frontline workers. One issue we are facing right now is that people are tired of vaccination. If a positive environmental sample has been found in the vicinity, then we have to go back three times within a very short time period. Every month you go to their doorstep, you knock on the door. There are times when people throw garbage. It has happened to me. But we do not react. We have to tolerate their anger; we have to listen.\nQ: What role does Rotary play in what you do?\nA: Whenever I need anything, I call on Rotary. Umbrellas for the teams? Call Rotary. Train tickets? Call Rotary. It's the longest-running eradication program in the history of public health, but still the support of Rotary is there."
] | [
"<urn:uuid:fe19e096-2c6c-4447-964b-d1b3bed30ceb>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.rotary.org/en/polio-surveillance-officer-virus-pakistan"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949009.11/warc/CC-MAIN-20230329151629-20230329181629-00185.warc.gz"
] | [
"en"
] | [
0.9627858400344849
] | [
981
] | [
2.796875
] | [
3
] |
[
"A body corporate which is laid down by the government of India which has been established under the Architects act 1972 is known as Council of Architecture (COA). This has been enacted by the parliament of the nation, India. The organization came into its functionality and force in the year 1972. The act lays down various facts with regards to standard of education and the registration of Architects. The Council of Architecture (COA) undertakes facts about education as well as practice of professions in this field.\nIndividual who is really qualified in terms of profession of Architect must have his registration done from Council of Architecture (COA). There must be a possession of adequate qualification which is associated with the education which the particular individual has undergone. This education facility is laid down by the council of Architecture. A person holding the certificate must get it up to date. Renewal after a certain period of time is really important in this regard. After the registration only, Council of Architecture (COA) will allow the individual to use the title of Architect.\nThere are in total of 237 institutions that runs under Council of Architecture (COA). The education imparted by these organizations is really standard as per the architectural point of view. They are either deemed university , affiliated schools as well as colleges. The autonomous institutions under Council of Architecture (COA) have their goal and achievements. The regulation is passed by the council under which the eligibility criteria for admission, standard of staff accommodation, course duration as well as course content are set. The regulation passed by Council of Architecture (COA) is also been maintained by the institutions throughout the world.\nThe council also keeps a track on maintenance of standard of the standard of education within particular period. It is required by the officials of Council of Architecture (COA) to keep the central government aware of the standard and discipline of each institution. Inspection is laid down with the help of the committees existing in Council of Architecture (COA)."
] | [
"<urn:uuid:3f5d14f9-8fee-4b87-a914-e409b3dbf87b>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.studyguideindia.com/Education-Council/council-of-architecture.asp"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00170.warc.gz"
] | [
"en"
] | [
0.9722071886062622
] | [
392
] | [
2.921875
] | [
3
] |
[
"|Previous | Spring 2017 | Summer 2017 | Fall 2017|\nAgriculture Policy & Environmental Law (LAW-795P-001)\nThere are no notices at this time.\nIt is often argued that individual food choice is the ultimate exercise of personal responsibility in our society. But what if that conventional wisdom was challenged, instead recognizing that a complex web of agricultural and food laws substantially influences what ends up on our plates, and ultimately affects the health of individuals, communities, and their ecosystems? These policies, and the regulatory mechanisms supporting them, play a vital role in determining health outcomes for our nation and the level of environmental impact to shared natural resources such as air, water, soil, and biodiversity, and thus will be explored in depth in this course. In the context of these policies, the course will cover diverse ecological and public health issues through the lens of federal environmental statutes. Because many of these issues are newly emerging topics, student participation in discussions is strongly encouraged. The course will conclude with a short research paper and a brief presentation on a topic of the student's choice. There are no prerequisites, but Administrative Law or Environmental Law is recommended.\nTextbooks and Other Materials\nThe textbook information on this page was provided by the instructor. Students should use this information when considering purchases from the AU Campus Store or other vendors. Students may check here to determine if books are currently available for purchase online.\nFirst Class Readings\nCLASS 1 (August 21): The Farm Bill: What It Is, What It Isn’t, and Its Impact on Our\nNation’s Environment and Public Health\n1) William S. Eubanks II, A Rotten System: Subsidizing Environmental Degradation and Poor Public Health with Our Nation’s Tax Dollars – available on Lexis or Westlaw at 28 STAN. ENVTL. L. J. 213, or at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1287408\n2) Scott Marlow (RAFI-USA), The Farm Bill Tree: Understanding the Logic of the Farm Bill, available at http://www.rafiusa.org/docs/Farm%20Bill%20Tree.pdf\n3) Mark Bittman, A Food Manifesto for the Future, available at http://opinionator.blogs.nytimes.com/2011/02/01/a-food-manifesto-for-the-future/\nOPTIONAL – National Sustainable Agriculture Coalition (NSAC), Farming for the Future: A Sustainable Agriculture Agenda for the 2012 Farm Bill, available at http://sustainableagriculture.net/wp-content/uploads/2008/08/2012_3_21NSACFarmBillPlatform.pdf\nOPTIONAL – Johns Hopkins Center for a Livable Future, Farm Bill Budget Visualizer, available at http://www.jhu.edu/farmbillvisualizer/\nOPTIONAL – Ken Cook, Turning the Farm Bill into the Food Bill, available at http://www.youtube.com/watch?v=Z6T37m4r3yo&list=PLCE159C603C7ED781\nUse your MyAU username and password to access the syllabus in the following format(s):"
] | [
"<urn:uuid:9971fba2-fbd8-40dd-bd68-00d21f9bf5a0>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.wcl.american.edu/registrar/coursesapp/inf_course.cfm?number=LAW-795P-001&time=fall_2012"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00545.warc.gz"
] | [
"en"
] | [
0.8579016327857971
] | [
679
] | [
2.53125
] | [
3
] |
[
"A cause and effect essay is a very popular assignment and one of the most interesting. It’s always fascinating to look deeper into ordinary issues and understand the true reasons for their happening. Before starting your work you should do some research on a given topic and make notes. The next stage some students are struggling with is making an outline which will guide you through the writing process.\nAn outline of any essay briefly describes its introduction, main body, and conclusion, but may also set forth other sections:\nIntroduce your topic and some general information about it. Define what you are going to explore: the two variables for causes and effects. You can present more specific data later. A thesis clear statement finishes the introduction.\nWrite what resources you used and how your topic was investigated previously by other authors.\nThis is the largest section which should have at least three subsections. Your main ideas should be contained in separate paragraphs. You may mention the problem as a subsection and its causes, effects or both as smaller subsections. If you want to describe the “domino effect” use separate subsections for each point.\nRephrase your thesis statement and expand it with evidence from the main body. You can also propose solutions to cure the harmful effects of some phenomenon or write why it is important to see its causes and effects.\nDefine the main purpose for writing and the major ideas you want to prove. Write lists of ideas with questions you want to answer, draw schemes to see clearly the reasons and results of the issue you describe. You should be a specialist on the topic before you make an outline.\nThere are two strategies of outline formatting. The first one is alphanumeric: you use Roman numerals, capitals, Arabic numerals and lowercase letters for listing ideas in order of their significance. The second is a decimal structure: it requires numerals instead of letters to number subsections like “3.1”, “3.1.1”, and so on.\nStart each section with a similar word construction, so that all of them are alike.\nDecide if you prefer to write in brief or in full sentences. If you use just short phrases you may later forget what you wanted to explain."
] | [
"<urn:uuid:d193cbcf-24ea-4af1-ae63-270e1694a709>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.tahoeshotokan.com/cause-and-effect-paper-outline.phtml"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00379.warc.gz"
] | [
"en"
] | [
0.945829451084137
] | [
456
] | [
3.625
] | [
4
] |
[
"Signs of spring are everywhere in a newly greening world.\nOh, sure, the season officially arrived on the equinox, March 20, but Mother Nature needs a little time to wake up, don't you think? After all, she's had a long winter's sleep and the season so far has been partly to mostly chilly, no inducement to getting up and at it.\nI know that many of you are out in the yard searching for the swelling buds, the new shoots and the early flowers that indicate the season is really underway. We all wait for the signals that say, \"Gardeners, start your engines!\"\nBut you may not know that your observations are being sought in a nationwide project to track climate change. Project Bud Burst, now in its third season, is calling on all citizen scientists to track the arrival of spring by recording such phenomenon as the unfolding of the first leaf and the blossoming of the first flower in selected species.\nLaunched as a pilot project in 2007, the national data-collecting initiative is directed by a consortium that includes the University Corporation for Atmospheric Research, the Chicago Botanic Garden and the University of Montana, with support from the National Phenology Workshop.\nPhenology is not the study of bumps on your head to assess character -- that discredited \"science\" is phrenology. \"Phenology\" is derived from the Greek words \"phaino,\" meaning \"to show or appear,\" and \"logos,\" meaning \"to study.\"\nThis examination of cyclical patterns in nature has a long and venerable history, with the Chinese keeping records since 974 B.C., the Japanese tallying observations for the past 1,200 years, and Linnaeus, the noted Western botanist, initiating record-keeping in the 1700s. Leading lights in early American history who endorsed the practice include Thomas Jefferson and Henry David Thoreau.\nThe study of nature's calendar yields insight into the interrelationships of plants and animals (including us). This wisdom has been distilled into adages still current in farm country that cue up seasonal tasks. For instance:\n‡ When the forsythia (or daffodils) bloom, plant peas.\n‡ When the first dandelion blooms, plant potatoes.\n‡ When the oak leaves are the size of squirrels' ears (technically, about ½ inch in diameter), plant corn.\n‡ What the indicator plants are indicating is that air and soil temperatures have moderated sufficiently to support the next step in spring planting. Project Bud Burst also hopes to track the influence of climate change on the nature's timing of early-season growth.\nData collected so far shows that in 2008, forsythia in Chicago opened first flowers between April 17 and 19 -- almost a full week earlier than the 2007 flowering dates of April 23 to 25. In Ohio, flowering dogwood reached full bloom on May 8 last year, two weeks earlier than in 2007.\nThat tallies with other university studies that show spring is arriving earlier in a warming world.\nAccording to a 2005 study by Stanford University, spring has leapt forward by nearly 10 days in the last 30 years. And Cornell University's array of lilacs planted in 72 locations throughout the Northeast show that the shrubs are blooming four to eight days sooner than 40 years ago.\nFrom small observations important conclusions can be reached, and you don't need a college degree to have your say. The internet has made it easy for hoards of ordinary citizens to participate in Project Bud Burst -- think of it as a national science project. Data is entered online at budburst.org, where you'll find step-by-step instructions for getting with the program.\nBasically, you'll select one or more plants to observe from the website list of more than 75 widely distributed species -- lilacs, maples, oaks, etc. Begin checking plants at least a week prior to the average date when the first buds have opened and leaves are visible. Then continue to observe, recording the date when all leaves are open, when the first flower appears, when seeds form and shed or when fall color emerges.\nYou can see what others have noted on the website's maps, which reflect reports from across the country. Last year, 4,861 observations were reported online from participants in every state except Hawaii.\nThis year, you can put yourself on the map with data from your own backyard, and add \"citizen scientist\" to your portfolio of skills. It has a jaunty sound, no?"
] | [
"<urn:uuid:6356bdef-7486-445f-80c4-70f00b1fcf28>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.nj.com/homegarden/garden/index.ssf/2009/04/signs_of_spring_are_emerging_e.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164941522/warc/CC-MAIN-20131204134901-00074-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9601059556007385
] | [
934
] | [
2.984375
] | [
3
] |
[
"COSEE NOW is pleased to present: Antarctica melting, a 4-part audio slideshow series on the fastest winter warming place on Earth, as seen through the eyes of three scientists. The slideshows, and accompanying lesson plans, provide a first hand look into the role that global climate change has had in transforming the Antarctic environment.\nTag Archives | Antarctica\nTo understand the ocean ecosystem, at some point you have to get in a boat. In this travelogue, Dr. Alex Kahl shows us how he collects samples of phytoplankton in Antarctica using a small boat, some bottles and a lot of filters.\nRobotic underwater gliders are helping oceanographers conduct research all over the world. Even in Antarctica. Learn how you can connect your students with cool real-time ocean science from the frigid waters of Antarctia in this data activity."
] | [
"<urn:uuid:5032f597-0ded-48ef-aa5e-cad5542f518e>"
] | [
"CC-MAIN-2020-05"
] | [
"http://coseenow.net/blog/tag/antarctica/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251672537.90/warc/CC-MAIN-20200125131641-20200125160641-00287.warc.gz"
] | [
"en"
] | [
0.918853759765625
] | [
177
] | [
2.59375
] | [
3
] |
[
"ROLE OF RISER IN SAND CASTING\nMetals and their alloys shrink as they cool or solidify and hence may create a partial vacuum within the casting which leads to casting defect known as shrinkage or void. The primary function of riser as attached with the mould is to feed molten metal to accommodate shrinkage occurring during solidification of the casting. As shrinkage is very common casting defect in casting and hence it should be avoided by allowing molten metal to rise in riser after filling the mould cavity completely and supplying the molten metal to further feed the void occurred during solidification of the casting because of shrinkage. Riser also permits the escape of evolved air and mold gases as the mold cavity is being filled with the molten metal. It also indicates to the foundry man whether mold cavity has been filled completely or not. The suitable design of riser also helps to promote the directional solidification and hence helps in production of desired sound casting.\n1. Considerations for Desiging Riser\nWhile designing risers the following considerations must always be taken into account.\n(A) Freezing time\n1 For producing sound casting, the molten metal must be fed to the mold till it solidifies completely. This can be achieved when molten metal in riser should freeze at slower rate than the casting.\n2 Freezing time of molten metal should be more for risers than casting. The quantative risering analysis developed by Caine and others can be followed while designing risers.\n(B) Feeding range\n1. When large castings are produced in complicated size, then more than one riser are employed to feed molten metal depending upon the effective freezing range of each riser.\n2. Casting should be divided into divided into different zones so that each zone can be feed by a separate riser.\n3. Risers should be attached to that heavy section which generally solidifies last in the casting.\n4. Riser should maintain proper temperature gradients for continuous feeding throughout freezing or solidifying.\n(C) Feed Volume Capacity\n1 Riser should have sufficient volume to feed the mold cavity till the solidification of the entire casting so as to compensate the volume shrinkage or contraction of the solidifying metal.\n2 The metal is always kept in molten state at all the times in risers during freezing of casting. This can be achieved by using exothermic compounds and electric arc feeding arrangement. Thus it results for small riser size and high casting yield.\n3 It is very important to note that volume feed capacity riser should be based upon freezing time and freezing demand. Riser system is designed using full considerations on the shape, size and the position or location of the riser in the mold.\n2 Effect of Riser\nRiser size affects on heat loss from top at open risers. Top risers are expressed as a percentage of total heat lost from the rises during solidification. Risers are generally kept cylindrical. Larger the riser, greater is the percentage of heat that flows out of top. Shape of riser may be cylindrical or cubical or of cuboids kind. If shape is cylindrical i.e. 4″ high and 4″ dia, insulated so that heat can pass only into the circumferential sand walls, with a constant K value of 13.7 min./sq.ft. Chvorinov’s rule may be used to calculate the freezing time for cylinder as 13.7 min. The freezing time of a 4″ steel cube of same sand is 6.1 minutes and the freezing time of a 2″, 8″ and 8″ rectangular block is also 6.1 min. Since the solidification time as calculated of the cylinder is nearly twice as long as that of either the block of the cube. Hence cylindrical shape is always better. Insulation and shielding of molten metal in riser also plays a good role for getting sound casting. Copied from A Textbook of a Basic Manufacturing Processes and Workshop Technology by Rajender Singh."
] | [
"<urn:uuid:ac292f21-2776-43d4-8443-a1f7c0291364>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.engineersgallery.com/role-riser-sand-casting/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323730.30/warc/CC-MAIN-20170628185804-20170628205804-00368.warc.gz"
] | [
"en"
] | [
0.9357287883758545
] | [
831
] | [
3.046875
] | [
3
] |
[
"CSB/SJU Health Promotion is committed to:\n- Being Proactive\nWhat is Health?\nHealth is the state of mental, physical, and social well-being, not merely the absence of disease or infirmity.\nWhat is Health Education?\nHealth education is any combination of planned learning experiences, based on sound theories, which provide individuals, groups, and communities the opportunity to acquire the information and skills needed to make quality health decisions.\nWhat is Health Promotion?\nHealth promotion is any planned combination of educational, political, environmental, regulatory, or organizational mechanisms that support actions and living conditions conducive to the health of individuals, groups, and communities.\nWhat is Wellness?\nWellness is an approach to health that focuses on balancing the many aspects or dimensions of a person's life through the adoption of health enhancing conditions and behaviors, rather than attempting to minimize conditions of illness."
] | [
"<urn:uuid:7f07c9e0-df83-47dd-95f9-bd2138608aa6>"
] | [
"CC-MAIN-2013-48"
] | [
"http://csbsju.edu/CHP/Health-Promotion/About-us.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164003787/warc/CC-MAIN-20131204133323-00040-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.930115818977356
] | [
184
] | [
2.78125
] | [
3
] |
[
"On my last day of actual teaching (only Finals Week to go before my retirement), I am proud to announce a major breakthrough in the rights of transgender and other gender-variant people on the federal level.\nOn Tuesday the Department of Educations Office of Civil Rights issued a letter barring all schools which receive Title IX funds from the Federal government from discriminating against gender-nonconforming students, entitled Questions and Answers on Title IX and Sexual Violence.\nTitle IX’s sex discrimination prohibition extends to claims of discrimination based on gender identity or failure to conform to stereotypical notions of masculinity or femininity and OCR accepts such complaints for investigation. Similarly, the actual or perceived sexual orientation or gender identity of the parties does not change a school’s obligations. Indeed, lesbian, gay, bisexual, and transgender (LGBT) youth report high rates of sexual harassment and sexual violence. A school should investigate and resolve allegations of sexual violence regarding LGBT students using the same procedures and standards that it uses in all complaints involving sexual violence. The fact that incidents of sexual violence may be accompanied by anti-gay comments or be partly based on a student's actual or perceived sexual orientation does not relieve a school of its obligation under Title IX to investigate and remedy those instances of sexual violence.\nIf a school's policies related to sexual violence include examples of particular types of conduct that violate the school's prohibition on sexual violence, the school should consider including examples of same-sex conduct. In addition, a school should ensure that staff are capable of providing culturally competent counseling to all complainants.\nWe hear from hundreds of students each year who simply want to be themselves and learn at school. Sadly, many schools continue to exclude transgender students from being able to fully participate. Now, every school in the nation should know they are required to give all students, including transgender students, a fair chance at success.\n--Masen Davis, Executive Director of Transgender Law Center\nThis guidance is crystal clear and leaves no room for uncertainty on the part of schools regarding their legal obligation to protect transgender students from discrimination. The Office for Civil Rights must now take the next step and issue comprehensive guidance on Title IX and transgender students.\n--Ian Thompson, ACLU\nThis is the first time the federal government has extended rules prohibiting sex discrimination in education to cover transgender students.\nIn 2012 The Equal Employment Opportunity Commission issued a similar ruling in an attempt to protect transgender employees from workplace discrimination.\nIt certainly would be our view that transgender students should be given the ability to participate in sex segregated activities, like sports teams, consistent with their gender identity. Failure on part of the school to allow that would be discrimination against that student.\nThe other areas in which federal law explicitly protects people on the basis of gender identity are the Matthew Shepard and James Byrd Hate Crimes Act and the Violence Against Women Act.\nThere’s clearly a tremendous amount of work still to be done. The important point is in the absence of explicit protections in federal statutes.\nThis guidance is very helpful, and having OCR take this position with respect to Title IX is very significant. But it should not be read as a substitution for explicit sexual orientation and gender identity nondiscrimination protections being put into place with a federal statute.\nThe ACLU calls for Congress to pasas both the Student Non-Discrimination Act (SNDA) and the Employment Non-Discrimination Act (ENDA), which both explicitly would protect transgender people.\nThis announcement is a breakthrough for transgender students, who too often face hostility at school and refusal by school officials to accept them for who they truly are. It is now clearer than ever that schools nationwide are responsible for ensuring that transgender students are respected and safe, and students can seek protection from the Department of Education and the courts if schools fail to do so.\nEvery student has a fundamental right to go to school in a safe learning environment that respects who they are as a person. We thank the Department of Education for doing the right thing and standing with transgender and gender non-conforming students who desearve nothing less than a safe learning experience."
] | [
"<urn:uuid:8864a96e-31aa-44d0-95ed-6f259e1a8b50>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.voicesonthesquare.com/essays/2014/05/02/doe-office-civil-rights-extends-title-ix-protections-transgender-students"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00633.warc.gz"
] | [
"en"
] | [
0.9419293403625488
] | [
827
] | [
2.640625
] | [
3
] |
[
"Intelligent contracts are digital transaction protocols that are executed after compliance with a number of contract rules. Intellectual contracts are executed without third party intervention. Blockchain smart contracts are decentralized, and the data set entered into the contract is irreversible. Blockchain smart contracts are protected by cryptography. All data is stored decentralized, as in the case of any other blockchain data. This is the most transparent form of transaction between two parties. The entire transaction process is automated.\nBelow are examples of the use of smart contracts in real conditions.\n- Commercial contracts: two commercial houses can be rented offline by hiring a legal adviser and finalizing the commercial conditions. It can cost both sides their time, effort and money. Later, a dispute may arise even regarding the contract or the terms of the contract. Blockchain technology solves this business problem through smart contracts. Develop a way to conduct business transparently and without problems. Once mutually agreed terms for running a business are programmed in a smart contract, no one can change it. It works as if the manufactured item was sent, then the manufacturer must receive payment.\n- Smart contracts in education: if the academic data of an educational institution are on the blockchain, smart contracts can be defined. For example, in the process of administration, this may be applied. Suppose that if the university’s 12th board has a 96% reduction, then a written smart contract can be made. The programmed smart contract will select the profile of those students whose blockchain result shows 96% or more grades. Other terms of the contract may be those who wanted to go to university and can get more at YellowHeart Blockchain.\n- Ownership of the blockchain: if the land-related data from the registry office brought the blockchain, everything will be quite transparent and there will be no fraudulent complaints. Developing smart land details contracts can greatly reduce inconvenience. Firstly, the duplication of property will be impossible. Land cannot be sold to more than one person. As for the header authorization check, there is no need to follow a strict autonomous process. Blockchain data will show the entire history of ownership of the land in question."
] | [
"<urn:uuid:bb147c4f-d52b-4019-b09a-c860fcc99cce>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.orderitontheweb.com/benefits-of-blockchain-smart-contracts.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250595787.7/warc/CC-MAIN-20200119234426-20200120022426-00023.warc.gz"
] | [
"en"
] | [
0.931441605091095
] | [
424
] | [
3.109375
] | [
3
] |
[
"- Posted March 10, 2013 by\nNaval Officers Design IT Solution for Military Suicide\nThe highest U.S. military suicide rate on record occurred in 2012 with approximately one active duty military member committing suicide every day along with one veteran every hour. With the inspiration of Dr. Nancy Roberts at the Naval Postgraduate School, two Navy Mustang junior officers set out to identify the underlying cause of suicide in the US military and design an IT solution to help mitigate further occurrences. Armed only with pencils, paper and a rational assessment of existing studies and data, LT Darryl Diptee and LTJG Jason Baker created the new theory of Chronic Emotional Atrophy (CEA) that offers an explanation why people in the US military may become suicidal. They also designed an IT solution called “EVA” to help curb future episodes of suicidal ideation in the armed forces.\nLT Diptee and LTJG Baker’s research paper entitled “Tackling Wicked Problems: Suicide in the US Military”will be published in the proceedings of the 10th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2013), and also presented in Baden-Baden, Germany this May.\nDuring their research, they noticed extreme similarity in the symptoms displayed by physically healthy military members who are suicidal and medical patients with frontal lobe damage to the brain. The brain’s frontal lobe is identified as an emotional epicenter which separates humans from lower species of animals. Medical patients with frontal lobe damage lose much of their ability to feel emotion and exhibit symptoms of: increased depression, apathy (indifference), drinking, risk taking and aggression, as well as social self-isolation and emotional numbness. Noticing that many members of the military also demonstrate these symptoms (particularly those who are suicidal), Diptee and Baker deduced that military members might be losing the emotional functionality of their frontal lobes due to severe underuse within the emotionally sanitized confines of the US military. Their proposed theory of Chronic Emotional Atrophy (CEA) asserts that suicidal ideation in the military is environmentally induced primarily due to an emotionally sterilized military culture which causes atrophy of the frontal lobe’s functionality.\nCEA is thought to slowly strip away those most delicate human qualities: the ability to experience deeply embedded, secondary emotion. This leaves a person with a frontal lobe that basically doesn't work right, essentially emotionally numb. Recommendations to combat CEA include performing activities that promote frontal lobe stimulation (FLS)... activities that will help a person suffering from CEA regain their sense of being human again.\nFrontal Lobe Stimulation (FLS) includes activities such as:\n- writing or expressing personal feelings as poetry, in a journal, blog etc.\n- painting/drawing emotions on paper or canvas\n- forming/maintaining healthy, emotional bonds with others (friends, family, acquaintances, pets)\n- talking openly about emotions with others in a non-judgmental arena\n- participating in healthy group activities (walk in park, picnic, cafe), that build the bond of being part of a larger group (even if only 1 other person)\n- group / individual meditation, clearing the mind of the \"noise\" and establishing oneself in \"being\".\nTo help fight the effects of CEA for deployed troops, they created the Emotional Vitality Assistant (EVA) model using a special design process developed by Stanford University. EVA is a web-based solution that is: 1) socially acceptable 2) technically feasible and 3) economically viable. Their proposed solution mitigates CEA by increasing stimulation of the frontal lobe via personal expression and virtual therapy. This psychiatric information technology solution fills many gaps in current military mental healthcare while offering benefits such as: therapeutic continuity and mobility, privacy, convenience and just-in-time therapy to name a few. EVA would host a global network of civilian therapists who would offer psychiatric sessions via video chat and voice communications. An EVA Smartphone application would allow military members to privately express their emotions “on the fly” with their therapists, which can later be discussed during scheduled therapy sessions.\nLT Diptee and LTJG Baker hope to promote their theory of CEA and the EVA model in hopes of mitigating the elusive problem of suicide in the US Military. The research paper is on the public domain and freely accessible at http://www.darryldiptee.com/research.html"
] | [
"<urn:uuid:33853818-b1b5-4185-ae1e-0ef0cccd144c>"
] | [
"CC-MAIN-2013-20"
] | [
"http://ireport.cnn.com/docs/DOC-939769?ref=feeds/latest"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00025-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9419885277748108
] | [
919
] | [
2.75
] | [
3
] |
[
"Welcome to The Truth News.Info\nDescendants of Sitting Bull, Crazy Horse break away from US\nThe Lakota Indians, who gave the world legendary warriors Sitting Bull\nand Crazy Horse, have withdrawn from treaties with the United States,\nleaders said Wednesday.\n\"We are no longer citizens of the United States of America and all those\nwho live in the five-state area that encompasses our country are free to\njoin us,\" long-time Indian rights activist Russell Means told a handful\nof reporters and a delegation from the Bolivian embassy, gathered in a\nchurch in a run-down neighborhood of Washington for a news conference.\nA delegation of Lakota leaders delivered a message to the State\nDepartment on Monday, announcing they were unilaterally withdrawing from\ntreaties they signed with the federal government of the United States,\nsome of them more than 150 years old.\nThey also visited the Bolivian, Chilean, South African and Venezuelan\nembassies, and will continue on their diplomatic mission and take it\noverseas in the coming weeks and months, they told the news conference.\nLakota country includes parts of the states of Nebraska, South Dakota,\nNorth Dakota, Montana and Wyoming.\nThe new country would issue its own passports and driving licences, and\nliving there would be tax-free -- provided residents renounce their US\ncitizenship, Means said.\nThe treaties signed with the United States are merely \"worthless words\non worthless paper,\" the Lakota freedom activists say on their website.\nThe treaties have been \"repeatedly violated in order to steal our\nculture, our land and our ability to maintain our way of life,\" the\nreborn freedom movement says.\nWithdrawing from the treaties was entirely legal, Means said.\n\"This is according to the laws of the United States, specifically\narticle six of the constitution,\" which states that treaties are the\nsupreme law of the land, he said.\n\"It is also within the laws on treaties passed at the Vienna Convention\nand put into effect by the US and the rest of the international\ncommunity in 1980. We are legally within our rights to be free and\nindependent,\" said Means.\nThe Lakota relaunched their journey to freedom in 1974, when they\ndrafted a declaration of continuing independence -- an overt play on the\ntitle of the United States' Declaration of Independence from England.\nThirty-three years have elapsed since then because \"it takes critical\nmass to combat colonialism and we wanted to make sure that all our ducks\nwere in a row,\" Means said.\nOne duck moved into place in September, when the United Nations adopted\na non-binding declaration on the rights of indigenous peoples -- despite\nopposition from the United States, which said it clashed with its own laws.\n\"We have 33 treaties with the United States that they have not lived by.\nThey continue to take our land, our water, our children,\" Phyllis Young,\nwho helped organize the first international conference on indigenous\nrights in Geneva in 1977, told the news conference.\nThe US \"annexation\" of native American land has resulted in once proud\ntribes such as the Lakota becoming mere \"facsimiles of white people,\"\nOppression at the hands of the US government has taken its toll on the\nLakota, whose men have one of the shortest life expectancies -- less\nthan 44 years -- in the world.\nLakota teen suicides are 150 percent above the norm for the United\nStates; infant mortality is five times higher than the US average; and\nunemployment is rife, according to the Lakota freedom movement's website.\n\"Our people want to live, not just survive or crawl and be mascots,\"\n\"We are not trying to embarrass the United States. We are here to\ncontinue the struggle for our children and grandchildren,\" she said,\npredicting that the battle would not be won in her lifetime.\n2008: The year a new superpower is born\nBy Cahal Milmo\nPublished: 01 January 2008\nHere comes the world's newest superpower. The rest of the world is gloomily contemplating economic slowdown and even recession. Not in Beijing. China is set to make 2008 the year it asserts its status as a global colossus by flexing frightening economic muscle on international markets, enjoying unprecedented levels of domestic consumption and showcasing itself to a watching world with a glittering £20bn Olympic Games.\nThe world's most populous nation will mark the next 12 months with a coming-of-age party that will confirm its transformation in three decades from one of the poorest countries of the 20th century into the globe's third-largest economy, its hungriest (and most polluting) consumer and the engine room of economic growth.\nOnce regarded at best as a sporting also-ran, China is widely tipped to top the medals table in the Beijing Olympics in August, an event in which the country's leadership is investing huge importance and prestige.\nIt will be a celebration viewed with consternation by many, as China's authoritarian regime shows little sign of relaxing its grip on power and continues to expand its influence overseas from the oil fields and metal mines of Africa to the City of London. Appropriately, 2008 marks the Year of the Rat, an animal considered in Chinese folklore to be a harbinger and protector of material prosperity.\nBritain will feel the full power of the new superpower's confidence. This month, for the first time, China's state-controlled banks will begin spending some of its $1.33trn (£670bn) in foreign currency reserves on London's financial markets. Beijing has ruled that Britain should become only the second destination after Hong Kong to be allowed to receive investors' money via so-called \"sovereign funds\" – the huge state-controlled surpluses built up by cash-rich economies from Qatar to South Korea. Throw in the biggest round of Chinese art exhibitions ever to tour these islands and the oriental bias to 2008 becomes even more pronounced.\nThe UK has made it clear that Beijing's investment, which could reach as much as £45bn, is welcome and it follows the recent acquisition by Chinese banks of stakes in such blue chip stocks as Barclays and the US private equity firm Blackstone, at a cost of $3bn. The talk in the finance houses is that the label \"Made in China\" will soon be replaced by one reading \"Owned by China\". Takeover speculation has provoked concern in some quarters at the wisdom of selling large assets to organs of a democratically unaccountable state where the financial sector remains underdeveloped.\nChina's trade surplus with the rest of the world will widen from £130bn in 2007 to £145bn this year as it tries to tame its burgeoning economy amid pressure from Washington and Brussels to narrow the trade gap and raise its currency's value.\nStephen Perry, chairman of the 48 Group Club, a Sino-British business network, said: \"China has become an international player much more quickly than it would have wanted to do, in part to meet its need for natural resources. But I don't think China has any intention of taking on American power. The West is important to China in this stage of its development as it seeks inward investment. But that is beginning to be much less important and it is looking more to the development of a strong Asia, in which it is one of the strongest players because of its enormous consumer base.\"\nBut while some may question Beijing's political motives, there is no doubt that China has arrived as serious power-broker. Last year, it surpassed America as the greatest driver of global economic demand. It is also widely predicted to overtake Germany as the world's third largest economy this year.\nWhile nearly all of its success since Premier Deng Xiaoping began China's economic transformation in 1978 has been driven by producing goods for the outside world, the country has a burgeoning urban middle-class whose insatiable appetite for consumer durables is hoped to put the economy on a more stable footing. One London-based luxury markets analyst said: \"The Chinese are waking up to quality brands in a way that is quite exciting. There is a real sense that what the West once kept to itself is now available to them, or at least the urban few who can afford it.\"\nThe arrival of conspicuous consumption and entry of Shanghai's sovereign funds into foreign investment markets, with London soon expected to be followed by the US, is symptomatic of a China increasingly willing to assert itself as a political and cultural influence, according to experts.\nFrom global warming to Darfur and North Korea, the views of Beijing and its willingness to act have become prerequisites to any solution to the world's most pressing problems.\nThe Chinese New Year on 7 February will herald the beginning of the largest-ever festival of China's culture in Britain with an accent on contemporary artists in fields from video art to neon signs. But others warn 2008 has as much potential to be a disaster as a triumph for Beijing's attempts to herald its own arrival on the world stage. The Chinese capital will host 31,000 journalists for the Olympics and any sign of protest or an attempt to quell dissent with violence would be catastrophic.\nThe drum beat of protectionism is already sounding in America and will only get louder in a presidential election year, putting pressure on both Republican and Democratic candidates to take a \"strong\" stance on China. In the meantime, Beijing will have to grapple with issues from rising inflation to Taiwan, which holds presidential elections in March, to its status as the world's biggest emitter of carbon dioxide and likely role as the largest consumer of primary energy resources.\nDr Kerry Brown, associate fellow of the Royal Institute of International Affairs, said: \"There are good reasons to feel pretty uncomfortable about 2008 for China. The world will be rightly watching China in August for the Olympics. But it will only take one truncheon blow to turn it away from a story about sport to one about repression.\"\nThe most controversial issue in American healthcare\nOn Tuesday, Jan. 8, at 9:00 PM (Eastern), 10:00 PM (Pacific), Public\nBroadcasting System will examine the most controversial issue in American\nwhy are more than 6 million American children being forced to take powerful,\ntoxic psychiatric drugs--some starting as young as two years old?\nIs it good medicine? What's the evidence to support the practice?\nThe program promises to examine what many psychiatrists are beginning to\nacknowledge: American children are being subjected to an uncontrolled high\nrisk experiment. Millions of American children are being prescribed the most\ntoxic brain damaging drugs--with absolutely no scientific evidence of a\ntherapeutic benefit to support the practice.\nThe increasing use of antipsychotic drugs for children is correlated with an\ninexplicable epidemic in American children being \"diagnosed\" as bipolar, an\nunprecedented diagnosis in children. Bipolar just happens to be an FDA\napproved use for antipsychotic drugs.\nSo, the marked increased rates of bipolar diagnoses in children over the\nlast five to seven years appears to be a case of the drugs prompting the\nIndeed, as Dr. Steven Hyman, a neuroscientist and former director of the\nNational Institute of Mental Health, acknowledges, those diagnoses are\nunsupported by scientific evidence.\nPsychiatry's sling-shot prescribing practices rely on an irresponsible\ndictum: shoot first, ask questions years after major harm has been done.\nSuch a cowboy mentality has led to a market-driven chemical assault on our\nChildren's fears, cries, and anxieties, are being muffled with toxic drugs\nthat undermine their mental and physical health.\nPsychiatrists who are financially invested in expanding the market are\ndiverting parents' attention from the lack of science and the drugs' harmful\nHopefully, viewers will wake up to the fact that America's children are the\ntarget of psychopharmacological abuse.\nThere is no credible scientific evidence demonstrating a therapeutic benefit\nfrom antipsychotics. These drugs' most prominent effect is somnolence.\nHow many children--like four-year old Rebecca Riley-- will be sacrificed\nbefore this lethal paradigm of \"treatment\" in psychiatry is halted?\nIs bad medicine any better just because it is promoted by influential\nHarvard University child psychiatrists ?\nContact: Vera Hassner Sharav\nIsrael to brief George Bush on options for Iran strike. Bush: We would defend Israel against Iran.\nBy Uzi Mahnaimi, Tel Aviv\nJanuary 6, 2007 - ISRAELI security officials are to brief President George W Bush on their latest intelligence about Iran’s nuclear programme - and how it could be destroyed - when he begins a tour of the Middle East in Jerusalem this week.\nEhud Barak, the defence minister, is said to want to convince him that an Israeli military strike against uranium enrichment facilities in Iran would be feasible if diplomatic efforts failed to halt nuclear operations. A range of military options has been prepared.\nLast month it was revealed that the US National Intelligence Estimate report, drawing together information from 16 agencies, had concluded that Iran stopped a secret nuclear weapon programme in 2003.\nIsraeli intelligence is understood to agree that the project was halted around the time of America’s invasion of Iraq, but has “rock solid” information that it has since started up again.\nWhile security officials are reluctant to reveal all their intelligence, fearing that leaks could jeopardise the element of surprise in any future attack, they are expected to present the president with fresh details of Iran’s enrichment of uranium - which could be used for civil or military purposes - and the development of missiles that could carry nuclear warheads.\nIn an interview with the Israeli newspaper Yediot Aharonot this weekend, Bush argued that in spite of the US intelligence assessment, Iran still posed a threat.\n“I read the intelligence report carefully,” Bush said. “In essence, what the report said was that Iran had a secret plan to develop nuclear weapons.\n“I’m saying that a state which adopted a nontransparent policy and had a secret plan for developing nuclear weapons could easily develop an alternative plan for the same purpose. So to conclude from the intelligence report that there is no Iranian plan to develop nuclear weapons will be only a partial truth.”\nIsraeli security officials believe the only way to prevent uranium enrichment to military grade is to destroy Iranian installations. Many Israelis are eager to know whether America would give their country the green light to attack, as it did last September when Israel struck a mysterious nuclear site in Syria.\nBush refused to be drawn when asked whether he would support an Israeli attack. “My message to all countries in the region is that we are able to solve the problem in a diplomatic way,” he said, “but all options are on the table.”\nPakistanis See US as Greatest Threat\nby Jim Lobe\nWASHINGTON - Amid reports that the administration of U.S. President George W. Bush is considering aggressive covert actions against armed Islamist forces in western Pakistan, a new survey released here Monday suggested that such an effort would be opposed by an overwhelming majority of Pakistanis themselves.\nThe survey, which was funded by the quasi-governmental U.S. Institute of Peace (USIP) and designed by the University of Maryland’s Programme on International Policy Attitudes (PIPA), also found that a strong majority of Pakistanis consider the U.S. military presence in Asia and neighbouring Afghanistan a much more critical threat to their country than al Qaeda or Pakistan’s own Taliban movement in the tribal regions along the border with Afghanistan.\nOnly five percent of respondents said the Pakistani government should permit U.S. or other foreign troops to enter Pakistan to pursue or capture al Qaeda fighters, compared to a whopping 80 percent who said such actions should not be permitted, according to the poll, which was based on in-depth interviews of more than 900 Pakistanis in 19 cities in mid-September.\nAs a result, the survey did not take account of the tumultuous events that have taken place in Pakistan since then, including the six-week state of emergency declared by President Pervez Musharraf, the sacking of the Supreme Court, the return from exile of former prime ministers Benazir Bhutto and Nawaz Sharif, and Bhutto’s Dec. 27 assassination which has led to the delay of scheduled parliamentary elections from Jan. 8 until next month.\nTo what extent those events may have influenced public opinion in Pakistan on the range of issues covered by the survey — particularly toward the Pakistani Taliban, one of whose leaders, Baitullah Mehsud, has been accused by the government of carrying out Bhutto’s killing — cannot be known.\nBut the underlying attitudes revealed in the poll, especially toward the U.S., can offer little very little comfort to the administration, which has become increasingly alarmed about recent events in Pakistan, particularly Bhutto’s death, the Pakistani army’s reluctance to take on the Taliban, and intelligence reports that al Qaeda and its local allies, including the Taliban, have intensified their efforts to destabilise the government.\nOn Sunday, the New York Times ran a front-page article regarding a White House meeting Friday in which top officials, including Vice President Dick Cheney and Secretary of State Condoleezza Rice, reportedly debated pressing Musharraf and his new military leadership to permit the Central Intelligence Agency (CIA) and U.S. Special Operations Forces (SOF) to carry out more aggressive covert operations against selected targets in the Federally Administered Tribal Areas (FATA), the quasi-autonomous tribal areas that have come become increasingly dominated by the Pakistani Taliban who have more recently extended their influence into the Northwest Frontier Province. The U.S. currently has about 50 soldiers in Pakistan acting primarily in an advisory and intelligence capacity.\nWhile some administration officials reportedly believe that recent events have persuaded Musharraf and the army that they need such assistance to curb the growing Taliban-al Qaeda threat, regional specialists both in and outside the administration have argued that such an intervention risked further destabilising the country by triggering what the Times called “a tremendous backlash” against the U.S. and any government that was seen as its accomplice.\nDespite the nearly four-month hiatus since the USIP-PIPA survey was conducted, its findings would certainly appear to support the latter prediction.\nA whopping 84 percent said the U.S. military presence in the region was either a “critical” (72 percent) or an “important” (12 percent) threat to Pakistan’s “vital interests”.\nBy comparison, 53 percent of respondents said they believed tensions with India — with which Pakistan has fought several wars — constituted a “critical threat”; 41 percent named al Qaeda as a “critical threat”; 34 percent put “activities of Islamist militants and local Taliban” in the same category.\nAsked to choose from a list of alleged U.S. goals in the region, 78 percent cited Washington’s alleged desire “to maintain control over the oil resources of the Middle East” (59 percent said it was “definitely” a goal, 19 percent said “probably”); 75 percent (53 percent “definitely”) cited “to spread Christianity”; and 86 percent (70 percent “definitely”) said it was “to weaken and divide the Islamic world”. Only 63 percent (41 percent “definitely”) chose the option “to prevent more attacks such as those on the World Trade Centre in September 2001.”\nMoreover, a majority of respondents said they believed that the U.S. controls either “most” (32 percent) or “nearly all” (24 percent) of the recent major events that have taken place in Pakistan, compared to 22 percent who attributed “some” control to the U.S. and four percent who said “very little”. Eighteen percent declined to respond.\nAs to Pakistan-U.S. security cooperation, less than one in five respondents said it had either benefited Pakistan primarily or both equally. Forty-four percent said it had mostly benefited the U.S.; and 11 percent said neither party had benefited.\nDistrust of the U.S., however, did not translate into support for radical Islamists, the Taliban, or al Qaeda, according to the survey. While they were considered much less of a threat than the U.S., six out of 10 respondents said they considered the Taliban and al Qaeda either a “critical” or an “important” threat” to Pakistan.\nAnd even as huge majorities opposed any U.S. or foreign military intervention against the two groups in Pakistan, pluralities approaching 50 percent said they would support the Pakistani army entering the FATA to capture al Qaeda fighters or Taliban insurgents who have crossed over from Afghanistan.\nComparable pluralities said they favoured phasing out FATA’s special legal status and integrating its areas into the country’s overall legal structure, but also prefer taking a gradualist approach that includes negotiating with the local Taliban over using military force to impose the central government’s control.\nThe survey also found overwhelming support for government based both on “Islamic principles” and on democratic ideals, including an independent judiciary and being governed by elected representatives. While six in 10 respondents said they supported a larger role for Islamic law, or Shari’a, in Pakistan’s legal system, only 15 percent said they wanted to see more “Talibanisation of daily life”, a common phrase used in Pakistani media to refer to extreme religious conservatism.\nIndeed, more than eight in 10 said it was important for Pakistan to protect its religious minorities; more than three out of four said attacks on those minorities are “never justified”; and nearly two out of three said they support government plans to regulate religious schools, or madrassas, to require them to teach secular subjects, such as math and science. Only 17 percent said they oppose those reforms.\nIn general, those respondents who supported the expansion of Shari’a and government based on “Islamic principles” also tended to favour both democratic ideals and educational reforms at higher rates than others.\n© 2007 Inter Press Service\nVeterans Need to Enroll in VA Healthcare Before January 17\nfrom Jesus' General by lokywoky\nUnder this provision, any veteran who is 0% service-connected (not disabled by being wounded or otherwise injured during their service) will be unable to enroll in VA Health Care after January 17, 2008. This ends a promise made to vets that has stood since WWII, that their health care needs would be taken care of in perpetuity.\nALL VETERANS: Take a copy of your DD214 and RUN do not walk to your nearest VA Clinic and enroll in VA Health Care - even if you don't need it right now! If you lose your civilian health insurance and need to fall back on VA Health Care - you will not be able to unless you enroll now.\nIRAQ AND AFGHANISTAN WAR VETS: This applies to you as well - only the news is actually worse. In the last military appropriation bill, your \"free\" health care was extended from two years to five. Yes, you heard right - you are currently only entitled to two years of free health care - even if you have seen combat. After Bush vetoed the military spending bill, which contained another three years, you are back to TWO WHOLE YEARS!\nEVERYONE: Write to your Congresscritters and protest this asinine policy. I am a veteran - who never saw combat during the Vietnam era. I am enrolled, and as such, am entitled to whatever healthcare I need for the rest of my life. I have no other health insurance (due to pre-existing conditions and past medical problems) so the VA system is my lifeline. But why in the world are the combat veterans of our latest idiotic wars being told they can only have TWO YEARS? Some ailments do not become apparent until much later. For instance - Vietnam vets exposed to Agent Orange develop diabetes at a rate that has resulted in an automatic assignment to a special group for care. However, this diabetes does not develop in some cases for 10-20 years later. Another example - Gulf War vets from the first time who suffer from Gulf War Syndrome develop strange cancers and other problems - but much later than two years after the fact - and many are still fighting to get their diagnoses confirmed.\nThis is totally nuts - and is yet another example of the Bush Administration's support of the valiant fighting men and women - NOT!\nSo...if you are a vet - or you know one - urge them all to go sign up. Even if they don't need it. Right now. Even if they have heard horror stories. Even if they never use it. Sign up anyway. We need to send a message that VA Health Care is a right for ALL VETERANS as compensation for their service. (The pay certainly isn't much!)\nClick Here To Comment"
] | [
"<urn:uuid:4353c8b7-1597-4476-9d6f-7bf73d68d38a>"
] | [
"CC-MAIN-2017-26"
] | [
"http://thetruthnews.info/1708.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00186.warc.gz"
] | [
"en"
] | [
0.9560679197311401
] | [
5227
] | [
2.578125
] | [
3
] |
[
"Cardiovascular diseases (CVDs) are the events that are associated with any alteration in the functioning of heart and blood vessels and they include:\n• coronary heart disease\n• cerebrovascular disease\n• peripheral arterial disease\n• rheumatic heart\n• congenital heart disease\n• deep vein thrombosis and pulmonary embolism\nHeart attacks and strokes are acute events and are most commonly caused by a blockage that prevents blood from flowing to the heart or to the brain.\nEuropean Society of Cardiology; British Cardiovascular Society; World Heart Federation, Asian Pacific Society of Cardiology; Cardiac Society of Australia & New Zealand; Russian Society of Cardiology."
] | [
"<urn:uuid:59c0c152-c766-4758-be05-33e3956388f9>"
] | [
"CC-MAIN-2020-05"
] | [
"https://scietechinternational.com/cardiovasculardiseases/scientificsessions/Cardiovascular-diseases"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599789.45/warc/CC-MAIN-20200120195035-20200120224035-00113.warc.gz"
] | [
"en"
] | [
0.8761899471282959
] | [
140
] | [
2.921875
] | [
3
] |
[
"The WWF is run at a local level by the following offices...\nPROTECTING TIGERS = PROTECTING PEOPLE\nAs an apex predator, Malayan tigers keep populations of prey species in check, which in turn maintains the balance in the ecosystem. This is not only important for wildlife, but for people too. Their habitat is natural forest, which we as humans rely on. Whether it is directly for our livelihoods or indirectly for food, for carbon sequestration or for other vital ecosystem services.\nAs the effects of climate change are becoming more apparent, natural forests are becoming increasingly important as they are our best bet to increase our resilience - they provide fresh water, clean air and regulate the climate to limit extreme weather, such as droughts and storms.\nPoaching is the most urgent threat to the tiger’s survival in the wild. The very existence of the Malayan tiger is now critically threatened and on the brink of extinction. We do not want to be a part of the generation that stands to lose the Malayan tiger."
] | [
"<urn:uuid:68f9773a-3b0c-4284-9830-922769b1a681>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.wwf.org.my/tiger_pledge_/why_we_must_save_our_tigers/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00181.warc.gz"
] | [
"en"
] | [
0.9438982009887695
] | [
214
] | [
3.234375
] | [
3
] |
[
"Primarily, this was originally invented for adults. They are made of a plastic shell that would fit perfectly on the entire teeth of a single jaw (upper and lower). Its original design is that it would leave no place for any teeth that may erupt during the whole treatment. This is the reason why the devices weren’t used in young patients whose teeth were still erupting.\nHowever, after becoming so popular thanks to its array of advantages, compared to the standard braces (especially with regards to aesthetic appeal), a need was felt to create the same product for younger patients. Thus, giving birth to the teen version. This version has tabs that are left in places where a tooth is expected to erupt. At the time when a tooth would erupt, the tab is broken, thus allowing the tooth to break out and grow. With this, the unique advantage of the original version is retained, while allowing the development of new teeth which is beneficial to growing children. Read about other orthodontic treatments available.\nFor those who are thinking of getting these, in general, it’s actually a lot easier than getting traditional braces. This is all thanks to the addition of CAD/CAM software and equipment.\nWith the use of modern technology and advanced dental techniques, fitting them may be done all in one day. Below are the following steps:\n- Consultation Stage – the initial dental consultation involves a two-way process. The dentist will first examine the patient and determine whether it would be the best choice for you. Don’t hesitate to ask your dentist about anything that troubles you or you’re curious about. For example, how long it will take or the price. Moreover, you can also ask your dentist for a simulation of how your or your child’s smile would look like after the series is complete.\n- Record Evaluations – the entire procedure starts with collecting data about the patient’s dental records. The following data will be taken:\n- Making Dental Impressions – the dentist will take an accurate impression of the patient’s teeth before the treatment. This will be done by using an impression putty and then using advanced technology, it will be digitized into the computer using a software. If there are other tools available, it will be read off the 3-D optical data directly from the patient’s mouth into the computer.\n- Bite Registration – afterwards, the dentist will create a record of the patient’s bite pattern. For example, how his or her teeth in the lower and upper jaw meet with each other.\n- Dental X-rays – these x-rays will provide your oral surgeons with enough data to evaluate the jaw bone and the tooth roots. Furthermore, this includes jawbone health as well as its current root positioning. A panoramic x-ray or a full-mouth series, or possibly both, may also be taken.\n- Photographs – the dentist would require the patient to take several pictures of his or her facial feature. This includes front and side photos, front and side close-up of closed teeth, and close-up pictures of upper and lower dental arches. All these, along with any comments from the dentist, will be sent to the manufacturer.\n- Simulation – after receiving all the data, they will then generate a simulation that shows the different stages of patient’s teeth through the entire realignment session. This simulation will be given back to our dentist for any further suggestions or a final “GO” signal. The patient can also see this simulation through the screen inside the clinic. Just ask your doctor about it.\n- Manufacturing and Delivery – once our doctor has developed a plan, the aligners will then be created using computer-aided manufacturing (CAM). Afterwards, those will be delivered here and given to you during your final consultation with our dentist.\n- How long do you need to wear them? – The entire duration of treatment depends on how severe the patient’s case is. Overall, it can be expected to take over a year to finish. Also, each set must be worn constantly for 2 weeks straight, as many hours in a day (and night) as possible."
] | [
"<urn:uuid:5af67e9d-4773-4440-8aea-bd0a319b52b8>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.highlandoakdental.com/orthodontics/invisalign-teen-clear-braces-aligners/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607596.34/warc/CC-MAIN-20200122221541-20200123010541-00075.warc.gz"
] | [
"en"
] | [
0.948416531085968
] | [
864
] | [
2.546875
] | [
3
] |
[
"Science Cafe: Saving the World’s Waterfowl\nHow did North Carolina become home to one of the world’s largest and most biologically significant bird parks? Hear the story directly from Mike Lubbock, the man who embarked on many expeditions to the most remote areas of the planet, studying and collecting birds in order to save them from extinction.\nFrom the Okavango Delta in Africa, to Australia, Alaska and Argentina, Lubbock explored the wilds, relying on his vast knowledge of avian behavior to locate and safely collect incubated eggs of various waterfowl species for captive management and study. As a consultant, Mike worked with other naturalists attempting to save critically endangered species such as the White-headed Duck in Spain, the Atitlan Grebe of Guatemala and most recently, the Brazilian Merganser in the Serra da Canastra National Park of Brazil.\nLubbock ultimately brought his expertise in avian behavior and breeding techniques to North Carolina, establishing Sylvan Heights Bird Park in Scotland Neck. The park allows the public to view the many colorful varieties of bird species from around the world, attend eco-education programs, and observe wildlife in the park’s natural wetland.\nA separate section of Sylvan Heights encompasses the extensive Avian Breeding Center, where Mike and a highly trained staff of aviculturalists work tirelessly to breed rare and endangered species of waterfowl and other birds.\nAbout the Speaker:\nMike Lubbock is Executive Director of Sylvan Heights Bird Park and founder of Sylvan Heights Avian Breeding Center, organizations dedicated to the survival of the world’s waterfowl species. In addition to receiving 17 World and 15 North American First Breeding Awards, he was inducted into the International Wild Waterfowl Association’s Hall of Fame and is also a recipient of the prestigious Jean Delacour Avicultural Award."
] | [
"<urn:uuid:b6c8ef30-efce-426c-8d99-9bece506fb78>"
] | [
"CC-MAIN-2013-48"
] | [
"http://naturalsciences.org/programs-events/science-cafe-saving-world%E2%80%99s-waterfowl"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164003787/warc/CC-MAIN-20131204133323-00045-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9219070672988892
] | [
391
] | [
2.921875
] | [
3
] |
[
"Jordan Bryant | Staff Writer\nThe country that carries an ancient and colorful history known to many, has been hit by an escalating debt crisis. For the past five years, Greece has endured a hard hitting recession with a total debt of 323 Billion Euros. Greece has faced negotiations and bailouts to securely handle the situation within these past few weeks. The European Union has agreed to release eighty-six Billion Euros over the next three years.\nThis will be the third bailout given to Greece by the European Union. To accept this bailout, the Greek government is required to not spend too much money, which has led to cuts on spending and higher taxes. This has led to protests by Greek citizens who are against the government’s plan. The world now watches closely to see if Greece will pay 1.6 billion Euros, which was due Tuesday July 21.\nIt’s easy to see that times have been rough for the Greek citizens. After five years of a recession, the country struggles to keep their spirits up as ATMs and banks are closing and limiting the amount of money given to citizens. Many are becoming stressed by the large cap that has been placed, which has made accessing funds difficult.\nHospitals and officials have noticed a rise in depression and suicide among the population. Researchers are studying to further understand the reason for these rising numbers. “Everyone is hopeless in Greece,” says Bettina Davou, Chief Researcher of the study. Some were hit harder than others, particularly those who lost their jobs. For many of these people, they have no hope in their government to get them out of this recession.\nMany Americans, especially college students, can sympathize with these issues. Many students in public and private universities are struggling to pay for schools that the total cost after four years is over $100,000. Students face choices such as taking out loans that may be a hinderance for a majority of their adult lives or joining the military to help thwart costs. Some students often think that college isn’t worth it and drop-out because of costs, leaving them stranded in a college-educated nation.\nMoney runs the world. Many countries rely on natural resources such as gas, oils and minerals for finances, but some have to specifically rely on the tourism industry. For a relatively large country such as Greece, relying on profits from tourism can only go but so far. Hopefully, before things get worse, Greece’s government can figure out a way to ensure growth for the country in the future."
] | [
"<urn:uuid:41bc9be4-cc5e-4056-ac55-d1efd3d8be9d>"
] | [
"CC-MAIN-2017-26"
] | [
"https://hamptonscript.com/2015/07/24/greece-economy-still-suffering-from-debt-crisis/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00607.warc.gz"
] | [
"en"
] | [
0.977618396282196
] | [
513
] | [
2.8125
] | [
3
] |
[
"|Title||A Canopy Trimming Experiment in Puerto Rico: The Response of Litter Invertebrate Communities to Canopy Loss and Debris Deposition in a Tropical Forest Subject to Hurricanes|\n|Publication Type||Journal Article|\n|Year of Publication||2010|\n|Authors||Richardson, B, Richardson, B, Grizelle González, Shiels, AB, Srivastava, DS|\n|Keywords||canopy gaps, community composition, forest manipulation, Fungi, Litterbags, relative abundance|\nHurricanes cause canopy removal and deposition of pulses of litter to the forest floor. A Canopy Trimming Experiment (CTE) was designed to decouple these two factors, and to investigate the separate abiotic and biotic consequences of hurricane-type damage and monitor recovery processes. As part of this experiment, effects on forest floor invertebrate communities were studied using litterbags. Canopy opening resulted in increased throughfall, soil moisture and light levels, but decreased litter moisture. Of these, only throughfall and soil moisture had returned to control levels 9 months after trimming. Canopy opening was the major determinant of adverse changes in forest floor invertebrate litter communities, by reducing diversity andbiomass, irrespective of debris deposition, which played a secondary role. Plots subjected to the most disturbance, with canopy removed and debris added, had the lowest diversity and biomass. These two parameters were higher than control levels when debris was added to plots with an intact canopy, demonstrating that increased nutrient potential or habitat complexity can have a beneficial effect, but only if the abiotic conditions are suitable. Animal abundance remained similar over all treatments, because individual taxa responded differently to canopy trimming. Mites, Collembola, and Psocoptera, all microbiovores feeding mainly on fungal hyphae and spores, responded positively,with higher abundance in trimmed plots, whereas all other taxa, particularly predators and larger detritivores, declined in relative abundance. Litterbag mesh size and litter type had only minor effects on communities, and canopy trimming and debris deposition explained most variation between sites. Effects of trimming on diversity, biomass, and abundance of some invertebrate taxa were still seen when observations finished and canopy closure was complete at 19 months. This suggests that disturbance has a long-lasting effect on litter communities and may, therefore, delay detrital processing, depending on the severity of canopy damage and rate of regrowth."
] | [
"<urn:uuid:d7ab7059-6b4d-4946-a8e1-735ab02a798b>"
] | [
"CC-MAIN-2017-26"
] | [
"http://luq.lternet.edu/content/canopy-trimming-experiment-puerto-rico-response-litter-invertebrate-communities-canopy-loss"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00188.warc.gz"
] | [
"en"
] | [
0.9047660231590271
] | [
514
] | [
2.828125
] | [
3
] |
[
"The History of Hip-Hop Music\n1925: Earl Tucker (aka Snake Hips), a performer at the Cotton Club invents a dance style similar to today’s hip-hop moves. He incorporates floats and slides into his dance style. Similar moves would later inspire an element of hip-hop culture known as breakdancing.\n1940: Tom the Great (a.k.a. Thomas Wong) uses a booming sound system to please his audience. Wong also utilizes hip American records to steal music-lovers from local bands.\n1950: The Soundclash contest between Coxsone Dodd’s “Downbeat” and Duke Reid’s “Trojan” gives birth to DJ Battling.\n1956: Clive Campbell is born in Kingston, Jamaica. Campbell would later become the father of hip-hop.\n1959: Parks Commissioner Robert Moses starts building an expressway in the Bronx. Consequently, middle class Germans, Irish, Italians, and Jewish, neighborhoods disappear in no time. Businesses relocate away from the borough only to be replaced by impoverished black and Hispanic families. Along with these poor people came addiction, crime, and unemployment.\n1962:James Brown records Live At The Apollo. Brown’s drummer Clayton Fillyau influences a sound that is now known as the break beat. The break beat would later inspire the b-boy movement, as breakers danced to these beats at block parties.\n1965: In a historic boxing bout, Muhammad Ali (born Cassius Clay) defeats Sonny Liston in the 6th round. Before the bout, however, Ali recited one of the earliest known rhymes:\nClay comes out to meet Liston\nAnd Liston starts to retreat\nIf Liston goes back any further\nHe’ll end up in a ringside seat.\nClay swings with a left,\nClay swings with a right,\nLook at young Cassius\nCarry the fight.\nListon keeps backing\nBut there’s not enough room\nIt’s a matter of time…\n1967: Clive Campbell migrates to the United States at the age of 11. Because of his size, kids at Alfred E. Smith High School nickname him Hercules. He would later become a writer and change his name to Kool Herc.\n1968: A gang named Savage Seven would hit the streets of the East Bronx. Savage Seven later transforms into Black Spades, before eventually becoming an organization known as Zulu Nation.\n1969: James Brown records two songs that would further influence the drum programming in today’s rap – “Sex Machines” with John Starks playing the drums and “Funky Drummer” with Clyde Stubblefield on the drums.\n1970: DJ U-Roy invades Jamaican pop charts with three top ten songs using a style known as toasting. The Last Poets release their self-titled debut album on Douglas Records combining jazz instrumentations with heartfelt spoken word. (The Last Poets would later appear on Common’s 2005 rap anthem, “The Corner.”)\n1971: Aretha Franklin records a well-known b-boy song “Rock Steady.” The Rock Steady crew would go on to rule in the world of break-dancing, with members all across the globe.\n1972: The Black Messengers (a group that staged performances for The Black Panthers and rallies relating to black power movement) feature on The Gong Show.\nHowever, they are only allowed to perform under the alias “Mechanical Devices,” because of their controversial name.\n1973: DJ Kool Herc deejays his first block party (his sister’s birthday) at 1520 Sedgwick Avenue, Bronx, NY. Herc would often buy two copies of a record and stretch the break parts by using two turntables and mixing in both records before the break ends. The Zulu Nation is officially formed by a student of Stevenson High school named Kevin Donovan. Donovan later changed his name to Afrika Bambaataa Aasim in honor of an ancient Zulu chief.\n1974: After seeing DJ Kool Herc perform at block parties, Grandmaster Caz, Grandmaster Flash, and Afrika Bambaataa start playing at parties all over the Bronx neighborhoods. Around this time, DJ/MC/Crowd Pleaser Lovebug Starski starts referring to this culture as “hip-hop.”\n1976: DJ Afrika Bambaataa performs at the Bronx River Center. Bambaataa’s first battle against Disco King Mario sparks off the DJ battling that is now embedded in the culture.\nLearn mofs learn!"
] | [
"<urn:uuid:9318a0fe-f2eb-4535-9eb1-eea806195fd3>"
] | [
"CC-MAIN-2013-20"
] | [
"http://offthedaycrew.tumblr.com/post/28852533627/lyfstyl-hip-hop-timeline-1925-present-part"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382450/warc/CC-MAIN-20130516092622-00006-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9434590339660645
] | [
983
] | [
3.328125
] | [
3
] |
[
"In Chapter 8, what are some examples of The Golden Rule?\nThis is the chapter where something unusual happens. There is snow in Maycomb. When this happens, Scout and Jem, understandably are excited and they begin to make a snowman. As they do, the snowman begins to look like Mr. Avery, a neighbor that the children are not very fond of. When Atticus comes home, he orders Jem to disguise the snowman, because the children are mocking Mr. Avery. In other words, they have broken the golden rule. Here is what Atticus says:\n“I don’t care what you do, so long as you do something,” said Atticus. “You can’t go around making caricatures of the neighbors.”\n“Ain’t a characterture,” said Jem. “It looks just like him.” “Mr. Avery might not think so.”\nWhat makes this contrast even starker is that Boo Radley shows great kindness and thoughtfulness to Scout. When Ms. Maudie's house burns down and the people are watching during the cold night, Boo comes by and places a blanket around Scout. This is an example of fulfilling the golden rule.\nThe Golden Rule is \"Do unto others as you would have them do unto you.\" In Chapter 8, there are several instances where characters demonstrate The Golden Rule by treating others the way they would want to be treated. When Maudie's house is on fire, the neighbors all demonstrate selflessness and altruism by helping remove Maudie's furniture before her house collapses in flames. Concerned citizens risk their lives by entering the burning home in order to help Miss Maudie. While the men help remove furniture from the burning home, Jem and Scout watch at a distance from the Radley yard. Scout is freezing in the cold weather, and Boo Radley displays his kindness by leaving the comforts of his home to put a blanket over her shoulders. Boo Radley's actions show that he cares about Scout's well-being and demonstrates The Golden Rule."
] | [
"<urn:uuid:00afb682-22be-4a1a-8cd8-60c796d71c0f>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.enotes.com/homework-help/chapter-8-what-some-examples-golden-rule-479096"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319688.9/warc/CC-MAIN-20170622181155-20170622201155-00217.warc.gz"
] | [
"en"
] | [
0.9602873921394348
] | [
438
] | [
3.46875
] | [
3
] |
[
"If you’re one of the countless many who carry around a USB flash drive, you’re already a solid state drive user of sorts. After all, a flash drive is little more than a flash memory chip or two mounted on a printed circuit board (PCB). The interface may differ from that of an internal system drive, but the system command codes are the same. Another key difference is that the controller on a USB drive rests inside the PC while an SSD or HDD will have a controller built onto the drive’s PCB. The speed benefits of an on-board controller should be fairly obvious. Which would be more effective: walking out to the adjacent building to get instructions from your manager or poking your head around the corner into the next cubicle?\nTo take this metaphor one step further, imagine each memory chip as a worker. If a bunch of papers come in that need filing, two workers can get the job done in less time than one. Similarly, if papers need to be fetched and sent out, then the more workers, the faster the task performance. This is why “dual-channel” flash drives with two memory chips perform faster than a single-channel drive with one chip and why bargain-oriented SSDs with five flash chips on their PCBs will perform slower than more expensive drives with 10 chips. There are several other factors that affect performance, as we’ll see, but this is one of the most important.\nA hard drive uses platters, much like old LP records in concept, mounted on a rotating spindle. A read/write head mounted on an arm extends over the platter surface and uses a magnetic field to control the orientation of particles on the platter’s surface. The magnetic orientation of groups of these particles represent binary bits—0s or 1s. The density of these particles and the number of platters in the drive dictate the drive’s total capacity. To read or write data, the drive controller must instruct the head to move into exactly the right position over the platter, and this “seek time” is one of the main causes of delay inherent in hard disk technology. If your application only needs to perform one seek followed by a long period of continuous reading or writing (such as when playing back a media file), then total throughput performance is much better than when it has to seek many tiny blocks of information scattered across the platter’s surface.\nThe difference between streaming and random reads/writes is a bit like finding certain bits of music on an LP. With streaming, you might grab the needle arm, position it right above the gap between tracks 1 and two, then lower it and just let the music play. But with random reads, you might want to stay playback 10 seconds into track 1, 20 seconds into track 4, 50 seconds into track three, etc., and only play each of those segments for five seconds each. There's a lot of hopping around the platter, and you're going to spend an inordinate amount of time trying to precisely position the needle over the exact right spot in each track. It's all that \"seeking\" time that kills you. Random seeks are what kill hard drive performance.\n“Solid state” simply means an electronic device comprised of non-moving parts. A solid state drive is little more than memory chips, an intelligent controller, a circuit board, power and data interfaces, and a rugged external case. Actually, some internal SSDs dispense with the case and are meant to simply plug into an I/O slot on the motherboard, such as the mini PCI Express slot in notebooks.\nAnyways, I got an X25-M G2 (OEM) for $220 @Newegg during Black Friday.\nAn SSD is just an extra cost of $150-300. It has no practical effect on the storage space your computer has."
] | [
"<urn:uuid:ae2b7363-0deb-415b-9b75-e3eaff0dd007>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.tomsguide.com/us/ssd-value-performance,review-1455-3.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00165.warc.gz"
] | [
"en"
] | [
0.9409713745117188
] | [
805
] | [
3.234375
] | [
3
] |
[
"Kenneth Cobonpue is a celebrated Filipino designer known for his work with bamboo, rattan, and other natural fibers. Until recently, Cobonpue had stuck mainly to the interior design world, creating award-winning furniture, lighting and home décor pieces for his design firm.\nBut recently, Cobonpue delved into the automotive realm, designing the world’s first biodegradable vehicle, called the Phoenix. Though the engine and wheels are made of longer-lasting materials, the “skin” that houses the vehicle is built mainly from bamboo and rattan, and can easily be reabsorbed by the planet. “This project attempts to unveil the future of green vehicles using woven skins from organic fibers mated to composite materials and powered by green technology,” says Mr. Cobonpue. The skin is designed to last 5-10 years, and can easily be replaced once it wears out. Additional features on the Phoenix include eco-friendly, energy efficient LED light bulbs, which provide illumination internally and externally.\nThough it might feel a little Swiss Family Robinson to be tooling around town in a bamboo roadster, this invention—along with the inclusion of LED fixtures—shows that forward-thinking designers are prioritizing a cleaner planet. We’re proud that LED lights are a part of developments like this one."
] | [
"<urn:uuid:e6fbeced-fceb-4a56-830f-4f038b0db13c>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.elementalled.com/academy/blog/green-eco-friendly/led-lights-adorn-the-word%e2%80%99s-first-biodegradable-car/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702730377/warc/CC-MAIN-20130516111210-00079-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9556290507316589
] | [
280
] | [
2.546875
] | [
3
] |
[
"(A Note. This article is in progress with detailed information still being added to all the classes.)\nThe article is in three parts\nSp. Species. Species roses are the wild roses of the world and by most estimates there are about a one hundred and forty that occur in the Northern Hemisphere. To date it is believed there are no wild roses has evolved naturally south of the equator. Peter Beales in his book ‘A Passion for Roses’ breaks the species roses down to the four main regions that are found to be growing naturally. They are: Europe, Asian Minor, Asia and North America.\nEurope. The most common species in Europe is R. canina or the dog rose. It is frequently used as the backbone of English Hedgerows and is also used as understock for colder parts of Europe. Additionally Mr. Beales lists R. rubiginosa, R. eglanteria and R. pimpinellifolia, formerly known as r. spinosissima, as roses frequently found wild in Europe. It is worth noting that R. eglanteria is particularly known for its apple scented foliage and R. pinpimellifolia for its tolerance of extreme cold and poor soil conditions. The latter grow as small shrubs making them invaluable for the garden. A few like Stanwell Perpetual and Aicha will repeat throughout the season.\nAsian Minor. Perhaps the most known species roses from this region is R. foetda. It later gave rise to R. foetida ‘Persiana’, which was used in the breeding of Soleil d’Or and introduced the yellow/orange color to the breeding of roses. Today’s hybrid yellow varieties can almost all be traced back to R. foetida ‘Persiana’.\nAsia. The most important species to come from this area is R. chinensis, also known as R. indica. Used as the parent for several China Hybrids brought to Europe in the last 18th and early 19th centuries, the repeat flowering characteristic of roses can be traced back to this rose. Four of those hybrids, ‘Old Blush’, ‘Slater’s Crimson’, ‘Hume’s Blush’ and ‘Park’s Yellow’, became known as the four stud Chinas. Mr. Beales also points out that of all the garden-worthy wild roses those from Asia have the showiest hips – a very important part of their appeal and use in a garden.\nNorth America. Colorful autumnal foliage is a trait that most species from this region have\nin common. The most brilliant display comes from R. virginiana and is followed by lots of small, orange-red hips. R. nitida, R. nutkana and R. californica are others well worth growing as is R. palustris for its open habit, large pink blooms and remontant qualities.\nSpecies Roses in the garden. From an orderly garden where a spot of joyous chaos can lend a touch of spontaneity to a wilder area of the garden where the can freely mix with other plants of the same ilk; Species Roses, with their wide range of growth characteristics make them invaluable garden plants. They are terrific when grown as hedges where their variance of characteristics is on full display. Their hips are a great source of food for birds in winter in addition to a colorful display – particularly against a fresh snowfall. The varieties with showy fall foliage should be planted in any garden where this is a desirable feature.\nThey are virtually care free and need little more than any shrub growing on its own in the garden. After all they have stood the test of time of their own and outside of cleaning out of dead wood and the taking out of an old cane they are best left to their own devices.\nThe main reason gardeners give for not growing species roses is that they are spring flowering, meaning they flower only in spring for on average a month or so. This argument should be overlooked as they are attractive shrubs even when not in flower and serve as a backdrop to summer and autumnal flowering perennials and shrubs. In addition their fall foliage and display of hips extend their “showy” season well beyond the spring.\nA. Alba. Also known as ‘The White Roses’ they are derived from a cross of R. canina with probably R. damascena. With the former they share smooth stems, healthy gray-green foliage and shrubby habit. Another characteristic is for the most part they are more tolerant of shade than other roses.\nSpring flowering in habit, their graceful growth habit and color of foliage provide a terrific backdrop for other plants in the garden. The blooms are fragrant despite their nickname also come in exquisite shades of pink. Albas should also be used in hedges and natural woodland plantings where dappled light is present. They tend to be very winter hardy.\nAlbas need very little care other than removal of dead wood and the occasionally taking out of an old cane to make room for new ones. If desired they can be kept to shrub shape by using the methods developed for shrub roses. They do not take to being hard-pruned.\nAyr. Ayrshire. R. arvensis at one point produced a little group of double ramblers mostly white. Some accounts have the name coming about because the first double form of R. arvensis was supposedly found in a village in Ayrshire, Scotland. A few are still in commerce today such as ‘Bennett’s Seedling’ and ‘Venusta Pendula’, ‘Ayrshire Splendens’ is fragrant and considered to be perhaps the most outstanding example of this class.\nIn the garden the Ayrshire roses are very hardy and grow in a prostrate fashion, making them terrific ground covers. This would suggest they could be useful for weed and erosion control on hillside. The other unique characteristic of these roses is they thrive in a thin woodland setting where they thrive being grown into trees.\nLike most ramblers the Ayrshire need little care. Removal of dead wood, taking out of the odd old cane are about all they need.\nB & Cl B. Bourbon and Climbing Bourbon. So named because most experts believe the first rose of this class occurred on the Ile de Bourbon (now known as Ile de Réunion). The first was ‘Rose Edouard’ the result of a spontaneous cross between a China rose, probably ‘Old Blush’, and the Damask rose, most likely an early form of ‘Quatre Saisons’. When Rose Edouard arrived in France in about 1818 it was quickly realized that it’s rounded, fully double, fragrant blooms that appeared from spring to fall not only made it a good rose for commerce but valuable breeding stock. At that time repeat flowering roses were limited to the Chinas and a few Portlands. In Rose Edouard repeat flowering was now found in a bloom with the look and fragrance of Old European Roses.\nIn the garden the Bourbons offer a wide variety of characteristics. Some are short and busy and, others will produce large arching canes and some make excellent climbers. Almost all repeat flower but there are a few that do not and some class them as Hybrid Bourbons so as to keep them separate.\nFrom the China roses the Bourbons inherited a silky quality to their petals making they outstanding roses for the mixed border. Their range of color from white to pink to red and even some striped, easily allows them to mix with other plants and roses. In a border of old roses their repeat flowering quality extends the season. Those with longer canes take well to pegging, being grown as pillar roses and for covering a short fence.\nIn some climates they can be prone to blackspot but good plant husbandry and mixing in perennials, annuals and shrubs will minimize that. Left alone some will build up disease resistance as they mature. Pruning should be done with a light hand. Removal of dead wood, an occasional old cane and on the larger varieties bringing the laterals back to within a foot of the main cane is about all that is needed. If desired they can be kept to shrub shape by using the methods developed for shrub roses. They do not take to being hard-pruned.\nBslt. Boursalt. Hybrids of the central European species R. pendulina the first was a near species known as R. x l’heritierana. Most Boursaults are climbers of which ‘Mme de Sancy de Parbère’ is the perhaps the best known example.\nIn the garden they useful for growing into trees, covering walls and some can even be grown as very large free standing shrubs. For the most part they are thornless and feature blooms in large clusters.\nAs with many roses like this the less care the better. Prune out dead wood, occasionally remove an old cane and outside of that it’s best to leave them alone.\nC. Centifolia. Not much is known about their true origin other than they have a very mixed heritage. In the sixteenth and seventeenth centuries they were widely hybridized by the Dutch, making them among the first group of roses to be developed this way. The Dutch most likely cultivated them as cut flowers and evidence of their work can be seen in many of the paintings of Dutch and Flemish old masters.\nTheir large flowers and many petals gave them nickname ‘Cabbage Roses’ and ‘hundred-petaled’ roses. The former nickname is often erroneously given to any multi-petaled rose with old rose characteristics.\nIn the garden their growth habit is from small and tidy to tall and sprawling. While they are spring flowering, their diversity of habit makes it easy to mix them with other shrubs in the garden. Stems can range from smooth to very thorny, a trait most likely due to the diversity of their background. What they do all have in common is excellent fragrance and large blooms in mostly shades of pink.\nCentifolias need little care other than removal of dead wood and the occasionally taking out of an old cane to make room for new ones. If desired they can be kept to shrub shape by using the methods developed for shrub roses. They do not take to being hard-pruned.\nD. Damask. From mixed parentage it is likely than many have origins in the Gallicas. Damask roses are highly prized for their attar, which is used by perfumeries for rose scents. For this reason they are excellent choices for making pot-pourri. Needless to say they are among the most fragrant group of roses we have.\nSpring flowering; the shrub is attractive and the downy-gray ribbed foliage adds a nice note of texture to the garden. The growth habit is relaxed but not overly large either. They are excellent when used in borders, mingled with other perennials and shrubs. Damasks are winter hardy.\nDamasks need little care other than removal of dead wood and the occasionally taking out of an old cane to make room for new ones. If desired they can be kept to shrub shape by using the methods developed for shrub roses. They do not take to being hard-pruned.\nHBc. Hybrid Bracteata. Offspring from “the Macartney Rose” or Rosa barcteata. They tend to be climbers, very vigorous and unlike most other ramblers offer repeat bloom in the autumn. The other great characteristic is the wonderful glossy foliage and extremely sharp thorns. They make great security fences.\nHCan. Hybrid Canina. These are hybrid versions of Rosa Canina, which is the species rose hedgerows in England are made of. As a group they are tough, cold hardy roses that bloom in the spring. The hybrids are showier and more manageable than the species version. Great roses for “wild” hedges and gardens.\nHCh & Cl CH. Hybrid China and Climbing Hybrid China. A wonderful group of heavily repeating shrub roses. Their small stature makes them perfect for the front of the border or in pots. Sadly not winter hardy, but if you grow them in pots you can bring them indoors for the winter.\nHEg. Hybrid Eglanteria. Also known as Sweet Briar roses, they are known for their distinctive apple scented foliage, and make wonderful garden shrubs when allowed to grow naturally. Some will even offer some repeat bloom later in the season. Winter hardy -another great use is to grow them tightly together as a hedgerow, a great natural security fence.\nHFt. Hybrid Foetida. A group of very yellow roses with touches of sulfur. Mostly once blooming and very wild looking, they are a great addition to a more natural planting – perhaps even mixing them with wild grasses.\nHGal. Hybrid Gallica. I’ve always loved these once blooming roses because they seem to be the only class that gives us a true almost purple color. Very fragrant these roses actually need some winter chill to bloom, much like lilacs.\nHGia. HYBRID GIGANTEA. Off shots of the Gigantea rose from southwest China and upper Burma. They get HUGE. 40 feet or more up a tree is not uncommon. They are not winter hardy but in a warm climate, up a tree they are sight to behold.\nHMult. Hybrid Multiflora. These are some of the true ramblers of the roses world and we plan to expand this collection in the years to come. Ramblers are not grown much in this country and it’s a shame because allowed to rumble up into a tree or a hedge they can usher in spring with a bang. Once blooming and winter hardy.\nHP & Cl HP. Hybrid Perpetual and Climbing Hybrid Perpetual. This is a group of roses you either love or hate. Everyone agrees the flowers are among the most exquisite in the rose world. But the plant can sometimes be gangly in appearance. This can be remedied by cutting them back hard in the winter, or by planting behind other plants towards the back of the border where the blooms can be seen above them. As landscape shrubs the reliability of their repeat blooming, their fragrance and winter hardiness make them indispensable in the garden.\nHsem. Hybrid Sempervirens. Lovely graceful group of old ramblers, of which “Felicite Perpetue” might be the most well known. Good for up into trees as they cascade a shower of blooms every spring. Nearly evergreen, but slightly too tender for cold climates.\nHSet. Hybrid Setigera. A great group of ramblers that will flower later in the season than most. They are very hardy and in most cases very fragrant.\nHSpn. Hybrid Spinosissima. Once blooming smallish shrubs that are winter hardy and disease resistant.\nHSte. Hybrid Stellata. Related to the native rose of the Texas and Arizona desert, this is a rose that actually prefers a lot of sun and very well drained soil. The are dwarf growing, with gray-green stems that form a wonderful small thicket.\nMiscOGR. Miscellaneous Old Garden Rose. The catchall category. Each roses should be considered individually.\nM. & Cl M. Moss and Climbing Moss. Known as Moss roses because of the “Moss” like hairs covering the buds. These are beautiful roses and are well worth growing. Winter hardy, most don’t repeat but some like Salet will recur during the year.\nN. Noisette. The best group of climbing roses we have. Fragrant, graceful in growth habit, alas they are not winter hardy. They do great in our foothills area where nights get into the 20s but I don’t know how much further north they can go. In future years we will begin to see which ones can handle what climates and pass this on to you. One of my favorite class of roses.\nP. Portland. (Damask Perpetual) This is an overlooked group of lovely landscape roses. Not tall in habit, repeat blooming, great textured foliage, hardy, fragrant they should be in every perennial border.\nT & Cl T. Tea and Climbing Tea. Not hybrid tea but “Tea”. Why these aren’t more widely grown in gardens is a total mystery to me. They bloom heavily and are fragrant. The shrub when left to it’s own devices will grow into a well shaped four to five feet. Their only drawback is they are tender but grow them in pots (they love it) and bring them indoors.\nF & Cl F. Floribunda and Climbing Floribunda. This is class of roses often over shadowed by the showier hybrid teas and it is too bad. As a rule they bloom heavily and make great landscape shrubs. Some are winter hardy.\nGr & Cl Gr. Grandiflora and Climbing Grandiflora. The blooms are very much like Hybrid Teas but the growth habit is taller and more upright. These are very useful landscape shrubs for against a house or at the back of the border.\nHKor. Hybrid Kordesii. Repeat blooming and very, very winter hardy these are good landscape shrubs for a casual border in that they don’t like orderliness. Some can be used a short climbers.\nHmoy. Hybrid Moyesii. The species form of this created a sensation when it was introduced into cultivation in 1908 for its blood red colored flowers. The growth habit is of a very large upright shrub, once blooming a great display of hips in the autumn. Good for the back of the border or where you need to shade perennials from the direct sun.\nHMsk. Hybrid Musk. A unique group of roses that are very useful in the garden because of their ability to thrive in dappled sunlight. As a plant they fill out to a graceful round shape that can anchor any border. In warm climates some can even be grown as short climbers.\nHRg. Hybrid Rugosa. These are the roses that are found wild on the beaches of Maine. They are great landscape shrubs for their flowers and also for their pale green ribbed foliage. Very disease resistant, very hardy they don’t like spraying so be careful. I find in hot climates they like being planted where they are out of the mid-day sun.\nHWich. Hybrid Wichurana. A group of rambling roses that gets its characteristics from R. Wichurana. They are tall growers with canes that are quite pliable making them very useful ramblers for those spots where the canes need to be trained like over arbors and such. Generally once blooming.\nHT & Cl HT. Hybrid Tea and Climbing Hybrid Tea. These are not the hybrid teas we think of today but rather some of the early hybrid teas. They are good landscape shrubs in they repeat bloom and stay mid-sized in stature. They are also good for pots.\nLCL. Large Flowered Climber. Exactly what they say they are some are repeat blooming and winter hardiness can vary. They are a beautiful group of roses that perhaps are hampered by being associated with today’s repeat climbing roses. At their best are more of a true rambling type rose.\nMin & Cl Min. Miniature and Climbing Miniature. The climbers in this class are just like their little shrub cousins but they climb to about 6’. Very effective in a small garden or on a patio.\nMiniFl. Mini-Flora. This is a new class of roses. Too large to be miniatures and to small to be Floribundas – hence the name Mini-Flora. They grow to around 2-3 feet in height and bear their blooms in sprays throughout the season. Great for mass planting, low hedges, front of the border or in pots.\nPol & Cl Pol. Polyantha and Climbing Polyantha. Also known sometimes as patio roses these are have blooms too big to be miniatures and too small to be Floribundas. Very popular in Europe they deserve to be more widely grown here. Great for that splash of color in a pot or at the front of the border.\nS. Shrub. Another catchall class of roses they are wonderful roses for the landscape because as advertised they are shrubs. Sadly it’s become the class that everything gets dumped into that defies a neat description. One we have is a group of roses that grow all different ways and sizes. When shopping from this class (and we suggest you do) pay close attention to descriptions of growth habit to make sure you are getting what you need."
] | [
"<urn:uuid:15a30183-7595-466d-b7a1-536b1ec38ccb>"
] | [
"CC-MAIN-2023-14"
] | [
"https://paulzimmermanroses.com/articles/types-of-roses/rose-classes-and-their-characteristics/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00588.warc.gz"
] | [
"en"
] | [
0.9561179876327515
] | [
4414
] | [
3.25
] | [
3
] |
[
"The settlement of Southern Cross was raised ‘from the lowest depths of despondency … to the highest pitch of excitement’ when Arthur Bayley and his party discovered 554 ounces of gold at Coolgardie, in 1892. The Great Australian gold rushes had arrived in Western Australia in earnest, leading to an influx of people from all over the world to the remote and arid region. Prospectors, shopkeepers and merchants soon established a thriving tent city based on the wealth gained from the rich deposits of gold.\nThe Coolgardie discoveries, and other Western Australian finds, occurred in the latter stages of the Australian rushes. This explains the more advanced mining techniques and equipment used in the state, such as dry blowing (the winnowing of the alluvial ground) and steam-power (typically employed in large mines run by English syndicates). Another innovation was that of the ‘chum’ system, that is, small groups of men who sunk shafts with a view to selling their claim to mining financiers."
] | [
"<urn:uuid:ce55630e-bf72-4a52-80cc-cf4ee4edea3f>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.egold.net.au/biogs/EG00154b.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783342.96/warc/CC-MAIN-20200128215526-20200129005526-00283.warc.gz"
] | [
"en"
] | [
0.96540367603302
] | [
212
] | [
3.546875
] | [
4
] |
[
"Thomas Jefferson (1801-1809)\nEpisode #2 of the course Greatest US presidents by Patrick Allitt\nJefferson was one of the most highly educated and brilliant men of 18th-century America. His beautiful and ingenious Virginia house, Monticello, is a monument to his inventiveness. A planter, a lawyer, an amateur scientist, an astute observer of human behavior, and a genuine idealist, Jefferson drafted the Declaration of Independence in 1776. He was US ambassador to France in the 1780s, Secretary of State to President Washington in the early 1790s, and vice president in the late 1790s under President Adams.\nHis election is often called “The Revolution of 1800.” During the 1790s, political parties had begun to form, an unforeseen development that alarmed many Americans. Washington and John Adams were Federalists; Jefferson was a Republican. Nevertheless, he won, was admitted to be the winner, and took over peacefully. The world then had very few democracies. Elections and transfers of power created dangerous opportunities to the losing party, but the defeated Federalists accepted the result of the election, thereby enhancing American political stability.\nThe central event of Jefferson’s presidency, in retrospect, was the Louisiana Purchase. Louisiana then comprised all the headwaters of the Mississippi River up to the crest of the Rocky Mountains, the middle one-third of the continental United States as it is today. Most of the area was, as yet, unexplored by white Americans. The politically and economically important part of Louisiana was the mouth of the Mississippi River and the port of New Orleans; to possess them was to control trade on the river itself.\nNapoleon, desperately in need of money to fight his wars in Europe, offered the whole area to Jefferson’s negotiators for $15 million. Though unsure of whether the Constitution entitled him to accept the deal, Jefferson also saw the opportunity as too good to miss. The Senate agreed and voted in favor of it, 24 to 7. At a stroke, the land area of the USA was doubled.\nJefferson sent two army captains, Meriwether Lewis and William Clark, to explore the Louisiana Territory with a group of about 30 soldiers. Their adventures on the Great Plains, their meetings with the Sioux, Mandan, and Shoshone, and their perilous boat ride down the Columbia River to the west coast, are one of the epics of American history. Lewis had prepared for the job by working as a White House aide to Jefferson, learning techniques of close observation, map-making, and accurate description.\nIn foreign policy, Jefferson was the first president to send the US Navy against a foreign enemy, the Barbary States of North Africa. Aiming to develop free trade and to suppress piracy, his ships bombarded the city of Tripoli (in today’s Libya), forcing its rulers to come to an agreement.\nStruggling to avoid involvement in the Napoleonic Wars but harassed by British aggression on the high seas, including the impressment of American sailors, Jefferson declared an embargo on Anglo-American trade in 1807. The embargo made him unpopular with Federalists in New England, whose prosperity depended on the Atlantic trade. Still, it forestalled a costly war that the United States was in no position to fight successfully.\nJefferson was a slave owner but had a bad conscience about it. He intended to liberate his slaves, following the example of President Washington, but was too deeply in debt to be able to do so. Slaves then counted as valuable property, and since Jefferson had always lived beyond his means, he could not give them away, even to themselves. This situation, combined with the fact that he had a prolonged sexual relationship with his slave, Sally Hemings (his wife’s half-sister), has cast a shadow over his reputation. Two centuries of denials lost their credibility in the face of DNA tests in 1998.\nThe effect of Jefferson’s presidency was to re-orient the United States away from Europe and toward the great continental interior. Its exploration and development over the next century would transform a scantily populated area into an immensely rich source of food, minerals, and wealth and lay the foundation of America’s emergence as an economic and political superpower.\nIn the next lecture, we’ll jump forward to the election of 1860 and the crisis years of the American Civil War, in which Abraham Lincoln distinguished himself as another of the great presidents.\nAmerican Sphinx: The Character of Thomas Jefferson by Joseph J. Ellis\nShare with friends"
] | [
"<urn:uuid:b431997c-cff7-4176-8304-64dbcc8ef4e7>"
] | [
"CC-MAIN-2023-14"
] | [
"https://gohighbrow.com/thomas-jefferson-1801-1809/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00604.warc.gz"
] | [
"en"
] | [
0.9737237095832825
] | [
939
] | [
3.5625
] | [
4
] |
[
"Wisdom and Power: A Philosophical Approach to T'ai Chi\nThe Unifying Principle\nTao in the world is like the river flowing home to the sea. The great Tao flows everywhere. Ten thousand things depend on it. It silently fulfills its purpose: It makes no claim. It nourishes ten thousand things and passes on in constant flow. Passing on, it becomes remote. Having become remote, it returns. It has no aim, it is very small. Ten thousand things return to it, yet it is not their master. It is very great, but does not show greatness. Therefore it is truly great.\n- Lao Tzu\nNothing in this chapter is true. (Including, of course, this statement.)\nI know that sounds like a strange way to begin the discussion of so crucial a topic as the construction of the Universe; but perhaps by so doing, I can avoid the pitfall into which philosophers from time immemorial have fallen. That pitfall is the mistaken notion that reality can be expressed in words. The fact is that it cannot, for a very simple and obvious reason. Reality is everything that is; words (language) constitute a very small part of everything that is.\nNow, even a child knows that the part cannot contain the whole; yet for some reason we human beings stubbornly insist on trying to cram the whole of reality into words, and I am no exception to this rule - hence the disclaimer.\nAs you read through this chapter, you will no doubt catch me in the act of making pompous assertions about reality, infinity, the ultimate basis of existence and similarly unbounded topics which, by their very nature, cannot be pinpointed by so limited a medium as words. In these instances, I hope you will do me the charity of understanding that I do not believe that I am telling the truth, but rather that I am using words to point out directions in which truth may be found. You, however, must discover the truth for yourself.\nActually, no one can really tell the truth about anything - all truth must be directly experienced. If, for example, someone asks you, \"What is red?\" and you reply, \"Red is the color of an apple,\" you have merely pointed out the direction he should look to find it. In reality, only the experience of seeing red is the truth about red. This is clear enough if you imagine trying to explain red to a blind man.\nYou may object that there are many things which can be accurately communicated by words alone, in the absence of direct experience. For instance, if you have read the story of Cinderella you will have a perfectly good idea of what a glass slipper is, iven though the odds are strong that you have never seen or touched one. Here again, though, your understanding resolves to direct experience, for you have certainly seen the material \"glass\" and the footwear \"slipper;\" and had you not, the phrase \"glass slipper\" would be meaningless to you. I hope I am not boring you with this discussion, but this is really a most important point to grasp. If you will spend a few minutes by yourself thinking about language and reality, you will surely discover that everything you know is either something you have directly experienced, or is a concept formed from a collection of things you have directly experienced. When you truly understand this it will free you from a great deal of confusion and misunderstanding. Experiencealone is truth.; words can only group experiences or point out the direction one should take to gain experience of a certain kind. To paraphrase Confucius, \"No statement is true, including this one.\"\nNow that we have firmly planted our feet on shifty ground, the next step is to - carefully - take a look ate the central conception underlying Oriental philosophy and the T'ai Chi way of life. That conception is that there is, always has been and always will be just one thing \"in\" the Universe. Matter, energy, space, time, life and thought are not separate things at all, but are merely different aspects of the One Thing. There is not much we can directly say about the Supreme Ultimate, even recognizing the limitations of language, because anything we say about it separates it from what we did not say about it; but it is that, too. As Lao Tzu said, \"The name that can be named is not the true name.\"\nThe Supreme Ultimate is the Tao, is T'ai Chi, is the omni- present, eternally self-regenerative, holistic/interactive process of unfoldment: being. What is, is that. T'ai Chi \"contains\" all diversity, all forms, all time, space and experience, but it is not diverse; it is the One Thing.\nWithout getting too abstract, let me see if I can come up with some meaningful ways of looking at this idea that will make it a little more meaningful. Suppose you and I are facing each other and someone says to us, \"look to the left.\" I will turn my head one way, and you will turn your head in exactly the opposite direction. Which direction is \"really\" left?\nIf you live in New York and I live in Louisiana, you may go \"south\" to West Virginia, while I go \"north\" to the same place. Is it really north, or is it south?\nIf I go for a swim in forty-degree weather, I am quite certain that it is \"cold,\" but ice melts at the same temperature because it is too \"warm.\"\nIt is trivially obvious in these examples that the \"opposites\" have no reality in themselves. They only acquire meaning when considered from particular pointes of view, and this is equally true of all pairs of opposites. But the Supreme Ultimate contains all points of view; in reality every direction is both up and down, every temperature is both warm and cold. In other words, left and right are really the same thing, they only appear to be different when we choose a particular, limited reference point from which to view them. Since the limitless Universe contains all possible reference points, and every point is equally as \"real\" as every other point, the notion of opposites loses its objective character.\nAnother way of looking at the Supreme Ultimate comes. ironically, from modern physics. Ever since Relativity demonstrated that matter and energy are interchangeable, scientists have recognized that the entire physical universe is composed of nothing more than positive and gegative forces arranged in different ways relative to one another (these forces are sometimes called waves, sometimes particles, depending on how you look at them). Since space is a relationship of pieces of matter to one another, and time is a relationship of energy-events to one another, space and time too have no existence apart from positive and negative forces. But since positive wave/particles and negative wave/particles are really the same thing viewed from different reference points, matter energy space and time are really - One Thing. In mathematical physics, the attempt to describe this is known as Unified Field Theory.\nTo gain some kind of direct experience of this reality, take a walk out to the countryside by yourself and sit somewhere where you will not be distracted by anything. If you gaze quetly about with a calm mind, you will soon have the experience that everything you see is actually inside of you - there is really no \"out there\" at all. Let's look at this phenomenon in diagram form:\nWhen you see a tree, your eyes apparently puck up a pattern of light reflected from the tree. This light pattern causes chemical changes in the elements of you optic nerve, which in turn transmits this information to your brain, and a picture of the tree pops into your consciousness. Now follow this please - the \"tree\" that you \"see\" is in your consciousness, not somewhere \"out there.\" The only knowledge you have of the tree, your only experience of the tree, is in your consciousness. Although it is conventional to do so, it does not add anything to say that there is also a tree out there that \"caused\" the tree-image to appear in your consciousness, since your experience of \"out there\" is also in your consciousness. In fact, every experience - hence every reality - is noplace but in your consciousness. All this may sound quite absurd and illogical in verbal form, but it is really simple and obvious if you will take the time to experience it.\nWhat I am suggesting here is the somewhat radical proposition that the entire Universe is within you; that in fact you are the Supreme Ultimate. How this can be, I will leave you to figure out for yourself, but I suggest that you don't try to do it in words.\nIf this idea attracts you, please pursue it diligently. Both the Tao Te Ching and the I Ching are excellent guides to follow as your own meditation and perseverance carry you toward a realization of this profound simplicity.\nSince T'ai Chi is also a practical way of life, however, I want to leave the further edvelopment of this more purely contemplactive aspect of the philosophy to your own curiosity for now, and proceed to the next step in the unfolding cosmology of the Supreme Ultimate. This is the cause of manifested action and the root of the principle of balance: the Yin and the Yang. T'ai Chi contains within itself all pairs of opposites. There are infinitely many pairs of opposites - up and down, in and out, light and dark, male ands female, strong and weak, empty and full, etc. But all pairs of opposites are themselves composed of the two fundamental opposites which are the underlying basis of the manifested Universe.\nYou will recall that modern physics has come to look at reality as a complex web of positive and negative forces arranged in different ways relative to one another. The ancient Chinese made this same discovery over three thousand years ago, but explained it is slightly different terms. The positive forces they called Yang; the negative, Yin.\nI think it is remarkable and exciting that if all the readers of this book had a thorough education in modern physics, most of the philosophy of T'ai Chi could be expressed in mathematical equations that would withstand the most rigorous scientific scrutiny; since that is not likely to be the case, however, I will stick to the original terminlolgy. Remember that words only point to the truth, and that one set of terms is as good as another. If it pleases you to do so, by all means translate Yin and Yang as negative and positive forces, and the interactions between thim as \"field phenomena.\"\nThe way T'ai Chi explains this idea is as follows:\nOut of the great, undifferentiated unity of pure Being, there arise simultaneously two exactly opposite forces or tendencies - Yin, which is constantly expanding from nothingness to infinity, and Yang which is constantly contracting from infinity to nothingness. Since \"nothingness\" and \"infinity\" are merely different ways of looking at the same thing (undifferentiated Being), this motion is eternal and circular. That is, the forces of expansion exactly balance the forces of contraction, and the beat goes on.\nAs these two forces encounter each other, they react in certain orderly and predictable ways, combining, attracting and repelling. This combining and interacting of Yin and Yang gives rise to all the things we perceive in the Universe: stars and planets, sun and moon, trees, love, war, shoelaces and color television are all just Yin and Yang arranged in different patterns of interaction.\nThe art of T'ai Chi is to understand these patterns of interaction (the Law of Change) and align ourselves with them so that we can keep our balance. Just as the Universe would be destroyed if there were not a perfect balance of Yin and Yang, so and individual is destroyed (or defeated, diseased or depressed) if he is unbalanced with respect to this great cosmic flow. Balance is the name of the game and the orderly interaction between Yin and Yang constitute the rules.\nFollowing this analogy, the \"rule-book\" of the Supreme Ultimate is the ancient Chinese Book of Change, the I Ching. limited degree of unfoldment that is not beyond the power of the human mind to grasp). In this scheme, a broken line represents a Yin influence, while a solid line indicates the force of Yang.\nCombining such lines six at a time results in 64 HEXAGRAMS (six-line diagrams), each of which represents one of the basic possible combinations of Yin and Yang; therefore, one of the basic possible qualities or situations of reality.\nAn interesting sidelight at this point is that the 64 hexagrams of the I Ching have recently been discovered to be an exact restatement of the 64 \"code words\" of the DNA genetic code! In both structure and content, the two are identical, and - even though most of the genetic code is still a mystery - the \"punctuation codes\" of DNA that have been deciphered have the same meanings as the equivalent hexagrams. For example, the genetic \"stop\" code at the end of each DNA \"statement\" has the same structure as hexagram 12, \"standstill.\" Does this mean that the ancient sages understood the genetic code, of which modern scientists were unaware until the last few years? Or does it simply mean that they had correctly identified the structural order of life, and therefore the biological life code would only naturally show the same structure? Who knows? But the fact that the scientifically accepted basis for the unfoldment of all life is identical to this ancient document argues convincingly for its universal valitidy.\n*For a detailed examination of this fascinating \"synchronicity,\" see The I Ching and the Genetic Code, by Martin Schoenberger (listed in the bibliography).\nThe images and commentaries attached to each of the 64 hexagrams explain the qualities of that particular combination of Yin and Yang, as well as indicating how the various forces within a hexagram move, change and interact with one another. It is no overstatement to say that all the secrets of the Universe are contained within this remarkable book, and your effor in studying it will be well rewarded.\nUnfortunately, it is not the easiest book to understand. While the poetic descriptions and commentaries are beautifully and clearly written, there is no getting around the fact that it takes years of study to begin to really comprehend the Law of Change through the I Ching. As wise a man as Confucius deliberately deferred studying the I Ching until he was fifty years old, because he felt he could not hope to grasp its essence with less maturity (and he spent the rest of his life with it.)\nThis is one of the reasons that T'ai Chi is such a remarkably valuable discipline - the physical exercises of T'ai Chi will allow you to directly experience much of the hidden meaning contained in the I Ching, in a much shorter period of time than would be possible through reading and meditation alone.\nStill, there is good use to which some degree of intellectual understanding of the Law of Change can be put, so I am going to include here a \"nutshell statement\" of the practical elements of the Unifying principle. This particular formulation was taken from the East-West foundation, an organization in the United States which studies Oriental cosmology.\nSeven Principles of the Order of the Universe\nAll things are differentiated aspects of One Infinity.\nAll antagonisms are complementary.\nThere is nothing identical.\nWhat has a front has a back.\nThe bigger the front, the bigger the back.\nWhat has a beginning has an end.\nTwelve Theorems of the Unifying Principle\nOne infinity differentiates itself into Yin and Yang, which are the poles that come into operation when the infinite centrifugality arrives at the geometric point of bifurcation.\nYin and Yang result continuously from the infinite centrifugality.\nYin is centrifugal, Yang is centripetal. Yin and Yang together produce energy and all phenomena.\nYin attracts Yang. Yang attracts Yin.\nYin repels Yin. Yang repels Yang.\nThe force of attraction and repulsion is proportional to the difference of the Yin and Yang components. Yin and Yang combined in various proportions produce energy and all phenomena.\nAll phenomena are ephemeral, constantly changing their constitution of Yin and Yang components.\nNothing is solely Yin or Yang. Everything involves polarity.\nThere is nothing neuter. Either Yin or Yang is in excess in every occurrence.\nLarge Yin attracts small Yin. Large Yang attracts small Yang.\nAt the extremes, Yin changes to Yang and Yang changes to Yin.\nAll physical forms and objects are Yang at the center and Yin at the surface.\nCLASSIFICATION OF YIN AND YANG\n||K, O, P, Ca, N\n||H, As, Cl, Na, C\nRight now, with this incredible array of ideas, \"rules\" and correspondences before you, let me suggest to you one way of approaching the study of Yin and Yang, and that is to take it slowly and with a large grain of salt. Understanding, not rigid dogma, is the aim of T'ai Chi. If you memorize these principles and theorems and rush out to apply them to your daily life, you will most likely fall flat on your face, get disgusted and give up the whole business.\nThe process of coming to understand the Law of Change is a lifetime study. Mastery of the way of the Supreme Ultimate is perhaps the highest goal one can aim for in life, and requires a step by step process of experiencing and maturing. Trying to cram too much intellectual understanding into an unprepared vessel can only result in failure. This is why the physical training plays such an important part in T'ai Chi: experiencing these patterns of interaction with your body gives you a direct insight into them that mere contemplation or analysis can never achieve.\nFor one thing, Yin and Yang are not absolute. Only the Supreme Ultimate itself is absolute; everything else is relative. For example, a literal reading of the classification chart would tell you that a woman is Yin while a man is Yang. But, according to theorem #8, nothing is purely Yin or Yang; the average woman is merely more yin in relation to the average man. In relation to the average stalk of broccoli, however, any woman is extremely Yang.\nIf this sounds confusing, imagine trying to figure out complex psychological or physical behavior patterns with only academic knowledge of the Unifying Principle. Without intending to be in any way discouraging, it is only fair to say that everyone embarking on this way encounters more than once the experience of having his or her neat conception of the way things \"really\" are dashed to pieces on the stern reef of disillusionment. These categories should be approached as general indicators of Yin and Yang in relationship; Yin and Yang cannot be quantitatively analyzed and isolated from real world phenomena. They must be appreciated by continuous open-minded attention to the way things and events of different qualities actually do interact with each other in your experience. Just when you have made what you think is some positive identification which will relieve you of the need for further judgment about the way something or other works, some unnoticed little factor will creep in from left field to make you realize your great wisdom is really simplistic and naive.\nYou must be prepared for this shattering of smug and certain conceptions if you are serious about advancing along the path of T'ai Chi, for that is one of the patterns of learning it requires: intellectual understanding, followed by confusion and disillusionment, out of which grows a kernel of genuine understanding and insight.\nIn my opinion, the best way to approach Yin and Yang intellectually (as distinguished from the practical exercises and meditiations outlined in this book) is from the point of view of an observer. In other words, don't accept any of the ideas in this chapter, but rather observe th flow of events in your daily life to see if they move in accord with any of these principles.\nFor example, like poles of magnets repel each other, while unlike poles attract. Is this in accord with any of our theorems?\nWhen you work very hard (Yang), does your energy turn to exhaustion (Yin)? And when you rest (Yin), are you restored and revitalized (Yang)?\n\"Every action has an equal but opposite reaction.\" Can this be interpreted by means of Yin and Yang?\nFolksy wisdom and old saws often take on an entirely new coherence when viewed though the spectacles of the Supreme Ultimate. Some examples:\n\"The darkest hour is just before dawn.\"\n\"The bigger they come, the harder they fall.\"\n\"You always hurt the one you love.\"\n\"Pride goeth before a fall.\"\n\"There is some good in the worst of us, and some bad in the best of us.\"\n\"Work is the curse of the drinking class.\"\n\"The grass is always greener on the other side of the fence.\"\nThe list is endless, and you will see the principle operative in the most unlikely places if you keep your senses open.\nWhen I first encountered this philosophy, one of the principles that was a great eye-opener for me was, \"every front has a back.\" If you encounter something apparently strong, look for its weaknesses. If you encounter something weak and ineffectual, look for its hidden strength. You will be surprised to discover that outward appearances never tell the whole tale. Every advantage has its price, every struggle has its rewards, and so on.\nThe gravitational field of the Sun is so great that nothing can escape from its pull. The incredible speed of the Earth in its orbit tries to fling it off into space. Yet the balance between these centrifugal and centripetal forces keeps our sphere comfortably suspended at a pleasant distance from its fiery host.\nA cold (Yin) climate produces aggressive (Yang) inhabitants, while a warm (Yang) climate produces realtively more passive (Yin) inhabitants. It is interesting to observe in history that there is a recurrent cycle of people from the northern latitudes sweeping down to conquer and colonize more southern cultures - it rarely happens the other way around. Since extreme Yang turns to Yin, however, the conquerors are often assimilated into the more passive cultures of their southern victims and are in turn preyed upon by the next generation of aggressors.\nThese rambling observations are just some of the things I have noticed in looking about at the world. The important thing is for you to try to notice what is going on about you, and to see if the idea of Yin and Yang can shed any light on why things are happening the way they are. Try to be flexible in your observations and avoid classifying anything categorically.\nThe life cycle itself is the most dramatic illustration of the Law of Change. A seed is extremely small, concentrated and Yang. From it grows a sprout, (Yin), which continues to expasnd and shoot up until it reaches the limit of its Yin, at which time it turns to seed (Yang). Life is full of such cycles. So is the environment: the heat of the Sun (Yang) causes water to evaporate and rise (Yin). When it has reached the limit of its ascent it condenses, becomes heavy and falls to earth (Yang.)\nSee if you can discover similar cycles in business, economics, politics and religious movements. See if you can discover them in your own daily routine, in your biological functioning, in your personal relationships.\nThe Unifying Principle itself is central to both the oldest spiritual conceptions and the newest scientific discoveries of man. This fact is a key to understanding it.\nThere are many ways in which this understanding can be put to practical use, other than through the formal discipline of T'ai Chi. In massage, for example, if you encounter a tense, contracted knot of muscular tension (Yang), apply firm pressure (Yang). Since Yang repels Yang, if you maintain the pressure, the knotted tension will have to go away - and does! If you want to get along well with an aggressive boss, listen to him, receive (Yin) his communication. If you're tired of the job, be as aggressive as he is!\nOnce you have begun to look at things in this way, and have started to discover for yourself that reality actually does unfold in an orderly and comprehensible way, you will have in your possession the most powerful tool imaginable for expanding your consciousness and shaping your own destiny. From the greatest cosmic movement to the most insignifican personal transaction, the Law of Change provides a clear and reliable guide to the nature of the forces involved, and - most importantly - to the kind of energy you should put into any situation in order to assure the outcome you desire. The natural order of change is omni-present and unstoppable; by understanding and aligning yourself with it, your own movements will take on its character: serene certainty and effortless success.\nAs you practice the movements and exercises of T'ai Chi, your understanding and appreciation of the Unifying Principle will naturally grow, for the T'ai Chi exercises will actually change the way your own vital energy (Ch'i) moves through your body so that it becomes a perfect example of the course of change and energy flow in the Universe as a whole; so that your body becomes a \"miniature Universe\" open to your direct experience and perception! This direct experience will mesh with the ideas in this chapter in the same way that building a bridge meshes with engineering theory. To use these understandings as you walk through life, for the benefit of yourself and those around you, is the T'ai Chi way of life.\nYou should treat your expanding understanding of the Law of Change with respect, however, and never consider yourself its master or take it for granted, Regardless of the level of wisdom and power you attain, there will always be more to understand. Remember, you and I are students - the Supreme Ultimate itself is the teacher. It will teach us well, but we must learn to turn down our conceited noise and listen carefully to its sagely whisperings.\n\"The wise student hears of the Tao\nand practices it diligently.\nThe average student hears of the Tao\nand gives it thought now and again.\nThe foolish student hears of the Tao\nand laughs out loud.\nIf there were no laughter, the Tao\nwould not be what it is.\"\n- Lao Tzu"
] | [
"<urn:uuid:12b58c6d-21b4-435f-80e2-6721a136ecfd>"
] | [
"CC-MAIN-2013-20"
] | [
"http://consciousevolution.com/TaiChi/ch03.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00032-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9516080021858215
] | [
5473
] | [
2.53125
] | [
3
] |
[
"How long is a short memoir?\n2,000 to 5,000 words\nWhat are 3 characteristics of a memoir?\n4 characteristics that define memoir\n- To be true. Memoirs are true stories.\n- A focus. A hodgepodge of unrelated anecdotes, or a litany of life events from birth to present day isn’t a memoir.\n- A transformation. Something needs to change, otherwise why will people read it?\n- An inner story that ties to something universal.\nWhat two characteristics does a memoir have?\nCharacteristics of a Memoir\n- #1. It has a specific focus.\n- #2. It makes the subject come alive.\n- #3. There must be an ABC story arc.\n- #4. Memoirs are often limited in nature.\n- #5. The story is more important than 100% accuracy.\n- #6. The writing of a memoir is deliberate in nature.\n- #7. Dialogue should be natural instead of journalistic.\nHow long did it take you to write your dissertation?\nWhat tense should a memoir be written in?\nIs it difficult to write a dissertation?\nWhen you’re writing a dissertation, one of the most difficult intellectual tasks a person can do, commitment to the writing process is far more important than genius. It’s very hard work, this writing-your-dissertation thing. The trick is to not make it even harder by avoiding the work itself.\nHow do you start a short memoir?\n10 Tips for Starting a Memoir\n- Engage the reader from the first word. A great memoir draws the reader in from the start.\n- Build trust with the reader.\n- Bring emotions out of the reader.\n- Lead with a laugh.\n- Open with a dramatic moment.\n- Think like a fiction writer.\n- Keep it relevant.\n- Write for the reader as well as yourself.\nHow long is a memoir?\nMemoir word count tends to be right there in the same range as novel word count, or 60,000 to 80,000 words. Shorter than that, and you may not have enough substance to truly excite readers, you may not be going deeply enough into your story, or telling enough of it.\nHow long does it take to write a novel?\nA good rule of thumb is to allot at least 4 months to write a book. Many authors report that it takes up to a year to write a book, but more recently, authors are finishing their books in as little as a month to 90 days with our specific system."
] | [
"<urn:uuid:6f4b755a-8af8-4a87-87a6-8026f9acc912>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.clambaronline.com/how-long-is-a-short-memoir/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00750.warc.gz"
] | [
"en"
] | [
0.9160548448562622
] | [
559
] | [
2.515625
] | [
3
] |
[
"Social exclusion is a complex social phenomenon with powerful negative consequences. Given the impact of social exclusion on mental and emotional health, an understanding of how perceptions of social exclusion develop over the course of a social interaction is important for advancing treatments aimed at lessening the harmful costs of being excluded. To date, most scientific examinations of social exclusion have looked at exclusion after a social interaction has been completed. While this has been very helpful in developing an understanding of what happens to a person following exclusion, it has not helped to clarify the moment-to-moment dynamics of the process of social exclusion. Accordingly, the current protocol was developed to obtain an improved understanding of social exclusion by examining the patterns of event-related brain activation that are present during social interactions. This protocol allows greater precision and sensitivity in detailing the social processes that lead people to feel as though they have been excluded from a social interaction. Importantly, the current protocol can be adapted to include research projects that vary the nature of exclusionary social interactions by altering how frequently participants are included, how long the periods of exclusion will last in each interaction, and when exclusion will take place during the social interactions. Further, the current protocol can be used to examine variables and constructs beyond those related to social exclusion. This capability to address a variety of applications across psychology by obtaining both neural and behavioral data during ongoing social interactions suggests the present protocol could be at the core of a developing area of scientific inquiry related to social interactions.\n24 Related JoVE Articles!\nInvestigating the Effects of Antipsychotics and Schizotypy on the N400 Using Event-Related Potentials and Semantic Categorization\nInstitutions: McGill University, McGill University, McGill University, McGill University.\nWithin the field of cognitive neuroscience, functional magnetic resonance imaging (fMRI) is a popular method of visualizing brain function. This is in part because of its excellent spatial resolution, which allows researchers to identify brain areas associated with specific cognitive processes. However, in the quest to localize brain functions, it is relevant to note that many cognitive, sensory, and motor processes have temporal distinctions that are imperative to capture, an aspect that is left unfulfilled by fMRI’s suboptimal temporal resolution. To better understand cognitive processes, it is thus advantageous to utilize event-related potential (ERP) recording as a method of gathering information about the brain. Some of its advantages include its fantastic temporal resolution, which gives researchers the ability to follow the activity of the brain down to the millisecond. It also directly indexes both excitatory and inhibitory post-synaptic potentials by which most brain computations are performed. This sits in contrast to fMRI, which captures an index of metabolic activity. Further, the non-invasive ERP method does not require a contrast condition: raw ERPs can be examined for just one experimental condition, a distinction from fMRI where control conditions must be subtracted from the experimental condition, leading to uncertainty in associating observations with experimental or contrast conditions. While it is limited by its poor spatial and subcortical activity resolution, ERP recordings’ utility, relative cost-effectiveness, and associated advantages offer strong rationale for its use in cognitive neuroscience to track rapid temporal changes in neural activity. In an effort to foster increase in its use as a research imaging method, and to ensure proper and accurate data collection, the present article will outline – in the framework of a paradigm using semantic categorization to examine the effects of antipsychotics and schizotypy on the N400 – the procedure and key aspects associated with ERP data acquisition.\nBehavior, Issue 93, Electrical brain activity, Semantic categorization, Event-related brain potentials, Neuroscience, Cognition, Psychiatry, Antipsychotic medication, N400, Schizotypy, Schizophrenia.\nThe Crossmodal Congruency Task as a Means to Obtain an Objective Behavioral Measure in the Rubber Hand Illusion Paradigm\nInstitutions: Macquarie University, Macquarie University, Macquarie University.\nThe rubber hand illusion (RHI) is a popular experimental paradigm. Participants view touch on an artificial rubber hand while the participants' own hidden hand is touched. If the viewed and felt touches are given at the same time then this is sufficient to induce the compelling experience that the rubber hand is one's own hand. The RHI can be used to investigate exactly how the brain constructs distinct body representations for one's own body. Such representations are crucial for successful interactions with the external world. To obtain a subjective measure of the RHI, researchers typically ask participants to rate statements such as \"I felt as if the rubber hand were my hand\". Here we demonstrate how the crossmodal congruency task can be used to obtain an objective behavioral measure within this paradigm.\nThe variant of the crossmodal congruency task we employ involves the presentation of tactile targets and visual distractors. Targets and distractors are spatially congruent (i.e.\nsame finger) on some trials and incongruent (i.e.\ndifferent finger) on others. The difference in performance between incongruent and congruent trials - the crossmodal congruency effect (CCE) - indexes multisensory interactions. Importantly, the CCE is modulated both by viewing a hand as well as the synchrony of viewed and felt touch which are both crucial factors for the RHI.\nThe use of the crossmodal congruency task within the RHI paradigm has several advantages. It is a simple behavioral measure which can be repeated many times and which can be obtained during the illusion while participants view the artificial hand. Furthermore, this measure is not susceptible to observer and experimenter biases. The combination of the RHI paradigm with the crossmodal congruency task allows in particular for the investigation of multisensory processes which are critical for modulations of body representations as in the RHI.\nBehavior, Issue 77, Neuroscience, Neurobiology, Medicine, Anatomy, Physiology, Psychology, Behavior and Behavior Mechanisms, Psychological Phenomena and Processes, Behavioral Sciences, rubber hand illusion, crossmodal congruency task, crossmodal congruency effect, multisensory processing, body ownership, peripersonal space, clinical techniques\nA Protocol for Conducting Rainfall Simulation to Study Soil Runoff\nInstitutions: University of Maryland Eastern Shore, USDA - Agricultural Research Service, University of Maryland Eastern Shore.\nRainfall is a driving force for the transport of environmental contaminants from agricultural soils to surficial water bodies via surface runoff. The objective of this study was to characterize the effects of antecedent soil moisture content on the fate and transport of surface applied commercial urea, a common form of nitrogen (N) fertilizer, following a rainfall event that occurs within 24 hr after fertilizer application. Although urea is assumed to be readily hydrolyzed to ammonium and therefore not often available for transport, recent studies suggest that urea can be transported from agricultural soils to coastal waters where it is implicated in harmful algal blooms. A rainfall simulator was used to apply a consistent rate of uniform rainfall across packed soil boxes that had been prewetted to different soil moisture contents. By controlling rainfall and soil physical characteristics, the effects of antecedent soil moisture on urea loss were isolated. Wetter soils exhibited shorter time from rainfall initiation to runoff initiation, greater total volume of runoff, higher urea concentrations in runoff, and greater mass loadings of urea in runoff. These results also demonstrate the importance of controlling for antecedent soil moisture content in studies designed to isolate other variables, such as soil physical or chemical characteristics, slope, soil cover, management, or rainfall characteristics. Because rainfall simulators are designed to deliver raindrops of similar size and velocity as natural rainfall, studies conducted under a standardized protocol can yield valuable data that, in turn, can be used to develop models for predicting the fate and transport of pollutants in runoff.\nEnvironmental Sciences, Issue 86, Agriculture, Water Pollution, Water Quality, Technology, Industry, and Agriculture, Rainfall Simulator, Artificial Rainfall, Runoff, Packed Soil Boxes, Nonpoint Source, Urea\nFunctional Interrogation of Adult Hypothalamic Neurogenesis with Focal Radiological Inhibition\nInstitutions: California Institute of Technology, Johns Hopkins University School of Medicine, Johns Hopkins University School of Medicine, University Of Washington Medical Center, Johns Hopkins University School of Medicine.\nThe functional characterization of adult-born neurons remains a significant challenge. Approaches to inhibit adult neurogenesis via invasive viral delivery or transgenic animals have potential confounds that make interpretation of results from these studies difficult. New radiological tools are emerging, however, that allow one to noninvasively investigate the function of select groups of adult-born neurons through accurate and precise anatomical targeting in small animals. Focal ionizing radiation inhibits the birth and differentiation of new neurons, and allows targeting of specific neural progenitor regions. In order to illuminate the potential functional role that adult hypothalamic neurogenesis plays in the regulation of physiological processes, we developed a noninvasive focal irradiation technique to selectively inhibit the birth of adult-born neurons in the hypothalamic median eminence. We describe a method for C\nomputer tomography-guided f\nradiation (CFIR) delivery to enable precise and accurate anatomical targeting in small animals. CFIR uses three-dimensional volumetric image guidance for localization and targeting of the radiation dose, minimizes radiation exposure to nontargeted brain regions, and allows for conformal dose distribution with sharp beam boundaries. This protocol allows one to ask questions regarding the function of adult-born neurons, but also opens areas to questions in areas of radiobiology, tumor biology, and immunology. These radiological tools will facilitate the translation of discoveries at the bench to the bedside.\nNeuroscience, Issue 81, Neural Stem Cells (NSCs), Body Weight, Radiotherapy, Image-Guided, Metabolism, Energy Metabolism, Neurogenesis, Cell Proliferation, Neurosciences, Irradiation, Radiological treatment, Computer-tomography (CT) imaging, Hypothalamus, Hypothalamic Proliferative Zone (HPZ), Median Eminence (ME), Small Animal Radiation Research Platform (SARRP)\nSetting-up an In Vitro Model of Rat Blood-brain Barrier (BBB): A Focus on BBB Impermeability and Receptor-mediated Transport\nInstitutions: VECT-HORUS SAS, CNRS, NICN UMR 7259.\nThe blood brain barrier (BBB) specifically regulates molecular and cellular flux between the blood and the nervous tissue. Our aim was to develop and characterize a highly reproducible rat syngeneic in vitro\nmodel of the BBB using co-cultures of primary rat brain endothelial cells (RBEC) and astrocytes to study receptors involved in transcytosis across the endothelial cell monolayer. Astrocytes were isolated by mechanical dissection following trypsin digestion and were frozen for later co-culture. RBEC were isolated from 5-week-old rat cortices. The brains were cleaned of meninges and white matter, and mechanically dissociated following enzymatic digestion. Thereafter, the tissue homogenate was centrifuged in bovine serum albumin to separate vessel fragments from nervous tissue. The vessel fragments underwent a second enzymatic digestion to free endothelial cells from their extracellular matrix. The remaining contaminating cells such as pericytes were further eliminated by plating the microvessel fragments in puromycin-containing medium. They were then passaged onto filters for co-culture with astrocytes grown on the bottom of the wells. RBEC expressed high levels of tight junction (TJ) proteins such as occludin, claudin-5 and ZO-1 with a typical localization at the cell borders. The transendothelial electrical resistance (TEER) of brain endothelial monolayers, indicating the tightness of TJs reached 300 ohm·cm2\non average. The endothelial permeability coefficients (Pe) for lucifer yellow (LY) was highly reproducible with an average of 0.26 ± 0.11 x 10-3\ncm/min. Brain endothelial cells organized in monolayers expressed the efflux transporter P-glycoprotein (P-gp), showed a polarized transport of rhodamine 123, a ligand for P-gp, and showed specific transport of transferrin-Cy3 and DiILDL across the endothelial cell monolayer. In conclusion, we provide a protocol for setting up an in vitro\nBBB model that is highly reproducible due to the quality assurance methods, and that is suitable for research on BBB transporters and receptors.\nMedicine, Issue 88, rat brain endothelial cells (RBEC), mouse, spinal cord, tight junction (TJ), receptor-mediated transport (RMT), low density lipoprotein (LDL), LDLR, transferrin, TfR, P-glycoprotein (P-gp), transendothelial electrical resistance (TEER),\nA Comprehensive Protocol for Manual Segmentation of the Medial Temporal Lobe Structures\nInstitutions: University of Illinois Urbana-Champaign, University of Illinois Urbana-Champaign, University of Illinois Urbana-Champaign.\nThe present paper describes a comprehensive protocol for manual tracing of the set of brain regions comprising the medial temporal lobe (MTL): amygdala, hippocampus, and the associated parahippocampal regions (perirhinal, entorhinal, and parahippocampal proper). Unlike most other tracing protocols available, typically focusing on certain MTL areas (e.g.\n, amygdala and/or hippocampus), the integrative perspective adopted by the present tracing guidelines allows for clear localization of all MTL subregions. By integrating information from a variety of sources, including extant tracing protocols separately targeting various MTL structures, histological reports, and brain atlases, and with the complement of illustrative visual materials, the present protocol provides an accurate, intuitive, and convenient guide for understanding the MTL anatomy. The need for such tracing guidelines is also emphasized by illustrating possible differences between automatic and manual segmentation protocols. This knowledge can be applied toward research involving not only structural MRI investigations but also structural-functional colocalization and fMRI signal extraction from anatomically defined ROIs, in healthy and clinical groups alike.\nNeuroscience, Issue 89, Anatomy, Segmentation, Medial Temporal Lobe, MRI, Manual Tracing, Amygdala, Hippocampus, Perirhinal Cortex, Entorhinal Cortex, Parahippocampal Cortex\nProtein WISDOM: A Workbench for In silico De novo Design of BioMolecules\nInstitutions: Princeton University.\nThe aim of de novo\nprotein design is to find the amino acid sequences that will fold into a desired 3-dimensional structure with improvements in specific properties, such as binding affinity, agonist or antagonist behavior, or stability, relative to the native sequence. Protein design lies at the center of current advances drug design and discovery. Not only does protein design provide predictions for potentially useful drug targets, but it also enhances our understanding of the protein folding process and protein-protein interactions. Experimental methods such as directed evolution have shown success in protein design. However, such methods are restricted by the limited sequence space that can be searched tractably. In contrast, computational design strategies allow for the screening of a much larger set of sequences covering a wide variety of properties and functionality. We have developed a range of computational de novo\nprotein design methods capable of tackling several important areas of protein design. These include the design of monomeric proteins for increased stability and complexes for increased binding affinity.\nTo disseminate these methods for broader use we present Protein WISDOM (https://www.proteinwisdom.org), a tool that provides automated methods for a variety of protein design problems. Structural templates are submitted to initialize the design process. The first stage of design is an optimization sequence selection stage that aims at improving stability through minimization of potential energy in the sequence space. Selected sequences are then run through a fold specificity stage and a binding affinity stage. A rank-ordered list of the sequences for each step of the process, along with relevant designed structures, provides the user with a comprehensive quantitative assessment of the design. Here we provide the details of each design method, as well as several notable experimental successes attained through the use of the methods.\nGenetics, Issue 77, Molecular Biology, Bioengineering, Biochemistry, Biomedical Engineering, Chemical Engineering, Computational Biology, Genomics, Proteomics, Protein, Protein Binding, Computational Biology, Drug Design, optimization (mathematics), Amino Acids, Peptides, and Proteins, De novo protein and peptide design, Drug design, In silico sequence selection, Optimization, Fold specificity, Binding affinity, sequencing\nA Rapid and Specific Microplate Assay for the Determination of Intra- and Extracellular Ascorbate in Cultured Cells\nInstitutions: University of Sydney, Monash University.\nVitamin C (ascorbate) plays numerous important roles in cellular metabolism, many of which have only come to light in recent years. For instance, within the brain, ascorbate acts in a neuroprotective and neuromodulatory manner that involves ascorbate cycling between neurons and vicinal astrocytes - a relationship that appears to be crucial for brain ascorbate homeostasis. Additionally, emerging evidence strongly suggests that ascorbate has a greatly expanded role in regulating cellular and systemic iron metabolism than is classically recognized. The increasing recognition of the integral role of ascorbate in normal and deregulated cellular and organismal physiology demands a range of medium-throughput and high-sensitivity analytic techniques that can be executed without the need for highly expensive specialist equipment. Here we provide explicit instructions for a medium-throughput, specific and relatively inexpensive microplate assay for the determination of both intra- and extracellular ascorbate in cell culture.\nBiochemistry, Issue 86, Vitamin C, Ascorbate, Cell swelling, Glutamate, Microplate assay, Astrocytes\nA Neuroscientific Approach to the Examination of Concussions in Student-Athletes\nInstitutions: Elon University, Elon University, Duquesne University, Elon University.\nConcussions are occurring at alarming rates in the United States and have become a serious public health concern. The CDC estimates that 1.6 to 3.8 million concussions occur in sports and recreational activities annually. Concussion as defined by the 2013 Concussion Consensus Statement “may be caused either by a direct blow to the head, face, neck or elsewhere on the body with an ‘impulsive’ force transmitted to the head.” Concussions leave the individual with both short- and long-term effects. The short-term effects of sport related concussions may include changes in playing ability, confusion, memory disturbance, the loss of consciousness, slowing of reaction time, loss of coordination, headaches, dizziness, vomiting, changes in sleep patterns and mood changes. These symptoms typically resolve in a matter of days. However, while some individuals recover from a single concussion rather quickly, many experience lingering effects that can last for weeks or months. The factors related to concussion susceptibility and the subsequent recovery times are not well known or understood at this time. Several factors have been suggested and they include the individual’s concussion history, the severity of the initial injury, history of migraines, history of learning disabilities, history of psychiatric comorbidities, and possibly, genetic factors. Many studies have individually investigated certain factors both the short-term and long-term effects of concussions, recovery time course, susceptibility and recovery. What has not been clearly established is an effective multifaceted approach to concussion evaluation that would yield valuable information related to the etiology, functional changes, and recovery. The purpose of this manuscript is to show one such multifaceted approached which examines concussions using computerized neurocognitive testing, event related potentials, somatosensory perceptual responses, balance assessment, gait assessment and genetic testing.\nMedicine, Issue 94, Concussions, Student-Athletes, Mild Traumatic Brain Injury, Genetics, Cognitive Function, Balance, Gait, Somatosensory\nCorrelating Behavioral Responses to fMRI Signals from Human Prefrontal Cortex: Examining Cognitive Processes Using Task Analysis\nInstitutions: Centre for Vision Research, York University, Centre for Vision Research, York University.\nThe aim of this methods paper is to describe how to implement a neuroimaging technique to examine complementary brain processes engaged by two similar tasks. Participants' behavior during task performance in an fMRI scanner can then be correlated to the brain activity using the blood-oxygen-level-dependent signal. We measure behavior to be able to sort correct trials, where the subject performed the task correctly and then be able to examine the brain signals related to correct performance. Conversely, if subjects do not perform the task correctly, and these trials are included in the same analysis with the correct trials we would introduce trials that were not only for correct performance. Thus, in many cases these errors can be used themselves to then correlate brain activity to them. We describe two complementary tasks that are used in our lab to examine the brain during suppression of an automatic responses: the stroop1\nand anti-saccade tasks. The emotional stroop paradigm instructs participants to either report the superimposed emotional 'word' across the affective faces or the facial 'expressions' of the face stimuli1,2\n. When the word and the facial expression refer to different emotions, a conflict between what must be said and what is automatically read occurs. The participant has to resolve the conflict between two simultaneously competing processes of word reading and facial expression. Our urge to read out a word leads to strong 'stimulus-response (SR)' associations; hence inhibiting these strong SR's is difficult and participants are prone to making errors. Overcoming this conflict and directing attention away from the face or the word requires the subject to inhibit bottom up processes which typically directs attention to the more salient stimulus. Similarly, in the anti-saccade task3,4,5,6\n, where an instruction cue is used to direct only attention to a peripheral stimulus location but then the eye movement is made to the mirror opposite position. Yet again we measure behavior by recording the eye movements of participants which allows for the sorting of the behavioral responses into correct and error trials7\nwhich then can be correlated to brain activity. Neuroimaging now allows researchers to measure different behaviors of correct and error trials that are indicative of different cognitive processes and pinpoint the different neural networks involved.\nNeuroscience, Issue 64, fMRI, eyetracking, BOLD, attention, inhibition, Magnetic Resonance Imaging, MRI\nInducing Plasticity of Astrocytic Receptors by Manipulation of Neuronal Firing Rates\nInstitutions: University of California Riverside, University of California Riverside, University of California Riverside.\nClose to two decades of research has established that astrocytes in situ\nand in vivo\nexpress numerous G protein-coupled receptors (GPCRs) that can be stimulated by neuronally-released transmitter. However, the ability of astrocytic receptors to exhibit plasticity in response to changes in neuronal activity has received little attention. Here we describe a model system that can be used to globally scale up or down astrocytic group I metabotropic glutamate receptors (mGluRs) in acute brain slices. Included are methods on how to prepare parasagittal hippocampal slices, construct chambers suitable for long-term slice incubation, bidirectionally manipulate neuronal action potential frequency, load astrocytes and astrocyte processes with fluorescent Ca2+\nindicator, and measure changes in astrocytic Gq GPCR activity by recording spontaneous and evoked astrocyte Ca2+\nevents using confocal microscopy. In essence, a “calcium roadmap” is provided for how to measure plasticity of astrocytic Gq GPCRs. Applications of the technique for study of astrocytes are discussed. Having an understanding of how astrocytic receptor signaling is affected by changes in neuronal activity has important implications for both normal synaptic function as well as processes underlying neurological disorders and neurodegenerative disease.\nNeuroscience, Issue 85, astrocyte, plasticity, mGluRs, neuronal Firing, electrophysiology, Gq GPCRs, Bolus-loading, calcium, microdomains, acute slices, Hippocampus, mouse\nIrrelevant Stimuli and Action Control: Analyzing the Influence of Ignored Stimuli via the Distractor-Response Binding Paradigm\nInstitutions: Trier University, Trier University.\nSelection tasks in which simple stimuli (e.g.\nletters) are presented and a target stimulus has to be selected against one or more distractor stimuli are frequently used in the research on human action control. One important question in these settings is how distractor stimuli, competing with the target stimulus for a response, influence actions. The distractor-response binding paradigm can be used to investigate this influence. It is particular useful to separately analyze response retrieval and distractor inhibition effects. Computer-based experiments are used to collect the data (reaction times and error rates). In a number of sequentially presented pairs of stimulus arrays (prime-probe design), participants respond to targets while ignoring distractor stimuli. Importantly, the factors response relation in the arrays of each pair (repetition vs. change) and distractor relation (repetition vs. change) are varied orthogonally. The repetition of the same distractor then has a different effect depending on response relation (repetition vs. change) between arrays. This result pattern can be explained by response retrieval due to distractor repetition. In addition, distractor inhibition effects are indicated by a general advantage due to distractor repetition. The described paradigm has proven useful to determine relevant parameters for response retrieval effects on human action.\nBehavior, Issue 87, stimulus-response binding, distractor-response binding, response retrieval, distractor inhibition, event file, action control, selection task\nMeasuring Attentional Biases for Threat in Children and Adults\nInstitutions: Rutgers University.\nInvestigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g.,\nsnakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g.,\nflowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.\nBehavior, Issue 92, Detection, threat, attention, attentional bias, anxiety, visual search\nPerceptual and Category Processing of the Uncanny Valley Hypothesis' Dimension of Human Likeness: Some Methodological Issues\nInstitutions: University of Zurich.\nMori's Uncanny Valley Hypothesis1,2\nproposes that the perception of humanlike characters such as robots and, by extension, avatars (computer-generated characters) can evoke negative or positive affect (valence) depending on the object's degree of visual and behavioral realism along a dimension of human likeness\n) (Figure 1\n). But studies of affective valence of subjective responses to variously realistic non-human characters have produced inconsistent findings 3, 4, 5, 6\n. One of a number of reasons for this is that human likeness is not perceived as the hypothesis assumes. While the DHL can be defined following Mori's description as a smooth linear change in the degree of physical humanlike similarity, subjective perception of objects along the DHL can be understood in terms of the psychological effects of categorical perception (CP) 7\n. Further behavioral and neuroimaging investigations of category processing and CP along the DHL and of the potential influence of the dimension's underlying category structure on affective experience are needed. This protocol therefore focuses on the DHL and allows examination of CP. Based on the protocol presented in the video as an example, issues surrounding the methodology in the protocol and the use in \"uncanny\" research of stimuli drawn from morph continua to represent the DHL are discussed in the article that accompanies the video. The use of neuroimaging and morph stimuli to represent the DHL in order to disentangle brain regions neurally responsive to physical human-like similarity from those responsive to category change and category processing is briefly illustrated.\nBehavior, Issue 76, Neuroscience, Neurobiology, Molecular Biology, Psychology, Neuropsychology, uncanny valley, functional magnetic resonance imaging, fMRI, categorical perception, virtual reality, avatar, human likeness, Mori, uncanny valley hypothesis, perception, magnetic resonance imaging, MRI, imaging, clinical techniques\nCortical Source Analysis of High-Density EEG Recordings in Children\nInstitutions: UCL Institute of Child Health, University College London.\nEEG is traditionally described as a neuroimaging technique with high temporal and low spatial resolution. Recent advances in biophysical modelling and signal processing make it possible to exploit information from other imaging modalities like structural MRI that provide high spatial resolution to overcome this constraint1\n. This is especially useful for investigations that require high resolution in the temporal as well as spatial domain. In addition, due to the easy application and low cost of EEG recordings, EEG is often the method of choice when working with populations, such as young children, that do not tolerate functional MRI scans well. However, in order to investigate which neural substrates are involved, anatomical information from structural MRI is still needed. Most EEG analysis packages work with standard head models that are based on adult anatomy. The accuracy of these models when used for children is limited2\n, because the composition and spatial configuration of head tissues changes dramatically over development3\nIn the present paper, we provide an overview of our recent work in utilizing head models based on individual structural MRI scans or age specific head models to reconstruct the cortical generators of high density EEG. This article describes how EEG recordings are acquired, processed, and analyzed with pediatric populations at the London Baby Lab, including laboratory setup, task design, EEG preprocessing, MRI processing, and EEG channel level and source analysis.\nBehavior, Issue 88, EEG, electroencephalogram, development, source analysis, pediatric, minimum-norm estimation, cognitive neuroscience, event-related potentials\nTraining Synesthetic Letter-color Associations by Reading in Color\nInstitutions: University of Amsterdam.\nSynesthesia is a rare condition in which a stimulus from one modality automatically and consistently triggers unusual sensations in the same and/or other modalities. A relatively common and well-studied type is grapheme-color synesthesia, defined as the consistent experience of color when viewing, hearing and thinking about letters, words and numbers. We describe our method for investigating to what extent synesthetic associations between letters and colors can be learned by reading in color in nonsynesthetes. Reading in color is a special method for training associations in the sense that the associations are learned implicitly while the reader reads text as he or she normally would and it does not require explicit computer-directed training methods. In this protocol, participants are given specially prepared books to read in which four high-frequency letters are paired with four high-frequency colors. Participants receive unique sets of letter-color pairs based on their pre-existing preferences for colored letters. A modified Stroop task is administered before and after reading in order to test for learned letter-color associations and changes in brain activation. In addition to objective testing, a reading experience questionnaire is administered that is designed to probe for differences in subjective experience. A subset of questions may predict how well an individual learned the associations from reading in color. Importantly, we are not claiming that this method will cause each individual to develop grapheme-color synesthesia, only that it is possible for certain individuals to form letter-color associations by reading in color and these associations are similar in some aspects to those seen in developmental grapheme-color synesthetes. The method is quite flexible and can be used to investigate different aspects and outcomes of training synesthetic associations, including learning-induced changes in brain function and structure.\nBehavior, Issue 84, synesthesia, training, learning, reading, vision, memory, cognition\nA Proboscis Extension Response Protocol for Investigating Behavioral Plasticity in Insects: Application to Basic, Biomedical, and Agricultural Research\nInstitutions: Arizona State University.\nInsects modify their responses to stimuli through experience of associating those stimuli with events important for survival (e.g.\n, food, mates, threats). There are several behavioral mechanisms through which an insect learns salient associations and relates them to these events. It is important to understand this behavioral plasticity for programs aimed toward assisting insects that are beneficial for agriculture. This understanding can also be used for discovering solutions to biomedical and agricultural problems created by insects that act as disease vectors and pests. The Proboscis Extension Response (PER) conditioning protocol was developed for honey bees (Apis mellifera\n) over 50 years ago to study how they perceive and learn about floral odors, which signal the nectar and pollen resources a colony needs for survival. The PER procedure provides a robust and easy-to-employ framework for studying several different ecologically relevant mechanisms of behavioral plasticity. It is easily adaptable for use with several other insect species and other behavioral reflexes. These protocols can be readily employed in conjunction with various means for monitoring neural activity in the CNS via electrophysiology or bioimaging, or for manipulating targeted neuromodulatory pathways. It is a robust assay for rapidly detecting sub-lethal effects on behavior caused by environmental stressors, toxins or pesticides.\nWe show how the PER protocol is straightforward to implement using two procedures. One is suitable as a laboratory exercise for students or for quick assays of the effect of an experimental treatment. The other provides more thorough control of variables, which is important for studies of behavioral conditioning. We show how several measures for the behavioral response ranging from binary yes/no to more continuous variable like latency and duration of proboscis extension can be used to test hypotheses. And, we discuss some pitfalls that researchers commonly encounter when they use the procedure for the first time.\nNeuroscience, Issue 91, PER, conditioning, honey bee, olfaction, olfactory processing, learning, memory, toxin assay\nRecording Single Neurons' Action Potentials from Freely Moving Pigeons Across Three Stages of Learning\nInstitutions: Ruhr-University Bochum.\nWhile the subject of learning has attracted immense interest from both behavioral and neural scientists, only relatively few investigators have observed single-neuron activity while animals are acquiring an operantly conditioned response, or when that response is extinguished. But even in these cases, observation periods usually encompass only a single stage of learning, i.e.\nacquisition or extinction, but not both (exceptions include protocols employing reversal learning; see Bingman et al.1\nfor an example). However, acquisition and extinction entail different learning mechanisms and are therefore expected to be accompanied by different types and/or loci of neural plasticity.\nAccordingly, we developed a behavioral paradigm which institutes three stages of learning in a single behavioral session and which is well suited for the simultaneous recording of single neurons' action potentials. Animals are trained on a single-interval forced choice task which requires mapping each of two possible choice responses to the presentation of different novel visual stimuli (acquisition). After having reached a predefined performance criterion, one of the two choice responses is no longer reinforced (extinction). Following a certain decrement in performance level, correct responses are reinforced again (reacquisition). By using a new set of stimuli in every session, animals can undergo the acquisition-extinction-reacquisition process repeatedly. Because all three stages of learning occur in a single behavioral session, the paradigm is ideal for the simultaneous observation of the spiking output of multiple single neurons. We use pigeons as model systems, but the task can easily be adapted to any other species capable of conditioned discrimination learning.\nNeuroscience, Issue 88, pigeon, single unit recording, learning, memory, extinction, spike sorting, operant conditioning, reward, electrophysiology, animal cognition, model species\nUsing the Threat Probability Task to Assess Anxiety and Fear During Uncertain and Certain Threat\nInstitutions: University of Wisconsin-Madison.\nFear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e.\n, “startle probes”). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g.\n, neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g\n., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion.\nBehavior, Issue 91,\nStartle; electromyography; shock; addiction; uncertainty; fear; anxiety; humans; psychophysiology; translational\nUtilizing Transcranial Magnetic Stimulation to Study the Human Neuromuscular System\nInstitutions: Ohio University.\nTranscranial magnetic stimulation (TMS) has been in use for more than 20 years 1\n, and has grown exponentially in popularity over the past decade. While the use of TMS has expanded to the study of many systems and processes during this time, the original application and perhaps one of the most common uses of TMS involves studying the physiology, plasticity and function of the human neuromuscular system. Single pulse TMS applied to the motor cortex excites pyramidal neurons transsynaptically 2\n(Figure 1) and results in a measurable electromyographic response that can be used to study and evaluate the integrity and excitability of the corticospinal tract in humans 3\n. Additionally, recent advances in magnetic stimulation now allows for partitioning of cortical versus spinal excitability 4,5\n. For example, paired-pulse TMS can be used to assess intracortical facilitatory and inhibitory properties by combining a conditioning stimulus and a test stimulus at different interstimulus intervals 3,4,6-8\n. In this video article we will demonstrate the methodological and technical aspects of these techniques. Specifically, we will demonstrate single-pulse and paired-pulse TMS techniques as applied to the flexor carpi radialis (FCR) muscle as well as the erector spinae (ES) musculature. Our laboratory studies the FCR muscle as it is of interest to our research on the effects of wrist-hand cast immobilization on reduced muscle performance6,9\n, and we study the ES muscles due to these muscles clinical relevance as it relates to low back pain8\n. With this stated, we should note that TMS has been used to study many muscles of the hand, arm and legs, and should iterate that our demonstrations in the FCR and ES muscle groups are only selected examples of TMS being used to study the human neuromuscular system.\nMedicine, Issue 59, neuroscience, muscle, electromyography, physiology, TMS, strength, motor control. sarcopenia, dynapenia, lumbar\nA Dual Task Procedure Combined with Rapid Serial Visual Presentation to Test Attentional Blink for Nontargets\nInstitutions: Dartmouth College.\nWhen viewers search for targets in a rapid serial visual presentation (RSVP) stream, if two targets are presented within about 500 msec of each other, the first target may be easy to spot but the second is likely to be missed. This phenomenon of attentional blink (AB) has been widely studied to probe the temporal capacity of attention for detecting visual targets. However, with the typical procedure of AB experiments, it is not possible to examine how the processing of non-target items in RSVP may be affected by attention. This paper describes a novel dual task procedure combined with RSVP to test effects of AB for nontargets at varied stimulus onset asynchronies (SOAs). In an exemplar experiment, a target category was first displayed, followed by a sequence of 8 nouns. If one of the nouns belonged to the target category, participants would respond ‘yes’ at the end of the sequence, otherwise participants would respond ‘no’. Two 2-alternative forced choice memory tasks followed the response to determine if participants remembered the words immediately before or after the target, as well as a random word from another part of the sequence. In a second exemplar experiment, the same design was used, except that 1) the memory task was counterbalanced into two groups with SOAs of either 120 or 240 msec and 2) three memory tasks followed the sequence and tested remembrance for nontarget nouns in the sequence that could be anywhere from 3 items prior the target noun position to 3 items following the target noun position. Representative results from a previously published study demonstrate that our procedure can be used to examine divergent effects of attention that not only enhance targets but also suppress nontargets. Here we show results from a representative participant that replicated the previous finding.\nBehavior, Issue 94, Dual task, attentional blink, RSVP, target detection, recognition, visual psychophysics\nA Low Cost Setup for Behavioral Audiometry in Rodents\nInstitutions: University of Erlangen-Nuremberg.\nIn auditory animal research it is crucial to have precise information about basic hearing parameters of the animal subjects that are involved in the experiments. Such parameters may be physiological response characteristics of the auditory pathway, e.g.\nvia brainstem audiometry (BERA). But these methods allow only indirect and uncertain extrapolations about the auditory percept that corresponds to these physiological parameters. To assess the perceptual level of hearing, behavioral methods have to be used. A potential problem with the use of behavioral methods for the description of perception in animal models is the fact that most of these methods involve some kind of learning paradigm before the subjects can be behaviorally tested, e.g.\nanimals may have to learn to press a lever in response to a sound. As these learning paradigms change perception itself 1,2\nthey consequently will influence any result about perception obtained with these methods and therefore have to be interpreted with caution. Exceptions are paradigms that make use of reflex responses, because here no learning paradigms have to be carried out prior to perceptual testing. One such reflex response is the acoustic startle response (ASR) that can highly reproducibly be elicited with unexpected loud sounds in naïve animals. This ASR in turn can be influenced by preceding sounds depending on the perceptibility of this preceding stimulus: Sounds well above hearing threshold will completely inhibit the amplitude of the ASR; sounds close to threshold will only slightly inhibit the ASR. This phenomenon is called pre-pulse inhibition (PPI) 3,4\n, and the amount of PPI on the ASR gradually depends on the perceptibility of the pre-pulse. PPI of the ASR is therefore well suited to determine behavioral audiograms in naïve, non-trained animals, to determine hearing impairments or even to detect possible subjective tinnitus percepts in these animals. In this paper we demonstrate the use of this method in a rodent model (cf. also ref. 5\n), the Mongolian gerbil (Meriones unguiculatus), which is a well know model species for startle response research within the normal human hearing range (e.g. 6\nNeuroscience, Issue 68, Physiology, Anatomy, Medicine, otolaryngology, behavior, auditory startle response, pre-pulse inhibition, audiogram, tinnitus, hearing loss\nBrain Imaging Investigation of the Neural Correlates of Observing Virtual Social Interactions\nInstitutions: University of Alberta, University of Illinois, University of Alberta, University of Alberta, University of Alberta, University of Illinois at Urbana-Champaign, University of Illinois at Urbana-Champaign.\nThe ability to gauge social interactions is crucial in the assessment of others’ intentions. Factors such as facial expressions and body language affect our decisions in personal and professional life alike 1\n. These \"friend or foe\n\" judgements are often based on first impressions, which in turn may affect our decisions to \"approach or avoid\n\". Previous studies investigating the neural correlates of social cognition tended to use static facial stimuli 2\n. Here, we illustrate an experimental design in which whole-body animated characters were used in conjunction with functional magnetic resonance imaging (fMRI) recordings. Fifteen participants were presented with short movie-clips of guest-host interactions in a business setting, while fMRI data were recorded; at the end of each movie, participants also provided ratings of the host behaviour. This design mimics more closely real-life situations, and hence may contribute to better understanding of the neural mechanisms of social interactions in healthy behaviour, and to gaining insight into possible causes of deficits in social behaviour in such clinical conditions as social anxiety and autism 3\nNeuroscience, Issue 53, Social Perception, Social Knowledge, Social Cognition Network, Non-Verbal Communication, Decision-Making, Event-Related fMRI\nHigh Density Event-related Potential Data Acquisition in Cognitive Neuroscience\nInstitutions: Boston College.\nFunctional magnetic resonance imaging (fMRI) is currently the standard method of evaluating brain function in the field of Cognitive Neuroscience, in part because fMRI data acquisition and analysis techniques are readily available. Because fMRI has excellent spatial resolution but poor temporal resolution, this method can only be used to identify the spatial location of brain activity associated with a given cognitive process (and reveals virtually nothing about the time course of brain activity). By contrast, event-related potential (ERP) recording, a method that is used much less frequently than fMRI, has excellent temporal resolution and thus can track rapid temporal modulations in neural activity. Unfortunately, ERPs are under utilized in Cognitive Neuroscience because data acquisition techniques are not readily available and low density ERP recording has poor spatial resolution. In an effort to foster the increased use of ERPs in Cognitive Neuroscience, the present article details key techniques involved in high density ERP data acquisition. Critically, high density ERPs offer the promise of excellent temporal resolution and good spatial resolution (or excellent spatial resolution if coupled with fMRI), which is necessary to capture the spatial-temporal dynamics of human brain function.\nNeuroscience, Issue 38, ERP, electrodes, methods, setup"
] | [
"<urn:uuid:23d3d815-df55-4d1a-9ae8-83bf4b4df54c>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.jove.com/visualize/abstract/23418420/there-is-no-free-wont-antecedent-brain-activity-predicts-decisions-to"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320438.53/warc/CC-MAIN-20170625050430-20170625070430-00365.warc.gz"
] | [
"en"
] | [
0.9143939018249512
] | [
10210
] | [
3.296875
] | [
3
] |
[
"Engineer, criminologist join forces to CRUSH black hats\nResearch project will uncover cybercriminals' secrets....\nAn engineer and a criminologist are teaming up in a research project that aims to get a better idea of how cybercriminals operate and how to best thwart their mendacious activities.\nMichel Cukier, associate professor of reliability engineering, and David Maimon, assistant professor of criminology and criminal justice, both at the University of Maryland, hope their joint research project will spur innovative ideas on possible approaches to depend against hacking and malware. The two academics, both members of the Maryland Cybersecurity Center, are studying cyberattacks from two different angles: one from from the perspective of a user and the other from the perspective of an attacker.\nThe first phase of the study looked at the relationship between computer-network activity patterns and cybercrime trends. Some of the raw data fed into this phase of the study will include information on attacks against the University's own networks between 2007 and 2009.\nBringing in an expert on the mind of a criminal onto the study will hopefully yield insights into the social engineering aspects of many cyberattacks that technically focused security researchers might be missing, the two professors hope.\n\"We believe that criminological insights in the study of cybercrime are important, since they may support the development of concrete security policies that consider not only the technical element of cybercrime, but also the human component,\" Maimon explained.\nApplying criminological rationale proposed by the \"Routine Activities Perspective\", successful criminal incidents happen because of motivated offenders, suitable victims, and the absence of capable guardians at a particular time and place. Applied to the field of cyberattacks, this led the researchers to hypothesise that the campus network was more likely to receive port scans and DDoS attacks during business hours than in the middle of the night or at weekends. The study of the campus data confirmed this (not especially surprising) hypothesis.\nSimply by browsing sites on the web, users place the campus network at greater risk of attack. \"The study shows that the human aspect needs to be included in security studies, where humans are already referred as the 'weakest link',\" Cukier said.\nCukier and Maimon said the results of their research so far point towards the need for increased user education on computer security-related risks as a means to help safeguard against future attacks. Secondly they concluded cyber/security defines strategies should \"rely on predictions regarding the sources of attacks, based on the network users' social backgrounds and online routines\".\nWe can't help that next/generation application aware firewall vendors, such as Palo Alto Networks, might have thought of this already, but the finding is certainly not entirely obvious – though perhaps not the \"game-changing results\" that the uber-boss at the university hopes the research might lead towards.\n\"Michel and David's research exemplifies the interdisciplinary and comprehensive approach of the Maryland Cybersecurity Center,\" said Michael Hicks, director of the Maryland Cybersecurity Center, in a statement.\n\"Resources are not unlimited, so true solutions must consider the motivations of the actors, both attackers and defenders, as well as the technological means to thwart an attack. Michel, an engineer, and David, a criminologist, are considering both sides of this equation, with the potential for game-changing results.\" ®"
] | [
"<urn:uuid:abdeb2d5-3ff5-471c-bffb-d544013b05ec>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.theregister.co.uk/2011/11/30/cybercrime_criminology_study/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00040-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9535374641418457
] | [
686
] | [
2.546875
] | [
3
] |
[
"For the first time this spring thunderstorms brought severe weather warnings to parts of my area in eastern Iowa. While there were no confirmed reports of severe weather it was a good warm-up for what will inevitably come, tornado warnings.\nThe science of tornado forecasting has made steady progress over the years with average lead times in strong twisters now more than 10 minutes. Going forward, the goal is to increase that time even more with an additional focus on geographically tightening the area warned.\nHere's an example of what I'm talking about. This was the area warned in the 2011 Tuscaloosa tornado which killed more than 30 people. The tornado track is represented by the black line running through the red warning polygon. It was a great warning and saved countless lives but there were many people in the warning box who were not impacted yet still forced to take shelter.\nNow the NWS is working on a project called Warn-on-Forecast. A more precise threat map based on PHI (probabilistic hazard information), which can ingest both conventional current data such as radar, satellite and surface observations, as well as any high-resolution short tern models, and can be adjusted in real-time by the forecaster. In the example below, notice the tighter warning plume and emphasis on the area most likely impacted. Not only could this increase lead time by more than a half an hour, it could be updated and altered as often as every minute. Today's warning polygons can remain in place unchanged up to 45 minutes.\nAt some point this will revolutionize replace the current system. This is going to be a terrific upgrade. Below is more information on the Warn-on-Forecast project from the National Severe Storms Laboratory.\nWarn on detection (The present)\nCurrently, the NOAA National Weather Service (NWS) does not issue warnings for local severe weather until they see an early signal on radar, or the weather hazard is spotted. This approach provides the public with an average of 13 minutes advance notice before a tornado strikes. For some needs, this is not enough lead-time to move people to safety.\nWarn-on-Forecast (The Future)\nWarn-on-Forecast researchers work to combine high-resolution surface, satellite, and radar data into an optimal set of analyses to initialize ultrahigh-resolution surface, satellite, and radar data into an optimal set of analyses to initialize ultrahigh resolution computer models that will predict specific weather hazards 30-60 minutes before they form. This advanced modeling system will predict probabilities of a hazard occurring, the confidence in the path, and adjust to trends in the threat level based on new weather observations, and rapid and adaptive radar scanning capabilities.\nWarn-on-Forecast and FACETs\nWarn on Forecast is the foundation of the new Forecasting a Continuum of Environmental Threats (FACETs), a proposed next-generation severe weather forecasting concept. FACETs aims to build a modern, flexible system that forecasters can use to communicate user-specific , understandable weather threat information. FACETs will serve as a “delivery mechanism” for WoF predictions of storm-specific hazards such as tornadoes, large hail, and extreme local rainfall. This work will enable the current NWS warnings paradigm to move beyond a binary yes/ no warning process (from being in our outside the warning polygon) toward one which provides a more detailed threat assessment allowing various classes of users to base decisions on their specific situations and vulnerabilities. Decision-makers could set their own hazardous weather threat thresholds based on their specific needs.\nTesting the Warn-on-Forecast concept\nAs new Warn-on-Forecast technologies emerge, they are tested in simulated forecasting and warning exercises in the NOAA Hazardous Weather Testbed (HWT), ensuring an efficient transition into forecasting operations. In the HWT, Warn-on-Forecast scientists and NWS forecasters have already evaluated multiple building blocks of a future Warn-on-Forecast system, including: • Phased Array Radar and its ability to provide more frequent updates than current NWS radars, • Different techniques to feed radar data into forecast models accurately and quickly • Different suites of forecast models that can be combined into a single system representing all possible outcomes for a given weather event, and • Development of strategies that allow forecasters to rapidly interpret computer-model guidance and add value in generating prototype forecast products. Supporting a Weather Ready Nation The Warn-on-Forecast activity supports requirements and activities documented in the NWS Weather Ready Nation road map, the NOAA 5-year Research and Development Plan, and recommendations in the National Academy of Science 2012 report, “The National Weather Service Modernization and Associated Restructuring.” Warn-onForecast is led by NSSL and represents a collaborative effort across several NOAA groups including the Earth System Research Laboratory, the Storm Prediction Center, and the Norman NWS Forecast Office. Academic collaborators are the Center for Analysis and Prediction of Storms, and the Cooperative Institute for Mesoscale Meteorological Studies at the University of Oklahoma................................................................................................................................................\nWith a strong cold front now well to the east Thursday's weather will be a far cry from Wednesday. Brisk winds and clouds will combine with highs 20-25 degrees cooler to make for a rather raw day. While it's bound to be a set back it's only a temporary downturn and readings will already be on the way up by the start of Easter weekend. Here's the forecast for Cedar Rapids which will be similar for much of area.\nThat's a wrap. And speaking of that you'll need a wrap today with the much cooler weather. Have a good one and of course, roll weather...TS"
] | [
"<urn:uuid:4adf4a05-c612-4361-8b5f-60bb02e296f2>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.tswails.com/single-post/2019/04/17/STORMS-GONE-SO-IS-THE-WARMTH"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145621.28/warc/CC-MAIN-20200221233354-20200222023354-00419.warc.gz"
] | [
"en"
] | [
0.9225404858589172
] | [
1170
] | [
2.90625
] | [
3
] |
[
"I often feel Artificial Intelligence (AI) is still directionless although we do see a lot of Work In Progress (WIP). AI in transportation is not just about autonomous aircrafts, cars, trucks and trains. There is much more that can be done with AI. Recently IBM helped to create an app that would use Watson Visual Recognition to inform travelers about congestion on London bus routes. In India, the state transport corporation of Kolkata took a technological leap by deploying artificial intelligence to analyze commuter behavior, sentiment, suggestions and commute pattern. This deployment is identical with what Indian cab aggregators Uber and Ola have been doing for quite a few years now.\nBOT, the AI technology being used by West Bengal Transport Corporation (WBTC), will receive the inputs from commuters via Pathadisha, the bus app that was introduced to analyze inputs and then provide feedback to both passengers and officials in WBTC to suggest future improvements in the service. Furthermore this app has a simple driver and conductor interface that will enable commuters to know whether there a seat is available in a bus or one has to stand during the journey. This input is expected to work on a real-time basis. A simple color band will indicate the seat status: green means seats are available, amber if seats are occupied and red if the bus is jam-packed.\nAI is expected to make our travel smoother and more efficient. User and Entity Behavior Analytics (UEBA), Advanced Health Analytics along with Machine Learning (ML), Deep Learning (DL) will be extensively used by Internet of Things (IOT) in predictive analytics and availability of real-time inputs. In the most recent developments AI is predicting whether public bus drivers are likely to have a crash within three months. If the prediction is ‘yes’, they are sent for training. In the future AI along with IOT will replace drivers and create more opportunities for humans in real-time transportation control and governance.\nAI could also help us detect to find emergencies during travel. Aircrafts, buses and trains could be fitted with cameras capable of biometric analysis that observe the facial expressions of passengers. This data could provide real-time input on their safety and well-being. Israel’s Tel Aviv-headquartered Beyond Verbal which was founded in 2012 on the basis of 21 years of research, specializes in emotions analytics. Its technology enables devices and applications to understand not just what people type, click, say or touch, but how they feel, what they mean and even the condition of their health. Another promising start-up from Tel Aviv, Optibus has a commendable dynamic transportation scheduling system which uses big-data analytics to dynamically adjust the schedules of drivers and vehicles to improve passenger experience and distribution of public transportation. Optibus technology is field-proven on three continents and received the European Commission’s Seal of Excellence.\nOne could easily build a superior transportation system with AI and its subsets. Very soon AI and IOT will dictate road traffic signals based on real-time inputs, study road conditions, provide data on the quality of air and add a thousand more functions to its capabilities. IOT will further add value to in-house travel experience in public transport. It will host a lot of features and additions that were unthought-of before. There is no need to go to the pantry of a train to order your food or look for the menu or even get down on the next station and rush to book your next ticket when everything can be done on your wrist-watch, mobile phone or an internal digital console.\nSome of the AI deployments we might get to see in lesser than a decade are autonomous driving, data-driven preventive maintenance, powerful surveillance and monitoring systems for transportation and pedestrians, sustainable mobility, advanced traveler infotainment systems and services, emergency management systems, transport planning, design and management systems and at last but not the least, environmental protection and quality improvement systems.\nBesides its economic, social, and environmental importance, AI needs a world that controls its human numbers. One cannot afford to allow countries to overpopulate and cause a threat to our own welfare. We live with limited resources and much limited renewable resources. AI promises to play a major role towards a better quality of life and this can only happen with a lesser number of human beings. AI badly needs global governance on all fronts right from conceptualization to implementation.\nOriginally published at the Times of Israel blogs"
] | [
"<urn:uuid:e9b3037d-7379-4a12-93b8-9f8dd6bb32f2>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.experfy.com/blog/artificial-intelligence-the-future-of-mobility"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694176.67/warc/CC-MAIN-20200127020458-20200127050458-00117.warc.gz"
] | [
"en"
] | [
0.9464403390884399
] | [
898
] | [
2.625
] | [
3
] |
[
"This week a 31 year-old woman living in Jacksonville, Florida, got infected with the most deadly form of malaria, Plasmodium falciparum. Just weeks ago a similar report came from Spain, where indigenous transmission occurred and led to the first case of malaria since 1961.\nImport cases of malaria are common in the USA (this year 111 travellers or returning immigrants returned to the USA with malaria) and estimates by the CDC are an average of 1300 import cases per annum.\nThink of it. That's 1300 people arriving all over the USA, carrying malaria parasites that may infect local anophelines. And these anophelines may bite others that have no immunity whatsoever against malaria as the disease was eliminated from the USA some 59 years ago.\nYet, do we see malaria becoming endemic again in the USA? No. Do we see epidemic outbreaks anywhere on US soil? No.\nThat's interesting. I have attended numerous meetings and conferences in which the danger of returning malaria was often seen as (almost) a reason to not try and eliminate malaria anyway. Doom scenarios whereby an epidemic causes thousands of deaths were pictured there. And therefore loss of immunity remains a key issue in the elimination debate.\nIn the report 'Shrinking the malaria map' this is highlighted in a chapter titled 'Holding the line'. Examples are given of places (Mauritius, Kazakhstan, and South Korea) where elimination was followed by recurrence of the disease.\nTwo factors will determine the likelihood of malaria returning: the frequency at which parasites are brought in, and the intrinsic potential for transmission (local vectors, ecology, social environment etc.). Apparently, 1300 introductions in the USA and the presence of competent anophelines there are not enough to kick-start malaria again.\nBut more is needed, and here is where the crux of the story lies: surveillance and a quick reaction force are key. A well functioning public health system is the key to keep malaria out once it is gone.\nSo the fear I heard at meetings was not so much the loss of immunity but merely the public health systems that would be insufficient to contain recurrence like that seen in Jacksonville this week. Is this an epidemiological issue? No. Is it a disease-related issue? No. Is it entomology? No. It is management.\nThe danger therefore lies in the loss of a region or country to sustain monitoring and surveillance and maintain the know-how and tools to contain a local outbreak. If this is not a problem in the USA, then why should it be a problem elsewhere?\nWell, in many of the poorer nations the problem with elimination is the loss of interest to continue with doing just that: maintaining a proper surveillance system, competent personnel, and so on. The reason for this is simple: cash. Cash that is needed to deal with other, more pressing issues, when malaria is gone.\nThe lesson from all this is that shrinking the malaria map will come at a price, not just during the elimination effort itself, but beyond.\nCash and proper management. Something Florida does not have to worry about..."
] | [
"<urn:uuid:d516f96f-44c8-4cd9-af24-bdecffbaac25>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.malariaworld.org/blog/elimination-and-risk-malaria-coming-back-afterwards"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163050122/warc/CC-MAIN-20131204131730-00092-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9457254409790039
] | [
638
] | [
3.015625
] | [
3
] |
[
"We’ve talked about the Sun before, but this time we’re going to look at the entire life cycle of the Sun, and all the stages it’s going to go through: solar nebula, protostar, main sequence, red giant, white dwarf, and more. Want to know what the future holds for the Sun, get ready for the grim details.\n- Stellar Life Cycle flow Chart\n- The Life and Death of Stars\n- The Natures of the Stars\n- Stellar Evolution\n- Life Cycle of a Star\n- The Life of a Star\n- Everything you need to know about the sun from Universe Today’s Guide to Space\nAnd the details…\n- Protostars — from Astrophysics Spectator\n- Protostars — from Wiki\n- Hayashi Track — from Internet Encyclopedia of Science\n- Mass-Luminosity Diagram — from Courtney Seligman\n- Paper on the sun’s activity for the past 8,000 years — from Max Planck Society\n- Jupiter gives off more heat than it gets from the sun\n- Accretion disk –– from Internet Encyclopedia of Science\n- Paper on magnetic fields of stars — from IAU\n- Main sequence stars — from CSIRO\n- Table of main sequence star data\n- Nuclear Fusion of Stars –– from Astrophysics Spectator\n- Post-Main Sequence Stars and Helium Flash\n- Gravitational Collapse of Stars — Astrophysics Spectator\n- Horizontal Branch Stars\n- Variable Stars — from Chandra’s website\n- Variable Stars — see Episode 22\n- Check out American Association of Variable Star Observers\n- Mira Variable stars\n- Pauli Exclusion Principle\n- Diamonds in the sky — White Dwarf stars\n- Globular Clusters\n- Will the Earth Survive When the Sun Becomes a Red Giant? — Universe Today\nA few papers on star formation:\n- Protostar Formation in the Early Universe\n- Properties of Protostars in the Elephant Trunk Globule\n- Problems of Star Formation Theories and Prospects of Submillimeter Observations\n- Evolution of Massive Protostars with High Accretion Rates\n- Expansion Rate of the Universe\n- Should you drink red wine?\n- World Cast, Oct. 4 — starring Dr. Pamela Gay! “The Origins of the Universe” Live webcast, 20:00 UT\nTranscript: The Life of the Sun\nDr. Fraser Cain: This wasn’t our intention but we’re actually coming up with another series. We talked about the Sun last time and we’re going to talk about the Sun today and maybe we’ll talk about the Sun next week. I don’t really know.\nDr. Pamela Gay: We just have too many big ideas that refuse to be confined to 30 minutes.\nFraser: I know. This could be one show, this could be two shows, I don’t really know.\nPamela: We’ll see where we go.\nFraser: Exactly, we’ll just let the show decide. We’ve talked about the Sun before. This time we’re going to look at the entire life cycle of the Sun and all the stages it’s going to go through, Solar Nebula, Protostar, Main Sequence, Red Giant, White Dwarf and more. So if you want to know what the past held and what the future holds for the Sun get ready for the grim details. [Laughter] And of course this will always end on a sad note.\nOkay Pamela, I think the goal here today is to go through in excruciating detail all of the stages of the Sun. It is actually really amazing all the crazy stuff that happens. So let’s rewind time all the way back to 4.6 billion years ago plus plus and talk about what came first.\nPamela: Well, once upon a time there was nothing more than a giant cloud of gas and dust. That’s the boring part. We don’t know how long that cloud of gas and dust just sorta hung out doing nothing other than maybe glowing faintly. Somewhere along the line that cloud of gas and dust was caused to contract; caused to fragment and turn itself into a bunch of baby Stars.\nFraser: Now the key is that it was a cold cloud, right?\nFraser: And not a hot cloud. If you get a hot cloud of gas it will never contract.\nPamela: This is because temperatures related to the rate at which Particles are flying around. If you have something hot the Particles are bouncing around, bouncing off of each other and it’s hard to get that to collapse down because you have this thermal pressure holding the cloud apart basically.\nBut if you have cold gas and dust that is just hanging out in Space and you whack it, it will start to condense. As the gas and dust fills a smaller and smaller volume, Gravity will start to drive that contraction faster.\nWe talk about the point at which something starts to identify itself as being the beginnings of a Star as the Hayashi track. With a Star like our Sun, it actually started out about ten times brighter than it is right now as it started to contract off of this Hayashi track.\nSo for several million years, we’re not exactly sure how long this process takes, the Sun contracted and actually got fainter as it contracted and then started nuclear burning in its core.\nFraser: So before it was bright but it wasn’t burning with nuclear fusion in its core?\nPamela: No, it was actually all thermal heat. This is sort of what Jupiter is doing. Jupiter actually gives off more light than it is simply reflecting from the Sun. If you turned the Sun off, Jupiter would still be giving off light.\nThis is because gas that is being held together, being pushed together, being squished together by Gravity actually emits thermal radiation for many billions of years.\nFraser: Right so the first few million years of the Sun, it was just a ball of Hydrogen and Helium held together by the Gravity and just headed up by that process. No fusion necessary.\nPamela: The best way to think of this is it’s the opposite of spray air. When you spray your hand with spray air, it’s really cold because the gas is expanding. In this case we’re squishing the gas together and it’s heating up. So, gas squished, heated up and eventually it starts nuclear burning.\nThis process probably started with Deuterium burning. This is where you’re burning up bits of Hydrogen Atoms that have an extra Neutron in them. These actually burn a lot easier than just regular run of the mill Hydrogen.\nFraser: And where did those come from?\nPamela: Those probably came from the Big Bang. So we’re burning up the building blocks of the Universe basically.\nFraser: The point being that it’s like at early enough on you didn’t have the conditions to fuse Hydrogen yet, but you still had a few left over chunks of Deuterium and those could start to fuse together.\nPamela: Eventually you do end up with nice friendly Hydrogen burning in the center of the Sun. Over the process of getting to that stage the Sun first overheats a little bit and then cools down to settle into a nice friendly what we call main sequence life. This is the first big main part of saying that is a Star.\nSo we go from protostar which is the process of going off of the Hayashi track to contracting to just settling down into nice round Star that has also along the way blasted everything out from around it.\nDuring the early parts of the Sun’s life, they go through many radical stages with lots of x-ray flares, lots of high energy output. They go through their own form of “the terrible twos” that includes High Energy Radiation.\nFraser: Now why are they so violent and active at that stage?\nPamela: As they collapse there’s material streaming on to them. Our Solar System is basically an Accretion Disk at this point, a disk of material where some of that material is just streaming on to the Star in the center.\nYou have powerful Magnetic Fields in many cases. You can have jets coming off of the poles of the Star. All of these different interactions can lead to flares as the Star settles down.\nFraser: So it’s almost like new chunks of material are landing on the Star and that causes flares. It wasn’t that inflow of material that causes the Star to settle down.\nPamela: We also don’t know exactly what the details of the Magnetic Field evolution at this point is because you have all these Magnetic Field lines that are rearranging themselves as well. There is lots of potential for badness to be going on.\nFraser: Now the Sun has finally settled down to its Main Sequence. But that was like four and a half billion years ago, right?\nPamela: So depending on what paper you read, the protostar stage could have taken hundreds of thousands of years or a few million years. That’s a short stage to get nice solid Star formation going on and to get our Planets formed and to get everything lined up so that we have a Solar System that looked like the Solar System we live in today although the terrestrial surfaces were very different. The pieces were all there.\nFraser: Right, but how does the Sun look? We’re still on a Main Sequence phase, how does the Sun look different when it started the Main Sequence to where it is today?\nPamela: Its temperature has changed slightly. It was a little bit hotter in the past – our Sun has actually cooled off some over the years. Once it hits the Main Sequence Stage, it’s a fairly constant Sun. We’ve had a bit of cooling off but our Planets found other ways through gases and stuff to keep going in a way that works for us.\nFraser: But how is it changing – even though it’s in the Main Sequence – it must be changing a little bit, right? Hydrogen is getting fused into Helium.\nPamela: There are long term changes in temperature. Over time our Sun is now heating up again. So we went from being hotter and the Sun cooled off and now slowly we’re getting warmer and warmer over time. It’s a gradual enough process that even over those 5 billion years; terrestrial effects have been really what have dominated the situation here on the planet Earth.\nFraser: Okay so the Sun is getting hotter – we’re not talking like a cause for global warming – we’re talking billions of years.\nPamela: Right, so it’s only in like 50 million years from now that we’re going to have to start worrying about the temperature has gone up enough that it starts to affect the planet Earth.\nIf you look at people who look at long term cycles in the Sun, there are a lot of them who believe for a variety of reasons that are hidden in the field of Solar Astronomy, that our Sun is actually in the process of a cooling period that has to do with how the Magnetic Field is evolving over time. There’s lots of long term and short term changes in the Sun’s behavior.\nWe think that there is currently a short term slight cooling phase going on but that’s superimposed over a long term heating of the Sun that about 50 million years from now is going to start to impact us. The Sun actually will stay a Main Sequence Star for probably another 5 billion years.\nFraser: Right, so we’re only not even halfway through the process yet.\nPamela: It’s middle-aged still though because the periods that come after it are so short that we can start to look at ourselves as being in our mid-40s if you are talking about someone who lives to be 100.\nFraser: Then I guess at some point – we’ve talked about this before – that the heat from the Sun is going to start to really impact our Planet, right?\nPamela: Yeah. This is where we start having our oceans heating up. That leads to higher humidity in the air which leads to the Planet heating up more which of course heats the oceans more and eventually the oceans evaporate – total runaway Greenhouse Effect. No more life on Planet Earth. It’s rather depressing but our Universe is after all trying to kill us. [Laughter]\nFraser: We’ve covered that before. [Laughter] I’ve seen some competing series on this but essentially 500 million to a billion years from now there will be no liquid water. Water vapor will have boiled off into Space. We’ll essentially be very much like Venus, just a little cooler.\nFraser: We’re on our way to Venus. So, Earth doesn’t matter anymore. [Laughter] The Sun is still a concern. That’s still like 3 billion years from now. So when do things get interesting again?\nPamela: About 5 billion years from now we start to run out of Hydrogen that is readily available for fusing in the center of the Sun. When this happens the Sun is going to start contracting because there is not going to be as much pressure from the light supporting the outer layers of the Star.\nFraser: This is kinda interesting because even though there is tons and tons of Hydrogen in the whole Sun and if you could somehow mix it all back up again – give it a stir – the Sun could just go on for hundreds of billions of years, right?\nPamela: This is what happens in little tiny tiny Stars. The burning process is able to create what we call convective mixing. The entire Star essentially acts like a Lava Lamp. It’s able to constantly refuel the center of the Star.\nAs you get to bigger and bigger Stars like our Sun, you reach the point where that mixing no longer takes place. So as you’re burning Hydrogen into heavier elements in the center of the Sun, those heavy elements stay there. You end up building up a Helium core to our Sun.\nOnce the core is exhausted of its Hydrogen fuel the Sun will begin to collapse and it will reach the point where a shell of Hydrogen around that Helium core is able to ignite. The densities around the core get high enough and the temperatures get hot enough just from the weight of everything resting on them that we burn a shell of Hydrogen.\nAt this point we talk about the Sun being off the Main Sequence and the next really interesting phase starts to occur once you reach the stage that you get a Helium Flash. For awhile you have what we call a Red Giant Branch Star. This is where you’re burning the shell of Hydrogen but the Star is still collapsing.\nThe Sun is still getting smaller and smaller and the center of the Sun is getting hotter and hotter under the weight of this collapsing material above it. The pressures are getting higher as everything is getting confined into a smaller and smaller area.\nIn a magical moment when it reaches a temperature ten to the 8 degrees, suddenly the Helium in the center of the Sun is able to ignite. We call this a Helium Flash. At this point the Sun becomes what we call a Horizontal Branch Star. Now you have a new segment in the evolution of the Sun. This phase can also be called the sub-giant phase of the Star. Here you have the Star happily burning Helium, it bloats itself back out. It gets hotter in the core once you get this new burning going on. You get more light pressure supporting the outer layers of the Star, Star bloats out. It also drops in luminosity here.\nThis is one of the neat trade-offs that is happening with the Star. It’s constantly changing every so slightly in brightness and in temperature as it goes through all these different phases. So once the Hydrogen shot off, the Star got much redder. Now that you have the Helium burning, the Star gets a little bit bluer again and that’s kind of cool. Eventually the Helium also exhausts itself in the center of the Sun.\nAll of the Helium ends up burning itself out into Carbon. Here again you end up with shell burning. So now you have this Carbon core surrounded by a shell of Helium that’s burning itself surrounded by a shell of Hydrogen that’s burning. So you start getting Onion15:11 of Sun. This is where we talk about the Star being a Red Giant again. Exactly what happens depends a little bit on metalisty15:19 of the Star.\nIn a lot of cases as it goes through these phases we can also end up with it being what’s called a Variable Star where it pulsates in brightness. This happens to Stars that are just like our Sun. They can go through a phase of pulsations as they go along. As they start running out of all this fuel, this is where we call them Mira Variables. They’re giant, they’re bloated; the outermost layers of the Star are thinner than the Earth’s atmosphere which is kind of cool to think about.\nThis is where you start to spread our Sun out over a volume that just fits – maybe we think – within the Earth’s Orbit. We don’t know for certain. And you also start getting Mass loss in Space as the nuclear burning is going on. The outer layers of the Atmosphere have expanded out so far that sometimes just a slight push from the core of the Star which is sputtering as it burns is able to cause puffs of the Atmosphere to drift away.\nFraser: And the red color is just coming from it being cooler, am I right? Back in the olden days the Sun was white because it was a temperature of nearly 6000 degrees Kelvin and now it’s cooled down even though it’s a lot larger, right?\nPamela: So here we’re starting to get down to 4000 degrees Kelvin. This change in temperature is enough to change its color so that it’s a deep red.\nFraser: But the overall brightness of the Sun is way higher.\nPamela: This is because you have a much larger surface area that the light is going through. Each bit of that surface area is able to radiate away Photons and all those Photons add up to being a much brighter Star.\nFraser: So even though the Sun is changed to red, it’s now visible from a much further distance than it was before.\nPamela: This is part of why so many of the really bright Stars that we see in the Sky are these red Stars. We can just see red Stars at a much greater distance and this is a common phase for Stars to go through. What’s kind of amazing is the time scales that all of this has been happening on.\nFraser: That’s just what I was going to ask – how long does this last?\nPamela: Our Sun hangs out on the Main Sequence for a few billion years – like 10ish billion years. Then it only spends a few hundred millions years going through all the rest of the stages. So those are relatively short stages in a Star’s life.\nWe refer to the Main Sequence as the majority of the Star’s life and that’s exactly what it is. Then it goes off and does all these really cool things but those happen essentially in the blink of a Cosmic eye. Once the Star hits the Mira phase, just maybe four or five hundred million years after leaving the Main Sequence, at that point it starts losing its Atmosphere.\nIt starts transitioning from being a Star that’s burning and doing all the Star-like things to blasting its Atmosphere away starting to form a Planetary Nebula. A Planetary Nebula is nothing more than the Atmosphere of a Star that’s been exhaled and hasn’t yet drifted so far away from its starting point that we can no longer see all the gas associated with one another.\nFraser: What’s the mechanism that actually gets the Atmosphere away from the Sun? Like what’s blowing it away?\nPamela: It’s the flickering and sputtering of these shells of burning Hydrogen and Helium. As the Star collapses down you’ll get a burst of extra light that pushes things away. The Star is so big that Gravity and Light are just barely in balance and it’s very easy to overcome that Gravity of the outer layers of the Star.\nFraser: You almost get it kicking as it’s normally in balance and then it maybe sputters and gets brighter and more light pressure per second and then contracts but it’s enough of a push to shove off that outside layer.\nPamela: There’s also this constant Solar Wind that’s going out where you have this light pressure pushing out and it’s always able to remove some amount of the Star’s Mass. We’re just not entirely sure how much of the Star’s Mass.\nWhat’s really amazing is we’re now able to start looking at detailed maps of the environments around some of these Stars and see all sorts of crazy strange structures that have formed during Planetary Nebula phases. We don’t understand what causes all of these different strange shapes.\nThere is different Planetary Nebula that looks like a series of nested boxes, a series of nested rings, figure eights and all of these are coming from fairly similar parent objects. But there’s something that is causing it to look radically different in just how the Atmospheres were lost to form these Nebula.\nFraser: Magnetic Fields.\nPamela: [Laughter] That’s the thing we always blame.\nFraser: Okay, so now our Sun is in this Mira phase, puffing off outside layers into Space….\nPamela: Eventually it reaches the point where between Mass loss and just burning up what little fuel it has, it starts to run out of Energy. The Helium burning shuts down. The Hydrogen burning shuts down. And the last of the Atmosphere just drifts away.\nAt this point you now have a hot cinder of a Star. That cinder of a Star collapses down. It no longer has any burning going on to support the Atoms against one another. As they collapse they actually reach a degenerate gas phase. This is where the Hydrogen and Helium Atoms pack themselves so closely together that the only way the Electrons can still exist is if they basically form a Matrix.\nYou end up with Stars that their internal structure is essentially a diamond of Carbon surrounded by these extremely dense – we call them degenerate layers – of Hydrogen and Helium as well. These are our White Dwarf Stars.\nFraser: Right and so you’ve gotten a situation where the Gravity is so intense that it’s packing the Carbon and the Helium and all that’s left into a sphere but there isn’t enough Gravity to actually ignite fusion of the Carbon.\nPamela: In the process of packing everything together it gets so close that the pressure of the Electrons one against the other going: “no, you have the same charge as I do stay away,” and the poly-exclusion principle that are working to support the Star.\nIf you made White Dwarfs any heavier you’d be able to overcome this and you’d squish everything down into being a Neutron Star which we will get to in a couple more episodes.\nBut the remnants of Stars like our Sun are supported not by light but by Electron pressure. That’s kind of neat to think of Electrons supporting a star. These are the largest diamonds we have in the Universe.\nFraser: Is it actually a diamond?\nPamela: Yeah, it just might be. If you think about it, what a diamond is. It is nothing more than Carbon Atoms that have been arranged in a Matrix which is one of the tightest structures that you can get those Carbon Atoms into. That’s why diamonds are so hard.\nAs you’re creating a White Dwarf you have to pack those Carbon Atoms down into a crystalline structure. That’s where you start getting something that is basically nothing more than a really HOT diamond.\nFraser: Right, if you could cool it down and survive the Gravity and chop pieces off you could turn them into diamond rings. [Laughter]\nPamela: Yes. You would have to wait a long time for them to cool off though.\nFraser: I’m a patient man. It’s a new business. Anyone want to go into business with me [Laughter] in the Inter-stellar diamonds?\nPamela: You want your one Solar Mass diamond, don’t you?\nFraser: Yeah, exactly. So then, but it’s not dead yet, right?\nPamela: It’s still radiating heat. It’s still hot. This is the situation of Captain Kirk heats up the rock with his phaser and it takes a little while for the rock to cool down. Well, White Dwarfs are a lot bigger than that rock and it takes them millions of years to cool off.\nFraser: Billions, trillions….\nPamela: It depends on how cool you want to get them. So they’re cooling off over time and as these White Dwarfs cool off, the Planetary Nebula they sit in the center of also fades away as it expands away. You’re essentially watching the home of the Star disappear.\nIts Atmosphere is dispersing moving further and further away from that Core White Dwarf. The Star itself is getting cooler and as it is getting cooler it’s getting fainter and fainter.\nEventually you end up with that gas and dust in the Planetary Nebula just sort of mixes itself in with the rest of the Cosmos. The White Dwarf over billions of years cools off to the temperature of Space. It’s a kinda sad future.\nFraser: Right and we call that a Black Dwarf, right?\nPamela: Yeah, it depends on who you talk to. People are kind of nervous about using the phrase Black Dwarf because too many people mix it up with Black Hole, but that is one of the terms kicking around.\nFraser: It there some super Scientific term?\nFraser: Okay, some kind of degenerate …..\nPamela: Cold White Dwarf also works.\nFraser: A Cold White Dwarf, okay. That’s very scientific sounding. [Laughter] Now what do we see? If we look out into the Universe, how far along that do we see White Dwarfs? Are there White Dwarfs that are just now too cool for us to be able to see them? Too cool for school? [Laughter]\nPamela: We don’t think so. The Universe hasn’t quite been around that long. One of the neat things that’s happening is we can look out at Globular Clusters, packages of in some case thousands of Stars, that are gravitationally bound together and are orbiting our Milky Way Galaxy. These are some of the oldest objects that we know of, formed 13 or 14 billion years ago depending on whose Stellar Evolution Models you believe.\nWhen we look at them – we can use Hubble Space Telescope to probe fainter and fainter until we start to pull out the White Dwarfs – we can actually see what we call the White Dwarf cooling sequence.\nThis is where you see a sequence of Stars in a plot of temperature vs. brightness that forms a nice polite line where the brighter ones are also bluer and the fainter ones are also redder. There is a direct relationship between how bright they are and what temperature they are forming a perfectly straight line. We can see where we stop getting Stars.\nThis is part of how we come up with the age of these Globular Clusters is we know, okay the first Stars to be able to form White Dwarfs were Foo and they burned through their stuff fairly quickly because they were higher Mass, had large amounts of Mass loss and eventually ended up dying with only 1.4ish Solar Masses of material after all of their Mass loss.\nThen they collapsed down into White Dwarfs. And then Stars that were a little bit less massive collapsed down to White Dwarfs. And then Stars that were even less massive collapsed down to White Dwarfs. The Stars that became White Dwarfs later are still hotter than the ones that formed first which are still cooler. There aren’t any that have had time to reach the point that they’re too cool for school as you put it.\nFraser: Right, so you can look at a cluster, count up the number of White Dwarfs count up the number of Stars and get a sense of how old that cluster is.\nPamela: This is one of the many ways that we work to confirm the ages of systems.\nFraser: Right. Now is there going to be any time then – I mean the Sun is going to be slowly cooling down – is there anything left? Will there be some time down the road where maybe Jupiter crashes into the Sun? [Laughter] You know the White Dwarf Sun and you get re-ignition?\nPamela: No, probably not. It just doesn’t have quite enough Mass to do anything quite that exciting. One of the interesting questions is going to be what happens as the Sun loses Mass through it’s – we call it the Asymptotic Giant Branch Phase – that period of time where it’s essentially a Mira variable. It’s going to be undergoing huge amounts of Mass loss as the Mass leaves the Atmosphere and starts to form another Planetary Nebula.\nAs that Mass is lost – first of all, it’s blasting the Planets – but second of all that Mass is no longer holding the Planets in their present orbits. This is going to cause the Earth’s orbit to get bigger; the Mars orbit to get bigger; Jupiter & Saturn’s orbits to get bigger. It rearranges our entire Solar System.\nThis is part of why we think the Sun isn’t actually going to consume the Planet Earth. Earth will drift out of range. So, our orbit will get consumed, but our orbit is just an artificial line around the Sun. Our Planet itself will probably escape.\nFraser: I think you’re wrong.\nPamela: Why do you think I’m wrong?\nFraser: The latest article I read: “The Earth will be destroyed. The Earth won’t be destroyed.” I think the last article that we did was the Earth will be destroyed.\nPamela: See, I like the Mass loss people. I’m a firm believer in Mass loss.\nFraser: Well, no the Mass loss will still happen it’s just that it won’t be enough the Earth will still be destroyed. Anyway, that’s the current thinking. [Laughter] We’ll talk in a year and the current thinking will be: Earth will survive.\nPamela: Well, and you know, I’m sure that for every paper written on Earth will be destroyed, an equal number are being written at the exact same rate for Earth will not be destroyed. This is one of the areas of Science that we’re still struggling to understand. We still don’t know how to calculate Mass loss halfway accurately. We’re trying to figure it out but it’s a complicated process where you have to understand in detail how Energy is transported through the Sun.\nIt’s a crazy situation where part of the Sun acts like a lava lamp with convection; other parts act more like light bulbs heating up the levels above them through radiative transfer and trying to figure out how all these things happen and how they change as the temperature of the Sun changes.\nIt’s a really complicated process and we’re just starting to get computer software that is sophisticated enough to answer a lot of these questions. We’re finally starting to get computers that are sophisticated enough to run that software without having to wait a few years for the answer.\nFraser: Right we can just keep coming back and forth with the controversy then. Five years more of AstronomyCast [Laughter] and you know, we’ll have flipped the position five times. I think that’s the wonderful thing about Science you know, that it isn’t known. More evidence keeps getting brought to the table and the situation just keeps changing back and forth as more evidence is brought in.\nAs more evidence is thought through and argued and that’s Science and I love that it’s how that all works. It’s different like should you drink red wine or not? [Laughter] It’s like where you’re changing your drinking habits the fate of the Sun doesn’t really play into the day-to-day habits that I have.\nPamela: It’s fun to watch how Scientists in general – a lot of us are willing to go yeah we’re not sure what the answer is but I’m going to go with this one because I like it – until we have more solid Science.\nWhen I first started studying Astronomy in college we didn’t know what the expansion rate of the Universe was and the choice was 50 or 100. It was often: “Children use 100, it makes the math easier.” [Laughter] We now know it’s around 70 kilometers per second per mega parsec. But I’ll never forget that: “Children use 100, it makes the math easier.”\nFraser: Even though it’s completely wrong, could be off by you know…\nPamela: But we didn’t know if it was 50 or 100 and there were people fighting to the death over those two numbers and it turns it was halfway in-between.\nFraser: Alright, well I think next week we wanted to look at Stars that are smaller and Stars that are bigger. The way those events unfold change dramatically depending on the Mass of the Star that you’re dealing with.\nSo we’ll probably go through that whole process again but there’s things that will get a lot more exciting and a lot more boring; mostly more exciting.\nPamela: But there will be explosions involved.\nFraser: There will be. Okay we’ll talk to you next week.\nThis transcript is not an exact match to the audio file. It has been edited for clarity. Transcription and editing by Cindy Leonard."
] | [
"<urn:uuid:40f134e8-95bf-46a8-b4cd-88ac306a98af>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.astronomycast.com/2008/09/ep-108-the-life-of-the-sun/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00368.warc.gz"
] | [
"en"
] | [
0.949768602848053
] | [
7439
] | [
2.921875
] | [
3
] |
[
"Advantages of using Cow Dung Powder Fertilizer Production for Agricultural Application\nIt is really an age-old tradition to utilize cow dung within the garden. Most farmers use fresh cow manure within their fertilizers to enhance crop production. But, fresh cow dung contains high amounts of ammonia. This usually contributes to plants dying when the farmer applies the manure directly. This is why modern farmers use cow dung powder rather than the raw product. They offer lots of benefits that other manure may not offer.\nElements of cow dung powder\nCow dung powder is a mix of numerous things. While the dung includes digested grains and grass, the powder used for fertilizer production experiences a composting process. Cow dung contains approximately 1% potassium, 2% phosphorus, and threePercent nitrogen. Aside from these three essential elements, furthermore, it has a high portion of ammonia that is certainly harmful for pathogens. That is why farmers use composted cow dung to ensure that it doesn’t include the harmful ammonia gas.\nFunctions of cow dung powder for agricultural applications\nComposted cow dung powder adds a lot of organic matter inside the soil that promotes crop growth. It improves the moisture-holding capacity from the soil. So, farmers should water their crops less often. Countries that have scarce water supply use cow dung powder fertilizers to make sure they don’t need to rely heavily on water. The roots of the crop use additional nutrients and water whenever required.\nAs well as increasing moisture-holding capacity, cow dung powder fertilizer also improves soil aeration. It breaks down the compacted soils and increases porosity, allowing the crops to grow quickly. The healthy bacteria within this sort of fertilizer converts nutrients to several accessible forms that release the main minerals slowly and steadily without burning the tender crop roots.\nComposting cow dung powder\nCow dung powder is not only employed in the fertilizers and also spread like a top dressing on crop soil. This nutrient-rich fertilizer is suitable with regards to producing fresh crops at the outset of the growing season.\nThe composting process starts by collecting cow dung and mixing it with relatively lighter materials, like hay or straw. Several of the other ingredients employed in the compost mix are ash, lime, garden debris like leaves and twigs, and vegetable matter. Most manufacturers produce mass-scale cow dung fertilizer. So, they need sufficient space to permit the pile to obtain enough air.\nMany farmers who require cow dung powder fertilizer in small quantities can make exactly the same in their home. Since it doesn’t require excessive heat, the farmer are able to keep the manure beneath a shade and keep twisting and turning it to provide air. Alternatively, manufacturers producing this fertilizer in big amounts use composting machines that mix the ingredients in equal quantities. They could control the temperature as well as twist and turn the manure periodically.\nThis is amongst the most inexpensive fertilizers in the agricultural sector. But, it will help to produce a high-quality crop, and that’s why most farmers apply it widely all over the world."
] | [
"<urn:uuid:35284dd3-78b0-46e9-9361-5a634b093c6c>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.organicfertprod.org/tag/powder-fertilizer-production/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00173.warc.gz"
] | [
"en"
] | [
0.9212324023246765
] | [
638
] | [
2.921875
] | [
3
] |
[
"|Prof. Sirpa Tenhunen. |\nPicture source: Univ. of Helsinki.\nCell phones speed up the practice of politics. In the past before cell phones it took one month to organize a general strike. Nowadays, using text messages it takes only ten minutes. The political power of the mobile phone is based on its invisibility. A revolt can be mobilized hidden from the ruling power. The ways for the state to fight back is to monitor citizens' mobile communication and, at times, even close down the supporting infrastructure.\nWatch the interview (in Finnish) here.\nRead the whole news article (in Finnish) here."
] | [
"<urn:uuid:825efccf-7ba3-4927-be51-c9131fda6cd4>"
] | [
"CC-MAIN-2017-26"
] | [
"http://mobiletech-gender-development.blogspot.com/2011/03/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00120.warc.gz"
] | [
"en"
] | [
0.9167357683181763
] | [
131
] | [
2.78125
] | [
3
] |
[
"Anaerobic respiration is a kind of respiration process which doesn’t require O2 molecule as electron acceptor or simply we can say that anaerobic respiration occurs in absence of Oxygen. Let’s discuss the anaerobic respiration examples briefly.\nAnaerobic respiration occurs mostly in prokaryotic cells and sometimes in eukaryotic cells also. Anaerobic respiration examples are –\n- Lactic acid production\n- Alcohol fermentation\n- Methanogenesis or Fermentation in methanogens\n- Propionic acid fermentation\nLactic acid production\nLactic acid production is an anaerobic respiration method in which oxygen is not required. In this process respiration begins with the glycolysis process, which means a glucose C6H12O6 molecule breaks and converts into the pyruvate. This reaction releases 2 molecules of ATP. After that the pyruvate breaks and converts into lactic acid C3H6O3 which is a three carbon molecule and releases 2 ATP molecules.\nC6H12O6 → C3H6O6 + energy (2ATP)\nThis process mainly occurs in eukaryotic cells specifically in muscle cells, when due to excessive working, the muscles cells lack oxygen supply. As in this process less amount of energy is released, weakness and shortness of breathing can be seen.\nAs lactic acid or lactose is produced in this process and stored , it causes sore muscles.\nLactic acid production from Wikimedia Commons\nAlcohol fermentation is another process in which oxygen is not required. Alcohol fermentation mostly occurs in some fungi species like Yeast (Saccharomyces cerevisiae). Same as aerobic respiration, glucose molecules undergo a glycolysis process and convert into pyruvate. After that the yeast converts the pyruvate into ethanol and releases energy. This is one of the Anaerobic respiration examples in which at the end carbon dioxide is released.\nC6H12O6 → C2H5OH + CO2 + energy (2ATP)\nIf we put yeast species and some glucose or carbohydrate substances together and bottled them for some time, the yeast converts into ethanol, an alcohol. That’s why this process is called the alcohol fermentation process.\nAnaerobic respiration examples from Wikipedia Commons\nTo know more read on Are Yeast Multicellular :Why,How And Detailed Insights And Facts\nMethanogenesis or Fermentation in methanogens\nMethanogens are prokaryotic organisms, undergo anaerobic respiration and produce an alcohol methanol from glucose. Methanogens oxidized cellulose from the plant body breaks it into methanol and releases energy molecules. In this process carbon dioxide is also produced just like the alcohol fermentation process. The difference is instead of ethanol it produces methanol. This methanol is poisonous in nature and even causes death.\nC6H12O6 → CH3OH + CO2 + energy\nPropionic acid fermentation\nIn some bacterias carbohydrate molecules break in the absence of Oxygen molecules and convert into acid molecules like propionic acid. This process is known as the propionic acid fermentation process.\nC12H22O11 → C3H6O2 + CO2 + energy\nThere are some bacterias like Propionibacterium shermanii in which the propionic acid fermentation process is found. During cheese production, this process is used widely. The released carbon dioxide causes bubbles in the cheeze.\nThese are some anaerobic respiration examples in which the oxygen molecule is not used as the electron acceptor. Instead of oxygen anaerobic organisms use components like nitrate (NO3-), fumarate (CH2O24-), sulfate (SO24-), or elemental sulfur (S) at the end of electron transport chain as the final electron acceptor. As these substances have less oxidising capacity and lower energy than oxygen, it releases less energy from the glucose molecule. Due to partial oxidation, Only 5% of the glucose breaks and releases energy.\nAll anaerobic respiration examples follow the first step of respiration, glycolysis to break the glucose into pyruvate.\n( Glucose) C6H12O6→ (Pyruvate) CH3COCOOH\nGlycolysis process from Wikimedia Commons\nAfter that it skips Krebs cycle and produces different organic by-products and releases energy. Carbon dioxide may or may not be produced in the final step of anaerobic respiration. In lactic acid fermentation carbon dioxide is not produced but in the alcohol fermentation process carbon dioxide is produced.\nThe anaerobic respiration occurs in lower groups of organisms like bacteria, fungi, etc. This process is a cellular respiration which takes place in the cytoplasm of the cell.\nAccording to some theory anaerobic respiration and fermentation both generate ATP in absence of Oxygen molecule but are not synonyms meaning they are different from each other. Fermentation can be extracellular but anaerobic respiration is always an intracellular process. In anaerobic respiration examples after glycolysis an electron potential or ion concentration gradient is created but in the fermentation process only substrate level phosphorylation is seen.\nTo know more read our article on Do Humans Have Animal Cells: Interesting FACTS\nIn anaerobic respiration examples which substances are used as the last electron acceptor molecule?\nElectron transport chain is the last step of the respiration process, when glucose breaks and energy is produced.\nIn the aerobic respiration process oxygen molecules are used as the last electron acceptor molecule. But in anaerobic respiration process, instead of oxygen different organic and inorganic substances are used as last electron acceptor such as nitrate (NO3–), fumarate (CH2O24-), sulfate (SO24–), or elemental sulfur (S).\nWhat are the chemicals produced in anaerobic respiration process?\nIn anaerobic respiration process, different inorganic or organic molecules are produced as by-products of reaction.\nIn the alcohol fermentation process Ethanol is produced. In lactic acid fermentation lactic acid or lactose is produced during reaction. Apart from these methanol, propionic acid, biogases, etc are also produced.\nAlong with these organic by-products, energy that is ATP molecules genareates. Carbon dioxide may or may not be produced.\nHow many ATP molecules are produced during anaerobic respiration process?\nIn anaerobic respiration process Two ATP molecules are produced per glucose molecule.\nHere we describe different anaerobic respiration examples respectively. We see how in absence of Oxygen molecule the cellular respiration happens. We also see in some theories how fermentation and anaerobic respiration differs from each other. Hope this article on anaerobic respiration examples will be helpful to you.\nTo know more read on Nucleotide Examples:Detailed Insights"
] | [
"<urn:uuid:ecd519c7-f956-489e-a113-6b41af5b0cdc>"
] | [
"CC-MAIN-2023-14"
] | [
"https://lambdageeks.com/anaerobic-respiration-examples/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00786.warc.gz"
] | [
"en"
] | [
0.8696757555007935
] | [
1470
] | [
3.828125
] | [
4
] |
[
"Sometimes researchers perceive planetary atmospheres as engines. Heat from the parent energy contains potential energy transforming into kinetic energy. This leads to the creation of winds and storms orbiting the planet.\nEarth's “engine” has become more efficient due to climate change. But higher efficiency should not be taken in a positive way. This can lead to dangerous cyclones, storms and hurricanes. Therefore, scientists consider the energy cycles of foreign worlds in order to understand what processes are taking place on Earth.\nIt seemed that in our conditions the efficiency of transformation of potential energy into kinetic energy increased over the past 35 years. Therefore, the number of storms has increased. Climatologists insist that the devastating storms pose the greatest danger because the planet continues to heat up. The energy cycle is now a method of diagnosing problems and tracking storm activity.\nFor a detailed review of issues, a team of NASA scientists used Cassini data on Saturn and Juno on Jupiter to study the atmospheric state. The most balanced situation is observed on Titan. But the massive storm of Saturn changed the principle of absorption of solar energy by the planet. In 1995, Edward Lorenz (invented the “butterfly effect”) explained how the energy transformation takes place. It is also known that this Lorentz cycle affects the climatic situation and the weather. Past studies were based on data for 10 years, which is not much to fix the impact on global warming and other changes.\nA new study collected data on wind and temperature fields for 1979-2013. It turned out that the total mechanical energy remained basically the same, but the kinetic energy grew.\nThis is important information that will directly affect climate change forecasting. But scientists have found some hot spots, where the growth trend is particularly strong. Most of them are located in Antarctica. The study provides a broad perspective for understanding the climate and atmospheric systems of any world."
] | [
"<urn:uuid:930a00e1-b9c0-4a29-9e2f-b9dab567b502>"
] | [
"CC-MAIN-2023-14"
] | [
"https://great-spacing.com/publication/69485/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00205.warc.gz"
] | [
"en"
] | [
0.9390057921409607
] | [
384
] | [
3.59375
] | [
4
] |
[
"An outbreak of a bacterial infection in Stephenson County has health officials on guard, urging residents to help slow the spread of Shigella.\nIn the last month, health officials report at least 41 Stephenson County residents have been diagnosed with Shigella, a bacterial infection that causes vomiting, diarrhea, fever and stomach pain.\nHealth officials say the number of cases is unusually high for the area and they cannot determine a source for the outbreak of Shigella.\n\"In Illinois there are about 600 cases of Shigella reported each year. So 41 in just one month is quite a lot for us,\" said Jeff Todd, Stephenson County Health Administrator.\nExperts say hand washing is the best way to stop the spread of Shigella. Todd says thorough hand washing involves 60 seconds of washing with water and soap.\nMost of the infected are school-aged children, which prompted the Freeport School District to send a letter to parents warning them of the outbreak.\n\"We don't want to be alarmist. We don't send letters every time there's a flu outbreak or a rash of colds but when so many people in our area and school district are affected we wanted to make parents aware. Especially since it's so easy to prevent,\" said Peter Flynn, Freeport School Superintendent.\nTodd says the symptoms of Shigella should go away in a few days but for some it could take several months to completely recover."
] | [
"<urn:uuid:a0bc1f13-3f59-41a1-9f5b-943144c99066>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.wifr.com/news/headlines/171722.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702730377/warc/CC-MAIN-20130516111210-00067-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9634196758270264
] | [
289
] | [
2.71875
] | [
3
] |
[
"Guitar School magazine (January 1992)\nBy Troy Stetina\nDuring the 16th century an elaborate system called musica ficta (falsified music) was created in which dissonances (notes that clash) and other \"crimes against the ear\" were avoided by altering the offending notes one half-step. The early church even referred to the extremely dissonant tritone interval as the 'diabolus in musica' (literally, the devil in music). The tritone's ugly turbulence was seen as the incarnation of evil, and represented the seething chaos lying beneath our mortal reality.\nBut times have changed. After more than four centuries of musical progress, these \"crimes against the ear\" sound fairly interesting to the modern ear. Today, dissonance is no longer relegated to the confines of Hades--it's an accepted musical tool, used to create harmonic tension. And since dissonance creates tension, it's not at all surprising that it's found at the core of today's most tense and aggressive music, thrash metal.\nDissonance is easy to hear. Figure 1, below, demonstrates a perfect consonance (notes that blend together well); and then, at the other end of the spectrum, a strong dissonance in this case, the tritone. Listen for its tell-tale unsettledness. Distortion will accentuate this aspect even more. Figure 2, below, shows all the intervals within an octave ('simple' intervals). I've indicated which ones are dissonances and which ones are consonances.\nFigures 1 and 2\nDissonances can reveal themselves in two different ways: harmonically or melodically. If dissonant notes ring together, it's called harmonic dissonance. That's what you heard in Figure 1. But if you play the notes in sequence, one after another, it creates a melodic dissonance. In this case, there isn't any turbulent clashing of notes. Instead, you hear an odd or disjointed-sounding leap between the notes. You'll likely find this device lurking within the more interesting riffs you meet.\nFigure 3, from \"All Things Repulsive,\" and Figure 4, from \"Bug Guts,\" are both excerpted from the Thrash Guitar Method to demonstrate each type of dissonance in action. An asterisk with an \"M\" or an \"H\" directly below it denotes a case of melodic or harmonic dissonance, respectively. Figure 3 abounds with that \"diabolus in musica,\" the diminished fifth. (E to Bb in this case.) Figure 4 uses both types of dissonance.\nThese examples should help put you on track to creating vicious riffs of your own. But of course we've just barely scratched the surface. Try mixing these dissonances with some ear-twisting chromatics, atonal ideas and a few unusual accents. You'll find these concepts covered in more detail in the Thrash Guitar Method. Good luck with your playing!\nFor more, see the Thrash Guitar Method.\nback to top of page"
] | [
"<urn:uuid:c4412090-d2e8-48d1-988f-cce36c714abe>"
] | [
"CC-MAIN-2017-26"
] | [
"http://stetina.com/lessons/incineration.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00255.warc.gz"
] | [
"en"
] | [
0.9475075006484985
] | [
631
] | [
2.9375
] | [
3
] |
[
"hyssop (hĭsˈəp) [key], aromatic, perennial, somewhat woody herb ( Hyssopus officinalis ) of the family Labiatae (mint family), native to the Old World but partially naturalized in North America. The plant has small, violet-blue or sometimes pink or white flowers. Although now grown chiefly for ornament, it has been used to flavor soups and salads, as a tea for chest ailments, and as a poultice for bruises; oil of hyssop has been added to liqueurs and cologne. The hyssop of the Scriptures (1 Kings 4.33; Ps. 51.7; John 19.29) may have been a similar plant or the name may have referred to different plants. Hyssop is used as a symbol of humility in religious painting. North American plants of the related genus Agastache are called giant hyssop and were used medicinally and as flavoring by the Native Americans. Hyssop is classified in the division Magnoliophyta, class Magnoliopsida, order Lamiales, family Labiatae.\nThe Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.\nMore on hyssop from Fact Monster:\nSee more Encyclopedia articles on: Plants"
] | [
"<urn:uuid:382efe9e-698c-489c-a110-5e2cff5c440c>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.factmonster.com/encyclopedia/science/hyssop.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051588/warc/CC-MAIN-20131204131731-00055-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9251554012298584
] | [
276
] | [
3.09375
] | [
3
] |
[
"Chronic Renal Failure\nmedical surgical, med surg, renal\nHi friends in this video, we're going to talk about chronic renal failure. And if you like this video, make sure to give it a thumbs up and subscribe below to my channel. I create new nursing content for pre-nursing students, nursing students and nurses, and we have new videos every week, but let's get into it.\nSo chronic renal failure. It's the end result of a gradual progressive loss of kidney function causes include chronic infections, vascular disease, such as hypertension, obstructive processes, such as renal, calculi, collagen diseases, such as systemic lupus, neuro nephrotoxic agents like different drugs and endocrine diseases such as diabetes or hyperparathyroid.\nIt's generally progressive and produces major changes in all of the body systems. And the final stage of renal dysfunction and stage renal disease is demonstrated by a glow meal filtration rate of 15% to 20% of normal or less and renal failure results. When the kidneys cannot remove the body's metabolic waste or perform regulatory functions.\nSo substances that are normally eliminated in the urine, accumulate in the body as a result of impaired renal excretion, affecting endocrine and metabolic functions, as well as fluid electrolyte and acid-base balance. Accumulation as renal function, declines the end products of protein metabolism, which are normally excluded in the urine accumulate in the blood adverse effects.\nWe'll see our uremia, which develops and adversely affects every system of the body. The disease tends to progress more rapidly and patients with significant amounts of protein or have elevated blood pressure, then those who do not. So the pathophysiology of chronic renal failure includes pathologic features such as fibrosis loss of renal cells, infiltration of renal tissues by monocytes or macro phases.\nWe can see. proteinurea hypoxia, extensive angiotensin to production, all contribute to the pathophysiology and an attempt to maintain the global filtration rate, the glomerular hyperfiltration which results in endothelial injury. you'll see proteinurea results from increased glomerular, permeability and increased capillary pressure.\nAnd hypoxia also contributes to disease progression angiotensin two increases glow meal, hypertension, which further damages the kidneys. So this is a nice chart overview of that path of physiology. You can see the hyperfiltration of the glomerular it's going to in crease, the glomerular permeability, which increases the filtration of proteins.\nAnd. Macromolecules, which leads to nefrotoxic inflammation or remodeling or protein, urea and dyslipidemia. Or I will see an increase in RAAS which will lead to nephrotoxic inflammation. And remodeling. So both of them lead to that. And once this happens, you'll see that Tubulointerstitial , fibrosis, and you'll see the decreased glomerular filtration rate, decreased urine output and systemic complications.\nSo predisposing factors for chronic renal failure include diabetes being aged sixty or older kidney disease present at birth, a family history of kidney disease, an autoimmune disorder, a bladder outlet obstruction. And there are differences when it comes to race as well. Precipitating factors. So occupational hazards such as overexposure to toxins and some medications.\nA sedentary lifestyle, which increases hypertension and atherosclerosis and a diet.\nSo clinical manifestations, we may see peripheral neuropathy. This is a disorder of the peripheral nervous system that is present in some patients they'll have like pins and needles in their fingers or their feet. Severe pain and discomfort. They may have restless leg syndrome and burning.\nThey may report burning feet can occur in the early stages and that's due to the peripheral neuropathy. So different complications of chronic renal failure include hyperkalemia due to decreased excretion, metabolic acidosis. And excessive intake such as diet medications, or different fluids pericarditis due to retention of uremic waste products and inadequate dialysis, hypertension due to sodium and water retention and the malfunction of the renin angiotensin aldosterone system anemia due to decrease Erythropoietin production, decreased red blood cell lifespan.\nBleeding in the gastrointestinal track from irritating toxins and ulcer formation and blood loss during hemo dialysis and also bone disease and metastatic and vascular calcifications due to retention of phosphorus, low sodium calcium levels, normal vitamin D metabolism and elevated aluminum levels.\nSo assessment and diagnostic findings. So the filtration rate in creatinine clearance decreases while serum creatine, which is a more sensitive indicator of renal function and bun levels increase. Sodium and water retention. Some patients retain sodium and water increasing the risk of edema heart failure and hypertension, acidosis metabolic acidosis occurs in end stage renal disease because the kidneys are unable to excrete increased loads of.\nAnd anemia and end stage renal disease cause of Erythropoietin and production decreases and profound anemia results, producing fatigue angina and shortness of breath.\nSo we can also look at the urine. So usually in the stage of olguria, we'll see 400 milliliters in 24 hours. Or urine may be absent, which is anuria. The color may be abnormally, cloudy, and may be caused by pus bacteria, fat, different particles, phosphates, or urates. It could be dirty and brown and have sediment such as red blood cells, hemoglobin myoglobin.\nSpecific gravity is usually less than 1.015. And if it's less than 1.010, it reflects severe renal damage and osmolality less than 350 is indicative of tubular damage. And you're in certain ratios. Usually one-to-one. Creatinine clearance may be significantly decreased less than 80 milliliters per minute in early failure, but less than 10 liters per minute in end stage renal disease sodium more than 40, because kidney is not able to reabsorb the sodium and protein high grade protein.\nUrea strongly indicates colonial damage when red blood cells and casts are also present.\nSo we can also look at the blood. We will usually see a bun or creating an elevated, usually in proportion, creatinine level of 12 suggests end stage renal disease. A bun of less than 25 is indicative of renal damage. If we look at a CBC the hemoglobin decreases because of anemia, usually less than seven or eight.\nRed blood cells, lifespan decreases because of Erythropoietin and deficiency. We can look at ABGs. The pH will be decreased metabolic acidosis if less than 7.2. This occurs because of the loss of the renal ability to excrete, hydrogen and ammonia, or end products of protein catabolism by carboning and P C O two.\nIs decreased serum. Sodium may be low if kidney wastes, sodium or normal reflecting dilution, state up hypernatremia and potassium may be elevated related to retention and cellular shifts in acidosis or tissue release red blood cell hemolysis and end stage renal disease. We can see ECG changes.\nIf potassium is 6.5 or higher potassium may also be decreased in patients on potassium sparing diuretics, or when patients are receiving dialysis, magnesium and phosphorus are usually elevated and calcium to phosphorus could be decreased.\nAll right. So assessment and diagnostic findings. So proteins, usually albumin is decreased. Serum levels may reflect protein loss via urine fluid shifts, decrease intake, or decreased synthesis because of the lack of essential amino acids serum osmolarity is usually higher than 285 K U B. X-rays demonstrates the size of the kidney ureters bladder in presence of obstruction or stones.\nRetrograde pyelogram outlines the abnormalities of the renal pelvis and the ureters renal arteriogram assesses, renal circulation, and identifies vascularity is masses. Avoiding cystourethrogram. She has bladder size reflects into ureters and retention. Renal ultrasound determines the kidney size and presence of masses, cysts obstructions in the upper urinary tract.\nA renal biopsy may be done endoscopically to examine tissue cells for histological diagnoses, renal and disc. Or an nephroscope is done to examine the renal pelvis and flush out calculi hematuria and remove selected tumors. And ECG may be abnormal reflecting electrolyte and acid-base amounts is, and we can also do x-rays of the.\nOr skull or spine enhanced reveal, any calcifications or demineralization resulting from electrolyte shifts?\nSorry. Okay, here we go. So medical management, the goal of. Management is to maintain kidney function or homeostasis as long as possible. So pharmacological therapy includes calcium and phosphorus binders, which will treat hyperphosphatemia and hypocalcemia. We can use antihypertensive and cardiovascular agents such as digoxin or dobutamine mean to manage hypertension.\nWe can use anti-seizure agents such as. Phenotyping or IV Ativan are used for seizures. erythropoietin used to treat anemia associated with end stage renal disease, nutritional therapy. So dietary interventions include carefully regulating the protein intake fluid intake to balance fluid loss, sodium intake to balance sodium loss and some restrictions on potassium.\nAlso dialysis is usually initiated. If the patient cannot maintain a reasonable lifestyle without a consecutive treatments.\nSo nursing assessment, we want to assess fluid intake and fluid status, assess nutritional dietary patterns, nutritional state, understanding of the cause of renal failure and its consequences and his treatment assessing. The patient and family's response to restrictions that because of treatments and the illness and assess for signs of hyperkalemia.\nThese are just some different nursing diagnoses that we could use with these patients. So excessive fluid volume related to decreased urine output, dietary, excess, and retention of sodium and water. Imbalanced nutrition, less than bodies requirements related to anorexia nausea, vomiting, dietary restrictions, and altered oral mucous membranes, activity, and tolerance related to fatigue, anemia, retention of waste products in dialysis procedures.\nAnd risk for situational low self-esteem related to dependency. Role change changes in body image and changes in sexual function. So planning and goals for these patients are to maintain an ideal body weight without excessive fluid maintenance of adequate nutritional intake participation in activity within tolerance and improved.\nSelf-esteem. Nursing priorities include maintaining homeostasis, preventing complications, providing information about the disease process and prognosis and treatment needs and support adjustments to lifestyle changes. So our nursing interventions can include assessing the fluid status and identifying potential sources of imbalance.\nImplemented dietary program to ensure proper nutritional intake within the limits of treatment regimen, promote a positive feeling by encouraging increased self-care and greater independence and promote intake of high biologic value, protein foods, such as eggs, dairy products and meats, and after scheduled of medications so that they are not given immediately before.\nAnd rest, encourage alternating activity with rest. So our evaluation of these interventions will include maintained ideal body weight without excessive fluid maintained, adequate nutritional intake participated in activity and within times and improved self-esteem. And again, these are just some examples because this is going to be based on how your individual patient responded to the interventions.\nAnd discharge in home care guidelines. So the patient should be taught how to check the vascular access device for patency and provide appropriate precautions, such as avoiding venipuncture and blood pressure measurements on the arm with the access device. So this is for a patient who has dialysis. If they have a vascular access device.\nThis is usually in their arm and we want to teach them how to care for it. So problems to report the patient and the family need to know what problems to report nausea, vomiting changes in usual urine output ammonia odor on breath, muscle weakness, diarrhea, abdominal cramps, a clotted, fistula, or graft and signs of infection.\nWe also want to provide follow-up exams and. Treatment is stressed to be patient and stresses to the patient and family because changing physical status and renal function and dialysis requirements are all things that need to be monitored and home care referrals. So referral to any home care, to help assess the patient in any of their changing statuses.\nAnd documentation guidelines. We want to make sure to document on existing conditions that contribute to and degree of fluid retention, I and O, and fluid balance results of lab tests, calorie intake, individual cultural, or religious restrictions and personal preferences, level of activity, plan of care, and teaching plan responses to interventions and teaching actions performed attainment of progress towards goals and outcomes.\nModifications to the plan of care and a longterm eats. All right. And that is the end of chronic renal failure. If you guys liked this video, make sure to subscribe and check out down below. I have a lot of free resources on my website, as well as an NCLEX study guide. I have a free pharmacology notebook.\nI have free cardiac study guides, a bunch of stuff on there. So go down and make sure to check that out as well. Then I'll see you guys next time. Bye."
] | [
"<urn:uuid:92840305-6129-4627-84dc-bbef733761cd>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.blossomwithjessica.com/medicalsurgical/chronic-renal-failure"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00584.warc.gz"
] | [
"en"
] | [
0.9217408299446106
] | [
2740
] | [
2.9375
] | [
3
] |
[
"|A) 2||B) 3|\n|C) 6||D) Cannot be determined|\nWe shall assume the dice in fig. (ii) to be rotated so that the 5 dots appear at the same position as in fig. (i) i.e. on RHS face (i.e. on face II as per activity 1) and 1 dot appears at the same position as in fig; (i) i.e. on Front face (i.e. on face I). Then, from the, two figures, 2 dots appear on the top face (i.e. on face V) and 4 dots appear on the Bottom face (i.e. on face VI).\nSince, these two faces are opposite to each other, therefore, two dots are contained on the face opposite to that containing four dots."
] | [
"<urn:uuid:6938a74a-9295-49da-be91-b3f554217516>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.sawaal.com/cubes-and-dice-questions-and-answers/observe-the-dots-on-a-dice-one-to-six-dots-in-the-following-figures-how-many-dots-are-contained-on-t_5279"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00356.warc.gz"
] | [
"en"
] | [
0.880607545375824
] | [
174
] | [
3.1875
] | [
3
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.