text
sequencelengths 1
1
| id
sequencelengths 1
1
| dump
sequencelengths 1
1
| url
sequencelengths 1
1
| file_path
sequencelengths 1
1
| language
sequencelengths 1
1
| language_score
sequencelengths 1
1
| token_count
sequencelengths 1
1
| score
sequencelengths 1
1
| int_score
sequencelengths 1
1
|
---|---|---|---|---|---|---|---|---|---|
[
"To see a World in a Grain of Sand\nHeaven in a Wild Flower,\nHold Infinity in the palm of your hand\nAnd Eternity in an hour.\nThe individuation process is a term created by\nthe famous psychologist Carl Gustav Jung to describe the process of\nbecoming aware of oneself, of one’s make-up, and the way to discover\none’s true, inner self. Although the structure is basic and simple, the\ncontents require a much deeper understanding.\nFor as long as mankind\nhas existed, there were always people who asked themselves that most\nintriguing question: \"Who am I\". There is no simple answer, but Jung’s\nindividuation process provides us with some clear guidelines. First you\nneed to understand a couple of terms, frequently used in psychology.\nThe ego. We are all familiar with the ego, or are we? What is the ego?\nWhen we say \"I\" or \"me\", what are we pointing to? The ego is the center\nof consciousness, but it is not what you are, as most people think. It\nis rather a function that allows you to distinguish yourself from\nothers. It is a structure that orders your psychological qualities, so\nyou can make sense of yourself and your actions. It gives you a sense of\nuniqueness, but know that we all have that in common.\nWhat we also\nhave in common is a conscious and an unconscious. With the conscious we\nare able to experience everyday life. The unconscious is a part of\nourselves that kind of remains in the background, but is in no way\ninactive or inert. The unconscious is composed of hidden aspects of\nourselves that continue to work on the conscious and thus on our\neveryday life, although we are not mostly not aware of it. The\nunconscious tries to bring man back into balance. In life we are not\nalways able to do or be what we would like. Thus, the unconscious will\ninfluence our behavior and actions in a way that will compensate. These\nunconscious tendencies can be stronger than our conscious, and can even\ngo against our will. Thus we tell things in a flare of anger, of which\nwe will be very sorry afterwards.\nJung divided the unconscious in two\nparts: the personal unconscious and the collective unconscious. The\npersonal conscious only belongs to yourself. It is the collection of\nsubliminal perceptions, repressed or forgotten memories, wishes, and\nemotions in an individual. The memories of the personal unconscious can\nbe evoked, although they cannot be totally controlled by will. Sometimes\nan accidental association will bring them to light. Sometimes they\nappear in dreams and fantasies. Hypnosis can also reveal them.\nAnother important term is the Self. The Self is often confused with the\nego. As the ego is only a temporal structure that gives us an identity\nin this life, the Self is from a higher order than the ego. The Self is\nthat what we are in essence. In psychological terms, it encompasses the\nconscious, the unconscious, and the ego. The Self is the central\narchetype in the collective unconscious, like the Sun is the center of\nthe solar system. The Self is the archetype of order, organization and\nunity. It unifies the personality. The Self is our goal of life, because\nit is the most complete expression of the highest unity that we call\nThe collective unconscious is an important\nconcept in the psychology of Carl Gustav Jung. The collective\nunconscious is shared by us all. This means that it is present in each\nof us, a vast reservoir of the archetypes of the whole of humanity. It\nis accessible to everyone. In general, the collective unconscious\nconsists of characteristics that many people have in common and which\neach of us inherit at birth. Fear and happiness, for example are\ninherited human characteristics. They arise without conscious motives\nbut simply arise from inner necessity.\nThese archetypes are the\nresult of the many experiences of life that repeat themselves: sunrise\nand sunset, the seasons, life and death, food, danger, and so on. They\nare symbols for the experiences of mankind.\nThe content of the\narchetype is basically unconscious. It undergoes a transformation when\nit becomes conscious or when it is being perceived. The way it is\ntransformed depends on the state of consciousness of the individual in\nwhich the archetype has arisen.\nAn archetype is experienced as image\nand as emotion. It is especially recognizable in such typical and\nimportant human situations as birth and death, adolescence, extreme fear\nor a fearful experience. During such life phases and experiences\narchetypes will often appear clearly in dreams.\nThe form of the\narchetype is only partially determined. Its content is a primal image\nthat can only be given form when it is has become conscious, and thus\nhas become filled with material from the conscious.\nwhen becoming conscious, will shape themselves, for example in myths and\nfairy tales, depending upon the cultural background of the people. A\nfairy in Europe, for example will be dressed in medieval or renaissance\nclothing, while in the East it will wear ancient Eastern clothing and be\nmore djinn like of appearance. The underlying content, however, remains\nthe same wherever you go. Archetypes are like a frame. The frame remains\nthe same, but the image that appears inside the frame will be dependent\nupon the circumstances.\nArchetypes cannot be brushed aside. They will\nalways manifest. When a society undergoes a change its manifestations of\nthe archetypes will change too. They get another form, another image in\nArchetypes by themselves are neutral, without value\njudgments attached to them, but they can be interpreted in a positive,\nnegative or neutral way.\nIndividuation means that one becomes a person,\nan individual, a totally integrated personality. It is a process of self\nrealization during which one integrates those contents of the psyche\nthat have the ability to become conscious. It is a search for totality.\nIt is an experience that could be formulated as the discovery of the\ndivine in yourself, or the discovery of the totality of your Self. This\ndoes not always happen without pain, but it is necessary to accept many\nthings that normally we would shy away from. Once a person has accepted\nthe contents of his unconsciousness and has reached the goal of the\nindividuation process, he is conscious of his relationships with\neverything that lives, with the entire cosmos.\nIndividuation is a\nnatural, inherent process in man. It cannot be stimulated by something\nexternal, but it grows from the inside. Just as the body can become\ndeformed or sick by lack of nutrition or movement, the personality can\nbe deformed by lack of experience or education. Jung stresses that our\nmodern world does not give enough opportunity to experience the\narchetype of the Shadow. When a child expresses his animal instincts,\ngenerally it is punished by its parents. Punishment does not lead to the\nextinction of the Shadow (repressed tendencies, more about this later\non), which is impossible, but it leads to the suppression of this\narchetype. The Shadow retreats to an unconscious state, primitive and\nundifferentiated. Then, when the Shadow breaks through the repressive\nbarrier, and this does happen once in a while, it manifests itself in a\nsinister, pathological way.\nThe first step of integration is individuation\nof all aspects of the personality, which is called the individuation\nThere is a second phase that Jung called the transcendental\nfunction. This function has the capacity to unify the opposite\ntendencies of the personality. The goal of transcendence is the\nrealization of all aspects of the personality as they were originally\nconcealed in the one’s center, and the development of the potential\nunity. The transcendence is the means to realize the unity of the\narchetype of the Self.\nThe individuation process begins with becoming\nconscious of the Persona, the mask we take on in our every day life.\nAfter this we become conscious of the Shadow, the repressed\ncharacteristics of the ego. Then we become conscious of the Anima, the\ninner woman in each man, or the Animus, the inner man in each woman.\nThen the image of the old wise man, or the old wise mother appears,\nafter which the experience of the Self happens.\nThese phases are not\nnecessarily chronological in order or separated from each other. They\ncan overlap each other or run parallel.\nThe Persona is the mask we all wear, a mask that\npretends individuality. It makes us believe that one is a certain\nindividual, but it nothing else than a well played role. The persona is\na compromise one creates between himself and the community about how one\nappears to be. One adopts a name, a title, an occupation, and identifies\noneself with this or that. One thinks that one is a businessman, a good\nfather or a misfit, but all this are masks, ways we would like to be or\nappear to other people and does not always reflect who we really are.\nThe Persona is a complicated system for connecting the individual\nconsciousness with society. One could call it a mask that makes an\nimpression on other people, but also hides the true nature of the\nperson. It partly results from the demands of a society that one has to\nplay the role that has been ascribed to him. In your profession you need\nto fulfill the demands of that profession as well as possible. A society\ndemands this as a sort of security measure. From a shoemaker is expected\nthat he repairs shoes to the best of his abilities, not that he is a\npoet. It is not even wanted that he is a poet, because then society\nthinks that he is not totally reliable as a shoemaker. In academic\ncircles, a similar person would be regarded as a dilettante, in politics\nhe would be considered as unreliable, in the religious area he would\nbecome a free-thinker. As soon as one deviates from his role, he becomes\na suspicious person, despite the fact that he might still be an\nexcellent worker in his profession. Therefore, if one wants to make it\nin society, one can only devote himself to one single thing. Of course,\nfew people are able to do this, as we all have more than one interest.\nTo accommodate to the wishes of society, we create a mask, a Persona.\nWhat is behind that mask we call ‘privacy’.\nThis split in our\nbehavior is not without consequences. If we neglect the development of\nthe Persona, then people might find us insulting or they make our lives\ndifficult, because they expect us to behave in the way society demands.\nAt the other side, there is danger of identifying too much with the role\nthat one is trying to fulfill.\nThe Shadow represents unknown or little known\ncharacteristics of the ego. When one tries to see his Shadow, he becomes\nconscious, and often ashamed of, the characteristics and impulses that\nhe denies in himself but sees clearly in other people: for example:\negotism, spiritual laziness, unreal fantasies, intrigues, indifference,\ncowardliness, greed, and all those little things of which we say \"Oh, it\ndoesn’t matter. Nobody will notice, and besides other people are doing\nThe Shadow is the inferior being in all of us, it wants to\ndo all those things that we do not allow ourselves to do, or that we\ndon’t want to be. It is the Mr. Hyde in relation to Mr. Jekyll.\nShadow is not only about not doing something, but also about impulsive\nand ill considered deeds. Before you have time to think about it, a\nnasty remarks slips out, leaving you confronted with the result of\nsomething that you didn’t really intended.\nThe Shadow is all those\nuncivilized desires and emotions that are incompatible with the norms of\nsociety and with our ideal personality. It is all we are ashamed of,\nthat we do not wish to be.\nWhen a person joins other people, he\nautomatically feels the need to behave as they do in order to be\naccepted. Thus, he suppresses more of his tendencies, and thus makes his\nShadow bigger. The Shadow can also be a collective phenomenon in regards\nto the whole of humanity, like the devil or the witch.\nWhile it is\nnecessary to have a certain degree of suppression of one’s\ncharacteristics in regards to one’s role in society, the Shadow,\nremaining the unconscious, will increase in strength. When a moment\narises that the Shadow must appear, it can be so powerful and dangerous\nthat it can overwhelm the personality. It shows, for example, when one\nsuddenly gets very angry. It certainly is true with the collective\nShadow, when a mass of people is protesting and apparently innocent\npeople turn violent.\nIn dreams the Shadow appears as a person of the\nsame sex as the dreamer. The Shadow does not have to be an opponent. As\nit is a part of ourselves we need to take it, give it love and\ncompassion, control it, guide it. The Shadow will only become hostile\nwhen it is not understood or is neglected.\n\"There is in the unconscious of each man an\ninherent image of woman who helps him to understand her being.\"\nanima is the personification of all female psychological tendencies in\nthe psyche of a man, including feelings, moods, intuition, receptivity\nfor the irrational, the ability for personal love, a feel for nature,\nand the man's attitude toward the unconscious.\nThis image becomes\nconscious by real contacts with women, especially the first woman he\nencounters in his life. Normally this first woman is his mother, who is\nthe most powerful in shaping him. There are men who have never been able\nto free themselves from her fascinating power. A man's experience of his\nmother is of course subjective. How she behaves is less important than\nhis experience of how she behaves. The image he builds is not an exact\nrepresentation of how she really is, but it is colored and shaped by his\ninherent ability to produce an image of her, that is, his anima.\nman has the feeling that his mother has had a negative influence on him,\nthen the anima will often be expressed with irritating, depressive\nmoods, insecurity, a feeling of being unsafe, and touchiness. This\nnegative anima can be expressed in nasty, effeminate remarks, with which\nhe demolishes everything possible. Another anima trick is\npseudo-intellectual dialogs which prevents a man from feeling life\nclosely and coming to real decisions. He thinks so much about life that\nhe cannot live, and he losses all spontaneity and the flow of life.\nWithout a healthy anima, a man becomes effeminate, or becomes the prey\nof women, and he is not capable of handling the difficulties of life.\nSuch men can be very sentimental or touchy.\nWhen he is grown up his\nimage of the anima is projected onto the women that attract him. It is\nthen that a lot of misunderstandings arise, as most men are not aware\nthat their projection does not correspond with who the woman is in\nreality. This is the cause of a lot of strange love affairs and\ndivorces. Unfortunately, this projection does not happen in a rational\nway. It is not that a man is actively projecting, but that the\nprojection happens to him automatically.\nBecause the anima is an\narchetype, she has characteristics that continue to appear throughout\nthe ages. She has a quality of eternity. Often she looks young, although\nshe has the feeling that she already has years of experience. She is\nwise but not overpowering. She often has the feeling of being special,\nor having a secret knowledge. She is often connected to the earth or\nwater and can have great power. She has both a light and a dark aspect.\nShe can be the pure, good, noble figure, almost a goddess, but she can\nalso be a prostitute, a seductress or a witch. Especially in children’s\ndreams these opposite aspects are pronounced.\nThe dark aspect will\nmost likely appear when a man has suppressed or underestimated his\nfemale nature, treating women with contempt or carelessness.\nanima can also appear in the form a fey or an elf and lure men away from\ntheir work or home, like the sirens in ancient times. In mythology and\nliterature she continues to appear as a goddess and ‘femme fatale’.\nIn the life of men the anima expresses herself not only in the\nprojection to women, but also in his creative activities, in his\nfantasies, his moods, premonitions, and emotional explosions. An old\nChinese text says that when a man wakes up in the morning with a heavy\nor bad mood, it is his soul, or anima, that is responsible for this. She\ndisturbs his concentration by whispering absurd ideas and spoils his day\nby supplying him with a vague feeling that something is not all right,\nor she wanders through his dreams with seductive visions.\nand negative as just two sides of a coin. In essence the anima is a\nguide to the psychological development of a man. Each time when man’s\nlogical mind is not able to recognize or understand unconscious\ncontents, his anima will help him to dig them out. His anima helps him\nto tune himself to the correct inner values and thereby helping him to\nopen the door to his inner world. Thus the anima takes the role of guide\nand mediator in his inner world. Then man has to take serious those\nfeelings, moods, expectations and fantasies sent by his anima, and fix\nthem in one form or another, like writing, painting, sculpting. When he\nis working on this with patience then his unconscious contents will well\nup and connect with earlier material. Whatever results from it has to be\nexamined both intellectually as well as with his feelings. It is\nimportant to consider it is not just ‘fantasy’, but that is very real.\nThe animus in women is the counterpart of the\nanima in men. Like the anima, the animus has three roots: the collective\nimage of a man that a woman acquires, her own experiences with men in\nher life, and the latent male principle in herself.\nThe animus also\nhas good and bad aspects. In contrast with the anima in men which\nappears most often in the form of erotic fantasies or moods, the animus\nhas a stronger tendency to appear in the form of ‘sacred’ convictions.\nThis male part in women is apparent when she lectures with a loud,\nobtrusive, male voice, or by unreasonable, emotional scenes. Even in a\nwoman who at the outside is very feminine, the anima can be a hard,\nunforgiving power. That woman can suddenly become stubborn, cold and\nTypical for such women is the endless\nrepetition of thoughts like: \"The only thing in the world I want is\nlove, but he doesn’t love me.\" Or \"In this situation there are only two\npossibilities, and both are as bad\". The animus never believes in\nexceptions. In general one cannot contradict an animus, because usually\nit is right, but at the same time it doesn’t quite fit the individual\nsituation. It is mostly only a reasoning, an opinion. It looks right,\nbut is beside the point.\nJust as the anima of a man is formed by his\nexperience of his mother, so the animus of a woman is formed through\nhers of her father. The father gives her indisputable ‘true’ convictions\nthat never include the personal reality of the daughter herself.\nhis negative aspect, the animus is personified by a cocoon of dreamy\nthoughts, filled with desires and judgments of ‘how things must be’,\nexcluding the reality of her own life. In his positive aspect, he can be\nvery valuable aid in building a bridge to the Self by his creative\nThe animus often appears (especially in dreams) as a group\nof men, this shows that the animus personifies a collective element\nrather than a personal element. Because of the collective aspect, women\nusually in reference to \"they’ or ‘everybody’ include ‘always’, should’\nThe animus is a kind of a collection of fathers and\nsimilar authorities, who pass an intellectualized, indisputable\njudgment. It is mostly formed from words and opinions picked up from\nchildhood on and later brought together into a canon of half-truths, a\ntreasure chest of preconceptions. They are justified by \"It is always\ndone like that\" or \"Everybody is saying that it like this\". This\ncritical judgment can sometimes act against her self resulting in an\ninferiority complex limiting her self-initiative. In other situations\nshe can turn against people in a completely destructive way. She will\ncriticize her neighbors, demolish the reputation of strangers without\nany reasonable explanation, or she makes belittling remarks to her\nfamily members or people with whom she works with the opinion that \"it\nis good for them\", or \"I like to call things by their name\", or \"I just\ndo not want to spoil them\".\nAn intelligent and developed woman is\njust as susceptible to the negative aspects of the animus as less\ndeveloped one. A less developed woman will quote a newspaper instead of\nthe state or a university. If her opinion is being questioned she will\nbecome quarrelsome or dogmatic. This side of a woman craves for power.\nShe can become aggressive, dominating and unreasonable.\nthis aspect of the animus it is very difficult for a woman to think in a\nnon-prejudiced way. She always has to be aware of that inner voice that\nconstantly tells her \"that it needs to be this way\", or \"they should do\nit this way\".\nThe positive side of the animus is that when a woman\nneeds the courage and the aggressively he will be there to support her.\nWhen a woman realizes that her opinions are based on generalities and\nauthorities, then the animus can help her to look for knowledge and\nof Anima and Animus\nThe way anima and animus function can be made\nconscious, but they are themselves factors that are transcendent to the\nconscious, and thus to perception and will. They remain autonomous and\none needs to keep an eye on them.\nAnima and animus are mediators\nbetween the conscious and the unconscious psyche. They can be understood\nwhen they appear, personified, in fantasies, dreams, visions.\nThe Old Wise\nAfter the anima and animus, the archetypes of\nthe old wise man and the great mother arise, respectively in man and\nThe old wise man appears in the form of king, hero,\nmedicine man, savior, magician, saint, ruler over man and spirits, God's\nclosest friend and so on. This archetype is a real danger for the\npersonality, because once it has been aroused, a man can easily believe\nthat he possesses ‘mana’, real magical power, and wisdom. He who is\npossessed by this archetype believes he is gifted with great (maybe\nesoteric) wisdom, prophetic gifts, the ability to heal and so on. Such a\nman can gather followers, as he has entered the unconscious way further\nthan anybody else.\nThe archetype has a fascinating power,\nintuitively felt by people and not easily resisted. They are fascinated\nby what he is saying, but after analysis it is often not intelligent.\nThe power of the old wise man can be destructive as it forces a man to\nact above his power and capacity. He does not posses the wisdom he\nclaims. In reality it is the voice of the unconscious that should be\nsubjected to criticism and analysis.\nIn a woman the archetype of the great mother\nacts in a similar way to the old wise man in a man. Any woman possessed\nby this archetype, believes that she is gifted with an unlimited\ncapacity to love and to understand, to help and to protect, and she will\nexhaust herself in service to others. The archetype can be destructive\nwhen the woman is fixated on the belief that anybody within her sphere\nof influence are ‘her children\" and therefore they are helpless or\ndependent on her.\nof the Self\nThe process of individuation is not easy for\nWestern man because he has difficulty with the concept of paradoxes.\nNevertheless it is necessary to accept both the superior and the\ninferior, the rational and the irrational, the order and the chaos,\nlight and darkness, yin and yang.\nThe Self, according to Jung, is not\na kind of universal consciousness. It is rather an awareness of our\nunique nature and our intimate connection with all life. This life is\nnot only human but also animal, with plants and minerals, and even the\nentire cosmos. It gives us a sense of ‘unity’ and acceptance of life as\nit is, and not as we might think we want it to be.\nThe Self is\nsymbolized in the form a child, Christ, Buddha, and so on. In dreams it\ncan sprout forth from an animal or an egg. The hermaphrodite, an often\nused alchemical image, is another symbol, it joins the opposites of male\nand female. Other images are the difficult to obtain treasure, a jewel,\na flower, a golden egg or golden ball, a chalice like the Grail, and all\nfourfold images like mandalas.\nImportance of the\nJung thought that that heritage can play a role\nin the balance of a personality. Man can have inherent extrovert or\nintrovert tendencies, or he can be a rather emotional type instead of an\nintellectual, and his anima can be strong or weak.\nThe other major\ncomponent in the development of a personality is the environment. The\nenvironment in which one grows up or lives, can deform, stimulate, or\nstabilize one’s development. The environment can interfere with the\ngrowth of the personality by taking away the necessary stimuli or by\nmaking inappropriate contacts.\nParents play an extremely important\nrole in the development of the character of the child. They are\nresponsible for the mistakes of the child and for stimulating his good\ntendencies. During its first years, the child does not have its own\nidentity. His psyche is a reflection of the psyche of his parents. Every\npsychic disorder of the parents is reflected in the child. When the\nchild goes to school it starts to develop its own individuality. The\ninfluence of its parents can still be strong if they are overprotective,\nmake decisions that the child should have made, and prevent the child\nfrom having sufficient experiences. Under these circumstances the\nindividuation of the child is stunned.\nThe individuation process is\nalso limited by parents who try to impose their own psychic tendencies\nonto the child, or when one of the parents is seeking to compensate for\nhis/her own shortcomings through the child.\nJung was convinced that\nthe educators have a much stronger influence on the individuation of a\nchild than the parents. The educators should bring the unconscious in\nthe student into the conscious. They could expand the conscious of\nstudents by providing him with a multitude of experiences. Educators are\nin a position to discover imbalances in the child and to help it to\novercome weaknesses in it's character. A child who is an overly\ndeveloped intellectual type could be stimulated to come into contact\nwith his feelings. An introvert student could be stimulated to show his\nextrovert side. However, the most important task of educators is the\nrecognition of the individuality of each student and the promotion of a\nbalanced development of individuality."
] | [
"<urn:uuid:cc1c4794-3f31-4461-93b3-07c493005e1c>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.soul-guidance.com/houseofthesun/individuationprocess.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00186.warc.gz"
] | [
"en"
] | [
0.9555113911628723
] | [
6048
] | [
2.828125
] | [
3
] |
[
"Giotto di Bondone (1266? – 1337) was an early Italian Renaissance Painter and Architect from Florence. Giotto made a radical break from the Byzantine (abstract – anti-naturalistic) style and brought more life to art. Giotto primarily painted Christian themes depicted in cycles and is best known for his frescos in various Chapels (Arene Chapel, Florence Cathedral, Assisi, Scrovegni). Our pattern set collection features many of his more familiar works including the Ognissanti Madonna, The Mourning of Christ, The Marriage at Cana, The Mourning of St. Francis, Crucifixion and Madonna and Child."
] | [
"<urn:uuid:9e87cb61-192b-4415-9edf-d34abe1bc178>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.segplaypc.com/pattern-set?set=GDB"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00777.warc.gz"
] | [
"en"
] | [
0.9323235154151917
] | [
136
] | [
2.609375
] | [
3
] |
[
"The flashcards below were created by user\non FreezingBlue Flashcards.\nDescribe 4 ways T cell receptors are similar to immunoglobulins.\n- (1) TCRs have a similar overall structure, containing an antigen binding site, 2 variable domains and 2 constant domains.\n- (2) Both are generated via somatic recombination of sets of gene segments.\n- (3)The variable region of the TCR conatains 3 complimentarity-determining regions encoded by Valpha and Vbeta (6 in total), analogous to the the Vh and Hl domains.\n- (4) Diversity is generated by the same means (combination of gene segments, junctional diversity due to P and N nucleotides and combination of 2 different chains)\nDescribe 5 ways in which TCRs are different than immunoglobulins.\n- 1) TCRs have only 1 antigen binding site, while Igs have at least 2.\n- 2) TCRs are never secreted\n- 3) TCRs are generated in the thymus (instead of bone marrow)\n- 4) TCRs have no effector function, and it does not undergo isotype switching,\n- 5) TCRs do not undergo somatic hypermutation\nCompare the organization of T-cell receptor alpha and beta genes with the organization of immunoglobulin\nheavy-chain and light-chain genes.\nThe alpha locus is like the Ig light chain locus in that both contain V and J gene segments and no D segments. The TCR beta locus resembles the Ig heavy-chain locus in that both contain V, D, and J gene segments.\nT-cell receptors do not undergo isotype switching. Why is this?\nT-cell receptors are not made in a secreted form and their constant regions do not contribute to T-cell effector function. Therefore there is no need for isotype switching in T-cells.\nThe role of CD3 proteins and Delta chain on the surface of the cell is to\na. transduce signals to the interior of the T-cell\nb. bind to antigen associated with MHC molecules\nc. bind to MHC molecules\nd. bind CD4 or CD8 molecules\ne. facilitate antigen processing of antigens that bind to the surface of T cells\na (they also help the TCR bind to the cell membrane)\nWhich of the following accurately completes this statement? The function of _______ T cells is to make contact with _______ and __________.\na. CD8; virus-infected cells; kill virus infected cells\nb. CD8; B cells; stimulate B cells to differentiate into plasma cells\nc. CD4; macrophages; enhance microbicidal powers of macrophages\nd. CD4; B cells stimulate B cells to differentiate into plasma cells\ne. All of the above\na, c, d\nThe immunological consequence of severe combined immunodeficiency dz (SCID) caused by a genetic defect in either RAG gene is\na. lack of somatic recombination in T-cell receptor and Ig gene loci\nb. lack of somatic recombination in T-cell receptor loci\nc. lack of somatic recombination in Ig loci\nd. lack of somatic hypermuation in T-cell receptor and Ig loci\ne. lack of somatic hypermutation in T-cell receptor loci\n1. Describe the structure of an MHC I molecule, identifying the different polypeptide chains and domains.\n2. Which domains or parts of domains participate in the following: antigen binding; binding the T-cell receptor.\n3. Which domains are the most polymorphic?\nthe complete MHC I molecule is a heterodimer made up of one alpha chain and a smaller chain called Beta2 microglobulin. The alpha chain consists of 3 extracellular domains (alpha1,2,3), a transmembrane region and a cytoplasmic region. The polymorphic class I molecules are HLA-A, HLA-B, and HLA-C. The antigen binding site is encoded by the alpha1 and alpha2 domains. The alpha3 domains binds the coreceptor of CD8.\nDescribe the structure of an MHC II molecule, identifying the different polypeptide chains and domains. Which domains participate in antigen binding and binding the TCR? and Which domains are the most polymorphic?\nMHC II are heterodimers made up of alpha and beta chains. The overall molecule is similar to MHC I, but the three polymorphic regions in MHC II are HLA-DP, HLA-DQ, and HLA-DR. Antigen binds to the peptide-binding groove formed by the alpha1 and beta1 domains. The beta2 domain binds the TCR CD4.\nAmino Acid variation among MHC class II allotypes that present antigens to CD4 T-cells is concentrated\na. where MHC contacts the co-receptors CD4 or CD8\nb. in the Beta chain, because the alpha chain is monomorphic\nc. where the MHC molecule contacts peptide and the T-cell receptor\nd. in the alpha chain, because the beta chain is monomorphic\ne. throughout both alpha and beta chains in all domains\nWhat is (a) antigen processing, (b) antigen presentation? and (c) why are these processes required before T-cells can be activated?\n- a) antigen processing: the intracellular breakdown of pathogen-derived proteins into peptide fragments that are of the appropriate size and specificity required to bind MHC molecules.\n- b) antigen presentation: the assembly of peptides with MHC molecules and the display of these complexes on the surface of antigen-presenting cells.\n- c) Antigen processing and presentation must occur for T cells to be activated because T-cell receptors cannot bind to intact protein, only peptides, and TCRs do not bind antigen directly, but rather must recognize antigen bound to MHC molecules on the surface of antigen presenting cells.\nDescribe in chronological order the steps of the endogenous antigen-processing pathway for intracellular (cytosolic) pathogens.\nProteins from pathogens growing in the cytosol are broken down into small peptide fragments by proteasomes. The peptides are transported into the lumen of the ER using TAP (heterodimer of TAP1 and TAP2). MHC I is already in the ER and binds to peptides that fit the peptide cleft. MHC I alpha-chains are bound to to the chaperone calnexin until B2-microglobulin binds, and then bind the chaperones calreticulin and apasin until the peptide binds. Tapsin binds to TAP1, positioning the MHC I molecule near the peptide source. MHC class I molecules bound to peptide dissociate from the chaperone molecules and progress to the Golgi apparatus for completion of glycosylation and transport to the cell surface in membrane-bound vesicles.\nStructure of a T cell\n- Either alpha/beta or gamma/delta heterodimers\n- Beta/delta: VDJ transcribed first, temporarily binds fake alpha/gamma to stabilize on the surface\n- Alpha/gamma: VJ\n- CD3 complex homodimer made from one of 3 chains - gamma, delta or epsilon.\n- Antigen binding distorts T cell structure\n- Distortion activates CD3 intracellular signalling\n- CD4: binds MHC class II (2 x 4 = 8) -- effected by HIV.\n- CD8: binds MHC class I (1 x 8 = 8) -- can exist as hetero or homodimer.\nLocation of T cells in Thymus\n- Cortex: contains immature T cells\n- Medulla: contains mature T cells\nT cell maturation\n- TCR gene rearrangement: Gamma/delta first, then alpha/beta (CD3 is stimulated spontaneously as the complex comes together, helps it anchor on cell membrane)\n- Double-positive: both CD4 and CD8 (random decision process depending on who binds first)\n- Positive selection: T-cells avoid programmed death by binding MHC\n- Negative selection: T-cells killed when they bind too tightly to self MHC.\nDoes the following describe class I or class II MHC?\nHLA-A,B,C: expressed codominantly (6 different class __ chains expressed on almost every cell).\nComposed of MHC encoded alpha unit and non-MHC encoded B2-microglobulin.\n3 alpha regions: first 2 polymorphic and 3rd conservative for B2-microglobulin and CD8 binding.\nPeptide cleft: fits 9 AA peptide generated by proteasome, first 2 regions are very polymorphic among a population, Tertiary complex req. Alpha unit, B2-microglobulin and peptide to be expressed, TAP: pumps cytoplasmic proteins into ER where MHC class __ is wating.\nPeptide loading occurs in ER\nMHC class I (endogenous)\nDoes the following describe a class I or class II MHC?\nAPC displays exogenous proteins\nPresented by macrophages (phagocytic), B cells (efficient, low antigen levels req. for response) and dendritic cells (migratory).\nHeterodimer of alpha and beta chain.\nPeptide cleft: fits 9-15 AA peptide, normally displays recycled self antigen.\nInvariant chain(Ii): plugs up MHC class __ until fused w/ peptide containing vesicle\nHLA-DM removes invariant chain (the CLIP portion in the peptide cleft)\nPeptide loading occurs in specialized vesicular compartments.\nMHC class II (exogenous)\nTCR antigen presentation\n- TCRs only recognize peptide antigens (Ig recognizes anything)\n- Antigen must be unfolded\n- MHC restriction: T-cells only recognize self MHC molecules (why skin grafts don't are rejected)\n- Both class I and II are most often presenting self-antigen in their clefts.\nEndocytosis of an extracellular foreign protein antigen is presented by which class of MHC?\nMHC class II (leading to CD4 response)\nEndogenous synthesis of a foreign protein antigen is presented by which class of MHC and elicits which type of T-cell response?\nMHC class I => CD8\nAll nucleated cells express MHC class I, but which express MHC class II?\n- Dendritic cells\n- B lymphocytes\n- Vascular endothelial cells\nWhy do heterozygotes have an advantage in peptide selection?\nBecause they are more likely to have 6 different class I chains expressed on MHC I molecules. (Homozygotes my express as few as 3, so they bind to fewer foreign antigens)\n1) CD8--virus infected cell => ?\n2) CD4--macrophage presenting foreign antigen => ?\n3) CD4--B-cell presenting foreign antigen => ?\n- 1) dead virus-infected cell\n- 2) activated macrophage releases cytokines\n- 3) B-cell => plasma cell releasing antibodies.\nT-cell development is driven by ______.\nNotch1 (if a cell has Notch => T-cell, if not => B-cell)\nAlpha:beta and gamma:delta cells develop from a common _________ ___________ T-cell precursor.\nWhat is the function of AIRE?\nAIRE is an autoimmune regulator that activates transcription in the thymus of every self peptide, so T-cells go through negative selection of EVERY self antigen.\nWhat would happen if B2-microglobulin could not bind the the MHC class I alpha-chain?\nThe MHC class I would be retained in the ER and would not be transported to the cell surface. It would remain bound to calnexin and not fold into the conformation needed to bind to peptide.\nWhat would happen to MHC class I if the TAP transporter were missing or non-functional?\nPeptides would not be transported into the lumen of the ER. So MHC I would not have any peptides to present on the cell surface => MHC class I deficiency. (bare lymphocyte syndrome is characterized by a defective TAP)\nWhat removes CLIP from MHC class II?\nWhere does an MHC class II bind with a peptide to present on the cell surface?\nMHC II molecules that are being transferred from the ER to the cell surface intersect with phagolysosomes, which contain degraded extracellular pathogens. These peptides are loaded into the antigen-binding groove after CLIP is removed by HLA-DM. The MHC-peptide complex then progresses to the cell surface to present the antigen.\nOther than protecting the petpide-binding groove in MHC class II, what is the function of the invariant chain?\nTransporting MHC II to the phagolysosome.\nHow do MHC variation due to multi-gene family and allelic polymorphism influence the antigen that a person's T-cells can recognize?\n- TCRs bind to peptide antigens in the form of peptide:MHC complexes. To bind specifically the TCR must fit both the peptide and the part of the MHC molecule surrounding it in the peptide-binding groove.\n- Because each individual produces a number of different MHC molecules from their MHC class I and class II multigene family, the TCR repertoire is not restricted to recognizing peptides that bind to just one MHC molecule. Instead, the TCRs repertoire can recognize peptides with different peptide-binding motifs during an immune response., increasing the likelihood of antigen recognition and T-cell activation.\n- The polymorphism in MHC molecules is localized in the regions affecting T-cell reetpor and peptide binding. Thus, a TCR that recognizes a given peptide bound to variant 'a' of a particularMHC molecule is likely not to recognize the same peptide bound to variant 'b' of the same MHC molecule. Polymorphism also means that MHC molecules of one person will bind a different set of peptides from those in another person. Taken together, these outcomes mean that because MHC polymorphism, each individual recognizes a somewhat different range of peptide antigens using a different repertoire of TCRs.\nPlace the following phases of a B-cell's life history in the correct chronological order.\na. negative selection\nb. attacking infection\nc. finding infection\nd. searching for infection\ne. repertoire assembly\nf. positive selection\ne, a, f, d, c, b\nPlace the following stages of B-cell development in the correct chronological order.\na. early pro-B\nb. large pre-B cell\nc. immature B cell\nd. stem cell\ne. late pre-B cell\nf. small pre-B cell\nd, a, e, b, f, c\nWhat is the importance of bone marrow stroma for B-cell development?\nbone marrow stroma provide the necessary environment for B-cell development by expressing secreted products and membrane-bound adhesion molecules. Cytokines such as IL-7 have an important role in later stages of B-cell development, stimulating the growth and cell division of late pro-B and pre-B cells.\nWhat would be the result of anit-IL-7 antibodies in the bone marrow?\ndeveloping B-cells would be arrested at the late pro-B or pre-B cell stage and would not be able to progress normally to the immature B-cell stage.\nWhat are the 2 main checkpoints of B-cell development in the bone marrow?\n- 1) when the heavy-chain binds the surrogate light-chain (VpreBgamma5).\n- 2) When a complete B-cell receptor is expressed on the B-cell surface.\na. What is the fate of B-cells after the heavy-chain is formed? (checkpoint 1)\nb. after the light-chain is formed? (checkpoint 2)\nc. how does this lead to allelic exclusion?\na. if the VDJ rearrangement gave rise to a functional pre-B cell receptor the late pro-B cell will undergo clonal proliferation. If the rearrangement was non-functional the B-cell has one more chance to create a functional BCR or it undergoes apoptosis.\nb. production of a functional light-chain results in assembly of a surface Ig and the survival and maturation of the B-cell. If it is non-functional the B-cell has 3 more chances to create a functional light-chain or it undergoes apoptosis.\nc. allelic exclusion = ensuring that only 1 heavy-chain and 1 light-chain are expressed. If a cell passes checkpoint 1, heavy-chain rearrangement is stopped, and the surrogate light chain becomes unavailable. Checkpoint 2 signals the end of light-chain rearrangement.\na) What is the function of B1 cells?\nb) and how do they differ from B2 cells?\na) B1 cells are best associated w/ the innate immune response because of their rapid response to antigen, their limited diversity and their polyspecificity.\nb) B1 cells express CD5, have few N nucleotides at VDJ junctions and have a restricted range of antigen specificities. They produce IgM antibodies of low affinity and respond mainly to carbohydrate, rather than protein, epitopes. B1 cells are polyspecific for antigen (they bind several different antigens).\nWhich of the following are true of centrocytes?\na. somatic hypermutation has occurred.\nb. they are large proliferating cells.\nc. isotype switching is complete.\nd. they produce secreted forms of immunoglobulins.\ne. they lack MHC class II molecules on the cell surface.\nWhat is the purpose of negative selection?\nto ensure that auto-reactive B-cells are prohibited from emerging in the body.\nImmunological tolerance in the B-cell repertoire is called _______ tolerance when it develops in primary lymphoid organs, and ______ tolerance when it is induced outside the bone marrow.\nA plasma cell is characterized by which of the following?\na. it differentiates in the medulla of lymph nodes and teh bone marrow.\nb. it dedicates 10-20% of total protein synthesis to antibody production.\nc. levels of MHC class II molecules are elevated.\nd. it undergoes extensive proliferation in germinal centers.\ne. it produces secreted Ig instead of membrane-bound forms.\nWhat is the T-cell analog to the B-cell VpreBgamm5 surrogate light chain?\npreTalpha, which combines the T-cell receptor B-chain with the first 2 T-cell receptor chains to be expressed, to form the pre-TCR. pTalpha also binds CD3 to complete the complex that induces T-cell proliferation and the cessation of rearrangement of the Beta-chain if it is functional.\nDouble negative thymocytes initiate rearrangement at the ______ locus before all other T-cell receptor genes.\nBeta and gamma\nThe function of negative selection of thymocytes in the thymus is to eliminate\na. single-positive thymocytes\nb. double-positive thymocytes\nc. alloreactive thymocytes\nd. autoreactive thymocytes\ne. apoptotic thymocytes\nDuring the early developmental stages of alph:beta T-cells in the thymus there are two key checkpoints that must be satisfied to permit the progression of T-cell development. Explain what occurs at each checkpoint.\n- 1) after the rearrangement of the beta-chain locus the first checkpoint occurs, which tests for the ability of the beta-chain to associate with pTalpha and form the pre-TCR on the cell surface.\n- 2) The 2nd checkpoint occurs after the rearrangement of the alpha-chain locus, which tests for the ability of the alpha-chain to associate w/ the beta-chain and form the TCR on the cell surface.\nIf a TCR on a double + thymocyte binds to a self-peptide:self-MHC class I complex with low affinity the result is\na. negative selection and apoptosis\nb. cell proliferation\nc. rearrangement of the 2nd B-chain locus\nd. + selection of a CD4 T-cell\ne. + selection of a CD8 T-cell\nIn T-cells, allelic exclusion of the alpha-chain is relatively ineffective, resulting in the production of some T-cells with 2 TCR's of differing antigen specificity on their cell surface.\na) Will both receptors have to pass + selection for the T-cell to survive?\nb) Will both receptors have to pass negative selection for the cell to survive?\nc) What if T-cells having dual specificity survive these selections and are exported to the periphery?\n- a) No, only 1 has to pass for the cell to move to the next stage.\n- b) Both have to pass negative selection, if just 1 fails the cell will undergo apoptosis.\n- c) a cell could that binds recognizes self antigen and a pathogenic antigen could be activated => an autoimmune response.\nWhy don't T-cells undergo somatic hypermutation?\nBecause of the req. of T-cells of dual recognition (peptide-MHC) somatic hypermutation would be likely to change the specificity of the T-cell.\nWould a MHC class II deficiency (a) affect the development of CD4, CD8 or both types of T-cells?\nb) How would this impact B-cells?\na) Just CD4, CD8 would still be selected for when dual + T-cells bound to MHC class I.\nb) To produce antibody B-cells req. the cytokines released from CD4 T-cells. So lacking CD4 cells would lead to low immunoglobulin levels and the inability of B-cells to differentiate into plasma cells.\nAs we age our thymus shrinks, or atrophies by a process called involution. Yet T-cell immunity is still functional in old age.\na) How do T-cell #s in the periphery remain constant in the absence of continual replenishment from the thymus?\nb) how does this differ from the maintenance of the B-cell repertoire?\na)T-cells in the periphery self-renew by cell division (and are long lived) after thymic atrophy.\nb) B-cells are short lived and replenish from immature precursors derived from the bone marrow.\nHow does the processing of T-cells in the thymus differ from processing in the periphery? what are the advantages/disadvantages?\nAIRE is present in the thymus which causes genes normally expressed in other tissues to be expressed in the thymus, generating a more comprehensive repertoire of self-peptides, increasing the # of potentially autoreactive T-cells that are killed during negative selection.\na) What is the role of regulatory CD4 T-cells (Treg)?\nb) How is it different from other CD4 T-cells?\na) Treg suppresses the proliferation of naive autoreactive CD4 T-cells by secreting inhibitory cytokines. This inhibitory action req. that both the Treg and other CD4 T-cells interact w/ the same antigen-presenting cell.\nb) Treg expresses CD25 and FoxP3 (transcription repressor protein) on the cell surface.\nTrue or False:\nIn adults the mature T-cell repertoire is self renewing and does not require a thymus for provision of new T-cells.\nPeople with defective AIRE (autoimmune regulatory) gene exhibit\nA. DeGeorge syndrome\nB. MHC class II deficiency\nD. autoimmune polyendocrinopathy-candidiasis-ectodermal dystrophy (APECED)\nE. MHC class I deficiency\n(this multiple choice question has been scrambled)\nPeople lacking a thymus have _________.\nWhy would an organ transplanted from any donor other than an identical twin almost certainly be rejected in the absence of any other treatment?\nacute rejection is due to immune responses to the HLA class I and II molecules of the graft that are different from those of the recipient and are therefore viewed as foreign. If the HLA class I and II molecules are the same, the differences in the peptides that are bound by the MHA molecules will trigger rejection through an allorecognition response.\n_______ describes polymorphic antigens that vary between individuals.\nHow does chronic rejection differ from acute rejection?\nAcute rejection occurs only a few days after transplantation and is mediated by CD4 and CD8 T-cell adaptive immune responses to the foreign peptides bound the HLA molecules. Chronic rejection occurs months to years after transplantation and is mediated by anti-HLA class I and II alloantibodies produced via the indirect pathway of recognition. CD4 T cells are activated by dendritic cells presenting donor-derived HLA class II allotypes of the recipient. These activated CD4 T-cells activate B-cells, which are presenting donor-derived allogeneic HLA peptides. This cognate interaction results in the production of anti-HLA class I and class II antibodies.\nIdentify 3 classes of drugs that are used to suppress acute transplant rejection, provide examples of each and name the toxic side-effects of each class.\n- 1) corticosteroids: can lead to fluid retention, weight gain, diabetes, bone demineralization and thinning of skin. (prednisone)\n- 2) cytotoxic drugs: nonspecifically prevent DNA replication in all mitotic cells (ie cancer drugs), liver and bladder damage. (cyclophosphamide, methotrexate)\n- 3) T-cell activation inhibitors: nephrotoxicity and suppression of B-cell activation. (cyclospoirn A, rapamycin)\nGraft-versus host disease is a consequence of what?\nmature T lymphocytes from the donor mounting an immune response against tissue of the recipient.\nWhat limits the effectiveness of mouse antibodies in tissue transplantation?\nMoAbs (mouse antibodies) aer antigenic in species and stimulate anti-MoAb responses. Anti-CD3 MoAbs are often administered to suppress T-cell activity in recipients, but repeated doses leads to the formation of a anti-MoAb immune response that diminishes and eventually completely stops the activity of the anti-CD3 MoAbs.\nWhy does a bone marrow donor need to be HLA matched to the recipient?\nThe recipient's MHC molecules mediate + selection of thymocytes in the thymus that interact w/ donor-derived MHC molecules in the periphery."
] | [
"<urn:uuid:bfd4e76d-c811-4ea9-ae11-b2210d873a8a>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.freezingblue.com/flashcards/print_preview.cgi?cardsetID=11280"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597458.22/warc/CC-MAIN-20200120052454-20200120080454-00371.warc.gz"
] | [
"en"
] | [
0.8832834959030151
] | [
5814
] | [
3.609375
] | [
4
] |
[
"- Heart and Soul: The Story of America and African Americans by Kadir Nelson\n- Reading level: Ages 9-12\n- Hardcover: 108 pages\n- Publisher: Balzer + Bray; 1 edition (September 27, 2011)\n- ISBN-13: 978-0061730740\nBack-of-the-book blurb: The story of America and African Americans is a story of hope and inspiration and unwavering courage. But it is also the story of injustice; of a country divided by law, education, and wealth; of a people whose struggles and achievements helped define their country. This is the story of the men, women, and children who toiled in the hot sun picking cotton for their masters; it’s about the America ripped in two by Jim Crow laws; it’s about the brothers and sisters of all colors who rallied against those who would dare bar a child from an education. It’s a story of discrimination and broken promises, determination and triumphs.\nKadir Nelson, one of this generation’s most accomplished, award-winning artists, has created an epic yet intimate introduction to the history of America and African Americans, from colonial days through the civil rights movement. Written in the voice of an “Everywoman,” an unnamed narrator whose forebears came to this country on slave ships and who lived to cast her vote for the first African American president, heart and soul touches on some of the great transformative events and small victories of that history. This inspiring book demonstrates that in gaining their freedom and equal rights, African Americans helped our country achieve its promise of liberty and justice—the true heart and soul of our nation.\nShe Is Too Fond of Books’ review: Heart and Soul is an illustrated history book targeted for middle grade readers – but it goes beyond that mission, in many ways. Set to read like a letter from a grandmother to the younger generations, it opens with this poignant statement (Prologue):\nMost folks my age and complexion don’t speak much about the past. Sometimes it’s just too hard to talk about … [but] You have to know where you came from so you can move forward.\nThe book continues with short chapters discussing the role of African Americans throughout of nation’s history – yes, roles that will make the reader angry at the injustice, and proud of the accomplishments. Nelson (in the voice of the elderly grandmother) takes the reader from the “birth” of nation in 1776 through the Civil Rights Act of 1964.\nThat’s 200 years of history in 100 beautifully illustrated pages; each chapter is about eight pages long, split evenly between full-page text and full-page illustration. I read the book aloud in several sittings to our younger (7 and 9 years) children; our 13-year-old read it on his own. The short chapters break up the dense text, and make a natural stopping point for discussion.\nNelson make the story personal to the fictional narrator. At the author’s breakfast during the recent NEIBA Fall Conference, Nelson explained that he was inspired to write the history after reading an interview with a 100-year-old African American woman who voted for Barack Obama in the 2008 elections. He began to speak to his own family members and dug deeper to hear of slaves in his lineage, descendants of native Americans, and people who migrated north to escape Jim Crow and to look for work. The emotion of Nelson’s personal connection comes through in the words of the narrator – this isn’t simply history, this is a family (and a nation’s) story.\nThe Epilogue continues the letter from the grandmother, telling the children:\nOur centuries-long struggle for freedom and equal rights had helped make the American promise of life, liberty, and pursuit of happiness a reality for all Americans. We have come a mighty long way, honey, and we still have a good ways to go, but that promise and the right to fight for it is worth every ounce of its weight in gold. It is our nation’s heart and soul.\nKadir Nelson dedicates this beautiful book:\nFor my family … and for every American family whose invaluable contributions and stories have helped stitch the grand quilt of these United States.\nIllustrations (painted) are vivid and expressive; Nelson fills the page - these are not simply accents to the written word, they are an integral part of the story. Some of the illustrations are made to look like family photographs from an old album or scrapbook, rather than depicting historical events; this furthers the connection of Heart and Soul as a family story, with Americans being one very large family.\nKadir Nelson received Caldecott Honors for two previous works: Henry’s Freedom Box (Ellen Levine) and Moses: When Harriet Tubman Led Her People to Freedom (Carole Boston Weatherford).\nHeart and Soul has most of the tools you’d expect from a reference book: illustrations are captioned, there’s a timeline (1565 – 2009), an extensive bibliography, and a complete index. The only piece I didn’t find is a table of contents – perhaps starting the book as a story/letter makes it more inviting to young readers.\nHighly recommended for the home, school, and public library."
] | [
"<urn:uuid:f984a549-5e46-4938-8567-0f7da17bf568>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.sheistoofondofbooks.com/2011/10/20/book-review-heart-and-soul-by-kadir-nelson/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696384181/warc/CC-MAIN-20130516092624-00086-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9492970108985901
] | [
1115
] | [
2.796875
] | [
3
] |
[
"Step into any specialty area, diving or non, business or pleasure, and you will come across buzz-words, acronyms, abbreviations, and other odd terminology. Underwater photography is no different. If you are going to get into underwater photography, it is helpful to know some of these terms and buzz words before you venture forth shopping or in conversation with aficionados that have been at it for awhile. For sake of space, I will not spend a lot of time on terminology common to photography, but to those terms that pertain to underwater photography in particular, and no doubt I will miss some.\nMACRO vs. WIDE-ANGLE\nThe job of the lens on a camera is to gather the image in a sharp form and convey it to the film or digital input device. What kind of lens you put on the camera will impart images in different ways. For land cameras, most choose a zoom lens that offers a variety, all in one lens.\nWith most consumer cameras 50 or 55 mm is a “normal” lens (not to be confused with the term “35 mm camera,” which refers to film size). With a “normal lens” the image you get is roughly equivalent to what your eye sees — no magnification, no reduction. A “wide-angle” lens shrinks the image and takes in more of the view. With film cameras, a lens rated 40mm or smaller are considered “wide-angle.” For underwater 28 mm is good but 20 to 15mm is even better. The main advantage of a wide-angle lens underwater is you can get very close to your subject (minimizing the negative effect of a lot of water between the camera and your subject) and the deep range of focus (depth of field) in wide-angle lenses.\n“Macro” refers to extreme close-up photography (two feet or less, usually only inches). Although extreme close-up is possible with a wide-angle lens, macro lenses (or similar set-ups) are for detailed views of small animals at some degree of magnification.\nAMPHIBIOUS vs. HOUSED\nCameras underwater fall into one of two categories: amphibious or housed. An amphibious camera is specifically meant to get wet and go underwater. Nikonos (now discontinued) and most of the Sea & Sea cameras are excellent examples of this kind of camera. Amphibious cameras are usually available as complete systems (strobes, arms, cords, etc.) and work well on land as well, although certainly not as well as land cameras.\nHoused cameras are cameras that are made specifically for the use on the land, adapted for underwater use by placing them in water-tight “housing” that allows access to the camera through a variety of controls. In general, with a housed camera you must purchase the camera and housing separately, although many manufacturers of lower-cost point-and-shoot models will sell them as a package. With a housed camera you get the sophistication and features available for the most part only in surface cameras. Often the finest lenses are available only with a land camera. With the more sophisticated land cameras, the housings add size, bulk and weight.\nIf you are using a housed camera that can accommodate interchangeable lenses, it is rare that the front portion of the housing, the “port,” will fit all lenses. On most high-end housings, this section of the housing is interchangeable to accommodate specialized lenses. You will usually have to have a wide-angle “dome” port and a tube shaped macro port. These ports are important considerations when you realize that they can add hundreds to the cost of a housing system.\nIt’s dark underwater and cameras don’t like that. To make colors and textures stand out you need artificial light. This comes in the form of an underwater flash unit usually known as the strobe. From a battery source a capacitor is charged to hold a high amount of power that is rapidly release as the flash. It puts a high amount of light in one spot at one time.\nThis is the power rating number for the strobe. The higher the number, the more powerful the strobe. But make sure you are comparing apples to apples in that the numbers you are comparing are at the same ASA rating.\nStrobe angle is the beam width of the strobe. This is especially important for wide-angle photography.\nStrobes take time to recharge between full power firings — 2 to 8 seconds depending on the model and power setting. This is important for cameras with motor drives or digital cameras that can rapid fire images.\nThe color quality of the output of a strobe is referred to as color temperature. Most are set at color equivalent to daylight, but some have a slightly warm cast to compensate for the blue cast that water can impart.\nMounting strobes to the camera is done with strobe arms. The arms allow you necessary flexibility to position strobes to direct light into the desired locations.\nFoundational support for the extras of strobes and arms and sometimes other items is the tray. Many housed cameras have a tray built in, but most amphibious cameras do not, although many are sold as part of a package."
] | [
"<urn:uuid:5d1279e1-f746-4630-a15c-13539bd8975b>"
] | [
"CC-MAIN-2023-14"
] | [
"https://cadivingnews.com/underwater-photo-speak/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00380.warc.gz"
] | [
"en"
] | [
0.9475280046463013
] | [
1124
] | [
2.8125
] | [
3
] |
[
"Any landowner who wants to manage property in a manner that encourages a healthy grouse population needs to recognize the importance of aspen. The buds of mature male aspen trees serve as a major winter food source, and young stands of aspen which sprout prolifically following a clear cut during dormancy (when leaves are off the trees) provide the necessary dense cover for good grouse habitat.\nGiven that the home range of a grouse hen with a brood may approach 40 acres, managing an area of that size is adequate and will provide habitat to several male grouse, as well.\nIf managing land for grouse, the Department of Fish and Wildlife publication A Landowners Guide to Wildlife Habitat Management for Vermont Woodlands recommends the following practices.\nOnce an area to be managed for grouse has been identified (preferably one that includes some component of aspen), divide the area into stands of five acres or less. Every 10 years, rotate treatment on one-quarter of the stands as described below in a checkerboard pattern. Stands with the oldest aspen trees should be treated first. Within each stand of five acres or less:\nTop / Back"
] | [
"<urn:uuid:ff047a72-f06a-4bc5-a9df-7f68ba0890e6>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.anr.state.vt.us/anr/envrpts/Env99/grousesb.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705926946/warc/CC-MAIN-20130516120526-00099-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9364354014396667
] | [
239
] | [
2.984375
] | [
3
] |
[
"One of the mysteries of the English language finally explained.\nChinese cabbage of a pale variety that resembles lettuce.\n- ‘The pe-tsai of the Chinese is an annual, apparently intermediate between cabbage and the turnip but with much thinner leaves than the former.’\n- ‘A member of the brassica family, this cabbage is also known as Napa, celery cabbage, pe-tsai, hakusai, wong bok, and Peking cabbage.’\nLate 18th century: from Chinese ( Cantonese dialect) báicài, literally ‘white vegetable’.\nTop tips for CV writingRead more\nIn this article we explore how to impress employers with a spot-on CV."
] | [
"<urn:uuid:95486af5-1170-4acc-9ef0-876374818081>"
] | [
"CC-MAIN-2017-26"
] | [
"https://en.oxforddictionaries.com/definition/us/pe_tsai"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00589.warc.gz"
] | [
"en"
] | [
0.9179823994636536
] | [
156
] | [
2.796875
] | [
3
] |
[
"|Type||Active Pharmaceutical ingredient|\n|Synonym||Deacetylated chitin; Poly(D-glucosamine)|\n|Related Products||Metformin, Guanidine Carbonate, Agmatine Sulphate|\nChitosan is the second most abundant biopolymer in nature after cellulose. It is widely distributed. It is mainly distributed in the shells of many lower animals, especially arthropods such as shrimp, crabs,s and insects. It also exists in the cell walls of lower plants such as bacteria, algae and fungi.\nChitosan is a kind of polyelectrolyte with biocompatibility, anti-bacterial and biodegradation. It has a wide range of biomedical and industrial applications. Its chemical properties and low toxicity can be used as a component of drugs, gene transfer systems, biodegradable membranes and skeleton in tissue engineering.\nIt is mainly used in food, medicine, agricultural seeds, daily chemical industry, industrial wastewater treatment and other industries. Chitosan oligosaccharide has the functions of improving immunity, activating cells, preventing cancer, reducing blood lipid, lowering blood pressure, anti-aging and regulating the body environment. It can be used in the fields of medicine, health care and food."
] | [
"<urn:uuid:793caf4d-499d-4b6f-b3f9-ad18630bcf0a>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.stanfordchem.com/chitosan.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00185.warc.gz"
] | [
"en"
] | [
0.8573257327079773
] | [
394
] | [
2.625
] | [
3
] |
[
"The distinctive features of the human genome or genetic program evolved in an era of some two and one half million years known as the paleolithic era (early stone age). This era ended about 10,000 B.C.E. During this period, food was often scarce, unpredictable and also often not very diverse. There was no electricity and little interior lighting, so sleeping and waking was entrained to the sun/moon light/dark cycle. Obtaining food usually required a considerable expenditure of physical energy by hunting or foraging. Like other mammals, to guard against future shortages, we evolved the capacity to store excess calories when food was diverse and abundant. Today a vast diverse abundance of food is always readily available. For most of us, obtaining our food requires the expenditure of a modest amount of mental but little physical energy. Much of the modern diet is “pre-digested” in the form of powdered grains, refined sugars and liquified pre-frozen fruits so that we do not even have to expend energy to digest our food. This mismatch between our hunter-gatherer genome and our modern sedentary processed food lifestyle is thought to have resulted in a worldwide epidemic in the diseases of civilization or metabolic syndrome diseases such as prolonged obesity/sarcopenia (fat gain and loss of lean body mass such as muscle and bone), cardiovascular disease, type 2 diabetes, hypertension and dislipidemia (elevated serum triacyglycerols (triglycerides), small-dense LDL cholesterol and reduced HDL cholesterol). Hence to optimize our biology and health, it is thought that we must return to the rhythms and patterns of our pre-industrial, pre-agricultural ancestors without abandoning the spectacular advances that technology has brought about.\nAnother source of inspiration for those who are seeking to optimize their health and biology are laboratory experiments that seek to maximize health and longevity in animals ranging from yeast cells to rhesus monkeys by restricting calories or specific nutrients.\nThe above picture compares unrestricted rhesus monkeys (A-B) with restricted monkeys (C-D) at an average lifespan age. Restricted animals, such as these monkeys, are often astoundingly robust, healthy and long-lived but also chronically hungry, a kind of blessed/wretched state that few humans have so far attempted to emulate. To overcome this hunger obstacle, scientists have proposed various strategies for tricking the hunger mechanism into requiring fewer calories. On a similar front, others are seeking to identify small molecules that will activate the health and life-span promoting signaling pathways that are activated by calorie restriction. One such candidate calorie restriction memetic, resveratrol, has turned out to be mostly hot air and wishful thinking, but the search continues.\nAnother intriguing area of aging research involves the genetic engineering of test animals with modifications that typically reduce the production of growth promoting compounds such as insulin, insulin like growth factor or growth hormone or that downregulate the receptors to these hormones or the signaling pathways that are downstream to these receptors. One such animal., the GHR-KO Dwarf Mouse 11C, very nearly lived 5 years or the human equivalent of 180 to 200 years. This mouse was born at the Southern Illinois University vivarium on January 15, 1998 and died about one week short of 5 years later. At the time of his death he weighed only 8 grams, small even for a dwarf mouse. Apparently there is a trade off between growth and longevity. The researchers hypothesized that the long life of the GHR-KO Dwarf mice is partly related to their low levels of glucose and insulin. At a deeper level the long life of these genetically modified mice as well as calorie restricted mice is apparently partly related to downregulation of the mTOR gene/protein and the upregulation or activation of the SIRT1 signaling gene/protein. mTOR suppression promotes autophagy, the breakdown and removal of old broken down mitochondria, oxidized proteins and AGE’s or advanced glycation end products. AGE’s are protein-sugar molecules that can build up in cells and tissues over time causing cell senescence and aging. Old broken down mitochondria can be a major source of DNA damaging free radicals. Oxidized proteins can disrupt the the cell signaling system of the cell. Sirt1 activation results in slower aging by decreasing oxidative damage to cellular DNA and by increasing DNA repair mechanisms.\nOn still another front, researchers hope to renew tissues and even entire organs using the technologies of genetic engineering and regenerative medicine. One fascinating possibility is that the immune system, red blood cells and the inner layer of blood vessels could be renewed by replacing the bone marrow stem cells that form these immune and blood/vascular tissues.\nIf you are searching for a way to apply these calorie restriction/genomic harmony ideals to your own wellness strategy, then the key concepts may be as follows:\n(1) Adopt the lifestyle of your Paleolithic ancestors. Eat the kind of food that they ate and mimic their patterns of food consumption. If you do this correctly you will most likely substantially reduce the total number of calories you consume relative to the calories you expend. In so doing you will very likely not only lose a lot of weight, you will also improve a wide range of health parameters including the highly important aging parameters that are slowed by calorie restriction. You will very likely switch the signaling patterns in your body’s cells from growth/fat storage/reproduction mode to maintenance/repair mode. This latter pattern is synonymous with robust health and slowed aging. On the negative side, it does not prepare you for future food shortages or famines! In the 21st century, future food shortages associated with reduced income can be avoided by various economic measures. The body’s stone age “intelligence” or genome has not yet caught up with this, so it continues to pile on the pounds in anticipation of the coming famine. Over time there is a dramatic shift in the body’s physiology towards disease and disfunctionality.\n(2) Sleep the way your ancestors slept and expend energy or exercise in a way that mimics their lifestyle.\n(3) I am not suggesting that you need to eat the exact same foods that our ancestors ate. Rather the idea is to mimic the nutrient pattern of the paleolithic era as a first approximation to an ideal diet. A second approximation would be to follow a diet that matches the best cutting edge research. A third and probably even better approximation would be to select an individual diet that minimizes disease and maximizes your individual physiological measures of wellness. In other words what works best for you is the bottom line. The main drawback of this individualized approach is that it may be somewhat difficult to measure health parameters.\n(4) In selecting an ancestor to emulate, do not select one who was living under conditions of great nutrient abundance and diversity. This ancestor was no doubt in a kind of fat storage, cell growth and reproductive signaling mode. He/she was probably not exercising too much. Instead emulate the ancestor who had a real perpetual need to hunt or gather because food was always both scarce and often not too diverse. This hypothetical model ancestor was consuming a diet that was nutrient dense but calorically deficient. It was nutrient balanced and symmetric in the long term but unbalanced and asymmetric in the short term. This hypothetical ancestor was perpetually lean but very well nourished and was switched over into a maintenance/repair signaling pattern that is correlated with robust health and longevity.\n(5) Do all of the above while also applying the best discoveries of modern medical science.\n(6) Finally the above prescriptions for healthy living are in no way one-size-fits-all. If you are someone who experiences high uric acid levels and consequent activation of fat storage signaling pathways in response to excessive purine rich protein/meat, then you may need to limit your consumption of purine rich meats. If you are part of the 10% of the population that is fat-insensitive, meaning that your brain does not respond to fat by decreasing hunger, then a low fat version of this diet would be best for you. If you are part of the 40% of the population that is grain sensitive, then you need to be zealous about restricting grains, especially the non-sprouted variety. If you are ethically opposed to the use of animals for food even if they are treated humanely, then you will want to put together a vegetarian version of the diet prescriptions of this blog. In the not too distant future maybe artificial intelligence expert systems (“health bots”) will be able to customize a diet, exercise and lifestyle regimen that will fit each person’s unique physiology, monitor that physiology over time, and make recommendations for changes.\nColman, R. Caloric restriction delays disease onset and mortality in rhesus monkeys. Science 2009;325(5937): 201-204.\nCordain, L. Origins and evolution of the Western diet: health implications for the 21st century. Am J Clin Nutr 2005; 81:341-354. (http://www.ajcn.org/content/81/2/341.full.pdf)\nJohnson, Richard J. et al. Lessons from comparative physiology: could uric acid represent a physiologic alarm signal gone awry in western society? J Comp Physiol. 2009 January; 179(1):67-76\nPinel, J. P. J. Hunger, Eating, and Ill Health. American Psychologist 2000; 55(10): 1105-1116.(http://www1.appstate.edu/~dennistonjc/Hunger_eating_and_ill_heath.pdf)\nStipp, David. A new path to longevity. Scientific American, January 2012.\nVarady, K.A. Alternate-day fasting and chronic disease prevention: a review of human and animal trials. Am J Clin Nutr 2007;86:7-13."
] | [
"<urn:uuid:dc16dbfc-de7a-4bbd-9398-ccbe18781e0f>"
] | [
"CC-MAIN-2013-20"
] | [
"http://ahuntergatherer.wordpress.com/2011/07/12/hello-world/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703532372/warc/CC-MAIN-20130516112532-00094-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9375569224357605
] | [
2034
] | [
3.625
] | [
4
] |
[
"THE LAST DAYS OF JERUSALEM, JUDAH AND JEREMIAH: The order that Emperor Nebuchadnezzar attempted to establish in Zion, under his appointed King Gedeliah, is upset with Gedeliah’s murder at the hands of Ishmael Ben Nethaniah, possibly at the instigation of Nebuchadnezzar’s appointed regent over Amon, King Baalis. (ch. 40-41). The counterstroke by Johanan Ben Kareah leaves a confused and vulnerable remnant wondering whether to flee to Egypt or await Nebuchadnezzar’s judgment on all the chaos. Jeremiah’s counsel, to continue submitting to Nebuchadnezzar, is rejected, and Jeremiah is taken, against his will, along with other hostages and anti-Babylonian partisans, to Egypt.\nTheir deliberate return to Egypt represents the lowest possible point of Israel’s disgrace. Babylon is where the Abrahamic story began. Exile in Babylon, from where came Abraham, represents a reset of the cycle and the story. Egypt, by contrast, represents slavery. To choose Egypt, deliberately, is to set one’s face against the mission, the faith, and the God, of Abraham.\nEgypt had already proven herself powerless and unreliable on behalf of her allies, even though Egypt had likely had a hand in instigating and encouraging some of the self-defeating revolts against Babylon that had resulted in three waves of deportation. Even in Egypt, they would not escape the reach of Babylon’s power, as Jeremiah predicted in chapter 43, a promise that may have been fulfilled in a later attack of Nebuchadnezzar’s army upon Egypt, in 567 BC, after which Nebuchadnezzar did not remain to occupy Egypt (Egyptian history suggests that he was repulsed eventually). As for Jeremiah’s prophecy regarding Pharoah Hophra (44: 30), he was killed in a coup d’etat in 567.\nSo, Jeremiah prophesies doom and destruction in Egypt for the particular remnant that seems to have taken him there against his will. Their deaths there will be his as well. But he alone would die with hope for his people. And Baruch, Jeremiah’s scribe and friend, would also find his life extended in reward for his faithfulness (ch. 45).\nJeremiah’s prophecy ends with basically the same account of II Kings 24-25, about the fall of Zion and the Exile to Babylon. This brings the story full circle back to everything that God told Jeremiah in chapter 1. As tragic as it was, the royal clemency, exercised toward the one Judean king who had willingly submitted to Babylon’s yoke, Jehoichin, is a note of hope speaking of better things to come for Israel.\nJEREMIAH AND THE NATIONS. Chapters 46-51 recount Jeremiah’s prophecies about neighboring nations, including their conqueror, Babylon. The conquerors of Babylon, the Medes from the North, are even mentioned (51:11). Jeremiah’s dire predictions for Babylon, fulfilled over the courses of centuries, were even sent along with the staff of King Zedekiah, to put the shocking and overwhelming imperial and idolatrous spectacle that was Babylon into perspective for the Jews. They would sustain their hope in God’s sovereignty over even nations as powerful and prosperous as Babylon, and they would keep them ready and prepared to return to Zion.\nThe surprising assumption of these prophecies, given the time, is that Israel’s YHWH God is God over the nations, all the earth, not just Israel, and that God works with and through the nations and creation in ways that are too big for the narrow, immediate viewpoint of humans to catch. The result is that “the moral arc of the universe is long, but it bends toward justice,” said Dr. Martin Luther King, Jr.\nSuch a view would have been surprising, in light of Babylon’s supreme ascendancy, and disturbing to the prophets and priests of those nations, who equated military power and victory with the might and victory of their gods.\nBecause these prophecies about the nations come at the end of Jeremiah does not mean that they came late in his ministry, nor that they all necessarily apply to the years following the Exile. They may be a collection of earlier prophecies, gathered together because of their common focus, because they seem to speak of sufferings and defeats that they will share with Israel at the hand of Nebuchadnezzar. Of special note is the tone of Jeremiah’s prophecies, often expressed as lamentations. Thus he displays care and compassion for them, as well as for Israel. This prophetic heart for all humanity will find its fulfillment and expression in the prophetic gospel ministry of Jesus toward Israel and the Gentiles.\n…is a personal lament, but with corporate liturgical elements, such as the words, “In God, whose word I praise,” or “What can [mere] man do to me?” which are repeated. What sounds like an individual lament may then have had corporate, liturgical expression in worship, with priests or the congregation participating and responding with the phrases mentioned above. This is a far cry from so much contemporary worship, in which our personal pains, failures and broken relationships are often kept segregated, hidden or in denial. We would do well to explore the connection between worship, justice and the care of souls that are bound together in Psalm 56.\nThat our tears, sufferings, actions and choices are “in your book” (v. 8) is one of the earliest mentions of The Book of Life (Ps. 69:28; Mal. 3:16; Phil. 4:3; Rev. 3:5 and more), a symbol for God’s attention to us, his omniscience and his justice.\nComments are closed"
] | [
"<urn:uuid:df27bd9a-e3e8-442e-a662-91d926b7db5c>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.emmanuelmennonitechurch.com/2011/06/16/week-56-jeremiah-42-52-psalm-56/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00581.warc.gz"
] | [
"en"
] | [
0.9677385687828064
] | [
1261
] | [
3.046875
] | [
3
] |
[
"You can now know what your dog is thinking, when he gazes up at you adoringly says a new study.\nEmory University researchers have developed a new methodology to scan the brains of alert dogs and explore the minds of the oldest domesticated species.\nThe technique uses harmless functional Magnetic Resonance Imaging (fMRI), the same tool that is unlocking secrets of the human brain.\n\"It was amazing to see the first brain images of a fully awake, unrestrained dog,\" said Gregory Berns, director of the Emory Center for Neuropolicy and lead researcher of the dog project.\n\"As far as we know, no one has been able to do this previously. We hope this opens up a whole new door for understanding canine cognition and inter-species communication. We want to understand the dog-human relationship, from the dog's perspective,\" he stated.\nKey members of the research team include Andrew Brooks, a graduate student at the Center for Neuropolicy, and Mark Spivak, a professional dog trainer and owner of Comprehensive Pet Therapy in Atlanta.\nTwo dogs are involved in the first phase of the project. Callie is a two-year-old Feist, or southern squirrel-hunting dog. Berns adopted her at nine months from a shelter.\nMcKenzie is a three-year-old Border Collie, who was already well-trained in agility competition by her owner, Melissa Cate.\nBoth dogs were trained over several months to walk into an fMRI scanner and hold completely still while researchers measured their neural activity.\nThe researchers aim to decode the mental processes of dogs by recording which areas of their brains are activated by various stimuli. Ultimately, they hope to get at questions like: Do dogs have empathy? Do they know when their owners are happy or sad? How much language do they really understand?\nIn the first experiment, the dogs were trained to respond to hand signals. One signal meant the dog would receive a hot dog treat, and another signal meant it would not receive one. The caudate region of the brain, associated with rewards in humans, showed activation in both dogs when they saw the signal for the treat, but not for the no-treat signal.\n\"These results indicate that dogs pay very close attention to human signals. And these signals may have a direct line to the dog's reward system,\" Berns says.\nBerns is a neuroeconomist, who normally uses fMRI technology to study how the human mind works. His human brain-imaging studies have looked at everything from why teens engage in risky behavior to how adults decide to follow, or break, established rules of society.\n\"To the skeptics out there, and the cat people, I would say that dogs are the first domesticated species, going back at least 10,000 years, and by some estimates 30,000 years,\" Berns said.\n\"The dog's brain represents something special about how humans and animals came together. It's possible that dogs have even affected human evolution. People who took dogs into their homes and villages may have had certain advantages. As much as we made dogs, I think dogs probably made some part of us, too,\" he added.\nThe results will be published in the Public Library of Science (PLoS ONE)."
] | [
"<urn:uuid:da9d1319-7859-4440-8eae-3c42815eb16e>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.medindia.net/news/images-of-canine-thought-processes-being-captured-by-brain-scans-101102-1.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00364.warc.gz"
] | [
"en"
] | [
0.9769037961959839
] | [
673
] | [
3.015625
] | [
3
] |
[
"In case of multidrug-resistant gram-negative bacteria, MRSA (methicillin-resistant S. aureus), VRE (vancomycin-resistant enterococci) or Candida auris, contact precautions are needed in healthcare facilities to protect other patients and staff. Isolation precautions result in patient inconvenience and fears, additional workload and costs in both, inpatient and outpatient settings. For many patients, isolation precautions can be terminated after a certain number of negative swab sets.\nFor MRSA-colonized patients, decolonization can be discussed and planned. This includes various measures at home over several days with the aim of eliminating the bacterium."
] | [
"<urn:uuid:7fd8f54d-93e9-4ee7-9cd4-e8e0b9d2ceff>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.usz.ch/en/clinic/infectiology/offer/isolation-consultation-service/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00799.warc.gz"
] | [
"en"
] | [
0.8140717148780823
] | [
140
] | [
2.875
] | [
3
] |
[
"General information: It is a relatively small member of the Rainbowfish family except there are some in Litchfield national Park that grow up to 100mm long. They are usually found about 60mm long. They are usually found in fresh water streams closer to the coast. Where this fish has been collected members of ANGFA have recorded details of the water quality. These are averages and it should be remembered that most collections are made in the dry season when conditions are different from the wet season. Temperature average 26 deg C, pH average 6.9, carbonate hardness 64 ppm, general hardness 85ppm. The natural diet of this species is unknown but is thought to be the same as other smaller rainbows, small insects both aquatic and terrestrial, algae, small crustaceans. Rainbowfishes breed throughout the year when conditions are good. The male finds a location and displays to females that are near. Females can lay approx 40 to 100 eggs a day if conditions are good.The Black-banded rainbowfish were collected at Goeorge Creek about 100 km south of Darwin, this form was selected because it is one of the best looking forms around Darwin.\nCultivation notes : It is recommended that a minimum size for an aquarium to keep a small group of these fish is 60 cm. They are a schooling fish and are best kept in a group of five or more, with a ratio of two to one males to females will get the best colour display each morning. The best set up aquarium has dark gravel and some plants but with a clear swimming area and some current. They like clean well oxygenated water and will benefit from plenty of water movement. Water quality parameters are not too important as the species has broad tolerances. In captivity rainbowfishes will accept most prepared foods supplied. It is best if they can be offered at least one third to a half vegetable matter. About 5 adults with three females are a good number to use for breeding. Spawning mops can be used to collect eggs from a group of fish in an aquarium. Eggs hatch in a few days to a week and can be raised easily using commercially available fry feeds and plankton cultures. They are a peaceful fish that will fit in well with most other fishes of the same size.\nDistribution : Recorded from several places in North Queensland, across the top of the Northern Territory and the northern portion of the Kimberley region of WA.\nSelling details : Sold individually at 2.0 centimetres or greater total length.\nReference: Allen G.R., Midgley S.H. and Allen M. (2002) \"Freshwater Fishes of Australia\"] ANGFA database - http://db.angfa.org.au"
] | [
"<urn:uuid:2ffef8c4-d58d-4517-8384-640c8f6e1129>"
] | [
"CC-MAIN-2017-30"
] | [
"http://aquagreen.com.au/plant_data/Melanotaenia_nigrans.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428300.23/warc/CC-MAIN-20170727142514-20170727162514-00193.warc.gz"
] | [
"en"
] | [
0.9545868039131165
] | [
551
] | [
2.609375
] | [
3
] |
[
"Lord Ganesha bronze contemporary statue from Indonesia. Photo credit: Kashgar\nGanesh is one of the best known and loved deities in the Hindu pantheon of gods, and indeed is the most recognised outside of India. But who is this elephant headed fellow, and why is he so popular?\nGanesh (also spelled Ganesa or Ganesha and known as Ganapati, Vinayaka and Pillaiyar) is the Lord of Good Fortune who provides prosperity, fortune and success. He is the Lord of Beginnings and the Remover of Obstacles of both material and spiritual kinds. Interestingly, he also places obstacles in the path of those who need to be checked.\nBecause of these attributes, Ganesh is widely revered by almost all castes and in all parts of India, regardless of any other spiritual affiliations. His image is found everywhere, in many different forms, and he is invoked before the undertaking of any task. Ganesh is also associated with the first Chakra, or energy wheel, which underpins all of the other Chakras and represents conservation, survival and material well-being. He is considered to be a patron of the arts and sciences and of letters. Devotees believe that if Ganesha is worshiped, he grants success, prosperity and protection against adversity. In a lesser known role, Ganesh is also the destroyer of vanity, selfishness and pride.\nThe attributes and characteristics of Ganesh have evolved over many centuries of Indian history. Several of the sacred Hindu texts relate myths and anecdotes associated with his birth and exploits and help to explain his distinct iconography. He is popularly held to be the son of Shiva and Parvati, although the Puranas(ancient Hindu and Jain texts narrating the history of the Universe and describing Hindu cosmology, philosophy and geography) disagree about his birth, stating that he may have been created by Shiva, or by Parvati, or by Shiva and Parvati, or may simply have been discovered by Shiva and Parvati. It is a little known fact outside of India that Ganesh has a brother Skanda, who is worshiped particularly in southern India as the embodiment of grace, bravery and love of virtuous deeds.\nIconic representations of Ganesh show considerable variation, his form changing over time from that of a simple elephant in earliest depictions to the Ganesh we know today, typically having the head of an elephant and a large rotund belly. He is generally shown with four arms, although the number may vary from two to sixteen. When in the four-armed configuration he usually holds his own broken tusk in his lower-right hand and a laddoo sweet in his lower-left hand which he tastes with his trunk. An axe or goad is held in the right upper hand and a noose is held in the left upper hand. In a modern variation, the lower-right hand does not hold the broken tusk but is turned toward the viewer in a gesture of protection and fearlessness (the abhaya mudra). Each of Ganesha's items carries it's own important spiritual significance and they (and the number of arms used to carry them) may vary to include a water lily, mace, discus, rosary, bowl of sweets, musical instrument, spear or staff, depending on the specific symbology intended by the artist.\nA depiction of many armed dancing Ganesh in the style known as patachitra (paint and pen on silk), from Orissa provence, east India. Photo credit: Kashgar\nGanesh may be portrayed as standing, seated, in tantric yoga pose, dancing, crawling as a child (with his favourite laddoo sweet in one hand), or even seated on his mother's knee. When seated, he may be crossed legged or with one leg tucked under him in the position known as \"royal ease\". His mount or vehicle is usually the humble mouse, often shown at his feet looking adoringly up at him and offering a laddoo sweet in his paws. The combination of elephant and mouse represents the removal of all obstacles of any size and the ability of Ganesh to control even the most unpredictable of creatures and situations.\nThere exist a large number of legends, myths and stories relating to Ganesh and his appearance, all reflecting the wealth of symbolism that attends him. The most famous is how he came to have an elephant's head. It is said that the goddess Parvati, wishing to bathe, created a boy and assigned him the task of guarding the entrance to her bathroom. When her husband Shiva returned from one his interminable battles, he was denied access by Ganesh and killed the boy in a fit of petulant rage, striking his head off with his sword. Parvati was understandably upset and so to soothe her Shiva sent out his warriors to fetch the head of the first dead creature they found, which happened to be that of an elephant. The head was attached to the body of the boy and he was brought back to life. The elephant's head symbolises unmatched wisdom and the gaining of knowledge through reflection and listening. And because of his role as his mother's doorkeeper, he is often placed facing doorways to keep out the unworthy.\nSome of the stories surrounding Ganesh are conflicting in nature, for example how his tusk came to be broken. One popular story is that he broke it off himself in order to write down the Mahabharata, one of the world's longest epic poems, as it was dictated to him by the sage Vyasa. In the process of writing, Ganesh's pen failed and so he snapped off his tusk as a replacement in order that the transcription not be interrupted. The broken tusk therefore symbolises sacrifice (particularly in the pursuit of artistic endeavours) and reiterates Ganesh's role as patron of the arts and of letters. However, another version of the broken-tusk story emphasises Ganesh's loyalty and devotion. In this account, his father Shiva decided to take a nap and asked Ganesh to guard him. A proud Brahmin warrior named Parashuram came to visit Shiva but was stopped from waking him by Ganesh. Parashuram was furious and fought with him, finally throwing his ax at his head. Ganesh stopped the ax with his tusk which broke, giving him the nickname Eka-danta, or \"One Toothed.\"\nAnother common icon associated with Ganesh is that of the snake. According to one Purana, Ganesha simply wrapped the serpent king Vasuki around his neck. Ganesh may also be portrayed using the snake as a sacred thread, aloft in both hands, coiled at his ankles or as a throne. However the best known story of all concerns Ganesh wrapping the snake around his stomach as a belt. According to the legend, on one of his birthdays, Ganesh went from house to house accepting offerings of sweet puddings (in one version of the story the offerings are cakes made by a baker, who wishes to thank Ganesh for his good fortune in business). Out on the road his mount the mouse stumbles, having seen a snake and become frightened, with the result that Ganesh tumbles off. His stomach bursts open and all the sweet puddings fall out. Unwilling to leave them on the ground for all to see (or in the second version, for the baker to see on his way home from the bakery), Ganesh stuffs them back into his stomach and, catching hold of the snake, ties it around his belly. In some versions, the story simply stops there. But in others, the moon in the sky, on seeing this, has a hearty laugh at his expense. Annoyed, Ganesh pulls off one of his tusks and hurls it at the moon. Once again, the symbology behind the mouse, snake, Ganesh's belly and its relationship to the moon on his birthday is highly significant, his belly representing as it does the entire cosmos which is held together by the cosmic energy of the snake kundalini.\nWith the association of benevolence, intelligence and strength that comes with his elephant countenance and the delightful stories that surround his creation, it is easy to understand why Ganesh is revered so highly in his homeland. But why is he also loved throughout the world? From the 10th century onwards Ganesh became the principal deity of the traders and merchants who went out of India seeking commercial trade. In later centuries many Hindus migrated to other countries and took their culture, including Ganesh, with them. Buddhism has a particular affinity for Ganesh, representing as he does the kindest of principals associated with personal success. And since the 20th Century, Ganesh has become a favourite mascot of Western countries, partially because of the westerner's love of elephants but also because of the rewards Ganesh promises when present to oversee daily affairs. Ganesh has even made appearances on the iconic television show The Simpsons - on one particularly memorable occasion Homer tries to offer him a peanut and is admonished by Apu for his irreverence.\nSouthern Indian amulet, silver, featuring the double good luck of Ganesha, left, and Laxmi, right. Early 20th century. Photo credit: Kashgar\nGanesh is also often associated with the goddess of luck and prosperity, Lakshmi, and the two form a typical motif on many protective Indian amulets, providing a double whammy to the wearer in the form of success and wealth married together.\nReferences and Further Reading\nBrown, Robert 1991. Ganesh: Studies of an Asian God. State University of New York Press, Albany\nGetty, Alice 1936. Ganesha: A Monograph on the Elephant-Faced God (reprinted 1992) Clarendon Press, Oxford\nLama, Mukhiya N 2003. Ritual Objects and Deities: an Iconography on Buddhism & Hinduism. Lama Art Publishing\nVaidyanathan, Sunil 2003. Ganesha, the God of India. English Edition. English Edition Publishers and Distributors (India) Pty Ltd.\nWikipedia 2008. Ganesha. Accessed Mach 2017\nComments will be approved before showing up."
] | [
"<urn:uuid:0098fe5a-ed2e-47fb-bc2e-aeb0a76a6629>"
] | [
"CC-MAIN-2020-05"
] | [
"https://kashgar.com.au/blogs/gods-goddesses/the-hindu-god-ganesh-who-is-this-elephant-headed-deity-anyway"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606872.19/warc/CC-MAIN-20200122071919-20200122100919-00412.warc.gz"
] | [
"en"
] | [
0.9780591726303101
] | [
2107
] | [
2.6875
] | [
3
] |
[
"I love it when people, places, things, or events recorded in ancient texts turn out to be real and exactly as described. Two thousand years ago Cicero wrote twice about seeing geared devices that predicted the movements of celestial bodies, but modern scholars thought he was making it up. The ancient Greeks couldn’t possibly have invented such advanced machinery. Or could they?\nHere is an x-ray of one of the original pieces:\nNew Scientist has a very thorough article on the discovery and reconstruction of this machine. I found the last section the most interesting:\nHistorians have often scoffed at the Greeks for wasting their technology on toys rather than doing anything useful with it. If they had the steam engine, why not use it to do work? If they had clockwork, why not build clocks? Many centuries later, such technology led to the industrial revolution in Europe, ushering in our automated modern world. Why did it not do the same for the Greeks?\nanswer has a lot to do with what the Greeks would have regarded as useful. Models of people and animals, like those of the cosmos, affirmed their idea of a divine order. Gadgets like Hero’s were also used to demonstrate basic physical laws in pneumatics and hydraulics.\n. . .\nRather than being toys, devices like the Antikythera mechanism were seen as a route to understanding and demonstrating the nature of the universe – a way to get closer to the true meaning of things. To what better use could technology be put?"
] | [
"<urn:uuid:e31aa40a-5a2d-42a5-be2e-887e5263c9ae>"
] | [
"CC-MAIN-2017-30"
] | [
"https://classicalbookworm.wordpress.com/2008/12/11/the-antikythera-mechanism/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500550969387.94/warc/CC-MAIN-20170728143709-20170728163709-00609.warc.gz"
] | [
"en"
] | [
0.9753457307815552
] | [
311
] | [
3.25
] | [
3
] |
[
"The word ‘culture’ is colloquially known as a set of beliefs, behaviours and norms that have been passed down for generations. Putting this into the perspective of a professional setting, it can briefly describe the shared beliefs and values that govern the workers of an organization; Essentially being referred as its DNA, the set of shared values contributing to how the organisation’s body runs. Having said that, changing the culture can be difficult in the perspective of both the workers and leaders of an organisation.\nIn an ever growing competitive and fast-paced world, change is necessary for an organization to improve and/or survive. However, leaders may struggle to motivate and engage their workers in assent to changes because the leaders themselves have to adopt a leadership style to cater to cultural changes. In a worker’s perspective, resisting to change from the uncertainty that may affect them, be it in loss of value, their job, or the fear of them being unable to adapt to these changes is inevitable. Uncertainty has a direct correlation to resistance, and this ultimately leads to insecurity which is an essential factor of Maslow’s hierarchy of needs.\nAs mentioned before, leaders have their fair share of difficulties in these changes. The leaders’ actions and behaviours have a direct impact on the culture of an organization and a change within may cause unforeseen discrepancies. When it comes to an organisational setting, leaders are the integral figures in setting the tone for what is acceptable, and this shapes the culture of the company. A related issue would also be because a change of organisational culture would require a large-scale undertaking, and this would require time, effort and change of policies, which may not settle well for employees and these problems may arise in situations such as mergers of companies.\nA good example of an organisation that faced difficulties in changing their culture is SMRT. It was reported back in November 2017 by Desmond Quek- president of SMRT stating that the recurring issues boil down to ‘deep-seated cultural issues’ that need time to fix.\nChanges may be necessary and inevitable as it can cement an organisation’s growth or survival, but with so many factors to be considered, it shows the difficulties in changing the culture of an organisation."
] | [
"<urn:uuid:478703c6-aff0-4596-bbff-85e48fd76c40>"
] | [
"CC-MAIN-2020-05"
] | [
"https://happywheelsonlinegame.net/the-said-that-changing-the-culture-can-be-difficult/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593994.14/warc/CC-MAIN-20200118221909-20200119005909-00516.warc.gz"
] | [
"en"
] | [
0.96619713306427
] | [
461
] | [
2.515625
] | [
3
] |
[
"BISMARCK, N.D. (AP) — North Dakota and South Dakota are celebrating their 123rd birthdays.\nThe two states entered the Union on Nov. 2, 1889. President Benjamin Harrison signed the admission papers for the two states on that day. North Dakota became the 39th state, and South Dakota the 40th.\nNorth Dakota Secretary of State Al Jaeger says people should use the day to reflect on the state's past and the prospects for its future. He says he thinks of the pioneers who built the state, and how fortunate it is to have a good economy."
] | [
"<urn:uuid:5b2ac02f-5de1-4700-84a8-35ad08d76967>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.dailypress.com/news/aan-sd-nd-celebrate-123rd-birthdays-today-20121102,0,6391506.story"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00024-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9706079959869385
] | [
122
] | [
2.671875
] | [
3
] |
[
"Get help with any kind of project - from a high school essay to a PhD dissertation\nSustainability is becoming and important concern in the globe as the Green Motion continues to get popularity. One area where research has been conducted to look for a more sustainable production process is plastic films. Plastic material films are thought as a packaging material, generally significantly less than ten mils (a mil is normally 0.001 inch) thick, with typically 0.7-1.5 mils, that can be utilized as a wrapper or bag. They are comprised of a broad selection of materials, which may be simple or complex based on just what a particular product or package demands (Osborn & Jenkins, 1992). There are two primary categories of films found in packaging, conventional movies and sustainable films. Standard plastic films are a lot more widely used and also have a more substantial market than sustainable films. The film could be made out of different resins, each which have unique structures and so are well suited for specific applications. The movies could be colored or clear, printed or plain, solitary- or multilayered and so are often coupled with other materials such as for example aluminum and paper. Types of plastic movies usages include Ziploc luggage, trash luggage, grocery sacks, drycleaner luggage, and plastic material wrap. The just common characteristic of most plastic regular film is that it's flexible in nature. The most typical resin used to produce these plastic film deals is low-density polyethylene (LDPE). As a film LDPE provides decent clarity, is an excellent dampness and gas barrier, and it can be heat sealed while retaining its versatility and strength. Polypropylene (PP) can be a common resin used to create plastic film. It has a great moisture barrier, great transparency, gloss, and tensile power. The PP resin includes a high melting stage also, which makes it befitting packages that require to be st..."
] | [
"<urn:uuid:368dafaf-e268-4992-b583-38ce88847ec3>"
] | [
"CC-MAIN-2020-05"
] | [
"https://studybay.com/example-works/essay/writing/1009190/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601628.36/warc/CC-MAIN-20200121074002-20200121103002-00351.warc.gz"
] | [
"en"
] | [
0.946172833442688
] | [
395
] | [
3.265625
] | [
3
] |
[
"Mill Creek Wetlands: Humboldt County, California, 2015\n- von Dohlen, Jerry\n- This polygon shapefile depicts boundaries of the Mill Creek Wetlands in the County of Humboldt, California. The McKinleyville Community Plan adopted in December 2002 designated the Mill Creek Wetlands as a floodplain and part of the McKinleyville Planning Area for land use planning, riparian habitat management and flood control purposes. These data were derived from the California Department of Fish and Wildlife mapping of wetland areas as it appeared in the Report for Wetlands in McKinleyville as Revealed by Infrared Aerial Photograph Interpretation (Winzler & Kelly, Feb., 1993), and was described in Hydrology and Ecology in the Mill Creek Corridor, McKinleyville, CA (Oscar Larson & Assoc., Mar., 1995). The Humboldt County Planning and Building Department is responsible for protecting the public health, safety and welfare via building permit review and inspections consistent with California model codes as well as planning and development review and approval consistent with the county's General Plan. This Department oversees the Advance Planning Division, which is responsible for the Humboldt County's Geographic Information System (GIS) that is utilized by other County Departments; many federal, state and local agencies; and the general public. This coverage can be used for basic applications such as viewing, querying, and map output production, or to provide a basemap to support graphical overlays and analyses of geospatial data. Humboldt County Planning and Building Department. (2015). Mill Creek Wetlands: Humboldt County, California, 2015. Humboldt County Planning and Building Department. Available at: http://purl.stanford.edu/gg728xz6041. McKinleyville Community Plan (adopted December 2002): http://www.humboldtgov.org/DocumentCenter/Home/View/287 The County of Humboldt makes no guarantee of the quality or completeness of this data. It has not been fully reviewed for accuracy and is intended to be used for planning purposes only. The department assumes no liability or responsibility in the use of this data. While every effort has been made to assure the accuracy of this information, it should be understood that it does not have the force and effect of law, rule, or regulation. In the event of any difference or error, the law will take precedence. The accuracy of map data varies from location to location in the county. While the GIS is useful for planning purposes, it should not be relied upon to determine property, zoning or general plan designation boundaries or be used in any way for project design. All GIS data should be verified before it is materially relied upon for property or project planning. In urban areas the GIS map data maybe inaccurate by as much as 50 feet in any direction. In rural areas the map data may be inaccurate by as much as 400 feet in any direction. This layer is presented in the WGS84 coordinate system for web display purposes. Downloadable data are provided in native coordinate system or projection.\n- Humboldt County Planning and Building Department\n- Humboldt County, California GIS Maps & Data\n- Humboldt County (Calif.) and McKinleyville (Calif.)\n- Floodplains, Wetlands, Rivers, Hydrography, Boundaries, and Inland Waters\n- Held by\n- More details at\n- Use and reproduction\n- This item is in the public domain. There are no restrictions on use.\n- This work is in the Public Domain, meaning that it is not subject to copyright.\n|Click on map to inspect values|"
] | [
"<urn:uuid:5b31f072-879b-4090-bfe4-d3499b90a330>"
] | [
"CC-MAIN-2023-14"
] | [
"https://earthworks.stanford.edu/catalog/stanford-gg728xz6041"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00384.warc.gz"
] | [
"en"
] | [
0.9063441157341003
] | [
830
] | [
2.65625
] | [
3
] |
[
"Dustin Kiggins, Staff Writer\nIn recognition of Academic Integrity Week on Wednesday, librarians from Ethel K. Library presented students with tips on how to avoid plagiarism when doing research and writing papers for class and future careers.\nThe presenters showed examples to students on plagiarism in music to see if the students understood the difference between what was and wasn’t plagiarized. This was so they had an idea of what to look for when presented with a written work.\n“Music is different because there are only a few beat patterns that are used a lot,” said Amee Odem, a Wingate librarian. “If you are doing a parody of a song that is fine but if you want to use someone else’s song in part or entirely you must ask for permission first and pay royalties.”\nThe ability to properly cite other works when writing is important because it gives proper credit to the author of the original work.\n“You need to treat citations as a conversation that you’re having with others,” said Kevin Winchester, director of the writing center. “When you cite works and then write your own you are joining the conversation and then contributing to it by writing your own that will one day be cited as a source in another work.”\nWith citations you can also trace back the history of cited works and find things that you may have never seen before.\n“Citation chaining is a neat trick where you can jump from one work to the next just by following their works cited sources,” Winchester said. “I’ve spent hours just going through other works to see all of the other works that someone else already cited.”\nIn order to emphasize the importance of citing, the presenters told several stories about people who didn’t properly cite their works and it ended their career. Odom told the story of Joseph Netti and Anil Potti who fabricated research data collected during their cancer study.\n“The cancer society had funded their project at Duke University and they were fabricating data,” Odom said. “They were conducting studies with data that wasn’t properly verified and cited which was a problem since they were conducting studies on patients.”\nThis led to Duke University and the researchers to lose all scientific credibility that they once had. “Use this as an example as to what can happen if you don’t use proper citation methods.” Winchester chimed in.\nThe presenters advised students that changing one word in a portion of a work or using outside sources need to be cited.\n“If you use anything from another work that is a direct quote, summary or paraphrase you need to cite it,” Winchester said. “There needs to be a path of search results showing you cited your work properly. The best thing to do is to keep a running citation of all the works you used in a paper,” Winchester said, “along with a bibliography of all the sources that you may have considered to ensure you aren’t plagiarizing.”\nA representative of the honor council noted that when it comes to plagiarism, ignorance isn’t bliss.\nPhoto Source: Al Young\nEdited by: Brea Childs"
] | [
"<urn:uuid:d847a609-9267-48bf-a412-ea81d60513e9>"
] | [
"CC-MAIN-2017-26"
] | [
"https://theweeklytriangleonline.wordpress.com/tag/events/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00621.warc.gz"
] | [
"en"
] | [
0.9690300822257996
] | [
686
] | [
2.96875
] | [
3
] |
[
"Other benign ovarian enlargements\nWhether they are cystic or solid or a combination of both, other benign ovarian tumours generally continue to grow and will eventually cause problems. The most common are dermoid cysts and cystadenomas.\nDermoid cysts are extraordinary. They are thought to arise from an ovum that has, for some unknown reason, been stimulated to progress towards foetal development but in a totally disorganized way. Dermoids are most common in women under the age of 30, and are found on both ovaries in around a quarter of cases.\nDermoids are a mixture of solid tissue and cysts, and can contain any body tissue including lung, nervous tissue, skin, hair, teeth, bone and cartilage. The sebaceous and sweat glands in the skin produce an oily fluid that fills cysts and is severely irritating and damaging to the lining of the pelvic and abdominal cavities if a dermoid cyst ruptures.\nCystadenomas are benign overgrowths of cells that secrete watery or mucous fluids. Fluid often collects to form multiple cysts within an outer capsule. The mucous type contains a gelatinous fluid and can grow to enormous size: some have weighed over 20 kg. These cysts can usually be distinguished from follicular and corpus luteum cysts by ultrasound.\nDermoids and cystadenomas won’t disappear spontaneously and can be complicated: they may twist or rupture. Also, they can occasionally become malignant so removal is always advised.\nThough ovarian cancer is much less common than cervical or endometrial cancer, it causes more deaths than any other malignancy of the reproductive tract. It is the fourth most common cause of cancer death in Australian women, after that of breast, lung and large bowel.\nOvarian cancer is more common in women over the age of 40, and especially after the menopause. It is particularly malignant because it develops rapidly and spreads early and widely, often before it has caused any symptoms and when the ovaries aren’t noticeably enlarged. There is no screening test for ovarian cancer, and no particular group of women who should be watched carefully for it.\nEarly diagnosis before spread is uncommon; it is usually a chance discovery further investigation of a slightly enlarged ovary found at routine examination. Sadly, the symptoms of ovarian cancer are usually from the effects of its spread within the abdominal and pelvic cavities. These include indigestion, abdominal discomfort, swelling of the abdomen due to accumulation of fluid, weight loss and loss of energy.\nTreatment is by surgery to remove ovaries, uterus and tubes, and all visible signs of spread. Unless it is certain that the tumour hasn’t spread beyond the ovaries, postoperative anticancer drugs (chemotherapy) and radiation therapy are used. Chemotherapy is often used when it appears that all tumour has been removed, in the hope of subduing growth of any microscopic spots.\nThe outlook depends on the type of cancer and the degree of spread. Your women generally survive longer.\nTags: Women’s Health"
] | [
"<urn:uuid:d73bb5de-1328-4438-af3d-f694cd8f6b76>"
] | [
"CC-MAIN-2013-20"
] | [
"http://landhealthdrugs.com/2009/03/women-other-benign-ovarian-enlargements-ovarian-cancer/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382398/warc/CC-MAIN-20130516092622-00032-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9456734657287598
] | [
646
] | [
2.640625
] | [
3
] |
[
"In a biological rendition of fiction's Strange Case of Dr. Jekyll and Mr. Hyde, researchers from the Mayo Clinic campus in Florida and Harvard Medical School have found that a protein thought to protect against cancer development can actually spur the spread of tumors.\nThe scientists, reporting in the Sept. 3 issue of Molecular and Cellular Biology, found that FOXO3a, a transcription factor that regulates gene expression, becomes active when growing cancer cells begin to starve. Their research suggests that this protein then turns on molecular switches that allow the cancer cells to invade surrounding tissues.\n\"This is a complete reversal of what everyone thought about FOXO3a — that we should find a way to activate this transcription factor so as to fight cancer growth,\" says cancer biologist Peter Storz, Ph.D., the study's lead investigator from Mayo Clinic in Florida. Findings from the study, which was funded in part by the Florida Department of Health, illustrate the growing recognition in the research community that proteins can play multiple roles with respect to tumor progression, he says.\n\"More and more we see that, when it comes to cancer, proteins can have split personalities,\" Dr. Storz says. \"Proteins once firmly believed to be tumor suppressors that protect against cancer development have recently been found to act as oncogenes, or cancer promoters, in certain cancers and in some biological circumstances. We now understand that proteins behave in different ways, depending on the cellular context.\"\nDr. Storz and his laboratory colleagues focus on understanding how cancer cells spread. This study builds upon a recent finding by collaborating author Alex Toker, Ph.D., associate professor, Department of Pathology, Harvard Medical School. Dr. Toker had found that Akt, a protein that protects tumor cells from programmed cell death and induces proliferation of cancer, in some circumstances also inhibits tumor cell invasion. \"This is an important protein that dogma said acts as an oncogene but which Dr. Toker demonstrated could also inhibit cancer spread, and thus may act as a suppressor for metastasis,\" Dr. Storz says.\nBecause Akt is an important negative-regulator of FOXO3a, the team looked at whether FOXO3a was actually the player with the Jekyll and Hyde split personality. They found that the transcription factor does indeed revert to its dangerous persona when a cancer cell becomes starved. \"Our hypothesis is that if a cancer cell doesn't get the nutrients it needs, it turns on FOXO3a, which leads to the migration and invasion of tumor cells into areas with better growth conditions,\" Dr. Storz says. \"This data fits neatly with Dr. Toker's findings about Akt, because Akt targets FOXO3a.\"\nThe study was funded by a Bankhead-Coley Grant from the Florida Department of Health, and by support from the Department of Defense and the National Institutes of Health.\nCite This Page:"
] | [
"<urn:uuid:5904f732-4eeb-4160-ad4c-1aa8dad03883>"
] | [
"CC-MAIN-2014-10"
] | [
"http://www.sciencedaily.com/releases/2009/09/090903163856.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010509865/warc/CC-MAIN-20140305090829-00089-ip-10-183-142-35.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9595417976379395
] | [
604
] | [
2.671875
] | [
3
] |
[
"How to have a healthy heart: Calm your mind\nStress and heart disease go hand-in-hand, says Dr Martha Gulati, director of women's cardiovascular health at Ohio State University, US. If you're constantly frazzled, your body's high levels of stress hormone cortisol can lead to a rapid heartbeat and high blood pressure, a potentially deadly combo. Too much cortisol can damage arterial linings, making it harder for blood to deliver nutrients to your organs.\nKnock down your stress level by hitting the mat! A study published in the International Journal of Medical Engineering and Informatics found that heart rate variability, a sign of a healthy heart, has been shown to be higher in yoga practitioners than in non-practitioners.\nLauren Maher, a yoga therapist, recommends starting with the uber-relaxing \"cat-cow\" pose: get onto your hands and knees and slowly inhale while arching your back toward the ceiling; slowly exhale and round your back down toward the floor. Repeat for three minutes.\nHow to have a healthy heart: Have more sex\nGetting busy at least twice a week can reduce your risk of heart disease by lowering blood pressure and reducing stress, recommends obstetrician and gynaecologist Dr Andrew Scheinfield. You'll still be helping your heart even if you don't always reach the big O; researchers suspect that just being aroused can trigger your brain to release hormones such as dehydroepiandrosterone, which may improve circulatory-system function and boost cardiac performance.\nNo partner? No worries. \"I encourage my patients to take matters into their own hands,\" says Dr Scheinfeld. And science backs him up. Numerous studies show that women who experience increased sexual frequency and satisfaction - with a mate or on their own - have a greater resistance to heart disease.\nHow to have a healthy heart: Floss every day\nGum disease doesn't just make for foul breath and a mangled smile - it's also murder on your heart. If you're breeding bacteria between your teeth, your immune system is on chronic high alert, a condition called inflammation that taxes your vital organs, including your heart.\nIn fact, a woman's chance of having a heart attack may double if she has gum disease, according to the Academy of General Dentistry, US. Flossing is the best way to banish oral bacteria, so whip out that string every night before brushing your teeth, says dentist Dr Mark Schlesinger.\nHow to have a healthy heart: Get a move on!\nConsider this: on a minute-by-minute basis, your heart muscle labours twice as hard as your leg muscles during a sprint. And you have to work your heart out to keep it working. The Heart Foundation recommends at least 30 minutes of moderate-intensity exercise, on most, if not all, days of the week (think brisk walking or cycling) and that regular vigorous activity (ie cardio that's intense enough to make carrying on a conversation difficult) gives you extra protection against heart disease. But the most important aspect of exercise is making it a habit. \"Time is not as important as frequency,\" says fitness coach Scott Danberg. Start easy with a 15-minute workout like this Total-body strength workout.\nHow to have a healthy heart: Skip the salt\nYou should bypass most salt shakers, says cardiologist Dr Ashley Simmons. Your body counteracts sodium intake by releasing extra water into the blood, leading to increased blood volume and a seriously overloaded heart."
] | [
"<urn:uuid:66cac57b-aec7-49f4-8a40-a3017f8e0d78>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.womenshealth.com.au/how-to-have-a-healthy-heart"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251684146.65/warc/CC-MAIN-20200126013015-20200126043015-00066.warc.gz"
] | [
"en"
] | [
0.9353898763656616
] | [
723
] | [
2.921875
] | [
3
] |
[
"Leopold and Queen Victoria kept up a regular correspondence throughout their lives, and their letters show their affection and respect for each other. Leopold’s reveal his character in the most amiable light. He was her trusted confidant and advisor in both political and personal matters, and Victoria confided in him unreservedly. He familiarised her with the complicated details of foreign politics, warned and encouraged her and answered her enquiries with the minutest care.\nA letter by Queen Victoria to Leopold, written on the conclusion of a visit of Leopold to England.\nWINDSOR CASTLE, 19th September 1837.\nMY DEAREST, MOST BELOVED UNCLE,\nOne line to express to you, imperfectly, my thanks for all your very great kindness to me, and my great, great grief at your departure! God knows how sad, how forlorn, I feel! How I shall miss you, my dearest, dear Uncle! every, every where! How I shall miss your conversation! How I shall miss your protection out riding! Oh! I feel very, very sad, and cannot speak of you both without crying!\nFarewell, my beloved Uncle and father! may Heaven bless and protect you; and do not forget your most affectionate, devoted, and attached\nNiece and Child,\nKing Leopold paid several visits to England and Queen Victoria visited Belgium in September 1843. The Belgian newspapers were full of her visit. Charlotte, then in her second year in the Pensionnat, saw the Queen passing along the Rue Royale on her way to the Palace, which was only a stone’s throw from the school.\nThe Queen, accompanied by Prince Albert, landed at Ostend on Friday, 15 September, and from the outset her visit was a source of good humour and amusement to all concerned. It included all the principal towns of Belgium, and everywhere she went she was greeted by illuminations and fireworks by night and parades and concerts by day.\nOn Monday, 18 September, her arrival in Brussels was fixed for one o’clock in the afternoon. To ensure a good turn-out for her the burgomaster had put out a proclamation which Charlotte and everyone else in town would have seen posted on the public buildings. It read: ‘Fellow Citizens! I have the great pleasure of informing you that H.M. the Queen of England will visit the capital of Belgium where she will make her entry by the Porte de Cologne on Monday at 1 p.m. and will drive to the Palace by the Boulevard du Jardin and the Rue Royale.’\nFlagpoles decorated with flowers were set up along the route. It was at the point nearest the Pensionnat, in the Rue Royale, that Charlotte saw the Queen. Answering Emily’s letter, who inquired her about it, she wrote on 1 October:\n“…You ask about Queen Victoria‘s visit to Brussels. I saw her for an instant flashing through the Rue Royale in a carriage and six, surrounded by soldiers. She was laughing and talking very gaily. She looked a little stout, vivacious lady, very plainly dressed, not much dignity or pretension about her. The Belgians liked her very well on the whole. They said she enlivened the sombre court of King Leopold, which is usually as gloomy as a conventicle…”\nThe Queen was in an open carriage with Queen Louise of the Belgians beside her and King Leopold and Prince Albert with their backs to the horses. The royal party attended a concert in the Park that afternoon and in the evening drove into the city to see the illuminations, which the newspapers declared were the finest since the Independence celebrations of 1830. Queen Victoria sailed back to England form Antwerp on 20 September.\nCharlotte, on 10th December the same year, again witnessed the presence of the King and Queen, when she attended a concert of the recently opened Salle de la Grande Harmonie. She gives an accurate account of this event in the following passage from Villette, where she portrays the King and Queen of Labassecour:\n“….Till then, I had never set eyes on living king or queen; it may consequently be conjectured how I strained my powers of vision to take in these specimens of European royalty. By whomsoever majesty is beheld for the first time, there will always be experienced a vague surprise bordering on disappointment, that the same does not appear seated, en permanence, on a throne, bonneted with a crown, and furnished, as to the hand, with a sceptre. Looking out for a king and queen, and seeing only a middle-aged soldier and a rather young lady, I felt half cheated, half pleased.\nWell do I recall that King – a man of fifty, a little bowed, a little grey: there was no face in all that assembly which resembled his. I had never read, never been told anything of his nature or his habits; and at first the strong hieroglyphics graven as with iron stylet on his brow, round his eyes, beside his mouth, puzzled and baffled instinct. Ere long, however, if I did not know, at least I felt, the meaning of those characters written without hand. There sat a silent sufferer – a nervous, melancholy man. Those eyes had looked on the visits of a certain ghost – had long waited the comings and goings of that strangest spectre, Hypochondria. Perhaps he saw her now on that stage, over against him, amidst all that brilliant throng. Hypochondria has that wont, to rise in the midst of thousands – dark as Doom, pale as Malady, and well-nigh strong as Death. Her comrade and victim thinks to be happy one moment – ‘Not so,’ says she; ‘I come’. And she freezes the blood in his heart, and beclouds the light in his eye.\nSome might say it was the foreign crown pressing the King’s brows which bent them to that peculiar and painful fold; some might quote the effects of early bereavement. Something there might be of both these; but these as embittered by that darkest foe of humanity – constitutional melancholy. The Queen, his wife, knew this: it seemed to me, the reflection of her husband’s grief lay, a subduing shadow, on her own benignant face. A mild, thoughtful, graceful woman that princess seemed; not beautiful, not at all like the women of solid charms and marble feelings described a page or two since. Hers was a somewhat slender shape; her features, though distinguished enough, were too suggestive of reigning dynasties and royal lines to give unqualified pleasure. The expression clothing that profile was agreeable in the present instance; but you could not avoid connecting it with remembered effigies, where similar lines appeared, under phase ignoble; feeble, or sensual, or cunning, as the case might be. The. Queen’s eye, however, was her own; and pity, goodness, sweet sympathy, blessed it with divinest light. She moved no sovereign, but a lady – kind, loving, elegant. Her little son, the Prince of Labassecour, a young Duc de Dindonneau, accompanied her: he leaned on his mother’s knee; and, ever and anon, in the course of that evening, I saw her observant of the monarch at her side, conscious of his beclouded abstraction, and desirous to rouse him from it by drawing his attention to their son. She often bent her head to listen to the boy’s remarks, and would then smilingly repeat them to his sire. The moody King started, listened, smiled, but invariably relapsed as soon as his good angel ceased speaking. Full mournful and significant was that spectacle! Not the less so because, both for the aristocracy and the honest bourgeoisie of Labassecour, its peculiarity seemed to be wholly invisible: I could not discover that one soul present was either struck or touched.”"
] | [
"<urn:uuid:54ee78be-df2c-400c-ad04-f7f2af11ed63>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.thebrusselsbrontegroup.org/the-brontes-in-brussels/history/leopold-victoria/leopold-i-and-queen-victoria-2/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00378.warc.gz"
] | [
"en"
] | [
0.9760281443595886
] | [
1711
] | [
2.84375
] | [
3
] |
[
"- Read a few of our sample essays on your topic\n- Develop your own ideas\n- Your paper will practically write itself\nIn the novel Animal Farm there were many similar events that took place. An old pig by the name of Old Major gave a very significant speech to the other animals, which spoke of a revolt against human beings. Snowball was the leader of the revolution. Napoleon, another pig, took over and ruled over the other animals. The animals were soon unable to survive. They had to rely on the humans, whom they had revolted against at the beginning, for existence. In the novel Animal Farm the characters, Old Major, Benjamin, Snowball and Napoleon can be directly compared to the real figures of Marx, the Russian population, Trotsky and Stalin.\nThe old and wise pig Old Major, from Animal Farm, can be directly compared to the real figure of Karl Marx. Old Major gave a great and inspiring speech about a better life for animals, just as Marx had written in the Manifesto. Old Major's words were very powerful and they were the foundation of the animal revolution. Karl Marx's \"Communist Manifesto\" was an influential piece of literature written to the Russia people. This is similar to Old Major. He was respected and looked up to for his wisdom and great thoughts. All the animals on the farm listened to him and hung onto every word he said. When Marx wrote the \"Communist\nQuotes talked about in this paper\n- Marx wrote the \"Communist Manifesto\", ...\nNames mentioned in this research paper\nJoseph Stalin, Napoleon, the leader, the person, Karl Marx, Benjamin, George Orwell,\nLocations mentioned in this research paper\nKeywords talked about in this research paper\nAnimal Farm, Old Major, Stalin, Napoleon, Snowball, Russian people, Trotsky, Karl Marx, the russian, Joseph Stalin, revolution,"
] | [
"<urn:uuid:17eef023-f189-4cef-81c4-d586166c05b4>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.directessays.com/viewpaper/151.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164037762/warc/CC-MAIN-20131204133357-00089-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9798030257225037
] | [
383
] | [
3.609375
] | [
4
] |
[
"Smiles: When You and Your Entire Team Can Work Without Interruptions Caused By Malware…\nThere will always be threats from viruses and other types of malicious computer programs.\nBelieve it or not, there are entire industries that exist specifically to create these types of malicious software (“mal-ware”) and programs.\nPeople that are in these industries (sometimes called “bad actors”) are always coming up with new ways to wreak havoc on your technology.\nThere is no end in sight to these threats.\nYou may have also heard of things like spyware, worms, trojans, ransomware, among others – these are all products of these “bad actor” industries.\nLately, these “bad actors” have been using something called Ransomware.\nRansomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.\nRansomware can cause quite a bit of damage to your business.\nIf your computers or servers end up with ransomware, the company records on those devices could potentially be deleted if you don’t pay soon enough.\nJust to “add insult to injury” – in some cases, victims’ data and company records were deleted even after they paid.\nOn top of that, ransomware attacks have been on the rise.\nIn 2017, 15 new ransomware families were predicted to be discovered each month.\nCan you imagine how you would react if your business’ company records were held for ransom?\nHow much would you pay?\nHow much would your company records be worth to you?\nThis is why prevention is key.\nYou never know when malware will strike or how bad it will hurt your business.\nIf it does, then you and your business are at the mercy of these hackers.\nEnter Premium Antivirus and Anti-Malware\nWith premium antivirus and anti-malware you can protect against known viruses and catch new, hard-to-detect malware threats.\nIt will help to keep both known and emerging malware off your workstations and servers.\nPremium Antivirus and Anti-Malware not only stay up to date with the latest threats using traditional signature-based protection, but also protect against new viruses using sophisticated heuristic checks and behavioral scanning.\nThese actions will add benefits like:\n- Minimized risks associated with receiving infected files.\n- More secured valuable company files, so they aren’t compromised or destroyed by infections.\n- Prevention of intruders accessing unauthorized data.\n- Prevention of “bad actors” manipulating, entering, and controlling your system.\n- Minimized risk of infection while surfing the Internet (i.e. shopping online, online banking, etc.).\nThese benefits are sure to add a new level of safety and security to you and your business.\nWith new threats created each day, your business will be protected by using these proactive methods – to help ensure rock-solid malware protection.\nReady to protect your business technology and make it more secure?"
] | [
"<urn:uuid:3ad663e5-769d-4ea5-a964-c2ac93eba5e9>"
] | [
"CC-MAIN-2020-05"
] | [
"https://media-moon.com/premium-antivirus-anti-malware/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592636.25/warc/CC-MAIN-20200118135205-20200118163205-00219.warc.gz"
] | [
"en"
] | [
0.939537525177002
] | [
641
] | [
2.578125
] | [
3
] |
[
"A cataract is a clouding of the normally clear lens of the eye. Cataracts are incredibly common; they are the most common cause of impaired vision or blindness.\nBy age 80 more than half of all Americans have a cataract in one or both eyes, or they have had cataract surgery before then. Diabetics are most prone to developing cataracts, and as the incidence of diabetes is growing worldwide, so too are cataracts.\nLooking at the world through a cataract is like seeing the world through a foggy window. Everything can look blurry and it becomes especially difficult to see clearly at night. Driving at night can be very difficult as bright lights appear to have a halo around them.\nWhy does the lens of the eye become clouded?\nThe short answer to that question is oxidative damage. This means the proteins that comprise the lens of the eye experience continual wear and tear and damage from free radicals.\nWhat causes this damage?\nSugar is a major culprit and that’s why diabetics are very prone to developing cataracts. Other things can promote oxidative damage, including smoking cigarettes, allergies, consuming too much omega 6 rich vegetable oil and not consuming enough antioxidants in your diet.\nSome people believe cataracts are an inevitable part of aging but I disagree and believe there is plenty you can do to protect your vision.\nHow do cataracts form?\nThe lens of the eye is mostly made of protein and water and is located behind the colored part of your eye (iris). The purpose of the lens is to focus the light that enters your eyes, in order to convey a sharp image to the retina. If the lens has become clouded, light that enters the eyes becomes scattered and therefore a blurry image reaches the retina.\nAs we age, it is normal for the lens of the eyes to become less flexible, thicker and less transparent. However if you have poor health and a lot of oxidative damage occurring in your body, this natural process is accelerated.\nFactors that increase your risk of developing cataracts\n- Diabetes, syndrome X, pre-diabetes, metabolic syndrome and insulin resistance\nAll of these conditions are associated with high blood sugar. If there is too much sugar in your bloodstream it binds to various proteins in your body and damages them in a way to produce Advanced Glycation End products (AGEs). When this happens to the lens in your eyes, the damaged protein cannot function properly and takes on a clouded appearance. Diabetics have a three to five times greater risk of developing cataracts. Diets high in sugar, carbohydrate rich foods (anything made of flour or grains) and most vegetable oil. Even if you’re not a diabetic and not overweight, eating a lot of sugar or foods that eventually get digested into sugar can increase your risk of cataracts. Most processed and refined vegetable oil also promotes oxidative damage in the body. Vegetable oil to avoid includes canola oil, cottonseed oil, sunflower, safflower, corn, soy, rice bran and grape seed oil, as well as all margarine. These oils raise the risk of macular degeneration as well as cataracts. The healthiest oils to include in your diet are extra virgin olive oil, coconut oil, macadamia or avocado oil, pastured butter or ghee and other animal fats. These fats are healthy because they are high in monounsaturated or saturated fatty acids, which do not create oxidative damage in the body like some polyunsaturated fats can.\nPeople who suffer with allergies have an overstimulated immune system that releases high levels of inflammatory chemicals. These chemicals cause wear and tear in the body. Cortisone, which is commonly used for allergies and autoimmune disease can raise the risk of cataracts.\n- Excessive exposure of your eyes to ultraviolet light\nIt is best to wear sunglasses on days the sun is very bright or if there is a lot of glare.\n- Lack of antioxidants in the diet\nThe lens of the eye is bathed in a fluid that is supposed to contain high levels of antioxidants. If you do not include enough of these antioxidants in your diet, they will not be present in your eyes to offer you protection from oxidative damage. Vitamins and the colored pigments that give vegetables their color are both equally important for eye health.\n- Smokers are at much higher risk of cataracts and also macular degeneration.\n- Trauma (injury) or surgery to an eye raises the risk of cataract development.\n- Occupations involving welding, glass blowing or metal work raise the risk of cataracts.\n- Having an under active thyroid gland is another risk factor\nWays to protect your vision\nWhether you want to prevent cataracts, or you have already been diagnosed with a cataract in one or both eyes, the following suggestions may help you:\nDiet and lifestyle recommendations\n- Avoid or reduce your intake of sugar, high carbohydrate foods and industrial seed oils (processed vegetable oil high in omega 6 fats).\n- Increase your intake of antioxidants from raw vegetables and fruits. Most people do not consume enough vegetables. Please try to eat one or two large salads each day. Dress your salads with one of the healthy oils mentioned above, along with apple cider vinegar, lemon or lime juice. Include fresh herbs in your salads, such as basil, dill, cilantro, arugula or watercressYou can boost your intake of these nutrients by consuming raw vegetable juices. See my book Raw Juices Can Save Your Life for ideas.\n- Try to get your blood sugar level as close to normal as possible. If you are a diabetic, the better able you are to control your blood sugar level, the less likely you are to experience diabetic complications. Ideal blood sugar is not higher than 99 mg/dL (5.5 mmol/L). If you need help achieving a healthy blood sugar, there is an eating plan in our book Diabetes Type 2 - You Can Reverse It Naturally.\n- Include more spices in your diet. Not only will this make your meals tastier, spices have powerful antioxidant benefits. Turmeric, ginger, cumin, cinnamon, cilantro and cloves are particularly beneficial.\n- You must pay attention to your liver. It is one of the hardest working organs in your body and it must filter and cleanse your bloodstream of all toxins and metabolic wastes. If you have a sluggish liver or a liver disease such as fatty liver or hepatitis, your liver will not do a good job of keeping your bloodstream clean. I suggest you follow the eating recommendations in my book Fatty Liver - You Can Reverse It.\nOrthodox medical treatment\nCataract surgery is one of the most commonly performed medical procedures. Luckily, it is classed as one of the safest medical procedures there is. Surgery is the only effective remedy for advanced cataracts. It involves removing the cloudy, damaged lens and replacing it with an artificial implant. Most people notice an improvement in their vision almost immediately.\nVitamin E capsules\nTake one capsule daily with food. Some research has shown that vitamin E helps to protect against cataract development. Observational studies have shown that people with a higher level of vitamin E in their diet are less likely to develop cataracts. Vitamin E is present in extra virgin olive oil, raw nuts and seeds and avocados. This vitamin is sensitive to heat and is easily destroyed if foods rich in vitamin E are cooked.\nTake 200 mcg daily with food. Selenium is a very important mineral to help reduce your risk of developing cataracts because it is required in order for your body to manufacture glutathione. Glutathione is a powerful detoxifier that helps to mop up free radicals and reduce oxidative damage in your body.\nTake a liver tonic that contains a high dose of the herb St Mary’s thistle, combined with the cofactors required for phase one and two detoxification in the liver. A poorly functioning liver does not cleanse and detoxify the bloodstream well. This leads to excess free radical and oxidative damage to occur throughout the body.\nTake 2 tablets twice daily with meals. The antioxidants in this formula are specific for protecting the eyes against oxidative damage. Lutein, zeathanthin and lycopene are all carotenoid antioxidants found in bright yellow or orange vegetables. Bilberry is specific for helping to protect the eyes and it reduces eye strain and supports healthy vision.\nCataracts are incredibly common as people get older but they are not an inevitable part of aging. Your vision is precious; please do your best to protect it.\nThese statements have not been evaluated by the FDA and are not intended to diagnose, treat or cure any disease."
] | [
"<urn:uuid:c2117f7d-f61a-463a-95e3-3ee520f8fe58>"
] | [
"CC-MAIN-2014-10"
] | [
"http://www.liverdoctor.com/cataracts/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010567051/warc/CC-MAIN-20140305090927-00090-ip-10-183-142-35.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9455538988113403
] | [
1807
] | [
3.109375
] | [
3
] |
[
"Inquiry and Integration in Education (IIE) 2023\nOnline Course | 2 May – 7 October 2023 | 22 weeks\nApplications close on 24 April 2023\nInquiry and Integration in Education (IIE) is a 22-week online course designed to develop\nHigher Order Cognitive Capacities (academic intelligence) in learners. This course will help you:\nAcquire a deeper understanding of ideas across disciplines;\nThink critically beyond your area of specialization;\nDevelop the ability to figure out answers to questions on your own;\nStructure your thoughts and arguments better;\nDevelop clarity and rigor in thinking, reasoning and communicating.\nWho is IIE for?\nAs the course is entirely in English, you would need sufficient proficiency in reading and writing in the language. However, you don’t have to be a specialist in any discipline to take the course. The level of academic knowledge required of you is no more than what is expected of a student who has finished 9th grade.\nThe course would benefit:\nHigh schoolers (Grade 9 and above) who want to go beyond their textbooks\nUndergraduate students who would like to further develop their Higher Order Cognition\nMaster’s and PhD students in any field interested in pursuing research*\nParents who wish to support their children’s intellectual growth\nSchool- and College-level educators keen on helping learners develop Higher Order Cognition\nPolicymakers and administrators working towards meaningful education for the youth in schools and colleges\nIIE would NOT help you if:\nYou are just looking to score higher in exams\nYou are looking for a certificate to add to your qualifications (we provide none)\nYou are not interested in, or unable to make time for serious reading\nYou are not interested in school-level Maths, Physics, Biology, History…\nThinQ also offers a fully self-paced online course called Introduction to Research (ITR), which focuses on developing research abilities. IIE and ITR have much in common, but they focus on different aspects of inquiry and research. Click here to find out more about ITR.\nThe course is organised around 5 elements:\n1. Learning Triggers (LTs): A primary LT is a package made up of readings and videos, designed to develop inquiry and critical thinking abilities. You would receive an LT every alternate weekend.\n2. ThinQabouts: A week after the LT is shared, you would receive questions in the form of a ‘ThinQabout’ to enable you to use the inquiry ability being focussed on that week. These ThinQabouts are designed to help you reflect on how much you have learnt, and have your doubts related to the LT clarified.\n3. Consolidated Feedback: ThinQ facilitators respond to the questions raised in the ThinQabouts through a Consolidated Feedback, to enable participants to learn further from each other’s questions, and facilitator responses.\n4. Discussion Forum: The LTs are interspersed with a Discussion Forum Activity that encourages you to collectively explore questions and ideas with other participants based on what has been learnt so far.\n5. Meetings: Regular online meetings with fellow participants and members of the ThinQ team are a part of the course. We might also organise in-person meetings in select cities, if circumstances permit.\nIf you work through the course diligently, by the end of the course, you will have strengthened your:\ncapacity to engage in rational inquiry (and become a capable debater),\nability to learn independently,\nability to make well-considered decisions in everyday life,\nhabits of mind that allow you to be more thoughtful in your professional, public, and personal lives,\nunderstanding of inquiry/research across academic disciplines.\nAnd if you are concerned with meaningfully educating yourself and/or the young, this is an opportunity to enable yourself/them to imbibe and develop the necessary cognitive capacities not found in formal curricula.\nHere’s what former IIE participants have to say about the course:\nWhat is expected of you?\nTo learn from this course, you need\ncommitment to learning, and\nwillingness to put in the required time and effort.\nTo make the most of IIE, you should spend at least three to four hours a week. That said, the more time you spend on the course content, the more likely you are to benefit from it.\nWe suggest that you read the course materials at least twice, think about them, write down your responses to various tasks in the chapters, and make a note of what you would like to clarify and discuss further. Most importantly, we urge you to engage in collective thinking and learning, by participating actively and articulating your thoughts in the forum discussions.\nCourse Fee and Requirements\nWe offer IIE free of charge. But if you think that you have benefitted from this course, and would like others to benefit from it too, you are welcome to make a donation to ThinQ. We would greatly value your generosity as it would enable us to be of service to other learners. Please get in touch with us at any point before, during or after IIE if you wish to contribute to our cause.\nNote that admission to the course is not automatic. We make a selection based on the information you provide in your application.\nWe do not provide any.\nThe course offers an opportunity to learn something valuable that you are unlikely to find elsewhere.\nFor any queries related to the course, please write to us at [email protected]."
] | [
"<urn:uuid:46731d91-90c3-4353-b336-94541bf00af5>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.thinq.education/iie"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00161.warc.gz"
] | [
"en"
] | [
0.9491859674453735
] | [
1226
] | [
2.515625
] | [
3
] |
[
"|A Bali Tiger in 1914|\n†P. t. sondaica\n|Panthera tigris sondaica|\n|Former range of the Bali tiger|\nformerly P. t. balica (Schwarz, 1912)\nThe Bali tiger, or Balinese tiger (Panthera tigris balica) is one of the three extinct sub-species of the tiger. They became extinct in 1937. They lived on Bali. This was the first sub-species of tiger to become extinct.\nThe Bali was also the smallest tiger sub-species. There is no record of a Balinese tiger ever being held in a zoo collection. The Balinese tiger's close sub-species were the Javan tiger and the Caspian tiger, which are now also extinct. The Balinese and Javan tigers were once the same, but during the Ice Age, Bali became isolated from Java by the Bali Strait. This split the tigers into two groups which then went onto develop alone.\nThe killing of the very last wild Balinese tiger is usually thought to have been at Sumbar Kima, West Bali on 27 September, 1937. It was an adult tigress.So the government of Bali made a strict law on killing tigers.\nReferences[change | change source]\n|Wikispecies has information on: Panthera tigris balica.|\n|Wikimedia Commons has media related to Panthera tigris balica.|"
] | [
"<urn:uuid:038f2f5f-e3f8-444e-b184-7c51132d02f2>"
] | [
"CC-MAIN-2020-05"
] | [
"https://simple.wikipedia.org/wiki/Bali_tiger"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00237.warc.gz"
] | [
"en"
] | [
0.8904001116752625
] | [
315
] | [
3.1875
] | [
3
] |
[
"By Lily Dayton\nCalifornia Health Report\nFor some kids, the end of the school year means summer camp, family vacations and backyard barbecues. For others, the end of the school year means hunger.\n“Many parents don’t have enough money for healthy food, or they leave for work very early in the morning so it’s difficult to feed their kids,” said Gloria Arizaga, who has been serving meals to children in the North Monterey County Unified School District (NMCUSD) for 30 years. She speaks Spanish as her first language, like many of the students in her district—over 70 percent of whom qualify for federally funded meals.\n“The breakfast and lunch we give to kids are the only meals they have during the school day,” she said in Spanish. “If they aren’t in programs during the summer, I imagine they don’t have enough food.”\nOver half the kids in California receive a free or reduced price lunch at school—yet the majority of these low-income kids don’t receive federally funded meals during the summer. Now schools and community organizations are coming together to make sure summer lunch reaches kids in need, even if they aren’t in summer school.\nAccording to California Food Policy Advocates’ (CFPA) analysis of California Department of Education (CDE) data, over 84 percent of those who benefitted from school lunch programs in 2011—more than 2 million children—did not use summer lunch programs. And the data show that this summer nutrition gap is widening. While the number of children eligible for free lunch has increased in California over recent years, the number of children participating in summer nutrition programs has plummeted. CFPA’s analysis shows that over the past ten years summer meal participation has decreased by over 50 percent.\nThis trend doesn’t reflect a lack of federal funding for summer nutrition—the funds are available, but the state isn’t using them. The CFPA report estimated that during July 2011, California missed out on $34 million that could have gone towards feeding the state’s low-income children. CFPA ties the growing summer nutrition gap to the decrease in summer school programs throughout the state.\n“If you look at historical trends, the vast majority of summer meals for low-income kids are served by schools at school sites,” explained Tia Shimada, an advocate with CFPA. “With recent budget cuts, there is much less summer programming.”\nEarlier this year, the USDA selected California as one of five states to target with additional technical assistance for summer meal programs—a decision driven largely by California’s declining participation rates.\n“State Superintendent Tom Torlakson has been very proactive,” said Sandip Kaur, director of nutritional services for the CDE. “He sent out 500 letters to community leaders in February 2013, encouraging them to get onto summer food service programs—churches, libraries, Parks and Recreation departments, YMCAs, and Boys and Girls Clubs.”\nThis highlights an up-and-coming venue for summer meal programs in California: With summer school disappearing across the state, school districts and community organizations are forging partnerships to create a summer safety net for low-income kids.\nLast summer was the first that NMCUSD partnered with the local parks and recreation center to help feed the community’s children. The rec center lies within blocks of Castroville Elementary School, where over 80 percent of students qualify for free or reduced lunch. Since the district already planned to serve meals for their two-week summer school session, they decided to feed kids in the community all summer long.\n“We figured if we’re going to do summer school, why not take on more?” said Kathleen Cleary, Child Nutrition Supervisor for NMCUSD. “Our summer school session is so small, and the need here is so high.”\nArizaga was one of the servers on the catering truck they used to deliver food to local parks and low-income housing areas. At first, she wasn’t sure what response the community would have. But once word got out, neighborhood kids came running to meet the truck.\n“They love that we offer them fruits and vegetables, and healthy food they don’t normally eat,” said Arizaga. “The part of my job I value most is la sonrisa de mis niños—the smile on my kids’ faces.”\nIn efforts to prevent obesity—an epidemic that disproportionately affects low-income children and adults—some summer lunch providers offer activities and education along with food.\n“Our theme is ‘eat smart, play hard,’” said Norma Johnson, program specialist with San Diego Unified School District—one of California’s largest summer meal providers. “We host activities so it makes for a fun-filled event. That way kids aren’t sitting in front of the TV, playing video games and eating junk food. As a school district, we need to make sure the gap has been filled so learning doesn’t stop due to lack of nutrition and physical activity.”\nLast year, SDUSD partnered with the San Diego Food Bank, local farmers and over 45 other community organizations to provide food at 68 sites for 48 days throughout the summer. In addition, they held 38 community barbecues with health resource fairs, fresh fruit and vegetable sampling and cooking demonstrations. At each of their sites, they offered a safe place for children to play.\nDespite local successes, Shimada said the numbers still don’t add up to fill California’s summer nutrition gap. Even SDUSD’s acclaimed program—third in the state for highest number of summer meal participants—still only reached 31 percent of the district’s low-income children in 2011. Overall, there aren’t enough providers, there aren’t enough sites, and there aren’t enough children being fed.\nOne of the challenges is getting the word out to families in need, said Patrice Chamberlain, director of California Summer Meals Coalition. “The biggest thing we can do is engage credible spokespeople—teachers, principles, school board members—to let people know there are safe places to send their kids.”\nAs the school year comes to a close, NMCUSD, SDUSD, and other summer nutrition providers across the state are gearing up to spread the word in their communities through banners, flyers, radio announcements, newspaper advertisements and the Internet.\nOf her district’s summertime reach so far, Johnson said, “It’s good, but we could do a lot more. We really need more children to come to our sites.”\nThe CDE posts summer meal sites on their website. People without Internet access can find site locations by calling 1-866-3-Hungry or 1-877-8-Hambre."
] | [
"<urn:uuid:2089c73f-e8f3-4fc3-a823-3709b3c2e017>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www.healthycal.org/archives/12078"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164009403/warc/CC-MAIN-20131204133329-00038-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9507158398628235
] | [
1462
] | [
2.796875
] | [
3
] |
[
"The 9th edition of the must-have guide to learning Spanish the enjoyable way Now in its 9th edition, Dicho y Hecho: Beginning Spanish offers a straightforward and user-friendly approach to beginning Spanish. This latest edition incorporates new information on how teachers teach and students learn. With an easy-to-implement and lively approach, Dicho y Hecho makes learning Spanish an attainable goal and a truly enjoyable experience for both teachers and students. Written by noted Spanish teaching experts Updated to include the latest research on how language is taught and learned Provides students with abundant input and uses new forms and structures, before moving students to output Incorporates a dynamic approach to teaching and learning Spanish This empirically proven language teaching methodology is based on over 30 years of research.\nThis text provides an approach to Spanish for Key Stage 3 pupils, using two-page units with grammar explanations, end-of-chapter checklists and revision tests. This Rojo pupil book is for Higher students and is parallel in content to the Foundation (Verde) book."
] | [
"<urn:uuid:30e4b51f-7d0d-4ce9-a5ac-bb189080f40e>"
] | [
"CC-MAIN-2020-10"
] | [
"https://prefacebahamas.com/product-category/textbooks/spanish/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143505.60/warc/CC-MAIN-20200218025323-20200218055323-00219.warc.gz"
] | [
"en"
] | [
0.9266437888145447
] | [
212
] | [
2.9375
] | [
3
] |
[
"Through my focus on unpredictable rhyming patterns and erratic form in “Underestimated, powerful, full of belittled ability,” I was capable of using a bird’s battle against hardships to produce a metaphor for women’s power and individuality. “Underestimated, powerful, full of belittled ability” begins with the sorrowful description of a restricted bird whose abilities and speech is limited and controlled, accurately representing women’s limits and regulations regarding their decisions and voice. “Astonished, the larger birds’ glee and laughter transform into silence” (15) Nonetheless, during the poem’s last couplets, readers were presented with the Hill Myna bird’s sudden boldness and willpower, demonstrating women’s dedication to annihilate various boundaries. Moreover, the work’s beginning stanzas all consist of a regulated and controlled rhyming pattern, emphasizing the bird’s limitations and calculated decisions. However, readers can observe a sudden change, as the pattern slowly contains an uncontrollable and erratic scheme, representing the bird’s need to confront and escape her surroundings. Furthermore, my poem uses form and font sizes in intentional ways, as the tinier fonts represent the bird’s controlled voice and whispering, while the larger fonts demonstrate the Hill Myna’s shocking anthem for individuality. Likewise, the poem’s shape slowly begins to break and advance to the right, creating the effect of a bird’s hesitant flight or the image of an increasing sound wave. Furthermore, my poem describes the hardships of a purposefully chosen bird species named Hill Myna, whose characteristics accurately personify women’s knowledge. Despite this bird’s tiny and ordinary appearance, the Hill Myna continuously surprises its surroundings with its understanding and shocking replies, which correctly relate to women’s hidden capability. Thus, by using an unpredictable rhyming pattern and erratic form, I was able to use a Hill Myna’s battle against limitations to reflect and represent women’s power and determination."
] | [
"<urn:uuid:e6d6f738-9172-4336-a815-fda9722aae6a>"
] | [
"CC-MAIN-2020-10"
] | [
"https://chicagoscratchorchestra.org/through-and-controlled-accurately-representing-womens-limits-and/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142603.80/warc/CC-MAIN-20200217145609-20200217175609-00449.warc.gz"
] | [
"en"
] | [
0.9442269802093506
] | [
428
] | [
2.890625
] | [
3
] |
[
"4 April 2006\nMIND OVER MATTER- thinking about your muscles\ncan increase strength\nA new study carried out by a research team at the University of\nHull, has been hailed as a breakthrough in sports research. The\nfindings have revealed that thinking about your muscles during\nexercise can boost muscle activity, benefiting exercisers and\npotentially aiding recovery after injury.\nThe research, led by Dr. David Marchant of the Department of\nPsychology in collaboration with the Department of Sport, Health\nand Exercise Science, consisted of a study which monitored 29\npeople performing bicep curls using a weights machine that measured\nhow much their biceps were working.\nParticipants had to produce as much force as possible under\nthree conditions - (1) thinking about their muscles and how they\nwere moving, (2) thinking about the dumbbell they were lifting and\n(3) thinking about whatever they wanted.\nThe study showed that there was a significantly increased muscle\nactivity when people thought about their arm muscles and how they\nmoved compared to when they just though about the dumbbell they\nDr. David Marchant, Department of Psychology at the University\nof Hull, commented: \"Sports coaches and trainers would benefit from\ntailoring their instructions depending on what they want performers\n\"When they want people to improve their performance, thinking\nabout outcomes such as targets or goals is best. However, when they\nwant athletes to exercise their muscles or recover from injury,\nthinking about the movement of their muscles during weights\nexercises is helpful.\"\nUntil now, there has been much confusion about what to think\nabout whilst exercising to ensure positive results. Studies have\nshown that thinking about your movements and muscles can make\nperforming certain skills, such as throwing a ball, more difficult\nand less successful.\nThis research shows that thinking about your muscles during\nweights exercises helps to activate the muscles, which may help\ndevelop strength over time.\nPage last updated by Greg Tindall on"
] | [
"<urn:uuid:60b27850-cb8b-47a5-bb78-cdf8d50cb7d1>"
] | [
"CC-MAIN-2013-48"
] | [
"http://www2.hull.ac.uk/newsandevents-1/newsarchive/2006newsarchive/april/muscles.aspx"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164032288/warc/CC-MAIN-20131204133352-00041-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9711741805076599
] | [
413
] | [
2.84375
] | [
3
] |
[
"Electronics as a mode of artful expression seemed like it was a distant cultural world away form myself. I didn’t know how easy it was to create LED art through arduino or chibitronics. I was unaware that these “crafts” of electronics were on sale on the internet and that these can be purchased for my classroom.\nChibitronics and the conductive pen, Wow! That by itself is artful technology because of the way you can manipulate the copper wiring to create points for light to occur. Arduino, using a thread to conduct electricity to LED lights is pretty impressive as well. You know, when I was younger the light up shoes were impressive to see. Now people can wear dresses that look like they are part of a christmas tree!\nWhen I did research, my thoughts raced as I looked into the cutting edge technology related to wearable technologies beyond the classroom and it took me to monitoring health issues, aiding the blind with smart glasses.\nI even looked at the wearable technologies on sale at amazon. I saw that even GoPro cameras, smart glasses, and small cameras embedded into things you can wear are electronic devices. My colleague has a fitbit and she explained that she and her friends compare how much exercise they get each week using the data collected on her wrist. Those devices make exercise, or taking pictures so simple that it takes the thought and calculation away from yourself. It made my mind connect to microwave dinners and how innovations created ways to just heat food for dinner instead of cooking a meal on the stove. These examples are similar in my opinion because it seems like the technological advances happening are taking the calculation, the planning, and the work out of what you’d do and computer chips and senors are taking the place of what we used to have to do to figure out how many miles we exercise, or take the time to prepare a meal. I don’t know if my rambling makes sense, but technology and the advances in these times are remarkable.\nThe blogs and twitter this week were interesting as well. Scott persuaded me that there are math components in chibitronics that I hadn’t considered. I’m thankful for Tristan to have helped with the twitter session and gosh, I was so nervous. I hope it really was a good chat. 🙂 Til Next time! (PS I am shocked that I am learning so much.)"
] | [
"<urn:uuid:06d028bd-e41d-4afd-909c-d24272ab849f>"
] | [
"CC-MAIN-2017-26"
] | [
"https://bjulroan.wordpress.com/2015/07/24/week-10-reflection/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321536.20/warc/CC-MAIN-20170627185115-20170627205115-00421.warc.gz"
] | [
"en"
] | [
0.9770052433013916
] | [
494
] | [
2.640625
] | [
3
] |
[
"Our modern furry friends aren’t the only animals that have endured the invasive bites of ticks. As it turns out, the pests may have fed on feathered dinosaurs, too—and now, we have the evidence in amber tick fossils.\nCarnegie Museum of Natural History is excited to receive some prehistoric Deinocroton draculi (“Dracula’s terrible tick”) specimens—including one engorged in blood, which researchers may identify as a dinosaur’s. Albert Kollar, invertebrate paleontologist and collection manager in the Section of Invertebrate Paleontology, will be adding the donated fossils to the Oakland museum’s collection.\n“Fossil like these are rare in the fossil record,” says Kollar, who has done research on invertebrate fossils and field work around the United States and other countries. “The addition of Cretaceous ticks in amber associated with feather dinosaurs adds an important group of specimens into the Invertebrate Paleontology collection at Carnegie Museum of Natural History.”\nThe fossils come from the Southeast Asian nation of Myanmar, where Spanish researchers from the Instituto Geologico y Minero de Espana in Madrid discovered ticks encased in Burmese amber from the middle Cretaceous Period—about 100 million years. Their discoveries included the new Dracula species, and one specimen is about eight times larger than its fellow ticks because it is so engorged with blood. The scientists also discovered specialized skin-beetle larvae attached to the legs of two Dracula ticks. Since these larvae feed on tough organic matter like skin, hair and feathers, the researchers suspect these ticks fed on feathered dinosaurs.\nIt is significant that these fossils were found in amber, which is fossilized tree resin that hardens over time into plastic. But extracting dinosaur DNA from amber only has happened in the movie “Jurassic Park.” Could the discovery of the ticks, and perhaps traces of dinosaur blood, lead us a step closer to a real-life version of the movie?\nScott Anderson—a co-author of the study, published in Nature Communications—donated the specimens to Carnegie Museum of Natural History. Anderson is a Pittsburgh-area geologist and amber collector."
] | [
"<urn:uuid:462223a6-0ab3-462d-93f2-efc4613782c3>"
] | [
"CC-MAIN-2020-05"
] | [
"https://carnegiemnh.org/press/carnegie-museum-natural-history-receive-fossilized-ticks/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00343.warc.gz"
] | [
"en"
] | [
0.9297479391098022
] | [
470
] | [
3.625
] | [
4
] |
[
"Sydney,August 16: Banana could well be wiped out globally in just five to 10 years by fast-advancing fungal diseases, warn researchers.\nThe threat could be coming from something called the Sigatoka complex, made up from three fungal diseases, which pose a huge risk to the world’s banana supply.\nResearchers at the University of California – Davis in the US and in the Netherlands discovered how this group of three closely related fungal pathogens evolved into a lethal threat to the world’s bananas.\nThe banana is the world’s leading fruit crop and ranks fourth as a global staple food. Almost 140 million tonnes of the fruit are produced across the world every year. At almost 25 million tonnes annually, India leads among the 10 major producers globally.\nBananas are prone to many diseases and also suffers from an “image problem,” giving consumers the appearance that it is and always will be readily available, said one of the researchers, Ioannis Stergiopoulos from the University of California – Davis.\nAlready, the Sigatoka disease complex can reduce banana yields by 50-70 per cent, if not controlled.\nThe Sigatoka disease complex is a cluster of three closely related fungi — yellow sigatoka (Pseudocercospora musae), eumusae leaf spot (Pseudocercospora eumusae) and black sigatoka (Pseudocercospora fijiensis) — which emerged in quick succession during the last century as destructive pathogens on banana.\nYellow sigatoka was the first of the three to be recorded on banana, although eumusae leaf spot and black sigatoka are now the most devastating. Black sigatoka, in fact, is posing the greatest constraint to banana production worldwide, the study said.\nBlack sigatoka is air-borne and affects the leaves of banana plants in small and large-scale plantations, and without chemical control it results in huge yield losses.\n“Now, for the first time, we understand the genomic basis of the evolution of virulence in these fungal diseases, thus giving us an opportunity for intervention,” Stergiopoulos said. (IANS)"
] | [
"<urn:uuid:21f46b2e-c8a6-4139-a380-0b7930b1073e>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.wefornews.com/fungal-diseases-may-wipe-out-banana-in-a-decade/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00247.warc.gz"
] | [
"en"
] | [
0.9350518584251404
] | [
460
] | [
3.578125
] | [
4
] |
[
"Vaccinations are among the simplest collective measures we can take to care for our children. Yet they have become politically charged, and avoiding them has resulted in outbreaks of completely preventable dangerous illness.\nFor example: Despite access to a proven safe vaccine, global measles cases rose by 30% between 2016 and 2017. In the U.S. alone, there has been a 25 year record in reported measles cases: 704 in this year alone. WHO estimates that vaccines save between 2 and 3 million lives each year. But “vaccine hesitancy” – being unwilling or refusing to vaccinate – is still a major barrier for public health workers around the world.\nOne would think that the positive effects of vaccines – the end of smallpox, prevention of tetanus and other formerly widespread problems – would be convincing enough. And vaccines are still making news: 2019 may be a historic year for Pakistan, a country well on the way to completely eradicating polio, thanks to energetic pro-vaccination campaigning. Newer vaccines, like those for HPV and Ebola, have world-changing potential.\nSo why do some parents choose not to vaccinate their children? Clearly they love their children and are acting with the best of intentions. They may have incomplete information. They may fear a connection between autism and vaccination – a widespread claim but one without scientific evidence to support it. More understandably, they may distrust programs administered by their anti-democratic or corrupt governments. And distrust of the large drug companies that produce vaccines is not delusional, but a logical response to the behavior of the pharmaceutical industry.\nWhile we wholeheartedly support vaccination as one of the most basic investments that we can make in the health of our families and communities, let’s stop vilifying the anti-vaxxers. Until we are able to inoculate against corporate greed and governmental corruption, there will always be some misdirected resistance."
] | [
"<urn:uuid:c11d816c-3da9-4421-9ee8-3bf3751c1952>"
] | [
"CC-MAIN-2023-14"
] | [
"https://hesperian.org/2019/04/30/new-chapter-on-our-healthwiki-vaccinations/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00364.warc.gz"
] | [
"en"
] | [
0.95589280128479
] | [
386
] | [
2.78125
] | [
3
] |
[
"Published on 13.04.17 in Vol 5, No 4 (2017): April\nDesign of a Mobile App for Nutrition Education (TreC-LifeStyle) and Formative Evaluation With Families of Overweight Children\nBackground: Nutrition and diet apps represent today a popular area of mobile health (mHealth), offering the possibility of delivering behavior change (BC) interventions for healthy eating and weight management in a scalable and cost-effective way. However, if commercial apps for pediatric weight management fail to retain users because of a lack of theoretical background and evidence-based content, mHealth apps that are more evidence-based are found less engaging and popular among consumers. Approaching the apps development process from a multidisciplinary and user-centered design (UCD) perspective is likely to help overcome these limitations, raising the chances for an easier adoption and integration of nutrition education apps within primary care interventions.\nObjective: The aim of this study was to describe the design and development of the TreC-LifeStyle nutrition education app and the results of a formative evaluation with families.\nMethods: The design of the nutrition education intervention was based on a multidisciplinary UCD approach, involving a team of BC experts, working with 2 nutritionists and 3 pediatricians from a primary care center. The app content was derived from evidence-based knowledge founded on the Food Pyramid and Mediterranean Diet guidelines used by pediatricians in primary care. A formative evaluation of the TreC-LifeStyle app involved 6 families of overweight children (aged 7-12 years) self-reporting daily food intake of children for 6 weeks and providing feedback on the user experience with the mHealth intervention. Analysis of the app’s usage patterns during the intervention and of participants’ feedback informed the refinement of the app design and a tuning of the nutrition education strategies to improve user engagement and compliance with the intervention.\nResults: Design sessions with the contribution of pediatricians and nutritionists helped define the nutrition education app and intervention, providing an effective human and virtual coaching approach to raise parents’ awareness about children’s eating behavior and lifestyle. The 6 families participating in the pilot study found the app usable and showed high compliance with the intervention over the 6 weeks, but analysis of their interaction and feedback showed the need for improving some of the app features related to the BC techniques “monitoring of the behavior” and “information provision.”\nConclusions: The UCD and formative evaluation of TreC-LifeStyle show that nutrition education apps are feasible and acceptable solutions to support health promotion interventions in primary care.\nJMIR Mhealth Uhealth 2017;5(4):e48\nMobile technology has experienced impressive gains in popularity in recent years . As people typically develop a strong attachment to their mobile devices and frequently keep this technology with them all the times, mobile platforms provide a critical source of information and motivation for engaging users with health interventions and behavior change (BC) [ - ]. Mobile devices increase the potential to promote healthy nutrition behaviors, and today nutrition and diet apps represent the fastest growing field of health promotion apps [ ]. Mobile health (mHealth) apps for nutrition education can be suitable solutions to support parents’ involvement in childhood weight management interventions provided in primary care, as this is often the families’ first point of contact with the health care system [ , ]. The delivery of a primary care intervention by leveraging on digital and mobile support facilitates a higher compliance to it by the target users such as parents, who might have tight daily agendas, difficulties in tracking children’s weight-related behaviors over a day per week on paper diaries, and location difficulties [ ]. Also, nutrition education apps make it possible to follow up healthy eating interventions long after their completion, a time when relapses are most likely to occur, thus supporting maintenance of healthy behavior in the long-term [ ].\nToday, a large consensus exists in recommending the development of mHealth interventions as based on evidence, BC theory and taxonomies, as well as on formative evaluation with the target user groups [, ]. However, still a majority of children weight management apps do not use any recommended strategies or behavioral targets [ ], and a few apps specifically target parents or families, which instead play a key role in supporting children’s adoption of healthy lifestyles [ , ]. Moreover, recent studies have shown that commercial mHealth apps are more engaging and better appreciated by users with respect to evidence-based mHealth apps [ ], but the quality of information provided by commercial mHealth apps is often rated as quite poor [ , ]. This suggests that a thorough user-centered design (UCD) approach informed by theoretical-empirical knowledge, as well as by user engagement principles, is required today to ensure a wide adoption of the mHealth intervention provided [ , - ].\nInvolving all relevant stakeholders and target users in the development of such interventions may help improve their effectiveness and acceptability [, ]. Getting early feedback from end-user populations helps ensure quality and usefulness of content, and the involvement of stakeholders who play a role in providing care to or managing overweight children is the key to inform feasibility and usability of the solutions designed [ ].\nThis study describes how a UCD approach founded on primary care practices and requirements was deployed for developing the TreC-LifeStyle app for nutrition education, and how the validity of the mHealth intervention designed was tested with representatives of the target user group in a formative evaluation.\nmHealth Intervention Design and Development\nThe design and development process of the TreC-LifeStyle mHealth intervention followed four main stages ():\n- Collecting requirements from primary care professionals on nutrition education practices, guidelines, and on the typical profiles of parents or families that could most benefit from the intervention\n- Prototyping the app features based on the collected requirements and on a review of nutrition education apps already available in the market\n- Revising the prototyped features with pediatricians and nutritionists with respect to content and BC strategies\n- Deploying the intervention in a formative evaluation study with target families for further refinement of the mHealth app and intervention\nIn stages 1 and 3, several meetings were held in 2015 among the design team, involving experts in BC interventions, working together with 3 pediatricians and 2 nutritionists from primary care services in the Trento region (Italy). In stage 2, the design team reviewed state-of-the-art features in nutrition education apps available in the market, then mapped the requirements collected with the most appropriate BC techniques proposed by international standards and taxonomies . It also developed a concept for providing the mHealth intervention in the most intuitive way, reducing as much as possible attention thefts by the app for children’s food intake reporting and monitoring by parents.\nIn stage 4, a protocol for the formative evaluation study was prepared by the design team and then deployed for understanding usability and feasibility of the mHealth intervention with target users.\nNutrition Education Requirements\nIn stage 1, pediatricians helped better understand the nutrition education practices and typical interventions provided in pediatrics primary care to prevent children from being overweight , as well as the main obstacles met by parents and families in adopting healthy eating behaviors. A main objective for pediatricians is to teach parents how to adhere to the eating guidelines provided by the Mediterranean Diet and the Food Pyramid while educating their children on healthy nutrition and managing them. Parents of overweight or obese children aged 6-12 years often seek support from primary care services, they might be prepared to change, but often fail in putting into practice healthy eating practices. In recent years, pediatricians tend to recommend nutrition education programs based on Therapeutic Patient Education [ ] rather than Dietetic Therapy [ ], as prescriptive dietary approaches are often perceived as more stigmatizing of individuals’ behaviors and were found less acceptable and effective in achieving BC in the short- and long-term [ ]. Educational approaches avoid an exclusive focus on children’s food intake calories control, but encourage parents to become more aware about their children’s lifestyle, including both eating behavior and physical exercise and the complex system of emotional perceptions related to food intake. Accurate, reliable, and personalized monitoring of children’s lifestyle is always a challenge during primary care intervention; mHealth apps can improve the delivery of these interventions, helping nutrition education to turn into effective BC, but they need to be enough motivating and engaging to be used by families to achieve the desired objectives.\nTreC-LifeStyle App Description\nAs an output of stage 2, a first prototype of the mHealth app was developed based on a mapping of the requirements collected from primary care experts with nutrition education features most likely to support the desired BC effectively ().\nThe mobile app is part of the TreC platform used in the Trento region as a citizen-controlled clinical record system allowing users to manage their own health and facilitating communications with health care professionals and institutions [, ].\nIn case of the TreC-LifeStyle solution, pediatricians can access data of their patients (child or parent) from a Web app dashboard () integrated into the TreC platform; they can configure the app intervention for each patient, prescribe it as a nutrition education intervention, and visualize data related to the intervention to inform follow-ups with patients. The TreC-LifeStyle prototype app was developed for Android devices only in this phase, with the plan of implementing both Android and iOS versions of the mobile app after the formative evaluation phase. To ensure confidentiality of the data acquired, the TreC-LifeStyle platform saves data in the local database of the user mobile phone device, in an anonymized format. The anonymized data are then transferred on to a server by means of rest calls requiring security authentication of level 2 (username and password). This way, the identity of the user-participant is only known by the pediatrician who has prescribed the mHealth intervention.\nThe target user of the TreC-LifeStyle intervention is the child-parent–dyad in need of overweight or obesity prevention support. In order to minimize possible acceptability concerns related to young children’s use (and possible abuse) of the mobile technology, the TreC-LifeStyle app is meant to be installed on the parent’s mobile phone and used primarily by the parent as a supporting tool for more precise monitoring of the child’s food intake and physical activity during the intervention. To ensure child engagement during the BC intervention, the child is asked to wear a bracelet (synchronized to the mobile app) for automatic tracking of daily steps to be reviewed with the parent on the TreC-LifeStyle home display and for checking the achievement of daily physical activity goals.\n|User requirements||App features||Behavioral change techniques|\n|Time-saving, convenient, intuitive interaction||Food intake dashboard (including recommended portions and quantities), virtual coaching messages||Instruction on how to perform the behavior|\n|Digital tracking of child’s food intake over time||Colors of food categories on dashboard, reports of meals and nutrient balance||Monitoring of the behavior|\n|Tracking of compliance with healthy nutrition guidelines||Color or blinking of food boxes on dashboard, color of nutrient bars on reports||Feedback on the behavior, prompt or cues|\n|Automatic tracking of child’s physical activity||Daily steps display||Review behavioral goal achievement|\n|Motivation to increase physical activity||Steps label in gold||Rewarding|\n|Memory aid for future food purchases||Shopping list||Information provision|\nThe concept design of TreC-LifeStyle app was based on the following principles:\n- The delivery of evidence-based nutrition education content, compliant with primary care practices, supporting knowledge and adoption of the Mediterranean Diet, Food Pyramid guidelines [ - ], and at least 10 K steps of daily physical activity by children.\n- A low-burden reporting of children’s food intake by parents by means of an intuitive food dashboard screen on the app ( ), based on the food categories recommended by international and national guidelines on healthy nutrition [ - ], combined with monitoring, feedback, rewarding, and virtual coaching features proposed by international taxonomies of BC techniques [ ].\n- Automatic tracking of children’s physical exercise by means of commercial devices like Jawbone and Misfit bracelets integrated with the app’s features: The number of daily steps detected from the wearable device is displayed on the home page of the mobile app, close to the display of the calories intake. When the child reaches the goal of 10 K steps per day, the steps label turns to gold to acknowledge the goal achievement.\nChildren’s daily food intake reporting is done by parents who play a key role in children’s nutrition management, by selecting food elements on the app dashboard with a few clicks (): When correct food elements and portions are selected, the corresponding food box turns green, if food elements and portions exceed the recommended quantities, the box turns red whereas unselected food elements and portions remain gray. Gray boxes go on a blinking mode when the participants have filled in their daily food intake without including sufficient types and quantities of recommended food. This is to prompt the parent participant to align with the guidelines’ indications. Colored bars in the app display also help the parent participant to achieve a better balancing of nutrients in children’s meals; red bars are shown to indicate excessive quantities consumed in a meal or nutrient (eg, lipids, carbohydrates). The bars’ lengths are used to indicate at a glance that different meals have different importance during a day.\nAdditional monitoring and feedback features () allow the parent participant to (1) monitor the food consumed, in a day or week, (2) visualize calories intake distributed in the principal meals and nutrients through progress bars. Based on personal food intake statistics, the virtual coaching function sends to the user daily reports summarizing deviations versus correct nutrition behavior with respect to the healthy diet guidelines. The virtual coach also sends notifications reporting guidelines for healthy diet adoption during the first 11 days of intervention (1 per day), covering basic topics relevant to nutrition education. Other more detailed information about food properties are available and can be inspected by the user on the app.\nThe app also provides a simple shopping list feature, allowing a parent participant to mark food to be purchased over a week, with the possibility of changing the family size ().\nDuring stage 3, the prototype concept and design were presented to the clinical stakeholders involved in stage 1 who revised both the app content and the BC features.\nA main suggestion provided by pediatricians was to keep the overall mHealth intervention within a duration period of 6 weeks, as this is aligned with the typical brief prevention programs delivered in primary care to families to support children’s weight management. Clinicians also advised to keep the food intake-reporting task on the app as simple and low demanding as possible for the participants in the initial phase of familiarization with the mHealth intervention. Based on these suggestions, a basic version of the app (vA) was provided to participants in the first 3 weeks of the intervention, not requiring an exact specification of children’s food intake, but a simple reporting of type of food and portions consumed by children. In the following 3 weeks of the intervention, the app automatically upgrades to a more advanced version (vB), where more precise quantities of food intake, dressing of food, and so on can be reported.\nIn stage 4, a protocol for conducting a usability and feasibility study of TreC-LifeStyle was prepared and discussed with the clinical stakeholders to ensure alignment during the pilot. Researchers obtained ethics approval of the study protocol by their Institutional Review Board. As shown in, the study involved 3 screening meetings with participants at the primary care offices. At the pilot start, to assess (1) parents’ knowledge of the Mediterranean Diet (KMD) guidelines; (2) state of change (SoC) for healthy nutrition-measured by an adapted version of the URICA-short-form scale, based on the 4 readiness to change states of the Transtheoretical Model of Change [ , ]; and (3) intention to use (IU) technology for nutrition education, as well as to train participants on usage of the app and of the activity tracker. After 3 weeks of the app vA usage to assess any change on the screening factors and evaluate parents’ perceived usability of the app (System Usability Scale Questionnaire [ ]). After 6 weeks from the study start, to assess any change on the screening factors after using vB of the app and to investigate more in depth the participants’ experience with the mHealth intervention in a final semi-structured interview involving both parents and children. Participants were allowed to continue to use TreC-LifeStyle and the activity tracker for the following weeks, on a voluntary basis.\nA convenience sample of 6 families attending a pediatric center in the Trentino area for problems related to overweight children was recruited. The group included parents with children aged 7-12 years, classified as overweight (BMI 85th-94th percentile), familiar with the use of mobile phone technology. Families with children already affected by obesity and by motor impairments limiting physical activity were excluded.\nParticipants were contacted and invited to join the study by phone. If they were interested in participating, an appointment for a recruitment and introduction session was made at the pediatric center. Parent participants provided written informed consent prior to their inclusion in the study.\nDescriptive frequency analyses were conducted on the quantitative data about the use of the TreC-LifeStyle app with respect to the prescribed intervention phases. At the qualitative level, positive, negative, and improvable aspects of the participants’ experiences with the TreC-LifeStyle app versions were descriptively coded. Interviews were transcribed verbatim and participants were assigned a numerical indicator (eg, Parent 1=P1). Transcribed data were subjected to an inductive thematic analysis procedure , which enabled the researchers to break down the data and identify some core themes that could have relevant implication for the future refinement of the mHealth intervention. Three team members completed the analysis independently. Transcripts were read several times to identify units of meaning in the data. Units of data (quotes) were isolated and similar quotes were grouped together as themes. Data coded within each theme were compared to ensure exclusivity. Themes were placed into 1 of 3 inductively generated groups according to positive feedback, negative feedback, and recommendations for improvements expressed by participants’ quotes. These groups were initially created by 1 researcher and then independently verified by 2 other researchers. Themes arising from postintervention interviews were compiled and presented in a tabular form. A meeting among the 3 researchers was finally held to revise the list of themes in the groups and resolve any difference.\nThe participants group included 6 parents (5 females, 1 male) of 6 overweight children (2 females, 4 males), mean age 9.16 years (SD 2.13). No participant dropout occurred during the prescribed intervention phase (first 6 weeks of app usage).\nParents’ KMD was good before the intervention and slightly improved at the end of the intervention (mean score from 12.5 to 12.70 on a total score of 15) with more than 80% of correct responses provided.\nIt was found that 4 out of 6 parent participants were classified at contemplation SoC before the intervention, but moved to action level after the 6 weeks’ intervention ().\nAll parent participants expressed a strong IU mobile apps for supporting the acquisition of healthy nutrition and lifestyles by children, both before and after the intervention (average rating was 5 on a 5-point Likert scale).\nUsage Patterns and Usability of the TreC-LifeStyle App\nDuring the pilot study, TreC-LifeStyle’s app was used by both parents and children in 3 out of the 6 families involved (P2-child aged 10 years, P3-child aged 12 years, and P6-child aged 11 years). In the above three cases, both children and parents shared the food-intake reporting task and used the app during the study. In other cases, it was the parent participant using the app for food-intake reporting and analyzing feedback, whereas the child wore the activity tracker and checked with the parent the achievement of the activity goal of 10 K steps per day on the app mainly.\nThe adherence to the mHealth intervention was very high during the first 6 weeks, with a percentage of meals inserted always higher than 90% (mean number of meals inserted per day 2.79), showing that participants kept track of most of their meals and were compliant with the intervention request. This finding also shows a good user acceptance and effectiveness of the BC techniques “instruction on how to perform the behavior,” “feedback on the behavior,” and “prompt or cues” implemented by means of the food intake dashboard of the app and of the virtual coaching function. In the follow-up phase, when families could use the app on a voluntary basis, 2 participants almost dropped out (P2 and P6) and the other participants lowered interaction with the app considerably (mean number of meals inserted per day 0.44). The follow-up phase occurred during children’s summer holidays, and this had a strong impact on families’ daily routines and usage patterns (eg, in summer schools children were not allowed to use wearable devices for security reasons).\nThe frequency of usage of the daily statistics on food intake reported (), as well as of weekly statistics and of the shopping list feature shows that these app’s functionalities were rarely used by parent participants during the study. Therefore, a refinement of the app features supporting the BC techniques “monitoring of the behavior” and “information provision” is required, in order to make these features more engaging and useful from a user’s perspective.\n|Daily statistics visualization||% of physical activity goal achievement–last 3 weeks of intervention||Difference of total deviations from healthy diet in week 1 and week 6 |\nThe result of children’s physical activity tracking was very positive, with most of the children participants reaching, and even overpassing the daily goal of 10 K steps (). Therefore, we can state that the app features related to the BC techniques “review behavioral goal achievement” and “rewarding” contributed well in supporting children’s engagement with the TreC-LifeStyle intervention and their motivation to reach physical activity goals.\nBy comparing the number of food portion deviations from healthy diet guidelines during week 1 (W1) and week 6 (W6) of the study (beginning and ending weeks of the intervention), we observed that 2 children showed stable behavior, 2 children made a few more deviations, and 2 children made fewer deviations (). It was noted that the absolute number of deviations per week was not very high in both weeks, which indicates a persisting commitment of participants to comply with the objectives and indications provided by the nutrition education intervention.\nOverall, parent participants rated the usability of TreC-LifeStyle app very positively. Both app versions vA and vB were assessed as being at the best imaginable level of usability, obtaining SUS mean scores of 95 and 97.92, respectively.\nQualitative Evaluation of the Intervention\npresents a list of core themes regarding positive, negative, and improvable aspects of the app design reported by participants during the interviews carried out at the end of the mHealth intervention.\n|Themes groups||Themes||Example quote|\n|Positive feedback||Simplicity of food-intake reporting ||I prefer vB as it is more precise regarding calories...and food quantities... [Parent, P6]|\n|Conscious food purchases ||We have changed our habits at the store...we do not care much about special offers anymore. [Parent, P3] |\n|Family awareness of dietary choices ||I realized that I used to prepare French fries or fried food too often... [Parent, P6] |\n|Influence on meals preparation ||Mom and daddy checked the app to decide what to prepare for lunch and dinner... [Child, P3] |\n|Children’s goal-driven motivation||I use the app more if there is the bracelet...I want to achieve the goal 100%... [Child, P2] |\n|Negative feedback||Difficulties with food portion assessment ||It was not easy sometimes to know the portion of food consumed... [Parent, P5]|\n|Poor engagement with secondary app’s features ||We did not understand much the functionality “shopping list” so we never used it [Parent and child, P1] |\n|Problems with children’s use of wearable trackers||I could not wear the bracelet during some of the sport activities at school, it was forbidden [Child, P2]|\n|Recommendations for improvement||Visual display of calories intake or burnt ||It would be interesting to have the app showing information about burned calories or intake [Parent, P4]|\n|Support to food categorization ||It would be good to get some app’s help on categorization of some particular foods, like “polenta” [Parent, P6] |\n|Healthy recipes provision ||I would like to receive suggestions on recipes for next meals, as some days it is not easy to find new ideas for meals preparation [Parent, P5] |\nAll interviewees reported that both the app versions were intuitive to use and valuable as educational tools to deepen their knowledge of healthy nutrition and of the Mediterranean Diet. Most participants expressed a preference for vB over vA, by saying that vA was good enough to get some general knowledge of healthy nutrition, but vB was more precise and allowed a more accurate input of food intake also in terms of quantity.\nSome participants also thanked the app intervention, as their family had become more aware about dietary choices over a week, and less influenced by special offers at the store when buying food.\nParticipants reported being influenced by the feedback provided by the mobile app, which marked the categories of food in red when deviating from a healthy diet. The food categories marked in red were checked every evening, after dinner, affecting decisions about meals to be prepared the day after.\nA strong support for motivating the app usage over the intervention was provided by the associated wearable devices used to track the physical activity of children, which triggered participants’ interest in monitoring and reflecting over calories’ intake versus consumption during the day. Parents reported that children were very interested in monitoring their activity levels and they tried to comply with the 10 K steps per day goal every day, as confirmed also by the activity logs.\nParticipants found some difficulties in reporting food intake especially with vA, as they could not find out how to specify, approximate, or exact food quantities, as well as the dressing of the food consumed.\nMost participants did not use at all or accessed a few times the weekly reports of the monitoring feature and the shopping list feature. It is likely that participants did not find these features particularly useful, which turned out not to contribute much to the user engagement with the app.\nSome participants also reported issues with the use of the Jawbone or Misfit devices to be worn by their children during the intervention. For example, during sport activities, children were not allowed to wear the device and this prevented a full synchronization of the physical activity tracking with the diet monitoring features.\nParticipants were recommended to refine the mobile app by including a visual display of balance between calories intake or burning, which was not provided in the tested app versions. They also asked to facilitate as much as possible the input of some types of food that were less obvious to categorize (eg, corn item under cereals). Moreover, they proposed adding app suggestions on healthy recipes for next meals preparation, in order to consolidate their adoption of the Mediterranean diet in their daily lives.\nTo our knowledge, this is one of the first studies documenting the UCD of an mHealth app intervention for nutrition education targeting children aged 7-12 years, developed starting from the needs and practices of primary care in pediatrics, also investigating in depth the user compliance and experience with the intervention by 6 families over a period of 6 weeks.\nAll participants used the app regularly during the intervention period, showing a good compliance of users with the nutrition guidelines and the physical activity goals. Shared usage of the mobile app was observed especially in the families of children aged 10-12 years, so this might further suggest the acceptability and appropriateness of mHealth solutions for this target user group. As this was a pilot study aimed at testing and further improving our mobile app before its larger deployment, we focused on the usability and feasibility of the mHealth intervention, aimed at realizing an effective human and virtual coaching system for nutrition education programs in primary care.\nDesign of an mHealth Intervention for Obesity Prevention in Pediatric Primary Care\nThe main difference between our TreC-LifeStyle app and commercial nutrition apps is that it targets families of overweight children attending pediatric primary care programs. Therefore, it is fully integrated with health promotion knowledge and approaches based on clinical evidence and it allows tailoring of the intervention to the specific needs and profile of each participant (eg, configuration of the app based on children’s age and weight by the pediatrician before prescription). Beyond supporting a more precise assessment and personalized intervention for obesity prevention in childhood, the TreC-LifeStyle approach has the potential to scale-up to become a useful tool for delivering prevention programs to the target population groups, by leveraging on participants’ motivation, knowledge, and self-management skills combined with clinical coaching and support by pediatricians. From a health care perspective, the TreC-LifeStyle platform is an effective cost-benefit solution for collecting data on children’s behaviors and lifestyle more reliably, which can be used during primary care visits to inform doctor-patient dialog and facilitate BC goals [ ]. This is also aligned with previous research, showing that stand-alone mHealth technologies are unlikely to drive BC, but are most useful when used concurrently with traditional care [ , ].\nUser Experience of the Mobile App\nThe analysis of the mobile app usage by participants showed a very high adherence to the intervention over its 6 weeks’ duration, with a mean number of meals inserted per day of 2.79. The most frequently used features of the app were the food intake reporting and feedback dashboard, as well as the monitoring of the physical activity levels, that turned out to be also the most appreciated functionalities of the app from the participants’ subjective reports. These results are consistent with previous research, which shows the benefit of mHealth apps in supporting participants’ self-regulation and an increasing of physical activity [ , ].\nHowever, we observed a considerable drop in the number of daily meals inserted in the app during the follow-up period (mean 0.44), which confirms how food intake recording might impose a high level of burden on users and represent a main challenge if requested out of BC interventions provided by health care providers . A revised version of our mobile app will feature 3 different steps or levels of nutrition education to go through, raising first the user’s awareness on categories of food consumed over a week, then on portions, and finally on balance of nutrients. This way the educational support provided by the app and virtual coaching system developed is expected to help the user to deepen their learning of healthy eating behaviors, step by step, unlocking contents at growing levels of detail.\nUsability of TreC-LifeStyle was rated as very good by all participants. A positive effect of the intervention was also observed in terms of parent participants’ SoC, achieving action or maintenance levels for all participants after the first 3 weeks of the intervention. However, a deeper analysis of participants’ comments on their user experience with the app indicated that additional support in defining or inserting food quantities should be provided. Another requested improvement of the app regarded the visual display of the ratio between calories intake and burnt and a possible replacement of the shopping list feature with a more engaging support in recommending recipes preparation compliant with healthy dietary guidelines. It is likely that the design of some app features related to the BC techniques “monitoring of the behavior” and “information provision” was not optimal for ensuring parents’ engagement, which is important for BC . In our revised app, the virtual coaching function proactively invites the user to consult the reporting features periodically (eg, in the evening, weekend) and takes into account user’s current deviations from healthy guidelines to propose goal settings and suggestions relevant to rebalancing food intake and unhealthy behaviors.\nThere are several limitations in this study. First, developing an mHealth intervention by deploying UCD methodology is rather time- and resource-intensive [- ]. Some refinements of the features developed need to be implemented before a future large-scale deployment of our app, and going through the different phases of our intervention design took much longer than the typical design time frame of commercial apps for health promotion [ ]. Another limitation is that our pilot study involved a small group of participants (parent participants were mainly mothers), which may not reflect the need of other families of overweight children in our target population.\nHowever, to our knowledge, this study is one of the first to assess the usability and feasibility of a mHealth app intervention targeting families of overweight children aged 7-12 years over a 6-weeks' deployment and follow-up period in a primary care setting. Relevant mHealth solutions and evaluation studies are reported in [, ], but they were targeting families of children or adolescents aged 10-17 years. All our participants used the app frequently over the intervention weeks, reporting positive effects in terms of children compliance with nutrition and physical activity goals.\nTreC-LifeStyle mobile app has the potential of better supporting primary care clinicians in providing effective prevention and health promotion programs related to children’s lifestyles, but further improvements of the app in terms of long-term user engagement, nutrition coaching, and food-intake monitoring functions need to be implemented before a next large-scale trial deployment.\nTreC-LifeStyle mHealth intervention has the potential to become an effective solution for supporting health promotion and prevention programs for children’s weight management in primary care. The UCD and clinically founded methodology used to design the app—which combines healthy lifestyle guidelines, food-intake monitoring and intuitive feedback, as well as Web-based data sharing with pediatricians for evidence-based dialog—is a significant advance over the functionality of current commercially available food journaling apps, and may represent the kind of mHealth interventions best fitting the requirements of primary care practice. Future refinements of the app ensuring user engagement and maintenance of healthy behaviors after the intervention are to be considered and tested further.\nThis work was supported by the TreC project (principal investigator S.F.) funded by the Autonomous Province of Trento. We thank Dr Carlo Pedrolli and Dr Maria Teresa Pasquazzo of the Dietetic and Clinical Nutrition Service of Trento, for their support during the development of the TreC-LifeStyle intervention.\nConflicts of Interest\n- PEW Research Center. PEW research internet project: Device ownership over time URL: http://www.pewinternet.org/fact-sheet/mobile/ [accessed 2017-03-29] [WebCite Cache]\n- Google Play. Search android apps URL: https://play.google.com/store/search?q.nutrition&c.apps&hl.en\n- DiFilippo K, Huang EH, Andrade JE, Chapman-Novakofski KM. The use of mobile apps to improve nutrition outcomes: A systematic literature review. J Telemed Telecare 2015 Jul;21(5):243-253. [CrossRef] [Medline]\n- Bert F, Giacometti M, Gualano MR, Siliquini R. Smartphones and health promotion: a review of the evidence. J Med Syst 2014 Jan;38(1):9995. [CrossRef] [Medline]\n- Avis JL, Holt NL, Maximova K, van Mierlo T, Fournier R, Padwal R, et al. The development and refinement of an e-health screening, brief intervention, and referral to treatment for parents to prevent childhood obesity in primary care. Telemed J E Health 2016 May;22(5):385-394. [CrossRef] [Medline]\n- Avis J, Bridger T, Buchholz A, Chanoine J, Hadjiyannakis S, Hamilton J, et al. It’s like rocket science…only more complex: challenges and experiences related to managing pediatric obesity in Canada. Expert Rev Endocrinol Metab 2014;9(3):223-229.\n- Barlow SE, Ohlemeyer CL. Parent reasons for nonreturn to a pediatric weight management program. Clinical Pediatrics 2006 May 01;45(4):355-360. [CrossRef]\n- Tate EB, Spruijt-Metz D, O'Reilly G, Jordan-Marsh M, Gotsis M, Pentz MA, et al. mHealth approaches to child obesity prevention: successes, unique challenges, and next directions. Transl Behav Med 2013 Dec;3(4):406-415 [FREE Full text] [CrossRef] [Medline]\n- Fjeldsoe BS, Miller YD, O'Brien JL, Marshall AL. Iterative development of MobileMums: a physical activity intervention for women with young children. Int J Behav Nutr Phys Act 2012;9:151 [FREE Full text] [CrossRef] [Medline]\n- Curtis K, Lahiri S, Brown KE. Targeting parents for childhood weight management: development of a theory-driven and user-centered healthy eating app. JMIR Mhealth Uhealth 2015 Jun 18;3(2):e69 [FREE Full text] [CrossRef] [Medline]\n- Schoffman DE, Turner-McGrievy G, Jones SJ, Wilcox S. Mobile apps for pediatric obesity prevention and treatment, healthy eating, and physical activity promotion: just fun and games? Transl Behav Med 2013 Sep;3(3):320-325 [FREE Full text] [CrossRef] [Medline]\n- Tabacchi G, Giammanco S, La Guardia M, Giammanco M. A review of the literature and a new classification of the early determinants of childhood obesity: from pregnancy to the first years of life. Nutrition Research 2007 Oct;27(10):587-604. [CrossRef]\n- Birch LL. Child feeding practices and the etiology of obesity. Obesity (Silver Spring) 2006 Mar;14(3):343-344 [FREE Full text] [CrossRef] [Medline]\n- Pagoto S, Schneider K, Jojic M, DeBiasse M, Mann D. Evidence-based strategies in weight-loss mobile apps. Am J Prev Med 2013 Nov;45(5):576-582. [CrossRef] [Medline]\n- Jeon E, Park HA, Min YH, Kim HY. Analysis of the information quality of korean obesity-management smartphone applications. Healthc Inform Res 2014 Jan;20(1):23-29 [FREE Full text] [CrossRef] [Medline]\n- Zhang MW, Ho RC, Hawa R, Sockalingam S. Analysis of the information quality of bariatric surgery smartphone applications using the silberg scale. Obes Surg 2016 Jan;26(1):163-168. [CrossRef] [Medline]\n- Cafazzo JA, Casselman M, Hamming N, Katzman DK, Palmert MR. Design of an mHealth app for the self-management of adolescent type 1 diabetes: a pilot study. J Med Internet Res 2012 May;14(3):e70 [FREE Full text] [CrossRef] [Medline]\n- Carter MC, Burley VJ, Cade JE. Development of 'My Meal Mate' – A smartphone intervention for weight loss. Nutrition Bulletin 2013 Feb 07;38(1):80-84. [CrossRef]\n- Hebden L, Cook A, van der Ploeg HP, Allman-Farinelli M. Development of smartphone applications for nutrition and physical activity behavior change. JMIR Res Protoc 2012 Aug;1(2):e9 [FREE Full text] [CrossRef] [Medline]\n- Campbell N, Murray E, Darbyshire J, Emery J, Farmer A, Griffiths F, et al. Designing and evaluating complex interventions to improve health care. BMJ 2007 Mar 03;334(7591):455-459 [FREE Full text] [CrossRef] [Medline]\n- Avis J, van MT, Fournier R, Ball G. Lessons Learned From Using Focus Groups to Refine Digital Interventions. JMIR Res Protoc 2015 Jul 31;4(3):e95 [FREE Full text] [CrossRef] [Medline]\n- Burrows T, Hutchesson M, Chai LK, Rollo M, Skinner G, Collins C. Nutrition interventions for prevention and management of childhood obesity: what do parents want from an eHealth program? Nutrients 2015 Dec 15;7(12):10469-10479 [FREE Full text] [CrossRef] [Medline]\n- Mummah S, Robinson T, King A, Gardner C, Sutton S. IDEAS (Integrate, Design, Assess, and Share): A framework and toolkit of strategies for the development of more effective digital interventions to change health behavior. J Med Internet Res 2016;18(12):e317. [CrossRef]\n- Michie S, Richardson M, Johnston M. The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: building an international consensus for the reporting of behavior change interventions. Ann Behav Med 2013;46:81-95.\n- Barlow SE, Expert C. Expert committee recommendations regarding the prevention, assessment, and treatment of child and adolescent overweight and obesity: summary report. Pediatrics 2007 Dec;120 Suppl 4:S164-S192. [CrossRef] [Medline]\n- Sargent G, Pilotto L, Baur L. Components of primary care interventions to treat childhood overweight and obesity: a systematic review of effect. Obes Rev 2011;12:e219-e235.\n- Pinelli L, Elerdini N, Faith MS, Agnello D, Ambruzzi A, De SM, et al. Childhood obesity: results of a multicenter study of obesity treatment in Italy. J Pediatr Endocrinol Metab 1999;12 Suppl 3:795-799. [Medline]\n- Limauro R, Farris E, Gallo P, Cioffi L, Tanas R. Medico e Bambino. 2013. La terapia del bambino sovrappeso e obeso nell’ambulatorio del pediatra di famiglia con l’educazione terapeutica familiare: follow-up di tre anni URL: https://www.medicoebambino.com/?id=1310_667.pdf [accessed 2017-04-06] [WebCite Cache]\n- Eccher C, Piras EM, Stenico M. TreC - a REST-based regional PHR. Stud Health Technol Inform 2011;169:108-112. [Medline]\n- Galligioni E, Piras EM, Galvagni M, Eccher C, Caramatti S, Zanolli D, et al. Integrating mHealth in Oncology: experience in the Province of Trento. J Med Internet Res 2015 May 13;17(5):e114 [FREE Full text] [CrossRef] [Medline]\n- Bach-Faig A, Berry EM, Lairon D, Reguant J, Trichopoulou A, Dernini S, Mediterranean Diet Foundation Expert Group. Mediterranean diet pyramid today. Science and cultural updates. Public Health Nutr 2011 Dec;14(12A):2274-2284. [CrossRef] [Medline]\n- Ghiselli A. SINU. 2014. LARN, Livelli di Assunzione di Riferimento di Nutrienti ed energia per la popolazione italiana URL: http://www.sinu.it/documenti/20121016_LARN_bologna_sintesi_prefinale.pdf [accessed 2017-04-06] [WebCite Cache]\n- Cialfa E. Entecra. 2003. Linee guida per una sana alimentazione italiana URL: http://nut.entecra.it/files/download/linee_guida/lineeguida_intro.pdf [accessed 2017-04-06] [WebCite Cache]\n- Prochaska J, Velicer WF. The transtheoretical model of health behavior change. Am J Health Promot 1997;12(1):38-48. [Medline]\n- University of Rhode Island. Weight control: stages of change (short form) URL: http://web.uri.edu/cprc/weight-control-stages-of-change-short-form/ [accessed 2017-03-29] [WebCite Cache]\n- Brooke J. SUS: a retrospective. J Usability Stud 2013;8(2):29-40.\n- Maykut P, Morehouse R. Beginning Qualitative Research: A Philosophic and Practical Guide. London, UK: Falmer Press; 1994.\n- Rusin M, Arsand E, Hartvigsen G. Functionalities and input methods for recording food intake: a systematic review. Int J Med Inform 2013;82(8):653-664. [Medline]\n- Højgaard B, Gyrd-Hansen D, Olsen KR, Søgaard J, Sørensen TI. Waist circumference and body mass index as predictors of health care costs. PLoS One 2008 Jul 09;3(7):e2619 [FREE Full text] [CrossRef] [Medline]\n- Patel MS, Asch DA, Volpp KG. Wearable devices as facilitators, not drivers, of health behavior change. JAMA 2015;313:459-460.\n- Jensen C, Duncombe K, Lott M, Hunsaker S, Duraccio K, Woolford S. An evaluation of a smartphone-assisted behavioral weight control intervention for adolescents: pilot study. JMIR Mhealth Uhealth 2016 Aug 23;4(3):e102 [FREE Full text] [CrossRef] [Medline]\n- Choo S. Development of a weight loss mobile app linked with an accelerometer for use in the clinic: usability, acceptability, and early testing of its impact on the patient-doctor relationship. JMIR mHealth and uHealth 2016;4(1):e24. [CrossRef] [Medline]\n- Sama PR, Eapen ZJ, Weinfurt KP, Shah BR, Schulman KA. An evaluation of mobile health application tools. JMIR Mhealth Uhealth 2014;2(2):e19 [FREE Full text] [CrossRef] [Medline]\n- Sharma AM, Kushner RF. A proposed clinical staging system for obesity. Int J Obes (Lond) 2009 Mar;33(3):289-295. [CrossRef] [Medline]\n- Spook JE, Paulussen T, Kok G, Van EP. Monitoring dietary intake and physical activity electronically: feasibility, usability, and ecological validity of a mobile-based Ecological Momentary Assessment tool. J Med Internet Res 2013;15(9):e214 [FREE Full text] [CrossRef] [Medline]\n- Thompson L, McCabe R. The effect of clinician-patient alliance and communication on treatment adherence in mental health care: a systematic review. BMC Psychiatry 2012;12:87 [FREE Full text] [CrossRef] [Medline]\n- Whittaker R, Merry S, Dorey E, Maddison R. A development and evaluation process for mHealth interventions: examples from New Zealand. J Health Commun 2012 May;17 Suppl 1:11-21. [CrossRef] [Medline]\n- Pagoto S, Bennett GG. How behavioral science can advance digital health. Transl Behav Med 2013 Sep;3(3):271-276 [FREE Full text] [CrossRef] [Medline]\n- Xu R, Cvijikj IP, Kowatsch T, Michahelles F, Büchter D, Brogle B, et al. Tell me what to eat – design and evaluation of a mobile companion helping children and their parents to plan nutrition intake. In: Ambient Intelligence. Cham, Switzerlan: Springer; 2014.\n- Mameli C, Brunetti D, Colombo V, Bedogni G, Schneider L, Penagini F, et al. Combined use of a wristband and a smartphone to reduce body weight in obese children: randomized controlled trial. Pediatr Obes 2016 Nov 29 Epub ahead of print. [CrossRef] [Medline]\n|BC: behavior change|\n|eHealth: electronic health|\n|IU: intention to use|\n|mHealth: mobile health|\n|SD: standard deviation|\n|SoC: state of change|\n|SUS: system usability scale|\n|UCD: user-centered design|\n|vA: version A|\n|vB: version B|\nEdited by G Eysenbach; submitted 01.12.16; peer-reviewed by M Bestek, M Jordan-Marsh, M Zhang; comments to author 26.01.17; revised version received 21.02.17; accepted 14.03.17; published 13.04.17\n©Silvia Gabrielli, Marco Dianti, Rosa Maimone, Marta Betta, Lorena Filippi, Monica Ghezzi, Stefano Forti. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 13.04.2017.\nThis is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included."
] | [
"<urn:uuid:fa241811-ffd9-4f49-95c9-22805418ee2e>"
] | [
"CC-MAIN-2017-26"
] | [
"http://mhealth.jmir.org/2017/4/e48/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00181.warc.gz"
] | [
"en"
] | [
0.9169665575027466
] | [
10577
] | [
2.53125
] | [
3
] |
[
"The landscape of colonial America has had a major influence on not only our country's homes but on our gardens as well. Gardens were not just a pretty pastime for the colonists; they were a matter of survival. Colonial gardens provided essential foods and medicines. Although gardens of today serve a different purpose, there is much we can learn from studying early American landscape design.\nThe Plymouth Colony settlers came equipped with seeds from England, yet nearly starved in the winter of 1620-21. They quickly learned how to cultivate the corn, pumpkins and squash in their new world, however, and a generation later Governor William Bradford wrote of gardens that contained not only food but flowers. The woman of the house was responsible for the garden adjacent to the home. Here she would grow the plants she needed for medicine, brewing and baking, repelling insects and vermin, freshening the home and dyeing cloth. She would have grown herbs for flavoring food, greens for making salads, and possibly a few flowers purely to enjoy.\nFor the sake of economy and ease of use, the garden was often in a quadrant with walks in between the four sections. An edging plant like box, pinks or thrift bordered the beds to hold the soil in place. Just as many colonial home were symmetrical in style, so were the gardens. The formal pathways between the beds were sometimes made of brick or pea gravel. Crushed oyster shells were a popular path material in some of the fine manor homes.\nAlthough we tend to think all colonial gardens were in the formal style of Williamsburg or Mt. Vernon, a more rustic and natural landscape style can be found at sites such as the National Colonial Farm in Accokeek or Claude Moore Colonial Farm in Virginia.\nThe plants in the colonial garden would have included both native American plants and plants grown from seed brought over from England. Colonial herb gardens would have contained dozens of plants, including anise, applemint, borage, calendula (pot marigold), chamomile, chives, dill, hyssop, johnny jump-ups, lavender, lemon balm, mint, rosemary, rue, scented geraniums, southernwood, sweet woodruff, tansy, wormwood and yarrow. Some ornamental favorites of the time were boxwood, dianthus, hollyhock, iris and roses.\nFences were an important element of the colonial garden landscape. By colonial law, fences of at least 4 1/2 feet were required around each property. They were intended to keep out stray horses and cattle. Brick fences were most common around public buildings. Private buildings were more likely to have a post and rail fence or a picket fence. More rustic wattle fences were made of twigs, branches or grapevines woven together in the springtime when the material was still pliable.\nEven if you don't have room for a large formal garden, there are elements of colonial landscape design you can bring into your own garden, such as an herb garden. Landscape designer Ruth Foster explains how to incorporate some of these colonial ideas in a video at BobVila.com. In recreating a colonial landscape for a modern colonial-style home, she uses two junipers to serve as sentries to the front garden. A third juniper, clipped topiary-style to form three separate globes, serves as the centerpiece of the garden. She also employs roses, hydrangea, holly, crabapples and lilac. Lilac was a special favorite in colonial times, and was imported from England very early on."
] | [
"<urn:uuid:2dac6978-0beb-4605-8a72-9bf4b510767c>"
] | [
"CC-MAIN-2014-10"
] | [
"http://www.gardenguides.com/74707-colonial-landscapes.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654330/warc/CC-MAIN-20140305060734-00089-ip-10-183-142-35.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9778937101364136
] | [
751
] | [
3.96875
] | [
4
] |
[
"EDITOR’S NOTE: Some of the plants reported to us are definitely not wild parsnip, but we recommend educating yourself as finding wild parsnip in the forest nowadays would not be unlikely.\nMany of you are familiar with poison ivy, but recently we have a new species popping up in small batches – Wild Parsnip. Some theorize birds are spreading the seeds and the loss of canopy from the ice-storm has allowed this shade intolerant species to gain a foothold in many areas this year. Regardless of how, this plant has been reported in the AF and it is a mean one. We take these reports seriously. Wild Parsnip comes from the same family as Giant Hogweed and will leave you with bad burns if the leaf oil gets on your skin.\n“The chemicals in the plant that cause this problem are called furocoumarins. When absorbed by your skin, they’re energized by ultraviolet light, causing a breakdown of cells and skin tissue. This leaves you with a red, sunburn-like area. (Don’t think you’re safe on a cloudy day – you can still get burned since ultraviolet light is present even on cloudy days.) Once exposed, your skin will turn red within 24 to 48 hours. In many cases, after the skin reddens, blisters appear–some of them pretty big. Sometimes the area that was burned takes on a dark red or brown discoloration that can last for as long as 2 years.” – Source\n“If one should come in contact with wild parsnip sap, you should immediately cover the exposed skin to prevent the reaction to sunlight (but the area will remain sensitized for about eight hours). The contact area should be washed with warm water and a mild soap. If exposure to sunlight causes a burn and blisters to develop the affected area should be covered with a cool, damp cloth to help relieve pain. The blistered skin should be kept out of the sunlight to avoid further burning. If blistering is severe, see a physician. There is no cure for parsnip burns; however, a topical or systemic cortisone steroid may relieve discomfort.” – Source\n“Vampire syndrome, I’ve named it. Because you can go out at night and do what you want, but during the day you have to hide because the UV rays will burn you,” “All of the sudden you can’t go in a boat. You can’t go canoeing, really. You have to stay totally covered up all the time because you don’t want to set it off again.” – Source\nPlease note not all plants will be fully grown or in bloom as shown in pictures. The leafs are not all exactly the same either. The plant has a very pungent odour if you crush a leaf or stem. Do not attempt to remove this yourself and stay on the trail!\nRandom fact: This plant was introduced to Canada by European settlers as the root is apparently edible(disclaimer: Do your own research there!!)\nHere are the reported locations and a handy guide:"
] | [
"<urn:uuid:61142260-7f9e-44ac-bc9d-ccb0d8123775>"
] | [
"CC-MAIN-2020-05"
] | [
"http://hafta.ca/2015/08/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687958.71/warc/CC-MAIN-20200126074227-20200126104227-00454.warc.gz"
] | [
"en"
] | [
0.9590756297111511
] | [
653
] | [
2.875
] | [
3
] |
[
"There are various types of group therapies including;\nPsycho-Dynamic Group Therapy\nPsycho-dynamic group therapy mostly helps individuals who are often aware of their unconscious motivations and needs as well as their common concerns to group members. This is made possible through analyzing of human interactions among specific group members. Issues that are based on authority and affection often provide rich sources of specific material used by the therapist to help the group members understand themselves and relationships.\nBehavior therapy comprises a number of unique techniques that are based on a common theoretical belief. Common maladaptive behaviors often develop based on the similar principles that usually govern all learning. Behavior therapy mostly focus on how a specific problem originated and the environmental factors used to maintain it. Various strategies are developed and employed so as to replace the specific problem behavior with a new, more adaptive behavior.\nThe phenomenological therapy is based on the belief that human beings are highly capable of knowingly controlling their own behavior and also taking responsibility for their own decisions. Some of the phenomenological group therapies include; Psychodrama, person-centered therapy and Gestalt therapy.\nPsycho-educational group therapy is led by a counselor with an intention of educating a certain group of people on a specific subject. It is composed of people with various practical expertise based on real-life aspects that are of the subject material. Although the counselor’s work is to present materials, most of the in discussions is normally based on group members.\nSkills Development Therapy\nSkills development group therapy gives its members skills that are needed to succeed in life. The various skills offered include; abstinence, avoiding relapse, saying no to drugs and alcohol, asserting oneself and managing anger and other strong emotions.\nCognitive Development Therapy\nCognitive development group therapy educates people on the importance of developing new behaviors through changing self-thoughts, perceptions and beliefs. Once a person sincerely accepts his or her negative behaviors are caused by false beliefs, he or she can then start learning new ways of positive thinking that will in turn lead to better and healthier behavioral outcomes.\nSupport group therapy helps its members deal with challenges that are associated with specific situations. Examples of the situations include; cancer, addiction and violence victims.\nProcess-oriented group therapy focuses more on the experience of being in a certain group as a healing opportunity. Examples include; the process of expressing one’s feelings, experience and thoughts in the group.\nProblem-solving group therapy assists the patient to identify various problems that are coming up with various realistic solutions. They then select the best possible solutions in developing and implementing the action plan.\nExpressive group therapy is a more specialized form of group therapy that majors on creative arts. Unlike traditional expressions of art, it is usually based on the assumption that people can quickly heal through imagination and other various forms of unique, creative expressions."
] | [
"<urn:uuid:ea56ca6e-3983-4ca4-b27d-524c135b0e45>"
] | [
"CC-MAIN-2020-10"
] | [
"https://typeslist.com/different-types-of-group-therapy/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147154.70/warc/CC-MAIN-20200228104413-20200228134413-00429.warc.gz"
] | [
"en"
] | [
0.9566929936408997
] | [
577
] | [
3.1875
] | [
3
] |
[
"Save the Bay\nThe Old Courthouse Spring Branch Stream Valley is particularly important because the stream leads to the Chesapeake Bay. Accordingly, it is protected under state law as a Resource Protection Area (RPA) and under Fairfax County law as an Environmental Quality Corridor (EQC).\nThe Chesapeake Bay Preservation Act – Resource Protection Areas\nIn 1983, the Chesapeake Bay Agreement was originally signed by Virginia, Maryland, Pennsylvania, the District of Columbia, the Chesapeake Bay Commission and the U.S. Environmental Protection Agency. It established a partnership to protect and restore the Chesapeake Bay’s ecosystem. To implement the Agreement in Virginia, the Virginia General Assembly enacted the Chesapeake Bay Preservation Act (Bay Act) in 1988. The Bay Act is a critical element of Virginia’s multifaceted response to protecting the Bay.\nFairfax County adopted its version of the Chesapeake Bay Preservation Ordinance to protect our local streams and one of the world’s most productive estuaries, the Chesapeake Bay, from pollution due to land use and development. All of Fairfax County drains into the Potomac River and ultimately the Chesapeake Bay. In an effort to protect and improve the quality of these waterways, and in alignment with state law, sensitive areas along streams throughout Fairfax County have been designated as Resource Protection Areas.\nAccording to Chapter 118 of the County’s Chesapeake Bay Preservation Ordinance, a Resource Protection Area (RPA) is defined as that component of the Chesapeake Bay Preservation Area comprised of lands adjacent to water bodies with perennial flow that have an intrinsic water quality value due to the ecological and biological processes they perform or are sensitive to impacts that may result in significant degradation of the quality of state waters. In their natural condition, these lands provide for the removal, reduction, or assimilation of sediments, nutrients, and potentially harmful or toxic substances from runoff entering the Bay and its tributaries, and minimize the adverse effects of human activities on state waters and aquatic resources.\nVirginia state regulations require that RPAs be designated around all water bodies with perennial flow. The Virginia Department of Public Works and Environmental Services (DPWES) conducted field studies to identify all perennial streams throughout the county and used this information to prepare a set of maps showing the location of RPAs as defined under the revised Ordinance. The maps were adopted by the Board on November 17, 2003.\nThe Old Courthouse Spring Branch is one of these RPAs and is depicted in the Chesapeake Bay Map, 29-3. The original RPA was revised in 2003 to include the portion between Gosnell Rd. and the area approximately behind Best Buy store. Most of the added land to the south of Old Courthouse Spring Branch belongs to TCA and Tysons Towers. This would mean that the portion of the Old Court House Spring Branch and its culvert area that lie within TCA property and Tysons Towers property should be protected too.\nEnvironmental Quality Corridor\nOld Courthouse Spring Branch Stream Valley is also categorized and protected as an Environmental Quality Corridor (EQC). An “Environmental Quality Corridor” includes lands that are designated under the Fairfax County Comprehensive Plan, 2003 Edition Policy Plan, Environment, Amended through 8-5-2002, Pages 12 and 13. Lands may be included within the EQC system if the land has a desirable or scarce habitat type, or one could be readily restored, or lie land hosts a species of special interest; the segment of open space could become part of a corridor to facilitate the movement of wildlife; the land could become part of a green belt separating land uses, providing passive recreational opportunities to people; or preservation of this land would result in significant reductions to nonpoint source water pollution, and/or micro climate control, and/or reductions in noise.\nFor the long history of EQC protection by Fairfax County, see the 2008 Park Authority EQC Presentation and Fairfax County Comprehensive Plan: Frequently Asked Questions. Any questions about how EQCs are identified or protected in Fairfax County, contact the Environmental Quality Advisory Council (EQAC)."
] | [
"<urn:uuid:3a9814a0-1514-4a25-8c7b-9730c86b2a18>"
] | [
"CC-MAIN-2020-05"
] | [
"https://tysonslastforest.org/tysons-last-forest-stream-valley/environmental-benefits/resource-protection-area-rpa-environmental-quality-corridor-eqc/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00010.warc.gz"
] | [
"en"
] | [
0.9335912466049194
] | [
832
] | [
3.046875
] | [
3
] |
[
"Welcome to Year 2!\nClass Teacher: Mrs Sutton Teaching Assistant: Denise Turner\nHere is some important information about Year 2:\nYear 2 are learning about number and number patterns. We can count forwards and backwards in 2s, 5s and 10s!\nYou can practise at home by clicking the pictures to follow the links:\nMaths Week 2018\nYear 2 had an amazing maths week this year! We really enjoyed working with our parents in class and making our fantastic Maths Hats!\nThis half term in Literacy, we are learning about the Great Fire of London. We have looked at the diary of Samuel Pepys and thought about the difference between London in 1666 compared to London now.\nWe went on a trip to the Museum of London and attended a great workshop - photos to follow!"
] | [
"<urn:uuid:9f37c1a2-77a8-4aa2-b963-b4f3c1770a4f>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.vittoria.islington.sch.uk/year-2/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145621.28/warc/CC-MAIN-20200221233354-20200222023354-00446.warc.gz"
] | [
"en"
] | [
0.9491856694221497
] | [
165
] | [
2.71875
] | [
3
] |
[
"BOOKS FOR YOU TO READ AND DOWNLOAD\n- Vocabulary Education by\nB. Mallikarjun, Ph.D.\n- A CONTRASTIVE ANALYSIS OF HINDI AND MALAYALAM by V. Geethakumary, Ph.D.\n- LANGUAGE OF ADVERTISEMENTS IN TAMIL by Sandhya Nayak, Ph.D.\n- An Introduction to TESOL: Methods of Teaching English to Speakers of Other Languages by M. S. Thirumalai, Ph.D.\n- Transformation of Natural Language into Indexing Language: Kannada - A Case Study by B. A. Sharada, Ph.D.\n- How to Learn Another Language? by M.S.Thirumalai, Ph.D.\n- Verbal Communication with CP Children by Shyamala Chengappa, Ph.D. and M.S.Thirumalai, Ph.D.\n- Bringing Order to Linguistic Diversity - Language Planning in the British Raj by\nRanjit Singh Rangila,\nM. S. Thirumalai,\nand B. Mallikarjun\n- E-mail your articles and book-length reports to [email protected] or send your floppy disk (preferably in Microsoft Word) by regular mail to:\nM. S. Thirumalai\n6820 Auto Club Road #320\nBloomington, MN 55438 USA.\n- Contributors from South Asia may send their articles to\nCentral Institute of Indian Languages,\nMysore 570006, India or e-mail to [email protected].\n- Your articles and booklength reports should be written following the MLA, LSA, or IJDL Stylesheet.\n- The Editorial Board has the right to accept, reject, or suggest modifications to the articles submitted for publication, and to make suitable stylistic adjustments. High quality, academic integrity, ethics and morals are expected from the authors and discussants.\nCopyright © 2001\nM. S. Thirumalai\nBISHNUPRIYA MANIPURI: A BRIEF INTRODUCTION\nAshim Kumar Singha\n1. The Manipuri Question\nIn recent years some controversy has arisen as to the validity of the name Manipuri attached to the Bishnupriya speech. I am a native speaker of Bishnupriya Manipuri. In this article I propose to give a short linguistic introduction to Bishnupriya Manipuri and to present my arguments in favor of the validity of attaching the name Manipuri to Bishnupriya.\nAt the outset I should make it clear that, historically speaking, both Bishnupriya and Meithei were used as languages of communication in Manipur for centuries, and that I do not claim any exclusive right to the appellation (Manipuri) to Bishnupriya only.\nAs a native speaker of Bishnupriya, however, I feel that the people of Bishnupriya Manipuri group are not given their rightful place and recognition among the languages spoken in Manipur, much against the government and census records as well as the research findings of reputed scholars.\nLet us begin by listing the observations of several researchers in the past.\n2. Bishnupriya Manipuri: Some Key Observations of Government Records and Researchers\n- \"There can be no reasonable doubt that a great Aryan wave of very pure blood passed through Manipur into Burma in pre-historic time. I see traces of this in the finely cut features seen now and then among the Manipuris\" - Gazetteer of Manipur by Captain E. W.\nDun, page 15.\n- \"A tribe known as Mayang speaks a mongrel form of\nAssamese known by the same name… They are also known\nas 'Bishnupiria Manipuris' or 'Kalosa Manipuris' \" -\nLinguistic Survey of India, 1891. Compiled by Sir G.\nA. Grierson, Vol V, page 419.\n- \"They (Mayangs) amongst themselves speak their own\nlanguage, which is a dialact of Hindee\" - An Account of\nthe Valley of Manipore by McCullock, 1849.\n- \"There is, moreover, an Aryan dialect called Mayang\nstill spoken in Manipur, the headquarters of which are\ntwo or three plain villages near Bishnupur\" - Gait's\nHistory of Assam by Shri Padmanath Vidyavinode, 1908.\n- \"By degrees, the Meiteis became dominant and that\nname was applied to the entire colony. It is highly\nprobable that these hordes over-ran a country that had\nbeen previously occupied by people of Aryan blood\nknown in Western India and to the bards... The present\npopulation of Manipur includes a tribe called Meiun\nwho speak a language of Sanskrit derivation. They are\nnow in a servile condition performing the duties of\ngrass-cutters to their conquerors.\" - Descriptive\nEthnology of Bengal by T.T. Dalton, 1872, page 48,49.\n- \"There is a also a degraded class called the\nKalachya or Bishnupuria … They speak a language which\nis different from that of the true Manipuris\" - Assam\nCensus Report by Gait.\n- \"Mayang, one of the languages spoken in the polyglot\nstate of Manipur, may, however, be classed as a\ndialect of this language.\" - Imperial Gazetteer of\nIndia, Vol I, 1907.\n- \"In 1627 A.D. Khgenba introduced the Meitai\nLanguage as court language in place of Bishnupriya or\nKala-chaia language.\" - The Background of Assamese\nCulture by Raj Mohan Nath, page 87.\n- \"Among the Manipuris, there is a community called\nMayang Kalichas who are more dark-skinned than the\nMeiteis\" - Religion and Culture of Manipur by Dr. M.\nKirti Singh, 1988, page 53.\n- \"It is quite probable that Khala-chais are the\nfirst cultural race in possession of the Manipur\nvalley, and they were connected more with the\nneighbouring kingdom of Kamrupa than with other\ncountries, and that is why their language is more akin\nto Kamrupi\" - The Background of Assamese Culture by R.\nM. Nath, 2nd edn. 1978, page 86.\n- \"Among the Kshatriyas there is a community known as\nVishnupriya(Vishnupuria) Manipuris.\" - Religious\nDevelopment in Manipur in the 18th and 19th Century, by\nDr M Kirti singh, page 20.\n- \"... So, in Manipur, in spite of Devanagari scripts\nwhich the Kala-chaias might have been using, the\nMeitais, when they came into power, introduced the new\nscripts.\" - The Background of Assamese Culture by R. M.\nNath, 2nd edn. 1978, page 90.\n- \"The Manipuris who have been Hinduised are\nworshippers of Bishnu\" - Sylhet District Gazetteer,\n1970, page 105.\n- \"Manipuris are diveded into two sections:\nKhalachaia or Bishnupriya and Meitei\" (English\nrendering from original Bengali) - Aranya Janapadey\nby Abdus Satter, 1974, page 296.\n- \"Bishnupuria Manipuris identify themselves as\nKshatriyas; they are pure Vaishnavs; they do not even\ntouch wine or meat.\"(English rendering from original\nBengali) - Purbobongo O Assam by Shri Krishna Mohan\nDhar, 1909, page 106,107.\n- \"Except the Bengali speaking Hindus and Muslims,\nthere are two communities in Barak valley called\nBishnupriya Manipuri and Meitei Manipuri. The\ndifference of languages exists in these communities.\"\n(English rendering from original Bengali) - Weekly\nDesh, June 19, 1989, A article by Dr. Dhirendra\n- \"Manipuri is another caste of this region. They are\ndivided into two tribes - Bishnupriya and Meitei.\"\n(English rendering from original Bengali) -Report of\nNational Aborginal Roundtable Meeting, Dhaka, Page 32.\n- \"These people had Indo-Aryan features and called\nthemselves Bishnupriyas. Long before their exodus they\nhad lost control of Manipur to the rival clan of\nMeiteis. In their adopted land their lives and limbs\nwere safe; but their language and culture began to\nlose ground against those of the majority. Meanwhile,\nthe Meiteis in Manipur became vindictive and imposed a\nde facto ban on Bishnupriya language and custom. The\nBishnupriya Manipuris were caught between a rock and a\nhard place. Today, young Manipuris are no longer sure\nof their cultural identity.\" -An Article By Syed\nZainul Akmal Al-Mahmood, published in the Daily Star\nWeekend Magazine in the January 21st issue, 2000.\n- \"The Manipuris residing in Cachar district are\ndivided into two distinct Sub-groups, viz, Meithei and\nBishnupriya\" - Letter of Commissioner for Linguistic\nMinorities in India, dated 29 August,1973.\n- \"The Bishnupriya are known as the Khala chais.\nThey were the first ruling race of Manipur.\" (English\nrendering from original Bengali) - Aranya Janapadey\nby Abdus Satter, 1974, page 297.\n- \"The Manipuris divided into three main groups -\nBishnupriya, Meitei and Pangans\" (English rendering\nfrom original Bengali ) - Moulvibazar Zelar Jonojibon\nby Prof Rasamoy Mohanto,1988, page 86.\n- \"Probably most controversial class of people having\nno homeland of their own, subsequently losing their\nidentities are the Bishnupriyas\" - Tribals and their\nCulture in Manipur and Nagaland by G. K. Ghose. Page\n3. Two Manipuri Languages\nThese observations make it clear that in the past the term \"Manipuri\" has been applied to two distinct linguistic groups: Meitei and Bishnupriya. The \"Manipuris,\" from a linguistic point of view, are divided into two groups, namely, the Meiteis and the\nBishnupriyas. The Meiteis entered Manipur from the\neast; their Language is of the Tibeto-Burman group.\nThe Bishnupriyas entered Manipur from the west; their\nlanguage is of the Indo-Aryan group.\nFor the last two centuries, the term 'Manipuri' has been associated also with the Bishnupriya people whenever others referred to them. The Bishnupriyas always considered them to be 'Manipuris.\"\nThe records maintained by the British India Government as well as the Government of India in independent India attest to this practice. For example, Sir George A. Grierson, in his Linguistic survey of India Vol -V, Part I, described the Bishnupriya Manipuris by the term \"Bishnupuriya Manipuris\" (\"A tribe known as Mayang\nspeaks a Mongrel form of Assamese by the same name.\nThey are also known as Bishnupriya Manipuri,\" page 419.)\nDuring the British regime, in the school statistics maintained by the Cachar School Board, Cachar, the main heading \"Manipuri\" was sub-divided into \"Meitei\" and \"Bishnupriya\".\nThe Census of India, 1961, also subdivided the main heading \"Manipuri\" into \"Meitei\" and \"Bishnupriya\". The Census of India 1971 report defended the use of the nomenclature \" Bishnupriya Manipuri\".\n4. The Bishnupriya Diaspora\nIn the early part of the 18th century, for various reasons including repeated Burmese invasions and local oppression, Bishnupriya people moved out of Manipur in large numbers to Cachar, Sylhet, and Tripura. A small number of people migrated to Burma also. Those who remained in Manipur merged with the Meitheis.\nBishnupriya Manipuri was originally confined only to\nthe surroundings of the Lake Loktak in Manipur. The\nprincipal localities where this language was spoken\nare now known as Khangabok, Heirok, Mayang Yamphal,\nBishnupur, Khunan, Ningthankhong, Ngakhong,\nThamnapoxpi, and so on. However, later, a great majority\nof speakers fled away from Manipur and took refuge in\nAssam, Tripura, Sylhet and Cachar during the eighteenth and\nnineteenth centuries due to the internal conflicts among the\nprinces of Manipur and due to Burmese attack.\nConsequently, it was difficult for the small number of\nBishnupriyas who remained in Manipur to retain their\nlanguage because of the impact of Meitei, although Dr.\nG.A. Grierson, in 1891, found the existence of a\nconsiderable number of speakers (1000) in two or three\nvillages near Bishnupur, locally known as Lamangdong.(\nLSI, Vol -V, Page 419). This Language is now spoken in\nparts of Assam, Tripura, Manipur(Jiribam\nSub-division) in India, in Bangladesh, in Burma and\nother overseas countries.\n5. Recognition of Meithei as the Manipuri Language, and Consequent Conflict\nThe 1968 Language Bill passed by the Manipur Government making Meitei (a non-Aryan word) synonymous to Manipuri (an Aryan word) and the inclusion of Meitei language as the Manipuri language in the Eighth\nschedule of the Constitution of India came as a rude shock to the ethnic and cultural identity of the Bishnupriya-Manipuri speaking people residing in Manipur, Assam and Tripura. They feel aggrieved that their identity as speakers of a Manipuri language that is quite distinct from Meithei has not been given due consideration when Meithei was taken to be wholly synonymous to Manipuri. They feel that their Manipuri identity is as old as the Manipuri identity of the Meitheis. Through this act of associating exclusively the Meithei language with the term Manipuri, they are deprived of this identity and heritage. The Linguistic Survey of India calls the speech of Bishnupriyas Bishnupriya Manipuri. During the British rule the Cachar School Board, and in independent India the Census of India Reports of 1961 and 1971 all refer to Bishnupriya as Bishnupriya-Manipuri. These recent records in their favor and the non-recognition of such records further accentuate the feeling of the loss of identity and heritage among the Bishnupriya Manipuris.\n6. Dialects of Bishnupriya Manipuri\nBishnupriya-Manipuri language is in close\nproximity with the Sauraseni-Maharastri Prakrit, and\nalso contains pure Vedic or Sanskrit words.\nBishnupriya Manipuri has two dialects, namely,\n- Rajar Gang (Kings Village) and\n- Madoi Gang (Queens village).\nThese two dialects, however, exist side by side in the same\nlocalities. The Madoi Gang dialect is/was spoken\nprobably in the Khangabok-Heirok area and the Rajar\nGang dialect, in the Bishnupur-Ningthankhong area of\nManipur. Morphological difference between the two\ndialects is negligible, but from the point of\nvocabulary, there are differences.\n7. Is Bishnupuriya Manipuri a Dialect of Bengali or Assamese?\nThough there is a correlation between the denotative words of Bishnupriya-Manipuri with those of Bengali, Assmese, and Meitei languages for regional and historical reasons, it does not mean that the original Bishnupriya Manipuri language is lost because of the influence of the surrounding languages nor is it reasonable to think that the Bishnupriya Manipuri language is the formative language of the plains people of Assam, Bengal or Manipur as viewed by certain phoneticians. The phonological and syntactical mainstream of the Bishnupriya Manipuri language was never hampered and the same is even now with its distinct identity. Moreover, it is very unlikely that the plains people of Assam, Bengal, and Manipur would have culturally, linguistically, and politically united together to form a language like Bishnupriya Manipuri used in the Valley of Manipur.\nDr. Suniti Kumar Chatterjee, a renowned Bangla phonetician, listed Bishnupriya Manipuri to be a dialect of Bengali, whereas Dr. Maheswar Neog and Dr. Banikanta Kakti claimed it as a dialect of Assamese. However, their observations are not based on any detailed study of Bishnupriya Manipuri language. The data supplied by Dr. Chatterji does not tally with the actual speech of the Bishnupuriya people from Manipur, Assam, Tripura, or Bangladesh. It appears that his informant or informants used a variety with a mixture of Bengali. The numerous dissimilarities between Bishnupriya Manipuri on the one hand and Assamese and Bengali on the other have not been taken into consideration by these researchers.\nConsider the following linguistic facts:\n- The difference in verbal forms according to difference in gender. e.g. He goes = Ta jarga, She goes = tei jeiriga.\n- The difference in verbal forms according to difference in number. e.g. I am going = Mi Jauriga, We are going = Ami Jiarga.\n- Bisnupriya Manipuri has a few case affixes of its own, e.g. 3rd case ending \"Lo\" = with, 5th case ending \"Rangto\" =from, 7th case ending \"Rang\" = in.\n- Bishnupriya Manipuri has got a number of affixes, i.e., Pratyas which are unprsent in Bengali/ Assamese.\n- Bishnupriya Manipuri has developed a complete T'o form for the future tense, e.g. I shall do = Mi Kortou, He will do = Ta kortoi.\n- Bishnupriya Manipuri has got some distinct pronominal forms, e.g. You= Ti, I = Mi, He = Ta etc.\n- The language has two distinct dialects.\n- The vocabulary of Bishnupriya Manipuri includes more than 8,000 words which do not occur in Assamese or Bengali.\nSo, Bishnupriya Manipuri is an independent language and cannot be called a dialect of any other language.\nThe term \"Manipuri\" is as much a matter of sentiment, culture and prestige to the Bishnupriyas, as the term \"Meitei\" is to the Meiteis. That is why the Bishnupriyas residing in Assam and Tripura have consistently refused the offers of both the state and central Governments to call their language only as 'Bisnupriya' and not Bishnupriya Manipuri. They have voiced their demands through peaceful, and democratic movements over the years. They are afraid that their cultural identity will be lost if the term \"Manipuri\" is dropped or deleted from the name of their community and language.\nSource and References\n- Singha, Jagat Mohan & Singha, Birendra. The Bishnupriya Manipuris & Their Language. Silchar ,1976\n- Barun Kumar Sinha. Imarging Pattern of the Bisnupriya Manipury Society- A Study in Cultural Identity, an essay. Dept. Of English,S.S.College Hailakandi.\n- G.K. Ghose. Tribals and Their Culture in Manipur and Nagaland. 1982.\n- Raj Mohan Nath. The Background of Assamese Culture. 2nd edn. 1978.\n- Singha, Mahendra Kumar. Prachin Manipurer Itihas. 1965.\n- Bidhan Sinha. Cultural Heritage of North-East India, Assam. 1999.\n- S.K. Chatterjee. Language and Literature of India. 1963.\n- Edgar C. Polome. Language, Society, and Paleoculture.\n- Captain E.W. Dun. Gazetteer of Manipur. 1885.\n- Sir G. A. Grierson. Linguistic Survey of India, Vol-5. 1903.\n- Sir G. A. Grierson. Linguistic Survey of India, Vol-3. 1904.\n- Vidyavinode, P. Gaits History of Assam. 1908.\n- K.P. Sinha. Bhasatatvar Ruprekha. 1977.\n- K.P. Sinha. An Anthological Dictionary of Bishnupriya Manipuri. 1982.\n- M. Kirti Singh. Religious Developments in Manipur in the 18th and 19th Centuuy. 1980.\n- Md. Abdus Sattar. Aronya Janapade. 1974.\n- Sri Sena Singha / Prachinadhunik Samkhipta Manipurer Itihas.\nHOME PAGE | BACK ISSUES | Urdu in Karnataka | Bishnupriya Manipuri: A Brief Introduction |Language Policy For Education In Indian States: Karnataka | 20th Century Language Visionaries | Endangered Language: A Case Study of Sansiboli | CONTACT EDITOR\nAshim Kumar Singha\nDepartment of Computer Science and Engineering\nBangladesh University of Engineering and Technology"
] | [
"<urn:uuid:8e55005a-b367-4763-8988-f9c5bbe77f7c>"
] | [
"CC-MAIN-2020-10"
] | [
"http://www.languageinindia.com/dec2002/bishnupriya.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144722.77/warc/CC-MAIN-20200220100914-20200220130914-00164.warc.gz"
] | [
"en"
] | [
0.9058751463890076
] | [
4951
] | [
2.546875
] | [
3
] |
[
"The times they are a changing. Instead of the old 1960s refrain of “Save the Whales”, the new refrain these days might be “Militarize the Whales.”\nThe U.K. based newspaper The Guardian has reported that Norwegian fishermen have discovered a beluga whale behaving strangely and bothering them while they tried to set their nets. The whale was swimming back and forth between the boats and harassing the fishermen while wearing a mysterious harness or straps around its body that could be used to hold a small camera or even a tiny weapon.\nExperts in Norway believe that the white beluga whale may have been trained by the Russians to spy or for some sort of military defence purposes, says the newspaper.\nThe whale was swimming up to various small boats and bothering the fishermen near the village of Inga in Norway by tugging on lines and straps and trying to pull these ropes from the sides of the vessels, preventing the setting of nets.\n“The strange behaviour of the whale, which was actively seeking out the vessels…raised suspicions among marine experts that the animal had been given military-grade training by neighbouring Russia,” the newspaper report says.\nThe whale didn’t seem to fear the fishermen. The harness was removed and an inscription on the harness read: “Equipment of St. Petersburg”.\n“If this whale comes from Russia – and there is great reason to believe it – then it is not Russian scientists, but rather the navy that has done this,” the newspaper quotes a Norwegian research scientist as saying.\nDuring the 1980s and the Cold War, Soviet Russia had a program to train dolphins for military purposes because of their “sharp vision, stealth and good memory, making them effective underwater tools for detecting weapons,” says the news report.\nThe Soviet mammal training program was closed in the 1990s but a recent Russian TV report says that the navy was again training beluga whales, seals and dolphins.\nPreviously, “dolphins and seals were trained to carry tools for divers and detect torpedoes, mines, and other ammunition sunk to depths of up to 120 metres,” says the newspaper report. Belugas were not used as much because of cold water temperatures."
] | [
"<urn:uuid:09043249-ef43-4eb3-b97d-baa4998bbd9a>"
] | [
"CC-MAIN-2020-10"
] | [
"https://ontariosailormagazine.ca/2019/05/save-the-whales-for-war/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141396.22/warc/CC-MAIN-20200216182139-20200216212139-00394.warc.gz"
] | [
"en"
] | [
0.9786252975463867
] | [
463
] | [
2.75
] | [
3
] |
[
"Four days from now, the new year will be upon us. Perhaps it`s time to start planning those resolutions? Like how we simply must stop eating all of that fat.\nThe American diet is almost 40 percent fat and that`s too much, according to many health groups, including the American Heart Association and American Cancer Society.\nBetter to get that figure down to 30 percent of calories, they say. OK, but how? you might ask. Project LEAN (Lowfat Eating for America Now) can help.\nSponsored by the Henry J. Kaiser Family Foundation, Menlo Park, Calif., and Partners for Better Health, the project asked food professionals to contribute to this national campaign to lower fat in our diets. They came up with ideas that don`t sacrifice taste and Project LEAN put them all together in a new booklet.\nCalled ``Lean Toward Health,`` the booklet shows you how to change the basics in your pantry to low-fat and high-fiber varieties of foods. And it gives ideas on reading food labels and dining out. To order a copy of the free booklet, call 800-EAT-LEAN."
] | [
"<urn:uuid:df076a5b-2efd-4779-a4a5-1a1bc09ee418>"
] | [
"CC-MAIN-2017-26"
] | [
"http://articles.chicagotribune.com/1989-12-28/entertainment/8903210850_1_lowfat-eating-american-diet-booklet"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00203.warc.gz"
] | [
"en"
] | [
0.9407557249069214
] | [
239
] | [
2.640625
] | [
3
] |
[
"|Nerve: Cranial nerves|\n|Inferior view of the brain and brain stem showing cranial nerves. An unlabelled version is here|\n|Latin||nervus cranialis (plural: nervi craniales)|\nCranial nerves are nerves that emerge directly from the brain, in contrast to spinal nerves, which emerge from segments of the spinal cord. In humans, there are traditionally twelve pairs of cranial nerves. Only the first and the second pair emerge from the cerebrum; the remaining ten pairs emerge from the brainstem.\nThe cranial nerves are part of the peripheral nervous system (PNS) with the exception of cranial nerve II. The optic nerve, along with the retina, is not a true peripheral nerve but a tract of the diencephalon. Cranial nerve ganglia originate in the central nervous system (CNS). The remaining eleven axons extend beyond the brain and are therefore considered part of the PNS.\nCranial nerves in non-human vertebrates \nHuman cranial nerves are nerves similar to those found in many other vertebrates. Cranial nerves XI and XII evolved in other species to amniotes (non-amphibian tetrapods), thus totaling twelve pairs. In some primitive cartilaginous fishes, such as the spiny dogfish or mud shark (Squalus acanthias), there is a terminal nerve numbered zero, since it exits the brain before the traditionally designated first cranial nerve.\nList of cranial nerves \n|I||Olfactory||Purely sensory||Telencephalon||Anterior olfactory nucleus||Transmits the sense of smell from the nasal cavity. Located in olfactory foramina in the cribriform plate of ethmoid.|\n|II||Optic||Purely sensory||Retinal ganglion cells||[Lateral geniculate nucleus]||Transmits visual signals from the retina of the eye to the brain. Located in the optic canal.|\n|III||Oculomotor||Mainly motor||Anterior aspect of Midbrain||Oculomotor nucleus, Edinger-Westphal nucleus||Innervates the levator palpebrae superioris, superior rectus, medial rectus, inferior rectus, and inferior oblique, which collectively perform most eye movements. Also innervates the sphincter pupillae and the muscles of the ciliary body. Located in the superior orbital fissure.|\n|IV||Trochlear||motor||Dorsal aspect of Midbrain||Trochlear nucleus||Innervates the superior oblique muscle, which depresses, rotates laterally, and intorts the eyeball. Located in the superior orbital fissure.|\n|V||Trigeminal||Both sensory and motor||Pons||Principal sensory trigeminal nucleus, Spinal trigeminal nucleus, Mesencephalic trigeminal nucleus, Trigeminal motor nucleus||Receives sensation from the face and innervates the muscles of mastication. Located in the superior orbital fissure (ophthalmic nerve - V1), foramen rotundum (maxillary nerve - V2), and foramen ovale (mandibular nerve - V3).|\n|VI||Abducens||Mainly motor||Nuclei lying under the floor of the fourth ventricle Pons||Abducens nucleus||Innervates the lateral rectus, which abducts the eye. Located in the superior orbital fissure.|\n|VII||Facial||Both sensory and motor||Pons (cerebellopontine angle) above olive||Facial nucleus, Solitary nucleus, Superior salivary nucleus||Provides motor innervation to the muscles of facial expression, posterior belly of the digastric muscle, stylohyoid muscle, and stapedius muscle. Also receives the special sense of taste from the anterior 2/3 of the tongue and provides secretomotor innervation to the salivary glands (except parotid) and the lacrimal gland. Located in and runs through the internal acoustic canal to the facial canal and exits at the stylomastoid foramen.|\n|VIII||Acoustic or Vestibulocochlear (or auditory-vestibular nerve or acoustic nerve)||Mostly sensory||Lateral to CN VII (cerebellopontine angle)||Vestibular nuclei, Cochlear nuclei||Senses sound, rotation, and gravity (essential for balance and movement). More specifically, the vestibular branch carries impulses for equilibrium and the cochlear branch carries impulses for hearing. Located in the internal acoustic canal.|\n|IX||Glossopharyngeal||Both sensory and motor||Medulla||Nucleus ambiguus, Inferior salivary nucleus, Solitary nucleus||Receives taste from the posterior 1/3 of the tongue, provides secretomotor innervation to the parotid gland, and provides motor innervation to the stylopharyngeus. Some sensation is also relayed to the brain from the palatine tonsils. Located in the jugular foramen.|\n|X||Vagus||Both sensory and motor||Posterolateral sulcus of Medulla||Nucleus ambiguus, Dorsal motor vagal nucleus, Solitary nucleus||Supplies branchiomotor innervation to most laryngeal and pharyngeal muscles (except the stylopharyngeus, which is innervated by the glossopharyngeal). Also provides parasympathetic fibers to nearly all thoracic and abdominal viscera down to the splenic flexure. Receives the special sense of taste from the epiglottis. A major function: controls muscles for voice and resonance and the soft palate. Symptoms of damage: dysphagia (swallowing problems), velopharyngeal insufficiency. Located in the jugular foramen.|\n|XI||Accessory or spinal-accessory (or cranial accessory nerve or spinal accessory nerve)||Mainly motor||Cranial and Spinal Roots||Nucleus ambiguus, Spinal accessory nucleus||Controls the sternocleidomastoid and trapezius muscles, and overlaps with functions of the vagus nerve (CN X). Symptoms of damage: inability to shrug, weak head movement. Located in the jugular foramen.|\n|XII||Hypoglossal||Mainly motor||Medulla||Hypoglossal nucleus||Provides motor innervation to the muscles of the tongue (except for the palatoglossus, which is innervated by the vagus nerve) and other glossal muscles. Important for swallowing (bolus formation) and speech articulation. Located in the hypoglossal canal.|\nMnemonic devices \nAn example mnemonic sentence for the initial letters \"OOOTTAFAGVSH\" is \"On old Olympus's towering tops, a Finn and German viewed some hops,\" and for the initial letters \"OOOTTAFVGVAH\" is \"Oh, oh, oh, to touch and feel very good velvet...ah, heaven.\" The differences between these depend on \"acoustic\" versus \"vestibulocochlea\" and \"spinal-accessory\" versus \"accessory\".\nA useful mnemonic for remembering which nerves are motor (M), sensory (S), or both (B) is, \"Some Say Marry Money But My Brother Says Big Brains Matter More\". There are many more mnemonics from many sources, for example OLd OPie OCcasionally TRies TRIGonometry And Feels VEry GLOomy, VAGUe, And HYPOactive.\nSee also \n||This article needs additional citations for verification. (January 2008)|\n- Board Review Series – Neuroanatomy, Fourth Edition, Lippincott Williams & Wilkins, Maryland 2008, p. 177. ISBN 978-0-7817-7245-7.\n- James S. White (21 March 2008). Neuroscience. McGraw-Hill Professional. pp. 1–. ISBN 978-0-07-149623-0. Retrieved 17 November 2010.\n- McCracken, Thomas (2000). New Atlas of Human Anatomy. China: MetroBooks. pp. 1–240. ISBN 1-5866-3097-0.\n- Henry Gray (1821–1865). Anatomy of the Human Body. 1918.\n- McCracken, Thomass (2000). New Atlas of Human Anatomy. China: MetroBooks. pp. 1–240. ISBN 1-5866-3097-0.\n- Dennis Long (2006). Vive Les Verbes Français!: 6,000 Verbs to Add Savoir-Flair to Your French. McGraw-Hill Professional. p. 8. ISBN 9780071478755.\n- Kevin C. Wang, Rita A. Mukhtar, and Rodrigo E Saenz (2005). Hardcore Neuroscience. Lippincott Williams & Wilkins. p. 23. ISBN 9781405104715.\n- Saladin, Kenneth S. (2008). Human anatomy (2nd ed.). McGraw-Hill Higher Education. ISBN 0071102094.\nExternal Links"
] | [
"<urn:uuid:c9dcfdc4-c0e2-463b-88a1-a8997b3d4822>"
] | [
"CC-MAIN-2013-20"
] | [
"http://en.wikipedia.org/wiki/Cranial_nerves"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00021-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.7222906351089478
] | [
1976
] | [
4.09375
] | [
4
] |
[
"They are carved.\nThey have been carved out.\n1. carving (countable noun) That room is full of carvings from the Pacific Islands.\n2. carving (non-countable noun) Carving and using clay are not the same because you can add with clay.\n3. carve (verb) Carve your name on a tree.\n4. calves (noun plural of calf) The truck was carrying a mature beast and two calves.\n5. carved (past participle) It is not carved in stone."
] | [
"<urn:uuid:af0a9a04-ab53-409d-9884-54b572c0af4c>"
] | [
"CC-MAIN-2017-30"
] | [
"http://englishconversations.org/lessons/notes-and-ideas-they-are-carved/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423901.32/warc/CC-MAIN-20170722042522-20170722062522-00031.warc.gz"
] | [
"en"
] | [
0.916791558265686
] | [
113
] | [
2.765625
] | [
3
] |
[
"Utilization of biochar and Trichoderma harzianum to promote growth of shallot and remediate lead-contaminated soil\nThis study aimed to determine the effect of biochar and Trichoderma harzianum toward lead removal in soil, lead absorption, lead content in plant tissue also growth and yield of shallot cultivated on lead-contaminated soil. The experimental design used was a completely factorial randomized block design consisting of 2 factors. The first factor was corn cobs biochar which was applied 1 week after basic fertilizer treatment and consisted of 4 levels, namely B0: without biochar, B1: 2.5 t ha-1, B2: 5 t ha-1, and B3: 10 t ha-1. The second factor was the dosage of liquid of Trichoderma harzianum, namely TR0: without T.harzianum, TR1: 10 mL L-1, and TR2: 20 mL L-1, which was applied three times at 14, 28 and 42 days after planting. Data were analyzed using the F test and continued with DMRT (Duncan Multiple Range Test) at P= 0.05 level. The results showed that the application of 5 t biochar ha-1 was able to remove lead and decreased lead uptake in plants. Application of T. harzianum could remove and decrease absorption in plant tissue biochar was not able to increase the growth of shallot while T. harzianum increased the number of leaves and the number of tubers.\nAkan, J.C., Mohmoud, S., Yikala, B.S. and Ogugbuaja, V.O. 2012. Bioaccumulation of some heavy metals in fish samples from river Benue in Vinikilang, Adamawa state, Nigeria. American Journal of Analytical Chemistry 3:727–736 doi:10.4236/ajac.2012.311097.\nAli, Z., Nawaz, I., Yousaf, S., Naqvi, S.T.A., Mahmood, T., Khan, N. and Iqbal, M. 2019. Wheat straw biochar promotes the growth and reduces the uptake of lead, cadmium and copper in Allium cepa. International Journal of Agriculture and Biology 21: 1173‒1180.\nAlia, N., Sardar, K., Said, M., Salma, K., Sadia, A., Sadaf, S., Toqeer, A. and Miklas, S. 2015. Toxicity and bioaccumulation of heavy metals in spinach (Spinacia oleracea) grown in a controlled environment. International Journal of Environmental Research and Public Health 12:7400–7416 doi:10.3390/ijerph120707400.\nAslam, Z., Khalid, M., Naveed, M. and Shahid, M. 2017. Evaluation of green waste and popular twigs biochar produced at different pyrolysis temperatures for remediation of heavy metals contaminated soil. International Journal of Agriculture and Biology 19: 1427‒1436.\nBahar YH. 2016. The impact of farmer behaviour in shallot cultivation on changing conditions agroecosystem in Brebes Regency. Jurnal Penyuluhan Pertanian 11(1):23-36 (in Indonesian).\nBasuki. 2014. Problems identification and shallots farming analyze in the highland during the rainy season in Majalengka District. Jurnal Hortikultura, 24(3):266-275 (in Indonesian).\nChaturvedi, A.D., Pal, D., Penta, S. and Kumar, A. 2015. Ecotoxic heavy metals transformation by bacteria and fungi in aquatic ecosystem. World Journal of Microbiology and Biotechnology 31:1595–1603, doi:10.1007/s11274–015–1911–5.\nChen, Y., Hua, Y., Zhang, S. and Tian, G. 2005. Transformation of heavy metal forms during sewage sludge bioleaching. Journal of Hazardous Materials 123:196–202, doi:10.1016/j.jhazmat.2005.03.047.\nCho, Y., Bolick, J.A. and Butcher, D.J. 2009. Phytoremediation of lead with green onions (Allium fistulosum) and uptake of arsenic compounds by moonlight ferns (Pteris cretica cv Mayii). Microchemical Journal 91(1): 6-8, doi: 10.1016/j.microc.2008.05.008.\nCobbet, C.S. 2000. Phytochelatins and their roles in heavy metal detoxification. Plant Physiology 123: 825–832.\nDamodaran, D., Suresh, G. and Mohan, R.B. 2011. Bioremediation of soil by removing heavy metals using Saccharomyces cerevisiae. 2nd International Conference on Environmental Science and Technology, IPCBEE vol.6 (2011), IACSIT Press, Singapore.\nDarsan, S., Sulistiyaningsih, E. and Wibowo, A. 2016. Various shallot seed treatments with Trichoderma to increase growth and yield on sandy coastal. Jurnal Ilmu Pertanian (Agricultural Science)1 (3) : 94-99.\nDixit, R., Wasiullah, Malaviya, D., Pandiyan, K., Singh, U.B., Sahu, A., Shukla, R., Singh, B.P., Rai, J.P., Sharma, P.K., Lade, H. and Paul, D. 2015. Bioremediation of heavy metals from soil and aquatic environment: An overview of principles and criteria of fundamental processes. Sustainability 7: 2189–2212.\nFellet, G., Marmiroli, M. and Marchiol, L. 2014. Elements uptake by metal accumulator species grown on mine tailings amended with three types of biochar. Science of the Total Environment 468–469: 598–608\nFlora, S.J.S., Flora, G., Saxena, G. and Mishra, M. 2007. Arsenic and lead induced free radical generation and their reversibility following chelation. Cellular and Molecular Biology 53: 26‒47.\nFu, F. and Wang, Q. 2011. Removal of heavy metal ions from wastewaters: A review. Journal of Environmental Management 92: 407–418.\nGelagutashvili, E. 2013. Comparative study on heavy metals biosorption by different types of bacteria. Open Journal of Metal 3: 62–67, doi:10.4236/ojmetal.2013.32A1008.\nGhelich, S., Zarinkamar, and Fatemeh. 2013. Histological and ultrastructure changes in Medicago sativa in response to lead stress. Journal of Pharmacognosy and Phytochemistry 2: 20-29.\nHadiawati, L., Suriadi, A., Sugianti, T. and Zulhaedar, F. 2020. Application of Trichoderma-enriched compost on shallot productivity and storability in East Lombok, West Nusa Tenggara. Jurnal Hortikultura (1): 57-64 (in Indonesian).\nHardiani, H. 2008. Clean up contaminated soil of hazardous waste from the deinking process in the paper industry by phytoremediation. Jurnal Riset Industri, 2(2):64-75 (in Indonesian).\nHarms, H., Schlosser, D. and Wick, L.Y. 2011. Untapped potential: Exploiting fungi in bioremediation of hazardous chemicals. Nature Reviews Microbiology 9:177–192, doi:10.1038/nrmicro2519.\nHartini. 2011. Plumbum (Pb) levels in shallot bulbs in Kersana District, Brebes. Jurnal Visikes 10(1): 69-75 (in Indonesian).\nHaryati, U. and Erfandi, D. 2019. Improvement of soil properties and yield of shallot (Allium cepa) using mulch and soil amendments. Jurnal Hortikultura 10(3): 200-2013 (in Indonesian).\nHerliana, O., Soesanto, L. and Mawadah, E. 2018. Phytobioremediation of cadmium contaminated soil using combination of Ipomoea reptans Poir and Trichoderma sp. and its effect on spinach growth\nand yield. Journal of Degraded and Mining Lands Management 6(1): 1519-1526, doi:10.15243/jdmlm. 2016.061.1519.\nHidayat, B. 2015. Remediation of heavy metal contaminated soil using biochar. Jurnal Pertanian Tropik 2(1):31-41 (in Indonesian).\nHussain, M., Farooq, M., Nawaz, A., Al-Sadi, A.M., Solaiman, Z.M., Alghamdi, S.S., Ammara, U., Ok, Y.S. and Siddique, K.H.M. 2017. Biochar for crop production: potential benefits and risks. Journal of Soils and Sediments 17: 685–716\nIppolito, J.A., Laird, D.A. and Busscher, W.J. 2012.Environmental benefits of biochar. Journal of Environmental Quality 41: 967–972\nKaryadi, K., Syarifudin, S. and Soterisnanto, D. 2012. Accumulation of heavy metal lead (Pb) as pesticide residue in agricultural land (case study on shallot agricultural land in Gemuh District, Kendal Regency). Jurnal Ilmu Lingkungan 9(1): 1-9 (in Indonesian).\nKomárek, M., Vaněk, A. and Ettler, V. 2013. Chemical stabilization of metals and arsenic in contaminated soils using oxides: a review. Environmental Pollution 172: 9–22.\nKopittke, P., Asher, C.J., Kopittke. R.A. and Menzies, N.W. 2007. Toxic effects of Pb2+ on growth of cowpea (Vigna unguiculata). Environmental Pollution 150: 280-287.\nKumar, G. and Tripathi, R. 2008. Lead-induced cytotoxicity and mutagenicity in grass pea. Turkish Journal of Biology 32: 73-78.\nKurniawan, A. and Nuraeni, E. 2016. Heavy metal mycoremediation: a review. Jurnal Bioteknologi dan Biosains Indonesia. 3(1): 36-45 (in Indonesian)\nLatifah, A., Kustantinah, and Soesanto, L. 2011. Utilization of several isolates (Trichoderma harzianum) as biological control agents for fusarium wilt disease in shallots in planta. Jurnal Eugenia 17(2): 86-95 (in Indonesian).\nMohsenzadeh, F. and Shahrokhi, F. 2014. Biological removing of cadmium from contaminated media by fungal biomass of Trichoderma species. Journal of Environmental Health Science & Engineering 12:102.\nMurtaza, G., Ghafoor, A., Qadir, M., Owens, G., Aziz, M.A., Zia, M.H. and Saifullah, 2010. Disposal and use of sewage on agricultural lands in Pakistan: A Review. Pedosphere 20: 23‒34.\nNurhasanah, Andrini, F. and Hamidy ,Y. 2015. Antifungal activity of red onion (Allium ascalonicum L.) juice against Candida albicans in vitro. Jurnal Ilmu Kedokteran 9 (2): 71-77 (in Indonesian).\nNurhidayati and Mariati. 2014. Utilization of maize cob biochar and rice husk charcoal as soil amendments for improving acid soil fertility and productivity. Journal of Degraded and Mining Lands Management 2(1): 223-230.\nNurhidayati, S., Majid, A. and Mihardjo, P.A. 2015. Utilization of liquid bio fungicide with Trichoderma sp. active compound to control anthracnose disease (Colletotrichum sp.) in chilli on the field. Berkala Ilmiah Pertanian 1(1): 19-27 (in Indonesian).\nOgunlade, M.O. and Agbeniyi, S.O. 2011. Impact of pesticides use on heavy metal pollution in cacao soil of Cross- River, Nigeria. African Journal of Agriculture Research 6(16): 3725 - 3728.\nPark, J.H, Girish, K.C., Nanthi, S.B., Jae, W.C. and Thammared, C. 2011. Biochar reduces the bioavailability and phytotoxicity of heavy metals. Plant and Soil 348: 439 - 451, doi 10.1007/s11104- 011-0948-y.\nPaz-Ferreiro, J., Lu, H., Fu, S., Méndez, A. and Gascó, G. 2014. Use of phytoremediation and biochar to remediate heavy metal polluted soils: a review. Solid Earth 5: 65–75.\nPrayudi, M., Zubair, A. and Maricar, I. 2015. Phytoremediation of soil contaminated Cr metal with vetiver plant on composted soil media. Repository of UNHAS, http://repository.unhas.ac.id /bitstream/handle/123456789/18791/.\nPriandoko, E.A., Parwanayoni, N.M.S. and Sundra, I.K. 2012. Heavy metal content (Pb and Cd) in green mustard (Brassica rapa) and Carrot (Daucus carrotafora) distributing in Denpasar City Market. Jurnal Simbiosis I (1) : 9-20 (in Indonesian).\nPuga, A.P., Abreu C.A., Melo L.C.A. and Beesley L. 2015. Biochar application to a contaminated soil reduces the availability and plant uptake of zinc, lead and cadmium. Journal of Environmental Management 159: 86-93.\nRahayu, Mujiyo and Arini, R.U. 2018. Land suitability evaluation of shallot (Allium ascalonicum L.) at production centres in Losari District, Brebes. Journal of Degraded and Mining Lands Management 6(1): 1505-1511, doi:10.15243/jdmlm. 2018.061.1505.\nRao, D.V., Shivannavar, C.T. and Gaddad, S.M. 2002. Bioleaching of copper from chalcopyrite ore by fungi. Indian Journal of Experimental Biology 40:319–324.\nRatnasari, I.F.D., Hadi, S.N., Suparto, S.R., Herliana, O. and Ahadiyat, Y.R. 2020. Phytoremediation of cadmium-contaminated soil using terrestrial kale (Ipomoea reptans Poir) and corncob biochar. Journal of Degraded and Mining Lands Management 7(4): 2313-2318, doi: 10.15243/jdmlm. 2020.074.2313.\nRincon, A.M., Benitez, T., Codon, A.C. and Moreno-Mateos, M.A. 2009. Biotechnological aspects of Trichoderma spp. In: Rai, M. and Bridge, P.D. (eds.), Applied Mycology (pp. 216–238). London: CAB International. http://doi.org/10.1079/9781845935344.0216.\nRosidah, S., Anggraito, Y.U, and Pukan, K.K. 2014. Tolerance test of tobacco (Nicotiana tabacum L.) to cadmium (Cd), lead (Pb), and copper (Cu) stress in liquid culture. Journal of Life Sciences Unnes 3 (2): 68-77 (in Indonesian).\nSantoso, S.E., Soesanto, L. and. Haryanto, T.A.D. 2007. Biological emphasis of moler disease in shallots using Trichoderma harzianum, Trichoderma koningii, and Pseudomonas fluorescens P60. Jurnal HPT Tropika 7(1): 53-61(in Indonesian).\nShoresh, M., Harman, G.E. and Mastouri, F. 2010. Induced systemic resistance and plant responses to fungal biocontrol agents. Annual Review in Phytopathology 48: 21–43.\nShovan, L.R., Bhuiyan, M.K.A., Begum, J.A. and Pervez, Z. 2008. In vitro control of Colletotrichum dematium causing anthracnose of soybean by fungicides, plant extracts and Trichoderma harzianum. International Journal of Sustainable Crop Production 3(3): 10–17.\nSukartono and Utomo, W.H. 2012. The role of biochar as a soil amendment in maize cultivation in semiarid tropical sandy loam Lombok. Buana Sains 12 (1) : 91-98 (in Indonesian).\nTaufik, Y. 2015. Horticultural Production Statistics, 2014. Direktorat Jenderal Hortikultura Kementerian Pertanian(in Indonesian).\nTripathi, P., Singh, P.C., Mishra, A., Chauhan, P.S., Dwivedi, S., Bais, R.T. and Tripathi, R.D. 2013. Trichoderma: a potential bioremediator for environmental clean up. Clean Technologies and Environmental Policy 15(4): 541 – 550.\nVankar, P.S. and Bajpai, D. 2008 Phytoremediation of Chrome-VI of tannery effluent by Trichoderma species. Desalination 222: 255–262.\nWang, H., Lin, K., Hou, Z., Richardson, B. and Gan, J. 2010. Sorption of the herbicide terbuthylazine in two New Zealand forest soils amended with biosolids and biochars. Journal of Soils and Sediments 10: 283‒289.\nWani, P.A. and Ayoola, O.H. 2015. Bioreduction of Cr (VI) by heavy metal resistant Pseudomonas species. Journal of Environmental Science and Technology 8:122–130, doi:10.3923/jest.2015.122.130.\nWidyatmoko, H. 2011. pH accuracy as a parameter of the level of heavy metal contamination in the soil. Jurnal Teknik Lingkungan 5(5): 173 – 178, 173 (in Indonesian).\nWulandari, R., Purnomo, T. and Winarsih. 2014. The ability of watercress plants (Ipomoea aquatica) in absorbing heavy metals cadmium (Cd) based on different concentrations and exposure times. LenteraBio 3(1): 83-89 (in Indonesian).\nZheng, W., Guo, M., Chow, T., Bennett, D.N., and Rajagopalan, N. 2010. Sorption properties of greenwaste biochar from two trizaine pesticides. Journal of Hazardous Materials 181 121-126.\nYuan, J.H., R.K. Xu, and H. Zhang. 2011. The forms of alkalis in the biochar produced from crop residues at different temperatures. Journal of Bioresource Technology 102: 3488–3497. doi:10.1016/j.biortech.2010.11.018.\n- There are currently no refbacks.\nCopyright (c) 2021 Journal of Degraded and Mining Lands Management\nThis work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License."
] | [
"<urn:uuid:4d3e23e9-f887-49e4-8a6f-57a889761a0d>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.jdmlm.ub.ac.id/index.php/jdmlm/article/view/845/0"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00351.warc.gz"
] | [
"en"
] | [
0.7172699570655823
] | [
4485
] | [
2.65625
] | [
3
] |
[
"Earlier in the year, plans to store America's nuclear waste inside one of America's most challenging engineering feats, Yucca Mountain, were scrapped due to a lack of federal funding.\nThe Yucca Mountain project, located in Nevada near the nuclear test sites, had been underway since 1987, when Congress had selected the site as America's nuclear waste repository. To ensure the waste was safely stored, over $9 billion was spent on concrete tunnels and chambers designed to keep waste safe for at least a million years.\nOne of the most extraordinary aspects of the project saw a five mile U-shaped tunnel was bored into the side of the extinct volcano, through which to transport the material.\nWhile environmentalists may have approved the decision by the White House, it does present the country with several problems; where does the country now store its nuclear waste, what shall happen to the Yucca Mountain complex and more importantly, if the President is seriously about more nuclear plants to wean the country off oil is he expecting them to be waste-free?\nTo discuss the two sides of the issue are US Infrastructure Online Editor Timon Singh and former senior advisor on Nuclear Nonproliferation matters at the US Department of Energy, Charity Azadian.\nCharity Azadian: \"One Step Forward, Two Steps Back\"\nAs the familiar saying goes, you can take the Senator (Harry Reid) out of Nevada, but you can't take the Nevada out of the Senator. It is clear that politics is once again trumping science. By allowing politicians, and not the scientific experts, to detail a path forward for Yucca Mountain, this only stalls the progress toward resolving the nation's nuclear waste problem.\nThe Nuclear Waste Policy Act of 1982 set 31 January 1998, as the deadline for the federal government to begin disposing of used fuel. More than a decade after the deadline, the government has still not settled on a policy for how to do it. The US Department of Energy (DOE) established a Blue Ribbon Commission to explore alternatives to long-term waste storage. The government's ineptitude to begin proper nuclear waste management should be a reason to remove government responsibilities, not remove Yucca from consideration. The Administration's Yucca Mountain policy signals once again that the government cannot be a trusted partner.\nEssentially the Administration's policies are schizophrenic. On one hand, President Obama has touted that the Federal Government will guarantee loans for nuclear power plants, and then days later states that he is going to abandon plans for a nuclear waste repository in Nevada. Furthermore, in staying the course with Obama-litic politics that sway to the wind, Energy Secretary Chu testified before Congress that he supported funding on Yucca Mountain, but then a few days later sent a letter to the committee that he would like to retract parts of his testimony, and that he was essentially confused.\nShocking, appalling, or is it? This type of delusional behavior and lack of integrity in our political leaders is unacceptable. And, by allowing politics to trump science at Yucca Mountain, Chu's announcement threatens to stall progress toward resolving the nation's nuclear waste problem.\nSo should we listen to the science, except when it's inconvenient to well-connected political leaders? If politicians eager to shut down Yucca Mountain are so confident that the science is on their side, why not allow the Nuclear Regulatory Commission to finish its license review? After, all, it's the NRC's responsibility to determine the technical feasibility of Yucca - even if it has been studied countless times.\nThe fact of the matter is that nuclear waste is currently being housed at several different national lab sites throughout the country, waiting to be deposited, buried forever, and the clock is ticking. Specifically, the current budget provides no answers as to what the Administration proposes to do with the approximately 57,700 tons of nuclear waste at more than 100 temporary sites around the country, or with the approximately 2000 tons generated each year by nuclear power plants. The Yucca site was designed specifically to handle spent fuel rods from the nation's 103 nuclear generators. \"The concern is not that these facilities are not safe,\" said Rick McLeod, executive for the Savannah River Community Reuse Organization. \"The concern is that the facilities have not been evaluated for storing the material permanently.\"\nThere are more than 60,000 tons of spent reactor fuel housed in temporary storage at commercial reactors in 31 states. Not to mention there are 7000 tons of high-level wastes left over from nuclear weapons production, much of it buried in 177 underground tanks at Hanford. For now, wastes from nuclear power generation and national defense programs are housed at 131 sites across the nation. There's no telling whether that number ever will be reduced under the course President Obama wants to take.\nAt the very least, DOE shouldn't spend any money closing down Yucca Mountain while its fate remains undecided. Better yet, the Administration ought to put Yucca Mountain back on the table ahead of any decision - it's bad policy to unilaterally scratch Yucca Mountain from consideration. It means throwing away the nearly $14 billion of the public's money that already has been spent studying the Nevada site.\nSo, what should the Administration do to constructively handle the Yucca Mountain dilemma? Some possible solutions are the following: 1) Allow the NRC to continue its license review, 2) Transfer the permit to construct Yucca Mountain to a third party, and 3) Use the Blue Ribbon Commission on America's Nuclear Future to inform a final decision on Yucca Mountain. After all, what's the current Administration afraid of, a little competition?!\nTimon Singh: \"A dangerous necessity?\"\nYucca Mountain is a issue that isn't just black and white. Despite my more environmental leanings, I am forced to agree that Yucca Mountain is a necessity for the United States for a number of reasons.\nIf President Obama is serious about switching to renewable sources of energy, as stated in the new Climate Bill and horrifically demonstrated by the Gulf of Mexico oil spill, then nuclear power plants are going to have to be built and used to provide enough electricity for the country, before truly 'clean' forms of renewable energy are up to significant levels.\nOf course, considering nuclear energy as a form of renewable energy is a bit of a joke considering the amount of radioactive waste it produces, but it does not emit any carbon, which is an objective at the forefront of governments all around the world.\nCurrently, the United States spreads its nuclear waste around 131 sites in 39 states, now from both an environmental and security point of view this is hardly safe and secure. As such, Yucca Mountain has always been touted as a \"sole, safe geological repository.\" However there are dangers with storing all your radioactive eggs in one colossal basket.\nWhen the Yucca Mountain proposal was sent to a Senate vote over eight years ago, Senator John Ensign of Nevada, opposed the idea saying that the proposal would \"give the terrorists plenty of opportunities by shipping this nuclear waste across the country through major metropolitan areas.\"\nNow, while this is fear-mongering of the worst kind, with quite a substantial terrorist force required to hijack an armed nuclear waste convoy, the chances of an accident are much more likely.\nShould a nuclear waste convoy or shipment be in an accident, then there are studies that this could essentially trigger a 'dirty bomb' in its own right. According to The Dekalb Neighbour in Dekalb County mere accidents may unintentionally detonate such a \"moving dirty bomb.\"\nIn Georgia, a state where nuclear waste would be shipping through en route to Yucca Mountain, there have been reports that there have been 16 accidents between trains and cars in the past five years. If that trend continues, there will be nearly 77 train accidents while nuclear waste is shipped through one of Georgia's most populated counties for the estimated 24 years of transport to Yucca Mountain.\nIn fact, according to the Federal Railroad Administration, there were over 13,000 railroad accidents in 2006, including over 840 fatalities. Over 2900 railroad accidents involved collisions with cars and other vehicles at a railroad crossing. In addition, 2145 railroad accidents involved train derailments, and more than 1400 railroad accidents were the result of defective equipment, including signal defects, track defects, and train equipment defects.\nAnd we haven't even started on the potential of an accident involving a road convoy...\nHowever, this is all pure speculation and it is clear that we do need a repository for nuclear waste and Yucca Mountain, ideally close to the radiated test sites of Nevada anyway, makes an obvious choice.\nThere are concerns from those that live near the site for obvious reasons. Apart from the fact that the people of Nevada would have highly radioactive material essentially in their backyard, there is a worry that possible natural forces such as erosion and earthquakes could render the site unstable and thus unsuitable to store nuclear isotopes.\nHow the brass tacks of the matter is that we just don't have another option. If the US is going to use nuclear power, which unfortunately it will have to for the near future, the country is going to need a place to store the waste and Yucca Mountain is that place.\nAfter all, $9 billion has already been spent on it. We might as well use it for something.\nCharity Azadian is a professor, diplomat and author. She served as the first Special Assistant on International Affairs for the Science and Technology Directorate at the U.S. Department of Homeland Security (DHS), and soon thereafter served as a Senior Advisor on Nuclear Nonproliferation matters at the U.S. Department of Energy (DOE) in the administrations of President George W. Bush."
] | [
"<urn:uuid:0b1cfaac-dcea-481e-b873-48d6951d2de1>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.americainfra.com/article/yucca-mountain/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00039-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9613527059555054
] | [
1969
] | [
2.796875
] | [
3
] |
[
"This is the final article in a four-part series on securing your Active Directory by expert Derek Melber\nI can't leave this series of articles on Active Directory security without touching on the de-facto method for managing security for all users and computers in the Active Directory domain: Group Policy. With almost 1,800 policy settings in a single Group Policy Object (GPO), it is no wonder they provide so much power, control, security, and management over an Active Directory enterprise. Every time I get in front of a group of people and talk about Group Policy, I say: \"It is impossible to talk about Active Directory security without talking about Group Policy!\"\nDefault Group Policy in Active Directory\nI am often told by seasoned Active Directory administrators that they don't use Group Policy. That statement is sort of like saying you don't eat chicken as you take a bite out of that KFC extra-crispy drumstick. There are actually two default GPOs in every Active Directory domain. These default GPOs are there for very distinct reasons and should be investigated to ensure they are configured properly to provide the best security for your company network.\nThe first default GPO is the Default Domain Policy. This GPO is responsible for establishing and maintaining the account policies for the domain user accounts. As we said in Part II of this article series, the account policies are essential for helping secure the domain user account passwords.\nThe second default GPO is the Default Domain Controller Policy. This GPO is responsible for establishing the baseline security for all domain controllers in the domain. The primary security settings that are established in the GPO are the user rights. Common user rights include:\nAllowing a user to logon using the keyboard attached to the computer (locally)\nChanging the system time\nBacking up files and folders\nAccessing the computer and its resources over a network\nLeveraging Group Policy to Establish Security\nThere is no way to give all of the rich capabilities of Group Policy the due respect it deserves within such a short article. However, I will stress that every network running Active Directory should have more than just the default two GPOs. The reason is that Group Policy provides an automated, centralized method for configuring and deploying security settings to all computers and users within the domain. Some common security related settings and areas of configuration include:\nRestricting which applications can be run on each computer\nUsing IP Security to encrypt data between computers\nRestricting anonymous connections to computers\nConfiguring which authentication protocols will be supported\nUser rights per computer\nAudit policy settings per computer\nControlling group membership\nConfiguring access control lists (ACLs) for files, folders, and Registry keys\nDisabling Guest and Administrator accounts\nThe full gamut of settings for Internet Explorer\nThis list is only a partial list of possibilities and is quite impressive. However, there have been many companies that have extended Group Policy. Companies like DesktopStandard, Quest, and Full Armor provide additional policies, settings, and control through their Group Policy extensions and solutions.\nEvery Active Directory enterprise uses Group Policy to secure user environments and computers. Companies need to leverage the power that Group Policy provides with regard to standardizing desktops and securing the network. There is almost nothing that a Group Policy can't help secure with regard to your Windows Active Directory network.\nDerek Melber, MCSE, MVP, and CISM, is the director of compliance solutions for DesktopStandard Corp. He has written the only books on auditing Windows security available at The Institute of Internal Auditors' bookstore and also wrote the Group Policy Guide for Microsoft Press -- the only book Microsoft has written on Group Policy. You can contact Melber at [email protected]."
] | [
"<urn:uuid:57e66c50-d1b4-41be-aa11-57d91f7cb4a1>"
] | [
"CC-MAIN-2013-48"
] | [
"http://searchwinit.techtarget.com/news/1133452/Group-Policy-The-final-consideration-in-securing-Active-Directory"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164027414/warc/CC-MAIN-20131204133347-00031-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9281523823738098
] | [
762
] | [
2.515625
] | [
3
] |
[
"Discussion in 'Science and Technology' started by jodylee, Dec 24, 2010.\nVery Interesting lecture.\nthe air pressure on venus is so high, that every probe which was sendet to got killed after a few minutes. No, the Venus is the wrong way.\nThe temperature is a bit hostile too. Mars is still harsh, but the conditions are much easier to adapt to then those on Venus.\nNot that either will happen anytime soon. But if you're gonna have a goal....it ain't Venus.\nUnder Obama, NASA's new mission is to be kind toward Islam and point all satellites toward Mecca 5 times a day\nBoth the construction of artificial biospheres and\\or the terraforming of Mars are infinitely easier.\nThe necessary technology to build artificial structures designed to sustain life in Venus won't be around for the next two centuries.\nTerraforming the whole planet would be even worse, a total nightmare. The amount of techno-scientific knowledge, money and work needed to turn the hellish greenhouse into a habitaple place almost ensures it will continue to belong in the realm of science fiction.\nOnly a political will of iron would get the job done in the far future.\nWell, mars has it´s problem too.\nThe major handicap with this planet is that it doesn´t have magnetic field. So he can´t keep a thick atmosphere because the solar storm blows it constantly away.\na soloution could probably be a kind of planet-wide roof of foil or membrane. THis isn´t so absurd:\nthe nobel-price winners in physics in this year discoverd a new kind of carbon. It´s a regular net of carbon molecules, only one molecule length thick. If you produce three squarefeet of this material, you can pick up a cat with it, so solid is it.\nWhen you remark then, that the atmosphere of mars is carbone dioxide means that, that you have enoug carbon on the planet for this project.\nyou obviously didnt watch the lecture, at 50 km above the ground the pressure is exacty the same as earths and the temperature is 20c. meaning we could live in venuses attmosphere\nvenus should be first, Not only is it closer and about the same size as earth there is a band of the atmospher which we could arive at and walk out of the space ship with just breathing apperatus 50 km up, the sweet spot. also it has lots and lots of heat(energy) at the surface and what is needed to turn co2 into o2, energy. we could lower a steam or stearling engine into the lower atmospher and create oxygen at will. and above all mars is cold, we cant even be bothered with antartica so why mars?\nDamn tree hugging EPA nutz want to terraform Venus now?\nSeparate names with a comma."
] | [
"<urn:uuid:cca0d6b7-ca18-4b62-802f-eb784afce775>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.usmessageboard.com/threads/forget-mars-we-should-colonize-venus.147715/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320491.13/warc/CC-MAIN-20170625115717-20170625135717-00495.warc.gz"
] | [
"en"
] | [
0.9298357367515564
] | [
602
] | [
2.71875
] | [
3
] |
[
"Finding Happiness & Celebrating Life\nJuly 24, 2013\nI dedicate this blog post to MS patients for having the courage to celebrate life.\nYoung People Disease\n“Multiple Sclerosis (MS) is an immune-mediated inflammatory disease that attacks myelinated axons in the central nervous system, destroying the myelin and the axon in variable degrees and producing significant physical disability within 20-25 years in more than 30% of patients” (see Medscape). The disease may have been coined the young people disease, but it’s everyone’s disease. We should be aware and find ways to help MS patients and prepare our students for what may lie ahead.\nYoung people with MS are often misunderstood because they look very normal on the outside. For example, those with athletic backgrounds, may look like super athletes, but inside they are falling apart. It’s disheartening to see 18 year old kids barely able to get out of bed. Walking is a chore because they tire like someone who’s in their 90s. Think of the hard life young people ages 17-40 have because of MS. It’s a daily struggle with what “normal” people take for granted.\nTeaching MS in School\nWhy not teach about MS in school? According to the American Academy of Neurology, ” Multiple Sclerosis (MS) is the most common demyelinating disease of the CNS and the second most common cause of disability among young adults.” Young adults should be aware of the disease so they can detect it in others early on. One of the problems of MS is that it’s not diagnosed in time. I believe that MS should be part of the school curriculum so that young people become aware of its symptoms and not ignore them. Early detection could make a difference in their lives. Today, we know a lot more about MS and the difficulties involved in learning. There are scholarships available to MS college and high school kids in the USA.\nPins and Needles that Stay\nMS is Big Business\nMS has become a huge business. It seems that for many MS patients money is the only solution. There are medications, but the prices are ridiculously high. Pharmaceutical companies are making huge profits from MS.\nAre Drugs for MS Good?\nHowever, just because the drug is out there and is expensive, does not mean that it’s safe or that it works. MS patients should be careful. According to Professor Jelinik, a doctor and MS patient, MS patients can live better lives than they realize. He watched his mother die of MS and was determined to do something about his condition when he was diagnosed with MS. He has a book out called Overcoming Multiple Sclerosis.\nBeing Open to Others\nIt’s important to learn about MS patients and accept them for who they are. MS may not always be apparent on the outside, but MS patients know that what they are undergoing is very real. It’s painful and hard to bear.\nFeeling Drunk When You’re Sober\nMS patients look fine on the outside, like most of us, but go through constant battles within themselves as they experience feelings of dizziness and lack of coordination, as if they were drunk. They sometimes forget things and find it difficult to learn, not because they are dumb, but because the disease won’t let them. How do we know whether students have MS or not? Being sensitive to others and being a caring teacher is very important in the classroom. Teachers and students should think twice before judging others.\nTeaching with MS\nYour teacher or a student in your class may be an MS patient. Don’t be quick to judge others who slur their words or who cannot remember dates. They may have MS.\nAnnette Funicello was a child actress, who became successful as an adult, too. However, she went through a hard time as the disease progressed. Eventually, she lost her life to MS. MS patients learn to appreciate the little things in life. We can learn a great deal from them about finding happiness.\nMy son has MS\nMy son was diagnosed with MS on his 27th birthday 3 years ago. It was not a happy event and his birthdays are now a nightmare. He seems to be getting attacks every May. The first thoughts that came to mind when I learned that he had MS was blame. I blamed myself. I should have protected him.\nI now realize more than ever that life is precious. We can let life happen and enjoy the process because, as much as we find it hard to believe, we have no control over ourselves, our children, or anyone or any thing. The best thing we can do as we journey through life is find happiness in being here in whatever shape or form. Finding happiness is no longer a goal. It’s a fact of life for me.\nFor a start, read 40 days of Joy and then join MeiMei Fox of Huffington Post and Dr. Nellie Deutsch in a conversation on WizIQ to learn about finding happiness on August 6, 2013 at 12 PM EST (check the time in your area here). MeiMei Fox is a life coach, author, Yoga instructor, and much more. She’s on the board of the Hope foundation. She holds an MA in psychology. According to Huffington Post, “her mantra is: Fear Less, Love More!”.\nDr. Nellie Deutsch is an education technology and curriculum consultant, faculty at Atlantic University in the MA transpersonal and leadership studies, teacher trainer, researcher, and writer. She organizes Moodle MOOCs and online conferences. She earned her doctorate in education and educational leadership with a specialization in curriculum and instruction from the University of Phoenix Her dissertation research (available on ProQuest & Amazon) focused on instructor experiences with integrating technology in blended learning contexts in higher education around the world. Nellie offers free teacher training courses on teaching with technology, action research and Moodle for teacher courses to new, veteran, and future teachers who wish to teach online, face-to-face or in blended learning formats. She also provides online courses to teachers and ICT people on how to be administrators of Moodle websites. She integrates Moodle and WizIQ live virtual classes in all her courses."
] | [
"<urn:uuid:20a6c71f-08c3-4fe3-9a12-ba9efe9b1382>"
] | [
"CC-MAIN-2017-26"
] | [
"https://blog.wiziq.com/celebrating-life/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00242.warc.gz"
] | [
"en"
] | [
0.9713680148124695
] | [
1303
] | [
2.5625
] | [
3
] |
[
"Aleppo pine is the main conifer in the Vasa Kellakiou region. There are other types of pine that grow higher up the mountains, but not here. The aleppo pine can be recognised by its very long needles.\nWhile all of these trees are only low-to-medium height, you will also see tall eucalyptus trees growing around the base camp area. Yes, eucalyptus are native to Australia. They were introduced to Cyprus by the British, in the colonial period. Strange as it may seem now, in the past the coastal areas of Cyprus used to be very swampy, and eucalyptus are very good at sucking up water and drying out the ground."
] | [
"<urn:uuid:3f001cdf-356f-4ee2-8c24-623056ab4312>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.cyprusultra.com/cyprus-ultra-nature-blog/aleppo-pine-trees"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00431.warc.gz"
] | [
"en"
] | [
0.9715374708175659
] | [
147
] | [
2.78125
] | [
3
] |
[
"The birds chirping, the wind sighing through the trees, or a baby’s cry are sounds most people take for granted. But for people who are deaf, these sounds are missed. For a composer, a loss of hearing is even more devastating.\n“It’s a terrible thing,” said composer Richard Einhorn, who lost most of his hearing four years ago. “Deafness separates you from people. It’s a struggle in a real physical way to speak, to participate in conferences, at restaurants, at concerts.”\nOn Saturday, Musicians of Ma’alwyck will present a concert by composers, including Einhorn, who have suffered profound hearing loss. These include Ludwig van Beethoven, Gabriel Faure and Bedrich Smetana.\nTechnology steps in\nEinhorn, who suffered what is called sudden sensory hearing loss literally overnight, is fortunate that when he wants to compose, today’s technology is there to help.\n“Composers work in the imagination. A computer can simulate any sound of any instrument,” he said. “If I only had to work on a piano, I might have issues.”\nSo with the help of hearing aids and a custom-built earphone, Einhorn can use a computer to compose for up to four hours a day. Violinist Ann-Marie Barker Schwartz and pianist Starr Norman will give the world premiere of the first movement of Einhorn’s Etude, and Norman will perform his Etude for solo piano.\nMusicians of Ma’alwyck\nWHEN: 3 p.m. Saturday\nWHERE: First Reformed Church, 8 N. Church St., Schenectady\nHOW MUCH: $25, $10\nMORE INFO: 377-3623, www.musiciansofmaalwyck.org\nBeethoven, on the other hand, didn’t have computers.\n“I would not know what to do if I’d had his problems,” Einhorn said. “I would have given up.”\nBeethoven (1770-1827) was in his late 20s when he first began having hearing problems. By 1802, he wrote his famous Heiligenstadt Testament in which he says that only his art kept him from ending his life. His deafness became marked over the decades, but Beethoven had the skill of being able to write in his head, Einhorn said. Still, he had tricks to help him hear.\n“He’d saw off the legs of his piano to use the floor as sounding boards,” Einhorn said. “Or he had several ear trumpets made. I’ve tried them and they are surprisingly good.”\nCellist Petia Kassarova and Norman will perform the third movement from Beethoven’s Cello Sonata of 1801.\nBeethoven’s deafness was well known to his friends and public, but Gabriel Faure (1845-1924) tried to keep his hearing problems a secret for almost a decade with only his wife knowing, said Barker Schwartz, who read several of Faure’s letters to his wife from a special compilation published in 1951.\n“He was afraid that his deafness would attack his credibility as a composer,” she said.\nFaure was already in his late 50s and may have concealed his hearing problems initially, but it did not stop him. He began an 18-year career as the music critic for Le Figaro, became the director of the Paris Conservatory where he served for 15 years, and only in 1909 at age 64 did he publicly acknowledged his deafness as “a veritable cacophony” (New Grove Dictionary of Music and Musicians, 2001). Besides pitch distortion, he heard high sounds a third interval lower and low sounds a third interval higher.\nYet, he continued to compose piano works, song cycles, lyric dramas, string sonatas and his only string quartet, and revised editions of works by Schumann and Bach. His Piano Trio of 1922, which MOM will perform, is considered a masterpiece.\nWhile the cause of Beethoven’s deafness was considered a mystery and Faure’s was thought to be age-related, Bedrich Smetana’s deafness was a secondary symptom of syphilis. In the summer of 1874 at age 50, Smetana suddenly started hearing buzzing and extraneous noises. Soon he could not hear individual sounds. By October, he had lost the hearing in both ears and used an ear trumpet to try to hear, Barker Schwartz said.\nDeafness did not crush Smetana’s spirit. Though he was already known as a great Czech nationalist composer, his greatest works were still before him. Although he had to quit his job as conductor at Prague’s Provisional Theater that same year, Smetana went on to write song cycles, three more operas, symphonic cycles, a string quartet, and even to play piano publicly until 1881, Barker Schwartz said. She will perform his violin pieces “From My Homeland” of 1882.\nToday’s technology has changed the world, especially for deaf composers. If they are in a theater such as Albany’s Capital Repertory Theatre or in several theaters in New York City that have installed hearing loops, which are part of amplification technology, they can hear for the first time real instruments play what they have written.\n“A flip of a switch on the hearing aid and you can hear what’s on stage,” Einhorn said. “These theaters are pioneers.”"
] | [
"<urn:uuid:5019c247-76be-4c73-b8b1-d314f666765e>"
] | [
"CC-MAIN-2017-30"
] | [
"https://dailygazette.com/article/2014/02/13/maal"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426234.82/warc/CC-MAIN-20170726162158-20170726182158-00159.warc.gz"
] | [
"en"
] | [
0.9845677018165588
] | [
1220
] | [
2.8125
] | [
3
] |
[
"Virginia is located in the Mid-Atlantic region of the east coast of the United States. The state is bordered by Washington, D.C., Maryland, West Virginia, North Carolina and Tennessee. The Northern Virginia region is the most populated and urban part of the state. Located in the center of the state is Richmond, the capital and an independent city. The eastern part of the state includes waterfront property along the Chesapeake Bay, the largest estuary in the United States, and Atlantic coastal communities including Virginia Beach and the Virginia Eastern Shore. The west and southern parts of the state have beautiful scenery and rural communities. Skyline Drive is a National Scenic Byway that runs 105 miles along the Blue Ridge Mountains.\nAs one of the original 13 colonies, Virginia played an important role in American history. Jamestown, founded in 1607, was the first permanent English settlement in North America. Major points of interest include in the state include Mount Vernon, the home of George Washington; Monticello, the home of Thomas Jefferson; Richmond, the capital of the Confederacy and of Virginia; and Williamsburg, the restored Colonial capital.\nGeography, Geology and Climate of Virginia\nVirginia has a total area of 42,774.2 square miles. The state’s topography is very diverse ranging from the Tidewater, a coastal plain in the east with low marshlands and an abundance of wildlife near the Chesapeake Bay, to the Blue Ridge Mountains in the west, with the tallest mountain, Mount Rogers reaching 5,729 feet. The northern part of the state is relatively flat and has similar geological features to Washington, D.C.\nVirginia has two climates, due to variances in elevation and proximity to water. The Atlantic Ocean has a strong effect on the eastern side of the state creating a humid subtropical climate, while the western side of the state with its higher elevations has a continental climate with cooler temperatures. The central parts of the state waiver with weather in between.\nPlant Life, Wildlife, and Ecology of Virginia\nVirginia's plant life is as diverse as its geography. Middle Atlantic coastal forests of oak, hickory and pine trees grow around the Chesapeake Bay and on the Delmarva Peninsula. The Blue Ridge Mountains of western Virginia are home to mixed forests of chestnut, walnut, hickory, oak, maple and pine trees. Virginia's state flower-tree, the American Dogwood, grows in abundance throughout the state.\nThe wildlife species in Virginia are varied. There is an overpopulation of white tailed deer. Mammals can be found including black bears, beaver, bobcat, foxes, coyote, raccoons, skunk, Virginia opossum and otters. The Virginia coast is especially known for its blue crabs, and oysters. The Chesapeake Bay is also home to more than 350 species of fish including the Atlantic menhaden and American eel. There is a population of rare wild horses found on Chincoteague Island. Walleye, brook trout, Roanoke bass, and blue catfish are among the 210 known species of freshwater fish found in Virginia's rivers and streams."
] | [
"<urn:uuid:88114faa-7834-417c-b288-e78adbcb8b15>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.tripsavvy.com/virginia-geography-and-guide-4068972"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591431.4/warc/CC-MAIN-20200117234621-20200118022621-00531.warc.gz"
] | [
"en"
] | [
0.9472924470901489
] | [
650
] | [
3.453125
] | [
3
] |
[
"071013 Healthy ideas that may be worth considering for a healthier life – part six – Following the Mediterranean style diet may be better for your overall health and quality of life.\nHealthy ideas that may be worth considering for a healthier life – part six – Following the Mediterranean style diet may be better for your overall health and quality of life.\nScientific research never ceases and constant investigations into what makes us healthy are no exception. Some of the recent research and subsequent reports result from observational studies. These observational studies were not designed to prove a cause and effect. Nonetheless, they still may point the way towards improving your health by decreasing your disease risk.\nSome of these findings may already be common knowledge to you, whereas others may be a surprise. In any case, all of them may be worthwhile paying attention to in the future.\nIn the majority of the world’s advanced nations, many avoidable diseases such as diabetes, high blood pressure, and obesity could be prevented or at least decreased in number if their citizens would simply follow a healthier lifestyle. Getting 30 minutes of exercise per day and eating nutritious foods would go a long way towards easing the healthcare costs and improving the lives of uncounted millions of people.\nFollowing the Mediterranean style diet may be better for your overall health and quality of life.\nAs a refresher, the Mediterranean diet consists of eating fish, fruits and nuts, olive oil, vegetables and whole grains. It has been linked to lowering the risks of numerous chronic, potentially preventable diseases such as diabetes, hypertension, obesity, and the metabolic syndrome. For those of you who are unfamiliar with the metabolic syndrome here is a brief explanation from the National Heart Lung And Blood Institute.\nMetabolic (met-ah-BOL-ik) syndrome is the name for a group of risk factors that raises your risk for heart disease and other health problems, such as diabetes and stroke.\nThe term “metabolic” refers to the biochemical processes involved in the body’s normal functioning. Risk factors are traits, conditions, or habits that increase your chance of developing a disease.\nIn this explanation, “heart disease” refers to coronary heart disease (CHD). CHD is a condition in which a waxy substance called plaque (plak) builds up inside the coronary (heart) arteries.\nPlaque hardens and narrows the arteries, reducing blood flow to your heart muscle. This can lead to chest pain, a heart attack, heart damage, or even death.\nMetabolic Risk Factors\nThe five conditions described below are metabolic risk factors. You can have any one of these risk factors by itself, but they tend to occur together. You must have at least three metabolic risk factors to be diagnosed with metabolic syndrome.\n• A large waistline. This also is called abdominal obesity or “having an apple shape.” Excess fat in the stomach area is a greater risk factor for heart disease than excess fat in other parts of the body, such as on the hips.\n• A high triglyceride level (or you’re on medicine to treat high triglycerides). Triglycerides are a type of fat found in the blood.\n• A low HDL cholesterol level (or you’re on medicine to treat low HDL cholesterol). HDL sometimes is called “good” cholesterol. This is because it helps remove cholesterol from your arteries. A low HDL cholesterol level raises your risk for heart disease.\n• •High blood pressure (or you’re on medicine to treat high blood pressure). Blood pressure is the force of blood pushing against the walls of your arteries as your heart pumps blood. If this pressure rises and stays high over time, it can damage your heart and lead to plaque buildup. High fasting blood sugar (or you’re on medicine to treat high blood sugar). Mildly high blood sugar may be an early sign of diabetes.\nAfter reviewing the syndrome and the problems associated with the conditions listed perhaps, the Mediterranean style diet is more appealing. A study, recently published in the European Journal of Clinical Nutrition, followed 11,015 students attending an unnamed University for four years. At the conclusion each one was asked to rate their mental and physical health. The researchers found that those who closely adhered to the Mediterranean over the four years scored higher on the quality of life issues in the questionnaire. In their report, the scientists stated, “adherence to the Mediterranean diet seems to be a factor importantly associated with a better health-related quality of life.”\nPotential changes in behavior considerations\nBy knowing the damage the diseases of the metabolic syndrome cause and then reviewing the Mediterranean diet and the potential health benefits of following such a plan, perhaps now is the time to seriously consider changing our dietary eating habits."
] | [
"<urn:uuid:af0f833a-94f9-4e02-8d75-6e6ed6ec3c32>"
] | [
"CC-MAIN-2017-26"
] | [
"https://explosivelyfit.wordpress.com/2013/10/07/071013-healthy-ideas-that-may-be-worth-considering-for-a-healthier-life-part-six-following-the-mediterranean-style-diet-may-be-better-for-your-overall-health-and-quality-of-life/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320873.54/warc/CC-MAIN-20170626235612-20170627015612-00335.warc.gz"
] | [
"en"
] | [
0.9401686191558838
] | [
976
] | [
2.578125
] | [
3
] |
[
"Cartonifício Valinhos has worried about the environment since its foundation. In a time when no one valued recycling, we innovated producing 100% recycled paper, transforming what was considered garbage in high quality raw material.\nPaper and cardboard recycling adds value socially as it generates direct and indirect jobs and encourages the community to exercise their citizenship by teaching the importance of separating their garbage.\nBy implementing a reverse logistics, it was possible to return disposed materials to our business productive cycle, diminishing the negative environmental impacts, such as the reduction of water and energy use in the production and the decrease of residues sent to landfill sites.\nToday, we recycle more than 5,000 tons of waste paper each month: to each ton we recycle, 22 trees are spared, saving 75% of electrical power and reducing air pollution in 74%.\nAll natural resources have always been very valuable to Cartonifício Valinhos. We were very careful when implementing the effluent treatment station, which does more than the environmental regulations require. We have three stages of depuration: physicochemical, anaerobic and aerobic. In the physicochemical stage, a flotation unit removes all the suspension material in the effluent. The IC anaerobic reactor, from Dutch technology, was the first to be installed in a paper mill in Brazil and is the most modern technology in terms of effluent treatment. It treats high organic loads and is very efficient when removing COD (chemical oxygen demand) and BOD (biochemical oxygen demand). The aerobic stage occurs when microorganisms degrade organic substances. After that, the effluent is forwarded to a decanter zone, where the solids are decanted and the clean and crystalline effluent goes back to the river. We also treat the washing water from the flexographic printers physicochemically.\nIn 2014, we implemented the biomass boiler. Through renewable fuel, it creates a controlled combustion, which heats the water and generates steam supplied to the whole plant. Because of that, we are able to reduce the carbon dioxide gas emission significantly.\nAnd to guarantee our product quality and its sustainability, Cartonifício Valinhos has a modern lab to research how to reduce chemical products when we manufacture our paper."
] | [
"<urn:uuid:62c749e6-2313-43cb-95f4-e86526425098>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.cartonificiovalinhos.com.br/en/environment/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00452.warc.gz"
] | [
"en"
] | [
0.9346069097518921
] | [
460
] | [
2.65625
] | [
3
] |
[
"Paw through enough manuscript collections, and you’ll eventually run across some advertisements printed on a thick, porous paper, usually with a pink or blue backing. For those not in the know, it’d be easy to dismiss these little items, which come in a variety of shapes and sizes–and often in bright colors– as simple promotional cards, but in fact, they had an ulterior and important function in 19th-century household and business environments.\nThrough the 18th century, the best countermeasure that correspondents, clerks, and other writers had against the inconvenience of slow-drying ink was to sprinkle sand (or sometimes its more costly alternative, salt) over their handwriting to set the ink, then shake the page to remove the temporary coating. The early 19th century saw the invention of the blotter, a handheld device with felt attached to a curved base that could be rocked over the written page to absorb excess ink. About fifty years later, a soft, thick, porous paper was developed as an effective means to absorb excess ink and speed the drying process. Pressed against the written page, the blotting paper soaked up the surplus ink and allowed the writer to complete a task more quickly and with fewer smears and smudges. The paper was also used in used in removing the excess ink from the pen’s nib, making for fewer drips and stains.\nFollowing its introduction, blotting paper quickly replaced sand as the method of choice in drying ink. As noted in an opinion piece within the July 6, 1883, edition of the Maryland Independent, lamenting the end of an era:\nIt is not so many years since blotting sand was an article of foreign export and domestic use. … Some of the merchants of to-day remember when, as clerks in stationery stores, they occupied leisure hours and rainy days in putting into convenient packages blotting sand that came from Block Island by the barrel … The use of blotting sand led to the manufacture of sand-sifters, which in itself was an industry of some magnitude. A piece of paper has displaced them, sand and all.\nIt was only a matter of time before some enterprising individual determined that desktop blotting paper would provide an excellent medium for commercial advertising, and in that same Maryland Independent piece, the writer notes that the sale of ink blotters would be even larger if the marketplace weren’t flooded with free blotters distributed by companies peddling their goods and services.\nIn a November 10, 1895 article about the role of job printers in a recent political campaign, the Omaha Daily Bee related the opinion of a printer who claimed that ink blotters were a much more effective form of advertising than traditional campaign cards: “Cards were thrown away, he argued, while blotters were kept for use on the desk and thus held attention of the voter to the name of the candidate. The blotters, good ones, could be furnished at $3.50 per 1,000, printed with the name of the candidates …”\nAs a free and useful item for household or business consumers, the blotters proved very popular. The Topeka State Journal of April 20, 1900 reported: “A man went through the court house a few days ago distributing advertising blotters. When he started he ahd two large bags full. When he escaped he had a few left, but very few.” At the turn of the 20th century, competition from blotter advertising led newspaper publishers nationwide–at least those not connect to job printers who benefited from printing the blotters–to denounce the medium as an effective form of advertising.\nThese blotters, all from businesses in southwestern Virginia, performed double duty by including a calendar, a ruler, a football schedule, and a list of early aviation records to insure that consumers would be less likely to discard them (click for full-sized images) (from the O’Shaughnessy Family Papers, Ms1987-052).\nThe development of quick-drying ink and improvements in fountain pen design were harbingers of doom for the advertising blotter. In the 1940s, Parker Pens promoted a new design by claiming that it made the use of blotting paper unnecessary. Though blotters continued to retain their place among other promotional giveaways in the advertising world for several more years, the mass manufacture and ready availability of the ballpoint pen sounded the medium’s death knell. Blotting paper can of course still be purchased for many other uses, and I suppose it’s possible that there’s a manufacturer out there somewhere who’s churning out desktop advertising blotters for some niche retro market, but the day of the advertising blotter–like that of blotting sand before it–has long passed.\nBy the time this 1942 blotter employed patriotism and Mickey Mouse to sell Sunoco Oil, the advertising blotter was nearing the end of its popularity (from the O’Shaughnessy Family Papers, Ms1987-052)."
] | [
"<urn:uuid:92d69218-5271-482b-a1d8-ebea6067b3f1>"
] | [
"CC-MAIN-2023-14"
] | [
"https://scuablog.lib.vt.edu/2022/11/03/a-blot-on-history/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00581.warc.gz"
] | [
"en"
] | [
0.9682303071022034
] | [
1029
] | [
3.609375
] | [
4
] |
[
"How to Draw the Letter E in Bubble Letters Graffiti\nUse this printable tutorial to learn how to draw the LETTER E bubble letter step by step. Bubble letters are a graffiti-style art that allows the reader to still identify a letter, but it appears puffy and bubbly!\nThis capital bubble letter tutorial is so easy kids of all ages can get in on the bubble letter fun.\nCapital E Bubble Letter\nTo make a capital letter E in bubble letter graffiti, we have some simple step-by-step instructions to follow! Print out the 2 page bubble letter tutorial pdf so you can follow along making your own bubble letter or even tracing the example when necessary.\nThis article includes affiliate links.\nSupplies Needed for Drawing a Bubble Letter E\n- Pencil or colored pencils\n- (Optional) Crayons or colored pencils to color your completed bubble letter\nWe have also created the 2 page printable bubble letter instruction sheets as coloring pages. If desired, start by coloring the steps and then try it on your own!\nHow To Draw Bubble Letter E\nFollow these simple steps to write your own bubble letter uppercase E! You can print them below by pressing the button.\nFirst we’ll start with drawing a fancy oval shape.\nWrite another fancy oval shape right below the first one.\nDraw another oval between the first two. We’re halfway done drawing our bubble letter!\nConnect the fancy ovals on the left side with a slightly curved line.\nAdd little graffiti lines in the middle. Now you’ve finished drawing your capital bubble letter!\nDownload & Print pdf files for Bubble Letter E Tutorial:\nMore Bubbles Letters You Can Draw\nMore Letter E Fun from Kids Activities Blog\n- Our big learning resource for everything about the Letter E.\n- Have some crafty fun with our letter e crafts for kids.\n- Download & print our letter e worksheets full of letter e learning fun!\n- Giggle and have some fun with words that start with the letter e.\n- Check out over 1000 learning activities & games for kids.\n- Oh, and if you like coloring pages, we have over 500 you can choose from…\n- Extraordinarily easy! That’s what I have to say about learning the letter E!\n- Our lesson plan makes it easy to break Letter E Worksheets with fun activities. This will help to keep your children engaged, as they learn!\nHow did your letter E bubble letter turn out?"
] | [
"<urn:uuid:4e651f8a-035d-4f25-9a3a-9bab70ad12f2>"
] | [
"CC-MAIN-2023-14"
] | [
"https://kidsactivitiesblog.com/166933/bubble-letter-e/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00583.warc.gz"
] | [
"en"
] | [
0.8422432541847229
] | [
544
] | [
3.796875
] | [
4
] |
[
"Everyone has to eat, so we have to cook. I think cooking is the perfect way to learn! Kids can learn at any age with cooking and eating!\nOur \"chef\" this week is Brooke. She's 3. Even though she is the \"head chef\", the others ask to be the \"sous chefs\" (well, they say shoe chef cause they think it's funny) and Brooke graciously welcomes the help.\nThis morning we made pancakes. Brooke measured the 2 cups flour. She worked on her motor skills to spoon the flour in the measuring cup and then level it off. She also stirred quite a bit.\nSummer helped with the teaspoon and tablespoon measurements. She found the correct spoons to use and correctly leveled them off. She also broke the eggs and mixed them. We have been doing this long enough that Summer (age 5) needs little supervision as long as it does not involve knives or heat.\nWe watched the liquid of the pancake batter heat and turn to a solid.\nThen we got to eat them. Yay!\nWe had a really easy lunch...frozen burritos. This was great for Brookie. She simply counted 6 burritos and put them on the pan, 3 on each side. We had talked about even and odd numbers recently, so I asked the girls if 6 was an even or odd number and showed how there were 2 equal sides.\nThen we got to eat our work again.\nToday was a special day because it was the first time Max ate cereal!! We all sat around and watched how he reacted to the new eating method. Funny faces, spitting out food, but he liked it and grunted when I wasn't fast enough.\n1. First, everyone needs to wash their hands. When they scrub, we sing the ABC song to make sure we've scrubbed long enough.\n2. Then we melt about 2T butter in the microwave. Brooke can work on her number recognition by punching in the numbers I tell her.\n3. Their favorite part: \"painting\" the butter on the tortillas. I use multi grain tortillas to add some fiber.\n4. Then we flip over the tortilla and spread some cheese on...we don't measure it but it was about 1/2 cup of cheese on each tortilla. One bag of cheese made 4 quesadillas.\n5. Place the second tortilla on and paint it as well.\n6. Place quesadilla in a heated skillet, turned to medium heat and sprayed with cooking spray. Heat until browned, flip, brown, and remove.\n7. I use a pizza cutter to cut into pieces. Here is Savannah cutting her quesadilla in half. We talked about how we could get 6 equal pieces."
] | [
"<urn:uuid:9873f5e3-3845-4f9b-b287-ae4cb2fe3d9c>"
] | [
"CC-MAIN-2020-05"
] | [
"http://wendishopscotch.blogspot.com/2009/12/good-food-day.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251796127.92/warc/CC-MAIN-20200129102701-20200129132701-00016.warc.gz"
] | [
"en"
] | [
0.9772711396217346
] | [
575
] | [
2.53125
] | [
3
] |
[
"Simple search using PubMed\nWe describe simple search using Pubmed to find the information we need with this search engine.\nWe saw in a previous post that our ignorance as doctors is huge, which forces us to ask ourselves questions about what to do with our patients on numerous occasions.\nAt this point, we will be interested in seeking and finding the best available evidence on the subject that occupies us, for which we will have to do a good bibliographical search. Although the bibliographic search is defined as the set of manual, automatic and intellectual procedures aimed at locating, selecting and retrieving references or works that respond to our question, the vast majority of the time we simplify the process and we just do a digital search.\nWhat is PubMed?\nIn these cases we will have to resort to one of the many biomedical databases available to find the pearl that clarifies our doubt and help remedy our ignorance. Of all these databases, there is no doubt that the most widely used is Medline, the database of the National Library of Medicine. The problem is that Medline is a very large database, with about 16 million articles from more than 4800 scientific journals. So, as is easy to assume, finding what you are looking for may not be a simple task on many occasions.\nIn fact, when we use Medline what we use is a tool that is known as Pubmed. This is a project developed by the National Center for Biotechnology Information (NCBI for friends), which allows access to three National Library of Medicine databases: Medline, PreMedline and AIDS. These databases are not filtered, so we will need critical reading skills to evaluate the results (there are other resources that give the information already filtered), since the searcher provides nothing more (and nothing less) than the article reference and, in many cases, a brief summary. Best of all, it’s free, which is not the case with all the search tools available.\nSo, if we want to explore this oyster with thousands of pearls, we will have to learn how to use Pubmed to find the pearls we are looking for. You can enter Pubmed by clicking on this link. Let’s take a look at starting to use it (see the first attached figure) (Pubmed look changes from time to time, so something may have changed since I wrote this post, probably to improve).\nThe first thing we see is the simple search box, where we can type the search terms to get the results by clicking the “Search” button. You see that under this box there is a link that says “Advanced”, with which we will access the advanced search screen, which we will talk about of another day. Today we will focus on the simple search.\nBelow are four columns. Notice the first one, “Learn”. Here you can find help on the use of this tool, including tutorials on the different search methods and the tools that Pubmed includes. I advise you to dive into this section to discover many more possibilities of this search engine than the few that I am going to tell you about in this post.\nThe second column is for the Pubmed tools, “Find”. Here are two of special interest, the “Single Citation Matcher”, to find the PubMed reference of a specific article knowing some aspects of its bibliographic citation, and the “Clinical Queries”, which allow us to filter the search results according to the type of studies or their characteristics. In addition, we have a link to access the advanced search, which we will cover another day.\nIn the fourth column we find access to the database of MeSH terms, which is nothing more than the thesaurus of search terms that Pubmed includes. Another day we will see how to do more specific searches using these MeSH terms.\nFirst, a structured clinical question\nWell, let’s get something to practice. Let us think, for example, that I want to know if it is better to use amoxicillin or cefaclor for the treatment of otitis in infants so that the evolution of the disease is less prolonged. Logically, I can not write this as it is. First I have to build my structured clinical question and then use the components of the question as search terms.\nMy question would be: in (P) infants with otitis, (I) treatment with cefaclor (C) compared to treatment with amoxicillin, (0) reduces the duration of disease ?. So, with this example, we could use five search terms: otitis, infants, amoxicillin, cefaclor and duration.\nSimple search using PubMed\nIn the simple search we will simply enter the words in the search box (natural language) and click on the “Search” box.\nThe search box supports boolean operators, which are “y”, “o” and “not” (they are often capitalized: AND, OR and NOT). When we put several words in a row without any boolean operators, Pubmed understands that the words are separated by AND. Thus, if we have a term consisting of two words and we want it to be considered as one, we will have to write it in quotation marks. For example, if we write acute appendicitis and we want it to count as a single term, we will have to introduce “acute appendicitis”.\nAnother useful operator is the truncation, which is to place an asterisk (a wild mark) at the end of the root of the word to search for all words that begin with that root. For example, infan * will search for infant, infancy…\nLet’s go with our example. We write otitis AND infants AND amoxicillin AND cefaclor AND course and click on “Search” (see the second attached figure). We were lucky enough; we get only 15 results (you can get a different number if you do the search at another time).\nWe take a look and see that the works are more or less adjusted to what we are looking for. The only drawback is that it includes articles that study the effect of amoxicillin-clavulanate, which we are not interested in. Well, we’re going to take them off. To the text of search we add NOT clavulanate, and we get an even more limited search.\nWe only have to select or click on the works that interest us to get the summary (if available) and, in some cases, even get access to the full text, although this will depend on whether the text is freely accessible or on the permissions or subscriptions of the institution from which we access to Pubmed.\nSo far we have seen the simplest way to search with Pubmed: simple search with free text. The problem is that using this form of search is not always going to get such a specific result, it will be much more frequent that we get thousands of results, most of them without any interest for us. In these cases we will have to resort to other resources such as advanced search, the use of MeSH terms or the use of Pubmed Clinical Queries. But that is another story…"
] | [
"<urn:uuid:3777bf3c-dbfe-4062-90aa-b968a5128669>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.cienciasinseso.com/en/simple-search-using-pubmed/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00194.warc.gz"
] | [
"en"
] | [
0.9389370083808899
] | [
1517
] | [
2.8125
] | [
3
] |
[
"A variety of foot problems can lead to adult acquired flatfoot deformity (AAFD), a condition that results in a fallen arch with the foot pointed outward.\nMost people — no matter what the cause of their flatfoot — can be helped with orthotics, braces and physical therapy. In patients who have tried these treatments without any relief, surgery can be a very effective way to help with the pain and deformity.\nThis article provides a brief overview of the problems that can result in AAFD. Further details regarding the most common conditions that cause an acquired flatfoot and their treatment options are provided in separate articles. Links to those articles are provided.\nAs discussed above, many health conditions can create a painful flatfoot.\nDamage to the posterior tibial tendon is the most common cause of AAFD.\nThe posterior tibial tendon is one of the most important tendons of the leg. It starts at a muscle in the calf, travels down the inside of the lower leg and attaches to the bones on the inside of the foot.\nThe main function of this tendon is to hold up the arch and support your foot when you walk. If the tendon becomes inflamed or torn, the arch will slowly collapse.\nWomen and people over 40 are more likely to develop problems with the posterior tibial tendon. Other risk factors include obesity, diabetes, and hypertension. Having flat feet since childhood increases the risk of developing a tear in the posterior tibial tendon. In addition, people who are involved in high impact sports, such as basketball, tennis, or soccer, may have tears of the tendon from repetitive use.\nFor in-depth information on posterior tibial tendon dysfunction: Posterior Tibial Tendon Dysfunction\nInflammatory arthritis, such as rheumatoid arthritis, can cause a painful flatfoot. This type of arthritis attacks not only the cartilage in the joints, but also the ligaments that support the foot. Inflammatory arthritis not only causes pain, but also causes the foot to change shape and become flat.\nThe arthritis can affect the back of the foot or the middle of foot, both of which can result in a fallen arch.\nFor in-depth information about rheumatoid arthritis of the foot: Rheumatoid Arthritis of the Foot and Ankle\nAn injury to the ligaments in the foot can cause the joints to fall out of alignment. The ligaments support the bones and prevent them from moving. If the ligaments are torn, the foot will become flat and painful. This more commonly occurs in the middle of the foot (Lisfranc injury), but can also occur in the back of the foot.\nIn addition to ligament injuries, fractures and dislocations of the bones in the midfoot can also lead to a flatfoot deformity.\nFor more information about injuries to the midfoot: Lisfranc (Midfoot) Injuries\nPeople with diabetes or with a nerve problem that limits normal feeling in the feet, can have arch collapse.\nThis type of arch collapse is typically more severe than that seen in patients with normal feeling in their feet. This is because patients do not feel pain as the arch collapses. In addition to the ligaments not holding the bones in place, the bones themselves can sometimes fracture and disintegrate – without the patient feeling any pain. This may result in a severely deformed foot that is very challenging to correct with surgery. Special shoes or braces are the best method for dealing with this problem.\nFor in-depth information about diabetic arch collapse: Diabetic (Charcot) Foot"
] | [
"<urn:uuid:201d466c-cfdb-4ba2-8527-4bbe750c7dfa>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.sunorthopaedic.com/adult-acquired-flatfoot/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250604397.40/warc/CC-MAIN-20200121132900-20200121161900-00218.warc.gz"
] | [
"en"
] | [
0.9203517436981201
] | [
739
] | [
3.0625
] | [
3
] |
[
"Exploring a variety of topicsþincluding health, politics, education, art, literature, media, and filmþAboriginal Canada Revisited draws a portrait of the current political and cultural position of Canada's Aboriginal peoples. While lauding improvements made in the past decades, the contributors draw attention to the systemic problems that continue to marginalize Aboriginal people within Canadian society. From the Introduction: \"[This collection helps] to highlight areas where the colonial legacy still takes its toll, to acknowledge the manifold ways of Aboriginal cultural expression, and to de.\nDescription based upon print version of record. CONTENTS; PREFACE AND ACKNOWLEDGEMENTS; INTRODUCTION: ABORIGINAL CANADA REVISITED; HEALTH, SOCIAL ISSUES, POLITICS; EDUCATION; IMAGINING AND IMAGING THE \"INDIAN\"; LITERATURE; PRINT MEDIA AND FILM; LIST OF CONTRIBUTORS; INDEX;\n- Dewey Decimal: 971.00497\n- Language: eng\n- Physical Description: 1 online resource (437 p.)\n- Edition Info: 45 (NL)\nBuying This Book\nWe query many merchants so that you can instantly compare prices and availability. You can even check historic prices and subscribe for notifications. For a manual check, clicking on a link will open a new window with a search for this book on the merchant's site of your choice.\n- Amazon.com by title or by ISBN - widest selection, reliable service, good prices\n- Abebooks.com by title or by ISBN - good source for rare and out-of-print books\n- Textbooks.com by title or by ISBN - large inventory of new & used textbooks\n- Alibris.com by title or by ISBN - their slogan is \"books you thought you'd never find\"\n- eCampus.com by title or by ISBN - they specialize in textbooks, used and new\n- BN.com by title or by ISBN - Barnes & Noble has a wide selection of new and used books"
] | [
"<urn:uuid:7e4dcf98-b5ba-4896-901f-019a94c89fd9>"
] | [
"CC-MAIN-2013-20"
] | [
"http://isbndb.com/book/aboriginal_canada_revisited"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705043997/warc/CC-MAIN-20130516115043-00000-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.820985734462738
] | [
431
] | [
2.53125
] | [
3
] |
[
"Fractions: This past week the kindergarten students have been learning how to identify fractions from whole to eighths. We have been talking about what the numerator and denominator are and why they are important. The students have been having fun figuring out equivalences and sensorially adding fractions together.\nCursive Handwriting: The students practiced writing the lowercase cursive letters l, b, f, e, h, k, a, g, o, qu, c and p.\nA peek into next week: Measuring to the nearest forth of an inch."
] | [
"<urn:uuid:c77ca68e-3292-4dce-91d5-23af46296cbb>"
] | [
"CC-MAIN-2023-14"
] | [
"https://thesmarterkids.com/academic-enrichment-week-february-25th-tallmadge/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00180.warc.gz"
] | [
"en"
] | [
0.9381276369094849
] | [
116
] | [
3.828125
] | [
4
] |
[
"The Waitakere Ranges are a chain of hills in the Auckland metropolitan area, generally running approximately 25 km (15.5 mi) from north to south, 25 km west of central Auckland, New Zealand. The maximum elevation within the ranges is 474 m (1555 ft). The ranges and surrounding areas were traditionally known to local Māori as Te Wao Nui a Tiriwa (The Great Forest of Tiriwa). It is under the jurisdiction of the Auckland Council.\nThe western coastline of the ranges consists of cliffs exceeding 300 m (984 ft), interspersed infrequently with beaches. The rugged upstanding topography is formed from erosion resistant ancient volcanic conglomerate and lava flows laid down in eruptions from the large Waitakere volcano to the west 12–25 million years ago. The ranges are covered in native forest, most of which is in the process of regeneration since extensive logging and farming in the mid–late 19th and early 20th centuries.\nIn 1894 a group led by Sir Algernon Thomas (the first professor of natural sciences at Auckland University College, now the University of Auckland) persuaded the Auckland City Council to preserve 3,500 acres (14 km²) in the Nihotupu area of the ranges as a bush reserve. In 1895 the national Government vested the land, and several other smaller areas of the ranges, in the City Council as \"reserves for the conservation of native flora and fauna\". The Waitakere Ranges Regional Park now contains about 39,500 acres (160 km²). The area is also protected under the Waitakere Ranges Heritage Area Act 2008.\nFive reservoirs within the ranges supply water to the Auckland region, including the Waitakere Reservoir and the Lower Nihotupu Reservoir. Combined, the reservoirs supply approximately 26% of Auckland's potable water demand. The ranges receive an average of over 2,000 mm (78.75 inches) of rainfall annually while the corresponding rate in the city is less than half that. As weather systems approach across the Tasman Sea, their path is blocked by the ranges causing a small uplift sufficient to trigger orographic rainfall.\nThe area is home to kauri snails, glowworms and native long-tailed bats. Long-tailed and short-tailed bats are New Zealand’s only native land-based mammals. At the northern end of the ranges, Otakamiro Point is the site of one of New Zealand’s few mainland gannet breeding colonies. In the bush are many indigenous invertebrates, including kauri snail, weta and oviparous peripatus (Onychophora or velvet worms) with 14 pairs of legs, and ovoviviparous species of 15 and 16 pairs of legs, none of which are members of any of the five scientifically described New Zealand species.\nSome of the ranges' main attractions are: the four popular surf beaches, Piha, Muriwai, Te Henga (Bethells Beach), Karekare; an extensive network of bush walks and tracks; and panoramic views of the east and west coasts and the city. A road, aptly named Scenic Drive, runs a good portion of the length of the ranges from Titirangi to Swanson. The Auckland Regional Council operates an information centre near the Titirangi end.\nThe beaches are typical of west coast beaches north of Taranaki in that they are all black sand beaches. They have a reputation of being dangerous for swimmers due to rips and large swells. Surf Life Saving Clubs patrol designated areas of the four most popular beaches during the summer months. Piha Surf Life Saving Club is the oldest of these, being founded in 1934.\nOn January 11, 2010, the Auckland Regional Council opened the Hillary Trail, a 70 km trail running roughly north-south through the Waitakere Ranges, named in honour of the New Zealand mountaineer Sir Edmund Hillary.\nThe Ark in the Park conservation initiative, a partnership between Forest and Bird and the Auckland Council, is working to reintroduce some of the species made extinct in the Cascades Kauri Park section of the ranges. The project was started in 2003 and now covers 2,300 hectares (5,700 acres).\n- Our parks - Waitakere Ranges, Auckland Regional Council. Accessed 13 April 2009.\n- Waitakere Ranges Heritage Area Act 2008 (PDF)\n- \"Rainfall\". Auckland Regional Council.\n- Arataki Visitor Centre\n- \"The Hillary Trail\". Auckland Regional Council.\n- Pratt, Ciara (13 January 2013). \"Waitakere Ranges Sanctuary To Re-Introduce Kiwi\". Western Leader (Stuff.co.nz). Retrieved 14 February 2013.\n|Wikimedia Commons has media related to Waitakere Ranges.|"
] | [
"<urn:uuid:7f830cc5-c93c-4454-8a58-a03c0c0797d1>"
] | [
"CC-MAIN-2013-48"
] | [
"http://en.wikipedia.org/wiki/Waitakere_Ranges"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163944066/warc/CC-MAIN-20131204133224-00049-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.933989942073822
] | [
1004
] | [
3.078125
] | [
3
] |
[
"Submitted to: Southern Region of the American Society for Horticultural Science\nPublication Type: Abstract Only\nPublication Acceptance Date: February 1, 2006\nPublication Date: June 1, 2006\nCitation: Baldwin, E. 2006. Current research programs at the USDA/ARS Citrus and Subtropical Products Laboratory. HortScience. 40(3):504.\nThe USDA/ARS Citrus & Subtropical Products Laboratory is a food science and postharvest facility for fresh and processed fruits and vegetables of tropical and subtropical origin. The term “tropical” is extended to vegetables grown during the summer of temperate climates like tomato. There are also projects involving strawberry and blueberry since these are important crops for Florida. The majority of the work, however, is on citrus (70%). There are four projects at the facility including quality and by-product research. The two quality projects involve work on juice (mainly citrus juices) and fresh fruit flavor. The other quality project includes work on edible coatings or other surface treatments to reduce decay, water loss and to improve of the appearance of fresh or fresh-cut fruits and vegetables. The two by-product projects aim to develop products from citrus processing waste. One project mines citrus waste for edible fiber, nutraceuticals and compounds in grapefruit that enhance uptake of certain drugs. The other by-product project seeks to develop industrial products from the carbohydrates in citrus peel such as suspension aids and fuel ethanol."
] | [
"<urn:uuid:433d29d6-a38f-44b6-a9b1-9fa985f8a8d1>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.ars.usda.gov/research/publications/publications.htm?SEQ_NO_115=192494&pf=1"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00034-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9211905002593994
] | [
303
] | [
2.765625
] | [
3
] |
[
"Alcohol addiction isn’t something that should be ridiculed and put aside. According to medical experts, alcoholism is a real medical condition. It is a deadly vice that has the power to cause changes in a person’s brain and neurochemistry.\nIt’s a disease that is spreading more rapidly than ever and needs to be taken seriously.\nSure, going out for a few beers with your buddies, or treating yourself to a nice glass of fine wine every once in a while, can turn out to be the perfect Saturday night.\nBut, what happens when that hedonistic pleasure and casual wine-tasting becomes an incurable and harmful addiction?\nHere are 9 positive signs indicating that someone is a high-functioning alcoholic:\n1. DRINKS INSTEAD OF REGULAR MEALS\nA typical alcoholic prefers drinks any day or time of the week. They have a decreased appetite and no interest in food. Their regular meals usually start with alcoholic beverages, instead of nutrients and real food.\n2. RARE HANGOVERS\nConsidering that high-functioning alcoholics are probably 24/7 intoxicated and drunk, after a while these people become addicted. Their drinking problem eventually transforms into a dangerous dependency.\nAs a result, their bodily functions are used to the excessive amounts of alcohol, so they can easily drink without waking up to a hangover.\n3. IRRATIONAL AND IRRITABLE BEHAVIOUR WITHOUT ALCOHOL\nIt is important to mention that because of the sedative effects alcohol has on us, a sudden abstinence from it can be the trigger for anxiety, shaking, sweating, uncontrollable mood swings and palpitations.\nAlcoholics who are advised to stay away from alcohol usually become easily frustrated, depressed and restless.\n4. EXCESSIVE CONSUMPTION\nAnd normally, high-functioning alcoholics will never quench their thirst with one glass of booze. They will always ask for one more. In fact, people who have a serious addiction to alcohol are likely to drink until they pass out.\nTheir tolerance for alcoholic beverages is way higher than average people.\n5. SEVERE MEMORY LOSS AND WEAKENED BRAIN FUNCTION\nAlcoholic beverages have severe damaging effects on the brain. The harmful consequences of living life as a high functioning alcoholic are usually blurred vision, slurred speech, slow reactions, and in the long run, impaired memory.\n6. LIVING IN DENIAL\nLong-term heavy drinking is also the main cause for clouding a person’s judgment. People who are used to consume alcohol in ridiculously excessive amounts, don’t like to admit that they have a problem.\nThe only feedback you’ll get once you confront them about their addiction will be anger and attack. That’s why they find it easier to live in their blissful state of denial.\n7. ILLOGICAL JUSTIFICATIONS FOR DRINKING\nAnother way you can recognize an alcoholic besides their uncontrollable behavior is their illogical justification for their drinking problem. It usually goes from “I’m stressed, and I need a drink” to waking up drunk in the middle of nowhere.\n8. UNPREDICTABLE MOOD SWINGS\nAs said before, a person highly addicted to alcohol is likely to experience severe mood swings. They can practically change in a few minutes. The chemical changes that occur in our brain due to an alcohol infusion can manifest in aggressive outbursts when you least expect it.\n9. HIDING ALCOHOL\nIn addition to their illogical justification for their drinking problem, high-functioning alcoholics usually have their secret stash. They don’t want their issues exposed, because then they would have to face it.\nAnd what’s better than living in an oblivious world?\nImage: George Baker"
] | [
"<urn:uuid:af634fc8-dafc-45a6-a238-1ce42fc55cb7>"
] | [
"CC-MAIN-2023-14"
] | [
"https://thepowerofsilence.co/9-caution-signs-that-someone-suffers-from-alcohol-addiction-without-realizing-it/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00583.warc.gz"
] | [
"en"
] | [
0.9469530582427979
] | [
808
] | [
2.59375
] | [
3
] |
[
"You can find various posts about art history in this area. Historical Topography of Istanbul on the Map: By examining the topography of Istanbul, you can explore the places, squares, monuments and much more that have been built since the first establishment of the city with the help of a source file on the map Click on the names of the places on the map to get comprehensive information about the places you are curious about. By clicking the link below, you can reach the big Istanbul map. (Note: The map will be zoomed in. If you want, you can reduce or enlarge the map by doing \"CTRL\" + Scrool Down or Scrool Up.\nClick to Review the Historical Topography of Istanbul (Only Turkish) Sources: List of sources used in Istanbul's Historical Topography page: Müller-Wiener, Wolfgang, (2001), “Historical Topography of Istanbul” , YKY Yayınları http://www.animaturk.com https://www.ibb.istanbul/"
] | [
"<urn:uuid:79e24003-60cd-470d-b1b5-8137abf57e90>"
] | [
"CC-MAIN-2023-14"
] | [
"http://www.antikagidiyor.com/art/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00403.warc.gz"
] | [
"en"
] | [
0.8613013029098511
] | [
214
] | [
2.671875
] | [
3
] |
[
"STANELY CRANE (anthropoides paradisea)\nThis beautiful crane is the national bird of South Africa and has three common names as seen above.\nIt is a bird of open grasslands and shallow wetlands. Its diet consist of grass seeds and small insects and vertebrates.\nThe two eggs are laid on the bare ground in short vegetation or on a platform nest of reeds in wetland areas. The chicks are carefully guarded by both parents during the rearing periods.\nThis crane, like all others, is decreasing in numbers due to human interference."
] | [
"<urn:uuid:f549f17c-3a17-4df2-b91d-85f23b2956d0>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.naturalbridgezoo.com/stanley-crane.php"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705926946/warc/CC-MAIN-20130516120526-00044-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9589639902114868
] | [
115
] | [
2.71875
] | [
3
] |
[
"I have added an educational page to the site. The purpose is to illustrate why focusing on a single bacteria may fail to produce results. You must also focus on the bacteria that support and contribute to it.\nWhere the new page is located\nWhen you click this, a new page will appear as shown below\nThere are arrows pointing between the bacteria, labelled with their influence. Some examples;\n- High Alistipes slows / inhibits bifidobacterium. In this case, so very well that it is very low.\n- Alistipes feeds / encourages Odoribacter, Dorea, Peptococcaceae. so high amount of Alistipes results in higher amounts of these.\n- Alistipes also inhibits other bacteria… and we see many that are low.\nTo keep complexity down, I do not display bacteria in the middle range.\nThe Outliers list includes only the bacteria that are outliers AND which have known relationships with other bacteria.\nA few things to remember:\n- A low bacteria may feed a bacteria that is very high. What this means is that OTHER things are feeding. For example, Roseburia faecis feed Odoribacter – so we would expect it to be low, but if you look above, we also see that Alisipes also feed it. Think of it this way: corn feed people, wheat feed people, barley feed people. If you have no corn, you may still have a lot of fat people.\n- Similarly, a high bacteria may feed other bacteria. Some of those may be low. To return to the food analogy: the bacteria may be producing pork — a lot of fat people, but none of them are Jewish or Vegetarians.\nFor those who do not have a ubiome sample available, I created a quick video showing the page."
] | [
"<urn:uuid:552d664d-d218-432f-b1c5-fa90c48a12d0>"
] | [
"CC-MAIN-2023-14"
] | [
"https://cfsremission.com/2019/06/18/why-is-my-bacteria-very-high-or-low/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00769.warc.gz"
] | [
"en"
] | [
0.950175404548645
] | [
379
] | [
2.75
] | [
3
] |
[
"Click here for a photo album of the peoples of Mindanaw\nLumad Series: Higaunon\nIntroductory note: This article on the Higaunons was prepared by Ms. Cecilia Valmores, in charge of the Research Desk of the Indigenous Peoples Apostolate (IPA) of the Cagayan de Oro City, and has been validated by two tribal chieftains, Datu Migtaltagan (Bruno Lindahay) and Datu Masaba (Manuel Lindahay), member and vice president respectively of the Lantad-Balatukan Federation of Tribal Council. Kalinaw Mindanaw is publishing this here through the courtesy IPA's incumbent Executive Director, Mr. Lino Gelsano. Photographs will be added later. May we also refer the surfers to the Home Page of Hans Brandeis (http://userpage.fu-berlin.de/~bukidnon/) for more information on the Bukidnon, Higaunon, Talaandig and others. It also has an excellent collection of photographs.\nLantad-Balatukan Federation of Tribal CouncilI. Background and Setting Balatukan territory is one of the eight recognized territories (walo ha talugan) where the Higaunons are geographically distributed. These territories are bounded by immense rivers – Odiongan (Gingoog), Agusan, Kabulig (Claveria), Tagoloan, Lanao, Cagayan, Pulangi (Bukidnon) and Balatukan (Balingasag) hence these territories were named after these rivers.\nAncestral Domain Claim\nAncestral Domain Claim\nThe first inhabitants of the territory were the Higaunons. The Higaunons were known as the subgroup of the Manobo tribe. The term Higaunon came from the term \"gaon\" which means \"from the mountain\" or \"mountain dwellers\". The term was first popularized by Ricardo Hopin de la Camara in the year 1966. According to the elders of the territory, their ancestors were once coastal dwellers. The influx or migrant settlers and their desire to preserve their culture pushed them to retreat to the mountains.\nAmong these eight territories, Balatukan is very significant and central to the Higaunons' spiritual belief and cultural identity. At the heart of Balatukan mountain ranges lies Mt. Balatukan, an extinct volcano traditionally known as Mt. Kamatayan. Mt. Kamatayan has been believed to be a sacred mountain. According to the Higaunons' death myth, it is where the soul of the dead takes its final judgment. Until today the elders believe that the smokes from the vents and top of Mt. Kamatayan are campfires of the dead inside the mountain.\nLater, Mt. Kamatayan gained its exonym, Mt. Cabecera, possibly from Spanish sources although there is no clear explanation for it; it means \"center\" as the mountain is indeed central to the religious belief and cultural identity not only to the Higaunons of Balatukan territory but also to the eight territories. This mountain today is popularly known as Mt. Balatukan with its close association with the Balatukan river.\nBalatukan river is famous for its strong current as its original name suggests, Maragulos (meaning \"with strong current\") river. It was later changed to Balatukan because Apo Bayagtuk, the great Apo who is a descendant of Apo Gumugunal the keeper of the death who dwells at Mt. Kamatayan drowned there.\nThe earliest peopling of the territory is believed to have taken place at Sitio Lantad and its neighboring sitios. Lantad is one of the six sitios of Balatukan territory and five sitios of barangay Kibanban, Balingasag, Misamis Oriental, a vast plain of about 400 hectares, with an elevation of 800 feet above sea level. It is blessed with fertile land, high level of biological diversity and geological resources, wildlife and other sources of food. It is a valley distinctly located across the face of the extinct volcano Mt. Kamatayan, traversed by the mighty Balatukan river.\nThe term Lantad, according to historical accounts, was allegedly derived from the Spanish term adelantar; no such term exists in Higaunon. The word denotes an \"improved condition\" or \"good condition\". It is said that the first datu who arrived at the place found it very productive. He invited his kin to inhabit the place with him. The term adelantar was then shortened to lantar and since the native tongue has difficulty with the r sound, lantar becameLantad. The first datu became known as Datu sa Lantad.\nLantad has been known as a rebel enclave for almost two decades now. It lies northeast of the municipality of Balingasag, bounded by Lagonglong on the west, Gingoog on the east and Claveria at the south. Lantad is approximately twenty-six kilometers from the municipality of Balingasag. It could be reached from various points, either Barangay Samay, Barangay Quezon, and Barangay Napaliran of Balingasag or Barangay Bantaawan, Barangay Sidlakan and Barangay Pigsaluhan of Gingoog City or Barangay San Isidro, Barangay Bangbang of Medina, Misamis Oriental. It is, however, more accessible with Barangay Quezon road. From Barangay Quezon to sitio Lantaka as drop off point, Lantad could be reached with either 123 kilometer walk, a three to five hours horseback ride or a two hours risky ride on a motorcycle called habal habal.\nIn the year 1968, OCA Logging concession and BOLCAN timber concession in 1970 started the depletion of the territory’s old growth forests. Forest damage, however, was more attributed to the 1983 forest fires. These logging companies also drew in migrant settlers. Lantad at this period was known to be an agricultural productive community in the municipality of Balingasag which in turn was the top producer of agricultural products in the province of Misamis Oriental at that time. Roads at different points to the community, including farm to market roads were still passable. The peace and order situation was quite normal until 1981 when the problem of insurgency broke out.\nIn 1981, the insurgents started penetrating the area and by 1982, the peace and order situation worsened. Massive military operations were launched. Migrant settlers abandoned their houses, farms and work animals and resettled to the lowlands to escape the growing conflict. The Lumad moved further into the interior parts of the mountains, thus becoming by force of circumstances, masa or direct supporters or full timers of the insurgents. In 1982, the insurgents had the sitio under siege and in the last quarter of 1985, a Peoples’ Revolutionary Government (PRG) was instituted in the area.\nWith this development local government service employees could not enter the area for fear of being caught in the crossfire. Damaged roads, too, aggravated inaccessibility.\nFrom 1984 to the middle of 1986, the CPP-NPA launched Operation Zombies, a systematic execution of deep penetration agents (DPAs) within its ranks. The years 1987 to 1989 marked the insurgents recovery period.\nDuring the years 1986 to 1989, the economy of the community was in the hands of the revolutionary government. No farm products were sold outside the community. What they produced were intended only for consumption. The community consumed only within the limits of what it produced. Lowland settlers or small time businessmen were not allowed to enter the area.\nIn response, the government military forces launched Operation Skylark, an intensified ground and air assault from February to July 1990. Lantad became a no-man’s-land. There was food, medicine and clothing crisis.\nMajor military operations continued until 1991 when the Lumads, tired of the situation and years of hiding, decided to surrender and live peacefully within the fold of the law. Lantad gained relative peace. The government granted amnesty to the surrenderees, most of whom were Higaunons from sitio Lantad.\nIn 1993, government assistance, including those from the local and from the province started to flow in. The DENR’s Integrated Social Forestry program (ISFP) had 75 recipients or beneficiaries. A school building was built. Non-governmental organizations, too, did their bit.\nThe Center for Peace and Development (CPD) along with the Presidential Management (PMS) Staff facilitated organizing and livelihood assistance in the area. The Lantad Task Force composed of different government and non-governmental agencies was also organized to facilitate the needs of the people.\nEarly this year (1997), up to the month of November, Lantad-Balatukan Federation of Tribal Council, with their Supreme Counsel Datu Man-oray held a series of meetings to represent the claimants of the 57,870 hectares, well defined Balatukan Talugan (Ancestral Domain). The territory includes sito Anahaw, part of Barangay Sidlakan and part of Barangay Pigsaluhan of Gingoog City, part of Barangay San Isidro, Barangay Maayam, and Barangay Bangbang of Medina, Misamis Oriental and sitio Iba, part of Barangay Samay, sito Kamanse and Lantad of Balingasag, Misamis oriental having approximately 415 households and 3,477 individuals. Lantad alone had 141 households and 982 individuals, 97% of which are Higaunons.\nThe peace loving Higaunons continue to live, often caught between conflicting parties. They are either branded as NPAs by the extreme right or DPAs (Deep Penetration Agents) or military assets by the extreme left. In the face of this problem, they manage to maintain tribal integrity; they observe their traditions, practice their religious rituals and pursue their traditional community governance and the in accordance with customary law, the Bungkatol Ha Bulawan Nangka Tasa Ha Lana. There are, however, serious threats to their culture’s considering the strong influences from the dumagats, from the extremes (fear of the military and of the NPA) and loss of pride in their own cultural pride.\nAbundance of natural resources and soil fertility within their ancestral territory continue to attract migrant settlers.\nThe Higaunons of sitio Lantad and the entire Balatukan terrritory and the NPAs are not one and the same as they are perceived by the dumagats. They are, however, one and united on one issue, the need to secure tenure protect their right to ancestral domain and to self-determination.\nIPA Research Desk\nIPA-Cagayan de Oro\nDatu Migtaltagan (Bruno Lindahay)\nMember, Lantad-Balatukan Federation of Tribal Council\nII. SOCIO-POLITICAL STRUCTURE There are virtually two political systems operating in Lantad, that of the local government and the traditional leadership of the Datus. Matters concerning government policies and programs are handled by the local government; conflicts within the community and questions of access to land are settled by the Datus. However, these divisions are not absolute and on matters of importance, both selected and traditional leaders are consulted.\nThe influential traditional leaders of Lantad gained their status from their leadership capabilities drawn from the wisdom of Bungkatol Ha Bulawan Nang Ka Tasa Ha Lana or Higaunon customary law. Their capacity to lead was also enhanced through the seminars and training gained either from the local government, from church seminars, from NGOs or from the extremes (CPP-NPA and the military). These leaders from time to time were contacted by different agencies. Although decision making was done by male leaders, behind them was the implicit but strong participation of women.\nAt monthly meetings of the sitio, community projects are discussed, as are government programs such as health, livelihood, peace and order and others. Sitio meetings and assemblies are held every month, usually on a Saturday at the plaza or at the school. Every Saturday is also a pahina day. Pahinas, or cooperative labor, are usually well-attended as each household in sitio Lantad is required to send one representative to the pahina or pay a fine of fifty pesos (50.00) is imposed on those who are absent. Common pahina activities are repairing roads, planting and maintaining ornamental plants within the centro or barrio as commonly referred to by the residents. Pahinas are usually initiated by the sitio officials, the teachers, the datus or by the military; best attended if called by the latter. Pahinas are also social functions which strengthen the relationship among the residents of the sitio or the barrio.\nDisputes within the community are first brought to the Datus. If either party is not satisfied by their decision, they can go to the Lupon Tagapamayapa, or barangay justice committee. The datus also handle questions of land ownership within Lantad, and relations with other indigenous communities, Higaunon or non-Higaunon.\nThough Higaunons listen only to one Limbobongan Ho Banwa, decision is held by consensus. Tribal elders were given high respect. Their opinions, decisions were always sought especially with serious matters that is through kalalanga, a discussion process.\nThe Grand Counsel or Limbobongan ho Banwa is usually multi-skilled, i.e. he performs rituals, he knows how to cure and most importantly he can settle differences as in the case of Datu Man-oray of Balatukan Territory. He has been known as a good arbiter during his time. He was installed after a long and thorough process. His courage and wisdom enables him to perform his duties. He has the knowledge and wisdom of Bungkatol Ha Bulawan Nang Ka Tasa Ha Lana.\nThe Koluba (Supreme Datu) leads his people to settle differences within the tribe and initiates discussion process or paglalang with the tribal elders especially with issues confronting them. He is basically the main ritualist of the tribe. He is chosen by the people and the Limbobongan Ho Banwa himself.\nThe sabandal or the emissary datu is responsible for providing information related to the current problems experienced by the community. He attends tribal activities outside the tribe in behalf of the Limbobongan Ho Banwa and carries messages for the tribe.\nDatu Pamahandi is responsible for the financial matters of the community. He performs rituals related to his job. He is in charge of the preparation of ritual paraphernalia. Securing food for the visitors of the tribe is also part of his duties.\nBae Tagohabol prepares vests, kamuyot and kerchief for Dang-ol (installation of Datus).\nThe baylan is the doctor and the priest of the tribe. He is responsible for the health of the community both the spiritual and physical health that is with the aid of an abyan.\nBae Mangangapog secures betel nut and apog or lime for the Datus during discussions.\nThe Alimaong or tribal guards are responsible for the security of the tribe.\nToday, the traditional political structure has undergone some changes. It is no longer well defined. It has weakened and become less influential because of the existing local government, the barangay. Although this is the common trend among the indigenous communities, Lantad-Balatukan Higaunons have been among those communities which have consistently tried to uphold their traditional political structures.\nBungkatol Ha Bulawan Nangka Tasa Ha Lana (Higaunon Customary Law)\nTranslated literally, Bungkatol Ha Bulawan Nangka Tasa Ha Lana means bulawanong panaghiusa nga adunay sukdanan sa kalinaw ug hustisya in Cebuano or golden solidarity and measure of justice and equality. It is a self-determining system, a way of life for the Higaunons.\nBungkatol Ha Bulawan Nangka Tasa Ha Lana could be traced back to the time before the Spaniards came, when Apo Pabuluson, Higaunons’ great Apo, upon observing that the Higaunons were already divided and the pgtugunan ko gin-apuanwere no longer observed, held a dumalungdong, the highest and most sacred prayer gathering among the Higaunons, together with the tribal datus from northern Mindanaw.\nThe Bungkatol Ha Bulawan symbolizes the undying fellowship among tribesmen who adhere to keep peace and harmony as an essential path for every tribal community. This has been observed with utmost respect, as it embodies the way of life, norms and traditions, social organization and system of the tribal community. The Bungkatol Ha Bulawan represents the humanity of life and the culture which the Lumads cherish and practice.\nWhat is embodied in the Bungkatol Ha Bulawan Nangka Tasa Ha Lana?\nThe Bungkatol Ha Bulawan says that land is a gift from Magbabaya, God. Nobody can claim ownership of it and, consequently, no one should be subjected to serfdom and enslavement.\nIt is prohibited to cut down flowering trees for they are the source of food and treasure of the forest.\nThose who hold authority or have dominion over the territories are acknowledged by the laws embodied in it.\nTheft, exploitation of the effort of others and disrespects for the properties of others is against the Bungkatol Ha Bulawan Nangka Tasa Ha Lana.\nThe Bungkatol Ha Bulawan enjoins respect and acknowledgement of the different tagbaya or demi-gods: the Igbabasok who has dominion over the farms; the Pamahandi over treasures and properties, the Bulalakaw over the waters and fishes, thePanalagbugta over lands, and the Tumanod, record keeper-servant of the Magbabaya.\nThe pangayaw or declaration of war against an enemy is permitted in the Bungkatol Ha Bulawan in order to protect the tribe and put a stop to all atrocities.\nAnybody who infringes on the laws of the territory will be punished (pagasalaon) including unreasonable murder, theft, slander and discrimination of another person.\nIt is a virtue in the Bungkatol Ha Bulawan to die for each other, to respect one another, to understand one another for rapport and peace inside or outside the tribe or territory.\nIPA Research Desk\nIPA-Cagayan de Oro\nDatu Masaba (Manuel Lindahay)\nLantad-Balatukan Federation of Tribal Council\nIII. SUBSISTENCE PATTERN Higaunons of sitio Lantad and the entire Balatukan territory subsists on staple agricultural products which they grow in wide variety. These are either planted on their backyards, their talaoha/unayan (work fields) or on their hillside kaingin or swidden farm. They also grow rice and corn which they either grind on their stone corn mill or have them milled at the poblacion and sold for 5.00 pesos per kilo. A proportion is stored for family consumption. Higaunon culture prohibits selling of any of these staple products. But with the influx of the dumagat and the influence of cash economy, almost all of them are already selling these products except for rice the selling of which, they still strongly believe, would cause great malas (scarcity of food) and must be abhorred.\nThey are also horticulturists. They grow a rich variety of vegetables which include wild ferns, water grass, sayote, white beans, and others. They also grow spices specially onions, which they grow in abundance, along with fruits like guavas, avocado, mango and wild fruits like rattan and others.\nOccasionally, they hunt, trap wild pigs, deer, rodents, amphibians, wild birds, and gather other food items from the forest. Forest products such as giyong (tiger grass), rattan (poles and split), romblon, tikog for mat weaving are significant in the area. Most of them are dependent on these products during lean months. Their forests also grow a rich variety of timber like tugas, tanguile, apitong and narra, hence the recourse to tablon-tablon, another source to supplement subsistence farming.\nDuring lean months, this economic activity does not only suffice for their basic needs while they await harvest but they also meet urgent needs such as medicines and hospitalization. It is also a recourse for those about to be married, and for ritual requirements like pigs and chickens. Engaged in this relatively easy way of getting a living are people whose ages range from 13 to 45, women included.\nDistinct also in Lantad is the large percentage of CAFGU employment for men ages 15 to 35, women included, too.\nThere is also significant number of residents have also gone down to the poblacion and the cities to work as helpers or working students.\nIV. BELIEFS AND CUSTOMSBelief in Supernatural Beings\nThe Higaunons spiritual belief is deeply rooted in nature and faith in the supernatural forces. They believe in magbabaya, the creator and supreme being. He created all things that we think, feel and see. In order to ensure the harmony over his creation,magbabaya created spirits called tumanod to guard over his creation. They also believe that with these good spirits co-exist the bad spirits or the busaw.\nConcept of Land and their Domain\nTo the traditional Higaunons land cannot be owned since life itself comes from the land. The idea of land being owned through a piece of paper, or buying it and owning it is alien to them. Today, however, with the dumagats’ influence of buying and selling land, some of them have sold their land for just a pittance to alleviate their situation or exchange a nating baka (cow) or a carabao to help them till their land, or for health needs, like hospitalization, or in exchange for cans of sardines or fighter wine, although they would say the latter in exaggeration.\nTheir ancestors have lived on their territories over which they ruled themselves and related with other neighboring territories, long before the government was established. These territories – the land includes the people, their dwellings, the mountains, the waters, the air, the plants, the mountains, the forests and the animals – these all constitute the environment or the domain in its totality. The indigenous peoples right to ancestral domain springs from their being heirs of their ancestors. They believe that their survival depends on the land, asserting their right to it and defending it, otherwise they will cease to exist as distinct people. They believe that the right to life includes the right to a way of life. If the right to a way of life rest upon the land for survival, then the right to life must be extended to their ancestral land.\nBelief in the Judgement of the Dead\nMt. Kamatayan, more prominently known by the dumagat as Mt. Balatukan is a landmark important for the cultural identity of the Higaunons of the eight territorial boundaries.\nThe Higaunons of the eight territorial boundaries believe that every human being has seven souls. When an individual dies, these seven souls merge into one. Then the soul makes its way to Mt. Kamatayan for the final judgement. The journey is long and tedious. First, it must go to Panigbasan where the tree of records grows. The soul makes a notch on the tree to show that it has arrived there. Then it proceeds to Dalamay Suso, a huge rock at upper Napaliran, then crosses to Balatukan with Andalapit, a demigod, who conducts the soul to the Kadiklumang Katiguman at Panaysayawan where the soul dances the ritual dance of atonement for his sins. It does not stop dancing until it sweats profusely. Next the soul gets a haircut at Panamparan. From there it proceeds to Kumbirahan where a banquet is prepared for it. Then, Apo Gumugunal conducts the soul at the foot of Mt. Kamatayan where the soul is judged by the assembled gods of the dead. If the soul is adjudged good, it is sent to Dungkiluban, the cloud-capped stairway to heaven. If it is deemed wicked, it is sent to Lake Aluyan (having a fishy smell). It is made to fetch water night and day until its sins are forgiven. The soul of the wicked sweats from exhaustion and the river is red due to their blood.\nV. RITES AND RITUALS\nAmidst the problem of insurgency, cultural assimilation and economic deprivation, Higaunons of sitio Lantad have remained traditional over the years. They still practice their customs and traditions. Their rites and rituals, i.e. passage rituals, livelihood rituals especially planting and harvests, are some of their interesting and well-observed rituals. There is, however, one that is very prominent because it is referred to as the biggest gathering or assembly of the Higaunons of the eight territories, the dumalungdong.\nDumalungdong Paghupit ho Espiritu, is the descent of the highest spirit, the spirit of wisdom, courage, goodness and peace, the spirit of Magbabaya. Later it became the name of the spirit itself. Dumalungdong, the prayer ritual reflects the Higaunons’ desire to recapture the descent experience.\nDumalungdong is the highest and most revered prayer for the indigenous people of Lantad. This ritual is usually held when an individual completes his training for datuship or that of a babaylan who would then become a professed baylan. This ritual is also held when there is a need for the community for new leadership or turnover of leadership as in the case of Lantad. Thus the ritual when Datu Man-Oray, the Limbobongan ho Banwa (Grand Counsel) at the age of 125, expressed his desire to turn over his leadership to his legitimate heir Datu Masaba. Or when the community is beset with serious problems as in that held at Kalabugao in 1986 when the groups of Iglesia ni Kristo were encamped by Governor Zubiri in their ancestral lands. Or when there is a call for serious action such as pangayaw, when a tribe engages itself in a tribal war against an oppressor. The first dumalungdong was held at Tagoloan territory under the leadership of Datu Pabuluson.\nThe Higaunons believe that for every Dumalungdong, a chosen individual becomes a medium of the spirit Dumalungdong itself. The medium facilitates the preparation and the coming of the different tribal leaders of different Talugans (territory) . The Lantad-Balatukan Dumalungdong was attended by its neighboring Talugans: Odiongan, Agusan, Kabulig, Pulangi, Cagayan and Lanao.\n(The Concept of Justice)\nThe tampuda is the Higaunons’ system of social control and peaceful mechanism to resolve conflicts in Lantad.\nA tampuda is conducted tin order to prevent vengeance. The process begins by obtaining a rattan vine or a balagun about half a meter long. At the ritual each of the feuding parties hold one end of the freshly obtained rattan. The officiating datu in a solemn tone proclaims the moment as a solemn moment and that each party should speak the truth because his is a pact of forgiveness, friendship and unity. If ever anyone would speak falsehood, he would suffer the same fate as the balagun. Then, he cuts the balagun neatly into two. This is then laid on a table and kept.\nOn the day before the wedding, a ritual for the couples’ gimukod or individual’s spirit, is performed. This is to seek their permission so that they would be joined with each other’s gimukod.\nOn the wedding day, the bride is taken to a room where she is left alone. The room’s door is sealed with fresh linen --an embroidered sack of rice will also do -- and a lady in waiting guards the entrance of the room in sitting position. When everything is set, the bride is then escorted out to the doorstep of the bride'’ house where a pig is laid. She steps on the pig before she goes up inside the house which in turn marks the start of the main rite. The datus from both parties officiate the proceedings. They unite the bride and the groom with a betel nut exchange. The datus from both parties also exchange betel nuts. After chewing the nuts, they also exchange a fist full of rice. A chicken is then butchered and its blood is smeared on the couples’ hands to symbolize the sanctity of the ceremony. Purification by water ends the rite. Merry-making follows. On the following day, they receive the wali-wali from the elders. Best wishes are given so that their married life will be fruitful. For three days, the newly wed were forbidden to step on water.\nPart of the Higaunons marriage institution is the duay where a man takes two or more wives. Permission of the first wife is prerequisite to the recognition of the duay. In most cases, it is the first wife who would ask the husband for a second wife or more so that she would have an assistant in her daily chores. The second wife is obligated to obey the first.\nThis ritual marks the transference of stewardship of the land. Traditional Higaunons believed that every nook and cranny of the earth has unseen guardians. Hence, before a new land is opened for cultivation, a ritual is first performed to ask the spirit’s permission. If the omen, pagbagto, is favorable, the cultivation begins. A padugo ritual is then made whereby an animal, usually chicken, is butchered and offered to the spirits. Only then is the land planted.\nPamuhatbuhat: Healing Ritual\nHigaunons believe that some sicknesses are due to soul loss. They believe that man has seven souls. During sleep, six of these souls leave the body and their adventures compose the dreams of the sleeper. Some of these souls may encounter a busaw or evil spirit who would captured it or them to be devoured later when the sleeper wakes up. The person who loses a soul or more then becomes sick. A baylan is then consulted. He offers an animal, uses the blood to call its abyan or helping spirit who in turn approaches the place of sacrifice. With the abyan, they search for the lost soul to bring back the health of the patient.\nIPA Research Desk\nIPA-Cagayan de Oro\n| (Sgd with thumbmark)|\nDatu Masaba (Manuel Lindahay)\nLantad-Balatukan Federation of Tribal Council\n16 Mar 02 - 20 Apr 05\n|December 15, 2004||The \"Inga\" Lesson|\n|November 30, 2004||A Murder, a Wedding and a Kidnapping|\n|November 22, 2004||Seminar Update|\n|November 18, 2004||Church Leadership Seminar|\n|November 1, 2004||Remembered to Pray for Rupu?|\n|October 18, 2004||Comprehension Checking|\n|October 5, 2004||Tongue Growth Update|\n|September 28, 2004||October 2nd is Thanksgiving Day|\n|September 21, 2004||Visitors|\n|August 23, 2004||Back in the Village|\n|August 8, 2004||Rebels in Area - Please Pray!|\n|July 26, 2004||God's Work in Two Outreach Villages|\n|July 20, 2004||New Batteries|\n|June 30, 2004||A Hard Decision to Make|\n|May 21, 2004||Answered Prayer|\n|May 12, 2004||Higaunon Church Seminar|\n|May 3, 2004||Rain, Requests, Coworkers & More|\n|March 16, 2004||At Work on Several Projects|\n|January 21, 2004||Silak Wanted to Talk|\n|December 26, 2003||Out ... No Matter the Method|\n16 Mar 02 - 20 Apr 05\n|February 25, 2002||The Word of God continues to go forth|\n|January 15, 2002||January Update|\n|December 11, 2001||Merry Christmas - biopsy results negative for malignancy!|\n|November 27, 2001||Emergency Flight for Laura|\n|October 30, 2001||Lance's mom (Erma Ostman) went \"Home\"|\n|September 23, 2001||How Will Recent Events Affect Us?|\n|August 13, 2001||Back in the Village|\nJune 19, 2001\nApril 5, 2001\nMarch 24, 2001\nMarch 24, 2001\nHello everyone - just thought we'd send you this update. Thanks each of you who continue to pray for us. L&L\nPraise the Lord and thanks for praying for us over the past week. We flew out of the village a little later than expected due to poor weather. But, by late morning the clouds parted allowing the plane to come get us. We \"bumped into\" (one of those meetings that only God can orchestrate) one of the church members from Bible Believers Fellowship and from that we had a good time of fellowship the following day. Pastor Greg had been up to visit the pastor who ministers to the lowland language speaking people just the week previous. He said they were expecting us, he thought, on Monday. So, instead of Tuesday, it ended up being Monday - no big deal. Then they asked if I'd be willing to speak to the congregation the next morning, and, since I have a hard time saying no to opportunities like that, I enjoyed sharing with the church Sunday morning where we saw some dear friends.\nWe had agreed that one of the pastors from the church would stop by and pick us up Monday morning and get us to the place where we'd get on public transportation to take us. Upon arrival where the \"jeep\" would take us into the mountains, we were notified that there would be no jeep until later that day - well into the afternoon. However, there are motorcycles that take up to 6 passengers at a time, and this fellow was more than willing to take us to our destination for a mere 120 pesos. (not to much when converted to dollars but who does that after all this time here?) So, we were off (no comments on that one please!) The bike was a small street bike - perhaps a 155cc. I sat behind the driver and Laura sat behind me with luggage strapped to the bike. The driver \"flew\" up the mountain road and Laura only screamed 4 times - thinking she was coming off the bike.\nA little over 30 minutes later we arrived at our destination. They were NOT expecting us until the next day but were happy that we had arrived. The said they'd love to have us for a month if we could stay that long. Langan & Iyi and their 4 children live in a 12’x16’ house with no furniture. They sleep on the hard floor with a mosquito net. Laura and I brought mats to sleep on but no net. We did, however, burn mosquito coils to keep those nasty malaria carrying creatures away. Mosquitoes aren't the only things that nets keep away but none of these other creatures awakened us the two nights we were there. It's amazing what we take for granted - water flush toilets (none), ready made food (none), electricity (none), etc., etc. They had picked some avocados the week before, and they were ready for eating. They tasted so good with a bit of sea salt sprinkled over them.\nWe enjoyed a great time of fellowship with the believers and had a question and answer time with unbelievers in attendance. While showing us around, Langan pointed across the valley to a place where he used to live. He spoke of a house where the people placed the bones of the dead - believing that if all the dead were gathered in one place, there would be a resurrection. He also spoke of a man who carried the bones of his wife and child around with him wherever he went. It breaks your heart! Pray that God would open their hearts to listen to the teaching. Pray too for a chieftain who is not a believer and had a number of questions for us. He is a witch doctor.\nThe trip out was all down hill making it a longer and \"less exciting\" trip. Thanks so for praying for us. What a blessing you are to this ministry.\nSecure in Him,\nLance & Laura\nPrayer Requests....... 4-5-01\nThank you for praying for the following.\nLance & Laura.....\n· Pray for us as we work on the teaching curriculum for the Higaunon church. The Bible teachers have been asking for new materials to give to those they are discipling. Before we can give them the materials, we want to make sure there are no errors in them. So, we’ve been spending a lot of hours going through the materials and weeding out errors before we do another print.\n· Our co-workers, Ron & Michelle Jennings have finished with the updated literacy materials and are printing them and putting them in book form. Each page is full color and gets laminated so they’ll not only be attractive but also will last in this harsh environment.\n· Pray for our children. Robert and Kelli are still in Jackson; MI. where Kelli is finishing up at NTBI and Robert is driving for a local company. He’s home every night with his job, which is a big answer to prayer. On those odd times when he’s not, Kelli goes with him. They are planning on visiting us this summer and would appreciate your prayers for them in this. They will then return to Oklahoma where Kelli will finish up her schooling for her marketing degree. Then Robert hopes to go back to school as well.\n· Nicole is at Trinity International University, Deerfield IL. She is just about to finish up her first year. She has enjoyed it for the most part but of course it has not been without its challenges. She has been asked to be an RA (resident’s assistant) this next year and has agreed to that. She is excited about the possibility of going to China this summer and would appreciate your prayers for her.\nJune 19, 2001\nDear Prayer Partners,\nWe trust this news update finds you all well and rejoicing in the Lord. There's a flight coming in tomorrow which will take our e-mail out to town, so we thought we'd take this opportunity to catch you up on what all is happening.\nFirst and foremost in our minds is the hostage situation with Martin & Gracia Burnham. They are never far from our minds these days and we find ourselves waking up in the middle of the night praying for them. They may be held \"against their will\" but they are not being held against God's will. Although our hearts ache for them, we take comfort in the fact that God is in complete control and He has a purpose for them right where they are. Thank you for praying for them and their children and extended family members. Pray, too, for the others being held - perhaps God is using this situation to bring them to Himself.\nSecond on our minds these days is Nicole. As we reported to you in previous letters, the Lord has arranged for her to go to China this summer. The organization she's with raised some extra money allowing her to stop in to see us on her way. We had a great time with her and we praise the Lord for this opportunity He has given to her for the summer. She left here over a week ago, spent a week with believers in Korea, and then last Monday made her way to Beijing, where she'll be teaching English. An e-mail from her yesterday assured us that she arrived safe and sound and everything went smoothly as she entered the country. Praise the Lord with us for this! Please continue to pray for her as she looks to the Lord for her time there. If you do write her, please do not mention anything of a religious/spiritual nature. \"We're thinking of you.\" translates into \"We're praying for you.\" and there are other ways to say things that will not be seen by the authorities there as threatening. So, please use discretion when or if you write. Thank you. Last week in Korea, the woman she stayed with told her that last year she herself was put in jail for 2 days and fined $700 for having a Bible study in China. So Nicole was warned to be very careful.\nThird we have one more month before we leave for our annual conference in Manila. We're looking forward to getting together with the rest of our NTM field personnel July 23-28 just outside Manila at a retreat/conference center. Please pray for safety for each one traveling to get there and then back to their respective places of ministry. Due to the current hostage crisis in the country, there are warnings for foreigners traveling because of threats that more hostages are being sought. Also pray our hearts will be prepared for the times in the Word.\nFourth we had told some of you that we expected Robert and Kelli to visit us this summer. Well, it doesn't look like it's going to work out as they had some unexpected expenses. We had given them some travel vouchers but they couldn't use them unless they were paying full fare which was apparently quite expensive. At any rate, God has other things in store for them. They are \"on the road\" as I write this - moving to Oklahoma. I'm sure they would appreciate your prayers for them as they settle in and as Robert looks for employment and Kelli finishing her degree this fall.\nWell I guess that sums it up. Thanks to each of you for your part in this ministry through prayer and to those who give. What a blessing each one is.\nSecure in Christ,Lance & Laura\nPS - this just in - A village about 5 \"grueling\" hours hike from here has asked for a teacher to come and teach them God's word. They have built a meeting house and are preparing for someone from here to come live there. Reportedly there are 28 families ready to listen to the teaching. Please pray!\n[August 13, 2001]\nGreetings from Higaunon land! We returned to the village on Thursday. We were so eager to get home, back to our routine and to work. We do praise the Lord for so many answered prayers! Thank you for praying for us and our NTM field conference. God gave safety for all the travel involved and we had a wonderful conference. Of course, our hearts were heavy because our dear friends Martin & Gracia Burnham were missing from our fellowship. Thank you for continuing to pray for them! We have no further news to report on their situation, but for any current update look at the NTM web site. http://www.ntm.org/connect/headlines/burnham.shtml\nThings here in the village seem to be going well. We do ask you to pray for the ongoing work with the checking, translation, the different projects going on - all for the strengthening of the Higaunon church. There is teaching going on in many other Higaunon villages at this time. Thanks for praying for the village where there are a number of families wanting to listen to the teaching. There is a family here who is getting ready to go and teach them. Please continue to pray for the people there that they will be faithful to listen and that they will respond to the truth of God's Word. Pray that the Higaunon church leaders (and we) will keep our focus on the Lord in all that we do. Our theme at conference was \"Intimacy with God\" and it was good to be reminded again that God desires our fellowship. He is more interested in our walk with Himself than anything we accomplish for Him!\nWhile we were out we got to talk to Robert, Kelli and Nicole by phone. Nicole had a great time in China! If you did not receive her update and would like to, please let us know. She is interested in returning to China again next summer. Right now she is preparing to be a Resident Assistant at Trinity International University this year - being responsible for 26 girls! Please pray for her in this as well as for her classes, her finances, a job, relationships, etc! Robert & Kelli got moved to Oklahoma and Kelli will be starting classes soon to complete her degree in marketing, the Lord willing, in December. God has provided them with a nice little house to rent and Robert has a job - driving truck yet again! This time the truck is not an 18 wheeler though. He will be delivering supplies to mini-marts and gas stations in the Dallas, Ft.Worth area. Please pray for his safety, for Kelli in her schooling and a job, for their relationship as husband and wife (they just celebrated their first anniversary last week!), for their involvement in a church, for God's direction for their future. We still very much want them to come for a visit here. Pray we all will rest in God's timing for this, if it is His will.\nI (Laura) ended up with a very bad virus - chest cold, cough last week. Thanks for praying for our health needs! We do so take our good health for granted, until we \"get hit\" with something!\nThe last word we had from the family regarding Lance's mom was that she isn't doing well at all. Your prayers for her and the family there are much appreciated. We know Mom wants to go \"Home\" to be with the Lord. It is hard for the family to watch her deteriorate mentally and physically like she is. God's timing is perfect, so we wait on Him for Mom's \"promotion.\" Lance's sister Kathy was able to be home from Venezuela, for several weeks this summer and got to see mom - we praise the Lord for this.\nWe enjoyed wonderful fellowship with coworkers from all over the Philippines at our conference. It is always a joy to hear what God is doing in other areas and ministries. We are privileged to be part of a great team reaching the tribes of the Philippine Islands with the Gospel of Jesus Christ. YOU are part of the team as well. Thank you again for your part in this work and in our lives personally. We praise God for you! We also want to say a special Thank you to each one who writes to us. Even the \"one-liners\" letting us know you receive our updates and are praying for us, are a big encouragement. So, keep those emails coming!\nSecure in Christ alone,\nLaura & Lance\n[September 23, 2001]\nGreetings one and all in that precious Name above all names - Jesus! What a joy it is to know we are in His hands and that He is in complete control of our lives. How we praise the Lord for the privilege to know Him during these uncertain days.\nSix o'clock each weekday morning finds us answering roll call on the 2-way radio. On Wednesday, September 12th there was no \"traffic\" and so it was only few minutes past six when we turned on the news to hear of the terrorist attack in the US. Our hearts are heavy for all that has happened, for this not only effects our nation, but it has changed our world like nothing else. We are living in exciting days, especially as we realize that each day is bringing us one day closer to the sound of that trumpet! Our prayer is that the Church around the world will be busy about the Master's business, taking advantage of the day - \"night is coming when no one can work.\"\nHow will this affect us? Time will tell and we are relying completely on the Lord to give us wisdom in the days and weeks ahead. Thank you for continuing to pray for our safety. The days may be uncertain, but we serve an all knowing God - all wise God.\nWe continue to press on with the work the Lord has given us to do among the Higaunon people. We've been busy with checking teaching materials before a final print. The Lord has provided for new equipment for photo copying and printing by the generous gift of a Christian businessman whom none of us has ever met!\nWe would appreciate your prayers for our health. I have not been feeling very well the past few days and have treated myself for malaria as a precaution. Today I'm a bit better but still weak. Laura was treated for pneumonia last month but still has some cough and is feeling better but still not 100%.\nIn case you haven't yet heard the news, there has finally been \"closure\" to the hostage situation of our three NTM co-workers taken from their tribal allocation in Panama in 1993. From all reports Dave Mankins, Mark Rich and Rick Tenenoff became a liability to their captors and were killed in mid 1996, when being chased by the Columbian military. Please do continue to pray for the families of these men as they adjust and look to the Lord for healing. That hostage situation has been resolved, but the one here in the Southern Philippines is still on going. Please keep praying for Martin and Gracia Burnham and their families. We have not had any reports on them in more than a week. With all the hatred the attacks in the US has stirred up, we are even more concerned for our dear brother and sister in their situation. We do know that God is still in control!\n\"Look up for your redemption draweth nigh!\" We don't know how soon the Lord could call His church upward, but we need to be ready and watching. Thank you for the part you have in our lives and the ministry here among the Higaunon people by your faithful prayer support! What a blessing each of you are to us.\nSecure in Him,\nLance & Laura\nOctober 30, 2001\nIt is Tuesday October 30 and we just received word that Lance's mom (Erma Ostman) went \"Home\" to be with the Lord yesterday. The family had been praying for her \"promotion,\" as she was failing so badly recently. Thanks for your prayers for the family at this time. see prayer request 8/13/01\nWe thought about trying to get back to the US for the funeral but for ourselves and the family there we just feel it's not necessary. It would be quite a feat to get ourselves organized, go from the tribe to the US within a matter of a couple of days! We also are in the process of doing a major printing project here.\nThe family plans to have a get together in Wisconsin in the spring to remember mom. We're planning to head back to the US at that time for a few months. Thank you again for your prayers!\nSecure in Him,\nLance & Laura\n[November 27 2001]\nDear Prayer Partners,\nWe have been overwhelmed with the outpouring of love and notes of encouragement from all of you who have let us know you are praying! I have been \"feeling\" those prayers! For those of you who have not yet heard, we called in an emergency flight on Sun morning to bring us out to town so I could see a doctor.\nI hardly slept on Saturday night and had pain in my left arm which really concerned me. On Sunday I rested once we arrived at the guest house. Yesterday (Monday) we went to see the doctor and I had all kinds of tests done. Praise the Lord all the tests came back with not just \"good\" results, but \"excellent\" results! My heart checked out fine. We do have to phone the doctor this morning after the radiologist reads my x-rays to see if my neck and shoulders are \"in line.\" I am going to another doctor on Thursday for some further checking (our doctor wanted me to get a second opinion just in case she missed anything) and to have an ultrasound. I do praise the Lord that I've slept better the past two nights!\nThank you all for praying for me (us) during these days as we seek answers to my physical condition. In short, the doctor here in town puts a lot of my symptoms down to \"pre menopausal syndrome.\" Whatever the cause of my physical symptoms, I do know the Lord knows all about it. Thanks again so much for your prayers and for all of you who have written personal emails to us to let us know you are praying. We appreciate it so very much!!! Don't stop now.\nWe praise the Lord that Nicole was able to fly down to be with Robert and Kelli for Thanksgiving break. She returned safely to school yesterday. The kids had a great time together. Pray for Kelli as she only has a couple of weeks of school left till graduation. The Lord has already answered prayer in providing a job for her in their area - working at their church! Robert will be looking for a new, part time job in the new year, as he hopes to go \"back to school\" in order to get his degree. Please pray for our kids in knowing God's direction for their future. Nicole is enjoying this year at Trinity International University - being kept very busy as a Resident Assistant for 26 girls as well as the International Students Assistant. This year is really stretching and growing her in the Lord. Please pray for her too!\nWill write more about our kids and the Higaunon work in another update soon. Do feel free to ask any questions you might have. Thanks again for your prayers!\nSecure in Christ alone,\nLaura & Lance\nPS - just got a message from the doctor saying I have a degenerative disk in my spine - not sure what all that means and am to see a specialist tomorrow. Thanks for praying!\nDecember 11 , 2001\nMerry Christmas from Lance and Laura!\nGreetings from the Philippines!\nLuke 2:10 Then the angel said to them, \"Do not be afraid, for behold, I bring you good tidings of great joy which will be to all people. 11 \"For there is born to you this day in the city of David a Savior, who is Christ the Lord. 12 \"And this will be the sign to you: You will find a Babe wrapped in swaddling cloths, lying in a manger.\" 13 And suddenly there was with the angel a multitude of the heavenly host praising God and saying: 14 \"Glory to God in the highest, And on earth peace, goodwill toward men!\"\nIt is with great rejoicing that we write to you today. First of all, we have a living Savior, Jesus Christ! We have assurance of eternal life with God, through Him, because of His sacrifice for our sin. We are blessed abundantly with family and friends who love us and whom we love so very much. We've been privileged to work among the Higaunon people and see many come to faith in Christ - brothers and sisters who will spend eternity with us! The list of blessings (this sounds more like a Thanksgiving message!) could go on and on.\nWe want to let each of you know that we just got the biopsy results back (even earlier than expected!) All were negative for malignancy! The doctor read the report to me over the phone, so I don't have the medical terms to describe what \"is\" the problem (it sounded like endometriosis to me) but she said there's nothing further to be done at this time - so that's good news! THANK YOU for your prayers for us during this past couple of weeks especially! Oh, and Lance is feeling much better this past couple of days, too! The cough seems to have subsided and so far, I haven't caught the virus! We do praise the Lord for these gracious answers to prayer. We had a good laugh when one person wrote \"...and we pray the Lord will protect you from your husband.\" Well, so far He has protected me from this virus.\nWe will plan to return to our village before the end of the month, God willing. Right now we just feel in need of more rest, since I'm still recovering from the surgery and am very sore! (It was the \"old fashioned\" kind of surgery!) It was the end of this week we had originally planned to come out \"for a break\" - so we're still hoping to do some of the things we planned on - like visiting some friends, doing some shopping, etc. Please pray we will recuperate well from our current \"ailments\" and be able to enjoy a safe, relaxing time together and with friends before our return to the work in the village. Lance has work to do while we are here as well; he has been working on the concordance as he's been able.\nWe've also enjoyed getting on the internet and \"chatting\" with our kids as well as doing emails ourselves from the guest house! We've enjoyed and appreciated all the notes of love and encouragement from so many! It's been fun trying to keep up with answering them - but we love being \"in touch\" and truly thank the Lord for this modern technology. Don't hesitate to reply to our emails - anytime! We do know that sometimes our emails are not reaching their destinations - so if you don't get a reply, just write again. We've had to resend some pretty important emails the past day or so!\nLet me close with something to think about: This year has been one of trial for us personally, and the body of Christ - with the Burnham's being taken hostage. God has confirmed to our hearts over and over again that our trust must be completely in Him, not in our circumstances or in men. He is God. He is sovereignly in control of ALL things. God delights in our fellowship with Himself. He wants our lives to glorify His name. He loves us with an unconditional, everlasting love! This is our prayer for each of you - that you may truly \"know Christ,\" perhaps as never before. And keep praying for laborers because many still have no knowledge of this Jesus whose birth we celebrate. Thanks again for your prayers for us and the Higaunon work. And please do keep praying for the Burnham family! We still pray many times daily for Martin & Gracia's soon release and to be reunited with family. God is good, all the time!\nRejoicing in Jesus,\nLaura & Lance\nOstman Update January 15\nHello! We've been back home in the tribal village for almost three weeks. Things are going well here. While we were away Ron Jennings continued with printing up Higaunon scriptures and teaching materials. The new printer has gone through 40,000 pieces of paper in two months! We praise the Lord for the equipment He's provided for us to produce the books for the Higaunon.\nWe had LOTS of rain the first couple of weeks we were home. On New Year's Eve we had a flood and \"almost\" lost the hydro-generator! It was a blessing in disguise though, as the guys were able to discover a problem and fix it. Had it not been for the flood and getting the generator out to dry it off, the problems would likely have caused the generator to burn up. Like so many things in our lives we have a negative attitude about, but after a while God shows us it was for our good.\nI've been feeling much better and stronger since the surgery. Thank you again for your prayers! The doctor has recommended that I have a check up in a few months, which I plan to do when we are Stateside, the Lord willing. Currently we are planning on leaving here sometime in April and returning in July. No exact dates yet, but we are working on it!\nPlease continue to pray for the work here. There is much to be done!\nSecure in Him,\nLaura & Lance\nOstman Update February 25\nThe old man danced for joy as the two Higaunon Bible teachers came into his village. Several months had passed since Sungusungu and his family had left there to go to their home village (where we live) for the delivery of their fifth child. In the months while they were gone a couple of renegade \"soldiers\" had been causing havoc for the villages in that area - stealing and threatening the people. The people who had been listening in the village thought, because of the trouble in their area, that the Higaunon missionary would not return. So, when Sungusungu and Sona went there to see if the people still wanted to hear the teaching of God's Word, they got their answer in the old man's joyous response to seeing them return! The Word of God continues to go forth here in the Philippines! Please continue to pray for safety and open doors to the Gospel amongst the Higaunon and other tribal groups here, despite the different forms of opposition.\nThings here in the village are going well. We continue to be busy with work on the concordance, checking revised Acts curriculum before a \"final print,\" and printing up lots of books for the church. (the printer's counter shows 80,000+ copies and it was brand new last October) Other projects that are being worked on are the moving of our hydro generator to a different location for more efficient electricity, the banana project, the Bible comics, further curriculum for the church and translation of Scripture. Thank you so much for upholding us (our missionary team) and the work here, in prayer.\nThis week marks 9 months of captivity for our dear coworkers, Martin & Gracia Burnham. We would ask that you please continue to pray for them and their family as we all wait on the Lord for the resolution of this hostage crisis. God continues to remind us of His sovereignty and His love for ALL men - even the Abu Sayyaf who are holding Martin & Gracia. Pray especially that Martin & Gracia will hold on to their faith, continue to find God's grace sufficient for each day and be a shining testimony of Jesus Christ before their captors and the watching world! Pray for their safety as the military are engaged in trying to eradicate the Abu Sayyaf and pray for their physical health, as we understand they are very thin and weak from malnutrition.\nOur health is pretty good these days. Laura continues to be thankful for her gall bladder surgery, as she's felt so much better since it came out! We are making plans to go to the US for three months from late April to late July. As we've mentioned before, this will be mainly a time to spend with family. We will be happy to visit with friends and supporters along the way as much as possible, but obviously we won't be able to get around to see everyone this time. We wish we could! Our plans are still to have a more \"regular\" furlough in the Spring 2003 to early 2004. We would appreciate your prayers for our visit in the US, for safety as we travel and all the many miles to be covered, profitable time with family, etc.\nAs always, we thank you for your partnership in the ministry here by your prayers. Don't hesitate to write us - we love getting mail!\nSecure in Christ alone,\nLance & Laura\nMay 01, 2002\nGreetings to each of you. We trust this finds you rejoicing in the Lord for each area in your lives.\nWe arrived in the US one week ago today. We don't think we've done too badly getting over jet lag. Right now we are still in California but tomorrow we fly to Chicago. We've had a wonderful time with the new friends we've met here. How we praise God for answered prayer in working out so many details of our time here. Thanks for praying for us!!\nTomorrow evening Nicole is planning to meet us at O'Hare airport! We look forward to seeing her and then within a couple days we will be with Lance's siblings for the internment of Mom Ostman's remains at Dad's grave in Kenosha, Wisconsin. We look forward to this family time and this time of memorial for Mom. We'll be visiting friends and supporters in the area there for a couple of weeks, then heading south to visit more family and friends. Do please keep us in prayer as we travel! We also desire that God be glorified in our lives wherever we are, whomever we're with - so please join us in praying to that end.\nPlease keep praying for our coworkers in the Philippines. We haven't got much news from the Higaunon work since we left. We'll update you as we get reports. Do keep praying for Martin & Gracia Burnham!!\nThanks for your partnership in our lives and ministry.\nSecure in Christ alone,\nLance & Laura"
] | [
"<urn:uuid:e8919a98-c4c2-4bc3-984e-f8a8c0e8b7f2>"
] | [
"CC-MAIN-2013-48"
] | [
"http://stevenwarran.blogspot.com/2012/12/the-people-of-mindanaw-by-cecilia.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163048129/warc/CC-MAIN-20131204131728-00070-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9666295647621155
] | [
13733
] | [
2.90625
] | [
3
] |
[
"Will Legend Nature School\nKids Love Outdoor Nature Activity\nNature School allows kids, students, or teens to take the lead in their learning through outdoor education (nature activities). Instead of teaching kids only at schools about nature, and the great outdoors, we’re much hoping kids can act as a guide and fellow nature explorer.\nPlan Your Outdoor Nature Activity\nThere are so many fun ways to learn and play with nature. Forester & Will Legend have created a list of nature activities which are brimming with some of the best outdoor activities for kids, students to teens. We’re delighted to customize nature activities with parents, teachers, and educators together too.\nNature activities serve as a starting point for kids for the day-to-day adventures in learning, and give them the time they need to find out what most interests them in the natural world.\nExamples of Nature Activity, Nature Game\nPapaya Field Trip & Farming Experience\nPapaya Field Trip is a fantastic place for kids to plant the seeds of their learning. Children can learn how to grow fruits and vegetables, and harvest foods (produce). This experience not only good for the minds, and bodies of kids, but also the future of our planet will benefit immensely.\nNature Scavenger Hunt\nNo matter pickup leaves, or flowers as they fall to the ground, find different colors or shapes, all these of nature scavenger hunts appeal to the child’s natural interest in discovering all clues that can be seen, heard, and felt in the natural world.\nBee & Butterfly Watching\nWatching bees, and butterflies are an excellent way for kids to learn about the importance of pollination, and appreciation of nature. This is a fun wilderness observation activity for children from toddlers to teens.\nBuild Your Own Mini Wildlife Corridor\nNo matter you choose adult plants of sunflower or start from a sunflower seed (germination), you can build up your own Mini Wildlife Corridors (Green Corridors). If you have concern to grow flowers at home, you can choose to grow your Mini Green Corridors at our Mini Forest in New Territories."
] | [
"<urn:uuid:8e4d6c3a-81f2-487c-9412-9a704586960a>"
] | [
"CC-MAIN-2023-14"
] | [
"https://will-legend.com.hk/conservation-love-our-nature/nature-school/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00776.warc.gz"
] | [
"en"
] | [
0.9221326112747192
] | [
435
] | [
2.71875
] | [
3
] |
[
"Why does Russia use toy-like inflatable S-300 missile systems?\nS-300 is a series of long-range surface-to-air missile systems, used since 1978. During the Russian invasion of Ukraine, S-300 turned out to be a devastating weapon. However, at least some of them appeared to be inflatable. Why would Russian forces use inflatable missile systems?\nIt’s actually not that uncommon. Inflatable and wooden mockups have been used for a very long time, especially since the First World War when aerial reconnaissance became a real tool of war. In the Second World War Allies used inflatable tanks to fake their advances, while some real tanks were dressed up to look like supply trucks. This kind of trickery is used to provoke an enemy’s reaction. For example, they could gather their forces to defend against the attack of armored units that are simply not real.\nRussian inflatable S-300 missile systems are examples of the same kind of thinking. It is believed that they were made in the early 2010’s although mock-ups of various weapon systems were definitely used by the Russian Armed Forces before as well. These inflatable systems match the real deal in colour, shape, and size. They were made in a formed hot air balloon factory and can be delivered and inflated very quickly. And they serve several different functions.\nFirst of all, these faux S-300 missile systems are designed to trick the enemy. Aerial and satellite reconnaissance struggles to differentiate between the real and inflatable systems.\nThis has a two-fold effect. First of all, Russians are hoping that Ukrainians will target inflatable weapons and miss the real ones. Secondly, Russian forces are trying to imitate a strong air defense situation, which might deter Ukrainian air forces from working in a specific area.\nFurthermore, these inflatable S-300 systems are thought to be used in occupied Crimea, which is a popular tourist destination. Civilians have a habit of taking pictures of military objects, which is not something the armed forces want. Giving them a fake S-300 system to look at from a distance provides civilians with a sense of security and gives them a harmless backdrop for holiday selfies.\nOpen source intelligence proved to be extremely valuable in the Russian invasion of Ukraine and both sides and looking into each other’s social media profiles and reporting. Inflatable S-300 systems look real in these amateur pictures.\nUkraine is also using dummy weapons. It’s been said that Russia has destroyed several wooden HIMARS systems, which were placed in tactical locations to ruin Russian estimates of how many of these weapons Ukraine has. By shooting at fake targets Russians can give away their positions.\nFinally, inflatable S-300 systems have been used in training as well. Moving a real S-300 is expensive and difficult. If live fire exercises are not planned, they can get away with using inflatable mock-ups, which help troops learn to work around these systems."
] | [
"<urn:uuid:98646f16-a803-4d9a-9265-492a999a69d5>"
] | [
"CC-MAIN-2023-14"
] | [
"https://arvindparmar.in/why-does-russia-use-toy-like-inflatable-s-300-missile-systems/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00160.warc.gz"
] | [
"en"
] | [
0.9664559364318848
] | [
623
] | [
2.609375
] | [
3
] |
[
"Grass, Soil, Hope: A Journey Through Carbon Country (Chelsea Green Publishing, 2014) addresses a crucial question: What can we do about the seemingly intractable challenges confronting all of humanity today? Build topsoil. Fix creeks. Eat meat from pasture-raised animals. Soil scientists maintain that a mere 2 percent increase in the carbon content of the planet's soils could offset 100 percent of all greenhouse gas emissions going into the atmosphere. But how could this be accomplished? What would it cost? Is it even possible? Author Courtney White says it is not only possible, but essential for the long-term health and sustainability of our environment and our economy.\nYou can purchase this book in the MOTHER EARTH NEWS store: Grass, Soil, Hope.\nFor a minute, I thought I had stepped into that scene from Lawrence of Arabia where Peter O’Toole, approaching the Suez Canal on foot, sees a ship sailing across the sand.\nI had parked on an earthen levee at the eastern end of Twitchell Island, in the great Sacramento–San Joaquin River Delta, east of San Francisco. In front of me was prime farmland, and in the distance, just beyond a slight rise, I saw a big cargo tanker plowing its way slowly across a field à la Lawrence — plowing the middle of the San Joaquin River, of course.\nI didn’t drive to Twitchell Island to see farmland, however. I wanted to see a carbon sweet spot in action. Sweet spots are where big things happen in small places for a minimum amount of effort and cost. On Twitchell, a whole suite of big things had happened on just 14 acres of wetland in only a few years. Thanks to a high density of plant matter and a low rate of decomposition, wetlands are the world’s best ecosystems for capturing and storing the carbon from CO2 in their soils. Their destruction, conversely, releases lots of CO2 into the atmosphere as these soils dry out and oxidize. Moreover, at least one-third of the world’s wetlands are composed of peat, a type of soil created by dead or dying plants that are permanently water-bound. Peatlands, which include bogs and fens, contain 30 percent of global terrestrial carbon but cover only 3 percent of the earth’s land surface (8 percent in the United States) — which is a lot of carbon bang for the buck.\nAlas, of the approximately 200 million acres of wetlands that existed in the United States during the 1600s, more than half have been destroyed, mostly by draining and conversion to farmland or commercial and residential development. Although the rate of destruction has slowed considerably in recent years thanks to our understanding of the critical role wetlands play in ecosystem health, roughly 60,000 acres are still being lost annually.\nThe Sacramento–San Joaquin River Delta was once a vast freshwater marsh thick with tule reeds, cattails, and abundant wildlife. At least six thousand years old, the marsh caught sediment that washed down annually from the Sierra Nevada range, building up soil that eventually reached 60 feet deep in places. When the delta began to be settled in the 1860s following California’s famous Gold Rush, farmers couldn’t believe their luck. Since the soil had often been submerged — a consequence of flat terrain, frequent flooding, and tidal action — it had essentially become peat, rich in carbon and other organic minerals. Crops grew vigorously in the fertile soil. Soon a new kind of gold rush was on — to grab land in the delta, drain it, and grow row crops by the bushel-load. By the 1930s, this “reclamation” work, as the government described it, was largely complete. Over 1,150 square miles of former wetland had been diked into fifty-seven separate islands, each surrounded by a levee.\nThe Land Began to Sink\nToday, 98 percent of the delta lies below sea level, with many of the islands 10 to 25 feet down, requiring pumps to work continuously to keep plant roots dry enough to grow the crops. This sinking is called subsidence, and it starts when organic carbon in peat soils is exposed to air. Waterlogged wetland soils are anaerobic, or oxygen-deprived, which means organic carbon accumulates faster (via annual plant growth) than it can decompose. However, drainage in the delta created aerobic, or oxygen-rich, conditions in the soil, which encouraged rapid microbial digestion of the carbon, released into the atmosphere as carbon dioxide. In other words, the carbon literally vaporizes. As a consequence, the rest of the peat dries up and either blows or washes away. Scientists have calculated that the rate of soil loss in the delta under these conditions can be as much as 1 to 3 inches per year.\nThese lowering soil levels are putting a great deal of stress (hydrostatic pressure) on the levees requiring that they be continually raised and strengthened to prevent their collapse, a costly and time-consuming business. And ongoing subsidence creates the potential for a catastrophic failure of the levee system as the result of a major flood or earthquake. Breaches in the levees, though rare, have caused serious problems in the past. As if that weren’t enough, subsidence encourages salt intrusion from San Francisco Bay.\nIt’s not just row crops that are threatened, however. Two-thirds of all Californians get some part of their drinking water from the delta, and much of the state’s agriculture depends on the delta for a steady supply of (salt-free) irrigation water.\nNot many people know that central California is a mammoth plumbing project, crisscrossed by a complex network of canals, ditches, and pumping stations. And most of the water in this plumbing system originates in the Sacramento–San Joaquin River Delta. Originating in watersheds that encompass 35 percent of the state of California, nearly half of all the state’s total river flow winds up in the delta, of which 7.5 million acre-feet of water, or roughly 25 percent, is delivered to huge pumping stations in the southern delta. Over 80 percent of this water is delivered to agriculture, supporting a nearly $45 billion industry in the state. Much depends on maintaining the integrity of this vast plumbing project. That’s why subsidence, weakening levees, expanding salinity, and rising sea levels due to climate change all combine to keep California’s water managers up at night.\nEnter a group of scientists with the US Geological Survey in Sacramento, led by Robin Miller. In 1997, she and her colleagues came up with a novel idea to reverse subsidence in the delta: resurrect the marsh. Could the process that created the land-loss problem be reversed, they asked? In other words, could controlled flooding re-create the original marsh ecology and thus begin to build the soil back up as it did before?\nTo find out, they implemented an experiment on two 7-acre, side-by-side plots of farmland adjacent to a ditch that bisected Twitchell Island, located in the northwestern part of the delta. Twitchell Island had been “created” in 1869 by ditches and levees, and by 1997 it had dropped 6 meters (18 feet) below sea level. The scientists determined that 3 to 9 meters of peat soil remained on the island, which meant further subsidence was likely.\nTo test their hypothesis, they flooded the western 7-acre plot to a depth of 10 inches and the eastern plot to 22 inches. Tules were planted in a small portion of both plots. By the end of the first growing season, cattails had colonized both plots (the seeds arriving on the wind), which provided a screen for other plants, including duckweed and mosquito fern. Then things really took off. After just a few short years of annual managed flooding, the western plot had developed a dense canopy of marsh plants, as did the eastern plot, though it maintained some open water.\nWhen they took measurements of the soil after seven years, they were amazed to discover that the soil in both plots had risen 10 inches—the result of 15 tons of plant material growing and dying per acre per year.\n“Ten years after flooding,” wrote Miller in a peer-reviewed summation, “elevation gains from organic matter accumulation in areas of emergent marsh vegetation ranged from 1 to 2 feet, with an annual carbon storage rate approximating 1 kg/m2, while areas without emergent vegetation cover showed no significant change in elevation.”\nThis answered their research question: subsidence could be reversed by returning natural marsh processes to the land.\nBut the hopeful news was just beginning. The researchers tested the amount of CO2 that had been sequestered in this new soil as a result of their experiment. They suspected that 1 to 2 feet of dense, carbon-rich peat soil likely soaked up a lot of atmospheric CO2 — and they were right. In fact, as much as 25 metric tons per acre per year were sequestered in the study plots, according to their analysis. In comparison, a typical passenger vehicle emits 5 metric tons of CO2 per year. The 14 acres in the study plots sequestered the equivalent emissions of seventy passenger vehicles per year!\nAccording to the scientists, if the entire delta could be turned into carbon farms, the net CO2 effect would be like changing all of California’s SUVs into small hybrids or the equivalent of turning off all residential air conditioners for a year. And that doesn’t even count the CO2 emissions eliminated by not farming the land (conventionally, anyway). And that doesn’t count all the other ecosystem services generated by a functioning marsh, including water purification and wildlife habitat.\nThe researchers called what they did a “carbon-capture farm” and hoped that the project would demonstrate that it is highly feasible to use managed wetlands to sequester carbon and reduce subsidence simultaneously. Although the specifics of this project are likely limited to the Sacramento–San Joaquin River Delta, it is nonetheless a very good example of a sweet spot. On just 14 acres, the project demonstrated how to reverse subsidence,reduce the risk of levee failure, sequester a lot of carbon, provide wildlife habitat, especially for birds on the Pacific flyway.\nThe experiment also raised other questions, which the team hoped to answer with a scaled-up project somewhere else in the delta: Is there some way to increase carbon storage in the soil beyond current levels? Could this be a buffer against rising sea levels? What are the total greenhouse gas emissions produced by restored wetlands, including methane and nitrous oxide, and how will this effect the overall goal of net greenhouse gas reduction?\nThe Project Was Cancelled\n“The State of California stopped supporting the research when the budget problems hit,” Miller wrote to me in an e-mail. “Still, while the project was active, much valuable information was gained.”\nOne question that wasn’t addressed in the research occurred to me as I watched the tanker sail across the farmland on Twitchell Island that day: where’s the economic incentive to “carbon-farm” this land? For all the multiple benefits that restoring the marsh ecology would create, there’s no incentive for a private owner to stop farming here — not yet.\nThe scientists assumed the answer lay with the creation of a carbon market via a cap-and-trade program, in this case via a law called the California Global Warming Solutions Act of 2006, signed into law by Governor Schwarzenegger, with the goal of reducing California’s greenhouse gas emissions to 1990 levels by 2020. Similar to Australia’s model, the law required California to place a limit (or “cap”) on major emitters of greenhouse gases, such as power plants, fuel refineries, and the transportation sector. These caps will then decline by 3 percent each year. Concurrently, the state will distribute allowances, which are tradable credits, equal to the emissions allowed under the cap. Emitters over the cap must buy credits or otherwise offset their emissions or else face financial penalties. Ideally, market forces will spur technological innovation and investments in clean energy so that emitters can come under the cap and thus sell their allowances.\nThe farmers on Twitchell Island could benefit by selling offsets they had generated by converting their farmland back to delta marsh and sequestering all that lovely carbon! The linchpin is what scientists call additionality — meaning the carbon added to the soil is new or additive to the carbon already present. It’s this extra carbon that forms the basis of a tradable carbon credit. The key is hard numbers, which Miller and her colleagues had in spades. All that Twitchell Island farmers needed was a marketplace. Right?\nMaybe. Many observers remain skeptical of the offset concept. When I first looked into it, I discovered a serious objection: “cap-and-trade” can easily become “cap-and-swindle.” At best, offsets may be illusory; at worst they may be fraudulent, thus imperiling the whole idea.\nHowever, there was nothing illusory about what had happened on Twitchell Island, despite my Lawrence of Arabia moment. That’s why some are touting the demonstration project as a role model for other work, including Stephen Crooks, a San Francisco–based wetland restoration expert. “This is probably the highest sequestration of carbon dioxide you can get in a biological system,” he said in an article. “This is the foremost example of showing how you can restore wetlands and sequester carbon at the same time. We can use what has been learned as a very firm reference to help inform policy development in the United States and overseas.”\nIf a market could be created for wetland restoration, Crooks went on to say, it would have multiple benefits beyond carbon sequestration, including recreational opportunities for hunting, fishing, and birding created by the restored wildlife habitat, which, incidentally, would be an additional source of income for landowners. In fact, the Twitchell Island project demonstrates that all sorts of possibilities exist when we adjust our lenses to look at the world in a different light.\nStarting with just a few acres at a time.\nRead more from Grass, Soil, Hope in How Cattle Ranching Can Positively Affect Carbon Absorption.\nReprinted with permission from Grass, Soil, Hope: A Journey Through Carbon Country by Courtney White and published by Chelsea Green Publishing, 2014. Buy this book in our store: Grass, Soil, Hope."
] | [
"<urn:uuid:05a6859b-6f10-4cc2-96f3-8ca8aa68439c>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.motherearthnews.com/Nature-and-Environment/Environmental-Policy/twitchell-carbon-sweet-spot-ze0z1605cbru"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00298.warc.gz"
] | [
"en"
] | [
0.9589563012123108
] | [
3069
] | [
3.296875
] | [
3
] |
[
"From Wikipedia, the free encyclopedia\nIn statistics, a confidence interval (CI) for a population parameter is an interval between two numbers with an associated probability p which is generated from a random sample of an underlying population, such that if the sampling was repeated numerous times and the confidence interval recalculated from each sample according to the same method, a proportion p of the confidence intervals would contain the population parameter in question. Confidence intervals are the most prevalent form of interval estimation.\n- (where x is a number between 0 and 1)\nthen the random interval (U, V) is a \"(100·x)% confidence interval for θ\". The number x (or 100·x%) is called the confidence level or confidence coefficient. In modern applied practice, most confidence intervals are stated at the 95% level (Zar 1984).\n Practical example\nA machine fills cups with margarine, and is supposed to be adjusted so that the mean content of the cups is close to 250 grams of margarine. Of course it is not possible to fill every cup with exactly 250 grams of margarine. Hence the weight of the filling can be considered to be a random variable X. The distribution of X is assumed here to be a normal distribution with unknown expectation μ and (for the sake of simplicity) known standard deviation σ = 2.5 grams. To check if the machine is adequately adjusted, a sample of n = 25 cups of margarine is chosen at random and the cups weighed. The weights of margarine are , a random sample from X.\nTo get an impression of the expectation μ, it is sufficient to give an estimate. The appropriate estimator is the sample mean:\nThe sample shows actual weights , with mean:\nIf we take another sample of 25 cups, we could easily expect to find values like 250.4 or 251.1 grams. A sample mean value of 280 grams however would be extremely rare if the mean content of the cups is in fact close to 250g. There is a whole interval around the observed value 250.2 of the sample mean within which, if the whole population mean actually takes a value in this range, the observed data would not be considered particularly unusual. Such an interval is called a confidence interval for the parameter μ. How do we calculate such an interval? The endpoints of the interval have to be calculated from the sample, so they are statistics, functions of the sample and hence random variables themselves.\nIn our case we may determine the endpoints by considering that the sample mean from a normally distributed sample is also normally distributed, with the same expectation μ, but with standard deviation (grams). By standardizing we get a random variable\ndependent on μ, but with a standard normal distribution independent of the parameter μ to be estimated. Hence it is possible to find numbers −z and z, independent of μ, where Z lies in between with probability 1 − α, a measure of how confident we want to be. We take 1 − α = 0.95. So we have:\nThe number z follows from:\nThis might be interpreted as: with probability 0.95 one will find the parameter μ between the stochastic endpoints:\nEvery time the measurements are repeated, there will be another value for the mean of the sample. In 95% of the cases μ will be between the endpoints calculated from this mean, but in 5% of the cases it will not be. The actual confidence interval is calculated by entering the measured weights in the formula. Our 0.95 confidence interval becomes:\nThis interval has fixed endpoints, where μ might be in between (or not). There is no probability of such an event. We cannot say: \"with probability 1 − α the parameter μ lies in the confidence interval.\" We only know that by repetition in 100(1 − α) % of the cases μ will be in the calculated interval. In 100α % of the cases however it doesn't. And unfortunately we don't know in which of the cases this happens. That's why we say: with confidence level 100(1 − α) % μ lies in the confidence interval.\"\nThe following picture shows 50 realisations of a confidence interval for μ.\nObservation of the sample means we choose from the population of all realisations. There the probability is 95% we end up having chosen an interval that contains the parameter. After realisation we just have our chosen interval. As seen from the picture there was a fair chance we choose an interval containing μ; however we may be unlucky and have picked the wrong one. We'll never know; we're stuck with our interval.\n Theoretical example\nhas a Student's t-distribution with n − 1 degrees of freedom. Note that the distribution of T does not depend on the values of the unobservable parameters μ and σ2; i.e., it is a pivotal quantity. If c is the 95th percentile of this distribution, then\n(Note: \"95th\" and \"0.9\" are correct in the preceding expressions. There is a 5% chance that T will be less than −c and a 5% chance that it will be larger than +c. Thus, the probability that T will be between −c and +c is 90%.)\nand we have a theoretical (stochastic) 90% confidence interval for μ.\nAfter observing the sample we find values for and s for S, from which we compute the confidence interval\nan interval with fixed numbers as endpoints, of which we can no more say there is a certain probability it contains the parameter μ. Either μ is in this interval or isn't.\n How to understand confidence intervals\nConfidence levels are typically given alongside statistics resulting from sampling.\nIn a statement: we are 90% confident that between 35% and 45% of voters favor Candidate A, 90% is our confidence level and 35%-45% is our confidence interval.\nIt is very tempting to misunderstand this statement in the following way. We used capital letters U and V for random variables; it is conventional to use lower-case letters u and v for their observed values in a particular instance. The misunderstanding is the conclusion that\nso that after the data has been observed, a conditional probability distribution of θ, given the data, is inferred. For example, suppose X is normally distributed with expected value θ and variance 1. (It is grossly unrealistic to take the variance to be known while the expected value must be inferred from the data, but it makes the example simple.) The random variable X is observable. (The random variable X − θ is not observable, since its value depends on θ.) Then X − θ is normally distributed with expectation 0 and variance 1. Given that 90% of the standard normal distribution lies between −1.645 and 1.645, we know:\nso the interval from X − 1.645 to X + 1.645 is a 90% confidence interval for θ. But when X = 82 is observed, can we then say that\nThis conclusion does not follow from the laws of probability because θ is not a \"random variable\"; i.e., no probability distribution has been assigned to it. Confidence intervals are generally a frequentist method, i.e., employed by those who interpret \"90% probability\" as \"occurring in 90% of all cases\". Suppose, for example, that θ is the mass of the planet Neptune, and the randomness in our measurement error means that 90% of the time our statement that the mass is between this number and that number will be correct. The mass is not what is random. Therefore, given that we have measured it to be 82 units, we cannot say that in 90% of all cases, the mass is between 82 − 1.645 and 82 + 1.645. There are no such cases; there is, after all, only one planet Neptune.\nBut if probabilities are construed as degrees of belief rather than as relative frequencies of occurrence of random events, i.e., if we are Bayesians rather than frequentists, can we then say we are 90% sure that the mass is between 82 − 1.645 and 82 + 1.645? Many answers to this question have been proposed, and are philosophically controversial. The answer will not be a mathematical theorem, but a philosophical tenet. Less controversial are Bayesian credible intervals, in which one starts with a prior probability distribution of θ, and finds a posterior probability distribution, which is the conditional probability distribution of θ given the data.\nFor users of frequentist methods, the explanation of a confidence interval can amount to something like: \"The confidence interval represents values for the population parameter for which the difference between the parameter and the observed estimate is not statistically significant at the 10% level\". Critics of frequentist methods suggest that this hides the real and, to the critics, incomprehensible frequentist interpretation which might be expressed as: \"If the population parameter in fact lies within the confidence interval, then the probability that the estimator either will be the estimate actually observed, or will be closer to the parameter, is less than or equal to 90%\". Users of Bayesian methods, if they produced a confidence interval, might by contrast say \"My degree of belief that the parameter is in fact in the confidence interval is 90%\". Disagreements about these issues are not disagreements about solutions to mathematical problems. Rather they are disagreements about the ways in which mathematics is to be applied.\n Confidence intervals in measurement\nMore concretely, the results of measurements are often accompanied by confidence intervals. For instance, suppose a scale is known to yield the actual mass of an object plus a normally distributed random error with mean 0 and known standard deviation σ. If we weigh 100 objects of known mass on this scale and report the values ±σ, then we can expect to find that around 68 of the reported ranges include the actual mass.\nIf we wish to report values with a smaller standard error value, then we repeat the measurement n times and average the results. Then the 68.2% confidence interval is . For example, repeating the measurement 100 times reduces the confidence interval to 1/10 of the original width.\nNote that when we report a 68.2% confidence interval (usually termed standard error) as v ± σ, this does not mean that the true mass has a 68.2% chance of being in the reported range. In fact, the true mass is either in the range or not. How can a value outside the range be said to have any chance of being in the range? Rather, our statement means that 68.2% of the ranges we report are likely to include the true mass.\nThis is not just a quibble. Under the incorrect interpretation, each of the 100 measurements described above would be specifying a different range, and the true mass supposedly has a 68% chance of being in each and every range. Also, it supposedly has a 32% chance of being outside each and every range. If two of the ranges happen to be disjoint, the statements are obviously inconsistent. Say one range is 1 to 2, and the other is 2 to 3. Supposedly, the true mass has a 68% chance of being between 1 and 2, but only a 32% chance of being less than 2 or more than 3. The incorrect interpretation reads more into the statement than is meant.\nOn the other hand, under the correct interpretation, each and every statement we make is really true, because the statements are not about any specific range. We could report that one mass is 10.2 ± 0.1 grams, while really it is 10.6 grams, and not be lying. But if we report fewer than 1000 values and more than two of them are that far off, we will have some explaining to do.\nIt is also possible to estimate a confidence interval without knowing the standard deviation of the random error. This is done using the T distribution, or by using non-parametric resampling methods such as the bootstrap, which do not require that the error have a normal distribution.\nIn the process of weighing 1000 objects, under practical conditions, it is easy to believe that the operator might make a mistake in procedure and so report an incorrect mass (thereby making one type of systematic error). Suppose he has 100 objects and he weighed them all, one at a time, and repeated the whole process ten times. Then he can calculate a sample standard deviation for each object, and look for outliers. Any object with an unusually large standard deviation probably has an outlier in its data. These can be removed by various non-parametric techniques. If he repeated the process only three times, he would simply take the median of the three measurements and use σ to give a confidence interval. The 200 extra weighings served only to detect and correct for operator error and did nothing to improve the confidence interval. With more repetitions, he could use a truncated mean, discarding say the largest and smallest values and averaging the rest. He could then use a bootstrap calculation to determine a confidence interval narrower than that calculated from σ, and so obtain some benefit from a large amount of extra work.\nThese procedures are robust against procedural errors which are not modeled by the assumption that the balance has a fixed known standard deviation σ. In practical applications where the occasional operator error can occur, or the balance can malfunction, the assumptions behind simple statistical calculations cannot be taken for granted. Before trusting the results of 100 objects weighed just three times each to have confidence intervals calculated from σ, it is necessary to test for and remove a reasonable number of outliers (testing the assumption that the operator is careful and correcting for the fact that he is not perfect), and to test the assumption that the data really have a normal distribution with standard deviation σ.\nThe theoretical analysis of such an experiment is complicated, but it is easy to set up a spreadsheet which draws random numbers from a normal distribution with standard deviation σ to simulate the situation (use =norminv(rand(),0,σ)). See for example Wittwer, J.W., \"Monte Carlo Simulation in Excel: A Practical Guide\", June 1, 2004. These techniques also work in Open Office and gnumeric.\nAfter removing obvious outliers, one could subtract the median from the other two values for each object, and examine the distribution of the 200 resulting numbers. It should be normal with mean near zero and standard deviation a little larger than σ. A simple Monte Carlo spreadsheet calculation would reveal typical values for the standard deviation (around 105 to 115% of σ). Or, one could subtract the mean of each triplet from the values, and examine the distribution of 300 values. The mean is identically zero, but the standard deviation should be somewhat smaller (around 75 to 85% of σ).\n Confidence intervals for proportions and related quantities\n- See also: Margin of error\nAn approximate confidence interval for a population mean can be constructed for random variables that are not normally distributed in the population, relying on the central limit theorem, if the sample sizes and counts are big enough. The formulae are identical to the case above (where the sample mean is actually normally distributed about the population mean). The approximation will be quite good with only a few dozen observations in the sample if the probability distribution of the random variable is not too different from the normal distribution (e.g. its cumulative distribution function does not have any discontinuities and its skewness is moderate).\nOne type of sample mean is the mean of an indicator variable, which takes on the value 1 for true and the value 0 for false. (Statisticians often call indicator variables \"dummy variables\", but that term is also frequently used by mathematicians for the concept of a bound variable.) The mean of such a variable is equal to the proportion that have the variable equal to one (both in the population and in any sample). Thus, the sample mean for a variable labeled MALE in data is just the proportion of sampled observations who have MALE = 1, i.e. the proportion who are male. This is a useful property of indicator variables, especially for hypothesis testing.\nTo apply the central limit theorem, one must use a large enough sample. A rough rule of thumb is that one should see at least 5 cases in which the indicator is 1 and at least 5 in which it is 0. Confidence intervals constructed using the above formulae may include negative numbers or numbers greater than 1, but proportions obviously cannot be negative or exceed 1. The probability assigned to negative numbers and numbers greater than 1 is usually small when the sample size is large and the proportion being estimated is not too close to 0 or 1.\nConfidence intervals for cases where the method above assigns a substantial probability to (−∞, 0) or to (1, ∞) may be constructed by inverting hypothesis tests. If we think of conducting hypothesis tests over the whole feasible range of parameter values, and including any values for which a single hypothesis test would not reject the null hypothesis that the true value was that value, given our sample value, we can make a confidence interval based on the central limit theorem that does not violate the basic properties of proportions.\nOn the other hand, sample proportions can only take on a finite number of values, so the central limit theorem and the normal distribution are not the best tools for building a confidence interval. A better method would rely on the binomial distribution or the beta distribution, and there are a number of better methods in widespread use. For details on advantages and disadvantages of each, see:\n- \"Interval Estimation for a Binomial Proportion\", Lawrence D. Brown, T. Tony Cai, Anirban DasGupta, Statistical Science, volume 16, number 2 (May, 2001), pages 101-117.\n See also\n- Fisher, R.A. (1956) Statistical Methods and Scientific Inference. Oliver and Boyd, Edinburgh. (See p. 32.)\n- Freund, J.E. (1962) Mathematical Statistics Prentice Hall, Englewood Cliffs, NJ. (See pp. 227-228.)\n- Hacking, I. (1965) Logic of Statistical Inference. Cambridge University Press, Cambridge\n- Keeping, E.S. (1962) Introduction to Statistical Inference. D. Van Nostrand, Princeton, NJ.\n- Kiefer, J. (1977) Journal of the American Statistical Association, 72, 789-827.\n- Neyman, J. (1937) Philosophical Transactions of the Royal Society of London A, 236, 333-380. (Seminal work.)\n- Robinson, G.K. (1975) Biometrika, 62, 151-161.\n- Zar, J.H. (1984) Biostatistical Analysis. Prentice Hall International, New Jersey. pp 43-45"
] | [
"<urn:uuid:ae01c138-8491-40fb-ade4-9a7e35692e84>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.unc.edu/courses/2007spring/geog/594/001/ltgreenb/non-project/BOOK2DBF/everything%20else/helpful%20info%20from%20web%20and%20urls/statistics/Confidence%20interval%20-%20Wikipedia,%20the%20free%20encyclopedia.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703057881/warc/CC-MAIN-20130516111737-00073-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9146707653999329
] | [
3895
] | [
4.3125
] | [
4
] |
[
"Organic gardening is a goal many people have but never actually try to accomplish. The thought of starting a garden can be intimidating for many people, due to the fact that it is not something a lot of people are familiar with, and it does seem complicated. This article can help you get the tips you need to make the leap into the fun and beneficial world of organic gardening.\nShoveling soil that is mostly clay can be difficult because of the hardness of the soil, and because it sticks to the shovel. Coat and buff the digging end of the shovel with automobile wax to make digging easier. This will make your task easier because the clay won’t stick to the shovel. It will also keep your garden tool from rusting.\nThe kind of soil you use will influence the results. Find out more about the plants you like and which type of soil is best. You can make an artificial area that uses a single kind of soil.\nWhen dealing with any type of seeds in gardening, it’s important that you soak them overnight in a cool, dark location. Put some seeds in a container and fill the container to the brim with water. This will give your seeds a good start by making sure they have plenty of water, which they need to sprout. This increases the chances of survival for the seeds.\nIf you find that you have soil that has high amounts of alkaline, mix used coffee grounds throughout the soil. Coffee grounds are an affordable means of adding acid to the soil so that it is pH-balanced. The plants will be healthier, leading to more delicious home-grown veggies.\nThe best gardens start with seeds, as opposed to plants. Starting with your own seeds is more environmentally friendly than buying plants from a nursery. Many of the plastics used for gardening simply end up going in the trash and clogging land fills. An environmentally-friendly garden is started with seeds or plants grown in organic pots.\nGarden for fall colors. Fortunately, this doesn’t have to be. In terms of colorful foliage, fall is the time of year admired by many. Many trees display a range of the vivid colors of fall, from bright yellow to rich crimson, including maple, beech, and dogwood. When selecting shrubs, consider barberry, hydrangea, or cotoneaster.\nChill out by taking time to garden. There are numerous ways to seek personal comfort and peace. One of the best ways to do this is gardening. Gardening does not require a lot of dollars to start, and yields tremendous benefits. The biggest dividend is the emotional satisfaction of planting and growing greens on your own.\nWater infused with aspirin is great for combating plant disease. Dissolve one and one-half aspirins into two gallons of cold water, and use it to fortify your plants. Spray the plants with the aspirin water to assist plants in battling disease. Spray them once about every three weeks.\nHopefully this article has taken all of your apprehension about organic gardening completely out of the equation. Apply these tips and you will quickly be eating luscious and wholesome foods, that you grew yourself!"
] | [
"<urn:uuid:0a8a91c2-debf-41d8-969a-0108a5c983b5>"
] | [
"CC-MAIN-2020-05"
] | [
"https://skolfieldhouse.com/read-this-article-on-gardening-to-become-a-master/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00431.warc.gz"
] | [
"en"
] | [
0.956176221370697
] | [
643
] | [
2.84375
] | [
3
] |
[
"NORMAL GABA FUNCTION\nThe gap where an electrical signal jumps from one neuron to another is called the synaptic cleft. This is a closeup of the cleft between one neuron and another. Since the impulse cannot cross a gap as electricity, it crosses as a \"message\" by means of chemical messengers called neurotransmitters.\nThis animation shows the action of a neurotransmitter called GABA, which acts to quiet electrical activity in parts of the brain. The GABA is produced in one neuron, here the one shown at the top. It is stored in packages called vesicles that move to the cell membrane and release the GABA into the cleft. The GABA crosses the gap between the neurons, and then binds to receiver sites, or receptors, on the neighboring neuron, shown at the bottom.\nWhen GABA occupies a receptor, it decreases the neuron's electrical activity. (That is, the neuron's electrical activity \"quiets down.\") After a while, the GABA comes off the receptor and is removed from the synapse by reuptake pumps that return it to the first neuron."
] | [
"<urn:uuid:34edb147-1461-4c00-b72b-69656f56dd15>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.thirteen.org/closetohome/animation/gaba-text.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00034-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9355788826942444
] | [
222
] | [
4.1875
] | [
4
] |
[
"Do you know about a giant prehistoric turtle whose head resembled a football? Or, have you heard about the Jesus Lizard? An ancient lizard that could walk on water. Check out our following pick ofthe 7 most exotic creatures.\n7 Weird Creatures Found in Fossils\n- Archaeopteryx a.k.a. Dino Bird\nIn Solnhofen, Germany; an ancient being that had the features of a dinosaur plus a bird was found. It was named Archaeopteryx. Astoundingly, this creature was only the size of a pigeon. The species was hailed as the ‘missing link’ between dinosaurs and birds.\n- Babibasiliscus Alxi a.k.a. Jesus Lizard\nDiscovered in 2015, Babibasiliscus Alxi was an ancient lizard species that could cover short distances on water. The species belongs to the family of Corytophanidae.\n- Bohaskaia Monodontoide a.k.a. Single Tooth Whale\nImage Source : cdn4.list25.com\nFounded in 1969AD, Bohaskaia Monodontoide was a toothed whale that lived some 3-4mn years ago. The species was discovered by a band of scientists from Howard University and Smithsonian’s National Museum in a mine near Hampton, Virginia, United States. On the contrary to modern whales, this species preferred moderate tropical regions to live.\n- Carbonemys Cofrinii a.k.a. Giant Prehistoric Turtle\nNamed after the Colombian coal mine where it was discovered, Carboneyms Cofrinii was a giant prehistoric turtle. The beast lived some 5mn years after the wipeout of dinosaurs from the earth.With a body size of a smart car, the dead animal species had a head with the size of an NFL football.\n- Iguanodon a.k.a. Vegetarian Godzilla\nFirst investigated in 1820 by Gideon Mantell, Iguanodon is the second dinosaur species that was awarded with a proper genus name. Iguanodon is among the 3 dinosaur species that was taken as the inspiration for the design of the popular fictional character of Godzilla. Contrary to the fictional beast, this dinosaur species was pure vegetarian.\n- k.a. Hellboy\nHailed as the ‘most impressive’ species of horned dinosaur behind Triceratops, the beast roamed earth about 66mn years ago. The dino was named Hellboy, after the comic book character, as it took 10 long (and difficult) years to study it. The beast had exotic facial horns.\n- Tullimonstrum a.k.a. Tully Monster\nDuring a fossil expedition in the 1950s, an exotic beast was found by Francis Tully. The species was baptised Tullimonstrum after its discoverer, which literally means Tully’s Monster. The weird animal featured a long nose, segmented body, a finned tail, and was only a few inches long.\nDino Bird was only an imaginary creature before its discovery, and so was Hellboy. But now we know that they really existed."
] | [
"<urn:uuid:488fd56a-9998-45c9-ad9c-6c4e4c51ffe7>"
] | [
"CC-MAIN-2017-30"
] | [
"http://www.incrediblediary.com/7-amazing-creatures-found-in-fossils.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424060.49/warc/CC-MAIN-20170722122816-20170722142816-00138.warc.gz"
] | [
"en"
] | [
0.9622814059257507
] | [
656
] | [
2.828125
] | [
3
] |
[
"While government officials, researchers, international agencies and members of the public join us at the African Initiative Congress on Climate Change , Save the Children released their latest report “Feeling the Heat”, in which they warned that 250,000 children could die next year due to the effects of climate change. The charity said the figure could rise to more than 400,000 per year by 2030.The leading factors and risk levels, as indicated by the report, include\n- Natural disasters, such as cyclones, droughts and floods\n175 million children will suffer the consequences of natural disasters like cyclones, droughts and floods by 2030\n- Mounting clean water shortages\n900 children in the next generation will be affected by water shortages\n- Increased spread of malaria\n160 million more children will be at risk of catching malaria – one of the biggest killers of children under five – as it spreads to new parts of the world\nDavid Mepham, Save the Children’s Director of Policy, called on world leaders to agree a tough deal on tacking climate change at the UN Climate Change Conference in Copenhagen this December.\n\"This is not just Africa’s problem, it affects everyone,\" he said. \"Climate change is a ticking time bomb. Global leaders need to act now to stop the needless deaths of millions of children.\""
] | [
"<urn:uuid:3322b23f-68e9-4b26-8850-7c33ef176ca0>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.cigionline.org/articles/save-children-report-warns-risks-climate-change"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00289.warc.gz"
] | [
"en"
] | [
0.9531181454658508
] | [
273
] | [
3.15625
] | [
3
] |
[
"What we look for:\nOur dedicated vascular ultrasound scans look at veins and arteries to help investigate a number of conditions including:\nVein and artery health is important to overall wellbeing. It may also be dangerous to put up with conditions that need treatment. Our diagnosis will help to either put your mind at rest or point you in the right direction for treatment. Contact us today.\nScans we do and what they mean:\nA Carotid scan is an ultrasound scan of the carotid arteries in the neck that lead to the brain. This study is used to detect a blockage or narrowing of the carotid arteries, which may cause a mini-stroke, stroke or eye problems. The Carotid scan takes about 30 minutes. There are no special preparations. You should wear loose fitting clothing for your scan.\nLeg Artery scan\nA Leg Artery scan is a non-invasive scan used to assess peripheral vascular disease (PVD) or blockages in the arteries. PVD can cause leg pain when walking, cold feet and ulcers. The Leg Artery scan takes about 30 minutes for each leg.\nA Venous scan is used to assess vein function and the presence of deep vein thrombosis (DVT). Venous disease or DVT can cause varicose veins, venous ulcers or leg swelling and pain. The scan takes between 20 and 60 minutes.\nDoppler Pressure Studies\nA Doppler Pressure Study measures the blood pressure in feet. It is used as a screening test for peripheral vascular disease (PVD). The sonographer wraps a blood pressure cuff around each ankle and measures the blood pressure in both legs. The Doppler Pressure Study takes about 20 minutes. Sometimes an exercise Doppler Pressure Study will be done as well. This gives us information about blood flow to your legs when you’re walking, running or cycling."
] | [
"<urn:uuid:cc1b204a-c5ee-4121-bb18-69204aba13f6>"
] | [
"CC-MAIN-2020-10"
] | [
"https://svh.co.nz/services/ultrasound/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146714.29/warc/CC-MAIN-20200227125512-20200227155512-00325.warc.gz"
] | [
"en"
] | [
0.9095193147659302
] | [
389
] | [
2.890625
] | [
3
] |
[
"From French développer from Middle French desveloper, from Old French desveloper, from des- + voloper, veloper, vloper (“to wrap, wrap up”) (compare Italian -viluppare, Old Italian alternate form goluppare (“to wrap”)) from Vulgar Latin base *vlopp-, wlopp- \"to wrap\" ult. from Proto-Germanic *wrappan-, *wlappan- (“to wrap, roll up, turn, wind”), from Proto-Indo-European *werb- (“to turn, bend”) . Akin to Middle English wlappen (“to wrap, fold”) (Modern English lap \"to wrap, involve, fold\"), Middle English wrappen (“to wrap”), Middle Dutch lappen (“to wrap up, embrace”), Danish dialectal vravle (“to wind, twist”), Middle Low German wrempen (“to wrinkle, scrunch, distort”), Old English wearp (“warp”). The word acquired its modern meaning from the 17th century belief that an egg contains the animal in miniature and matures by growing larger and shedding its envelopes.\ndevelop (third-person singular simple present develops, present participle developing, simple past and past participle developed or developt)\n- (intransitive) To change with a specific direction, progress.\n- Let's see how things develop and then make our decision.\n- (intransitive) To progress through a sequence of stages.\n- Isabel developed from a tropical depression to a tropical storm to a hurricane.\n- An embryo develops into a fetus and then into an infant.\n- (transitive) To create.\n- I need to develop a plan for the next three weeks.\n- (transitive) To bring out images latent in photographic film.\n- Please develop this roll of film.\n- (transitive) To acquire something usually over a period of time\n- I have been in England enough to develop a British accent.\n- You will develop calluses if you play the cello\n- She developed bad eating habits\n- (chess, transitive) To place one's pieces actively.\n- I need to develop my white-square bishop.\n- (snooker, pool) To cause a ball to become more open and available to be played on later. Usually by moving it away from the cushion, or by opening a pack.\n- Objects: plan, software, program, product, story, idea.\nto progress through stages\nto bring out photographic images\n(chess) to place one's pieces actively\n- The translations below need to be checked and inserted above into the appropriate translation tables, removing any numbers. Numbers do not necessarily match those in definitions. See instructions at Help:How to check translations.\nTranslations to be checked"
] | [
"<urn:uuid:b6b20c64-21c2-4b42-a013-2c1613e37923>"
] | [
"CC-MAIN-2013-20"
] | [
"http://en.m.wiktionary.org/wiki/develop"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00035-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.8477072715759277
] | [
629
] | [
3.34375
] | [
3
] |
[
"St. Lawrence Action Plan 2011 to 2026\nThe St. Lawrence Action Plan 2011 to 2026 is the latest Canada-Quebec Agreement on the St. Lawrence and builds on the four previous agreements implemented since 1988.\nThe agreement aims to conserve and enhance the St. Lawrence. It is based on strong collaboration and the pooling of resources and expertise between the governments of Canada and Quebec. As part of their respective responsibilities for the management of the St. Lawrence basin, these two governments recognize the need for close cooperation to tackle the environmental challenges facing this important ecosystem. Other partners are also joining in this initiative, including local organizations, environmental groups, research centres, and universities.\nThe St. Lawrence Action Plan 2011 to 2026 has identified three priority issues that are the foundation of the partners’ joint actions:\n- Biodiversity conservation\n- Improved water quality\n- Sustainable use\nIn addition, two programs will provide decision support on the St. Lawrence:\n- The State of the St. Lawrence Monitoring Program, launched in 2003\n- The Numerical Environmental Prediction Program for the St. Lawrence (new)\nThe St. Lawrence Action Plan 2011-2026 is also seeking to implement an integrated-management approach for the St. Lawrence by coordinating the efforts of decision-makers, users and civil society. To this end, Regional Round Tables will allow participants to plan and harmonize measures designed to protect this important ecosystem within the framework of sustainable development. An annual forum brings together representatives from all stakeholders having an interest in or a responsibility toward the management of the resources of the St. Lawrence. This forum provides a platform to discuss the major issues facing the ecosystem and to advance the development of joint action plans.\nThe Community Interaction funding program supports community projects focused on regional environmental issues and the improvement of the St. Lawrence ecosystem.\nScientific Information on the St. Lawrence River\n- Date modified:"
] | [
"<urn:uuid:53a32676-af35-46a4-915f-02f79c83559d>"
] | [
"CC-MAIN-2017-26"
] | [
"http://ec.gc.ca/nature/default.asp?lang=En&n=A642EE65-1"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00011.warc.gz"
] | [
"en"
] | [
0.8979336619377136
] | [
387
] | [
2.703125
] | [
3
] |
[
"I adore poetry. Not only do I write poems and have been fortunate enough to have several published, but I also read this brief but powerful form of literature extensively. And I’m willing to bet that many word nerds read (and maybe write) poetry as well. In fact, fellow DIY MFA columnist Brenda Patterson often covers poetry in her Writing Small column, like in her introductory post and this more recent deep dive into poetry.\nSo it only makes sense that we give poetry its time in the spotlight here at Theme: A Story’s Soul. Because, like with novels and short stories, poems are teeming with literary themes. And since single poems can be analyzed in as much depth as entire books of poetry, that’s how we’ll approach this post: first by determining the themes in an individual poem, and then in a book of poetry.\nBefore we do that, though, let’s establish how we can identify themes in the poetry we read.\nFour Questions for Identifying Themes in Poetry\nAs we defined here, a theme is an answer to the question, “What is this story—or any piece of writing—really about?” When we read a poem, sometimes its themes will be clear from the first read-through. Other times we have to ruminate on the piece before we find those themes, or study it in a deeper, analytical way like we might have in school.\nAs we read a poem, here are some questions we can ask to determine the poem’s themes:\n- What are the explicit themes? In other words, what themes or topics do you see in the poem on the first read-through?\n- What is the poem’s overall tone? What thoughts or emotions does the poet convey? What images are used? How do these reveal the poet’s feelings toward the subject matter?\n- What is the poem’s overall mood? How does the poem make you, the reader, feel? What effect does the poem’s tone, setting, and word choice have on you?\n- What are the implicit themes? Now that you’ve considered the poem’s tone and mood, what other, less obvious themes have you discovered?\nWhy should we consider a poem’s tone and mood here? Because emotions themselves can be literary themes. Happiness, sadness, anger, fear—these and other reactions are not only feelings that characters or readers can experience during a piece of literature, but also part of the piece’s overall thematic web.\nWith poetry in particular, every word must be carefully chosen for its literal meaning and emotional weight. Those words and the phrases, images, and atmosphere they create give additional clues about themes we might not notice if we rely only on subject matter. It’s almost like how, in novels and other longer forms of literature, a conversation between characters contains multiple layers (topics, details, and opinions) that need to be considered when using dialogue to identify themes. So by considering tone and mood to find a poem’s themes, we’re taking all of the poem’s elements and layers into account and digging to the heart of the message that the poet is conveying.\nIdentifying Themes in an Individual Poem\nLet’s practice identifying themes in poetry using Mary Oliver’s “The Summer Day.” You can read the poem in its entirety here, but we’ll use excerpts as we answer each question.\nWhat Are the Explicit Themes?\n- Man and the Natural World: Oliver does more than name animal species or list outdoor activities. She describes a grasshopper’s movements in surprising detail (“… who is moving her jaws back and forth instead of up and down – / who is gazing around with her enormous and complicated eyes…”) as well as her own relaxed, almost worshipful motions of strolling through the fields and kneeling in the grass. From this perspective, the poem is about the small or everyday wonders of the natural world and the contentment that the narrator/poet finds in them.\n- Spirituality: The reverence expressed in “The Summer Day” isn’t limited to the narrator’s kneeling. Oliver introduces this theme halfway through the poem with the line “I don’t know exactly what a prayer is,” then goes on to detail actions that, to her, are a way of showing adoration or thanksgiving to something she believes is sacred.\nWhat Is the Poem’s Overall Tone?\nThe tone could be described as inspired or amazed. Oliver depicts the grasshopper’s motions so clearly and reverently that it seems as if she’s watching another living creature eat for the first time. Her word choices such as “gazing around,” “blessed,” and “enormous and complicated,” as well as the other images her words present and the questions she asks, also evoke her sense of curiosity, deep respect, and compassion for the natural world and for herself.\nWhat Is the Poem’s Overall Mood?\nWhen I read “The Summer Day,” the poem makes me feel alert and alive. Its tone and detailed imagery create a vicarious experience of sorts. I can imagine being in the field with the narrator, walking through the grass in the same manner and observing the grasshopper and everything else around me with heightened awareness and delight. In addition, the questions that begin and end the poem compel me to pause and think about how I want to live my life. So I would describe this poem’s mood as uplifting, thoughtful, and meditative.\nHow would you describe the mood of “The Summer Day”? What do you feel as you read the poem?\nWhat Are the Implicit Themes?\n- Wonder & Amazement: These words aren’t mentioned in “The Summer Day,” but this emotion is absolutely part of the poem’s thematic makeup. Oliver’s wide-eyed observations demonstrate an openness to the wonders of the world and an appreciation for things great and small. The latter also emerges in the poem’s opening and closing questions. We may have ideas about how the world was created, but do we really know “Who made the world”? It’s an awe-inspiring thing to think about.\n- Life & Existence: “The Summer Day” is a celebration of life in verse. The narrator’s observations of the grasshopper and mentions of her day’s activities are full of movement, so they’re not just examples of things that are alive but also embodiments of the state of being alive. The existential questions that bookend the poem also address life from a philosophical perspective, beckoning the reader to think about the creation of the world and the quality of her own life.\nIdentifying Themes in a Book of Poetry\nWith chapbooks and longer collections of poetry, you can take two routes for determining their overarching themes. You can answer the Four Questions listed above for multiple poems in the book, which can help you hone your poetry analysis skills. But if you’d rather do it more casually, you can read the book from cover to cover and take note of which topics, concepts, and emotions recur throughout.\nThis emphasis on repetition brings us back to our working definition of “literary theme.” Any given theme doesn’t have to appear in every poem in a poetry book. But it should recur often enough that you, the reader, notice its importance and sense the weight or emotive quality of that theme as you continue. And if that theme is delivered with the right amount of subtlety and eloquence, it can make your experience with the poet’s work all the more powerful and unforgettable.\nHere are some examples of themes I noticed in poetry books I’ve recently read:\n- Billy Collins’ Nine Horses is grounded in a wide range of everyday activities and events. Sketching, writing and reading poetry, listening to (and pretending to play) music, traveling to foreign countries, rescuing a sparrow from the housecat on Christmas Day—you’d have to read all of the poems to fully grasp the breadth of Collins’ subject matter. And once you do, you’ll find themes such as imagination, the power of literature, the natural world, and gratitude woven throughout.\n- Jenny Xie’s Eye Level, on the surface, appears to be a collection of poems about travel experiences and Xie’s childhood as a Chinese immigrant in the United States. But her word choices and introspective, pensive tone cue you in on Xie’s feelings of restlessness and lack of belonging. Thus, the themes in Eye Level include exploration, isolation, self-discovery, and identity.\n- Natasha Trethewey’s Native Guard is organized into three seemingly distinct sections. The first one features elegies to her mother, the second confronts the Deep South’s long history of racism, and the final third focuses on Trethewey’s own experiences as a biracial child growing up in Mississippi. Thus, the central themes of each section overlap so that, as a whole, Native Guard is as much about race, mortality, and loss as it is about identity, family, and the significance of the past and one’s memories.\nLooking for more DIY MFA posts about poetry? Check out Gabriela’s DIY MFA Radio podcast interviews with Marilyn Singer, David L. Harrison, and Kallie Falandays, as well as this post on Gabriela’s “not-so-epic” journey into poetry.\nWhat are some of your favorite poems or poetry books? Can you identify their themes, either from memory or upon re-reading them? Do you have particular themes you enjoy reading about most in poetry? If so, what are they?\nSara Letourneau is a freelance editor and writing coach based in Massachusetts. She’s currently taking clients with manuscripts in speculative fiction, literary fiction, or YA, though she’s open to other genres as well. She’s also a poet whose work has appeared in Amethyst Review, Canary, Muddy River Poetry Review,Soul-Lit, and elsewhere. A Massachusetts resident, she can often be found performing her poems at local open mic nights, reading good books, and enjoying a cup of tea. Learn more about how Sara can help you with your writing at Heart of the Story Editorial & Coaching Services. You can also connect with her at her writer website, Twitter, Goodreads, or Instagram."
] | [
"<urn:uuid:6f0d2fa9-edcf-427d-97ba-ed37af8f3102>"
] | [
"CC-MAIN-2020-05"
] | [
"https://diymfa.com/reading/identifying-themes-poetry"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251688806.91/warc/CC-MAIN-20200126104828-20200126134828-00358.warc.gz"
] | [
"en"
] | [
0.9573319554328918
] | [
2255
] | [
3.171875
] | [
3
] |
[
"This medical video focuses on the medical advancements in Lou Gehrig's syndrome.\nRead the full transcript »\nJennifer Matthews: Lonnie and Susan Larson know, life can change in an instant. Theirs did when Susan was diagnosed with a fatal disease known as ALS three years ago. Each day, her health got a little worse. Lonnie Larson: We just go for little walks. You're kind of walking with a walker, a push walker, and then a strolling walker, and then you have a wheelchair around for awhile. Jennifer Matthews: Susan can no longer walk, talk or swallow. Lonnie Larson: I do the makeup, do the hair, dress, bathe. Jennifer Matthews: ALS or Lou Gehrig's, attacks the body's nerves and muscles. Patients lose their ability to breathe and need a mechanical ventilator to survive. But that can be risky. Raymond Onders: Just being on that ventilator changes your life expectancy because of the risk of pneumonia. Jennifer Matthews: Susan was the first ALS patient in the country to undergo the same procedure that doctor Onders performed on Christopher Reeve. With special instruments, two electrodes are placed on each diaphragm. An electronic device stimulates the muscles and nerves, allowing muscles to contract and air to enter the lungs. Raymond Onders: What we're trying to do is help the patients with one of the major issues that they face, how to breathe, how to breathe with their own muscle. Jennifer Matthews: The device has done more than that. Susan's lung capacity has actually improved. She hopes to make it to her son's wedding next year. Lonnie Larson: She's a real fighter and giving her best to try to make, make something positive out of this situation we're in. Jennifer Matthews: Doctors say the device has already extended Susan's life by nine months. Precious time for a woman who has so much to live for. This is Jennifer Matthews reporting."
] | [
"<urn:uuid:32ef02fa-e741-494a-ad53-d97eb7ca66b4>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.healthline.com/hlvideo-5min/breakthrough-for-lou-gehrigs-175530772"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701370254/warc/CC-MAIN-20130516104930-00009-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9455844163894653
] | [
403
] | [
2.578125
] | [
3
] |
[
"Redroot pigweed (Amaranthus retroflexus), also known as pigweed amaranth, is a common summer annual herb. This plant is native to the tropical Americas, but it has been introduced to also every continent in the world. In the US, this plant is mainly used as livestock fodder, especially for hogs and pigs, hence its name. Other than that, this plant also grows in many farm fields and gardens. Due to its prolific growth and hardiness, some people regard this plant as a pesky weed.\nThis plain-looking plant may be a livestock fodder. But, that doesn’t mean that humans can’t enjoy it as well. In fact, this plant is considered a valuable vegetable in many parts of the world. For example, Native Americans, Mexicans, and Indians are known to include pigweed leaves in their traditional dishes. Moreover, this plant is well-known for being a great survival food due to its delicious flavor and its nutritional content.\nEdibility and culinary use\nEvery part of the plant is edible, but the leaves are the most popular part. Pigweed leaves are eaten as vegetables in many parts of the world and they can be eaten raw or cooked. Harvest and eat only the young pigweed leaves. This is because as they get older, the leaves become bitter and tough. These leaves have a mild and neutral flavor that’s reminiscent of spinach. Due to their light flavor, pigweed leaves are often combined with herbs, spices, and other stronger-flavored leaves. Alternatively, you can also boil fresh or dried pigweed leaves to make an herbal tea.\nAs mentioned earlier, every part of this plant is edible, including its seeds. These seeds may be small, but they really pack a punch. The seeds have a pleasant nutty flavor that becomes even more delicious when they’re roasted. You can grind roasted pigweed seeds and use the powder as a thickener or a cereal substitute. You can also use the powder when making bread. Or you can also sprout the seeds and add them to salads.\nPigweed leaves and seeds aren’t only delicious, but they’re also nutritious. They’re rich in vitamins A and C as well as other important minerals, such as iron, manganese, calcium, zinc, copper, and magnesium. Adding pigweed into your daily diet can improve your health and immunity immensely.\nConsuming pigweed can help alleviate fever, headache, nausea, stomachache, and other digestive disorders. Moreover, pigweed leaves have astringent properties. For that reason, tea made from these leaves can help treat sore throat, heavy menstrual bleeding, diarrhea, internal bleeding, and internal ulcers. You can also use the tea topically to treat cuts, rashes, scrapes, and insect bites.\nAfter knowing all of its culinary and medicinal benefits, you might want to grow some redroot pigweed plants in your own garden. You’re in luck! This plant is very easy to cultivate and maintain. This plant can thrive in almost any condition; it can withstand hot weather and droughts. Moreover, you can also find pigweed seeds readily available online.\nSow the seeds directly in spring after the last frost. Try to choose a spot with moist but well-drained soil. Germination should happen within a week. Try to water the plants regularly until they’re well established. After that, the plant can basically maintain itself.\nThis plant also self-sows. It can even regenerate itself from seeds that have gone through the winter. Simply let the plant be and you will have a bunch of pigweed plants in no time. Harvest the leaves and seeds regularly to control the plants’ growth. Also, make sure to tile the roots every year to prevent the plants from taking over your entire garden.\nThere are no known hazards from eating pigweed. However, you need to source itundated properly. Avoid pigweeds that are grown on nitrogen-rich soils or soils that contain chemical fertilizers. This plant concentrate nitrates in its leaves. Consuming nitrates in large amounts may lead to digestive tract disorders, stomach cancer, and cardiovascular problems.\nRedroot pigweed garners mixed feelings in the botanical field. While some people see it as a mere agricultural weed, some view this plant as a valuable food source. Which category do you fall in? After learning about the culinary and medicinal benefits of pigweed, hopefully, you’ll give this wonderful wild edible a try.\nWriten by Cornelia Tjandra\nCornelia is a freelance writer with a passion for bringing words to life and sharing useful information with the world. Her educational background in natural science and social issues has given her a broad base to approach various topics with ease. Learn more about her writing services on Upwork.com or contact her directly by email at [email protected]\nMany of our readers find that subscribing to Eat The Planet is the best way to make sure they don't miss any of our valuable information about wild edibles."
] | [
"<urn:uuid:2f9f98eb-d88a-4175-a46f-387b4fc36ded>"
] | [
"CC-MAIN-2020-05"
] | [
"http://eattheplanet.org/redroot-pigweed-a-humble-and-underrated-wild-edible/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251737572.61/warc/CC-MAIN-20200127235617-20200128025617-00179.warc.gz"
] | [
"en"
] | [
0.9603169560432434
] | [
1051
] | [
2.9375
] | [
3
] |
[
"Alternative medicines are becoming around the world. Largely because they are cheap, available, side effect free and also when hope on conventional medicine is lost, this is the only medicine is left.\nAll those medicines that do not fit in the scientific definition of modern medicine is an alternative medicine. A scientific or western medicine is that medicine which has proved to have effect on the disease or the condition of the body and has been scientifically proven. In United States the area of scientific medicine is further expanded to include any medicine that is not been given approval by the Food and Drug Administration department, which is the watchdog over the drugs sold in United States. These medicines are also approved by the American medical Association.\nIn other countries, alternative medicine is judged by different rules and regulations. In united states even vitamins come under the category of alternative medicine. This inefficiencies in judging between the alternative and real medicines is attributed to the politics of medicine. Vitamins are said to have the same effect on the body like a placebo does, even after the hundreds of thousands of papers written proving their effectiveness as healers and as a part of vital body functions. Herbal medicine is too known as alternative medicine.\nAlthough herbal medicine is illegal in United States, it is still sold and told to be more effective than other forms of medicine. There have been no formal studies done to prove the ineffectiveness of these medicines because the mature can not afford to pay the fees meant for the clinical trails. Unless a company further develops these medicines and adds a few zero next to the cost, it has no chance of moving from alternative to western medicine. One also had to be careful while consuming medicines, since not all are advantageous."
] | [
"<urn:uuid:ed33ffb8-1db0-49f0-8e3f-45946496de9d>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.wc2000.org/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703532372/warc/CC-MAIN-20130516112532-00023-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9684357047080994
] | [
341
] | [
3.109375
] | [
3
] |
[
"Raifa Bogoroditsky Monastery, Russia\nAccording to Behealthybytomorrow.com, the main cultural attraction of the Volga-Kama Reserve is the male Raifa Bogoroditsky Monastery, which stands on the shores of Raifa Lake. The monastery was founded in 1613 by Filaret, a monk of the Kazan Spaso-Preobrazhensky Monastery. Gradually, other monks began to arrive here, and in the middle of the 17th century several cells united into deserts. The first building appeared here in 1662. It was a wooden church, consecrated in the name of Saint Euthymius of Novgorod. A wall with two gates and gate churches was erected around the buildings of the monastery – in the name of the Origin of the Honest Trees of the Life-Giving Cross of the Lord and in honor of the Reverend Fathers in Sinai and Raifa beaten. By the name of the second church got its name and deserts. In 1689, a major fire destroyed all the buildings of the monastery, after which they began to re-erect in stone. This period includes the temple in the name of the Most Holy Theotokos of Georgia, the temple of the Holy Fathers in Sinai and Raifa beaten, the church of St. Nicholas the Wonderworker, the rector’s chambers, monastic cells and a refectory. The monastery was surrounded by strong walls with five towers. By 1739 there were 15 stone churches in the monastery. Almost all of them, along with other buildings of the monastery, were rebuilt due to dilapidation at the end of the 19th century. In 1928 the monastery was closed. The monastery was revived only in 1991. Now the Main Cathedral of the monastery is the Cathedral of the Georgian Icon of the Mother of God of 1842. It contains a copy of the Georgian icon of the Mother of God of the Montenegrin monastery, which was found in the desert at the end of the 17th century. This icon is revered in the Orthodox world, so many pilgrims come to the desert every year to bow to her. For this, the monastery works hotel. In addition to the cathedral, on the territory of the monastery you can see the monastery walls with three towers, the gate church of the Archangel Michael, the bell tower, the fraternal buildings with the church of Faith, Hope, Love and their mother Sophia and the Church of the Holy Fathers in Sinai and Raifa beaten, the refectory and the latest building of the monastery – richly decorated Trinity Cathedral of 1910.\nThe main archaeological area of the Republic of Tatarstan, revealing the ancient history and culture of the region, is the city of Bolgar. It is located 140 km south of Kazan on the left bank of the Kuibyshev reservoir. Settlements on the site of the modern city existed in the Stone Age. Starting from the 8th century, the capital of the Volga Bulgaria was located here. However, the first annalistic references to the capital date back to 922. Around the same time, the Volga Bulgars converted to Islam and began to unite. By the end of the 10th century, Bolgar was a major trading center that connected the states of East and West. In the period from the end of the 10th to the beginning of the 13th centuries, the capital of the Volga Bulgaria was not in Bolgar, but in neighboring Bilyar. Bolgar again became the capital after the devastation of Bilyar by the Tatar-Mongols. In 1236, the Bolgars were captured and burned by the troops of Batu, in 1361 – by the troops of one of the khans of the Golden Horde, and in 1431 – by the troops of Moscow Prince Vasily II. Since the 15th century, Bolgar became part of the Russian state.\nIn 1722, Peter I visited the legendary place and issued a decree on the protection of its monuments (this was the first decree of this kind in Russia). In 1781, just north of the ruins of the ancient city of Bolgar, the village of Chertykovo was founded, later it was given the status of a city, which became known as Spassk. In the period from 1926 to 1935 the city was called Spassk-Tatarsky, and from 1935 to 1991 – Kuibyshev. In 1991 the city received the historical name Bolgar. The territory of the Bolgar settlement in 1969 it was declared a historical and architectural museum-reserve. It is located south of the city of Bolgar and covers an area of 550 hectares, where architectural monuments of the 13th-14th centuries have been preserved. Local chambers, mausoleums and minarets are revered Islamic shrines and almost the only monuments of the Golden Horde times.\nIn June, pilgrims from all over the country and neighboring countries arrive in Bolgar, at this time the anniversary of the adoption of Islam by the Tatars is celebrated. Around the settlement, you can see the remains of a rampart and a moat with a total length of 5630 meters. In the center of the settlement are the remains of the Cathedral Mosque, which was built in the second half of the 13th century after the invasion of Batu. Fragments of walls and combat towers of a semicircular shape have been preserved from it. In the 90s of the 20th century, the Great Minaret of the Cathedral Mosque, 32 meters high, was reconstructed. The ancient minaret of the 13th century was destroyed in 1841. Inside it is a spiral staircase. Tradition says that if you climb to the very top of the minaret, then as many sins will be forgiven as there are steps in the stairs. Near the mosque is the Northern Mausoleum – a symbol of the entire Bulgarian settlement. This small building with a spherical dome made of large stones was erected in the 14th century. Inside the mausoleum are collected tombstones from the cemeteries of Tatarstan. Several plates have preserved inscriptions made in Turkic runic writing, which allows them to be attributed to the beginning of the 9th century. Also of interest is the Eastern Mausoleum of the 14th century, which has six sides and is topped with a pointed tent resembling a helmet. Not far from the Cathedral Mosque rises the Assumption Church of the 18th century, made in the Russian Baroque style. It is believed that it was erected on the site of the Khan’s Palace. There are plates with ancient inscriptions in the wall of the church, and inside there is an archaeological museum, where archaeological finds from Bolgar are exhibited. A little south of the Assumption Church is the Black Chamber. It is a cuboid structure with a semicircular dome and reliefs on the blackened walls. Presumably, the khan’s court was once located here. In the 18th century, a smokehouse was located in the Black Chamber, which is why the walls were covered with ashes and turned black, hence its name. Also, the remains of the foundation of the White Chamber of the 14th century, which housed a public bath, have survived to this day. An ancient cemetery has been preserved on the territory of the museum-reserve. The complex of its buildings includes the Small Minaret of the second half of the 14th century, 12 meters high, built in the image of the Big Minaret, and the Khan’s Tomb. Inside the Small Minaret there is also a spiral staircase with high steps. The Khan’s tomb is made in the form of a domed mausoleum. Other archaeological sites of the Bolgar settlement include the Armenian settlement with the Greek church, the Southern town, the well of Gabdrakhman and the Suvar settlement. In the summer from Kazan to Bolgar along the Volga go tourist boats and meteors.\nAbout 100 km east of Bolgar is the village of Bilyarsk, on the site of which in ancient times the site of ancient settlement Bilyar was located, where in the 10th century the capital of Volga Bulgaria was moved from Bolgar. Bilyar was the main city of the state for almost three centuries until it was completely destroyed by the Tatar-Mongols. At one time it was one of the largest cities in Eastern Europe. The remains of the Bilyar settlement have survived to this day. The complex of Bilyar ruins covers an area of 620 hectares. Around it, earthen fortifications in the form of ramparts and ditches with a length of 11 km are visible. Inside the fortifications, the remains of the palace mosque and the ruins of more than 30 buildings have been preserved. The Bilyar settlement is part of Bilyar State Historical-Archaeological and Natural Museum-Reserve. The museum was established in 1992. On its territory with an area of 2378 hectares, in addition to the ancient settlement, there is the “Holy Key” tract with a pagan sanctuary of the 9th-10th centuries, the ancient settlement of the 13th-16th centuries on Balynguz Mountain with the remains of defensive fortifications, the Bolshe-Tigansky burial ground, which remained from the ancient Hungarian tribes of the 7th-9th centuries, and house-museum of chemist E.A. Arbuzov."
] | [
"<urn:uuid:70128113-e1c2-4311-ab69-677a51e1b1aa>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.citypopulationreview.com/raifa-bogoroditsky-monastery-russia/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00369.warc.gz"
] | [
"en"
] | [
0.9721606969833374
] | [
1957
] | [
2.6875
] | [
3
] |
[
"How do cells form tissues? How do tissues form organisms? Cell and developmental biologists at the Max Planck Institute of Molecular Cell Biology and Genetics in Dresden devote their research to discovering how cell division and cell differentiation work, which structures can be found in cell organelles and how cells exchange information and materials. Physical processes play an important role here; processes which, for instance, influence the movement of molecular motors, such as actin and myosin. Model organisms like the fruit fly, zebrafish, roundworm or mouse help the 25 research groups to find answers to the very basic questions of life. Often, this research includes investigating diseases like diabetes, cancer, Alzheimer's Disease or retinal degeneration.\nIn addition, there is the possibility of individual doctoral research. Please contact the directors or research group leaders at the Institute."
] | [
"<urn:uuid:e0dfd928-d498-48fb-ae34-75f44fd749ff>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.mpg.de/151339/mole_zellbiologie_genetik?section=eb-evb-g"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00479.warc.gz"
] | [
"en"
] | [
0.9178170561790466
] | [
168
] | [
3.4375
] | [
3
] |
[
"Gifted and Talented Education (GATE)\nThe Gifted and Talented Education (GATE) Program provides academic and individual stimulation for our community's more able learners. Children who have demonstrated outstanding intellectual ability, high achievement, leadership skills and other areas of mental acuity are candidates for GATE. Goals of the GATE Program include the acquisition of advanced subject matter, the mastery of skills including problem solving, creative thinking and logic and the development of ethical standards and social responsibility along with the skills to interact well with others.\nAll third grade students are tested for GATE. Standardized test scores are also screened by the psychologist. Older students may be tested by parent request or following a referral by the teacher. The student's personality characteristics and potential ability to successfully work in a GATE environment are taken into consideration."
] | [
"<urn:uuid:b4bcf4d1-4689-4226-86af-12703ab813ed>"
] | [
"CC-MAIN-2020-10"
] | [
"https://www.nsd.us/Domain/103"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145767.72/warc/CC-MAIN-20200223093317-20200223123317-00292.warc.gz"
] | [
"en"
] | [
0.9624034762382507
] | [
166
] | [
2.84375
] | [
3
] |
[
"Yoga is a part of the TLC daily curriculum. Yoga has been found to be an effective practice for children with Autism.\na) Reduces stress and anxiety in children’s bodies\nb) Increases balance and strength.\nc) Helps children think abstractly and metaphorically, raising thinking to a more broad and conceptual level. (Example: a child might think that trees must be brown with green leaves, but after learning tree pose they may then understand that they can “become a tree” through tree pose.)\nd) Provides a safe and peaceful space (the yoga mat).\ne) Teaches listening skills. When a child does yoga, he is in one spot, but is yet directed to move so the attention is focused upon how to do the yoga pose. The child listens to instructions regarding how he is supposed to move to achieve the pose.\nf) Provides an opportunity to practice compliance skills, as the child listens and then complies with the teachers’ instructions.\ng) Provides an opportunity to practice a group activity within a safe, unshared, and private (the mat) space.\nh) Teaches effective, self-coping mechanisms. The deep breathing practiced in yoga helps calm the yogi-child and can generalize as a method of self-calming when he finds himself in tense situations outside of doing yoga.\ni) Helps a child face challenges. The yogi-child learns perseverance in the face of defeat. His body will likely not bend easily into a yoga pose perfectly but will after practice.\nThe TLC yoga teacher is a certified Yoga teacher or will be a student/colleague of the TLC yoga teacher and thus trained by her to conduct the class.\nStandard, appropriate sized yoga mats are provided for the children.\nSoft, peaceful music is played through-out the practice"
] | [
"<urn:uuid:ed3ee9aa-653e-4497-8b1b-658f06d30d67>"
] | [
"CC-MAIN-2013-20"
] | [
"http://tlcaba.org/index.php?option=com_content&view=article&id=51&Itemid=49"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707440258/warc/CC-MAIN-20130516123040-00049-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9560664296150208
] | [
384
] | [
3.203125
] | [
3
] |
[
"Entire endangered species program gets less money than the cost of a single F-14\nBy Summit Voice\nSUMMIT COUNTY— These are tough times for the federal budget, with all sorts of competing demands for scarce funds, but endangered species will suffer disproportionately under President Barack Obama’s proposed budget. Obama has proposed a $1.5 million cap on what the U.S. Fish and Wildlife Service can spend on responding to citizen listing petitions. By comparison, a single F-14 fighter jet costs $38 million.\nSince the Endangered Species Act was passed in 1973, 24 at least 24 species have gone extinct while awaiting protection, and this proposed budget could push a few more plants and animals into oblivion.\nOverall, the budget would boost funding for the Fish and Wildlife Service slightly, to about $1.3 billion, with $22 million for the endangered species program, about the same as last year.\n“Instead of asking for enough money to protect endangered plants and animals, the administration is again asking Congress to limit the amount it can spend,” said Noah Greenwald, endangered species director with the Center for Biological Diversity. “This will ensure that hundreds of species that need Endangered Species Act protection will be left in the waiting room rather than receiving the emergency care they need.”\nUnder President Obama’s proposal, the total requested budget for the “listing program,” which is charged with identifying species as threatened or endangered under the Endangered Species Act, is capped at $22,431,000. Within this amount, the administration is requesting limits on the amount that can be spent on designation of critical habitat ($7.4 million), listing species in response to petitions ($1.5 million), and listing foreign species ($1.5 million).\nLast year, the Center for Biological Diversity reached a settlement agreement with the Fish and Wildlife Service that moves protection forward for hundreds of species, including roughly 250 species that have been stuck on a candidate list for an average of 20 years and will receive final decisions on their protection over the next five years. Decisions on protections for many other endangered species outside of the agreement will also need to be made in the coming years.\nThe Center, for example, petitioned to protect 404 species dependent on the beleaguered rivers of the southeastern United States. In accordance with the agreement, the Fish and Wildlife Service issued an initial decision on the petition last year, finding that 374 of the species may warrant protection, but with the administration’s proposed cap on spending, these species are unlikely to receive final protection decisions in the next several years."
] | [
"<urn:uuid:3d7259a9-8063-4797-bc81-fbcb78bd406b>"
] | [
"CC-MAIN-2013-48"
] | [
"http://summitcountyvoice.com/2012/02/19/endangered-species-short-shrifted-in-federal-budget/?like=1&_wpnonce=8181a116d3"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163879441/warc/CC-MAIN-20131204133119-00070-ip-10-33-133-15.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9358670711517334
] | [
535
] | [
2.5625
] | [
3
] |
[
"The History of the Wunderkammer\nReflecting the Renaissance passion for exploration, German intellectuals and taste-makers paid cabinetmakers to custom-build Wunderkammer (rooms of marvels) and Kunstkammer (rooms of art), and similar structures were popular throughout Europe.\nTravelers, scientists, and Renaissance men carefully collected objects representing the vast complexity of creation, showcasing their own encyclopedic knowledge of the world through their ownership of naturalia (natural oddities), artefacta (ancient objects), and scientifica (man-made instruments). Theowner of a Wunderkammer used his collection to assert dominance over the natural and human world, showcasing his intellect, experience and taste through the variety and complexity of his collection. Skeletons, insects, fossils, and bird’s nests were collected alongside works of art, scientific instruments, and ancient texts and artifacts. As the practice became popular, the emerging middle-class clamored for their own, smaller collections, and soon ready-made small cabinets of curiosities, often with secret compartments, pre-filled with curiosities, were available for purchase. Collections of this sort remained popular in the Baroque and Victorian periods."
] | [
"<urn:uuid:5bdb3343-1c5e-4b6c-81c6-c434837aa12a>"
] | [
"CC-MAIN-2017-26"
] | [
"http://johnthompsondesigner.blogspot.com/2010/11/disambiguation.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00593.warc.gz"
] | [
"en"
] | [
0.9518954157829285
] | [
254
] | [
3.71875
] | [
4
] |
[
"Purchase this article with an account.\nLaura Germine, Joshua Hartshorne, Jeremy Wilmer, Christopher Chabris, Garga Chatterjee, Ken Nakayama; Heterogeneity in cognitive maturation and aging: Why there is no such thing as an adult control. Journal of Vision 2013;13(9):285. doi: https://doi.org/10.1167/13.9.285.\nDownload citation file:\n© ARVO (1962-2015); The Authors (2016-present)\nResearch on cognitive change typically focuses on early development or aging, and thus we have little knowledge of cognitive changes that might occur in adulthood. Taking advantage of large Web-based samples, we previously showed that both face learning ability and approximate number sense peak relatively late in adulthood (after age 30), whereas recognition memory for inverted faces and memory for names peak much earlier (Germine et al., 2011; Halberda et al., 2012). Here, we expand on these findings by examining cognitive change over the lifespan across a wide range of cognitive abilities. First, we present results from a systematic analysis of published data from the Wechsler Adult Intelligence Scales and Wechsler Memory Scales showing that there is wide variation in the ages of peak performance on standardized IQ and memory tests. Second, we present findings from year-by-year analysis of large web samples on tests of processing speed, verbal and visual recognition memory, verbal and visual working memory, complex emotion perception, and crystallized verbal intelligence (sample sizes ranging from 3,000 to 10,000 for each test). Again, we find substantial heterogeneity in the peaks of different cognitive functions across the age range. While some cognitive abilities peak very early, declining after age 20 (e.g. processing speed), other cognitive abilities do not peak until around age 40 (e.g. complex emotion perception). Our findings also add to the growing list of cognitive functions that peak around age 30, including verbal and visual domains of working memory. Our data support the notion that changes in cognitive function over the lifespan are impacted by age-related change in multiple, dissociable factors. Finally, our data suggest that there is no age at which an adult has reached peak for all major cognitive functions.\nMeeting abstract presented at VSS 2013\nThis PDF is available to Subscribers Only"
] | [
"<urn:uuid:b70e1548-8bdc-41a6-8903-a1864a41392a>"
] | [
"CC-MAIN-2020-10"
] | [
"https://jov.arvojournals.org/article.aspx?articleid=2142392&resultClick=1"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145960.92/warc/CC-MAIN-20200224132646-20200224162646-00213.warc.gz"
] | [
"en"
] | [
0.905683159828186
] | [
481
] | [
2.53125
] | [
3
] |
[
"Machetes are unusual in that this blade can be used as a weapon and a shovel. Pinpointing its exact origin is difficult. What we do know is that the machete is a cutting and chopping tool used in agricultural and rural areas all over the world. The machete is popular in subtropical counties for its capacity to cut through rain forest undergrowth and its value as a farming implement (cutting sugarcane for instance). Splitting rock-hard coconuts, removing small branches and plants, clearing bushes are other jobs that the machete can do efficiently – the blade embodies versatility.\nIt has made quite a name historically and culturally as well. In 1762, when the British invaded Havana, the Cuban guerrillas used machetes in the defense of the city. A hundred years later, the machete was an iconic symbol in Cuba’s revolt against the Spanish government. In West Africa, the machete is still a popular sidearm for many ethnic groups. In movies, Jason Voorhees popularized it during the 1980s with the Friday the 13th series.\nThe Latin machete or the bush machete is the one immediately brought to mind when you hear the word “machete.” It has a plain look, straight back blade, is evenly weighted and stout. This effective utility tool is great for cutting vegetation.\nThe Kukri, a Nepalese knife with the inwardly curved edge, is among the most popular. Though not a machete per se, it is quite similar. The kukri is the standard weapon of the Nepalese Army, the Royal Gurkha Rifles, and all Gurkha regiments around the world. The blade’s three parts have distinct usage – the tip is useful in combat (for stabling), the broader midsection helps to chop, and the narrow area close to the handle is perfect for carving.\nThe Panga, also called tapanga, is a variation of the machete and is found commonly in East and Southern Africa. The backside of the blade is broad and the tool can reach a length of 18 inches. Traditionally, the Panga knife’s weight makes it ideal for chopping and its curvature enables easy slicing.\nThe Bolo closely resembles the Panga but is broader just before the tip which enables greater efficiency in chopping. These blades are popular in Filipino households for clearing vegetation and cutting food. The bolo makes for a terrific harvesting tool and has tremendous chopping power.The Parang is a shorter, stouter version of the Panga and Bolo, and is found in Indonesia and Malaysia. These are among the thickest machetes and perfect for cutting thick foliage without the fear of the blade getting stuck in the vegetation. Then there is the Golok machete, similar to the Parang in looks and usage, which originated in Southeast Asia.We suggest that you buy these blades from authentic, reliable stores. If you want to buy machetes online, Atlanta Cutlery has just the perfect collection for you."
] | [
"<urn:uuid:55391181-c507-40f6-a0cc-4618383c7c80>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.atlantacutlery.com/machetes-versatile-efficient-tools"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690379.95/warc/CC-MAIN-20200126195918-20200126225918-00256.warc.gz"
] | [
"en"
] | [
0.9481828808784485
] | [
640
] | [
3.078125
] | [
3
] |
[
"The rewards of being a Firefighter are extensive. The work is exciting and challenging. Below is a summary of key components of the job.\nSummary of Duties\n- Responsible for all fire suppression duties necessary to save life and property. Combat, extinguish and/or prevent fires by rapidly and efficiently performing varied duties as required under emergency conditions (frequently involving considerable hazard).\n- Provide emergency medical response and aid; perform rescue/extrication operations where necessary to prevent loss of life or further injury from any cause.\n- Provide service assistance with respect to, but not restricted to the following: police, paramedics and public.\n- Responsible for station maintenance and upkeep of firefighting equipment and fire department property.\n- Responsible for upgrading and maintaining skills/knowledge and physical requirements to current standards.\n- Perform duties in fire prevention, public education and communications as assigned.\n- Responds to all emergency calls immediately, as directed.\n- Drives and/or operates any vehicle or equipment as assigned.\n- Performs a variety of rescue related duties to protect the public and lessen severity of injuries.\n- Lays and connects hose; holds nozzles and directs high pressure water streams, raises; climbs and works from ladders, and uses or operates all equipment associated with the control and extinguishment of fire or other incidents.\n- Wears self-contained breathing apparatus and full protective clothing while working in noxious and/or smoke filled environments.\n- Ventilates buildings or areas to release heat, smoke, or fumes.\n- Places salvage covers so as to protect property and prevent water damage.\n- Performs overhaul operations in order to ensure that the fire has been completely extinguished.\n- Drives, checks safety of immediate area, brings required medical equipment.\n- Assesses situation/victim by taking medical history, visual and vital signs.\n- Conducts appropriate intervention, including CPR, other first-aid as required.\n- Assists paramedics - conveys information, lifts and carries heavy patients, etc.\n- Manages crowd/by-standers/victim's relatives, etc.\n- Performs a variety of rescue related duties to protect the public and lessen severity of injuries related to motor vehicle collisions, confined space entrapment, water hazards, industrial accidents, incidents involving hazardous materials, etc.\n- Assesses and performs extrication of the victim's in motor vehicle collisions.\n- Performs various maintenance duties to fire services apparatus, equipment and department property.\n- Participates in departmental training programs to be proficient, knowledgeable and up to date with respect to equipment and procedures for fire fighting, medical and other emergencies.\n- Participates in public relations projects involving visits, demonstrations, parades, etc., as directed.\n- Assists with on the job training of other firefighter.\n- Performs inspections and assessments related to fire prevention duties.\n- Performs other duties as assigned.\nTo be a successful firefighter you must possess\n- Motivation to serve\n- Effective communication skills (written and verbal)\n- Physical, mental, emotional health\n- Ability to exercise sound judgment\n- Strong sense of responsibility\n- Ability to work as team member\n- Honesty and integrity\n- Problem-solving skills\n- Strong work ethic\n- Physically fit and able to perform sustained and intense physical effort\n- Ability to work at heights and in confined spaces"
] | [
"<urn:uuid:8266acf0-7c98-48fb-9354-b5c93006822b>"
] | [
"CC-MAIN-2017-26"
] | [
"http://ottawa.ca/en/residents/emergency-services/ottawa-fire-services/firefighter-recruitment"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00174.warc.gz"
] | [
"en"
] | [
0.9220118522644043
] | [
702
] | [
2.96875
] | [
3
] |
[
"posted by lala .\nTwo cars of equal mass are traveling as shown in the figure below just before undergoing a collision. Before the collision, one of the cars has a speed of 19 m/s along +x, and the other has a speed of 31 m/s along +y. The cars lock bumpers and then slide away together after the collision. What are the magnitude and direction of their final velocity?"
] | [
"<urn:uuid:f693c393-d7d7-4f9a-b141-b9a4b5d69e9b>"
] | [
"CC-MAIN-2017-30"
] | [
"https://www.jiskha.com/display.cgi?id=1298586781"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423839.97/warc/CC-MAIN-20170722002507-20170722022507-00484.warc.gz"
] | [
"en"
] | [
0.9652089476585388
] | [
85
] | [
3.515625
] | [
4
] |
[
"Filed under: Quillblog\nThe Supreme Court of Canada today released several key decisions that effectively expand the definition of “fair dealing” under copyright law.\nWhile four of the five rulings deal specifically with digital music and video games, the court also ruled against Access Copyright in an appeal pertaining to the use of copyrighted material in Canadian classrooms.\nAt issue is a photocopying tariff that applies to short excerpts from textbooks used by students in kindergarten to Grade 12. In a decision dating back several years, the Copyright Board determined that such uses do not constitute fair dealing and are therefore subject to a royalty.\nWhile the Supreme Court has not overturned the royalty, it has remitted the matter to the Copyright Board for reconsideration. In its decision, the court stated that the Copyright Board’s approach in levying the royalty drives “an artificial wedge” between research and private study – which are allowed under fair dealing – and a teacher’s role as a facilitator in learning.\nFrom the Supreme Court decision, written by Justice Rosalie Abella:\nTeachers have no ulterior motive when providing copies to students. Nor can teachers be characterized as having the completely separate purpose of “instruction”; they are there to facilitate the students’ research and private study. It seems to me to be axiomatic that most students lack the expertise to find or request the materials required for their own research and private study, and rely on the guidance of their teachers. They study what they are told to study, and the teacher’s purpose in providing copies is to enable the students to have the material they need for the purpose of studying…. Instruction and research/private study are, in the school context, tautological.\nCopyright activist Michael Geist interprets the Supreme Court’s expanded definition of fair dealing as a “victory for education, Internet users, and innovative companies.” With respect to the photocopying tariff in particular, he writes:\nThe Access Copyright case has enormous implications for education and copyright in Canada. With the court’s strong endorsement of fair dealing in the classroom, it completely eviscerates much of Access Copyright’s business model and calls into question the value of the model licence signed by many Canadian universities.\nFor his part, novelist John Degen calls the decision “another astonishingly short-sighted blow to Canadian writing and publishing,” one that “has free culture activists dancing in their well-appointed academic offices.”\nHe adds that, ironically, the decision creates more confusion, not less, about what can be legally copied for classroom use: “Without question, anyone claiming to be in the role of a teacher will now be under the impression that almost any amount of copying done for that role is allowable under the law.”"
] | [
"<urn:uuid:75aef69e-0f60-4e48-9565-cac61c6b257b>"
] | [
"CC-MAIN-2013-20"
] | [
"http://www.quillandquire.com/blog/index.php/2012/07/12/supreme-court-rules-against-access-copyright-photocopying-tariff/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701314683/warc/CC-MAIN-20130516104834-00052-ip-10-60-113-184.ec2.internal.warc.gz"
] | [
"en"
] | [
0.9502611756324768
] | [
584
] | [
2.609375
] | [
3
] |
[
"Annotation 8 - Sixth Amendment\n''The primary object of the constitutional provision in question was to prevent depositions of ex parte affidavits . . . being used against the prisoner in lieu of a personal examination and cross- examination of the witness in which the accused has an opportunity not only of testing the recollection and sifting the conscience of the witness, but of compelling him to stand face to face with the jury in order that they may look at him, and judge by his demeanor upon the stand and the manner in which he gives his testimony whether he is worthy of belief'' 145 The right of confrontation is ''[o]ne of the fundamental guarantees of life and liberty . . . long deemed so essential for the due protection of life and liberty that it is guarded against legislative and judicial action by provisions in the Constitution of the United States and in the constitutions of most if not of all the States composing the Union.'' 146 Before 1965, when the Court held the right to be protected against state abridgment, 147 it had little need to clarify the relationship between the right of confrontation and the hearsay rule, 148 inasmuch as its supervisory powers over the inferior federal courts permitted it to control the admission of hearsay on this basis. 149 Thus, on the basis of the Confrontation Clause, it had concluded that evidence given at a preliminary hearing could not be used at the trial if the absence of the witness was attributable to the negligence of the prosecution, 150 but that if a witness' absence had been procured by the defendant, testimony given at a previous trial on a different indictment could be used at the subsequent trial. 151 It had also recognized the admissibility of dying declarations 152 and of testimony given at a former trial by a witness since deceased. 153 The prosecution was not permitted to use a judgment of conviction against other defendants on charges of theft in order to prove that the property found in the possession of defendant now on trial was stolen. 154\nIn a series of decisions beginning in 1965, the Court seemed to equate the Confrontation Clause with the hearsay rule, positing that a major purpose of the clause was ''to give the defendant charged with crime an opportunity to cross-examine the witnesses against him,'' unless one of the hearsay exceptions applies. 155 Thus, in Pointer v. Texas, 156 the complaining witness had testified at a preliminary hearing at which he was not cross-examined and the defendant was not represented by counsel; by the time of trial, the witness had moved to another State and the prosecutor made no effort to obtain his return. Offering the preliminary hearing testimony violated defendant's right of confrontation. In Douglas v. Alabama, 157 the prosecution called as a witness the defendant's alleged accomplice, and when the accomplice refused to testify, pleading his privilege against self-incrimination, the prosecutor read to him to ''refresh'' his memory a confession in which he implicated defendant. Because defendant could not cross-examine the accomplice with regard to the truth of the confession, the Court held the Confrontation Clause had been violated. In Bruton v. United States, 158 the use at a joint trial of a confession made by one of the defendants was held to violate the confrontation rights of the other defendant who was implicated by it because he could not cross-examine the codefendant not taking the stand. 159 The Court continues to view as ''presumptively unreliable accomplices' confessions that incriminate defendants.'' 160\nMore recently, however, the Court has moved away from these cases. ''While . . . hearsay rules and the Confrontation Clause are generally designed to protect similar values it is quite a different thing to suggest that the overlap is complete and that the Confrontation Clause is nothing more or less than a codification of the rules of hearsay and their exceptions as they existed historically at common law. Our decisions have never established such a congruence; indeed, we have more than once found a violation of confrontation values even though the statements in issue were admitted under an arguably recognized hearsay exception . . . . The converse is equally true: merely because evidence is admitted in violation of a long-established hearsay rule does not lead to the automatic conclusion that confrontation rights have been denied.'' 161\nFurther, the Court in California v. Green 162 upheld the use at trial as substantive evidence of two prior statements made by a witness who at the trial claimed that he had been under the influence of LSD at the time of the occurrence of the events in question and that he could therefore neither deny nor affirm the truth of his prior statements. One of the earlier statements was sworn testimony given at a preliminary hearing at which the defendant was represented by counsel with the opportunity to cross-examine the witness; that statement was admissible because it had been subjected to cross-examination earlier, the Court held, and that was all that was required. The other statement had been made to policemen during custodial interrogation, had not been under oath, and, of course, had not been subject to cross-examination, but the Court deemed it admissible because the witness had been present at the trial and could have been cross-examined then. ''[T]he Confrontation Clause does not require excluding from evidence the prior statements of a witness who concedes making the statements, and who may be asked to defend or otherwise explain the inconsistency between his prior and his present version of the events in question, thus opening himself to full cross-examination at trial as to both stories.'' 163 But in Dutton v. Evans, 164 the Court upheld the use as substantive evidence at trial of a statement made by a witness whom the prosecution could have produced but did not. Presentation of a statement by a witness who is under oath, in the presence of the jury, and subject to cross-examination by the defendant is only one way of complying with the Confrontation Clause, four Justices concluded. Thus, at least in the absence of prosecutorial misconduct or negligence and where the evidence is not ''crucial'' or ''devastating,'' the Confrontation Clause is satisfied if the circumstances of presentation of out-of-court statements are such that ''the trier of fact [has] a satisfactory basis for evaluating the truth of the [hearsay] statement,'' and this is to be ascertained in each case by focusing on the reliability of the proffered hearsay statement, that is, by an inquiry into the likelihood that cross-examination of the declarant at trial could successfully call into question the declaration's apparent meaning or the declarant's sincerity, perception, or memory. 165\nIn Ohio v. Roberts, 166 the Court explained that it had construed the clause ''in two separate ways to restrict the range of admissible hearsay.'' First, there is a rule of ''necessity,'' under which in the usual case ''the prosecution must either produce, or demonstrate the unavailability of, the declarant whose statement it wishes to use against the defendant.'' Second, ''once a witness is shown to be unavailable . . . , the Clause countenances only hearsay marked with such trustworthiness that 'there is no material departure from the reason of the general rule.''' 167 That is, if the hearsay declarant is not present for cross-examination at trial, the ''statement is admissible only if it bears adequate 'indicia of reliability.' Reliability can be inferred without more in a case where the evidence falls within a firmly rooted hearsay exception. In other cases, the evidence must be excluded, at least absent a showing of particularized guarantees of trustworthiness.'' 168\nRoberts was narrowed in United States v. Inadi, 169 holding that the rule of ''necessity'' is confined to use of testimony from a prior judicial proceeding, and is inapplicable to co-conspirators' out- of-court statements. The latter--at least those ''made while the conspiracy is in progress''--have ''independent evidentiary significance of [their] own''; hence in-court testimony is not a necessary or valid substitute. 170 Similarly, evidence embraced within such firmly rooted exceptions to the hearsay rule as those for spontaneous declarations and statements made for medical treatment'' is not barred from trial by the Confrontation Clause. 171 Particularized guarantees of trustworthiness inherent in the circumstances under which a statement is made must be shown for admission of other hearsay evidence not covered by a ''firmly rooted exception;'' evidence tending to corroborate the truthfulness of a statement may not be relied upon as a bootstrap. 172\nContrasting approaches to the Confrontation Clause were taken by the Court in two cases involving state efforts to protect child sex crime victims from trauma while testifying. In Coy v. Iowa, 173 the Court held that the right of confrontation is violated by a procedure, authorized by statute, placing a one-way screen between complaining child witnesses and the defendant, thereby sparing the witnesses from viewing the defendant. This conclusion was reached even though the witnesses could be viewed by the defendant's counsel and by the judge and jury, even though the right of cross-examination was in no way limited, and even though the state asserted a strong interest in protecting child sex-abuse victims from further trauma. 174 The Court's opinion by Justice Scalia declared that a defendant's right during his trial to face-to-face confrontation with his accusers derives from ''the irreducible literal meaning of the clause,'' and traces ''to the beginnings of Western legal culture.'' 175 Squarely rejecting the Wigmore view ''that the only essential interest preserved by the right was cross-examination, 176 the Court emphasized the importance of face- to-face confrontation in eliciting truthful testimony.\nCoy's interpretation of the Clause, though not its result, was rejected in Maryland v. Craig. 177 In Craig the Court upheld Maryland's use of one-way, closed circuit television to protect a child witness in a sex crime from viewing the defendant. As in Coy, procedural protections other than confrontation were afforded: the child witness must testify under oath, is subject to cross examination, and is viewed by the judge, jury, and defendant. The critical factual difference between the two cases was that Maryland required a case-specific finding that the child witness would be traumatized by presence of the defendant, while the Iowa procedures struck down in Coy rested on a statutory presumption of trauma. But the difference in approach is explained by the fact that Justice O'Connor's views, expressed in a concurring opinion in Coy, became the opinion of the Court in Craig. 178 Beginning with the propo sition that the Confrontation Clause does not, as evidenced by hearsay exceptions, grant an absolute right to face-to-face confrontation, the Court in Craig described the Clause as ''reflect[ing] a preference for face-to-face confrontation.'' 179 This preference can be overcome ''only where denial of such confrontation is necessary to further an important public policy and only where the reliability of the testimony is otherwise assured.'' 180 Relying on the traditional and ''transcendent'' state interest in protecting the welfare of children, on the significant number of state laws designed to protect child witnesses, and on ''the growing body of academic literature documenting the psychological trauma suffered by child abuse victims,'' 181 the Court found a state interest sufficiently important to outweigh a defendant's right to face-to-face confrontation. Reliability of the testimony was assured by the ''rigorous adversarial testing [that] preserves the essence of effective confrontation.'' 182 All of this, of course, would have led to a different result in Coy as well, but Coy was distinguished with the caveat that ''[t]he requisite finding of necessity must of course be a case-specific one;'' Maryland's required finding that a child witness would suffer ''serious emotional distress'' if not protected was clearly adequate for this purpose. 183\nIn another case involving child sex crime victims, the Court held that there is no right of face-to-face confrontation at an in- chambers hearing to determine the competency of a child victim to testify, since the defendant's attorney participated in the hearing, and since the procedures allowed ''full and effective'' opportunity to cross-examine the witness at trial and request reconsideration of the competency ruling. 184 And there is no absolute right to confront witnesses with relevant evidence impeaching those witnesses; failure to comply with a rape shield law's notice requirement can validly preclude introduction of evidence relating to a witness's prior sexual history. 185\n[Footnote 146] Kirby v. United States, 174 U.S. 47, 55 , 56 (1899). Cf. Pointer v. Texas, 380 U.S. 400, 404 -05 (1965). The right may be waived but it must be a knowing, intelligent waiver uncoerced from defendant. Brookhart v. Janis, 384 U.S. 1 (1966).\n[Footnote 148] Hearsay is the prior out-of-court statements of a person, offered affirmatively for the truth of the matters asserted, presented at trial either orally by another person or in written form. Hickory v. United States, 151 U.S. 303, 309 (1894); Southern Ry. v. Gray, 241 U.S. 333, 337 (1916); Bridges v. Wixon, 326 U.S. 135 (1945).\n[Footnote 149] Thus, while it had concluded that the co-conspirator exception to the hearsay rule was consistent with the Confrontation Clause, Delaney v. United States, 263 U.S. 586, 590 (1924), the Court's formulation of the exception and its limitations was pursuant to its supervisory powers. Lutwak v. United States, 344 U.S. 604 (1953); Krulewitch v. United States, 336 U.S. 440 (1949).\n[Footnote 154] Kirby v. United States, 174 U.S. 47 (1899), and Dowdell v. United States, 221 U.S. 325 (1911), recognized the inapplicability of the clause to the admission of documentary evidence to establish collateral facts, admissible under the common law, to permit certification as an additional record to the appellate court of the events of the trial.\n[Footnote 155] Pointer v. Texas, 380 U.S. 400, 406 -07 (1965); Douglas v. Alabama, 380 U.S. 415, 418 (1965). ''The right to confrontation is basically a trial right. It includes both the opportunity to cross- examine and the occasion for the jury to weigh the demeanor of the witness.'' Barber v. Page, 390 U.S. 719, 725 (1968). Unjustified limitation of defendant's right to cross-examine witnesses presented against him at trial may constitute a confrontation clause violation. Smith v. Illinois, 390 U.S. 129 (1968), or a denial of due process, Alford v. United States, 282 U.S. 687 (1931); and In re Oliver, 333 U.S. 257 (1948).\n[Footnote 156] 380 U.S. 400 (1965). Justices Harlan and Stewart concurred on due process grounds, rejecting the ''incorporation'' holding. Id. at 408, 409. See also Barber v. Page, 390 U.S. 719 (1968), in which the Court refused to permit the State to use the preliminary hearing testimony of a witness in a federal prison in another State at the time of trial. The Court acknowledged the hearsay exception permitting the use of such evidence when a witness was unavailable but refused to find him ''unavailable'' when the State had made no effort to procure him; Mancusi v. Stubbs, 408 U.S. 204 (1972), in which the Court permitted the State to assume the unavailability of a witness because he now resided in Sweden and to use the transcript of the witness' testimony at a former trial.\n[Footnote 157] 380 U.S. 415 (1965). See also Smith v. Illinois, 390 U.S. 129 (1968) (informer as prosecution witness permitted to identify himself by alias and to conceal his true name and address; Confrontation Clause violated because defense could not effectively cross-examine); Davis v. Alaska, 415 U.S. 308 (1974) (state law prohibiting disclosure of identity of juvenile offenders could not be applied to preclude cross-examination of witness about his juvenile record when object was to allege possible bias on part of witness). Cf. Chambers v. Mississippi, 410 U.S. 284 (1973); United States v. Nobles, 422 U.S. 233, 240 -41 (1975).\n[Footnote 158] 391 U.S. 123 (1968). The Court in this case equated confrontation with the hearsay rule, first emphasizing ''that the hearsay statement inculpating petitioner was clearly inadmissible against him under traditional rules of evidence'', id. at 128 n.3, and then observing that ''[t]he reason for excluding this evidence as an evidentiary matter also requires its exclusion as a constitutional matter.'' Id. at 136 n.12 (emphasis by Court). Bruton was applied retroactively in a state case in Roberts v. Russell, 392 U.S. 293 (1968). Where, however, the codefendant takes the stand in his own defense, denies making the alleged out-of-court statement implicating defendant, and proceeds to testify favorably to the defendant concerning the underlying facts, the defendant has not been denied his right of confrontation under Bruton, Nelson v. O'Neil, 402 U.S. 622 (1971). In two cases, violations of the rule in Bruton have been held to be ''harmless error'' in the light of the overwhelming amount of legally admitted evidence supporting conviction. Harrington v. California, 395 U.S. 250 (1969); Schneble v. Florida, 405 U.S. 427 (1972). Bruton was held inapplicable, however, when the nontestifying codefendant's confession was redacted to omit any reference to the defendant, and was circumstantially incriminating only as the result of other evidence properly introduced. Richardson v. Marsh, 481 U.S. 200 (1987).\n[Footnote 159] In Parker v. Randolph, 442 U.S. 62 (1979), the Court was evenly divided on the question whether interlocking confessions may be admitted without violating the clause. Four Justices held that admission of such confessions is proper, even though neither defendant testifies, if the judge gives the jury a limiting instruction. Four Justices held that a harmless error analysis should be applied, although they then divided over its meaning in this case. The former approach was rejected in favor of the latter in Cruz v. New York, 481 U.S. 186 (1987). The appropriate focus is on reliability, the Court indicated, and ''the defendant's confession may be considered at trial in assessing whether his codefendant's statements are supported by sufficient 'indicia of reliability' to be directly admissible against him (assuming the 'unavailability of the codefendant' despite the lack of opportunity for cross-examination.'' 481 U.S. at 193 -94.\n[Footnote 161] California v. Green, 399 U.S. 149, 155 -56 (1970); Dutton v. Evans, 400 U.S. 74, 80 -86 (1970). Compare id. at 93, 94, 95 (Justice Harlan concurring), with id. at 100, 105 n.7 (Justice Marshall dissenting). See also United States v. Inadi, 475 U.S. 387 (1986).\n[Footnote 163] Id. at 164. Justice Brennan dissented. Id. at 189. See also Nelson v. O'Neil, 402 U.S. 622 (1971). ''The Confrontation Clause includes no guarantee that every witness called by the prosecution will refrain from giving testimony that is marred by forgetfulness, confusion, or evasion. To the contrary, the Confrontation Clause is generally satisfied when the defense is given a full and fair opportunity to probe and expose these infirmities through cross- examination.'' Delaware v. Fensterer, 474 U.S. 15, 21 -22 (1985) (per curiam) (expert witness testified as to conclusion, but could not remember basis for conclusion). See also United States v. Owens, 484 U.S. 554 (1988) (testimony as to previous, out-of-court identification statement is not barred by witness' inability, due to memory loss, to explain the basis for his identification).\n[Footnote 164] 400 U.S. 74 (1970). The statement was made by an alleged co-conspirator of the defendant on trial and was admissible under the co-conspirator exception to the hearsay rule permitting the use of a declaration by one conspirator against all his fellow conspirators. The state rule permitted the use of a statement made during the concealment stage of the conspiracy while the federal rule permitted use of a statement made only in the course of and in furtherance of the conspiracy. Id. at 78, 81-82.\n[Footnote 165] Id. at 86-89. The quoted phrase is at 89, (quoting California v. Green, 399 U.S. 149, 161 (1970)). Justice Harlan concurred to carry the case, on the view that (1) the Confrontation Clause requires only that any testimony actually given at trial must be subject to cross-examination, but (2) in the absence of countervailing circumstances introduction of prior recorded testimony--''trial by affidavit''--would violate the clause. Id. at 93, 95, 97. Justices Marshall, Black, Douglas, and Brennan dissented, id. at 100, arguing for adoption of a rule that: ''The incriminatory extrajudicial statement of an alleged accomplice is so inherently prejudicial that it cannot be introduced unless there is an opportunity to cross-examine the declarant, whether or not his statement falls within a genuine exception to the hearsay rule.'' Id. at 110-11. The Clause protects defendants against use of substantive evidence against them, but does not bar rebuttal of the defendant's own testimony. Tennessee v. Street, 471 U.S. 409 (1985) (use of accomplice's confession not to establish facts as to defendant's participation in the crime, but instead to support officer's rebuttal of defendant's testimony as to circumstances of defendant's confession; presence of officer assured right of cross-examination).\n[Footnote 166] 448 U.S. 56 (1980). The witness was absent from home and her parents testified they did not know where she was or how to get in touch with her. The State's sole effort to locate her was to deliver a series of subpoenas to her parents' home. Over the objection of three dissenters, the Court held this to be an adequate basis to demonstrate her unavailability. Id. at 74-77.\n[Footnote 168] Id. at 66. Applying Roberts, the Court held that the fact that defendant's and codefendant's confessions ''interlocked'' on a number of points was not a sufficient indicium of reliability, since the confessions diverged on the critical issues of the respective roles of the two defendants. Lee v. Illinois, 476 U.S. 530 (1986).\n[Footnote 170] Id. at 394-95.\n[Footnote 171] White v. Illinois, 112 S. Ct. 736, 743 (1992).\n[Footnote 172] Idaho v. Wright, 497 U.S. 805, 822 -23 (1990) (insufficient evidence of trustworthiness of statements made by child sex crime victim to her pediatrician; statements were admitted under a ''residual'' hearsay exception rather than under a firmly rooted exception).\n[Footnote 175] Id. at 1015, 1021 (1988).\n[Footnote 176] Id. at 1018 n.2.\n[Footnote 178] Coy was decided by a 6-2 vote. Justice Scalia's opinion of the Court was joined by Justices Brennan, White, Marshall, Stevens, and O'Connor; Justice O'Connor's separate concurring opinion was joined by Justice White; Justice Blackmun's dissenting opinion was joined by Chief Justice Rehnquist; and Justice Kennedy did not participate. In Craig, a 5-4 decision, Justice O'Connor's opinion of the Court was joined by the two Coy dissenters and by Justices White and Kennedy. Justice Scalia's dissent was joined by Justices Brennan, Marshall, and Stevens.\n[Footnote 180] Id. at 850. Dissenting Justice Scalia objected that face- to-face confrontation ''is not a preference 'reflected' by the Confrontation Clause [but rather] a constitutional right unqualifiedly guaranteed,'' and that the Court ''has applied 'interest-balancing' analysis where the text of the Constitution simply does not permit it.'' Id. at 863, 870.\n[Footnote 181] Id. at 855.\n[Footnote 182] Id. at 857.\n[Footnote 183] Id. at 855."
] | [
"<urn:uuid:c8e0321a-c00e-4e3c-a674-cf8b0a5e11cf>"
] | [
"CC-MAIN-2017-26"
] | [
"http://constitution.findlaw.com/amendment6/annotation08.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320049.84/warc/CC-MAIN-20170623100455-20170623120455-00337.warc.gz"
] | [
"en"
] | [
0.9550623893737793
] | [
5218
] | [
2.578125
] | [
3
] |
[
"FAQ on Climate Change and Environmental Health Competencies\nFAQs written by: Arianne Cohen (University of Toronto), Finola Hackett (University of Alberta)\n1. What do we mean by planetary health?\nBy planetary health we envision a broad definition that includes more than just traditional environmental and occupational health. This idea was first published in a 2015 Lancet article by the Rockefeller Foundation. They define planetary health as “… the achievement of the highest attainable standard of health, wellbeing, and equity worldwide through judicious attention to the human systems—political, economic, and social—that shape the future of humanity and the Earth’s natural systems that define the safe environmental limits within which humanity can flourish. Put simply, planetary health is the health of human civilisation and the state of the natural systems on which it depends.”\nIn brief, planetary health is holistic. It looks beyond meteorological changes to populations, ecosystems, and the resilience of civilization. It demonstrates the importance of health promotion and protection regardless of social or political situations.\nWhitmee S, Haines A, Beyrer C, Boltz F, Capon AG, de Souza Dias BF, Ezeh A, Frumkin H, Gong P, Head P, Horton R. Safeguarding human health in the Anthropocene epoch: report of The Rockefeller Foundation–Lancet Commission on planetary health. The Lancet. 2015 Nov 14;386(10007):1973-2028.\n2. Why should we learn about this if there’s no LMCC objective?\nPlanetary health intersects with medicine in many different and important ways. While not specifically addressed in all medical school curricula, it is important to understand the impacts of environmental issues like climate change for our patients. The health effects of climate change can be both direct (i.e. heat exhaustion, asthma from pollution) and indirect (i.e. PTSD from a natural disaster). It can also be socially mediated (i.e. population displacement from conflict).\nAs future physicians, we need to expect, prevent and manage these changes appropriately. According to the Lancet Commission on Planetary Health, health professionals have an essential role to integrate policies, tackle inequalities and reduce the environmental impacts of health systems while increasing resilience to change. It was also stated in a recent paper that “integrating climate change into medical education offers an opportunity for future doctors to develop skills and insights essential for clinical practice and a public health role in a climate-changing world.” It is therefore important for physicians to be aware of climate and the environment and do our part to provide a safe and sustainable future for all.\nNote: there is an LMCC objective focused on traditional environmental and occupational health concepts: https://mcc.ca/objectives/expert/key/78-6/. However, note that this does not specifically refer to climate change and does not incorporate the holistic definition of planetary health described above.\n3. How can I advocate on climate change & environment in my medical school or community?\nThere are several ways to get more involved in your own communities. The first is by joining the HEART Network. This network comprises members of HEART and interested individuals, clubs and groups from medical schools across Canada. We send out a monthly newsletter with initiatives, updated articles and other relevant resources. We can also connect you with local representatives or other Network members at your school. If you would like to take on a more active role in this network, appointed committee positions for our task force are recruited in the fall of each school year through the CFMS.\nIf you have a great idea that you would like to plan yourself, the CFMS has excellent resources for first-time advocates. You can find our Advocacy Toolkits here: https://www.cfms.org/what-we-do/advocacy/advocacy-toolkit and https://www.cfms.org/what-we-do/global-health/advocacy-toolkit.html\n4. How might planetary health and climate & environment topics actually fit inside a medical school curriculum?\nThere are many ways these topics could fit into a curriculum, and each school’s integration may be unique depending on their existing sessions and teaching structure. For instance, HEART has created a case-based group learning module that will be integrated at the University of Alberta next year. It includes a pre-session survey and preparation that involves watching two short videos, two cases for discussion: one individual patient-based in family medicine setting, and one community-based in a public health consultancy setting, and finishes with a short wrap-up lecture. This is complemented by a separate stand-alone session, a two-hour didactic lecture on the health impacts of climate change.\nOther options include adding a slide or two to existing sessions: such as links between air pollution and health in a lecture on pulmonary diseases, on climate related displacement and migration in a session on refugee and migrant health, on heat related illnesses or extreme disaster events in emergency medicine teaching… the possibilities are endless. Suggested links to existing topics or courses are highlighted in red within the competencies document.\n5. What’s already been done at different schools?\nThere are already some schools that either have already started teaching sessions on this topic, are looking to integrate them within the next year. Other schools have created specific portfolios who host non-mandatory student-run extracurricular sessions. Because the current status is so variable, HEART has conducted a national survey on the current status of each school in 2019, to be made available in the near future. You can continue to help with this, as we plan to re-survey each school in 2020! One curriculum assessment survey per school is to be completed, and you can work with other students and with faculty at your school in order to provide the most comprehensive and accurate responses.\nContact us :\n267 O'Connor Street, Suite 401\nOttawa, ON K2P 1V3\nOffice hours: weekdays 9:00 - 13:00 EST"
] | [
"<urn:uuid:c58c0e46-bc74-4609-99ce-25a064dc480b>"
] | [
"CC-MAIN-2020-10"
] | [
"http://www.cfms.org/what-we-do/global-health/heart-competencies-faq"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145282.57/warc/CC-MAIN-20200220193228-20200220223228-00474.warc.gz"
] | [
"en"
] | [
0.9439783692359924
] | [
1255
] | [
2.6875
] | [
3
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.