text
stringlengths
198
622k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
47
136k
score
float64
2.52
5.09
int_score
int64
3
5
Koi Nutrition, Well-being, First Aid, and Nursing Koi care has many facets, but the two most critical factors are pond water quality and proper nutrition. Koi are inherently hardy and long-lived. As such, they are easy to care for and don't demand much from the koi keeper. Nonetheless, there are some basic but important requirements to adhere to for your koi to remain quality is undoubtedly the most critical aspect of koi care. Koi can go on for weeks without being given food, but they can all perish overnight in poor water. It is therefore necessary for any koi keeper to give serious thought to how water quality will be sustained, and how much he's willing to spend for it, even before the pond is built. koi nutrition is also an important aspect of koi care. Providing your koi with good nutrition will protect them from diseases and ensure that they'll attain maximum size and develop good body conformation. Lastly, koi care involves being able to respond promptly to health problems or accidents. This includes administering the right medication to a sick koi or even applying first aid to one. 'Must Read' Articles for Koi Care: KOI POND FILTRATION BASICS PROVIDING HIGH-QUALITY POND WATER KOI NUTRITION REQUIREMENTS KOI FIRST AID
<urn:uuid:c343c0a5-10d7-48de-8566-10bee423b789>
CC-MAIN-2014-10
http://www.koiandponds.com/care.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394020703260/warc/CC-MAIN-20140305115823-00044-ip-10-183-142-35.ec2.internal.warc.gz
en
0.921443
308
2.546875
3
The BSI has a selection of public engagement activities that you can download from our website or contact us to order. These provide background information on immunology as well as some practical activities for you to run yourself. Please click on the links below and in the right-hand menu bar to find out more. Supercells and Supercells II - Educational cartoon videos describing the roles of different immune cells and how these cause - and dampen down - inflammation. The Secret Life of Snot - Snot, what's it all about? Resources on what snot is, why we make it and what it can tell you about your health...plus a recipe to make your own snot at home! Malaria - A series of resources for schools focusing on the science of malaria. Vaccine and Herd Immunity activities - Ideas for public engagement activities surrounding vaccines and herd immunity. Allergy and Asthma - Our educational resource looking into Asthma. We have a range of ideas for activities surrounding allergy and asthma, and explain what asthma is, the link between allergies and asthma as well as what happens in an asthma attack. Information on immunology Bite-Sized Immunology – Our online guide to the immune system. The content is especially suitable for biomedical undergraduates but should also appeal to advanced schools students and others coming to the field of immunology for the first time. Immunology Infographics - Our collection infographics on a range of immunology topics. Vaccines, autoimmunity, malaria and more! Your Amazing Immune System – This book provides comprehensive information on how the immune system works and is a valuable tool for both school and home education. While the content supports both the GCSE and A-level Biology curriculum, its pictorial nature makes it accessible to children of all ages. To request a copy, please email Glyn Jones. Podcasts & Music - We have a number of podcasts on different topics of immunology and also a collection of immunology inspired songs on our SoundCloud account that are available to download. Videos - In December 2015 we published a series of short videos on different aspects of the immune system including asthma, cancer immunotherapy, immunodeficiency, parasites and more. These videos can be viewed on YouTube or downloaded from Vimeo. Respiratory viruses and immunology: a short interview with BSI President, Professor Peter Openshaw, about his work on how the immune system defends against respiratory viruses. This video was made by the Infectious Diseases Hub.
<urn:uuid:38703859-b5b1-4b32-8ddc-43fe30974470>
CC-MAIN-2019-22
https://www.immunology.org/public-information/immunology-related-activities-and-resources
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232260658.98/warc/CC-MAIN-20190527025527-20190527051527-00037.warc.gz
en
0.930431
518
3.203125
3
Vector intersection - angles¶ You can calculate bearing in the Field Calculator in QGIS using the xat(n) yat(n) funtions. This works in UTM (metric) coordinates over small distances (hundreds of km), but something more sophisticated would be needed for large distances or for decimal degrees. Open the attribute table for your line layer, toggle editing, and click the Field Calculator button to open the dialog: Create a new field as decimal with 1 or 2 precision. Paste this code into the "Expression" box, and click "OK": (atan((xat(-1)-xat(0))/(yat(-1)-yat(0)))) * 180/3.14159 + (180 *(((yat(-1)-yat(0)) < 0) + (((xat(-1)-xat(0)) < 0 AND (yat(-1) - yat(0)) >0)*2))) The first part calculates the inverse tangent of the x and y differences and converts it to degrees (180/pi). The second part adds either 180 or 360 to the resulting figure to give a bearing from 0-360°.
<urn:uuid:6e7dac22-7c3d-4e88-8bef-928cd8a8420b>
CC-MAIN-2015-48
http://hub.qgis.org/wiki/quantum-gis/Vector_intersection_-_angles
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464536.35/warc/CC-MAIN-20151124205424-00215-ip-10-71-132-137.ec2.internal.warc.gz
en
0.730592
252
3.265625
3
The Leviathan gas field is situated near Israel, away from its cost in the Mediterranean Sea. It is located about 29 miles to the southwestern end of Tamar gas field. Existing right in the Levantine Basin, the Leviathan gas field is situated about 81 miles to the west of Haifa in the water. This gas field boasts off an area that is Very rich in hydrocarbons. It could very well be the largest gas finds of the decade. As a result of the year 2017, it was estimated that the Leviathan gas fields could produce enough gas for meeting all the domestic needs of Israel for the next 40 years. It is expected that this field will start operating near the end of the year 2019. In order to further explore the prospects of the area with respect to gas drilling, Delek drilling joined hands with Noble Energy and the two companies cooperated in this entire venture of gas exploration. Back in the year 2010, it was announced that according to what the seismic studies indicate, there is about 50% probability that the Leviathan field is rich in natural gas. It was estimated that the size of the reserve would be around 16 trillion cubic feet. In cubic meters, this would be 450 billion cubic meters. Indeed, this is quite a huge reserve. In the initial exploration, drilling was done about 16,960 feet deep after which the gas was discovered. It was more like a test drill that was done in order to confirm the presence of natural gas. Quite fortunately, natural gas was found in abundance. This was announced around December 30th, 2010. The total drilling costs incurred in this exploration were around $92 million. In the second part of the exploration, the drilling was intended to be about 23,600 feet deep. This was an extra reserve of a natural gas, which was expected to hold roughly 600 million oil barrels. However, reaching the deeper layers could not be possible as a number of technical issues arise in the process. These issues were faced because of the extreme depth of the basin and harsh conditions underneath. Indeed, the Leviathan gas field possesses huge prospects for Israel in terms of natural gas. Considering the depleting reserves of naturally occurring resources all over the globe, the recent discovery of this natural gas reserve could play a big role in improving the economy of Israel. As a result of this, a number of projects have sprung up in the last decade and many more plans are expected to be put forward in the coming few years. It is expected that the plant will start operating in the year 2019, near the end.
<urn:uuid:c57bf4dc-11ab-4622-846b-7a6e8cd9d660>
CC-MAIN-2019-35
http://www.wecaregreen.com/leviathan-gas-field-a-brief-history/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313987.32/warc/CC-MAIN-20190818165510-20190818191510-00216.warc.gz
en
0.978149
515
2.609375
3
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages. Do not use for reproduction, copying, pasting, or reading; exclusively for search engines. OCR for page 12 Space Studies Board Search: Jump to Top NewsJump to Science in the Subscribe to our FREE e- Headlines newsletter! NATIONAL ACADEMY OF SCIENCES NATIONAL ACADEMY OF ENGINEERING INSTITUTE OF MEDICINE NATIONAL RESEARCH COUNCIL June 18, 2004 Current Operating Status International Cooperation for Mars Exploration and Sample Return 3 Intensive Investigations of Mars GENERAL CHARACTERIZATION OF THE PLANET The martian surface has clearly evolved under the influence of a variety of processes of internal, surficial, and external origin. The major processes that shaped the surface of Mars include eruption and emplacement of volcanic deposits, water erosion and sedimentation, impacts, and faulting and other tectonic processes, as well as glacial phenomena. Valles Marineris, a canyon system more than 4000 kilometers long, seems to have been the result of rifting and other tectonic processes as well as major erosion. Extensive layered deposits are visible in the sides of the canyons and in the associated mesas. Some of these deposits may have arisen as sediments in vast lakes that once filled parts of the canyon system. However, other speculations are that some layered deposits resulted from lava flows, explosive volcanic deposits, or wind-laid sediments. Regardless of the origin, these layered deposits and the canyon walls may reveal critical clues about a large part of martian history, in much the same way that the deposits and walls in Arizona's Grand Canyon reveal much about Earth's history. Some regions of Mars are dissected by large and small channels apparently cut through young rock, indicating that liquid water existed on the surface of Mars relatively late in the planet's history. Other, more degraded, channels dissect ancient terrain and appear to have formed earlier in the history of the planet. Altogether, the present indirect clues suggest the likelihood of profound climatic change on Mars, including the possibility that flowing water occurred at least several times throughout the history of the planet. Mars has distinct seasons, with carbon dioxide cycling between the polar caps driving a major component: of the atmospheric circulation. Layered sedimentary deposits near the martian poles provide additional evidence of long-term climatic changes whose origins are poorly understood and that pose some of the most http://www7.nationalacademies.org/ssb/marscoopch3.html (1 of 4) [6/18/2004 10:03:54 AM] OCR for page 12 Space Studies Board fundamental scientific questions motivating intensive Mars investigation. On Earth, such climatic change has given rise to the occasional ice age, a phenomenon also still poorly understood. The Viking mission indicated the absence of even relatively small amounts of organic molecules on Mars. Viking also confirmed the existence of intensely oxidizing conditions at the martian surface. These factors strongly suggest that living organisms are not now present. Whether Mars was less hostile to the development of life during earlier times, when it may have had a denser atmosphere, higher surface temperatures, and liquid water, is still an open question. So far as is known, Earth is the only planet with surface conditions, an atmosphere, and a hydrosphere that have allowed the formation of life as well as its sustenance and evolution over a long period of time. Terrestrial life forms have substantially altered the chemistry of the atmosphere, oceans, and major sedimentary rocks on Earth's surface. Fundamental questions to be addressed through investigations of Mars also include questions about the role' that life plays in the evolution of a planetary surface and environment; these questions are most effectively addressed through detailed investigation of another planet on which life seems to have played a much smaller role than it has on Earth, or no role at all. Other basic questions about Mars include the state and evolution of the planet's interior, the physical processes that have shaped the surface, the fate of the apparently missing water, and the nature of current and past hydrological cycles that link the polar caps, ground water, and atmosphere. THE SCIENTIFIC AND TECHNICAL CHARACTER OF MARS EXPLORATION The scientific objectives of intensive Mars investigation are to understand the planet's gross planetological characteristics, the principal processes that govern its present state, the history of variation in the martian environment, and phenomena that have been responsible for such environmental change. It is also a principal objective to ascertain whether any stages of chemical and biological evolution might have occurred on Mars and to determine whether evidence can be found for the existence of life at any time during the history of the planet. Strategies and approaches for achieving these scientific goals have been analyzed in previous Space Studies Board and NASA reports. 1,5,6,10 In this report the committee briefly summarizes those conclusions in order to define the context of scientific objectives in which its recommendations about cooperation are made. Investigation of the structure and dynamics of the martian interior will require the use of a globally distributed network of sensitive seismometers—at least three—on the surface of the planet, with a substantial period of simultaneous operation extending over the order of 1 year or more. Investigation of the atmospheric circulation and climate will require at least a similar number of widely spaced monitoring stations distributed over the martian globe in latitude and longitude and operating for an overlapping interval lasting at least 1 martian year. http://www7.nationalacademies.org/ssb/marscoopch3.html (2 of 4) [6/18/2004 10:03:54 AM] OCR for page 12 Space Studies Board To obtain the variety of samples needed to answer the principal scientific questions, it will be necessary to obtain planetary material of a variety of ages, including material from the most ancient sites on the heavily cratered terrains, material more recently brought to the planet's surface on the intermediate-aged, resurfaced plains areas, and materials from the youngest identifiable volcanic deposits. Material spanning this range of planetary age will be necessary for tracing the planet's interior and crust. Material capturing stratigraphic records will be recoverable from crater ejecta as well as from material on channel walls. Sedimentary deposit material—including such material from beneath the surface—will be important for exploring questions pertaining to the history and nature of flowing water on Mars, and to possible biochemical and biological aspects of the planet's history. The margins of the polar ice caps, seasonal ice- related deposits, and the ice sheets themselves hold important information about the planet's volatile inventory and about climatic variation on Mars; the polar margins are also essential targets of study for questions about the past and present biological potential of the planet. Identifiable regions of contemporaneous volcanism would be important targets of investigation for studying geochemical and geophysical questions, as well as questions pertaining to the planet's biological potential. Altogether, Mars exhibits a variety of geological terrains and environments that are widely separated and distributed over the planet. The scientific objectives dictate that a variety of sites be investigated for several reasons: investigation of the global questions requires an absolute minimum of three widely separated sites; and the varieties of materials required for scientific analysis are distributed widely over the planet's surface; and the varieties of environments and manifestations of evolutionary history are distributed in many different locations on the planet. The.exact number of missions needed in the next phase of Mars intensive investigation will depend on technical details not yet resolved, including such questions as rover range and maneuverability, accuracy of lander targeting, and feasible modes of deploying scientific instruments. To obtain answers to the major scientific questions and to build an understanding, of Mars at the level needed to address comparative planetological questions will require the exploration of, and sample return from, several diverse sites—in the range of four to six. A program of this nature would also provide the base of information needed to determine the value of possible human exploration of Mars and to assess the technical questions involved in planning for possible future human exploration. Investigations of Mars will play a critical role in achieving a general understanding of the terrestrial planets and their environments. Because of the importance of a Mars program in terms of the quality and significance of the scientific objectives, the prestige and scientific importance associated with the return of the martian materials, and the substantial implications for new technologies such as robotics and artificial intelligence, this committee concurs with previous recommendations of the Space Studies Board and recommends the vigorous scientific exploration of Mars, with investigations on the martian surface and the return of marcian materials from several diverse sites, ranging from equatorial to polar, in order to http://www7.nationalacademies.org/ssb/marscoopch3.html (3 of 4) [6/18/2004 10:03:54 AM] OCR for page 12
<urn:uuid:7657b858-801c-454e-b518-e1c05d17952a>
CC-MAIN-2014-42
http://www.nap.edu/openbook.php?record_id=12327&page=12
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507442497.30/warc/CC-MAIN-20141017005722-00372-ip-10-16-133-185.ec2.internal.warc.gz
en
0.915959
1,860
3.5
4
This course surveys the history of ancient Greece from its occluded origins in the pre-Homeric past to the widespread diffusion of Hellenic culture that accompanied the conquests of Alexander the Great. At the heart of the course will be a careful study of the emergence and development of the Greek city-state in its various incarnations. The course will provide a solid grounding in political history but also will explore aspects of the cultural milieu - for example, religion, sexual mores and the economy - that fostered some of the greatest literary and artistic works produced by Western civilization. We will read from the celebrated Greek historians Herodotus and Thucydides, as well as from a variety of other sources, ranging from the familiar to the recondite. The course will combine lecture and discussion. No prerequisite. Offered every other year.
<urn:uuid:37b3f131-3a50-4019-a228-a2e1b498699c>
CC-MAIN-2015-40
http://www.kenyon.edu/directories/campus-directory/biography/adam-serfass/
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738017788.94/warc/CC-MAIN-20151001222017-00171-ip-10-137-6-227.ec2.internal.warc.gz
en
0.934772
171
3.078125
3
In my previous post I discussed various measures of symmetry of the vertex set of a graph. The main terms introduced were vertex-transitive, vertex-primitive, vertex-quasiprimitive, vertex-biprimitive and vertex-biquasiprimitive. It was also seen that the class of vertex-transitive graphs was very large and so we often place further symmetry conditions on our graphs so that we can obtain interesting results. In this post I wish to discuss conditions on the symmetry of the edge set and arc set . A graph is called edge-transitive if acts transitively on the set of edges of and is called arc-transitive if acts transitively on the set of arcs. As long as there are no isolated vertices (that is vertices with no neighbours) then an arc-transitive graph will also be vertex-transitive and edge-transitive. Such graphs are often called symmetric. I will first discuss how to construct all arc-transitive graphs. Let be a transitive permutation group on a set . The orbits of on are called orbitals. An orbital is called self-paired if for all the element also lies in . This is equivalent to there being an element that interchanges and . For each self-paired orbital we can construct a graph with vertex set and edges for all . The group is an arc-transitive group of automorphisms of . Moreover, all arc-transitive graphs arise in this way.
<urn:uuid:65faba14-a5e6-4d37-932c-2d00afb569e5>
CC-MAIN-2018-39
https://symomega.wordpress.com/tag/half-arc-transitive-graph/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156314.26/warc/CC-MAIN-20180919235858-20180920015858-00112.warc.gz
en
0.959548
309
3.53125
4
When camp is made in a certain locality with no intention of moving it until the party is ready to go home, it usually is called a " permanent camp." This is a misuse of terms; for a camp of any kind is only a temporary biding place. " The camp and not the soil," says Gibbon, " is the native country of the genuine Tartar." When speaking of a camp fixed in one place for a considerable time, I shall call it a fixed camp or stationary camp. It differs from a shifting camp, so far as outfitting is concerned, in permitting the use of heavy and bulky equipment and more of the comforts of home. For fixed camps, situated where there are wagon roads or other adequate ways of transportation, the best cloth shelter is a wall tent, rectangular or square, of strong and rather heavy material. Fig. 1. Wall Tent, with Fly. It is a trade custom to list tents according to an arbitrary scale of ground dimensions, in even feet, although the cloth seldom works out exactly so; for ground dimensions are governed by the number of widths of cloth used and the number of inches to the width, allowing for seams. To slit the cloth lengthwise would destroy its strongest part, the selvage, besides being a waste of material. Moreover, cloth stretches or shrinks in handling. In the following table are given the trade sizesj actual ground dimensions (these may vary), standard heights of wall and center, and weights of un-proofed tents (without flies, poles, or stakes) in sizes commonly used by campers. These sizes apply only to tents made of standard 29-inch duck. If 36-inch stuff, or some other width, is used, proportional allowances must be made. Actual width and length. 9 x 9 ft. gV3 x 9/3 ft. 12 x 14 ft. 11/ x 14/ ft. 14 x 14 ft. 14 x 14 ft. 14 x 16 ft. 14 x i6J4 ft. Weight of poles and stakes varies a good deal, according to size and density of wood. Flies of same length as tent, and same kind of duck, weigh about half as much as the tent itself. As a rule, not more than four persons should occupy one tent. Two in a tent will get along better; for camp life is very intimate in any casb. Weights of tents. Poles and Stakes. 12 X 12 ft. 12 X 14 ft. 12 X 16 ft. 14 x 14 ft. 14 x 16 ft. A group of small tents around a common campfire is quite as sociable as if the party were all bunked together — except when sociability is not wantedv as when some wish to sleep and others want to play cards. Even a camper does not care to reduce his individuality to a least common multiple. Two small tents need not be made of so heavy material as a large one of cubic capacity equal to both of them. They are easier to erect and manage. They are more adaptable to various camp sites. Their short poles are handier to transport (for that matter, jointed ones may be bought, up to a limit of twelve feet total length). And small tents are stancher in a gale than big ones. Roominess is not to be estimated by ground dimensions alone. It depends much upon height of center and walls. If a tent is to be used right on the ground, not elevated over a floor with baseboards, it should be made higher in center and walls than the standard proportions given in the table. This is not expensive: the charge is only five per cent, of the cost of regular tent for each six inches of added height. To my notion the best all-round size of wall tent for two people, if weight and bulk and cost are of any consequence, is the so-called 9x9 or a 9x 12, huilt with 3^4-foot walls, instead of 3-foot, and 8-foot center, instead of 7jA-ioot. For four persons a 12x14 is commonly used; but a 14x14 with 4-foot walls and 9-foot center has double the head-room of the standard 12x14, and 2^/2 feet more space between cots, if these are set lengthwise of the tent, two on a side. Before selecting a tent, consider the number of people to occupy it, and their dunnage, and the furniture. Then draw diagrams of floor and end elevation, of various sizes, fitting in the cots, etc., according to scale; so you can get just what you want — no more, no less. The conventional tent is made of plain cotton duck. A single roof of such material will shed rain, if the stuff is closely woven, but only so long as it is stretched at a proper angle, rather taut, and nothing touches it from the inside. If so much as a finger-tip should be rubbed against the under side of the roof, a leak would spring there, due to capillary action. It is of little use to draw the finger from the drip spot down to the tent wall, for, although this runs the water off for a time, fresh dripping will start on each side of the line. Nor is it possible to avoid slackness in a roof of plain canvas during a wet spell of weather. Cloth that is not water-proofed will shrink a great deal as soon as it gets wet; hence the guy ropes must be let out, and the roof allowed to sag, before the rain comes; otherwise the shrinkage of the canvas will loosen your tent stakes, or even pull them all up together, when down goes your house about your ears! For these reasons, a tent should either be waterproofed, or should have a supplementary roof called a fly. These matters will be considered later. Cotton duck comes in three general grades, known as single filling, double filling, and army duck. Single filling duck is made of coarse yarn, loosely woven, and of an inferior grade of cotton. It is suitable only for cheap tents that are not intended for continuous use, and generally is a bad " bargain " even then. It is weaker than the same weight of the other grades and is poor stuff to shed water. Double filling duck is of closer texture, better fiber, and is equal to all but the hardest service. For average summer Camping it is good enough. Army duck is the best grade made, of selected cotton free from sizing, both warp and filling doubled and twisted, closely woven, and free from imperfections — if it comes up to army standard. It will outwear any other tent material of the same Weight, except flax (which I have not seen used in this country), and sheds water much better than cheaper grades.
<urn:uuid:006d79a6-ca6f-4df9-8e61-4cf3b8bf851b>
CC-MAIN-2020-45
https://bookdome.com/outdoors/Camping-Woodcraft/Chapter-III-Tents-For-Fixed-Camps.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891624.95/warc/CC-MAIN-20201026175019-20201026205019-00425.warc.gz
en
0.943254
1,438
2.734375
3
Fascism is both a historical and political term. Historically, it describes regimes from the first half of the 20th century in Europe that were authoritarian and had a high propensity for violence. Politically, it has been deployed ever since as a battle cry used to lump opponents into the same camp as Benito Mussolini and Adolf Hitler in an effort to discredit and silence them. Many perfectly democratic politicians have been blasted as fascists by the left without the slightest justification. That is not what is happening here. Trump's unscrupulous behavior during the election campaign, his racism and his threat to jail Hillary Clinton (though apparently withdrawn this week) go well beyond what is acceptable in a democracy. No comparisons can be made to George W. Bush or to Ronald Reagan -- Trump is in a category of his own. Unless, of course, what we are seeing is fascism. What Is Fascism? If it is fascism, then it would be a disaster on a global scale. See above. But if it isn't fascism, it would be a defamation of Trump's voters to call it that, akin to accusing them of helping to bring a fascist to power and potentially driving them away from democracy forever. That's why we must exercise great care when using the term. What is fascism and how does it relate to Trump? Or to the right-wing populist Alternative for Germany party, the Freedom Party of Austria, France's Front National or Viktor Orbán in Hungary? In February, fascism expert Robert Paxton told the online magazine Slate that Trump "even looks like Mussolini in the way he sticks his lower jaw out." There are also parallels when it comes to his treatment of women: Mussolini was accused of being addicted to sex (a charge, it must be said, that was never levelled at Hitler). At the political level, though, comparison is difficult because there are so many different ideas about what truly constitutes fascism. Action française, which formed at the end of the 19th century, is considered Europe's first fascist organization. Mussolini's Italy became the first fascist country, followed by Hitler's National Socialist Germany. Hungary, Croatia, Spain and Portugal also developed regimes during the 1930s and 1940s that had fascist elements. But the differences between Nazi Germany and Francisco Franco's Spain were so great that it's difficult to mention them in the same breath. Franco was a dictator, but didn't seek control of his subjects' thoughts and private lives. He wasn't an imperialist and he didn't seek to eradicate Judaism. The Features of 'Ur-Fascism' In the mid-1990s, when fear broke out over the possibility of a new fascism in Russia, novelist and scholar Umberto Eco defined elements of an "Ur-Fascism." The main question he posed at the time was this: Is there a way of defining fascism to make it recognizable during any period of time? Eco had experienced Mussolini's Italy as a boy and wrote about how he won an essay contest in 1942 on the subject "Should we die for the glory of Mussolini and the immortal destiny of Italy?" His answer? Yes, of course we should die. "I was a bright boy," he wrote in the 1995 article, which appeared in the New York Review of Books. Should we die for Trump's glory and the immortal destiny of the United States? If this question is ever asked of American students, then they will, without a doubt, be living under fascism. In order to prevent his own experiences from happening again, Eco developed an early warning system including 14 different features that define Ur-Fascism -- a fascism test, as it were. It can be applied to Trump in terms of what is known about him politically, knowledge that comes primarily from the campaign. "The first feature of Ur-Fascism is the cult of tradition," Eco begins. It has to do with the "primeval truth," the pseudo-religious "syncretistic" elements of a fascist movement. That's not a pronounced characteristic with Trump. He hails from the worlds of real estate development and reality TV, and thus far there haven't been any significant signs of religious or philosophical underpinnings to his movement. So that criterion, at least, does not apply. Feature No. 2 is the "rejection of modernism," of capitalism, but also of Enlightenment and the Age of Reason -- the "Spirit of 1789," Eco wrote, in reference to the French Revolution. Trump is himself a capitalist, but politically he has shown a strong tendency towards the irrational and intemperate. No determination is yet possible on this point. 'Distrust of the Intellectual World' Clearly applicable is feature three, which includes a "distrust of the intellectual world." In Trump's world, most intellectuals are considered to be part of the hated "Establishment." Feature four for Eco is an entirely closed worldview that considers any disagreement to be "treason". That kind of worldview to which all must submit is not currently detectable in Trump. In point five, he writes that Ur-Fascism "seeks for consensus by exploiting and exacerbating the natural fear of difference. The first appeal of a fascist or prematurely fascist movement is an appeal against the intruders. Thus Ur-Fascism is racist by definition." Here, it sounds as though Eco could have been writing directly about Trump, AfD or Marine Le Pen. Point six states: "Ur-Fascism derives from individual or social frustration. That was why one of the most typical features of historical fascism was the appeal to a frustrated middle class, a class suffering from an economic crisis or feelings of political humiliation and frightened by the pressure of lower social groups." It would be impossible to more aptly describe Trump's appeal to his voters. Nationalism is the seventh point in Eco's list -- in other words, Trump in his purest form. Point eight: "The followers must feel humiliated by the ostentatious wealth and force of their enemies." As a boy, Eco wrote, he was taught that the English ate five meals a day, "more frequently than the poor but sober Italians." He was also taught that Jews were disagreeably rich. Although Trump is said to be a billionaire, many of his supporters are driven by rage against an establishment they see as having enriched itself. In identifying Ur-Fascism, point nine holds that "there is no struggle for life but, rather, life is lived for struggle." In other words, permanent warfare. That definitely has not been a part of Trump's message. As for point 10, Eco says that Ur-Fascism reflects what he calls a "mass elitism." Those who are members of the movement, the party or the nation look down on everyone else. Surely some of Trump's white supporters disdain African Americans, but the feeling of indignity is still greater than the idea of superiority. "The Ur-Fascist hero is impatient to die," Eco writes in point 11. Furthermore, everyone would be raised in this spirit. That doesn't apply. Criterion number 12: The Ur-Fascist "transfers his will to power to sexual matters." That is true of Trump. Point 13: "Whenever a politician casts doubt on the legitimacy of parliament because it no longer represents the Voice of the People, we can smell Ur-Fascism." That is at the core of right-wing populism. They like to claim that those in power in Washington, Berlin or Paris are out of touch with what "the people" want.
<urn:uuid:efd06d1d-911f-47b7-9087-8f87cbd0f543>
CC-MAIN-2018-17
http://thoughtsandpolitics.blogspot.com/2016/11/how-much-mussolini-is-there-in-donald.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948950.83/warc/CC-MAIN-20180427021556-20180427041556-00176.warc.gz
en
0.977846
1,551
2.796875
3
A team of Virginia Tech researchers has discovered a way to create hydrogen fuel using a biological method that greatly reduces the time and money it takes to produce the zero-emissions fuel. This method uses abundantly available corn stover – the stalks, cobs, and husks – to produce the hydrogen. The team’s new findings, published Monday in the Proceedings of the National Academy of Sciences, could help speed the widespread arrival of the hydrogen-powered vehicles in a way that is inexpensive and has extremely low carbon emissions. “This means we have demonstrated the most important step toward a hydrogen economy – producing distributed and affordable green hydrogen from local biomass resources,” said Percival Zhang, a professor in the Department of Biological Systems Engineering, which is in both the College of Agriculture and Life Sciences and the College of Engineering. The team already has received significant funding for the next step of the project, which is to scale up production to a demonstration size. “Although it is difficult to predict cost at this point, this work represents a revolutionary approach that offers many new advantages,” said Lonnie O. Ingram, director of the Florida Center for Renewable Chemicals and Fuels at the University of Florida, who is familiar with the work but not associated with the team. “These researchers have certainly broadened the scope of our thinking about metabolism and how it plays into the future of alternative energy production.” Joe Rollin, a former doctoral student of Zhang’s at Virginia Tech and co-founder with Zhang of the start-up company Cell-free Bioinnovations, is the lead author on the paper. This work builds upon previous studies Zhang’s team has done with xylose, the most abundant simple plant pentose sugar, to produce hydrogen yields that previously were attainable only in theory. Their new discovery is unique in two ways. Unlike other hydrogen fuel production methods that rely on highly processed sugars, the Virginia Tech team used dirty biomass—the husks and stalks of corn plants—to create their fuel. This not only reduces the initial expense of creating the fuel, it enables the use of a fuel source readily available near the processing plants, making the creation of the fuel a local enterprise. Rollin used a genetic algorithm along with a series of complex mathematical expressions to analyze each step of the enzymatic process that breaks down corn stover into hydrogen and carbon dioxide. He also confirmed the ability of this system to use both sugars glucose and xylose at the same time, which increases the rate at which the hydrogen is released. Typically in biological conversions, these two sugars can only be used sequentially, not simultaneously, which adds time and money to the process. One of the biggest hurdles to widespread hydrogen use is the capital cost required to produce the fuel from natural gas in large facilities. Distribution of the hydrogen to users of fuel cell vehicles is another key challenge. Rollin’s model increased reaction rates by threefold, decreasing the required facility size to about the size of a gas station, which reduces associated capital costs. The dominant current method for producing hydrogen uses natural gas, which is expensive to distribute and causes fossil carbon emissions. To produce distributed hydrogen at affordable costs, product yield, reaction rate, and product separation must be addressed. In terms of product yield, the use of cell-free artificial enzymatic pathway not only breaks the natural limit of hydrogen-producing microorganisms by three times but also avoids complicated sugar flux regulation. The team also increased enzymatic generation rates. This reaction rate is fast enough for hydrogen production in distributed hydrogen-fueling stations. The achieved reaction rate is at least 10 times that of the fastest photo-hydrogen production system.
<urn:uuid:2cb46b6c-e2c4-40f3-b0a8-cc59ba7df1b1>
CC-MAIN-2019-04
http://www.innovationtoronto.com/2015/04/new-discovery-may-be-breakthrough-for-hydrogen-cars/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00556.warc.gz
en
0.946661
767
3.59375
4
A Brief Summary of Ålands Framtid A brief summary of what has led to the foundation of Ålands Framtid - a political party in the Åland Islands - and of the most important questions on the agenda of this party. In an English translation the name of the party is The Future of Åland. The goal of Ålands Framtid Ålands Framtid wants Åland to become a sovereign, neutral and demilitarized microstate in the ever growing and more and more respected European family of microstates. From time immemorial the mother tongue and the culture of the people in the Åland Islands have been Swedish. Among its first commercial and cultural relations were those with Sweden. In the early Middle Ages Åland was part of Sweden where it constituted a county (län) of its own. Later it came to be part of the county of Åbo in Finland. In the peace treaty of 1809 Sweden had to yield Finland and Åland to Russia. In 1917 Finland proclaimed itself independent. Then the population of Åland arranged a referendum in Åland as to where Åland wanted to belong. The result of this referendum was that an overwhelming majority of the Ålanders wanted to belong to Sweden, the country that they regarded as their mother country. Neither Finland nor Sweden wanted to give up Åland and thus the question was submitted to the League of Nations where it was decided that Åland come under Finnish sovereignty. But at the same time it was stipulated by the League of Nations and 10 signatory powers, to which Finland, Sweden, England and Russia belonged, that Åland was to become an autonomous province with guarantees for the people of Åland to develop their autonomy as far as possible without becoming a sovereign state. Inbuilt in the autonomy were also paragraphs that protect the Swedish language, culture, customs and way of living. During these more than 80 years of autonomy it has become clear that Finland neither can nor indeed is willing to keep its promises to Åland. According to law Finland has two official, equal languages - Swedish and Finnish. In practice this is not true today. Finnish has become more and more dominant, a both natural and inevitable development since the vast majority of Finland has Finnish as their mother tongue. This has led to the fact that it in practice is impossible for the authorities of Åland to communicate with Finnish authorities in Swedish, a right that they once were guaranteed. It has also become more and more difficult generally to cope in Swedish, be it regarding commerce, higher education, computer programs and more common day things as, for instance, informative labels on goods for sale, directions for use or special offers. These facts plus the undeniable fact that the Swedish language in mainland Finland looses more and more of its ground and is on its way to become something that might be called a family language, led to the forming of Ålands Framtid, a political party the aim of which is an independent microstate. We do not see any other possibility for Åland to protect its Swedish heritage - its mother tongue, its culture, its economy and its right and desire to have a functioning right of self-determination. We are fully aware of the fact that our goal - a sovereign microstate - will not be reached in one day - nor was Rome built in one day. But on our certainly most difficult way there we are working on developing our autonomy to the degree we once were promised. Once this goal has been reached there is only one small, formal threshold to step over before full sovereignty is reached. The most urgent questions on our agenda are the following: - Our Swedish mother tongue. We want to use our mother tongue, Swedish, at all levels in our communications with the authorities of Finland. - An independent industry. We want to be able to do business with Sweden without any restrictions imposed by Finland. Then the language would pose no difficulties. - An independent foreign policy. Negotiations on international treaties should be part of the competence of Åland. - An independent, responsible economical policy. The first and foremost goal here is of course to take over the taxation. Without that we cannot even talk about a functioning autonomously. - An independent cultural development. We want to protect Åland's cultural heritage. A people’s cultural heritage is crucial in creating roots and confidence. - A member of our own to represent Åland in the parliament of the European Union. This is crucial since we have yielded significant parts of our legislation to the EU and Finland is not willing to give us a representative in the parliament. This is not in accordance with the promises we were given when we, against our will, were forced to accept our autonomy. Åland - a World of Islands Åland (in Finnish: Ahvenanmaa) lies in the middle of the Baltic Sea, between Sweden and Finland. It is an autonomous, demilitarised, monolingually Swedish-speaking region of Finland. It consists of more than 6500 islands and skerries. 6400 of these are larger than 3000 square metres. The Åland archipelago consists of nearly 300 habitable islands but in fact only 80 are inhabited. There is one Main Island (Fasta Åland) where the capital, Mariehamn, is situated. It measures approximately 47 kilometres from north to south and 42 kilometres from east to west. The population of Åland amounts to about 28500 persons. Whereas in Mariehamn amounts to 11346 persons (2012). Åland in numbers Åland is divided into 16 municipalities. Those are: Brändö, Eckerö, Finström, Föglö, Geta, Hammarland, Jomala, Kumlinge, Kökar, Lemland, Lumparland Mariehamn, Saltvik, Sottunga, Sund and Vårdö. The biggest municipality is Mariehamn – 11346 persons. The smallest is Sottunga, where lives only 101 persons (2012). 66 % of all Åland inhabitants were born in Åland, 19.4% in Finland, little less than 8% in Sweden. 6.8% came to Åland from ”other countires” (2012). There are 31817 registered vehicles – including 20886 cars and 3741 tractors (2012). Gross domestic product of Åland (2010) is mainly coming from: Shipping 21.7%, government services 21.2%, financial services & real estate 16.9%, trade & hotels 9.3%. Åland Pariament is called ”Lagtinget”. It has 30 members, who are elected every four years under a system of proportional representation. After the elections in 2011, ”Lagtinget” consists of six parties: Åland Centre Party (7 members). Åland Liberals (6). Åland Social Democratic Party (6). The Moderates (4). Future of Åland (3). Åland has one representative in the Finnish Parliament. Åland has its own flag since 1954, its own postage stamps since 1984, runs its own police force, and is a member of the Nordic Council.
<urn:uuid:75deef6a-f835-4e04-8761-3e9ff4699a5f>
CC-MAIN-2017-17
http://alandsframtid.ax/index.php?option=com_content&view=article&id=315&Itemid=125
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00624-ip-10-145-167-34.ec2.internal.warc.gz
en
0.961225
1,523
2.609375
3
Objectives of the service Image credit: ukowapi UG, Project: airUTM airUTM is an Unmanned Traffic Management system that allows safe, efficient and secure access to airspace for large numbers of drones. Drone operators need to file daily flight plans as part of their operation procedure. These flight plans are reviewed and approved by CAA (Civil Aviation Authority). Currently, DCA (Department of Civil Aviation) Malawi uses emails and a WhatsApp group to communicate with drone operators in Malawian airspace. Flight plans by drone operators are shared in a WhatsApp group which also comprises of manned aircraft operators and Air Traffic Control (ATC). An officer from ATC then reviews the flight plans and issues approval or rejection. Communication via WhatsApp/ email is an interim solution. However, the main challenge of such analog communication is the lack of situational awareness. Flight plans submitted in this manner are usually in text format, therefore relevant flight information cannot be transmitted. The current solution can be improved by developing a digital system delivering a set of automated functions, services and procedures to ensure safe and secure aircraft operations in a specific volume of airspace. airUTM is a framework designed to facilitate any kind of routine mission, in all classes of airspace and environment while addressing an appropriate interface with manned aviation and air traffic control. Users and their needs The main users/ customers are: - - Drone operators: BVLOS (Beyond Visual Line Of Sight) & VLOS (Visual Line Of Sight), - CAA (Civil Aviation Authorities) - Humanitarian Aid Organizations i.e. UNICEF, GIZ - Drone hobbyists/ enthusiasts. Drone operators are required to file daily flight plans as part of their operation procedures. These flight plans are reviewed and approved by CAA daily. This forms the basis of drone regulations issued by CAA. CAA requires that all drones are registered and authorized to fly. CAA ensures adherence to drone regulations by monitoring drone operations, approving flight plans and defining restricted airspace. Humanitarian aid organizations conduct various drone operations i.e. mapping, emergency response, cargo delivery, etc. As airspace users these organizations also need to comply with drone regulations to ensure safety. Drone hobbyists require access to accurate weather information and other relevant flight data. Before each flight, hobbyists need to know when and where it is safe to fly. Service/ system concept Figure 1. The schematic diagram of airUTM application/ service airUTM will have the following outputs: - Weather information - Situational awareness of airspace - E-registration, e-identification and geofencing - Flight plan review and approval - Relevant information and data flow Key aspects of the airUTM system architecture are: - API integration - GNSS for real-time position information Space Added Value The space assets that will be used for this activity are: - SatNav: airUTM offers location-based services (GPS & Galileo) using real-time geo-data from tracking devices to provide position information and live-tracking. We intend to use both GPS and Galileo as these provide high reliability and accuracy. - SatEO: airUTM uses Earth Observation to access satellite images of the earth surface in form of digital maps. Images from Sentinel 2 satellites (via Open Street Maps/ MapBox) will be used, because of the high spatial resolution of 10 m – 60 m as well as the free and open data policy. The airUTM feasibility study is now complete. Overall, the activity was a great success. An overview of the milestones, achievements and next steps can be found below: - Completed consultations with key stakeholders (Department of Civil Aviation Malawi, Wingcopter, Swoop Aero, MicroMek, GIZ Malawi, UNICEF Malawi, African Drone & Data Academy and several drone hobbyists in order to define the Service Requirements, Service & System Architecture as well as develop a Business Blan. - Conducted a demonstration with the Department of Civil Aviation Malawi and Wingcopter during a scoping visit to the Humanitarian Drone Testing Corridor in Kasungu, Malawi in November 2020. This activity was done as part of the Drone & Data Aid project in close collaboration with the main sponsors GIZ, UNICEF Malawi and Wingcopter. - Secured LOI’s from key stakeholders. - Confirmed the Department of Civil Aviation Malawi as main reference customer and GIZ as first paying customer for the next phase - Demonstration Project. - Secured partnership with WTS Positioning to use their tracking device, Trax, to provide real-time position information as part of our UTM solution. - Complete full proposal and apply for the subsequent Demonstration Project with support from ESA Business Solutions. - Start to engage private investors to secure co-funding for the Demonstration Project. - Travel to Malawi to negotiate the terms of a follow up activity with key stakeholders. Secure signed LOI’s and MOU’s. - Start to develop functional airUTM prototype to be tested as part of the Drone & Data Aid project in Malawi. In partnership with GIZ Malawi, UNICEF Malawi and Wingcopter. - Continue to engage KCAA (Kenya Civil Aviation Authority) and other relevant stakehoders in the Kenyan drone ecosystem. - Establish initial relationships with RCAA (Rwanda Civil Aviation Authority) to explore market opportunities in Rwanda. - Continue marketing & PR activities such as monthly webinars and regular meetups to engage industry stakeholders and the general public.
<urn:uuid:d11eecd3-2ebe-4f9c-b973-1c33d06064a0>
CC-MAIN-2022-49
https://business.esa.int/projects/airutm
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711712.26/warc/CC-MAIN-20221210042021-20221210072021-00288.warc.gz
en
0.901783
1,183
2.515625
3
Why Kids Should Play With Pretend Guns – It’s Healthier Than Some May Think! Children are naturally curious about everything – especially firearms. But researchers are discovering that children’s make pretend play with fake guns doesn’t mean the child will be violent. In a recent Slate article, Melinda Moyer dissects several psychological studies aimed at finding out children’s motivations for playing with guns. And the deeper into the research Moyer goes, the more she seems to discover that violent or aggressive pretend play doesn’t necessarily have anything to do with social interaction. “Aggressive behavior in pretend play is different than actual aggressive behavior in real life,” says co-author and Case Western Reserve University child psychologist Sandra Russ. A central push throughout the article seems to be that yes, children will be curious about firearms. Many may not listen to instruction when regarding them. But make pretend playing with imaginary guns does not, in of itself, constitute anything that should trouble or bewilder parents. Some big strategies for helping your kids use make believe guns to work through situations: - Roleplay through situations with them Levin adds that if there are aspects of your child’s play that make you uncomfortable—maybe your kid is always talking about “killing” bad guys and that makes you cringe—try to engage and perhaps even redirect your child. - Don’t try to stifle their fun “Kids are going to make guns out of sticks and clay and that’s fine—that’s pretend,” [Case Western Reserve University child psychologist Sandra] Russ says. It’s best not to stop them, because doing so might shame them. Plus, Sanfilippo says, “if you make it too big of a deal about it, they’re going to want to do it more, and they’re going to do it behind your back.” While many psychologists believe make-believe play with pretend guns isn’t a bad thing for children, Moyer goes to great lengths to warn readers of the dangers of unsecured firearms in the house. It’s true – children are extremely curious about firearms. It’s always important to lock up and secure firearms so that children cannot have access to them. The Slate article cites plenty of statistics relating to the incidences of violence or death caused by children gaining access to their parents’ firearms – so there’s no need to reiterate all of them here. For concealed carriers with families, this is always a big concern. On one hand, we train to always react with a loaded, ready firearm and on the other hand, we have to accept some amount of risk in order to ensure our children are safe. This fine line is best determined by the concealed carrier and situation awareness. In the meantime, turns out it’s perfectly fine for your child to pick up a stick and pretend it’s a rifle. (Duh.) If anything, working through these situations may help your child acclimate better to social situations later on.
<urn:uuid:5ad1ddd4-4d9b-4893-9366-84324ecb0bd7>
CC-MAIN-2018-22
http://concealednation.org/2015/07/why-kids-should-play-with-pretend-guns-its-healthier-than-you-think/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867092.48/warc/CC-MAIN-20180525121739-20180525141739-00453.warc.gz
en
0.945231
646
2.5625
3
Fish sauce is a part of many Southeast Asian cuisines including Vietnamese nuoc mam, Filipino patis, Korean aek jeot, and Thai nam pla. There's also non-liquid versions of fish and shrimp pastes such as Vietnamese mam ruoc, Cambodian prahok, Filipino bagoong, and Malaysian belacan. But for the purposes of this post, I'm only going to discuss the liquid version of fish sauce in general, and Vietnamese fish sauce in particular. In "Salt: A World History," Mark Kurlansky says the invention of fish sauce is believed to have occurred independently in Europe and Asia. In Europe, the Romans had four classes of fish sauce - garum, liquamen, allec, and muria. While the exact meanings of each class has been lost in time, garum and liquamen became generic terms for fermented fish sauce. Fish scraps were placed in earthen jars, layered with salt, and weighted to draw out the moisture from the fish. The oldest Roman cookbook in existence, "De Re Coquinaria," compiled by Apicius provided more recipes with garum than with salt. A few drops of garum were added to meat, fish, vegetable, and even fruit dishes. In Asia, fish sauce is believed to have been invented by the Vietnamese. Although, the method may have been borrowed from the Chinese soy sauce, which in ancient times used fermented fish with soy beans. Unlike the Roman garum, which fell out of use, Vietnamese nuoc mam remains a vital part of the cuisine today. When the French entered Vietnam, they were horrified to discover that the Vietnamese ate "rotten fish." Nonetheless, the Institut Pasteur in Paris spent 16 years studying nuoc mam, from 1914 to 1930, to figure out the fermentation process. They discovered that the fish were of the Clupeidae family, which contain herring and sardines. The fish were salted and left for three days to extract juices. Some of the juice was saved and left to ferment in the sun, while the rest of the juice was pressed with the fish. The two juices were mixed together and left to ferment for three months or longer. Solid parts were strained out. And that was all Kurlansky had to say about nuoc mam before he continued his discussion of garum. Aside from the horridly mangled accents for nuoc mam, Kurlansky also didn't include anchovies as the fish of choice. Although, I wonder what Kurlansky would have said if he devoted equal space to studying all the gradations of fish sauce in Vietnam. And how nuoc mam differed in other countries. Nuoc, the Vietnamese word for water also means nation. Mam means paste or sauce. Could I argue that nuoc mam can also mean "national sauce"? Because certainly, it's a vital part of Vietnamese cuisine. Not all fish sauces are the same. While I've tried some brands of Filipino and Thai fish sauces, I found the flavors too harsh, too salty, with little nuance. Of course, this is mainly because I cook Vietnamese food, the fish sauces I use are geared toward Vietnamese dishes. So I'll leave the discussion of which brands of fish sauce to use for other cuisines to my blogging friends who do a much better job of cooking those cuisines. For the Vietnamese kitchen in general, and my kitchen in particular, these are my preferred brands. For a long time, the most common brands of fish sauce that were available were Thai. I grew up on the Thai Squid Brand Fish Sauce. It's not nearly as salty as Tiparos, another popular Thai fish sauce. It's commonly stocked at American grocery stores, and in a moment of laziness when I ran out and because I didn't want to make a separate trip to the Asian grocery store, I bought a bottle. It was perfectly OK, and I used it mainly to season large pots of soup. So if you don't have much of a choice of fish sauce in your area, I'd recommend Squid. But these days, since Vietnamese brands of fish sauce are available, I'd much rather recommend Viet Huong's brands of Flying Lion Phu Quoc and Three Crabs nuoc mam. (Though the labels might say processed in Thailand, these are purely Vietnamese fish sauces. I think this was before normalization of relations so it needed to have a non-Vietnamese label in order to be imported into the US?) Phu Quoc, the island off the southernmost tip of Vietnam, is famed for their nuoc mam. So much so that other brands might slap on the words Phu Quoc in order to mislead. Also, look for the words nuoc mam nhi (which you can see above the Viet Huong label on the Three Crabs bottle). This means it is from the first extraction, rather similar to the "cold-pressed extra virgin" label on a bottle of olive oil. Although the nuoc mam will darken with time after being opened, you want to look for a light amber color when you purchase it. It's perfectly fine to store nuoc mam at room temperature. So what do they taste like? Nuoc mam hits the fifth taste bud, umami, a savoriness if you will. It's more than just salty. Squid is the saltiest of the three, followed by Flying Lion Phu Quoc, and then Three Crabs. I reserve Squid and Flying Lion Phu Quoc for seasoning soups and cooking. Three Crabs is more nuanced, with slightly sweeter undertones, as it's made from the first extraction. I reserve Three Crabs for use in Vietnamese dipping sauces, where the taste of the fish sauce won't overpower. Make sure it's Three Crabs brand, there's copycat one and two crabs brands too. I admit, my preference for Three Crabs is because that's what my ba noi (Vietnamese paternal grandmother) taught me. Also, because I don't have time to try every single brand on the market. I stick with what's tried and true. Like Burgundy wine, which can only be called such if it is produced in Burgundy, France, make sure your fish sauce was processed in Phu Quoc, Vietnam. I've heard the coastal town of Phan Thiet also makes good fish sauces, but haven't tried any of those. So there you go, if you thought fish sauce was too salty or too smelly, it could be because you were using the wrong brands. Make sure you use Vietnamese nuoc mam when making Vietnamese dishes. After all, we did invent fish sauce. :) And for my non-Vietnamese food bloggers and readers, what brands of fish sauce do you prefer for cooking your cuisine? My recipe for basic nuoc mam cham (Vietnamese fish dipping sauce). August 17, 2010 update: My error. I just wanted to clarify that according to this San Francisco Chronicle article, Viet Huong fish sauce is from Thailand, processed it in Hong Kong, and finished in America because the quality of the fish sauce from Vietnam is not suitable for export. But since the company is owned by a Chinese-Vietnamese-American, that makes it Vietnamese enough in my book. ;) 1 year ago today, Carne Asada (Mexican Grilled Meat) and Ga Nuong Xa (Vietnamese Grilled Chicken with Lemongrass) for a Memorial Day barbecue.
<urn:uuid:abb6e4a9-ee57-4a47-afc0-a01f43a08691>
CC-MAIN-2013-20
http://wanderingchopsticks.blogspot.com/2008/05/nuoc-mam-vietnamese-fish-sauce.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00069-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962375
1,561
3.09375
3
It is convenient to measure the resistance using two wires, but it will cause measurement errors. This error can be almost eliminated by using a four-wire multimeter separated from the source terminal and the measurement terminal. Unfortunately, adding extra leads and connections increases the complexity of the measurement. You will need to connect the added leads and you may have to change the clips and probes when changing from voltage to resistance. Now, there is a new concept that allows you to make 4-wire resistance measurements with just two leads. Figure 1 (left). The 2-wire resistance measurement produces an error due to the drop in the test lead voltage. Figure 2 (right). The 4-wire resistance measurement eliminates the current in the voltage lead and eliminates this source of error. Why use 4 wires to measure resistance? The challenge of managing two leads is large enough, especially when measuring small components in tight spaces. If you want to use four leads to inspect small solder joints, soft connectors or chip resistors, you will face real challenges. Switching the lead configuration may require replacement of the banana plug, resulting in measurement errors. It takes time to switch from a voltage probe to a Kelvin lead and then back. Why use 4 wires to measure the resistance? Measuring voltage with two lines has little effect on measurement accuracy. The typical input impedance of the voltage input on the multimeter is 10 megohms, so the very small current flow in the leads and the resulting drop in lead voltage are negligible. The effect of series lead resistance on current measurement is also not significant. Unfortunately, in resistance measurements, lead resistance can cause significant degradation in accuracy. When measuring resistance, the multimeter switches the current source to the measurement loop. The current is driven through an unknown resistor and the voltage measured by the multimeter drops. If there are only two leads, as shown in Figure 1, the source current flows through the same path as the measured voltage drops. Measuring leads are not perfect conductors, they have a certain series resistance. By driving the current through the measurement leads, you can not only see the voltage drop in the unknown resistor, but also the voltage drop of each lead. Therefore, you measured the combined resistance of the positive, unknown, and negative leads. If four leads are used, as shown in Figure 2, the source current measurement and the voltage measurement can be separated. The meter terminal is called the “source” (“Source”) for the current source and the “sensing terminal” (“Sense”) for the voltage input. The series resistance in the source lead does not affect the current flow. There is almost no current flow in the measurement/sense leads because the input impedance of the meter is high. This means that there is no I x R voltage drop in the measurement leads. Therefore, you only need to measure the voltage drop in the unknown resistor due to the source current flowing through it. Figure 3. The 2x4-wire resistor technology uses dedicated split banana jacks and leads to provide 4-wire performance using two wires. Introducing 2x4 line resistance measurement The patented split terminal socket on the Tektronix DMM series maintains the convenience of using two wires to measure resistance while providing the measurement performance of a 4-wire measurement method. The socket is fully compatible with standard 4 mm banana plugs. But internally, each socket is divided into two contacts: one source contact and one measuring contact. The specially designed test leads have two wires per line, which are also one source wire and one measuring wire. The leads are aligned with the contacts inside the socket to deliver separate source and measurement signals over the entire length of the leads. At the distal end of the lead, clips and probes that keep the source signal separate from the measurement signal can provide 4-wire performance up to the component under test. Tektronix offers a range of fixtures and probes that provide up to 4 wires up to the connection point, including: * Test probe * Crocodile (Kelvin) clip All of these accessories can be used to measure 4-wire resistance or voltage. The 2x4 line technology available on the DMM series simplifies the task of accurately measuring resistance without having to change the cable configuration or handle a large number of cables.
<urn:uuid:a796e612-664b-4b01-876d-deeec647a1c6>
CC-MAIN-2020-45
https://community.cypress.com/thread/47024
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891624.95/warc/CC-MAIN-20201026175019-20201026205019-00670.warc.gz
en
0.928771
888
3.609375
4
Federal regulators are looking for insight into the safety and health issues related to mining automation and associated technologies. The National Institute for Occupational Safety and Health (NIOSH) of the Centers for Disease Control and Prevention (CDC) noted in their request the rapid adoption of automated mining in Australia and the increasing momentum for the adoption of such technologies in the United States. In the U.S., the agency wrote in the Federal Register, some of the first automation has been applied to processing facilities, drilling equipment, underground coal mine longwalls. There are now pilot projects underway with automated haulage trucks and loaders, the agency said. NIOSH is seeking comment on three research questions in particular: - To what extent will automation and associated technologies be implemented in mining and in what timeframe? - What are the related health and safety concerns with automation and associated technologies in mining? - What gaps exist in occupational health and safety research related to automation and associated technologies? NIOSH is also seeking to proactively address worker health and safety challenges that may be associated with automation, as well as leverage new technologies to improve miner health and safety. To better understand the state of automation technologies, their implementation in the United States, and the health and safety concerns associated with the technology, NIOSH said, it would like input on the following questions: - What are the major safety concerns associated with humans working near or interacting with automated mining equipment? Have other organizations addressed the safety concerns associated with humans working near or interacting with automated mining equipment? If yes, please provide a description. - What research has been conducted, or approaches taken, to address the potential for human cognitive processing confusion, misunderstanding, and task or information overload associated with monitoring or controlling automated mining equipment or other monitoring systems (e.g.,fleet management, environmental monitoring, safety systems, health care systems)? - What is the state of the art for display methodologies and technologies to provide mine personnel and equipment operators with information on operational status, location, and sensory and environmental feedback from automated mining equipment or systems? - What sensor technology improvements are needed to ensure the safety of humans working on or near automated equipment? - How are existing methods of big data analytics applied to automated mining equipment or systems? Are there health and safety benefits to these applications? If yes, please describe. - Are there any needed improvements to guidelines or industry standards for automated mining system safe design and operation practices? If yes, please describe. - Are there any needed improvements to training materials, training protocols, and operating procedures for system safety design principles related to automated mining systems? If yes, please describe. Comments can be submitted to https://www.regulations.gov. They also can be submitted by mail to: National Institute for Occupational Safety and Health, NIOSH Docket Office, 1090 Tusculum Avenue, MS C-34, Cincinnati, Ohio 45226-1998. The Docket Number is CDC-2019-0016.
<urn:uuid:9de2924f-4d09-4d14-9df7-716e639cbc00>
CC-MAIN-2019-30
http://insideunmannedsystems.com/regulators-seek-feedback-on-mining-automation-safety-health-issues/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527458.86/warc/CC-MAIN-20190722010436-20190722032436-00133.warc.gz
en
0.931492
606
2.625
3
In part one of this blog entry, I describe how our College Success Portfolio is the benchmark by which we measure students' abilities to succeed in college. This portfolio includes the completion of tasks across all the core academic disciplines, including science, math, language arts, social studies, and world languages. In addition, students are required to produce a college-ready research paper and a multimedia product and complete a workplace learning experience or internship. Each task is evaluated against carefully selected standards that are clear, challenging, and attainable. The tasks and evaluation rubrics used for each task were developed with educational experts at Stanford University. The tasks are embedded into the regular curriculum rather than presented as an adjunct to their other studies. The evaluation rubrics, which are used throughout high school, are shared with the students at the start of the freshman year. This strategy gives students a clear and focused understanding of exactly what is expected of them and how they will be evaluated. Once a task is completed, students must also write a reflection that describes both the product and process they used to create it. They reflect on what they've learned, what they would have done differently, and how they will apply this learning to future projects. Additionally, students must describe how they used at least two of Envision Schools's 21st-Century Leadership Skills to complete the task. All throughout school, students archive their work on a digital platform that instructors also use to evaluate it. This step enables us to keep tabs on student progress, as well as evaluate the data more effectively to strengthen and improve student outcomes. How do you measure college readiness at your school or in your classroom? Please share with us.
<urn:uuid:ea769ff4-1204-4140-9c70-36d8cb74694e>
CC-MAIN-2014-52
http://www.edutopia.org/college-success-portfolio-part-two?quicktabs_edutopia_blogs_sidebar_popular_list=2
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447559374.74/warc/CC-MAIN-20141224185919-00064-ip-10-231-17-201.ec2.internal.warc.gz
en
0.97157
341
2.9375
3
They say the process destroys E. coli and other potentially deadly microbes that chlorine doesn't kill in fruits and vegetables. But consumer groups are concerned. Before bagged leafy greens wind up on your plate, they are washed, often three times, in a potent chlorine bath. But new research shows the steps that California companies rely on to protect consumers do not kill dangerous bacteria inside the leaves, whereas zapping them with radiation wipes them out. The debate over how to protect consumers from E. coli and other potentially deadly microbes has intensified since the fall of 2006, when at least 200 people across the nation became ill and three died after eating tainted spinach grown in San Benito County. Irradiation, which involves bombarding food with high-energy gamma or electron beams to disrupt the DNA of pathogens, has its supporters and critics. But the new research suggests that it may be the only way to penetrate leafy greens and kill bacteria hiding inside. Although some hamburger meat, poultry and spices are irradiated to kill bacteria, its use on fruits and vegetables to enhance food safety is not permitted in the U.S. Some produce is irradiated for insect control and shelf-life extension. The Food and Drug Administration is considering whether to allow the practice for killing pathogens, which would make it much more widespread. No health problems have been associated with eating irradiated food. But some consumer groups say its safety is unproven, and have raised concerns about radioactive waste and accidental radiation releases. Presenting their findings Thursday at the American Chemical Society's annual conference, U.S. Department of Agriculture scientists said irradiation could be key to destroying pathogens in hard-to-reach places inside and on the surface of fruits and vegetables. "Irradiation kills E. coli where chlorine doesn't," said Brendan Niemira, a microbiologist at the USDA's Eastern Regional Research Center in Pennsylvania who led the research. "We used pretty aggressive levels of chlorine and found they weren't very effective at all. But when you have E. coli inside a leaf, and you irradiate it, the E. coli dies." Every year, 1 in 4 Americans suffers a food-borne illness. About 14% of cases are linked to fresh produce, and spinach and lettuce are the biggest known culprits, causing 23 outbreaks since 1995. Most of those outbreaks were traced to California, the leading producer of greens. Some food safety experts say that the ionizing radiation could damage leaves and that consumers won't buy bags of spinach with a radiation logo on the label. Irradiation also could increase processing and handling times. In the spinach outbreak 19 months ago, the E. coli was traced to a cattle ranch in San Benito County, and was probably carried to the spinach field by feral pigs or by water. The bagged spinach had been triple-rinsed at a Natural Selection Foods/Earthbound Farm plant in San Juan Bautista. The company now tests all greens for pathogens when they arrive at the plant and after they are processed. Industry leaders such as Earthbound Farm have been searching for foolproof sanitation methods. But they are wary of irradiation. One obstacle is that irradiated foods cannot be certified organic under USDA standards.
<urn:uuid:1e0b5feb-f7ef-4899-a5ef-bfb4efc7f42e>
CC-MAIN-2014-41
http://www.organicconsumers.org/articles/article_11535.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131846.69/warc/CC-MAIN-20140914011211-00306-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.964115
660
3.046875
3
On Aug. 29, protestors toppled a statue of John A. Macdonald in Montreal. Besides serving as Canada’s first prime minister, Macdonald is infamously known as the creator of the residential school system and as someone who starved Indigenous groups to forcibly relocate them. Macdonald’s treatment of Indigenous Peoples was reconsitiuted as cultural genocide by the Canadian government in 2015, due to the work of Indigenous activists. The distress caused by statues of those who contributed to the marginalization of minority groups is not new. On McGill’s campus, there is a growing movement demanding the removal of the statue of James McGill. The calls to remove statues honouring Canada’s colonial legacy is a direct result of the inaction of those in positions of power to denounce the harmful acts of those before them. Silencing minority voices and ignoring their labour to build a more equitable society will no longer be tolerated by BIPOC and their allies. The conversation surrounding harmful commemoration is not unique to Montreal; rather, it is one being held all over Canada. In 2018, the City Council of Victoria, British Columbia, voted to remove their statue of Macdonald. Those who want statues of racist historical figures to remain often argue that removing them is equivalent to erasing history, insisting that there is no middle ground between commemoration and erasure. This argument fails to acknowledge that many Black and Indigenous people face the harmful legacies of residential schools and slavery in their everyday lives. One cannot celebrate the societal contributions of men like Macdonald and McGill without considering the harm that they have also perpetuated and acknowledging the fact that their success came at the expense of Black and Indigenous peoples. There may have been alternative solutions to the removal of these statues when concerns first arose, but the government’s reluctance to acknowledge its racist past has led protesters with no other choice than to force change. Montreal activists have been asking for the removal of Macdonald’s iconography through petitions and peaceful demonstrations but they have been ignored by those able to authorize its removal. The tearing down of the Macdonald statue demonstrates a shift: Marginalized voices are tired of inaction and are now taking matters into their own hands. BIPOC are no longer waiting for white men to make the right decisions. Politicians have been largely ignoring the protestors but have spoken out about the statue’s fall, insisting that it was not their own inaction that led to the toppling of the statue. Prime Minister Justin Trudeau condemned the protestors’ actions, arguing that vandalism does not pave the way for progress or addressing injustice in Canada. Previously, Trudeau has apologized to Indigenous groups for Macdonald’s actions but the Prime Minister’s acknowledgement of Macdonald’s legacy as important only highlights his unwillingness to listen to Indigenous groups’ need for justice—the bare minimum of which would be to stop honouring Macdonald’s racist legacy. Both Trudeau and Quebec Premier François Legault argue that removing a part of our history is not productive, but their tactics to ignore marginalized voices demanding change is also stalling progress. The government’s neglect of the needs of BIPOC and their unconcerned attitude while making decisions that harm Indigenous groups, such as approving the Trans Mountain pipeline, emphasizes the performative activism in their response to Black Lives Matter and other such social justice movements. McGill’s administration has added a statement acknowledging their namesake’s role in enslaving Black and Indigenous people, but still has yet to mention that they were Black and Indigenous. The university has had more than enough time to listen to BIPOC students’ needs in regards to McGill’s racist legacy but as time passes, students are getting tired of waiting. The administration is blatantly disregarding Black students’ demands for equity. Other than an emailed statement about the Black Lives Matter movement, the university has yet to comment on the statue of James McGill. McGill’s lack of tangible action is reminiscent of the Canadian government making blanket statements and ignoring their active role in perpetuating the marginalization of people of colour. McGill students are losing patience. The administration’s inaction is leaving many students of colour uncomfortable with the institution that they attend and questioning the values that it holds. Protesters should not have needed to tear Macdonald down; the government should have listened to the people that his legacy has harmed and cooperated to remove the statue peacefully. It is now time for McGill to take action. Passivity only leads to escalation, and there is nothing to say that the James McGill statue will not be next.
<urn:uuid:09e85714-5918-42b2-a5fc-ae7697799c67>
CC-MAIN-2022-05
https://www.mcgilltribune.com/opinion/from-john-a-macdonald-to-james-mcgill-bipoc-voices-will-no-longer-be-silenced09152020/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304859.70/warc/CC-MAIN-20220125160159-20220125190159-00368.warc.gz
en
0.962316
934
3.46875
3
Science and Technology Education Honeywell is committed to delivering programs in science and math that improve our hometowns, one student, one teacher, one classroom at a time. The Honeywell India Technology Center (HITC) is helping more than 600 local students learn about science and technology though a partnership with Sanskriti School, a Haryana government-funded school in Gurgaon. Volunteers from the HITC, backed by a US$10,000 (INR 6,20,825) contribution from Honeywell, participate in a program to provide experiential learning opportunities through interaction with scientists and engineers. The program is part of Honeywell Hometown Solutions, the company’s corporate citizenship initiative, which seeks to address certain needs in the communities it serves. In 2013, Honeywell awarded four teachers from India full scholarships to attend Honeywell Educators @ Space Academy at the U.S. Space and Rocket Center in Huntsville, Alabama. These teachers participated in 45 hours of classroom, laboratory and training time, focused on science and space exploration. Since the program’s inception in 2004, Honeywell has awarded scholarships in the program to 2,176 teachers from more than 45 countries, including 38 teachers from India. The Honeywell Initiative for Science & Engineering (HISE) is part of our approach to cultivate and inspire the next generation of scientists and engineers. HISE gives students direct access to Honeywell’s top technologists and engineers, as well as to some of the world’s Nobel Prize-winning Laureates in chemistry and physics. Indian partner universities have hosted HISE events 11 times since 2006, including recent events at the College of Engineering, Pune, and the Birla Institute of Technology and Science in Pilani. Through the Science Lab Initiative, Honeywell has provided science labs in more than 500 schools to promote science and math education among disadvantaged children. Honeywell volunteers train teachers and students to ensure effective use of science kits, as well as hold demonstrations of science fundamentals. As part of the Honeywell Robotics Program, the company has trained nearly 600 school children in rural and semi-urban areas in southern India since 2003 in understanding wireless communication, autonomous movements, problem solving techniques and programming languages. A series of nine-day Discovery Workshops are held in schools around Pune that covers experiments and discussions on science, math and geography. More than 2,500 middle school students and 55 teachers from 14 schools participated at these workshops in 2012. Family Safety & Security Honeywell, through its School Fire Safety Program, has provided fire safety training to more than 67,000 children across 83 schools in India. The program helps to create awareness about fire prevention, equipment and potential fire hazards. To learn more about Honeywell’s community involvement efforts, visit Honeywell Hometown Solutions.
<urn:uuid:f1be4479-cd8d-4ebd-a7a0-0ff5b70922a5>
CC-MAIN-2018-17
http://www.honeywell-indiatechnologycenter.com/in-our-community/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945604.91/warc/CC-MAIN-20180422135010-20180422155010-00415.warc.gz
en
0.943101
580
2.8125
3
By Joseph D’Aleo, CCM Here are two extremes. The Russians looking for Maunder Minimum and the NCAR grant fed researchers an 8F warming based on model of satellite data. I await reaction of Drs. Spencer and Christy on the latter. (Update: John Christy has responded - see below the WAPO story). Bicentennial Decrease of the Total Solar Irradiance Leads to Unbalanced Thermal Budget of the Earth Habibullo I. Abdussamatov, Pulkovo Observatory of the RAS Applied Physics Research Vol. 4, No. 1; February 2012 Temporal changes in the power of the longwave radiation of the system Earth-atmosphere emitted to space always lag behind changes in the power of absorbed solar radiation due to slow change of its enthalpy. That is why the debit and credit parts of the average annual energy budget of the terrestrial globe with its air and water envelope are practically always in an unbalanced state. Average annual balance of the thermal budget of the system Earth-atmosphere during long time period will reliably determine the course and value of both an energy excess accumulated by the Earth or the energy deficit in the thermal budget which, with account for data of the TSI forecast, can define and predict well in advance the direction and amplitude of the forthcoming climate changes. From the early 1990s we observe bicentennial decrease in both the TSI and the portion of its energy absorbed by the Earth. The Earth as a planet will henceforward have negative balance in the energy budget which will result in the temperature drop in approximately 2014. Due to increase of albedo and decrease of the greenhouse gases atmospheric concentration the absorbed portion of solar energy and the influence of the greenhouse effect It will additionally decline. The influence of the consecutive chain of feedback effects which can lead to additional drop of temperature will surpass the influence of the TSI decrease. The onset of the deep bicentennial minimum of TSI is expected in 2042 plus or minus 11, that of the 19th Little Ice Age in the past 7500 years - in 2055 plus or minus 11. After the maximum of solar cycle 24, from approximately 2014 we can expect the start of the next bicentennial cycle of deep cooling with a Little Ice Age in 2055 plus or minus 11. Thus, long-term variations of TSI (with account for their direct and secondary, based on feedback effects, influence) are the main fundamental cause of climate changes since variations of the Earth climate is mainly determined by a long-term imbalance between the energy of solar radiation entering the upper layers of the Earth’s atmosphere and the total energy emitted from the Earth back to space. See full paper PDF. And the other polar opposite using models fed with satellite data by NCAR which by the way using models with proclaimed 97% accuracy predicted a record strong solar cycle for 24 with a max SSN of 169. The forecast was only100 off with the max at 66.9 so far and current 11 month means at 63. Table from Solar Terrestial Activity Report And remember the Layman’s Sunspot Count site which only counts spots larg enough to have been seen many decades ago so as to more acurately see trends. WARMER STILL: EXTREME CLIMATE PREDICTIONS APPEAR MOST ACCURATE, REPORT SAYS NOAA/REUTERS - Hurricane Sandy is seen churning northwards in this NOAA handout satellite image taken on October 25, 2012. According to climate scientists, the world could be in for a devastating increase of some eight degrees Fahrenheit by 2100, resulting in drastically higher seas, disappearing coastlines and more severe droughts, floods and other destructive weather. Climate scientists agree the Earth will be hotter by the end of the century, but their simulations don’t agree on how much. Now a study suggests the gloomier predictions may be closer to the mark. Warming is likely to be on the high side of the projections,” said John Fasullo of the National Center for Atmospheric Research in Boulder, Colo., a co-author of the report, which was based on satellite measurements of the atmosphere. That means the world could be in for a devastating increase of about eight degrees Fahrenheit by 2100, resulting in drastically higher seas, disappearing coastlines and more severe droughts, floods and other destructive weather. Such an increase would substantially overshoot what the world’s leaders have identified as the threshold for triggering catastrophic consequences. In 2009, heads of state agreed to try to limit warming to 3.6 degrees, and many countries want a tighter limit. Climate scientists around the world use supercomputers to simulate the Earth’s atmosphere and oceans. Sophisticated programs attempt to predict how climate will change as society continues burning coal, oil and gas, the main sources of heat-trapping gases such as carbon dioxide. But these simulations spit out a wide range of warming estimates. All foresee an overheated planet in 2100, but some predict just three degrees of warming while others estimate eight or more degrees of extra heat. “This problem has been around for 30 years,” Fasullo said. “As long as climate models have existed, there’s been this spread in projections of the future.” One source of uncertainty involves the impact of cloud cover, especially clouds that form in the tropical and subtropical regions between about 30 degrees north and south of the equator. “Tropical clouds are so important to climate,” Fasullo said. “Small changes in clouds near the equator have a big effect on where you end up” for temperature predictions. As sunlight pours onto the tropics, clouds bounce some of that heat back into space. Fewer clouds open up the atmosphere “like an iris,” Fasullo said, allowing more heat to beam onto Earth’s surface. No supercomputer is powerful enough to predict cloud cover decades into the future, so Fasullo and colleague Kevin Trenberth struck on another method to test which of the many climate simulations most accurately predicted clouds: They looked at relative humidity. When humidity rises, clouds form; drier air produces fewer clouds. That makes humidity a good proxy for cloud cover. Looking back at 10 years of atmospheric humidity data from NASA satellites, the pair examined two dozen of the world’s most sophisticated climate simulations. They found the simulations that most closely matched humidity measurements were also the ones that predicted the most extreme global warming. In other words, by using real data, the scientists picked simulation winners and losers. “The models at the higher end of temperature predictions uniformly did a better job,” Fasullo said. The simulations that fared worse ND the ones predicting smaller temperature rises “should be outright discounted,” he said. The most accurate climate simulations were run by the United Kingdom’s Met Office, a consortium in Japan and a facility at the National Center for Atmospheric Research.... Note from Dr. John Christy Simple answer. When it comes to global temperature, the most sensitive models are the worst. Fasullo and Trenberth picked a rather obscure variable to hype, but when looking at the temperature itself, the worst models are the most sensitive models (attached, from my House testimony.) The real trend in global tempErature from satellite (RSS) for the last 15 years is flat while these ‘skillful’ models predicted a steep rise. As is the Hadley data (used by the IPCC). And the CFS unadjusted surface data since 1979 (Maue Weatherbell) So why the constant push to manipulte data and hype natural disasters as proof that fossil fuels and man are responsible. Their own words tell us: Maurice Strong, senior advisor to Kofi Annan, U.N. Secretary-General who chaired the gigantic (40,000 participants) “U.N. Conference on Environment and Development” in Rio de Janeiro in 1992 , who was responsible for putting together the Kyoto Protocol with thousands of bureaucrats, diplomats, and politicians, stated: “We may get to the point where the only way of saving the world will be for industrial civilization to collapse...isn’t it our job to bring that about” “In searching for a new enemy to unite us, we came up with the idea that pollution, the threat of global warming, water shortages, famine and the like would fit the bill....All these dangers are caused by human intervention...and thus the “real enemy, then, is humanity itself....believe humanity requires a common motivation, namely a common adversary in order to realize world government. It does not matter if this common enemy is “a real one or...one invented for the purpose.” Quote by the Club of Rome. Timothy Wirth, U.S. Undersecretary of State for Global Issues, seconded Strong’s statement: “We have got to ride the global warming issue. Even if the theory of global warming is wrong, we will be doing the right thing in terms of economic policy and environmental policy.” “The data doesn’t matter. We’re not basing our recommendations on the data. We’re basing them on the climate models.” Prof. Chris Folland, Hadley Centre for Climate Prediction and Research “The models are convenient fictions that provide something very useful.” Dr David Frame, Climate modeler, Oxford University “It doesn’t matter what is true, it only matters what people believe is true.” - Paul Watson, Co-founder of Greenpeace” “Unless we announce disasters no one will listen.” - Sir John Houghton, First chairman of the IPCC “No matter if the science of global warming is all phony ... climate change provides the greatest opportunity to bring about justice and equality in the world.” - Christine Stewart, former Canadian Minister of the Environment “The only way to get our society to truly change is to frighten people with the possibility of a catastrophe” - emeritus professor Daniel Botkin ”We are on the verge of a global transformation. All we need is the right major crisis.” - David Rockefeller, Club of Rome executive manager - Trustee of The Rockefeller Foundation a heavy funder of environmenal causes. “This has almost nothing to do with environmental policy....one must say clearly that we redistribute de facto the world’s wealth by climate policy” - Ottmar Edehoffer, UN IPCC WARNINGS THIS WOULD HAPPEN Eisenhower’s farewell address to the nation “The free university, historically the fountainhead of free ideas and scientific discovery, has experienced a revolution in the conduct of research. Partly because of the huge costs involved, a government contract becomes virtually a substitute for intellectual curiosity. For every old blackboard there are now hundreds of new electronic computers. The prospect of domination of the nation’s scholars by federal employment, project allocations, and the power of money is ever present - and is gravely to be regarded. Yet in holding scientific research and discovery in respect, as we should, we must also be alert to the equal and opposite danger that public policy could itself become the captive of a scientific-technological elite.” Vaclav Klaus, President of the Czech Republic, visited Australia in July 2011. In referring to the ideological orientations of those individuals and organisations who have significant financial and other vested interests in propagating the ‘Doctrine’ of anthropogenic induced climate change, President Klaus said: “They want to change us, to change our behaviour, our way of life, our values and preferences, they want to restrict our freedom because they themselves believe they know what is good for us. They are not interested in climate. They misuse the climate in their goal to restrict our freedom. What is endangered is freedom, the climate is okay.” After noting that today’s human-induced climate change alarmists are the ideological descendents of the zero and negative population growth advocates of the 1970s who erroneously forecast that human population pressures would lead to increases in global poverty and growing shortages in resources, President Klaus went on to add: “They hate us, the humans, they consider us selfish and sinful creatures who must be controlled by them. I used to live in a similar world - called communism - and I know that it led to the worst environmental damage the world has ever experienced.”
<urn:uuid:58a76ccc-57c0-419a-9085-ae6c77bce407>
CC-MAIN-2015-18
http://icecap.us/index.php/go/joes-blog/two_schools_of_thought_one_scientific_and_the_other_science_fiction/
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430460924971.72/warc/CC-MAIN-20150501061524-00065-ip-10-235-10-82.ec2.internal.warc.gz
en
0.922387
2,636
2.65625
3
Genomic patterns of nucleotide diversity in divergent populations of U.S. weedy rice © Reagon et al; licensee BioMed Central Ltd. 2010 Received: 30 January 2010 Accepted: 15 June 2010 Published: 15 June 2010 Weedy rice (red rice), a conspecific weed of cultivated rice (Oryza sativa L.), is a significant problem throughout the world and an emerging threat in regions where it was previously absent. Despite belonging to the same species complex as domesticated rice and its wild relatives, the evolutionary origins of weedy rice remain unclear. We use genome-wide patterns of single nucleotide polymorphism (SNP) variation in a broad geographic sample of weedy, domesticated, and wild Oryza samples to infer the origin and demographic processes influencing U.S. weedy rice evolution. We find greater population structure than has been previously reported for U.S. weedy rice, and that the multiple, genetically divergent populations have separate origins. The two main U.S. weedy rice populations share genetic backgrounds with cultivated O. sativa varietal groups not grown commercially in the U.S., suggesting weed origins from domesticated ancestors. Hybridization between weedy groups and between weedy rice and local crops has also led to the evolution of distinct U.S. weedy rice populations. Demographic simulations indicate differences among the main weedy groups in the impact of bottlenecks on their establishment in the U.S., and in the timing of divergence from their cultivated relatives. Unlike prior research, we did not find unambiguous evidence for U.S. weedy rice originating via hybridization between cultivated and wild Oryza species. Our results demonstrate the potential for weedy life-histories to evolve directly from within domesticated lineages. The diverse origins of U.S. weedy rice populations demonstrate the multiplicity of evolutionary forces that can influence the emergence of weeds from a single species complex. Among the most widespread and costly agricultural pests are the numerous weeds that have evolved from within the same complex of interfertile species as domesticated plants [1–3]. The recent and rapid evolution of these conspecific weeds also presents unique opportunities to study processes influencing adaptive population divergence and parallel evolution of weedy life-histories. Conspecific weeds are morphologically and ecologically divergent from domesticated and wild congener species, and are not simply transient "volunteers" of the previous season's crop [4, 5]. The evolutionary success of conspecific weeds is often attributed to acquisition of traits associated with wild plants (e.g. dormancy), presumably selected against in crops. Conversely, these weeds also often exhibit characteristics typical of domesticated plants, (e.g. more selfing, rapid growth), which could promote invasiveness in the agroecosystem. There is great interest in understanding the evolutionary mechanisms that can lead to the emergence of weedy species from the same species complexes that give rise to domesticated plants. The larger complex of interfertile species within which conspecific weeds evolve includes the crop, wild relatives, and other feral weeds . Studies have shown that, in many cases, hybridization between crops and wild species can facilitate weed evolution [reviewed in [7, 8]]. Alternatively, conspecific weeds may evolve from standing genetic variation in wild relatives , or cultivated germplasm [e.g. ], though examples of weeds evolving directly from crops are rare. The short evolutionary time scales involved make it less likely that novel mutations are significant to weed evolution, however exceptions are known [e.g. ]. Here we investigate the evolutionary origins of weedy rice in the United States, which has been a subject of considerable debate for more than 150 years [11–16]. Weedy or red rice (due to the frequent presence of a red pericarp), is found in cultivated rice fields worldwide, but is most damaging in direct seeded (seeding directly into a dry soil bed), highly mechanized agricultural systems typical of the U.S., Europe and Australia . Although currently classified as the same species as Asian cultivated rice, Oryza sativa L., weedy rice has morphological characteristics typical of wild species (e.g. dormancy, shattering) and of cultivated rice (e.g. high fecundity, high selfing rate). The long term persistence of weedy rice throughout the range of cultivated rice, suggests that it can adapt to local changes in agronomic practices as well as different biotic and abiotic conditions [18, 19]. Taking advantage of the existing genomic resources for domesticated rice [28, 29], we use genome-wide patterns of DNA sequence variation in a broad sample of the Oryza crop-wild complex, to infer the origin and demographic history of U.S. weedy rice. Specifically we attempt to address remaining uncertainties regarding 1) the ancestral Oryza group(s), including other wild species, that gave rise to U.S. weedy rice, 2) the timing of divergence between U.S. weedy rice and its progenitor(s), and, 3) the role of hybridization in the establishment of U.S. weedy rice populations. We find considerable population structure in U.S. weedy rice, with genetically divergent populations having separate origins. Exotic cultivated O. sativa varieties are the main contributors to weedy rice genomes, and there is little evidence of contribution from wild Oryza. Hybridization among weedy groups has also influenced the emergence of novel weed phenotypes. Assessments of demographic parameters suggest differences among divergent weedy groups in the effect of population bottlenecks upon U.S. colonization, and in the timing of their origins. Our results demonstrate how similar weedy life histories can evolve from divergent genetic backgrounds. Weedy rice seed was obtained from collections made over a period of 30 years in the Southern rice belt (Arkansas, Louisiana, Mississippi, Missouri and Texas) and maintained by the United States Department of Agriculture (USDA) at the Dale Bumpers Rice Research Institute, Stuttgart Arkansas (Additional file 1). We selected a subset of 58 accessions that maximized geographical diversity, but were otherwise chosen at random. We also included a few samples representative of rare morphologies (i.e. brown hulls), to increase the probability of capturing all existing population structure. Accessions listed in Additional file 1 as single seed descent are derived from seeds collected at rice mills and have been selfed at the USDA for four generations (D. Gealy personal communication). The remaining accessions were collected directly from weedy plants occurring in cultivated rice fields by the USDA. Putative parental populations For our analyses, we used data from 206 Oryza accessions, 95 of which were included in , and 111 which were chosen specifically for this study. Our sample broadly surveys AA genome Oryza species for potential parental sources of U.S. weedy rice (Additional file 2). We included Asian landraces and modern accessions from the five main variety groups of O. sativa; this includes 22 indica, 7 aus, 18 tropical japonica (varieties grown in tropical and subtropical regions), 22 temperate japonica (varieties typical of northern latitudes), and 6 aromatic (fragrant rice varieties). A plurality of evidence supports the independent domestication of the indica and aus groups from the japonica and aromatic groups beginning ~ 10,000 ybp from divergent populations of O. rufipogon [see ] (for alternate views see [32, 33]). An additional 12 tropical japonica cultivars were added that are representative of important U.S. founding lineages (i.e. Carolina Gold, Blue Rose; ) or have been extensively grown in the southern U.S. We included 50 O. rufipogon and 3 O. nivara (a species often considered an annual form of O. rufipogon ) accessions, sampled across their geographic range. More samples from India and China were included as these regions are the possible centers of origin for domesticated rice [20, 36]. Four accessions of African domesticated rice (O. glaberrima) and three of its wild progenitor (O. barthii) were included, as historical evidence suggests their introduction by early crop breeders and Africans brought to the U.S. as slaves . Similarly, two accessions of O. glumaepatula were included, as it occurs in the Caribbean and Central America, and may have contributed to the evolution of weedy rice. O. meridionalis, native to Australia and Oceania, was included as an outgroup, as phylogenetic evidence indicates that it is ancestral to other AA genome Oryza . DNA extraction and sequencing DNA was extracted from approximately 1 g of fresh leaf material from one plant per accession using a modified CTAB protocol [39, 40]. DNA concentrations were gel quantified and diluted to 2 ng/ul for sequencing. We amplified and sequenced a total of 48, ~ 400-600 bp, gene fragments, selected from a set of 111 randomly chosen sequenced tagged loci (STS) developed by . The 48 fragments were chosen to include ~4 loci per chromosome distributed on both chromosome arms (Additional file 3), without referencing diversity data or estimates of informativeness . DNA sequencing was carried out in Cogenics sequencing facilities (Houston, TX) as described in [30, 42]. Base pair calls, quality score assignment and construction of contigs were carried out as described in . Newly constructed contigs were added to existing alignments , and all subsequent analyses were based on the merged alignments. Further sequence alignment and editing were carried out with BioLign Version 2.09.1 (Tom Hall, NC State Univ.) as described in . New DNA sequences obtained for this study were deposited in GenBank under accession numbers GQ999668-GQ999777. The cytoplasm genomes of O. sativa cultivars from independent domestication events have been used to distinguish cultivar groups [15, 43, 44]. We assessed the origins of cytoplasm genomes in weedy rice using one chloroplast [Orf100, ], and two mitochondrial [SSV500 and SSV39, ] markers in all 58 weedy rice accessions, and 82 Oryza samples from our panel and those from for which DNA was available. These PCR-based markers amplify regions in the chloroplast or mitochondria containing large indels (69 bp to 500 bp), which can be visualized on a 1% agarose gel. Reaction conditions were as in and . We assumed maternal inheritance for cytoplasmic genomes, and combined the three markers into a single cytotype for analysis. We assessed population structure using the Bayesian clustering program InStruct , which is similar to the commonly used STRUCTURE , but was developed specifically for identifying population structure in inbreeding species. Cultivated and weedy Oryza tend to self-fertilize, while wild Oryza outcross more frequently (10 to 60%) [20, 26]. InStruct does not assume Hardy Weinberg equilibrium within populations, which can result in over-splitting in populations with a history of inbreeding [46, 48]. We created genotype data from phased haplotypes inferred for each STS fragment using PHASE 2.1 . We inferred population structure using two data sets: one included only U.S. weedy rice accessions (N = 58) and the second contained all individuals used in this study (N = 209). To determine the number of populations (K) that best approximates population structure, we tested a range of purposefully extreme K: K = 2 to 20 for the complete data set, and K = 2 to 15 for the weedy rice dataset. For each value of K, five replicates were carried out with an initial burn-in of 100,000 followed by 500,000 iterations using the "infer population structure and the individual selfing rates" option for final simulations. Sizes of burn-in and simulation number were found sufficient based on the Gelman-Rubin estimate of chain convergence for preliminary trial runs of various lengths (data not shown). All InStruct analyses were run on a computer cluster freely available at the Computational Biology Service Unit of Cornell University http://cbsuapps.tc.cornell.edu/InStruct.aspx. We used the Deviance Information Criterion (DIC) scores provided in the InStruct output to determine the number of populations that best fit our data. The K with the lowest average DIC score of the five replicates was considered to best describe population structure. For the model with the lowest mean DIC score, we checked for consistency in estimates of membership coefficients and split locations by estimating the correlation between ancestry membership matrices of replicate model runs with the R package simco . InStruct results were plotted using R v2.6.2 . Summary statistics for each STS locus and population of interest, including nucleotide diversity (θW and θπ), Tajima's D, polymorphic loci (P), number of segregating sites (S), and population unique alleles/haplotypes were calculated as described in . Site type determination was based on annotations of the O. sativa genome (TIGR v. 5 January, 2008). Levels of population differentiation were estimated using Fst, calculated after , using modifications of , which drops singleton SNPs. We calculated Fst for each STS fragment by taking the mean Fst of all SNPs per fragment, and then calculated the grand mean over all STS fragments, counting non-polymorphic fragments as zeros. Negative values of SNP Fst were changed to zero before taking means of individual SNPs per STS fragment . Demographic models of weedy rice evolution To infer the demographic history most consistent with the observed patterns of polymorphism in U.S. weedy rice, we used a full likelihood method, IMa (Isolation with Migration analytic; [54, 55]), and an approximate Bayesian computation (ABC) method that relies on summary statistics . A description of the demographic model and assumptions of the IMa analyses are provided in Additional File 4 and below we discuss details specific to our implementation. Three population pairs were considered, and each IMa analysis used only STS polymorphic within each population pair, as preliminary runs including invariant loci would not converge in a reasonable time. All pairs contained a similar number of polymorphic loci (27-32); thus exclusion of invariant loci does not preferentially affect parameter estimates in any group. We used a neutral mutation rate of 1 × 10-8 , derived from synonymous site divergence at the maize Adh loci to convert ML estimates to years and number of individuals. Both cultivated and weedy rice are, on average, annual plants under field conditions due to harvesting and cultivation practices , and we assumed a generation time of one year. Note that excluding monomorphic STS effectively increases the baseline mutation rate by ~1.6 (48/30), but this value is within error ranges of mutation range estimates, and does not affect scaling of parameters across groups. For all runs, we assumed that migration between populations was symmetrical, and set the maximum prior for population sizes to be equal. For final runs, we used a burn-in of 5,000,000 and recorded simulations for an additional 5,000,000 iterations using 10 chains and a two-step geometric heating scheme. To check for convergence, we ran each parameter set three times with a different starting random seed. IMa command lines were: ima -b 5000000 -l 50000 -m1 25 -m2 25 -f g -n 10 -g1 0.7 -g2 0.8 -p345 -q1 5 -k 3 -t 5 -s12307. We assumed that the population size of the progenitor of weedy rice has remained constant and set ηc equal to ηp for the duration of an individual simulation. Priors for ηc were based on the ratio ηc/4N and ranged from 0.1 to 0.7. These limits were based on the observed ratio of silent site θw, crop/θw,O. rufipogon. Priors for the current and bottleneck population size of the weed were based on the ratios ηr/ηc, and ηb/ηr, and ranged from 0 - 1 and 0-ηr respectively. Priors for time of population expansion (τg), founding in the U.S. (τf), and time of divergence (τs) were based on the known history of cultivated rice in the U.S. and timing of domestication. The upper limit for τg was chosen to coincide with the rapid expansion of cultivated rice, which began around 1870 in the southern rice belt. Similarly, τf was assumed to have occurred after cultivated rice was introduced into the U.S. and was constrained to be less than 400 years ago. Priors for τs ranged from τf to 50,000 ybp, and were chosen to be consistent with divergence occurring prior to domestication (τs = 12,000-50,000), post domestication in Asia (τs ≤ 12,000), and at the time of founding in the U.S. (τs = τf). A grid of prior values for the three timing parameters and ηc was generated, and the MS command line and further details on parameter ranges are given in Additional file 4. Summary statistics and observed data were calculated using data pooled from all 48 STS fragments [after 30]. We chose summary statistics shown to be sensitive (correlated) to changes in population growth and timing of divergence . These statistics also illustrate a key pattern observed in the data: that weedy rice groups contained a subset of genetic diversity present in putative ancestral populations (see results). We used eight statistics: θπ for both populations combined, the number of segregating, fixed, and private sites in weedy populations and their putative cultivated progenitors, and the number of shared sites between weeds and their putative progenitors. A similar set of summary statistics were used to infer demographic history in Zea . We employed a similar rejection approach as in [35, 65] and used the proportion of accepted simulations to calculate the approximate likelihood for a given demographic scenario. For each of the scenarios described above, we performed ~850,000 simulations. All processing and analysis of MS output were performed using R. The 48 sequenced STS ranged in aligned length from 400 to 921 base pairs (bp) over all accessions, for a total of ~24,145 bp aligned sequence per accession. We observed 827 SNPs in our entire dataset. Thirty-three SNPs had more than two alleles, primarily (73%) due to alternative states present in the outgroup species (O. barthii or O. meridionalis). These SNPs were excluded from analyses when occurring in targeted groups. Insertions and deletions (indels) were not used in haplotype determination or calculation of summary statistics (unless segregating sites occurred within an indel, which was rare). Heterozygotes were observed almost exclusively in O. rufipogon, and only two weedy rice and four cultivated O. sativa accessions had heterozygous sites. Cytoype frequency in weedy rice populations and potential sources in Oryza U.S. weedy rice population structure Oryza population structure To identify potential source(s) for U.S. weedy rice within Oryza, we used InStruct and a dataset that included all accessions in our panel (n = 209). The best fitting model contained nine populations (K = 9) (Figure 3B, Additional files 2 and 5). Cluster membership was generally consistent with previous research [30, 66]. InStruct identified O. sativa varieties aus, indica, tropical japonica and temperate japonica as distinct populations; however, our dataset lacked resolution to differentiate tropical japonica and aromatic accessions. The fourteen U.S. cultivars included in this study clustered with tropical japonica, as expected, and historic and modern cultivars were not differentiated. Approximately four clusters were observed within the wild ancestor of cultivated rice, O. rufipogon although most individuals appeared to be admixtures (Figure 3B). Many O. rufipogon individuals shared some ancestry with indica, but only five had membership coefficients greater than 50%. None of these were indicated as hybrids in the passport data available, and admixture may be due to shared ancestry, rather than recent hybridization. Consistent with previous research [20, 67, 68] no distinct O. nivara cluster separate from O. rufipogon was observed. African cultivated rice, O. glaberrima, and its progenitor, O. barthii, formed a distinct cluster, as did the two O. meridionalis samples. O. glumaepatula samples, on the other hand, clustered with three O. rufipogon and one O. nivara (Figure 3B, Additional file 2). Origins of U.S. weedy rice populations To determine the putative progenitors of U.S. weedy rice, we used the results of the two InStruct analyses, combined with the genotyping results for the three-cytoplasm markers. All of the SH individuals identified by InStruct (Figure 3A) cluster with indica when all samples are used (Figure 3B). All SH accessions had the same cytotype, which was also the most frequent in indica (60%) and O. rufipogon (53%) (Table 1), and was found in all of the O. rufipogon and O. nivara accessions that shared greater than 50% membership with indica (Additional file 2). Both black hulled weedy rice groups, BHA1 and BHA2, cluster primarily with aus and are not differentiated in the InStruct analysis that included all individuals (Figure 3B). Interestingly, the most frequent BHA1 (60%) and BHA2 (71%) cytotype did not occur in our aus sample, but is most common in tropical japonica (63%), and rare in indica (20%) and O. rufipogon (7%) (Table 1). However, two other cytotypes found in BHA1 and BHA2 were also found at high frequency in aus. Two BHA1 individuals and an O. rufipogon accession from India shared a cytotype that was absent in all other accessions (Additional file 2). The InStruct analyses suggest that the BRH population is either the result of hybridization between indica and aus, the SH and BHA weedy groups, indica and BHA, or aus and SH (Figure 3A and 3B). The BRH group contained a subset of the diversity found in the SH and BHA groups (10 of the most frequent STS haplotypes [MFH] in BRH were exclusive to BHA1 and BHA2, and six to SH; the remaining 32 were common to all weedy populations) consistent with hybridization among weedy groups in the U.S. All BRH individuals have the same cytotype as SH weeds, suggesting a maternal SH lineage. No heterozygotes were observed, which would be expected from early generation hybrids; however, heterozygosity may have been affected by selfing at the USDA stock center. InStruct results also indicate that hybridization between tropical japonica varieties grown in the U.S. and weedy rice has occurred. Population MXSH contains two individuals that share genetic membership with both indica/SH and tropical japonica (Figure 3B). The MXSH population is also notable in that weedy rice is likely the paternal rather than maternal parent, as observed cytotypes are absent from SH weeds, but occur in tropical japonica (Additional files 1 and 2, Table 1). Individuals in the MXBH group were identified as admixtures between aus/BHA and tropical japonica (Figure 3B). Both accessions in MXBH have the same cytotype (Additional file 1), which is absent in aus, but found in BHA groups and tropical japonica. Outside of the MXSH and MXBH populations, only one accession shared membership with tropical japonica (Figure 3B). Three of the five putative hybrids we identified were listed as suspected crosses based on morphological observations made at the time of collection (Additional file 1). Three modern U.S. cultivars (M202, Bengal, and Palmyra) appear as admixtures of temperate and tropical japonica in our analyses, in agreement with known pedigree data. This suggests our data is sufficient for identifying relatively advanced generation hybrids and supports our designation of weedy hybrids. Genetic diversity in weedy rice Mean diversity measures for 48 STS loci U.S. weedy rice populations θ W per Kb θπ per Kb # of polymorphic STS (all sites) # of polymorphic STS (silent sites) In general, U.S. weedy rice groups contain a subset of diversity observed in their most closely related cultivated O. sativa populations. SH weedy rice contains only ~30% of the silent site variation found in indica, while the BHA1 and BHA2 groups harbor between 50-67% of the variation found in aus. For a majority of the STS fragments, weedy rice groups and putative progenitor shared the same MFH (83% of STS fragments in indica and 73% of STS fragments in aus). We did not observe high frequency or specific haplotypes that would suggest weedy rice is a product of recent hybridization with O. rufipogon. Mean and median STS F st between U.S. weedy populations and putative Oryza progenitors (0 - 0.56) (0 - 0.83) (0 - 1) (0 - 1) (0 - 0.423) (0 - 0.98) (0 - 1) (0 - 1) (0 - 0.428) (0 - 1) (0 - 0.217) (0 - 1) (0 - 0.407) (0 - 0.407) Estimates of demographic parameters Rescaled ML estimates and 90% posterior density intervals (HPD) of demographic parameters for three population pairs N e1 a N e2 a N eA b (1,483 - 4,450) (2,472 - 12,854) (4,3013 - 166,613) (3,975 - 27,829) (299 - 1,897) (9,487 - 30,458) (36,548 - 244,662*) (2,016 - 11,592) (605 - 241,880) IMa-based estimate of divergence time between aus and indica was ~6,047 ybp, (Table 4, Additional file 6), with a wide HPD interval (605 to 241,880 ybp). Divergence time estimates for SH from indica (~31,995 ybp) and BHA1 from aus (~9,939 ybp) predate the introduction of cultivated rice to the U.S. (~1690's), and its establishment in the southern rice belt (>150 years). However, confidence HPD intervals for all estimates are very large and overlap (Table 4, Additional file 7). Obtaining estimates of migration between populations from our IMa runs was problematic. Initial runs of models that did not include migration, under the assumption that gene flow between weeds in the U.S. and cultivars in Asia is unlikely, did not converge. Including migration improved estimates for remaining parameters. However, for all population pairs, estimates of migration are not reliable, as posterior distributions did not converge within prior ranges (Additional file 8), suggesting that, under short evolutionary time scales, with this dataset, IMa may confound recent divergence with ongoing gene flow. Approximate likelihoods for divergence scenarios Timing of divergence Introduction to U.S.b Prior to domesticatione BHA1 - aus SH - indica The evolutionary origins of U.S. weedy rice Current weedy rice populations in the U.S. are morphologically diverse, and we find that population structure in weedy rice is correlated with hull morphology. The two major weedy rice groups occurring in the U.S. are most closely related to the exotic cultivated rice varieties, aus and indica. Our data thus provides strong evidence that weedy con-generics can evolve directly from domesticated backgrounds, a result that has been little reported/confirmed to date [5, 9, 18]. Similar to previous morphometric and molecular marker studies [13, 14, 16], weedy rice individuals that have straw hulls and no awns (SH) cluster primarily with O. sativa indica (Figure 3). Other hull morphologies, including black and straw hull with awns (BHA1, BHA2), cluster primarily with O. sativa aus (Figure 3), a relationship also recently detected with microsatellites . Unlike previous microsatellite based studies [13, 14], we did not find conclusive evidence for contribution of wild Oryza species to U.S. weedy rice. Although some O. rufipogon and O. nivara accessions clustered with indica and SH weedy rice (Figure 3), only two out of 51 accessions had the same level of shared genetic membership (>80%) with SH weedy rice as all indica accessions. Moreover, accessions of O. rufipogon and O. nivara that clustered with SH groups in our analysis do not share hull morphology or any unique alleles with weedy accessions, unlike indica, supporting shared ancestry as the most likely explanation for the clustering pattern. Black hulls and awns are a common phenotype in O. rufipogon and O. nivara, but no accessions from this group clustered with BHA weedy rice. Aus cultivars, however, often have dark hulls and awns. The results of our clustering analyses combined with morphological data suggest that the main U.S. weedy rice groups evolved primarily from aus and indica genetic backgrounds. Although clustering of weedy rice groups with cultivated relatives could also be due to common descent from a shared ancestral founding gene pool, the pattern of shared polymorphisms among weedy and cultivated groups is more consistent with direct descent from domesticated ancestors. Most of the SNPs found in the SH and BHA groups are a subset of those found in indica and aus, respectively (Additional file 6). This is particularly striking for the SH group, which contains only one non-singleton SNP not also found in indica, fewer than what it has with respect to O. rufipogon (Additional file 6). Moreover, in each main weedy rice group (SH and BHA1), the most frequent haplotype (MFH) at each STS locus was most often the MFH observed in its putative progenitor group (data not shown). The greater divergence and number of private SNPs seen in the BHA groups with respect to aus, as well as differences in some cytotypes, however, suggest that demographic histories (e.g. magnitude of bottleneck, founding events, time of introduction) differ between the BHA and SH groups. The close relationship of weedy rice with cultivated groups not grown in the U.S. suggests that both major weed groups were introduced either as stock seed contaminants or escaped breeding material. Although the majority of rice grown commercially in the U.S is tropical japonica [27, 39], extensive opportunities for the intentional and unintentional introduction of Oryza germplasm have occurred. During the establishment of rice industry in the southern rice belt (~1860-1900), rice germplasm collected by the USDA was given to farmers directly for testing , potentially facilitating the spread and escape of weedy rice. During this time, farmers also commonly purchased seed from outside the U.S., which likely included representatives of all major O. sativa varieties. The timing of weed evolution If U.S. weedy rice groups originated from cultivated ancestors, it is of interest to determine whether divergence of the weeds occurred prior to or concurrent with their introduction to the U.S., and how divergence is related to the timing of domestication. We first estimated divergence time between aus and indica cultivar groups, which likely stem from the same domestication event. The ML estimate of ~6,000 years (Table 4) is reasonable, given that the commonly accepted time for domestication is ~10,000 years ago; however, confidence intervals for the estimate are large, consistent with the difficulty in estimating population parameters for very recent events . In contrast, IMa estimates for divergence of weedy groups from their cultivated relatives were surprisingly ancient, although, again, confidence intervals were very large. ABC coalescent simulations, on the other hand, supported a very recent SH-indica divergence, within the past 100 years, but divergence for BHA1 and aus occurring within the past 7,000 years (Table 5). We considered two possible explanations to account for the discrepancy between SH-indica divergence time estimates obtained in each of our analyses. First, contribution of other groups to the weedy rice gene pool or unsampled variation in the putative progenitor could violate IMa assumptions that gene flow occurs only between population pairs, inflating estimates of divergence time. However, SH weedy rice contains a subset of the nuclear and cytoplasmic genetic diversity in indica (Table 2, Additional file 6); the only non-singleton private SNP in SH occurs at low frequency (13%), and was not found in any other Oryza group other than BHA weeds. Thus, introgression or incomplete sampling of indica diversity is an unlikely explanation of divergence estimates. Alternatively, IMa divergence time estimates may be affected by the combination of an extremely strong bottleneck coupled with very recent divergence between indica and SH. Although, the IMa model is particularly suited to recently separated populations that are not under equilibrium , simulation studies to test sensitivity of IMa to extremely recent splits with no accumulation of divergent mutations have not been done (J. Hey, personal comm.). Both demographic analyses and the low levels of observed polymorphism support a very strong bottleneck for SH weedy rice (Tables 2 and 4, Figure 5). Since few lineages seem to have founded this weedy group, the divergence times obtained may represent the coalescence of these founders with the entire indica gene pool, and not the more recent split between weedy rice and progenitor. Observed patterns of polymorphism support the more recent divergence time estimated by ABC: SH either diverged from indica concurrent with its establishment in the U.S. (maximum of 400 ybp), or within 1000 ybp (Table 5). Both demographic analyses suggested an older divergence of BHA1 from its putative aus progenitor, either after domestication, or close to the timing of domestication (Tables 4 and 5). In addition to one fixed site, the BHA1 group contains some private SNPs and cytotypes not observed in our aus sample (Table 2, Additional file 6). These patterns of polymorphism may indicate introgression of other Oryza, or incomplete sampling of aus diversity, which could have an effect on estimates of divergence time. Nuclear SNPs observed in BHA1 but not aus occurred at moderate frequencies (average 52%) and were also relatively frequent in other groups such as O. rufipogon, O. nivara, and tropical japonica, supporting the possibility of introgression. However, our Instruct analysis did not detect contribution of other Oryza groups to BHA weedy rice, and we have no a priori reason to believe our aus sampling did not capture the genetic diversity present in this geographically limited group. Given the shared ancestry of all cultivars, weeds, and O. rufipogon, BHA1 private alleles shared with other groups could be a result of lineage sorting since divergence from aus. Interestingly, the single fixed SNP differentiating BHA groups from aus was not observed in any other Oryza group, supporting longer divergence between BHA weedy rice and its putative progenitor. Our estimates suggest that the founders of the BHA1 weedy rice group split from their cultivated relatives several thousand years ago and therefore may have existed as weeds prior to their introduction to the U.S. The ABC analysis marginally supported the introduction of BHA weeds before SH, which is contrary to expected based on historical records; black hull awned plants were not recorded until the 1920's, and anecdotal evidence attributes their origin to a cultivar introduced to Louisiana and abandoned due to excessive shattering . The role of hybridization in U.S. weedy rice In addition to multiple introductions, our results suggest that hybridization and introgression occurring post-founding have contributed to the development of morphological diversity in weedy rice populations. The BRH population is most probably a product of hybridization occurring in the U.S. between SH and BHA weedy rice (Figure 3). No indica or aus are grown in the U.S., and therefore, an additional introduction of a weedy or cultivated group to the country would be required if BRH were the result of hybridization between indica-aus, indica-BHA, or SH-aus. The high estimates of Fst between SH and BHA1 (~0.32) indicates that gene flow is relatively infrequent between weedy groups. Prior research has suggested non-overlapping flowering time, high selfing rates, and height differences as possible mechanisms restricting gene flow between straw-hull and black-hull awned weedy types . Evidence that tropical japonica cultivars grown in the U.S. have contributed to genomic backgrounds of weeds in our sample set is limited to a few individuals in the MX populations (Figure 3, Additional file 1). Several studies have observed both pre- and post-zygotic reproductive isolating barriers in experimental crosses between tropical japonica and weedy rice [16, 25]. The existence of some barrier to gene flow is supported by the lack of more extensive hybridization in our sample. However, the barrier is "leaky," as both BHA and SH-tropical japonica hybrids are found (Figure 3B). Additionally, the maternal lineage of at least one hybrid was consistent with weedy rice being the paternal parent, and therefore, gene flow from the weed to the crop could be an alternative pathway for weed evolution. Although infrequent, the fact that hybridization occurs at all presents a challenge to the management and continued use of cultivars containing traits suspected to increase weed fitness, such as herbicide resistance. Our characterization of genome-wide patterns of SNP variation in U.S. weedy rice demonstrate that multiple introductions, bottlenecks, and hybridization among introduced lineages have been important in the evolution of weedy rice, and that different evolutionary histories can lead to similar weedy lifestyles. Contrary to previous studies, we do not find evidence that wild Oryza contributed directly to the genetic background of U.S. weedy rice groups. Together these results provide strong evidence that agricultural weeds can evolve directly from domesticated backgrounds despite experiencing significant bottlenecks and loss of genetic diversity. The absence of any tropical japonica weedy types in the U.S. is puzzling, as these cultivars are considered better adapted to the temperate conditions of the Southern U.S. than indica and aus cultivars. Based on typical descriptions of aus and indica, it would seem that increased tolerance to cold, high dormancy, easy shattering, and lack of photoperiod sensitivity (though this trait is found in aus) may have evolved in U.S. weedy rice populations. It will be interesting to determine whether trait evolution supports pre-existence of the groups as weeds in Asia, or evolution of weediness upon introduction to the U.S. agroecosystem. We are grateful to D. Gealy for providing weedy rice accessions and S.R. McCouch for providing several cultivated rice accessions used in this study. We also thank members of the Caicedo, Olsen labs, and anonymous reviewers that provided comments that much improved that manuscript. This project was funded by a grant from the U.S. National Science Foundation Plant Genome Research Program (DBI-0638820) to ALC, KMO and YJ. - Harlan JR: Crops and Man. 1992, Madison, Wisconsin: American Society of AgronomyGoogle Scholar - Ellstrand NC, Prentice HC, Hancock JF: Gene flow and introgression from domesticated plants into their wild relatives. Annual Review of Ecology and Systematics. 1999, 30: 539-563. 10.1146/annurev.ecolsys.30.1.539.View ArticleGoogle Scholar - Holm LG, Plucknett DL, Pancho JV, Herberger JP: The world's worst weeds. 1977, Honolulu (USA): University Press of HawaiiGoogle Scholar - Dewet JMJ, Harlan JR: weeds and domesticates - evolution in man-made habitat. Econ Bot. 1975, 29 (2): 99-107. 10.1007/BF02863309.View ArticleGoogle Scholar - Gressel J: Introduction: the challenges of ferality. Crop Ferality and Volunteerism. Edited by: J G. 2005, CRC Press, 1-9.View ArticleGoogle Scholar - Anderson E: Plants, Man and Life. 1952, Boston: Little, BrownGoogle Scholar - Ellstrand NC: Dangerous liaisons?: when cultivated plants mate with their wild relatives. 2003, Baltimore: Johns Hopkins PressGoogle Scholar - Jarvis DI, Hodgkin T: Wild relatives and crop cultivars: detecting natural introgression and farmer selection of new genetic combinations in agroecosystems. Molecular Ecology. 1999, 8 (12): S159-S173. 10.1046/j.1365-294X.1999.00799.x.View ArticleGoogle Scholar - Burger JC, Lee S, Ellstrand NC: Origin and genetic structure of feral rye in the western United States. Molecular Ecology. 2006, 15 (9): 2527-2539. 10.1111/j.1365-294X.2006.02938.x.View ArticlePubMedGoogle Scholar - Jasieniuk M, BruleBabel AL, Morrison IN: The evolution and genetics of herbicide resistance in weeds. Weed Science. 1996, 44 (1): 176-193.Google Scholar - Allston RFW: The rice plant. DeBow's Review I. 1846, 320-356. available online from U. MichiganGoogle Scholar - Dodson WR: Rice weeds in Louisiana. Lou Agric Exp Sta Bull. 1900, 61 (Part Ii):Google Scholar - Londo JP, Schaal BA: Origins and population genetics of weedy red rice in the USA. Molecular Ecology. 2007, 16 (21): 4523-4535. 10.1111/j.1365-294X.2007.03489.x.View ArticlePubMedGoogle Scholar - Vaughan LK, Ottis BV, Prazak-Havey AM, Bormans CA, Sneller C, Chandler JM, Park WD: Is all red rice found in commercial rice really Oryza sativa?. Weed Science. 2001, 49 (4): 468-476. 10.1614/0043-1745(2001)049[0468:IARRFI]2.0.CO;2.View ArticleGoogle Scholar - Suh HS, Sato YI, Morishima H: Genetic characterization of weedy rice (Oryza sativa L) based on morpho-physiology, isozymes and RAPD markers. Theoretical and Applied Genetics. 1997, 94: 316-321. 10.1007/s001220050417.View ArticleGoogle Scholar - Gealy DR, Tai TH, Sneller CH: Identification of red rice, rice, and hybrid populations using microsatellite markers. Weed Science. 2002, 50 (3): 333-339. 10.1614/0043-1745(2002)050[0333:IORRRA]2.0.CO;2.View ArticleGoogle Scholar - Delouche JC, Burgos NR, Gealy DR, de San Martín GZ, Labrada R, Larinde M, Rosell C: Weedy rices - origin, biology, ecology and control. Fao Plant Production And Protection Paper. 2007, 188:Google Scholar - Cao QJ, Lu BR, Xia H, Rong J, Sala F, Spada A, Grassi F: Genetic diversity and origin of weedy rice (Oryza sativa f. Spontanea) populations found in North-eastern China revealed by simple sequence repeat (SSR) markers. Annals of Botany. 2006, 98 (6): 1241-1252. 10.1093/aob/mcl210.PubMed CentralView ArticlePubMedGoogle Scholar - Baki BB, Chin DV, Mortimer M, (eds): Wild and Weedy Rice in Rice Ecosystems in Asia - A Review. Los Baños, Philippines. 2000Google Scholar - Oka HI: Origin of Cultivated Rice. 1988, Tokyo: Japan Scientific Societies Press and Elsevier Science PublishersGoogle Scholar - Morishima H, Sano Y, Oka HI: Evolutionary studies in cultivated rice and its wild relatives. Oxford Surveys in Evolutionary Biology. 1992, 8: 15-184.Google Scholar - Oka HI, Chang WT: hybrid swarms between wild and cultivated rice species, Oryza perennis and O sativa. Evolution. 1961, 15 (4): 418-430. 10.2307/2406310.View ArticleGoogle Scholar - Kiang YT, Antonovics J, Wu L: The extinction of wild rice (Oryza perennis formosana) in Taiwan. Journal of Asian Ecology. 1979, 1: 1-9.Google Scholar - Majumder ND, Ram T, Sharma AC: Cytological and morphological variation in hybrid swarms and introgressed population of interspecific hybrids (Oryza rufipogon Griff × Oryza sativa L) and its impact on evolution of intermediate types. Euphytica. 1997, 94 (3): 295-302. 10.1023/A:1002983905589.View ArticleGoogle Scholar - Langevin SA, Clay K, Grace JB: the incidence and effects of hybridization between cultivated rice and its related weed red rice (Oryza-sativa L). Evolution. 1990, 44 (4): 1000-1008. 10.2307/2409561.View ArticleGoogle Scholar - Song ZP, Zhu WY, Rong J, Xu X, Chen JK, Lu BR: Evidences of introgression from cultivated rice to Oryza rufipogon (Poaceae) populations based on SSR fingerprinting: implications for wild rice differentiation and conservation. Evolutionary Ecology. 2006, 20 (6): 501-522. 10.1007/s10682-006-9113-0.View ArticleGoogle Scholar - Gealy DR, Yan WG, Eizenga G, Moldenhauer K, Redus M: Insights into the parentage of rice/red rice crosses using SSR analysis of U.S. rice cultivars and red rice populations. Rice Technology Working Group. 2004, 30:Google Scholar - Yu J, Hu SN, Wang J, Wong GKS, Li SG, et al: A draft sequence of the rice genome (Oryza sativa L. ssp indica). Science. 2002, 296: 79-92. 10.1126/science.1068037.View ArticlePubMedGoogle Scholar - Goff SA, Ricke D, Lan TH, Presting G, Wang RL, et al: A draft sequence of the rice genome (Oryza sativa L. ssp japonica). Science. 2002, 296: 92-100. 10.1126/science.1068275.View ArticlePubMedGoogle Scholar - Caicedo AL, Williamson SH, Hernandez RD, Boyko A, Fledel-Alon A, York TL, Polato N, Olsen KM, Nielsen R, McCouch S, et al: Genome-wide patterns of nucleotide polymorphism in domesticated rice. PLoS Genetics. 2007, 3: e163-10.1371/journal.pgen.0030163.PubMed CentralView ArticleGoogle Scholar - Sweeney M, McCouch S: The complex history of the domestication of rice. Annals of Botany. 2007, 100 (5): 951-957. 10.1093/aob/mcm128.PubMed CentralView ArticlePubMedGoogle Scholar - Vaughan DA, Lu BR, Tomooka N: The evolving story of rice evolution. Plant Science. 2008, 174 (4): 394-408.View ArticleGoogle Scholar - Gao LZ, Innan H: Nonindependent domestication of the two rice subspecies, Oryza sativa ssp indica and ssp japonica, demonstrated by multilocus microsatellites. Genetics. 2008, 179 (2): 965-976. 10.1534/genetics.106.068072.PubMed CentralView ArticlePubMedGoogle Scholar - Dilday RH: Contribution of ancestral lines in the development of new cultivars of rice. Crop Science. 1990, 30 (4): 905-911. 10.2135/cropsci1990.0011183X003000040030x.View ArticleGoogle Scholar - Zhu QH, Zheng XM, Luo JC, Gaut BS, Ge S: Multilocus analysis of nucleotide variation of Oryza sativa and its wild relatives: Severe bottleneck during domestication of rice. Molecular Biology and Evolution. 2007, 24 (3): 875-888. 10.1093/molbev/msm005.View ArticlePubMedGoogle Scholar - Chang T-T: The origin, evolution, cultivation, dissemination, and diversification of Asian and African rices. Euphytica. 1976, 25: 425-441. 10.1007/BF00041576.View ArticleGoogle Scholar - Carney JA: Black rice: the African origins of rice cultivation in the Americas. 2001, Cambridge, MA: Harvard University PressGoogle Scholar - Zhu QH, Ge S: Phylogenetic relationships among A-genome species of the genus Oryza revealed by intron sequences of four nuclear genes. New Phytologist. 2005, 167: 249-265. 10.1111/j.1469-8137.2005.01406.x.View ArticlePubMedGoogle Scholar - Gross BL, Skare KJ, Olsen KM: Novel Phr1 mutations and the evolution of phenol reaction variation in US weedy rice (Oryza sativa L.). New Phytologist. 2009, 184: 842-850. 10.1111/j.1469-8137.2009.02957.x.PubMed CentralView ArticlePubMedGoogle Scholar - Hillis DM, Maple BK, Larson A, Davis SK, Zimmer EA: Molecular Systematics. Edited by: Hillis DM, Moritz C, Maple BK. 1996, Sinauer, Sunderland, MA, 321-381.Google Scholar - Rosenberg NA, Li LM, Ward R, Pritchard JK: Informativeness of genetic markers for inference of ancestry. American Journal of Human Genetics. 2003, 73 (6): 1402-1422. 10.1086/380416.PubMed CentralView ArticlePubMedGoogle Scholar - Olsen KM, Caicedo AL, Polato N, McClung A, McCouch S, Purugganan MD: Selection under domestication: Evidence for a sweep in the rice Waxy genomic region. Genetics. 2006, 173 (2): 975-983. 10.1534/genetics.106.056473.PubMed CentralView ArticlePubMedGoogle Scholar - Sun CQ, Wang XK, Yoshimura A, Doi K: Genetic differentiation for nuclear, mitochondrial and chloroplast genomes in common wild rice (Oryza rufipogon Griff.) and cultivated rice (Oryza sativa L.). Theoretical and Applied Genetics. 2002, 104 (8): 1335-1345. 10.1007/s00122-002-0878-4.View ArticlePubMedGoogle Scholar - Chen WB, Nakamura I, Sato YI, Nakai H: Distribution of deletion type in cpDNA of cultivated and wild rice. Japanese Journal of Genetics. 1993, 68 (6): 597-603. 10.1266/jjg.68.597.View ArticleGoogle Scholar - Tian XJ, Zheng J, Hu SN, Yu J: The rice mitochondrial genomes and their variations. Plant Physiology. 2006, 140 (2): 401-410. 10.1104/pp.105.070060.PubMed CentralView ArticlePubMedGoogle Scholar - Gao H, Williamson S, Bustamante CD: An MCMC approach for joint inference of population structure and inbreeding rates from multi-locus genotype data. Genetics. 2007, 176: 1635-1651. 10.1534/genetics.107.072371.PubMed CentralView ArticlePubMedGoogle Scholar - Pritchard JK, Stephens M, Donnelly P: Inference of population structure using multilocus genotype data. Genetics. 2000, 155 (2): 945-959.PubMed CentralPubMedGoogle Scholar - Falush D, Stephens M, Pritchard JK: Inference of population structure using multilocus genotype data: Linked loci and correlated allele frequencies. Genetics. 2003, 164 (4): 1567-1587.PubMed CentralPubMedGoogle Scholar - Stephens M, Donnelly P: A comparison of Bayesian methods for haplotype reconstruction from population genotype data. American Journal of Human Genetics. 2003, 73: 1162-1169. 10.1086/379378.PubMed CentralView ArticlePubMedGoogle Scholar - Jones O: Simco: A package to import Structure files and deduce similarity coefficients from them. R package version 1.01. 2007Google Scholar - R Development Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing. 2008, R Foundation for Statistical Computing. Vienna, Austria, [http://www.R-project.org]Google Scholar - Weir BS, Cockerham CC: Estimating F-statistics for the analysis of population structure. Evolution. 1984, 38 (6): 1358-1370. 10.2307/2408641.View ArticleGoogle Scholar - Akey JM, Zhang G, Zhang K, Jin L, Shriver MD: Interrogating a High-Density SNP Map for Signatures of Natural Selection. Genome Research. 2002, 12 (12): 1805-1814. 10.1101/gr.631202.PubMed CentralView ArticlePubMedGoogle Scholar - Hey J, Nielsen R: Integration within the Felsenstein equation for improved Markov chain Monte Carlo methods in population genetics. Proceedings of the National Academy of Sciences. 2007, 104 (8): 2785-2790. 10.1073/pnas.0611164104.View ArticleGoogle Scholar - Hey J, Nielsen R: Multilocus methods for estimating population sizes, migration rates and divergence time, with applications to the divergence of Drosophila pseudoobscura and D-persimilis. Genetics. 2004, 167 (2): 747-760. 10.1534/genetics.103.024182.PubMed CentralView ArticlePubMedGoogle Scholar - Beaumont MA, Zhang W, Balding DJ: Approximate Bayesian Computation in Population Genetics. Genetics. 2002, 162: 2025-2035.PubMed CentralPubMedGoogle Scholar - Ma JX, Bennetzen JL: Rapid recent growth and divergence of rice nuclear genomes. Proceedings of the National Academy of Sciences of the United States of America. 2004, 101 (34): 12404-12410. 10.1073/pnas.0403715101.PubMed CentralView ArticlePubMedGoogle Scholar - Gaut BS, Morton BR, McCaig BC, Clegg MT: Substitution rate comparisons between grasses and palms: synonymous rate differences at the nuclear gene Adh parallel rate differences at the plastid gene rbcL. Proceedings of the National Academy of Sciences. 1996, 93: 10274-10279. 10.1073/pnas.93.19.10274.View ArticleGoogle Scholar - Wright SI: The effects of artificial selection on the maize genome. Science. 2005, 310 (5745): 54-54. 10.1126/science.310.5745.54.View ArticleGoogle Scholar - Innan H, Kim Y: Pattern of polymorphism after strong artificial selection in a domestication event. Proceedings of the National Academy of Sciences of the United States of America. 2004, 101 (29): 10667-10672. 10.1073/pnas.0401720101.PubMed CentralView ArticlePubMedGoogle Scholar - Hudson RR: Generating samples under a Wright-Fisher neutral model of genetic variation. Bioinformatics. 2002, 18 (2): 337-338. 10.1093/bioinformatics/18.2.337.View ArticlePubMedGoogle Scholar - Ross-Ibarra J, Wright SI, Foxe JP, Kawabe A, DeRose-Wilson L, Gos G, Charlesworth D, Gaut BnS: Patterns of Polymorphism and Demographic History in Natural Populations of Arabidopsis lyrata. PLoS ONE. 2008, 3 (6): e2411-10.1371/journal.pone.0002411.PubMed CentralView ArticlePubMedGoogle Scholar - Machado CA, Kliman RM, Markert JA, Hey J: Inferring the history of speciation from multilocus DNA sequence data: the case of Drosophila pseudoobscura and close relatives. Molecular Biology and Evolution. 2002, 19: 472-488.View ArticlePubMedGoogle Scholar - Ross-Ibarra J, Tenaillon M, Gaut BS: Historical Divergence and Gene Flow in the Genus Zea. Genetics. 2009, 181 (4): 1399-1413. 10.1534/genetics.108.097238.PubMed CentralView ArticlePubMedGoogle Scholar - Weiss G, von Haeseler A: Inference of population history using a likelihood approach. Genetics. 1998, 149: 1539-1546.PubMed CentralPubMedGoogle Scholar - Garris AJ, Tai TH, Coburn J, Kresovich S, McCouch S: Genetic structure and diversity in Oryza sativa L. Genetics. 2005, 169 (3): 1631-1638. 10.1534/genetics.104.035642.PubMed CentralView ArticlePubMedGoogle Scholar - Zhou HF, Zheng XM, Wei RX, Second G, Vaughan DA, Ge S: Contrasting population genetic structure and gene flow between Oryza rufipogon and Oryza nivara. Theoretical and Applied Genetics. 2008, 117 (7): 1181-1189. 10.1007/s00122-008-0855-7.View ArticlePubMedGoogle Scholar - Lu BR, Zheng KL, Qian HR, Zhuang JY: Genetic differentiation of wild relatives of rice as assessed by RFLP analysis. Theoretical and Applied Genetics. 2002, 106 (1): 101-106.PubMedGoogle Scholar - Nordborg M, Donnelly P: The coalescent process with selfing. Genetics. 1997, 146 (3): 1185-1195.PubMed CentralPubMedGoogle Scholar - Knapp SA: The present status of the rice culture in the United States. USDA Botanical Bulletin. 1899, 22:Google Scholar - Templeton AR: Population Genetics and Microevolutionary Theory. 2006, Hoboken, NJ: John Wiley & SonsView ArticleGoogle Scholar This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
<urn:uuid:8ff3b7dd-0946-4f3b-ac27-67ce0a12dfc7>
CC-MAIN-2017-43
https://bmcevolbiol.biomedcentral.com/articles/10.1186/1471-2148-10-180
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826283.88/warc/CC-MAIN-20171023183146-20171023203146-00162.warc.gz
en
0.882062
12,969
2.53125
3
Most of us aspire to have a lean, well toned body. However, before setting out to achieve this goal, you need to focus on your cardio vascular and respiratory function, commonly referred to CV or aerobic exercise, by developing a rudimentary fitness base and after that you can progress in to body toning and sports specific activity. Aerobics can be defined as a physical activity that uses and supplies oxygen + fat, utilizing it for energy production in a specific time frame! Out of many energy production systems in the human body, Aerobics falls under the endurance system or aerobic glycolysis. For many, “aerobics” means attending an aerobic class in order to get an effective workout. However, there are many other alternative forms of effective aerobic exercises such as: - Cycling (indoor or outdoor) - Dancing (especially Latin American) - Walking your pet - Playing a sport with your kids After a period of participation some might feel stagnated with their current exercises. At this point, an option might be to join a group class, which might also include many exciting aerobic methods which are evolving around the world apart from traditional aerobics, such as: - Latin Dance based classes - Aqua Aerobics - Step Aerobics - Boxing or Kick boxing based - Group Rowing - Outdoor activity By attending a class you are more likely to be motivated, as a good instructor can lead a class safely and effectively in a fun filled environment and you also get to make new friends. Remember to select a mode of exercise which suits your fitness level and personal preference. Important points to remember: - Do a fitness/health assessment before starting an appropriate program - Gradual warm up for 10 minutes and 20-30 minutes aerobic session - Maintain your target heart rate (Ask your Trainer/Instructor/Doctor) - Proper clothing and shoes for appropriate surface - If you develop any pain or discomfort inform your (Trainer/Instructor/Doctor) - Gradual progression - Appropriate cool down - Aerobics/CV Training should be done at least 3 times a week - Increase lung capacity - Increase circulation - Lowers fat level - Burns more calories - Lowering blood pressure (due to efficient heart function) - Faster recovery from strenuous activity - Improves muscle and skeletal tone With this basic knowledge, your next walk or aerobic class will be something to look forward to, – as aerobic exercise is one of the best natural medicines you can give your heart and lungs! Fitness Consultant & Performance Coach Read more about Ranil Harshana
<urn:uuid:4e359c13-4d48-4620-b8eb-25956a237800>
CC-MAIN-2021-39
https://livefitonline.com/press-news/benefits-of-aerobics/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00420.warc.gz
en
0.911963
551
2.875
3
Relatively common, Hyperpigmentation is areas of the skin that have become darker than the surrounding skin colour. These patches can differ in size from very small to larger areas, are light brown to black in colour and can affect any skin colour. Affecting both men and women, there are many types of Hyperpigmentation, however, each type is always flat, never raised and tends to get worse with sun exposure. Types of Hyperpigmentation Hyperpigmentation is a broad term for darker patches / spots on the skin, however, there are varying types of hyperpigmentation. Sun Spots / Sun Damage Also known as ‘Liver Spots’ or ‘Age Spots’, Sun Spots develop on areas of the skin that have been more exposed to the sun, such as the face, shoulders, back and hands. Sun Spots are common in adults over 50 years old, although they can form earlier depending on the amount of sun exposure the skin has had. Affecting both men and women, Sun Spots vary in size and although they are also known as ‘Liver Spots’, they have nothing to do with the liver. Post-Inflammatory Hyperpigmentation (PIH) Hyperpigmentation of the skin caused by inflammation typically from acne, atopic dermatitis or psoriasis tends to appear after the inflammation has healed. Affecting the face and body of both men and women, post-Inflammatory hyperpigmentation can affect any skin type, although is more prevalent in darker skin. This type of hyperpigmentation can be pink, red, brown or black in colour. Often referred to as ‘Chloasma’ or ‘The Mask of Pregnancy’, Melasma tends to appear across the upper lip, nose, cheeks and forehead. This type of hyperpigmentation is more common in women and is often caused by natural hormonal changes or that from medication. Why does Hyperpigmentation occur? Hyperpigmentation occurs when excess, or overproduction of melanin (pigment) is produced in certain areas of the skin. What causes Hyperpigmentation? Just as there and different types of Hyperpigmentation, there are varying causes also. Excessive exposure to the sun is the number one cause of Hyperpigmentation as sunlight triggers the production of melanin. Melanin being the natural pigment that gives human skin, hair and eyes their colour and is responsible for tanning. When the skin is exposed to sunlight more Melanin is produced as it’s the skin’s natural defence system to protect against the harmful UV rays. Once there are Hyperpigmentation spots and patches on the skin, exposure to the sun can make these areas and spots darker. Skin Injury / Inflammation Injury to and inflammation of the skin such as a burn, acne, eczema or psoriasis can leave the skin with a dark spot or patch of Hyperpigmentation after the wound has healed. This is due to the skin cells producing more melanin when the skin is damaged. Pregnancy and hormonal drugs like birth control and hormone replacement are the main causes of the type of Hyperpigmentation named Melasma. The exact cause of Melasma is still unknown but it thought to be linked with the female sex hormones oestrogen and progesterone when they work to stimulate the overproduction of melanin when skin is exposed to the sun. Hyperpigmentation is also a side effect of certain hormone treatments, chemotherapy drugs, antibiotics and various other medications. Where can Hyperpigmentation appear? Hyperpigmentation can appear anywhere on the body, however, it usually tends to appear in areas that have been more exposed to the sun. For example, the face, neck, chest and hands. Although as previously mentioned, not all Hyperpigmentation is caused by sun exposure. Can you treat Hyperpigmentation? Most types of Hyperpigmentation responds well to treatment. The type of treatment used is dependent upon the type of Hyperpigmentation, the skin type, the severity of the damage and how much downtime, if any that you are willing to take. This is something that can be discussed with a doctor, dermatologist or an aesthetics clinical nurse where a treatment plan will be created bespoke for you, your skin and requirement. Below are some of the treatment options available for Hyperpigmentation. - Chemical Peels (including The Perfect Peel) - Medical Skin Needling - Intense Pulsed Light Therapy (IPL) - LED Light Therapy Can you prevent Hyperpigmentation? You can help to prevent Hyperpigmentation by limiting the time you spend in the sun and protect your skin from the harmful UV rays by using a broad-spectrum sun cream with a high SPF. Not only will this help to prevent Hyperpigmentation, it will also help to stop existing dark patches and dark spots of Hyperpigmentation getting darker.
<urn:uuid:e58a657c-60d0-435a-a80c-dad41107b0ec>
CC-MAIN-2019-51
https://theperfectpeel.co.uk/what-is-hyperpigmentation/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540486979.4/warc/CC-MAIN-20191206073120-20191206101120-00385.warc.gz
en
0.933899
1,054
3.3125
3
Cities wanting to remove the guesswork from solar power installations are turning to friendlier technology for citizens. Since typing a street address into a Web site is all it takes to determine how much solar power can be obtained from a rooftop installation, who wouldn't take a look? An exemplar is the San Francisco Solar Map that lets residents view buildings that are equipped with solar power. Users also can type their address into the Solar Map site to get an analysis of how much solar power their roof could harness. "We wanted something that would help people, that would break down some myths about installing solar in San Francisco, and then offer a tool to people who were interested in solar but didn't really know how to take the first step," said Johanna Partin, renewable energy program manager of the San Francisco Department of the Environment. San Francisco has set a lofty goal: 10,000 roofs equipped with solar power by 2012. As of press time, 871 of the city's roofs had solar panels installed. The Solar Map's goal is to offer residents a simple tool to learn about solar installation. The department envisioned a platform similar to Google Earth, so residents could zoom into the view of their building, according to Partin. In spring 2007, San Francisco presented the idea to CH2M HILL - an engineering, consulting and construction company. "Mayor [Gavin] Newsom was very interested in promoting solar, and they said, 'Can we quickly come up with a solution that allowed business owners and residents of San Francisco to make an assessment of the solar potential of their building?'" said Dave Hermann, client solutions director of CH2M HILL. "And that was really the genesis of the idea of the Solar Map." The Solar Map combines aerial photography, GIS software and data supplied by the client. "It's a combination of parcel data ... and the tax assessor's database, which then gets the size of each building and the number of floors which we used to come up with an algorithm that estimates the photovoltaic potential for a rooftop," said Ryan Miller, lead technologist for solar mapping initiatives for CH2M HILL. When someone types a street address into the Web site, the technology identifies objects on the roof that cast shadows, such as HVAC units, skylights, perimeter walls or an adjacent building that's taller. "It takes out the unusable space," Partin said. "It takes out the north-facing side of the roof if it's a pitch roof. It takes out the shaded areas; it takes out roof obstructions and those kinds of things." CH2M HILL uses "stereo-pair aerial imagery" - taking side-by-side photographs to view three-dimensional features - to build models of the buildings, which are run through a computer rendering that determines where the sun is throughout the year in relationship to the building. This determines the ideal location for solar panels. San Francisco chose Google Maps as the platform, but Hermann said Microsoft Virtual Earth can be used, and the company is working on implementations using ESRI solutions. According to Miller, there are two features to the Solar Map. First is the mapping of existing solar installations, which required city-provided data for geocoding - the process of determining geographic coordinates. These data points are mapped through the Solar Map Web portal and incorporate characteristics of each installation, such as system size, the amount of electricity it generates, the installer, a link to the installer's Web site, and photos and comments posted by the home or business owner. This information is displayed after users click on a dot on the map that represents each location where photovoltaic (PV) systems are installed. Information that's publicly available is posted for each solar installation, but Partin said about 1 in 500 owners chose not to participate in the Solar Map. The second feature of the Solar Map is for people who are interested in installing solar panels. "They enter their address, and that address hits a database that contains their building-specific characteristics. That information is then rendered on the page and includes the PV potential and computations based on that PV potential, such as the amount of CO2 [carbon dioxide] that would be reduced, the [power] output, the estimates of cost, etc.," Miller said. If users want a more detailed price, they may click on "get cost estimates" and the information is tied into Clean Power Research's Clean Power Estimator. According to Jeff Ressler, product line manager of Clean Power Research, the company was approached by CH2M HILL and San Francisco, who asked that solar economics analysis be added to the map. The information provided by the Solar Map is shared with the estimator. "The Clean Power Estimator Web services can produce a total energy output, and that energy output can dictate what incentives are paid out and thus the overall cost of the system," Ressler said. Hermann said the Solar Map's accuracy is dependent on the data because cities can choose between a low-resolution or a high-resolution map. The map's assessments have been compared with those made by a solar installer who does the measurements in-person. The installer tells CH2M HILL the information meets their needs and the technology can be used in place of physical assessments, though the installer didn't reveal the exact results. According to Hermann, the high-resolution version of the Solar Map costs about $4,000 per square mile, which is a one-time fee and covers approximately 2,500 buildings in an urban area. The low-resolution version costs about $25,000 for a 50-square-mile city or county. "The low-res version is really a great marketing tool and is a great one-stop shop for all your solar information as a city or county," he said. Miller added that there's a cost-accuracy tradeoff depending on how detailed the client wants the data to be. The less detailed, the less expensive the map will be. San Francisco first launched the site in low resolution for it to display quickly and then updated the portal with high-resolution information. The site was expected to be updated to high resolution by November 2008. It takes about 45 days to launch a low-resolution solar map, as long as there isn't a backlog, Miller said. Clients can add unique details to their solar map. CH2M HILL has cities that are interested in allowing users to draw solar panels on their rooftop in the Solar Map; for example, if users add three solar panels, the map will determine the details and then they can see what the difference would be compared to two solar panels. According to Hermann, Los Angeles County is customizing its solar map with high-resolution imagery for county buildings, and each city within the county can decide whether to fund the high-resolution imagery. The Solar Map site can also match the colors and structure of a government's overall Web page style. "The goal is to have the Solar Map feel like a part of their existing city presentation," Miller said. San Francisco hasn't yet received feedback from citizens that the Solar Map led directly to solar installation, Partin said, but the Department of Environment has heard that potential customers use information garnered from the site when speaking with solar installers. She suspected city grants for residents who install solar power is the main driver of solar installations. The Web site receives about 200 page hits per month, according to Partin. However, the number increases after a big announcement is made about solar. In the future, San Francisco will add measurements of solar water heating potential to the map and eventually make it a wind power resource. Hermann said estimating wind power depends on if cities can measure the wind microclimate - the climate of a specific place in contrast to the climate of an entire area - but San Francisco has some capability to do that. Video: Sacramento, Calif., nuclear facility used as solar farm.
<urn:uuid:d1a55c56-ca13-4d6f-90c1-d053a3f73e13>
CC-MAIN-2017-09
http://www.govtech.com/technology/Solar-Map-Helps-San-Francisco-Residents.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00347-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950476
1,640
3.078125
3
Reprinted with permission from: Doggone Safe!TM A non-profit organization dedicated to dog bite prevention. Check out their great information at doggonesafe.com These signs indicate that your dog is uncomfortable with the current situation and there is a need for intervention to prevent pushing the dog to the point of biting, and to make sure your canine friend is happy and not feeling anxious. Please remember: It is a GOOD THING that a dog shows you that he is anxious or uncomfortable, rather than going straight to a bite. Never punish a dog for showing that he wants to be left alone by growling, leaving the situation or demonstrating more subtle signs. If you punish a dog for growling or breaking a stay to get way from a child you might suppress the warning or avoidance behavior and he might just bite without warning first the next time. The dog still feels exactly the same way about the child bothering him, but now he has no way to show it and no way out of the situation. Be glad if your dog gives a warning and take steps to modify the behavior of the child, condition the dog to enjoy the child and create safe spaces for both dog and child. One Paw Raised This is very cute but the dog is not happy and does not want to be petted or bothered. She is worried. Half Moon Eye This dog just wants to be left alone. Watch for this one when kids are mauling the dog. This is a common expression in dogs that being hugged. If you see the half moon eye when the kids approach the dog or are interacting with the dog, it’s time to intervene and give them all something else to do. Displacement behaviors are normal behaviors displayed out of context. They indicate conflict and anxiety. The dog wants to do something, but he is suppressing the urge to do it. He displaces the suppressed behavior with something else such as a lick or a yawn. For example, you are getting ready to go out and the dog hopes to go too. He is not sure what will happen next. He wants to jump on you or run out the door, but instead he yawns. The uncertainty of the situation causes conflict for the dog and the displacement behaviors are a manifestation of that conflict. The dog may want to bite a child who takes his bone, but instead he bites furiously at his own foot. Some examples of displacement behaviors include: - yawning when not tired - licking chops without the presence of food – Watch the video below to see why this is important - sudden scratching when not itchy - sudden biting at paws or other body part - sudden sniffing the ground or other object - wet dog shake when not wet or dirty These are all things that dogs do anyway. It is important to look at the context to determine whether the dog is feeling anxious. For example: if it is bedtime and the dog gets up, stretches, yawns and goes to her bed, then that yawn was not a displacement behavior. If the kids are hugging the dog or lying on him and he yawns or starts licking at them over and over then this is displacement. He wants to get up and leave or even to bite, but he displaces that with yawning or licking them or himself. In this context the licking or yawning behavior tells you that the dog is uncomfortable with whatever the kids are doing and it is time for you to intervene. You must then either prevent the kids from doing this in the future or use positive training techniques to teach the dog to enjoy (not just tolerate) these actions from the kids. Visit the dog owner information page for advice on how to do this. Sometimes dogs are more overt when they feel anxious and want to remove themselves from a situation. Please don’t force a dog to stay in situation in which he feels anxious, especially if children are the source of his anxiety. Here are some examples: - the dog gets up and leaves an uncomfortable situation (he may bite rather than leaving one of these days) - turning head away - hiding behind person or object - barking and retreating - dog rolls over on back in submissive way (please don’t hurt me!) Other Body Language Signs of Anxiety - tail between legs - tail low and only the end is wagging - tail between legs and wagging - tail down or straight for curly-tailed dog (husky, malamute, pug, chow chow, spitz-type dogs etc.) - ears sideways for erect eared dog - ears back and very rapid panting - dog goes into another room away from you and urinates or defecates (Please find a professional behavior consultant for help with this – search our directory) All dogs should have a safe place, such as a crate or mat that they can go to when they want to be left alone. All family members and guests should be taught not to bother the dog when he is in his safe place. Know the Signs Reprinted with permission from: Doggone Safe!TM A non-profit organization dedicated to dog bite prevention. Contact them at [email protected]
<urn:uuid:ef8a1c01-4450-4162-b191-b005af8f6685>
CC-MAIN-2021-17
https://yourdogsfriend.org/life-with-dogs/learn-to-speak-dog-prevent-bites/signs-of-anxiety/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038059348.9/warc/CC-MAIN-20210410210053-20210411000053-00485.warc.gz
en
0.947612
1,067
3.03125
3
While researching history, I've turned again to my wonderful "America's Fascinating Indian Heritage" published by Reader's Digest. I cannot tell you how many times I have counted on this historical guide to help me get my facts straight...and to learn. In 1881, Sitting Bull and his Sioux tribe surrendered to the U.S., closing the history of the plains Indians as we know it. All plains Indians were confined to reservations in the Dakotas, to lands so dry and unyielding, that even experienced farmer's would encounter problems working the soil. The people were expected to survive on supplies rationed by the government to supplement what they grew, but sadly, the food they received was as scarce as the yield they garnered from the tilled soil. Land-hungry white men took advantage of the starving Indians and tried to buy their plots for as little as 50 cents per acre, and certain government agencies pressured the red man to consent to sell off the excess real estate. Caught in the middle of greed and hunger, the tribe sustained themselves with memories of the old days. Far away, a Paiute prophet, Wavoka had a vision that spread and gave a new hope to the desparity. The Ghost Dance would bring a new dawn and a time when the white man would disappear. The dead would be resurrected and all Indian existence would change, living forever and hunting the new herds of buffalo that would reappear. In preparation, The Ghost Dance had to be performed, a simple ceremony consisting of dancing and chanting, often resulting in a frenzy where participants often fell into a semi-conscious state and saw visions of the coming of the new world. A Ghost Dance shirt, thought to make the wearer safe from the white man's bullets, was adopted, and because so many wore such shirts, the garments may have been the reason the ritual was considered a war dance. Despite mistreatment at the hands of the whites and the undertones of the Dance, no antiwhite feelings were expressed and the message of the cult was one of peace, but fear mongering among the white officials on the reservation and spreading of gossip pointed a finger at Sitting Bull, who was thought to be the focus of the ceremony. Forty-three Indian police were ordered to arrest him, and descended upon his cabin. He fought against the injustice due to what has been said to be taunts from old women to resist the whites once again. Shots were fired and at the end, fourteen people, including Sitting Bull lay dead. More next month of the aftermath known as the Slaughter at Wounded Knee. Note from Ginger: All information pertaining to the Ghost Dance is attributed to Reader's Digest. I have paraphrased to share this event with you.
<urn:uuid:60e616a5-52ee-485f-9dfd-7c44ea9d4414>
CC-MAIN-2017-30
http://cowboykisses.blogspot.com/2015/07/how-ghost-dance-originated-by-ginger.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423812.87/warc/CC-MAIN-20170721222447-20170722002447-00216.warc.gz
en
0.980377
562
2.78125
3
June 7, 2010 The BP Gulf Oil Gusher has shown the whole world the nightmarish risks of deep sea drilling. But there is another, older, story of environmental destruction in the Mississippi River Delta wetlands—and it, too, is related to offshore drilling. This tragedy will continue long after BP's well is shut down, and it's another accident just waiting to happen. The first offshore well was drilled in fourteen feet of water off the coast of Calcasieu Parish, Louisiana in 1937. In the decades that followed, a dense infrastructure was thrown up to support a booming offshore oil business—which was rapidly moving into ever-greater depths. Some 30,000 to 40,000 miles of underwater pipeline were laid—maps show a dense thicket of infrastructure—and navigational canals were cut through the wetlands for shipping. Most of these pipelines and canals that service the roughly 4,000 active wells in the Gulf were built long before environmental laws were passed and agencies were created to protect the wetlands. This oil infrastructure has cost Louisiana dearly, and it will threaten the Gulf coast for years to come. Since the early 1900s, Louisiana has lost 2,300 square miles of wetlands to the sea, an area roughly the size of Delaware. Paul Harrison, a senior director in EDF's Ecosystems program, explains several causes of the state's vulnerability. First, the Mississippi River has been separated from the wetlands by the levees and jetties that were built to keep shipping channels open. Fresh river water, carrying its rich load of sediment and nutrients, no longer reaches and replenishes the wetlands. Along with the infrastructure that supports the offshore drilling industry, this has severely compromised the resilience of the Delta ecosystem. Louisiana's Shrinking Coastline Since 1930, 1.2 million acres of coastal wetlands have been lost. (Maps: Courtesy Windell Curole, SLLD/Joe Suhayda, LWRRI) Second, the straight, wide industrial canals have disrupted the hydrology—the water flow—of the wetlands. Normally, bayous are full of small, winding channels that keep saltwater from running inland. The manmade canals, in contrast, serve as conduits for seawater, which kills the freshwater marsh vegetation that holds the land together, leaving it to wash away with the tides. Third, the Geophysical Research Letters will soon publish a paper revealing that the pipeline along the seafloor of the Gulf of Mexico, much of it old and decaying, is extremely vulnerable to hurricane-induced currents. In 2004, during Hurricane Ivan, sensors placed on the ocean floor showed that underwater currents put considerable stress on the oil infrastructure. More hurricane-resistant design of this infrastructure is needed before the next crisis erupts. And the last, and largest, problem for the Mississippi River Delta wetlands is global warming. In low-lying places like Louisiana, you have to consider relative sea level rise. Because the land is subsiding at the same time that the ocean is rising, Louisiana faces the most severe consequences of climate change. Lance Nacio's story vividly illustrates the impact of land subsidence in the Delta. For more than a century, his family has owned a couple of thousand acres of freshwater marshland, about thirty to forty miles inland, in Lafourche Parish, Louisiana. His grandparents lived off the land—they were self-sufficient. They raised cattle for food, grew crops and fished, hunted duck commercially, and trapped animals like nutria, muskrat, otter and mink to sell to furriers. They carved dugout canoes out of large old felled trees. Photographs from the forties and fifties show a land so fertile that, as Nacio says "it breaks your heart to see it, compared to how it looks now." This beautiful land is rapidly disappearing. Since Nacio inherited it 21 years ago, he figures about 30% has vanished underwater. As saltwater rushes into his marshes, the freshwater grasses die off and grasses that thrive in saltwater haven't grown in fast enough to stop the land from eroding. His land was once protected by barrier islands further south in the Gulf, but they have subsided, leaving him increasingly vulnerable. Now his land is also subsiding into the water, literally sinking from sight. Lance Nacio recounts decades of wetlands loss that has taken his land and put the region at even greater risk of oil spill damage. Nacio, who is 39 years old, has tried to adapt. In 1998, when roughly 60% of his land became water, he started running a commercial shrimp boat to make a living. Since the BP Blowout, Nacio can no longer fish. "We've been shut down for a more than a month here," he says. "The oil has contaminated the fishing areas." It is hard to imagine how families like Lance Nacio's can survive. The BP disaster is already creating severe economic hardship for everyone whose livelihood depends on these oil-soaked Gulf waters. But even after the Gusher is capped, the tens of thousands of miles of pipeline and canals will remain. The next Gulf tragedy waits its turn. That's why the urgent work of EDF and its allies to replenish and strengthen the wetlands that nourish and protect the Gulf Coast should become America's priority. This magical, rich, fertile, wild and abundant land must be thought of as a national treasure. Losing it would leave us all that much poorer. But there is a larger issue that we Americans must confront. Regardless of our collective fury over the environmental nightmare in the Gulf, as long as we demand oil, oil companies will venture into ever-trickier waters to find it. Now is the time to support energy and climate legislation that will shift our economy to safer energy sources. We can be energy-addicted. We cannot afford to be addicted to filthy fossil fuels.
<urn:uuid:3a2c1153-b157-48b5-b214-1f2aebff4133>
CC-MAIN-2015-35
http://blogs.edf.org/personalnature/category/bp-oil-disaster/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064263.27/warc/CC-MAIN-20150827025424-00163-ip-10-171-96-226.ec2.internal.warc.gz
en
0.966367
1,220
3.34375
3
The first days of these holidays fall within the month (30-day period) following the vernal equinox every year. The timing within the annual cycle is provided by the sun, while the phase of the moon brings us near or to the beginning of these periods. In the case of the Christian calendar, a third (weekly) cycle marks the exact days (the Hebrew calendar is lunisolar and is therefore synchronized to the motions of the sun and moon). In astrological terms, both holidays start while the sun is in the tropical sign of Aries. Since in the temperate zones of the northern hemisphere – where the two cultures originate from – it is always springtime during the “month” of Aries, it is no wonder that the holidays’ symbolism of resurrection and freeing from bondage both point to the renewal of nature in spring. In the English language, the term for this season indicates a “bursting forth” or “springing up” of plants. Starting at the end of the 19th century, the verb form of this word took on the meaning of “release” (from imprisonment), closely paralleling Passover symbolism. Other meanings of the same word include “source of a stream” and “elastic coil”, both painting the imagery of coming to life. It is this time of year when various media outlets proudly announce the start of spring, equating this day (even the exact time) with the timing of the vernal equinox. From a symbolic perspective, there can be no doubt that the two holidays occur during springtime. Does it follow then that the vernal equinox, as one of four “corners” of the year, marks the start of spring? To answer this question, we first need to find out what “spring” means. And here we come up against a bit of a challenge: there seems to be no precise and unambiguous definition of seasons. Moreover, the definition of spring depends on which reference one checks. There are three main definitions, and the following is an overview of which camp the major references belong to (results are from the first three pages of a web search for “define spring season”): - Astronomical definition (from the vernal equinox to the summer solstice, March 20/21 – June 21/22): Cambridge Dictionary, Encyclopedia Britannica, The Old Farmer’s Almanac, Collins Dictionary - Meteorological definition (the three-month period between the coldest and warmest months, typically March, April and May): American Heritage Dictionary, Oxford Dictionary - Natural or ecological definition (according to the cycles of nature; timing depends on local conditions and varies from year to year): BBC Nature UK blog http://www.bbc.co.uk/blogs/natureuk/2011/02/how-do-you-define-spring.shtml Wikipedia mentions all three definitions (and some more) with the following introduction: “There are various technical definitions of spring, but local usage of the term varies according to local climate, cultures and customs.” It is clear from the above that only by adopting the astronomical definition could spring possibly start on the day of the vernal equinox. But does it really? The vernal equinox is the moment when the sun crosses the celestial equator in a northerly direction (in the northern hemisphere). This is equivalent to saying that the sun moves into (ingresses) tropical Aries at that time. So what is the relation of this movement to the season of spring? The clue lies in the meaning of the word “equinox.” There are two equinoxes and two solstices each year, marking the four cardinal points of the zodiac. The word “equinox” means “equal night” in Latin: this time of year, day and night are about the same length (but not exactly due to the size of the sun’s disc and the bending – refraction – of light by the atmosphere). “Solstice” on the other hand means “sun coming to a standstill” because on these days the sun reaches its highest and lowest points (altitude) in the sky, making them the longest and shortest days of the year, respectively. In terms of daylight (or the sun’s altitude, to be precise), it would then make sense to define astronomical summer as the one and a half months preceding and the one and a half months succeeding the summer solstice since this is the quarter of the year when the days are the longest. Similarly, astronomical winter would be defined as the three months surrounding the winter solstice, coinciding with the shortest days of the year; therefore, winter solstice would mark the middle of winter. To say that (astronomical) winter starts at the winter solstice is just as nonsensical as saying that night starts at midnight (when the sun reaches its lowest points during the daily cycle). Similarly, midday doesn't start at noon (which is the marker for the middle of the day) just as (astronomical) summer cannot start at the summer solstice, the highest point of the sun’s annual cycle. It is easy to see then that the vernal equinox cannot possibly mark the start of spring, even in the astronomical sense of the term (other definitions have no direct relation to the Aries point). The four cardinal points of the year mark the middle of astronomical seasons and so the vernal equinox coincides with the middle of astronomical spring. It would be more appropriate to say that the start of (astronomical) spring is in early February, which is around Candlemas in the Christian calendar. The symbolism of the presentation of child Jesus at and later his first entry into the temple is analogous with the sun’s presentation at and entry into the new season of (astronomical) spring. The simple reason for having eight significant points within the year, meaning the cardinal points of the annual circle and their midpoints, is exactly to demarcate the sun’s annual path into four seasons. The midpoints (Candlemas, Ascension, Transfiguration and All Soul's Day in the Christian calendar), falling approximately in the middle of fixed signs in the zodiac, signify the starts and ends, while the corners (Christmas, Easter, St. John the Baptist and Michaelmas), positioned close to the beginning of cardinal signs, mark the middle of astronomical seasons. In the pagan wheel of the year, these festivals are exactly aligned with the tropical zodiac and are called Imbolc, Beltaine, Lughnasadh (Lammas) and Sanhain for the seasonal boundaries, and Yule (Midwinter), Ostara, Midsummer and Harvest Home (Mabon) for the middle of astronomical seasons. We are only talking about astronomical seasons of course; nobody in their right mind would actually say that spring arrives in early February in places where the lengths of the four seasons are roughly equal. Heat follows light due to a number of factors, and this is the primary reason why we experience seasons closer to the meteorological and natural definitions. Notional springtime is the three-month period from March to May in the northern hemisphere, but the actual start of spring will vary depending on location and year-to-year variations in nature. While this might be difficult to pin down, one thing is for sure: it will not coincide with the vernal equinox other than by sheer luck. It is the end of Easter Sunday here but in Greenwich the clock has already turned over to a new day and a new month. But just because it is April 1st there, it doesn’t mean that I’m joking here. And that of course is another topic for another day!
<urn:uuid:024be29c-5f8c-4f5f-95b5-46c3dd8b82ae>
CC-MAIN-2019-04
http://www.objectiveastrology.net/blog/does-the-vernal-equinox-mark-the-first-day-of-spring
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763839.28/warc/CC-MAIN-20190121070334-20190121092334-00550.warc.gz
en
0.944485
1,639
3.703125
4
Exercise Helps DietersKeep Bones Strong When overweight people loseweight, they tend to lose bone mineraldensity at the same time, which increasestheir risk for osteoporosis. Astudy from Washington University in St.Louis, Mo, suggests that exercising tolose weight can help preserve bonestrength. The results of the studyappeared in the December 11, 2006,issue of the Archives of InternalMedicine. Researchers randomly assigned 48healthy, nonobese people in their 50sto 3 groups as part of a 1-year study.The first group lowered their caloricintake by 16% in the first 3 months,then by 20% for the rest of the year.The second group increased theiramount of exercise by 16% in the first3 months, then by 20% for the next 9months. The third group was a controlgroup that had neither diet nor exercisemodifications. The diet group lost an average of 17lb and the exercise group an averageof 14 lb. Those in the low-calorie group,however, also lost bone mineral density—more than 2% at the spine, hips,and leg. The researchers recommend acombined program of diet and exercisefor a more beneficial weight-loss program. Oversized Purses Can Be Such a Pain One of the biggest fashion trends last season was large, oversized purses.Although they may be stylish for a short time, the damage they can cause canlast for years if not dealt with promptly. Bigger bags mean more items to carry,and long-term usage of these weighted-down pocketbooks can cause back,neck, and shoulder pain, headaches, and possibly arthritis. Jane Sadler, MD, a family practice physician at Baylor Medical Center atGarland, Tex, knows what to do when women patients come to her with neckpains and headaches. "I usually?look for their purse and pick it up," she said."We take it over to the scale and weigh it, and?they're anywhere from 7 to 10lb." She says that, carrying extra-large bags with extra items causes an imbalancein walking and standing that can leave a lasting impression. "It creates strainalong the neck and into the nerves that exit the neck and down the shoulder, soit can be very painful later on," she said. Dr. Sadler suggests that, if a woman's purse is uncomfortable when wearing it,if she can feel it pulling her shoulder, or if it weighs more than a few pounds, itmight be time to downsize. "We're really going to see women with more andmore problems later on if we continue the big purse craze," she said. Discovery About Cartilage May Aid OA Treatment Scientists at the University of Manchester, UnitedKingdom, have revealed the structure of cartilage, in hopesof finding clues to help better treat patients with osteoarthritis(OA). For years, scientists have known that cartilagegets its strength from interlocking, millimeter-longcollagen fibers that work in a manner similar to load-bearingsteel rods in reinforced concrete. The precise structureof these fibers has remained unknown for over 40 years,however, thereby stalling any progression of potentialtherapies. Researchers at the university used sophisticated electronmicroscope techniques to discover the molecular structureof the thinner of the 2 types of fibrils. They explained, "OAoccurs when the fibrils are disrupted or lost?. Eventually,the cartilage breaks down altogether?. Without a detailedunderstanding of the structure of these fibrils, a treatmentthat prevents them from deteriorating would always proveelusive." Once scientists learn how the fibrils form anddevelop into healthy cartilage, they can then study whatoccurs when diseases such as OA develop. The findingswere published in the November 2006 issue of the journalProceedings of the National Academy of Sciences. Arthritis Foundation CommendsPain Relief Lotions The Arthritis Foundation has given itsEase-of-Use Commendation to CastivaCooling and Warming Arthritis PainRelief Lotions. Castiva received the commendationfor providing a flip-top tubethat is easy for patients with arthritis,minor strains, and other joint symptomsto open. A favorable review was awardedwhen the product was evaluated bypatients with limited physical functionsdue to the effects of arthritis. "We wanted to create a product thatwas truly innovative," said Greg Pulido,chief executive officer of HumcoHolding Group, the distributor ofCastiva. "It was important [that] Castivanot only worked, but was easy to useby those with joint or muscle limitations." The commendation gives Castivathe right to display the ArthritisFoundation's "Ease-of-Use" logo on thepackaging and advertising in recognitionof the "packaging innovation that?improves the quality of life for peoplewith arthritis by providing greateraccessibility."
<urn:uuid:81299903-cb57-45b3-8894-5a0380ca8142>
CC-MAIN-2022-49
https://www.pharmacytimes.com/view/2007-03-6325
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710968.29/warc/CC-MAIN-20221204072040-20221204102040-00428.warc.gz
en
0.937862
1,037
2.671875
3
This paper deals with the way of adjustment radiation quantity to develop a unified evaluation method of multi-temporal data as part of an environmental evaluation method using the satellite image. The proposed method is intended to automate reading of training data used for radiation quantity adjustment by extracting common class area during image, following the principle of post-classification comparison, based on land cover classification map produced under the supervised maximum likelihood classification method. Also, it adopted the way of adjusting the frequency distribution of the brightness information and that adjustment is made with threshold value. The effectiveness was shown as follows; it used LANDSAT/TM image. The difference occurring among multi-temporal data decreased, and it proved that the reference image and the comparison became possible relatively. The acreage estimation of the riceplanted fields is an important subject for agricultural administration, and it requires the high precise measurements in actual work. In order toimprove the accuracy of estimation, high ground resolution satellite data are required in conventional methods. However, there are problems in frequent use of high ground resolution satellite data due to its narrow observation area, requiring a fair weather at time of acquisition and high cost; there are some limitations to use them operationally. A method of referring agricultural plot outline data was developed in this study, which improves the estimation accuracy of the rice planted fields using medium ground resolution satellite data such as LANDSAT-TM, SPOT-HRV or ASTER-VNIR. In this method, the satellite raster image data are not used for totalization, although they are used to discriminate whether the fields are rice planted or not. The acreage of the rice planted fields discriminated as rice planted fields are totalized referring the existing or preliminary measurement data of agricultural plot outline data. By employing the developed method, the acreage estimation of the rice planted fields using remote sensing techniques is remarkably progressed in practical use. This paper described the result which the method was applied to ASTER-VNIR image and the estimation data was compared with the surveyed data. The estimation error ratio was -5.5%. Forests play an important role in maintaining environmental conditions suitable for life on the earth. Forests have seasonal cycles and change from year to year. External factors such as harmful insects may cause damage, and the surrounding conditions are not constant. All these factors have an effect on the tree crown, therefore crown size measurement is an important task in forest management. The goal of this study was to measure the distribution of the tree crown size in the forest including closed canopies by image processing methods. We assumed that one crown consists of leaves and branches of similar color and that there are shadow areas around the crowns. Additionally each crown grows differently and has different structure. These features are used to identify a circular crown area. The size of a circle representing the crown is computed using the brightness distribution and local fractal dimension within the circular area. To measure the crown size distribution, forest was photographed from a helicopter, and the images were analyzed using the suggested technique. Comparing the analysis results and visual inspection of the same area, we concluded that the proposed technique was effective for measuring the crown size distribution. ASTER (Advanced Spaceborne Thermal Emission and Reflection Radiometer) is an imaging instrument that is flying on Terra, a satellite launched in December 1999 as part of NASA's Earth Observing System (EOS) . ASTER is a cooperative effort between NASA and Japan's Ministry of Economy, Trade and Industry (METI) and the Earth Remote Sensing Data Analysis Center (ERSDAC) . ASTER data is distributed by HDF-EOS format, which has a very complicated data structure. It result in the difficulties of handling the data. However, that includes latitude and longitude values of footprints every 6km owing to the precise orbit tracing system with the star tracker. Precise geometric correction is one of the most difficult and indispensable process in remote sensing data. In this study, firstly, a free software is developed to achieve map projection conversion from UTM to plate carriee coordinate with ASTER data in HDF-EOS format. Secondly, map projection conversion is applied to sixteen scenes of ASTER data over Japan Island. Thirdly, accuracy of system geometric correction is evaluated with the castal lines and administrative boundary lines in vector format by visual interpretation. As a result, the root mean square geometric error is 79.2m in North West direction.
<urn:uuid:186a2aaa-4fd8-4c7f-8c8d-714f2308df5a>
CC-MAIN-2022-33
https://www.jstage.jst.go.jp/browse/jsprs/42/4/_contents/-char/ja
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00306.warc.gz
en
0.93489
899
2.734375
3
Daud Aris Tanudirjo Indonesia’s approach to heritage management has been shaped by the perception of the role of archaeology and the history of Dutch colonial rule. The Dutch colonial government justified its rule internationally through its care of Indonesians and Indonesia, in particular iconic heritage sites like Borobudur. The emphasis on expertise in archaeology continued for many years, often leading to heritage sites being separated from the communities near the sites and groups with religious or historical connections. Today a broad set of groups are involved in heritage management and there are a diverse set of heritage management policies emerging. The colonial approach Early interest in Indonesia’s heritage is often associated with foreigners who were fascinated with the monuments, artifacts, and ruins of the past. In the early eighteenth century, European scholars began to produce reports and publications, such as those on the ruins of Prambanan and Borobudur. The growing interest in heritage fueled the establishment of the Royal Batavian Society for Arts and Sciences in 1788 which then founded a museum that later became the National Museum. Although the Society stated that the museum was for the public, it spoke only to and for European communities. In 1822, the Dutch Administration established the Commission for the Exploration and Conservation of Antiquities. It marked the beginning of official engagement in heritage management in Indonesia. This was restructured to the Commission for Archaeological Research in Java-Madura in 1901 and then the Archaeological Service in the Netherlands-Indie in 1913, charged with research and preservation duties. The participation of the indigenous Indonesian elite in heritage management, particularly through establishing local museums, created a problem for the Dutch authorities who were accustomed to exclusive access to heritage resources. One response was the first heritage regulation, Monumenten Ordonnantie, of 1931. This ordinance gave the colonial government (and later post-independence governments) full authorisation to claim access to and ownership of any artifacts and monuments with artistic, historic, prehistoric, and palaeoanthropological significance. Soekmono: the first Indonesian archeologist Soon after independence was proclaimed in 1945, Indonesians took over the Archaeological Service. But, when the Dutch returned to re-colonise a year later, they set up another Archaeological Service. These institutions then merged in 1950. The new Archaeological Service was led by a Dutch archaeologist and most of its staff were Indonesian apprentices. In 1953, the Service was handed over to Indonesians. The first Indonesian archaeologist, Soekmono, was appointed as its head. Although only limited resources were available to support heritage management, the institution was able to secure the support from political leaders to undertake archaeological research, undertake reconstructions of ancient heritage, and establish archaeological attractions. Prambanan Temple - Credit: Georgia Doust In terms of its policy, however, there were hardly any changes. Monumenten Ordonnantie remained the main regulation until the 1990s. Even the establishment of archaeological departments in several universities in the 1960s did not bring any new approaches to heritage management. The public was almost totally excluded and archeology was perceived to be in service of the state, with almost all Indonesian archaeologists employed as government officials. Archaeologists played their role as ‘legislators’ who had the authority to determine what should be done with heritage. They dictated the interpretation and the use of heritage. Conflict between residents and archaeologists occurred quite often. Resettlement of the local population around Borobudur and Prambanan temples for archaeological park in 1980 caused a prolonged conflict. Land-owners and the official archaeological bureaucracy incessantly disputed ownership of Majapahit vestiges found in Trowulan or ancient fossils recovered in Sangiran Early Man Site. These are just a few examples of the endless conflicts between the public and archaeologists. Public participation in heritage management Heritage management has improved since the 1980s when a new awareness emerged among academics about the importance of public participation. This awareness was disseminated by a few young archaeologists who realised that the government alone could not effectively manage complicated heritage. Elite groups came to a similar opinion, so they founded non-government organisations (NGOs), such as the Friends of Culture Foundation (Yayasan Mitra Budaya) and the Indonesian Ceramic Network (Himpunan Keramik Indonesia), to assist the government in certain aspects of heritage management. Meanwhile, the government drafted new heritage regulations which were passed in 1992 as the Items of Cultural Property Law. Ironically there were no essential changes in this new law, and public participation in heritage management was not fully accommodated. By the late 1990s, pressure to change the approach to heritage management increased. Now it came not only from academics but also the wider public and the tourism sector, all of whom were beginning to understand that ‘archaeology in the service of the state’ was no longer relevant and that it was time to move to ‘public archaeology’. Archaeologists began to reposition themselves as ‘stewards’ who do not claim ownership, but work to protect and preserve heritage for the benefit of the public. Prambanan Temple - Credit: Georgia Doust From within civil society, demand for more community-oriented heritage management came not only from elites but also common people. There had been major changes in public attitudes toward heritage. More people started to consider heritage as part of their identity. They realised that they had the right to participate in heritage management and to benefit socially, culturally, or financially from heritage. Surely, they also learned about the inadequate government efforts to manage their heritage. New heritage organisations, new regulations This new perception is manifest in the establishment of a considerable number of NGOs concerned with heritage management, especially at the local level. In 2000 these NGOs launched Jaringan Pelestarian Pusaka Indonesia (Indonesian Heritage Conservation Network or JPPI). Supported by the international heritage body ICOMOS (International Council on Monuments and Sites) and the Ministry of Culture and Tourism, JPPI declared an Indonesia Charter on Heritage Conservation in 2003 and founded Badan Pelestarian Pusaka Indonesia (Indonesia Heritage Trust or BPPI), as a counterpart for the government in the management of heritage. Surprisingly, only a small number of archaeologists joined this network, signed up the Charter, or became involved in BPPI. This is a sign that the majority of Indonesian archaeologists persist with the conservative view and think community-based heritage management will instigate future conflicts. The tourism sector has also applied pressure to change heritage management. On the one hand, heritage is seen as a strategic resource for the development of tourism and therefore the national economy. On the other, the existing heritage policy is regarded as an obstacle to heritage-based tourism. All the above pressures have forced Indonesian archaeologists to reconsider their position as heritage managers. The last decade has witnessed an increasing implementation of public archaeology. Now Archaeological Offices all over Indonesia regularly involve communities in their programs. To accommodate greater public participation in heritage and political decentralisation, the government issued a new regulation in 2010, the Cultural Heritage Protection law. This new regulation legalises the use of cultural heritage for religious, social, educational, scientific, technological, cultural, and tourism activities, stipulating bottom-up processes for the registration and nomination of heritage from the district level up to the national level. In addition, every district or province has the right to draft and employ their local heritage regulations. In many districts, heritage policy has been prepared by interdisciplinary scholars as there are not enough archaeologists to assist with all the local heritage policies. Heritage policy, and Indonesian archaeology in particular, is still making the journey from “serving the state” to “serving the public”. Daud Aris Tanudirjo (firstname.lastname@example.org) is an archeologist (PhD. ANU, 2001), and senior lecturer in the Faculty of Humanities, Gajah Mada University. He is a contributor for many Indonesia and international scientific journals, and author of ‘Changing Perspectives on the Relationship Between Heritage, Landscape and Local Communities: A Lesson from Borobudur’ in Transcending the Culture-Nature Divide in Cultural Heritage: Views from Asia Pacific Region (Brockwell et.al, 2013, Terra Australis Series).
<urn:uuid:4d156b01-f3c9-41b8-b379-8dd66b34b2dc>
CC-MAIN-2018-47
https://www.insideindonesia.org/index.php?option=com_content&view=article&id=3304:shifting-sands&catid=219&Itemid=129&tmpl=component&print=1&layout=default&page=
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742968.18/warc/CC-MAIN-20181116004432-20181116030432-00215.warc.gz
en
0.952147
1,718
3.4375
3
Niger 1897: the end of two Empires “whatever happens we have got the Maxim gun – and they have not” In the long and complicated history of British imperial expansion, commercial companies have played a significant role. The old adage that “trade follows the flag” was in many cases the flag following trade. Some of the largest trading companies were given special status as “Chartered Companies” with powers not only to trade but to negotiate local treaties, to raise taxes and establish distinct areas of influence. Some were given the power to raise their own armed forces, initially to defend their trade and premises but equally to force their demands on perhaps reluctant neighbours. The most famous of these chartered companies was the “Honourable” East India Company, trading in India from as early as 1600 and by the mid 18C effectively the British government’s agent in expansion, conquest and control. In the great “scramble for Africa” after 1882, three chartered companies were very much at the forefront of trade and expansion. These were the well-known British South Africa Company (1889) under Cecil Rhodes, eventually responsible for British control of the Rhodesias, the Imperial British East Africa Company under Sir Charles McKinnon (1888), largely responsible for British control of Uganda and Kenya, and the Royal Niger Company in West Africa. The Royal Niger Company (RNC) under Sir George Taubman Goldie was created out of an amalgamation of the British companies vying for trade in the huge delta of the Niger. This area held one vital interest for British merchants – palm oil. It value as a lubricant for Britain’s thirsty industrial machinery made it a commodity of great worth, and it also found use in other products notably soap; Lever Brothers founded “Port Sunlight” on the back of this trade and “Palmolive” soap is one remnant of this 19C phenomenon. - Early postage stamps – for the “Oil Rivers” and its successor as the “Niger Coast Protectorate”. Palm oil was the lure. Because of the huge local production and export of palm oil, the Niger delta became known as “the Oil Rivers”. Britain had attacked Lagos in 1851 and taken the city as a coastal base in 1862 and her “sphere of influence” in the Niger delta was internationally recognised at the Berlin Conference in 1885. The British companies trading there amalgamated in 1879 to form the United Africa Company, becoming the National African Company in 1884. Under Sir George Goldie, this was granted a Royal Charter in 1886 to become The Royal Niger Company. In 1888 it established its own fighting force, the Royal Niger Constabulary, recruited entirely from local men and under British officers. Such was the importance of the Niger trade that the area was formally taken as a British territory in 1891, known as “the Oil Rivers Protectorate” and as the RNC continued to expand its area of control by concluding local treaties, “the Niger Coast Protectorate” was proclaimed in 1893. It cannot be said that “official” British interest in the area was very great – certainly if it came to spending taxpayer’s money. But in 1896, with the accession of Joseph Chamberlain as Tory Colonial Secretary, things moved up several gears. Chamberlain was concerned at the speed and extent of French (and to a lesser extent German) expansion in tropical Africa, which threatened to cut off or restrict the existing British territories like the Gold Coast and Sierra Leone from their hinterlands and inland trade. He developed the theory of the “undeveloped estates” – lands which at the moment might seem to be of little value but may, in the future, prove to be valuable as sources of raw materials or as markets. Under Chamberlain, British expansion in tropical Africa was deliberately and officially stepped up (as witness the Ashanti campaign of 1896 and others). It was really a policy of “land grabbing” – taking control of huge swathes of territory before someone else did. Northwards, beyond the coastal “band” of largely non-Muslim west African states, many of whom had by 1896 come under British or French “protection” (like the Fante of the Gold Coast) lay the great sub-Saharan Muslim empires and emirates. These highly organised states, often of some antiquity, could field impressive military forces, largely in the form of armoured cavalry. In the course of aggressive European imperial expansion after 1896, all were to come under the sway of Britain and France, most taken by actual military conquest. For the Royal Niger Company, the two most formidable neighbours and potential blocks on inland expansion were the great Muslim emirates of Bida and Ilorin. The Fulani state of Bida was founded as recently as 1859 out of the ancient Kingdom of Nupe, which had adopted Islam c.1770. It was governed from the mud-walled city of Bida which became the main centre of the emirate by 1873. Across the Niger, Ilorin was founded in the late 18th century and became the capital of a kingdom which was originally subject to the powerful Oyo Empire. However, by the1820s, Ilorin had broken free, later destroying Oyo itself and by conquest created its own empire. Throughout the 19C, Ilorin was a major trading centre, controlling movement on the Niger between the Hausa of the north and the Yoruba of the south. An excuse for British (or in this case, RNC) military action against the two states was easily found. There were claims about raiding into designated “British” areas and the usual claim that the empires were slave owning, slave trading and slave raiding and that, since they would not mend their ways by agreement, military action should be taken against them. There is no doubting the real interest in many British circles in acting against slavery and the slave trade around the world, but there were other more pressing reasons to embark on expensive military operations! In the post-1896 climate of British imperial politics, the need to subjugate the two emirates was clear – to allow the expansion of the Niger Coast Protectorate into potentially valuable new lands, to control trade further along the Niger and, not least, to thwart French expansion into the region. The French were already perilously close to Nikki and Bussa. Once a decision to act against the two emirates had been taken, the RNC assembled a military force in January 1897 which, for what seemed a tremendous military task, looks remarkably small. Apart from the usual horde of porters and bearers (about 1,000 were used) the actual strike force comprised only 30 British officers and NCOs and about 500 men of the Royal Niger Constabulary – seven companies of about 70 men each being mobilised. Overall command was given to Lieut (local Major) A. J. Arnold of 3rd Hussars – an impressive appointment for a Lieutenant! The men were armed with Snider rifles – antiquated by 1897 – but the key point is that the RNC had two 7-pdr mountain guns and 5 new Maxim machine guns, which had been “loaned” by the War Office. A river flotilla of twelve ships, armoured with steel plates, under William Wallace, CMG, Goldie’s Assistant Director, was equally well-armed, with 1-pdr Nordenfeldt quick-firing guns and Gardner machine-guns. It would operate along the Niger itself, the river serving as a highway northewards and directly into “enemy” territory. - “Whatever happens we have got the Maxim gun and they have not” Since the emirates were well-aware that an attack was coming, defensive measures had to be taken on the border of RNC territory. In what was in effect the first of three expeditions, RNC forces were assembled at Akassa in the mouth of the delta and then carried by the armed steamers up to Lokoja, to establish a defended base in what was already the RNC’s “advanced post” where the Niger joined the Benue. Once this had been done, the main RNC fighting force was shipped to Lokoja. Major Arnold intended that one army of Bida – estimated at 10,000 cavalry under their Emir Makum and camped fifty miles away at Kabba – would be the first to be confronted. Arnold would lead a “flying column” westwards to attack this army, while a smaller force under Captain Sangster carried in the boats would sail northwards, “securing” riverside villages, and head for Egwa. This town marked a crossing point on the Niger, across which Emir Makum might seek to retreat or receive reinforcements. By placing the RNC flotilla at Egwa, Makum’s force near Kabba would be isolated and, since the armies of Ilorin were not mobilised in their neighbour’s support, Arnold could deal with the separate forces of Bida in detail. On January 6th 1897, Arnold (with the Protectorate’s Governor Sir George Goldie in tow) marched from Lokoja with a force of approx. 510 Constabulary, with all his Maxims and artillery, supported by a column of porters. Marching in single file along narrow paths – a dangeorus necessity through dense bush – he reached Sura on the 11th where he left a small garrison and most of his porters before continuing towards the enemy base. Nearing Kabba on January 14th, Arnold had his men form square – and quite a small square, given the numbers – and marched forward, only to find that the Emir had already fled, heading back towards the Niger crossing at Egwa where he hoped to unite the entire armies of Bida. But harassed by locals who had no love for the Emir or his army, and finding the crossing blocked by the RNC flotilla, the Emir’s army simply ceased to exist, fleeing into the bush or trying in groups to cross the Niger. Without firing a single shot, Arnold’s first expedition had dispersed one powerful army. In the centre of Kabba, Sir George Goldie raised the union flag and proclaimed that the people were now “free” and that slavery was abolished. Major Arnold lost no time in pursuing Makum and seeking out the rest of Bida’s army. Marching for Egwa with more or less the same force, he crossed the river and headed straight for the capital, Bida. However, just south of the mud-walled town, the second army of Bida made a determined attack on the RNC column. Forming his men into square, Arnold repelled several attacks by the impressive cavalrymen of the Emirate, with mass rifle fire and (in particular) the Maxims and mountain guns doing terrible damage. It has been said that over 25,000 cavalry were involved in these attacks against a square of less than 500 men. It must have been some sight – the chainmail-clad cavalry of Bida, like an army from the Crusades, repeatedly and bravely charging a force only a fraction their size, but armed with the very latest in death-dealing weaponry. This really was one world pitted against another. And, as at Omdurman a year later, it proved to be an absolutely destructive clash. The losses to the Fulani cavalry are unknown but must have been very high; the RNC force lost 1 officer and 7 men killed and only 9 wounded. In the end, the cavalry of Bida simply broke and fled and on January 29th 1897, without the town offering any further resistance, the union flag was raised over the town. In the meantime, the flotilla had advanced northwards along the Niger and had captured Ladi, the southern capital of the Bida emirate. Wasting no time, Arnold’s small army now sailed along the Niger to advance against the Emirate of Ilorin. Carried as far as Jeba (where a temporary base was established), it landed within striking distance of the capital city. Arnold must have been very confident : to take on the army of Ilorin he took with him only 320 Niger Constabulary (under 15 British officers and 7 British NCOs) with 20 gunners and only two mountain guns and four Maxims: an actual fighting force of only 362 all told, with 480 carriers. Starting out on February 10th 1897, the column neared Ilorin by the 15th and found that a force of up to 10,000 cavalry blocked their route and were preparing to attack their flanks. The men of the RNC Constabulary had no sooner formed square, with the porters in the centre, when they were attacked by the full weight of the Fulani cavalry. Once again, small though the RNC force was small, its sheer firepower, dominated by the Maxims, was devastating and more than enough to decimate the attackers, whose reckless gallantry was just as ineffectual as that of Bida’s army had been. The cavalry casualties must have been appalling. That night, the RNC column camped within two miles of Ilorin, a town of 30,000 inhabitants. Next morning, again marching his men forward in square, Arnold headed right to the city gates, facing only desultory firing. Hoever, when a messenger was sent forward demanding immediate surrender, firing broke out from the ramparts and Arnold ordered his mountain guns to open fire with shells and rockets. The effect was almost instantaneous: return fire ceased and the RNC force marched straight into the city. In the great market square of Ilorin, before the Emir’s burning palace, the end of slavery and the Emir’s rule were proclaimed and the surrender of 2,000 soldiers was taken. Two days later Emir Suleiman, who had fled with 8,000 men, returned to the city and offered his own surrender. - The standard reverse of the East and West Medal, with the “old” or “veiled” head of the Queen. - The reverse of the medal for Niger 1897. So ended a remarkable and highly successful campaign, which, if more British troops had been involved, might be better known. In only five weeks two powerful emirates had been subjugated by little more than 500 Hausa constabulary – notably assisted by the most up-to-date machine guns and light artillery. Sir George Goldie received his reward very quickly; as soon as 1898, the British government bought out the RNC and brought its territories under British rule. The Royal Niger Constabulary became the foundation of the new West African Frontier Force (WAFF) and two new colonies soon emerged – Southern Nigeria and Northern Nigeria, in which the emirates of Bida and Ilorin (and others by 1903) were incorporated. Thus were empires lost and made! A medal for the 1897 operations was quickly approved. Army Order 155 of 1897 authorised the award of the East and West Africa Medal with clasp Niger 1897 to those who had served between 6th January and 25th February 1897, including the garrison at Lokoja. It has always been a rare medal, especially to British military recipients. According to R.G. Magor in his African General Service Medals, only 24 British officers and 7 British NCOs with 651 RNC Constabulary qualified and comprised the fighting force which conquered two powerful emirates. A few civilians and RNC employees also qualified– but apparently not the porters. - The Royal Niger Company’s medal in bronze, as awarded to African soldiers. As a “Royal” chartered company, it could use the monarch’s effigy and titles on its awards. - The Royal Niger Company’s own medal (reverse) for campaigns of 1880-97. In silver as awarded to Europeans. A rare medal. At the same time, the Royal Niger Company awarded its own distinctive medal to its forces. The medal was awarded in bronze to African troops, with the simple clasp Nigeria and numbered (not named) around the rim and in silver to its European employees, British officers and NCOs. The latter are exceptionally rare (only 36 known to British army recipients) and carried a dated clasp, Nigeria 1886-97. The medal was awarded for a number of RNC military operations over the period, including the Bida-Ilorin expedition. For those who want to read them, the official dispatches for Niger 1897 are in The London Gazette of 7 June 1897; the best account of the campaign – one of very few – is in Major Seymour Vandeleur’s Campaigning on the Upper Nile and Niger (Methuen, 1898).
<urn:uuid:47a07ee6-0691-4da1-8be2-34726ddb1192>
CC-MAIN-2021-04
https://www.dcmmedals.co.uk/war-on-the-niger-the-conquest-of-empire/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519984.9/warc/CC-MAIN-20210120085204-20210120115204-00031.warc.gz
en
0.980253
3,491
3.09375
3
This brief article explores the impact of COVID-19 lockdown on learning in Aotearoa New Zealand and how it went beyond a centre- or school-led curriculum to encapsulate wider issues of identity, whānau and culture. COVID-19 has led to unprecedented change and upheaval for teaching and learning in Aotearoa New Zealand. Teachers have shown incredible flexibility, innovation and responsiveness to new and different ways of teaching and learning. So, what has been learned while in lockdown? The following are snapshots of learning gathered from a number of sources across the sector as teachers, learners, parents and whānau reflect and prepare to return to a new kind of normal. Authentic partnerships – what has been revealed and what can we take forward “Finding ways to further strengthen partnerships and value the learning that happens across the boundaries between homes and schools, seems an important step in expanding our view of what counts as quality education, making schooling more equitable and in honouring te Tiriti o Waitangi,” (Evaluation Associates Report, p.7) The COVID-19 lockdown and the time tamariki and rangatahi spent learning from home enabled teachers to engage families and whānau in their children’s learning, as per the Code of Professional Responsibility|Ngā Tikanga Matatika, in new and different ways. Raiha Johnson, Kaiako at Waverley School, explains in this webinar how with limited time to prepare for lockdown, there was a shift in power and mana to parents and whānau in their tamariki’s learning. Teachers, centres/kura/schools became the manuhiri in the homes of their learners and parents and whānau had greater agency and decision-making capability in their child’s learning. The COVID-19 lockdown presents a unique opportunity to critically reflect on our authentic partnerships with parents and whānau and take what has worked best for learners and their whānau and carry it forward. Here are some provocations, wonderings and suggestions gathered from teachers and expert thought leaders: - Technology has been used widely for tamariki and rangatahi to connect from home to school during lockdown. We can continue this connection, but in reverse. So, learners are sharing their progress and their learning with parents and whānau from their centre/school/kura environment - Teachers have had to adapt and innovate to ensure learning is whanau-friendly so they can best support their tamariki learning from home. We know that whānau are a child’s first teachers and that the educational success of learners is greatly enhanced by active engagement of their families. So, continuing this approach will support sustaining partnerships and continue to benefit our learners. - Learners introducing their whānau to their teachers and peers online has provided deeper personal connections which can continue to be built on with a return to the physical learning environment - Parents and whānau have learnt even more about their tamariki, their strengths and how they learn, which provides a great opportunity to work together in partnership to plan learning for the rest of the year together Parents and whānau have also reported they have enjoyed watching their children’s learning progress, along with understanding more about the challenges they face. Dr Melanie Riwai-Couch has discussed in this webinar how sometimes there is a disconnect between business as usual reporting and communication and what parents and whānau really want to know about their child’s learning. The COVID-19 lockdown and subsequent transition back to centres and schools provides an opportunity to unpick this further and to ask: - What do we know about what families want to know about their child’s progress? - Do we provide opportunities for families to ask questions as well as being given information? - Are parents and whānau “informed consumers” or are they “determined contributors” in their child’s learning? The place of values and culture post lockdown Associate Professor at the University of Auckland Dr Melanie Webber and Raiha Johnson, have both discussed how upholding te ao Māori values are more critical than ever in supporting ongoing collective wellbeing following the COVID-19 lockdown and as centres/kura/schools return to a new normal. Whakamana – teachers and leaders need to whakamana the communities of tamaraki and rangatahi and celebrate the time they have spent with their whānau, rather than focussing on the perceived loss of formal learning opportunities. Teachers could ask their learners: - What did you learn about your role in your whānau during lockdown? - What did you learn about another whānau member that made you proud? Whanaungatanga - relationships and reconnecting together as a learning community will be key. Ministry of Education Psychologist Michelle Wood describes in this webinar how important it is that children and young people know that their teachers are excited to be with them again and that their focus is not immediately resuming the learning programme but re-connecting with each other. Kaitiakitanga – recognises that teachers are the kaitiaki in the learning environment and are responsible as protectors and guardians of our tamariki during a time where they and their whānau may be feeling anxious. Dr Webber went on to explain, that we already know that culture and language can ground tamariki and rangatahi during times of uncertainty and upheaval. Learners will have been talking with their whānau more than ever about their whakapapa, about Matariki. So, as we transition back to centres/schools/kura it is a good time to support learners to reflect and ask them: - What are you grateful for? - What are you working towards? - How might you contribute to the goals of others? As teachers consider individual and collective views on how the transition back to centres and kura might progress, the Ministry of Education shared this webinar where teachers, parents and leaders discussed what was important for them in their learning environments. Learning beyond the centre gates – the place of working theories post lockdown In terms of assessment, planning and teaching, there is a unique opportunity for a stronger focus on working theories and the way in which we can better understand our tamariki’s perspective of the world and the impact of recent events in their lives. So how do we demonstrate, in practice, our professional capability in this theory? Helen Hedges talks specifically about working theories in this article where she reminds us of the tentative and speculative nature of a theory. We know the experience of COVID-19 has informed the thinking in the minds of our very young children in particular. Hedges suggests in this article that “young children are participating in these new ways to live and be” and asks what new meanings are they ascribing to their daily lives? What do they think might happen in the future? Hedges also referred to a blog and noted the choice of words children used to describe their thoughts and feelings about the impact COVID-19 had on them: “We can see a number of children’s working theories about what COVID19 has meant in their lives, including about being “stuck inside”, what their parents are doing during the pandemic, that they miss grandparents, friends and schooling, that personal hygiene has perhaps become (more?) important, their pride in those who work in the medical community, and so on. Ones I find interesting too are those projecting ideas and theorising about how the world might change as a result of this shared experience.” Post COVID-19 we have a new lens to apply when collaborating with whānau in child-led teaching and learning. We can continue to strengthen our practice around collaboration, inclusion and partnership, by maximising the opportunity to use our expertise in planning for learning that maps the voices of whānau and in particular their children and by responding to their voice with activities and challenges that mirror their current working theory, post COVID-19 lockdown. We would love to hear from you about your experience of teaching and learning while in lockdown. Please contact us on email@example.com or start a conversation on Hapori Matatū! This article was researched and written by the Teacher Capability and Collaboration team. Helen Hedges Working Theories Helen Hedges – children’s working theories about COVID-19 Riwai-Couch, M., Bull, A., Ellis, B., Hall, K., Nicholls, J., Taleni, T., Watkinson, R. (2020). School-led learning at home: Voices of the parents of Māori and Pasifika students. Auckland, Evaluation Associates Ltd. Webinar: Learning from lockdown – the voices of parents of Māori and Pacific learners Summary Article: Dr Nina Hood – Lessons from lockdown: engaging in true partnership with Māori and Pasifika families Ministry of Education webinar - Diverse Perspectives on Wellbeing Ministry of Education webinar - Transitioning back for children and young people with learning needs Ministry of Education webinar – Transitioning back to early learning services
<urn:uuid:6fac31ee-7248-4d7f-86b2-86f5500e3ede>
CC-MAIN-2020-29
https://teachingcouncil.nz/content/learning-lockdown
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00365.warc.gz
en
0.965157
1,955
2.671875
3
Joseph A. Labadie Collection Hatcher Graduate Library 913 S. University Avenue Ann Arbor, MI 48109-1190 A collection documenting the history of social protest movements and marginalized political communities from the 19th century to the present In the 1930s, the U-M Library’s Joseph A. Labadie Collection — the oldest publicly accessible archive of its kind in America — was called “probably the most complete record of the social unrest of our times that has ever been assembled." Since then, the collection has only grown, expanding from its original focus on anarchism to also encompass antheism and free thought, anti-colonialist movements, anti-war and pacifist movements, civil liberties and civil rights, labor and workers' rights, LGBTQ movements, prisons and prisoners, New Left, Spanish Civil War, youth and student protest, and many more. The collection is named for Detroit labor activist and anarchist Joseph Antoine Labadie (1850-1933), who in 1911 donated the books, pamphlets, newspapers, magazines, manuscripts, and memorabilia he had assembled over the years. Today, the Labadie Collection is the most widely used of all of the library’s special collections and serves as a unique and important resource for students and researchers at U-M and around the world. “This is a collection that documents history from below,” says curator Julie Herrada. “We are preserving, and making available to the public, the activities of under-represented groups, people whose ideas are considered marginal or dangerous.” Labadie Collection materials have been used in numerous publications and exhibits. A single poster from the collection, for example, was recently sought out for inclusion in an art book, as well as displayed in exhibits at Cornell University and the National Center for Civil and Human Rights in Atlanta, Georgia. And new materials are being added to the collection all the time. “Not long ago we received a large donation of transgender rights research materials that greatly add to our existing strength in LGBT topics,” she adds. Along with physical access to rare and unique archival materials, a host of materials are available digitally including scans of anarchist pamphlets, historic photographs,more than 1,000 political “pin-back” buttons and over 2,000 posters on topics we cover. Because of the collection’s breadth and depth, several finding aids and guides to its holdings are available, including to many of the uncataloged manuscripts and letters. "Melba Joyce Boyd, a well-known author and Wayne State University professor, says that an activist is a person with a certain level of consciousness who then incorporates that consciousness into what they do. So, I see my work as a curator as a kind of activism,” says Herrada, who has overseen the collection since 2000. Follow us on Facebook.
<urn:uuid:d9b9ead0-627a-47be-a615-961f0cbe6838>
CC-MAIN-2018-13
https://www.lib.umich.edu/labadie-collection/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648207.96/warc/CC-MAIN-20180323102828-20180323122828-00431.warc.gz
en
0.947276
602
2.828125
3
Hola, Amigos! Beginning foreign language in early childhood helps students to develop higher levels of proficiencies in one or more languages. In other words, they develop an ear for language! Research also shows that children who learn a foreign language in early childhood demonstrate certain cognitive advantages over children who do not. Young learners from age 2 through Kindergarten, attend Spanish class each week at the Elegant Child.
<urn:uuid:b0786e8a-dccf-4195-b66a-584e73adc891>
CC-MAIN-2020-29
https://www.elegantchildcampus.com/spanish?lightbox=dataItem-iuc0yoyt1
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900335.76/warc/CC-MAIN-20200709131554-20200709161554-00172.warc.gz
en
0.917366
86
3.28125
3
Table of Contents We take a cricket ball for granted but we simply couldn’t play a match without it so I think it’s worth taking a few minutes to find out how a ball is made. The Manufacturing Process of Cricket Balls Cricket balls are rarely hand made, certainly as far as the professional game is concerned. The days of tradesmen shaping the leather and stitching the seam with calloused hands are long gone. With the majority of manufacturers, machines take care of the process from start to finish although some hand made elements may remain. - In the early stages, a small, central sphere of cork is taken. - Some string is wound tightly around it until the ball gets to a certain width. - The leather exterior is now put in place before the ball is stitched. - This is where the procedure will differ slightly. Some producers will use a machine to take care of the stitching while others will continue to finish off the ball by hand. - The ball will then be polished until a high sheen is achieved. - The manufacturer’s branding is then stamped on the surface and the ball is finally finished. It’s a fast and easy process when taken care of by that machinery but keep reading for a closer look at the various stages and those component parts. What is a Cricket Ball Made of? 1. Cork Centre A hard sphere of cork is used at the very centre of the cricket ball. It’s a tough and durable material which is reinforced with rubber for extra hardness. If we look at the Dukes manufacturer which is responsible for balls used in professional cricket in the UK and other parts of the world, we find that the cork is machine made and the rubber is imported from Malaysia. It may be the smallest part of the final product but that inner core is vitally important. This is the central foundation upon which the rest of the ball is made so great care must be taken to get things right. Tightly wound yarn or string is used in the next stage of the manufacturing process. There doesn’t appear to be any special requirements for this material but it is important that the yarn is wound very tightly around the central cork sphere. The tightness of the second piece of the equipment is instrumental in terms of weight and hardness of the ball itself. 3. Leather Exterior There is a famous saying in cricket about the sound of ‘leather on willow’ and that’s the clue to the next part of the ball. A leather exterior surrounds the cork and string and it provides the surface of the ball itself. In the majority of cases, cow leather is used in this stage of the manufacturing process. That’s the standard for professional balls around the world although there are isolated cases where ox leather and even buffalo leather are used. Dukes balls offer an interesting insight into this part of the production process: They only obtain leather from one specific tannery in Scotland as they believe this is the best supplier of the highest quality leather. Four segments of leather are used on the surface. For red balls, these should be of four equal quarters and, for consistency in the quality, they should all come from the same stretch of leather. In white balls, it’s possible to use two pieces of leather and that’s partly why they don’t have the same levels of durability. The thickness is also important here: With the Dukes ball, the leather can be between 4mm and 4.5mm thick. With other balls, particularly those made and used in the subcontinent, the surface could be between 2mm and 3mm. That’s a big difference and one that can affect how the ball performs and how long it lasts for. The final part of the process sees the leather surface put firmly into place via the stitching process. The seam stitches the leather in as it goes around the circumference of the ball. I mentioned that machines do most of the work in this process but there is an element of hand stitching still in the game. With the Dukes ball, there are six individual rows around the circumference of the ball and all are hand stitched. It’s a very painstaking process but one that ensures a high quality product in the end. At the very end of this process, the leather is polished to a high standard. At Dukes, a synthetic grease is used which treats the ball, and prevents the leather from picking up any moisture. A lot of this grease is used and that’s why the Dukes ball tends to be darker and shinier than any of its competing brands. Throughout this round up I’ve used Dukes for the examples and that’s because they are widely respected and acknowledged as the best producer. Other manufacturers, such as Kookaburra, might do things slightly differently but the overall process will be very similar. And that’s it: The ball is finally ready to be used in a match situation. Different Types of Cricket Balls The traditional red ball has been used in most forms of cricket for centuries. The first change to the rule came along when white cricket balls were introduced for day/night games. In the present day, pink balls have come along to join the family of professional cricket balls.
<urn:uuid:815473ff-46d9-451c-b742-72aaa0bc298a>
CC-MAIN-2023-40
https://www.itsonlycricket.com/how-is-a-cricket-ball-made
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00409.warc.gz
en
0.952806
1,121
2.96875
3
The video teaches the technique of crocheting with two different yarns. You start with a basic slip knot and then crochet a basic chain of ten loops. It is important to keep the loops loose and to ensure that you pull both yarns through the loop each time. Crocheting with two yarns give you a bigger fuller knot. After crocheting the chain of ten, you make a foundation row starting by crocheting two loops and then going through the second loop in the row of ten, using a single crochet stitch. As the foundation row is made, it is again important to be sure that you keep the knots loose so that they don't get too tight. On the next row, you use a half double crochet stitch through the back loop starting at the third loop from the crochet needle.
<urn:uuid:fe010884-8faf-4bf3-84af-233a8005f111>
CC-MAIN-2018-51
https://knitting-crochet.wonderhowto.com/how-to/crochet-with-2-yarns-283204/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826800.31/warc/CC-MAIN-20181215061532-20181215083532-00239.warc.gz
en
0.943774
164
2.5625
3
Offshore islands are often preferentially selected for marine sanctuaries (no take areas) over inshore reefs on populated coasts because they support relatively unique marine communities and critical habitat for protected marine wildlife and are often less accessible to people. To evaluate whether marine sanctuaries around an offshore island with a large fur seal colony performed differently to inshore areas, we compared fish assemblages at 36 reef sites within marine sanctuaries and fished areas around an offshore Island and within inshore areas of the Batemans Marine Park in temperate southeastern Australia. In each site, we quantified fish assemblage structure using 3–4 replicate baited remote underwater video deployments. We also evaluated the role of fur seal activity, sea surface temperature and wave exposure in structuring fish assemblages on reefs inside and outside marine sanctuaries. Of these variables, only fur seal activity on shallow island reefs (∼10 m deep) was significantly related to fish assemblage structure with a negative relationship to fish richness and abundance. The fish assemblages in marine sanctuaries differed significantly from fished areas on deep reefs around Montague Island (30–40 m deep) and on shallow inshore reefs (∼10 m deep), with 119% and 45% more fish and 49% and 19% more species of fishes in marine sanctuaries in the two areas, respectively. There were also significantly more kyphosids, labrids, southern maori wrasse (Ophthalmolepis lineolatus) and silver sweep (Scorpis lineolata) in marine sanctuaries than in fished areas on deep reefs around Montague Island. Although there was, on average, 34% more fish on shallow reefs inside than outside marine sanctuaries around Montague Island, there were no significant differences in fish assemblages when the influence of fur seal activity was taken into account. Given that fur seals numbers are increasing and they eat reef fishes, marine sanctuaries on shallow reefs adjacent to seal colonies may not achieve some of the positive benefits associated with increased fish biomass (e.g. increased kelp cover) to same level as sanctuaries more distantly located. We suggest, therefore, that careful consideration of long-term conservation goals (e.g. conservation of fur seals or local enhancement of fish diversity) is needed before preferentially locating marine sanctuaries adjacent to fur seal colonies. Kelaher, BP, Tan, M, Figueira, WF, Gillanders, BM, Connell, SD, Goldsworthy, SD, Hardy, N & Coleman, MA 2015, 'Fur seal activity moderates the effects of an Australian marine sanctuary on temperate reef fish', Biological Conservation, vol. 182, pp. 205-214. Published version available from:
<urn:uuid:c1d254a3-0047-4146-8cc6-a3bdff821181>
CC-MAIN-2018-13
https://works.bepress.com/brendan_kelaher/30/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647649.70/warc/CC-MAIN-20180321121805-20180321141805-00746.warc.gz
en
0.902984
580
2.546875
3
Latitude: (shown as a horizontal line) is the angular distance, in degrees, minutes, and seconds of a point north or south of the Equator. Lines of latitude are often referred to as parallels. Longitude:(shown as a vertical line) is the angular distance, in degrees, minutes, and seconds, of a point east or west of the Prime (Greenwich) Meridian. Lines of longitude are often referred to as meridians. Middle East Latitude and Longitude examples: (see map) |Ankara, Turkey:||39°||55'||N||/ 32°||51'||E| |Baghdad, Iraq:||33°||19'||N||/ 44°||25'||E| |Islamabad, Pakistan:||33°||43'||N||/ 73°||3'||E| |Muscat, Oman:||23°||36'||N||/ 58°||35'||E| |Riyadh, Saudi Arabia:||24°||42'||N||/ 46°||43'||E| |Sana, Yemen:||15°||21'||N||/ 44°||12'||E| |Tehran, Iran:||35°||41'||N||/ 51°||25'||E|
<urn:uuid:e12f323b-3b54-4674-bb31-a74aa6919238>
CC-MAIN-2019-22
https://www.worldatlas.com/webimage/countrys/asia/middleeast/melatlong.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259327.59/warc/CC-MAIN-20190526165427-20190526191427-00088.warc.gz
en
0.692792
287
3.71875
4
Cytomegalovirus (CMV) is a common virus that can infect almost anyone. Most people don’t know they have CMV because it rarely causes symptoms. However, if you’re pregnant or have a weakened immune system, CMV is cause for concern. Once infected with CMV, your body retains the virus for life. However, CMV usually remains dormant if you’re healthy. CMV spreads from person to person through body fluids, such as blood, saliva, urine, semen and breast milk. CMV spread through breast milk usually doesn’t make the baby sick. However, if you are pregnant and develop an active infection, you can pass the virus to your baby. There’s no cure for CMV, but drugs can help treat newborns and people with weak immune systems. Cytomegalovirus is related to the viruses that cause chickenpox, herpes simplex and mononucleosis. Once you’re infected with CMV, the virus remains with you for life, but it’s not always active. CMV may cycle through periods during which it lies dormant and then reactivates. If you’re healthy, it mainly stays dormant. You can pass the virus to others during reactivation. Transmission of the virus occurs through exposure to body fluids — including blood, urine, saliva, breast milk, tears, semen and vaginal fluids — not by casual contact. The virus can spread in a number of ways: - Touching your eyes or the inside of your nose or mouth after coming into contact with the body fluids of an infected person. This is the most common way CMV is spread because it’s absorbed through the mucous membranes. - Through sexual contact with an infected person. - Through the breast milk of an infected mother. - Through organ transplantation or blood transfusions. - Through the placenta, from an infected mother to her unborn child, or during birth. CMV is a widespread and common virus that can infect almost anyone. But healthy children and adults who contract the infection usually have few if any symptoms, so CMV often goes undiagnosed. In the rare cases in which CMV causes a healthy person to become very sick, the infection may cause the following complications: This syndrome resembles infectious mononucleosis, but the Epstein-Barr virus (EBV) causes classic mononucleosis. If you have signs and symptoms that resemble mononucleosis — a sore throat, swollen glands and tonsils, fatigue, and nausea — your doctor will test you for the antibody your body makes to fight off EBV. If it’s absent, there’s a chance CMV is causing your symptoms CMV infection in your intestines can result in diarrhea, fever and abdominal pain; inflammation of your colon; and blood in your stool. CMV can cause abnormal functioning of your liver and an unexplained fever. A variety of neurological complications have been reported as a result of CMV infection in the nervous system. These may include inflammation of your brain (encephalitis). CMV can cause inflammation of your lung tissue (pneumonitis).
<urn:uuid:4e758a3c-0981-4988-8e60-301d66e89421>
CC-MAIN-2017-43
http://cmvcanada.com/about-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00788.warc.gz
en
0.921681
668
3.703125
4
Rain Water Harvesting system based on modern technology has been proposed because of its multiple advantages over the conventional type. Some of the advantages are – Flexible Design, Easy to clean, Faster Installation and Relocation, Longer Life, Better Water Quality, Accident Free Honey Comb Structure, Load bearing structure hence provides Reusable Upper Surface, High Void Ratio and Water Storage Facility. As per the smart city guidelines the buildings under the smart cities must be energy efficient and sustainable and elements such as Rain Water Harvesting must be part of the development. Apart from this, the Environment Clearance given for Area Based Development has also mandated the provision of Rain Water Harvesting in all the upcoming projects. The size of RWH pits 50 cum, 100cum & 200 cum depending upon the catchment area of the selected location. Currently 12 locations have been identified to install these harvesting systems. The system shall be installed at the outflow points along the peripheral storm water drainage system within the plots and shall collect all the rooftop water as well as water in the open area. Similarly, installation shall be made along the outflow of various roads, collecting rain water from storm water drainages. The total cost of the Project is Rs. 8.79 Cr.
<urn:uuid:e3d38980-cac6-4cb6-ac2f-0e6e3b1596b1>
CC-MAIN-2022-33
http://smartbhopal.city/abdprojectdetails/MTE%3D.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00414.warc.gz
en
0.935273
248
2.578125
3
Sochi water woes could wreak havoc for the athletes and tourists of the 2014 Winter Olympics. It has been a well known fact for years that the water of Sochi, Russia, is contaminated. The issue has been shoved under the rug without resolution, but is now in plain view for the world to see. Minimal efforts and temporary fixes to control the dangerous situation have only been a slight disguise to the real problem. Sochi was chosen by the International Olympic Committee (IOC) to host the 2014 Winter Olympics and $51 billion was raised to build the parks and stadiums for the big event. More attention to important things such as safe drinking water should have been top priority. Bottled water seems to be the cure all for thirsty competitors and visitors. Water, however, is not just to quench thirst, it is the sustenance of life. Beyond staying hydrated and refreshed, water is needed for cooking and bathing. These key requirements to daily living also seem to be in question with the current quality of Sochi water. Sochi, located on the coast of the Black Sea, depends on the Mzymta River for their city water supply. Over recent years with increased construction of the Olympic Village, landfills near the river have been overloaded with debris and industrial waste. Run-offs into the river have caused pollution and contamination. Officials have simply paid major EPA fines instead of correcting the issue of safe water in Sochi. Cover-ups of clay over the debris in the landfills and ignorance in the quest for power have only been masks to the real problems. Tires, spray cans, foam, cement slabs and various other hazardous materials have all been piled into the landfills. Distractions over the years have seemed to avoid relaying the true nature of the problem to the IOC. Bottled water from suppliers such as Sochi Water, Ltd., Alibaba and KAY National Spring Water have become mainstays in the Russian daily water consumption. Even if from a natural spring, it causes one to wonder how pure the bottled water really is. Some processed and bottled water travels in from as far as Turkey, where it is gathered from the Uludag Mountain. People have been conditioned to trust the bottled water without question. Most likely safe, with the over 3,000 athletes, plus dignitaries, reporters and tourists from around the world, additional water companies no doubt are helping with the supply. Added to the equation, as somewhat a side issue, is the boycott of Coca-Cola products from some Americans due to the controversial Super Bowl commercial. Cocoa-Cola produces Dasani bottled water, so if it is available some may be forced with a critical choice. Sochi water woes could wreak havoc even in the simple pleasure of bathing. It has been reported that the contaminated water is tinged yellow and could be dangerous to the skin. Showering may be put on hold anyway with the latest revealing fact of surveillance cameras in the bathrooms and showers. Deputy Prime Minister Dmitry Kozak let it slip to reporters, that hotels use cameras to help prevent water shortages by monitoring guests. It may be a very long two weeks with the issues at hand. Sochi water woes could wreak havoc on the health and welfare of the athletes and visitors. Infections, rashes, diseases, treatment of wounds, proper food preparation with sanitary water and much more could turn a glorious worldwide event into a gruesome nightmare. A few days under unfavorable living conditions could greatly impair an athlete’s ability to compete. Dreams will still come true, medals will still be won, but the tales of Sochi may provide memories one could live without. By: Roanne FitzGibbon
<urn:uuid:62702476-301c-4678-b08a-9bd7ae2e7e8a>
CC-MAIN-2015-35
http://guardianlv.com/2014/02/sochi-water-woes-could-wreak-havoc/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064445.47/warc/CC-MAIN-20150827025424-00334-ip-10-171-96-226.ec2.internal.warc.gz
en
0.963745
749
2.578125
3
The Present Active Participles The present active participle, like all present participles, is derived only from imperfective verbs, since it refers to an action that is currently taking place or which takes place repeatedly. The simplest way of deriving the Present Active Participle is to remove the final т from the 3rd Person Plural form of the verb, add -щ plus the appropriate adjective agreement endings, i. e. -щий, -щая, -щее, -щие. For example, the second conjugation stem for "divide" is дел-и-, so the present active participle is formed like this: The verb делай- "do, make" ends on a consonant and so is a first conjugation verb. It forms its present active participle like this: . Other consonants stems, like вед- (вести) follow the same rule: . Participles generally share a meaning with a который clause. Notice that the inflectional ending of the который clause is the same as that of the participle in the following examples. Notice also that, like который and adjectives, they agree with the noun in number and gender but, unlike который they also agree as to case. |девушка, которая живёт у нас the girl who lives with us |девушка у нас the girl living with us |человек, который сидит на диване the person who is sitting on the couch |человек на диване the person sitting on the couch |собака, которая всегда лает the dog that always barks the dog always barking |дерево, которое сейчас зеленеет the tree that is turning green now the tree that is now turning green |Now Try a Few Yourself| Type in the correct form of the participle below, then push the button to check your answer. Click here for font information. More participal exercises
<urn:uuid:b8972b87-8dbc-4fed-9766-3fffcbe7b8f2>
CC-MAIN-2017-17
http://www.alphadictionary.com/rusgrammar/presact.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121153.91/warc/CC-MAIN-20170423031201-00069-ip-10-145-167-34.ec2.internal.warc.gz
en
0.736337
580
3.03125
3
Here are some tips about bad musician habits to avoid while practicing your instrument. Trying to break those habits will help you enhance your practice sessions and will greatly facilitate your learning process. 1. Not Reading your Teacher’s Notes Your teacher, if you have one, is your best advisor. He absolutely knows how you play, the areas you need to progress in and your bad habits. Also, he is giving you many detailed practice notes during your lessons. Read these notes regularly to focus on the right things. If you ignore them, you will be frustrated and the result will be a poor week of practice. Your teacher will also show you how pieces should sound and the perfect position to adopt. Don’t forget to write down each tip that seems interesting for you. 2. Not Listening to the Piece You’re Working on Even if you’ll find a lot of indications on how to play the piece on the music sheet (pitch, rhythm, articulation, dynamics…), it is really important to listen to and memorize the melody. It is definitely easier to play a song when you can imagine it in your mind and sing it while you practice. It is also important to listen to the sound you are producing to compare it to the melody you already know. Feel free to record yourself regularly and listen to your performances to see what needs to be improved. 3. Not Focusing on What Needs Work Even if it’s always enjoyable and rewarding to play pieces and parts we already know and that we perfectly master, save your energy for difficult parts and remain focused on the task at hand. That’s what practice is all about. At the beginning of your session, don’t start from the beginning of the piece if you already master it, but rather start with the problematic parts. Your time is precious, use it to fix problems and move forward. Repetition is also one of the best ways to progress and secure technique, do not try to run away from the pieces that cause you problems, just repeat them again and again. 4. Not Spending Enough Time with Your Instrument We can never say it enough: regular practice is the key to progress. Ideally, your goal should be to practice every day, even if it’s for 20 or 30 minutes. But if you can’t, it’s not a big deal, just try to find some moments during the week. Here are some tips to find time to practice effectively, between school or work, family responsibilities and a dinner with your friends. But don’t forget that music practice should not become a chore or a boring task. Take a look at our next advice to revitalize your practice sessions. 5. Playing It Alone All the Time It’s important to practice alone, and spend time focusing on the hard things by oneself is natural in the learning process. But practicing for hours and weeks alone can also isolate you and make way for boredom. Music is sharing! Finding other musicians, of your level or not, can be really interesting to enjoy playing your instrument differently, discover other ways of practicing and progress with the help of your fellow musicians. Great music happens when artists collaborate! With internet and social media, you can find groups near your (with Facebook or forums), or more naturally find local associations or events to meet other musicians. 6. Being Too Hard on Yourself We’ve all experienced it before, it’s not always the perfect moment to practice but you still make the effort. It’s important to listen to yourself and accept that, sometimes, things will be harder than other. It’s not a sign of regression, just a bad mood, a tough night or fatigue. Also remember that learning to play an instrument will not happen overnight. Go easy on yourself, take a break in your practice sessions, just listen to the song you’re learning, repeat easier parts or pieces if possible, or do some scales, but above all don’t get discouraged. 7. Not Setting Goals for Yourself It’s probably something you’ve read or heard before… But it seems easy to forget to set any goals or to forget what we’re working towards. Try to set attainable goals regularly and mark your progress, this will help you throughout your learning process. 8. Not Working on your Fingering Never forget scales and finger exercises at the beginning of your practice sessions. It’s not a waste of time, you’ll make your fingers more agile and it will make your training easier. In addition, by doing finger exercises at the beginning of each session, you will make your fingers more resistant and you will be able to play longer without getting them tired. Your fingers are your working tools, take care of them! 9. Having a Bad Posture Your posture will greatly influence your learning process. If you play sitting down, sit up straight in order to be more agile with your arms and avoid back pain. When you play standing up, adopt a natural posture and release all unnecessary tensions in your limbs. A good posture is crucial and often forgotten, especially since you don’t have a teacher to correct you. It is also important for your breath management. During your practice sessions, you’re focused on technique, notes, rhythms, but don’t forget to breathe regularly to stay calm and in control of your body. 10. Too early, too fast, wrong acceleration… Don’t Forget the Tempo. The purpose of practicing is to improve your ways of doing things, not to perform. The best way to achieve this is to deconstruct the piece by playing it so slowly that it becomes almost unrecognizable. Use a metronome to make sure you stay in rhythm. It can be boring sometimes, however there is no other solution. More generally speaking, learn to love your metronome! Nothing keeps a musician honest and exposes mistakes like the steady click of a metronome. It’s not always easy for beginners to keep the tempo honest, you may start too early, accelerate while playing… The most important is to realize that and to correct it quickly, before our memory records the wrong rhythm. As seen in the 2nd section, take the time to listen, record yourself and if possible, use music accompaniment to improve your performances. Don’t forget that you can use Metronaut app to enhance your practice sessions with music accompaniments that listen to you! You can record yourself, listen to the accompaniment and then play it at the chosen tempo. Chloe from Metronaut Team
<urn:uuid:c06c2a13-4c33-4aa9-92f6-c51eeb596cd8>
CC-MAIN-2020-16
https://www.antescofo.com/metronaut-blog/bad-musician-habits-avoid-practice/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00176.warc.gz
en
0.931104
1,381
2.765625
3
Youth Training for Democracy and Development The overall objective of the project was to strengthen the participation of young people in Guatemala through training to create a base of young leaders from indigenous communities living in the Department of Alta Verapaz. The project strategy revolved around four priority components: developing the competencies of young leaders to improve their ability to assume responsibility in their communities; promoting knowledge about current legislation to foster rule of law, governance, and democracy; improving the quality of the dialogue between youth and local government to consolidate opportunities for participation; and encouraging youth to become more involved and influential in local decision-making bodies to help meet the basic needs of their communities. The approach was consistent with the grantee’s strategic goal of providing young people training in participatory civic practices, and enabling them to approach and develop responses to the problems and needs of youth in rural indigenous communities. In addition, the project’s cost-benefit ratio was positive: there was very high participation in terms of the number of benefiting communities and the number of young people completing the project’s training.
<urn:uuid:31857431-be96-4b8d-ac12-5197d9762774>
CC-MAIN-2023-50
https://www.undeflessonslearned.org/projects/youth-training-democracy-development/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00008.warc.gz
en
0.955797
220
2.859375
3
Tobacco smoking caused an estimated 20% of national Indigenous deaths in 2003. Smoking is twice as common in Indigenous as non-Indigenous Australians. THe project increased knowledge about Indigenous smoking by describing: - Indigenous perceptions of why people smoke or quit - The social determinants of Indigenous smoking - National and local trends in Indigenous smoking The project increased knowledge about tobacco control activities for Indigenous people by: - Evaluating tobacco control projects - Monitoring tobacco control activities in remote Indigenous communities. Summary of outcomes This research added important new evidence about Indigenous perceptions of smoking and quitting in remote communities, the social determinants of smoking and quitting, local and national trends in Indigenous smoking, and evaluations of tobacco control interventions. It also established the feasibility of monitoring tobacco consumption trends in remote Indigenous towns, using store and takeaway sales of tobacco. Such monitoring (and local feedback) is analogous to the established monitoring of infectious disease notifications. It enabled policy responses to local changes in tobacco consumption, and facilitated the evaluation of the local impact of new tobacco control activities and policies. - Fact Sheet: Reducing Tobacco Smoking among Aboriginal People PDF [509 KB], March 2008 - Policy Brief: Targeting Indigenous Australians' Smoking Rates PDF [378 KB]
<urn:uuid:04e7c505-11e8-46d4-b02e-6e53af168ae9>
CC-MAIN-2019-04
https://www.lowitja.org.au/evaluating-tobacco-control
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584328678.85/warc/CC-MAIN-20190123085337-20190123111337-00384.warc.gz
en
0.885222
253
3.640625
4
PUBLIC HEALTH TEAM “Public health is a discipline that addresses health at a population level”. Public health not only deals with the treatment of unhealthy people but it also deals with the preventing the healthy people from getting diseased. Sanitation problem is one of the major issues affecting public health. This project is based on the study of sanitation issues in the selected areas i.e., Chokkasandra near Dasarahalli and Shrirampura near Mantri square. Keeping sanitation as our main topic we went forward for the survey. After doing survey we got to know that the health problems of the people living over there are mainly because of improper sanitation. Our report said that 50% of the houses over there did not have basic facilities such as toilets and solid waste management and they choose open defecation which was the root cause for all the health issues over there. Fig:1- Picture showing unhygienic environment over there. Fig:2-Houses built just next to drainage Fig:3- Children playing next to drainage which make them to fall sick frequently
<urn:uuid:c50398fd-cd57-4dee-833a-8cf49a88b6b6>
CC-MAIN-2019-22
https://www.sfdindia.org/public-health
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256600.32/warc/CC-MAIN-20190522002845-20190522024845-00052.warc.gz
en
0.966348
224
2.859375
3
Synopses & Reviews With its clear and engaging writing style, PRINCIPLES OF MICROECONOMICS, Sixth Edition, continues to be one of the most popular books on economics available today. Mankiw emphasizes material that you are likely to find interesting about the economy (particularly if you are studying economics for the first time), including real-life scenarios, useful facts, and the many ways economic concepts play a role in the decisions you make every day. Table of Contents Part I: INTRODUCTION. 1. Ten Principles of Economics. 2. Thinking Like an Economist. Appendix: Graphing: A Brief Review. 3. Interdependence and the Gains from Trade. Part II: SUPPLY AND DEMAND I: HOW MARKETS WORK. 4. The Market Forces of Supply and Demand. 5. Elasticity and Its Application. 6. Supply, Demand, and Government Policies. Part III: SUPPLY AND DEMAND II: MARKETS AND WELFARE. 7. Consumers, Producers, and the Efficiency of Markets. 8. Application: The Costs of Taxation. 9. Application: International Trade. Part IV: THE ECONOMICS OF PUBLIC SECTOR. 10. Externalities. 11. Public Goods and Common Resources. 12. The Design of the Tax System. Part V: FIRM BEHAVIOR AND THE ORGANIZATION OF INDUSTRY. 13. The Costs of Production. 14. Firms in Competitive Markets. 15. Monopoly. 16. Monopolistic Competition. 17. Oligopoly. Part VI: THE ECONOMICS OF LABOR MARKETS. 18. The Markets for the Factors of Production. 19. Earnings and Discrimination. 20. Income Inequality and Poverty. PART VII: TOPICS FOR FURTHER STUDY. 21. The Theory of Consumer Choice. 22. Frontiers in Microeconomics. Glossary. Index.
<urn:uuid:5f8f7205-dd88-423d-9193-552b2a31a8f0>
CC-MAIN-2015-48
http://www.powells.com/book/principles-of-microeconomics-6th-edition-9780538453042
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447783.20/warc/CC-MAIN-20151124205407-00007-ip-10-71-132-137.ec2.internal.warc.gz
en
0.803837
400
3.53125
4
Curious Indians, drafty outhouses and long walks are just a few of the inconveniences early students had to endure in Macomb County. In 1881 six one room schoolhouses dotted the countryside in Shelby Township, with 390 students. Schools were named for the land donor or geographical and physical Only 2 schools remain. The Prestonville Schoolhouse (25 Mile & Schoenherr built in 1881,was converted into a private residence. The Andrews Schoolhouse (25 Mile & Mound) was moved to the Shelby Township grounds in 1975 and restored as part of the townships Bicentennial project. This small wooden building is the former one room Andrews Schoolhouse. It dates back to the 1800’s. The school was originally located at the northeast corner of 25 Mile and Mound Roads. It was named for Hiram Andrews who owned the land on which the school was built. The school was moved to its present location in 1976 as part of the Shelby Township’s Bicentennial project. The first land grant for an eighty-acre parcel of land on which the school was later located was received by Abel Warren in 1842. He and his wife Sarah then sold a portion of the land to William and Laura Miller. Two years later they then sold twenty acres to Hiram Andrews for $300. Hiram Andrews, along with Jeremiah Curtis and Alanson Arnold, were district board members for School District #4 of Shelby Township. It was during this time that Hiram Andrews’ land was leased “for the sole purpose of a School house and no other”. On September 8, 1864 the land was once again leased for a period not “less than 50 years” to the “Fractional School District #4 of Shelby and Washington”. Documents imply that the school itself was not built until sometime after September 8, 1864 since in his recorded deed of that date Hiram Andrews made the following added provision, “That said District shall build a Schoolhouse on the aforesaid premises and use the same for School purposes for the consideration of which I receive $12.” The Schoolhouse was built at least by 1871 as records dated that year refer to “5/8ths of one acre with schoolhouse thereon.” At this time the land was owned by Chester Andrews, son of Hiram who died in 1869, and leased for 90 years to “the Fractional School District #4 or Shelby and Washington Townships at the cost of $10 provided that the said District use the same for School purposes.” This school district later became part of the Utica Community Schools. The building was periodically used for class into the 1950’s. Shelby Township’s population increase soon outgrew the Schoolhouse. It was unused for a time and then had a succession of owners, one of who converted it into a two family flat. Later it was purchased by Amoco Oil Co. who hoped to locate a service station at 25 Mile Road and Mound. Shelby Township, as a Bicentennial Project, sought to purchase, remove and restore the building. In April of 1975 the building was sold to the Shelby Bicentennial Committee for $1. One of the conditions of the sale was that the building be moved within 90 days. The original plan was to use an Army cargo helicopter from Selfridge to drop a hook an sling arrangement around the building and fly it to its new location. It was later decided that this might crush the building, so they attempted to lift it by its roof. The roof came off! Finally, a U.S. Army Transport crew and the U.S. Army Corps of Engineers moved the building by ground transport to its present location. There were many problems! The concrete foundation didn’t fit, the building was placed on the foundation backwards, the roof was damaged beyond repair, the walls were weakened, and most of the remaining tenants, wood-eating beetles, moved with the building! A master carpenter, Heinz Lambertz, and three assistants were hired with Federal funds to solve the problems. A new roof was put on just weeks before the first snowfall. An exterminator rid the building of its inhabitants, wobbly walls were secured to the foundation, and the ceiling was braced against the gabled roof. The back of the building was made to look like the front as doors and what was once a cloakroom were moved. Insulation and new wood siding were added. The bell tower and its original bell were reinstalled adding to the charm of this one room Schoolhouse. The Andrews Schoolhouse became the home of the Shelby Township Historical Committee in 1994.
<urn:uuid:772a93c1-1be1-434d-b077-49d09a592228>
CC-MAIN-2017-17
http://shelbyhistory.tripod.com/id30.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00452-ip-10-145-167-34.ec2.internal.warc.gz
en
0.986985
1,010
2.59375
3
"Saints have never flourished in those parts" [HOUN] Everybody knows of St. Patrick's Day on March 17, honoring the patron saint of Ireland, but England's patron saint, George, marks his Day today, April 23, with far less press. (The other two components of the United Kingdom also have saints: Scotland's St. Andrew is honored on November 30, Wales's St. David on March 1.) St. George's Day is not an English holiday, and the St. George's Cross, red on a white background, is associated mostly with soccer fans, though it does appear as one component of the Union Jack. St. George is, however, a significant figure in English folklore and literature, so it's no surprise that he makes a few appearances in the tales of Sherlock Holmes. Three explicit mentions of him have, as one might expect, a religious connection. - From "The Man with the Twisted Lip": "Isa Whitney, brother of the late Elias Whitney, DD, Principal of the Theological College of St. George's, was much addicted to opium." - In "The Noble Bachelor" there are two mentions of the location of the ill-fated wedding, St. George's Church in Hanover Square. - From "The Crooked Man": "Mrs. Barclay was, it appears, a member of the Roman Catholic Church and had interested herself very much in the establishment of the Guild of St. George, which was formed in connection with the Watt Street Chapel for the purpose of supplying the poor with cast-off clothing." But it's also St. George who is meant when Sherlock Holmes in "The Priory School" and "The Six Napoleons" swears "By George!" In fact the same oath is used ten times in canonical stories — twice by Holmes, twice by Lestrade, twice by Carruthers of "The Solitary Cyclist", and once each by Stapleton, Inspector Martin, Stanley Hopkins, and Leverton, hero of the Long Island cave mystery, in "The Red Circle", who is certainly no Englishman. These incidents all come in the second half of the canon. It can be assumed that "By George!" is a euphemistic substitution for "By God!" but even so it was strong language, apparently not suitable for use in any of the Holmes tales published before the twentieth century. |Credit: "Union Flag and St Georges Cross" by THOR - Summer Sky in Southsea England. | Licensed under CC BY 2.0 via Wikimedia Commons St. George himself was no Englishman either, but a Roman soldier, born in Palestine in the third century AD. The principal legend about his life is that he killed a (presumably diabolical) dragon, rescuing a maiden in the process. On the strength of that feat of heroism he is the patron saint not only of England but of Portugal, Bulgaria, Ethiopia, and dozens of other places, not to mention the Scout movement and herpes sufferers. In his honor, April 23 is a holiday in the Canadian province of Newfoundland and Labrador. And in his honour, according to one recent count, England has 104 pubs called the "George and Dragon". None of them figures in the Sherlock Holmes tales, although Holmes and Watson stay at the "Green Dragon," perhaps representing the creature St. George slew, when they leave London to investigate the affair of "Shoscombe Old Place". Charles Augustus Milverton's safe is a metaphorical dragon, "this green and gold monster, the dragon which held in its maw the reputation of many fair ladies," and in that case Holmes himself stands in for St. George when he conquers the monster. A very familiar reference to England's patron saint comes in the play Henry V, whose author, William Shakespeare, happens to mark his birthday on St. George's Day. He provides a brilliant speech for the young king, rallying his troops before the battle of Agincourt, which was fought exactly 600 years ago this October. "Follow your spirit," Henry (or Harry) urges them, "and upon this charge, Cry — God for Harry! England and Saint George!" Just a few words earlier, what does Henry tell his soldiers? All Sherlockians know that clarion call, which Sherlock Holmes quotes as he rouses Watson in "The Abbey Grange": "The game's afoot!" Image credit: Paolo Uccello [Public domain], via Wikimedia Commons
<urn:uuid:6d258432-94e8-4727-a8e9-a2275af376af>
CC-MAIN-2016-50
http://www.ihearofsherlock.com/2015/04/st-george-and-his-sherlock-holmes.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542112.77/warc/CC-MAIN-20161202170902-00061-ip-10-31-129-80.ec2.internal.warc.gz
en
0.964908
922
2.578125
3
Edmund of Woodstock, 1st Earl of Kent |Edmund of Woodstock| Coat of arms of Edmund, Earl of Kent 5 August 1301| |Died||19 March 1330 |Cause of death||Execution| |Resting place||Westminster Abbey |Title||1st Earl of Kent| |Tenure||26 July 1321 – 19 March 1330| |Known for||Younger half-brother of Edward II of England| |Years active||1318 – 1330| |Wars and battles||War of Saint-Sardos| |Offices||Lord Warden of the Cinque Ports| |Successor||Edmund, 2nd Earl of Kent| |Spouse(s)||Margaret Wake, 3rd Baroness Wake of Liddell| |Issue||Edmund, 2nd Earl of Kent Margaret, Viscountess of Tartas Joan, 4th Countess of Kent, Princess of Wales John, 3rd Earl of Kent |Parents||Edward I of England Margaret of France Edmund of Woodstock, 1st Earl of Kent (5 August 1301 – 19 March 1330) was the son of Edward I of England, and a younger half-brother of Edward II. Edward I had intended to make substantial grants of land to Edmund, but when the king died in 1307, Edward II failed to follow through on his father's intentions, much due to his favouritism towards Piers Gaveston. Edmund still remained loyal to his brother, and in 1321 he was created Earl of Kent. He played an important part in Edward's administration, acting both as diplomat and military commander, and in 1321–22 helped suppress a rebellion against the king. Discontent against the king grew, however, and eventually affected also Edmund. The antagonism was largely caused by Edward's preference for his new favourites, Hugh Despenser the Younger and his father. In 1326, Edmund joined a rebellion led by Queen Isabella and Roger Mortimer, whereby Edward II was deposed. Edmund failed to get along with the new administration, and in 1330 he was caught planning a new rebellion, and executed. Once the new king, Edward III, came of age and assumed personal control of government, he annulled the charges against his uncle. The title and estates of the Earl of Kent descended on Edmund's son, also called Edmund. When this Edmund died, in 1331, his brother John became earl. Though he was officially exonerated, Edmund did not enjoy a great reputation during his life and afterwards, due to his unreliable political dealings. Family background and early years Edward I of England had a great number of children with his first wife, Eleanor of Castile, but only one son who survived into adulthood – the future Edward II (b. 1284).[a] After Eleanor died, the king married Margaret of France, with whom he had two children: Thomas (b. 1300) and, when the king was sixty-two, Edmund.[b] Edmund was born at Woodstock in Oxfordshire on 5 August 1301, and was therefore referred to as Edmund of Woodstock. Son of the English king, he was also, through his mother, grandson of Philip III of France. On 7 July 1307, before Edmund had turned six, King Edward I died, leaving Edmund's half-brother Edward to succeed as King Edward II. Though not resident in the two boys' household, Edward I had taken great interest in the princes' upbringing and well-being. Before he died, the king had promised to provide Edmund with substantial grants of land. In August 1306, Edward I signed a charter promising Edmund land worth 7000 marks a year, and in May 1307, 1000 marks was added to this. He probably intended to give the earldom of Norfolk to Thomas, while Edmund would receive the earldom of Cornwall, which had been left vacant after Edward I's cousin Edmund died without children in 1300. When Edward II came to the throne, however, he went against his father's wishes by granting the earldom of Cornwall to his favourite Piers Gaveston. According to the chronicle Vita Edwardi Secundi, this act was a grave insult to the king's younger brothers. Edward II nevertheless took steps to provide his half-brother with an income; grants made in 1315 and 1319 secured Edmund 2000 marks a year. In May 1321, Edmund received the strategically important Gloucester Castle, and further grants followed his creation as Earl of Kent on 28 July 1321.[c] Edward II's close relationship to Gaveston had been a source of conflict at court, and Gaveston's execution by a group of rebellious barons in 1312 had brought the country to the brink of civil war. As Edmund came of age, he became an important member of the circle around his brother. In 1318, the Treaty of Leake was drafted as an effort to reconcile the opposing parties, and Edmund – as his first public act – was among the witnesses to sign this treaty. Further official appointments followed. In the spring of 1320 he took part in an embassy to Pope John XXII in Avignon, where the mission was to absolve the king of his oath to uphold the Ordinances, a set of restrictions imposed on royal authority by the baronage. Later that year, he joined his brother the king in Amiens, where Edward was paying homage to the French king. In October 1320, Edmund attended his first parliament. As the political conflict escalated into full-scale rebellion in 1321–22, Edmund played an important role in its suppression. The opposition stemmed from resentment against the king's new favourites, Hugh Despenser the Younger and Hugh Despenser the Elder. When Bartholomew Badlesmere, steward of the royal household, defected to the opposition, Edward made his youngest brother Lord Warden of the Cinque Ports in place of Badlesmere on 16 June. In the parliament of July 1321, Edmund briefly sided with the opposition when he agreed to exile the Despensers, but later claimed this had been done under duress, and in November sat on the council that annulled the exile. In October, Edmund was once more employed in a move against Badlesmere, when he took part in a siege on Leeds Castle in Kent, which was held by Badlesmere. After Badlesmere was forced to surrender, hostilities moved to the Welsh Marches, where Roger Mortimer and others were in open revolt. Once confronted with the royal army, Mortimer surrendered without a fight, and attention turned to the leader of the baronial opposition, Thomas of Lancaster. Edmund, who had taken part in the Marcher campaign, was now ordered, with the Earl of Surrey, to take Lancaster's castle of Pontefract. On 17 March 1322, Lancaster was captured after his defeat at the Battle of Boroughbridge, and brought to Pontefract. Here, Edmund was on the jury that condemned him to death for treason.[d] Even with Lancaster defeated, the battle against the rebels was not over. Edmund was charged with overtaking Wallingford Castle from Maurice de Berkeley in January 1323, a task which he fulfilled with great success. For his loyalty, Edmund was rewarded with substantial holdings in Wales, primarily land forfeited by Roger Mortimer.[e] The greater part of the spoils of war, however, went to the Despensers, who both benefited greatly from the forfeiture of the rebels. By 1326, the Despensers, father and son respectively, enjoyed incomes of £3,800 and £7,000, while Edmund's annual income was at only 2,355 marks (£1,570). Scotland and France With domestic opposition largely neutralised, the king turned his attention to Scotland. A major campaign was organised in August, but the effort ended in total failure when the English were routed by the Scots, led by Robert the Bruce, at the Battle of Old Byland on 14 October 1322. Edward II himself had to flee the battlefield to avoid capture, and Edmund was with him as the royal army retreated to York. The king's inability to handle the Scottish situation was becoming apparent. Andrew Harclay, who had defeated Lancaster at Boroughbridge, and for this had been created Earl of Carlisle and appointed Warden of the Marches to Scotland, signed a peace treaty with the Scots without royal sanction in January 1323. When the king found out, he ordered Harclay's arrest. Edmund was one of the judges who passed judgement on Harclay, who was hanged, drawn and quartered for treason. With Harclay gone, Edmund was given responsibilities for the defence of the northern border, but the situation remained untenable. On 30 May 1323, Edmund was on the council that agreed to a thirteen-year truce with Scotland. Meanwhile, the English king's possessions in France were coming under threat from the French king. Charles IV of France demanded that Edward again pay homage for his Duchy of Aquitaine,[f] while at the same time threatening to confiscate the duchy under the pretext of a local dispute involving the priory at Saint-Sardos. In April 1324, Edmund and Alexander de Bicknor, Archbishop of Dublin, were sent to France on a diplomatic mission. While some historians have criticised Edmund for his failure to reach a diplomatic settlement, others have pointed to the difficult circumstances he faced, and how others had fared little better. When diplomacy failed, Edmund was appointed Edward's lieutenant in France on 20 July 1324. Though there was a desperate need for reinforcements from England, these never arrived. In the short war that followed, the English lands were quickly overrun by the French, and Edmund was besieged at La Réole. Here he held out until 22 September, at which point he was forced to surrender and agree to a six-month truce. Deposition of Edward II Edward II's refusal to pay homage to the French king was based on concern for his royal sovereignty, but also on fear of a potential resurgence of domestic resistance. For this reason, he sent his wife Isabella to negotiate with King Charles, who was her brother. The Queen departed for France on 9 March 1325, and in September she was joined by her son, the heir to the throne, Prince Edward. Isabella's negotiations were successful, and it was agreed that the young Prince Edward would perform homage in the king's place, which he did on 24 September. Not long after this, Edmund joined the queen and prince in Paris. A circle of opposition was emerging around the queen, including the exiled Roger Mortimer. Edmund, who had previously been steadfast in his support for his half-brother, now joined the plot against the king. Though he still distrusted Mortimer, his hatred for the Despensers seems to have been even greater at this point. When Edmund, along with the others, ignored the king's order to return to England, his lands were confiscated in March 1326. In August, Isabella and Mortimer invaded England with mercenary soldiers, and Edmund took part in the invasion. The invasion won the support of a great part of the English nobility, including Edmund's brother Thomas, and Henry, Earl of Lancaster, Thomas of Lancaster's brother. Edmund took part in the trials of the two Despensers, and in the council transferring power to Prince Edward, who was crowned King Edward III. For his participation in the coup, Edmund received a reward of land belonging to the Despensers, and the Earl of Arundel, who was also executed as a supporter of Edward II. As the Northern situation was still difficult, Edmund was given joint command of the Scottish Border with Lancaster, but the two fell out, and Lancaster was soon after given sole command. It did not take long for Edmund to grow disenchanted with the new regime; one source of contention was the dominant position at court of Mortimer, who has been described as Isabella's lover. In the autumn of 1328, Edmund and his brother Thomas joined Henry of Lancaster in a conspiracy against Isabella and Mortimer. The conspiracy was a product of shared interest, however, rather than strong personal ties. Once it became clear that it would fail, the two brothers abandoned the venture. Death and aftermath After participating in the planned rebellion, Edmund became less popular at court. He was still allowed to accompany the king's wife Philippa to her coronation in January 1330, but his appearances at court became less frequent. At this point he became involved in another plot against the court, when he was convinced by rumours that his brother was still alive.[g] It later emerged that Roger Mortimer himself was responsible for leading Edmund into this belief, in a form of entrapment. The plot was revealed, and in the parliament of March 1330 Edmund was indicted and condemned to death as a traitor. Upon hearing that the verdict was death, the condemned earl pleaded with Edward III for his life, offering to walk from Winchester to London with a rope around his neck as a sign of atonement. Edward III however knew that leniency was not an option for the aforementioned entrapment utilized by Mortimer could extend to him and potentially be subversive to his own kingship if his father, Edward II truly was alive. Thus Edward III sanctioned the killing of his uncle. It was almost impossible to find anyone willing to perform the execution of a man of royal blood, until a convicted murderer eventually beheaded Edmund in exchange for a pardon. Edmund's body was initially buried in a Franciscan church in Winchester, but it was removed to Westminster Abbey in 1331. The execution of a royal prince was a great provocation to the seventeen-year-old Edward III, who had not been informed about the decision, and it probably contributed to the king's decision to rise up against his protector. In 1330, Edward III carried out a coup installing himself in personal control of government, and Mortimer was executed. Among the charges against Mortimer was that of procuring Edmund's death, and the charges against the late earl of Kent were annulled. In late 1325, Edmund had married Margaret Wake, sister of Thomas Wake, Baron Wake of Liddell, and the couple had several children. His lands and titles descended on his oldest son by the same name, but this Edmund himself died in October 1331. The earldom then passed to the younger son John. Edmund was not particularly popular while he was alive, nor did he enjoy a good reputation after his death. His unreliability in political issues, and repeated shifts in allegiance, might have contributed to this. His household was also said to behave in a way that caused popular resentment, taking provisions as they passed through the countryside while offering little compensation. At the same time, it has been pointed out that Edmund showed a great deal of loyalty to Edward II, in spite of receiving relatively little rewards and recognition from his brother. |Name||Birth date||Death date||Notes| |Edmund, 2nd Earl of Kent||1326||bef. 5 October 1331| |Margaret||1327||1352||Married Arnaud Amanieu, Lord of Albret| |Joan of Kent||28 September 1328||7 August 1385||Known as "The Fair Maid of Kent". Married Thomas Holland, 1st Earl of Kent, and later Edward, the Black Prince, son of Edward III.| |John, 3rd Earl of Kent||7 April 1330||26 December 1352| |Ancestors of Edmund of Woodstock, 1st Earl of Kent| - Marshall (2006), p. 190. - Waugh (2004). - Prestwich (1997), pp. 556–7. - Marshall (2006), p. 197. - Lawne (2010), p. 28. - McKisack (1959), p. 3. - Lawne (2010), p. 29. - Lawne (2010), p. 31. - Prestwich (2007), pp. 188–9. - Lawne (2010), p. 30. - Phillips (1972), p. 192. - Prestwich (2007), pp. 197–8. - Prestwich (2007), p. 198. - McKisack (1959), p. 66. - Maddicott (1970), pp. 311–2. - Lawne (2010), p. 33. - Barrow (1965), p. 317. - Lawne (2010), p. 32. - Phillips (1972), p. 229. - Prestwich (2007), p. 303. - Phillips (1972), p. 232. - McKisack (1959), p. 109. - Lawne (2010), p. 34. - McKisack (1959), pp. 108–9. - Tuck (1985), p. 88. - Lawne (2010), p. 35. - Prestwich (2007), p. 215. - McKisack (1959), p. 93. - McKisack (1959), pp. 82–3. - Tuck (1985), p. 90. - Tuck (1985), p. 97. - Haines (2003), p. 216. - Tuck (1985), pp. 99–100. - McKisack (1959), p. 100. - Prestwich (2007), p. 223. - Lawne (2010), p. 47. - Given-Wilson (1996), p. 33. - Prestwich (2007), pp. 223–4. - Tuck (1985), p. 103. - Powicke (1961), p. 434. - Lawne (2010), pp. 46–7. - Prestwich (1988), pp. 122–33. - Barrow, G. W. S. (1965). Robert Bruce and the Community of the Realm of Scotland. London: Eyre & Spottiswoode. ISBN 9780748620227. - Denholm–Young, Noël (1969). The Country Gentry in the Fourteenth Century: With Special Reference to the Heraldic Rolls of Arms. Oxford: Clarendon. ISBN 0198223013. - Given-Wilson, Chris (1996). The English Nobility in the Late Middle Ages. London: Routledge. ISBN 0415148839. - Haines, Roy Martin (2003). King Edward II: Edward of Caernarfon, His Life, His Reign, and Its Aftermath, 1284–1330. Montreal, London: McGill-Queens University Press. ISBN 9780773524323. - Lawne, Penny (2010). "Edmund of Woodstock, Earl of Kent (1301–1330): a study of personal loyalty". In Chris Given-Wilson (ed.). Fourteenth Century England VI. Boydell & Brewer. pp. 27–48. ISBN 9781843835301. Retrieved 12 May 2011. - Marshall, Alison (2006). "The childhood and household of Edward II's half-brothers, Thomas of Brotherton and Edmund of Woodstock". In Gwilym Dodd and Anthony Musson (eds.). The Reign of Edward II: New Perspectives. Boydell & Brewer. pp. 190–204. ISBN 9781903153192. - McKisack, May (1959). The Fourteenth Century: 1307–1399. Oxford: Oxford University Press. ISBN 0198217129. - Maddicot, J.R. (1970). Thomas of Lancaster, 1307–1322. Oxford: Oxford University Press. ISBN 0198218370. OCLC 132766. - Phillips, J.R.S. (1972). Aymer de Valence, Earl of Pembroke 1307–1324. Oxford: Oxford University Press. ISBN 0198223595. OCLC 426691. - Powicke, Maurice; E.B. Fryde (1961). Handbook of British Chronology (2nd ed.). London: Royal Historical Society. - Prestwich, Michael (1980). The Three Edwards: War and State in England 1272–1377. London: Weidenfeld and Nicolson. ISBN 0297777300. OCLC 185679701. - Prestwich, Michael (1997) . Edward I (updated ed.). New Haven: Yale University Press. ISBN 0300072090. - Prestwich, Michael (2007). Plantagenet England: 1225-1360 (new ed.). Oxford: Oxford University Press. ISBN 0198228449. - Tuck, Anthony (1985). Crown and Nobility 1272-1461: Political Conflict in Late Medieval England. London: Fontana. ISBN 0006860842. - Waugh, Scott L. (2004). "Edmund, first earl of Kent (1301–1330)". Oxford Dictionary of National Biography. Oxford: Oxford University Press. doi:10.1093/ref:odnb/8506. Hugh le Despenser |Lord Warden of the Cinque Ports Sir John Peche |Peerage of England| |New creation||Earl of Kent Edmund, 2nd Earl
<urn:uuid:cf4b5434-5b4f-4bf7-9b54-0dc1aea23c09>
CC-MAIN-2015-40
https://en.wikipedia.org/wiki/Edmund_of_Woodstock
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677497.37/warc/CC-MAIN-20151001215757-00073-ip-10-137-6-227.ec2.internal.warc.gz
en
0.962777
4,474
3.625
4
This first poverty assessment for Cambodia is based on the 1997 update of Cambodia's baseline poverty profile of 1993-94. Since the early 1990s Cambodia has made progress in rebuilding its economy following more than two decades of war. Trade and investment flows have risen to unprecedented levels, supporting average annual growth of 6 percent. In 1997 and 1998 reconstruction and recovery were set back by renewed political instability and by the East Asian crisis. With the assumption of office of a new reform-minded government in late 1998, and the virtual end of the Khmer Rouge movement in early 1999, there is renewed optimism that growth and recovery will resume. Cambodia FY00 PA Read the Full Text (10Mb PDF) Cambodia is nevertheless still a very poor country, with GDP per capita estimated at only $280 in 1998 and with other non-income indicators of poverty comparing poorly with those in other countries in the region, The 1997 poverty estimates confirm that poverty is pervasive in Cambodia--an estimated 36 percent of the population is poor--and rural households, especially those for whom agriculture is the primary source of income, account for almost 90 percent of all the poor. The poor are more likely than the better-off to live in households that are larger, have a larger share of children, and have a head of household who is less educated than the average. They also have much less access to public services than the better off. For example, while 17 percent of people in the richest consumption quintile have access to piped water, only 4 percent in the poorest quintile do. In rural areas the poorest quintile has net primary school enrollment of 50 percent, considerably below the 75 percent for the richest quintile. Less than 5 percent of children ages 12-14 in the poorest quintile in rural areas are enrolled in lower secondary schools, but 25 percent in the richest quintile are. About 21 percent of people in the poorest quintile have to travel more than 5 kilometers to reach a health clinic; only 14 percent in the richest quintile have to travel that far. About 6 percent of the poorest two quintiles live more than 5 kilometers from the nearest road; only 1.4 percent in the richest quintile do. While almost 20 percent of the richest rural quintile have access to publicly provided electric lighting, under 1 percent in the poorest quintile receives the same service. Differences in the design and coverage of the 1993-94 and the 1997 surveys mean that the two profiles are not directly comparable. Nevertheless, the modest decline in poverty during 1993-97 (from 39 percent to 36 percent) suggested by the profiles is corroborated by the estimated 3 percent increase in real per capita private consumption, as captured in the national accounts, and by broad improvements in other non-income indicators of poverty such as enrollment rates and maternal and infant mortality rates. The profiles also suggest that rural poverty declined less than urban poverty. This is plausible given the strongly urban bias in growth during the period. Growth was unbalanced, centered in Phnom Penh and other urban areas, driven by reconstruction efforts, and led by phenomenal increases in such activities as construction and tourism. In contrast, growth of rural activities, based primarily on agriculture, showed considerable variability and significantly lagged growth in the rest of the economy. Despite its pervasiveness poverty in Cambodia is relatively shallow, suggesting great scope for poverty reduction through rapid growth. In fact, income poverty rates could be cut by as much as 50 percent by 2005 if Cambodia is able to resume and maintain average annual growth of 6 percent. But such gains in poverty reduction will depend strongly on the pattern of growth. If growth continues to be urban-focused, poverty reduction gains can be expected to be much less and rural poverty in particular will remain high--especially since the depth of poverty is greater in rural areas. In contrast, poverty in Phnom Penh would be almost eradicated. This report recommends three components to a broad poverty reduction strategy for Cambodia: - Expanding economic opportunities through rapid growth--particularly growth of the rural sector. - Helping the poor build human assets. - Providing an adequate safety net to address the needs of vulnerable groups in society. The government's Five-Year Socio-economic Plan (1996-2000) gives priority to poverty reduction and recognizes these three elements as critical to its antipoverty strategy. However, much greater attention to the growing HIV/AIDS epidemic is needed given the significant potential it holds for increased poverty--both new poverty as well as a deepening of existing poverty. Extensive public education on the epidemic and an prevention should figure prominently in the government's health and overall poverty reduction strategy. Creating Economic Opportunities through Rapid Growth Creating new economic opportunities through rapid and sustained growth, particularly in rural areas, must be the core of a successful poverty reduction strategy for Cambodia. Almost half of the poor in Cambodia would be lifted out of poverty within the next eight years if the economy grew at 6 percent annually. But this growth must be more broad based than in the recent past. This will require maintaining a stable macroeconomic environment and deepening reform in order to tackle the remaining impediments to growth. Fiscal policy will continue to play an important role in stabilization efforts, given the extensive dollarization of the Cambodian economy. The objective of policy should be to avoid levels of fiscal deficit that could be destabilizing because they lead to rapid growth of the money supply, to high levels of domestic borrowing that could crowd out the private sector, or to unsustainable levels of external debt. Cambodia has in the recent past successfully used fiscal policy to maintain macroeconomic stability. However, the quality of fiscal adjustment needs to be improved through greater reliance on revenue generation--especially by addressing governance issues related to forestry revenues--and less on expenditure cum particularly in the social sectors and in operations and maintenance. Success in the government's demobilization efforts will be important in achieving sustainable fiscal adjustment while meeting social sector objectives. Cambodia has made impressive progress in its transition to a market economy. Further reforms are needed, however, to remove remaining distortions in the economy. This is especially important since most countries in the region have reinvigorated their reform efforts in order to speed their recovery from the regional crisis and improve their long-term competitiveness. Cambodia cannot afford to be left behind. The new government has already introduced fiscal reforms. Other key areas for policy attention include further public enterprise reform: private sector development, and banking sector reform. Public enterprise reforms should focus on commercializing enterprises remaining in the public portfolio in line with the law regulating public enterprises. Rehabilitation plans should be formulated for the six rubber plantations and a privatization plan outlined and implemented. Private sector development can be further fostered by adopting a comprehensive commercial code and by strengthening the rule of law through better enforcement of existing laws and modernization of the judiciary. Banking sector reforms should focus on strengthening the prudential and regulatory framework, including adequate regulations on provisioning for loans, legislation that facilitates the taking and enforcement of collateral, and enactment of a bankruptcy law. In addition, the supervisory capacity of the National Bank of Cambodia should be strengthened, particularly its capacity to enforce capital adequacy standards and force the exit of banks that cannot comply, especially the numerous weaker smaller banks. But growth must also be more balanced than it has been in the recent past to ensure that economic opportunities are widespread. In particular, special emphasis must be placed on stimulating growth and opportunities in the rural economy, where the overwhelming majority of Cambodia's poor live. This will require both raising agricultural incomes and promoting diversification into other rural activities. Key areas for policy attention include increasing crop productivity through greater access to improved seed varieties; appropriate sail and pest management, and better water control through small-scale irrigation facilities. Increasing livestock and fisheries production is also important, and will require improved technical services for animal health, fisheries research, conservation, and management. Investments are needed to upgrade and maintain secondary and tertiary roads, to strengthen rural infrastructure and provide better access to input and output markets. Support for the development of formal rural finance institutions will be important for expanding access to rural credit. And easing the land constraint will require addressing the issue of military land holding and speeding up land titling efforts--particularly in rural areas--as part of the creation of a transparent and secure land market. Government efforts to promote growth must be combined with efforts to increase the assets of the poor, thus allowing the poor to take full advantage of the economic opportunities created through growth. Increasing the physical assets--land, credit, rural infrastructure--of the poor is an integral part of promoting rapid growth of the rural sector and hence of the economy as a whole. Building the human assets of the poor, including education and health, is equally important for helping them access economic opportunities and for sustaining growth. Expanding Access to Education for the Poor Cambodia's achievements in education in the 1960s and early 1970s were systematically erased by the Khmer Rouge in the second half of the 1970s, when schools, equipment, and books were destroyed, effectively abolishing education. It is estimated that 75-80 percent of all teachers and secondary school students fled or were murdered in 1975-79 (Asian Development Bank 1996). Post-Khmer Rouge, Cambodia has made impressive progress in expanding schooling. There was a concerted effort to rebuild the education infrastructure, but this had to be done under tight budgetary constraints. The government made rehabilitation of primary education its main focus in the 1980s, but despite these best of intentions, primary school enrollments plateaued at around 1.3 million between 1985 and 1991, which actually meant declining enrollments given the rapidly expanding primary school-age population (Asian Development Bank 1996). Since then, however, enrollments have expanded more rapidly than population, and gross primary enrollments in 1997 increased to almost 95 percent, according to the Ministry of Education, Youth, and Sports. This is impressive by any standard. But problems remain. Why Enrollment Rates Are So Low among the Poor. Enrollment rates vary considerably between the poor and the better-off in Cambodia. Only 55 percent of all children of primary school age in the poorest quintile of the population attend school, compared with 79 percent for the top quintile. These disparities increase at higher levels of education, with virtually no children from the poorest quintile enrolled beyond primary school. Both supply and demand factors are important in explaining low enrollment among the poor and the significant disparities in enrollment across income groups. Half of the rural population does not have a primary school in the village and more than 95 percent have no secondary school. Children in the poorest quintile also have to walk longer distances to school--on average almost 7 kilometers to the nearest lower-secondary school outside the village, compared with about 4 kilometers for children in the richest quintile. Limited and poor quality rural roads aggravates poor physical access to schools. Schooling is also extremely expensive for the poor; the cost of one child in primary school takes up a quarter of all nonfood spending per capita in the poorest quintile. Quality of schooling (as measured by such factors as availability of teachers and proportion of trained teachers) is another contributing factor. The probability of enrollment is also strongly associated with gender, with boys more likely than girls to be enrolled. What Government Can Do to Raise Enrollment Rates among the Poor. Improving physical access to schools by constructing more schools in poorer--particularly rural--areas and by improving rural infrastructure will be critical to raising enrollments, but policy must also address issues of price and quality. In particular, the relative costs of schooling will have to be lowered for the poor. Fewer than 10 percent of the poorest students are exempted from school fees. Fee exemptions, coupled with a clearly established and transparent system of needs-based scholarships for the poorest students will be necessary to raise the enrollment rate of this group. Another option is for the government to provide (or to insure) loans to needy students to help them pay for education costs (as in Thailand and the United States, for example). The advantage of a loan program is that it relies mainly on private resources in a situation in which government funds are severely limited. The funds to finance both scholarships and loans can be obtained by reducing high levels of public subsidies to post-secondary education, a practice that benefits mainly the rich. As well as reducing schooling costs, a pro-poor schooling policy should address school quality. The extraordinarily high pupil-teacher ratios in rural areas (80 and above) will need to be brought down at least to the national average (around 60)--and probably lower. This will require a more rational policy of deploying teachers across provinces and villages. One way to do this is to pay teachers a premium to work in underserved areas (a policy used with some success in Indonesia and elsewhere). Funds to finance these quality improvements could also be obtained, at least in the short run, from savings generated by reducing subsidies to post-secondary education. Data on earnings suggest that women have higher returns to primary and lower-secondary schooling than do men, especially at younger ages. Yet female enrollments, especially at the lower-secondary level, lag behind those of men. This is not only inequitable but inefficient. Targeting at least some additional schooling subsidies to poor girls would boost efficiency and equity. Some countries (Bangladesh and India, for instance) have found scholarship and stipend programs targeted to girls an effective means of raising enrollments of girls. Data also indicate that the private sector still has only a limited role in schooling in Cambodia. Fewer than 1 percent of students are enrolled in private institutions, most of them in post-secondary schools (typically vocational training). The support of the private sector will be needed to expand secondary school coverage in Cambodia. One strategy would be for the government to target its limited educational spending to providing basic and secondary education to poor students and to let the affluent turn to the emerging private sector for schooling needs. Alternatively, vouchers can be used to provide access to private schools for the poor. Indeed, broader use of vouchers might increase efficiency in education by fostering competition between public and private schools. Household survey data already show a strong shift of upper-income groups to private schools. This should be encouraged, so that the government can better target its expenditures to the poor. It would be useful, however, to identify constraints and problems, including any formal or hidden restrictions imposed by the government, that may put a brake on the private sector expanding its role in the provision of schooling in Cambodia. Improving Access to Health Services for the Poor Many health facilities around the country were completely destroyed. often deliberately during Cambodia's more than 30 years of war and conflict. Even today many parts of Cambodia still have no health facilities, and in other places facilities are too dilapidated to be of any use. Yet despite these handicaps, the government has taken concrete steps to reconstruct and revitalize the public health system. The Ministry of Health has also been instrumental in developing and expanding programs to tackle infectious diseases, such as the National Tuberculosis Program and the National Malarial Program, and in vastly expanding coverage of child immunization programs. In addition, since 1996 the Ministry of Finance has been implementing a health services plan to expand access to health facilities. This improved access to health services for the population could not have been achieved without the assistance of donors and nongovernmental organizations (NGOs). Why Health Service Use Is So Low among the Poor. High costs of health services, low house-hold incomes, limited education, and inadequate access to health facilities and to health personnel are all important factors in explaining the low use of health services by poor Cambodians. The cost of health care (measured by health spending per capita relative to household spending per capita on nonfood items) is much greater for the poor than for the non-poor. One outpatient visit to a commune clinic or district health center would use up half of all nonfood spending for someone in the poorest quintile. Moreover, there is no formal and transparent mechanism for exempting the poor from user fees. For them, health care is simply unaffordable. The poor also have less immediate physical access to health facilities than the non-poor. Better-off Cambodians have much greater local (within-village) access than the poor to the four most frequently used health providers: drug vendors, commune clinics, private clinics, and trained midwives. Moreover, the poor have to travel much longer distances to all types of health facilities than the better-off when no health provider is available in their home village. But other factors, especially education, are also important in determining health services use. Immunization rates among children up to 24 months old are significantly lower for the poor than for better-off Cambodians even though more than 95 percent of the poor reported a child immunization campaign in their village in the previous 12 months. Indeed, since child immunization has such wide coverage and is free in Cambodia, it is difficult to explain the large disparities in immunization coverage based on differences in economic standing or affordability. Cambodians with more schooling are more likely to treat their illnesses than those with no schooling. Moreover, women with primary and post-primary schooling are much more likely than those with no schooling to use preventive health services such as immunization for their children. While there is no hard data, anecdotal evidence suggests that health services to the poor are of much lower quality than those available to the better-off. The low quality of health services, combined with high relative cost, must act as a strong deterrent to the use of health services by the poor. What Government Can Do to Improve the Health of the Poor. As with education, government efforts to increase use of health services by the poor should include both demand and supply measures. Reducing out-of-pocket costs of health services for the poor will be critical. Expanding and enforcing user fees, in parallel with a transparent mechanism for exempting the poor from such fees and providing a free supply of drugs targeted exclusively to Cambodia's poorest will be important in ensuring greater equity in access to health services while reducing affordability constraints for the poor. These measures need to be implemented in parallel with greater cost recovery in secondary and tertiary health facilities such as provincial and central hospitals. Several of Cambodia's health facilities need rehabilitation, but in the long run additional primary health facilities are needed to increase access. Unlike most other developing countries, Cambodia does not have a nationwide network of primary health care facilities. The government's Health Coverage Plan aims to create a new network of 909 health centers, 65 referral hospitals, and 8 national hospitals in 72 operational districts. The location of the new facilities will have to be carefully selected, with an emphasis on providing facilities in remote and underserved regions, to meet the objective of providing equitable access to basic health and referral services for the entire population. In the shorter to medium term increased access in such areas could be provided through mobile health posts. The low quality of health care in public facilities needs to be addressed. An important first step is to raise staffing standards so that commune clinics and district health centers used by the poor have trained medical workers. Better salaries and benefits for health workers could also provide increased incentives for higher quality service. In addition, stocks of drugs and medical supplies in commune clinics and district health centers need to be increased. The quality of health services could also be enhanced by allowing health facilities to retain a share of fees collected. These efforts to raise health services utilization by the poor will entail a restructuring of public health expenditures to benefit the poor. Public expenditures need to be targeted more toward proving adequate funding for primary health facilities, a process that began in 1996 as spending was shifted from hospitals toward primary health care. This trend should continue, shifting more resources to preventive health interventions (such as communicable disease control programs) and curative services targeted to the poor. This shift also represents more efficient use of public resources, given the substantial positive externalities of preventive health care and private underspending on such care. Private sector provision should be encouraged to complement government efforts and to ensure adequate access to health services as living standards improve with growth. Appropriate government regulation will be important in setting quality standards that ensure public safety. This is especially important in the case of private drug vendors who are mainly unregistered and used heavily by poorer groups for self treatment. Providing an Adequate Program of Transfers and Safety Nets Vulnerable groups in Cambodia can benefit from the protection offered by a well-functioning system of transfers and safety nets. NGO and other aid agencies are active in this area, but there is very little in the way of a functioning government system. A strategy for developing such a system should emphasize timely delivery of assistance and effective and efficient targeting to ensure that resources reach only the intended beneficiaries. Given Cambodia's largely rural population and low level of development, policies that are likely to work include well-designed rural public employment schemes that can provide insurance against agricultural uncertainties. For those unable to work options to consider include food-based interventions such as food distribution and feeding programs, special operations to provide basic food items to the poor in remote and other high risk areas during times of insecurity, and feeding programs and transfer schemes administered through the public health system. While the need for safety nets is great, the effectiveness and successful targeting of such a system in addressing poverty will depend on further progress in identifying indicators of poverty in Cambodia that have strong predictive ability.
<urn:uuid:70b00cc0-87fc-411c-8fbb-d672c91e8fda>
CC-MAIN-2014-42
http://web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTPOVERTY/EXTPA/0,,contentMDK:20204883~isCURL:Y~menuPK:435735~pagePK:148956~piPK:216618~theSitePK:430367,00.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507450097.39/warc/CC-MAIN-20141017005730-00027-ip-10-16-133-185.ec2.internal.warc.gz
en
0.959914
4,356
2.890625
3
What is Arthroscopic Knee Surgery? Arthroscopic knee surgery involves making a small incision through the skin so doctors can diagnose and treat knee problems. A small camera is inserted through the incision, which then displays images of the knee. From here, surgeons can insert small medical instruments to perform a surgical debridement, which is the removal of dead, damaged or infected tissue. This process helps the healthy tissue in the area heal. Surgical debridement of the knee can include: - Removing torn areas of meniscus tissue - Removing loose bodies - Removing and cleaning up areas of cartilage damage - Other minimally invasive procedures that do not include any repairs What is a Knee Meniscectomy? The surgical removal of a torn meniscus is called a meniscectomy, which is a type of arthroscopic knee surgery. The meniscus is a cushion for your knee and helps keep your knee steady by balancing your weight. Meniscus tears are most common in the knee joints and are usually caused by twisting or turning the knee quickly. Arthroscopic Knee Surgery Recovery After a meniscectomy, your surgeon will likely advise physical therapy to put you on the best path toward recovery. The day after your surgery, you will need to see your physical therapist to: - Change your dressings - Take initial measurements - Learn an initial home exercise program Your physical therapist will also review information about what to expect, how to take care of your incisions and how to manage your pain. Handouts outlining everything you will learn will be provided. Physical therapy appointments will be scheduled twice a week for approximately 6 to 8 weeks. Walking with Crutches Some patients are released from the surgical center with crutches, but most can walk immediately. If you were given crutches, we will likely encourage you to stop using them as soon as possible. Returning to Work & Daily Activities Most people can get back to desk work, school or sedentary activity 3 to 5 days after surgery. If your right knee was operated on, it may be up to 2 weeks before the knee is strong enough to hit the brakes to drive safely. For heavy work, it may take 4 to 6 weeks before the leg is strong enough to allow for working. You should never drive or operate heavy machinery if you are still taking prescription pain relievers. Returning to Sports Approximately 4 weeks after surgery, patients typically begin to perform higher level activities during physical therapy visits. With your physical therapist’s guidance at 4 to 6 weeks, you will begin the gradual transition back to your sport. However, your surgeon will make the final decision about your full return to activity. Weeks 0 to 2 During the first few weeks of your arthroscopic knee surgery recovery, you should be bearing weight as tolerated with crutches. You should be progressing to full weight bearing without the use of crutches. Range of Motion (ROM) - 0 to 125 degrees is expected - Quad sets, glute sets - Ankle pumps - Hamstring and calf stretches - Multi-angle isometrics for quads (90 to 60 degrees) - Straight leg raises (multi-plane) - Knee extension, open chain 90 to 40 degrees - Patellar mobs - Heel slides to tolerance - Bicycle for ROM - Passive range of motion (PROM) focused on improving full extension ROM - Standing weight shifts - Standing mini squats 0 to 30 degrees - Low-level balance and proprioceptive exercises in standing - Proprioceptive exercises focus on the ability to sense movement within joints. Weeks 2 to 4 Range of Motion (ROM) - Full ROM is expected - Continue exercises from weeks 0 to 2 and all passive and active ROM - Standing hamstring curls - Bilateral protected ROM leg press - Bicycle for ROM and light cardiovascular endurance with no resistance - Stationary mini-lunge forward - Calf raises (standing bilateral –> unilateral) - Wall slides - Progress standing balance and proprioceptive exercises - Pool walking program once incisions are fully closed Weeks 4 to 6 - Continue exercises from previous weeks and all passive and active ROM as needed - Lateral step-ups - Squats (increased ROM) - Stair stepper machine <20 minutes - Continue with exercises to achieve terminal knee extension - Bicycle for cardiovascular endurance with light to moderate resistance Weeks 6 to 8 During these weeks and the following weeks, there are no restrictions to activities of daily living (ADLs). - Continue exercises from previous weeks - Advance closed kinetic chain (CKCs) and functional exercises - Begin walking program for cardiovascular endurance - Gradually increase time on stair stepper for cardio endurance - Functional movement screen (FMS) at 8 weeks Weeks 8 to 12 - Light plyometrics (jump training) if good hip and knee mechanics, gradually advancing - Linear forward jogging in short bouts, gradually progressing jog intervals - Perturbation training (also known as improving reaction times) - May initiate gentle yoga - Initiate elliptical for cardiovascular endurance - Initiate forward agility drills (progressing to lateral as appropriate) - Begin a strength and conditioning program, like Access Acceleration During this time period, your surgeon must clear you before you’re able to return to your sport. - Progress jogging program, intervals and/or sprint training - Sport-specific training as needed: cutting, jumping, deep squats, etc.
<urn:uuid:68f5c83a-b6e7-4429-9d5a-8e9b3f8419eb>
CC-MAIN-2021-04
https://www.accesssportsmed.com/meniscectomy-recovery/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514495.52/warc/CC-MAIN-20210118092350-20210118122350-00463.warc.gz
en
0.920889
1,189
2.53125
3
Hundreds rallied to support labeling of genetically engineered foods. Around 200 people, some wearing blindfolds and vegetable costumes, attended “What’s on Our Plates?” last week, a community forum in northeast Albuquerque. Organizers say the purpose of the meeting was to inform the public about genetically-engineered (GE) foods and push the city for legislation that would require companies to label genetically-engineered foods. Yong Jung Cho, field organizer for Food & Water Watch, said the forum is just one of many of an ongoing campaign to make labeling of GE food mandatory by law. “There are no long-term studies proving that genetically engineered foods are safe for human consumption or for the environment and yet the Federal Drug Administration still doesn’t require labeling. However at the heart of the issue is consumers deserve the right to know what we are eating and what we are feeding our families.” Genetically engineered crops are created by transferring genetic material from one organism into another to create specific traits, such as resistance to treatment with herbicides… or to make a plant produce its own pesticides to repel insects. Some of the most common genetically-engineered foods are corn, alfalfa, cotton and soybeans. In 1992, the FDA approved Calgene’s Flavr Savr™ tomatoes making it the first genetically modified food to be sold in U.S. stores. Earlier this year the New Mexico State Senate voted down a bill that if passed would have made it mandatory for companies to label of genetically-engineered food throughout the state. However, the city of Santa Fe passed a resolution about two weeks ago making it mandatory to label foods that contain genetically-engineered food products.
<urn:uuid:fa33576b-8dfb-450e-98e2-4def82ba1876>
CC-MAIN-2014-42
http://alibi.com/blog/s/news/44400/Hundreds-rallied-to-support-labeling-of-geneticall.html?mobile=y
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646425.54/warc/CC-MAIN-20141024030046-00016-ip-10-16-133-185.ec2.internal.warc.gz
en
0.949846
359
2.78125
3
1. Negative comments Empathetic people are always tuning in to how other people feel around them. This can have two outcomes e.g. tuning into other peoples’ feelings can be draining or energising. Being around negative people who are complaining, criticising or generally speaking ill of other people can be doubly difficult for highly empathetic people. Empaths tend to take on the blame and responsibility for others feelings. Acknowledging that somebody else has had a negative impact on your own thinking is a positive step towards discarding negativity from your life. It is important to find ways to separate yourself from negativity, especially if you take on other peoples’ burdens. 2. Crowded public places When experiencing high levels of empathy, it may be temporarily difficult to approach crowded areas, like going to the supermarket, shopping centres, bars etc. Wherever there are throngs of people, highly empathetic people can experience sensory overload. Living inside an empath’s head can become very noisy at times. Colours, sights, smells, facial expressions, tone of voice, gestures all seem to hit the empath at once, without the ability to filter or block out unnecessary background noise. Crowded public places can become intensely stressful for highly empathetic people as they are trying to diminish some of the ‘noise’. The best way to overcome intense feelings associated with crowded places is to begin visiting these areas at quieter times during the day. Over time, you can begin to visit crowded public places at busier times, but try to have a direct goal in mind. When focussing on one goal, it may be easier to focus on a singular pursuit than allowing the senses to work on overdrive. 3. Anxiety, worry and stress By becoming aware of the thoughts and feelings around you, it is highly likely that empathetic people struggle with anxieties and worries. They may even unknowingly take on worries that won’t directly affect them. Empaths strengths reside in their ability to understand multiple situations and points of view. They appreciate the connectedness between all things which makes it harder to separate their own problems from everyone else’s. This is why it is very important for empathetic people to take time for themselves. Highly empathetic people would benefit from time away to reflect, meditate and connect with things that they personally enjoy. 4. Being perceived as weak or fragile Highly empathetic people have an enormous amount of strength. They are incredible powerful people to be able to understand others and situations. However, due to their more sensitive nature, highly empathetic people are often perceived as too nice, weak willed or fragile. These statements couldn’t be further from the truth. It takes an enormous amount of strength to feel. Putting yourself in somebody elses’ shoes, especially given the amount of hurt, disappointment and dissatisfaction experienced by many people in daily life, is a brave and strong quality. Unfortunately, those who do tend to perceive highly empathetic people as weak or fragile are often quite disconnected and switched off to the feelings of those around them, making it even more frustrating for the struggling empath. In order to overcome poor perceptions, highly empathetic people must keep viewing their gift as a strength.
<urn:uuid:489c1df7-94f3-4f1d-8904-0e0bd80d58a5>
CC-MAIN-2019-26
https://happychoix.com/2015/10/31/4-obstacles-that-highly-empathetic-people-have-to-overcome/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998580.10/warc/CC-MAIN-20190617203228-20190617225228-00190.warc.gz
en
0.964518
678
3.03125
3
Non-biblical evidence for individuals named in the Bible is rare, particularly for people who were not royals. But an ancient Babylonian tablet provides further proof that a king and his servant — both named in the Book of Jeremiah — existed in the 6th century B.C. according to an announcement by Assyriologist Michael Jursa. According to an announcement by Assyriologist Michael Jursa and the British Museum , the small clay tablet from the museum’s collections bears the name of Babylonian officer Nebo-Sarsekim. In chapter 39 of the Book of Jeremiah, this individual is described as being with King Nebuchadnezzar II at the siege of Jerusalem in the year 587 B.C. Jursa, a visiting associate professor from the University of Vienna, discovered the find while analyzing the tablet’s cuneiform script, which was produced by pressing a wedge-shaped instrument — probably a cut reed — into moist clay. The tablet turns out to be a 595 B.C. bill of receipt acknowledging Nebo-Sarsekim’s payment of over 1.6 pounds of gold to a Babylonian temple. Jursa said that "finding something like this tablet, where we see a person mentioned in the Bible making an everyday payment to the temple in Babylon and quoting the exact date is quite extraordinary." Both Nebo-Sarsekim and Nebuchadnezzar were players in key historical events with repercussions still felt today. Prior to the 587 Jerusalem siege, the Babylonians had allied themselves with Iranian warriors. After Nebuchadnezzar’s 604 B.C. coronation, he campaigned in Syria for five months. In 601 B.C., he and his troops marched to the Egyptian frontier, where the Babylonians and Egyptians battled for many years. During the course of this struggle, Nebuchadnezzar captured Jerusalem. Zedekiah, a Babylonian-appointed king of Judah, later rebelled, which led to yet another Jerusalem siege in 587-586 B.C., during which a large segment of the population was deported. Arab-Israeli tensions in the region have continued until the present day. In fact, Iraqi dictator Saddam Hussein made links between himself and King Nebuchadnezzar in speeches and by use of billboards that showed Hussein shaking hands with a drawing of the ancient king, according to Aaron Brody, assistant professor of Bible and archaeology at the Pacific School of Religion and director of the Badè Museum. "Nebuchadnezzar vanquished surrounding nations, so Hussein wanted to draw parallels with his own reign and that of the former Mesopotamian leader," Brody told Discovery News. Brody thinks the tablet represents "further verification that certain historical elements within the Book of Jeremiah are valid." He said this time period in the Bible, around the 6th century, is among the least disputed among Biblical scholars. The Old Testament’s 9th century Assyrian texts are also believed to contain historically accurate information. Other parts of the Bible, however, such as those that describe earlier events from the 10th century, are still hotly debated. The British Museum tablet even suggests that some Biblical translations were adjusted to fit altered moral standards. Nebo-Sarsekim is described on the tablet as being Nebuchadnezzar’s "chief eunuch." Eunuchs were castrated in order that they might supervise harems, sing at a higher pitch, or perform certain civic, social or religious functions without posing much of a threat to leaders. More modern versions of the Bible had listed Nebo-Sarsekim as being a "chief officer," but it is now believed that "chief eunuch" was indeed the correct, original title given by Jeremiah. Irving Finkel, assistant keeper in the Department of the Middle East at the British Museum, agrees that the tablet is important. "Cuneiform tablets might all look the same, but sometimes they contain a treasure," Finkel said. "Here a mundane commercial transaction takes its place as a primary witness to one of the turning points in Old Testament history."
<urn:uuid:23e42d58-25d2-494d-939d-c885bb8675cc>
CC-MAIN-2023-50
https://www.impactlab.com/2007/08/17/ancient-tablet-vouches-for-biblical-king/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00493.warc.gz
en
0.965064
873
3.65625
4
Spring marks the peak of the Louisiana strawberry season when fresh berries are abundant and so sweet. Strawberries are a nutritious and delicious treat. They are naturally high in fiber, vitamin C, folate, potassium, and antioxidants while being low in calories and nearly fat and sodium free. One cup of strawberries has 46 calories, 85 mg of vitamin C and 2.9 grams fiber. Stock up on the fresh berries now, and store them properly to enjoy after the peak season. Since strawberries do not ripen after picking, choose firm ripe berries with a solid red color and bright green caps attached. If the container has red stains, the berries may be overripe or crushed. It is important to store strawberries correctly to maintain freshness. Spread them in a flat container, cover loosely, and refrigerate unwashed until ready to use. Washing strawberries removes their natural protective outer layer, and quality will begin to deteriorate rapidly. When ready to use, thoroughly wash berries under cold running water in a colander. Do not soak them in water. Freezing is the best and easiest way to maintain nutritional quality and keep berries fresh for a length of time. Strawberries freeze well with or without sugar, but texture, color and flavor are better when packed in sugar. Berries can also be frozen with artificial sweetener in place of sugar. Just follow the package directions for the equivalent amount of sugar. To freeze with sugar, sprinkle sugar over berries that have been washed, dried and sliced. Use ½ to ¾ cup sugar to 1 quart (1 1/3 pounds) of berries depending on your taste preference. Turn berries gently with a large spoon until all are coated with sugar. Let set for 5 to 10 minutes to make their own juice. Pack berries in freezer bags or containers leaving ½ inch of space at the top. If you use a rigid container, place a small piece of crumpled waxed paper or freezer paper on top to hold berries under the juice. Seal airtight, label, and freeze quickly. If you want to make preserves or jam later, or if you want to limit your sugar intake, freeze berries without sugar. To freeze whole berries without sugar, place in a single layer on a tray or baking pan. Cover lightly and freeze quickly until firm. Remove berries from pan and package in freezer containers or bags. When ready to use, you can thaw berries in the refrigerator or in a pan of cool water. Strawberries are best served with a few ice crystals remaining since they may become mushy if thawed completely. Strawberries can be stored in the freezer at 0 degrees for 8 to 12 months. If you would like more information on using or storing fresh strawberries, click here to download “Its Strawberry Time” publication.
<urn:uuid:88778dd0-c53d-4c99-b2f6-76678d23ef27>
CC-MAIN-2019-09
https://www.lsuagcenter.com/portals/our_offices/parishes/ouachita/features/fcs/sweet-on-strawberries
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482478.14/warc/CC-MAIN-20190217192932-20190217214932-00085.warc.gz
en
0.913244
564
2.578125
3
To recognize National Alzheimer’s Disease Awareness Month in November, Griswold Home Care has created an engaging infographic that provides a visual snapshot of the most critical barriers, frustrations, challenges and best practices for clients with Alzheimer’s Disease and their family/professional caregivers. Alzheimer¹s Disease is a progressive brain disorder that can impact a person’s memory, concentration, personality, judgment, perception, orientation and ability to complete activities of daily living. Alzheimer’s Disease also creates significant emotional, financial and psychosocial burdens for those living with the disease. Over the last two years, the US Department of Health and Human Services and national advocacy organizations have updated and published a “National Alzheimer’s Plan to Address Alzheimer’s Disease.” This publication offers 70 pages of detailed findings, goals, challenges and priorities. Recent research has also uncovered new medical and non-medical treatment approaches that have shown some promise. We still do not have a cure for Alzheimer¹s Disease. This often creates a sense of helplessness for clients and caregivers. We feel that there are things that you can do to fight back such as advocacy, clinical trials, research funding and peer-to-peer support. Read on to learn more about Alzheimer¹s Disease and steps you can take to fight back. For more information, please review our Alzheimer’s Disease & Dementia Resources.
<urn:uuid:421f88c8-83a2-4db1-9e0f-7978f6eb2256>
CC-MAIN-2017-26
http://www.griswoldhomecare.com/blog/alzheimers-disease-innovation-2013-a-review-of-barriers-and-best-practices-infographic/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00632.warc.gz
en
0.906202
289
2.546875
3
First cat in space Félicette to get memorial statue after successful crowdfund Félicette, the first cat to fly into space in October 1963, is seen her carrier pre-flight. A crowdfunded campaign will erect a memorial to honor the Félicette in her hometown of Paris, France.(CNES) Nov. 17, 2017 — The first cat to launch into space and live to meow about it is getting her own monument — thanks to the crowdfunded support of more than 1,100 of her fans. A campaign on the Kickstarter website on Friday (Nov. 17) successfully raised more than $57,000 to create "a proper memorial" for Félicette, a female black-and-white stray that lifted off on a French rocket for a sub-orbital spaceflight on Oct. 18, 1963. The funds will underwrite the sculpture and erection of a statue for Félicette in her home city of Paris. "Although other animals in space — such as Laika the dog and Ham the chimpanzee — are well-known within popular culture and have lasting memorials, very few people are aware that a cat went to space at all. Now it's time for 'The Astrocat' to get the memorial she rightly deserves," wrote Matthew Serge Guy of London, who came up with the idea for the statue and created the Kickstarter campaign. Chosen by scientists out of a trainee class of 13 other cat-stronaut hopefuls, Félicette was loaded into the nose cone of a French Veronique sounding rocket in Algeria, and sent soaring 97 miles (156 kilometers) above the Earth. A commemorative "autographed" postcard produced by CNES, the French space agency, pictures and celebrates Félicette.(CNES) During the mission, which lasted less than 15 minutes from launch to touchdown, Félicette was subjected to forces up to 9.5 times the normal pull of gravity and "became the first and perhaps only cat to experience the weightlessness of space," as described by Colin Burgess and Chris Dubbs in their book, "Animals in Space: From Research Rockets to the Space Shuttle" (Springer, 2007). Félicette's trip came the same year as the U.S. and former Soviet Union completed their respective first programs to launch astronauts and cosmonauts into Earth orbit. Unlike her fellow 1963 space travelers though, Félicette lifted off with electrodes implanted in her skull to monitor her brain's reaction to the environment and rigors of spaceflight. It was her implants that may have held back Félicette from achieving fame like her human counterparts. "The photographs of Félicette with electrodes fitted to her head like a bellboy's skullcap were far from appealing to many [newspaper] readers, especially to those involved in the burgeoning animal rights movement," explained Dubbs and Burgess. More than 50 years later, it was only because of a chance discovery of a napkin (tea towel) with a design celebrating the first cat in space that Guy became aware of Félicette. Realizing that her role in history had been overlooked — or when noticed, misattributed to a non-existent feline named Félix — Guy set out to give Félicette her due. "It felt like something big should be done," he wrote. The design for Félicette's statue is still to be finalized but "it is safe to assume it will include a cat and a rocket."(Matthew Serge Guy) Guy will use the $57,158 raised to commission Gill Parker, an acclaimed animal sculptor, to create the 5-foot-tall (1.5-meter) bronze statue. The monument's design is still to be finalized, but "it is safe to assume it will include a cat and a rocket," described Guy. The statue is expected to be ready for installation in seven months, assuming all goes to plan, in time to celebrate the 55th anniversary of Félicette's flight in October 2018. Depending on their donation, those who gave towards the statue will receive replica "autographed" picture postcards, lapel pins and poster prints commemorating the first cat in space. Those who gave $330 or more will have their name included on a plaque to be placed near the statue. Donors who gave $8,000 (or more) will also receive a 12-inch (30-centimeter) bronze maquette of the monument. The French attempted to follow-up Félicette's mission with a second feline flight less than a week after the first. Sadly, that nameless cat met its demise when its rocket exploded seven miles (11 kilometers) shy of leaving Earth. After that, based on all public records, space remained cat-less.
<urn:uuid:dbce1942-ff49-4578-901a-399105cef1c8>
CC-MAIN-2018-43
http://www.collectspace.com/news/news-111717a-felicette-first-cat-space-statue.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514030.89/warc/CC-MAIN-20181021140037-20181021161537-00422.warc.gz
en
0.964302
1,010
2.875
3
See for yourself how the forces of electricity and magnetism can work together by building a simple DC motor using simple materials! Electricity and magnetism are both forces caused by the movement of tiny charged particles that make up atoms, the building blocks of all matter. When a wire is hooked up to a battery, negatively charged electrons flow away from the negative terminal of the battery. They flow toward the positive end, because opposite charges attract each other, while like (similar) charges repel each other. This flow of electrons through wire is electric current, and it produces a magnetic force. In a magnet, atoms are lined up so that the negatively charged electrons are all spinning in the same direction. Like electric current, the movement of the electrons creates magnetic force. The area around the magnet where the force is active is called a magnetic field. Metal objects and other magnets that enter this field will be pulled toward the magnet. The way the atoms are lined up creates two different poles in the magnet, a north pole and a south pole. As with electrical charges, opposite poles attract each other, while like poles repel each other. Learn about electromagnetism and its many uses here. Now let's watch it work as we build a motor. (Note: This project requires adult supervision.) What You Do: - To make a bundle, wrap the ends of the wire several times around the loops to hold them in place. Position the ends so they are directly across from each other and extending out in a straight line on either side of the bundle, to form an axle. What you just made is called the armature. - Hold the wire bundle you have made so that it would be flat against a wall, rather than a table, and color the top side of each wire end using the marker. Leave the bottom side of each wire bare. - Carefully bend each paperclip, forming a small loop by wrapping one end around a small object such as a pencil or pen. Thick wire and pliers may be used instead of a paper clip if you want. Be sure to use caution when using the pliers. - If you are using a battery holder, attach a paper clip to either side, and insert the battery. If you don’t have a battery holder, wrap the rubber band tightly around the length of the battery. Insert the paperclips so each one is touching one of the terminals, and they are securely held by the rubber band. Attach the curved side of the battery firmly to a table or other flat surface using the clay or sticky tack. - Set one neodymium magnet on top of the battery, in the center. Position the armature in the paper clip loops, with the shiny, uncolored side touching the paperclips. Make sure it doesn’t touch the magnet. - If your motor doesn’t start immediately, try giving it a start by spinning the wire bundle. Since the motor will only spin in one direction, try spinning it both ways. - If your motor still is not working, make sure that the paperclips are securely attached to the battery terminals. You may also need to adjust the insulated wire so both ends are straight, and the bundle you have made is neat, with the wire ends directly opposite of each other. - With the motor spinning, hold up the other magnet, above the armature. As you move it closer, what happens? Turn the magnet over and try again to see what happens. The armature is a temporary magnet, getting its force from the electrical current in the battery. The neodymium magnet is permanent, meaning that it will always have two poles, and cannot lose its force. These two forces – electricity and magnetism – work together to spin the motor. The poles of the permanent magnet repel the poles of the temporary magnet, causing the armature to rotate one-half turn. After a half-turn, the insulated side of the wire (the part you colored with permanent marker) contacts the paperclips, stopping the electric current. The force of gravity finishes the turn of the armature until the bare side is touching again and the process starts over. The motor you created uses direct current, or DC, to rotate the armature. The magnetic force is only able to flow in one direction, so the motor spins in only one direction. AC, or alternating current, uses the same principle of electron flow, but the pole is rotating rather than in one place. AC motors are often more complex than DC motors, like the simple one you were able to make. Unlike a fixed DC motor, AC motors can switch the direction of rotation. (The DC motor you made is only able to spin in one direction because its direction is determined by the poles of the permanent magnet. If you turn the magnet over, so the other pole is facing up, it will change the direction the motor spins.) When you held the second magnet over the top of the armature, it either stopped or made the motor rotate more rapidly. If it stopped, it’s because the pole was in the opposite direction of the first magnet, in a sense canceling out the rotation of the armature. If it moves faster, the same poles of the first and second magnets, which repel each other, work to spin the armature more quickly than with only one magnet. Building Bigger, Faster Motors Experiment with batteries of higher voltage, as well as more powerful magnets. You can also try using ceramic magnets. One design we found worked well was to set the armature over 4 ceramic ring magnets and connect the supporting paperclips to a 6V battery. You can also try increasing the size of the armature, and how many coils there are, to make a stronger electromagnet. When using batteries of higher voltage, and bare wires, be very careful. The circuit can emit enough heat to cause a burn if the wire is held too long. More Electricity Projects: - Electromagnetism Experiments - Electricity Experiments (including making a homemade battery!) - Make a Light Bulb Motors, Motors, Everywhere! Without motors, your house would be without electricity! AC motors are essential for power plant generators that supply us with electricity. Many small motors can be found in cars for power windows, heating, cooling fans, and windshield wipers. Motors can also be found all around the house, especially for slow-moving, high-torque functions. Kitchen appliances like blenders and mixers use electric motors. Most washer and dryer machines use an AC motor to be able to spin in either direction. Small DC motors can be found in DVD or CD players, and the disk drive of a computer. The vibrator in your cell phone also works because of a tiny DC motor.
<urn:uuid:eb24d726-717a-4bed-a912-3d58c7c788bb>
CC-MAIN-2020-40
https://www.homesciencetools.com/article/build-motor-project/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198287.23/warc/CC-MAIN-20200920161009-20200920191009-00773.warc.gz
en
0.921265
1,408
4.3125
4
(RxWiki News) There's just not much good news about fat. Now late-breaking research demonstrates yet another reason why there are no health gains in large weight gains. After menopause, weight gain is common - but unhealthy. Postmenopausal women who gain weight as adults have a twofold risk of developing endometrial (lining of the uterus) cancer as women who maintained a normal weight. Those are the findings of the American Cancer Society’s Cancer Prevention Study II Nutrition Cohort. "Don't let weight weigh down your health." Victoria L. Stevens, Ph.D., strategic director of laboratory services at the National Home Office of the American Cancer Society in Atlanta, and colleagues studied the impact of weight gain and so-called yo-yo dieting (losing and regaining weight) on risks of endometrial cancer. Stevens hypothesized that yo-yo dieters would be at greater risk, because fat tissue is a key source of circulating estrogen, the hormone that drives endometrial and other cancers. The team gathered data from 38,152 women whose uterus was intact uterus. Participants were surveyed about their weight history - including weight cycling - in a1992 questionnaire. Of this total group, 560 women were diagnosed with endometrial cancer. Researchers found that those who gained 61 pounds in that timeframe were twice as likely to develop the disease as women whose weight remained stable. The study found that yo-yo dieting had no effect on endometrial cancer risk. Stevens says additional study is needed to evaluate the impact of weight gain during specific periods in adulthood and also to determine the effect of weight loss on risks. This research was presented at the 10th American Association of Cancer Research (AACR) International Conference on Frontiers in Cancer Prevention Research. Research is preliminary before they are published in a peer-reviewed journal.
<urn:uuid:51bc06e0-fa6a-4897-89e4-dc1806ae7184>
CC-MAIN-2016-44
http://www.rxwiki.com/news-article/endometrial-cancer-risks-increase-large-weight-gains
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720154.20/warc/CC-MAIN-20161020183840-00290-ip-10-171-6-4.ec2.internal.warc.gz
en
0.966405
385
2.671875
3
A robot nicknamed "Vomiting Larry" is helping scientists study the spread of norovirus. Credit: BBC Screenshot Norovirus, the infectious stomach bug that causes severe nausea and diarrhea — and is the scourge of cruise-ship passengers everywhere — is a very tricky virus to study. It can't be grown in a controlled laboratory environment, according to PopSci.com, so a cure for the easily spread disease has eluded medical researchers for decades. To the rescue comes Vomiting Larry, a robot that simulates one of the more disgusting symptoms of norovirus. With his fine imitation of a college frat boy, Larry is helping his creators at the British Health and Safety Laboratory study the spread of the virus. During a "projectile episode," as researchers daintily call it, the virus can spread up to 10 feet (3 meters) when an infected person throws up, according to Bill Marler, an attorney and an infectious illness specialist, on his Marler Blog. Norovirus is one of the most easily transmitted viruses known: Just 20 particles can infect a person, according to PopSci.com, and only the common cold is more often diagnosed. The speed and ease with which the virus spreads allow infections to race through a population, especially on a cruise ship, in a school or in other relatively small, contained groups. "Norovirus is the Ferrari of the virus world," Ian Goodfellow, professor of virology at Cambridge University in England, told the BBC. Goodfellow notes that while bleach can kill the virus, ordinary households cleaners like window spray will not. Regular hand-washing is one of the best ways to prevent a norovirus infection. About 20 million cases are reported in the United States each year, according to the Centers for Disease Control and Prevention. Though most infected people recover within a couple of days, the symptoms can be debilitating: stomach cramping, fever, chills, diarrhea and vomiting.
<urn:uuid:ac6d691c-df0f-4f5e-9e81-62cd652b3f31>
CC-MAIN-2015-35
http://www.livescience.com/25983-robot-vomit-norovirus.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645315643.73/warc/CC-MAIN-20150827031515-00276-ip-10-171-96-226.ec2.internal.warc.gz
en
0.942953
409
3.28125
3
The solar cycle was discovered in 1843 by Samuel Heinrich Schwabe, who after 17 years of observations noticed a periodic variation in the average number of sunspots. Rudolf Wolf compiled and studied these and other observations, reconstructing the cycle back to 1745, eventually pushing these reconstructions to the earliest observations of sunspots by Galileo and contemporaries in the early seventeenth century. Following Wolf’s numbering scheme, the 1755–1766 cycle is traditionally numbered “1”. Wolf created a standard sunspot number index, the Wolf index, which continues to be used today. The period between 1645 and 1715, a time of few sunspots, is known as the Maunder minimum, after Edward Walter Maunder, who extensively researched this peculiar event, first noted by Gustav Spörer. In the second half of the nineteenth century Richard Carrington and Spörer independently noted the phenomena of sunspots appearing at different latitudes at different parts of the cycle. The cycle’s physical basis was elucidated by George Ellery Hale and collaborators, who in 1908 showed that sunspots were strongly magnetized (the first detection of magnetic fields beyond the Earth). In 1919 they showed that the magnetic polarity of sunspot pairs: - Is constant throughout a cycle; - Is opposite across the equator throughout a cycle; - Reverses itself from one cycle to the next. Hale’s observations revealed that the complete magnetic cycle spans two solar cycles, or 22 years, before returning to its original state. However, because nearly all manifestations are insensitive to polarity, the “11-year solar cycle” remains the focus of research. Furthermore, the two halves of the 22-year cycle are typically not identical; the 11-year cycles usually alternate between higher and lower sums of Wolf’s sunspot numbers (the Gnevyshev-Ohl rule). In 1961 the father-and-son team of Harold and Horace Babcock established that the solar cycle is a spatiotemporal magnetic process unfolding over the Sun as a whole. They observed that the solar surface is magnetized outside of sunspots, that this (weaker) magnetic field is to first order a dipole, and that this dipole undergoes polarity reversals with the same period as the sunspot cycle. Horace’s Babcock Model described the Sun’s oscillatory magnetic field as having a quasi-steady periodicity of 22 years. It covered the oscillatory exchange of energy between toroidal and poloidal solar magnetic field ingredients. Sunspot numbers over the past 11,400 years have been reconstructed using Carbon-14-based dendroclimatology. The level of solar activity beginning in the 1940s is exceptional – the last period of similar magnitude occurred around 9,000 years ago (during the warm Boreal period). The Sun was at a similarly high level of magnetic activity for only ~10% of the past 11,400 years. Almost all earlier high-activity periods were shorter than the present episode. Fossil records suggest that the Solar cycle has been stable for at least the last 700 million years. For example, the cycle length during the Early Permian is estimated to be 10.62 years and similarly in the Neoproterozoic. Until 2009 it was thought that 28 cycles had spanned the 309 years between 1699 and 2008, giving an average length of 11.04 years, but research then showed that the longest of these (1784–1799) seems actually to have been two cycles, so that the average length is only around 10.7 years. Since observations began cycles as short as 9 years and as long as 14 years have been observed, and in the double cycle of 1784–1799 one of the two component cycles had to be less than 8 years in length. Significant amplitude variations also occur.
<urn:uuid:ad87900c-1d1e-4382-9491-b65fda72c2ca>
CC-MAIN-2019-43
https://thegrandsolarminimum.com/wolf-minimum/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660829.5/warc/CC-MAIN-20191015231925-20191016015425-00152.warc.gz
en
0.951947
812
3.953125
4
Transmission Precautions for Dental Aerosols Reduce the risk of transmission at the Dental Office...AeroShield Aerosol Extractor can reduce bioaerosols produced during dental procedures. Visit www.AeroShieldHealth.com for more information. Transmission Precautions for Dental Aerosols Understanding the risk posed by aerosols will help minimize the possibility of infection transmission during dental procedures. Respiratory infections — both chronic and acute — contributed to 6 million deaths in 2016, and they are highly communicable.1–3 Many respiratory infections have been linked to the oral microbiota.4–10 Dental procedures that use low- or high-speed handpieces, lasers, electrosurgery units, ultrasonic scalers, air polishers, prophy angles, hand instruments or air/water syringes can create bioaerosols and spatter.9,11 Ultrasonic scalers and high-speed handpieces produce more airborne contamination than any other instrument in dentistry.9,12,13Inhalation of airborne particles and aerosols produced during dental procedures may cause adverse respiratory health effects and bidirectional disease transmission.8,9,11,12,14–24 While transmission-based precautions can minimize the risk, many may not be routinely practiced.9,12,17,19,21 Oral health professionals should be aware of these invisible dangers in the operatory and follow recommended infection prevention protocols before, during and after patient care. The oral cavity is inhabited by more than 700 microbial species, including fungi and viruses from the respiratory tract.4,9,25 Temperature, pH, nutrients, host defenses and host genetics contribute to microbial growth.26,27 Common inhabitants of the oral cavity include species of Streptococcus, Actinomyces, Neisseria, Campylobacter, Porphyromonas, Prevotella, Capnocytophaga and Fusobacteria.5,21,26 The oral microenvironment can be altered by factors such as age, tooth eruption or loss, oral disease status, pregnancy and drug use. Several of these changes can alter the virulence and pathogenicity of micro-organisms.27,28 Although direct disease transmission has not been confirmed, oral microflora in healthy and diseased states has been linked to respiratory infections.6–9,29 These include the common cold, influenza, sinusitis, pharyngitis, pneumonia, tuberculosis, and severe acute respiratory syndrome (Table 1).4–10 Furthermore, nasal congestion, headaches and asthmatic episodes have also been triggered by dental bioaerosols.30 Potential routes of infection in dental settings include direct and indirect contact, inhalation and injections/punctures.9,13,31 These routes can be bidirectional, meaning transmission may occur from patient-to-patient, patient-to-clinician, or clinician-to-patient.24 Inhalation of bioaerosols is considered a moderate risk for disease transmission.31 Dental personnel and patients are exposed to tens of thousands of bacteria per cubic meter, and the potential to breathe infective material that is aerosolized during routine procedures is high.13,30 Due to their size, composition and ability to linger, airborne particles pose an increased health risk.14,17,19,31 Aerosols are differentiated based on particle size: spatter (> 50 µm), droplet (≤ 50 µm), and droplet nuclei (≤ 10 µm).9,14,18,31 In dental settings, 90% of the aerosols produced are extremely small (< 5 µm).18 Spatter, being the larger particle, will fall until it contacts other objects (e.g., floor, countertop, sink, bracket, table, computer, patient or operator).9,19 Droplets remain suspended in the air until they evaporate, leaving droplet nuclei that contain bacteria related to respiratory infections.9,14 Droplet nuclei can contaminate surfaces in a range of three feet and may remain airborne for 30 minutes to two hours.9,10,13,17,18,30 If inhaled, the droplet nuclei can penetrate deep into the respiratory system.9,14,17–19,31 Furthermore, the susceptibility of developing an infection is influenced by virulence, dose and pathogenicity of the microorganisms, along with the host’s immune response.10 Oral biofilm is resistant to antibiotics, antimicrobial agents and the body’s immune system; therefore, removal of bacteria in dental biofilms is best achieved by physical disruption — yet this very process contributes to aerosol production.5,7 Aerosols, both visible and invisible, are created during surgical and nonsurgical procedures that may include extractions, crown preparations, caries restorations, periodontal therapies, prophylaxes and endodontic treatment.13,22,32 Aerosols consist of water, saliva, blood, debris and microorganisms (e.g., bacteria, fungi, viruses and protozoa), along with their metabolites, such as lipopolysaccharides/endotoxins and other toxins.11,30 Numerous studies have identified specific microbes aerosolized during dental procedures.21,22,33,34 Manarte-Monteiro et al33 determined species of Micrococcus, Staphylococcus, and Streptococcus were aerosolized during endodontic and restorative therapies. Rautemaa et al34 found the most common bacteria aerosolized during restorative treatment using high-speed instruments were viridans streptococci and staphylococci. Pina-Vaz et al22 discovered streptococci were aerosolized during endodontic access. Feres et al21 identified species of Actinomyces, Fusobacterium, Capnocytophaga, and Streptococcus that were aerosolized during periodontal therapy. Dental unit waterlines have also been shown to harbor microbial pathogens. The specific bacteria likely to cause diseases include Legionella, Pseudomonas, and Nontuberculous mycobacteria.13,35 Dental treatments and aerosolized bacteria from waterlines can cause serious infections and even death.13,35,36 PREVENTION AND REDUCTION Recommended transmission-based precautions should be incorporated into daily practice to minimize aerosol production and prevent disease transmission from emitted particles. The risks of dental aerosols can be reduced with the use of high-velocity air evacuation and preprocedural antimicrobial mouthrinses, as well as by flushing waterlines at the beginning of the workday and between each patient, wearing personal protective equipment (PPE), and using air purifications systems.9,11–13,22 These recommendations are outlined in the U.S. Centers for Disease Control and Prevention (CDC) Guidelines for Infection Control in Dental Health-Care Settings — 2003.13 In 2016, the CDC published the Summary of Infection Prevention Practices in Dental Settings: Basic Expectations for Safe Care.35 This guide highlights the existing CDC recommendations, provides basic infection prevention principles and recommendations, reaffirms standard precautions as the foundation for preventing transmission of infectious agents, and provides links to the full guidelines and source documents.35 The high-volume evacuator’s (HVE) large diameter (> 8 mm) allows for removal of high volumes of air in a short time, which reduces the amount of bioaerosols by up to 90%.9,11–18 The HVE can be challenging to maneuver simultaneously during instrumentation; therefore, many clinicians find the saliva ejector easier to use and prefer this device for removing excess fluids from the oral cavity.9 From a practice and safety standpoint, it is important to note the opening size of the saliva ejector makes it inadequate for reducing aerosols compared with the HVE or an isolation-and-evacuation device.9,19,22,31 Although the CDC does not offer specific recommendations for using preprocedural antimicrobial mouthrinses to reduce aerosol exposure, studies show their use for 60 seconds significantly reduces the level of oral microorganisms in the aerosols generated during routine dental procedures.9,11,17,18,20 AIR AND WATERLINE PRECAUTIONS Water in the dental treatment setting should meet U.S. Environmental Protection Agency standards for drinking water (< 500 colony forming units/ml of heterotrophic water bacteria).13,35 To ensure the delivery of safe water, manufacturer instructions for use (IFU) should be followed for the dental unit and any waterline treatment products.13,35 Water-quality monitoring can be conducted by an outside laboratory or internally with in-office testing kits.13,35 The use of independent reservoirs, chemical treatment, filtration, sterile water delivery systems, or combinations of technologies is an additional means for improving and maintaining dental water quality.13,35 The CDC recommends water and air should be discharged for a minimum of 20 to 30 seconds after each patient.13,35 This should be completed for all devices that connect to a waterline and enter patients’ mouths, such as handpieces, ultrasonic scalers and air/water syringes.13,35 Some IFU recommend purging at the beginning of the workday and between patients for two minutes; therefore, providers should follow the IFU specific to their devices. Additionally, the manufacturer advice for testing and maintaining anti-retraction devices (that prevent water/fluid backflow in a waterline) must be followed.13,35 PERSONAL PROTECTIVE EQUIPMENT Standard precautions, as outlined by the CDC, involve the use of PPE.13,35 Primary PPE includes donning properly fitting gloves and surgical masks, protective eyewear with solid side shields or face shield, and protective clothing/disposable gowns.13,35 This equipment should be worn whenever there is a potential to encounter spray or spatter during patient care, and while disinfecting the treatment area (as noted, bioaerosols remain suspended for 30 minutes to two hours posttreatment).9,10,13,17,18,30,35 Masks and gloves should be changed between patients; moreover, all PPE should be changed if torn, wet or visibly soiled.13,35 If providing care for patients with a known infectious disease, the National Institute for Occupational Safety and Health (NIOSH) requires the wearing of a NIOSH-certified particulate-filter respirator.13 To reduce disease transmission, all PPE must be removed prior to exiting the treatment area.13 Aerosol control in confined, poorly ventilated spaces where the air exchange with filtration cannot be successfully applied presents a challenge.15 Another hurdle is to decrease the indoor concentration of bioaerosols.15 While some indoor air purification techniques aim solely at reducing aerosol concentrations, others are designed to inactivate viable bioaerosols.15 Strong evidence demonstrates ventilation in a practice setting can impact the spread of airborne infections.37 Air cleaning systems — such as high-efficiency particulate air (HEPA) filters, gas filter cartridges and electrostatic filters — assist in purifying the air in and outside of dental operatories.11 The HEPA systems direct air through a series of prefilters, which help to continuously catch airborne microorganisms and retain particles as small as 0.3 µm.11 The four-cylinder gas filter cartridge systems aid in reducing gases and vapors, including mercury, formaldehyde and glutaraldehyde.11 The electrostatically charged post-filters/ion emitters aid in purification by reducing dust, particulates and vapors.11,16,38 Studies show that all three systems have successfully reduced bioaerosols created during dental procedures, most notably during cavity preparations, tooth extractions and use of ultrasonic units.15,38,39 Ultraviolet germicidal irradiation units, commonly employed in hospital operatories and waiting areas, are successful adjunctive means for eliminating aerosols.39 The high spectral emission lamps from these units produce photons that expose microorganisms to a short light wavelength (254 nm) that is lethal to a variety of microorganisms, especially Mycobacterium tuberculosis and Escherichia coli.17,19,39 Due to the risk of infectious transmission posed by dental aerosols, transmission-based precautions should be a key element of daily practice. Patients and practitioners are regularly exposed to tens of thousands of aerosols generated during procedures,30 and this exposure increases the potential for respiratory infections.24,30 To ensure patient and provider safety, oral health professionals should abide by the latest CDC guidelines and recommendations. This includes using HVE or an isolation-and-evacuation device, providing preprocedural mouthrinses, maintaining dental unit water quality, and wearing proper PPE.30 To further reduce risks and improve air quality, air cleaning systems can be employed.11,12,15–17,21,37–39 Ultimately, combining multiple methods may be the most effective approach for managing dental aerosols. - World Health Organization. The Top 10 Causes of Death. Available at: who.int/news-room/fact-sheets/detail/the-top-10-causes-of-death. Accessed October 26, 2018. - GBD 2015 LRI Collaborators. Estimates of the global, regional, and national morbidity, mortality, and aetiologies of lower respiratory tract infections in 195 countries: a systematic analysis for the Global Burden of Disease Study 2015. Lancet Infect Dis. 2017;17:1133–1161. - Murphy SL, Xu J, Kochanek KD, Curtin SC, Arias E. Deaths: final data for 2015. Natl Vital Stat Rep. 2017;66:1–75 - Aas JA, Paster BJ, Stokes LN, Olsen I, Dewhirst FE. Defining the normal bacterial flora of the oral cavity. J Clin Microbiol. 2005;43(11):5721–5732. - Avila M, Ojcius DM, Yilmaz Ö. The oral microbiota: living with a permanent guest. DNA Cell Biol. 2009;28:405–411. - Brook I. Microbiology of sinusitis. Proc Am Thorac Soc. 2011;8:90–100. - Gomes-Filho, IS, Passos JS, Seixas da Cruz S. Respiratory disease and the role of oral bacteria. J Oral Microbiol. 2010;2:5811. - Scannapieco F. Role of oral bacteria in respiratory infection. J Periodontol. 1999;70:793–801. - Harrel SK, Molinari J. Aerosols and splatter in dentistry: A brief review of the literature and infection control implications. J Am Dent Assoc. 2004;135:429–437. - Zemori C, de Soet H, Criellard W, Laheij A. A scoping review on bioaerosols in healthcare and the dental environment. PLoS One. 2017;12:eo178007. - Hallier C, Williams DW, Potts AJC, Lewis MAO. A pilot study of bioaerosol reduction using an air cleaning system during dental procedures. Br Dent J. 2010;209(8):E14. - Rao RM, Shenoy N, Shetty V. Determination of efficacy of pre-procedural mouth rinsing in reducing aerosol contamination produced by ultrasonic scalers. Nitte University JHS. 2015;5:52–56. - Kohn WG, Collins AS, Cleveland JL, et al. Guidelines for infection control in dental health-care settings — 2003. MMWR Recomm Rep. 2003;52(No. RR-17). - Atkinson J, Chartier Y, Pessoa-Silva CL, et al. Natural Ventilation for Infection Control in Health-Care Settings. Geneva: World Health Organization; 2009. - Grinshpun SA, Adhikari A, Honda T, et al. Control of aerosol contaminants in indoor air: Combining the particle concentration reduction with microbial inactivation. Environ Sci Technol. 2007;41:606–612. - Lee BU, Yermakov M, Grinshpun SA. Removal of fine and ultrafine particles from indoor air environments by the unipolar ion emission. Atmos Environ. 2004;38:4815–4823. - Veena HR, Mahantesha S, Joseph PA, Patil SR, Patil SH. Dissemination of aerosol and splatter during ultrasonic scaling: A pilot study. J Infect Public Health. 2015;8:260–265. - James R, Mani A. Dental aerosols: A silent hazard in dentistry! Int J Sci Res. 2016;5:1761–1763. - Szymanska J. Dental bioaerosol as an occupational hazard in a dentist’s workplace. Ann Agric Environ Med. 2007;14:203–207. - Thomas MV, Jarboe G, Frazer RQ. Infection control in the dental office. Dent Clin N Am. 2008;52:609–628. - Feres M, Figueiredo LC, Faveri M, Stewart B, de Vizio W. The effectiveness of a preprocedural mouthrinse containing cetylpyridinium chloride in reducing bacteria in the dental office. J Am Dent Assoc. 2010;141:415–422. - Pina-Vaz I, Pina-Vaz C, de Carvalho MF, Azevedo A. Evaluating spatter and aerosol contamination during opening of access cavities in endodontics. Rev Clin Pesq Odontol. 2008;4(2):77–83. - Polednik B. Aerosol and bioaerosol particles in a dental office. Environ Res. 2014;134:405–409. - Laheij AMGA, Kistler JO, Belibasakis GN, Välimaa H, de Soet JJ. Healthcare-associated viral and bacterial infections in dentistry. J Oral Microbiol. 2012;4. - Scannapieco F. The oral environment. In Lamont R, Hajishengalis G, Jenkinson H, eds. Oral Microbiology and Immunology. 2nd ed. Washington, DC: ASM Press; 2014:51–76. - Sowmya Y. A review on the human oral microflora. J Dent Sci. 2016;9:1–5. - Aas JA, Griffen AL, Dardis SR, et al. Bacteria of dental caries in primary and permanent teeth in children and young adults. J Clin Microbiol. 2008;46:1407–1417. - Najjar T. Bacterial mouth infections. Medscapes. Available at: emedicine.medscape.com/article/1081424-overview. Updated September 26, 2017. Accessed October 26, 2018. - Paju S, Scannapieco FA. Oral biofilms, periodontitis, and pulmonary infections. Oral Dis. 2007;13:508–512. - Dutil S, Meriaux A, de Latremoille MC, Lazure L, Barbeau J, Duchaine C. Measurement of airborne bacteria and endotoxin generated during dental cleaning. J Occup Environ Hyg. 2009;6:121–130. - Sawhney A, Venugopal S, Babu G, et al. Aerosols how dangerous they are in clinical practice. J Clin Diagn Res. 2015;9:52–57. - Yamada H, Ishihama K, Yasuda K, Hasumi-Nakayama Y, Shimoji S, Furusawa K. Aerial dispersal of blood-contaminated aerosols during dental procedures. Quintessence Int. 2011;42:399–405. - Manarte-Monteiro P, Carvalho A, Pina C, Oliveira H, Manso MC. Air quality assessment during dental practice: Aerosols bacterial counts in an university clinic. Rev Port Estomatol Med Dent Cir Maxilofac. 2013;54:2–7. - Rautemaa R, Nordberg A, Wuolijoki-Saaristo K, Meurman JH. Bacterial aerosols in dental practice: a potential hospital infection problem? J Hosp Infect. 2006;4:76–81. - Summary of Infection Prevention Practices in Dental Settings: Basic Expectations for Safe Care. Atlanta: Centers for Disease Control and Prevention; October 2016. - Ricci ML, Fontana S, Pinci F, et al. Pneumonia associated with a dental unit waterline. Lancet. 2012;379:684. - Li Y, Leung GM, Tang JW, et al. Role of ventilation in airborne transmission of infectious agents in the built environment: a multidisciplinary systematic review. Indoor Air. 2007;17:2–18. - Martin SB, Moyer ES. Electrostatic respirator filter media: filter efficiency and most penetrating particle size effects. Appl Occup Environ Hyg. 2000;15:609–617. - Noakes CJ, Fletcher LA, Beggs CB, Sleigh PA, Kerr KG. Development of a numerical model to simulate the biological inactivation of airborne microorganisms in the presence of ultraviolet light. J Aerosol Sci. 2004;35:489–507. Featured image by NIK LEBOWSKI/ISTOCK/GETTY IMAGES PLUS From Decisions in Dentistry. December 2018;4(12):30—32,35.
<urn:uuid:9d5fcc56-517c-4bb6-addc-3a8d6e1dd67b>
CC-MAIN-2023-23
https://aeroshieldhealth.com/blogs/related-articles/transmission-precautions-for-dental-aerosols
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00636.warc.gz
en
0.828958
4,645
2.734375
3
- Top education issues - Track Education-Related Bills - Sign Up for Email Updates - How to Write a Letter to the Editor - Who is My Legislator? - Members of the Texas House - Members of the Texas Senate - FAQs on Texas Legislature - Guide to Lobbying - Information About the Capitol - Contribute to TSTA-PAC - Upgrade TSTA-PAC Contribution - Watch the Action in the House - Watch the Action in the Senate - 83rd Legislature Wrapup How to Write a Letter to the Editor Be a Voice of the People Short and Sweet Most newspapers prefer letters that are closer to 200 words than to 600. Keep sentence structures simple. Ideal paragraphs are from 50-80 words long. Stay away from using words with three or more syllables when a one or two syllable word applies. Instead of saying, “The Congressman supported the bill to propitiate his constituents,” say “The Congressman supported the bill to please his constituents.” And stay away from “edu-jargon.” Not everyone knows what NCLB or ESEA is. Focus, Focus, Focus Concentrate your letter into one distinct argument. With so little space to work, presenting a strong central concern and sticking with it throughout the letter is important. Jumping from one argument to the next will either make it impossible to contain your thoughts in the space allowed or weaken your main point. Newspapers may edit the small things, but they won’t restructure your entire entry. Don’t Live in the Past While Letters to the Editor don’t provide breaking news, they are intended to be a forum to discuss relevant topics. This means you must address an issue others are thinking about. While you may feel that the intricacies of the Iran Contra Scandal need to be discussed further, most people have moved on. Think about what you have been reading about in the newspapers. Try and refer to specific articles when making your point and remember that journalists have egos too. Compliment them on some part of the article or editorial before taking issue with a particular part of it. Large newspapers like the New York Times and the Washington Post receive hundreds of letters a week, while smaller papers have to beg for letters. For every New York Times, there is a Rock Creek Current and Allentown Morning Call waiting for you to write them. Act Like a Pro Always type letters and make sure they are sent with care. Adhere to good writing practices: avoid the passive voice, use colorful verbs, and keep acronyms sparse. And above all else, be sure to spell check and proofread your letter. Tell Them Who You Are Include important contact information, including your phone number, when sending your letter and mention your position and the school where you work, as well.. Many newspapers will call to verify information before printing a letter. While only your name and city is usually printed, providing additional information is key. Don’t Go Overboard While passion will get printed, extremism will not. The purpose of the Letter to Editor is for the reader to express his or her opinion. Editors appreciate this when it is done with assurance, intelligence and reason. However, when the reader offers unbarred emotion, radical ideas or viciously attacks another person, most editors will reject the letter.
<urn:uuid:f4a5cc80-beb7-45ba-9e40-3aa0cd566d09>
CC-MAIN-2015-27
http://www.tsta.org/issues-and-action/take-action-at-the-state-level/how-write-letter-editor
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098685.20/warc/CC-MAIN-20150627031818-00180-ip-10-179-60-89.ec2.internal.warc.gz
en
0.918675
707
2.8125
3
People seeing the doctor normally take their gum out of their mouth first, but if a start-up company from the STERN BioRegion has its way, chewing gum could become part of the diagnostic process and patients will need to exercise their jaws before receiving treatment. The team at 3a-diagnostics GmbH from Frickenhausen is developing a gum that can be used both in doctors’ surgeries and at home as a quick and easy diagnostic aid. The sensor in this case is the human tongue. If bacteria are present – due to an inflammation of the teeth or tonsils, for instance – chewing produces a bitter taste and the doctor can quickly initiate the appropriate treatment. This in-body “test system” is thought to be the only one of its kind anywhere in the world to date. “Trained staff and equipment with corresponding software are still required for many point-of-care tests on patients, so we were looking for a really easy way of spotting bacterial infections,” explains 3a-diagnostics GmbH co-founder Dr. Heinrich Jehle. The team of chemists and pharmacists came up with a simple and effective sensor that everyone always has with them – the tongue. Highly sensitive, it is able to detect the tiniest quantities of small organic molecules. The chewing gum acts as a carrier incorporating a thin, soluble film with a specific peptide chain comprising amino acids and a bitter substance. Virtually everyone recognises a bitter taste as a warning signal. The chain surrounds this substance, making it large enough not to be tasted initially, as the tongue can only perceive very small molecules. When disease-specific enzymes of a bacterial inflammation are present in saliva, they separate the peptide chain from the bitter substance, which means it can be tasted. If no bacteria are present, the taste remains neutral. A different chain isolates the specific enzyme for each pathogen, which means a number of chewing gums, each with a different peptide chain, need to be developed for various diseases. The launch of the chewing gums to diagnose peri-implantitis – inflammations caused by tooth implants – is scheduled for 2021 and will be closely followed by variants for periodontitis. Other developments in the pipeline are aimed at Streptococcus pyogenes, a commonly occurring bacteria that can cause conditions such as suppurative tonsillitis. In the event of a potential bacterial infection, this means there would be no need for a swab test by the practice nurse. Patients could start simply by chewing the appropriate gum for the disease they are suspected of having. In addition to being very easy to use absolutely anywhere, the new detection method is also extremely fast. The result is available in just two minutes, helping the doctor to decide what treatment to prescribe. “The product is above all intended as a complement to the existing tests, to be used for pre-screening or low-threshold monitoring,” continues Dr. Jehle. After being given a tooth implant, for example, a patient could use chewing gum to identify infections at a very early stage – long before a suppurative inflammation leads to serious complications. It is envisaged that the product will be available from pharmacies without prescription – once all the classification issues have been clarified. In the IVD (in vitro diagnostics) solutions used to date, a sample is taken from the patient that is then analysed in an external device. Because the chewing gum works as a test system within the human body, however, the licensing authorities are provisionally classifying it as a medical device. “As far as I know, we’re the first ones worldwide to apply for a licence, so it’s also completely new terrain for the Medical Devices Regulation,” presumes Dr. Jehle. In early 2020, the 51-year-old will be moving into new premises at the Sirius Business Park in Frickenhausen with four of his colleagues. Thanks in part to funding from the L-Bank and bwcon “Start-up BW Pre-Seed” programme and support from BioRegio STERN Management GmbH, the biotech company’s team is gearing up to have appropriate certified suppliers manufacture the product on a large scale. Following the filing of patent applications between 2013 and the present day, the protected technology is now set to reach market maturity with the help of these partners.
<urn:uuid:787c4de6-0320-43d0-9ab4-3b9d7eb435bc>
CC-MAIN-2021-43
https://www.gesundheitsindustrie-bw.de/en/article/press-release/medizinischer-feinschmecker-die-zunge-als-sensor-fuer-infektionen
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00485.warc.gz
en
0.949219
909
3.109375
3
This sermon is going to define what virtuous means and why we should apply virtue to our behavior. And now, my daughter, fear not; I will do to thee all that thou requirest: for all the city of my people doth know that thou art a virtuous woman. H2428-חַיִלchayil, khah'-yil; from H2342; probably a force, whether of men, means or other resources; an army, wealth, virtue, valor, strength:—able, activity, ( ) army, band of men (soldiers), company, (great) forces, goods, host, might, power, riches, strength, strong, substance, train, ( ) valiant(-ly), valour, virtuous(-ly), war, worthy(-ily). Biblical Outline of Usage of H2428 strength, might, efficiency, wealth, army force , army morally excellent : RIGHTEOUS having or exhibiting virtue conformity to a standard of right : MORALITY a particular moral excellence commendable quality or trait The word chastity does not just mean restraining from sexual intercourse. Chastity means so much more than that, however because the world is always focused on sex, the definition of chastity is only spoken of when talking about abstinence. purity in conduct and intention restraint and simplicity in design or expression firm adherence to a code of especially moral or artistic values the quality or state of being complete or undivided If you are Walking with Abba Yah and you believe that Yahusha Saved you and your life has been transformed, then you should be in a state of completeness and undivided. You should be able to see right from wrong, evil and good. You are considered Rectified back to Yahuah and are standing upright. Integrity will always keep you in Yah's hands never to be plucked out because of your Transformation and the Holy Spirit living within you will not allow you to be taken away. Does that mean you will not face trials and tribulations anymore? No, in fact the closer to our Creator you get the more attacks you will face. Because the World Hates Jesus, and thus hates you. capable of producing desired results with little or no waste (as of time or materials) being or involving the immediate agent in producing an effect A virtuous woman is a crown to her husband: but she that maketh ashamed is as rottenness in his bones. Who is the Immediate agent in your life? Is the Holy Spirit Guiding You in all you are doing? Are you allowing Abba Yah to use you as His instrument? a means or instrument by which a guiding intelligence achieves a result a representative, emissary, or official of a government For we are his workmanship, created in Christ Jesus unto good works, which God hath before ordained that we should walk in them workmanship: G4161-ποίημαpoíēma, poy'-ay-mah; from G4160; a product, i.e. fabric (literally or figuratively):—thing that is made, workmanship. We are the product made by Abba Yah/The Lord God Almighty and Revived to live via belief in Yahusha/Jesus. We were created for a purpose and Abba Yah's intelligence is what guides us to achieve His Results. We are His Representatives! We are both Salt and Light. We cannot be good representatives of Abba Yah if we are walking with poor morals, values and ethics. Believers Are Salt and Light 13 “You are the salt of the earth; but if the salt loses its flavor, how shall it be seasoned? It is then good for nothing but to be thrown out and trampled underfoot by men. 14 “You are the light of the world. A city that is set on a hill cannot be hidden. 15 Nor do they light a lamp and put it under a basket, but on a lampstand, and it gives light to all who are in the house. 16 Let your light so shine before men, that they may see your good works and glorify your Father in heaven. 2 Timothy 2:21 21 Therefore if anyone cleanses himself from the latter, he will be a vessel for honor, [h]sanctified and useful for the Master, prepared for every good work. Definition of vessel: G4632-σκεῦοςskeûos, skyoo'-os; of uncertain affinity; a vessel, implement, equipment or apparatus (literally or figuratively [specially, a wife as contributing to the usefulness of the husband]):—goods, sail, stuff, vessel. Biblical Outline of Usage of G4632 in the plural household utensils, domestic gear the tackle and armament of vessels, used specifically of sails and ropes a man of quality, a chosen instrument in a bad sense, an assistant in accomplishing an evil deed Definition of instrument a means whereby something is achieved, performed, or furthered one used by another as a means or aid When we have poor morals, values and ethics and we lack virtue we become instruments of evil. Remember, this is a heart and mind issue, we wrestle not with flesh and blood, but with principalities, and powers. For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places. Powers-G1849-ἐξουσίαexousía, ex-oo-see'-ah; from G1832 (in the sense of ability); privilege, i.e. (subjectively) force, capacity, competency, freedom, or (objectively) mastery (concretely, magistrate, superhuman, potentate, token of control), delegated influence:—authority, jurisdiction, liberty, power, right, strength. When we become morally good or virtuous, we are able to become stronger against the forces of evil. Biblical Outline of Usage of G1849 power of choice, liberty of doing as one pleases leave or permission physical and mental power the ability or strength with which one is endued, which he either possesses or exercises the power of authority (influence) and of right (privilege) a right or immunity granted as a peculiar benefit, advantage, or favor such a right or immunity attached specifically to a position or an office to accord a higher value or superior position to Ephesians 1:3-10 ESV 3 Blessed be the God and Father of our Lord Jesus Christ, who has blessed us in Christ with every spiritual blessing in the heavenly places,4 even as he chose us in him before the foundation of the world, that we should be holy and blameless before him. In love5 he predestined us[b] for adoption to himself as sons through Jesus Christ, according to the purpose of his will,6 to the praise of his glorious grace, with which he has blessed us in the Beloved.7 In him we have redemption through his blood, the forgiveness of our trespasses, according to the riches of his grace,8 which he lavished upon us, in all wisdom and insight9 making known[c] to us the mystery of his will, according to his purpose, which he set forth in Christ10 as a plan for the fullness of time, to unite all things in him, things in heaven and things on earth. We are chosen to be Yah's Children, His Light and His Moral Projection on this earth. What are your standards, who is your guide in life? We only have 2 choices, to walk the way of this world or to walk according to Abba Yah's Words. We cannot keep saying we want change, yet not change ourselves, for anytime we promote evil, we are part of the problem and not the solution. We cannot be hypocrites in one area of life while claiming to be of Yah's then do evil towards our Brothers and Sisters because we don't like how they treat us or how they chose to live or how they cannot hear Yah's Words. This means we don't gossip, we don't plot revenge, we are not envious of what someone else has and we don't, we do not go out of our way to hinder someone else and we don't participate in the evil deeds of others. Their choice is Not Ours. Yes, we make mistakes, but not all mistakes are sins and knowing the difference is key. When we chose to assist in evil we are just as guilty as if we committed the evil deed and are in sin. However, when we strive for Righteousness, we should be changing our hearts and minds and discernment should be heightened so that we can make sound choices and decisions. Having good morals: good behavior and conduct known as virtue should be something we all strive for. (Copywrite: Virtue Font - FFonts.net)
<urn:uuid:babec012-f7aa-41a7-98c9-bf9dcb49ae40>
CC-MAIN-2022-40
https://www.thelionstares.com/post/attitudes-of-yah-what-does-being-virtuous-mean
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00070.warc.gz
en
0.943695
2,002
2.640625
3
NCI Dictionary of Cancer Terms The NCI Dictionary of Cancer Terms features 8,054 terms related to cancer and medicine. - A type of RNA found in cells. mRNA molecules carry the genetic information needed to make proteins. They carry the information from the DNA in the nucleus of the cell to the cytoplasm where the proteins are made. Also called messenger RNA.
<urn:uuid:55ac1e18-a448-49b1-874b-e7b9a23fe2ef>
CC-MAIN-2017-17
https://www.cancer.gov/publications/dictionaries/cancer-terms?CdrID=662001
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121865.67/warc/CC-MAIN-20170423031201-00502-ip-10-145-167-34.ec2.internal.warc.gz
en
0.863697
77
3.15625
3
Could it be your hair dye? Experiencing a reaction when using hair dye is not uncommon and there are various reactions a person may experience. Most commonly people will experience irritation in the area where the product has come into contact with their skin. This is known as Irritant Contact Dermatitis (damage to outer layer of the skin which causes itching, redness and sometimes a burning or stinging sensation). Some people may experience a more serious allergic reaction to the chemicals in hair dye. This is known as Allergic Contact Dermatitis (similar symptoms, as noted above, will be evident; however a person’s immune system may also be compromised). In very severe cases a person may experience an anaphylactic shock. This is a potentially life threatening allergic reaction and requires immediate professional medical attention. Symptoms of anaphylaxis include: - breathing difficulties - feeling lightheaded or faint - changes to your skin, such as itchy skin or a raised, red skin rash - swelling of certain body parts, particularly the face One of the main chemicals which may cause a reaction to hair dye is Paraphenylenediamine. More conveniently known as PPD, it is a chemical that is widely used in dyes, especially those at the darker end of the colour spectrum. It is a colourless substance that becomes coloured when it comes into contact with oxygen. It is when it comes into contact with oxygen that PPD can cause an allergic reaction in sensitive individuals. PPD is a common ingredient in hair dye for the simple reason that it is permanent, and the hair can be shampooed, permed and styled as normal without losing any colour or damaging the hair. Inevitably, hairdressers will come into regular contact with PPD and are therefore vulnerable to allergic reactions. Allergy to PPD is usually confirmed by a patch test which involves placing a small amount of the hair dye on a patch of skin and waiting 48-72 hours to see if it causes any irritation. These days most hairdressers will require you to have a patch test before they will apply any hair dye during your visit. If this has not been requested make sure you ask before allowing any hair dye products to be applied. Similarly all boxes of hair dye will state that a home patch test should be carried out before the application of the product. You are then advised to seek the help of a qualified medical professional if any serious or long lasting effects from hair dye are experienced. There is also a chance that you may be allergic to substances related to PPD. These include Azo dyes and some medicines such as sulphonamides which are used as antibiotics and some local anaesthetics. Ensure that you always tell your doctor, dentist or pharmacist if you are allergic to PPD. Also, always check the contents list of a product for PPD as it comes in many different guises as outlined below: The following are all alternative names for PPD: PPDA; Phenylenediamine base; p-Phenylenediamine; 4-Phenylenediamine; 1,4-Phenylenediamine; 4-Benzenediamine; 1,4-Benzenediamine; para-Diaminobenzene (p-Diaminobenzene); para-Aminoaniline (p-Aminoaniline); Orsin™; Rodol™; Ursol™. Sources used in writing this article are available on request Information contained in this Articles page has been written by talkhealth based on available medical evidence. Our evidence-based articles are certified by the Information Standard and our sources are available on request. The content is not, though, written by medical professionals and should never be considered a substitute for medical advice. You should always seek medical advice before changing your treatment routine. talkhealth does not endorse any specific products, brands, or treatments. Information written by the talkhealth team Last revised: 12 November 2015 Next review: 12 November 2018
<urn:uuid:744b1ae3-3260-452a-82fd-1d1337651e3c>
CC-MAIN-2019-30
http://www.talkhealthpartnership.com/talkallergy/articles/hairdye.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525793.19/warc/CC-MAIN-20190718190635-20190718212635-00009.warc.gz
en
0.95034
831
2.640625
3
Like us, our dogs can and do experience stress. Just as stress can make us feel afraid or hyper or edgy or irritable, it can do the same to our dogs. It is a well-established fact that the “wrong kind” of stress or chronic stress can have a detrimental effect on our behavior, health, and overall well-being. Whether “good stress” or “bad stress”, physiologically, the manifestation of stress in dogs is similar as to that in humans, with the same negative and positive effects. Stress has the potential to make one ill, suppress the immune system, cause behaviors that damage relationships with others, and increase arousal. This increase in arousal greatly increases the probability of aggressive behavior. As a pet behavior consultant, I have observed that most behavior problems with pets, especially the more serious such as aggression and separation anxiety, are the result of stress. Therefore, as responsible guardians for our dogs, we have an obligation to understand stress and its impact so we can do what is necessary to minimize stress in the lives of our canine friends. Definition of Stress “Stress is the response of an organism to a demand placed upon it to change or adapt.*” *Canine Neuropsychology, third edition, by James O’Heare, Ph.D., DogPsych, 2005, page 3 “Good” Stress versus “Bad” Stress Certain levels of stress are normal and even necessary for survival and the increase of gray matter in the brain. Good stress is called eustress. This “positive” stress allows an organism to utilize energy in a positive manner and assists in the development of new capabilities. This type of stress, in appropriate quantities, is essential to normal growth. When stress is negative or becomes excessive, it is called distress. Stress of this manner can damage an organism, resulting in illness and behavioral problems such as anxiety and aggression. This may become a vicious cycle, with stress contributing to even more stress until an organism collapses in exhaustion or self-destructs. The susceptibility to distress varies with each individual organism. How an individual responds to distress is often affected by a combination of inherited genes and events within the organism’s environment. It is important to understand that eustress and distress occur over a continuum. Eustress can range from contentment to extreme excitement and distress can range from worry to extreme fear or minor irritability to severe aggression. What Does Stress Feel Like? Stress affects us both physiologically and emotionally, and the two are always interconnected. Whether experiencing eustress or distress, the physiology and the effects on the body are essentially the same. Therefore, the biggest difference between the two types of stress is a matter of our perception of how we feel. |Good Stress (eustress) Always Acute ||Bad Stress (distress) Acute or Chronic |Heightened Sense of Awareness |Learning a new task (confident) ||Inability to learn (doubtful) We have all experienced both eustress and distress at some point in our lives, but fortunately not all of us have experienced extreme distress. Some medications can cause the same physiological effect as distress so if you have ever been on prednisone, or known someone who has, you may have a better idea of how severe distress feels. Prednisone is a man-made corticosteroid that is used to suppress the immune system. It is often used to treat autoimmune disease, asthma, lupus, colitis, Bell’s palsy, rheumatoid arthritis and other inflammatory diseases. Prednisone mimics cortisol, a major stress hormone, so the side-effects of prednisone can be similar to those of an organism in extreme distress. These side effects include; insomnia, euphoria, depression, mania, mood swings, irritability and even psychotic behavior. (As an asthmatic I have been on prednisone numerous times and know how it makes me feel. While it eventually makes me physically healthier, the side effects are not pleasant for me, or those around me. I have also observed animals on prednisone, and sometimes they can react negatively and experience significant behavioral changes, which do not always resolve long after the drug is no longer being used.) Physiological Effects of Stress When something stressful happens; we are frightened or startled or experience physical or emotional pain, our body falls under the control of the Sympathetic Autonomic Nervous System (SANS). The SANS is part of the body responsible for controlling the flight or fight response. Our body goes on auto-pilot to protect us from the perceived threat. The SANS is closely associated with the limbic system, which is the section of the brain that deals with the expression and experience of emotions, storage of memories and expression of aggression. It is the most primitive part of the brain and is very involved with instinctual survival mechanisms. It is separate from the cerebral cortex, which is thought to be the “thinking” part of the brain and the site of conscious thought and intelligence. Note that the brain is hard-wired to ALWAYS remember negative emotional responses to help ensure our future safety. When the limbic system (emotional auto-pilot) is activated, the cerebral cortex is suppressed. This is why one does not typically behave rationally when in a highly charged emotional state. This can also help us to understand why expecting our dogs to respond to a well-trained cue when they are in distress is usually a futile effort. Likewise, the parts of the brain responsible for learning something new are shut-down at this time. Conversely, when the cerebral cortex is highly active, the limbic system is suppressed. The release of various neurotransmitters and stress hormones triggers a plethora of reactions within our body that shuts down all of our bodily systems not necessary for defense. Levels of adrenaline, a neurotransmitter, become elevated which in turn increase pulse rate, blood pressure, blood sugar levels and the dilation of bronchial tubes and pupils, preparing the body for the surge of energy necessary for a flight or fight response. Cortisol production increases which turns off the immune system and other non-essential systems. The above is a gross oversimplification. For a more in-depth understanding, please refer to the books listed in the resources section of this article. After the stressful situation has passed, the body’s stress response is supposed to turn-off and levels of neurotransmitters and stress hormones should return to normal levels. However, these changes do not “turn-off” instantly but can, in fact, take 24 to 72 hours to return to their normal (non-stress) levels. As a result, if an organism is exposed to frequent stress events (daily or multiple times per day) those levels may never return to normal, leaving the individual in a constant/chronic state of stress. Think of the dog that aggressively reacts to the mail carrier Monday through Saturday of every week. That dogs stress levels may never get a chance to return to normal. The same can happen with the dog that demands to play fetch each and every day. Sometimes when an individual is subjected to chronic stress, the mechanisms that are supposed to turn off stress no longer work and levels continue to build and can reach four times normal levels. Normal now becomes a much higher level. Causes of Stress in Dogs Brambell’s Five Freedoms A significant cause of stress for an animal occurs when its most basic needs are not being met. One of the first and most comprehensive efforts to define an animal’s most basic welfare needs started in Great Britain in 1965 with the establishment of the Brambell Commission. This commission, created by Parliament, was charged with reviewing the treatment of farm animals and developing a minimum standard for meeting their needs. They created what is known as “The Five Freedoms,” which is an excellent starting point for evaluating the welfare of any animal, including companion dogs. The five freedoms are: - Ensure your pet is free from hunger, thirst and malnutrition. This sounds relatively simple — provide your dog with food and water and the need is met. However, I encourage you to give this more thought. Is the food you feed your dog wholesome and a type that would be in their natural diet? Are they allowed to consume this food in a manner that is natural for their species? We also must consider that too much food is equally bad, as evidenced by the significant number of obese dogs we see today. - Ensure your pet is free from discomfort. Again this freedom seems relatively straight forward — make sure your pet always has adequate shelter from temperature and weather extremes. However, there is much more to comfort than hot versus cold and dry versus damp. Your dog also needs a quiet, comfortable resting place where they can be undisturbed and where they will feel safe. You need to make sure that their environment is free from things that may cause them harm. Your dog’s breed also affects what they need to be comfortable. If they have long hair, they may be unable to properly groom themselves. If that is the case, you must groom them on a regular basis, so that their hair does not become tangled and matted, causing them discomfort. Obesity puts a strain on the joints and may cause pain and discomfort, so it is important not to allow our dogs to become obese. Lastly, dogs, like humans, are social animals and may depend on interactions with others, particularly of their own species, to be comfortable. However, if they do not feel safe around another dog, being compelled to live with another dog may cause discomfort. Knowing and responding properly to your dog’s social needs is critical - Ensure your pet is free from pain, injury and disease. One of the easiest ways to meet this freedom is to make sure your dog gets an initial series of vaccinations to ensure that they are protected against diseases, followed up by annual and as-needed visits to your veterinarian. At home, a weekly body check can alert you to any changes in your pet’s physical condition. Being free from pain is very similar to being free from discomfort so the dog’s grooming needs must also be considered. Remember, dogs are designed by nature not to show pain and thus weakness, so often they will attempt to hide their pain. Obesity and matted coats may cause pain. - Ensure your pet is free to express normal behaviors. If you are going to allow your pet to express normal behaviors you first need to know and understand what constitutes both “normal” canine behavior and “abnormal” canine behavior. This is not easy because there is so much incorrect information about canine behavior circulating as myth and being perpetuated in out-dated books and inaccurate websites. What we know about canine behavior today has changed greatly since the 1970’s. Many of the old “truths” are in fact not true. Statements such as; “…you need to be dominant or “alpha” over your dog, dogs are like wolves and should be treated as such, dogs are pack animals, and dogs should be trained with choke collars, shock collars, and alpha-wolf rollovers and other types of intimidation” are NOT true and in fact cause far more problems than they resolve. In fact, all of those methods and techniques are a perfect recipe for causing fear, stress, and aggression. That is one reason the American Animal Hospital Association (AAHA) specifically recommends that the dominance construct or any tools and methods which cause discomfort, pain or intimidation should NEVER be used.* *2015 AAHA Canine and Feline Behavior Management Guidelines The freedom to express normal behaviors is the one that is most often overlooked, as many dog guardians are either unaware of the huge repertoire of normal dog behaviors or because they do not approve of some of these normal behaviors such as “butt sniffing.” It is imperative you take the time to learn what constitutes normal behavior. The best way to do this is to enroll you and your dog in a dog training class taught by an individual who has been certified by either the Pet Professionals Guild (PPG) or the Certification Council for Professional Dog Trainers (CCPDT. They should also comply with the PPG philosophy of training that is Pain Free, Force Free and Fear Free. Minimally, to express normal behaviors your dog needs adequate space in which to run and an enriched environment to stimulate their minds and bodies. The ability to sniff and explore the world is key to a dog’s life. Toys enrich your pet’s environment by giving them something to play with; however your dog also needs appropriate interaction with living things as well. That can come from us as well as other dogs. Playing with your dog is good for establishing and maintaining a lifelong bond. It is also a great outlet for mental and physical activity and can be just plain fun! However, it is essential to understand that play, especially very active play, is stressful in itself and increases your dog’s arousal level. Play should be frequently interrupted and as soon as the dog has calmly settled that behavior can be rewarded with more play. If the dog does not or cannot settle, then play stops. Overly rough play between a person and a dog, especially play where the dog exhibits mouthing and nipping behavior, is inappropriate and for the safety of others, as well as yourself, should ALWAYS be discouraged. The best way to discourage such play is to immediately stop playing when it occurs. You should also learn to recognize the signs that tell you that your dog’s level is arousal is increasing so that you can stop play before the mouthing occurs. While our dogs hopefully enjoy our companionship most also need adequate opportunities to interrelate with others of their own kind in a positive situation. That does not mean you need to have more than one dog, but it does mean your dog may need to have some suitable doggie friends in the neighborhood or at doggie daycare. However, these friends must be of a similar temperament, age, size and play-style and the interactions must be enjoyable for all. Lastly, not all dogs enjoy the company of other dogs, just as many people do not enjoy others. In this case, it is important to understand that you cannot make a dog like another dog or a person. - Ensure your pet is free from fear and distress. I truly believe that no psychologically healthy human would ever intentionally cause their dog fear or distress. However, lack of knowledge, or incorrect perceptions and beliefs about canine behavior, certainly causes a great deal of fear and distress in our canine companions. As a behavior consultant, I see a great number of dogs for “aggression” that is almost always based in stress related fear. Far too many people are still not aware of how critical a well thought out socialization plan is for a puppy when they are between 8 and 16 weeks of age. During this time, most puppies are very accepting of new environments, people, and situations — as long as they are setup to ensure it is a positive experience. Socialization does not end after the critical socialization period; rather it should continue throughout a pet’s life. A dog can be socialized after 16 weeks of age, but I recommend that you work with a certified dog behavior consultant to help you develop a remedial socialization program that will be beneficial and not cause more harm. A lack of adequate physical and mental stimulation can also cause a dog to become anxious and fearful. A dog needs a moderate amount of both physical and mental exercise on a daily basis. A pet that does not get adequate exercise may become bored and frustrated, and start exhibiting behaviors that you will find undesirable. On the other hand, too much stimulation and exercise can also be detrimental, causing a state of chronic stress. Daily visits to the dog park or a doggie daycare are often counter-productive and unhealthy. Activities need to be well balanced with ample opportunities for rest. A dog normally sleeps 17 hours per day. When we add a dog to our family we are bringing them into a very foreign environment and culture with very different rules. On top of that we are expecting them to understand a foreign language while we often make no effort to learn their language. We need to educate our dog to live in our world and educate ourselves about the dog world if we are to keep them free from fear and distress. We also need to actively protect our dog by avoiding stressful situations until they have had adequate socialization and training. You are their guardian and as such must take responsibility for managing their interactions with the environment and other living things. What Does An Animal Do When They Are Afraid? Animals, humans included, have four typical responses when they are afraid; Flee, Fight, Freeze, and Fidget About. Flee is self-explanatory and is all about the normal fight or flight response. It is important to understand that when a dog is on a leash they know that they cannot run away from what is scaring them. That is one reason a dog may be more reactive when they are on a leash; they are desperately trying to scare what they are afraid of away. This is NOT an excuse to have a reactive dog off-leash; in fact a known reactive dog should ALWAYS be on a regular six-foot leash or inside a secure fenced area when they are outside of your home. It is essential to keep a reactive dog out of situations where they react like this because every time such a reaction it occurs it becomes more likely to occur again. To Fight or become aggressive is also part of the normal fight or flight response. To allow your dog to react in this manner is a liability risk for you and a safety risk for yourself and others. Dogs can do in an incredible amount of very serious damage in a very short amount of time. As your dog’s guardian, it is your responsibility to prevent this type of behavior. As explained with fleeing, a dog on leash comprehends that the leash will restrain them from fighting effectively. It also can make the situation worse if two dogs are fighting and they are both on leashes that become entangled. Separating dogs in this scenario becomes even more difficult and risky. This is NOT an excuse to have a reactive dog off-leash; in fact a known reactive dog should ALWAYS be on a regular six-foot leash or inside a secure fenced area when they are outside of your home. It is essential to keep an aggressive dog out of situations and environments where they could attack another person or animal because there is ALWAYS a risk of serious injury or death. Every time such a reaction it occurs it becomes more likely to occur again. Dogs that have attacked other dogs should NEVER be taken to a dog park. To Fidget About is essential the dog exhibiting a normal behavior in an abnormal context. It may be as simple as looking away, sniffing, or playing with a toy. It is the dog’s way of ignoring what they perceive as being threatening with the hope that the threat will ignore them and go away. Freezing is becoming totally rigid and immobile. It is essentially the absence of any behavior that the dog feels could be provocative. This often occurs when the dog’s emotional state has moved from being afraid to being terrified. Freezing is often misunderstood by dog guardians who because they see that their dog is non-reactive they assume the dog is “fine.” While the dog is not barking, lunging or running away in this situation, it is not doing so because it is terrified. This is a tremendous emotional response that will not be forgotten easily. The key thing you need to remember with any of the four F’s (Flee, Fight, Fidget About, or Freeze) is that you want to minimize putting your dogs in these situations once you know this behavior is a likely possibility. The brain is designed to remember scary things after the very first event. Subsequent exposures will just make reduce the probability of ever being able to move beyond this fear. Common Causes of Stress in Dogs - Any change in environment (schedule, people, animals, increased noise) - Arguments among family members - Combination training (rewards and punishment) - Excessive play that becomes borderline “obsessive/” - Excessive stimulation (too much play, doggie daycare, dog sports, ) - Grief due to the loss of a companion (human or animal) - Humans ignorant of needs and ways of communicating - Inappropriate play partners, human or animal - Insufficient stimulation - Not being taught how to be alone - Punitive training (shock, choke and prong collars) - Scary events - Too many dogs per available space - Unreasonable expectations (expected to like all people and all other animals in all situations, expected to be 100% on all the time) - Insufficient social time/family time Identifying Stress in Canines Dogs express themselves and communicate with body language, vocalizations, and behavior. By getting familiar with our dogs’ bodies, we can tell when they start to feel stressed. It is imperative to look at the entire body and not just isolated parts to get the best understanding of what your dog is feeling. Calming signals, as described by Norwegian ethologist and dog behaviorist Turid Rugaas, are very subtle changes in the body of a dog that suggest building stress and are used to diffuse conflict before it happens. A calming signal is a polite request to another dog to change their behavior and, therefore, prevent any dispute from occurring. Dogs use calming signals to communicate with us as well. Two of the calming signals people see most frequently are “licking of the nose” and “yawning.” The dog in the picture is demonstrating both “averting of the eyes” and a “nose lick,” probably because the camera is staring at her. Other signs that can be calming signals are; turn away, softening of the eyes (squinting), freezing, play bow, sitting down, lying down, sniffing, scratching and splitting up. For more information on calming signals read the article Introduction to Canine Communication http://www.greenacreskennel.com/blog/2015/04/05/dog-training-introduction-to-canine-communication/. Some key indications of stress, by body part, are noted below. - Avoiding Eye Contact - Blinking or squinting - Dilated pupils - Furrowed Brows - Hardened Eyes (direct stare with pupils dilated) - Tightness around eyes - Whale eye/ Half-moon eye - Cheek puffing - Excessive salivation or drooling - Lip Curling - Lip/Nose licking - Mouth closed tightly or lips pulled back - Showing teeth - Teeth chattering - Wrinkled muzzle - Flattened or lowered - Pinned back - Upright and alert - Dribbling or submissive urination - Excessive shedding - Freezing – little or no movement - High body posture, rigid forward stance - Groveling posture - Low body posture, weight shifted back - Penis crowning - Piloerection (Hackles) - Shake off - Sweaty paws - Tail up and flagging - Tail Tucked - Tense all over - Tight brow - Urogenital “check-out.” Dogs may also indicate they are stressed through vocalizations. Some of the more common stress related vocalizations are: - Barking – low pitch = threatening, high pitch = fear/stress When stressed a dogs behavior will often change. Common behaviors that are often stress induced are: - Clinging to or hiding behind guardian - Destructive behaviors, chewing, ripping, shredding, clawing - Excessive self-grooming - Excessive sleeping, often due to exhaustion - Freezing or walking slowly - Inability to focus - Inappropriate urination and defecation - Increased urination and defecation - Jumping up on guardian - Jumpy/Easy to startle - Loss of appetite - Obsessive/Compulsive behaviors – (e.g. shadow chasing) - Poor sleeping habits, less than 17 hours sleep per day - Refusing food or treats - Restless, inability to relax - Running off - Sniffing, out of context - Unable to settle - Vomiting and diarrhea The Stress Escalation Ladder Stress and the dog’s arousal happen on a continuum. Some of the signs of stress start appearing at very low levels of arousal. As the arousal level continues to rise it may result in growling, showing of teeth, lunging and biting at the most extreme levels. It is important to remember that arousal levels increase with positive stress (eustress) just as they increase with negative stress (distress). A dog that is ramped up and highly aroused in play is also more likely to bite and lose their bite inhibition. The chart below, created by Rugaas, illustrates the signs seen at various levels of arousal. It should always be our goal to keep the dog out of the yellow and red zones. Reducing Stress in Dogs In order to reduce our dogs’ stress we first need to understand it. Once we have identified the cause, there are many approaches to eliminating the stress. The easiest way to deal with a dog under stress is usually management — removing the dog from the situation/context where the stress occurs. While this does not solve the problem, it is a temporary fix that will make the dog feel better. If this is a context/situation the dog will need to be exposed to in the future, it is advisable to work with a qualified behavior consultant to help get the dog over this fear. Few dog guardians are successful resolving this type of issue by reading books or watching programs on TV. In our experience, they usually make the problem worse. A qualified, professional behavior consultant will ALWAYS first recommend that you discuss your dog’s behavioral issues with your veterinarian. Pain and other medical conditions can cause behavioral problems, and they need to be addressed first. A behavior consultant will consider a number of methods to help your dog deal with their stress. They will almost always recommend a behavior modification protocol, which is a specialized program for your dog’s situation. A dog training class is seldom recommended for a dog with stress-based issues such as anxiety and aggression, as it often puts a dog in an environment where they will be stressed. Any organism must be free from fear if they are going to be able to learn. Teaching your dog to sit, down, stay, etc. will not change the way your dog feels. In fact, asking your dog to sit in the presence of something that causes them to react may make them more fearful. For example, let’s say that you are afraid of bees and wasps. Now imagine sitting in a room full of bees and wasps and imagine trying to learn. You will not be learning but will be focusing on keeping yourself safe from getting stung. A behavior modification program is all about changing your dog’s emotions and the way they feel about what is making them fearful or angry. Additionally, a behavior consultant may also recommend changes in diets, and treatment with complementary therapies; Bach Flower Remedies, Herbs, Homeopathy, T-Touch, if they are so qualified. They may also suggest that you ask your veterinarian to refer you to a veterinary behaviorist so that the veterinary behaviorist can determine if drug therapy is necessary. A behavior consultant should always be working with your veterinarian. Stress can make us feel miserable, and it does the same for our dogs. If you have a dog living in stress — take steps to help them as soon as possible! Articles on Don’s Blog Understanding Behavior; Why It Matters – http://www.greenacreskennel.com/blog/category/dogs/canine-behavior/ What Should I Do When My Dog Growls? – http://www.greenacreskennel.com/blog/category/dogs/canine-behavior/problem-behavior/aggression/ Your Pet’s Behavioral Health Is As Important As Their Physical Well-Being: The New AAHA Canine and Feline Behavior Management Guidelines – http://www.greenacreskennel.com/blog/2015/08/01/pet-health-and-wellness-your-pets-behavioral-health-is-as-important-as-their-physical-well-being/ Dog Behavior – Dominance: Reality or Myth – http://www.greenacreskennel.com/blog/2015/06/20/dog-behavior-dominance-reality-or-myth/ Puppy Socialization and Habituation – http://www.greenacreskennel.com/blog/2015/06/27/dog-behavior-puppy-socialization-and-habituation/ Green Acres Kennel Shop Position Statement on Pet-Friendly, Force-Free Pet Care – http://www.greenacreskennel.com/boarding/what-is-pet-friendly Green Acres Kennel Shop Position Statement on the Use of Dominance and Punishment for the Training and Behavior Modification of Dogs – http://www.greenacreskennel.com/training/position-on-the-use-of-dominance-and-punishment-for-the-training-and-behavior-modification-of-dogs The Unintended Consequences of Shock Collars – http://www.greenacreskennel.com/blog/2013/08/05/dogs-the-unintended-consequences-of-shock-collar/ Introduction to Canine Communication – http://www.greenacreskennel.com/blog/2015/04/05/dog-training-introduction-to-canine-communication/ Can You Trust What You Read on the Internet? – http://www.greenacreskennel.com/blog/2015/09/03/can-you-trust-what-you-read-on-the-internet/ Animal Welfare – Assessing Pets’ Welfare Using Brambell’s Five Freedoms – http://www.greenacreskennel.com/blog/2014/10/01/animal-welfare-assessing-pets-welfare-using-brambells-five-freedoms/ Selecting A Pet Care Provider – Yes! A Trend Towards Kinder and Gentler Professional Pet Care – Green Acres Kennel Shop’s “Pet Friendly” Philosophy – Part 1 – http://www.greenacreskennel.com/blog/2015/04/02/yes-a-trend-towards-kinder-and-gentler-professional-pet-care-green-acres-kennel-shops-pet-friendly-philosophy-part-1/ Selecting A Pet Care Provider – Yes! A Trend Towards Kinder and Gentler Professional Pet Care – The PPG – Part 2 – http://www.greenacreskennel.com/blog/2015/05/02/selecting-a-pet-care-provider-yes-a-trend-towards-kinder-and-gentler-professional-pet-care-the-ppg-part-2/ Selecting A Pet Care Provider – Yes! A Trend Towards Kinder and Gentler Professional Pet Care – A Veterinary Perspective – Part 3 – http://www.greenacreskennel.com/blog/2015/06/30/selecting-a-pet-care-provider-yes-a-trend-towards-kinder-and-gentler-professional-pet-care-a-veterinary-perspective-part-3/ Dogs-Dog Training: A Holistic Approach to Dog Training (Parts 1 & 2) – http://www.greenacreskennel.com/blog/2015/02/01/dogs-dog-training-a-holistic-approach-to-dog-training-parts-1-2/ Trends in Training – The Evolution of a Pet Care Professional – http://www.greenacreskennel.com/blog/2008/04/19/professional-development-trends-in-training-the-evolution-of-a-pet-care-professional/ An Overview of the Bach Flower Remedies – http://www.greenacreskennel.com/blog/2015/06/22/bach-flower-remedies-an-overview-of-the-bach-flower-remedies/ PODCAST – Dog Training Questions for Don and Kate with special guest host Dr. Mark Hanks – part 1 – http://www.greenacreskennel.com/blog/2015/07/12/podcast-dog-training-questions-for-don-and-kate-with-special-guest-host-dr-mark-hanks-part-1/ PODCAST – Dog Training Questions for Don and Kate with special guest host Dr. Mark Hanks – part 2 – http://www.greenacreskennel.com/blog/2015/07/19/podcast-dog-training-questions-for-don-and-kate-with-special-guest-host-dr-mark-hanks-part-2/ PODCAST – Dog Training Questions for Don and Kate with special guest host Dr. Mark Hanks – part 3 – http://www.greenacreskennel.com/blog/2015/07/27/blog-post-27jul15-podcast-dog-training-questions-for-don-and-kate-with-special-guest-host-dr-mark-hanks-part-3/ PODCAST – Pet Behavior Counseling and Don and Kate – with special guest host Dr. Mark Hanks – http://www.greenacreskennel.com/blog/2015/01/10/podcast-pet-behavior-counseling-and-don-and-kate-with-special-guest-host-dr-mark-hanks/ Stress in Dogs, Martina Scholz and Clarissa von Reinhardt, Dogwise Publishing, 2007 Canine Neuropsychology, 3rd edition, James O’Heare, Ph.D., DogPsych, 2005 The dog’s brain — a simple guide, Val Strong, Alpha Publishing, 1999 ©2015, Donald J. Hanson, All Rights Reserved <Click for Copyright and Use Policy>
<urn:uuid:f3f06f59-d8e8-4632-9f43-185562b39504>
CC-MAIN-2018-13
http://www.greenacreskennel.com/blog/2015/11/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645604.18/warc/CC-MAIN-20180318091225-20180318111225-00119.warc.gz
en
0.939838
7,358
3.03125
3
In the second line, “success in circuit lies,” “lies” clearly has the primary meaning that success is found in circuit, however, dickinson chooses every word very carefully, and the secondary meaning of “lies,” that is, dishonest statements, would not have been unintentional. Tell all the truth but tell it slant- - online text : summary, overview, explanation, meaning, description, purpose, bio success in circuit lies tell all the truth but tell it slant- analysis emily dickinson critical analysis of poem, review school overview analysis of the poem literary terms. Based upon the foregoing, the fourth circuit concluded that murphy’s errors rendered his analysis “outside the range where experts might reasonably differ,” and, thus, the district court did not abuse its discretion in excluding murphy’s report as unreliable under federal rule of evidence 702. Fault tree analysis sequence of events leading to success this list should be complete, omitting no part of the operation circuit, or that the missile strikes an obstacle the important difference between situation (b) and situation (c) is the kind and. Success in circuit lies - “tell all the truth”could mean to tell every person the truth, or to speak only the truth - “slant” could mean that the truth should be told with a angle - mean something circular, while the second could mean something to do with electricity. In the context of circuit analysis, the circuit must be composed of linear elements (capacitors, inductors, linear transformers, and resistors) with n independent sources, and what you're solving for must be either voltages or currents. Circuit analysis and general study tips [closed] ask question up vote 0 down vote favorite 1 the more work i do in the field of ee, the more i realizing that my general circuit analysis skills are usually the root of my confusion and could use improvement even after putting on my break-a-big-problem-into-smaller-pieces hat, i still find. Success in circuit lies too bright for our infirm delight the truth’s superb surprise as lightning to the children eased with explanation kind the truth must dazzle gradually. A short analysis of emily dickinson’s ‘tell all the truth but tell it slant’ success in circuit lies too bright for our infirm delight what makes such an analysis of ‘tell all the truth but tell it slant’ persuasive is that christianity is full of such references to being ‘blinded’ by the truth for instance, there is 1. The repeated recurrence of diderot's ternary model in these different contexts brings into focus an unexpected unity in what at first looks like a disparate corpus as the analysis proceeds, furthermore, it also becomes clear that diderot's materialist philosophy dictates a rhetoric aiming at the sensitive body just as much as the reasoning mind. Ss one-shot short scenes from the lives of summer and seth. The boys become accustomed to the pattern of their days on the island although it is impossible to adjust to the new rhythms of tropical life, which include the strange point at midday when the sea rises and appears to contain flickering images. Success in circuit lies spring 2009 the best of times, the worst of times americans have, for the first time in half a century, lived anew the meaning of dickens’ famous words. Over the past 5 years, costco canada has only opened 10 new stores which is a small fraction of the 122 new stores opened globally during the same time period (costco operates in the us, canada, mexico, united kingdom, japan, taiwan, korea and australia. Circuit court of cook county upholds city of chicago’s imposition of “success in circuit lies” any legal analysis, legislative updates or other content and links should not be. A polygraph, popularly referred to as a lie detector, emphasizing that it can detect lies and that it is important to answer truthfully then a stim test is often conducted: the subject is asked to deliberately lie and then the tester reports that he was able to detect this lie in 2005, the 11th circuit court of appeals stated that. Can you please paraphrase this poem by emily dickinson: tell all the truth but tell it slant--- success in circuit lies too bright for our infirm delight the truth's superb surprise as lightening to the children eased with explanation kind the truth must dazzle gradually or every man be blind--- 10 points to the first answerer with a paraphrase. Success in circuit lies we get from the first line that we're not supposed to tell the whole truth directly (according to this poem), and this line lets us know how we are supposed to tell it, specifically in circuit. Tell all the truth but tell it slant tell all the truth but tell it slant---success in circuit lies too bright for our infirm delight the truth’s superb surprise as lightning to the children eased with explanation kind the truth must dazzle gradually or every man be blind--. Note: citations are based on reference standards however, formatting rules can vary widely between applications and fields of interest or study the specific requirements or preferences of your reviewing publisher, classroom teacher, institution or organization should be applied. An analysis of the success in circuit lies 2 de dezembro de 2017 / outros / an analysis of expressive one word picture vocabulary test a comparative essay analysis of sight and the fog sen classic literature. Success in circuit lies's profile including the latest music, albums, songs, music videos and more updates. Many observers attributed the success of the circuit city concept to its strong management, customer service focus, and a good journal of business cases and applications rise and fall, page 3 merchandising formula which capitalized on innovative electronic consumer products based on. For example, in the 2014-2015 term, four courts had 100 percent of their cases reversed, but the raw numbers were small (one case for the 2nd circuit, three for the 3rd circuit, three for the 7th. Success in circuit lies too bright for our infirm delight the truth's superb surprise as lightning to the children eased with explanation kind the truth must dazzle gradually. As the analysis proceeds, furthermore, it also becomes clear that diderot's materialist philosophy dictates a rhetoric aiming at the sensitive body just as much as the reasoning mind. I am, however, convinced that the success that lies in circuit, that dictates that all the truth must be told, but told slant, has behind it the authority of both the old and new testament: that parables, riddles, the incarnation itself are, but aspects of a truth we could not comprehend without their mediation. The article presents philip roth's analysis of american jewish identity as reflected in his novels novels such as the counterlife and operation shylock by philip roth illustrates search and obsession of american jews toward their jewish identity roth's work, which depict jews passion for being. By stj dixon-warren engineering and process analysis manager, chipworks the extraordinary success of the iphone 4 lies in the superb integration of multiple sensor technologies in conjunction with a very slick software interface in a recent series of mems investor. The question for the senate is this: is the new standard for those in public life that accusations of misconduct with no corroboration are enough to destroy someone's reputation and career.
<urn:uuid:f30ab5cf-6e50-4da4-afaa-1623b511726a>
CC-MAIN-2018-43
http://glhomeworkdwlc.icecondoassignments.info/an-analysis-of-the-success-in-circuit-lies.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513548.72/warc/CC-MAIN-20181021010654-20181021032154-00452.warc.gz
en
0.94668
1,553
2.859375
3
Date: 21 December 2011 Click here for printable version Depending on the number of CSS files used in the test, a list of previously visited sites can be assembled quickly by this JavaSript code. This attack is based on cache timings and was first described in a paper by E. Felten et al, circa 2000. An example of these CSS files used for identifying MySpace users is 'http://x.myspacecdn.com/modules/common/static/css/futuraglobal_kqj36l0b.css', which is a standard CSS file used in most MySpace.com pages. This script (or variations of) has been found to be affective in Firefox, Chrome, Safari and Opera. A version targeted at Internet Explorer users is currently being developed. At the time of posting there have been no patches issued by browser vendors to correct this vulnerability. Happy and Safe browsing, Implementation of attack for Firefox. Original Paper by E. Felten et al. Rapid history extraction through non-destructive cache timing (v8)
<urn:uuid:b1772e7c-1af1-4ba3-917e-f857f6744d05>
CC-MAIN-2016-36
https://auscert.org.au/15247
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292181.27/warc/CC-MAIN-20160823195812-00025-ip-10-153-172-175.ec2.internal.warc.gz
en
0.919234
230
2.609375
3
Why Southerners Have a Higher Risk of Kidney Stones If you live in the South, you’re more likely to have a kidney stone than someone who lives in a milder climate. Kidney stones, which affect nearly 10 percent of Americans, are deposits made of mineral or acid salts that form inside the kidneys or other parts of the urinary tract. The primary function of the kidneys is to remove waste from the body and balance the water and electrolyte content in the blood, but kidney stones stall this process. Kidney stones can form for several reasons, including obesity, when there’s too much mineral or uric acid buildup in the urine or as a result of a urinary tract infection or a rare genetic disorder. Why Southerners are More Susceptible to Kidney Stones We often refer to the Southeastern part of the country as the “Stone Belt” because people who live in these areas have a greater likelihood of developing kidney stones. Southerners have a higher risk of this condition because the warm weather makes them more susceptible to dehydration, which causes fluid loss and low urine volume that facilitates the formation of stones. One study that tracked adults and children living in South Carolina over a 16-year period found that among an at-risk population of more than 4.6 million people, children had double the risk of developing kidney stones and women had a nearly 45 percent lifetime risk of developing the condition. Population studies also have shown that Southerners are 50 percent more likely than people in other parts of the country to develop kidney stones. Other contributing factors may include poor diet, not drinking enough water and obesity. Research included in the National Institutes of Health review of the global prevalence of kidney stones suggests that dietary changes may be a key factor in why more people have kidney stones. Increased consumption of animal protein worldwide and increased intake of sodium have paralleled increased rates of stone disease in several countries, including the United States. High sugar consumption and not eating enough calcium-rich foods also may increase your risk. The Southern diet is filled with food and drinks like iced tea, okra, spinach and other high-oxalate foods that contribute to stone formation. This diet also contains many high-sodium foods, another risk factor for kidney stones. How to Lower Your Risk of Kidney Stones Symptoms of kidney stones include a sharp, stabbing pain in the mid-back that occurs every few minutes, nausea and vomiting, pain in the lower abdomen, blood in the urine or a burning sensation when you urinate, frequent trips to the bathroom, fever and pain in the lower abdomen. If you experience any of these symptoms or severe pain as a result of them, it’s best to see a doctor as soon as possible. He or she can perform a blood or urine test or an ultrasound or stone protocol CT to confirm the diagnosis and give you medication such as an alpha blocker to help you pass the stone more quickly. However, most kidney stones don’t require medical treatment to pass on their own. In some people, passing kidney stones can be incredibly painful, but others just may need to drink more water (as much as three quarts a day) or take a pain reliever to pass a small stone. Unfortunately, once you form a kidney stone, you’re more likely to form stones again. That’s why prevention is critical. There’s very little Floridians can do to control the weather here, so it’s best to focus on dietary changes to lower your risk. Limit your consumption of animal protein. When the body breaks down protein, this increases uric acid levels, which in turn may increase your risk of forming stones. Also reduce your salt intake. Sodium increases calcium in your urine, another risk factor for stone disease. People who often form calcium-oxalate kidney stones (the most common type of stone) should limit their consumption of oxalate, a natural compound found in foods like tea, chocolate, nuts and tofu. Oxalate can bind to calcium and form crystals in the urine, especially if there’s fluid loss. However, eating enough calcium can offset oxalate levels in your urine and prevent the formation of stones. Maintaining a healthy weight also lowers your risk for stone disease, so stock up on high-fiber, nutrient rich fruit, vegetables, whole grains and lean protein. These foods tend to be lower in fat, sodium and artificial sugars that can lower your risk of this condition. The bottom line is that kidney stones are preventable with lifestyle changes and increasing fluid intake. Yes, weather increases your risk of stone disease, but monitoring your diet is the most effective way to avoid this condition and limit its recurrence. Quick Scheduling with a Urologist We are committed to the diagnosis, treatment and management of patients with urological disorders. Our physicians offer diagnosis and therapy for the entire spectrum of urologic disease.Request an Appointment
<urn:uuid:f1040bc3-7fd2-4dd0-b075-edc80f2b7dd4>
CC-MAIN-2019-43
https://www.orlandohealth.com/content-hub/why-southerners-have-a-higher-risk-of-kidney-stones
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986668569.22/warc/CC-MAIN-20191016113040-20191016140540-00374.warc.gz
en
0.950055
1,019
3.4375
3
Summary and Info In just 24 lessons of one hour or less, you will be able to build full-featured production websites using Django, the powerful web development framework based on Python. Designed for experienced website developers who have at least some familiarity with the Python programming language, this book uses a straightforward, step-by-step approach. Each lesson builds on the previous ones, enabling you to learn the essentials of implementing the Django framework on a website from the ground up. Step-by-step instructions carefully walk you through the most common Django tasks. Q&As, quizzes, and exercises at the end of each lesson help you test your knowledge. Notes and tips point out shortcuts and solutions. Learn how to… Install and configure the Django web development framework Cleanly separate data, logic, and view layers Implement site interfaces with build templates and views Utilize templates and views to store, access, and retrieve data Use the Django forms library Define custom tags and filters to minimize coding Secure sites with registration, authorization, logins, and permissions Manage sessions and cookies Implement middleware for request and response handling Create sitemaps to inform search engines of your content Internationalize your site Optimize performance with caching Deploy Django in multiple configurations Maintain sites with Django’s administrator interface Introduction 1 Part I: Creating the Website Framework Hour 1: Understanding Django 7 Hour 2: Creating Your First Website 19 Hour 3: Adding Models and Objects to Your Website 37 Hour 4: Creating the Initial Views 63 Part II: Implementing the Website Interface Hour 5: Using Data from the Database in Views 81 Hour 6: Configuring Web Page Views 103 Hour 7: Implementing Django Templates to Create Custom Views 117 Hour 8: Using Built-in Template Tags to Enhance Views 139 Hour 9: Using Built-in Template Filters to Enhance Views 155 Hour 10: Adding Forms to Views 185 Hour 11: Using Views to Add and Update Data in the Database 209 Hour 12: Utilizing Generic Views 231 Hour 13: Advanced View Configurations 269 Part III: Implementing a Full-Featured Website Hour 14: Managing Site Users 295 Hour 15: Adding Website Security 313 Hour 16: Managing Sessions and Cookies 333 Hour 17: Customizing Models in the Admin Interface 347 Hour 18: Customizing the Admin Interface 365 Part IV: Implementing Advanced Website Components Hour 19: Implementing Middleware 383 Hour 20: Internationalization and Localization 407 Hour 21: Creating Sitemaps 423 Hour 22: Implementing Multiple Websites 437 Hour 23: Configuring Caching 451 Hour 24: Deploying Django 465 Appendixes Appendix A: Django Resources 477 Appendix B: Django Form Field Objects 481 Appendix C: Formatting Dates and Times 491 Index 493 Review and Comments Rate the Book Sams Teach Yourself Django in 24 Hours 0 out of 5 stars based on 0 ratings.
<urn:uuid:cdbb9f18-ba1f-4c86-a7f1-5edb29dd2604>
CC-MAIN-2017-04
http://libdl.ir/book/39960/sams-teach-yourself-django-in-24-hours
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00541-ip-10-171-10-70.ec2.internal.warc.gz
en
0.754051
576
2.734375
3
In November 2003, a large hepatitis A outbreak was identified among patrons of a single Pennsylvania restaurant. We investigated the cause of the outbreak and factors that contributed to its unprecedented size. Demographic and clinical outcome data were collected from patients with laboratory confirmation of hepatitis A, and restaurant workers were tested for hepatitis A. A case-control study was conducted among patrons who dined at the restaurant between October 3 and October 6, 2003. Sequence analysis was performed on a 315-nucleotide region of viral RNA extracted from serum specimens. Of 601 patients identified, 3 died; at least 124 were hospitalized. Of 425 patients who recalled a single dining date at the restaurant, 356 (84 percent) had dined there between October 3 and October 6. Among 240 patients in the case-control study, 218 had eaten mild salsa (91 percent), as compared with 45 of 130 controls (35 percent) (odds ratio, 19.6; 95 percent confidence interval, 11.0 to 34.9) for whom data were available. A total of 98 percent of patients and 58 percent of controls reported having eaten a menu item containing green onions (odds ratio, 33.3; 95 percent confidence interval, 12.8 to 86.2). All restaurant workers were tested, but none were identified who could have been the source of the outbreak. Sequences of hepatitis A virus from all 170 patients who were tested were identical. Mild salsa, which contained green onions grown in Mexico, was prepared in large batches at the restaurant and provided to all patrons. Green onions that were apparently contaminated before arrival at the restaurant caused this unusually large foodborne outbreak of hepatitis A. The inclusion of contaminated green onions in large batches that were served to all customers contributed to the size of the outbreak. Copyright 2005 Massachusetts Medical Society.
<urn:uuid:02a29478-79e6-4e10-ba4e-96fbefab99b6>
CC-MAIN-2021-39
https://www.scienceopen.com/document?vid=263a9ae3-567b-4352-abd3-f35ab9cae3f6
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057427.71/warc/CC-MAIN-20210923165408-20210923195408-00367.warc.gz
en
0.980557
361
2.875
3
Scuba diving brings many benefits to children. This activity can have a very positive effect on physical, mental, intellectual and social development. Let’s Take A Look At Some Of The Main Benefits. - Scuba diving strengthens muscles and allows children to develop psychomotor skills. - Improves lung capacity and heart and circulatory function. - Encourage children’s maturity. - Increase self-esteem and sense of accomplishment. - Encourage responsibility. - It stimulates children’s imagination and creativity. - Reinforce values related to teamwork, solidarity, and camaraderie. Of course, children can be stressed even if they don’t bear the same burdens as adults. And doing activities like scuba diving can help relieve that anxiety positively. Diving involves several risks, and fortunately, all of these risks are manageable. Still, we shouldn’t underestimate the risk factors. - The dive instructor must be a qualified professional in teaching children as well as the dive activity itself . - Children under the age of 8 have not yet developed enough lungs. So experts say it’s better not to dive for these kids. - Children under the age of 12 are more likely to experience ear pain. Therefore, the instructor should be able to teach the skills related to decompression in the ear. - The smaller the child, the greater the risk of hypothermia. - To begin diving, you must be at least 150 cm (5 feet) tall and at least 45 kg (100 pounds) in weight. Before starting scuba diving, children must first master swimming. In particular, it is important to acquire the skills related to the tube. - The first part of the instruction is performed in the pool. Then the children will go out into the open waters. - It is not good for a dive to last longer than 25 minutes. - Children cannot be dive partners with each other. So each child has to dive in pairs with an experienced adult. - Children must learn to not rise faster than their own air bubbles. - It is medically forbidden to climb above 500 m (1,640 feet) after diving. This applies for 12 hours after diving. Children should also have enough autonomy. You must be able to get on the boat yourself, and you must be able to pack and manage your own equipment.
<urn:uuid:ae0b3811-1aa3-4ea8-87f2-74203b2729b9>
CC-MAIN-2022-21
https://portolavalleyhaven.com/the-benefits-of-scuba-diving-for-children/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00610.warc.gz
en
0.924198
496
3.515625
4
Plasma-assisted atomic layer deposition (ALD) is an energy-enhanced method for the synthesis of ultra-thin films with Å-level resolution in which a plasma is employed during one step of the cyclic deposition process. The use of plasma species as reactants allows for more freedom in processing conditions and for a wider range of material properties compared with the conventional thermally-driven ALD method. Due to the continuous miniaturization in the microelectronics industry and the increasing relevance of ultra-thin films in many other applications, the deposition method has rapidly gained popularity in recent years, as is apparent from the increased number of articles published on the topic and plasma-assisted ALD reactors installed. To address the main differences between plasma-assisted ALD and thermal ALD, some basic aspects related to processing plasmas are presented in this review article. The plasma species and their role in the surface chemistry are addressed and different equipment configurations, including radical-enhanced ALD, direct plasma ALD, and remote plasma ALD, are described. The benefits and challenges provided by the use of a plasma step are presented and it is shown that the use of a plasma leads to a wider choice in material properties, substrate temperature, choice of precursors, and processing conditions, but that the processing can also be compromised by reduced film conformality and plasma damage. Finally, several reported emerging applications of plasma-assisted ALD are reviewed. It is expected that the merits offered by plasma-assisted ALD will further increase the interest of equipment manufacturers for developing industrial-scale deposition configurations such that the method will find its use in several manufacturing applications. |Number of pages||26| |Journal||Journal of Vacuum Science and Technology A: Vacuum, Surfaces, and Films| |Publication status||Published - 2011|
<urn:uuid:2edfa70c-d3fd-4440-ae5d-7a6f44218fb9>
CC-MAIN-2022-27
https://research.tue.nl/en/publications/plasma-assisted-atomic-layer-deposition-basics-opportunities-and-
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104277498.71/warc/CC-MAIN-20220703225409-20220704015409-00213.warc.gz
en
0.923675
423
2.625
3
An Ambiguous Plan To Protect The U.S. Since the creation of the catapult in the medieval times, the proposal of long range attacks have been very popular amongst military leaders. From the creation of cannons, to missiles, to the now feared nuclear warhead, the strategy has always been to cause massive destruction. Many countries throughout the world have access to nuclear warheads, which puts a lot of pressure on smaller enemy countries. Any country that can put an immensely destructive missile in the air at the touch of a button poses a threat to the rest of the world. Due to this, during the arms race in the seventies, a theory referred to as MAD was developed. MAD stood for mutual assured destruction, meaning that if one country ever fired missiles at a second country there would be retaliations one after another until both countries were destroyed. As soon as MAD became fully understood, the public and government felt it was time to take the next step. That step being an older theory that stated the best offense is a good defense. The idea of a strategic missile defense program was brought up amongst the American government and given serious consideration. Again the strong, libertarian personality of the United States of America stood tall and clear, taking it's problem head on for, "All the right reasons (LaFeber 529)." When in hindsight the defense plans should have been replaced with more peace talks and more efforts to reach military agreements. When creating a missile defense program, one is saying they can't be touched, which is just as much threatening as one having the most powerful weapons in the world. The concept of a strategic missile defense plan may be decades old, but the actual implementation of the plan is drawing near,
<urn:uuid:e9e58453-e5aa-469a-9a36-93d4014e9bc2>
CC-MAIN-2017-13
http://www.writework.com/essay/strategic-missle-defense-program
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189032.76/warc/CC-MAIN-20170322212949-00426-ip-10-233-31-227.ec2.internal.warc.gz
en
0.969969
343
3.125
3
Holocaust Education & Archive Research Team Introduction to the Ghettos of the Holocaust David Cohen was born in Deventer, Holland in 1882, he was an expert in papyrology and became a professor of ancient history, first in Leyden, and then in Amsterdam. He was active in Jewish affairs from an early age - he joined the Zionist movement in 1904 and held key posts in it. He was one of the sponsors and organisers of the Zionist Students Union.and the Jewish Youth Federation. During World War One David Cohen was active in providing assistance to Jewish refugees, mainly from Germany, and became the secretary of the Committee for Refugees. He was a member of the Jewish Council in The Hague and then in Amsterdam and in 1934 was elected to the Standing Committee of the Union of Ashkenazic Communities. In 1933 when the Nazis rose to power in Germany, it was on Cohen’s initiative that the Comte voor Bijzondere Joodse Belangen (Committee for Special Jewish Affairs) was established and he became the executive chairman of its sub-committee on refugees. Following the German occupation of the Netherlands in May 1940, Cohen was among the sponsors of the Jewish Co-ordinating Committee set up in the December of that year. On 12 February 1941 David Cohen together with Abraham Asscher formed the Jewish Council (Joodse Raad), at the suggestion of the Germans. They both as chairmen taking part in the daily running of the Jewish Council and determining its policy in dealing with the Germans. During the occupation the Jewish Council under severe attack from Lodewijk Ernst Visser and from the Dutch government –in-exile, for its policy of co-operation with the Germans. This was the background for Cohen’s conflict with Visser, who was opposed to such collaboration. In the Joodse Raad itself, there was also opposition to Cohen’s policy, but he was always successful in overcoming this resistance and obtaining majority support for his position in the Co-ordinating Committee. When the Allies broadcast their declaration on the 17 December 1942 regarding hundreds of thousands of Polish Jews being put to death by barbaric means, Asscher discounted the claims saying: “As far as I am concerned, the reports are nothing but English propaganda, with the sole intention of inciting the world against Germany.” David Cohen later recalled his feelings regarding the broadcast: “The fact that the Germans had perpetrated atrocities against Polish Jews was no reason for thinking that they behaved in the same way towards Dutch Jews, firstly because the Germans had always held Polish Jews in disrepute, and secondly because in the Netherlands, unlike Poland, they had to sit up and take notice of public opinion.” On 23 September 1943, Cohen was arrested with the other members of the Jewish Council who were still in Amsterdam and taken first to Westerbork transit camp and from there to the transit ghetto of Theresienstadt near Prague. When he returned to the Netherlands after the war, the Dutch government instituted judicial proceedings against him, charging him with collaborating with the enemy. The prosecutor charges that without the collaboration of the Joodse Raad, far fewer Jews would have been deported from the Netherlands. Cohen was briefly detained and in July of 1951 the Minister of Justice formally dropped the case "for reasons of general public interest." It must be noted that Cohen's mother, three brothers, and sister were murdered as Auschwitz and Sobibor. In 1947 Cohen was also charged before a Jewish Community tribunal, where he put up a passionate defence of his policy during the occupation, but he was found guilty and was barred from holding office in any Jewish institution. In 1950 the sentence was annulled, Cohen returned to his university post, but did not become active in Jewish public life. In 1955 he published his memoirs Zwervend en Dolend (Fugitive and Vagabond), a publication dealing with his involvement and dealings with Jewish fugitives. he died in 1967 a broken man. Encyclopedia of the Holocaust - Israel Gutman (Ed) - New York 1990. Final Journey – The Fate of the Jews in Nazi Europe by Martin Gilbert, published by George Allen and Unwin Ltd London 1979. Biografisch Woordenboek van Nederland 3 (Den Haag 1989) Copyright: Chris Webb H.E.A.R.T 2007
<urn:uuid:a0b5168e-b137-42dd-8697-7995dc17c04c>
CC-MAIN-2017-04
http://www.holocaustresearchproject.org/ghettos/cohen.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280239.54/warc/CC-MAIN-20170116095120-00040-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974194
916
3.625
4
With the right plant knowledge, you can be well fed in the Northwest. The forest is filled with many types of edible plants. A number of fresh leaves and flowers exist that are perfect for a salad, and some bulbs and tubers are even substantial enough to be a main course. Wild berries are abundant from early summer through fall, with some holding on into winter. And some other foods can be eaten fresh or dried, such as nuts and mushrooms. Bulbs, Roots and Tubers To add substance to their diet, Northwest Native Americans made use of starchy bulbs and tubers. Camas (Camassia quamash) was used much like a potato. Another bulb was wapatoo (Sagittarius variabilis). These bulbs could be boiled or roasted. They were also dried and made into flour. Other edible bulbs are mariposa lily (Calochortus nuttalli), wild onion (Brodiaea grandiflora), and glacier lily (Erythronium grandiflorum). The root of wild ginger (Asarum caudatum) can be used to flavor food just like common ginger. The leaves of many wild plants are edible. Miner's lettuce (Claytonia perfoliatum) can be used in a spring salad along with the new leaves of fireweed (Epilobium latifolia), and dandelion (Taraxacum officinale). Wood sorrel (Oxalis oregana) has an unusually sour taste and is best for snacking. The stinging nettle (Urdica dioica) seems an odd food to attempt to eat; once it is cooked, it loses its bite. Nettle is very nutritious and worth the extra effort to harvest. For an unusual vegetable, try the young fronds of native ferns called fiddleheads. Two edible species are ostrich fern (Matteuccia struthiopteris), and bracken fern (Pteris aquilina). To add color to dishes, add edible wild flowers. All wild roses and their hips are edible. A Northwest rose (Rosa gymnocarpa) can be found at the edge of the woods, and along roadsides in summer. All violet flowers and leaves are edible. The yellow wood violet (Viola glabella) is a common spring wildflower. Clover and dandelion flowers are also edible and easily obtained. The Northwest is known as the perfect climate for growing berries. The tiny native strawberry is tasty, along with the native blackberry (Rubus ursinus). Two types of huckleberry exist: evergreen huckleberry (Vaccinium ovatum), and red huckleberry (Vaccinium parviflorum). In moist areas you will find salmon berry (Rubus spectabilis) and thimble berry (Rubus parviflorus). Northwest berry producing trees are blue elderberry (Sambucus cerulea) and service berry (Amelanchier alnifolia). The most common Northwest nut is the hazelnut (Corylus californica). Native nuts can be eaten raw or roasted for extra flavor. There are two types of acorn: one is from the white oak (Quercus garryana) and the other from black oak (Quercus keloggii). A lesser known small nut is from the chinquapin tree (Chrysolepis chrysophylla). There is no shortage of Northwest mushrooms. An easy one to identify is the chanterelle. Other favorites are morel, bolete, hedgehog and oyster mushrooms. many mushrooms can look alike so it is important to identify them by their cap, gills and stem. The first time you go wild harvesting, it's a good idea to go with someone who has experience. Buy a good field guide with clear pictures. Choose collection areas where herbicides have not been sprayed.
<urn:uuid:a211f981-d287-438f-998c-9a9dfe778fc3>
CC-MAIN-2015-14
http://www.gardenguides.com/95157-edible-native-plants-northwest.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298529.91/warc/CC-MAIN-20150323172138-00210-ip-10-168-14-71.ec2.internal.warc.gz
en
0.911568
831
3.5
4
Romance of the Bells: The California Missions in Art In 1769, Spain began colonizing California, building missions to convert the indigenous people to Catholicism. As the oldest buildings in California, the missions continue to captivate the imagination. Starting in the 1880s, artists began creating paintings and drawings of weathered adobe walls, red-tiled roofs, and tranquil arcades that shaped a romantic vision of the region’s Spanish-era past. Although reality differed from that vision, the missions did set the course of history during their 65-year heyday, establishing the roots of today’s California, from its agricultural empires of cattle and grain to its architecture, cuisine, and place names. This exhibit presented paintings from the Irvine Museum that captured a moment in time, as some of California’s finest Impressionist artists perceived it.
<urn:uuid:cc0b3d30-f7b4-4adc-ab83-88f0ca8c3c42>
CC-MAIN-2016-07
http://www.californiamuseum.org/exhibit/romance-bells-california-missions-art
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701169261.41/warc/CC-MAIN-20160205193929-00047-ip-10-236-182-209.ec2.internal.warc.gz
en
0.963472
177
3.640625
4
The two you gave are a pair that obey Newton's third law The normal force should be equal in magnitude but opposite in sign to the weight (weight is directed down, normal is directed up, and the forces must be equal in magnitude since F=N-W=ma, and a=0 so N=W), so the two forces you gave are a pair described by Newton's third law The normal contact force on the book and the weight of the book are not described by Newton's Third Law. Newton's Third Law states that when object A exerts a force on object B, object B exerts an equal but opposite reaction force on object A. A pair of forces here must satisfy: - Equal in magnitude - Opposite in direction - Forces of the same type - Should be acting on two different objects Since both the weight and the normal contact force act on the book, these two forces are not considered a pair. Also, the two forces are not of the same type. However, a pair in this situation would be the normal contact force exerted by the table on the book and the normal contact force exerted by the book on the table. *Another pair of forces is the gravitational force on the book by the earth and the gravitational force on the earth by the book.
<urn:uuid:4775f89f-5a3a-40ce-bd29-ea42f485bcd6>
CC-MAIN-2019-26
https://socratic.org/questions/58ff710db72cff35ba2849c2
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998959.46/warc/CC-MAIN-20190619103826-20190619125826-00053.warc.gz
en
0.944983
270
2.953125
3
Why Can You Blame Lasers for Your Last Speeding Ticket? Laser Speed Detection and LIDAR (LIght Detection and Ranging) LIDAR measures the vehicle's speed by sending out two laser pulses and calculating the difference in time it takes to detect the pulses of light reflected from the target, your car. Often times people will have radar detectors in their car so they know in advance if a police officer is trying to catch speeder. These work by picking up the radar radio waves that are scattered from other objects. However, it is difficult to detect the use of LIDAR in advance as it is a highly focused laser beam that scatters very little. LIDAR has the distinct advantage of being able to pick out one vehicle in a cluttered stream of traffic; your vehicle cannot be mistaken for another vehicle unlike radar, which has a broader pulse. It can also be used over a large distance, which makes it even more difficult to spot. License plates are typically the strongest LIDAR target, as they are covered in a retroreflective material that returns light back its source with a bare minimum of scattering. How LIDAR Works Light travels from the LIDAR gun at about 3x108meters/second, or 0.3 meters per nanosecond. After the light hits the target, it is reflected back towards the source. The laser determines distance by calculating how far a returning photon has traveled to and from a target: Distance = [Speed of Light x Time of Flight] / - Laser gun generates an optical pulse. - The pulse travels from the laser gun to the target and back to the gun. - LIDAR system measures the time of flight from the start pulse to the return pulse. - Time measurement is converted to a distance by using the formula above. The LIDAR gun then sends out a second pulse and finds the distance again, as well as the time between the two pulses. Using the following formula, it can determine your speed. Speed = [Change in Distance (Dx)]/ [Change in Time (Dt)] The LIDAR system then determines your speed by the above formula. A laser gun can determine your speed very quickly, about 1,000 times per second!
<urn:uuid:c30bbbfb-8462-40ac-af20-38ce3bce3bdb>
CC-MAIN-2017-22
http://physicscentral.com/explore/poster-speed.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607120.76/warc/CC-MAIN-20170522211031-20170522231031-00380.warc.gz
en
0.95019
472
4.09375
4
Human play, as embodied in sports, is one of the most important expressions of human culture. It can be said that the games people play in a society are a reflection of the society as a whole. It can also be said that communication is the one dominant attribute that distinguishes human beings from every other species on the planet. Thus the intersection of communication and sports in the human experience is an important one. The Olympic movement is considered to be one of the largest social movements in human history. Nowhere else do the countries of the world gather in one place as they do during the Summer Olympic Games. While the peaceful gathering of the world’s youth for sports competition is the embodiment of that intersection of sport and communication, this fact underscores the importance of the media in conveying Olympic values and ideals. In many respects, it is a relationship between the Olympic community and the media that allows the Games to be conducted on the scale that they are. This presentation will briefly examine the evolution of this relationship from the founding of the Olympic movement at the height of the Industrial Revolution to the dawning of the Information Age. The discussion of the early days will necessarily be brief as the primary focus of this presentation is on the ways that technology, and more specifically the Internet, is driving the communications process and with it the dissemination of the human ideals. There will be a discussion of some of this new media and the presentation will conclude with some of the challenges before us as we look to the future being wrought through technological change. ### Evolution of Media As has already been noted, the Olympic movement was founded at the height of the Industrial Revolution in the late 19th century. The founder of the Olympic movement, Baron Pierre de Coubertin, authored many articles arguing for the establishment of a modern Olympic Games. An example of this effort was the publication of an essay in the “Review de Paris” in June, 1894 on the very eve of the first Olympic Congress setting out his vision for the establishment of a modern Olympic Games (4). Writing in the 19th century was a lengthy process, meaning that 19th century writers faced a much longer period than happens today, between researching, writing, and receiving payment for their work. Only the best educated individuals, usually from privileged backgrounds had the time, expertise, talent, inclination, and financial backing to undertake this effort (2). Illustrated news weeklies or monthlies were among the primary means of communication and dissemination of the news in the late 19th and early 20th centuries. This medium was also one that was particularly well suited to the audience that de Coubertin was trying to reach. The founders of the Olympic movement were well educated and well-to-do. Therefore, the message to this audience leant itself well to the tenets of the early games that they should only be open to amateurs; those who participated in sport as an avocation as opposed to a vocation (4). However, the on-going Industrial Revolution was bringing about important society-wide changes that allowed sports to flourish. This included a population migration from rural to urban centers, increases in disposable income accompanying a rise in the middle-class and eventually, more leisure time that allowed more recreational activities, among them participation in and the viewing of sports events. Concurrent with the rise in the middle class was a wider distribution of newspapers, many of which began to include sports coverage. Sports coverage did, in fact, become one of the ways that newspapers in larger metropolitan areas competed with each other. As interest in sports generally, and local teams particularly, began to appear in newspapers, the amount of space given over to this content expanded over time. As there were in these early days, no broadcast media, the newspaper sports coverage of the day was largely descriptive play-by-play recaps of the sports events. Eventually, however, broadcast media was introduced to the communications mix and began to usurp the role historically played by the newspapers. First radio, and later television, allowed the audience to experience the sport events as they occurred with their play-by-play broadcasts. Thus, the role of the newspapers and weekly or monthly sport themed news magazines began to evolve from reporting the play-by-play, now done by the broadcast media, to more reporting of “behind the scenes” activities or analysis of the athletes, teams and events. There are two lessons to be learned from this experience. First is that as technology evolved and new forms of communication emerged, message content carried in the channels of distribution changed as well. So too is this the case today; as technology evolves so does the nature of the message content being distributed. The second lesson concerns the role of “gatekeepers” such as editors or producers in the public communications process. During this early period there were comparatively few media outlets. In Europe, countries might have one or two “national” newspapers plus those in the metropolitan areas. In the United States, there was no general national newspaper until the advent of “USA Today” in 1982. While larger metropolitan areas may have as many as five news dailies, most of the country were smaller markets that could support no more than one or two. In terms of electronic broadcasting, the available air time for sports was typically limited as most outlets aired a variety of content and in the early days of television in the United States there were only three major television networks. Because of the limited availability of channels of distribution, editors in the newsroom or producers of over-the-air broadcasting wielded enormous power in determining what their audience would read or hear. The selection process for media was typically driven by market concerns; but in any case was decidedly autocratic. ### The Information Age and Rise of the Internet Human civilization has moved from the Age of Industry to the Information Age. While the general consensus is that the dawn of the Information Age is the 1970’s, the changes wrought to society through technological change really accelerated with the creation of the World-Wide- Web (the web). As changes in technology changes channels of communication and message content, a brief discussion of the underlying technology is in order. The early 1960s saw experimentation with computer technology that established the protocols for what became known as the Internet in 1969. This feat was followed by the development of Hypertext Mark-up Language (HTML) in 1989 that became the basis for the development of the web though it was not until 1993, that the web was introduced to the public-at-large. Most early websites were a series of static web pages connected by hyperlinks that could be internal, which provided structure to a website or external leading to other websites based on whatever criteria the webmaster decided. The underlying computer technology such as processors, memory, and connectivity limited the content of these early web pages. Most hosts, or the site where the web content was posted, were initially personal computers (PCs) adapted for this purpose, although eventually specialized computer devices called “web servers” evolved. Over the years, the capability of these website servers has changed dramatically as has the role of the webmaster. Today, virtually all commercial or professionally developed websites are dynamic with the web content contained in a relational database called “the backend”. Most websites also have a variety of plug-in applications, such as secure financial transaction software for ecommerce, called “middleware”, and the front facing graphic interface that people see when they arrive at a website. Webmasters have evolved into web developers and the skills required for maintaining a website can vary significantly between those working the backend and those designing the frontend. On the recipient’s end were similar technological limitations. PC’s that had their processor capability expressed in numbers such as the 286, 386, 486 and Pentiums. In terms of connectivity, bandwidth has increased exponentially with a succession of changes from dial-up modems to ISDN and now broadband. Thus, early on the limitations of technology necessarily limited the content; e.g. the message. Over the past 30 years, society has experienced a fundamental change in the way information is created and disseminated. From its rudimentary early beginning, the interface between computer technology and users has evolved to a point where virtually anyone can create “media content” and post it to the web where it can be accessed and read by anyone in the world with access to the computer resources to do so. This has led to another fundamental and extraordinarily significant change: a process of democratization. No longer can gatekeepers such as the editors or publishers of the old media exert autocratic or monopolistic control over the flow of information into the public sphere. There are, however, both positives and negatives to this state of affairs as we shall see in our ensuing discussion of the evolution of the web. ### Web 1.0 – The Inaugural Web During the formative days of the web, strategies for the dissemination of information could be broadly classified as “push” versus “pull”. Push refers to the proactively sending out or distributing messages across the Internet most commonly by email from one user’s account to another. One of the ways in which email was used as a precursor to today’s Web 2.0 applications, such as blogs and social networking sites, was the listserv. A listserv was a group of individuals typically bound together by a common interest who signed onto an email list to receive messages on a topic of mutual interest. When an email was sent in bulk to the list, anyone in the group could respond to the sent message which subsequently went to everyone else in the group. In so doing, an online discussion and sharing of ideas would ensue. Unfortunately, the widespread abuse of email has gradually restricted its utility as a medium of communication exchange beyond personal messages. Both marketers and criminals seized upon email as a means to try and sell their wares or dupe people into giving up money which gave rise to the spam phenomenon. Unfortunately, spam is still a plague on the Internet with an estimated 48.5 billion messages sent everyday largely through networks of compromised computers called botnets. In March, 2011, one of the largest of these, the Rustock Botnet that was sending as many 13.82 billion spam emails each day, was finally taken down by the authorities (8). Partially as a consequence of this abuse, more and more people are seeking out alternative channels for the sharing of electronic communications such as through the messaging capabilities of Facebook or Twitter. The other concept is that of “pull” in which individuals actively seek out web content utilizing web browsers and devices such as search engines. The key to this strategy is to insure that this web content is properly optimized and has appropriate tags so it becomes more visible on the web and easier to find. Education is the most powerful vehicle for the transmission of human ideals. It is in the realm of education that the Internet has had a profound impact. The advent of the Internet and the worldwide web has fundamentally changed the paradigm of education; a paradigm that had essentially been unchanged since the 16th century. Early on, the Academy embraced this change and developed a distance education program that can be defined as asynchronous, transformational, and computer mediated. This means that the Academy’s students can pursue their studies across the Internet using computer resources at any time and from any place without the faculty and student needing to present on-line at the same time. While removing impediments to learning created by time and space, the institution has transformed the traditional educational experience of the lecturer in the classroom to learning activities distributed through the web in which learning outcomes and course objectives are satisfied. There has been a lot of skepticism with respect to the efficacy of online education. The validity of the model has been validated by the Academy’s own research among which has been the comparison of comprehensive examination results between resident and online students. The institution’s accrediting agency, Southern Association of Colleges and Schools, reviewed and approved the Academy’s distance education program in 1996, and currently more than 85% of the Academy’s students report that they have learned as much or more through online education as they did in resident study. The Academy is also pleased that more than 96% of its students would recommend the Academy’s online education programs to friends or colleagues. Illustrative of this approach to education is the Olympic Values Education Program (OVEP) that was prepared for distance learning delivery by the Academy under a grant from the International Olympic Committee (IOC) in 2008. Through the web, the OVEP program is available to anyone in the world who has access to the Internet, and further utilizing emerging technology, such as the Google Universal Translator, albeit with some inherent limitations, it can be accessed in any one of 52 different languages. The online OVEP course can be reached at [students.ussa.edu/olympic_values](students.ussa.edu/olympic_values). I should also note that the Academy recently completed another such cross-cultural academic offering with the preparation of a bachelor’s degree course entitled the “Shaolin Philosophy of Kung Fu.” The basis for the course is a 1,500-year-old manuscript that was translated from the ancient to the modern version of Chinese and then into English. The Academy’s Department of Instructional Design then refined the English and placed it into an online course environment. In so doing, East meets West, the ancient meets the new and we come full circle insofar as the modern English course can be translated back into Chinese with the universal translator function built into the Academy’s Course Management System (CMS). Very important in the supporting of student education and the dissemination of human values is access to libraries and research resources. In 1997, the Academy was among the first organizations to put online a peer-reviewed research Journal, [The Sport Journal](http://www.thesportjournal.org). This Journal is provided subscription-free to the public and is accessed on average about 15,000 times per week. As a matter of interest, all of the papers from last year’s International Olympic Academy (IOA) were posted to The Sport Journal site in a special Olympic edition of the Journal. From the comfort of their own homes, the Academy’s students can use the Internet to access more than 57,000 libraries in 112 countries that have over 70 million holdings and 270,000 unique journals through the institution’s library portal on its’ website. However, access to educational resources, such as libraries, are not restricted to students in universities. Very early in the development of the web, the Encyclopedia Britannica posted its entire body of work online and made it available on a subscription basis. Today, there are a myriad of libraries to which the public has access free-of-charge, such as the Alabama Public Online Library. Organizations such as Google are digitizing the holdings of entire research libraries with the ultimate intent of placing these online for ease of access; though inevitably at a price. ### Web 2.0 – The Social Web The rise of participatory information sharing through the Internet has truly revolutionized the dissemination of information using web 2.0 techniques. With the advent of the social web, the creation of content has evolved from the efforts of a comparative few in the media professions to a model that maximizes the contributions of the multitudes. With about 400 social media platforms available and an untold number of blogs being authored, the proliferation of communication channels, both public and professional, and private and amateur, allow for the contribution of millions of people sharing a public conversation unprecedented in the human experience. One of the most important consequences of the proliferation of these platforms available to virtually anyone with access to the Internet, is the democratization of media content. What people can see and hear has been taken out of the hands of the gatekeepers and placed into the hands of society at large. It is not possible within the constraints of this presentation to cover all aspects of the social web, so the author has selected five representative examples beginning with a discussion of Wikipedia. If the Encyclopedia Britannica, long acknowledged as a definitive compendium of human knowledge, represents Web 1.0 technology in which content is simply posted and accessed by people through subscription, Wikipedia represents a web 2.0 application because of its collaborative nature insofar as anyone can submit articles for inclusion. Ironically enough, I have turned to Wikipedia for a definition of itself though I should note that at the Academy there is a prominent notice posted on the library portal that Wikipedia is not considered an appropriate source of citations for research papers for reasons that will be explained. By its own definition, Wikipedia is a free, web based, collaborative, multilingual encyclopedia project supported by the non-profit Wiki Media Foundation. Its 18 million articles (over 3.6 million in English) have been written collaboratively by volunteers around the world, and almost all of its articles can be edited by anyone with access to the site. Wikipedia was launched in 2001, and has become the largest and most popular general reference on the Internet ranking seventh among all websites on Alexa.com (a web statistics reporting site) and 365 million readers. (9) The reason that Wikipedia has not been widely accepted in academic research has its roots in its early days. The articles submitted at that time frequently were not carefully researched, often inaccurate, and sometimes posted with malicious intent. It is significant to note that many of these issues have been addressed through the use of anonymous reviewers who examine submissions from the general public for both accuracy and appropriateness. Nonetheless, it still remains a very important resource insofar as researchers, especially the youngest, still access Wikipedia as a point of departure in their research to give them ideas on where to go for additional information. For those of you who have entries in Wikipedia, it is worth your time to periodically check the content to ensure that someone has not submitted inaccurate or even malicious information. Further, and especially given the reach of Wikipedia, it affords organizations the opportunity to promulgate their missions and activities. For example, in the entry on Olympia, the article posted there cites its role in the ancient Olympic Games and presents a chronology of the site by era to the present day. It does not, however, mention the IOA so a submission could be authored for consideration and inclusion how Olympia serves as the site of the IOA together with a description of its mission and function. One of the true phenomena of the last few years in Web 2.0 technology is the rise of Facebook as suggested by Internet usage statistics posted on Alexa.com. In April, 2011 more than 40% of all global Internet users visited Facebook on a daily basis, a rate of usage that has remained consistent over the past three months. Facebook represents the power of social media as individuals sharing common experiences are provided a platform through which these experiences or interests can be shared. As friends beget friends, the media content on Facebook expands in ever increasing circles. This content is not limited to posts or messaging, but also includes YouTube video clips, decidedly unscientific opinion polls, and games. Additionally, the messaging function built into Facebook has, in many circles, replaced email as the preferred means of interpersonal electronic communication. Facebook can be a two edged sword as the most decorated Olympic athlete of all time found out much to his chagrin. This individual, who won a record eight gold medals in the 2008 Beijing Olympics, suffered the consequences of the posting of a photograph to Facebook of him consuming illegal recreational drugs. This incident sullied his image and reputation and cost him millions of dollars in endorsement revenue. The irony is that the picture posted was not posted on his personal Facebook page, but on that of another individual who happened to be at the same party. In this instance the interconnectivity of the medium produced dire consequences for a sports hero and role model. This incident also underscores the need to be circumspect with what one posts to social media sites and a good guideline is not to post anything you would not want to see in a newspaper. It is not uncommon for prospective employers, among others, to search out Facebook pages in an effort to gain insights on a given individual. Another extraordinarily popular site, and one already mentioned, is YouTube. Founded in February, 2005, viewership on YouTube exceeded two billion views per day in May, 2010. YouTube allows viewers to watch and share originally created videos and provides a forum for people to connect, inform, and inspire others across the globe and acts as a distribution platform for original content creators and advertisers large and small (10). Alexa.com reported in April, 2011 that YouTube is the third most visited global website receiving just over 26% of daily website visits over the past three months. YouTube, whose web interface is available in 42 languages, can be accessed by anyone although those individuals who want to post content on the site must be registered. For regular users, the time limit for any one post is 15 minutes. Posting video content there can be accomplished from a wide range of devices from computers to mobile phones. YouTube video posts spread across the entire Internet by appearing as links in emails, posts on other social media platforms, such as Facebook and in blogs. Periodically, a video on YouTube will “go viral”, which simply refers to a phenomenon in which the content captures the public’s imagination and is promulgated through a vast array of distribution channels. However, sites such as YouTube pose a recognized threat to the business model of many sports organizations. The blogging and social media rules of the IOC specifically proscribe the posting of “moving images” or sound. While these guidelines can be enforced on accredited individuals to the Games, such as national delegations or the media, it is much harder to do with spectators seated in the stadium. Modern 3G or 4G phones can easily capture video of sporting events from the stadium seat, and the video can be uploaded to YouTube through a user’s account. While such activity violates the terms of service for registered account holders, the process for removing the content and terminating a user’s account can sometimes be a lengthy one. In the meantime, to the extent to which the video has been accessed and distributed through posts on other social media web sites or platforms, it can never be removed from the web in its entirety. Obviously, this is a major issue for media companies that may pay as much as billions of dollars for exclusive media rights to the event. Another social media phenomenon is Twitter and, in fact, the Winter Games in Vancouver were cited as the first “Twitter Olympics” (5). The Twitter posts, called tweets, of the athletes provide insights to their physical and mental preparation for competition, their reactions to being in the Olympic Games and other aspects of the Olympic experience that simply were not possible in the past through traditional media outlets. Twitter allows for the sharing of the human experience with an unparalleled immediacy and intimacy with potentially vast audiences that is not tempered with the interference of a gatekeeper. Many tweets generated by Olympians at the Vancouver Winter Games can be found on the web by simply “Googling” Olympic athlete tweets. However, as was the case with Facebook, Twitter can also be a two edged sword. There have been instances where athletes have posted comments denigrating their competition, the officials, and even their teammates or coaches. These actions can create dissension on teams and when comments go viral, they can take on a life of their own and stir considerable controversy and unfavorable comment in the press. This has occurred frequently enough that some teams ban their athletes from using Twitter, while other teams such as that of the Australian Olympic Team provide their athletes with training on the appropriate use of the medium. Lastly, I would like to touch on “blogging” as a medium for the dissemination of the human experience. A blog can be thought of as an online diary, open to the public, and onto which an author can write on any topic they choose and to which anyone who reads the post can, in turn, reply. These blogs typically focus on a particular topic such as politics or sports and there are blogs on virtually every topic imaginable. Taken altogether, these blogs are referred to as the “blogosphere.” With all of the attention that this form of human endeavor engenders and the emotion that it evokes, sports are a common topic in the blogosphere. As one might expect, the blogging commentary related to sports can be both positive and negative. Frequently the authors of blogs do not have the professional or academic preparation to speak knowingly about which they write. The unfortunate thing about blog posts that are inaccurate is that they often carry more weight than they deserve. Illustrious of this situation is the phrase, “it must be true, I read it on the Internet”. The Academy is seeking to address this situation in some small measure through its decision to change one of our online publications, The Sport Digest, into a blog. Through this effort, Academy faculty and other well regarded individuals in the profession generate articles on a host of issues surrounding the sport profession. These posts have a basis in fact or are otherwise well-reasoned and as is the case with other blogs, afford the readers an opportunity to respond to the issues. ### Web 3.0 – The Semantic Web While the term Web 2.0 has entered the lexicon, Web 3.0 will be the next step in the evolution of the Internet. A common, agreed upon definition for Web 3.0 has yet to emerge but a consensus is building that it will be a combination of technology through which the entire web is turned into a database combined with the marshaling of human resources. New computer languages such as HTML5 will allow computers to read online content and so will facilitate the identification and indexing of the web, a process that will make content more accessible. Beyond the changes in technology, renowned web futurist Clay Shirky argues that for the first time in history the web has provided the tools to harness society’s “cognitive surplus.” Essentially, the cognitive surplus is derived from the trillions of hours of free time that the residents of the developed world enjoy and that has steadily increased since World War II. Increases in gross domestic product, education and life span have provided riches of free time but that prior to the Internet was squandered in non-productive pursuits. The Internet democratized the tools of production and distribution and the Internet made the benefits scalable: value comes from the combined cognitive surplus of millions of individuals connected to a network that allows collaboration. (1) Shirky is an example of this dynamic at work. In the course of researching this paper, the author continuously came across references to Shirky and his theories of cognitive surplus. As more authors agreed with the concept than those that did not, it suggests that these theories are gaining traction and apparently have some merit. Through this process of review and debate, concepts and theory are continually refined adding to the body of knowledge through which the human condition can be enriched. With all of its potential to elevate human discourse and to assist in the dissemination of human ideals, many challenges remain. This can fall into three broad areas as follows: The first is economic. There exists in a very real sense a digital divide in which a vast proportion of the worlds’ population remains without access to computers or the Internet. In many respects, the Internet still remains a world of the “haves and have nots.” In some respects we have almost come full circle to the human condition of when Olympic movement first began in the late 19th century in which access to information was the domain of the privileged few. This fact has been recognized and there are efforts to address this imbalance through the production of low cost machines to allow the underserved populations without the necessary economic resources to gain access to the Internet. A looming issue is a social one. Governments all over the world took note at the “Jasmine Revolution” in Tunisia and the events in Tahrir Square in Egypt and the role that Web 2.0 applications played in mobilizing the population to overthrow the political establishment. In the most populous country of the world, the two most globally accessed websites everyday cannot be reached at all. So in a very real sense, we could be headed to a world of two Internets; one in which the flow of information is free and unfettered, and another where access to information resources are tightly controlled or restricted to what the government believes to be “politically acceptable.” (7) In the West, the Internet has played a role in self-censorship resulting in societal fragmentation and polarization insofar as people have a tendency to seek out and read only that information that reinforces their points of view. If the ability to share information is deemed to be strength, impediments to the free flow of information can only be deemed to be a detriment in a future of shared human values. The last issue is technical. Computers as we know them, those bulky desktop machines and even portable laptops, are going away. What is going to occur in the future, will be a proliferation of smaller devices such as tablet computers, IPhones, and Androids that provide access to the Internet, but where the information that they generate is stored on the Internet itself (also called the cloud). However, all of these devices require wireless connectivity and the amount of electromagnetic spectrum through which these connections are made is a finite resource. In June 2009, the U.S. Government took back that portion of the electromagnetic spectrum through which analog television signals were broadcast. This spectrum was subsequently auctioned off to telecommunication providers and others such as Google; but the fact remains that in the not-too-distant future this bandwidth will also be exhausted. All of this is setting the stage for a time in which data consumption will be metered as is any other utility and subject to the laws of supply and demand (3). Thus, if the digital divide was created by economic conditions, the situation can be exacerbated by “metered Internet access.” The solution will be found both in the technical, such as content providers better streamlining their services, or through the creation of better means by which access is gained such as twisting the wireless signals. Information technology has unquestionably changed human society in ways that can scarcely be imagined. From early experiments in the 1960’s to today, the Internet, as embodied in the web, has over 171 million web hosts. Assuming an average 100 pages on a given website (the Academy website has more than 800 pages) would yield an estimated 17.1 billion pages of web content, the vast majority of which can be accessed by anyone. Research shows that the Internet, excluding the deep web, is growing by more than 10 million new static pages every day. (6) Thus, the Internet spans virtually the entire gamut of the human existence and can be a powerful medium for the conveying of humanistic ideas. It has provided a vehicle that can educate and entertain us and can serve to make society more cohesive. In so doing, it has created an environment for public discussion unequaled in human history but at the same time, it can also serve to isolate us from each other. People can immerse themselves in an environment where the virtual becomes reality and normal communication with others slowly becomes lost. In any case, the evolution of the Internet has brought about a democratization of media content and has created an environment in which all can participate. It is, as the title a popular novel suggests, “A Brave New World.” 1. Davis, P. (2010). Here Comes Everything: A Review of Clay Shirky’s Cognitive Surplus. Shareable: Work and Enterprise. <http://shareable.net/blog/here-comes-everything-a-review-of-clay-shirky%E2%80%99s-cognitive-surplus>. (13 July, 2010). 2. Harper, A. (2007). 19th Century Magazine – An Amazing Source of Public Domain Information. Ezinearticles. <http://ezinearticles.com/?19th-Century-Magazines—An-Amazing-Source-of-Public-Domain-Information&id=762208>. (3 October, 2007). 3. Gruman, G. and Kaneshige, T. (2008) Is Our Internet Future in Trouble? InfoWorld. <http://www.infoworld.com/d/networking/our-Internet-future-in-danger-715>. (11 November, 2008). 4. Guttmann, A. (1992). The Olympics; A History of the Modern Games. (2nd. Ed.). Champaign-Urbana: The University of Illinois Press. 13 5. Mann, B. (2010). Olympians On Course Using Twitter. MarketWatch Blogs. <http://blogs.marketwatch.com/vancouverolympics/2010/02/10/olympians-on-course-using-twitter/> (10 February, 2010). 6. Metamend. (2011). How Big is the Internet? Metamend. <http://www.metamend.com/Internet-growth.html>. (14 April. 2011) 7. McMahon, R.; Bennett, I. (2011). U.S. Internet Providers and the Great Firewall of China. Council on Foreign Relations. <http://www.cfr.org/china/us-Internet-providers-great-firewall-china/p9856>. (23 February, 2011) 8. Slashdot. (2011). Spam Drops 1/3 After Rustock Botnet Gets Crushed. Slashdot IT Blog. <http://it.slashdot.org/story/11/03/29/1516241/Spam-Drops-13-After-Rustock-Botnet-Gets-Crushed>. (29 March, 2011). 9. Wikipedia (2011). Wikipedia. Wikipedia. <http://en.wikipedia.org/wiki/Wikipedia>. (24 March, 2011). 10. YouTube (2011). About YouTube. YouTube. <http://www.youtube.com/t/about_youtube>. (23 March, 2011).
<urn:uuid:b37c7ba4-eaa2-43e9-92c5-e4ec522798bb>
CC-MAIN-2020-24
https://thesportjournal.org/article/the-importance-of-new-forms-of-technology-in-the-dissemination-of-humanistic-ideas/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396163.18/warc/CC-MAIN-20200527204212-20200527234212-00484.warc.gz
en
0.957077
7,054
3.59375
4
This article will explore how Electric Vehicle Batteries are Made, the challenges manufacturers face and solutions to overcome these challenges. Electric vehicles are undoubtedly the future of motoring. In order to ensure this future is as efficient and safe as possible, the fundamentals of how electric vehicle technology works need to be streamlined and harnessed, but how are electric vehicle batteries made? In order to power an electric vehicle, a battery is needed in place of the fuel tanks we are so familiar with. Just like our phones and laptops, electric vehicle batteries are charged up using electricity, which then is used for power. Whereas the batteries for most gadgets have a defined time before they are depleted, EV batteries have a ‘range’ – i.e., a distance that the car can travel before the batteries run out of charge. After this, they will need to recharge again. These batteries need to store as much energy as possible to minimize range anxiety, as well as maintain safety in case of unexpected events. So, how are Electric Vehicle batteries made? Battery Design and Development Batteries are highly complex systems, requiring advanced engineering methods at all levels: from chemistry to cell engineering, to module and pack engineering, and finally integration into full vehicles. There is a lot for battery manufacturers to consider and implement into processes to ensure that battery designs are of the highest standard and quality and meet the needs of customers. Find out more about how we can assist you with this process in our on-demand webinar ‘Battery Design from Chemistry to System’. EV batteries are made from a combination of raw materials. ‘Base’ metals such as aluminium, copper and iron are important ingredients, but the most expensive materials are ‘precious’ metals such as cobalt, nickel and manganese, along with elements such as graphite and lithium. These materials must be extracted or mined from the earth in a complicated and expensive way, which is one reason why electric vehicles are more expensive to buy than combustion cars. The costliest component of an EV is its battery. What challenges are Battery Manufacturers facing? There are many challenges facing battering manufacturers today. First and foremost, there is an increasing demand for battery design and production to be sustainable. A key driver of the introduction and uptake of electric vehicles is the need to better care for and protect our planet. This has had a real impact on both consumer buying behaviours, with more people considering the environmental impact of their purchases, and the expectation and responsibility placed on businesses to do their part. This extends to the battery manufacturing industry, now not only do they need to navigate new technologies, but they must do so in a sustainable way. Further to this, manufacturers must also meet the steadily growing quality requirements, while also juggling the need to reduce costs and beat the competition. Users are demanding higher capacity, better quality, more safety and a longer service life for batteries, as well as the ability to drive longer trips without having to recharge electric vehicles. This is something manufacturers need to keep in mind. Industry-leading Solutions to help you overcome these challenges and drive success End-to-end Battery Design, Development, and Delivery with 3DEXPERIENCE - Design, develop, and deliver battery innovations, from chemistry to system all within a single, collaborative environment. Find out more in our webinar. - Discover how leveraging virtual twin technology can help you to visualize real-life battery behaviors through a digital replica of a physical battery system. Find out more in our webinar. - Explore how advanced simulation can help you overcome aerodynamic challenges to increase battery range and performance. Find out more in our webinar.
<urn:uuid:3cc8910f-42cc-4250-8bd8-ef5146c11189>
CC-MAIN-2023-23
https://enterprise.trimech.com/industry-insight-how-are-electric-vehicle-batteries-made/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00752.warc.gz
en
0.952638
753
3.734375
4
1. I was not sorry when my brother died. The novel begins with this shocking confession from Tambu. Tambu has had a murky, often ambivalent relationship with her brother, Nhamo. He represents everything she is denied and the principal failing of the social structure and family hierarchy into which she has been born. Simply because he is a male and the eldest, he is the sole repository of the family’s hopes and ambitions. Tambu, regardless of her intelligence, talents, and abilities, must be satisfied with a secondary role, an understudy whose sole job it is to support and assist Nhamo as he makes his way in the world. With his sudden and unexpected death, Tambu’s life takes a dramatic turn for the better. She is offered his place at the mission school, and because of his death, she is able to write the story she is beginning in the novel’s opening paragraphs. 2. And these days it is worse, with the poverty of blackness on one side and the weight of womanhood on the other. Aiwa! What will help you, my child, is to learn to carry your burdens with strength. These words are spoken by Ma’Shingayi, Tambu’s mother, in Chapter 2. They underscore the harsh reality faced by many Africans, particularly African women. Ma’Shingayi is arguing that being black and female is a double burden and that the two obstacles are too considerable to surmount. What sets her apart from Tambu, however, is how she qualifies this statement. Rather than exhort her daughter to be strong and rally against the prevailing conditions that conspire to keep her down, Tambu’s mother encourages her to passively accept the forces she feels are too powerful for her to control. This passage shows the differences not only between the two women but between the older, more traditional beliefs and the new attitudes emerging in a more contemporary Africa. The passage also reveals the conflicting thoughts and attitudes of many of the novel’s female characters. While Ma’Shingayi presents herself as the model of humble acquiescence, she rails against the laziness of men and grows increasingly jealous of her brother- and sister-in-law, whose educations have afforded them greater economic mobility and a more comfortable lifestyle. Ma’Shingayi is a prime example of how reality and ideology, or theory and practice, grow increasingly conflicted in the novel. 3. “What it is,” she sighed, “to have to choose between self and security.” Maiguru speaks these words in Chapter 5, after Tambu has questioned her about her past, her education, and what happens to the money she earns at the mission. Maiguru’s words succinctly summarize the sacrifices she has made in order to raise a family and subscribe to a more traditional notion of a woman’s role in African society. Maiguru goes on to tell Tambu of the possibilities she witnessed while living in England, glimpses of the things she could have become had she been free of restrictive gender roles and the expectation that she would play the part of the subservient provider. She feels there is no recognition or appreciation of the compromises she has made and, similar to Tambu’s mother, stoically bears her burdens in silence. Maiguru’s sacrifices, of putting her husband and her family before her own needs and ambitions, are viewed by Nyasha as a costly compromise to her mother’s dignity and honor. Tambu remains undecided and does not take sides in this debate, as she understands her own compromised and precarious position in her uncle’s household. Later in the year, when Nyasha and her father have a violent argument, Tambu realizes firsthand her need to choose security over self and remains noncommittal. She stifles and censors any opinion she may have on the issue, hiding comfortably instead in the role of a “grateful, poor, female relative.” 4. It’s bad enough . . . when a country gets colonized, but when the people do as well! That’s the end, really, that’s the end. Nyasha makes this pronouncement in Chapter 7 as part of her ongoing role in which she challenges and shapes Tambu’s perceptions and modes of thought. Slowly, Tambu has become seduced by her exposure to the colonialist-influenced “new ways.” Despite the fact that Tambu is opposed to the humiliation her parents will suffer by having to endure a Christian wedding ceremony, she agrees with Babamukuru’s insistence that the ritual, and not the traditional cleansing rites, be performed. Nyasha quickly dismisses Babamukuru’s position, warning Tambu of the dangers inherent in assuming that Christian ways are necessarily progressive ways. Nyasha’s words gesture to another preoccupation in Dangarembga’s work. Rhodesia has been placed under British control, and the life of the nation has been clearly altered by this foreign influence. Without the opportunities colonialism has created for them, Babamukuru and his family, as well as Tambu, would not be in their positions of privilege and power. At the same time, the novel is narrated through the lens of African lives and the inner workings and struggles of one extended family. The African and the colonial cannot coexist without eventually influencing, even colliding, with each other. Slowly, the effects of colonialism has trickled down, infecting Tambu and Nyasha’s family. Nyasha’s observations foreshadow the nervous breakdown she will soon suffer as she feels colonialism infiltrating not only her nation and people but her own identity as well. 5. Quietly, unobtrusively and extremely fitfully, something in my mind began to assert itself, to question things and refuse to be brainwashed, bringing me to this time when I can set down this story. It was a long and painful process for me, that process of expansion. Tambu closes her account, in Chapter 10, with these words. She has actively sought advancement, winning a scholarship to the convent school, but she begins to question what it has cost her sense of self and her ailing mother, heartsick at the thought of another of her children being altered by their desire for a Western education. Her school and the nuns who run it are no longer the sun on her horizon, as she puts it. Her use of the word brainwashed is telling, denoting a radical shift in her thinking. In this passage, Tambu seems to be speaking for Nyasha, who is also depressed and ailing, saying the words that Nyasha, in her compromised state, can no longer say for herself. Tambu exhorts herself to no longer be passively influenced by the people and institutions around her. She is firm in her resolve to question. This evolution of perception and thought, which could be considered an epiphany, allows Tambu to write her own story. She is freed of the need to be dutiful and grateful and can become her own person and seize control of her own voice and destiny. Her education has been more than learning the rudiments of reading, writing, and mathematics—it has helped her refine her perceptions and recognize and embrace her personal liberty. This expansion and certitude have finally grounded her and helped her resolve the often contradictory forces that had buffeted and unsettled Tambu throughout her life.
<urn:uuid:2c2d5e9b-7eb0-412f-9f84-ba67a110594e>
CC-MAIN-2015-22
http://www.sparknotes.com/lit/nervouscondition/quotes.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929230.43/warc/CC-MAIN-20150521113209-00308-ip-10-180-206-219.ec2.internal.warc.gz
en
0.978337
1,586
2.671875
3
Alisitos Wind Statistics, May averages since 2006 The figure describes how frequently and how strongly the wind blows from different directions over a normal May. The longest spokes point in the directions the wind most commonly blows from and the shade of blue suggests the strength, with the strongest winds shown by deep blue. It is based on 2200 NWW3 forecasts of wind since since 2007, at 3hr intervals, for the closest NWW3 model node to Alisitos, located 13 km away (8 miles). There are insufficient recording stations world wide to use actual wind data. Invevitably some coastal places have very localized wind effects that would not be predicted by NWW3. According to the model, the dominant wind at Alisitos blows from the SW. If the rose graph shows a fairly circular pattern, it means there is no strong bias in wind direction at Alisitos. By contrast, dominant spokes show favoured directions, and the more deep blue, the stronger the wind. Spokes point in the direction the wind blows from. During a typical May, the model suggests that winds are light enough for the sea to be glassy (light blue) about 21% of the time (7 days each May) and blows offshore 27% of the time (9 days in an average May). Over an average May winds exceeding >40kph (25mph) are not expected, but 0 have winds on the range 30-40 (19-25) at Alisitos IMPORTANT: Beta version feature! Swell heights are open water values from NWW3. There is no attempt to model near-shore effects. Coastal wave heights will generally be less, especially if the break does not have unobstructed exposure to the open ocean.
<urn:uuid:ea469d7f-0eac-4b64-99ff-7944580dee9e>
CC-MAIN-2017-17
http://www.surf-forecast.com/charts/Alisitos/wind/statistics/may
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122886.86/warc/CC-MAIN-20170423031202-00018-ip-10-145-167-34.ec2.internal.warc.gz
en
0.922697
361
2.59375
3
You must first logout before you can change your location setting. Do you wish to The new 3rd edition of English Basics and More English Basics has been developed specifically for New Zealand students with a new engaging design. It offers independent study for those wishing to improve their understanding of the basics of English grammar and punctuation. Now also available as engaging, student friendly e-workbooks, suitable for Mac, PC, iPad & tablet. Want to know more? Click here. These integrated textbook-workbooks in the Achievement English: Close Reading of Unfamiliar Text – Years 11, 12 and 13 series are designed to prepare students for these externally assessed standards. Each title takes only the relevant Close Reading sections to focus on the analytical skills required in these standards. Click here for more information Complete Close Reading is a three-book course for New Zealand to help develop and practice the vitally important skills of reading with comprehension and responding to a variety of written, visual and oral texts. It holds to the idea that you can’t run before you walk and, therefore, divides its questions into sections that bring together the best ideas. Essential English is an invaluable personal resource designed to help your students’ memory when texts are being read, analysed and critiqued. It’s easy-to-use A-Z format of terminology used in a senior English classroom makes it a comprehensive reference tool. Often when students read, the essentials are not considered. This guide is intended to present the intentions of a type of writing first and an example to demonstrate how a writer achieves those intentions. Essential Text Types is designed to help produce over 30 different types of written texts from general academic essays, speeches, media articles and job applications. Click here for more.
<urn:uuid:2501adfa-d9f8-4dbc-86ea-0c771dc9d50a>
CC-MAIN-2017-43
https://cengage.co.nz/secondary/browse-subjects/english
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825308.77/warc/CC-MAIN-20171022150946-20171022170946-00465.warc.gz
en
0.929455
361
3.09375
3
By Richard B. Morrow (NAR #3575) The RAVEN Sounding Vehicle was developed at Rocket Power, Inc. under ONR Contract NONR-3872(00). The purpose of the development of the RAVEN vehicle was to provide a reliable meteorological vehicle capable of carrying a 10 pound payload to an altitude in excess of 200,000 feet. One unique feature in the RAVEN design was the boost phase designed into the rocket motor to provide an acceleration sufficiently high to reach a velocity of 600 feet per second during the first second of flight. This greatly reduced the wind sensitivity problems and allowed the vehicle to be launched in relatively high winds. It also allowed the use of a very simple, low cost launcher. Ten vehicles were manufactured for flight tests at White Sands, New Mexico in 1963. Their fin configuration was slightly different than the production run. The rocket motor for the RAVEN was the HOPI IV.(8.5 KS 1 800). The HOPI IV rocket motor is a nominal 9 second duration 1740 pound thrust unit. The rocket motor case is SAE 4130 steel heat treated to a minimal yield strength of 165,000 psi. The rocket motor has an outside diameter of 4.5 inches and a nominal length of 93 inches (94.785 REF). The rocket motor utilizes a polyurethane propellant cast in the configuration of an internal burning star. The ignitor utilized in this unit is of the pyrogen type. It is installed though the forward end of the rocket motor and can be supplied with either aft end or head end initiation. The nozzle assembly consists of a carbon steel housing with a graphite insert for the throat. Motor case and nozzle are insulated by a pressure-molded fiberglass-reinforced phenolic material. The forward closure is made of SAE 4130 alloy steel. The longitudinal center of gravity location from the nozzle exit plane of the motor is 47.94 inches for the loaded unit and 44.5 inches for the fired unit. The nominal motor weights before and after firing are 88.0 pounds and 19.21 pounds respectively. The drawing depicts the upper stage of the SIDEWINDER-RAVEN which was used by Great Britain. The first stage was a Sidewinder 1A The motor diameter of the booster is 5.0″ and the booster length is 78.64″. The nose cone length is 18.12″, payload section length is 11.55″, remaining body length 94.69″. Raven instrument housing internal volume is 225 cubic inches. Nose cone internal volume is 65 cubic inches. The Raven was also a stand alone singe stage rocket as is depicted in the accompanying photos. I would like to thank Mr. Ted Ryan, Mr. R.A. Thomas (VP of Engineering and Research, Talley Defense Systems), and Frank Marion (former VP of Rocket Power Inc.) for their assistance with this information. SIDEWINDER-RAVEN PERFORMANCE SUMMARY Weights (LB) Performace Total 208 Summitt Altitude (ft) 460,000 Payload 20 Max. Velocity (ft/sec) Second Stage 116 First Stage 1330 First Stage 92 Second Stage 5830 Max. Acceleration (g’s) First Stage 22 Second Stage 24 HVAR-RAVEN PERFORMANCE SUMMARY Weights (LB) Performace Total 209 Summitt Altitude (ft) 344,000 Payload 20 Max. Velocity (ft/sec) Second Stage 116 (total) First Stage 800 69 (propellant) Second Stage 5350 First Stage 93 (total) Max. Acceleration (g’s) 24 (propellant) First Stage 30 Second Stage 24 The HVAR Boosted RAVEN has a nose cone length of 18″, payload section length of 15″, and body length of 95″. The HVAR booster has a diameter of 5: and a lenght of 78.64″. When launching the RAVEN, a forward launch strap assembly was utilized which snapped away from the vehicle on take off. COLOR DATA Nose Cone: Dull Red (flat) Payload Section: Earth (flat) Motor: Flat White Fins and Shroud: Metallic Silver The only color photo is slightly faded and the nose cone may have been brighter. The earthen color in the suns reflection in the photo may be grey. Motor Label: placed 4 inches below top of motor Decal dimensions approximate. Scaled from photo. DATA SOURCE Black andWhite Photos 9300-1020-494, 9300-1020-494 White Sands N.M. Color Photo M-573 Raven Meteorological Sounding Vehicle Report No. 7691 Rocket Power Inc. Product Data Bulletin Sidewinder-Raven Performance Summary RPI Product Data Bulletin HVAR-Raven Performance Summary RPI drawings: 1424-102,SK2599-44, 2599-10,2599-50,2596-10
<urn:uuid:68ed04e7-5265-42ce-806e-4cfe6d828258>
CC-MAIN-2020-10
https://www.nar.org/nar-products/raven-meteorological-sounding-vehicle/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145742.20/warc/CC-MAIN-20200223001555-20200223031555-00095.warc.gz
en
0.886907
1,035
2.796875
3
(First in a continuing series) I love to laugh, especially those big ones where your belly shakes and your eyes tear up. There have been many studies verifying the therapeutic value of laughing in developing well-being and reducing stress. Laughter and humor are basic elements of the human condition, and it has motivated me to think about the role of such a powerful element in the classroom. I know that I use humor all the time in class because it helps me be a better teacher! When we think about our favorite instructors and consider what made them so memorable to us – we might find that many of them were funny? Teachers who use wit and humor in their classrooms are often seen as more interesting and authentic. Humor can even help to foster the student-teacher relationship, which in turn creates a positive and welcoming classroom environment. When meeting with a new group of students, a well-placed joke or quip can go a long way towards setting the tone for the rest of the term. The best thing about the use of humor in the classroom is that even if your joke bombs, it still accomplishes the goal of appearing light-hearted – as long as you can laugh at yourself. Self-deprecating humor can be effective in demonstrating that a faculty member is fun and approachable. Certainly we all enjoy having fun, and my humor, even if bad, does usually increase the fun quotient. But beyond the fun factor, humor can be an effective way to engage students and activate learning. A recent NEA Survey included the following powerful role that humor provides them in the classroom: - Create a Comfortable Learning Environment When teachers share a laugh or a smile with students, they help students feel more comfortable and open to learning. Using humor brings enthusiasm, positive feelings, and optimism to the classroom.“Because I know that a good laugh eases tension, increases creativity, … I will do almost anything to get the class rolling with laughter — voice inflections, exaggerated facial expressions and movements, hilarious personal stories (of which I have way too many), ridiculous examples…and I encourage my students to do the same.” — Kaywin Cottle, Speech Communications teacher (NEA Facebook) - Lighten the mood and reduce the tension Even if you’re not naturally funny, you still can lighten things up a bit. “In Health class, we learned the cerebellum is responsible for balance and coordination. When I trip over their backpacks, I might make a joke that my cerebellum is taking a nap.” –Deirdre Sexton (NEA Facebook) - Engaging the student Every teacher’s goal is to be effective in the classroom and help students learn. Educators want their students to be eager and engaged. Humor has the power to fuel that engagement. - Maximizes Learning Fire Up Their Brains…. During her research on learning and humor, educator-researcher Mary Kay Morrison looked at brain scans that showed high levels of activity in multiple areas of the brain when humor was used in conversation and instruction. “We’re finding humor actually lights up more of the brain than many other functions in a classroom,” says Morrison, author of Using Humor to Maximize Learning. “In other words, if you’re listening just auditorily in a classroom, one small part of the brain lights up, but humor maximizes learning and strengthens memories.” - Being at ease The key thing to remember is to do what’s comfortable for you. Not only will it make you more approachable, it will also help put students more at ease in your classroom. I use storytelling as a main part of my classroom delivery, a subject of a later blog posting, but the humor, no matter how corny serves a variety of positive functions beyond simply making people laugh. Humor builds group (as in class) cohesion. People respond more positively to each other when humor is present. It brings them together. Humor can facilitate cohesion by softening criticism. I work hard in class to stimulate discussion and interaction, helping students take the risk of expressing their point of view. It is much easier to do so when the mood is inviting and less threatening. Research also establishes that humor helps individuals cope with stress. It relaxes them. But not all the functions of humor are positive. Humor used divisively or to disparage others weakens group cohesion. Humor has negative impacts when it is used as a means of control. For example, given the power dynamic in the classroom, it is highly inappropriate for instructors to target students by making fun of their ignorance or beliefs. Not every instructor feels comfortable being funny and I would never suggest they add jokes to their lectures. But you can quote funny stories from other people or use materials that contain humor to accomplish similar advantages. And whatever else you say about humor, whether you agree with me or not, you have to admit that there is nothing like a hearty laugh!
<urn:uuid:3d8f2d8b-0c49-4ae8-b3bb-9024b8d2c436>
CC-MAIN-2020-34
https://academic-exchange.com/category/in-the-classroom/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739073.12/warc/CC-MAIN-20200813191256-20200813221256-00082.warc.gz
en
0.954079
1,027
3.53125
4
Stretching can cause microscopic tears in muscle tendons and surrounding tissue. Eccentric exercise, which includes stretching, can cause these tears because the muscle lengthens and contracts under tension. These tiny tears are common, although you need to use caution to prevent them from worsening and turning into a serious condition. Take Time to Heal These small tears naturally heal themselves if you rest the muscles for 24 to 48 hours, according to YogaJournal.com. However, some areas like the upper hamstrings don't receive as much blood and need more time to heal. If you continue to work the same area before the tears have healed fully, you can cause an injury in that area. You can also cause scar tissue to build up, which will make the healing process take even longer. Avoid a Serious Tear While stretching, the muscle lengthens and relaxes, which makes it weaker during the activity. Because of this, an injury is possible. Injuries can happen in the soft tissue when normal tissue takes on too much of a load or the tissue is abnormal, such as scar tissue. If the tissue can’t handle a load, it can develop a microscopic tear up to a complete tear. You want to be careful and avoid continuing with scar tissue or pain because a serious tear can require surgery. In his book "Fusion Fitness," Chan Ling Yap explains that stretching causes the muscles to tighten and contract at first before releasing. If you stretch too quickly or bounce in the stretch with ballistic stretching, the muscles can tighten too much and experience force while tight, which causes tearing more than gentle stretching. Slow stretching without any force can help the muscle relax and can minimize tearing. Warming up the muscles before stretching with low-intensity exercise like walking can also minimize muscle tears. Watch for Delayed Soreness These tears seem to cause delayed onset muscle soreness, which comes on one to two days after exercising and goes away soon after. Delayed onset muscle soreness from the microscopic tears happens if you’re a beginner who starts eccentric exercise, or you’re experienced and you change the intensity or the type of exercise, according to the American Council on Exercise. However, the body adapts so this is a temporary phenomenon that is only likely to happen again if you change the intensity. - Comstock/Comstock/Getty Images
<urn:uuid:92f3de86-7eab-42e5-9ae9-0cada57a7cf6>
CC-MAIN-2017-17
http://livehealthy.chron.com/stretching-cause-microscopic-muscle-tears-4400.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00245-ip-10-145-167-34.ec2.internal.warc.gz
en
0.943435
480
2.90625
3
YOU can believe you can almost scent the heather and the sweet Scottish air. Except that the smells would actually be of industry. This is the Highlands transported to the banks of the coaly Tyne, a hitherto forgotten chapter in the Celtic connections of one of the river’s best-known shipbuilding communities. These astonishing photographs, turned up by avid collector and Gazette contributor Kevin Blair, recall the period when, over at least three decades at the end of the 19th century and beginning of the 20th century, Hebburn hosted its own Highland Games. And prestigious affairs they were too. Scottish athletes would travel hundreds of miles to compete and the prize money sometimes ran to what would now be thousands of pounds. And yes, on one occasion, they even built a fake Scottish fort on Hebburn ballast hill. Kevin was astonished when he stumbled on the pictures for sale. “I bought them off a guy from Fife who’d bought an album and split it,” he said. “Unfortunately there is no photographer’s name.” As well as the games, some of the pictures also depict workers from Hebburn shipyard, which had been founded by Shetlander Andrew Leslie in the 1850s. One of them – dated, like the others, 1883 – is of apprentice platers, pictured in front of a ship, the Aberlady Bay, which was launched in the summer of that year. She was wrecked, Kevin has established, just six years later, off North Carolina. Hebburn’s Highland Games seem to have dated back to the 1870s and were held under the auspices of Hebburn Celtic Association. This held its meetings in St Andrew’s Institute in the town, and had been formed with the stated aim of “...preserving our mother tongue, for social intercourse and to help Highlanders who need it.” An early location was what was known as ‘the Celtic field,’ behind the shipyard. Later, under what had by then become Hebburn Celtic and Caledonian Association, they were held in what’s described as ‘the Ellison grounds,’ which would suggest the grounds of Ellison Hall. And they were a full-blown Scottish games, with tossing the caber and the hammer, bagpipe playing and Highland dancing, and other competitive events such as pole leaping. A regular feature was a tug-of-of war. In 1881, teams competing in this included one made up of police from Newcastle, and another by young Irish lads from the shipyard. Some competitions seem to have dropped by the wayside over the years, such as one for baking. In 1881, a Mrs Gaims won 10s (50p) for her baked yeast loaf. On the occasion illustrated here, in 1883, there was also music from the Hebburn Temperance Saxhorn band. The games were usually held in July or August, though they seem to have been unusually bedevilled by bad weather –- which was so wet in 1887 that it caused their cancellation. That didn’t stop athletes travelling from as far as Oban on Scotland’s west coast, and from even further afield, to take part. In 1889, the prize money totalled £50 – equivalent in value, today, to more than £3,000. The games appear to have started to dwindle in size as they entered the 20th century and the Edwardian era. By 1902, they were being held on what’s described as the ‘Victoria running grounds’ in Hebburn, having been organised by a number of the community’s “Scottish sportsmen” and with a reduced programme of events and competitions compared with years earlier. Perhaps someone can say when they finally came to end.
<urn:uuid:5afd1290-b177-4d08-b342-a383ef91348c>
CC-MAIN-2019-22
https://www.shieldsgazette.com/retro/highland-games-on-the-banks-of-the-tyne-1-7211138
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256227.38/warc/CC-MAIN-20190521042221-20190521064221-00508.warc.gz
en
0.985695
810
2.578125
3
Courtesy of EarthSky A Clear Voice for Science Tonight’s sky is dominated by Jupiter and the waning gibbous moon. You can see them in the east by mid-evening tonight, after brilliant Venus has disappeared beyond the western horizon. Rising just an hour or two after sunset, Jupiter and the moon can be viewed for the rest of the night among the faint stars of the constellation Pisces the Fish. With a bright moon passing near them, Pisces’ dim outline might not be visible except from very dark locations. Still, you might glimpse a prominent asterism – or noticeable pattern of stars – near Jupiter and the moon tonight. It is called The Circlet in Pisces. The moon was full a couple of nights ago, but already a small portion of the moon’s edge has slipped back into the moon’s own shadow. It is hard to tell, but the moon is slightly less bright tonight than last night. Jupiter, on the other hand, is slowly increasing in brightness as it heads towards its closest approach to Earth in 12 years just next month. Jupiter, the moon and all the other objects in the sky appear to slowly drift – more or less from east to west – as night passes. This westward drift of the stars is akin to the sun’s westward motion during the day, and, as with the sun’s motion, the stars’ motion is due to Earth’s spin beneath the sky. The moon also moves in front of the stars, however, and you can see the moon’s motion if you watch carefully. A sharp-eyed observer who compares the relative positions of the moon, Jupiter and nearby stars at, say, 10 p.m. tonight – and then looks again just before dawn – will notice the change. The distant stars appear in a “fixed” pattern relative to each other. Over a single night, the same is essentially true for Jupiter. But because the moon is so close to Earth – and circumnavigates our sky once a month instead of once every 12 years like Jupiter – the motion of our companion world is obvious after only a few hours. In fact, the moon appears to move its own diameter eastward in just one hour. Therefore, after 6 hours – or the course of a single night – the change in the moon’s position is easy to notice. Jupiter, being farther from Earth than the moon, appears to move more slowly than the moon. While you cannot easily detect its motion over just a few hours (or usually even over a few days), it does move. If you carefully plot its position tonight on star chart, and compare it to a similar plot in a month or two, the change will be easy to see. In fact, astronomers of past centuries were originally able to rank the planets by distance based on the speed of their motions in front of the fixed stars. For example, Jupiter is brighter than Mars – but brightness does not always mean proximity to Earth. In the case of Jupiter, the planet is bright because it is so big! Yet, Jupiter moves more slowly than Mars in front of the stars. Therefore, early astronomers assumed that Jupiter was more distant. The moon moves faster than any other natural astronomical object, which makes perfect sense for our closest neighbor in space. Written by Larry Sessions
<urn:uuid:e3c9d379-e6bc-43eb-8da8-93964d5f4b6f>
CC-MAIN-2017-09
http://www.berthoudrecorder.com/earthsky-tonight%E2%80%94august-26-jupiter-and-moon-in-east-by-late-evening/
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00596-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947484
693
3.578125
4
Marine sediments cover more than two thirds of the Earth’s surface and have been estimated to contain as much as one-third of Earth’s prokaryotic biomass (Whitman et al., 1998). Despite this, relatively little is known about this deep biosphere, and essentially nothing is known about the presence of microbial eukaryotes in sediments deeper than a few centimeters. Through consumption of dissolved organic matter and by selective grazing in subsurface horizons where bacterial and/or archaeal numbers are high, protists and fungi may significantly impact carbon cycling in the marine subsurface. The first analyses of eukaryotic small subunit ribosomal RNA gene (18S rRNA) sequences obtained from deep marine subsurface sediments, the first metagenome, and a cultivation study based on those samples show that fungi dominate eukaryotic life in the buried marine subsurface. Novel fungi continue to be reported from deep marine environments, and and there is fossil evidence of filamentous structures highly suggestive of fungi within carbonate-filled vesicles within the upper oceanic crust. In collaboration with J. Biddle at U.Del, and A. Teske at UNC Chapel Hill, our group used RNA-based approaches to investigate microbial eukaryote (protist and fungi) communities in deep subsurface samples from around the globe to determine whether fungi dominate the eukaryotic communities in all deep subsurface samples. This study produced intriguing results suggesting that fungi are metabolically active in the subsurface sediment cores studied. We are pursuing a more detailed understanding of the metabolic activities of fungi in the deep marine subsurface and their ecological impact with collaborator Gaetan Burgaud at University of Brest, France, and his postdoc Vanessa Redou. This study involves eukaryote focused transcriptomics, culture studies, and analysis of metabolic activities of cultured isolates from several oceanic provinces.
<urn:uuid:1511adae-cf3e-4808-96ff-aac79d1359ac>
CC-MAIN-2015-32
http://www.whoi.edu/page.do?pid=80537
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986444.39/warc/CC-MAIN-20150728002306-00231-ip-10-236-191-2.ec2.internal.warc.gz
en
0.93072
400
2.6875
3
World Energy Needs and Nuclear Power (Updated April 2014) - The world will need greatly increased energy supply in the next 20 years, especially cleanly-generated electricity. - Electricity demand is increasing twice as fast as overall energy use and is likely to rise by more than two-thirds 2011 to 2035. In 2012, 42% of primary energy used was converted into electricity. - Nuclear power provides about 11% of the world's electricity, and 21% of electricity in OECD countries. - Nuclear power is the most environmentally benign way of producing electricity on a large scale. - Renewable energy sources other than hydro have high generating costs but can be helpful at the margin in providing clean power. Primary energy and electricity outlook The World Energy Outlook 2013 and Electricity Information 2012 from the OECD's International Energy Agency (IEA) set out the present situation and also present current policies,* new policies, and carbon reduction (‘450’) scenarios. From 2000 to 2010 total world primary energy demand grew by 26%, and to 2020 it is projected to grow less (by 20% under current policies scenario, and less under other scenarios). Growth to 2035 is 45% under current policies, and 33% under a more restrained scenario. Electricity growth is about double this in each case. Electricity demand almost doubled from 1990 to 2011, and is projected to grow 81% from 2011 to 2035 (from 19,004 TWh to 34,454 TWh) in the current policies scenario, and 69% (to 32,150 TWh) in the central New Policies scenario. Increased demand is most dramatic in Asia, projected to average 4.0% or 3.6% per year respectively to 2035. Currently some two billion people have no access to electricity, and it is a high priority to address this lack. With the United Nations predicting world population growth from 6.7 billion in 2011 to 8.7 billion by 2035, demand for energy must increase substantially over that period. Both population growth and increasing standards of living for many people in developing countries will cause strong growth in energy demand, as outlined above. Over 70% of the increased energy demand is from developing countries, led by China and India – China overtook the USA as top CO2 emitter in 2007. Superimposed on this, the UN Population Division projects an ongoing trend of urbanisation, from 52% in 2011 to 62% in 2035 and reaching 70% worldwide by 2050, enabling world population to stabilize at about 9 billion with better food supply, clean water, sanitation, health, education and communication facilities. Coal is not limited globally, but large amounts need to be moved from where it is plentiful to where it is needed, mainly for power generation. This has both economic and carbon emission implications (apart from actually burning it). Natural gas is abundant and increasingly traded over long distances, with supplies in several countries increasing due to technology enabling access to gas in shale beds. Oil is more limited, in 2012 global production increased to almost 76 million barrels per day (27 billion barrels/yr), and known reserves increased 8% to 1600 billion barrels. In the World Energy Outlook 2013 New Policies scenario, coal demand increases 0.7% per year from 2011 to 2035, gas increases 1.6% pa, and oil increases 1.1% pa to 2020 then 0.4% pa. For electricity, coal use increases 35% to 2035 thus reducing its share of generation from 41% to 33%, gas increases 72% so that its share remains at 22%, nuclear increases 66% pa to hold its 12% share, and renewables other than hydro increase 483%. Nuclear Power in published scenarios Nuclear power generation is an established part of the world's electricity mix providing in 2011 some 11.6% of world electricity of 22,202 TWh (cf. coal 41.2%, oil 4.8%, natural gas 21.8%, hydro 16.1% and other 4.5%). It is especially suitable for large-scale, continuous electricity demand which requires reliability (i.e. base-load), and hence ideally matched to increasing urbanisation worldwide. The World Energy Outlook highlights the increasing importance of nuclear power in meeting energy needs while achieving security of supply and minimising carbon dioxide emissions. The 2006 edition of this report warned that if policies remained unchanged, world energy demand to 2030 is forecast to increase by 53% accompanied by supply crises, giving a "dirty, insecure and expensive" energy future which would be unsustainable. The report showed that nuclear power could make a major contribution to reducing dependence on imported gas and curbing CO2 emissions in a cost-effective way, since its uranium fuel is abundant. However governments needed to play a stronger role in facilitating private investment, especially in liberalized electricity markets where the trade-off between security and low price had been a disincentive to investment in new plant and grid infrastructure. The World Energy Outlook 2009 report said that investment of US$ 25.6 trillion* would be required by 2030 under the reference scenario, and $10.5 trillion more under an alternative low-carbon energy scenario. Under this, nuclear capacity increases 378 GWe (86%) to 816 GWe rather than to 475 GWe in reference case, energy demand increases by 20% rather than 40% and CO2 emissions reduce to 26.4 Gt/yr from 28.8 Gt/yr in 2007. The World Energy Outlook 2010 report built on this and showed that removing fossil‐fuel consumption subsidies, which totaled $312 billion in 2009 (mostly in non-OECD countries), could make a big contribution to meeting energy security and environmental goals, including mitigating CO2 and other emissions. In the central New Policies scenario, based on recent policy advances, world primary energy demand increases by 36% between 2008 and 2035, or 1.2% per year average. This compares with 2% per year over the previous 27‐year period, but is higher than the low-carbon scenario. In this scenario, non-OECD countries account for 93% of the primary energy demand growth. The report notes that while China's energy use was half that of the USA in 2000, it overtook the USA in 2009. In the WEO 2010 New Policies scenario electricity demand was expected to grow at 2.2% pa to 2035, almost double the rate of primary energy, and with 80% of the growth being in non-OECD countries. Globally, gross capacity additions, to replace obsolete capacity and to meet demand growth, amount to around 5900 GWe to 2035 – 25% more than current installed capacity. Nuclear capacity increased by only 360 GWe, somewhat less than in the reduced carbon scenario. Support for renewable sources of electricity, estimated at $37 billion in 2009, is quadrupled. But per unit it drops from average 5.5 c/kWh to 2.3 cents, apart from costs of integrating them into the grid. CO2 emissions increase from 29 Gt/yr in 2008 to 34 Gt in 2020 and 35 Gt in 2035, all this being in non-OECD countries. In the low-carbon scenario they peak at 22 Gt about 2020 and drop to 22 Gt in 2035 with CO2 emission costs then being $90-120 per tonne (all in 2009 dollars). In the '450' low-carbon scenario to 2035, the additional spending on low‐carbon energy technologies (business investment and consumer spending) amounts to $18 trillion more than in the Current Policies Scenario, and around $13.5 trillion more than in the New Policies Scenario. Following the Fukushima accident, World Energy Outlook 2011 New Policies scenario had a 60% increase in nuclear capacity to 2035, compared with about 90% the year before. "Although the prospects for nuclear power in the New Policies Scenario are weaker in some regions than in [WEO 2010] projections, nuclear power continues to play an important role, providing base-load electricity. Most non-OECD countries and many OECD countries are expected to press ahead with plans to install additional nuclear power plants, though there may be short-term delays as the safety standards of existing and new plants are reviewed. Globally, nuclear power capacity is projected to rise in the New Policies Scenario from 393 GW in 2009 to 630 GW in 2035, around 20 GW lower than projected last year." In this scenario the IEA expects the share of coal in total electricity to drop from 41% now to 33% in 2035. Electricity generation increases from 20 to 36 PWh. WEO 2011 also included a "Low Nuclear Case (which) examines the implications for global energy balances of a much smaller role for nuclear power. The lower nuclear component of electricity supply is not a forecast, post Fukushima, but an assumption adopted for the purpose of illustrating a global energy outlook in such a low nuclear world." "In the Low Nuclear Case, the total amount of nuclear power capacity falls from 393 GW at the end of 2010 to 335 GW in 2035, just over half the level in the New Policies Scenario. The share of nuclear power in total generation drops from 13% in 2010 to just 7% in 2035, with implications for energy security, diversity of the fuel mix, spending on energy imports and energy-related CO2 emissions." Its effect would be to "increase import bills, heighten energy security concerns and make it harder and more expensive to combat climate change." The New Policies scenario in World Energy Outlook 2012 showed that "several fundamental trends persist: energy demand and CO2 emissions rise even higher; energy market dynamics are increasingly determined by emerging economies; fossil fuels remain the dominant energy sources; and providing universal energy access to the world's poor countries continues to be an elusive goal." Electricity generation increases from 21.5 PWh in 2010 to 36.6 PWh in 2035, with average price increase of 15% in real terms. WEO 2012 further reduced nuclear capacity projections for 2035, to 580 GWe, about 10% less than that scenario the year before and only 55% more than today. That would produce 4.37 PWh, 12% of world total. Renewables are likely to "become the world's second-largest source of power generation by 2015", with share of electricity generation growing from 20% in 2010 (mostly hydro) to 31% by 2035, though this "hinges critically on continued subsidies" which impact electricity prices. The IEA concluded that "taking all new developments and policies into account, the world is still failing to put the global energy system onto a more sustainable path." This is highlighted by a 28% increase in fossil fuel subsidies to $523 billion in 2011 (compared with $409 billion in 2010, and $44 billion in 2010 for renewables. Renewables subsidies are expected to reach $240 billion per year in 2035, for 31% of power). World Energy Outlook 2013 was very much in line with WEO 2012, though electricity generation increases from 22.1 PWh in 2011 to 37.1 PWh in 2035. Its New Policies scenario showed 66% increase in nuclear contribution 2011-2035, with its share steady at 12%. Nuclear capacity rises only 47% however, in line with WEO 2012, with the expansion being mainly policy-driven on energy security grounds. The largest gross capacity additions are in China, which adds 114 GWe during the projection period (38% of global new nuclear capacity). Cumulative global investment in the power sector to 2035 needs to be $17 trillion, an average of $740 billion per year. New plants account for 58% of this, the rest is transmission and distribution. Electricity prices by 2035 are expected to show significant regional differences, with those for industry in USA ($80/MWh) being a little over half those in the EU and 40% lower than China’s, where network costs eclipse capital cost savings. Japan’s electricity prices for industry, now shown as over $185/MWh, decrease below EU levels to about $145/MWh as fossil fuel imports diminish. In 2012 the IEA issued its Energy Technology Perspectives Study (ETP 2012), which takes the 450 ppm scenario in WEO 2011 and extends it out to 2050, calling it the two-degree scenario (2DS). This scenario is then compared with the status quo (six-degree scenario) and with a four-degree scenario in between. It then goes a step further to see if a zero emissions energy system is possible by 2075. The study makes the case that environment and energy development must go hand in hand. Some of the findings: - A sustainable energy system is still within reach and can bring broad benefits - Technologies can and must play an integral role in transforming the energy system. - Investing in clean energy makes economic sense – every additional dollar invested can generate three dollars in future fuel savings by 2050. - Energy security and climate change mitigation are allies. - Despite technology’s potential, progress in clean energy is too slow - Nine out of ten technologies that hold potential for energy and CO2 emissions savings are failing to meet the deployment objectives needed to achieve the necessary transition to a low-carbon future. Some of the technologies with the largest potential are showing the least progress. - The share of energy-related investment in public research, development and demonstration (RD&D) has fallen by two-thirds since the 1980s. - Fossil fuels remain dominant and demand continues to grow, locking in high-carbon infrastructure. It then goes on to focus on how energy policy must address the key issues and the role of government in formulating that, finally concluding with recommendations to energy ministers (assuming these recommendations were to be considered at Rio+20). The study focuses on renewable technologies such as wind and solar, energy efficiency technologies to reduce demand, and carbon capture technologies to clean up the ever-expanding fossil infrastructure, though this is prime area where progress is obviously "too slow". Nuclear technology is also shown to be important although its suggested role is less than the others. The electricity generation mixes for each of the three scenarios in 2050 range from almost 50,000 TWh in 6DS down to 40,000 TWh in 2DS. Improved energy efficiencies is the most important source of clean generation, along with huge growth in renewables (wind, solar, hydro and biomass) and an increase in nuclear output to about 8,000 TWh in 2DS. Most of the remaining fossil generation, contributing 10,000 TWh, is assumed to have CCS installed. Looking at the needed capacity, due to the variability and low capacity factors of renewables such as wind and solar, capacity must increase even more than the output. This demonstrates the importance of nuclear as it has high capacity relative to other forms of generation. With less than 5% of the generating capacity (about 550 GWe), it produces about 20% of the electricity, indicating its importance in a low-carbon electricity system. The main tool in achieving CO2 reduction targets for the 2DS is CO2 price, increasing from USD 40/tCO2 in 2020 to USD 150/tCO2 in 2050. This greatly increases the electricity generation costs of CO2-emitting technologies and thereby improves the relative cost-competitiveness of low-carbon power technologies. The report suggests that the only way to achieve a low-carbon world is to price carbon aggressively to force behavioural change; first by reducing demand and second through the implementation of higher cost low carbon technologies. This has a major impact on electricity prices, however, and the only mitigating factor is the relatively low cost of power from nuclear plants allowed to operate on a continuous full-power basis unrestrained by subsidised high-cost intermittent sources having dispatch preference. Hence the study continues to include a "high nuclear" sensitivity case for the 2DS scenario. In the 2DS-hiNuc case, nuclear generation is increased to 34% in 2050. Compared with the base 2DS, nuclear replaces fossil power plants with CCS and renewables, whose share in 2050 falls, in the case of CCS from 15% to 7%, and in the case of renewables from 57% to 49%. This scenario reflects a world with greater public acceptance of nuclear power. On the technical side, the average construction rate for nuclear power plants in the period 2011 to 2050 rises from 27 GW/yr in the base 2DS to 50 GW/yr. The cumulative investment costs of this case are only USD 200 billion higher than in the base 2DS and are more than offset by costs savings for fossil fuels in the order of USD 2000 billion (10 to 1). A system with about one third of the generation provided by nuclear is achievable if the industry can overcome the major issue of public acceptance. It raises the question of whether the public will prefer very high electricity costs with a large increase in renewable generation, or a greater role from nuclear power involving a relatively modest increase in the number of plants. The International Atomic Energy Agency (IAEA) in its annual Energy, Electricity and Nuclear Power Estimates for the Period to 2050 published in September 2012 revised downwards its projections for 2030, as it had done the previous year following the Fukushima accident. Its low projection showed a nuclear capacity increase from 370 GWe then to 456 GWe in 2030, the high one gave 740 GWe then, in line with forecast growth in all power generation. For 2050 it tentatively estimated 470 to 1337 GWe respectively. That IAEA publication in September 2013 again revised downward the projections for 2030, to 435 GWe in 2030 for the low projection and 722 GWe for the high one then. For 2050 the figures were 440 and 1113 GWe. The OECD's Nuclear Energy Agency published its first Nuclear Energy Outlook in October 2008. Apart from nuclear being virtually carbon-free, it points out that energy security is enhanced due to nuclear fuel's high energy density, which means that transport is less vulnerable and storage of large reserves is easy. In its high scenario, life extensions and plant upratings continue and present plans for new capacity are largely implemented to 2030. After that new build accelerates to bring over 50 GWe on line each year, giving 1400 GWe nuclear capacity in 2050. It identifies factors which would result in that outcome. In June 2010 this NEO was supplemented by the joint NEA-IEA Nuclear Technology Roadmap, with scenario for cutting energy-related CO2 emissions by 50% by 2050. This would see 1200 GWe of nuclear capacity on line then, providing 24% of electricity (world production having grown from 20,000 TWh in 2007 to 41,000 TWh then). Nuclear power would then be the single largest source of electricity. If constraints on building new nuclear capacity were overcome, nuclear could provide 38% of electricity by 2050, and in this case the power would be 11% cheaper then. The roadmap saw nuclear as a mature technology which required no major technological breakthrough to achieve the projected growth. However, global industrial capacity to construct nuclear power plants will need to double by 2020 if nuclear capacity is to grow in the 2020s and beyond as projected. The Roadmap estimates the investment in nuclear power needed by 2050 to be almost $4000 billion: including $893 billion in China, $883 billion in USA and Canada, $615 billion in OECD Pacific (including Japan & Korea), $389 billion in India, and $330 billion in centrally-planned economies. The US Energy Information Administration has also revised upwards its normally low projections for nuclear in recent editions of its annual International Energy Outlook (IEO). In 2010 it projected 558 GWe nuclear capacity in 2030 and 593 GWe in 2035. The 2030 figure is 53% higher than its 2030 projection published seven years earlier. The reference case for 2035 includes 66 GWe added in China, 23 GWe in India, 25 GWe in Russia and 12 GWe in the USA. It projected 4200 TWh from nuclear in 2030 and 4510 TWh in 2035. In 2013 these projections had increased to 4755 TWh in 2030, 5135 TWh in 2035 and 5492 TWh in 2040 (from 2438 TWh in 2012). In the International Energy Outlook 2013, nuclear power and renewable energy are forecast to be the world's fastest-growing energy sources from 2010 to 2040, increasing by 2.5% each year, driven by concerns about energy security and greenhouse gas emissions which support the development of new nuclear generating capacity. "Factors underlying the IEO2013 nuclear power projections are mixed. They include the consequences of the March 2011 disaster at Fukushima, planned retirements of nuclear capacity in OECD Europe under current policies, and continued strong growth of nuclear power in non-OECD Asia." In November 2011 the World Energy Council (WEC) published a report: Policies for the future: 2011 Assessment of country energy and climate policies, which ranked country performance according to an energy sustainability index, meaning how well each country performs on "three pillars" of energy policy – energy security, social equity, and environmental impact mitigation (particularly low carbon emissions), or simply environmental sustainability. The five countries with the "most coherent and robust" energy policies included large shares of nuclear energy in their electricity fuel mix. The best performers, according to the report, are: Switzerland (40% nuclear), Sweden (40% nuclear), France (75% nuclear), Germany (30% nuclear prior to reactor shutdowns earlier 2011), and Canada (15% nuclear). The report said that countries wanting to reduce reliance on nuclear power must work out how to do so without compromising energy sustainability. In Germany this would be a particular challenge without increasing the reliance on carbon-based power generation "since the renewable infrastructure currently does not have the capability to do so." The 2013 version of this WEC World Energy Trilemma report gave top rating to Switzerland, Denmark, Sweden, the United Kingdom and Spain as being the only countries that historically demonstrate their ability to manage the trade-offs among the three competing energy policy dimensions coherently. These all have, or depend upon, a high level of nuclear contribution. Germany had notably dropped down the list on energy security and sustainability criteria, as had France on energy security. Canada plunged from 2011 due to environmental sustainability, though at top on the other two. In December 2011 the European Commission (EC) published its Energy 2050 Roadmap, a policy paper. This was very positive regarding nuclear power and said that nuclear energy can make "a significant contribution to the energy transformation process" and is "a key source of low-carbon electricity generation" that will keep system costs and electricity prices lower. "As a large scale low-carbon option, nuclear energy will remain in the EU power generation mix." The paper analysed five possible scenarios leading to the EU low-carbon energy economy goal by 2050 (80% reduction of CO2 emissions), based on energy efficiency, renewables, nuclear power and carbon capture and storage (CCS). All scenarios show electricity will have to play a much greater role than now, almost doubling its share in final energy demand to 36%-39% in 2050. The EC high-efficiency scenario would reduce energy demand by 41% by 2050 (compared with 2005); the diversified supply technologies scenario would have a combination of high carbon prices, nuclear energy and introduction of CCS technologies; a high-renewables scenario suggests they might supply 75% of total energy supply by 2050; a "delayed CCS" scenario has nuclear power would playing a major role; and a low-nuclear power scenario had coal plants with CCS providing 32% of total energy (ie 82-89% of EU electricity). The highest percentage of nuclear energy would be in the delayed CCS and diversified supply technologies scenarios, in which it would account for 18% and 15% shares of primary energy supply respectively, ie 38-50% of EU electricity. Those scenarios also had the lowest total energy costs. In January 2014 BP published its Energy Outlook 2035, which showed growth in primary energy demand to then at 2.0% per year to 2020 then 1.2% pa, but electricity demand growth is much higher and by 2035 accounts for 46% of primary energy. Nuclear energy output is expected to rise to 2035 at around 1.9% a year. China, India and Russia will together account for 96% of the global growth in nuclear power, while nuclear output in the USA and EU declines due to expected plant closures. Renewables are expected to continue to be the fastest growing class of energy, gaining market share from a small base as they rise at an average of 6.4% a year to 2035. Renewables' share of global electricity production is expected to grow from 5% to 14% by 2035. Including biofuels, renewables are expected to have a higher share of primary energy than nuclear by 2025. Electricite de France (EdF) in about 2008 published forecast world figures for the period to 2020. These show 140 GWe of new capacity being built and 10 GWe decommissioned to give 480 GWe in 2020. Of the 140 GWe new build, almost 30% is in China, 15% is in India and 15% other Asia. Europe, Americas and Russia have about 12% each. A 2014 comparison among several sets of projections from IEA (WEO 2013) and EIA (Outlook 2013) showed 2035 nuclear capacity figures ranging from 527 to 792 GWe, compared with 381 GWe in 2010 base year. The World Energy Council’s higher scenario was 751 GWe. Exxon Mobil and Shell projections for 2040 were comparable with those from EIA. On the basis of these, a doubling of nuclear capacity by 2040 emerges as being likely. In electricity demand, the need for low-cost continuous, reliable supply can be distinguished from peak demand occurring over a few hours daily and able to command higher prices. Supply needs to match demand instantly and reliably over time. There are number of characteristics of nuclear power which make it particularly valuable apart from its actual generation cost per unit – MWh or kWh. Fuel is a low proportion of power cost, giving power price stability, its fuel is on site (not depending on continuous delivery), it is dispatchable on demand, it has fairly quick ramp-up, it contributes to clean air and low-CO2 objectives, it gives good voltage support for grid stability. These attributes are mostly not monetised in merchant markets, but have great value which is increasingly recognised where dependence on intermittent sources has grown, and governments address long-term reliability and security of supply. The renewable energy sources for electricity constitute a diverse group, from wind, solar, tidal and wave energy to hydro, geothermal and biomass-based power generation. Apart from hydro power in the few places where it is very plentiful, none of these is suitable, intrinsically or economically, for large-scale power generation where continuous, reliable supply is needed. Growing use will however be made of the renewable energy sources in the years ahead, although their role is limited by their intermittent nature. Their economic attractiveness is still an issue also. Renewables will have most appeal where demand is for small-scale, intermittent supply of electricity. In the OECD about 2% of electricity is from renewables other than hydro and this is expected to increase to 4% by 2015. This diagram shows that much of the electricity demand is in fact for continuous 24/7 supply (base-load), while some is for a lesser amount of predictable supply for about three quarters of the day, and less still for variable peak demand up to half of the time. Without nuclear power the world would have to rely almost entirely on fossil fuels, especially coal, to meet demand for base-load electricity production. Most of the demand is for continuous, reliable supply on a large scale and there is little scope for changing this. There is as much electricity generated by nuclear power today as from all sources worldwide in 1960. There is much made of comparisons with renewables. Aside from the obvious intermittency and non-dispatchability of renewables, the following comparisons of plant materials is interesting. Per MWe of installed capacity (disregarding capacity factors): Solar PV: 40 t steel, 19 t aluminium, 76 t concrete, 85 t glass, 13 t silicon. Wind: 118 t steel, 298 t concrete Nuclear (1970s plant): 36-40 t steel, 75-90 m3 concrete.* Implications of Electric Vehicles Future widespread use of electric vehicles, both pure electric and plug-in hybrids, will increase electricity demand modestly – perhaps up to 15% in terms of kilowatt-hours. But this increase will mostly come overnight, in off-peak demand, so will not much increase the system's peak capacity requirement in gigawatts. Overnight charging of vehicles will however greatly increase the proportion of that system capacity to be covered by base-load power generation – either nuclear or coal. In a typical system this might increase from about 50-60% to 70-80% of the total, as shown in the Figures below. This then has significant implications for the cost of electricity. Base-load power is generated much more cheaply than intermediate- and peak-load power, so the average cost of electricity will be lower than with the present pattern of use. And any such major increase in base-load capacity requirement will have a major upside potential for nuclear power if there are constraints on carbon emissions. So potentially the whole power supply gets a little cheaper and cleaner, and many fossil fuel emissions from road transport are avoided at the same time. Drivers for increased nuclear capacity The first generation of nuclear plants were justified by the need to alleviate urban smog caused by coal-fired power plants. Nuclear was also seen as an economic source of base-load electricity which reduced dependence on overseas imports of fossil fuels. Today's drivers for nuclear build have evolved: Increasing energy demand Global population growth in combination with industrial development will lead to a doubling of electricity consumption by 2030. Besides this incremental growth, there will be a need to renew a lot of generating stock in the USA and the EU over the same period. An increasing shortage of fresh water calls for energy-intensive desalination plants, and in the longer term hydrogen production for transport purposes will need large amounts of electricity and/or high temperature heat. See first section above for recent projections. Increased awareness of the dangers and effects of global warming and climate change has led decision makers, media and the public to realize that the use of fossil fuels must be reduced and replaced by low-emission sources of energy, such as nuclear power, the only readily available large-scale alternative to fossil fuels for production of continuous, reliable supply of electricity. Security of Supply A major topic on many political agendas is security of supply, as countries realize how vulnerable they are to interrupted deliveries of oil and gas. The abundance of naturally occurring uranium makes nuclear power attractive from an energy security standpoint. Increasing fossil fuel prices have greatly improved the economics of nuclear power for electricity now. Several studies show that nuclear energy is the most cost-effective of the available base-load technologies. In addition, as carbon emission reductions are encouraged through various forms of government incentives and trading schemes, the economic benefits of nuclear power will increase further. Insurance against future price exposure A longer-term advantage of uranium over fossil fuels is the low impact that increased fuel prices will have on the final electricity production costs, since a large proportion of those costs is in the capital cost of the plant. This insensitivity to fuel price fluctuations offers a way to stabilize power prices in deregulated markets. As the nuclear industry is moving away from small national programmes towards global cooperative schemes, serial production of new plants will drive construction costs down and further increase the competitiveness of nuclear energy. In practice, is a rapid expansion of nuclear power capacity possible? Most reactors today are built in under five years (first concrete to first power), with four years being state of the art and three years being the aim with prefabrication. Several years are required for preliminary approvals before construction. It is noteworthy that in the 1980s, 218 power reactors started up, an average of one every 17 days. These included 47 in USA, 42 in France and 18 in Japan. The average power was 923.5 MWe. So it is not hard to imagine a similar number being commissioned in a decade after about 2015. But with China and India getting up to speed with nuclear energy and a world energy demand double the 1980 level in 2015, a realistic estimate of what is possible might be the equivalent of one 1000 MWe unit worldwide every five days. A relevant historical benchmark is that from 1941 to 1945, 18 US shipyards built over 2700 Liberty Ships. These were standardised 10,800 dwt cargo ships of a very basic British design but they became symbolic of US industrial wartime productivity and were vital to the war effort. Average construction time was 42 days in the shipyard, often using prefabricated modules. In 1943, three were being completed every day. They were 135 metres long and could carry 9100 tonnes of cargo. See also the paper in this series: Heavy Manufacturing of Power Plants. Clean Air and Greenhouse Gases On a global scale nuclear power currently reduces carbon dioxide emissions by some 2.5 billion tonnes per year (relative to the main alternative of coal-fired generation, about 2 billion tonnes relative to the present fuel mix). Carbon dioxide accounts for half of the human-contributed portion of the global warming effect of the atmosphere. The UN Intergovernmental Panel on Climate Change (IPCC) has comprehensively reviewed global warming and has reached a consensus that the phenomenon is real and does pose a significant environmental threat during the next century if fossil fuel use continues even at present global levels. See also Climate Change – science paper. The 2007 IPCC report on mitigation of climate change says that the most cost-effective option for restricting the temperature rise to under 3°C will require an increase in non-carbon electricity generation from 34% (nuclear plus hydro) now to 48-53% by 2030, along with other measures. With a doubling of overall electricity demand by then, and a carbon emission cost of US$ 50 per tonne of CO2, nuclear's share of electricity generation is projected by IPCC to grow from 16% now to 18% of the increased demand (ie 2650 TWh to some 6000 TWh/yr), representing more than a doubling of the current nuclear output by 2030. The report projects other non-carbon sources apart from hydro contributing some 12-17% of global electricity generation by 2030. These projected figures are estimates, and it is evident that if renewables fail to grow as much as hoped it means that other non-carbon sources will need to play a larger role. Thus nuclear power's contribution could triple or perhaps quadruple to more than 30% of the global generation mix in 2030 – around 10,000 TWh. Nuclear power has a key role to play in reducing greenhouse gases. Every 22 tonnes of uranium (26 t U3O8) used saves one million tonnes of carbon dioxide relative to coal. Of more immediate relevance is clean air, and the health benefits of low pollution levels. A World Health Organisation (WHO) study published in 2011 showed that some 1.34 million people each year die prematurely due to PM10 particles – those less than 10 microns (μm) – in outdoor air. Outdoor, PM10 particles mostly originate in coal-fired power stations and motor vehicles, and indoors, residential wood and coal burning for space heating is an important contributor, especially in rural areas during colder months. WHO studied publicly-available air quality data from 1081 cities across 91 countries, including capital cities and those with populations of more than 100,000 people. The data used are based on measurements taken from 2003 to 2010, with most being reported for the period 2008-09. The WHO air quality guideline for PM10 is 20 micrograms per cubic metre (μg/m3) as an annual average. However, eleven cities exceeded 200 μg/m3 average, eg UlaanBaatar at 279 μg/m3, whereas most of the 490 cities below the guideline level were in North America. Use of Natural Resources Carbon and hydrocarbon resources have many other uses that generating power on a large scale. Coal and other fossil fuels are required in much larger quantities than uranium to produce the equivalent amount of electricity – nuclear power is very energy-dense, an extremely concentrated form of energy – see Table below. Nuclear power already has substantially reduced the use of fossil fuels. There are particular questions of ethics and opportunity cost in the use of gas to generate base-load power. Energy conversion: the heat values of various fuels |Liquefied Petroleum Gas (LPG) |Natural gas (UK, USA, Canada, Australia) |Natural gas (Russia) |Natural gas as LNG (Australia) |Hard black coal (IEA definition) |Sub-bituminous coal (IEA definition) |Lignite/brown coal (IEA definition) |Lignite (Australia, electricity) |Natural uranium, in LWR (normal reactor) |Natural uranium, in LWR with U & Pu recycle |Natural uranium, in FNR |Uranium enriched to 3.5%, in LWR Uranium figures are based on 45,000 MWd/t burn-up of 3.5% enriched U in LWR MJ = l06 Joule, GJ = 109 J; % carbon is by mass; mass CO2 = 3.667 mass C MJ to kWh @ 33% efficiency: x 0.0926 One tonne of oil equivalent (toe) is equal to 41.868 GJ Sources: OECD/IEA Electricity Information 2008, for coal; Australian Energy Consumption and Production, historical trends and projections, ABARE Research Report 1999. A further aspect of natural resource use in some places is regarding fresh water. Coal-fired plants are often built on coalfields for logistical reasons, and then cooled with fresh water using evaporative cooling towers. These use a lot of water. With nuclear plants, there is no similar siting consideration and they may more readily be put on the coastline, using seawater for cooling without evaporation. In Australia, a dry continent, a move from coal-fired to nuclear power could save enough fresh water to supply a city of four million people. See also Sustainable Energy in this series.
<urn:uuid:f358f277-66df-4021-a4ff-7812bd3cb167>
CC-MAIN-2014-15
http://www.world-nuclear.org/info/Current-and-Future-Generation/World-Energy-Needs-and-Nuclear-Power/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538787.31/warc/CC-MAIN-20140416005218-00135-ip-10-147-4-33.ec2.internal.warc.gz
en
0.938076
7,931
3.34375
3
This month we review a pioneering study that examines vegetarianism as a movement. Vegetarianism: Movement or Moment? Temple University Press, 2002 What does a typical vegetarian look like? She is most likely a single white middle class woman who has a friend or friends who are vegetarian. She chooses this lifestyle because she is concerned about her health. She is less apt to drink or smoke. She is one of 2.5 to 7 million vegetarians in the United States. The number varies because people asked differ on what vegetarian encompasses. She may have become a vegetarian for a variety of reasons: health, concern for farm animals, world hunger, or disgust at eating animal flesh. The profile of a vegetarian is one aspect of Vegetarianism: Movement or Moment?, a research project that has been part of sociologist Donna Maurer's life for more than 10 years. A vegetarian who moved toward veganism during that time, Maurer undertook a project not attempted previously, an examination of vegetarianism in North America as a movement. One of the key questions she had to address was whether vegetarianism is a fad or a trend. Sympathetic to vegetarianism, Maurer does not hesitate to be critical of the movement and its leaders. The movement has focused on the health benefits that have been borne out by research and has lobbied for more vegetarian options. Yet, she reveals two reasons why the movement has not convinced people to become vegetarian. The vegetarian movement has failed to persuade the public that meat eating is dangerous or immoral. As a movement vegetarianism has not attracted large numbers over the last two centuries. Vegetarianism involves a diet of personal choice rather than a commitment to a collective effort. In order to succeed as a movement, Maurer feel its leaders have to convince people their personal food choices will have an impact on society. Maurer points out that in order to establish a collective identity vegetarian organizations must answer the question, "What does it mean to be a vegetarian?" Many movements have a collective identity based on gender, ethnicity, or sexual preference. Their shared trait becomes the most important trait to their personal identity. With vegetarians there is no shared trait. Their only commonality is what they avoid -- eating animal flesh. They also do not have an adversary or common enemy. Meat eaters are not adversaries because vegetarian leaders want the message to remain positive to encourage conversion to vegetarianism. Vegetarian leaders believe people, perhaps after initial resistance, will become converts if they have positive interaction with vegetarians. Maurer found that those who change their diets gradually were more likely to commit to vegetarianism than those making overnight changes. The gradual approach contrasts with the opinion espoused by Drs. Neil Barnard and Dean Ornish. They both feel that rapid change will lead to health improvement and more motivation to continue a vegetarian diet. The vegetarian movement finds itself overlapping other movements that are concerned with animal rights, health, and the environment. In the case of animal rights, organizations such as PCRM and PETA have embarked on extensive dietary campaigns that are primarily vegan. Membership growth in vegetarian organizations has been static in the 1990's except for increased interest by teenagers and college students. She concludes by stating that the future of the vegetarian movement depends on convincing people that participation in the movement is important. People have to realize that their food choices can make a difference. By selecting vegetarianism they can help themselves, others, animals, and the environment. In Vegetarianism: Movement or Moment? Donna Maurer has created an overview for anyone wanting to study vegetarianism on the North American continent. After reading its 150 pages, one comes away with knowledge of the history of vegetarianism, the attitudes of health professionals to the diet, and the activities of vegetarian organizations. The reader is also introduced to the strategies of its leaders, the role the food industry in promoting vegetarian diets, and the ideology of the movement. The book is filled with information she has gleaned from interviews, questionnaires, publications of local and national groups, participation in regional and national conferences, and attendance at lectures by prominent vegetarian leaders. In the process she has turned what might have been a dry dissertation into very readable and fascinating work. Reviewed October 2002
<urn:uuid:b62a2f95-62a6-4e9a-925b-b627eee89a1f>
CC-MAIN-2016-40
http://www.vegparadise.com/vegreading410.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660602.38/warc/CC-MAIN-20160924173740-00044-ip-10-143-35-109.ec2.internal.warc.gz
en
0.965421
861
2.921875
3
Medical TreatmentsDefinite treatment for Vertigo depends on the underlying cause. Treatments may include: - Antibiotics in case of infections. - Anti-cholinergics and anti-convulsants (substances that act on the nervous system). - Anti-histamines which act as controllers of vomiting. - Steroids in case of inflammations. - Surgeries may be required in treatment for Vertigo in certain specific conditions especially for inner ear problems. Non-Medical MeasuresCertain physical maneuvers are done to treat BPPV. These include: - Vestibular rehabilitation exercises: The patient sits on the edge of a table and lies down to one side till the vertigo improves after which the patient sits up and lies down on the other side, again until the vertigo ceases. This is can be repeated again until the vertigo improves completely. - Particle repositioning maneuver: This is done with the understanding that vertigo has occurred due to displacement of the particles in the middle ear. The head is so repositioned to move these particles to their normal position.
<urn:uuid:006be5c8-0545-4834-99cf-ba1d1bc735a9>
CC-MAIN-2018-51
https://www.welcomecure.com/diseases/vertigo/treatment
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828018.77/warc/CC-MAIN-20181216234902-20181217020902-00493.warc.gz
en
0.900372
228
2.796875
3
Acute enteric viral infections include infections caused by for example: norovirus, rotavirus, calicivirus, astrovirus and adenovirus. Diarrhea is a common cause of death in developing countries and the second most common cause of death in infants worldwide. In industrialized countries, diarrheal diseases are a significant cause of morbidity among all age groups. Though typically self-limited, infectious diarrhea results in millions of physician visits annually. In industrialized countries, most gastroenteritis cases are caused by viruses, such as rota-, calici-, astro-, and adenoviruses. Although noro-and rotavirus infections are major causes of acute enteric viral infections, causing massive disease burden and mortality in both the developed and developing world, it is expected that many of the causal agents of acute enteric viral infections still need to be identified. We aim to identify these viruses in diagnostic samples negative in all routine diagnostic assays that have been and will be collected from human cohorts in Rotterdam, Bilthoven, Amsterdam, and international collaborating institutions. Viral discovery programs in the past have almost exclusively relied on classical virological techniques. The advent of novel molecular virus discovery and characterization techniques used in this project will allow the identification of new acute enteric viral infections agents, their clinical impact, and elucidate the associated burden of acute enteric viral infections.
<urn:uuid:c4c56997-484b-4ab0-8333-686803fee8fe>
CC-MAIN-2018-17
http://virgo.nl/mission/acute-enteric-viral-infections/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944848.33/warc/CC-MAIN-20180420233255-20180421013255-00556.warc.gz
en
0.905425
289
3.046875
3
Natural History, Pathogenesis, and Outcome of Autoinflammatory Diseases (NOMID/CAPS, DIRA, CANDLE, SAVI, NLRC4-MAS, Still'S-like Diseases, and Other Undifferentiated Autoinflammatory Diseases) Some diseases cause chronic inflammation with intermittent flares in the body. These are called autoinflammatory diseases. They can cause fevers, rashes, ulcers, and other problems. Researchers want to learn more about the causes and effects of these diseases. They hope this will improve how the disease is managed in the future. To understand the underlying immune dysregulation To identify the genetic cause To translate our findings into novel treatments that improve patients disease outcomes Patients with known NOMID/CAPS, DIRA, CANDLE, SAVI, NLRC4-MAS, Still's Disease, and with other yet undifferentiated autoinflammatory diseases. Unaffected relatives of participants with a known or undifferentiated autoinflammatory disease Healthy adult volunteers at least 18 years of age Participants will be screened with blood sample and medical history. They may provide copies of their medical records. Enrolled participants will be evaluated at the NIH for 2-5 days. All participants will have a detailed medical history, physical exam, blood tests, and other evaluations depending on the extent of their autoinflammatory disease. Participants may also expect the following assessments: - Clinical tests that help assess organ damage and function such as hearing, vision, memory, and learning tests. - Imaging studies to characterize organ involvement of the inflammatory disease including: X-rays, CT scans, special MRIs, and bone scans. - Laboratory evaluations including clinical markers of disease activity, research samples <TAB>for genetic studies, blood samples for cytokine/biomarker assessment, and gene expression profiling.<TAB> - Questionnaires to assess disease activity and quality of life. - If indicated, other procedures may be administered that include: a lumbar puncture if CNS inflammation is suspected, a skin biopsy if skin inflammation is present, and/or gastrointestinal and pulmonary procedures if they are clinically indicated. Participants may return for a single follow-up visit or for long-term follow-up visits depending on their disease and willingness to return. Long-term follow-up may occur for up to 15 years on this protocol. |NOMID CAPS DIRA NLRC4-MAS SAVI Other Undifferentiated Autoinflammatory Diseases CANDLE| |Study Design:||Observational Model: Cohort Time Perspective: Prospective |Official Title:||Studies of the Natural History, Pathogenesis, and Outcome of Autoinflammatory Diseases (NOMID/CAPS, DIRA, CANDLE, SAVI, NLRC4-MAS, Still S-like Diseases, and Other Undifferentiated Autoinflammatory Diseases)| - To study the pathogenesis of patients affected with autoinflammatory diseases, including their clinical, immunological, genetic and metabolic-endrocrinological characteristics. [ Time Frame: Baseline, 1-2 years, 3-5 years, 10 years ] - To collect long-term clinical and laboratory outcome parameters of the multiorgan inflammatory involvement and/or organ damage in patients with genetically defined or undifferentiated autoinflammatory (immune-dysregulatory) diseases. [ Time Frame: 1-2 years, 3-5 years, 10 years ] - To evaluate clinical characteristics-disease manifestations and blood, body fluids, and tissue biomarkers during disease flares and quiescence [ Time Frame: 1-2 years, 3-5 years, 10 years ] |Study Start Date:||November 16, 2016| |Estimated Study Completion Date:||September 30, 2032| |Estimated Primary Completion Date:||August 31, 2031 (Final data collection date for primary outcome measure)| Please refer to this study by its ClinicalTrials.gov identifier: NCT02974595 |Contact: Raphaela T Goldbach-Mansky, M.D.||(301) email@example.com| |United States, Maryland| |National Institutes of Health Clinical Center||Recruiting| |Bethesda, Maryland, United States, 20892| |Contact: For more information at the NIH Clinical Center contact Patient Recruitment and Public Liaison Office (PRPL) 800-411-1222 ext TTY8664111010 firstname.lastname@example.org| |Principal Investigator:||Raphaela T Goldbach-Mansky, M.D.||National Institute of Allergy and Infectious Diseases (NIAID)|
<urn:uuid:98721d24-d21f-426b-b288-f8938ffe9b75>
CC-MAIN-2017-26
https://clinicaltrials.gov/ct2/show?term=dira&rank=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319933.33/warc/CC-MAIN-20170622234435-20170623014435-00311.warc.gz
en
0.847384
994
2.828125
3