text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Throughout high school math classes, teachers will often hear students ask, “When will I ever need this in real life?”
But what many students don’t realize when asking this question is that a lot of the magic behind our world operations come from math. For instance, those MRI, CT scanners and X-ray machines we see in medical facilities are all functioning because of math equations.
Melody Alsaker, assistant professor of mathematics at Gonzaga University, has been researching a different form of medical imaging technology — one that is non-invasive and portable. Electrical Impedance Tomography (EIT) is a functional medical imaging technique in which electromagnetic fields are used to form images of the electrical properties of the body. Alsaker, along with students, are using math to help improve this technology.
Alsaker first got involved with EIT research in 2012, while getting her master's degree at Colorado State University.
“I helped build the EIT machine that is currently in the lab [at Colorado State,] but mostly I worked on the software side of things,” Alsaker said.
To get a reading, electrodes are placed on the surface of the human body and electricity is run through the person's body, but no pain is felt due to the low frequency.
The image the doctors see is created by using conductivity levels of different materials in the body. This allows the doctors to have an image that resembles a horizontal slice through the patient.
“It's not used extensively in hospitals at the moment, but there are a lot of potential applications," Alsaker said.
Possibilities include things like breast cancer detection, pulmonary detections, classification of different types of strokes, prostate cancer detection, bladder volume detection in paraplegics, ventilation monitoring and an array of other opportunities, Alsaker said.
“I’ve been involved with an ongoing project with Children’s Hospital Colorado," Alsaker said. "We’ve been looking at the monitoring of cystic fibrosis in children,”
Cystic fibrosis patients get a baseline CT scan every two years. EIT technology, however, can be used to take images between these scans, Alsaker said.
“EIT scans are better than the CT scans [for children] because they have a lot of ionizing radiation in them,” Alsaker said.
Not only is EIT safer and noninvasive, but it's also portable technology.
“The machine itself is very small," Alsaker said. "You can pick up the machine and move it to the patient, rather than move the patient to the machine.”
Hypothetically, this machine can be put in an ambulance, helicopter or taken into a war zone. Further, it is also much lower in cost. An EIT Machine is significantly cheaper than MRI and CT machines, Alsaker said.
There is also a capability for real-time imaging.
“You can take a whole bunch of images in quick sequence and make a movie out of it," Alsaker said. "So you can watch a patient breath, or watch their heart beat."
Alsaker’s specific role in this research is primarily based on improving the spatial resolution of the EIT images using various mathematical techniques and depends largely on using computer coding to do this job.
The students involved at GU in EIT research are focused on removing artifacts, which are things that show up in the image that are not supposed to be there. Essentially, they are trying to filter out these artifacts from the images using math and computer code.
Benjamin Bladow, a senior majoring in computer science and mathematics, began working with Alsaker during the fall of his junior year.
“I think EIT is super cool because the whole purpose of it is to develop a technology that is low cost, portable and gives you real-time imaging,” Bladow said.
He meets with Alsaker twice a week and spends four to 10 hours doing coding research.
“I've been able to meet a lot of mathematicians from around the world because of the research I do with Dr. Alsaker,” Bladow said.
In November, Bladow, along with Alsaker and mathematics majors Scott Campbell and Sydney Schmidt will be going to Colorado State University to visit the EIT lab there.
Bladow said he has gained a better understanding of the math behind imaging, and the amount of effort put into this technology through his research experience.
“I think it would be great if as many students as possible did research with a professor, because you end up really delving into a topic," Bladow said. "That’s why we’re here, we are not just here to learn facts and figures, we're here to learn how to learn, and doing research helps you in that process."
Editor's Note: Sydney Schmidt is a graphic designer in Student Media. | <urn:uuid:c60f7dca-73db-4a96-b56e-5d9c8f8e6ea1> | {
"date": "2020-01-24T00:14:39",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9599391222000122,
"score": 3.171875,
"token_count": 1042,
"url": "https://www.gonzagabulletin.com/news/gu-math-professor-helps-develop-portable-medical-imaging-device/article_eaa06dde-f9c5-11e9-8773-3709e6b97cf3.html"
} |
Type 2A, stone adze made of black argillite. Surface markings show evidence of flaking and bruising techniques on upper side, smooth underside and cutting edge.
The most important tools for the early Maori were adzes (toki). These stone adze heads were lashed to a wooden handle and used in working wood, including canoe building.This early adze has a well-defined butt/toe end to allow grip for lashing to a handle. The majority were made from basalt or other hard rock, such as adzite. This is a very tough, fine-grained metamorphic rock, also called baked argillite or greywacke, which is hard sandstone.
maximum dimension: 94mm, 51 grams
subject area: Maori, Social Science, Technology, The Arts
subject themes: New Zealand, Maori, Tools
handling collection number: HC43
why not get your hands on these... Mahe HC84, Patu Muka HC83, Piupiu HC156 | <urn:uuid:f93e90d4-a842-4381-a2fb-dd380607339e> | {
"date": "2020-01-23T23:52:52",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.93433678150177,
"score": 3.15625,
"token_count": 214,
"url": "https://www.handsontauranga.co.nz/hot-items/the-arts/toki-kohatu-hc43/"
} |
Anxiety has been shown to have an effect on ones working memory. This can show up in academic, professional and personal settings. This is a common problem seen amongst students. Up to 38% of university students have anxiety that impairs their performance academically (Buswell, 2013). Working memory is a combination of short-term memory and attention control and it is a key component in studying and retaining information. It is measured through the assessment of a variety of capabilities such as language comprehension and reasoning ability.
In this peer reviewed, randomized, single blind study it was determined that acupuncture improves working memory in students with low to high anxiety. In this study 90 undergraduate students participated. They filled out a State-Trait Anxiety Inventory and an Automated Operation Span Task assessment (AOSPAN). They then either laid on a table for 20 minutes with no acupuncture or laid on the table for 20 minutes and received acupuncture. They were then retested after. The researchers found a 9.5% improvement in their AOSPAN score and 36% fewer math errors (Buswell, 2013). The researchers concluded that acupuncture is a useful tool in improving working memory and performance in students with anxiety.
*all information from this blog was cited from the following article:
Bussell, Jason. (2013). The Effect of Acupuncture on Working Memory and Anxiety. Science Direct, 6, (241-246). https://doi.org/10.1016/j.jams.2012.12.006 | <urn:uuid:2ab34ff3-5dbd-462f-9326-604bcce39ba1> | {
"date": "2020-01-23T23:59:27",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9445605278015137,
"score": 3.234375,
"token_count": 302,
"url": "https://www.heartspaceacupuncture.com/single-post/2019/02/26/Acupuncture-for-Working-Memory"
} |
John Gordon Morrison -- born in Ireland on 13 July 1838 -- immigrated to the United States on 13 October 1855. Settling in Lansingburgh (present-day Troy), New York, he found work as a brush maker before enlisting in the U.S. Navy on 14 July 1857. Assigned to the screw frigate Wabash, Morrison participated in the capture of William Walker, the infamous freebooter, after Wabash steamed to Panama. After returning to N.Y., the frigate’s crew was discharged. Morrison quickly reenlisted, reporting to the supply ship Relief. Shortly after arriving on board, Relief returned to Aspinwall (Colón), Panama. After her return to N.Y., Morrison received his discharge on 29 January 1859.
Returning to Lansingburgh, Morrison married Margaret McCabe on 3 July 1859. They enjoyed two years together before the outbreak of the American Civil War on 12 April 1861. Morrison enlisted for two years in the 30th New York Infantry, U.S. Army, at Lansingburgh, on 24 April. Mustered in as a private with Company A, 30th N.Y., on 1 June 1861, he spent the next several months marching south into Virginia with General Irvin McDowell’s I Corps, Army of the Potomac.
With snow falling heavily on 15 February 1862, the 30th N.Y., received an order from general-in-chief of the Union Army, George B. McClellan, asking volunteers “to man the gun boats on western waters.” Morrison and “about thirty more” men stepped forward, with only Morrison and seven others from three different regiments chosen for the duty. After bidding his friends farewell, the young Irishman stood at attention before his commanding officer, Colonel Edward Frisby (later killed at the Second Battle of Manassas), telling Morrison he “hoped that I would do nothing to disgrace my regiment.”
Leaving with the other volunteers, the men made their way to Washington D.C., before riding a train to Pittsburgh, Indianapolis, and down to Cairo, Ill. After arriving on board receiving ship Maria Denning on 21 February 1862, Morrison arrived three days later to the badly damaged ironclad gunboat Carondelet, a Western gunboat and part of the Mississippi squadron under Admiral Andrew Hull Foote. Carondelet “suffered severely” in the battle at Fort Donelson in the Cumberland River, receiving some 70 artillery hits to her superstructure, killing four men and wounding another 30. Repairs were made over the next few weeks, and she returned to service.
During an engagement on 15 July 1862, with Confederate ram Arkansas in the Yazoo River, Morrison inspired Carondelet’s crew during an unsuccessful attempt to halt the Confederate ironclad’s progress through the Union blockade to the Mississippi River. After losing four killed, 16 wounded and 12 missing in the deadly engagement (many of these jumped overboard during the close-in battle, but soon returned to the ironclad), Morrison’s “presence of mind in time of battle…is reported as always conspicuous and encouraging.” Appointed coxswain after the engagement in recognition of his bravery, Morrison found the honor wholly “sufficient,” as he “was not fighting for an office.”
On 8 May 1862, Cmdr. Henry A. Walke, commanding officer of Carondelet, informed Morrison he “made another application…through the Navy Department for the congressional medal for me. As I had refused an appointment, I told him that I would be very glad to receive it.” The citation to Morrison’s Medal of Honor reads: “When the Carondelet was badly cut up, several of her crew killed…Morrison was the leader when boarders were called on deck, and the first to return to the guns and give the ram a broadside as she passed.”
In the early morning hours of 18 January 1863, an aide to Cmdr. Walke awoke Morrison from sleep, informing him Walke wanted to see him. The captain was to take command of the new gunboat Lafayette, and asked Morrison if he would come serve on board with him, an offer the young hero accepted. Lafayette, part of Rear Admiral David Dixon Porter’s Mississippi Squadron, joined the battle at Vicksburg from April–July 1863.
Discharged during the Vicksburg campaign on 31 May 1863, Morrison returned home to Lansingburgh on 1 July. Enlisting in Company C, 21st New York Cavalry in September 1864, he served with that unit until the end of the war on 9 April 1865, and the discharge of Union troops in May. On 22 June, General Order No. 59 officially provided the citation of Morrison’s Medal of Honor.
Morrison died in New York City on 9 June 1897, and lies buried in Cypress Hills Cemetery, Brooklyn.
(DD‑560: displacement 2,050; length 376'6"; beam 39'8"; draft 17'9"; speed 35 knots; complement 273; armament 5 5-inch, 10 40-millimeter, 7 20-millimeter, 3 21-inch torpedo tubes, 6 depth charge projectors, 2 depth charge tracks; class Fletcher)
Morrison (DD‑560) was laid down on 30 June 1942 at Seattle, Wash., by the Seattle‑Tacoma Shipbuilding Corp.; and was launched on 4 July 1943; sponsored by Miss Margaret M. Morrison, daughter of Coxswain Morrison.
Commissioned on 18 December 1943, Cmdr. Walter H. Price in command, Morrison lay moored at Plant “B,” Seattle-Tacoma Shipbuilding Corp., and fit out there (18–27 December). She got underway at 0900 three days after Christmas at the end of her fitting out period, proceeding to Three Tree Point, where her Mk. IV radar was calibrated. At 1215 on 28 December, Morrison steamed to Sinclair Inlet, anchoring at 1415 before conducting an ammunition on load.
At 1449 on 30 December 1943, she got underway for Illahee, Wash., arriving there at 1532 for deperming. At 0800 on 31 December, Morrison got underway for Keyport, Wash., and loaded torpedoes. She fired one test slug from each torpedo mount. At 1240, she steamed for Point Jefferson, arriving at 1435 to degauss before proceeding to Pier 41, Seattle.
Morrison conducted further fitting trials during the first week of January 1944, operating out of Seattle. On 2 January, she steamed for Elliot Bay for magnetic compass calibration. At 1115, she set course for Indian Island, and began loading depth charges upon arrival at 1341. Morrison steamed for anchorage off Port Townsend, Wash., upon securing from drills at 1700. Three days later, on 5 January, Morrison reported for shakedown duty.
Assigned to Task Unit (TU) 14.5.7, she got underway on 6 January 1944 for San Diego, Calif., for shakedown training. Arriving on 10 January, she joined at 0820 with coastal yacht Sea Scout (PYc-43) and S-34 (SS-139), forming Group II of a sound school group. At 0825, she commenced making simulated submarine attacks with K-6 as the target. Completing the exercise at 1545, she next operated with Destroyer Division (DesDiv) 106, to commence rehearsal runs of Night Battle Practice with Elliot (DD-146) as target, securing from the exercise at 2330.
Steaming in company with small seaplane tender Chincoteague (AVP-24), and frigates Glendale (PF-36), and Long Beach (PF-34) on 12 January 1944, the group remained in an assigned night area until Morrison proceeded for further drills with sound school ships. Commencing anti-submarine warfare training runs with S-23 (SS-128), and submarine chaser SC-632, she secured at 1541 and proceeded independently to San Diego, mooring alongside O’Bannon (DD-450). Morrison conducted various exercises, including anti-aircraft gunnery, speed, and anti-submarine drills off San Diego throughout the month of January and into the first week of February.
On 7 February 1944, at 1425, Morrison,” got underway for Seattle. She arrived at 1413 on 10 February at Pier 6, Puget Sound, for post-shakedown availability. From 10–23 February, Morrison underwent a post-shakedown overhaul at Puget Sound Navy Yard. Her badly ruptured sound drome, whether struck with an object or the concussion caused from structural test firing of depth charges, needed replacing. Regardless of the cause, Morrison received a new sound dome and a ready for sea date of 25 February.
Underway for Pearl Harbor at 0800 on 25 February 1944, Morrison maintained a speed of 20 knots, arriving at Kuahua Island Wharf, Oahu, on 1 March. Reporting for duty to Commander, Destroyer Pacific (ComDesPac), Morrison got underway from Pearl Harbor to conduct anti-aircraft and torpedo rehearsal runs, completing the drills at 1245 on 2 March. At 2012, she made contact with a plane towing target sleeves and commenced firing at 2035, expending 123 rounds of 5-inch projectiles, 2,802 rounds of 40-millimeter, and 3,252 rounds of 20-millimeter ammunition.
After a few more days of gunnery exercises, Morrison got underway from 6–9 March 1944, to conduct exercises with aircraft carrier Hornet (CV-12) as part of her destroyer screen. Alongside Taylor (DD-468) and Marshall (DD-676), the destroyers acted mainly as an anti-submarine screen, commencing several drills while Hornet conducted flight operations.
On 15 March 1944, Morrison got underway at 0720 with TG 58.2 from Pearl Harbor to Majuro, Marshall Islands. Forming a screen for carrier Bunker Hill (CV-17), accompanying ships included carrier Hancock (CV-19), and destroyers Hickox (DD-673), and Marshall. Morrison also acted as a screen for small aircraft carrier Cabot (CVL-28) when that ship conducted flight operations. Arriving at Majuro on 21 March, Morrison moored in Berth C-13 to receive routine upkeep. Detached from TG 58.2, she received a new assignment to TG 50.15. The task group got underway on 26 March, forming up into three fueling groups (TG 50.15.1, 50.15.2, and 50.15.3) for refueling off Majuro Atoll. At 0940 on 30 March, fueling completed, Morrison resumed acting as screen for the task group operation.
After further screening duties, Morrison got underway from Majuro on 18 April 1944, joining TF 58 for fueling operations. The fast carrier task force was involved in operations leading to the invasion of Hollandia, New Guinea, on 22 April. At 1530, Morrison proceeded to her assigned picket station at a distance of 16,000 yards from the fast carrier task force. Arriving at the picket station by 1645, she maintained her position for the remainder of the night. Two days later, on 20 April, TG 50.17 steamed to Seeadler Harbor, Manus Island, anchoring at 1459. On 21 April, Morrison acted as a screen for fuel ships in the Admiralty Islands, during the raids on Truk, Satawan, and Ponape. She returned to Manus when the operations were complete.
Steaming to Pearl Harbor from Seeadler Harbor, Morrison returned to Hawaii to begin training for the invasion of Saipan, Tinian, and Guam, before steaming to the Marshall Islands, arriving at Kwajalein on 9 June 1944. Getting underway from Roi, Marshall Islands, with TG 52.17 for Saipan on 12 June, Morrison prepared to get into her first action. Assigned to Task Unit 52.14.3, Morrison sailed alongside carrier escorts Kitkun Bay (CVE-71), Gambier Bay (CVE-73), Laws (DD-558), and Benham (DD-796), before becoming detached from TG 52.17 and redesignated TU 52.11.1. On 14 June, at 0825, Morrison left formation to rescue a man overboard from Coral Sea (CVE-57). She recovered an uninjured ACM Joseph S. O’Grady at 0843, and transferred him back to Coral Sea at 1220.
Steaming in company with TG 52.11 to the east of Saipan, Morrison operated in support of the landings and occupation of the island on 16 June 1944. At 1355, she made a sound contact at a distance of only 800 yards and made an “urgent attack” by dropping an eight depth charge pattern. Although no results were observed, Morrison continued the search to regain contact, which proved unsuccessful. The next day, lookouts on the destroyer observed eight to 12 enemy Val dive bombers diving on nearby carriers. Morrison commenced firing at the Japanese planes on 1851 with her 5-inch battery. Although two enemy planes crashed near the carriers Gambier Bay and Kitkun Bay, Morrison did not receive credit for them. Some 18 to 20 Japanese planes attacked during the course of the day, with five to seven splashed by the task group.
Directly involved in efforts at the Battle of the Philippine Sea on 19 June 1944, Morrison helped repulse an enemy air raid again targeting Gambier Bay. At 1758, she commenced firing her 20-millimeter and 40-millimeter batteries at planes screaming in between the ships of the task group. The escort carriers CAP patrols swooped in to break up the enemy attack. “The results were gratifying,” notes the war diary. “No damage to any vessel of this formation.” Effective gunfire from Morrison assisted in destroying seven out of seven Mitsubishi G4M Navy Type 1 (Betty) land-based bombers, five from ships’ gunfire and two by fighter planes. The task group destroyed some 40 Japanese planes in the two-day battle, better known as the Marianas Turkey Shoot. During the next few hours, Morrison helped in efforts to recover pilots and air crew forced to ditch at sea in the darkness. After securing from this mission, Morrison resumed her duties in the area to the east of Saipan until 2 August.
After the U.S. captured Saipan, Morrison received assignment to TF 58 for the invasion of Guam. Navy dive-bombers of the task force struck Guam with more than 300 tons of bombs a day. On 13 August, the destroyer steamed back to Eniwetok, where she remained until getting underway with TG 38.3 for another series of raids. Involved in operations for the invasion of Palau, Morrison then supported attacks on the Philippines and Formosa.
Arriving at Eniwetok at 1720 on 5 July 1944, Morrison took on stores and carried out routine duties on 6 July. She got underway on 11 June to screen Kitkun Bay and Gambier Bay at 0540 en route to Saipan. On 18 July at 1321, while in the Saipan operating area, Morrison rescued Lt. Robert C. White, a fighter pilot flying a Grumman FM-2 Wildcat (BuNo 55281) with VC-5 off Kitkun Bay. Morrison went alongside Kitkun Bay to transfer Lt. White at 1345, before resuming screening duties. Operating with TU 52.14.1 for the rest of the month, Morrison performed anti-submarine patrol duties to the east of Saipan.
Ordered to proceed with TG 58.4 for the Marianas Islands on 1 August 1944, Morrison served as a screen for carriers Belleau Wood (CVL-24) and Essex (CV-9) conducting flight operations off Guam and Tinian until 11 August. On 12 August, the destroyer got underway to Eniwetok, arriving at 0910. She remained anchored in Eniwetok Lagoon until 19 August, when she got underway alongside destroyer tender Markab (AR-23) at 0750, engaging in “logistics and upkeep.” After arriving back in Eniwetok Lagoon on 26 August, Morrison spent the remainder of August anchored in Berth 570.
Getting underway en route for raids against Palau Island with TG 38.3 on 1 September 1944, Morrison provided screening duties for carriers Essex and Lexington. Beginning on 3 September, TF 38 launched air strikes against Palau. Morrison also provided anti-submarine duties for the task force carriers while in recovery operations of all aircraft.
On the morning of 9 September 1944, while engaged in air attacks on Mindanao, U.S. pilots sighted a convoy of 50 Japanese sampans and freighters headed north. Four destroyers and two cruisers were sent to intercept and destroy the enemy ships. Morrison led the attack force, but by the time they reached the convoy the American planes had strafed and bombed it so completely that the remaining pickings were extremely small. Not more than 15 sampans remained, and of these, several were burning or beginning to sink. All but one or two of the sampans were destroyed. During the action, known as the Battle of Sanco Point, Morrison became the first U.S. surface warship to enter a Philippine harbor since the Japanese occupation over two years prior.
Two days later, TF 38 steamed for the Central Philippine area to conduct air strikes in the area until 16 September 1944. On 17 September, the task force shifted focus to supporting the landings on Peleliu. After providing screening duties for the carriers involved, Morrison shifted course for Luzon on 20 September. After serving on night picket station, she remained at general quarters throughout 21 September while the carriers launched strikes against Manila. At 0530 the next morning, radar picked up an unidentified Japanese plane.. At 0621, Morrison commenced firing her 5-inch batteries at the aircraft until receiving a report that night fighters reportedly shot the enemy down.
After flight operations ceased at 1925 on 25 September 1944, Morrison arrived with the task group for fueling operations at 1200 the next day. Morrison took her turn at refueling at 1244 and by 1353 resumed her station in the screen. She entered Kossol Passage in the Palau Islands on 27 September for minor upkeep.
On 2 October 1944, Morrison sailed with TG 38.3 for picket duty off Ulithi. She anchored at 1604 in Mugai Channel. The next day, at 0225, all ships in the task group prepared to sortie at daylight. By 0800, “cyclonic disturbances” caused storm conditions and “very heavy seas.” After changing course to a retirement area to the north, Morrison and the other ships of the group waited for the strong seas to subside. After arriving back at Ulithi for provisioning, refueling and upkeep, “Mighty Moe” got underway again on 7 October for Okinawa. Carrier air strikes against Okinawa began on 10 October, continuing into the next two days. Morrison next began screen and plane guard operations off Formosa and northern Luzon during a five-day attack beginning on 12 October. Four days later, on 16 October, the damaged cruisers Houston (CL‑81) and Canberra (CA‑70), both torpedoed off Okinawa, returned to Manus for repairs. Morrison assisted in escorting the vessels out of the combat zone.
Morrison accepted picket station duties ahead of the task groups steaming to Formosa. At 1010, she went to general quarters after radar picked up an unidentified Japanese plane, but an attack never materialized. Later in the evening, Morrison again went to general quarters after expecting an enemy attack. Continuing to search for the Japanese surface forces proved fruitless, as they had already retired to Formosa and Southwest Islands.
Japanese air attacks on TG 38.3 began in earnest throughout the day of 13 October 1944. Morrison opened fire at 0015 on an unidentified enemy plane streaking in from the west. Once in range, the destroyer fired, but did not hit the plane. An expected torpedo strike around this time also failed to materialize, but Morrison laid down a smoke screen at 0159 as a precaution. At 0600, the carriers from TF 38 commenced air strikes against Formosa lasting throughout the day.
At 1705, Morrison went to general quarters to repel an enemy torpedo attack. Firing on three attacking Nakajima B6N Tenzan (Jill) torpedo bombers soaring in from the east at 1810, the crew watched as a U.S. fighter shot down one of the Japanese bombers. However, the surviving two enemy Jill torpedo bombers survived the barrage thrown up by the destroyer screen, and one barreled in only 2,000 yards astern of Morrison. This plane dropped a torpedo at Essex, just barely missing the huge carrier. The enemy dive-bomber managed to pull up out of the dive, until promptly downed by another U.S. plane. While fighting off the furious air attack, Morrison managed to rescue S1c Harold G. Olsen at 1800, after he accidentally fell overboard from battleship Alabama (BB-60). By 1835, Morrison resumed her normal screening station.
While the task group conducted a search for Japanese surface units, the enemy force retired to Formosa and the Southwest Islands by the evening of 17 October. Underway as a screening unit of TG 38.3 in company with TG 38.2 from 20-22 October 1944, Morrison operated as the screening force for the American carriers conducting air strikes in support of amphibious landings at Leyte, Philippines.
During the Battle of Leyte Gulf (23–26 October 1944), Morrison continued steaming as part of the destroyer screen for the group’s carriers, and in the early morning hours of 24 October, she evaded some 40 enemy planes slipping past the combat air patrol (CAP) to attack the task group. She aided carrier Princeton (CVL‑23), badly damaged by a Japanese bomb at 0938. In the space of less than two hours, Morrison rescued four hundred survivors. At 1245, she came alongside the burning carrier to assist in firefighting efforts. Heavy smoke reduced visibility to 30 feet as the smaller destroyer maneuvered alongside. She had just reached her position when Princeton, drifting and rolling, wedged the destroyer’s mast and forward stack between her uptakes.
The two tangled ships continued to bash against one another in the heavy seas. Assessing the situation, Cmdr. Daniel B. Miller, Irwin (DD‑794)’s commanding officer, ordered his ship to come alongside Morrison twice in an attempt to breast her fellow destroyer out using mooring lines, but the lines parted both times. Both Princeton and Morrison, still entangled, caused damage to one another. Princeton’s stacks, searchlight platform, main battery director, and port side of the bridge were all smashed up. Her mast at bridge level broke completely off. The damage to Morrison was largely superficial.
Morrison finally managed to break free, but at 1525, Princeton’s aft section exploded, blowing off her fantail. Light cruiser Birmingham (CL-62), having just taken the destroyer’s position alongside Princeton, suffered heavy casualties from a shower of shrapnel, killing 300 while wounding another 400. The same explosion may very well have sunk the smaller and much lighter Morrison, had she remained on station. The damage to Princeton was so extensive, it became necessary to sink her. Destroyer Irwin (DD-794) ineffectively fired five torpedoes at her before cruiser Reno (CL-96) sent two torpedoes into Princeton’s main magazine, triggering a huge explosion and sending her to the bottom in only 45 seconds.
Bkr2c Stanley F. Sedicavage, a survivor from Princeton, rescued the previous day by Morrison, succumbed to severe shrapnel wounds on the morning of 26 October 1944. He received a burial at sea with full honors from Morrison’s crew at 1001. With Princeton survivors on board, Morrison steamed from the operating area off the Philippines en route to Ulithi, in company with Irwin and Birmingham, all suffering damage from Princeton rescue efforts. Four days after the horrific event, on 28 October 1944, Cmdr. James R. Hansen reported on board as prospective commanding officer. TF 38.1 stood into anchorage at Ulithi on the same day.
Morrison suffered enough damage during the attempted rescue of Princeton to send her Stateside for repairs. Over the next several days, while anchored in Ulithi Lagoon, Morrison received minor repairs. She finally made way for Pearl Harbor on 31 October 1944, arriving there on 7 November. Steaming from Oahu three days later, she arrived on 17 November, mooring at Hunters Point Naval Dry Docks, just outside San Francisco. Morrison’s enlisted men were given 25 days leave, while her officers enjoyed 16. She spent the remainder of the year through February 1945 in dry dock at Hunters Point.
Morrison cast off on 10 February 1945, steaming for Pearl Harbor and arriving at Oahu on 15 February. Missing the Battle of Iwo Jima (19 February–26 March), she joined TF 54 underway out of Ulithi for Okinawa on 21 March. After a period of shore bombardment exercises, she steamed to the southern shores of Okinawa on 25 March, D-minus 7, and commenced bombardment of the island in preparation for the 1 April landings.
On 31 March 1945, fellow destroyer Stockton (DD-646) made a positive sound contact and expended her remaining depth charges in an anti-submarine attack. Morrison, sent to assist, also obtained a sound contact. Lookouts saw the sub on the surface quickly dive, and “Mighty Moe” dropped a pattern of eleven depth charges, forcing the enemy submarine back to the surface seconds later. In a half-hour gunfight, the submarine fired her deck guns while Morrison opened up with 40-millimeter and 5-inch gunfire, eventually destroying and sinking the enemy submarine.
Morrison cruised the area throughout the night, discovering a large oil slick and debris early the next morning. She also discovered a lone survivor clinging to a small spar in the middle of the flotsam. Rescued by the destroyer’s small boat, the enemy sailor, PO2c Mukuai Takamasa, proved in excellent condition, but unwilling to give any information. Turned over to an intelligence officer at Kerama Retto, the prisoner identified his submarine as I-8 (Lt. Cmdr. Shinohara Shigeo, commanding), one of the largest in the Imperial Japanese Navy. Operating off Okinawa, Lt. Cmdr. Shinohara hoped to strike supporting American vessels. Despite recently undergoing an overhaul to carry four smaller kaiten suicide submarines, I-8 received none for her final mission to Okinawa.
Morrison resumed shore bombardment, night and harassing fire duties off Oshima Beach to support ground forces on Okinawa. Attacked by suicide boats on the night of 11 April 1945, Morrison assisted Anthony (DD‑515) in illuminating and sinking the suiciders, as well as enemy landing craft heading north along the beach. Three days later, on 14 April, Morrison drew radar picket duty, also known as the “graveyard shift.” Crews gave such duty this nickname because the ships were far forward of most other U.S. naval vessels, keeping everyone on edge for hours and days at a time until relieved.
As Morrison began her duties on station, kamikaze attacks continued in earnest, damaging or sinking over a destroyer a day off Okinawa. The majority of these attacks were against radar picket ships. Obtaining the extra radio equipment necessary, plus a fighter-director team, Morrison’s first stations, numbers ten and seven, to the southwest of the island, were uneventful. Nothing of note happened during the day, and at night, an occasional air raid developed, but no attacks materialized. Meanwhile, kamikazes were knocking out other radar picket stations, especially those to the north of Okinawa.
Sent to radar picket station number two on 28 April 1945, Morrison replaced Daly (DD‑519) after a kamikaze struck the latter. Morrison remained at general quarters for hours as enemy planes buzzed around her all night long. None of the suicide planes attempted to strike her, and fortunately, the next three days were cloudy, grounding the kamikazes.
Ordered north of Okinawa to take up station number one on 30 April 1945, Morrison arrived at the hottest spot on the radar picket line and scene of the most kamikaze strikes. Expecting a heavy attack of suiciders on the first clear day, Morrison again remained at general quarters over the next few days.
On 4 May 1945, the weather dawned “bright, clear and ominous.” The expected attack, in the form of around 25 kamikazes, finally arrived at 0715. The CAP rose to meet them, shooting most of the enemy planes down, although a few managed to sneak through. The first attack on Morrison, a main target as a fighter-director ship, was a strafing run by a Mitsubishi A6M Zero (Zeke). The kamikaze streaked through heavy flak, dropping a bomb that missed just off her starboard beam, doing no damage. About 0825, another enemy plane, possibly a Zeke or Aichi D3A Type 99 carrier bomber (Val), crashed into Morrison’s number one stack and the bridge, causing heavy casualties.
The damage was severe, knocking out Morrison’s radar, radios, and main battery. As damage control teams began fighting fires and helping the wounded, a third plane smashed into gun number three only a few minutes later, while the fourth kamikaze screamed in, crashing into gun number 5. Morrison, struck by four planes in less than five minutes, listed badly to starboard and burned furiously. There are conflicting reports regarding the type of Japanese planes striking Morrison. The first to hit was apparently a Zero, or Zeke, while the other kamikazes were two Val’s and another Zeke. Despite this, Japanese records claim the last three planes to slam into Morrison were floatplanes.
Verbal instructions to abandon ship passed amongst the crew after Cmdr. Hansen’s order via the 1MC did not circulate, due to communication circuits damaged by the kamikazes. Shortly after the order made its way around the destroyer, two large explosions occurred simultaneously, causing Morrison’s stern to sink beneath the water as she rapidly rolled onto her starboard side. With her bow lifted high into the air, Morrison sank at 0840, just ten minutes after the kamikaze attacks. Due to the swiftness of her sinking, most of the crew working below decks were lost; consequently, she took 152 sailors to the bottom.
Japanese planes strafed some of the survivors in the water, and several were rescued, many by large support landing craft LCS(L)-21. The wounded were transferred to hospital ship Mercy (AH-8) and travelled on to Guam before being sent home as the war ended in August 1945.
Commander Hansen received the Navy Cross for his actions during the battle off Okinawa. Fighting off 40 enemy planes, he “carried out radical defensive maneuvers and directed his gun batteries in maintaining a tremendous volume of antiaircraft fire.” Cmdr. Hansen continued to rally his men, even after four kamikazes crashed Morrison, fighting until the very end.
Morrison received the Navy Unit Commendation award twice. The first award due to her actions on 24 October 1944, while saving survivors from Princeton, and the second award for her valiant fight against kamikazes on 4 May 1945. She was stricken from the Navy Register on 22 June 1945.
In July 1957, the U.S. Navy donated Morrison’s hull, along with those of some 26 other ships sunk in the Ryukyus area to the government of the Ryukyu Islands for salvage.
Morrison received eight battle stars for World War II service.
||Date Assumed Command
|Cmdr. Walter H. Price
||18 December 1943
|Cmdr. James R. Hansen
||28 October 1944
Guy J Nasuti
12 August 2019 | <urn:uuid:a6ec12e7-f3b1-4de8-a383-8fb366937104> | {
"date": "2020-01-23T22:18:40",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9564893841743469,
"score": 2.6875,
"token_count": 6793,
"url": "https://www.history.navy.mil/research/histories/ship-histories/danfs/m/morrison.html"
} |
Niagara Falls in Niagara County, New York — The American Northeast (Mid-Atlantic)
Three Sisters Islands
These picturesque islands have also been known as the "Moss Islands" because fine growths of moss once covered their rocks. The smooth surfaces of the rocks and the great number of potholes are clues that these islands were once submerged beneath the rapids. In recent years, the islands have increased in size because of the diversion of water upriver for the hydroelectric power plants.
The Three Sisters Islands were named for the daughters of Parkhurst Whitney, a local businessman and a decorated War of 1812 veteran. In the spring of 1816, when ice jams in the shallow rapids created natural bridges between the islands, Whitney took his three daughters on a walk out to the farthest island. Whitney was so proud of the success of their adventure, that he convinced Augustus Porter, the islands' new owner, to name them after his daughters. The nearest was named Asenath, the next, Angeline, and the farthest Celinda Eliza. The island adjacent to Celinda Eliza is called "Little Brother," after the Whitney daughters' brother Solon.
In 1829, Francis Abbott, a young Englishman, came to Niagara Falls on a visit and was so taken
[Photo captions, from top left around to top right, read]
Parkhurst Whitney • Bridge to 1st Sister Island. "Hermit's Cascade" is in the background. • Asenath Whitney • Suspension bridge to 2nd Sister Island • Angeline Whitney • Goat Island and Three Sisters Islands looking from Canada, ca. 1868 postcard.
Images courtesy of Niagara Falls Public Library.
Erected by Niagara Falls State Park.
Location. 43° 4.773′ N, 79° 3.945′ W. Marker is in Niagara Falls, New York, in Niagara County. Marker is at the intersection of Goat Island Road and Three Sisters Island Parking Area, on the left when traveling west on Goat Island Road. Marker is on Goat Island, part of Niagara Falls State Park. Touch for map. Marker is in this post office area: Niagara Falls NY 14303, United States of America. Touch for directions.
Other nearby markers. At least 8 other markers are within walking distance of this marker. Goat Island Flora (here, next to this marker); The Niagara Portage (approx. ¼ mile away); The Parting of the Waters (approx. ¼ mile away); Cave of the Winds and Bridal Veil Falls (approx. ¼ mile away); The Cave of the Winds (approx. ¼ mile away); The Power of the American Rapids (approx. 0.3 miles away); Niagara River Corridor Important Bird Area (approx. 0.3 miles away); Cave of the Winds Elevator (approx. 0.3 miles away). Touch for a list and map of all markers in Niagara Falls.
Also see . . .
1. Three Sisters Islands. (Submitted on August 4, 2014, by William Fischer, Jr. of Scranton, Pennsylvania.)
2. History of America's Oldest State Park. (Submitted on August 4, 2014, by William Fischer, Jr. of Scranton, Pennsylvania.)
Categories. • Environment • Settlements & Settlers • Waterways & Vessels •
More. Search the internet for Three Sisters Islands.
Credits. This page was last revised on June 16, 2016. This page originally submitted on August 4, 2014, by William Fischer, Jr. of Scranton, Pennsylvania. This page has been viewed 357 times since then. Photos: 1. submitted on November 20, 2014, by J. J. Prats of Powell, Ohio. 2, 3, 4, 5, 6, 7, 8. submitted on August 4, 2014, by William Fischer, Jr. of Scranton, Pennsylvania. | <urn:uuid:8e344680-27f1-4f9d-b1b2-4927121d85e4> | {
"date": "2020-01-23T23:14:42",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9273515939712524,
"score": 3,
"token_count": 817,
"url": "https://www.hmdb.org/m.asp?m=75986"
} |
[DeGouw2000] "Proton-transfer chemical-ionization mass spectrometry allows real-time analysis of volatile organic compounds released from cutting and drying of crops",
Environmental science & technology
, vol. 34, no. 12: ACS Publications, pp. 2640–2648, 2000.
The wounding and drying of plant material during crop harvest could be a significant source of volatile organic compounds (VOCs) that enter the atmosphere. Here, we show that these primarily oxygenated VOCs can be measured using proton-transfer chemical-ionization mass spectrometry (PT-CIMS), a method that allows online and simultaneous monitoring of oxygenated VOC levels. For clover, alfalfa, and corn, leaf wounding and in particular drying were shown to lead to strongly enhanced emissions of a series of C6 aldehydes, alcohols, and esters derived from (Z)-3-hexenal. Additionally, for the forage crops clover and alfalfa, enhanced emissions of methanol, acetaldehyde, acetone, and butanone were observed. The identities of the measured carbonyl compounds were confirmed using high-pressure liquid chromatography. For clover, initial cutting led to a VOC release of about 175 μg of C (g dry wt)-1, while during drying the cut clover released >1000 μg of C (g dry wt)-1; qualitatively, similar amounts of VOCs were released from alfalfa, the major hay crop in the United States. The atmospheric implications of these findings may include effects on the local air quality in agricultural areas, contributions to long-range transport of pollutants, and effects on the formation of HOx (=OH + HO2) radicals in the upper troposphere. | <urn:uuid:d6d6514b-2e96-49c6-9c48-89a6b72e80fe> | {
"date": "2020-01-23T22:21:06",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9222005605697632,
"score": 2.84375,
"token_count": 374,
"url": "https://www.ionicon.com/publications?f%5Bauthor%5D=818&%3Bqt-main_navigation=3&qt-main_navigation=2"
} |
The Mitigation of CO2-emissions in the cement industry is becoming a must in most countries. One of the levers, the reduction of the clinker factor, is usually seen as impacting the cement quality. In addition, current supplementary cementitious materials like reactive fly ash and slag are currently limited to less than 20% of cement demand worldwide and this will decrease in the near future.
For the last five years our team from the Swiss École Polytechnique Fédérale de Lausanne (EPFL) has been working on a new cement called LC3 made of only 50% clinker content in cement plus a combination of calcined clay (30%) and limestone (15%).
LC3 is ready to be implemented and mentioned as a key technology to combat climate change and to be considered regarding frameworks.
In the following two pages, we show exemplary how LC3 contributes to achieving the Sustainable Development Goals (SDGs) and Nationally Determined Contributions (NDCs). | <urn:uuid:c9f46027-9dbe-4d5b-978c-efd2866a1540> | {
"date": "2020-01-24T00:12:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9413043856620789,
"score": 2.78125,
"token_count": 203,
"url": "https://www.lc3.ch/lc3-and-environmental-policies/"
} |
North West Mounted Police Stables
Former N.W.M.P. Stables
Ancienne écurie de la P.C.N.-O.
Links and documents
Listed on the Canadian Register:
Statement of Significance
Description of Historic Place
The North-West Mounted Police (N.W.M.P.) Stables, also known as the Former N.W.M.P. Stables, is located on what was the site of Fort Herchmer and later became the south end of Dawson City in the ‘Government Reserve’. It is a timber structure with a gable roof that features a louvred cupola. The designation is confined to the footprint of the building.
The N.W.M.P. Stables is a Recognized Federal Heritage Building because of its historical associations, and its architectural and environmental values.
The N.W.M.P. Stables is closely associated with the North-West Mounted Police, and its role in the rapid, early development of Dawson City during the Klondike Gold Rush. The structure is associated with the establishment of law and order, and the exercise of Canadian sovereignty in the northern territories. It is also one of Canada’s few remaining N.W.M.P. buildings from this period.
The N.W.M.P. Stables is valued for its good, simple aesthetic. It is a timber frame building designed to accommodate horses in sub-arctic frontier conditions. The structure retains its functional character despite being reduced by about 40% sometime prior to 1925. The structure exhibits good functional design and good workmanship and materials.
The N.W.M.P. Stables reinforces the character and previous role of the government reserve area taken in association with the surviving structures of Fort Herchmer. It is a familiar landmark to residents and visitors.
Brian Dewalt, N.W.M.P. Stables, Government Reserve, Site 4, Parcel U4, Dawson City, Yukon, Federal Heritage Buildings Review Office Report 87-069; Former N.W.M.P. Stables, Dawson, Yukon Territory, Heritage Character Statement 87-069.
The character-defining elements of the N.W.M.P. Police Stables should be respected.
Its good functional design and good construction and materials, as evidenced in:
- the simple, functional form of the structure, the rectangular massing formed by the gable-roofed structure;
- the timber frame construction and the timber siding of the exterior walls;
- the functional features that characterize it as a stable such as the ventilated cupola, and the narrow stall windows;
- the large multi-paned window in each gable;
- the double doors that provide access.
The manner in which the N.W.M.P. Stables reinforces the Fort Herchmer complex setting and is a familiar landmark, as evidenced by:
- its overall design and materials that harmonize with the surroundings and with the other buildings withinin the fort setting;
- its role as an important component of the group of four surviving structures from the Fort Herchmer complex, which makes it familiar to locals and visitors.
Government of Canada
Treasury Board Heritage Buildings Policy
Recognized Federal Heritage Building
Theme - Category and Type
Function - Category and Type
- Police Station
Architect / Designer
Location of Supporting Documentation
National Historic Sites Directorate, Documentation Centre, 5th Floor, Room 89, 25 Eddy Street, Gatineau, Quebec
Cross-Reference to Collection
North West Mounted Police Jail
The North West Mounted Police (N.W.M.P.) Jail, also known as the former N.W.M.P. Hospital and Jail is located on a rectangular block of land on what was the site of Fort Herchmer…
NWMP Married Quarters
The North-West Mounted Police (N.W.M.P) Married Officers’ Quarters is located on the ‘Government Reserve’, a rectangular block of land, on what was the site of Fort Herchmer in… | <urn:uuid:d6cc7716-912a-4ba3-b967-f020bc25e847> | {
"date": "2020-01-23T23:14:30",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9207490682601929,
"score": 2.53125,
"token_count": 877,
"url": "https://www.lieuxpatrimoniaux.ca/en/rep-reg/place-lieu.aspx?id=9842"
} |
Susan La Flesche glanced out her window at the Nebraskan prairie as she finished braiding her long black hair. Impatient to be out where the wind blew cool and free, she hurried to get ready before the last star disappeared from the sky.
Running out the door of her home, laughing with the pure joy of the morning, the young girl took out her favorite pony. Riding bareback into the dawn, she urged the pony to go a little faster. All the while, she carefully guided him away from any holes that might hurt his legs.
The golden light spanning the sky slowly faded. Susan turned her pony around now, aware of the lonely sound of his hooves clip-clopping over the ground. No longer did the noise of the buffalo thunder over the prairie. No longer did the sound of thousands of wings brush the sky.
Original lands of the Omaha and other Plains tribes are in green. Reservation lands are in orange.
Born on June 17th in 1865, Susan lived on the Omaha Reservation in northeastern Nebraska. Relegated to a small percentage of the former land of the Omaha Tribe, they could no longer hunt whatever buffalo had survived the guns of the newcomers. They had to wait for meat that had been promised but rarely came. Susan's father cut into his own herd of cattle to keep his people from starving.
Why Didn't He Care?
Now, Susan gently reined in her pony as a familiar sight came into view. She studied the scene once more, analyzing it with both her mind and heart.
An Omaha woman stood pleading with the European doctor who was in charge of health care at her reservation. His attention was on the horizon and he listened with an air of disinterest fading into boredom.
Susan could not understand it. He had spent years studying to become a doctor.
Why didn't he care?
Susan, still a child, would later watch a sick woman die because the doctor would not give her proper treatment. On that day, Susan reached up and took the last star from the sky. She held it in her hand and it burned there with the fire of her desire to become a doctor herself. When she became an adult, never again would one of her people die needlessly if she could help it.
Susan La Flesche was the youngest of four daughters born to Joseph (Iron Eye) and Mary (The One Woman) La Flesche. Her parents emphasized the importance of reading and education, and she attended a boarding school on her reservation until the age of 14.
She went on to attend the Elizabeth Institute for Young Ladies in New Jersey. Later, she attended Virginia's well-regarded Hampton Institute. Originally founded for newly-freed slaves, the Institute now accepted Native Americans as well.
Susan was inspired by her classes and immersed herself in the study of
literature, mathematics, physiology and writing, among other subjects. Blessed with a sunny nature and smile, Susan nevertheless studied as if many lives depended on her hard work. In her heart, Susan knew she wanted to make a difference and never lost sight of her dream.
A large part of her dream came true when she was accepted by the Women's Medical College in Philadelphia. She was concerned about how she would do in these advanced courses and if she would be excluded from the social life at the college.
Susan found she was warmly welcomed by her new roommate and the other young women at the college. In her rare spare time, she toured the museums and monuments dedicated to America's freedom. She received many curious looks and some stares, but she walked with her back straight and head high. She kept to her purpose of being in Philadelphia.
Again in a hurry, Susan completed the three-year coursework in only two years. She became the first Native American woman to earn a medical degree, graduating in the top half of her class.
Physicians in the late 19th century. Susan is in the second row from the back, fourth from the right.
Doctor Sue Begins Her Work
Dr. Susan La Flesche returned to the reservation as she'd promised. Only 24, she threw herself into a rigorous routine of meeting the urgent needs there. In the freezing cold of winter or during the hot, dusty summers, Susan never turned away a patient of any heritage.
Her day usually began in the dawn hours that she loved. She would head out on horseback and later in a buggy. She'd often return, exhausted, at 10:00 at night.
Dr. La Flesche used her young adulthood to care for everyone who needed her, fighting measles, tuberculosis, malnutrition and the harrowing disease of alcoholism. Hating what she saw happening to those affected, she campaigned against liquor on the reservation.
To counteract the negative forces, Susan began a reading room stocked with books, magazines, plants and games for the children. In addition, she started a night school, Sunday School and a church. Clubs on various subjects for young people were also held regularly.
Hardships and Heartbreak
It took all her energy to be the only physician in a wide territory, and Susan's health began to fail. She developed earaches and pain from being out in the biting cold of sub-zero temperatures. She had to take time off to recuperate, but she still helped anyone who needed her to translate papers or to fight for legal rights.
From left, Susan, her sister Marguerite, Marguerite's husband, Walter, and seated, Henry Picotte.
She also found happiness and sorrow as a wife. She married a man of Sioux heritage, Henry Picotte, in 1894. In another break from societal expectations, Henry was proud of his wife's work and helped take care of their two sons when she went out on calls.
Susan's life was full until one of the most serious diseases on the reservation finished its grip on her own family. Her husband died of the effects of alcoholism in 1905.
A New Dream
She had a new dream now: a hospital where the critically ill could be cared for in a proper and clean environment. She again poured her life into being a physician, raising funds to realize the dream of a hospital on the reservation. The hospital opened its doors in 1913. Always an advocate of cleanliness, sunshine and fresh air, Susan made sure the building had plenty of windows. Even as she went about her duties, as the doctor in charge of the hospital, she continued to struggle from the effects of the hardships on her own health.
On September 18th, 1915, Dr. La Flesche Picotte passed away at the age of 50. Her funeral was attended by all those who loved and respected her, and owed their lives to her. Before the last star disappeared, she had brought hope and help at a critical time to the people she had cared for and loved.
The Susan La Flesche Picotte Memorial Hospital was made a National Historic Landmark in 1993.
One of the characters in my book, Mystery Shores, is a young Native American girl who is determined to become a doctor. Dr. Susan La Flesche Picotte is definitely an inspiration to her. My novel of secrets unfolds on a remote lighthouse island in 1893. Mystery Shores is available now at Amazon.com | <urn:uuid:f94309cd-a8d8-47b8-b486-011df86e1723> | {
"date": "2020-01-23T23:54:59",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9838261604309082,
"score": 2.875,
"token_count": 1499,
"url": "https://www.lindaborromeo.com/single-post/2016/03/18/Freedom-at-Dawn-The-Inspiring-Story-of-Trailblazing-Doctor-Susan-La-Flesche-Picotte"
} |
Excessive amounts of sodium in your diet will most likely send your blood pressure up, increasing your risk of heart disease over time. No matter which soft drink you turn to, though, regular or diet, you won't get a lot of sodium. Just because sodas are low in sodium, however, doesn't mean you should drink them regularly. Often they're still full of empty calories from sugar, which eventually causes weight gain that can add stress on your heart.
Colas and Pepper Flavors
The sodium level in regular colas is generally the same in both caffeinated and noncaffeinated varieties. Drinking a 12-ounce can of cola gives you around 12 milligrams of sodium. Low-calorie caffeinated diet colas can have up to 24 milligrams of sodium in 12 ounces. But usually noncaffeinated diet colas have about the same 12 milligrams of sodium as regular colas. Regular caffeinated pepper-type soft drinks have 36 milligrams of sodium in 12 ounces. If you prefer caffeinated low-calorie pepper-flavored soft drinks, you'll get up to 60 milligrams of sodium, while noncaffeinated diet varieties have around 12 milligrams per 12-ounce serving.
Bubbly lemon-lime and other fruity soft drinks often have more sodium than most colas. If you drink 12 ounces of lemon-lime soda pop, you'll get about 36 milligrams of sodium. Orange sodas have closer to 50 milligrams per 12-ounce serving. If you prefer grape flavor, you'll get around 60 milligrams of sodium in the same serving size.
Ginger ale is slightly lower in sodium than fruity soft drinks, giving you roughly 24 milligrams in a 12-ounce serving. Chocolate soda has half that amount for the same portion size. Cream soda and root beer are at the higher end for sodium content among sweet-flavored soft drinks. Twelve ounces of either of these soft drinks contain about 48 milligrams of sodium.
Whether you add soda water -- also known as club soda -- or tonic water to mixed drinks or sip them over ice, you'll be getting more sodium than most other carbonated drinks. A 12-ounce can of soda water contains about 72 milligrams of sodium, while the same serving of tonic water has less than 50 milligrams of sodium
Your Sodium Allowance
You can have up to 2,300 milligrams of sodium daily, as long as you're healthy. So that 12-ounce can of cola represents less than 3 percent of your entire sodium allowance for the day. According to the Dietary Guidelines for Americans 2010, if you have kidney problems, diabetes or hypertension, or you are living with another chronic ailment, you should limit your daily sodium intake to 1,500 milligrams. If you are in this category, depending on which soft drink you choose, one can has up to 5 percent of your daily sodium allowance. | <urn:uuid:cb2896eb-e5a7-4e69-a637-59ca935a2b05> | {
"date": "2020-01-23T23:23:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9223120212554932,
"score": 2.625,
"token_count": 614,
"url": "https://www.livestrong.com/article/273911-sodium-levels-in-soft-drinks/"
} |
Hospitals are often described as being cold and sterile places. This atmosphere certainly isn’t by accident either. In a place where patients are already struggling with a health issue or have open wounds, infections and the spread of bacteria or other pathogens are a major concern.
It isn’t just the bleached clean walls, beds and machinery that receive attention. Patients are also given antibiotics to help control or kill any harmful bacteria that may find its way into the body. Vital Signs recently published a report by the Centers for Disease Control and Prevention that showed that some hospitals may be over-sterilizing patients with too many antibiotics.
The mood of the report fits the old adage of “everything in moderation.” Antibiotics are a good thing, but too many antibiotics and a patient could be put at risk for “infections, allergic reactions and intestinal infections that can be deadly” but have become resistant to current medications.
The report found that some hospitals give patients up to three times the amount of antibiotics than other hospitals. But did you know that reducing the level of antibiotics can actually reduce the number of infections?
Need hard data? The CDC report used Clostridium difficile or C. diff as an example. “Reducing the use of high-risk antibiotics by 30% can lower deadly diarrhea infections by 26%” was a statistic written in the report.
“We have to protect patients by protecting antibiotics,” said CDC Director Dr. Thomas Frieden. The statement leaves room for medical malpractice questions. Amputating the wrong leg is a much clearer mistake, but is this? Does a patient who contracts a drug-resistant strain of bacteria after over-medication have a medical malpractice claim?
It is situations such as this one why injured patients should have a conversation with a Connecticut attorney to determine if they may have a medical malpractice claim.
Source: CNN, “CDC: Hospitals contributing to rise of superbugs,” Katy Mersmann, March 5, 2014 | <urn:uuid:802fe8dc-e534-449c-90ce-2863796e03ce> | {
"date": "2020-01-23T22:14:44",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9521470665931702,
"score": 3.15625,
"token_count": 422,
"url": "https://www.ltke.com/blog/2014/03/are-some-connecticut-hospitals-becoming-too-sterile.shtml"
} |
Northern Saw-whet Owl
The Northern Saw-whet Owl is a wide-spread owl species found in Maine’s mixed and conifer forests. The edges of swamps and riparian zones along rivers and streams are particularly suitable for these owls. They are vocal in the spring, calling throughout the night, and peaking about 2 hours after sunset. These monotonous series of whistles which can be heard over great distances are used to advertise territories and court mates. Northern Saw-whet Owls are cavity nesters and nest within woodpecker excavations or man-made nest boxes. Fledged young typically stay in the vicinity of the nest and are fed by the male (and occasionally the female) for at least 1 month.
Safe Dates: April 1st to August 1st (applicable for only the S or H codes).
Breeding Evidence: Northern Saw-whet Owls can occasionally be found by day roosting in small conifers. For observations of these silent Saw-whet Owls within the safe dates and in appropriate breeding habitat, use code H. If you hear one singing its monotonous whistled song within the safe dates, use code S. The simplest way to upgrade this to a “Probable Breeder” is to listen again at the same location 7 or more days later to upgrade the code to S7. If there is evidence of young owls in the nesting cavity, use code NY, but note that we strongly discourage closely approaching or disturbing nesting birds. | <urn:uuid:06449bad-4bbe-454b-aedf-9f7e0231ab5e> | {
"date": "2020-01-23T23:20:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9358575344085693,
"score": 3.078125,
"token_count": 317,
"url": "https://www.mainenightjar.com/northern-saw-whet-owl"
} |
STEM Projects and PuzzlesBuild cool stuff and solve fun puzzles while learning STEM, engineering, and coding skills
Our free STEM projects and puzzles will help get kids excited about STEM!
Build circuits to learn engineering skills. Write code to develop programming skills . Solve logic problems to develop analytical thinking. New puzzles and projects added often, so keep coming back for more!
Project-based learning is where students gain knowledge and skills by investigating and responding to authentic, engaging, and complex questions, problems or challenges. It’s a teaching method you’ll often find in classrooms, homeschools and learning centers, and -...read more
Parents can spend up to $1,000 a month on after school coding camps, hoping to instill the life-long value of STEM skills in their children. We get it: learning STEM is important, and we think that being exposed to coding as early as possible makes for a...read more
STEM is for everyone! And it doesn't take too long or too much money for your kiddos (or you!) to learn essential skills in science and engineering. We pulled together three projects that don't take too much time or cash - and still give you a fun time,...read more
Take a Field Trip Take virtual field trips to the cultures, times and places you’re learning about in your current curriculum. Have students do independent research on a home computer, compiling photos and information, and maybe even have them teach YOU what they’ve...read more
Making Screentime Productive There are lots of articles that discuss why screen time is bad for kids, and explain how much screen time is good for kids, as well as tools for limiting it. Out-of-school time creates more time for parents and students to argue about...read more
Taking STEM on the Road Are you hitting the road this summer? Road trips are a mainstay of summer time! Traveling to new destinations, combined with lots of time in the car, allow for lots of opportunities to keep minds active and engaged while you are on the road. ...read more
Summer has arrived, and somehow everyone’s already bored or sucked inside of a television. Panic has set in and you’re wondering how to keep little minds learning, growing and occupying themselves with constructive creativity. Well, you’re in luck - Here’s our Summer...read more
According to John Spencer, co-author of Launch: Using Design Thinking to Boost Creativity and Bring Out the Maker in Every Student, a makerspace is “...simply a space designed and dedicated to hands-on creativity.” When we think of a makerspace, we think of an area in...read more
Test your problem solving ability with this recycling logic puzzler!Four recycling trucks arrive in different days, and in different times, to collect recycling materials.What is the color of the truck that collects batteries? Use the chart and clues below to help you...read more
5 Great STEM Activities for OutdoorsSpring is here! The beautiful weather calls us outside, and creates the perfect opportunity to bring learning outdoors. Check out these ideas to encourage STEM learning while taking advantage of the great outdoors!...read more | <urn:uuid:acf938b9-a33d-45f2-8d00-bd8bdfb25094> | {
"date": "2020-01-24T00:03:41",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9410349726676941,
"score": 3.84375,
"token_count": 661,
"url": "https://www.makecrate.club/stem-projects-and-puzzles/"
} |
For battery charging, the highly efficient step-down (buck) configuration is usually the topology of choice. But a different approach is required if special conditions prevail: if the supply voltage is less than the battery voltage, or (worse) if the supply voltage ranges above and below the battery voltage. The charger might need to accommodate one of several voltage sources, depending on to which is active, and it might need to charge batteries with different cell counts. All of these requirements can be met with the Figure 1
circuit, which charges 1 to 15 cells from an input of 4V to 15V.
Figure 1. This versatile battery charger is built around the controller IC, which is forced to produce an average current at an amplitude regulated by the op amp.
The topology shown is the single-ended, primary-inductance converter (SEPIC), which is notable for its step-up/step-down capability. The controller (IC1) usually regulates an output voltage, but in this case the resistive dividers at pin 3 keep the feedback unsatisfied, causing the system to produce current pulses at a level determined by its current-limit circuitry. To regulate charging current, the op amp adjusts Q1's current limit by comparing the R2 voltage (proportional to charging current) with a voltage derived from the reference in IC1. S1 and S2 let you set the charging-current level.
The maximum Q1 current set by R1 (4A) is within the capability of L1, but it allows some saturation and heating. If this peak inductor current is insufficient, IOUT
will fall gracefully short of the desired maximum value (1A). If VIN
is high and VOUT
is low, you can obtain more charging current by changing resistor values at the op amp's inverting input. Otherwise, higher current requires that you set a higher peak current by lowering R1. In that case, L1, L2, C1, and C2 must be larger to withstand the higher currents.
To limit the voltage stresses on Q1, C1, C2, and D1, the resistor values connected at pin 3 of IC1 set a maximum output voltage of 28V across the battery. You can extend this voltage by adjusting the resistors, but note that Q1 and D1 must withstand slightly more than VIN
, and the coupling capacitor (C1) must withstand VIN
. The full charging current flows through C1, so be sure that any substitutes can handle the required voltage and the ripple current. C1 and C2 are nonpolarized ceramic capacitors, but maintain the polarities shown if you substitute polarized capacitors.
As shown, the maximum VIN
is about 15V. This value can be higher if you limit the supply voltage applied to IC1 (pin 2). Either add a linear regulator for this purpose, or replace the MAX770 with a MAX773, which takes its power from a built-in shunt regulator. Note that any coupling between L1 and L2 will assume the polarities shown by the dots, but circuit operation does not depend on such coupling. | <urn:uuid:56d7eaa8-de50-484f-adbe-c96ed1422621> | {
"date": "2020-01-23T23:59:03",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9015322327613831,
"score": 3.421875,
"token_count": 653,
"url": "https://www.maximintegrated.com/en/design/technical-documents/app-notes/1/179.html"
} |
What is thirdhand smoke, and why is it a concern?
Answer From J. Taylor Hays, M.D.
Thirdhand smoke is residual nicotine and other chemicals left on indoor surfaces by tobacco smoke. People are exposed to these chemicals by touching contaminated surfaces or breathing in the off-gassing from these surfaces. This residue is thought to react with common indoor pollutants to create a toxic mix including cancer causing compounds, posing a potential health hazard to nonsmokers — especially children.
Thirdhand smoke clings to clothes, furniture, drapes, walls, bedding, carpets, dust, vehicles and other surfaces long after smoking has stopped. The residue from thirdhand smoke builds up on surfaces over time. To remove the residue, hard surfaces, fabrics and upholstery need to be regularly cleaned or laundered. Thirdhand smoke can't be eliminated by airing out rooms, opening windows, using fans or air conditioners, or confining smoking to only certain areas of a home.
Children and nonsmoking adults might be at risk of tobacco-related health problems when they inhale, swallow or touch substances containing thirdhand smoke. Infants and young children might have increased exposure to thirdhand smoke due to their tendency to mouth objects and touch affected surfaces.
Thirdhand smoke is a relatively new concept, and researchers are still studying its possible dangers. In the meantime, the only way to protect nonsmokers from thirdhand smoke is to create a smoke-free environment.
J. Taylor Hays, M.D.
July 13, 2017
- Samet JM, et al. Secondhand smoke exposure: Effects in children. https://www.uptodate.com/home. Accessed June 9, 2017.
- Samet JM, et al. Control of secondhand smoke exposure. https://www.uptodate.com/home. Accessed June 9, 2017.
- Bahl V, et al. Thirdhand cigarette smoke: Factors affecting exposure and remediation. PLOS One. 2014;9:e108258.
- Goniewicz ML, et al. Electronic cigarettes are a source of thirdhand exposure to nicotine. Nicotine and Tobacco Research. 2015;17:256.
- Ventilation does not effectively protect nonsmokers from secondhand smoke. Centers for Disease Control and Prevention. https://www.cdc.gov/tobacco/data_statistics/fact_sheets/secondhand_smoke/protection/ventilation/index.htm. Accessed June 9, 2017.
- Hays JT (expert opinion). Mayo Clinic. Rochester, Minn. June 16, 2017.
- Sleiman M, et al. Formation of carcinogens indoors by surface-mediated reactions of nicotine with nitrous acid, leading to potential thirdhand smoke hazards. PNAS. 2010;107:6576. | <urn:uuid:bf18ea5e-3b1e-460f-bcf7-47c6255daf8b> | {
"date": "2020-01-23T23:40:55",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9158858060836792,
"score": 3.515625,
"token_count": 588,
"url": "https://www.mayoclinic.org/healthy-lifestyle/adult-health/expert-answers/third-hand-smoke/faq-20057791?p=1"
} |
With the intense heat during the summer in Italy it is especially important to make sure you are staying hydrated and properly taking care of your body. Some of the most common and preventable illnesses that occur in the summer are heat related. With that said there are many things you can do such to help prevent these illnesses those include drinking enough water, maintaining proper nutrition, protecting yourself from extreme heat, and more.
How to stay hydrated?
As most people know water plays a huge role in preventing dehydration as it makes up around 60 percent of your body weight. With water being extremely important to stay hydrated many may be wondering what the best water is to drink around Italy. Fortunately, throughout Italy there are many fountains located all over that provide fresh cold drinking water that is completely free. You can either carry around a water bottle and refill it or you can simply hold your hand over the end of the spout to block the water flow and watch a thin arch stream from the top of the spout. If you are not satisfied with the fountains you may purchase bottled water or drink from the tap as long as it is safe to do so.
How to maintain proper nutrition?
Another thing that plays an important role in your overall health and avoiding heat related illnesses include making sure you are maintaining proper nutrition. Throughout Italy it is very easy to find fresh fruits and vegetables which can play a role in helping you stay hydrated during extreme heat. It is best to avoid foods that are high in fat and high in sugar as those will only deprive your body of sustainable energy and thus exhaust you quicker. When shopping for food be aware of what is in season and what is not.
How to best avoid the heat?
To reduce your exposure throughout the day to extreme heat you should avoid spending long amounts of time outside from 11am to 3pm. This is usually when the sun is the hottest and you will find your energy drains faster. If you are a tourist spend this time inside churches or museums or simply take a “siesta” for some time in the afternoon a commonality in Italy since many businesses tend to close in the afternoon for 1-2 hours. You should also be sure to wear sunscreen to avoid sunburns. Italian summers can be very hot, and sunburns can be painful and also put you at a higher risk of developing skin cancer. Finally, you should be sure where you live has air conditioning so you can cool down on extremely hot days in Italy. | <urn:uuid:d597f37f-bb6a-4b3e-8c96-964f898bad75> | {
"date": "2020-01-23T23:25:02",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9735992550849915,
"score": 2.578125,
"token_count": 508,
"url": "https://www.medinaction.com/stay-cool-in-italy/"
} |
Hand Contracture Australia
This is a medical condition that affects the nerves. There is no clear explanation on why it develops; however, it is not associated with arthritis or any other types of nerve diseases. Contracture involves limited movement of the hands including the fingers. The health complication begins by tough scar like tissue developing underneath the palm. It can be seen from the skin surface. Usually, the scar is not painful, but can be itchy. Over time, the tissue thickens and starts pulling other blood tissues and elements of the skin together, towards the middle of the hand. The thickening scar pulls fingers to palm limiting flexibility of the fingers because they cannot straighten.
Progression of Contracture
While the scar on inside the skin is not painful, there are several signs that you should be aware, which indicate it is hand contracture. Pitting is one of the common elements that you should watch out for on your palm. Pitting is appearance of a dimple on surface of the palm. There is also a possibility of formation of lumps, at the base of a finger. There is no specific finger to watch for the nodules, it varies from case to case. As the condition progresses, one or two fingers begin curling towards the palm. The flexibility of the fingers reduces as the contracture progresses towards extreme conditions of no movement.
How many fingers are affected?
Hand contracture is a case to case scenario. Some people get affected on one finger, others two alternating fingers while others get all their fingers contracting towards the palm. Usually at this stage, the cord at the middle of the palm is matured and hard. While there is no certainty on the fingers to watch out in hand contracture, most people are affected on the pinky and ring finger. The index, thumb, and middle finger are rarely affected. However, the possibility cannot be completely ruled out.
This is a do-it-yourself technique that can help in determining if you have hand contracture or not. It is as easy as laying your hand flat on a table, with the palm facing down. All fingers should lie flat uniformly on the table, if not, consult with a doctor.
We deliver all our hand contractures to Melbourne, Sydney, Adelaide, Brisbane, Gold Coast (QLD) and all other major cities in Australia. | <urn:uuid:7a04dbf7-011a-4bec-ba1e-3ce08da21689> | {
"date": "2020-01-24T00:11:58",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9394040107727051,
"score": 2.578125,
"token_count": 477,
"url": "https://www.medisupplies.com.au/physiotherapy/hand-contracture/"
} |
Epoxy is a compound that requires two chemicals to work in conjunction to bond pieces together. One part cannot work without the other part. So how do you get a good seal without all the mess when using epoxy to repair items? Check out this trick for mixing both parts of the epoxy together:
- Grab a plastic sandwich bag.
- Put equal parts of both sides of the epoxy into the plastic bag.
- Squish the parts around inside the bag, mixing them together evenly.
- Cut or poke a hole in the corner of the bag.
- Squeeze out the compound from the bag to the surface of your item.
The small tip of the plastic baggie allows for great control when applying epoxy. Since epoxy is permanent, it must adhere the right way the first time. Use epoxy to fix things like furniture, dishes, plastic, fiberglass, and more. After application, be sure to dispose of the plastic bag. | <urn:uuid:f8b1de04-823d-4ecf-b831-f7b1e4816ed4> | {
"date": "2020-01-23T22:44:43",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9068533182144165,
"score": 2.96875,
"token_count": 199,
"url": "https://www.mnhbi.com/mixing-epoxy-with-no-mess/"
} |
Nicotine Affects Your Metabolism and Appetite
Nicotine (a substance found in cigarettes and NRT) increases your metabolic rate, so your body burns calories faster, and suppresses your appetite. If you quit smoking, your metabolic rate may drop meaning that your body burns calories more slowly. Nicotine Replacement Therapy can help control your weight when you stop smoking so find the right product(s) for you.
Tips for Managing Your Weight
- Exercise regularly: Try walking or cycling to work or when you go to meet your friends or start a gym class.
- Combat hunger pangs by keeping a stash of healthy treats to hand. Nuts, dried fruit, fresh fruit and veg sticks are ideal.
- Try using a healthy-recipe book for your meals.
- Eat smaller portions of food until your metabolism has stabilised. Remember it takes 20 minutes for you to feel full after eating, so take a break (go for a walk) after your main meal and see if you still feel hungry in half an hour. If so, dip into your healthy treats.
- Limit your alcohol intake. | <urn:uuid:9e73b930-de30-46eb-b161-0c2581e9e08c> | {
"date": "2020-01-23T23:39:07",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9016045331954956,
"score": 2.609375,
"token_count": 230,
"url": "https://www.nicorette.co.uk/staying-on-track/managing-your-weight.list"
} |
Our immune system does a remarkable job of protecting us against the harmful effects of infectious agents that cause disease. However, every so often this defence mechanism can be made to turn on itself, triggering a violent, often fatal reaction against its host. Understanding how the immune system can be prompted to behave in such a self-destructive manner can be traced to discoveries made by this year’s Nobel Laureate in Physiology or Medicine.
Through a series of experiments, Charles Richet demonstrated that this adverse response, which he termed anaphylaxis, was far from being an accident or an aberration, as many scientists in the field had thought. Working with Paul Portier, Richet discovered that dogs that had received an injection of sea-anemone poison without any noticeable distress always went into shock and died quickly after receiving a weaker dose a set amount of days later. Instead of raising tolerance towards the toxin, as expected, the initial dose in fact made animals highly sensitive for a set period of time to even miniscule amounts of the poison. Systematically administering a number of poisons in this manner and examining the violent reactions led Richet to conclude that anaphylaxis behaves in a similar, but opposite, manner to immunity. For instance, reactions were specific to the poison in question, and transferring blood from an affected animal to a healthy one could provoke hypersensitivity to the toxin.
Identifying the principal triggers for anaphylaxis and the early, alarming symptoms led to the creation of a valuable medical warning system. Physicians could now identify patients who might be sensitive to treatments for infectious diseases that contain toxins from bacteria, such as diphtheria. More recently, this adverse immune response has become the object of intense scrutiny in completely different area. Anaphylaxis is thought to be the cause of adverse reactions that a small number of individuals have towards certain proteins found in food.
This Speed read is an element of the multimedia production “Immune Responses”. “Immune Responses” is a part of the AstraZeneca Nobel Medicine Initiative.
Their work and discoveries range from how cells adapt to changes in levels of oxygen to our ability to fight global poverty.
See them all presented here. | <urn:uuid:90eac5c3-aeed-4059-9af5-4cb353b010b5> | {
"date": "2020-01-23T23:35:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9596246480941772,
"score": 3.359375,
"token_count": 454,
"url": "https://www.nobelprize.org/prizes/medicine/1913/speedread/"
} |
Why consider composites as a structural material?
Thermoset composites are prized for their robust properties and design flexibility. From world class weight adjusted strength and stiffness to corrosion resistance, to toughness and fatigue resistance, composites have found use in the most demanding mechanical and structural applications under, on, and above the earth.
A composite is produced from a resin matrix and a reinforcing substrate. By selecting component materials for specific properties, Norplex-Micarta structural composites can be tailored to meet specific design objectives for use in environments from absolute zero to 250 C and beyond.
Your custom composite is within reach
There’s nothing exotic about custom materials. We develop them every day. Our chemists and engineers have produced hundreds of materials for thousands of applications—more than 200 grades. Our significant technical data and in-house testing capability is the starting point for your new application, accelerating the design process.
Destined for repeatable performance
When design engineers come to us for a material solution, they also get the manufacturing capability and capacity to deliver it.
From standard products to those that are uniquely produced for a single application, our structural composite materials are manufactured in accordance with ISO and PSM standards. Our production approach minimizes variation relative to other composite manufacturing techniques, resulting in materials that are produced economically in large volumes.
What is a composite?
Composite materials are made up of two or more different materials, referred to as the matrix and the reinforcement.
Each combination is chosen for its ability to deliver predictable and repeatable performance to match the application’s requirements. Since these materials have very different properties, the heterogeneity of composites must be addressed to support the analysis of composite parts and structures.
The matrix functions to bind the reinforcement together and protect it. A composite matrix will be one of three types: polymer, metal or ceramic.
Norplex-Micarta specializes in a subset of polymer matrix composites called thermosets. Thermosets undergo a high-temperature curing process by which the chemical structure of the polymer is irreversibly cross-linked. Therefore, thermosets do not melt after curing, as opposed to thermoplastic materials, which do melt.
The reinforcement is considered the primary contributor to the strength and stiffness of the composite. Potential reinforcements that can be effectively utilized are nearly infinite. Common reinforcement materials include paper, cotton fabrics, glass, aramids, nylon and carbon fiber. Other materials such as virgin PTFE or rubber can be incorporated into the composite to achieve specific design objectives.
Norplex-Micarta produces pre-preg from several different resin systems such as epoxy, phenolic, melamine, and silicone. These resin systems can be modified through the use of various additives to modify their behavior. These additives can make the material semi to fully conductive, increase the hardness, increase the toughness, or reduce the coefficient of friction, amongst other possible enhancements.
Reinforcements are virtually endless. From the choice of the fiber, to woven, non-woven, and stitched fabrics, and various hybridizations and combinations of the myriad of inputs, designers have a wide range of potential inputs that can be used to optimize a material for their specific application.
Learn more about Norplex-Micarta’s various products:
Have another idea or a question about Norplex-Micarta and our approach to composites? Speak with one of our applications engineers to discuss how Norplex-Micarta’s thermoset composites can be designed your specific application. | <urn:uuid:cb2b43fe-9f0d-4007-ad8a-5fbb9c992cfa> | {
"date": "2020-01-23T23:21:38",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9131428599357605,
"score": 2.875,
"token_count": 724,
"url": "https://www.norplex-micarta.com/structural-materials/"
} |
Saint Audas was Bishop of Bethchasar in Persia. He destroyed a temple of the fire-worshippers, and was brought to trial before the Persian emperor Izdegerd I (401-402), who ordered the saint to rebuild the temple. When Bishop Audas refused, the emperor ordered soldiers to destroy all the Christian churches, persecute the Christians, and to torture them.
Saint Audas was the first to be martyred. He was beheaded after lengthy tortures. After thirty days, the other martyrs were also executed. Among them was the deacon Benjamin, who suffered particularly cruel torments. They stuck sharp needles under his nails and impaled him on a spear.
The hieromartyrs died in the old Persian city of Suza. | <urn:uuid:c2256033-6fbf-4996-917b-636e43b2d95f> | {
"date": "2020-01-23T22:24:16",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9762729406356812,
"score": 3.296875,
"token_count": 161,
"url": "https://www.oca.org/saints/lives/2015/03/31/100959-hieromartyr-abdas-bishop-of-persia-and-martyr-benjamin-the-deaco"
} |
The Fire Triangle
The Fire Triangle is a simple way of understanding the factors of fire. Each side of the triangle represents one of the three ingredients needed to have a fire – oxygen, heat, and fuel – demonstrating the interdependence of these ingredients in creating and sustaining fire. When there is not enough heat generated to sustain the process, when the fuel is exhausted, removed, or isolated, or when oxygen supply is limited, then a side of the triangle is broken and the fire will die.
A heat source is responsible for the initial ignition of fire, and heat is also needed to maintain the fire and permit it to spread. Heat allows fire to spread by removing the moisture from nearby fuel, warming surrounding air, and preheating the fuel in its path, enabling it to travel with greater ease.
Fuel is any kind of combustible material, and is characterized by its moisture content (how wet the fuel is), size and shape, quantity, and the arrangement in which it is spread over the landscape. The moisture content determines how easily that fuel will burn.
Air contains about 21% oxygen, and most fires require at least 16% oxygen content to burn. Oxygen supports the chemical processes that occur during a wildland fire. When fuel burns, it reacts with oxygen from the surrounding air releasing heat and generating combustion products (i.e. gases, smoke,embers). This process is known as oxidation. | <urn:uuid:942e0229-3d28-4307-81f0-47fe208d3895> | {
"date": "2020-01-24T00:40:00",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9323834776878357,
"score": 4.34375,
"token_count": 288,
"url": "https://www.ohs.me.uk/tag/resources-2/"
} |
"What are your thoughts on testing a teen suspected of using drugs through the use of a home drug-testing kit that can be purchased online?"
Parents who are anxious to know whether their kids are using drugs have easy access to kits sold on the Internet, but home drug testing is not consistent with the guidelines of professional medical organizations. The mother or father using these kits may be reassured by a "false negative," or mistakenly accuse their youngster of using drugs because of a "false positive".
I recommend that the parent who suspects that her youngster is using drugs seek a professional assessment rather than conduct a drug test at home. I want to caution you about the limitations and potential risks of home drug-testing products. Testing for drug use at home, with or without the consent of the teen, can also seriously undermine the parent-child relationship.
Moms and dads who are concerned that their youngster is using drugs may not know exactly which drug the youngster is using, and using the wrong test may delay the correct diagnosis of a serious substance abuse disorder. There are several types of tests for alcohol, marijuana, amphetamines and other drugs common among teens.
Laboratory testing for drugs of abuse is a technically challenging procedure, even for medical professionals, and tests performed at home by an untrained parent may have higher rates of error than professional tests. I have cited one study in which a certified laboratory had false negative tests between 6% and 40%, depending on the drug detected.
False positives are also a problem as in the case of amphetamines, especially if the youngster is using high doses of caffeine or cold medications containing pseudoephedrine or theophylline. Similarly, poppy seeds contained in bagels and other foods may result in a false positive for morphine.
Collecting a urine or hair sample is not an easy task for a parent. The standard protocol for collecting urine samples requires "observation" to avoid adulteration or dilution with water, and teenagers are quite adept at beating the tests. In addition, teens can purchase products from the Internet that "clean" urine by interfering with standard drug tests. But, observing the collection of a urine sample would not be acceptable to most families -- and is not advisable. The Web sites we reviewed did not address these issues, nor did they offer any details about how to collect a hair sample.
Coerced home drug testing by parents may be perceived by teens as invasive and a violation of their rights, potentially damaging the parent-child relationship. Only one of the eight Web sites viewed gave clear advice on testing a youngster against his or her will.
Many of the claims of benefits of home drug testing made by the Web sites are "unsubstantiated." Seven of the eight sites claimed that random drug testing prevented drug use by reducing peer pressure, but I can’t find any studies to substantiate that claim.
Here are five ways that adolescents may try to cheat drug tests. They're all described elsewhere on the Internet, so you should be aware of them:
1. Popping vitamins: Perhaps this works because niacin (aka vitamin B3) is known to aid metabolism, or perhaps it's because Scientologists are said to take it in excess to flush their bodies of toxins. Whatever the reasons, some adolescents got the idea that extreme doses of this vitamin would erase any trace of their illicit drug use. Instead, it almost cost them their lives. In two separate incidents, emergency physician Manoj Mittal of Children's Hospital of Philadelphia has found adolescents who downed at least 150 times the daily recommended dose of niacin (15 mg) to cheat drug tests. Both kids were vomiting, had low blood sugar, and had "significant" liver toxicity when they arrived at the ER. And the niacin didn't even do what they'd intended; both tested positive for illicit drugs. People might think that since niacin is a vitamin it's harmless. But these cases suggest that our bodies have limits.
2. Swapping urine samples: Whether they use a friend's clean urine, synthetic pee, or even freeze-dried urine purchased online, some adolescents try to pass off foreign samples as their own. The biggest tip-off is temperature. Anything significantly lower than body temperature is suspicious, which is why some have tried to shuttle samples in armpits or taped to thighs to keep them warm. Possibly the oddest trick of all is a device marketed to those trying to beat witnessed drug collections: a sort of prosthetic penis called the "Whizzinator" that claims to come equipped with clean urine "guaranteed" to remain at body temperature for hours, with the help of special heat pads. Believe it or not, the prosthesis comes in different colors.
3. Switching drugs: Perhaps most alarming is that adolescents bent on defeating drug tests will sometimes switch their drug of choice to an undetectable (or harder to detect) substance that's considerably more hazardous. Inhalants, for example, include numerous types of chemical vapors that typically produce brief, intoxicating effects. You don't excrete inhalants in your urine, but inhaling is acutely more dangerous than marijuana. Indeed, inhalants can trigger the lethal heart problem known as sudden sniffing death in otherwise healthy adolescents, according to the National Institute on Drug Abuse.
4. Tampering: A sprinkle of salt or a splash of bleach, vinegar, detergent, or drain cleaner is all that's needed to muck up a urine specimen. These and other household substances are all too often smuggled into the bathroom and used to alter the composition of urine, making the presence of some illegal substances undetectable. Same goes for chemical concoctions sold all over the Internet. Sometimes these additives or "adulterants" will cloud or discolor urine, easily casting suspicion on the specimen, but others leave the sample looking normal. Laboratory toxicologists employ simple tests to catch these cheats. For example, a few drops of hydrogen peroxide will turn urine brown if it's been mixed with pyridinium chlorochromate, an otherwise-imperceptible chemical designed to foil drug tests.
5. Water-loading: Gulping fluids before providing urine, a long-standing tactic, is still the most common way that adolescents try to beat tests. Whether cheats use salty solutions to induce thirst, flushing agents that increase urine output, or just plain old H2O, their aim is to water down drugs so they can't be detected. Some testing facilities may check urine for dilution and deem overly watery samples "unfit for testing." But consuming too much fluid too quickly can occasionally have dire consequences.
As I stated earlier, the best way to drug test your adolescent is to have a professional (e.g., doctor) do it.
==> My Out-of-Control Teen: Help for Parents | <urn:uuid:17e8603c-e664-4c89-95ba-e686a793ebbf> | {
"date": "2020-01-23T22:18:05",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9548953175544739,
"score": 2.625,
"token_count": 1403,
"url": "https://www.onlineparentingcoach.com/2019/05/testing-your-teen-using-home-drug-test.html"
} |
The CBOE Volatility Index (VIX) was created to measure the market’s expectation of near-term volatility. It is a calculation that is derived from the
pricing of options on the Standard and Poor’s S&P 500 Index (SPX.)
The relationship between the VIX and the SPX is well known. The two tend to move in the opposite directions. This is especially true when the market
crashes. During these periods of upheaval, the VIX tends to spike upwards.
The gist is that investors will pay more for options when their expectation for price movement increases. The increase in options pricing is a result of an
increase in the implied volatility. (There is a bit of “chicken or the egg” thing when it comes to changes in option pricing and implied volatility. But,
that’s another topic altogether.)
A change in the VIX is not necessarily bullish or bearish. It just represents relative increase in option pricing. However, fear of a downward move tends
to send people into protective options – put contracts – more than a move to the upside would send them into bullish call contracts. Thus, the VIX tends to
spike in response to the bearish sentiment. That is why the VIX why it is sometimes called the “Fear Index.”
The VIX was specifically developed to represent the implied volatility of a theoretical, at-the-money option on the SPX that expires in 30 days.
Implied volatility is the volatility that is expected to occur over the life of an option. Essentially, what this means is that the VIX attempts to predict
the historic volatility that will be realized, 30-days in the future.
Historic volatility is a measure of the volatility that happens in the stock movement. It has nothing to do with options or options pricing. There are
differ methods to calculate historic volatility, the most common convention is to take the standard deviation of the logarithmic change in price over the
past 30 days.
The following graph compares the SPX Historic Volatility (black) and the VIX (blue.)
From this, you can see that the VIX and the SPX historic volatility appear to be related. The VIX and SPX historic volatility tend to spike together. One
can also observe that the VIX tends to fall more quickly than the historic volatility. This is because of the nature of the historic volatility
calculation, which is a rolling 30-day calculation. Just a few significant day-to-day price changes will cause the historic volatility to rise
dramatically. But, it will take 31 days for those significant changes to roll out of the calculation. That explains why the historic volatility falls more
slowly than the VIX falls.
How good is the VIX at doing what it was designed to do?
It was designed to estimate the SPX historic volatility 30 days in the future. So, we can compare a scatter plot of the VIX to the Historic Volatility that
is realized in 30 days. If there is a correlation, a distinct pattern should emerge.
One can see that there is a cluster pattern in this plot. However, it seems to fall apart at extreme values. The R2 measure gives an objective
measurement of the correlation between the VIX and historic volatility. An R2 of 1 would be a perfect fit. If the R2 was 1, the dots
would fall perfectly in a line. The VIX has an R2 correlation of 0.2519 when compared SPX historic volatility that is realized 30 days later.
A keen observer may notice that the “30 days” in this plot is actually 30 trading days. Which is much farther in time than 30 calendar days. In 30 calendar
days, there are about 21 trading days. Following is the scatter plot for the historic volatility of the SPX that emerges 21 days later.
Considering this shorter and more realistic time frame, we can see that the R2 correlation improves to 0.4213. This is a significant
A curious investigator may ask if the timeframe was even shorter, would the R2 improve even more?
Below is a plot of the various R2 correlations for different time periods of the realized historic volatility. What you can see from this chart
is that the R2 correlation is pretty good in the beginning and then trails off as you go out further in time.
The highest R2 correlation occurs in just 3 days and is 0.7361. Following in a scatter plot of the VIX vs the historic volatility of the SPX
that is realized 3 days later.
If you asked a statistician, they would say that this is a pretty good correlation.
What does this all mean? It means that the VIX does a pretty good job at predicting what the historic volatility of the SPX will be in next 3 to 7 days.
But, it does a poor job of predicting what the volatility will be in 30 days, which is what it is purported to do.
A hypothesis which explains this relationship is that volatility in the SPX actually causes the VIX to rise. That is the opposite of what it is intended to
This is not a difficult hypothesis to imagine when one considers the human nature of traders. Many things cause traders to seek protection through the
purchase of options. However, it is movement of the SPX itself that most often causes traders to seek protection. The increased demand in SPX options would
cause the price, and thus the implied volatility, of those options to increase. That affects an increase in the VIX.
A separate investigation using Granger Bivariate Causal Analysis showed that the SPX does likely cause changes in the VIX. That also supports the reverse
notion of the VIX.
One can debate this interpretation of the VIX and SPX and which is actually causing the other. However, what is very clear is that the VIX does a poor job
telling us about the historic volatility that occurs in 30 days. It may be good at telling us what is happening now and in the next few days. However, why
do we need a complicated index to tell us what is readily apparent in the market?
The author of this blog believes that all that we really know from the VIX is the relative price of options: are they expensive or cheap?
This news will take the wind out of the sails of someone who hoped to learn something about the VIX and use it to their advantage. You may take some solace
in that if you didn’t already understand the VIX, you were not missing much.
This is not to imply that implied volatility indices (VIX type calculations) are worthless. With some equities, implied volatility indices do provide
significant insight to their future.
One example of these implied volatility indices is the CBOE Equity VIX® on Apple (VXAPL.) This is a relatively new index, recently made available by the
CBOE. I will leave the reader with following chart of the R2 correlations of the VXAPL vs different periods of time.
From this chart, one can see a significantly different result than what the SPX and the VIX showed. From VXAPL and the historic volatility on Apple, we
find there is a very distinct correlation with the historic volatility that is realized in 21 days. That is powerful and insightful information.
Unfortunately, this is the end of this blog post. I will just have to whet the appetite of the reader and leave the discussion of this enlightenment to a | <urn:uuid:4f66a467-5ee9-4ab8-968b-2755656d44b3> | {
"date": "2020-01-23T23:51:47",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9534596800804138,
"score": 2.546875,
"token_count": 1573,
"url": "https://www.optionsanimal.com/the-vix-you-can-see-the-future-sorta/"
} |
SCENE 5Draw a Road Map
Today we are introducing three revolutionary products.
—STEVE JOBS, REVEALING THE iPHONE
On January 9, 2007, thousands of Mac faithful watched as Steve Jobs delivered an electrifying announcement. “Today Apple reinvents the phone,” Jobs said as he revealed the iPhone for the first time to the public.1
Before delivering that headline, however, Jobs added to the drama and suspense when he told the audience that Apple would introduce not one, but three revolutionary products. He identified the first one as a wide-screen iPod with touch controls. This met with a smattering of applause. Jobs said the second product would be a revolutionary mobile phone. The audience cheered that announcement. And the third, said Jobs, was a ... | <urn:uuid:ac669d70-39fd-41e8-9359-7b55b4d0a5f3> | {
"date": "2020-01-23T22:42:28",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9592017531394958,
"score": 2.6875,
"token_count": 164,
"url": "https://www.oreilly.com/library/view/the-presentation-secrets/9780071636759/ch05.html"
} |
Let’s talk about your relationship with your cat. Have you ever been petting your cat when she seems to suddenly turn on you, transforming from purring and sweet to evil and attacking? Cats can be mysterious creatures, and many owners of cats become frustrated with their seemingly erratic or aggressive behavior. But, the key to managing an aggressive cat is understanding cat aggression and knowing the signs that your cat could be ready for some alone time.
Types of Cat Aggression
Cat aggression often falls into one of the following categories:
- Territorial/resource aggression — Cats are territorial. When they perceive something as belonging to them, they may feel compelled to guard and protect it. Resources a cat might defend include scratching posts, food bowls, toys, and even people. A new visitor or pet in a cat’s home could also lead to aggressive behavior.
- Petting aggression — Some cats love to be petted. Others enjoy it, but only on their terms and for a duration with which they’re comfortable. Most cats who are about to reach their petting limit will exhibit at least one warning sign (see below) before losing their cool.
- Medically related aggression — Various medical conditions, including pain, hyperthyroidism, cognitive dysfunction, dermatological conditions, and more, can lead to aggression in cats. Cats on certain medications may also experience behavioral changes.
- Fearful/stressful aggression — Whether a cat is afraid of some unfamiliar noise or is feeling anxiety or stress because she just arrived home after being boarded during a vacation, cats that feel fearful or anxious are more likely to aggress.
- Predatory/play-related aggression — Most common among cats that were weaned from their mothers too early, cats experiencing predatory or play-related aggression didn’t have as much (or any) play time with their littermates, and, as a result, never learned bite inhibition.
Warning Signs of Cat Aggression
Watch for the following warning signs that your cat might be on the verge of attacking.
- Dilated pupils
- Flashing tail
- Hissing or growling
- Whiskers and/or ears held flat or pointing directly down or straight out
- Hair standing up on the back of the neck
- Backing into a corner and crouching into a small position or trying to look as large as possible
Your pet’s behavior significantly impacts every part of your day. A well-behaved pet will develop a beautiful, new relationship with your family. While a misbehaving pet will introduce unnecessary stress into your life. We believe the Human-Animal bond is one of the most beneficial and healthy relationships a person can form. And, just like the Human-Human bond, it all comes down to proper communication. We can help you set up healthy habits and communication protocols around your pet’s daily life, eating, exercise, and play time.
Far too many cats are relinquished to shelters (and often euthanized) because of behavior issues. If your cat is exhibiting aggressive behavior, call our office for help. | <urn:uuid:19614888-a4bb-4020-b4ee-04e46186a035> | {
"date": "2020-01-24T00:34:18",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9594840407371521,
"score": 2.9375,
"token_count": 635,
"url": "https://www.paolivet.com/health/what-is-your-aggressive-cat-trying-to-tell-you/"
} |
Lyme Disease Awareness and Prevention
Lyme disease is a bacterial infection that may develop after a bite from a Lyme-infected blacklegged tick. The CDC estimates that more than 300,000 new cases of Lyme disease occur each year in the US but only a fraction of these cases are reported to public health officials.
Lyme Awareness: Risk
Many areas of the country are at high risk for Lyme disease. Wooded or forested regions that provide suitable tick habitat are especially at risk and breaking these areas into smaller parcels increases that risk. This map depicts where blacklegged ticks are commonly found.
People who live/work/recreate in Lyme-endemic areas or tick habitat may be exposed to disease carrying ticks in a variety of settings – campsites, parks, golf courses, sports fields, and their own back yards. Pet ownership is associated with an increased risk of Lyme disease. Age-related risk is greatest in school-aged kids and lowest in young adults.
Lyme Awareness: Disease basics
Lyme infections can cause a significant illness for some, producing serious and chronic symptoms that result in substantial short- and long-term disabilities. Lyme disease is multi-staged but not every patient experiences each stage. A wide variety of symptoms are possible and symptom patterns differ from patient to patient. An individual’s symptoms may vary in intensity, come and go, disappear entirely or progress. These variations can make it difficult to recognize the infection.
- Early Lyme disease occurs within 2-30 days of a bite. In 70% of the cases reported to the CDC, patients developed a rash at the site of the tick bite. Lyme disease rashes, commonly called EMs (short for the medical term “erythema migrans”) are usually oval-shaped and solid-colored. The classic “bull’s-eye” is seen in less than 20% of cases. Patients may also have fever, chills, muscle and joint pains, neck stiffness, headaches, fatigue and sore throat. When the EM rash is absent, these flu-like symptoms may be the only clue of the infection. Some patients are asymptomatic in early disease.
- Late Lyme (or disseminated) disease develops weeks to years after a bite. In this stage, the infection has spread beyond the skin to other body sites. Within weeks, multiple EM rashes, fatigue, muscle and joint pain, generalized pain, severe headaches and stiff necks (indicating meningitis), facial nerve palsy (weakness or paralysis of facial muscles), sleep and/or concentration difficulties may be seen. A small percentage of patients experience abnormalities in their heart rate.
- Months to years after the bite patients may notice several seemingly unrelated problems including: arthritis, nervous system abnormalities or non-specific problems with fatigue, headaches, generalized pain or muscle pain, recurrent fevers, difficulty thinking or and changes in mood.
- Persistent (or chronic) Lyme disease is marked by persistent, recurrent and/or the development of new symptoms of Lyme disease despite prior antibiotic therapy for the infection.
Lyme Awareness: A Tricky Diagnosis
Because symptoms are variable and lab tests are not always reliable, Lyme disease can be a tricky diagnosis to make. If you spend time in tick habitat or areas known to have Lyme disease or co-infections and develop symptoms of these infections, be sure to let your doctor know about your exposures.
Lyme Prevention: Avoid Ticks
The best way to prevent Lyme disease is to avoid ticks. Stay out of tick habitat, especially areas with long grass, lots of brush or leaf litter. Stay in the center of hiking and biking trails; don’t sit on fallen logs.
Many people become infected around their home. Clear away brush and fallen leaves, keep your grass short. Place lawn furniture and play structures in sunny areas of the yard. Bird feeders and wood piles attract tick-carrying mice so keep them far from the house. Don’t feed deer or use plants that attract them.
Lyme Prevention: Use Insecticides and Repellents
Insecticides and repellents reduce the risk of a tick bite. Insecticides kill ticks; repellents encourage them to leave before biting. Look for products with one of these ingredients:
- Permethrin is an insecticide essential to prevention plans; its importance cannot be overemphasized. Apply it to clothing, sleeping bags, tents and other gear, but not skin, before entering tick habitat. It remains effective for 2-6 weeks and through multiple washings. Permethrin-embedded clothing retains its effectiveness through 70 washings; tick gaiters are also useful. It has passed EPA safety tests and is used extensively by the US military. Retail products are sold at outdoor stores and on-line. Safety information is available at:
- Picaridin is a newer repellent that’s as effective as DEET, use concentrations of 20%. Apply it to unbroken skin, fabrics and materials. It is non-toxic and safe for children of all ages. Safety information is available at:
- DEET is the best known repellent, use concentrations of 30% or higher. DEET is safe to apply to unbroken skin, wool and cotton but it can damage other fabrics and materials, such as leather or rubber. The EPA considers DEET to be safe for kids more than 2 months old but Canada’s health department recommends against using DEET on children. Safety information is available at:
- BioUD is a newer repellent derived from wild tomato plants. A concentration of 7.75% is 2-4 times more active than 98% DEET against deer ticks. It can be used on clothing but doesn’t last as long as permethrin. It’s only available on-line at www.homs.com.
Lyme Prevention: Tick Checks are Vital
Check for ticks frequently while in tick habitat and for 1-2 days after potential exposure. Promptly remove and save attached ticks in a re-sealable container so your doctor can examine them. Pets that go outdoors can bring ticks indoors; check them for ticks and use appropriate, veterinarian-approved tick products.
The risk of contracting Lyme disease depends on how long the tick was attached and how likely it is to be infected. Few infected ticks transmit Lyme in less than 24 hours. At 48 hours, roughly 15% will transmit; at 60 hours, 50% pass on the infection and when infected ticks feed until full, 94% will transmit Lyme disease. In many high-risk areas, half of the deer ticks are infected with Lyme.
Deer ticks may be infected with other diseases and these infections, often called co-infections, are also transmitted through bites. Anaplasmosis, babesiosis and Powassan disease are known co-infections; bartonellosis may also be transmitted by ticks. Transmission times for Babesia and Bartonella are unknown; anaplasmosis is transmitted more rapidly than Lyme disease (in less than 24 hours).
Lyme Prevention: Antibiotic Treatment of Deer Tick Bites
Certain antibiotics may reduce the risk of Lyme disease if taken within 2 days of a bite. Contact your doctor immediately after a bite to discuss this strategy. Following a “wait and see” strategy is risky because 30% of patients never develop a Lyme rash. Basing treatment decisions on blood tests done shortly after a bite isn’t a good idea because the results are unreliable. Antibiotic approaches are changing; ask your doctor to review these papers which deal with tick bite management:
- Evidence Assessments and Guideline Recommendations in Lyme Disease: The Clinical Management of Known Tick Bites, Erythema Migrans Rashes and Persistent Disease
- Grasp tick close to the skin
- Avoid squeezing body
- Pull tick straight out | <urn:uuid:633a7c01-deae-41ba-846b-38d5bca7ea01> | {
"date": "2020-01-23T23:44:12",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9338962435722351,
"score": 4.09375,
"token_count": 1634,
"url": "https://www.partnershipforhealingandhealth.com/prevention/"
} |
Sailors have their krakens and their sea serpents. Physicists have white holes: cosmic creatures that straddle the line between tall tale and reality. Yet to be seen in the wild, white holes may be only mathematical monsters. But new research suggests that, if a speculative theory called loop quantum gravity is right, white holes could be real—and we might have already observed them.
A white whole is, roughly speaking, the opposite of a black hole. “A black hole is a place where you can go in but you can never escape; a white hole is a place where you can leave but you can never go back,” says Caltech physicist Sean Carroll . “Otherwise, [both share] exactly the same mathematics, exactly the same geometry.” That boils down to a few essential features: a singularity, where mass is squeezed into a point of infinite density, and an event horizon, the invisible “point of no return” first described mathematically by the German physicist Karl Schwarzschild in 1916. For a black hole, the event horizon represents a one-way entrance; for a white hole, it’s exit-only.
There is excellentevidence that black holes really exist , and astrophysicists have a robust understanding of what it takes to make one. To imagine how a white hole might form, though, we have to go out on a bit of an astronomical limb. One possibility involves a spinning black hole. According to Einstein’s general theory of relativity, the rotation smears the singularity into a ring, making it possible in theory to travel through the swirling black hole without being crushed. General relativity’s equations suggest that someone falling into such a black hole could fall through a tunnel in space-time called a wormhole and emerge from a white hole that spits its contents into a different region of space or period of time.
Though mathematical solutions to those equations exist for white holes, “they’re not realistic,” says Andrew Hamilton , an astrophysicist at the University of Colorado at Boulder. That is because they describe universes that contain only black holes, white holes and wormholes—no matter, radiation or energy. Indeed, previous research, including Hamilton’s , suggests that anything that falls into a spinning black hole will essentially plug up the wormhole, preventing the formation of a passage to a white hole.
But there’s a light at the end of the wormhole, so to speak. General relativity, from which Hamilton draws his predictions, breaks down at a black hole’s singularity. “The energy density and the curvature become so large that classical gravity is not a good description of what’s happening there,” says Stephen Hsu , a physicist at Michigan State University in East Lansing. Perhaps a more complete model of gravity—one that works as well on the quantum scale as it does on large ones—would negate the instability and allow for white holes, he says.
Indeed, a unified theory that merges gravity and quantum mechanics is one of the holy grails of contemporary physics. Applying one such theory, loop quantum gravity, to black holes, theorists Hal Haggard and Carlo Rovelli of Aix-Marseille University in France have shown that black holes could metamorphose into white holes via a quantum process. In July, they published their work online .
Loop quantum gravity proposes that space-time is made up of fundamental building blocks shaped like loops. According to Haggard and Rovelli, the loops’ finite size prevents a dying star from collapsing all the way down into a point of infinite density, and the shrinking object rebounds into a white hole instead. This process may take just a few thousandths of a second, but thanks to the intense gravity involved, the effects of relativity make the transformation appear to take much, much longer to anyone watching from afar. That means that minuscule black holes born in the infant universe could “now be ready to pop off like firecrackers,” forming white holes, according to a report in Nature . Some of the explosions astronomers thought were supernovae may actually be the wails of newborn white holes.
The black-to-white conversion could resolve a nettlesome conundrum known as the black hole information paradox . The notion that information can be destroyed is anathema in physics, and general relativity says that anything, including information, that falls into a black hole can never escape. These two statements are not at odds if black holes simply act as locked safes for any information they slurp up, but Stephen Hawking showed 40 years ago that black holes actually evaporate over time. That led to the disturbing possibility that the information contained within them could be lost too, triggering a debate that rages to this day.
But if a black hole instead turns into a white hole, then “all the information is recovered,” says Haggard. “We are quite excited about this mechanism because it avoids so many of the thorny issues that surround this discussion.”
The new work is preliminary, however, and it is far from clear whether loop quantum gravity is an accurate description of reality. The only glimpse we get of white holes might turn out to be those we model in labs and kitchen sinks . But Carroll says that’s okay. Just thinking about these possibly mythical cosmic creatures can improve physicists’ intuition, “even if the real world is messy and not like those exact situations,” he says. “That’s the way in which white holes are very useful.”
Editor’s picks for further reading
Inside Black Holes
Physicist Andrew Hamilton is your guide on a visual journey inside a variety of kinds of black holes.
“White Holes” Could Exist—But That Doesn’t Mean They Do
Matthew Francis on white holes and their implications for the symmetry of time.
Ask an Astronomer:
What is a white hole?
Astronomer Karen Masters provides an introduction to the physics of white holes. | <urn:uuid:31c92694-9da5-4713-afe3-2983fd92c8e9> | {
"date": "2020-01-24T00:40:15",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9351543188095093,
"score": 3.625,
"token_count": 1260,
"url": "https://www.pbs.org/wgbh/nova/article/are-white-holes-real/"
} |
Chem Primer Video Transcript
Hi. I’m here to talk to you about an exciting new feature you’ll find in Mastering Chemistry called the Chemistry Primer. The Chemistry Primer is a series of tutorials focused on remediating students in preparation for their first college chemistry course.
Topics covered in the Chemistry Primer include math in the context of chemistry, chemical skills and literacy as well as some basics of balancing equations, the mole concept, and stoichiometry. These topics were chosen based on extensive surveys of chemistry professors across the country who identified the areas where students would benefit most by having prerequisite knowledge at the beginning of the course. With the Chemistry Primer, instructors can easily assign pre-built modules within Mastering Chemistry to help students build the necessary skills needed for more advanced Chemistry problems.
In this video, I’ll show you the Chemistry Primer as well as an example diagnostic question designed to help students recognize the areas where they need the most help and where to access the tools to help them improve.
Let’s jump in and take a look.
First, after logging into a newly created course, click on the “Assignments Tab,” then “Chemistry Primer,” then “Student View.” In this view, you can see the selection of topics that cover math in the context of chemistry.
Next, scroll down and click on “Of Mass and Moles.” Here you see that the main body of each item in the primer offers diagnostic questions that will show students where they need help once they answer the question. The learning experience adapts to each student, specific to his or her level of understanding.
When students answer a question, they receive feedback specific to their answer. If correct, the Primer explains why and reinforces the concept covered and allows the student to move on without being required to complete “busy work”.
If incorrect, the primer offers wrong-answer feedback with hints, instructional videos, and step-wise worked examples. Feedback is presented in a scaffolded structure to help guide students’ remediation.
Now, let me show you scaffolded instruction in action. Enter 0.0689 as an answer for this diagnostic question. Notice the feedback provided to the student. This feedback tells students the importance of understanding unit conversions for Chemistry. Next, let’s look at the hints the student receives after submitting the incorrect answer.
Hint 1 is a declarative hint. This is the first type of hint that students will encounter. It shows an instructor walking students through a similar problem and provides a model for approaching the problem.
Hint 2 is a Socratic hint that breaks a problem into smaller sub-parts in order to simplify the problem without giving the answer. Students must attempt to answer the problem on their own and are given support and feedback when they’re stuck.
Hint 3 is also in the Socratic style and gives valuable feedback necessary for understanding the concept. The Chemistry Primer learning tools are based on the same principles as the tried-and-true Mastering Chemistry content that instructors have come to expect.
The Chemistry Primer can be found as an assignable, pre-built module in Mastering Chemistry for your courses in General, Preparatory, Introductory, and General, Organic, and Biological Chemistry.
Instructors can also make edits, assign due dates, or simply drag the Chemistry Primer to the calendar as they would any other Mastering assignment. Student results appear in the Mastering gradebook.
And there you have it. That was a quick look at the Chemistry Primer. If you want to learn more about The Chemistry Primer, go to Mastering Chemistry.com. And if you want to find out about all of Pearson's MyLab & Mastering products, be sure to check out Pearsonmylabandmastering.com. Thanks for watching. | <urn:uuid:f0be14e0-f568-4161-ac0a-b4c40f5a2932> | {
"date": "2020-01-23T22:44:16",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9282521605491638,
"score": 3.15625,
"token_count": 808,
"url": "https://www.pearsonmylabandmastering.com/northamerica/masteringchemistry/chem-primer-video-transcript/index.html"
} |
Tea May Cut Ovarian Cancer Risk
Health experts conducted a two-year study of 1,000 women with an average age of 59, half of which were diagnosed with ovarian cancer, while a controlled group of 500 were free of the disease. They were questioned about their tea drinking habits from how often they made a cup, what kind of tea they drank and when they first started.
The researchers discovered that the women without cancer were more likely to be tea drinkers from an earlier age than those diagnosed with the illness.
However, even within tea drinkers in both groups, those who did not have cancer had been drinking tea for longer and, on average, consumed more cups a day than the others.
Researchers from the School of Public Health, Curtin University in Perth, Australia, carried out the study on 1,000 women living in southern China.
Of the two groups, 79% of women not diagnosed with cancer were tea drinkers, compared to 51% who have or have had the disease. They found that flavonoids, powerful compounds with strong disease-fighting properties, were found in black tea in particular.
Previous studies have suggested that adding milk does not weaken their effect.
Study co-author Dr. Andy Lee said, "Tea is a safe and inexpensive beverage. Its consumption should be encouraged because of the potential benefit in preventing this common and deadly disease for women."
Dr. Catherine Hood, of the Tea Advisory Panel, said studies had shown that flavonoids have antioxidant and anti-inflammatory properties and reduce the growth of body cells.
"Overall this new study adds to the evidence base linking tea consumption with reduced risk of ovarian cancer," she said.
"This is good news for British women among whom tea is a very popular beverage."
The study suggests it is not just the occasional cuppa that might help but a long-term habit of drinking four or more cups a day.
It shows almost 40% of the non-diagnosed women drank four or more cups a day compared with 22% of the other group.
They were also more likely to have been drinking tea for longer -- an average of 22.7 years for the non-diagnosed group compared to 18.3 years the others. | <urn:uuid:8e673110-188c-4277-9671-aa3f235719d1> | {
"date": "2020-01-23T22:57:11",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.983182966709137,
"score": 2.984375,
"token_count": 454,
"url": "https://www.preparedfoods.com/articles/112025-tea-may-cut-ovarian-cancer-risk"
} |
Oceans of Energy, a spin-off of Netherland’s Delft University of Technology, has finished installing the first section of an offshore PV system it is developing with a local consortium in the North Sea, off the Dutch coast.
The consortium that is developing the pilot project, which was launched in February 2018, includes the Energy Research Center of the Netherlands (ECN), the Netherlands Organization for Applied Scientific (TNO), the Maritime Research Institute Netherlands (MARIN), and Abu Dhabi National Energy Co.
Oceans of Energy said the 8.5 kW modular PV system started operating at the end of November, and noted that it has already withstood its first storms. The plant will quickly be expanded to 50 kW, followed by a one-year testing phase. The project will then be expanded to 1 MW and to 100 MW at a later stage.
“We are now entering the next phase of scaling up. We are now going to collect the necessary investments for that, “said Oceans of Energy CEO Allard van Hoeken.
The project, which the state-run Netherlands Enterprise Agency (RVO) is financially supporting, will test the viability of PV projects at sea, in combination with wind power.
“The combined use of space with offshore wind is possible, because the solar panels can float between the wind turbines at sea,” the company explained. “The great thing about the combination of offshore sun with offshore wind turbines is that you can generate five times as much energy on the same part of the sea, and that by combining these two you get a more stable and continuous power generation, with wind blowing harder in winter and the sun shining more in the summer.”
Van Hoeken said that solar at sea could end up being cheaper than offshore wind, once the technology is scaled up. He believes that offshore PV could help the Netherlands cover 50% of its energy demand, mainly by deploying solar close to existing or planned offshore wind projects.
The company claims that the PV system will not pose a danger for the marine environment and that it could even produce a number of benefits. For example, the shadowing effect of the array on the water is negligible, as tidal currents continuously renew the seawater under the floating platforms.
Oceans of Energy also said the solar systems could offer fishing opportunities. “(We are) actively collaborating with the aquaculture sector on research in this area,” it explained.
The installation relies on standard modules that were procured by ECN. The consortium claimed the panels could even have a 15% higher yield than traditional PV systems.
Meanwhile, a Belgian consortium that includes engineering services provider Tractebel, a subsidiary of French energy giant Engie, is working on another offshore PV project in the North Sea. The group also includes DEME NV, solar manufacturer Soltech NV, and Ghent University. The €2 million PV array will be built near an aquaculture farm and offshore wind project.
Philippe De Baker, the Belgian secretary of state for social fraud, privacy and the North Sea, said in February 2018 that the government would support offshore solar in the North Sea. The first pilot project will likely be launched in 2020. | <urn:uuid:5ac1aff8-47b7-4df2-b386-db6f90b3d89d> | {
"date": "2020-01-23T23:40:15",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9485852718353271,
"score": 2.609375,
"token_count": 661,
"url": "https://www.pv-magazine.com/2019/12/12/offshore-pv-system-goes-online-in-north-sea/"
} |
Get a quick refresher on all the conversions and statistics you’ll want to know while watching the Summer Olympics. Then, enjoy the Games!
I don’t know about you, but I’m a big fan of the Olympics. Perhaps not surprisingly, I’m also a big fan of the numbers and statistics behind the games. That’s right—you might not have thought about it before, but the Olympics are chock-full-o-math. And knowing and understanding the math involved, really does enhance the experience of watching. Which is why today we’re headed to Olympic math boot camp to learn my top 7 tips for making the most of the Summer Olympic Games..
Tip 1: How to Convert Between MPH and KPH?
Much to the chagrin of metric-holdouts in the U.S. and elsewhere, the Olympic games are pretty much a metric-only affair these days. Which means you should know how to make sense of distances in kilometers and speeds in kilometers per hour. We’ll talk about how to think about distances in kilometers in a minute, but it’s good to know that 1 mile is equal to about 1.6 kilometers and 1 mile per hour is equal to about 1.6 kilometers per hour. So to convert miles into kilometers or miles per hour into kilometers per hour, just multiply by 1.6.
Tip 2: What do Distances in Meters Really Mean?
How far is 800 meters? Or 10,000 meters? If you like to watch track-and-field events, developing an intuition for distances like this will give you a better feel for what the runners are going through. Since there are 1,000 meters in a kilometer, you can use the conversion from the previous tip to figure out how long these distances are in miles. And while that’s great, it’s also nice to be able to relate the lengths of these races to things you’re more familiar with. For example, 800 meters is about the length of 10 normal Manhattan city blocks. And although this might not be something you can directly relate to, it’s interesting to know that 10,000 meters is about the same distance as the height of Mount Everest!
Tip 3: How Fast is a Millisecond?
Most timed events in the Olympics are measured with millisecond precision. But what exactly is a millisecond? If you take a second and divide it up into 1,000 pieces, each of those pieces is a millisecond. How long is that really? Well, if you’re driving your car at 60 miles per hour, you only travel about 1 inch in a millisecond. Even a passenger jet cruising at 550 miles per hour travels less than 10 inches in a millisecond. So how much time is a millisecond? Not much!
Tip 4: How Fast Swimmers Swim and Runners Run?
When watching swimmers and runners, it’s easy to lose track of the fact that they’re moving really, really fast. How fast? Well, the world record time for the 50 meter freestyle event (which is a single lap of an Olympic pool) is just over 21 seconds. Which means that a sprinting swimmer moves at more than 5.25 miles per hour—faster than a lot of people can run! As for runners, the world record time for the 100 meter sprint is 9.72 seconds. How fast is that? Nearly 34 miles per hour (the speed of a reindeer!). And that’s only the average speed for the entire race…the top speed is even faster!
Tip 5: How Many Events Are in the Triathlon, Pentathlon, and Decathlon?
What do the triathlon, pentathlon, and decathlon have to do with math? In truth, not a whole lot. But there is a bit of math buried in their names. You’re no-doubt familiar with the prefix “tri” from “triangle,” and therefore you’d probably guess that a triathlon has 3 events just as a triangle has 3 sides. And you’d be right! What about pentathlons and decathlons? Well, the prefix “pent” means 5 which explains why the modern pentathlon includes an eclectic mix of 5 events. Similarly, the prefix “dec” means 10 which explains why the decathlon has 10 events.
Tip 6: How High and Far Vaulters Vault and Jumpers Jump?
It’s easy to overlook just how high and far the vaulters and jumpers in track-and-field events are jumping. But you really don’t want to do that because the distances and heights are very impressive. The world record for the high jump is 2.45 meters. Big deal, right? Well, think about this: 2.45 meters is just over 8 feet…which means that it’s about as high as the ceiling in most houses! The long jump world record is 8.95 meters. Again, no big deal…until you realize that that’s just under 30 feet—almost as long as some city buses! How about pole vaulters? The world record pole vault is 6.14 meters or just over 20 feet—higher than a two-story building!
Tip 7: How Much Weight a Weight Lifter Lifts?
Just as with the jumping events, it’s easy to overlook the incredible feats achieved by the weightlifters at the Olympics. There are lots of different weight classes for the different sized competitors, so let’s just look at the heaviest and most burly weight class. The Olympic records for the two different weightlifting events in this class are 212 kg and 263 kg. How much weight is that? It’s a ridiculous amount—263 kg is almost 580 pounds…almost half the weight of a typical dairy cow!
Of course, this list is really just the beginning…there are lots and lots of other fascinating numbers and statistics in the Olympics. Feel free to email me your favorites at [email protected].
If you’ve enjoyed this article, I’d greatly appreciate you adding your rating and review on the iTunes podcast store. The Quick and Dirty Tips hosts are having a friendly little contest right now to see who can get the most ratings and reviews of their show on iTunes. I’m just a few new ratings from the lead, so whether you’re a brand new listener or a long-time fan of The Math Dude, please consider reviewing the podcast now and helping me pull ahead. Many thanks in advance for your support! While you’re there, remember to subscribe to the podcast to ensure you’ll never miss a new episode.
Until next time, this is Jason Marshall with The Math Dude’s Quick and Dirty Tips to Make Math Easier. Thanks for reading, math fans! | <urn:uuid:93954a32-4970-4607-9b99-22e9a921317a> | {
"date": "2020-01-23T23:23:50",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9330161809921265,
"score": 3.109375,
"token_count": 1455,
"url": "https://www.quickanddirtytips.com/education/math/olympic-math-boot-camp"
} |
Photo: Reuters, Jorge Silva
I was 9 years old and living in Los Angeles when the Northridge earthquake hit Southern California in 1994. I still remember my mother waking me in the middle of the night and rushing me under the table as books and trinkets fell from our bookshelves. Despite the lasting memory and a few shattered handicrafts, our family was not much affected. Throughout California the earthquake left only minor infrastructural damage and killed 72 people, a relatively low number for such a strong quake. So when I first heard that the earthquake of similar magnitude that hit Haiti destroyed entire Haitian cities and killed more than a quarter million people, I was shocked. For me, it was apparent that this was more than a natural disaster.
With only a little knowledge of Haitian history before the earthquake, I listened attentively to the daily reports on Democracy Now. As I learned about the role the U.S. government had played in Haitian affairs—the multiple occupations, the support for dictatorships, the CIA-backed coups—it seemed to me that the “aid” effort had to be viewed in the light of this history. For example, after the U.S. government took control of the Port-au-Prince airport, several journalists reported that planes carrying French and Cuban doctors and emergency supplies were turned away.
One year after the earthquake, more than a million Haitians are still homeless, only 5 percent of the rubble has been removed, and only 10 percent of the $5.3 billion in aid pledged by countries and organizations around the world has been spent. In the aftermath of the failed aid effort, a deadly cholera outbreak has exploded across the country. So far 5,000 Haitians have died of the disease out of 300,000 who have been infected. The Haitian writer and activist Jean Saint-Vil told Democracy Now, “One year after the earthquake, we are seeing the Haitian population being treated and seen as a threat, rather than as an asset.”
The role played by the U.S. government raises critical questions for students and teachers. How does Haiti’s history explain why it experienced such devastation as a result of the earthquake? Who or what is responsible? And why has Haiti not been able to quickly rebuild and recover?
These were the questions I wanted my civics students at Lincoln High School in Portland, Ore.,to address. Lincoln is a large public school serving Portland’s predominantly white, moderately affluent Westside. A few months after the earthquake, I prepared a unit that I hoped would take my students through a learning experience similar to the one I went through in the first weeks after the disaster.
We spent the first two weeks of the unit building background information. It was important that students understood the significance of the Haitian revolution—the only successful slave rebellion in history—which became an inspiration for other revolutions across the world and ended in the creation of the first independent nation of Latin America in 1804. My students were stunned that it took nearly 60 years for the U.S. government to recognize the first black republic, that the French immediately saddled Haiti with a debt of 90 million gold francs to pay slave owners for their “stolen property,” and that in 1915 U.S. Marines invaded Haiti and occupied the country for 19 years. My students wondered why they had never before learned about the U.S. occupation of Haiti. As Haitian writer Edwidge Danticat so eloquently explained: “Few Americans are aware their country once occupied ours, and for such a long time. This is not surprising, for as one Haitian proverb suggests, while those who give the blows can easily forget, the ones who carry the scar have no choice but to remember.” | <urn:uuid:46486a09-82e6-4ae3-9ace-af0376c8d107> | {
"date": "2020-01-24T00:26:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9770424962043762,
"score": 2.8125,
"token_count": 773,
"url": "https://www.rethinkingschools.org/articles/te-tremble-an-unnatural-disaster"
} |
What is the single most importatnt term or concept in Environmental Science?
Sustainability. Sustainability has many similar but different meanings across different fields. Basically it refers to humans using resources modestly so that the same resources are available for future generations. It refers to humans living within their means, sonsuming resources at a rate below the sustainable yeield. | <urn:uuid:6892e8af-e85f-44ee-bd80-13edf602fd44> | {
"date": "2020-01-23T23:50:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9443958401679993,
"score": 2.65625,
"token_count": 74,
"url": "https://www.sanleandro.k12.ca.us/site/default.aspx?PageType=3&ModuleInstanceID=15177&ViewID=9fc4dc78-f943-4224-8465-6c780e58f4df&RenderLoc=0&FlexDataID=16550&PageID=2257"
} |
Ranier Whipple II returned from spring break with stories to tell about the black history lessons he learned on a civil rights tour though Alabama. Near the end of the three-day journey, the nine-year-old turned his learnings into a prayer – “that we be nice to each other and love people.”
Rainer travelled with his grandmother, Evonne S. Whipple, and 18 other adults. Together they relived the 1963 bombings that took the lives of four girls at the 16th Street Baptist Church in Birmingham; walked the sacred grounds in Montgomery commemorating the lynchings of some 4,400 African Americans; and retraced the steps of hundreds of others who faced danger as they marched across the Edmund Pettus Bridge in Selma in 1965.
When tour members began their walk across the bridge, Ranier froze.
“As brave as he was, he was nervous,” said George Shinhoster, who walked alongside the Isle of Hope School student. “He understood what happened on that bridge. He knew people were beaten on that bridge. He didn’t want that to happen to him.”
Shinhoster and Shirley Miller Gamble, who as teenagers became involved in the fight for equality in Savannah, organized the bus trip to museums and historical sites in Alabama. Through their Majestic Travel civil rights tours, they want people to learn from their history and create positive changes.
Lemuel and Beatrice Campbell celebrated their 56th wedding anniversary by taking the tour. Mrs. Campbell said the Legacy Museum in Montgomery “brought back so many vivid memories…so many emotional feelings.”
The Legacy Museum in downtown Montgomery focuses on the terror filled passages of blacks from enslavement to mass incarceration. The museum’s sister site is the sixacre National Memorial for Peace and Justice, which is also called the lynching museum.
For Edna Branch Jackson, Savannah’s first African American woman mayor, the tour highlighted the importance of sharing this history with young people.
After watching a video about civil rights martyrs at the Southern Poverty Law Center in Montgomery, Ranier typed his name on the 20-by-40-foot Wall of Intolerance. He was taking a pledge against intolerance and injustice, which for him meant “to not do bad stuff.”
For most on tour, Ranier’s presence highlighted the necessity of engaging more young people in carrying on the civil rights work begun decades ago. As a banner at the SPLC declared, “The March Continues”. | <urn:uuid:d6758862-7e6d-4009-aa64-7119ad6300b0> | {
"date": "2020-01-23T22:53:13",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9572731256484985,
"score": 2.78125,
"token_count": 530,
"url": "https://www.savannahtribune.com/articles/student-learns-black-history-lessons-on-civil-rights-tour/"
} |
We recognize words as pictures
As your eyes scan these words, your brain seems to derive their meaning instantaneously. How are we able to recognize and interpret marks on a page so rapidly? A small new study confirms that a specialized brain area recognizes printed words as pictures rather than by their meaning.
Researchers led by neuroscientist Maximilian Riesenhuber of Georgetown University Medical Center scanned the brains of 12 subjects with functional MRI. They focused on a tiny area of the brain known to be involved in recognizing words, the visual word form area (VWFA), found on the surface of the brain, behind the left ear. The VWFA's right hemisphere analogue is the fusiform face area, which allows us to recognize faces. In young children and people who are illiterate, the VWFA region and the fusiform face area both respond to faces. As people learn to read, the VWFA region is co-opted for word recognition.
The researchers presented the subjects with a series of real words and made-up words. The nonsense words elicited responses from a wide pool of neurons in the VWFA, whereas distinct subsets of neurons responded to real words. After subjects were trained to recognize pseudo words, however, neurons responded as they did to real words, according to the paper published in March in the Journal of Neuroscience. Because the nonsense words had no meaning, Riesenhuber deduced that our neurons must respond to words' orthography—how they look—rather than their meaning.
As we become more proficient at reading, then, we build up a visual dictionary in the VWFA—much as we accumulate a catalogue of familiar faces on the opposite side of our brain.
We “hear” written words in our head
Sound may have been the original vehicle for language, but writing allows us to create and understand words without it. Yet new research shows that sound remains a critical element of reading.
When people listen to speech, neural activity is correlated with each word's “sound envelope”—the fluctuation of the audio signal over time corresponds to the fluctuation of neural activity over time. In the new study, Lorenzo Magrassi, a neurosurgeon at the University of Pavia in Italy, and his colleagues made electrocorticographic (ECoG) recordings from 16 individuals. The researchers measured neural activity directly from the surface of the language-generating structure known as Broca's area as subjects read text silently or aloud. (This measurement was made possible by the fact that participants were undergoing brain surgery while awake.)
Their neural activity was correlated with the sound envelope of the text they read, which was generated well before they spoke and even when they were not planning to speak, according to the report published in February in the Proceedings of the National Academy of Sciences USA. In other words, Broca's area responded to silent reading much in the same way auditory neurons respond to text spoken aloud—as if Broca's area was generating the sound of the words so the readers heard them internally. The finding speaks to a debate about whether words are encoded in the brain by a neural pattern symbolic of their meaning or if they are encoded via simpler attributes, such as how they sound. The results add to mounting evidence that words are fundamentally processed and catalogued by their basic sounds and shapes. | <urn:uuid:37191aa5-1372-4d9f-abd1-8759e86a6539> | {
"date": "2020-01-23T22:58:08",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9690543413162231,
"score": 3.734375,
"token_count": 682,
"url": "https://www.scientificamerican.com/article/when-we-read-we-recognize-words-as-pictures-and-hear-them-spoken-aloud/?error=cookies_not_supported&code=0849c539-ade9-42fc-bde8-dee6e082d2f7"
} |
Repeated coral bleaching events due to global climate change are permanently altering the diversity and structure of marine fish communities, according to a long-term study in the Seychelles.
An 18-year study revealed that repeated episodes of severe coral bleaching are permanently changing the diversity and structure of the marine communities they support. An international team of researchers discovered that coral reef fish communities in the Seychelles did not return to the levels of species richness that existed before bleaching despite a 16-year recovery period (1998–2014) between two climate‐driven mass coral bleaching events (1998, 2016). Instead, the scientists found that after a bleaching event, coral reef communities were dominated by herbivores, with few small fishes and even fewer large fishes present. The researchers confirmed that these patterns extend to species that provide important ecosystem services, such as fisheries.
Are coral reefs doomed?
“Fair question,” said lead author, James Robinson, a Senior Research Associate at Lancaster University, who studies how human pressures on coral reefs affect ecosystem function.
“Coral reefs aren’t doomed, but they will certainly look very different to how they did 10-20 years ago. Coral bleaching from heat stress is probably the main threat to the existence of coral reefs, and our study suggests that even just one major bleaching event can change the diversity and composition of fish communities.”
Changes in fish populations were most obvious in coral reefs that became engulfed in forests of seaweed — but all bleached coral reef communities showed signs of damage. The data revealed substantial changes in the composition and diversity of fishes: herbivorous fishes dominated virtually all of the coral reefs, even those that were not transformed into seaweed forests (Figure 4).
Further, although some coral reefs appeared to recover following a bleaching event, the original composition of their fish species did not return.
“We found that fish didn’t recover towards their pre-bleaching levels, which suggests that bleaching impacts on reef fishes can be persistent,” Dr. Robinson said in email.
Before a bleaching event, a coral reef community is comprised of greater numbers of large predatory fishes, such as snappers and groupers, and a large number of very small fishes, such as damselfish and butterflyfish, but after bleaching, a new community of fishes emerged, dominated by algal-feeding parrotfish and rabbitfish and invertebrate-feeding fishes, such as emperors and wrasses.
“On a more positive note — we didn’t record species extinctions, just changes in species abundances. So these reefs continue to support fish life, and this is actually very promising,” Dr. Robinson pointed out, adding that he and a team of collaborators published a study earlier this year about how the Seychelles’ coral reef fisheries changed after bleaching (ref).
“Although the 18-year period between major mass bleaching events allowed corals to recover on some reefs, we found evidence that fish populations were not able to return to their pre-bleaching levels, and they were substantially altered on the reefs that become dominated by seaweeds,” Dr. Robinson said.
“With bleaching events now occurring relatively frequently (< 10 years in many places, including Seychelles), there simply isn’t enough time for fish populations to recover,” Dr. Robinson explained in email.
Thus, these observed changes in reef fish biodiversity are permanent.
“Given realized and projected frequencies of bleaching events, our results show that fish communities historically associated with coral reefs will not re‐establish, requiring substantial adaptation by managers and resource users,” the researchers wrote in their paper (ref).
Corals are also permanently harmed by frequent bleaching events.
“We actually published another study on the recovery rates of corals in Seychelles, and found similar results — the time between bleaching events is too short to allow corals to regrow to their pre-bleaching levels [ref],” Dr. Robinson added in email.
The researchers think that fundamentally altered reef fish communities will be the prevailing outcome in other coral reefs around the world, and this could become the ‘the new normal’ after a coral bleaching event.
“The new normal for coral reefs will be reef fish communities which have fewer species and are dominated by herbivores and invertebrate feeding fish. This will alter the way coral reefs function, and the fishery opportunities for coastal communities adjacent to coral reefs,” said study co-author, Nick Graham, a professor of marine ecology at Lancaster University who studies the patterns and processes by which degraded coral reefs recover, and how this may be influenced by management.
“Ocean warming is already causing irreversible changes to coral reefs — our study documents the impacts of a mass bleaching event which happened 20 years ago, and many more coral reefs have bleached since,” Dr Robinson said in email.
How did the local fisheries fare following the coral bleaching event?
“We found that the increase in herbivore biomass on the bleached reefs, especially on new seaweed reefs, translated to an increase in fish catches,” Dr. Robinson replied in email.
Can anything be done to help coral reefs?
“Bleaching events are due to ocean warming, and much of the heating we see today has been baked in for many years already,” Dr Robinson replied in email.
“There is little evidence that local management efforts can prevent bleaching. Only global emissions reductions can prevent the decline of coral reefs.” | <urn:uuid:dc4dbe1a-8dcc-489b-91e9-a7bc2229936d> | {
"date": "2020-01-24T00:18:07",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9507149457931519,
"score": 3.859375,
"token_count": 1167,
"url": "https://www.seadwelling.com/how-to-fix-a-sliding-screen-door-that-sticks/"
} |
After civil war broke out in Somalia, my family moved to Uganda in search of security. Following years in an indeterminate state as refugees, we finally landed in Seattle.
My first encounter with the American school system rattled me. My mother dropped me off at Thurgood Marshall Elementary School in Seattle’s Central District, and said, “nabad gelyo,” “goodbye” to me in Somali. Before I even began settling into the classroom that day, my teacher told me that, in order to be successful, it was important that I only speak English, emphasizing that my Somali language skills would not be helpful.
If only this teacher knew then what we know today: Knowledge of more than one language can boost a child’s creative thinking and problem-solving skills and, when children have a strong understanding of their home language first, it actually helps facilitate learning a second language such as English.
Thankfully, my mother worked hard to ensure my siblings and I kept speaking Somali, but many other immigrant students systematically discouraged from speaking their home language were not so lucky. Even today, families encounter the misleading attitude and popular narrative that speaking another language can confuse children and detract from English learning.
That’s why today, immigrant rights organization OneAmerica, launched a statewide “Speak Your Language” campaign.
More than 180 languages are spoken in South King County alone, and in many parts, more than a quarter of the population speaks a language other than English. Linguistically diverse families are a growing asset to our schools and communities, and we need to continue advancing policies and systems that recognize this, while helping to close the opportunity gap in our schools.
As an education organizer with OneAmerica, I took part in a December community event at South Seattle’s Graham Hill Elementary School, coordinated in partnership with their Parent and Teacher Association and the school. The aim was to celebrate and learn about the many languages spoken within the school, and increase pride in bilingualism and multilingualism among students and their families.
I was able to tell the parents about opportunities students have to earn high school credit for demonstrated proficiency in their home language and show them a video that was actually translated in their home language.
During small group discussions, parents expressed that it is important for schools to honor students’ native language and help students realize that being multilingual can create career opportunities. They made a commitment to speak their home language to their children through storytelling and daily activities.
However, parents also expressed some of the obstacles they encountered in supporting their children. Some explained that they were not fully literate in their home language and were not able to read to their children at home. Somali parents asked for more support in the form of Somali-English tutoring and after-school programs, and parents from all of the language groups asked for additional support in accessing books in their home language.
Not only was the dialogue at Graham Hill Elementary a breakthrough for many families who have received years of negative messaging about nurturing home languages, but a testament to the need to learn more about how to best support multilingualism in the school day.
Important progress has been made since my first day at Thurgood Marshall Elementary with more schools and districts increasingly embracing bi-and -multilingualism. Highline School District is leading the way with the goal for their class of 2026 to graduate fully bilingual and biliterate. High school students can now earn world language credits through competency testing in their home language, and a Seal of Biliteracy on their high school diplomas. Last year, legislation passed to award grants to schools for dual-language education.
Advocacy efforts like the “Speak Your Language” campaign give me hope that we can change the narrative about language learning so that one day, no child will experience shame for speaking their home language, and instead, feel great pride in their multilingualism.
But without strong, positive messages from schools and surrounding communities, immigrant children often abandon their home language, reject their home culture, lose their ability to communicate with their families and fail to benefit from the recognized development benefits of bilingualism.
Schools, educators, service providers and community leaders play a key role in keeping the progress going on home language learning, so that immigrant students don’t get left behind.
Here are a few actions one can take through our “Speak Your Language” campaign:
- Host a community event to talk about home language.
- Talk with students about the value of their bilingual skills.
- Hold a ceremony for students who have earned a Seal of Biliteracy.
- Spread the word about the World Language Credit Program.
- Contact your legislators, and ask them to advance dual language policy. | <urn:uuid:f15be454-ee99-400a-934e-c06de33518ab> | {
"date": "2020-01-23T22:44:43",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9719763994216919,
"score": 2.984375,
"token_count": 979,
"url": "https://www.seattleglobalist.com/2016/02/16/home-language-learning-ell-seattle-highline-schools/47462"
} |
Introduction of Stainless Steel Pipe Making Machine:
Stainless steel pipe making machine is designed for manufacturing stainless steel straight welded pipe for metallurgy, construction, transportation, and machinery and vehicle industries. To be specific, the stainless steel pipe production line can produce round pipe, square and rectangular tube, as well as section steels through cold rolled forming and high frequency welding technology.
This pipe making machine adopts long steel strip as the material to manufacture steel pipes according to requested size by cold rolled forming and argon arc welding method.
Structure of Stainless Steel Pipe Making Machine:
1) Double Side Uncoiler
2) 3-Stage Roller Tube/Pipe Making machine
3) Welding Seam Grinding
4) Auto Cutter Unit
5) Electric Control System Equipment
6) Forming Roller
7) Auto Unloading Platform
Production Flow Chart:
Unfolding strip → Branding →Forming →Welding →grinding →Sizing →Straightening → Length fixing →Cutting →Un loading.
First, the coil is set onto the uncoiler, and the steel belt is loosened and rolled into the storage cage, before being transported into the forming machine.
The steel belt is first flattened out, and is processed through rollers to squeeze it to the desired pipe diameter.
The machine then welds, straightens and cuts the pipe to the length set in the automated cut-off machine, and transports the finished pipe to the run out table, where quality inspection can be performed.
Technical Parameters of Stainless Steel Pipe Making Machine: | <urn:uuid:91f940f0-d4d1-4803-95a1-8d9c7c8e0c57> | {
"date": "2020-01-23T23:26:29",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8505748510360718,
"score": 2.703125,
"token_count": 327,
"url": "https://www.shanghaimetal.com/steel_pipe_making_machine-548.htm"
} |
NASA's Lunar Reconnaissance Orbiter (LRO) looked back at Earth and snagged some impressive imagery during last week's long-awaited Great American Solar Eclipse.
As LRO crossed the lunar south pole heading north at 3,579 mph (5,760 km/h) last Monday (Aug. 21), the shadow of the moon was racing across the United States at 1,500 mph (2,400 km/h).
LRO executed a slow 180-degree turn to look back at Earth and capture a photo of the eclipse very near the spot of maximum length of totality. The Lunar Reconnaissance Orbiter Camera's (LROC) Narrow Angle Camera began scanning Earth at 2:25 p.m. and 30 seconds (18:25:30 GMT) and completed the image 18 seconds later, mission team members said.
Typical day on the moon
"While all of Monday's thrill was in experiencing the shadow of the moon sweep across us on Earth, on the moon this was just another typical day," said LROC principal investigator Mark Robinson, of Arizona State University.
"The lunar nearside was one week into its two-week night, while the sun shone on the farside in the middle of its two-week day," Robinson added. "For the moon, and the LRO spacecraft observing the moon, the real excitement is during a lunar eclipse, when the shadow of the Earth sweeps across the moon."
Robinson added that, during lunar eclipses, surface temperatures on the moon drop rapidly. LRO's thermal imager, the Diviner Lunar Radiometer, can learn about the material properties of lunar rocks and soils by studying their temperatures just after the lights abruptly go out.
"Though for the LRO spacecraft itself, the Earth's shadow means that most of the other instruments must be powered down because of the lack of power coming from the solar panels," Robinson said.
Launched on June 18, 2009, LRO has collected a treasure trove of data about the moon with its seven powerful instruments. LRO is managed by NASA's Goddard Space Flight Center in Greenbelt, Maryland, for the Science Mission Directorate at NASA Headquarters in Washington, D.C.
Leonard David is author of "Mars: Our Future on the Red Planet," published by National Geographic. The book is a companion to the National Geographic Channel series "Mars." A longtime writer for Space.com, David has been reporting on the space industry for more than five decades. Follow us @Spacedotcom, Facebook or Google+. This version of this story was posted on Space.com. | <urn:uuid:b47c600c-426b-4b9d-a9a4-255459c86dd0> | {
"date": "2020-01-24T00:00:24",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9432896971702576,
"score": 3.109375,
"token_count": 533,
"url": "https://www.space.com/37979-solar-eclipse-2017-nasa-moon-probe-photo.html"
} |
As we continue our discussion into the esoteric mysteries of the Tree of Life, this chapter covers a range of topics within the mystical realm of the Qabalah; the basic understanding of Qabalah as a whole the nature of the Hebrew language, and the different kinds of Qabalah systems that exist.
Qabalah translates to “Received Tradition”, or simply “to Receive”, and actually is an ancient esoteric interpretation of the Torah, the first five books within the Old Testament.
These teachings have a very mysterious origin, with some claiming that they were originally received by Moses, while others suggest that it was Abraham who was the first to describe the Qabalah. Regardless of these possibilities, the first actual texts on Qabalah were written in the Zohar in 13th century Spain.
The Qabalah describes the physical world we live in as being a world of outcomes, but not a world of causes. This physical plane we live in is the result of the invisible forces of nature, which creates the projection of tangibility, a hologram that we have come to believe is solid.
There are also different types of systems for understanding the Qabalah as well. There is the spelling with a Q, the one we’ve been using. There is also Kabbalah with a K, and even Cabalah with a C. This is because of the widespread use of Qabalah between different religions and spiritual practices over time. In the traditional Hebrew spelling, Qabalah is translated to the letters Qoph, Bet, Lamed, He. In English this sort of translates to QBLH, as there are no vowel letters in the Hebrew Alphabet.
Over time, Qabalah has been adopted by a wide array of different traditions and practices, which have led to three predominant spellings to correlate each tradition’s specific understanding of the practice.
The original version is spelled with a K. This is the Hebrew Kabbalah and is set in its traditional scriptures, not deviating or expanding beyond the borders of the faith. This was soon adopted by Christians and Cabala was spelled with a C to distinguish it from the Hebrew version.
Finally, after the rediscovery of the ancient writings attributed to Thoth or Hermes during the Renaissance, another Qabalah was developed, this time spelled with a Q, which today is called Hermetic Qabalah. This modern version of the Qabalah explores the same esoteric Hebrew practice, correlated with the wisdom and writings attributed to Thoth-Hermes, and over time has been related to a lot of other world spiritualities as well.
Dion Fortune – The Mystical Qabalah | <urn:uuid:a030588b-d8bb-42c4-9fce-f5810316f38f> | {
"date": "2020-01-23T23:12:36",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9527161121368408,
"score": 2.734375,
"token_count": 554,
"url": "https://www.spiritsciencecentral.com/blog/Spirit%20Science%2035_3%20Mysteries%20of%20Qabalah%20Tree%20of%20Life%20Pt-%203"
} |
With the number of hedgehogs diminishing from 35 million in the 1950s to now just one million in the UK, there is every chance that the UK’s favourite mammal could become no more.
However, there is still hope as a petition has been created by Queen guitarist and animal rights activist Dr Brian May to give hedgehogs protected status. By becoming a protected species, this would mean that hedgehogs would, by law, be protected from being harmed.
This comes after the launch of the Amazing Grace Campaign which follows the story of a hedgehog named Grace and her recovery. The British Hedgehog Preservation Society, Save Me Trust and the Harper Asprey Wildlife Rescue all support the petition.
Anne Brummer, CEO of the Save Me Trust, states how protected status would help the species: “We think they are being killed by people systematically and the area we are changing is not compatible…by 2025 [if helped] they will remain in isolated office and protected status will give them that; if we can get them protected they will be able to survive in large areas.”
Emily Wilson, Hedgehog Officer for the People’s Trust for Endangered Species, explains what it would mean if the hedgehogs received protected status: “Upgrading legal protection would mean adding the hedgehog to Schedule 5 of the Wildlife and Countryside Act, where it would be listed as a fully protected species alongside the otter, dormouse and red squirrel. This would mean that hedgehogs would need to be protected in regards to any future developments and cannot be killed deliberately.
“However, this would not protect hedgehogs from the other major factors that are responsible for their decline, such as loss of habitat – like hedgerows and green spaces – and road traffic.”
Emma Bristow, an avid hedgehog carer from Hedgehogs North East, explains how we can care for our spiky friends:
“Put out food and water. Never put out milk or bread as hedgehogs are lactose intolerant and bread has no nutritional value to hoggies. Use meat-based cat and dog food (not fish-based as hedgehogs are intolerant to fish protein) and dried mealworms which are favourites of hedgehogs.”
If you would like to sign the petition or want to find out more, here are some useful links: | <urn:uuid:15af9b73-b2bd-4888-b1ee-592e4c46b655> | {
"date": "2020-01-23T22:37:18",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9669724702835083,
"score": 2.734375,
"token_count": 494,
"url": "https://www.sr-news.com/index.php/2018/03/20/hedgehogs-are-the-nations-favourite-mammal-but-for-how-much-longer/"
} |
The Swiss education system can be divided in three main parts: compulsory education, upper secondary level and tertiary level. A specificity in Switzerland is the high degree of permeability: there are different ways to reach your goal and you can switch easily from one to the other! Let’s look at it from top to bottom.
Higher education forms the tertiary level. In order to qualify for this level, you have to get an upper secondary degree (maturity certificate). You’ve got one? Great! So, you have to choose between:
- professional education and training colleges – which enable professionals who have completed vocational education and training to specialize and to enhance their skills and knowledge; and
- the universities – which offer various academic and practice-oriented programmes
You’re interested in studying at university level?
Then you’re in the right place on this website! But which sort of tuition are you looking for? Depending on what you want to become, you will choose to go to a:
These are the three different types of universities in Switzerland.
Upper Secondary Level
At this level, the responsibility is divided through the cantons and the Confederation.
After the compulsory education, students have the opportunity to choose an apprenticeship. The majority of the week (three or four days) is spent working in a company (practical learning) and the rest of the week is spent in a vocational school (one or two days): this is the dual-track system. At the end of their professional training, students receive a VET (vocational education and training) certificate. They can also conclude the apprenticeship with a federal vocational baccalaureate.
Students can also study in a middle school/high school or in an upper secondary specialised school. At the baccalaureate school (Gymnasium/gymnase), they will receive a “maturity certificate”. In upper secondary specialised school, they will receive a “specialised baccalaureate” (Fachmaturität/maturité spécialisée). These schools prepare the students for further education at the tertiary level.
Compulsory Education: Primary and Lower Secondary Level
Public compulsory education is free. It usually takes 11 years to complete compulsory schools: eight years at primary school (including two years of first learning cycle) and three years of secondary school. Some differences may exist between the different cantons. The 26 cantons are responsible for compulsory education. Each local municipality organizes the schools and daily work. The language of instruction is French, German, Italian or Romansh, depending in which part of Switzerland the school is located. Pupils enjoy mandatory classes in a 2nd national language and in English. | <urn:uuid:87b888b5-eee9-45ec-b3bc-b9dfcd8133f4> | {
"date": "2020-01-23T23:55:52",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9536496996879578,
"score": 2.96875,
"token_count": 571,
"url": "https://www.studyinswitzerland.plus/education-system/"
} |
The old Balkanisation refrain has been revived since the election of Félix Tshisekedi, brandished by a Congolese opposition that has no interest in peace in the DRC and which wishes to stir up hatred against Rwandans and Rwandan-speaking Congolese. A pure and simple sham.
Africa’s prosperity depends on sustainable cities
Carlos Lopes, high representative of the Africa Union Commission, gives his views on climate change from the 2019 African Climate Summit.
Last week, delegates from around the world met in Accra for the 2019 African Climate Summit.
It is no accident that the first ever regional climate summit is in Africa. Although Africans are responsible for only a tiny share of the carbon emissions that cause climate change, the continent is especially vulnerable to climate shocks. The 54 countries face a range of risks, from more severe flooding to drought to heat stress.
Many of these hazards are most pronounced in Africa’s cities.
- Hard surfaces like roads and buildings do not absorb water, so there is more run-off and therefore more flooding.
- Concrete and asphalt also radiate heat, particularly if there is no green space.
- In summer, temperatures in informal settlements in Nairobi are up to 4°C hotter than other parts of the city.
Climate stress will only increase as Africa’s towns and cities grow. The urban population of Africa is predicted to expand by nearly a billion people between 2015 and 2050. This will place more pressure on the environments around towns and cities.
- Cape Town discovered this in the terrifying months counting down to ‘Day Zero’, a water crisis that it averted in 2018 by severe water rationing.
Perhaps this is why many African countries are global leaders in the fight against climate change. Despite their low levels of emissions, countries from Burkina Faso to Kenya have committed to reduce emission intensity. Every tonne of greenhouse gases they avoid will help to allay the impacts of climate change.
With a growing share of both people and economic activity in urban areas, low-carbon cities will be absolutely key to reducing climate risk. The African Climate Summit recognises this, focusing on human settlements and energy. And cities from Accra to Durban are already making plans to reach carbon neutrality by mid-century.
But African governments cannot focus narrowly on climate mitigation in cities: they must also find ways to reduce poverty, create decent jobs and reduce pollution. It is therefore essential to identify low-carbon measures that also deliver real improvements in people’s lives.
And now, success stories are emerging from across the continent. These offer hope that choosing a green path can make African cities cleaner, healthier and richer.
- Solar-powered street lights have been installed in Jinja, Uganda. Street lighting leads to safer streets, with extended opening hours for small businesses. And solar-powered street lights cost 25% less than conventional street lights, so many more can be installed for the same price.
- Waste collection and recycling has been extended to informal settlements in Kampala, Uganda. By formally partnering with waste pickers, the state has been able to improve the livelihoods of the poorest while reducing flooding and disease.
- Wide sidewalks and car-free days in Kigali, Rwanda, are encouraging people to walk rather than drive, which especially benefits those who cannot afford cars.
- And Bus Rapid Transit (BRT) systems have been constructed in Cape Town, Johannesburg, Dakar, Dar es Salaam, Lagos and Nairobi, which help tackle air pollution and congestion.
- In every case, these cities have found a low-carbon path to address urgent priorities: public health, decent work, safe streets.
Every one of these success stories has, at its heart, a partnership between national and local governments.
Municipal authorities have a critical role to play in planning and providing public services.
- Housing and transport, for instance, will all be better suited to local people’s needs if the state involves them in decision making. And people need to be able to reach their governments easily to tell them when a street light isn’t working or their waste isn’t being collected. It is hard to reach the national minister, but easy to reach the local councillor.
But municipal authorities need support to address the many challenges they face. Perhaps they cannot partner with waste-picker cooperatives if public procurement policies demand certain legal documents. Perhaps they cannot afford the construction costs of a new bus network. Perhaps they do not have the technical skills to install solar-powered street lights. In each of these cases, national governments can support local governments to deliver better public services at a lower cost – and with fewer emissions.
The African Climate Summit is the first step on the road to the annual climate negotiations. We should take this moment to celebrate African leadership on climate change. In cities across the continent, we see that there are opportunities to improve living standards today and ensure a safer planet in the future. Both national and local governments should be proud of these success stories. | <urn:uuid:23b6d5fb-1c7e-492c-b4ee-8376a40658a1> | {
"date": "2020-01-24T00:18:12",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9428158402442932,
"score": 2.921875,
"token_count": 1050,
"url": "https://www.theafricareport.com/10824/africas-prosperity-depends-on-sustainable-cities/"
} |
Bose is one of the pioneers of the audio industry. Throughout the years, Bose has created some of the world’s most popular audio system and has invested plenty of time and resources into changing the way that people hear and experience sound.
A Bit of Bose History
The story of Bose goes way back to 1964, when the company was founded by Amar Bose. It is a worldly-renowned company that manufactures and sells audio equipment, and it’s particularly popular because of its speakers and audio systems.
Throughout the years, as they gained more experience, Bose started centering its values around the idea that technology needs to be able to improve people’s lives on many different levels. In order to achieve its mission, Bose was heavily invested in making sure they develop a company with plenty of engineers, design specialists, marketers, developers, and so on. By bringing together people who are passionate and good at what they do, Bose knew it could create quality products for its market.
Some of Bose’s most significant milestones include:
- 1964: The year when Amar Bose created the company bearing his name. However, the company’s first product wasn’t launched until 1966. It was their very first loudspeaker, but due to Bose’s lack of experience, it didn’t have very much success.
- 1968: This is the year that marks one of Bose’s first successful product: another speaker. Why was this special, you ask? Because the speaker was designed to mimic the emotional audio experience that people felt when attending a live concert. The company focused a lot more on product demonstration, so the 901 speaker was a success.
- 1978: Fast forwards through a decade of speaker innovation, a global launch, and plenty of product development, 1978 marks the year when Bose, while traveling by air, discovered how much the world could use noise-cancellation technology. Disrupted by the background noise, Bose developed the mathematics for noise-cancellation headphones immediately after landing. However, it was only in 1986 that the first noise-canceling headphones developed by Bose were actually tested on a flight, by pilots Jeana Yeager and Dick Rutan.
- 1987: Bose and William R. Short receive the Intellectual Property Owners Education Foundation’s Inventor of the Year Award for their development of the waveguide loudspeaker system.
- 1988: During the winter Olympics in Canada, Bose became the very first company to provide sound systems for such an event.
- 1998: Bose opens its first international store in New Dehli.
- 2004: Further expanding its knowledge, Bose turns its linear-motion actuator technology into a business capable of supplying materials and simulation instruments to engineering companies, universities, research institutions, and so on.
- 2008: Bose’s founder was introduced into the Akron Hall of Fame for his outstanding achievement in the field of audio technology.
- 2013: Amar Bose dies at the age of 83, but the company continues his legacy after appointing Bob Maresca as the CEO of the company.
The Concept behind Bose’s Sleebuds
When you hear words like “earbuds” or “sleepbuds”, you’re probably picturing a set of in-ear headphones that connect to a mobile device, like a smartphone or a music player, and can render the audio tunes that you play on said device. That’s why you might be tempted to think that these sleepbuds do the very same thing.
Actually, the Bose sleep headphones are basically a smaller wireless sound machine, which a much higher sound output quality. In other words, these are not headphones that stream music, they are earbuds that block external noise and background noise that could potentially prevent you from sleeping.
But even if they are designed to be used as sleep headphones, they can also serve people who are looking to “tune out” and perhaps study, meditate, or simply for those who don’t feel like listening to the racket and other people’s conversations while they’re on the bus.
The entire concept of the Bose sleep headphones is pretty simple: you pick a sound out of the preset ones available, you set an alarm to wake you up in the morning, and you just sleep. The headphones are controlled from the mobile app, which is quite simple to navigate through.
The preloaded sounds are, as follows:
- Tranquility: Created to be like a soothing spa melody.
- Warm static: This is very similar to the white noise you get from the machines that bear the same name.
- Swell: For those who enjoy listening to the sound of waves.
- Downstream: For people who like to imagine they’re walking through the forest, with a stream running beside them.
- Shower: Soothing rainfall sounds.
- Cascade: Because the sound of water falling is awesome.
- Rustle: Gentle sound of wind interacting with leaves.
- Circulate: For sleepers who enjoy fan sounds.
- Altitude: Great for those who like the airplane cabin ambient noise.
- Campfire: Self-explanatory, but with crickets in the background!
It’s easy for people to get confused when they first try to set up a kind of product that they’ve never used before. However, Bose has created an entire flow around the process that first-time users have to go through, streamlining the experience so that even the less tech-savvy can have functional headphones in minutes.
Bose has a special app that you can download on your smartphone and the wizard will guide you through the setup every step of the way. You will then pair your sleeping headphones with your phone, which can be either an Android or an iOS device.
The Bose Sleepbuds are charged by placing them inside their case. However, there is a precise position that you have to nail every time if you want these earbuds to actually charge. The magnets integrated into the system can make sure that the headphones are actually charging, but they don’t serve really well in guiding you to placing these in the right position.
As advertised, the Bose sleep headphones are meant to provide you with 16 hours of battery autonomy, and this marketing promise is almost true. Of course, the battery’s life will depend on how you use your device. If you choose to listen to the sound for 30 minutes, the battery will certainly last longer than those who opt for continuous sound playback.
Unboxing & Design
Design and comfort are two aspects that go hand-in-hand, but we wanted to talk about them separately because there’s plenty to be said about both. The concept behind these headphones is to plug the ear, allowing little to no noise to reach your ear canal.
That’s one of the things that make this product so brilliant: it has a sleek design that easily fits inside the ear and stays there. And while we’re talking design, we can’t help but praise how good the case looks. The Bose sleep headphones come with an aluminum case… with a twist.
Aside from keeping the headphones protected when not in use, and serving as an excellent carrying case that won’t allow you to lose your headphones in your backpack, this case also acts as an external battery charger, but for headphones. The case provides you with about 16 hours of charge even when you’re nowhere near a USB port. The only weird thing is that Bose opted for a micro USB port, instead of the newer and faster-charging type C.
Getting past that, you slide the case open to reveal the headphones, which look like something out of a sci-fi movie. It becomes clear why Bose is a world-leader in its field. The earbuds feature a Sleep tip, which is actually another means to block out noise. It’s absolutely vital to mention that the sleep tip is available in three different sizes, which is important to know because this means that the Bose headphones are designed for every ear size, which is awesome, to say the least.
Measuring about 1 x 1 cm and weighing in at 1.4 grams, these headphones are small and lightweight. It is about at this point that people start thinking why on Earth they cost so much.
Probably the most important aspect for many of you when considering buying headphones that are designed for sleeping is how comfortable they feel when you’re actually in bed. Throughout the years, manufacturers that have looked to create comfortable sleeping headphones have struggled with finding a concept that works for as many people as possible. But let’s talk Bose.
One of the best things about these Bose earbuds is that they seem to fit snuggly into just about any ear size. However, the trickiest aspect to analyze when it comes to comfortable sleeping headphones is how they feel if you’re a side sleeper. Back sleepers will often find it easier to discover headphones that they find comfortable because there is no pressure exerted between the headphones and the pillow if you lie asleep on your back.
Now, the thing with these headphones is that it’s often a love-hate relationship. What that means is that people who have used the headphones either fell in love with how they felt or never got used to them. There’s really no telling what type of relationship you’ll have, but here are some considerations that might give you a clue whether or not you two are a match:
- Even customers that now love their Bose sleep headphones needed a break-in time to get adjusted to how these felt. That means that you shouldn’t give up on them even if they seem very uncomfortable the first few nights.
- If you’re a side sleeper, the plastic of the earbuds might make a disturbing noise if you tend to toss and turn a lot while you’re sleeping. However, that isn’t really a problem unless you’re a very light sleeper.
How They Work
Because the Bose sleep headphones are not designed to replace your average headphones, but rather to enhance the benefits and quality that you’d want to get from a sound machine, they are designed to be compatible with the Bose app only, so trying to sync them with some of your streaming platforms is useless.
The app is a very important part of how much you’ll love the Bose headphones because once you’ve understood everything it does, will you be able to fully embrace the concept of this product. The app features information that you’ll want to access sooner or later, such as a battery level indicator (because these wireless headphones will need charging at some point), the preset sound options, and even a timer for the sound you’ve chosen.
The Bose headphones provide a total of 10 different sounds, which are divided into two main categories: sleep and relaxation. As mentioned before, when you select one of these sounds, you are also able to adjust its playback time. This means that you can listen to the sounds of crashing waves for 30 minutes, or throughout the entire night. Of course, the app also allows you to adjust the volume of each sound.
The alarm feature makes perfect sense, because if you were to set up your alarm as you usually do, the noise-cancellation headphones might prevent you from actually hearing it. When it’s time to wake you up, the headphones will certainly do so.
When you hear that a huge brand like Bose has released a new product, you know that it’s going to be good. And, much like the other products it has created in the past, these sleep headphones were meant to revolutionize the way we sleep and how we integrated noise-cancellation into our nocturnal lives.
The Bose sleep headphones aren’t cheap, but when you get the chance to test them, you immediately begin to understand why. The headphones are clearly a premium product that’s designed for people who would benefit from a white/sound machine in order to block external noise that could distract their brains from falling asleep.
Despite their spicy price, the Bose headphones deliver exactly what they’re meant to; they’re comfortable enough to be used throughout the entire night, they’re small enough to be transported even when traveling (regardless of the means of transportation), and provide mean sound quality that’s definetly what you would expect at this price point. | <urn:uuid:389977f2-b77a-45e9-818b-3bef33f98834> | {
"date": "2020-01-23T22:21:49",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9604325294494629,
"score": 2.5625,
"token_count": 2642,
"url": "https://www.thesleepjudge.com/bose-sleep-headphones/"
} |
Different animals get different diseases but sometimes these ailments can spread from species to species or even from a human to an animal. Zoonotic diseases are the types of diseases that can be spread from an animal to a human and should not be taken lightly. Whether or not the common cold is a zoonotic disease is important for pet owners to know in order to help keep their pets healthy.
What Is the Common Cold?
People "catch" the cold on a regular basis but what exactly are we catching? The cold is really a virus and it is usually the rhinovirus, coronavirus, respiratory syncytial virus, or parainfluenza virus. These viruses are not contracted from being out in the cold or getting wet, despite the popular misconception, rather they are contracted from someone else that has the virus. Because the cold is a viral infections, you will be more prone to catching it if your immune system is weakened because you are tired, stressed, or have allergies.
Can a Pet Catch Your Cold?
According to the Ontario Veterinary College, a cat may be able to catch your cold depending on what kind of virus it is. It may not be very common but it can happen. A dog, on the other hand, cannot catch your cold. Exotic cats such as Bengals are not excluded from being susceptible to contracting the cold but exotic canines including foxes and wolfdogs will not be affected by the cold viruses. Ferrets are another species that cannot catch the common cold but they can catch the flu from you if you have it. It is always advised to wash your hands before and after handling your pet to protect both you and your pet from disease transmission but it is unlikely that you'll pass your cold on to your pets.
What Diseases Can Your Pet Catch From You?
Since there are many diseases can be spread from animals to humans as well as from humans to animals, the CDC (Centers for Disease Control and Prevention) closely monitors these disease transmissions in order to keep people safe. Many exotic pets are susceptible to several different kinds of zoonotic diseases so it is vital to know what diseases both you and your pets may be at risk for transmitting to each other.
- Influenza - Ferrets, as was mentioned before, are able to catch the influenza virus from humans causing similar symptoms that we experience when we are sick with the flu.
- Herpes simplex virus - Rabbits are susceptible to the herpes simplex virus (the virus that causes cold sores in some people's mouths) but it is more commonly seen in laboratory rabbits than pet rabbits. Hedgehogs are suspected to be able to catch the herpes simplex virus but it has yet to be confirmed.
- H1N1 - Exotic cats and domestic felines can catch some viruses from humans including H1N1 and some of the cold viruses.
- Eye infections - Birds can get some eye infections from some bacteria and viruses from humans when we kiss them.
- Ringworm - This fungal infection can be passed on to many different kinds of pets from their humans. Exotic cats, foxes, ferrets, guinea pigs, rabbits, pot-bellied pigs, birds, mice, rats, hamsters, gerbils, chinchillas, and other pets can all be infected with ringworm.
What if Your Exotic Pet is Coughing or Sneezing?
Just because the common cold can't be passed to your exotic pet (except perhaps to a cat) it doesn't mean that it can't cough and sneeze for other reasons. Similar symptoms of the cold that may show up in a pet might actually be influenza, bordatella, or another type of respiratory infection and these symptoms or diseases should not be ignored. Even though we may not always seek medical treatment for our sniffles, if an exotic pet starts to act like it has caught a cold, it should be kept warm and taken to an exotic pet veterinarian for an examination as soon as possible. Even simple diseases can manifest quickly in a small exotic pet and be life threatening. X-rays, bacterial cultures, cytologies, and other testing may be recommended by the veterinarian in addition to medications to treat the disease. | <urn:uuid:2c49f446-ef74-4c1d-bcb9-376d7d7dfb8d> | {
"date": "2020-01-23T22:34:04",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9534193277359009,
"score": 3.375,
"token_count": 865,
"url": "https://www.thesprucepets.com/can-your-pet-catch-your-cold-3951989"
} |
Maybe you first heard of a trust from watching public broadcasting funded by the trust of what sounds like a very rich family.
But trusts aren’t just for the very wealthy. Almost everybody planning the future of their assets at least considers using a trust as tool to achieve their goals.
The word “trust” makes sense
In a trust, a person (the trustee) is entrusted to manage assets for the benefit of someone else (the beneficiary). The trust is granted, of course, by a grantor.
There are many reasons and ways to create trusts of various kinds. Let’s focus on a couple common cases.
In a living trust, the grantor (frequently a parent) also acts as the trustee for the benefit of beneficiaries (usually their children). This way, the parent can leave assets while also, for example, minimizing probate delays after death.
The grantor/trustee can change the terms of most living trusts at any time and has a relatively free hand in making decisions. Such trusts are “revocable.”
Why create an “irrevocable” trust?
In an irrevocable trust, the grantor (perhaps the parent) can’t act as trustee and can no longer control the assets. Plus, the trust can’t be changed once it’s created.
Obviously, irrevocable trusts shouldn’t be taken lightly. But they have major advantages that make them worth considering.
Although an irrevocable trust can’t be changed, the grantor creates it, names the trustee and can retain the right to change the beneficiaries.
Assets are transferred to the trust, so the grantor’s net worth may be greatly reduced, possibly making them eligible for Medicaid and free of creditors and alimony payments. This might also limit the taxes paid by heirs upon the grantor’s death.
The legal and financial solutions offered by the very complex field of trusts and estate planning offer a wide range of opportunities. | <urn:uuid:34da7800-27d9-48e6-a43c-f12a917014ae> | {
"date": "2020-01-24T00:14:54",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9445894956588745,
"score": 2.59375,
"token_count": 423,
"url": "https://www.trustedattorneys.com/blog/2019/06/trust-basics-and-why-some-trusts-should-be-irrevocable/"
} |
A Fungal Infection in the Brain Could be Linked to Alzheimer’s, Study Suggests
Although 60 percent or more of dementia cases are caused by Alzheimer’s disease, its cause is still unknown. A small study, however, has found a link between the disease and fungal infections.
Fungus in Brain Samples
For a study published in Scientific Reports, researcher Luis Carrasco, of Spain’s University of Madrid, and his team analyzed cadaver brains from 14 Alzheimer’s patients. In each patients’ brain sample, the molecular biologists found evidence of fungal infection. The fungi were both in the brain cells and outside the cells. Other evidence of fungal infections, such as fungal DNA and proteins, were present in both the brain tissue and the blood serum of the test subjects. The scientists had previously examined four other brains from Alzheimer’s patients, and fungi were present in those samples as well.
The fungal evidence was present in multiple regions of the brain. The team gave in-depth analysis to one sample in particular, referred to as AD1. Throughout the four regions of AD1’s brain that were studied, multiple fungal species were found, but no one species was present in all four regions. As a control, similar samples from the same regions of the brain were taken from a control subject without Alzheimer’s disease, and the researchers found no evidence of fungi in these corresponding samples.
The team also studied the brains of 10 other control cadavers who had never had Alzheimer’s disease. In all of the control samples, the researchers detected no sign of the fungal infections present in the other brains.
Even though the fungus was found in all of the Alzheimer’s patients’ brains in this study, fungal infections are probably not the cause of all Alzheimer’s disease. For instance, other studies have found a genetic link in a small number of cases.
However, this study implies that there might be a connection between the fungus and Alzheimer’s disease. Perhaps the disease makes brains more vulnerable to infection, and the fungus takes hold after the onset of Alzheimer’s. On the other hand, the fungus could precede the disease. For example, patients whose bodies are dealing with an infection might be more susceptible to cognitive diseases.
Another possibility is that the infection itself is the cause of some Alzheimer’s disease cases. The infection may trigger immune system and inflammation responses, which in turn initiate a process of cognitive impairment. Lending support to this idea is the fact that, just as Alzheimer’s typically comes on slowly, so too does a fungal infection spread slowly. Perhaps as the infection worsens, the disease becomes more pronounced.
Further studies will hopefully better define whether there is an Alzheimer’s-fungus connection and, if so, what it is. A clearer understanding of what role fungus plays in the disease has the potential to shape future options for treating, or even preventing, Alzheimer’s disease. | <urn:uuid:f146175c-01f5-446e-99e5-4ed5b1e5023f> | {
"date": "2020-01-23T23:25:18",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9626777172088623,
"score": 2.796875,
"token_count": 630,
"url": "https://www.webpsychology.com/news/2016/05/02/fungal-infection-brain-could-be-linked-alzheimer%E2%80%99s-study-suggests-255021"
} |
Watercress (Nasturtium officinale) is a water plant that can be found throughout the United States, southern Canada, Europe and Asia. It's actually native to Europe and Asia.
Watercress grows in shallow running water where it normally forms dense mats. Its stems usually have 3 to 9 small oval leaves and grow 4 to 10 inches high. It flowers from April to October. Watercress flowers are small and white and occur in long clusters like many other mustards.
As one of our most nutritious wild foods, watercress is rich in calcium, beta carotene and iron. It also contains a variety of vitamins and minerals including vitamins C, B1, B2 and E.
Watercress was traditionally used to treat coughs, gout and arthritis. It's an expectorant and also a diuretic, so it helps to relieve fluid retention.
Watercress is best used fresh but can be kept indefinitely in water if the water is changed daily. It's good raw in salads or as a cooked green and can be used any way cultivated mustard is used. It pairs well with the following:
Although watercress typically occurs all year, the cold of winter usually beats it back to a point that makes it difficult to gather in quantity, and the heat of summer makes it hot and bitter. Nasturtium leaves and flowers make a good substitute in the summer.
Watercress grows in water that is slightly alkaline. Here in the Southern Appalachians our water and soil are acidic, so we typically only find watercress in areas downstream of spring boxes or other concrete structures that raise the pH of the water.
The easiest way to harvest is to cut its stems at waterline with scissors. It's also easy to gather by pulling clumps out by the roots if you don't mind cutting the roots off later. It's important, especially when eating watercress raw, to take it only from water that's been tested and is known to be clean. Otherwise, harmful pathogens and toxins can be contracted when eating. | <urn:uuid:22eaec9a-9dfc-4137-aff3-e95f4c312732> | {
"date": "2020-01-23T22:55:53",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9445039629936218,
"score": 3.65625,
"token_count": 427,
"url": "https://www.wildedible.com/wild-food-guide/watercress"
} |
Window World Celebrates National Window Safety Week April 3-9, 2016
With the arrival of spring, more homeowners are opening up their windows to let in fresh, warm air. Did you know that you could be putting your child in danger by leaving a window open, possibly causing an accidental fall?
The goal of Window Safety Week is to educate homeowners on the use of windows in escaping an emergency and learn how to prevent accidental window falls that could be fatal. Check out the 7 tips Window World has put together on how to practice window safety every day or the year.
Window Safety Tips
1.Install Window Stoppers
2. Check For Broken Locks
3. Ensure Windows Open Easily
4. Use Cordless Blinds or Cord Hooks
5. Ensure All Screens Are Intact and Not Punctured
6. Check For Dropping Windows
7. Install Escape Ladders For 2nd Story Windows
Learn More About Window Safety
For more information about National Window Safety Week and why it is important, please visit the National Safety Council website. | <urn:uuid:9b35ed49-86a8-457d-be68-ffdaef400952> | {
"date": "2020-01-23T22:38:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8719691634178162,
"score": 2.640625,
"token_count": 218,
"url": "https://www.windowworldcolorado.com/about/press/national-window-safety-week/"
} |
On June 4, 1919, Congress passed the 19th Amendment to the United States Constitution. Passage in the House and Senate activated the ratification process, in which each state legislature would vote for or against.
The amendment was adopted in August 1920. Finally, after nearly a century of direct and indirect action by organized women, along with some men, the right to vote was protected regardless of sex.
Still, not all women had full voting rights and protection in 1920. Laws discriminating against race and class did — and some still do — exist to stop women from voting in spite of the new amendment.
See the Joint Resolution from National Archives. | <urn:uuid:75b097e5-ac94-4485-a86b-288b75227166> | {
"date": "2020-01-24T00:09:50",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9743133783340454,
"score": 4.34375,
"token_count": 129,
"url": "https://www.zinnedproject.org/news/tdih/19th-amendment-passed"
} |
On Aug. 4, 1964, the bodies of three lynched civil rights workers (James Chaney, Michael Schwerner, and Andrew Goodman) were found, after disappearing more than a month before.
On June 21, 1964, James Chaney, Michael Schwerner, and Andrew Goodman were tortured and murdered by the KKK with help from the deputy sheriff near Philadelphia in Neshoba County, Mississippi. They were killed defending the right to learn and human rights for all.
The three young men had traveled to Neshoba County to investigate the burning of Mt. Zion Methodist Church, which had been a site of a CORE Freedom School.
Read “Lynching of Chaney, Schwerner & Goodman” at the Civil Rights Movement veterans (crmvet.org) website, a detailed description of their arrest, the complicity between the “law enforcement” and the Klan, their murder, and the fight to have their bodies found, autopsied, and the murderers charged.
See the Southern Poverty Law Center list of Civil Rights Martyrs for more names of people murdered in the fight for voting rights and human rights in the U.S. Listen to the Democracy Now! broadcast, “After Over Four Decades, Justice Still Eludes Family of 3 Civil Rights Workers Slain in Mississippi Burning Killings.“ | <urn:uuid:d3d0601d-65cc-45fa-a905-2e6076aed0de> | {
"date": "2020-01-23T23:53:43",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9487370252609253,
"score": 3.125,
"token_count": 276,
"url": "https://www.zinnedproject.org/news/tdih/civil-rights-workers-found/"
} |
Researchers from five institutions have opened a new door in the world of paleontology with a study of the fossilized bones of a dinosaur.
The study identifies two protein crosslinking mechanisms known to naturally affect human blood vessels and shows that these also likely contributed to the preservation of blood vessels in the dinosaur bones.
Their research, “Mechanisms of Soft Tissue and Protein Preservation,” was published Wednesday, Oct. 30, in the open-access journal Scientific Reports. The study is available online.
The lead author is Elizabeth Boatman of University of Wisconsin-Stout, with six co-authors, including Mark Goodwin, assistant director of the University of California Museum of Paleontology; and Hoi-Ying Holman, director of the Berkeley Synchrotron Infrared Structural Biology Program at Lawrence Berkeley National Laboratory.
This study is part of a larger body of work on preserved blood vessels and cellular elements that Mary Schweitzer, a paleontologist at North Carolina State University, has led since the mid-2000s.
Using a combination of cutting-edge materials characterization techniques, the team of researchers studied pliable vessel networks recovered from a one-inch core sample removed from a tibia bone of a well-preserved Tyrannosaurus rex. The specimen is a nearly complete skeleton known as The Nation’s T. rex that recently went on display at the National Museum of Natural History in Washington, D.C.
That T. rex skeleton is approximately 66 million years old, well beyond the “upper limit” of one million years that scientists have generally projected for the survival of soft tissue structures and proteins in fossils, Boatman said.
However, the paper details for the first time two mechanisms that could have preserved the blood vessels — protein crosslinking by Fenton chemistry and glycation. Iron, a component of hemoglobin in vertebrate blood, plays a central role in both, and both mechanisms are also known to occur during aging and with diabetes, for example, in humans.
The paper also provides microscopic images of blood vessels from the T. rex, which was unearthed in Montana by a team from the Museum of the Rockies.
“The body of evidence is convincing now,” Boatman said, noting that over the years, there have been “a lot of skeptics” across the scientific disciplines that blood vessels could be preserved. Initially, the use of materials science techniques to explore this question wasn’t widespread, but importantly their application offered a new perspective for studying fossil remains.
Bone chips reveal vessels’ secrets
Part of the process of characterizing the vessels involved demineralizing small chips of T. rex bone samples to liberate the preserved vessel tissue inside.
“They looked like little pieces of sponge floating in the water,” Boatman said of the microscopic vessel networks, which hold their three-dimensional architecture when suspended in solution.
The T. rex sample was exciting because it had “the most extensive vessel networks that any of us had ever seen,” she said, noting that Schweitzer’s had team first reported blood vessels recovered from this dinosaur in 2007.
In positively identifying the preserved proteins that give blood vessels their structures at the nano-scale, Boatman said that a TEM — transmission electron microscopy — image confirmed the presence of a banding pattern that is specific to vertebrate collagen. “That was an exciting find,” she said.
The study provides arguable evidence that the fossil bones of Mesozoic-era creatures are more than simply rocks, which Boatman pointed out is a common misconception regarding fossils.
In regard to future avenues of scientific study, Boatman said, “There’s a lot of potential. It’s part of the big picture of understanding dinosaurs.”
The study’s findings could be applied to mammalian fossils or other prehistoric creatures. Thicker, more dense bones, such as those from large dinosaur limbs, offer the best chance to find blood vessels because they effectively entomb the vessel structures, she said. “More technology is now available to scientists,” Boatman said, in reference to the major advances that have taken place in materials characterization techniques over recent decades.
Don’t expect dinosaur clones
Although the researchers were not looking for DNA in the bone samples they tested, Boatman also notes that such findings would not be expected. In other words, no dinosaur clones will walk the Earth anytime soon, like in the movie “Jurassic Park.”
Schweitzer, however, trained with John “Jack” Horner, the real-life paleontologist portrayed in the movie, which is how the team gained access to the T. rex bone sample, while the skeleton was previously curated at the Museum of the Rockies in Montana.
“This is one of the most complete T. rex skeletons in the world,” Boatman said.
The study took about six years to complete, in part because Boatman took a detour from her career as a researcher to pursue the AAAS Science and Technology Policy Fellowship in Washington, D.C. During those two years, Boatman also worked as a volunteer science writer at the Smithsonian.
As the National Museum of Natural History celebrated the arrival of The Nation’s T. rex with an extended uncrating exhibit, she walked by daily for months, not knowing that it was the fossil specimen from which the core sample had been taken for her team’s study (the specimen identification number was changed when the fossil was transferred to the Smithsonian).
Boatman’s connections with Goodwin and Schweitzer go back to her graduate studies at the University of California, Berkeley. Schweitzer is considered the first researcher to report soft tissues recovered from fossil bones.
In 2013, Boatman was a co-author of a study with Schweitzer, Goodwin and others on a report of preserved soft tissues, cells and molecules “from deep time.”
Boatman teaches engineering mechanics in the engineering and technology department at UW-Stout. The native of St. Louis has an undergraduate degree in physics and applied chemistry from Beloit College and a master’s and doctorate in materials science and engineering from the University of California, Berkeley.
Elizabeth Boatman, UW-Stout
A blood vessel network recovered from the tibia of a T. rex dinosaur fossil is seen with a light microscope.
UW-Stout’s Elizabeth Boatman visits Dinosaur National Monument in Utah in 2018, when she was finishing work as lead author of the research “Mechanisms of Soft Tissue and Protein Preservation.” | <urn:uuid:d3a501d4-89e8-4d2d-b484-14054d849fc8> | {
"date": "2020-01-23T22:49:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9545759558677673,
"score": 3.34375,
"token_count": 1387,
"url": "https://wwwprod.uwstout.edu/about-us/news-center/researchers-identify-mechanisms-blood-vessel-preservation-t-rex-dinosaur"
} |
A look at the history of the greek theater
Scenes then alternate between spoken sections dialogue between characters, and between characters and chorus and sung sections during which the chorus danced.
When did greek theatre begin
Some theatres also had a raised speaking place on the orchestra called the logeion. Aristotle on the origins of Tragedy and Comedy 1. Exodos: At the end of play, the chorus exits singing a processional song which usually offers words of wisdom related to the actions and outcome of the play. Although its theatrical traditions seem to have lost their vitality, Greek theatre continued into the Hellenistic period the period following Alexander the Great 's conquests in the fourth century BCE. People would come from all across the Greek world to attend the popular theaters held in open air amphitheaters. Seated of honor, found in the front and center of the theatron, were for public officials and priests. The Corinthians say and the Lesbians agree that the greatest wonder in his life was the voyage of Arion of Methymna to Taenarum on a dolphin. For example, Oedipus is ignorant of his true parentage when he commits his fatal deed. Some prestigious benches towards the bottom might be covered with marble or otherwise enhanced for priests and officials. His works followed all the basic principles of old comedy, but he added a facet of cleverness and depth in feeling to his lyrics, in an attempt to appeal to both the emotions and intellect of the audience. The Suda lexicon 3.
Throughout the comedic period in Greece, there were three distinctive eras of comedies as the genre progressed. During a play in ancient Greece, actors would change costumes as the play was taking place. Before c.
Development of greek drama
That development would come in the 6th century B. It continues to entertain modern audiences with its timeless ability to portray universal themes. Artist rendering of the Theatre of Dionysus Ancient Greek theatre in Delos Most ancient Greek cities lay on or near hills, so seating was generally built into the slope of a hill, producing a natural viewing area known as the theatron literally "seeing place". This is evident, since in talking with one another we very often utter iambic trimeters, but seldom dactylic hexameters, or if we do we depart from the tonality of normal speech. Therefore the spectators said in joke, "Nothing to do with Dionysus. In what follows, we will run through an imaginary but as far a possible, accurate outline of the production of a Greek tragedy in 5th century BC Athens from beginning to end. The origin of the dramatic arts in Greece can be found in Athens, where ancient hymns were sung in honor of their gods.
As you can see in one of the albeit, restored Greek theater photos, the orchestra could be paved as with marble or it could simply be packed dirt. This post was written by GreekBoston.
What is greek theatre
And in accordance with their individual types of character, poetry split into two kinds, for the graver spirits tended to imitate noble actions and noble persons performing them, and the more frivolous poets the doings of baser persons, and as the more serious poets began by composing hymns and encomia, so these began with lampoons Nothing to do with Dionysus. Being a winner of the first theatrical contest held in Athens, he was the exarchon, or leader, of the dithyrambs performed in and around Attica, especially at the rural Dionysia. Bahn and Bahn write, "To Greeks the spoken word was a living thing and infinitely preferable to the dead symbols of a written language. Greek plays were performed as part of religious festivals in honor of the god Dionysus, and unless later revived, were performed only once. A second actor was added by Aeschylus and a third actor was added by Sophocles, and the number of the chorus was fixed at fifteen. Herodotus V. This century is normally regarded as the Golden Age of Greek drama. Theatron[ edit ] The theatron was the seating area, built into a hill to create a natural viewing space. Herodotus I. The Orchestra and the Chorus The orchestra would be a flat area and might be a circle or other shape with an altar [technical term: thymele] in the center. During the ritual, people would not be able to control their emotions and become another person.
Marmor Parium, under the year about BC. The costume changes would break up the play into distinct episodes.
On the first day of the festival there were contests between the choruses, five of men and five of boys. It was concerned less with people and politics, and more with myths and tragedies.
based on 90 review | <urn:uuid:b1bcdfa8-6f4c-422a-9760-2a21af0b318c> | {
"date": "2020-01-23T22:23:07",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9755927324295044,
"score": 3.328125,
"token_count": 992,
"url": "https://xopugoxonuhiha.whatshanesaid.com/a-look-at-the-history-of-the-greek-theater330834006dm.html"
} |
Following on from our work that featured in TH 173 about teaching a history of people with disabilities, we have focused our recent development work on resources for teaching about mental health in the past. Here are the resources that we presented in our session at the HA conference in Chester in May 2019. This work is ongoing and we are also working with colleagues in the Netherlands. It would be great if other people would like to get involved.
Resources are provided here for a single lesson with the EQ: How differently have people viewed mental health?
We have a moral duty to reflect the diverse past in our classrooms and the Equality Duty Act of 2010 requires us to eliminate unlawful discrimination, harassment and victimization, advance equality of opportunity between different groups and foster good relations between different groups. Respecting the past of everyone is part of fostering this.
From this lesson we want students to learn that:
• Mental health has a past and therefore a history
• Ideas of what constitutes mental illness and health have changed over time
• Ideas of what causes and the treatments for mental illness have changed over time due to these changing ideas, but also other cultural and societal changes.
It could be taught at the start of GCSE or as a KS3 study to encourage conceptual understanding of change over time (thematic).
The resources you need are here:
- Teacher notes – blog version
- Starter images (see below)
- Timeline of ideas and treatment
- Living graphs
- MH History lesson
There are also a selection of slot-ins on the YorkClio slot-in page.
The starter images are here: | <urn:uuid:c8688e37-2b0f-471d-a0b7-e0953bba3f98> | {
"date": "2020-01-23T23:44:17",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9600667953491211,
"score": 3.984375,
"token_count": 327,
"url": "https://yorkclio.com/category/subject-development/"
} |
Below are some foods and the potential problems involved with them:. Salads: The possibility of contamination lies in the cleanliness of the boards used to chop ingredients and the addition of croutons or salad dressings containing unsafe ingredients. Ask for dressing to be served on the side.
Our Menu of Amazing Resources
No croutons or other bread products. Salad Dressings and Marinades: Salad dressings and marinades may contain thickeners or other unsafe ingredients. Soups and Sauces: Soup bases are often used as a foundation for soups and sauces. Bases contain ingredients comparable to bouillon or broth, i. It is safest to avoid sauces. Canned sauces are also used in some restaurants, so you may be able to check the ingredient listing. Soup base will sometimes appear in sauces.
Au jus may come from a can or mix and contain unidentified hydrolyzed vegetable protein HVP. Seasonings are often used in preparing meats; their ingredients should be verified. Self-basting turkeys and imitation bacon bits may contain HVP or textured vegetable protein TVP and need to be checked for safety before using.
Restaurants with Gluten-Free Menus: Restaurants in Athens
Fried Foods: The oil used to deep-fry foods may be used for both breaded and non-breaded items, in which case they should be avoided. In large restaurants where French fries are cooked in separate fryers, there is less chance of contamination. Rice, Starches, and Hash Browns: Many hash browns are frozen and pre-packaged with starch added. Ask what other ingredients have been added during cooking. Many rice pilafs may have seasonings or added ingredients that you may need to avoid. Plain steamed or baked rice cooked in water is a good choice. Dairy Products: Non-dairy products are sometimes used instead of dairy products in restaurants.
Verify that the ingredients in any non-dairy substitutes are okay. Find out whether breaded or gluten-containing foods have been cooked on the surface beforehand.
- Mantras From The Great Void.
- Playoff Fever & Split Pants (Cliff Vermont Book 1)?
- Lesson Plans It Happened to Nancy: By an Anonymous Teenager!
Therefore, regardless of your reasons for following a gluten-free diet, it's important to know how it can affect your overall nutritional needs. Your doctor or a dietitian can help you make appropriate dietary choices to maintain a well-balanced diet. The gluten-free diet is essential for managing the signs and symptoms of some medical conditions:. Claims about the general health benefits of a gluten-free diet are the motivation for other people to avoid wheat and other grains with gluten. Very little clinical research has been conducted, however, about the benefits of the diet for people who do not have a gluten-related medical condition.
Following a gluten-free diet requires paying careful attention to both the ingredients of foods and their nutritional content. While oats are naturally gluten-free, they may be contaminated during production with wheat, barley or rye. Oats and oat products labeled gluten-free have not been cross-contaminated.
Some people with celiac disease, however, cannot tolerate the gluten-free labeled oats.
- The Fourth of July;
- Sources of Gluten: What You Can (and Can't) Eat - Cooking Light.
- Social Media for the Insurance Agent.
- Gluten Free Restaurant Guide - Urban Tastebud?
- Liebesgrüße aus dem Jenseits (German Edition);
- Sources of Gluten: What You Can (and Can't) Eat!
- Flash Card Fun : The Complete Collection.
Wheat terms to know There are different varieties of wheat, all of which contain wheat gluten:. Wheat flours have different names based on how the wheat is milled or the flour is processed. All of the following flours have gluten:. When you are buying processed foods, you need to read labels to determine if they contain gluten. Foods that contain wheat, barley, rye or triticale — or an ingredient derived from them — must be labeled with the name of the grain in the label's content list. Foods that are labeled gluten-free, according to the Food and Drug Administration rules, must have fewer than 20 parts per million of gluten.
Foods with these labels may include:. Alcoholic beverages made from naturally gluten-free ingredients, such as grapes or juniper berries, can be labeled gluten-free. An alcoholic beverage made from a gluten-containing grain can carry a label stating the beverage was "processed," "treated" or "crafted" to remove gluten.
However, the label must state that gluten content cannot be determined and the beverage may contain some gluten. In addition to foods in which wheat, barley or rye are likely ingredients, these grains are standard ingredients in a number of other products. Also, wheat or wheat gluten is added as a thickening or binding agent, flavoring, or coloring.
It's important to read labels of processed foods to determine if they contain wheat, as well as barley and rye. In general, avoid the following foods unless they're labeled as gluten-free or made with corn, rice, soy or other gluten-free grain:. Prescription and over-the-counter medications may use wheat gluten as a binding agent.
Talk to your doctor or pharmacists about the drugs you're taking. Dietary supplements that contain wheat gluten must have "wheat" stated on the label. For people with celiac disease, in particular, it's important to avoid exposure to gluten.
The following tips can help you prevent cross-contamination in your own food preparations at home and avoid gluten-containing food when you eat out:. Keeping a strict gluten-free diet is a lifelong necessity for people with celiac disease. Following the diet and avoiding cross-contamination results in fewer symptoms and complications of the disease. For some people with non-celiac gluten sensitivity, the condition may not be lifelong. Some research suggests that you may follow the diet for a certain period, such as one or two years, and then retest your sensitivity to gluten.
For other people with non-celiac gluten sensitivity, the diet may be a lifelong treatment. Few clinical studies have looked at the benefits of the diet among the general population — people without celiac disease or non-celiac gluten sensitivity.
17 Standout Vegan–Approved Restaurants in Portland
There is not enough clinical evidence to determine the accuracy of the following claims about the diet's results:. The foods not included in a gluten-free diet provide important vitamins and other nutrients. For example, whole-grain breads and other products are natural or enriched sources of the following:. Therefore, following a gluten-free diet will likely change your nutrient intake. Some gluten-free breads and cereals have significantly varied nutrient levels than the products they are replacing.
Some gluten-free foods also have higher fat and sugar contents than the gluten-containing food being replaced. It's important to read labels, not only for gluten content but also for overall nutrient levels, salt, calories from fats and calories from sugars. You can talk to your doctor or dietitian about foods that would provide healthy, nutrient-rich alternatives. The costs of prepared gluten-free foods are generally higher than the cost of the foods being replaced. The expense of following a gluten-free diet can be substantial, especially if your diet includes foods that aren't naturally gluten-free. | <urn:uuid:9a144360-78fc-4d6d-9095-00fdcb76ad09> | {
"date": "2020-01-25T16:45:15",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.934787929058075,
"score": 2.5625,
"token_count": 1563,
"url": "http://abepivurev.tk/hide/the-essential-gluten-free-restaurant-guide-midwest-edition.php"
} |
In The Supreme Court and Constitutional Democracy John Agresto traces the development of American judicial power, paying close attention to what he views as the very real threat of judicial supremacy. Agresto examines the role of the judiciary in a democratic society and discusses the proper place of congressional power in constitutional issues. Agresto argues that while the separation of congressional and judicial functions is a fundamental tenet of American government, the present system is not effective in maintaining an appropriate balance of power. He shows that continued judicial expansion, especially into the realm of public policy, might have severe consequences for America's national life and direction, and offers practical recommendations for safeguarding against an increasingly powerful Supreme Court. John Agresto's controversial argument, set in the context of a historical and theoretical inquiry, will be of great interest to scholars and students in political science and law, especially American constitutional law and political theory.
"To put it quite simply, this is an extradordinarily good book. It warrants reading by everyone who teaches about the Supreme Court, and ... it warrants assignment in upper-level courses on the judiciary and constitutional law. It is one of those rare books that grows richer on re-reading; it belongs on the shelf of every serious judicial scholar."
— Journal of Politics (Vol. 48, 1986)
"This is an impressive book. It attacks an important problem in a lucid and cogent way. I learned from it and enjoyed reading it."
— Walter F. Murphy
"The underlying argument in this book is both stimulating and timely. It will play a significant part in the current national debate on the role of the Supreme Court."
— Jeremy Rabkin | <urn:uuid:d9e65db4-aa41-4c03-a302-c6bc7f4e7f85> | {
"date": "2020-01-25T17:21:39",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9331574440002441,
"score": 2.640625,
"token_count": 337,
"url": "http://asahinaandwallace.com/book/supreme-court-and-constitutional-democracy"
} |
GIROUARD, JEAN-JOSEPH, militia officer, notary, politician, Patriote, portrait painter, and philanthropist; b. 13 Nov. 1794 at Quebec, son of Joseph Girouard and Marie-Anne Baillairgé; d. 18 Sept. 1855 in Saint-Benoît (Mirabel), Lower Canada.
Jean-Joseph Girouard’s forebear, François Girouard, came to live in Acadia during the 1640s. Following the deportation, a small number of his descendants, including Jean-Joseph’s grandfather, Joseph Girouard, went to Quebec, settling there during the Seven Years’ War. In his youth Jean-Joseph’s father was apprenticed to Jean Baillairgé*, a master carpenter. He worked subsequently as a shipbuilding contractor at Quebec. There he married Baillairgé’s youngest daughter, Marie-Anne, in 1793, and they had three children: Jean-Joseph, Angèle, and Félicité. From his paternal ancestors Jean-Joseph retained an instinctive and lasting distrust of England. From his mother he inherited the artistic tradition of the Baillairgé family.
In September 1800, at the age of five, Jean-Joseph lost his father, who was drowned while sailing off Wolfe’s Cove (Anse au Foulon). After Joseph’s death the boy, his mother, and his two sisters were given shelter in his maternal grandfather’s house, where he remained from the age of six until he was ten. It was during this period that the young boy learned something of the skills of the Baillairgé family, whose name was already well known at Quebec. In the diary that he kept later with his second wife, he described how he learned from his grandfather “the rules of finding cubic content.” He also recalled seeing his uncles François* and Pierre-Florent* busy at their saw-horses while he tried his own hand, almost in fun, at the various tasks undertaken in the Baillairgé workshop.
After her father’s death in 1805 Mme Girouard met Jean-Baptiste Gatien, one of his close friends, who was priest of the parish of Sainte-Famille on the Île d’Orléans. Gatien proposed that she become the housekeeper in his presbytery and bring her children to Sainte-Famine. She agreed, and Gatien looked after their material needs; he also assumed responsibility for the children’s intellectual and religious instruction. He could find no praise great enough for his young pupil Jean-Joseph, whom he thought exceptionally talented. None of the subjects he studied – music, painting, architecture, physics, or mathematics – gave any trouble to Jean-Joseph’s gifted mind. The boy was also well behaved, thoughtful, and reflective, as the portrait painted by François Baillairgé suggests.
Mme Girouard and her children followed Gatien when he was sent to take charge of the parish of Sainte-Anne at Sainte-Anne-des-Plaines in 1806, and again in 1811 when he became priest at Saint-Eustache. Having assimilated the general knowledge imparted by his tutor, in 1811 Girouard began training as a notarial clerk under Joseph Maillou at Sainte-Geneviève (Sainte-Geneviève and Pierrefonds), on Montreal Island. At the beginning of the War of 1812 he was too young to be called up for militia service but became a volunteer in a corps at Lachine. When Maillou was called to the colours, Girouard left the corps and continued his training under Pierre-Rémi Gagné at Saint-Eustache. In November 1812, having reached enlistment age, he served at Montreal as an adjutant in the Lavaltrie Battalion of militia under Lieutenant-Colonel Joseph-Édouard Faribault. After his return to Saint-Eustache at the end of the war he finished his clerkship and took his examinations. On 13 June 1816 he received his commission as a notary, and that year settled in Saint-Benoît, a village adjoining Saint-Eustache, where he spent the rest of his life.
That a man such as Girouard was to become a rebel can be explained only by the environment in which he lived. Girouard opened an office in the house of Jean-Baptiste Dumouchel*, a merchant in the village with whom he soon became friends. On 24 Nov. 1818 he took as his first wife Dumouchel’s sister-in-law Marie-Louise Félix, whose brother Maurice-Joseph was the priest of the parish of Saint-Benoît. Through his marriage the young notary quickly secured entry to the small circle of village society and sealed his friendship with Dumouchel by family ties. From then on, enjoying the high regard of the townspeople and possessing undeniable talents as a notary, Girouard attracted numerous clients, the most regular being Dumouchel, and eventually acquired a sound reputation in his profession.
In the autumn of 1821 Governor Lord Dalhousie [Ramsay*] appointed Girouard a captain in the Rivière-du-Chêne battalion of militia, a position he retained until the beginning of 1828. On 7 March 1827 Dalhousie decided to adjourn the House of Assembly because of the conflict which had developed between it and the Legislative Council. During the electoral campaign the following summer, Girouard travelled through York riding with the Patriote party candidate, Jacques Labrie*, and Jean-Olivier Chénier*. In July several Patriote supporters, in particular Dumouchel, Joseph-Amable Berthelot, and Labrie, all three close friends of Girouard, were dismissed as militia officers because they had taken part in election meetings. As a token of protest against these unjust dismissals, Girouard resolutely returned his commission as a militia captain to the governor in January 1828. Meanwhile, Girouard and Chénier had none the less succeeded in getting Labrie elected, in a climate of violence heralding the stormy years before the rebellion.
Following Labrie’s death in 1831 Girouard was chosen by acclamation as member in the assembly for the new constituency of Deux-Montagnes, which had been part of York riding. He set to work soon after arriving at Quebec in January 1832 and became a keen supporter of Louis-Joseph Papineau* and a close friend of Augustin-Norbert Morin*. He had not been blessed with oratorical gifts, however, and rarely contributed to the fiery debates in the assembly. He preferred to sit on committees studying matters such as municipal affairs, regulations governing the notarial profession, and education. In 1834 he supported unreservedly the 92 Resolutions, which outlined the principal grievances and demands of the assembly.
General elections had been planned for the autumn of that year, and it was anticipated that the struggle would be extremely fierce. In these circumstances Girouard, who had a gentle and timid disposition, was reluctant to rush into the political arena, but he finally agreed to run as a Patriote party candidate along with William Henry Scott, the other member for Deux-Montagnes. The English party decided to contest the seat, James Brown* and his brother-in-law Frédéric-Eugène Globensky campaigning as candidates. The electoral struggle, as foreseen, gave rise to violence: in riots at St Andrews (Saint-André-Est) numerous people were hurt, including Scott and Dumouchel, and a veritable street battle developed at Saint-Eustache. As a result of the incidents at Saint-Eustache, Stephen Mackay, the returning officer who was also a brother-in-law of Globensky, quickly stopped the voting, in order, he said, to put an end to the violence constantly erupting around the polling-booth. Fearing that the English party candidates would be defeated, he resorted to a subterfuge. He declared Girouard and Scott elected, although they had 30 votes fewer than Brown and Globensky, the hope being that the English party could contest the election results. However, Girouard and Scott resumed their seats in the assembly and kept them until 1837; no one ever ventured to raise an objection.
On the eve of the outbreak of the rebellion in November 1837, Girouard, who had taken an active part in Patriote meetings at Saint-Benoît and the neighbouring villages during the preceding three years, was regarded by the authorities as a leader of the resistance movement in the Lac des Deux-Montagnes region, along with Chénier and Luc-Hyacinthe Masson*. His name was on the list of outlaws, beside the names of Papineau and Morin. There was a price on his head and a reward of £500 for anyone who turned him in. On 13 December Sir John Colborne* and his troops left Montreal and headed for Saint-Eustache and Saint-Benoît, to arrest in particular Chénier, Amury Girod*, Dumouchel, and Damien and Luc-Hyacinthe Masson, as well as Girouard. At Saint-Eustache, Chénier and his supporters decided to go down fighting. At Saint-Benoît, on the other hand, Girouard persuaded the villagers to lay down their arms and surrender, while the outlawed leaders sought refuge in flight. He himself made his way to Rigaud, where he found shelter with a habitant. Meanwhile Colborne and his troops, along with the volunteers from neighbouring villages, sacked and set fire to Saint-Benoît. Girouard hid for some days at Coteau-du-Lac, but soon learned in his hide-out that his supporters had been arrested and put in jail at Montreal. Rather than pursuing his plan to reach the American border, he decided to give himself up to Colonel John Simpson*, who was stationed at Coteau-du-Lac, and to place his legal knowledge at the disposal of his friends who were accused of high treason.
Girouard was taken to Montreal and imprisoned on 26 Dec. 1837. He continued to be active behind bars. He managed to acquire a small table for a desk, and Adèle Berthelot, the wife of Louis-Hippolyte La Fontaine*, got pencils and drawing paper for him. There he maintained a notarial “office” and a painter’s studio. Friends came to ask him to paint their portraits and he executed these with the skill of a master. He frequently gave advice and wrote letters, including personal letters to the families of those in custody in which he often included a portrait of the prisoner.
Girouard was quickly reassured as to the prisoners’ lot. After initially harsh treatment, discipline within the jail became much less severe. He was no longer worried about his fate or that of his friends. He kept up correspondence with La Fontaine, who had reached England and who sent encouraging news to the French Canadian Patriotes. Moreover, Girouard’s temperament led him always to attribute kind intentions not only to his friends but even to his enemies. He radiated serenity, a serenity which spread to the other prisoners.
With the arrival of Lord Durham [Lambton*] in May 1838, a general amnesty was expected. Before settling the fate of the prisoners, however, Durham sent Simpson to the jail in Montreal to extract confessions from the chief prisoners. Girouard objected to this procedure and refused to sign any document containing an admission of guilt. In addition he used his influence to dissuade his companions from agreeing to any statement, however honourable in appearance, attesting to their responsibility in the revolutionary movement. Despite Girouard’s advice, eight prisoners signed a confession of guilt and were condemned to be deported to Bermuda. Girouard was released on 16 July, only a few days after Lord Durham’s amnesty, on bail of £5,000. He was imprisoned again at Montreal following the second uprising, because of his past record, and released on 27 December. When he recovered his freedom, Girouard had nothing left: his large house had been burned down, as had another dwelling he owned in the village of Saint-Benoît; his notarial minute-book, his books, and his physics and astronomical instruments had been either looted or burned. His wife had not been harmed, thanks to the charity of her brother-in-law Ignace Dumouchel of Rigaud. Girouard was no longer young. At 44 he could count only on relatively good health and his great personal and professional qualities.
Profoundly embittered by the British army’s attitude at the time of the sacking of Saint-Benoît, and disappointed with his fellow man and with political action, Girouard went back to his village, where he decided to devote himself to his profession as a notary and to the study of science and philosophy. When a group of political leaders of the Province of Canada, notably Simpson, René-Joseph Kimber, Frédéric-Auguste Quesnel*, Joseph-Édouard Turcotte*, Louis-Michel Viger, Étienne Parent*, and Étienne-Paschal Taché*, literally besieged his Saint-Benoît retreat to persuade him to participate in the new ministry proposed by Governor Sir Charles Bagot* in September 1842, they met with a polite but dignified and emphatic refusal. At the risk of offending La Fontaine, the former member for Deux-Montagnes sent the governor a letter of refusal in which he pleaded reasons of health for declining. Girouard was not ill, but he took refuge behind a lofty and contemptuous attitude betraying his scorn for the idea of collaborating with those whom he considered of little faith and integrity. He continued to lead an active professional life centred on his office. Moreover, he was often called to Montreal, Rigaud, and the parishes south of Montreal to deal with estate matters, in which he had become highly skilled. It was he who settled the difficult estates of seigneurs Joseph Masson* of Terrebonne and Charles de Saint-Ours*.
On 2 April 1847 Girouard lost his wife; they had had no children. On 30 April 1851 he took as his second wife Émélie Berthelot, the daughter of his longstanding friend Joseph-Amable Berthelot, a notary of Saint-Eustache. They had two daughters, one of whom died at birth, and two sons. Émélie Girouard had always dreamed of becoming the founder of an almshouse. She realized this dream with the help of her husband, who fully shared her enthusiasm for the project. In one of her three diaries, Mme Girouard devoted many pages to describing the ups and downs that she and her husband experienced in building the Hospice Youville in Saint-Benoît. Girouard allocated all the income from the indemnity he had received in January 1853 for his losses during the rebellion, £924 (he had claimed £2,424 7s.), to the construction of a convent for the education of girls and the care of the elderly. In addition to endowing this establishment, he and his wife personally shared in the work, carrying out as many tasks as they could. Girouard, the grandson of Jean Baillairgé, designed the hospice and the decoration of the chapel himself. He donated the land for the building, hired the contractors, and with his wife’s help supervised the construction work.
Girouard and Émélie truly put their hearts and souls into the building of the Hospice Youville, which they considered the crowning achievement of their lives. When Bishop Joseph La Rocque*, the administrator of the diocese of Montreal in the absence of Bishop Ignace Bourget*, came on 9 Nov. 1854 to preside at the opening of this convent, which was committed to the care of the Sisters of Charity of the Hôpital Général in Montreal, it was indeed a supreme moment for the couple. For Mme Girouard this event seemed a mystic consecration of her union with her husband. The building still stands; instruction is no longer given to young girls, but it does provides a home for the elderly.
Girouard died, most likely of pulmonary tuberculosis, on 18 Sept. 1855 in Saint-Benoît, at the age of 60. He was buried three days later in the chapel of the hospice he had founded. He might be judged to have had a narrow existence because he confined his talents to his family and his parish, when everything destined him for a brilliant political career. In public life he never had any title higher than that of member for his riding in the House of Assemblet this likeable figure deserves a place in the historical record for several reasons, as notary and Patriote, as portrait painter and artist, and as the philanthropist who endowed his parish with a home for the elderly. From all these points of view Girouard is memorable. But he himself would have liked his name to be remembered especially for his charitable works. After his death, to honour his memory, the habitants in the Lac des Deux-Montagnes region called Girouard “the father of the poor.”
Jean-Joseph Girouard’s minute-book was destroyed by fire during the sack of Saint-Benoît in December 1837, and only part of its index has been preserved. This document, which lists the titles of 4,025 instruments notarized by Girouard from 27 June 1816 to December 1830, is held at the ANQ-M, CN1-179.
Girouard is the author of Relation historique des événements de l’élection du comté du lac des Deux Montagnes en 1834; épisode propre à faire connaître l’esprit public dans le Bas-Canada (Montréal, 1835; réimpr., Québec, 1968). He is also the co-author, along with his second wife, of the “Journal de famille de J.-J. Girouard et d’Émélie Berthelot,” composed between 1853 and 1896. This 193-page journal is full of minor incidents in the life of the Girouard family. The first 23 pages are in Girouard’s hand. The second part of the journal, pages 23 to 193, is entirely the work of Émélie Berthelot, who after the death of her husband in 1855 continued the account of family events. This document forms part of the Coll. Girouard in ANQ-Q, P–92.
Girouard drew a portrait of the Patriotes who were held in the Montreal jail on charges of high treason at the end of 1837 and the beginning of 1838. In 1846 he also presented a carefully detailed inventory of the losses he had suffered in the looting of Saint-Benoît to the Rebellion Losses Committee, established to compensate the victims of 1837. These documents were published by Paul-André Linteau in “Documents inédits,” RHAF, 21 (1967–68): 281–311, 474–83.
Girouard also sketched a great many portraits, especially during the period when he was a member of the House of Assembly of Lower Canada, and while he was behind bars in the Montreal jail. A collection of 102 of these pencil sketches is now in the possession of his great-grandson, Pierre Décarie, of Dorval, Que., and consists for the most part of portraits of Patriotes imprisoned in 1837–38 and of several members of the Baillairgé family. Girouard’s artistic works also include a view of the ruins of Saint-Benoît, a plan of the Montreal jail, a self-portrait, a magnificent portrait of Louis-Hippolyte La Fontaine, and the plans for the Hospice Youville in Saint-Benoît.
ANQ-M, CE6-9, 24 nov. 1818, 21 sept. 1855; CE6-11, 30 avril 1851; CN6-15, 29 avril 1851. ANQ-Q, CE1-1, 5 févr. 1793, 14 nov. 1794; E17/12–14, nos.646–840; P-52/13. Arch. de l’Institut d’hist. de l’Amérique française (Montréal), Coll. Girouard. Arch. des Sœurs Grises (Montréal), Dossier Saint-Benoît, historique. PAC, MG 11, [CO 42] Q, 239: 373; 259-2: 265–66; MG 24, A27, 34; A40, 27; B2, 32; B4, 8: 525; RG 4, B8, 4: 1386–88; B20, 32. R.-S.-M. Bouchette, Mémoires de Robert-S.-M. Bouchette, 1805–1840 (Montréal, 1903). Alfred Dumouchel, “Notes d’Alfred Dumouchel sur la rébellion de 1837–38 à Saint-Benoît,” BRH, 35 (1929): 31–51. Placide Gaudet, “Généalogie des Acadiens, avec documents,” PAC Rapport, 1905, 2, iiie part.: 60. Amury Girod, “Journal tenu par feu Amury Girod et traduit de l’allemand et de l’italien,” PAC Rapport, 1923: 408–19. “Lettre de M. Girouard à M. Morin, sur les troubles de 37 dans le comté des Deux Montagnes,” L’Opinion publique, 2 août 1877: 361–62. Rapports des commissaires sur les pertes de la rébellion des années 1837–1838 (s.l., ). L’Aurore des Canadas (Montréal), 28 août 1841. Le Canadien, 1831–37. La Gazette de Québec, 1821–38. La Minerve, 1827–37; 29 déc. 1855. F.-J. Audet, “Les législateurs du Bas-Canada.” F.-M. Bibaud, Le panthéon canadien (A. et V. Bibaud; 1891). Desjardins, Guide parl. Fauteux, Patriotes, 253–56. Quebec almanac, 1822–27. P.-G. Roy, Fils de Québec, 3: 71–73. G.-F. Baillairgé, Notices biographiques et généalogiques, famille Baillairgé . . . (11 fascicules, Joliette, Qué., 1891–94), 1–2; 6. Auguste Béchard, Galerie nationale: l’honorable A.-N. Morin (2e éd., Québec, 1885). L.-N. Carrier, Les événements de 1837–38 (2e éd., Beauceville, Qué., 1914). Béatrice Chassé, “Le notaire Girouard, Patriote et rebelle” (thèse de d ès l, univ. Laval, Québec, 1974). Christie, Hist. of L.C. (1866). David, Patriotes, 53–64, 79–90. Émile Dubois, Le feu de la Rivière-du-Chêne; étude historique sur le mouvement insurrectionnel de 1837 au nord de Montréal (Saint-Jérôme, Qué., 1937), 61–62, 66, 118–19. [Albina Fauteux et Clémentine Drouin], L’Hôpital Général des Sœurs de la charité (Sœurs grises) depuis sa fondation jusqu’à nos jours (3v. parus, Montréal, 1916– ), 3: 25–34. Filteau, Hist. des Patriotes (1975). Désiré Girouard, La famille Girouard en France (Lévis, Qué., 1902). [C.-A.-M. Globensky], La rébellion de 1837 à Saint-Eustache avec un exposé préliminaire de la situation politique du Bas-Canada depuis la cession (Québec, 1883; réimpr., Montréal, 1974). A.[-H.] Gosselin, Un bon Patriote d’autrefois, le docteur Labrie (2e éd., Québec, 1907). Laurin, Girouard & les Patriotes, 5–20. Meilleur, Mémorial de l’éducation (1876), 295. Monet, Last cannon shot. P.-G. Roy, La famille Berthelot d’Artigny (Lévis, 1935). R.-L. Séguin, Le mouvement insurrectionnel dans la presqu’île de Vaudreuil, 1837–1838 (Montréal, 1955). Taft Manning, Revolt of French Canada. André Vachon, Histoire du notariat canadien, 1621–1960 (Québec, 1962). F.-J. Audet, “Les députés de la vallée de l’Ottawa, John Simpson (1788–1873),” CHA Report, 1936: 32–39. L.-O. David, “Les hommes de 37–38: Jean-Joseph Girouard,” L’Opinion publique, 19 juill. 1877: 337–38. Bernard Dufebvre [Émile Castonguay], “Une drôle d’élection en 1834,” Rev. de l’univ. Laval (Québec), 7 (1952–53): 598–607. [Désiré Girouard], “La famille Girouard,” BRH, 5 (1899): 205–6. Léon Ledieu, “Entre nous,” Le Monde illustré (Montréal), 5 nov. 1887: 210–11. “Quelques Girouard,” BRH, 47 (1941): 350–51. [Arthur Sauvé], “Évocation d’un passé plein de gloire: les trois Girouard,” Le Journal (Montréal), 10 févr. 1900: 5. | <urn:uuid:7c5385b1-871c-4c28-b8dd-bbdf3c01c014> | {
"date": "2020-01-25T17:25:51",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9497985243797302,
"score": 2.859375,
"token_count": 5892,
"url": "http://biographi.ca/en/bio/girouard_jean_joseph_8F.html"
} |
TROY, EDWARD, Roman Catholic priest; b. c. 1797, probably in Ireland; d. 2 April 1872 at Torbay, Nfld.
Nothing is known of Edward Troy’s birthplace, family background, or education. He was ordained at Carrick-on-Suir, in the diocese of Waterford and Lismore, Ireland, by Bishop Michael Anthony Fleming* of Newfoundland; shortly afterward he sailed for Newfoundland where he landed in May 1831. He served as priest and assistant to Fleming at the chapel in St John’s. His zeal and energy were soon evident. In October 1833 Troy presided at the dedication in Portugal Cove of a church whose completion the Newfoundlander credited to his efforts. Edward Troy became known, however, chiefly through his political activities in St John’s.
The granting of an elected assembly in 1832 had only emphasized the many divisions in Newfoundland. The colony was increasingly split between the Irish Catholics, mainly fishermen and labourers, influenced by their priests, and the educated and prosperous, both Protestant and Catholic, who were primarily merchants and often English. The Patriot had become the newspaper of the former; the Public Ledger, the focus of Protestant and conservative opposition.
Troy clashed first with Governor Thomas John Cochrane. Early in 1834 the Patriot published letters of “Junius,” accusing the governor of bigotry and injustice. Cochrane was about to sue John V. Nugent, co-proprietor of the Patriot, when Troy admitted authorship. The governor instituted a libel suit against Troy. It was dropped when Cochrane was replaced by Henry Prescott. There is evidence that Cochrane thought he owed his hostile, mud-spattered send-off from St John’s in November 1834 partly to an inflammatory sermon by Troy.
Troy’s next antagonist was Henry D. Winton*, proprietor of the Ledger. In December 1833 Winton had praised Troy’s moderating influence in helping to disperse a mob besieging Winton’s premises because of his denunciation of Fleming’s electoral intervention. But by early 1835 the Ledger was reporting that Troy was forbidding his congregation to subscribe to the paper, denying religious rites to Catholics who supported its political sentiments, and prohibiting trade with them under threat of excommunication. In a sermon quoted in the Ledger his bent appears: “I’ll put the fear of God in them, and if that does not do I’ll put the fear of man in them.” The risk of financial ruin and starvation was real for those who failed to obey. The Ledger regarded such use of religious authority as an attempt at political dominance. By spring 1835 even the official newspaper, the Royal Gazette, was alarmed for the freedom of the press and for the whole colonial society. When Winton was assaulted on 19 May by ruffians who cut off his ears, the governor and others blamed the crime on the repeated tirades of Troy and other priests.
In July 1836 Bishop Fleming departed for Europe, leaving Troy as vicar-general for 14 months. He now increased his attacks on Catholics whose political opinions differed from his own. Stigmatizing them as “Orange Catholics” or “Mad Dogs,” he denied them even burial rites, and created an uproar and several court cases when he expelled a few from the chapel during service. In the autumn elections of 1836 Troy campaigned for candidates to the assembly. After a boisterous rally on 23 October, he and candidates William Carson*, Patrick Morris*, and John Kent were indicted for illegal and riotous assembly. Although acquitted in January 1837, they were accused by the Protestant press of a deplorable attempt to intimidate the electorate. Troy’s “popular” (radical) candidates were elected, but the election was declared invalid. In the new election of May 1837, Troy instructed his people to vote for the same candidates, and participated in their successful campaigns. He even took an active part in the new assembly. On 7 July 1837 the Ledger noted “we have occasionally glanced up at the reporter’s box and witnessed the gaunt, stalworth [sic] frame and figure of the Rev. Father Troy, leaning upon his elbows and grinning ineffable delight at the proceedings of his Parliament below . . . .”
The final phase of Father Troy’s political career centred on Henry John Boulton*, chief justice since 1833. The Catholic reformers thought him harsh and unfair in the exercise of his office, and he had been subjected to constant attacks, especially by the Patriot. In 1835 he charged its editor, Robert John Parsons*, with contempt, heard the case, and convicted him. Troy joined the Constitutional Society which sought Boulton’s removal, and subscribed on Fleming’s behalf to its fund to pay Parsons’ fine. By December 1837 an impasse between the assembly and the Legislative Council, of which Boulton was president, and his continued judicial severity impelled the assembly to send Carson, Morris, and Nugent to England to press for his removal. Boulton crossed the Atlantic to defend himself. Bishop Fleming joined the assemblymen and from London wrote to Troy with news and also instructions that indicate Troy’s influence with the assemblymen in St John’s. Troy campaigned against Boulton by sermons and petitions displayed in the chapel for signatures. When word reached St John’s in August that the British government had dismissed Boulton, Troy ordered a Te Deum. His actions aroused further anger and anxiety in Newfoundland. The Colonial Office had already sought Troy’s removal, in 1836 and in 1837, and through the Foreign Office had got the Congregation of Propaganda to request Fleming to control the political activity of his priests. The mounting disorder in Newfoundland and the threat to its prosperity led the Foreign Office to take final steps to make Rome fully aware of Troy’s actions. A decision to remove Troy from St John’s was apparently made; his name disappears from newspaper reports and it seems probable that early in 1839 Fleming ordered him to Merasheen Island in Placentia Bay.
After 1839 Troy appears to have been out of favour for a while. He was not mentioned as present at the laying of the foundation stone of the cathedral in St John’s in May 1841. From 1848 on he once more took part in major annual religious celebrations in St John’s, and was also noted as assisting at other important services in the 1850s and 1860s such as the consecration of the cathedral in September 1855.
Father Troy’s energies were channelled into parish activities. In his seven or eight years at Merasheen he built a church and presbytery. Then he moved to Torbay as parish priest for his last 25 years. There he replaced the existing wooden church with a stone one, consecrated in October 1863. In 1865 a convent and school house, with four nuns of the Presentation Order, were established at Torbay. Michael Francis Howley*, in his Ecclesiastical history of Newfoundland, credited him with a spreading of the Catholic faith in the area, and told of often seeing him walking the nine miles back from St John’s carrying a sack of nails.
A deed of property drawn up 28 May 1870 reveals that Troy focussed much of his energy upon acquiring land in Torbay and erecting a permanent presbytery to ensure the presence of a Roman Catholic priest. Single-minded energy, discipline, sacrifice, and pride are all manifest in his chronicle of privations and achievement attached to the deed. “. . . owing to the failure of the fisheries and consequent decrease in the revenues of the Parish, I was compelled to use the poorest description of food nor could I afford to procure sugar for my table and was obliged to use molasses . . . . I was often pained when visited by priests at not being able to give them a dinner nor even a glass of wine but so anxious was I to leave a dwelling House for a Priest that I joyfully submitted to these privations.” Years of work enabled. him to transfer ten acres of land (Father Troy’s farm), a dwelling, coachhouse, and outhouses to a group which included his brother-in-law John Delaney*, postmaster general of St John’s, and his nephew Father Patrick Delaney, to be held in trust. By this time his powers were declining, but he served until his death at the age of 75.
Bishop Fleming had lauded Troy as Newfoundland’s most zealous missionary. His obituary in the Newfoundlander paid tribute to the warmth, simplicity, and kindliness which won him the veneration of the lowly. For more than forty years he had been an energetic, ambitious pioneer of Roman Catholicism in Newfoundland.
Archives of the Archdiocese of St John’s, Deed of land of Edward Troy (includes autobiographical material). PANL, material gathered on Edward Troy from various files. Newfoundlander (St John’s), 1831–43, 1837–38, 1845–70, especially 31 March, 30 April 1869; 5 April 1872. Public Ledger (St John’s), 1833–40, especially 24, 27 Feb., 6, 17 March 1835; 25 March, 7 Oct., 22 Nov. 1836; 7 Feb., 7 July 1837. Royal Gazette (St John’s), 1833–35, 1837–38. G.B., Parl., House of Commons paper, 1839, XXXIV, 525, pp.565–94, Newfoundland: return to an address of the honourable the House of Commons dated 12 July 1839; – for, copy of any addresses received at the Colonial Office from the Legislative Council or Assembly of Newfoundland, or from public bodies of individuals in that colony, relative to the state of affairs there. Gunn, Political history of Nfld. M. F. Howley, Ecclesiastical history of Newfoundland (Boston, 1888). “The new church at Torbay,” Newfoundland Quarterly, XXI (April 1922), 12. | <urn:uuid:1f097401-472e-495b-bdff-5a8483889ac9> | {
"date": "2020-01-25T16:30:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9815775752067566,
"score": 2.78125,
"token_count": 2132,
"url": "http://biographi.ca/en/bio/troy_edward_10E.html"
} |
By Pradeep K. Gupta (auth.)
In any rotating equipment approach, the bearing has normally been a crit ical member of the whole approach, because it is the part that allows the relative movement among the desk bound and relocating components. counting on the applying, a couple of assorted bearing kinds were used, similar to oil-lubricated hydrodynamic bearings, fuel bearings, magnetic suspensions, rolling aspect bearings, and so forth. Hydrodynamic bearings grants any wanted load aid, yet they're constrained in stiffness and the linked strength loss might be relatively huge. gasoline bearings are used for high-precision functions the place the supported quite a bit are rather gentle, bearing strength losses are very low, and the rotating speeds in most cases excessive. For great precision elements the place no frictional dissipation or bearing energy loss may be tolerated, magnetic suspensions are hired; back, the weight aid specifications are very low. Rolling point bearings were common for these purposes that require higher bearing versatility, end result of the necessities for high-load and high-stiffness features, whereas permitting average strength loss and allowing variable speeds. A research of the dynamic interplay of rolling components is, for that reason, the topic of this article. Texts overlaying the research and layout method of rolling components are very restricted. extraordinary works contain research of Stresses and Deflections (Jones, 1946, Vols. I and II), Ball and curler Bearings, Their conception, layout and alertness (Eschmann, Hasbargen, and Weigand, 1958), Ball and curler Bearing Engineering (Palmgren, 1959, third ed. ), complicated Bearing expertise (Bisson and Anderson, 1965), and Rolling Bearing research (Harris, 1966).
Read Online or Download Advanced Dynamics of Rolling Elements PDF
Similar automotive books
Dieses umfassende Lehrbuch deckt inhaltlich und didaktisch (? bungsaufgaben) die mattress? rfnisse von Studenten der Luft- und Raumfahrtstudieng? nge ab. Aber auch der Raumfahrt-Ingenieur in Forschung und Praxis bekommt damit einen ? berblick und rasch abrufbare info ? ber sein Fachgebiet. Wenn auch nicht g?
Routinely, the examine of inner combustion engines has interested in the steady-state functionality. in spite of the fact that, the day-by-day riding time table of automobile and truck engines is inherently on the topic of unsteady operation, while the main severe stipulations encountered by means of business or marine engines are met in the course of transients.
Automobile strength administration addresses the problem of bettering automobile gasoline financial system and decreasing emissions with out sacrificing car functionality, reliability and sturdiness. It opens with the definition, pursuits, and present examine problems with car energy administration, ahead of relocating directly to a close creation to the modeling of auto units and elements fascinated with the car strength administration procedure, which has been confirmed to be the main most economical and effective strategy for initial-phase automobile study and layout.
This booklet makes a speciality of rising applied sciences within the box of clever Transportation structures (ITSs) specifically effective info dissemination among autos, infrastructures, pedestrians and public transportation platforms. It covers the state of the art of Vehicular Ad-hoc Networks (VANETs), with centralized and decentralized (Peer-to-Peer) conversation architectures, contemplating a number of software situations.
- Hillier's fundamentals of motor vehicle technology
- Vehicle Dynamics. Theory and Application
- Biosensors Nanotechnology
- Tyre and Vehicle Dynamics
Extra resources for Advanced Dynamics of Rolling Elements
38) becomes a little difficult. In view of this difficulty, Lund berg has determined an empirical equation based on actual load deflection measurements in line contact. 39). 40); however, when J is prescribed, some type of iterative procedure will be necessary in order to compute Q. 41 ) In terms of results, the above two relations are fairly close. 41) and, under such conditions, the iteration will converge rather rapidly. Tractive Forces and Moments. For the purposes of computing the traction, it will be necessary to define the position vector locating the center of the elementary disk in the contact zone relative to the roller geometric center and the local slip velocities.
An attractive feature of such a simplification is that the integration required for the computation of the total tractive forces and moments is necessary only along the x axis. It is generally agreed that for oil-lubricated elastohydrodynamic conditions (to be discussed in Chapter 4) such an assumption is quite realistic, especially in view of the assumptions in the traction/slip models. However, for a dry contact or for solid-lubricated conditions the point-to-point variation in the traction force must be considered and a generalized two-dimensional integration must be performed.
81) may be solved for ~o by setting Pi (~o) = O. The resultant algebraic equation will be nonlinear, but the solution is straightforward by the conventional bisection method. 0 - as a function of ( and 2. Figure 3-16 shows ¢o as a function of, and Figure 3-17 shows the pressure profile, at , = 0, for the different values of the parameter 2. 81), over the entire contact region -1::; ~ ::; ~o and -(0::; ( ::; ~o, where the coordinate indicates the point of maximum film. ; ~2~! 82) where R = 1/22 + (2 + ~'2 and a = 1/22 + (2. | <urn:uuid:1117f20f-5f83-4db6-a0ed-d9df48b0442d> | {
"date": "2020-01-25T16:54:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8519752025604248,
"score": 2.625,
"token_count": 1197,
"url": "http://brokenfadercartel.com/index.php/download/advanced-dynamics-of-rolling-elements"
} |
Filters & Filtration
A pool filter is the most vital part of a swimming pool. Without it the water
cannot be cleaned and the chemical balance cannot be maintained. Therefore the water
will be murky and bacteria will exist.
There are three types of filters used in swimming pools and spas today.
Diatomaceous Earth (D.E.) Filter: This is by far the most efficient filter for
swimming pools in both energy efficiency and filtration capability. D.E. filters
will filter out particles 1 to 3 microns in diameter. You cannot see a particle with
the naked eye until it is 40 microns.
Cartridge Filter: Cartridge filters are the second most efficient type of filter.
They will filter out 10 - 12 microns in diameter.
Sand Filter: Sand filters are the least efficient in filtration and in energy
efficiency. Sand filters filter out particles 20 microns in diameter. | <urn:uuid:9860b689-4d43-4d9a-bd8a-5346aed74007> | {
"date": "2020-01-25T18:26:31",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8695793151855469,
"score": 2.75,
"token_count": 196,
"url": "http://chempurapools.com/filters%26.htm"
} |
by Graeme K
CAD is becoming an increasingly important part of contemporary furniture design. Understanding how to use CAD is considered an essential part of a furniture designer’s education, thanks to its ability to quickly transform ideas into technical drawings. Using CAD designers are able to create original furniture designs faster than ever before.
What is CAD?
CAD is an acronym for Computer Aided Design. It is used by engineers, architects, and yes – furniture designers in order to create plans and drawings. CAD systems are more than software. They also involve a mouse, digitizing tablet or light pen and printer that is capable of meeting the design specifications. CAD systems are extremely useful because they allow the user to view the design from any angle. They also provide the user with the ability to zoom in and out.
CAD allows the user to move between three-dimensional and two-dimensional views of the drawings. You can also change the scale of your furniture drawing so that when you change one value all of the related values change as well. You can manipulate the shapes of your drawings. If you change one part of the drawing CAD will automatically adjust the rest of the drawing to suit.
The Benefits Of CAD For Furniture Design
In the past, furniture designers were often limited when it came to drafting furniture designs by hand. In particular, obtaining the desired level of accuracy and precision was a challenge. CAD helps furniture designers to overcome this problem, thanks to the software’s ability to provide automatic adjustments to dimensions.
Another benefit, from the furniture designer’s perspective, is the help advanced CAD programs offer. More sophisticated CAD programs will provide suggestions about the materials and dimensions that should be used in order to enhance the appearance and durability of their furniture. And thanks to cloud platforms, designers can share CAD furniture designs and collaborate with one another.
CAD has significantly improved the ability of furniture designers to go from idea to prototype. Using CAD, the designer can quickly create a prototype of any desired furniture. Thanks to 3D printing technology, the furniture designer can create a three-dimensional drawing and then have prototype created with the click of a button. In the past, such a task would have to be done by first drafting the design by hand and then using manual tools to create the prototype.
Using CAD can reduce the possibility of creating beautiful looking furniture which may be impractical in terms of functionality. When furniture is designed using CAD it can be tested for applied force. This can be used to see how the furniture would stand up to human or other weight that is placed on it. If a piece of furniture is not able to stand up to this weight, adjustments can be made in CAD. This can create huge potential savings in wasted time and materials.
Furniture is an art which combines function with beauty. Using CAD, designers are able to take their vision and see it realized faster and more accurately than ever before.
Author Graeme K: It was watching a designer using CAD for stainless steel furniture that opened my eyes to this incredible technology. While to those in the industry it is probably just a tool they use, to see it in action seemed like watching something from the future! No wonder such radical and innovative designs are now possible, that actually do the job as well as looking great. | <urn:uuid:b95416d1-fb1a-4769-b68f-fca7c895fefc> | {
"date": "2020-01-25T18:24:19",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9619121551513672,
"score": 3.140625,
"token_count": 669,
"url": "http://computerbooksonline.com/n2tech/making-furniture-with-computer-aided-design-cad/"
} |
In the regular use, we usually just apply the toothbrush and the toothpaste, but specialists say that we also have to use the mouthwash to have a cleaner mouth.
Most people do not use it, because they seem the mouthwash just like an extra and not so necessary complement. There is no toothbrush that can reach every corner in the mouth, that is why a mouthwash is needed to have a better hygiene and breath.
The mouthwash can eliminate 97 percent of harmful bacterias. Also the tongue is one of the areas in a human and animal body that conserves more of this bacterias due to accumulted food.
Dentists recommend using mouthwash at least once a day. This helps to prevent the increase of dental plaque, because if you do not take care of your hygiene, you may get a gum disease. Also the mouthwash can improve your teeth enamel.
Another product you need is the dental floss, because it can reach delicated areas between the teeth.
This days, we can find many types of mouthwashes for special uses, for example to eliminate halitosis or bad breath, and other exists to prevent cavities.
It is important to use only 20ml every day, and rinse your mouth just for 30 seconds. It is not recommended to dilute the rinse with water. Also avoid eating food for 15 minutes after cleaning your mouth.
You may also be interested in this post: What can causes halitosis or bad breath. | <urn:uuid:0a6c4254-1f67-4f4b-87d1-5e3f5c53a5ad> | {
"date": "2020-01-25T16:25:17",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9446526765823364,
"score": 2.75,
"token_count": 307,
"url": "http://dentistincozumel.com/importance-of-the-mouthwash/"
} |
Have you notice that your teeth turned yellow and you don’t know why? Don’t worry, it’s not necessarily a sign of poor hygiene but it’s very important to find out the reason and how to prevent futures dental diseases.
There are many factors that contribute to tooth color and it doesn’t mean something bad or wrong in our dental health for example:
AGEING: Your teeth become yellow as you age because the protective enamel layer becomes thinner.
GENETICS: Genetic variances can affect tooth color and enamel porosity.
YOUR DIET: If your teeth are stained yellow, it might be because of foods such as coffee and tea, red wine, curries, tomato sauces, berries, soy sauce, balsamic vinegar, beetroot, among others. There are other foods and drinks which, although they don’t cause staining themselves, contain acids that eat away at your tooth enamel.
MEDICATION OR ILLNESS: Some antibiotics and certain illnesses can affect the color of teeth.
But if you notice a yellow buildup on your teeth, it’s probably plaque. Plaque forms when bacteria from food and drink particles aren’t cleaned properly from your teeth. Over time, plaque hardens to form tartar, which can only be removed by a dentist.
However, there are many options you can take to have a whitening of teeth, depending on your budget, the results you want, and how quickly you want to see a difference.
The most effective way to make yellow teeth white is to visit your dentist for professional whitening, you can get results in a single visit.
Besides if you have any crooked, chipped or loose tooth, the best solution could be crowns or veneers according to the case to change the overall size, shape and color of your smile. Your doctor will tell you what’s options might be available for you.
If you want to know more about your dental care call toll free from USA and Canada 1-800-565-1424, or if you are already on vacation in Cancun and want to meet us, you can call us for an appointment at the following local number (998) 1-40-51-25.
You might be interested: Can I do a teeth whitening treatment even if I have dental crowns? | <urn:uuid:e6697a94-32f0-489d-ac02-1497b06b2f45> | {
"date": "2020-01-25T18:55:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9218196272850037,
"score": 2.875,
"token_count": 494,
"url": "http://dentistincozumel.com/whitening-teeth-cancun/"
} |
The first Europeans to live and work in the Rocky Mountains were hunters and miners. Canada’s Rocky mountains are rich in minerals and the Canmore region — just south of Banff — has especially good coal deposits.
The Canmore Miners’ Union Hall has been part of this community for more than a century and the building is one of the oldest in the town. Completed in 1913, it was built to serve as the union office for local coal miners. The building was one of the first in town to have electric lights. The miners union helped improve working conditions, safety and miners’ wages.
Coal mining has ceased in Alberta and the mining jobs have also disappeared, so there is no need for a Miners Union in Canmore anymore. Ownership of the Union Hall was transfered to the town and the building underwent extensive restorations and modernization beginning in the early 1980s. As you might expect, the function of the building has undergone a transformation as well. Now it serves as a community gathering place for weddings, plays, fundraisers, dances, conferences and other social functions. If you’re interested, the hall is available for rent.
(Click on thumbnails to enlarge, right arrow to advance slideshow) | <urn:uuid:8b949d0b-75db-4c3a-9878-2f4a4eed65b2> | {
"date": "2020-01-25T16:32:50",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9743985533714294,
"score": 2.6875,
"token_count": 254,
"url": "http://drfumblefinger.com/blog/2019/05/pic-of-the-week-miners-union-hall-canmore/"
} |
Why Do Old Books Become Yellow with Time
We all have seen that old books become yellow and brittle with time.
This is due to the presence of lignin. As we know paper is made from wood, wood in turn is made of carbohydrates like cellulose and lignin. Lignin is very complicated molecule that adds hardness to wood. More the lignin, harder is the wood. However in paper it is a problem. Over time, lignin breaks down to form many phenolic acids, which are yellow, in colour. These acids reacts with cellulose. This causes the paper to become very brittle.
But this can be prevented by removing lignin from the wood pulp before it is made into paper. These require additional chemical reactions. In addition the paper is made alkaline by adding calcium bicarbonate. If any lignin is left in the paper, when it forms acid the calcium bicarbonate will immediately react with it and neutralise it. This kind of paper is called Acid free paper.
All this makes paper expensive. Things like newspaper, tickets, notebooks etc. are therefore not printed on it. But all books nowadays are printed on acid free paper. | <urn:uuid:be69e135-ea75-4b35-891c-b4bf17736fa4> | {
"date": "2020-01-25T17:12:44",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9646226167678833,
"score": 3.296875,
"token_count": 248,
"url": "http://echemistry.in/why-do-old-books-become-yellow-with-time/"
} |
Technology Quality Service
UV introduction and UV LED applications
The wavelength of UV is from 10 nm to 400 nm, and it divided into different wavelengths: black spot uv curve of (UVA) in 320 ~ 400 nm; Erythema ultraviolet rays or care (UVB) in 280 ~ 320 nm; Ultraviolet sterilization (UVC) in 200 ~ 280 nm band; To ozone ultraviolet curve (D) in 180 ~ 200 nm wavelength.
UVA wavelengths have a strong penetration that can penetrate most transparent glass and plastic. More than 98% UVA rays form the sunlight can penetrate the ozone layer and the clouds and reach the surface of the earth. UVA can direct the dermis of skin, and damage elastic fibers and collagen fibers and our skin. The UV light that its wavelength is about 365 nm centered can be used for testing, fluorescence detection, chemical analysis, mineral identification, stage decoration and so on.
UVB wavelengths have medium penetration, and its short wavelength part will be absorbed by transparent glass. In sunlight, UVB rays form the sun is most absorbed by the ozone layer, and only less than 2% can reach the surface of the earth. In summer and in the afternoon will be particularly strong. UVB rays have erythema effect to human body. It can promote the formation of mineral metabolism and vitamin D in the body, but long-time or excessive exposure can tan the skin. Medium wave was used in fluorescent protein detection and more biological research, etc.
UVC wavelengths have the weakest penetration, and it can’t penetrate much of the transparent glass and plastic. The UVC rays form the sunlight is completely absorbed by the ozone layer. Shortwave ultraviolet radiation’s harm is very big, short time radiation can burn the skin, long or high strength still can cause skin cancer.
In UVLED market applications, UVA have the largest market share, as high as 90%, and its application mainly involves UV curing, the nail, teeth, printing ink, etc. In addition, UVA also import commercial lighting.
UVB and UVC are mainly used in sterilization, disinfection, medicine, light therapy, etc. UVB is given priority to medical treatment, and UVC is sterilization .
Among them, the UV LED panels industry has become a hot. The biggest advantage is that it can provide no formaldehyde environmental protection board, and 90% energy saving, high yield, resistance to coin scratches, comprehensive benefit of economic advantages. This means that the UV LED curing market is a comprehensive application product and the whole cycle market.
Uv-curable resin is mainly composed of oligomer, crosslinking agent, diluent, photosensitizer and other specific agent .It is crosslinking reaction and curing moment.
Under the irradiation of UV LED curing light, the curing time of uv-curable resin is very short that it don't need 10 seconds and it is much faster than the traditional UV mercury lamp in speed.
Skin treatment: UVB wavelength is an important application of skin diseases, namely ultraviolet phototherapy applications.
Scientists found that about 310 nm wavelength ultraviolet ray has strong shading effects to the skin, accelerate the metabolism of skin, improve skin growth force, which can be effective in the treatment of vitiligo, pityriasis rosea, polymorphous sunlight rash, chronic actinic dermatitis, so in the healthcare industry, ultraviolet phototherapy has been more and more used at present.
Medical equipment: UV glue adhesive have enabled medical equipment automated assembly easier.
UVC band by the short wavelengths of ultraviolet ray, high energy, can destroy microbes in a short time the body (such as bacteria, virus, spores pathogens) DNA (deoxyribonucleic acid) in the cells or RNA (ribonucleic acid), the molecular structure of the cell cannot regenerate, bacteria and viruses lose self-replicating ability, so the UVC band can be widely used in products such as such as water, air sterilization.
Some deep uv applications on the market at present products include LED deep uv portable sterilizer, LED the deep ultraviolet toothbrush sterilizer, uv LED lens cleaning sterilizer, air sterilization, clean water, food sterilization and surface sterilization. With the improvement of people's safety and health consciousness, the demand of the products will be improved to a great extent, so as to create a mass market.
The UVC wavelength is belongs to blind ultraviolet wavelengths, so it has important application in the military, such as short distance, secret communication interference and so on.
Enclosed soilless cultivation easy cause the toxic matter accumulation, and the substrate cultivation in the nutrient solution root secretions and rice husk degradation products can be degraded by TiO2 photo-catalyst , the sun's rays only contains 3% of uv light, facilities cover material such as glass filter out more than 60%, can be applied within the facilities;
Anti-season vegetables winter low temperature as low efficiency and poor stability, unable to meet the needs of facilities vegetable factory production.
In Different kinds of gem stone, different colors of the same kind of gem stones and the mechanism of the same color, they have different the UV-visible absorption spectrum. We can use UV LED to identify gems and distinguish the certain natural gems and synthetic gemstones, and also distinguish some natural stones and artificial gem processing.
UV identification technology is mainly test the fluorescent anti-counterfeiting mark and dumb light reaction of banknotes by using fluorescent or UV sensor. It can identify most of the counterfeit notes (such as washing, bleaching, and paste paper money). This technology developed very early and it is very common. | <urn:uuid:f8ed604d-0f77-4cd1-b77e-b5b2a1094b0f> | {
"date": "2020-01-25T17:18:47",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9213546514511108,
"score": 2.953125,
"token_count": 1171,
"url": "http://en.shineon.cn/intro/13.html"
} |
GLOSSARY OF MINING AND PROSPECTING TERMS
(This page is STILL in progress!)
Some really rusty gold! ...Find out why in our DredgeMaster course.
Adjustable Sluice: The bottom angle of the sluice box can be raised or
lowered as required depending on the condition oof the material being run, water volume,
Amalgamation: The process of using mercury to recover micron gold and
other gold pieces too small to recover easily by panning, gold wheel, bowl or other methods of separating
Ancient Streambed Material: Gravel that is in place from a previous
river course or the one that is there now but has changed course or eroded a deeper channel, stranding
potentially valuable gold deposits in various locations above and below the water line.
Assay: That process by which ore (or metal) is tested to determine what
kind of metals are present and how pure the metal is that is in the sample.
AuWhatfun: Site owner's pen name.
Bang Box: See Header Box
Bar: Gravel or Iron? A gravel bar is formed in the low pressure
areas of rivers and creeks, most often on inside bends. Iron- See "Prybar".
Bedrock: The rock crust of the earth. Placer gold can't penetrate this
layer except in cracks and fissures, though sometimes it can be found several feet into decomposed
Bench: A level or nearly flat area on a hillside.
Bench Deposit: A gravel deposit that is above the modern water line,
usually made up of Ancient Streambed material.
Black Sand: Sand that contains large amounts of iron, hematite,
magnetite and other dark, heavy minerals.
Boulder: Larger than a cobble, can not be picked up by one
Boulder Bound: That
condition in a working dredge hole where you uncovered so many boulders that were too large to remove from the
work area that progress becomes difficult or impossible to continue.
Cemented Gravel: Gravel that is so tightly packed together that it is
reminiscent of concrete. Very difficult to dredge.
Claim: An area usually in 20 acre increments of size, in which
the minerals are "claimed" by a person or association of persons for the purpose of extraction for profit. Rules
for filing and maintaining a "Claim" vary depending on local, State and Federal laws.
Classification: The process of separating sand and gravel into various
sizes using screens with uniform size holes for the purpose of making the process of extracting the "values"
from the gravel more efficient.
Classified Gravels: The state of the concentrated gravels after the
process of classification.
Cleaned Out: An area that has already been mined.
Clean-Up: The process of removing the concentrates from a sluice box
after processing sorted or unsorted materials through the box.
Clouded Out: When dredging and the silt gets stirred up, lowering or
obliterating your visibility.
Cobble: Rocks that are too big to pass through the dredge nozzle, but
not so big that one man can't easily move them.
Color: Traces of gold that can be seen with the naked
Concentrates: The heavy (usually) black sand and metal
particles that are left in a sluicebox after processing bank run or pre-sorted gravels from a
mining operation usually involving a bare sluice box, a sluicebox on a dredge or a
Crevice: A wide crack in the bedrock.
Dive Mask: A device used to see underwater, usually styled like oversize safety
goggles, but some versions integrate the regulator and face mask in one unit. The better Dive Masks allow you
to exhale through a purge valve in the mask making it easier to keep your mask clear for better
Dredge: A machine that usually floats on top of the water that is
designed to draw the sand and gravel up from the bottom of the body of water (lake, stream, river, ocean, etc.)
and deliver that material through a sluicebox in which riffles and materials are placed to allow the
heavier particles such as gold and other precious metals and gems to be trapped as "concentrates" and the
lighter gravels pass on through and are deposited back into the body of water a few feet from where they were
originally picked up. The dredge basically functions like an underwater vacuum, only retaining selective
Dry Suit: A dive suit designed to keep you dry while underwater. These
are designed to keep you warmer in very cold water temperatures.
Dust (gold dust): Bits of gold too small to grasp with your
Face Mask: See "Dive Mask".
Fines: Same as dust or gold dust.
Flour Gold: No, you don’t bake gold bread with this flour! It’s another name for gold
Free Gold: Any gold that does not need chemicals to be separated from concentrates or
Glory Hole: We all hope to hit one of these some day! It is an ultra rich spot that
yields so much gold that when telling about it afterwards, there is no need to exaggerate the
Gold Nugget: see "Nugget"
Gold Path: Or “Common Gold Path” is the path of travel that placer gold takes as it is
moved down river by the force of the water- usually during massive floods.
Good Gold: Well truthfully, there is no bad gold! But good gold is sometimes called
making wages or better while mining. There is a point at which it is not worth continuing in the hole you are
dredging in (see profitability).
Grain: A unit of weight measurement. 480 grains equals 1 Troy
Gram: A unit of weight measurement. 31.1 grams equals one Troy
Gravel: Rocks that are anywhere from a half inch to three inches in
Grizzly: A plate of steel with holes punched in it, a screen or heavy
steel bars to force oversize materials to be rejected and only allow materials to pass through that are "Blank"
(the hole size, say 1 inch) minus. For example, a grizzly that has opening between the bars of 2
inches would leave a pile of 2 inch minus gravel, ready for further processing.
Gut: The deepest part of a creek or river, usually near the
Hard Pack: Gravels that have not been disturbed since being deposited
there during some long ago storm or flood. They are very tight and require some use of pry bars or to dredge
Header Box: Sometimes known as the “bang box” or "crash box" (due to the noise of
gravel banging around inside) and was used on older dredges before the Jet Flair became popular. It is the area
that the rocks and water enter after leaving the dredge hose before entering the sluice box. Its job is to slow
down the material to allow the gold to “fall out” and get trapped in the sluice.
Hookah: Type of diving system whereby the diver is supplied breathable air through a
hose from a compressor on the surface, usually powered by the dredge pump engine but can be a stand alone unit,
sometimes powered by low voltage. A low pressure regulator is used for breathing. The diver is "tethered" to the
compressor, but can stay under water as long as the compressor is running. This is the most common
Hungarian Riffles: A series of bars placed in the sluice box perpendicular to the flow
of the water designed with a bend in them that creates a low pressure area down stream of the water flow to
allow more gold and heavy minerals to be extracted from the flow of water and gravel through the sluice
Iron bar: Tool for prying open bedrock pieces, prying boulders loose,
Jet Flair: The transition tube between the dredge's round suction
hose and the opens up an oval shape as it enters the sluice box.
Lode: Rock that contains one or more valuable minerals but needs
processing to extract the "Values".
Micron Gold: Gold too small to separate from the concentrates without using
amalgamation, shaker table or chemical leaching methods.
Mining Claim: See "Claim"
Mother Lode: The fabled elusive "Fabulously Rich" lode that the
California '49ers thought existed in the High Sierra mountain range which has turned out (so far) to be just
that: a fable. But we keep looking! :)
Nozzle: The metal fitting that is clamped on the the business (suction) end of
the dredge hose.
Nit picking: When the
Nugget: A piece of noble metal (i.e.. Gold, Silver, Platinum, etc.) that will not pass
through a number 10 screen.
Panning: The process used to separate gold from common river sand and
gravel. Gravel is placed in a pan, shaken and moved back and forth to remove the lighter materials.
This method has been used for centuries to sample gravel to determine if the area warrants further investigation
or mining. Also used to trace a placer deposit to it's lode source.
Pay: The term describing the amount the gravel you are mining is
yielding. For example, the location my friend told me he was dredging was "paying" a quarter ounce a day in
Paydirt: The dirt or gravel that contains higher concentrations of gold
and/or other values than the surrounding materials.
Pay Layer: Gravel bars often have layers that are deposited during flood
stage. These layers often act as a false bedrock with the gold being deposited around the old cobbles and
boulders that were there previously.
Pennyweight: Equal to the weight of one penny in the British Empire. It takes twenty
Pennyweight to make one troy ounce.
Platinum Group Metals:
Plug-up: When the dredge hose gets partially or completely clogged with rocks
and/or sand and gravel.
Pontoon: Floatation device to build a foundation in the water for the dredge
Profitability: The point at which you can pay your expenses with the equipment and crew you
have assembled- in the location you are dredging.
Purge Valve: A one-way valve allowing air to pass one direction and does not allow
water in. Used on better Dive Masks and snorkels.
Recovery System: This varies widely in design, but any system that is design to
catch and retain gold or other precious metals or gems.
S.C.U.B.A.: Self Contained Underwater Breathing Apparatus. This allows the
diver more freedom to roam under water but due to the bulky tank and other gear is usually not practical for
Snorkel: A tube held in the mouth while floating face down in the water to
allow you to breath without lifting your face out of the water.
Streak: See- Paystreak
Tailings: The waste material that drops back in the river after working it's
way through the dredge system or other mining gear.
Tracking/ back tracking:
Trommel: Circular metal tube with holes punched in it. This is to allow the smaller
particles to drop through as the "paydirt" is run through with water as a slurry. The oversize cobbles and
gravel run on through as tailings. Watch for cobbles with stringers of gold going into the tailings! A metal
detector mounted in the system could be useful to alert the operator of these
Troy Weight System:
Underwater rock weight:
Up cropped bedrock: A chunk or mass of bedrock extending up through the bottom of the stream
bed which can cause gold to accumulate in one glory hole or can enhance a paystreak if it occurs on the common
gold path traveling down the river.
Wet Suit Heater: (not the hot chocolate you drank before the | <urn:uuid:3a51ef7c-4245-4479-a46d-791061fe16df> | {
"date": "2020-01-25T17:20:41",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9147315621376038,
"score": 2.765625,
"token_count": 2590,
"url": "http://goldrushu.com/Glossary-of-Mining-Terms.html"
} |
- Υπεύθυνος Επικοινωνίας: Ms. ZHAO QIONG
- Δείτε τα στοιχεία επικοινωνίας
Consumer electronics refers to the audio and video products used by individuals and families in relation to radio and television. They mainly include: TV sets, DVD players, VCRs, camcorders, radios, tape recorders, , Record players, compact disc players (CDs) and more.
In some developed countries, however, telephones, personal computers, home office equipment, home electronic health care equipment, automotive electronics, etc. are also classified as consumer electronic products. With the advent of technology and new applications of new products, digital cameras, mobile phones, PDAs and other products are emerging as emerging consumer electronic products.
Since the late 1990s, information appliances integrating three fields of computer, information and communication, and consumer electronics have begun to penetrate into family life extensively. It has such functions as audio-visual, information processing and two-way network communication, Processor, associated supporting hardware (such as a graphics card, storage media, IC card or credit card reading device), embedded operating system and application layer software package. Broadly speaking, information appliances include all household appliances such as PCs, set-top boxes, HPC, DVDs, super VCDs, wireless data communication devices, video game devices, WEBTV, etc. that can exchange information through the network system. Currently, audio, video and communications equipment is a major component of information appliances.
In the long run, refrigerators, washing machines, microwave ovens and the like will also develop into information appliances and form an integral part of smart appliances. | <urn:uuid:cca25e6d-810b-4e39-b1b3-6e9dbc423f11> | {
"date": "2020-01-25T18:18:27",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9077209234237671,
"score": 2.859375,
"token_count": 383,
"url": "http://gr.ifagoup.com/consumer-electronics/"
} |
Information on this page, including unit offerings, is from the 2020 academic year.
Time Series Analysis (MAS352)
|Organisational Unit||Information Technology, Mathematics and Statistics|
|Availability||MURDOCH: S1-internal, S1-external|
|Teaching Timetables||Murdoch S1
|Description||This unit introduces methods for the analysis of measurements made sequentially over time and a brief look at data which are multivariate and correlated. Time series models are developed and inferential procedures (estimation, testing, forecasting) discussed. The unit also includes frequency domain methods for the extraction of signals from noisy data and discussion of linear systems. Applications of time series analysis are shown on Perth temperature data illustrating concepts useful for forecasting and demonstrating aspects of climate change.|
|Unit Learning Outcomes||On successful completion of the unit students should be able to:
1. Recognize and understand the nature of correlated data.
2. Recognize autocorrelated data or data which are correlated over time (as is in the nature of many time series data) and learn techniques - of both a simple nature and of a more complex nature, by way of which one may analyse such data. These techniques can include straight forward regression in time or further more appropriate methods in some contexts which involve what is known as the 'Time Domain Approach'.
3. Recognize cyclical patterns that are analysed in the frequency domain. Ideas of spectral analysis and the 'Frequency Domain Approach' are countenanced.
4. Understand bivariate processes that can be analysed using the Cross Spectrum and these lead into the theory of Linear Systems in both the Time Domain and the Frequency Domain.
|Timetabled Learning Activities||Lectures: 3 x 1 hour per week; laboratories/tutorials: 1 x 1 hour per week.|
|Unit Learning Experiences||This unit uses a mixture of structured activities and assessments to assist students in learning the material covered in the unit. Structured activities include lectures and tutorials, and assessments include assignments, a project, and a final exam. It is essential that internal students attend lectures and tutorials. External and internal students should review the recorded lectures on Echo360 and study the unit notes and textbook in the progression of the lectures. It is important that students grapple with the computing part of the unit early on so that they may prepare themselves for doing the project later in the semester. By attempting questions at the back of each chapter of the text, students get valuable insight into the material covered in lectures, and ultimately have a good background knowledge for preparing themselves for the final examination.|
|Assessment||All students' abilities to correctly apply time series methods will be assessed at regular intervals during the semester via assignments and a project. These assessments are designed to allow students to demonstrate their ability in each of the content areas of the unit and to give them regular feedback on their progress, helping them to identify their areas of strength or weakness during the semester. Assignment solutions and results will be posted progressively on the Learning Management System.
The weightings for assessment items are as follows:
Assignments (4) - 20%
Project - 10%
Final Examination - 70%
|Prerequisites||MAS222/MAS278 Probability and Statistical Inference OR MAS223 Applied Statistics OR MAS224/MAS230 Biostatistical Methods OR MAS284 Applied Statistics and Process Management or enrolment in a postgraduate IT course. In addition students must have a calculus background equivalent to at least either MAS161 Calculus and Matrix Algebra OR MAS221/MAS208 Mathematical Modelling.|
|Exclusions||Students may not enrol in this unit and either of MAS180 Introduction to Statistics or MAS183 Statistical Data Analysis concurrently. Students who previously successfully completed MAS368 Time Series and Multivariate Analysis cannot enrol in this unit for credit.|
|Previously||2015: 'Time Series and Multivariate Analysis'|
|Appears in these Courses/Majors:
see individual structures for context
|Internet Access Requirements||Murdoch units normally include an online component comprising materials, discussions, lecture recordings and assessment activities. All students, regardless of their location or mode of study, need to have access to and be able to use computing devices with browsing capability and a connection to the Internet via Broadband (Cable, ADSL or Mobile) or Wireless. The Internet connection should be readily available and allow large amounts of data to be streamed or downloaded (approximately 100MB per lecture recording). Students also need to be able to enter into online discussions and submit assignments online.| | <urn:uuid:1c307e57-074f-4e31-bc20-f01d9d400d8c> | {
"date": "2020-01-25T17:26:01",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8984774351119995,
"score": 2.5625,
"token_count": 942,
"url": "http://handbook.murdoch.edu.au/units/details/?unit=MAS352&year=2020"
} |
Through our 21st century, western eyes, Psalm 29 seems to be about how God shows his strength in the natural world. He thunders, he breaks cedar trees, and he sits enthroned on a flood. The psalm also contains language that is not so familiar and gives us the uneasy feeling that we possibly don’t understand it as well we might. For example, God’s voice flashes fire (v7), he makes Lebanon skip like a calf (v6), and he shakes the wilderness of Kadesh (v8) – the significance of these phrases is not obvious. By the end of the psalm we’re not sure exactly what it’s about, but are pretty comfortable that it’s somehow a declaration that God’s power is shown in dramatic weather events like thunder, lightning, and floods.
Christadelphian students have interpreted the psalm in a number of ways: Some have thought that the ‘voice of the LORD’ is a reference to God’s actual voice or words1, some have used the passage to make the case that before Abram had set off from Ur God must have explained the plan of salvation to him2, some have thought that the psalm teaches that God speaks before acting, and that this has a bearing on our understanding of inspiration3, and some have used it in discussions about the length of Christ’s future reign on earth (v10).4 As we will see, the psalmist’s intention lies elsewhere.
If instead of reading with 21st century, western eyes we listen to the psalm with the Iron Age ears of an Israelite agriculturalist5 we will hear an entirely different message, and that message is crystal clear.
In a section describing rewards for obedience to God, a passage in Deuteronomy contrasts the land of Canaan with that of Egypt:
Dt 11:10–12 For the land that you are about to enter to occupy is not like the land of Egypt, from which you have come, where you sow your seed and irrigate by foot like a vegetable garden. But the land that you are crossing over to occupy is a land of hills and valleys, watered by rain from the sky, a land that the LORD your God looks after.6
Unlike Egypt, watered by the ever-reliable Nile, agriculture in the land of Canaan was dependent on the rain. If the rain didn’t come then the land would suffer drought and its inhabitants famine. The first time we come across the land of Canaan in scripture we find it in this sorry state. Shortly after Abram arrived in Canaan (Ge 12:5), he had to leave due to famine (12:10). Following the lead of those around him, he went down into Egypt in order to survive.7 Canaan suffered from famine in the time of Isaac (26:1), as it did in the time of Jacob (42:5). During the early settlement period the land suffered from famine8, as stated in the Ruth narrative (Ru 1:1). It did not escape in the time of David (2 Sa 21:1), or in the time of Elisha (2 Ki 4:38). Famine and hunger were common in the land “flowing with milk and honey.”
Living at the mercy of the elements and being dependent on seasonal rains left the Israelites in a vulnerable position. God had hoped that they would have responded by placing their trust in him:
Le 26:3–4 If you follow my statutes and keep my commandments and observe them faithfully, I will give you your rains in their season, and the land shall yield its produce, and the trees of the field shall yield their fruit.
Instead, the Israelites who entered Canaan “lived among the Canaanites, the Hittites, the Amorites, the Perizzites, the Hivites, and the Jebusites; and they took their daughters as wives for themselves, and their own daughters they gave to their sons; and they worshiped their gods. The Israelites did what was evil in the sight of the LORD, forgetting the LORD their God, and worshiping the Baals and the Asherahs” (Jdg 3:5–7). They abandoned God wholesale – hardly a surprise given the extent of their intermarriage with the native Canaanite population. Further, we’re told:
Jdg 2:11–13 Then the Israelites did what was evil in the sight of the LORD and worshiped the Baals; and they abandoned the LORD, the God of their ancestors, who had brought them out of the land of Egypt; they followed other gods, from among the gods of the peoples who were all around them, and bowed down to them; and they provoked the LORD to anger. They abandoned the LORD, and worshiped Baal and the Astartes.
It would be a mistake to think that this falling away to the gods of the surrounding Canaanites is a reference to a few isolated cases – the scriptures paint the early Israelites as having completely turned their backs on God for the worship of the gods of the Canaanites, Moabites, and Phoenicians amongst others.9 There was a wide gulf between the sometime-state religion practiced by Levitical priests in Jerusalem worshipping Yahweh, and the Israelites’ hereditary folk religion worshipping the Canaanite pantheon, a practice passed down through their generations (Je 9:14).
The Canaanite god we hear most of in scripture is Baal. It is recorded that even before the wandering Israelites made it into the Promised Land they were worshipping at Baal-Peor.10 They worshipped Baal in the time of the Judges (Jdg 10:10), Ahab famously built the god a temple in the capital city of Samaria (1 Ki 16:31-32), and just before Judah were taken to Babylon they were still worshipping him (Je 2:8). The Israelites were loyal and keen worshippers of Baal: For your gods have become as many as your towns, O Judah; and as many as the streets of Jerusalem are the altars to shame you have set up, altars to make offerings to Baal (Je 11:13).
Though he was not the head of the Canaanite pantheon, Baal was its most prominent god. He is first mentioned in the Ebla texts of the late 3rd millennium BC where he is the son of Dagon11, but it is from the texts discovered at Ugarit that we learn the most about him. Baal’s father was variously El or Dagan, his consort was Anat, he fought and was killed by Mot the god of the underworld, he came back to life, and was enthroned.12
Baal was considered to ride on clouds. The epithet “Cloud Rider” occurs frequently in the Ugaritic texts. For example, Anat responded to an invitation from Baal in The Tale of Aqhat:
What enemy has risen against Baal,
What foe against the Cloud Rider?
The youths speak up and answer:
No enemy has risen against Baal,
No foe against the Cloudrider.13
It was thought that Baal sent the rain. From The Legend of King Keret we read:
Unto the earth Baal rains,
And unto the field rains ‘Aliyy [Aliyy being identical with Baal].
Sweet to the earth is Baa[l’s] r[ai]n,
And to the field the rain of ‘Aliyy.14
Back in The Tale of Aqhat we read of a time when Baal would fail, resulting in the cessation of rain:
Seven years shall Baal fail,
Eight the Rider of the Clouds.
No dew, No rain;
No welling-up of the deep,
No sweetness of Baal’s voice.15
Thunder was considered to be Baal’s voice. In the story The Palace of Baal we find the following:
Baal uttered his holy voice,
Baal repeated the [issue] of his lips;
(he uttered) his [holy] voice [(and)] the earth did quake,
[(he repeated) the issue of his lips (and)] the rocks (did quake);
peoples afar off were dismayed […] the peoples of the east;
the high places of the earth shook.16
As well as his voice being thunder, he was also thought to send out lightning. Though it is damaged the tablet containing the relevant story recounts Anat, Baal’s consort, calling for Baal to send out his lightning, and his “horns”, i.e. “double-lightning”:
May Baal set his bolts [in the Heavens,]
May […] radiate his [‘ho]rns.’17
Baal’s father El summed up the above characteristics in his speech to the goddess Athirat:
So now may Baal enrich with his rain,
May he enrich with rich water in a downpour.
And may he give his voice in the clouds,
May he flash to the earth lightning.18
The Israelites did not fall for Baal due to their belief that he was in control of dramatic natural events such as thunder and lightning; rather it was because the fertility of the land depended on him sending the rain.19 There was a naturalistic attraction to the fertility god. This explains why God framed Elijah’s encounter with the priests of Baal on Mount Carmel with the following statement:
1 Ki 18:1 After many days the word of the LORD came to Elijah, in the third year of the drought, saying, “Go, present yourself to Ahab; I will send rain on the earth.”
That was the question that needed to be settled. Who would send rain on the earth? Yahweh? Or Baal? The contest Elijah proposed to the people was simple: you call on the name of your god and I will call on the name of the LORD; the god who answers by fire is indeed God (1 Ki 8:24). The god that sent down lightning20, he was the true and the other the imposter. Lightning would come from a storm, the storm would bring rain, and rain would end the drought. Much was riding on the contest – the next verse tells us “the famine was severe in Samaria.”
The outcome of the contest is well known. Against all odds (1 Ki 18:33-35) lightning struck (1 Ki 18:38) and therefore thunder would have been heard,21 the heavens grew black with clouds (1 Ki 18:45), and heavy rain fell that would have ended the drought (1 Ki 18:45).
These are exactly the actions that would ordinarily have been attributed to Baal. He was after all the cloud-riding god of thunder, lightning, and rain. As the Israelite onlookers and unfortunate priests of Baal found, it was not Baal who answered but Yahweh. After all, when the priests of Baal called on the name of Baal all morning, there was no voice in response:
1 Ki 18:26 So they took the bull that was given them, prepared it, and called on the name of Baal from morning until noon, crying, “O Baal, answer us!” But there was no voice, and no answer. They limped about the altar that they had made.
As well as receiving an answer, they’d been expecting to hear the voice of Baal, i.e. thunder. But no thunder came from him. The voice they heard was Yahweh’s thunder.
In the events on Mount Carmel, Yahweh had appropriated the attributes of Baal to himself. What the Israelites assumed to be the actions of Baal were now irrefutably seen to be Yahweh’s.
It is with this background that we now turn to Psalm 29.
With the Baal motifs in mind, we can get a sense of the impact the psalm would have had on the Israelite agriculturalist, and it would not be dissimilar to that of the events on Mount Carmel. It begins, “Ascribe to Yahweh, O heavenly beings, ascribe to Yahweh glory and strength. Ascribe to the LORD the glory of his name; worship the LORD in holy splendor.” The focus is not on Yahweh’s glory and strength, neither is it on the glory of his name. The focus is on the ascription of these attributes to Yahweh. The listener was instructed to ascribe them to Yahweh, not another God. If this was not the psalmist’s intent it could instead have begun with, “Yahweh has glory and strength, etc.” Just as on Mount Carmel the question was which god would bring down lightning, the question in this passage is: to which god should strength and glory be ascribed? As the psalm continues the choices available to the hearer become obvious.
Ps 29:3–9 The voice of the LORD is over the waters; the God of glory thunders, the LORD, over mighty waters. The voice of the LORD is powerful; the voice of the LORD is full of majesty. The voice of the LORD breaks the cedars; the LORD breaks the cedars of Lebanon. He makes Lebanon skip like a calf, and Sirion like a young wild ox. The voice of the LORD flashes forth flames of fire. The voice of the LORD shakes the wilderness; the LORD shakes the wilderness of Kadesh. The voice of the LORD causes the oaks to whirl, and strips the forest bare; and in his temple all say, “Glory!”
Seven times the “voice of Yahweh” is mentioned. It is the focus of the body of the psalm. His voice is described as being “over the waters” and “mighty waters”. It is powerful, full of majesty, and breaks the cedars of Lebanon. The voice of Yahweh produces lightning, shakes the wilderness of Kadesh. The imagery of thunder is clear, and if there was any doubt verse 3 makes it clear: The voice of the LORD is over the waters; the God of glory thunders, the LORD, over mighty waters, where the voice of Yahweh is paralleled with the thunder he is responsible for.
Again, just like on Mount Carmel, the psalmist is claiming the thunder and lightning for Yahweh. With the background we established above it would have been abundantly clear to any Israelite agriculturalist that they were to ascribe the thunder to Yahweh, and they would only have needed to be told to do this if they were not doing so already, and they’d only not be ascribing it to Yahweh if they were already ascribing it to another god, and the other only god who’d have fitted the bill was Baal. The psalmist was appropriating thunder from Baal and ascribing it to Yahweh.
The same is true of the lightning ordinarily attributed to Baal. In verse 7 the voice of Yahweh flashes forth flames of fire. The link between the thunder (“the voice of Yahweh”) and lightning (“flames of fire” “flashed” from the thunder), though obvious, points us once again to characteristics attributed to Baal. As seen above in El’s speech to Athirat, it was Baal who was thought to send lightning; the psalmist intended the hearer to ascribe lightning to Yahweh instead. Similarly, though not in this psalm, the language of Baal the “cloud-rider” is attributed to Yahweh elsewhere; Sing to God, sing praises to his name; lift up a song to him who rides upon the clouds – his name is the LORD – be exultant before him (Ps 68:4).
What does it mean that the voice of Yahweh was over the water? The idea is mentioned three times; twice in verse 2 and once in verse 10 where we find Yahweh enthroned over the flood. This may seem like an odd idea to us but it would have been striking to the Israelite agriculturalist. Canaanite mythology held that thunder was the result of battle between Baal and “Yam”, the god of the sea. In the closing scene of the story Baal and Yam we read the following:
“Strike the crown of prince Yam, between the eyes of judge Nahar. Let Yam collapse and fall to the earth!’ And the club danced from the hand of Baal, [like] an eagle from his fingers. It struck the crown of prince [Yam]…. Yam collapsed (and) fell to the earth; his joints quivered and his form crumpled. Baal dragged out Yam and laid him down… Athtart rebuked the Name,(saying): “Scatter (him), o mightiest [Baal]! Scatter (him), o rider on the clouds! For prince [Yam] is our captive….’ And he did come forth […] mightiest Baal scattered him and […]: ‘Yam is indeed dead! Baal shall be king!22
The sea was considered a terrible force23, and in Canaanite mythology its subjugation was ascribed to Baal. However, the psalmist ascribed that characteristic to Yahweh too:
The voice of the LORD is over the waters;
the God of glory thunders,
the LORD, over mighty waters…
The LORD sits enthroned over the flood;
the LORD sits enthroned as king forever. (Ps 29:3,10)
The psalm opens with the image of Yahweh “thundering”, or displaying his power over the water. By the end of the psalm he is enthroned on it, having conquered and brought order to it. The flood Yahweh is described as being enthroned over is the only use of the word outside of the deluge narrative of the early chapters of Genesis – water described as destructive enough to flood the earth. The psalmist ascribed power over these waters to Yahweh; something Canaanites ascribed to Baal.
Mention of Sirion and Lebanon attest to the psalm’s geographic setting north of Canaan in Phoenicia. Kadesh is also likely speaking of a northern location, i.e. Kadesh on the Orontes.24 Lebanon’s cedars, and Sirion (i.e. Mount Hermon – Dt 3:9, 4:8, Je 18:14) are symbols of strength.25 However, in verses 5 and 6 we see these powerful symbols as being made weak: The voice of the LORD breaks the cedars; the LORD breaks the cedars of Lebanon. He makes Lebanon skip like a calf, and Sirion like a young wild ox. Cedar trees, a symbol used for Baal’s lightning26 were smashed by Yahweh’s voice. Sirion, one of the most prominent mountains in the Levant, a source of cedar for the building of Baal’s palace27 and recorded as being a site of Baal worship (Jdg 3:3) was made to “skip” by Yahweh. Baal’s strength was broken, because it was Yahweh who thundered, not Baal. The psalm once again ascribes to Yahweh the power ordinarily ascribed to Baal.
Much more could be said about the psalm including about its great age28, its ancient meter29, and its use in the feasts of Tabernacles and Pentecost30; we have only scratched its surface. However, from a Baal-worshipping Israelite agriculturalist’s point of view, the psalm’s intent has become abundantly clear:
Ascribe to Yahweh, not Baal, glory and strength.
- Broyles, Craig C. Psalms. Edited by W. Ward Gasque, Robert L. Hubbard Jr., and Robert K. Johnston. Understanding the Bible Commentary Series. Grand Rapids, MI: Baker Books, 2012.
- Peter C. Craigie, Psalms 1–50 (vol. 19, 2nd ed.; Word Biblical Commentary; Nashville, TN: Nelson Reference & Electronic, 2004)
- Frank Moore Cross Jr and David Noel Freedman, Studies in Ancient Yahwistic Poetry (Grand Rapids, MI; Cambridge, U.K.; Livonia, MI: William B. Eerdmans Publishing Co.; Dove Booksellers, 1997)
- John Day, “Baal (Deity),” ed. David Noel Freedman, The Anchor Yale Bible Dictionary (New York: Doubleday, 1992), 545.
- John C. L. Gibson and Godfrey Rolles Driver, Canaanite Myths and Legends (2nd ed.; London; New York: T & T Clark International, 2004)
- Derek Kidner, Psalms 1–72: An Introduction and Commentary (vol. 15; Tyndale Old Testament Commentaries; Downers Grove, IL: InterVarsity Press, 1973), 141–145.
- Hans-Joachim Kraus, A Continental Commentary: Psalms 1–59 (Minneapolis, MN: Fortress Press, 1993)
- Amihai Mazar, Archaeology of the Land of the Bible 10,000-586 B.C.E. (New Haven; London: Yale University Press, 1990)
- Mark S. Smith, The Early History of God: Yahweh and the Other Deities in Ancient Israel (Grand Rapids, MI; Cambridge, U.K.; Dearborn, MI: William B. Eerdmans Publishing Company; Dove Booksellers, 2002), 65–101.
- Mark S. Smith and Simon B. Parker, Ugaritic Narrative Poetry (vol. 9; Writings from the ancient world; Atlanta, GA: Scholars Press, 1997)
- Alan and Margaret Fowler, “In the beginning was the word,” The Christadelphian (May), no. 1547 (1993): 177–178.
- Stephen Palmer, “Great and precious promises – The God of glory appeared to Abraham,” The Christadelphian (March), no. 1545 (1993): 89.
- Peter Watkins, “The inspired scriptures – our sure foundation,” The Christadelphian (September), no. 1167 (1961): 405-406.
- Stanley Owen, “Studies in the Statement of Faith, The Millennium After,” The Christadelphian (October), no. 1516 (1990): 127.
- The Iron Age spans approx. 1200–586 BC, the period from the conquest of Canaan to the Babylonian captivity. As for the psalm’s target audience being an agriculturalist, almost everyone in Canaan was exactly that. As Dever explains, “…the archaeological record bears out the notion of a simple, poorly developed society and economy, based on agriculture and a self-sufficient lifestyle.” William G. Dever, The Lives of Ordinary People in Ancient Israel: Where Archaeology and the Bible Intersect (Grand Rapids, MI; Cambridge, U.K.: William B. Eerdmans Publishing Company, 2012), 206. “Iron Age Israelite Agriculturalist” serves as a useful label for those the psalm aimed to teach.
- All scripture quotations from the New Revised Standard Version (Nashville: Thomas Nelson Publishers, 1989)
- K. A. Kitchen, On the Reliability of the Old Testament (Grand Rapids, MI; Cambridge, U.K.: William B. Eerdmans Publishing Company, 2006), 318–319.
- Amihai Mazar, Archaeology of the Land of the Bible 10,000-586 B.C.E. (New Haven; London: Yale University Press, 1990), 235.
- For example see Judges 10:6 “The Israelites again did what was evil in the sight of the LORD, worshiping the Baals and the Astartes, the gods of Aram, the gods of Sidon, the gods of Moab, the gods of the Ammonites, and the gods of the Philistines.”
- “Prior to the discovery of the Ugaritic texts it was sometimes thought that there were various and quite-separate gods called Baal. This idea was encouraged by the presence in the OT of various compound place names involving Baal, e.g. Baal-peor, Baal-hermon, Baal-meon, Baal-hazor, Baal-gad, etc. However, with the discovery of the Ugaritic texts it became clear that there was one great Canaanite storm-and-fertility deity Baal-Hadad of cosmic stature, so that we must assume that these OT allusions refer to particular local manifestations of this one god. We may compare the variety of local manifestations of the Virgin Mary within Roman Catholicism.” John Day, “Baal (Deity),” ed. David Noel Freedman, The Anchor Yale Bible Dictionary (New York: Doubleday, 1992), 547.
- Winfried Corduan, “Baal,” ed. John D. Barry et al., The Lexham Bible Dictionary (Bellingham, WA: Lexham Press, 2016).
- For Baal as son of El: KTU 1.3:5:32–36 “Our king is Mightiest Baal… In lament he cries to Bull El, his Father, to El, the King who created him.” Mark S. Smith and Simon B. Parker, Ugaritic Narrative Poetry (vol. 9; Writings from the ancient world; Atlanta, GA: Scholars Press, 1997), 117–118. For Baal as son of Dagan: KTU 1.2:1:35 “Give up Baal that I may humble him, the Son of Dagan, that I may possess his gold.’” Ibid., 100. For Anath’s consort: KTU 1.3:3:5–6 “She sings the love of Mightiest Baal…” Ibid., 109. For Baal’s death: KTU 1.5:6:8–10 “We [c]ame upon Baal fallen to earth; dead is Mightiest Baal, perished the Prince, Lord of the Earth.” Ibid., 149. For Baal’s coming back to life: KTU 1.6:3:20–21 “For Mightiest Baal lives, the Prince, Lord of the Earth is alive.” Ibid., 158. For Baal’s enthroning: KTU 1.6:6:33–35 “Let Baal be enthroned on [his] royal [throne,] on [the resting place], [the throne] of his dominion.” Ibid., 163
- KTU 1.3:4:4–6, Smith & Parker, op. cit., 112.
- Ibid., 148.
- Ibid., 153.
- CTA 4:7:29–38 John C. L. Gibson and Godfrey Rolles Driver, Canaanite Myths and Legends (2nd ed.; London; New York: T & T Clark International, 2004), 65.
- KTU 1.3:4:25–27, Smith & Parker, op. cit., 113.
- KTU 1.4:5:6–9, Ibid., 129.
- John Day, “Baal (Deity),” ed. David Noel Freedman, The Anchor Yale Bible Dictionary (New York: Doubleday, 1992), 545.
- The “fire from Yahweh” that “fell” (1 Ki 18:38) can only have been lightning. It was a natural event that the Canaanites associated with thunder, a phenomenon they’d experienced many times and referred to as “fire”. The naturalistic explanation fits well with the other use of the phrase: “While he was still speaking, another came and said, ‘The fire of God fell from heaven and burned up the sheep and the servants, and consumed them; I alone have escaped to tell you.’” (Job 1:16) The passage is not describing some sort of heavenly flame-thrower.
- Lightning always causes thunder. See National Severe Storms Laboratory, “Severe Weather 101 – Lightning”, http://www.nssl.noaa.gov/education/svrwx101/lightning/faq/
- CTA 2:4:19–35, Gibson & Driver, op. cit., 44–45.
- It was seen as a cosmic element, represented by violent sea-monsters in most Ancient Near Eastern mythology, see Elaine R. Follis, “Sea,” ed. David Noel Freedman, The Anchor Yale Bible Dictionary (New York: Doubleday, 1992), 1058–1059.
- “Some scholars argue that the expression should be interpreted as a place name and that the Qadesh referred, to in the Sinai traditions is intended. But others, noting the same expression in the Ugaritic texts (mdbr qdš; CTA 26.65), prefer to identify the area with the Syrian desert, perhaps the area near Qadesh on the Orontes (e.g. Dahood, Psalms I, 178; Cross, Canaanite Myth and Hebrew Epic, 154). The reference to northern locales in vv 5–6 may seem to support such an interpretation, but it must remain uncertain.” Peter C. Craigie, Psalms 1–50 (vol. 19, 2nd ed.; Word Biblical Commentary; Nashville, TN: Nelson Reference & Electronic, 2004), 248. See also Hans-Joachim Kraus, A Continental Commentary: Psalms 1–59 (Minneapolis, MN: Fortress Press, 1993), 349.
- Craigie, op. cit., 247.
- CTA 4:7:32–41, Gibson & Driver, op. cit., 65.
- KTU 1.4:6:16–21, Smith & Parker op. cit., 133.
- “Psalm 29 is very old — perhaps one of the oldest of all OT psalms.” Hans-Joachim Kraus, A Continental Commentary: Psalms 1–59 (Minneapolis, MN: Fortress Press, 1993), 347.
- “Without doubt we have in Psalm 29 archaic meters that clearly stand out from other OT psalmic poetry.” Kraus, op. cit., 345–346.
- Derek Kidner, Psalms 1–72: An Introduction and Commentary (vol. 15; Tyndale Old Testament Commentaries; Downers Grove, IL: InterVarsity Press, 1973), 142. | <urn:uuid:cebaea14-a873-443e-81b4-9e14a196aaea> | {
"date": "2020-01-25T18:44:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9486086368560791,
"score": 2.984375,
"token_count": 6580,
"url": "http://living-faith.org/2016/12/22/ascribe-to-yahweh/"
} |
South Llano River State Park is a bird watcher’s paradise. As you drive along the entrance road into the park you will pass the first of many bird viewing blinds that are scattered throughout the park.
All of the bird blinds are well maintained and equipped with comfortable seating, a log book where you may record the birds you have observed and a bird identification book as well as bird posters on the inside walls. Outside, birds flock to the various feeders and bird baths. The observation glass offers a crystal clear view of our feathered friends comings and goings. 220 species of birds are found in the park.
The Painted Bunting, a native Texan, makes it’s summer home here at the South Llano River State Park. This beautiful, colorful songbird retreats to Mexico in the winter months however returns to the South Llano River State Park each spring. The rare and endangered Golden-cheeked Warbler establishes breeding territories at the South Llano River Park in early spring.Another rare and endangered bird, the Black-capped Vireo is also found at the South Llano River State Park. At present the Black-capped Vireo breeds in only a few isolated areas of Oklahoma, Central Texas, and Coahuilla.
The old-growth Juniper-oak woodlands at the South Llano River State Park also attract hummingbirds. They hunt the many small insects in the riverside (riparian) areas of the spring-fed South Llano River.
The South Llano River State Park is at the eastern edge of the range of the black-chinned hummingbird and at the western edge of the ruby-throated hummingbird’s range. When you come out to camp at the South Llano River State Park hang a hummingbird feeder at your site, fill it with a mixture of sugar water (1 part sugar dissolved in 4 parts water) and you will be viewing the hummers right from your campsite. Dozens of these minuscule birds will congregate just after dawn and right before dark to feed, inserting their long beaks as they slurp the nectar with tiny forked tongues.
An interesting fact about the black-chinned humming bird is that it makes it’s nest with spider webs. The webs stretch as the chicks grow.
The Acorn Bird Blind on the east side of the camping loop is the location for ranger talks at the South Llano River State Park on summer weekend evenings. The bird blind adjacent to the walk-in camping area is named Falcon. Nearby is the Falcon trailhead.
(See related blog post on the Falcon Trail hike.)
The South Llano River State Park is located approximated 6 miles outside the town of Junction, Texas in Texas Hill Country.
Be sure to secure a camping reservation in advance before you head to the South Llano River State Park or any of the Texas Hill Country State Parks for a summer weekends. | <urn:uuid:7b618269-4a6e-4532-a0fd-b63068a8f2df> | {
"date": "2020-01-25T17:15:15",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9324797987937927,
"score": 2.671875,
"token_count": 612,
"url": "http://lonestartravelers.com/birding-at-the-south-llano-river-state-park/"
} |
Technology Enhancing Learning: Analysing Uses of Information and Communication Technologies by Primary and Secondary School Pupils with Learning Frameworks
Curriculum Journal Volume 17, Number 2, ISSN 0958-5176
Successive national policy in England has striven to develop uses of information and communication technologies (ICT) to support teaching and learning, and has promoted the adoption of ICT in schools over a period of some 25 years (since the "Microcomputer in schools initiative" of 1981). The current level of deployment of ICT in schools is high. Not only are current levels higher than ever before, but the diversity of forms of ICT have also increased. These high levels and wide diversity create challenges for teachers, in terms of understanding how to select appropriate uses of ICT to support learning most effectively in specific situations. A clear need is for teachers to know how each form of ICT supports precise aspects of learning, in each subject area, topic and activity. Teachers need to consider the forms of technological resources that are accessible, how these specifically work within learning environments in classroom (and other) settings, and how uses of resources match social, behavioural, emotional and cognitive needs of pupils. This article offers a perspective of the pedagogical needs of teachers, by considering a particular selection of learning technologies, how these are used within learning environments, and how it is possible to view their impact on pupil cognition. A set of starting frameworks, through which to analyse impact, is considered, and the findings from example sets of case studies indicate how uses of ICT have been focused by teachers, and where potential forms of impact have arisen. The findings indicate a need for more detailed data gathering, both to provide evidence that will offer a greater insight into specific aspects of learning that are supported when certain forms of ICT are used, and to give an indication of gaps in learning focus that might arise. From the results of the analyses presented, implications for policy, practice, evaluation and research are highlighted and discussed. (Contains 2 figures, 3 tables, and 2 notes.)
Passey, D. (2006). Technology Enhancing Learning: Analysing Uses of Information and Communication Technologies by Primary and Secondary School Pupils with Learning Frameworks. Curriculum Journal, 17(2), 139-166. | <urn:uuid:67fa015b-c3ba-42f3-9d21-daf33340d651> | {
"date": "2020-01-25T17:04:59",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9382128715515137,
"score": 3.1875,
"token_count": 468,
"url": "http://mail.editlib.org/p/99516/"
} |
India has far fewer tigers living in the wild than had been thought, initial results from a major new study suggest.
There has been a sharp decline in the number of tigers in India
The Wildlife Institute of India census showed tiger numbers falling in some states by two-thirds in five years. A final report is due out in December.
India's last major survey in 2002 put tiger numbers at 3,500. That was far too optimistic, say conservationists.
They blame poaching and urbanisation for the decline and say the authorities must do more before time runs out.
A century ago India was believed to have tens of thousands of tigers.
The new survey, conducted over two years, was the most ambitious ever undertaken to try to stem the decline in the population of India's tigers.
It found the largest decline in the tiger population to be in the central state of Madhya Pradesh, where the number of big cats has gone down from 710 to 255 in the past five years.
Tiger skins and other body parts sell for thousands of dollars
"The figures are quite different from what we have seen earlier," said Mr Rajesh Gopal, secretary general of the government's Tiger Conservation Authority of India, which also took part in the survey.
Mr Gopal said the new study was far more detailed than any previous research.
Results are available only for some regions and a total overall figure is not expected until later this year.
But conservationists say the 2002 census badly overestimated tiger number.
Wildlife experts have criticised the Indian government for failing to crack down on poachers and the illegal trade in tiger skins.
"The results are depressing," Belinda Wright, director of the Wildlife Protection Society of India, told the Associated Press news agency.
"But it's a major step forward that a government study has finally come to terms with this disastrous decrease in tiger numbers," she said.
According to reports, there were 40,000 tigers in India a century ago.
The country is home to 40% of the world's tigers, with 23 tiger reserves in 17 states.
Tigers are poached for their body parts - skins are prized for fashion and tiger bones are used for oriental medicines.
Tiger pelts can fetch up to $12,500 in China.
Some conservationists say forest officials often inflate the number of sightings to paint a rosy picture of how India's tigers are surviving.
Tiger expert Valmik Thapar says the government has failed to protect its tigers.
He says instead of wasting time and energy on carrying out the new survey, the government should concentrate instead on protecting tigers. | <urn:uuid:55e7260f-fc2d-452d-b483-48f1669249fe> | {
"date": "2020-01-25T18:02:09",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9631490111351013,
"score": 3.21875,
"token_count": 543,
"url": "http://news.bbc.co.uk/2/hi/south_asia/6686457.stm"
} |
I enjoy gifts that lead to interesting projects.
For a gardener, there are many possibilities for such gifts, definitely including plants that would complement the landscape, or add something that is both compatible and unusual.
This year, my most intriguing gift is a “hotel” for native bees. It qualifies as a hotel by including nesting facilities for multiple occupants.
This gift leads to an interesting study of the bees themselves, and of ways to entice them into using the hotel.
Some 4,000 species of bees are native to North America. This column is not suitable for an overview of native bees, but it is worth noting at the outset that the familiar honeybee (Apis mellifera) is not native to this part of the world, but emigrated from Europe to the United States.
Native bees are excellent pollinators, more efficient than honeybees in that work. An important difference between these groups: most native bees are solitary, nesting in cavities or the ground, while honeybees are social, nesting in hives.
According to the Xerces Society (which seeks to conserve bees and other invertebrates) about thirty percent of our 4,000 species of native bees nests in cavities that they find or create in nature. The other seventy percent nest in the ground. There are also few other native species, like the Western Bumblebee (Bombus occidentalis) that are social creatures that nest in larger cavities.
My native bee hotel would be of interest, hopefully, to cavity-nesting species that live in central California. My initial expectation was that this nest would attract mason bees, but the Xerces Society lists only a few species that are found primarily in Washington and Oregon. There are many other species, however, including the Blue Orchard Mason Bee (Osmia lignaria),that might live in California.
Another cavity-nesting native bee species that could appear in my garden is the carpenter bee (Xylocopa californica), which, according to Las Pilitas Nursery, will spend weeks digging a 1/2 by 4–to–6-inch hole into a tree for their nest site. We might expect that carpenter bees would be attracted to a nest that is already for occupancy.
In addition, many other species of native bees might welcome this native bee hotel.
While there will be variations in nesting by different native bee species, the common model has the newly hatched female bee emerging from its nesting place in the early spring, and busily mating and seeking a cavity for its eggs. The bee gathers pollen to stock the nest, then deposits an egg, and seals the nest with a wall of mud. The bee repeats this process so that a single cavity could include five–to–eight chambers, each with its own egg and pollen stash.
During the summer, the eggs develop into larvae, then into pupae, and finally into adults, which remain in the nest until the following spring.
To support this process, the hotel manager, i.e., the garden host, should install the nest complex in a east- or southeast-facing location, where it will enjoy morning sunlight. It could be three–to–six feet above ground for convenient observation, and near a good supply of flowering plants (preferably California natives) and mud for construction of nest chambers.
I will plant a selection of California native annuals near this nesting unit, for the bees’ easy access to pollen. I will also provide a supply of muddy clay soil, for the bees’ use. My garden’s clay occurs in a rather deep layer, so I will need to import some clay soil, and keep it moist in a container, such as a large saucer for a plant container.
A good source of seeds for pollinator flowers is the Early Blooming Beekeeper’s Mix, offered by Renee’s Gardens. This mix includes twenty-two varieties, many of which are California native plants.
Bee experts recommend moving the nesting unit into a dark, unheated garage or shed during the winter months to protect the bees from predators. The gardener should then return the unit to the garden in the early spring, well before flowers bloom. As the days warm, the gardener can watch for the new generation of bees as they emerge from the nests. | <urn:uuid:73139176-c0bb-467e-bdc9-bc3ebd796b3d> | {
"date": "2020-01-25T18:51:57",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9513469934463501,
"score": 2.59375,
"token_count": 897,
"url": "http://ongardening.com/?tag=insects"
} |
The Bible or Holy Scripture or Canon, that is the Old and the New Testament, is the sum of the god-inspired books, which are the source of Christian belief. The Jews, supposedly, have also the Old Testament as source of their religion, without calling it Old Testament of course, since they are not accepting a New Testament; they are calling it, without a single name, «Law Prophets and Writings» (Torah Nevi’im and Ketuvim). In addition, after 135 a.D., this «Old Testament» of them, is in its text corrupted to a such degree that is not anymore the god-inspired Bible, but essentially another book. The Orthodox Christians, the Jews along with Protestants and Anglicans, and the Papists have three different catalogs of Canon books.
The catalog of the Canon of the Christian Church was published in 367 after research by Athanasius the Great, bishop of Alexandria, who acted as an assignee exclusively for this, after delegation and mandate of the first Ecumenical council. The council assigned each bishop of Alexandria to write and send every year and forever, a circular letter, named festive letter, to all the churches of the world, first for defining the date of next's year easter and next for commenting about the principal issues of belief and confession that occurred throughout the world in christianity during the year before. So Alexander of Alexandria wrote this letter in the years 326-328, and Athanasius the Great in the years 329-373. In the year 367, Athanasius gave the catalog of the Canon in his 39th Festive Letter, which is accepted by the Christian Church.
The Jews accept one catalog of the Canon, only of the Old Testament of course, which is edited by an unknown commentator between the years 700 and 1350 and it is found at the Study (Talmud) and more precisely at the Comments (Gemara) of the Repetition (Mishnah), in the treatise Last Gate (Baba Bathra, 14b - 15a), and in my opinion originates in the years 120-135 a.D. to the infamous rabbi Shimon ben Akiva.
All the Protestants and together the Anglicans accept this late Jewish catalog of the Canon, which they, in the year 1545, propounded expressly and completely by compiling it at their dogmatic confession of Zurich.
The Papistics accept their own catalog of the Canon, that supposedly is an «infallible» doctrine (decretum) of the Pope of Rome Paul III, which in 8/4/1546, was announced and published during the fourth session of the according to them «ecumenical» council of Trent, held also that year.
Except the book difference of the three catalogs (ecclesiastic, jewish-protestant, papistic), there is another and equally essential difference, that, until today, the appearing as connoisseurs (biblical theological faculty professors etc.) did not ever realize. The difference here is that G. Athanasius and with him all the Orthodox Christian Church think that the selection of the god-inspired books of the Canon results not from some critical presumption and evaluation of any posterior prophet and apostle, but by its uninterrupted handing down, hand to hand, from the apostles to us, and that this tradition is for us a matter of historical and grammatic examination and not of a dogmatic decision; whereas the others, Jews Protestants Anglicans, think that the catalog results by the critical presumption and evaluation of the specialists that have published it – that is, they are judging by themselves about what is god-inspired and what is not – and Papistics by the alleged «infallible» doctrinal inspiration of the Pope of Rome who wrote his supposedly «infallible» decree. Athanasius relies upon the non biblical writers of Israel that lived before Christ and on the Christian ecclesiastical writers before him, mostly on Melito of Sardis (160 a.D.); whereas Akiva and the Pope of Rome rely on their own «god-inspiration» and Protestants and Anglicans on the Jewish, post-Christian, catalog.
In the four following quoted catalogs, first I cite the catalog of the Christian Church from the authentic writing of Athanasius the Great; next I translate [Translator’s Note: in Greek] the Jewish catalog from the Hebrew text through English, and its titles directly from the original Hebrew text of the Talmud; then the protestantical, from its original Latin text; and finally the papal from its original Latin text too.
1. The 39th Festive letter of G. Athanasius
Therefore of the Old Testament there are twenty-two books in number; for it has been handed down, as I heard, that so many are the letters among the Hebrews; their respective order and names are as follows; the first is Genesis, then Exodus, next Leviticus, after that Numbers, and then Deuteronomy; following these there is Joshua – the son of Navi [Nun], and Judges, and next to it Ruth; next again the four books of Kings follow, of which the first and second count one book, and the third and fourth likewise one; next to them the first and second of the Chronicles count also one book; next Esdras first and second also one; after these the book of Psalms, then the Proverbs, next Ecclesiastes, and Canticles; and Job additionally to them; then from the Prophets, the Twelve count one book, then Isaiah, Jeremiah and with it Baruch, Lamentations, Epistle, and after it, Ezekiel and Daniel. And with them the Old Testament is set. As of those in the New it is not boring to say; these, indeed, are: four Gospels, according to Matthew, according to Mark, according to Luke, according to John; after these, apostles’ Acts, and seven Epistles, called generic, as follows: of James one, whilst of Peter two, then three of John, and after these one of Jude; in addition, there are fourteen Epistles of apostle Paul recorded as follows; first to the Romans, then two to the Corinthians, after these to the Galatians, next to the Ephesians, then to the Philippians, and to the Colossians, and after these to the Thessalonians two, and the one to the Hebrews, and right after to Timothy two, and one to Titus, and last the one to Philemon; and another John’s Revelation.
These fountains are of salvation, so that the thirsty might be satisfied by the godly words in them; these alone are evangelizing the teaching of piousness. Let no man add to these, neither let him subtract anything from these. Concerning these, Kyrios [the Lord] put to shame the Sadducees by saying, You are deceived since you do not know the Scriptures; while he urged the Jews, Search the Scriptures, for those are that testify of me.
(I publish this text [TN: in Greek that is] out of 24 ancient manuscripts. see also PG 26,176-180; BSA 33.76-77; The Rudder, 583-5.)
2. The rabbinic catalog of Talmud
Rabbis taught us; the order of the Prophets are; Joshua of Navi, Judges, Samuel, Kings, Jeremiah, Ezekiel, Isaiah, and the Twelve minor Prophets. Let us look at it. Hosea precedes, because it is written; The beginning of the word of the Lord to Hosea (Ho. 1,2). But did God speak first to Hosea? Were there not many prophets between Moses and Hosea? Rabbi Johanan however explained that he was the first of the prophets that were prophesying during that period, and whose names are Hosea, Isaiah, Amos, Micah; hence, souldn’t Hosea precede? Because his Prophecy is ‹in›scribed (=co-registered) together with Haggai Zechariah and Malachi, and Haggai Zechariah and Malachi were recorded in the end of the Prophets and he was listed with them. But why was he ‹in›scribed separately and placed first? Because this book is so small that could be lost. Let us take a look at something else. Isaiah lived before Jeremiah and Ezekiel. Then why Isaiah was non placed first? Because the book of Kings finishes by recounting the disaster, and Jeremiah speaks about the disaster from the beginning to the end, Ezekiel starts from the disaster and finish with consolation, and Isaiah is full of consolation; thus we classify consecutively the disaster after the disaster and the consolation after the consolation.
The order of the Scriptures (Ketuvim = Writings) are; Ruth, the book of Psalms, Job, Proverbs, Ecclesiastes, Canticles, Lamentations, Daniel, and the scroll of Esther, Esdras, and Chronicles. Now, given that Job lived in the times of Moses, shouldn’t the book of Job precede? We do not start by narrating afflictions. Nevertheless even the book of Ruth narrates afflictions; but, as rabbi Johanan said, an affliction with a happy ending. And why is it named after Ruth? Because David came from her, who closes this sacred book, so she might be blessed with hymns and praises.
Who ‹in›scribed the Sacred Scriptures? Moses ‹in›scribed his book and the quotation of Balaam and Job. Joshua of Navi ‹in›scribed the book with his name and eight verses of the Pentateuch. Samuel ‹in›scribed the book with his name and the book of Judges and Ruth. David ‹in›scribed the book of Psalms and included in it the work of his precedents Adam, Melchisedec, Abraham, Moses, Heman, Idithun, Asaf, and of the three sons of Kore. Jeremiah ‹in›scribed the book with his name, the book of the Kings, and Lamentations. Hezekiah and his friends ‹in›scribed the books of Isaiah, Proverbs, Canticles, and Ecclesiastes. The men of the supreme Council ‹in›scribed the books of Ezekiel, the Twelve minor Prophets, Daniel, and the scroll of Esther. Esdras ‹in›scribed the book with his name and the genealogies of the book of the Chronicles up to his time. This is assured by the opinion of the rabbis, because rabbi Jude said on behalf of a rabbi; Esdras did not leave Babylon, to ascend to the land of Israel, until he ‹in›scribed his genealogy. Well who finished it? Nehemiah son of Hacaliah.
Study, Criminal Laws, Last Gate, 14b-15a
(= Talmud (Gemara), Nezikin, Bava Bathra, 14b-15a)
Publications: L. Goldshmidt, Berlin-Wien 1925 (in Hebrew-German). I. Epstein, London (in English).
3. Confession of the protestant church of Zurich of the year 1545; treatise 2
Books of the canonical Scripture
This canonical Scripture is included in the Old and the New Testament. The books of the Old Testament are; of Moses the Pentateuch, the book of Joshua, and Judges, Ruth, two books of Samuel, and of the Kings too, two books also of the Chronicles, and of Esdras and Nehemiah too, the book of Esther. To them we add the book of Job, the Psalms, and the three books of Solomon, that is Proverbs, Ecclesiastes, and Canticles; and Four major Prophets and Twelve minor.
But for those that are counted outside of this Canon, such as Tobias, Judith, and a few others, we think that are not handed down at all, so to have them as of equal authority with those first, neither as of the same respect. However we do not condemn them, either we reject them. Because once they were reading them during gathering at the church, and they are reading them until today. When they are reading them rightly and prudently, they bring their fruit to the church. And even if it seems that they do not agree completely with the previous books, they have to be explained and expounded according to the measure (norma) of them.
And to the New Testament we count the following books. Evangel of Matthew, Mark, Luke, and Acts written by him, and Evangel of John; and fourteen Epistles of Paul, and seven of the other apostles, together with the Apocalypse of Jesus Christ that he gave to the apostle and evangelist John.
Orthodoxa Tigurinae ecclesiae, tract. 2, Tiguri 1545 (church of Zurich).
Cp. Müller E.F.K., Die Bekenntnisschriften der reformirten Kirche, Leipzig 1903, p. 155 (The identical catalog is omitted and replaced with dots).
This canonical Scripture is included in the Old and the New Testament. The books of the Old Testament are; the Pentateuch of Moses ....................................................................
But those that are counted outside of this Canon, such as Tobias, Judith, and a few others, we think that they are not handed down, so to have them as of equal authority with those first or neither as of the same respect. However we do not condemn them either we reject them. Because once they were reading them during gathering at the church, and they are reading them until today. When they are reading them rightly and prudently, they bring their fruit to the church.
4. Papal council of Trent (8 April 1546)
Papal decretum for the canonical Scriptures
published in the fourth session
The holiest ecumenical and general synod of Trent .............................., following the examples of the orthodox fathers, accepts and respects with the same reverence and equal veneration all the books of both the Old and New Testament, since the author of both is the one God, and the traditions as well, that refer inasmuch about faith as to morals, as good as being them taught by Christ himself and either by the Holy Spirit and kept in the catholic church by the continuous succession. And considered proper that it might record the table of the Sacred Books to this decretum, so no one doubts as to which are these that this council accepts. They are therefore those written immediately after.
Of the Old Testament five books of Moses, namely Genesis, Exodus, Leviticus, Numbers, Deuteronomy, Joshua, Judges, Ruth, of Kings four, of Chronicles two, the first of Esdras, and the second called Nehemiah, Tobias, Judith, Esther, Job, David's Psalter with one hundred and fifty psalms, Proverbs, Ecclesiastes, Canticles, Wisdom, Ecclesiastical, Isaiah, Jeremiah along with Baruch, Ezekiel, Daniel; Twelve minor Prophets, ie Hosea, Joel, Amos, Obadiah, Jonah, Micah, Nahum, Habakkuk, Zephaniah, Haggai, Zechariah, Malachi; two of Maccabees, the first and the second.
Of the New Testament, four Evangels, according to Matthew, Mark, Luke, and John, Acts of the Apostles written by the evangelist Luke; fourteen epistles of the blessed apostle Paul, namely to Romans, to Corinthians two, to Galatians, to Ephesians, to Philippians, to Colossians, to Thessalonians two, to Timothy two, to Titus, to Philemon, to Hebrews; of the apostle Peter two, of the apostle John three, of the apostle James one, of the Apostle Jude one, and of apostle’s John the Apocalypse.
Mansi 33, 22
* * *
G. Athanasius, and with him the ancient Orthodox Church, as «Esdras first and second» has in mind the books that occur in printed versions as 2 Esdras and Nehemiah; and as «Epistle of Jeremiah» he intends, as I found out, the text that printed versions purport as Jeremiah chapters 36-38, and which is a freestanding book of prophet Jeremiah, his Epistle, that was embedded later in the position where it is found; he does not mean the Jewish Alexandrian writing of the first century b.C., which is purported as «Epistle of Jeremiah» and it is written first in Greek by an unknown Jew who did not know Hebrew. To this discovery of mine led me on one hand my faith and love of the Bible and on the other my trust on the holy tradition of the church; I mean the holy apostolic and first tradition and not the tradition of the presbyters (Ev.Matt. 15, 1-20), that Kyrios [the Lord] rejects as something that is abhorrent. My grammatical and historical conclusion about the authentic Epistle of Jeremiah, is a conclusion extracted according the way that G. Athanasius and the other ecclesiastical authors were using to extract their conclusions, and not according the jewish protestant and papal jugglery of «critical» and dogmatic evaluations, with which are also drawing their «conclusions», that is parroting for the last 200 years, the «biblical» professors of the theological schools, these fruitless trees
The Jews and the protestants deviate from the ecclesiastical Canon in two books; they do not have Baruch and add Esther. Papists deviate by twelve books; they add the books Tobias, Judith, Esther, Maccabees 1, Maccabees 2, Solomon’s Wisdom, Sirachides’ Wisdom (Ecclesiastical), «Epistle of Jeremiah» (false), which they attach to Baruch, and Sussana, Hymn of the three youths, Bel, and Dragon, which they embed or attach in the authentic book of Daniel.
After 1830, several publishers and marketers of the Bible imposed implicitly to the Orthodox Christian Church, the papal catalog of the Canon for the following reason. After the coming of typography the Orthodox Christian Church does not have its own Old Testament, like the Papists the Protestants the Anglicans and the Jews have, but takes it, as text, from the Protestants and, as book collection, from the Papists. Until 1904 it did not have indeed either its own New Testament, but was taking it from the protestants. In 1904, the modest B. Antoniades published the New Testament Η ΚΑΙΝΗ ΔΙΑΘΗΚΗ of the Orthodox Church out of chosen ancient manuscripts.
Publishers and marketers are promoting the Old Testament into the Church as a selection of books taken from the Papists, but this fact certainly does not mean that this is the Canon of the Church. The Canon of the Church is that which G. Athanasius determined, as commissioner of the First Ecumenical Council, and which the Church had until 1830. And this is what I also mean when I say «Bible». As for the authentic text of the Bible, only the Greek-speaking Orthodox Christians of Greece and Cyprus have it. Papists and Protestants and Anglicans and the non Greek-speaking Orthodoxs have not precisely the Bible, but instead of the Bible they have in the place of the Old Testament the rabbinic fabrication, and for the New Testament a bad translation, the so-called Latin Vulgate, that Jerome made in the 4th century and passed to the five maternal Protestant translations, German French Spanish Italian English in the 16th century, and through them to all the translations of the earth.
In a case like this, Orthodoxy is not judged according to who is holding or not the tradition junk of the presbyters (Ev.Matt. 15, 2-3) in his receptacle, but according to who, holds inside it together with the few or many such junk, the integral invariable and authentic Bible too. Who is that one that, when the junk sweeps away, will stay with the real treasure of Kyrios [the Lord] in hand? That one is from now already an Orthodox; the one who has the Canon of the Bible. The others are as much Christians as the Jews and the Muslims. Criterion of Orthodoxy is the Canon of the Bible.
5. The three catalogs of the Canon in brief
|Christians||Jews – Protestants||Papistics|
|1-2Ch.||Ep.Phil.||1-2Ch.||Ep.Phil.||1-2Ch.||Hymn of youths|
Studies (Μελέτες) 1 (2008) | <urn:uuid:57ea07ef-053c-4c2c-b13a-e5e266a15775> | {
"date": "2020-01-25T17:26:56",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9375226497650146,
"score": 2.859375,
"token_count": 4405,
"url": "http://philologus.gr/4/68-2010-01-01-01-22-30/281-biblical-canon-of-the-orthodox-christian-church"
} |
Description: The blackberry is a perennial plant native to large parts of Europe as well as parts of Asia and Africa. It is a densely growing plant with thorn-ridden stems which make it rather difficult to maneuver through. This species is a wild version of the many domesticated varieties commonly grown for its fruit.
Size:R. plicatus will grow rapidly in its first year after germination, often developing a creeping stem up to 6 - 9 metres in length. During the second year growth slows down as flowers start to form.
A trained and domesticated R.plicatus with a grapevine intermingling.
Conditions: The wild blackberry is an extremely hardy plant, tolerant of very poor soils and therefore often found in abandoned lots and open grassy areas.
Blackberries basking in the sunlight.
Propagation:R. plicatus propagates via seed as well as domestically through grafting.
Detail of flowers.
When to plant: In warm regions this plant can be grown all year around. If you live in a colder climate, planting around mid-spring is recommended. | <urn:uuid:2ecd869c-b142-4376-bd4e-b09e1e7b8e67> | {
"date": "2020-01-25T17:09:57",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9563121795654297,
"score": 3.46875,
"token_count": 230,
"url": "http://plantpedia.com.au/wild-blackberry-rubus-plicatus/"
} |
RTC:Rural’s research on accessible community events has a new focus. Dr. Rayna Sage, RTC:Rural Research Associate, is leading our Participation in Rural Events among Young Adults with Disabilities research project. The study aims to understand how young adults with disabilities in rural communities participate in community events, and how their community participation can enrich their lives and contribute to their communities in meaningful ways.
The accessibility of rural community events is directly tied to participation, and community participation can be tied to the accumulation of social capital. “Social capital is a tradeable resource that exists in a relationship. If you have social capital you can use it to gain other kinds of capital,” said Sage. “It provides opportunities to interact with other people who may have access to resources that you don’t have access to.”
These other kinds of capital could include things like favors, experiences, or a job. Another way to think of it could be as “cashing in” on a friendship or social connection in order to secure some sort of benefit, such as a job at a family friend’s store, or access to a behind-the-scenes space at a public event for someone who needs a place to sit in the shade and rest.
Having social capital could be especially important in rural communities, and could help overcome some of the limitations faced by young adults with disabilities as they transition into adulthood. “It’s a vulnerable period for most people, the transition after high school into whatever they’re going into, but for young adults with disabilities it’s even more critical for them to engage in meaningful activities that are going to enhance their lives,” said Sage.
Sage’s previous work has pointed to how the inequality gap between poor/working class and middle/upper class young adults grows during the period of transition into adulthood, even if they go to college. Now, in this new study, she hopes to see if the social capital in rural communities can help young adults with disabilities compensate for some of the other inequalities and challenges they may be facing. Continue reading | <urn:uuid:03ebc10a-8805-41f9-8277-3c08c0de240e> | {
"date": "2020-01-25T17:48:41",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9621270895004272,
"score": 2.53125,
"token_count": 439,
"url": "http://rtc.ruralinstitute.umt.edu/tag/interviews/"
} |
Let's make a web page. Open HTML-Kit or whatever editor you have and open a new page. Most editors, HTML-Kit included, will provide the code shown in green below. Fill in a title and add some text to the body of the page like so:
<html> <head> <title>Give this page a title</title> </head> <body> Add some text to the body by typing it here. </body> </html>
Save the file in a place you can find it (like in a Development folder or on your Desktop), naming it something you will remember, and adding a ".htm" extension on the end. Find the file and open it.
Many of you are looking at the very first web page you designed. You are now a Webmaster.
For more information on the topics of this Lesson, see this site. | <urn:uuid:3fac2241-982d-46b7-8ff3-62baa0c95b77> | {
"date": "2020-01-25T17:15:45",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8616731762886047,
"score": 2.78125,
"token_count": 182,
"url": "http://sandersongs.com/HTMLcourse/Lesson02A.php"
} |
- Transfer knowledge from international researchers regarding the increased competency in focusing attention, the improved maintenance of emotional balance and the enriched resilience in the face of life’s challenges for children/young people who experience spiritual education.
- Familiarise educators with mediation practice that may provide a simple way to support the development of core emotional and social competencies that underlie successful learning and help students and teachers excel.
- Introduce educators to an expert educator practitioner in the field of contemplative practices for children/young people.
- Explore an inter-spiritual approach to intercultural and interfaith education in a North-South context through situating exchange in shared practices.
- By- providing a two day action-research (AR) workshop on spiritual education. | <urn:uuid:201ca462-b3b3-4a50-b1b4-76a0df4b54e9> | {
"date": "2020-01-25T16:41:27",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8873050212860107,
"score": 2.859375,
"token_count": 154,
"url": "http://scotens.org/spiritual-education-new-challenge-new-opportunity/"
} |
1. Like fingerprints, everyone’s tongue print is different.
2. Most lipstick contains fish scales.
3.The cigarette lighter was invented before the match.
4.Elephants are the only animals that can’t jump.
5.Butterflies taste with their feet.
6.A crocodile cannot stick its tongue out.
7.A snail can sleep for three years.
8.”Stewardesses” is the longest word typed with only the left hand.
9. The name of all the continents end with the same letter that they start with.
10.TYPEWRITER is the longest word that can be made using the letters only on one row of the keyboard.
11. Women blink nearly twice as much as men.
12.“Rhythm” is the longest English word without a vowel.
13.If you sneeze too hard, you can fracture a rib. If you try to suppress a sneeze, you can rupture a blood vessel in your head or neck and die.
14.The “sixth sick sheik’s sixth sheep’s sick” is said to be the toughest tongue twister in the English language.
15.Hot water will turn into ice faster than cold water.
16.The Mona Lisa has no eyebrows.
17.The strongest muscle in the body is the tongue.
18.“I Am” is the shortest complete sentence in the English language.
19.Coca-Cola was originally green.
20.When the moon is directly overhead, you will weigh slightly less.
21.There are only two words in the English language that have all five vowels in order: “abstemious” and “facetious.”
22. Bullet proof vests, fire escapes, windshield wipers and laser printers all have one thing in common. And that is they’re all invented by women.
23.In the last 4000 years, no new animals have been domesticated.
24. Wearing headphones for just an hour will increase the bacteria in your ear by 700 times.
In 2011, a woman named Aimee Davison purchased a ‘non visible’ piece of art for $10,000.
Saddam Hussein was the author of a romantic novel called Zabiba and the King.
Prince Charles & Prince William always travel in separate planes in case there is a crash, one needs to survive.
Cockroaches were there 120 million years before dinosaurs roamed the earth.
As a kid, Adolf Hitler wanted to be a priest.
Worldwide, women earn US$18 trillion but spend US$28 trillion.
Charles Darwin ate almost every animal he discovered.
The weight of all ants combined is almost equal to the weight of all humans combined.
Brad Pitt was banned from entering China for his role in the movie Seven Years in Tibet (1997).
34. The iPhone, the Harry Potter books, and the Rubik’s Cube are the top 3 most sold productsin human history.
Metallica is the first band to have played in all continents.
It takes at least 8 bees their lifetime to create a teaspoon of honey.
In the Philippines, there’s an island with a lake that has an island in it, which has its own lake, which has its own small island in it. It’s called Taal Lake.
The tree where Isaac Newton discovered gravity is still alive and well, outside of his childhood home.
Pizza Hut once made a delivery to the International Space Station in 2001. They paid the Russians $1 million to transport the Pizza.
Google hires a flock of 200 goats regularly to chew away the grass in their lawns rather than using land-mowers.
Iceland kills whales, so anonymous hacker shut down its Government websites. “Whales do not have a voice. We will be a voice for them.” – Anonymous.
There is an area in Canada with less gravity than the rest of the Earth. This is in Hudson Bay area of Canada.
Bill Haast, known as “Snake Man”, was bitten by venomous snakes more than 170 times. By injecting himself with snake venom daily for 60 years, he saved countless lives with his antibody rich blood. He lived up to 100 years.
44. If you somehow found a way to extract all of the gold from the bubbling core of our lovely little planet, you would be able to cover all of the land in a layer of gold up to your knees.
45. In 1386 a pig in France was executed by public hanging for the murder of a child.
46. One in every five adults believe that aliens are hiding in our planet disguised as humans.
47. A single cloud can weigh more than 1 million pounds.
48. James Buchanan, the 15th U.S. president continuously bought slaves with his own money in order to free them.
49. The average person walks the equivalent of three times around the world in a lifetime.
50. A broken clock is right two times every day.
51.Bob Marley’s last words to his son before he died were “Money can’t buy life.”
52.Guinness Book of Records holds the record for being the book most often stolen from Public Libraries.
53.About 150 people per year are killed by coconuts.
54. More people are allergic to cow’s milk than any other food.
55.The toothpaste “Colgate” in Spanish translates to “go hang yourself”.
56. Human thigh bones are stronger than concrete.
57. You breathe on average about 8,409,600 times a year.
58. A waterfall in Hawaii goes up sometimes instead of down.
59. Our eyes are always the same size from birth, but our nose and ears never stop growing.
60. During your lifetime, you will produce enough saliva to fill two swimming pools.
61. You are 1% shorter in the evening than in the morning.
62. You are born with 300 bones, but by the time you are an adult you only have 206.
63. ATM’s were originally thought to be failures, because the only users were prostitutes and gamblers who didn’t want to deal with tellers face to face.
64. Ever wonder where the phrase “It’s raining cats and dogs” comes from? In the 17th century many homeless cats and dogs would drown and float down the streets of England, making it look like it literally rained cats and dogs.
65. Dogs are capable of understanding up to 250 words and gestures and have demonstrated the ability to do simple mathematical calculations.
66. A sheep, a duck and a rooster were the first passengers in a hot air balloon.
67. The founders of Google were willing to sell Google for $1 million to Excite in 1999, but Excite turned them down. Google is now worth $527 Billion.
68. In the past 20 years, scientists have found over 1,000 planets outside of our solar system.
69. There are 60,000 miles of blood vessels in the human body.
70. If a pregnant woman has organ damage, the baby in her womb sends stem cells to help repair the organ.
71. What is called a “French kiss” in the English-speaking world is known as an “English kiss” in France.
72. Russia has a larger surface area than Pluto.
73. There’s an opera house on the U.S.–Canada border where the stage is in one country and half the audience is in another.
74. There are more stars in space than there are grains of sand on every beach in the world.
75. Only one person in two billion will live to be 116 or older.
76. Every year more than 2500 left-handed people are killed from using right-handed products.
77. The tongue of a blue whale weighs more than most elephants!
78. Birds don’t urinate.
Love from Suresh
If you want to communicate with me, please email me at [email protected] | <urn:uuid:b70be88f-2bdc-44e2-8606-c35c4e114b8e> | {
"date": "2020-01-25T18:22:04",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9508872032165527,
"score": 2.578125,
"token_count": 1746,
"url": "http://sureshrai.com/2018/11/20/amazing-facts-collected-by-suresh/"
} |
C Programming Tutorials and FAQs
Beginners Chess Links
Advanced Chess Rule Links
Chess Puzzles Links
Chess Programming Links
... I think I haven't to say anything more about this great site. Go and check it ...
The Official TIGCC Site - another "nothing to say more" link. Every TIGCC programmer should be comfortable with it ;-)
Excellent Resource for everyone who starts learning TIGCC programming ...
HomePage of the famous VTI (TI-Emulator)
TI-89 Hardware Site (ti89hardware.tk)
Olle Hedman's Site which hosts very useful informations about the hardware of the TI-89
Ray Kremer's TI Graphing Calculator FAQ
Homepage of our Calculators Parents
Calcware Online / Check it out
News site for the TI community, gathers information from all major sites
Large TI-related french site and board
Techno-Plaza's TIGCC Programming Lessons
Fine tutorials if you try to start with TIGCC programming
Squale92's TIGCC Tutorials (French ONLY)
A huge collection of TIGCC tutorials (sorrily only available in french) is available somewhere on TI-FR
Programming in C: A Tutorial (Brian W. Kernighan)
The original from one of the creators of C.
C language tutorial
Good generic tutorial including exercises and their answers.
Lessons consist of basic concepts, and advance techniques,the latter of which includes search trees. Sample code helps illustrate the ideas.
C Programming - Steve Holmes
Learn to program in C by reading up on variable types, common operators, and control statements.Sections are organized in outline format.
C Programming for Beginners
Consider this developer's contentions regarding benefits of C,following a brief language history. Basic lesson involves input/output concepts.
Introduction to C Programming - Rob Miles
Lessons designed for first-time programmers include lengthy documentation onbasic types and functions. Memory issues are addressed.
Optimization of Computer Programs in C - Michael E. Lee
Abstract presents reasons why a developer would be concerned with optimization.Content teaches how to fine tune algorithms to save runtime.
Tour of C Programming
Start programming with instructions on invoking math operations, loops, and case statements.Overview of compilers provides some personal advice.
Tutorial on Pointers and Arrays in C - Ted Jensen
Concepts allowing memory storage and retrieval in C, for input processing, are revealed in theseexercises. Read about dynamic allocation issues.
Comp.Lang.C Answers to Frequently Asked Questions
Compiled between 1990 and 1996, this resource provides information on pointers, arrays,and the "stdio" class. 20 sections are listed by topic.
Most frequently asked questions posted to the comp.lang.c newsgroup, withlinks for faster access to your area of interest.
The Basics of Chess: Beginners
Step by step introduction to the game for absolute beginners.
Beginner's Chess Page: Rules
Summary of the rules. Explains why experienced players don't holler out "check!".
Chatty tutorials start with how to set up the board, and move on from there.
Chess For Kids: How to Play
Nicely done set of tutorials teaching the moves and board setup.
Chess is Fun!
Explains the moves, and then as a nice touch shows a complete game on a board that makes the moves automatically.
Rules and movement of the pieces explained in a manner suitable for children. Also offers a freeware chess program called Chess Rules.
Lets Play Chess
Simple, well-done tutorial from the folks that ought to know the rules, because they write them: the U.S. Chess Federation!
By Geurt Gijssen, arbiter for world championship matches and other high-level events. All manner of rules questions addressed every month.
The Official FIDE Handbook
The Standard! Nothing to say more ...
USCF Clock Rules
Everything you ever wanted to know but were afraid to ask about the USCF's new clock rules.
Basics of Chess
Collection of 25 "intermediate" positions.
Chess Puzzle Archive
Amazing! If you were to solve one puzzle a day from this fantastic site, you'd still be going strong 10 years from now.
Chesscafe Endgame Studies
There's a new endgame for you to ponder every week at the Chesscafe. Roll up your sleeves; these can be tough.
Chess Coaching Online: Puzzles
Weekly puzzle that asks you to assess if the position is better for white, better for black, or equal.
Chess Tactics Tester
Positions to build your tactical muscle.
Monthly competition where you are asked to solve tactical puzzles and questions on chess history.
Chesty's Chess Puzzles
Modest collection (17 at last viewing) of sacrifice combinations.
Endgame of the Day
Seems to have stopped a few months ago, but there is still plenty of material in the archives.
Huntsville Chess Club Fools Problems
A handful of fun puzzles.
Good collection of puzzles organized by level of difficulty.
Manolis Strataki's Chess Problems Page
Plenty of fun stuff here. Composed problems, mate in x positions, openings and endings. See if you can find mate in 127 moves!
1001 Brilliant Ways to Checkmate
The first 24 positions from Reinfeld's classic book, but no answers. Also a file you can download with all 1001 problems in PGN format.
1001 Winning Chess Sacrifices
Same as above: some positions from the Reinfeld book of the same name (no answers provided) and a PGN file to download.
365 Chess Lessons
In theory a coaching page, but mostly a collection of problems organized by level of difficulty.
The Anatomy of Chess Programs
Computer Chess Programming
Chess Programming From the Ground Up
An introduction to the MTD(f) minimax algorithm | <urn:uuid:097c97b0-1e4b-421f-881c-13997194e93d> | {
"date": "2020-01-25T17:22:48",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8471282720565796,
"score": 2.6875,
"token_count": 1254,
"url": "http://tict.ticalc.org/links.html"
} |
A range of assessments including both formative and assumptive forms of assessment are employed to gauge the understanding of the students throughout the year. Assessment Types will include Unit Tests, Written Examinations at Mid and Annual Terms.
Unit Test will comprise of evaluation of student understanding of each unit completed in classroom. It helps identify areas of learning that needs development and works as a feedback tool to support learning. Unit Tests will be short and conducted within classroom during Students must be informed of Unit Test in the previous class.
Mid Term & Annual Assessments
As the school year is split into Two (2) academic terms, Mid Term and Annual. In-Term assessments are conducted to accumulate data and reports on individual student learning and development. Assessments are conducted from Play Group to Class 10. Class 10 students are additionally assessed externally when they register for their Pearson International and Cambridge Assessment International Education (CAIE) O’ Level Examination. | <urn:uuid:cf9a9b2c-e408-4a70-a62c-db82f60fd047> | {
"date": "2020-01-25T18:24:43",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9606450796127319,
"score": 3.25,
"token_count": 189,
"url": "http://wheaton-bd.com/information/exam-assess-schedule/"
} |
The History of Snoring
Snoring is a defence mechanism. It seeks to drive someone or something away. Why should it so often drive away the one a man has at his side? To answer this question we need to go a very long time back in history, at least 5,250 years and, perhaps much, much further!
That something has been in a particular state or form for many thousands of years does not mean that it must for all eternity remain so. Indeed, this is a time in which biologists are seeing great changes in the behaviour of many life forms. Humanity is no exception.
If you are reading this now, you have survived the last period of the patriarchy. The dinosaur is not yet quite dead and can still give a lethal swipe with its tail but the age of materialism is over.
In order that we could experience the patriarchy, a change to the natural order was required.
A true meeting of souls whereby the man and the woman grow completely open one to the other will, naturally, bring up his deep sense of grief for all that man has done to woman over the millennia. His deep seated insecurity because she, as the guiding and nurturing force has been missing throughout this age comes to the fore. When his conscious mind which constantly seeks to manufacture justifications for what he has done goes away then he lays there bare and open to her hand.
As a last resort to save himself from the “damnation” of being denied her love and nurture his unconscious body generates a horrible noise to drive her away.
A Sexual Digression
Digressing here slightly, sexual problems such as impotence and premature ejaculation also stem from this. It is her loathing from centuries of being used and abused which can engender the former and his fear of being rejected which causes the latter. | <urn:uuid:82028b8e-ee7e-4e1f-8366-a12c9c5e1545> | {
"date": "2020-01-25T18:16:17",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9790897369384766,
"score": 2.84375,
"token_count": 371,
"url": "http://whymensnore.com/the-history-of-snoring/"
} |
By Bernt Aardal and Johannes Bergh.
Although the Storting election of 11 September 2017 reduced the number of seats backing the incumbent conservative government, it still gave the two governing parties and their supporting centre-right parties a parliamentary majority. Thus, Prime Minister Solberg’s premiership will continue after the election. In the previous period, the government could secure a parliamentary majority with either of the two centrist parties; the Liberal Party or the Christian Democrats. After the 2017 election, they will need the support of both parties to secure a majority, unless they can get help from one or more of the centre-left opposition parties. When Solberg formed her government back in 2013, the populist right-wing Progress Party entered government for the first time. Even Progress Party leaders feared that they would lose support from anti-establishment voters. Poor turnout at the 2015 local election did not bode well.1 However, the Progress Party did far better in the 2017 national elections and lost only 1.1 percentage points and two seats compared with the 2013 election. A major success factor for the Progress Party was the attention given to immigration issues during the election campaign (see below). At the previous election, in 2013, the Green Party won a seat for the first time, increasing the number of parties in parliament from seven to eight.2 In 2017, the far-left Red Party increased the number of parties from eight to nine.3 Despite the re-election of the incumbent government, the election signalled a shift to the left, even to the left of the Labour Party. (West European Politics, vol.4, No. 5: 1208-1216) | <urn:uuid:eeec3bb8-48d3-480d-a152-d8f2ec3bec93> | {
"date": "2020-01-25T18:28:45",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9574165940284729,
"score": 2.6875,
"token_count": 337,
"url": "http://www.aardal.info/the-2017-norwegian-election-bernt-aardal-johannes-bergh/"
} |
The unique white and black markings on the Bald-Faced Hornet’s head makes this half-inch long bee easy to identify. They are also known as the bald hornet, the white-faced hornet, white-tailed hornet and bull wasp. Despite their name, they are actually a wasp as opposed to a true hornet. They have some of the largest colonies in the bee world, typically between 400-700 workers. They are known for the large gray paper nests they build. Bald-faced hornets are very aggressive year-round and are found in all 50 states.
Bald-faced hornets build large, gray, football-shaped nests the consistency of paper. They start building this nest in the spring, and as the year progresses, both their colony and their nest continue to grow. By fall, the population is at an all-time high and the bees are at their most aggressive. These bees eat nectar, sweet things such as fruit, and have even been noticed eating meat.
These bees build a large paper nest typically 3 or more feet off the ground in trees or under eaves. Their nest building begins in the spring with the first line of workers, and continues to grow throughout the year.
Watch out if you spot a bald-faced hornet’s nest. They are some of the most aggressive bees and are known to sting their victims over and over if they feel threatened. Keep well away from a nest site, especially in fall when the bees are at their most combative.
It is difficult to prevent bald faced hornets from nesting if you have a nice site, but if you notice a nest on your home or property, do not attempt to remove it on your own. These bees are very aggressive when their nest is disturbed, and touching it could cause them to attack. Contact Us and we'll have our professional technicians take care of you right away.
- Stinging & Biting-General
- Africanized ("Killer") Bees
- Bumble Bees
- Carpenter Bees
- The Household Guide to Stinging Insects | <urn:uuid:7b2e9950-7f7d-445c-8e3a-1b0700e02376> | {
"date": "2020-01-25T18:37:50",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9725891947746277,
"score": 3.15625,
"token_count": 430,
"url": "http://www.acewalco.com/index.php/stinging-a-biting-general/90-bald-faced-hornets"
} |
Click on the structure to specify the target of your label
Erector spinae muscles
Other Terms: Erector spinae, Musculus erector spinae, Muscle érecteur du rachis
The erector spinae muscles are the second layer of intrinsic, or “true,” back muscles and like their more superficial counterparts, the splenius muscles, their muscle fibers span many vertebral levels. Unlike the splenius muscles, the erector spinae muscle group spans the entire length of the vertebral column. Beginning on the posterior surface of the sacrum, the muscle group terminates on the back of the cranium. The erector spinae is divided into three parts, which from medial to lateral are the spinalis muscle, the longissimus muscle, and the iliocostalis muscle. This strong group of epaxial muscles consists of muscle fibers that course vertically and somewhat laterally as they cross multiple vertebral levels. They function as primary extensors of the vertebral column and are key postural muscles for the maintenance of the upright bipedal posture. Like all epaxial muscles, they are innervated by the posterior (dorsal) ramus of the spinal nerves.
Musculus erector spinae
Muscle érecteur du rachis | <urn:uuid:7649a342-dd73-4d00-8a23-12fefa1b0d48> | {
"date": "2020-01-25T17:07:42",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7771325707435608,
"score": 2.890625,
"token_count": 279,
"url": "http://www.anatomyexpert.com/app/structure/5111/1619/"
} |
G. Vidotto, A. Bastianelli, A. Spoto, E. Torre, F. Sergeys
Since a great many teenagers are involved in road accident every year, the acquisition of much experience is a crucial factor in driver education and training. The ability to identify potentially dangerous traffic situations is termed as hazard perception. Previous studies showed that hazard perception training in novice drivers leads to improved performance on hazard perception tests. Hazard perception training is particularly relevant for riders, as motorcyclists are not protected by a vehicle body so the ability to perceive and respond to hazards posed by other vehicles is crucially important. This study is aimed to find out whether a rider simulator (Honda Riding Trainer, HRT) could improve the hazard perception in teenagers. The experimental procedure involves a pre/post randomized experimental design with an experimental group and a control group. Results show a clearly visible learning process and improvement in participants’ performance, regardless of the order in which the riding tracks are presented. HRT trainees improve their performance in avoiding accidents in a simulated environment significantly more than participants of the control group.
Keywords: hazard perception; riding simulator; road safety; training | <urn:uuid:88a0c11c-31a8-4452-9c55-f0a2c7d56b4b> | {
"date": "2020-01-25T18:47:37",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9311443567276001,
"score": 3.09375,
"token_count": 237,
"url": "http://www.atsinternationaljournal.com/index.php/2008-issues/xvi-november-2008/426-using-a-riding-trainer-as-a-tool-to-improve-hazard-perception-and-awareness-in-teenagers"
} |
During the first half of the nineteenth century, biologists had come to understand that animal species had changed through time, a process that offered archaeologists interesting parallels for the changes they could observe in human technology and society. The concept was given an enormous public boost by the publication of Charles Darwin’s On the Origin of Species in 1859.
The concept of evolution
During the late eighteenth and early nineteenth centuries, biologists had started to classify the natural world, grouping plants and animals in species, genera, phyla, orders and so on. Their classificatory schemes were based on similarities and differences. Naturalists were beginning to speculate that closely similar species must be closely related and that the differences between them had arisen over time, much as farmers and animal breeders can change the characteristics of their livestock. By the middle of the century, most educated people recognised that numerous animal and plant species were somehow related to each other and that fossils showed that species had changed through time. The concept of evolution was already part of the world view of many people, but there was no explanation for how these changes might have occurred.
Then, Charles Darwin (1809-1882) was persuaded to publish his hypothesis about natural selection in On the Origin of Species by means of Natural Selection in 1859 (although it was another twelve years before he felt confident enough to include humanity in his hypothesis). His principal contribution was to suggest a mechanism that would account for biological change over time: those members of a population best adapted to their surroundings would have a reproductive advantage over others and would thus increase in numbers at the expense of those others. In time, small changes in the characteristics of these living things would change the population from one species to another.
Just as biologists were trying to classify the natural world, archaeologists also began to develop classificatory schemes (such as Thomsen’s Museum-Ordning). Like the biologists, archaeologists classified artefacts according to their similarities and differences, leading to the development of the technique of typology, a means of classifying artefacts and placing them in a developmental sequence. The increasing emphasis on understanding artefactual style and how it had changed through time paralleled the evolutionary theory being applied to the natural world. Archaeologists began to recognise similar patterns in the artefacts they recovered from the ground: styles changed with time, often moving from simple to complex forms, such as flat axes in the Early Bronze Age to socketed axes by the Late Bronze Age. Observations like these fitted in with the development of ideas about biological evolution, which – at a broad level – seemed to show how simple organisms developed over time into complex organisms, with humanity as the pinnacle of evolutionary development. | <urn:uuid:d7528ded-ed55-4b7c-a6a9-5a7f6034e452> | {
"date": "2020-01-25T18:04:10",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9796014428138733,
"score": 4.21875,
"token_count": 543,
"url": "http://www.badarchaeology.com/the-history-of-archaeology/evolving-concepts/"
} |
On the edges of Camulodunum; ancient Colchester, there once stood an Iron Age defence system – part of a greater one spanning the circumference of the town. This is now roughly where Lexden is. Earthern ramparts defending the west side of Camulodunum were built roughly between 25 and 1 BC, and still remain today at Bluebottle Grove. The site today is signposted by English Heritage. Although there isn’t much to see at first in this unsuspecting patch of woodland, clear ditches and earthern wall-like mounds can be made out with a little imagination. These are indeed the remains of the ramparts, and they are among the few surviving Iron Age defences remaining in Britain. The outermost rampart is the most visible today; Gryme’s Dyke, and stretched between the River Colne and the Roman River. It appears first as a hedge south of the London Road, and then as a visible bank with a significant ditch on its west side. Christian locals in the post-Roman or Medieval era referred to the dyke as ‘Gryme’s’ because this was a name for the Devil, and they did not know who built these ditches and when; accounting it to either a pagan or supernatural force. To the east of Gryme’s Dyke lies Triple Dyke; part of an earlier defence system extending south to Bluebottle Grove. Numerous important archeological finds have been uncovered in the area. Nearby is the Lexden Tumulus; the largest of several burial mounds for the deceased leaders of Camulodunum. It is supposed to contain the grave of Cunobelinus or Cymbeline, and can be seen at Fitzwalter Road today. Further away lies a large gravel pit called ‘King Coel’s Kitchen’, and this was probably part of a crossing system over the dykes where roads to Cambridge and London converged.
The graphics below were produced by Sir William Stukeley in the mid-18th Century. In 1759 he believed he had found the sites of an ancient amphitheatre and circus, which are now known to instead be the defence system described. The circus would be discovered only in 2004 much further away.
Sources: Historic England & English Heritage, The Megalithic Portal, Stukeley images from The Colchester Archaeologist (https://www.thecolchesterarchaeologist.co.uk/?p=32529) | <urn:uuid:2f4ce439-76ce-48b0-87cb-5d7fe8624cfd> | {
"date": "2020-01-25T17:49:00",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9621339440345764,
"score": 3.234375,
"token_count": 518,
"url": "http://www.beyondthepoint.co.uk/property/lexden-iron-age-earthworks/"
} |
NANJING, China -- Chinese archaeologists on Wednesday opened a 1,000-year-old steel case that was believed to contain Buddhist relics.
<< Chinese archaeologists on Wednesday opened a 1,000-year-old steel case that was believed to contain Buddhist relics. (Source: cnsphoto)
A pagoda top wrapped in silk emerged after archaeologists removed two steel panels of the cube-shaped case, which is 0.5 meter long, 0.5 meter wide and 1.34 meters high.
Hua Guorong, vice curator of the Nanjing City Museum where the case was opened, said an initial analysis showed the object was a pagoda about 1 meter high.
He said Buddhist relics, which were formed from the ashes of cremated Buddhist masters and were an important aspect of the religion, were likely to be under the pagoda.
The box was found in an underground shrine of the Dabaoen Temple here. | <urn:uuid:37d17777-a6e3-424a-9bb5-5e629f2f950e> | {
"date": "2020-01-25T16:45:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.980681836605072,
"score": 2.90625,
"token_count": 194,
"url": "http://www.buddhistchannel.tv/index.php?id=46,6937,0,0,1,0"
} |
The "Pirate Coast," including Geriah, in a map from 1785
Source: ebay, Sept. 2005
"From AN ACCURATE MAP OF HINDOSTAN OR INDIA, engraved by Thomas Kitchin, published by C. Dilly & G. Robinson, London, 1785. The map is from 'The Atlas to Guthrie's System of Geography'."
A British-Portuguese-Indian naval force attacks the fort of Geriah, 1756
Source: ebay, Jan. 2004
"Hand-colored engraving: Geriah Fort, India. Published circa 1760. The scene depicted is that of the British-commanded Indo-Portuguese naval force which attacked the base of the Maratha pirate Tulagee Angria on the 13th of February 1756. The British Admirals Pocock and Watson with their Indo-Portuguese manned naval force (the first time such a mixed force had been used in a military situation) were attempting to suppress Tulagee Angria who had been attacking Portuguese and English shipping."
"A view of Geriah as it was taken by the British fleet under the command of the Admirals Watson and Pocock 13 February 1756," by M. Hore and W. Tringham
(downloaded June 2006)
A closer look at the attack in progress: "from the logbook of the H.M.S. Elizabeth, 1759"
(downloaded Oct. 2005)
"A plan of the town and fortress of Gariah, belonging to Angria the Admiral to the Sahou Rajah on the Coast of Mallabar," from 'The Gentleman's Magazine: or, monthly intelligencer' by Sylvanus Urban, published by Edward Cave, London, 1756; *a closeup of the fort itself*; *a closeup of the key*
Source: ebay, Apr. 2007
== Indian Routes index == Indian Routes sitemap == Glossary == FWP's main page == | <urn:uuid:5e1d1383-089c-4b93-898c-9616cfec882c> | {
"date": "2020-01-25T17:05:07",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.93851238489151,
"score": 2.6875,
"token_count": 422,
"url": "http://www.columbia.edu/itc/mealac/pritchett/00routesdata/1700_1799/malabar/geriah/geriah.html"
} |
What is VAT?
The following excerpt is from the SARS website:
Value-Added Tax is commonly known as VAT. VAT is an indirect tax on the consumption of goods and services in the economy. Revenue is raised for government by requiring certain businesses to register and to charge VAT on the taxable supplies of goods and services. These businesses become vendors that act as the agent for government in collecting the VAT.
VAT is charged at each stage of the production and distribution process and it is proportional to the price charged for the goods and services.
VAT is presently levied at the standard rate of 14% on the supply of most goods and services and on the importation of goods. The VAT on the importation of goods is collected by customs. There is a limited range of goods and services which are subject to VAT at the zero rate or are exempt from VAT.
Who should register for VAT?
Any person that carries on a business may register for VAT. The term person is not only limited to companies but also includes, amongst others, individuals, partnerships, trust funds, foreign donor funded projects and municipalities. In order to register, an application form must be completed and a specific process must be followed, both of which you can find on our page how to register for VAT.
It is mandatory for a person to register for VAT if the taxable supplies made or to be made is, in excess of R1 million in any consecutive twelve month period.
A person may also choose to register voluntarily if the taxable supplies made, in the past period of twelve months, exceeded R50 000. As from the 1st of March 2012, qualifying micro businesses that are registered for Turnover Tax may also choose to register for VAT provided that all the conditions for voluntarily registration for VAT are met.
A person who is obliged to register for VAT is referred to as a vendor.
When should I submit returns and make payments?
A vendor is required to submit VAT returns and make payments of the VAT liabilities (or claim a VAT refund) in accordance with the tax periodallocated to the vendor. The VAT returns and payments are normally submitted / made on or before the 25th day after the end of the tax period. Late payments of VAT will attract a penalty and interest.
|Payment method||Return due date||Payment due date|
|SARS branch (Cheques only, not exceeding R50 000)||25th||25th|
|Payments at ABSA, Albaraka Bank Limited, Bank of Athens, FNB,
HBZ Bank LTD, Nedbank and Standard Bank.
|Electronic Fund Transfers (including internet banking)||25th||25th|
|eFiling of return and payment via either SARS eFiling or Electronic Funds Transfers (internet banking)||Last business day||Last business day|
Top Tip: On 19 October 2012, SARS clarified in a notice that vendors who use eFiling may continue to submit their VAT declarations on the 25th of the month. The benefit of no interest, penalties or prosecution will remain effective if the declaration and payment are submitted via eFiling (or EFT) on or before the last business day of the month.
How do I access older VAT-related documents?
The SARS website does not host old or withdrawn documents, except for those owned by Legal & Policy, for example earlier published Proclamations, Regulations and Government Notices, as well as the archived VATNews copies.
The VATNews copies can be found in the Legal & Policy Archive, which has been made available for research and reference purposes. | <urn:uuid:189396b7-4d79-4cc1-bfbf-ae15968aaefb> | {
"date": "2020-01-25T17:22:26",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9513005018234253,
"score": 2.53125,
"token_count": 745,
"url": "http://www.dehoogeaccountants.co.za/what-is-vat/"
} |
To achieve your dental healthy goals, you need to follow a few recommendations. You should done it from the beginning of your day until you lie down, and you will see changes day by day and health of your teeth will improve noticeably.
Brush Better: According to dentistry experts, keeping your teeth clean is one of the most important parts of good dental care. Try to brush at least twice a day, preferably after meals. Be sure to clean both the outer and inner surfaces of your teeth and use a gentle touch to avoid damaging your tooth enamel and gums.
- Floss Frequently: Flossing remove the food and plaque trapped between your teeth and reach into places that toothbrushes can’t. Dental clinic professionals advise flossing at least once a day to protect your teeth from decay.
- Treat Tooth Problems Immediately: If you suffer pain in your teeth or jaw, you must make an appointment with a dentistry clinic as soon as possible. Only an affordable dentist can determine the origin of the problem and prevent it from causing further damage.
- Smoke, Avoid Tobacco: Smoking is very bad for your health and just as dangerous for your dental health. If you smoke, you may developed major dental care problems like oral cancer and periodontal complications. Ask your affordable dentist for advice on how to quit it.
Visit a Dental Clinic Regularly: You should see an affordable dentist at least twice a year to protect your dental health. While at-home dental care is important, you also need professional check-ups and cleanings from a dental clinic to detect and treat any problems | <urn:uuid:d0f00f0a-44e8-4dcf-961a-88322da7449f> | {
"date": "2020-01-25T18:36:08",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9374549388885498,
"score": 2.921875,
"token_count": 329,
"url": "http://www.hallmarkdentalclinic.com/perfect-smiles-are-easy-if-you-wish-it/"
} |
Even 8 years ago it was the fight that whether the Unix (Lets include Linux also here) or Windows is better operating system. Russinovich wrote in his article that the OS is all about the application availability, initial cost, cost of support and maintenance, compatibility with existing infrastructure, and ease of use. The things are clear now still today the windows has more than 60% of market penetration and now when Windows Vista has come into the market with better security and look & feel, there is no way that the *nix OS will come into the market in next 10 years.
I like to quote these two paragraph in this post which was written in the article…do not miss these
A major difference between UNIX's and NT's: architecture is that UNIX does not
incorporate its windowing system--the subsystem that manages GUI resources for
applications--into kernel mode, as does NT 4.0. Instead, the UNIX windowing
system is an add-on user-mode application that its developers wrote using
publicly defined UNIX APIs; consequently, third-party products can replace
UNIX's windowing system. However, the majority of the UNIX community has adopted
MIT's X-Windows as a de facto, if not official, graphical interface standard.
Before NT 4.0, the NT windowing system was a user-mode implementation, but
Microsoft found that the performance of graphics-intensive applications improved
when the windowing system operated in kernel mode.
Namespace and object management:In the NT object model, device drivers can easily implement
objects in the namespace that represent nonstandard resources. For example, a
device driver can create an object called \Proc that, after an application reads
it, returns information about the active processes in the system. | <urn:uuid:a447bd6a-341e-4ff8-9bec-eee09c5a19c9> | {
"date": "2020-01-25T18:53:20",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9387326240539551,
"score": 2.84375,
"token_count": 374,
"url": "http://www.markandey.com/2007/03/"
} |
In Good Company: Famous People Born Prematurely
When your child is born premature, it’s normal to feel isolated – like you’re the only one going through the emotional rollercoaster of the NICU.
But you are not alone, and neither is your little one. Every year, about 1 in 10 babies born in the United States is born prematurely. And while any baby born prematurely is more at risk than their full-term counterparts for illnesses and complications, many preemies go on to live healthy, long, and successful lives.
Don’t believe us? Check out this list of famous preemies and you’ll find that your little one is in pretty good company!
Born prematurely in 1879 when neonatology was basically nonexistent, Albert Einstein went on to become one of the most influential scientists and mathematicians of the 20Century.
The naturalist and geologist credited with developing the theory of evolution was born prematurely in 1809.
Born 2 months early in 1835, American novelist Samuel Clemens – better known as Mark Twain – went on to publish what is now referred to as the great American novel: Adventures of Huckleberry Finn.
Born weighing just 3 pounds in 1642, Isaac Newton not only outlived expectation – he went on to become one of the most influential scientists of all time for discovering gravity and the laws of motion.
This world-famous ballerina was born prematurely in 1885. It’s theorized that her small size, likely a result of her premature birth, set her apart from other ballerinas of her time.
The child prodigy and iconic artist was born six weeks premature in 1950. Stevie Wonder is blind due to retinopathy of prematurity (ROP), a complication caused by underdeveloped vessels on a premature baby’s retinas. However, being blind hasn’t held him back; Stevie Wonder has more than 30 top 10 hits and 22 Grammy awards.
The list goes on, and includes British and world leader Sir Winston Churchill, poet John Keats, painter Pablo Picasso, astronomer and mathematician Johannes Kepler, Academy Award Winner Sir Sidney Poitier, and so many more. | <urn:uuid:6ae1e34c-1956-4003-8c95-fc4cbddbb388> | {
"date": "2020-01-25T17:07:10",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9629924893379211,
"score": 2.71875,
"token_count": 456,
"url": "http://www.medelabreastfeedingus.com/article/117/Famous%20People%20Born%20Prematurely"
} |
In order to create a weld or solder joint, various approaches can be used.
The most versatile but low volume method is the single point attachment. Either the focusing optics or the device are moved perpendicular to the incident beam to reach the respective position.
This method is well suited for process development and feasibility.
For the welding joint, large energy and a short time interval of several milliseconds are required. Therefore, XY scanners offer a possibility to deviate the beam fast from one position to the other. A working area of 50 mm to 1mm edge length can be realized.
Multiple Beam Optics are of advantage when various spots have to be repeatedly set in a fixed geometry. This method avoids tombstone effects in welding or soldering joints. This happens for a single beam, when one side of the component is attached and starts tilting.
For soldering procedures, the process times can be cut tremendously. The soldering takes at least a second to melt the solder material evenly and the power level is substantially lower compared to welding. This means that the beam can be split into various spots.
The Multi Beam Optics used by nanosystec split the beam into various spots which can have different energy distribution in order to adapt it perfectly to the requirements of the device. This method ist the superior choice for high-volume selective laser soldering. | <urn:uuid:bb58b15b-0a7c-440d-8f37-0ed36cc59cec> | {
"date": "2020-01-25T16:45:04",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9271129369735718,
"score": 2.578125,
"token_count": 275,
"url": "http://www.nanosystec.com/index.php/en/technology/item/multiple-beam-optics"
} |
The Array is a data structure, which can store a fixed-size sequential
collection of elements. Every Array has an ID which is clearly identify that
array and it has undeterminded number of string items.
<Array> command example usage:
It's really practical when you would like to collect all of your information
about the incoming new and old messages.
string value, e.g. sampleArray
This ID will clearly identify the array and you can reach this array with this ID.
OzML simple example:
The ID of this array is „sampleArray”. For example if you would like to reach
that array to iterate it with ForEach loop, the source of the ForEach will be
that ID. And the Array has two items: the Hello and the Welcome.
And you can iterate this array with the ForEach loop. | <urn:uuid:abe3dd30-1194-44c8-96c3-a364a767b694> | {
"date": "2020-01-25T16:27:08",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7379328012466431,
"score": 2.84375,
"token_count": 183,
"url": "http://www.ozekiphone.com/voip-ozml-array-command-1404.html"
} |
Latin name: Brassica oleracea var. botrytis
Common names: Cauliflower, Broccoflower, Calabrese, Romanesco
Cauliflower, a cultivar of wild cabbage, is a plant of the Cabbage family, Brassicaceae (formerly Cruciferae). Wild cabbage/wild mustard originated along the northern and western coasts of the Mediterranean. This plant was domesticated and eventually bred into widely varying forms, including Cauliflower, Broccoli, Cabbage, kale, kohlrabi, and Brussels sprouts, all of which remain the same species (1).
Cauliflower is a cool-season annual, coming in white (the most popular and readily available), lime-green and purple varieties. On clusters of stalks are thousands of aborted, malformed flower buds. The entire floret portion (called the “curd”) is edible. The green leaves at the base are also edible.
Cauliflower plants are limited to cultivated beds. The florets can be eaten raw or cooked in a number of ways, including boiling, baking and sautéing. They often appear in soups, or as a side dish smothered with a cheese sauce, or served raw on a crudité platter. Cauliflower is high in vitamin C and is a fairly good source of iron.
Cauliflower (and other members of the genus Brassica) contain very high levels of antioxidant and anticancer compounds. Vitamins and nutrients typically are more concentrated in flower buds than in leaves, and that makes Cauliflower a better source of vitamins and nutrients than Brassica crops in which only the leaves are eaten. Other research has suggested that the compounds in Cauliflower and other Brassicae can protect the eyes against macular degeneration, the leading cause of blindness in older people.
Sulphurous compounds can emit unpleasant smells during cooking, and can result in tainted flavour. Cauliflower is also said to cause flatulence.
No allergens from this plant have yet been characterised.
In the evaluation of a 70 year-old man who had experienced an IgE-mediated anaphylactic reaction to Cauliflower, immunoblotting with Cauliflower extract showed several IgE-binding components with molecular masses ranging between 30 and 45 kDa (2).
A lipid transfer protein (LTP) has been isolated from a close family member, Broccoli, suggesting that Cauliflower may contain an LTP. This has not been demonstrated to date (3-4).
An extensive cross-reactivity among the different individual species of the genus could be expected, as well as to a certain degree among members of the family Brassicaceae, such as Broccoli, Cauliflower, Brussels sprouts and Cabbage (5). This has been supported by a study that reported cross-reactivity among Cabbage, Broccoli, Cauliflower, Mustard, Rape and Turnip (6). Ortolani et al. disagree and state that cross-reactivity among Brassicaceae species is rare (7).
Cross-reactivity between Cauliflower and other plants containing LTP is possible.
Clinical ExperienceIgE-mediated reactions
Anecdotal evidence suggests that Cauliflower can uncommonly induce symptoms of food allergy in sensitised individuals; however, few studies have been reported to date (2).
A 70-year-old man suffered acute oropharyngeal itching, facial and hand swelling, dyspnoea and severe bronchospasm within a few minutes after eating vegetable paella containing Cauliflower. A strong SPT response was obtained with Cauliflower and Peach LTPs. IgE antibody determinations were positive for Cabbage (0.79 kUA/l), Cauliflower (0.49 kUA/l) and Apple (1.54 kUA/l), and negative for Mustard. Laboratory analysis of the patient’s serum with Cauliflower extract showed several IgE-binding components. The authors concluded that the patient experienced an IgE-mediated anaphylactic reaction to Cauliflower (2).
An Indian study evaluated the effect of a specific elimination diet on symptoms of 24 children aged 3 to 15 years with documented deterioration in control of their perennial asthma. IgE antibody analysis for a range of food items found that 19 children (79%) had IgE antibodies directed at Cauliflower (8).Other reactions
Maternal intake of Cabbage, Cauliflower, Broccoli, Cow’s milk, Onion, and chocolate were significantly related to colic symptoms in exclusively breast-fed infants (9).
Compiled by Dr Harris Steinman, [email protected]
Wikipedia contributors, ”Broccoli,” Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/w/index.php?title=Broccoli&oldid=236472388 (accessed September 8, 2008)
Hernandez E, Quirce S, Villalba M, Cuesta J, Sastre J. Anaphylaxis caused by cauliflower.
J Investig Allergol Clin Immunol 2005;15(2):158-9
Asero R, Mistrello G, Roncarolo D, Amato S, van Ree R. A case of allergy to beer showing cross-reactivity between lipid transfer proteins. Ann Allergy Asthma Immunol 2001;87(1):65-7
Asero R, Mistrello G, Roncarolo D, de Vries SC, Gautier MF, Ciurana CL, Verbeek E, Mohammadi T, Knul-Brettlova V, Akkerdaas JH,
et al. Lipid transfer protein: a pan-allergen in plant-derived foods that is highly resistant to pepsin digestion.
Int Arch Allergy Immunol 2000;122(1):20-32
Yman L. Botanical relations and immunological cross-reactions in pollen allergy. 2nd ed. Pharmacia Diagnostics AB. Uppsala. Sweden. 1982: ISBN 91-970475-09
Blaiss MS, McCants M, Lehrer S. Anaphylaxis to cabbage: detection of allergens.
Ann Allergy 1987;58:248-50
Ortolani C, Ispano M, Ansaloni R, Rotondo F, Incorvaia C, Pastorello EA Diagnostic problems due to cross-reactions in food allergy.
Allergy 1998;53:(Suppl 46):58-61
Agarkhedkar SR, Bapat HB, Bapat BN. Avoidance of food allergens in childhood asthma. Indian Pediatr. 2005; 42(4):362-6
Lust KD, Brown JE, et al. Maternal intake of cruciferous vegetables and other foods and colic symptoms in exclusively breast-fed infants. J Am Diet Assoc 1996;96(1):46-8 | <urn:uuid:b929a2ca-fd45-4968-a9a8-938a574c38fd> | {
"date": "2020-01-25T18:18:06",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8892228603363037,
"score": 3.203125,
"token_count": 1471,
"url": "http://www.phadia.com/es/5/Productos/ImmunoCAP-Allergens/Food-of-Plant-Origin/Vegetables/Cauliflower-/"
} |
Subsets and Splits