text
stringlengths
205
677k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
15
2.02k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
47
152k
score
float64
2.52
5.16
int_score
int64
3
5
As a parent, it didn’t take me long to realize that I was different. Like the other parents, I also realized that the world is full of dangers (and is quickly getting worse). But, where all of the other parents were doing everything in their power to shield their kids from the dangers, I felt compelled to prepare my child. In fact, I feel an obligation to make sure my child knows how to survive when SHTF. Teaching Your Children the Survival Mentality – It is Never Too Early! Survivalism isn’t about knowing a bunch of tricks (though that certainly helps). Survival readiness is a mentality. And, while a 2-year old won’t be ready to light a fire or read a map, it is never too early to teach your kids the survivalist mentality. It can be really challenging to teach your kids the survival mentality. It means telling them that bad things do happen, that there are bad people in the world, and that things aren’t as stable as they seem. These are cruel life lessons. But, trust me, kids can handle it. And not telling them is much crueler because they will be unprepared when bad things do occur. Aside from teaching my daughter specific survival skills, here are some of the things I do to teach her the survival mentality: - Take her out of her comfort zone: Whereas some parents never take their kids out of a 3-block radius of their homes, my daughter goes to all sorts of places. This includes the great outdoors, big cities, the metro, ethnic restaurants… By going to as many different places as possible, my daughter has learned to be comfortable and find herself in multiple settings, with multiple types of people. - Ask her what she thinks should be done to solve problems: I want to encourage critical thinking skills in my daughter. If I am always telling her what to do, then she isn’t going to learn to think for herself. So, when a problem arises, I ask her what we should do. Even at 5, she was able to make decisions like whether we should wait for the next bus or walk. These aren’t life-or-death decisions, but they do build the survival mentality. - Letting her explore, fall, and sometimes get hurt: As a parent, it is really hard to watch your child get hurt. But this is how we learn important life lessons. For example, there is one mom at the park who never lets her kid climb on the playground equipment because she is too worried that he will fall and get hurt. As a result of being coddled, the kid is one of the most uncoordinated 5 year olds I’ve ever seen. Yes, he could fall. But the chances of him dying or getting seriously injured are practically zero. So, before you tell your kid not to run, jump, climb, etc. out of fear that he/she might get hurt, think of the bigger picture instead! 8 Survival Skills Your Kids Need to Know NOW How to Build a Fire When my daughter was 3, I taught her how to make a safe fire pit by surrounding it by rocks (and to be careful lifting the rocks when in snake country!), and how to make the “tee pee” out of sticks. When she turned 5, I let her light the fire – with supervision, of course! If she is ever lost in the wilderness, she will be able to stay warm, keep wild animals away, and signal for help with the fire. How to Read a Map Do you know about the sport Orienteering? It is a race where you have to use a map and a compass to get to certain points in the fastest amount of time. My dad took me Orienteering when I was a kid. I think I was about 6 when we started, and was running through the woods by myself when I was 7. Start by taking your kids out the first few times. LET THEM GET LOST! Then let them find their way back again. Once they are versed in map reading, you can let them go out on their own. You can find a local Orienteering club at their website here. What to Do If They Get Lost Make a safety plan and go over it with your kids! Otherwise, they will likely panic when they get lost and it could lead to disastrous outcomes. Here is what they need to know: - When lost in the wilderness: Stay put! Do not go anywhere unless you have a specific reason to do so (like recognizing a landmark or going to a water source). The more they wander in hopes of finding their way back, the more lost they are likely to get. - When lost in public places: Stop and observe! Often, the parents are just a few yards away. If the kids immediately panic and start running around looking for you, they will likely just get more lost. If they cannot find you within a few minutes of waiting, they should seek out an adult. First look for police officers. If none are around, then they should (ideally) approach a woman with children and ask for help. What to Do During a Home Invasion This is every parent’s worst nightmare – and a nightmare which unfortunately happens quite frequently. I recommend that you make a home invasion plan and run test drills with your children. In the ideal situation, your children will sleep on the same floor as you (such as everyone being on the second floor). Then, if you suspect an intruder is on the first floor or outside, you could gather everyone in your “safe” room and call 911. If you are unable to gather everyone in a safe room, then you need to have a code word or other signal which can be used from across the home. At the signal, the children should know to HIDE and not come out. How to Find Drinkable Water If your children ever get lost in the wilderness, they can go without food for weeks – but they will need water if they are going to survive. The problem is that most natural water sources are contaminated. This could lead to diarrhea, which in turn could lead to dehydration and death. As soon as your children master the art of making a fire, you can teach them how to boil water to purify it. But, there is a chance that your kids aren’t going to have a pot for boiling water if they ever get lost in the wilderness or are in a similar survival situation. Teach them how to locate the safest sources of water – such as to drink water from the moving parts of streams and not from stagnant areas. Also teach them tricks like using a piece of cloth to absorb dew and moisture from plants, and then wringing it out into a bottle or directly into their mouths. To SCREAM, kick and fight! If you ever go to a self-defense class, one of the first things you are going to learn and practice is screaming. The same applies to many martial arts. Unfortunately, most people don’t send their kids to self-defense classes. Instead, we train our kids to be quiet, obedient, and listen to our elders. So if your kids are in a threatening situation (being attacked, raped, kidnapped…), they might freeze up and become passive. This is NOT what we want them to do. Teach your kids to SCREAM if they feel they are in a threatening situation. If screaming doesn’t save them, they should fight back with everything they have! Fighting back (no matter how seemingly hopeless because the attacker is bigger, stronger) could earn them a few extra seconds, during which time someone notices the struggle and is able to help. Go ahead and get your kids into martial arts classes so they can practice this. Recommended Reading – Essential Guide To Self Defense How many of these survival skills do your kids know? Are you preparing your kids for survival? Let us know in the comments.
<urn:uuid:b019fdbb-1e53-4a95-80d7-851727d740f7>
CC-MAIN-2023-50
https://www.primalsurvivor.net/do-your-kids-know-these-survival-skills/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.968262
1,665
2.71875
3
WASHINGTON, July 1, 2020 /PRNewswire/ -- Born Free USA, an internationally recognized leader in animal welfare and compassionate conservation, is launching a six week-long campaign in July and August to raise awareness of the global impact of trophy hunting and reveal the brutal facts behind common myths supporting the continuation of this cruel, outdated practice. "The trophy hunting industry has unfortunately been able to persuade a segment of the public that it's actually helping save endangered species like lions, tigers, elephants, and rhinoceroses by killing them for so-called sport," said Angela Grimes, CEO of Born Free USA. "But hunting these threatened animals as recreation and then showing off their heads or other body parts doesn't do anything to help vulnerable populations, and this is a chance to set the record straight." The facts about trophy hunting tell a different story than the one presented by hunting advocates: Myth: Trophy hunting helps maintain wildlife populations. Fact: Trophy hunting weakens wildlife populations by killing off the strongest and healthiest animals, which are considered better trophies. Hunters frequently target endangered species and contribute to the global wildlife trade that threatens biodiversity and wilderness habitats. Myth: Trophy hunting provides economic support for local communities and conservation efforts. Fact: The trophy hunting industry benefits a small group of outfitters, sponsors, and government agencies. Very little of the money it generates is invested in local economies, creates jobs, or is distributed to conservation organizations. Animal-friendly eco-tourism, meanwhile, offers an efficient, sustainable, and cruelty-free economic opportunity. Myth: Trophy hunting is a sport. Fact: Trophy hunting guides lure animals with bait, target animals in and around protected land that are accustomed to humans, and even shoot from helicopters. In canned hunting operations, people pay thousands of dollars to kill animals that have been raised in captivity, and shoot them in an enclosed area from which they cannot escape. There is nothing sporting about this. Born Free USA's trophy hunting campaign coincides with the fifth anniversary of the death of Cecil the lion. In a case that provoked widespread outrage, an American hunter and his guide in Zimbabwe used bait to lure Cecil from a national park, wounded him, and left him to suffer overnight before returning to kill him more than 10 hours later. Despite the negative public reaction to Cecil's death, the United States continues to allow trophy hunters to import trophies into the U.S. from around the world and allows domestic trophy hunting of iconic species like wolves, black and grizzly bears, and mountain lions. "There's nothing sporting about this practice," Grimes said. "The animals targeted by the trophy hunting industry are facing shrinking habitats, increased contact with humans, and reduced populations. Many of them are on the verge of extinction. They need to be protected, not hunted." For more information, visit www.bornfreeusa.org/trophyhunting. About Born Free USA Born Free USA works to ensure that all wild animals, whether living in captivity or in the wild, are treated with compassion and respect and are able to live their lives according to their needs. We oppose the exploitation of wild animals in captivity and campaign to keep them where they belong – in the wild. Born Free USA's Primate Sanctuary is the largest in the United States and provides a permanent home for more than 450 primates rehomed from laboratories or rescued from zoos and private ownership. SOURCE Born Free USA
<urn:uuid:43695b1d-24e4-4e6c-abac-a42ac555e6a8>
CC-MAIN-2023-50
https://www.prnewswire.com/news-releases/born-free-usa-campaign-challenges-trophy-hunting-industry-301086545.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.93189
700
2.59375
3
Table of Contents Doxing, also known as “doxxing” or “d0xing,” is a cyber-attack tactic involving the collection and dissemination of personal information with malicious intent. Doxing attacks are carried out to embarrass or harm the target by publicly exposing sensitive data, such as social security numbers, addresses, phone numbers, credit card details, and other private information. Doxers use this data to threaten the victim in some way, whether through blackmail or extortion. The term “dox” comes from the slang word for “documents” (or doc), as historically, doxers would typically search online databases like public records websites and social media platforms to collect personal information about their victims. Doxers may also try to get more data on their target by contacting external sources, such as people close to the victim. Once they have gathered enough information on their victim, they will post it online directly or via a link-sharing portal. Doxing can range from personal pranks, such as revealing someone's phone number without permission, to more serious offenses like identity theft and fraud. Technological advancements have made it easier for attackers to pinpoint potential victims on the web, even if those people are not intentionally searching for attention. As a result, many organizations now take proactive steps towards protecting against doxing attacks by investing in robust cybersecurity measures like firewalls and encryption software that help safeguard against potential threats posed by doxers. Doxing is an illicit digital practice that victimizes people, corporations, and even nations. By understanding the different types of doxing techniques available, IT teams and cybersecurity professionals can take steps to protect their networks from potential threats. Cybersecurity Education and Training Begins Here Here’s how your free trial works: - Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure - Within 24 hours and minimal configuration, we'll deploy our solutions for 30 days - Experience our technology in action! - Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks Fill out this form to request a meeting with our cybersecurity experts. Thank you for your submission. Types of Doxing Doxing is a cyber assault that unearths and publicizes personal data about an individual or entity. The aim of doxing is to shame or discredit the target by divulging sensitive data. It can be broken down into two primary types. Physical doxing is when someone visits a location to gather personal data on their target. This could include taking pictures of the property or snooping around for documents with identifying information. In some cases, physical doxers may also use GPS tracking devices to follow their targets' movements. An example was seen during the Hong Kong protests, where Chinese authorities placed GPS trackers on protesters' phones and vehicles to identify them in surveillance footage later. Online doxing is when someone collects personal data from online sources such as social media accounts and websites to reveal details about a person's identity or activities without their consent. For example, if you have ever posted your address online, it would be easy for someone with malicious intent to discover where you live just by searching through your posts and profile pictures. Doxing can take many forms, from gathering publicly-available information to more advanced techniques like social engineering. Doxing is a major concern and must not be disregarded. Once the information is released into cyberspace, the consequences can be far-reaching and potentially damaging to the reputations of people and businesses. Examples of Doxing Examples of doxing can range from trivial pranks to serious invasions of privacy. It’s a form of cyber harassment that has become increasingly common in recent years. Doxing on Social Media One typical example is when someone posts unsolicited personal information, such as a home address, phone number, email address, or other sensitive data online. This is often done by creating fake social media accounts specifically designed to target individuals for harassment and humiliation purposes. Doxing by Association Another example is “doxing by association,” which involves gathering personal information about someone based on their connection to a targeted doxing victim. For instance, if a hacker were targeting an employee at a company, they might try to find out more about their family members or friends to gain access to confidential data related to the company itself. A third type of doxing is called “doxware,” where hackers demand payment from victims in exchange for not publicly releasing their sensitive data. Hackers may also threaten victims with legal action if they don't comply with demands – making it particularly dangerous and difficult for victims to fight back against these types of attacks without putting themselves at risk further down the line. Finally, there are instances where people use doxing as part of political activism campaigns known as “hacktivism.” This is where activists seek justice through public shaming tactics like posting private documents online related to corporations or government officials involved in unethical activities such as corruption scandals. Hacktivism can have far-reaching consequences beyond just embarrassing those responsible. It can also potentially damage reputations and businesses depending on how widely shared the information becomes once released into cyberspace. Is Doxing Illegal? Legally, doxing can be a complicated and contentious matter. Doxing is considered a cyber crime characterized by researching and broadcasting private information about an individual online. However, the legality of doxing depends on the type and source of shared information. In most places, releasing confidential details without the proprietor's authorization is illegal. This includes personal data, such as addresses, phone numbers, email addresses, bank account details, etc. Some countries have laws that make sharing certain types of sensitive data (such as medical records) illegal, even if they have been made public by another source. However, in certain situations where private data has been circulated for a long time, it may not be seen as infringing upon privacy regulations. The US Computer Fraud and Abuse Act penalizes those who access computers without permission or surpass authorized entry with malicious intent or for personal benefit. Depending on the severity of the act committed, penalties for this type of crime can range from hefty fines of up to $500k to lengthy prison sentences. Therefore, it's imperative to recognize that activities like illegally accessing databases or utilizing malicious software/spyware programs to breach protected networks are strictly prohibited by law and can result in severe penalties for participants. In Europe, GDPR (General Data Protection Regulation) legislation provides individuals with rights over their personal data. This includes how companies collect, store, process, use, share, delete, transfer, and dispose of personal data. Under GDPR, any organization found guilty of violating these regulations could face fines of up to €20 million or 4% of global annual turnover, whichever is higher. In the U.S., states have adopted legislation to penalize menacing activity conducted electronically, including emails, texts, and social media posts – as part of doxing assaults against persons. Even though we don’t always hear about these cases, there are legal repercussions associated with carrying out such activities, and in most scenarios, doxing is considered an illegal, punishable activity. Dangers of Doxing The repercussions of doxing can be extensive, leaving those affected in psychological distress from the fear of being tracked or threatened by strangers who possess their private information. Reputational damage is also possible should employers or associates stumble upon sensitive details made public without consent. Moreover, the financial cost of recovering from damages due to identity theft and credit card fraud may leave one feeling like they are between a rock and a hard place. Cyberbullying via direct messages containing threats and insults on social media platforms could create an atmosphere where individuals feel belittled amongst peers who become privy to these posts. Furthermore, divulging home address data makes offline stalking possible, potentially putting people at physical risk. Responding to a Doxer If you are doxed, it is critical to promptly take action to safeguard you or your organization from further harm. The first step when responding to a doxer is to notify law enforcement authorities. Depending on the severity of the attack and potential threats, legal action may be necessary; thus, it's recommended to contact local police for further assistance. Legal action may be required in cases with grounds for filing criminal charges against attackers. Monitor Online Activity It’s also critical to monitor social media accounts associated with your business or brand in case attackers post defamatory content about you or your organization online. If this happens, immediately report offensive posts or comments and remove them from all platforms. Set up Google Alerts to be notified when content related to your name appears online, allowing you to stay ahead of potential attackers. Secure Your Data You should also secure any exposed data by changing passwords across all accounts associated with an affected user profile (email addresses included). Also, ensure all sensitive information stored on company servers is encrypted using strong encryption protocols. This helps prevent unauthorized access even if hackers manage to breach IT-implemented data security measures within organizations. Finally, keep track of IP addresses that have recently accessed corporate networks to help detect suspicious activity before it causes serious harm. Employ Prevention Policies and Systems Remember that prevention is always better than a cure when dealing with cybersecurity threats like doxing. Invest time in creating robust employee data management policies and regularly reviewing the company's security systems. By doing so, organizations can minimize their chances of falling victim to future attacks launched by determined adversaries looking for weaknesses within networks that could be exploited. It is imperative to be watchful and take the essential measures when reacting to a doxer. Once vigilance is achieved, learning how to thwart doxing can be the next step in safeguarding yourself. How to Protect Against Doxing To guard against doxing, bolster your online security and restrict how much personal data is publicly accessible. Multiple strategies can help achieve this. Secure Password Protection Strong passwords are critical for protecting against doxing attacks. For optimal security, passwords should contain a combination of uppercase and lowercase letters, numbers, and symbols with at least 8 characters in length. Using distinct passwords for each account is vital to ensure that if one password is exposed, other accounts remain secure. Check out our blog post for password best practices. Two-factor authentication (2FA) and multifactor authentication (MFA) add extra layers of security by requiring users to provide a username/password combination and another form of verification, such as a code sent via text message or email, before they can access their account. This makes it much more difficult for attackers to gain unauthorized access, even if they manage to get hold of someone’s credentials through doxing or other means. Limit Information Shared Online Another way to protect yourself from doxers is by limiting the personal information you share online, particularly on public forums, social media sites, or discussion boards where people may search for targets using keywords related to location, job title, or interests. Be mindful when posting photos, too – avoid including details that could identify where you live or work unless absolutely necessary. Not only is it essential to safeguard your information but also that of those around you. Friends and family members who might not understand how easy it can be for malicious actors to find their personal details should also be educated about good digital hygiene practices. Detecting doxers is a critical part of protecting against cyber attacks. IT personnel, cyber security experts, business owners, and corporate leaders must comprehend doxer tactics to effectively detect and address potential threats. One way to detect potential doxers is by monitoring social media accounts and other online platforms. This includes regularly checking profiles for suspicious activity, such as new followers or posts with personal information about an individual or organization. Any dubious conduct should be quickly reported to allow for suitable measures if necessary. Additionally, security audits should be conducted regularly to identify any vulnerabilities that may have been overlooked previously. Analyze Traffic Logs Another method of detecting doxers is analyzing network traffic logs for unusual patterns or activities that could indicate malicious intent from outside sources. For example, large amounts of data sent out from a single source could suggest an unauthorized attempt to collect sensitive information about an organization’s systems and networks. Monitoring these types of activities can help IT teams identify potential threats before they become serious problems for the company’s security posture. Employee Training and Education To safeguard against doxing, companies should educate their employees on the importance of refraining from sharing too much personal information online and using strong passwords when accessing sensitive accounts, for example, on financial institution websites. Employees should be advised not to click on links sent by unfamiliar senders, as this could put them at risk of identity theft or other cyber offenses like phishing. How Proofpoint Can Help Doxing is a serious threat to online security and privacy. To mitigate the risk of doxing, it is essential to take measures such as regularly changing and reinforcing passwords, using multifactor authentication, monitoring online presence, and keeping employees trained to detect doxing acts. Proofpoint is a global cybersecurity leader that can help employ such measures to protect against cyber crime acts like doxing. Learn more about Proofpoint and its AI-powered technologies and defense platforms can prevent doxing, data loss, and other security threats. Related Doxing Resources Subscribe to the Proofpoint Blog
<urn:uuid:dda849ff-d122-4b37-8c3f-0399880135a6>
CC-MAIN-2023-50
https://www.proofpoint.com/us/threat-reference/doxing
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.942271
2,802
3.46875
3
A Source Edition of the History of People with Disabilities in Germany after 1945. A contribution to Public Disability History The list of complaints was long: Inadequate teaching facilities, lack of resident participation, arbitrary distribution of premium payments by the institution’s administration and forced residence in the institutional facilities during job training programs. In the early 1970s, the Bremen rehabilitative institution Friedehorst came under severe criticism by various disability advocate groups and youth clubs.1 To indicate the extent of the misconduct to local politicians, the journalist Gerhard Tersteegen compiled a compendium of the institutional transgressions. His documentation, entitled Heimideologie contra Integration [Institutional ideology versus integration], is only one of the previously unpublished sources featured in Quellen zur Geschichte von Menschen mit Behinderungen (QGMB) that documents the changing cultural realities of people with disabilities in Modern Germany and unearths their constant claims to agency. QGMB follows the lead of various other disability historians to open the disability archive and eliminate barriers to explore the history of people with disabilities. Whereas American efforts already culminated in a digital disability museum as early as 2000 and other pioneering source platforms have made published journals of the German disability movement (Krüppelbewegung)2 available, unpublished primary material that offers glimpses into the intricate realities of people with disabilities have remained unavailable for larger audiences in Germany – or reserved for the privileged eyes of historians. QGMB attempts to further open the archive for a general audience. Additionally, to help integrate disability history into mainstream educational curricula, the source edition is didactically designed for use in both high schools and universities.3 Apart from a search function, the categorization of sources reflects different facets of the phenomena collectively referred to as Behinderung. Even more, the selected material and its encoding permit teachers to give students independent research tasks. As the documents are chosen to offer a variety of viewpoints on a given topic, and balance each other rather than require to be used as a unit, different levels of depth can be achieved according to the teachers, students and curricular demands. To fulfill the demand for multiperspectivity in history didactics, both non-disabled commentators and individuals categorized as disabled are collected in the source edition. Lecturers and high school teacher can select the amount of sources and which viewpoints to look at, and also whether to use the finely encoded sources in more independent or supervised teaching formats. The project is initially derived from research project People with Disabilities in Germany after 1945. Self-determination and participation in two German states in comparative perspective. A contribution to Disability History that was funded by the German Research Foundation and headed by Gabriele Lingelbach at Kiel University. While the project was finalized at the end of 2017, QGMB assembles the project’s findings as a central archive. However, it is not only a testimony to the individual dissertations by Jan Stoll (Disability Self-advocacy movements in West Germany),4 Sebastian Schlund (West German Parasports),5 Bertold Scharf (Working environments of people with disabilities in the GDR)6 that makes their results available and sets the stage for new disability history projects in Kiel. While the sources are currently categorized according the domains of activism, sports, work, alongside legal texts and stereotypes, the source edition is devised to be enlarged – in categories, periods and territories. |Screenshot of the QGMB web site.| Particular attention was paid to long-term availability, searchability and intertextual relations. The documents were encoded with the standard for digital editions in the humanities - TEI. TEI allows not only to mark up the structure of the text but also textual elements like persons, places etc., so they can be directly identified. The faceted search on the web site works like a register and allows cross-referencing of persons, institutions, organizations, key words, places and laws. Each of these is referenced – if possible – with a permanent link to the respective entry in the German national library (DNB). Moreover, in contrast to a printed source edition, it is possible to extend the edition in the future. The usage of TEI also facilities upcoming research: In TEI, different terminologies for disabilities and people with disabilities are indicated and could serve as a foundation for a corpus that helps to uncover discursive changes in the naming and, hence, in the construction, ascription and disavowal of the complex of dis/ability. These encoded concepts include the GDR’s Geschädigte [damaged/defective], the male veterans’ self-description of Versehrte [permanently wounded] and the Sorgenkinder [problem children] that became a frequent reference point after the Thalidomide scandal in early 1960s West Germany. The encoding makes the documents not only machine-readable and searchable, but also qualified with meta-data (bibliographical information, key words and notes on the edition process and responsibilities). The documents will be published in the TextGrid Repository, a digital preservation archive for XML/TEI encoded humanities research data, so the documents will be available also if the web version site should not exist anymore. The web site is barrier-free and accessible for blind and visually impaired people: It is readable for a screen reader and every picture is linked with an alternative description. Unfortunately, it is not accessible to non-German-speaking people and people with learning difficulties, there is no English version and the texts are not translated in easy-to-understand language. In its current inception phase, QGMB comprises 37 very diverse sources. From complaints about institutional repression, such as Heimideologie contra Integration, to leaflets written by the German disability movement, to parasport visuals that speak to the changing cultural ascriptions of mental or physical dis/ability. Moreover, the range is from letters of complaint directed at federal ministries, official advertisements for the Kriegsversehrtenspiele to satirical obituaries of the disability movement for the public service TV lottery Aktion Sorgenkind which was often regarded as paternalistic. Newspaper articles show how the subject was discussed in the public and abstracts from laws and regulations show the handling in politics. Each individual source is amended with a separate commentary by the disability historians of the Kiel project. These commentaries frame the source and reference further research on the topic. 1 Cf. Lingelbach, G. / Stoll, J. (2013): „Die 1970er Jahre als Umbruchsphase der bundesrepublikanischen disability history? Eine Mikrostudie zu Selbstadvokation und Anstaltskritik Jugendlicher mit Behinderung.“ In: Moving the Social 50, S. 25-52.↩ 2 Lux, U. (2017): "Nothing is forgotten, and nobody!" Archives for the disability rights movement as a disability policy project. In: Public Disability History 2 (2017) 19.↩ 3 Hellberg, F. (ed.) (2016): Disability History: Behinderung in der Geschichte - ein Längsschnitt. Aachen: Bergmoser + Höller.↩ 4 Stoll, J. (2017): Behinderte Anerkennung? : Interessenorganisationen von Menschen mit Behinderungen in Westdeutschland seit 1945. Frankfurt am Main: Campus.↩ 5 Schlund, S. (2017): "Behinderung" überwinden? Organisierter Behindertensport in der Bundesrepublik Deutschland (1950-1990). Frankfurt am Main: Campus.↩ 6 Bertold Scharf’s forthcoming dissertation project is scheduled for release in the same monograph series on Disability History issued by Campus.↩ Raphael Rössel/ Bertold Scharf (2018): A Source Edition of the History of People with Disabilities in Germany after 1945. A contribution to Public Disability History. In: Public Disability History 3 (2018) 8.
<urn:uuid:02714a2c-dbf6-4086-87d3-a4ef0ee87d62>
CC-MAIN-2023-50
https://www.public-disabilityhistory.org/2018/05/a-source-edition-of-history-of-people.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.876131
1,696
3.40625
3
The Fresh Air Cure Just over a century ago, tuberculosis was the leading cause of death in America. Known as consumption at the time, tuberculosis is caused by a bacterium that, when inhaled, can cause weakness, coughing, chest pain, shortness of breath and other life-threatening respiratory symptoms. As early as the 1860s, TB sufferers began pouring into Colorado and entire towns sprung up around these sanatoriums or treatment facilities. At one point, tuberculosis killed one in three Colorado residents, compared to the ten percent national average. Physicians naively believed that fresh air, high altitudes and abundant sunshine were the panaceas of all ailments. They were correct that fresh air does prevent the spread of TB from spreading, but it did not cure the disease. Only antibiotics developed in the 1940s lead to a complete cure. The Purgatory Springs sanitarium allowed “guests” to relax with special diets, sip mineral water (believed to have curative properties) and listen to live orchestras, enjoy the mountain views from spacious porches and solariums. The more opulent tuberculosis facilities, such as the Purgatory Spring Resort, bred their own elite social scenes and attracted famous patients from all over the world. The “Hilltop” sanatorium, however, was isolated from town and was established as a charitable society for Jewish victims of the disease. Townspeople often stigmatized the sanatorium and feared contagion from the less affluent patients and “foreigners” of the hilltop. Thus, even the white death was stratified by class and race.
<urn:uuid:e897399e-0b4a-494e-950f-5778d3302b22>
CC-MAIN-2023-50
https://www.purgatorysprings.com/2021/07/15/white-death-colorado/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.962329
331
3.234375
3
Get free samples written by our Top-Notch subject experts for taking the assignment services uk from Rapid Assignment Help. Supply Chain Management (SCM) is playing an important role to maintain the entire flow of production of products and services. This is dealing from the raw components to the delivery of the final products to the consumers. It deals with different activities that consist of designing, farming, manufacturing, packaging, transporting, and many more. The development of supply chain management is depending on the opinion of customers of the company. With the changes in demand of consumers companies are able to develop products that are effective to increase the rate of productivity of a company. The values of clients are playing an important role for business organizations to continue their distribution of products correctly. This report is trying to focus on the several aspects of this company within the competitive market. Based on the supporting examples the customers are trying to illustrate the supply chain strategies, tools and technologies, and so on through this study. The theoretical support of this management process also tries to elaborate in this part of the study. Supply Chain Management of companies, specifically businesses require an efficient system of operation and activities so that the products and services reach the customer base on time and in the appropriate condition. In this case, the proper working of the supply chain is also responsible for improving the customer value and creating a good reputation within the market. The concept of the supply chain is based on the creation of a network that connects individuals, organisations, human and physical resources, operations, and technology that helps in the production, transport, and sale of a product (Lopes de Sousa Jabbour et al. 2018). Considering the whole process of the supply chain it covers the system that starts from the delivery of source materials from the supplying unit, development by the manufacturer till the final delivery to the customer base. In the case of the activities within a business, the supply chain consists of two units, which are operations and logistics. The managers of both these departments are responsible for the implementation and management of the efficient deployment of personnel, “in-process inventories”, physical facilities, finished goods, and related information and services. As for the current problems of the supply chain system regardless of the type of business, the global supply chain industry has three major critical challenges facing businesses. These are the labour shortages, unavailability of proper equipment availability, along with the “ripple effect of global bottlenecks” (Gholami-Zanjani et al. 2021). Thus, it is also a difficult case for the companies to gain customer value amidst the challenging situation. Other than that, the major problems regarding the supply chains that are common to almost all businesses are to keep the costs of transportation low and maintain the changing demands of the customers as well as the industry. Further, it is also challenging to keep the sourcing consistent, while having a reliable carrier capacity. Unable to stay up-to-date with the latest technology solutions causes the company to have a low-efficiency supply chain management strategy along with the performance of pick-up and delivery (Clauson et al. 2018). As for the need to create customer value, the companies should apply an efficient supply chain strategy, which can be acquired by meeting the key requirements and opportunities of the supply chain. These can be done by having proper monitoring and planning along with a system of processing orders and management of inventory. Warehousing techniques and management are the most integral for supply chains as they should be sorted in a way that they can easily be sourced and supplied in a minimal time (Kumar, 2020). The management of the transportation system is also responsible for the on-time delivery and support to customers during their needs. Finally, on the part of the management and accounting, the company should consider using “supply chain analytics” along with collaboration and technical features for smart record keeping, and business and market analysis. For the companies to gain a high customer value based on the service or product quality, there is a need to apply the correct analytical tools for the analysis of the existing supply chain and then improve or develop it accordingly. In this case, there are several types of analytics that can be used which are “Descriptive analytics”, “Predictive analytics”, “Prescriptive analytics”, and “Cognitive analytics” (Jabbar et al. 2021). These are sometimes supported with the help of appropriate performance metrics along with “Hybrid Performance Measurement” in case, the supply chain is more complex than usual. Thus, it is an integral system for the companies to have a system that caters to all the physical, technical, and analytical aspects of the supply chain so that the management covers all the activities for successful integration. Considering the structure of the global supply chain networks, as already mentioned earlier, the main aspects they cover are the segments of storage, warehousing, and handling of materials (Saberi et al. 2019). This is because improper storage conditions and handling mostly lead to the deterioration of the product even before it leaves the manufacturing unit and if these somehow reach the customers it might reduce the reputation and goodwill of the business. Immediately after that, the products should be properly packaged and unitised for easy location and accessibility (Dolgui et al. 2020). Lastly, inventory management and an efficient transport system are essential along with the secure handling of the information and control system. Due to the rising internationalisation and globalisation of almost all businesses, the supply chain logistics are also required to match the market trends. Globalisation of supply chains produces a new revenue stream, specifically for the logistics companies, which, however, also increases the system of communication among the vendors, customers, as well as business owners (Free and Hecimovic, 2021). This allows them to reach new audiences and connect with customers, regardless of location. On the other hand, it is also challenging for the logistics managers considering the increase in the size of the business locale. In the case of the logistics managers, it is firstly not a career path for them and they have the responsibility of employee retention. They are also required to operate a “streamlined communications management” and also comply with the service hours. Logistics managers also need to cater to employee benefits along with fuel costs, while providing all-time better customer service (Kandil et al. 2020). They also have governmental and environmental regulations imposed on their roles and the managers also cater to information processing and maintain relationships with business partners all at once. Thus, it becomes a difficult task for the managers to also think about the strategies that help in creating good customer value on behalf of the manufacturing companies. Resource-based View Theory This theory is playing an important role to understand the behavior of organisations to perform their business-related activities. The supply chain management of companies is relevant for continuing their market performances within the competitive market. As per this theory, the firms are playing dominating role within the competitive marketplace (icmab.org, 2022). The aggressive behaviors of business organisations are able to mitigate their marketing issues as problems within the marketplace. The management of supply chain resources is helpful for companies to manage their services related to products and services. Acquisition and improvement of resources are also being improved through this theory in a proper manner. The performance of stakeholders is also relevant for the development of a supply chain management system. The stakeholder group can be dealing with the suppliers of products, employees, consumers, competitors, and so on. This theory focuses on the basic contracts between companies and their suppliers to continue their services (Tangestani et al. 2020). This is effective to identify the expectations of each member within the business contracts. It can help companies to identify the basic requirements related to their products and services. The casual agreement between customers and suppliers within the marketplace are also present within this management system. All this information is playing an important role for business firms to maintain their position within the competitive market. Transaction cost theory This theory is dealing with the cost amount of products as well as the amount that gets by the supplies by delivering the products within the marketplace. The overall expenses are related to the collection of raw materials, product development, product delivery processes, and many more (Cuypers et al. 2021). This theory is also helpful to develop the relationship between companies as well as suppliers to maintain their products within the marketplace. The concept of partnership is also being developed based on this theory that is effective to improve company performance within the market. In order to maintain a successful supply chain organisation, any company can apply leadership skills, team collaboration skills, and many more. All these are effective for companies to modify their services within the competitive market (Antoni and Akbar, 2019). The analytic capabilities of managers are also helpful for companies to manage their products and services in a proper manner. In order to measure the success of the supply chain system, the firms can apply transaction costs analysis; network perspective, material logistic analysis, and many more (Jermsittiparsert et al. 2019). All these techniques are being applied in different forms to manage their position within the marketplace. Plan, source, make, delivery, return, and many more are the main components of this process that are also used by business organisations. Problems related to Supply Chain Management The supply chain management system is facing different challenges that are dealing with cash flow, time limitations, data management, and delays in product delivery, quality control of products, and many more. All these issues are creating problems for companies to continue their development within the marketplace (Ageron et al. 2020). In case of delay in product delivery creating an impact on the customer satisfaction rate. This can reduce their performance within the marketplace effectively. Samsung is one of the biggest companies in the electronics products market which is creating brand value based on supply chain management. The operations of the Samsung corporation regarding the supply chain make it clear that the firm has focused on supply chain management for maintaining their customer value during the business. All these supply chain operations focus on the cost of the products, delivery of the products, quality assurance of the products, and human resource stability within the corporation. Samsung has a huge base of customers who are looking for the products of smartphones and foods related to smartphone technologies. Therefore, it is a huge responsibility of the firm Samsung to provide all the m products in regular gap intervals to make the business sustainable in the market. Production of modern products including modern smartphones needs a lot of raw materials which are supplied by large trusted supply chains (Andrijasevic. and Novitz, 2020). Therefore, the market competition of products of smartphones always becomes easy for the firm Samsung. The increases in the customer loyalty of the firm in the recent two years (15.5% in 2019) are showing the real world valuation of the supply chain management (91mobiles.com, 2019). For making better products in the technology sector the importance of Research and Development is huge, for meeting all the parameters of research and development the firm needs to have access to a huge amount of resources. The demand for the resources can be met easily with the help of a trusted supply chain. From the point of view of the customers, it is important to get access to a large number of products which can be used, and Samsung uses the strategy to attract the consumer base (Ishida, 2020). The motivation behind implementing this strategy should be developing a huge number of products according to the demand of the consumers. Developing smartphones and related products need a huge amount of skills which can be met easily by having a good relationship with the stakeholders (Song and Choi, 2018). The best-talented people in academics who are pursuing the degree related to product development can be easily availed if the supply chain is managed in the best sort of way. The supply chain management strategy of the technological good production firm is far better than most of the forms in this particular sector which is bringing the firm into the first position in the sector of Smartphone and semiconductor production. Customer valuation increase with the development in the position in the market, which is deeply impacting the customer valuation of Samsung technologies. Samsung engages its supply chain stakeholder in the partnership of their business which makes the business persons act in a reliable way (Ardito et al. 2018). This helps the firm to gain a good face value in front of its customer base. Amazon is another biggest retail delivery firm in the globe which is creating a good supply chain value that is making the customers bound to choose the firm over any other firm for delivering and purchasing the products. The importance of the supply chain is huge behind the development of the business and customer bases of the firm Amazon. Therefore, it is essential for business firms to find the real stakeholders related to this technological environment. The firm follows multiple strategies for satisfying the different needs of the customers which help them to gain a competitive advantage in the market in the UK. The strategies that are practiced by the firm for managing the supply chain are: Applying a push and pull strategy can be one of the biggest success strategies for avoiding the risks of losses through the help of the supply chain. With the help of this strategy, Amazon makes divisions with the customers and buys products according to their demands. The stores and the warehouses contain the products and deliver these products according to the demand. . The strategy helps the firm to arrange the suppliers of the product according to the needs of the customers which helps to develop a customer base of the online service platform (Dias Galuchi et al. 2019). The estimated secured customer is around 81% found in a survey where 30% percent are loyal customers, and 51% buys products frequently (statista.com, 2020). In some cases, the firm faces losses because of the push-pull strategy and avoiding the situation can be easier for the firm if they implement the strategy of all pull strategy. This strategy helps to avoid all kinds of losses during business development because of the push-pull strategy. The firm faces losses because of the less demand for products that meet the expiry dates. In the pull strategy, the supply chains directly involve the sellers which help the firm to buy the products according to the needs of the products (Bharadwaj, 2019). The needs of the customers are easily met with this strategy of supply chain management, and customer satisfaction is met in the best possible way. This report is focusing on the effectiveness of supply chain management processes that are being affected due to changes in customer values. The overall changes in the supply chain system are developing issues for companies to continue their business activities within the marketplaces. Based on different theories business companies are facing issues that can create an impact on business development. The transactional costs, product development, and so on are very important parts of the company to modify their services. The development of supply chain management is also facing issues related to time management, cash flow, data protection, and many more. Based on the transactional cost analysis and logistic analysis the success rate of this process is being measured easily. In this report, the practical examples of firms that use supply chain management for increasing customer values of the firms are listed. The operations of Amazon and Samsung electronics are described as focusing on business strategies and customer satisfaction points. Get Better Grades In Every Subject Submit Your Assignments On Time Trust Academic Experts Based in UK Your Privacy is Our Topmost Concern Copyright 2023 @ Rapid Assignment Help Services offer valid for limited time only*
<urn:uuid:9e7d713b-29bc-445f-9121-171a01d5d2f2>
CC-MAIN-2023-50
https://www.rapidassignmenthelp.co.uk/customer-value-is-effective-supply-chain-management-assignment-sample-16499
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.954616
3,169
2.640625
3
Nettle | What's that? Everyone is familiar with nettles. For some they are nature's incomparable gift for health – for others they are weeds to be attacked with hoe, spade and herbicide. From time immemorial nettles have been used in many spheres of life. They are one of the world's oldest medicinal herbs. Hippocrates of Kos (the founder of the science of medicine in the 2nd century AD) recommended the plant for cleansing the stomach and blood. It contains many minerals, vital substances, trace elements and potassium as well as vitamins A and C. A comparison of the contents of stinging nettles and lettuce: |100 g nettles||100 g lettuce| |Vitamin C||333 mg||13 mg| |Vitamin A||0.74 mg||0.13 mg| |Iron||7.8 mg||1.1 mg| |Magnesium||71 mg||11 mg| |Pottassium||410 mg||224 mg| How better to combat spring tiredness than with a plant that is so rich in vitamins and minerals?. There are countless recipes in which the herb can be used as a spring cure to flush out the waste products that have accumulated over winter. However, first we need to know where the plant grows, when is the best time for harvesting and how it is best harvested. Habitat: The stinging nettle is a plant that can be found on every continent apart from Antarctica. It is a ruderal plant, which means it is one of the first to colonise disturbed sites, which it then "detoxifies". As a nitrogen-forming plant it follows human civilisation and grows particularly well on soils fertilised or treated by man. It is less often found in untouched nature. The stinging nettle, which accumulates large amounts of iron, regulates the iron content of the soil and thus has a positive influence on all plants growing in the soil. Best picking time: March to August as this is when the herbs are fresh and juicy. Gloves are recommended when picking nettles as the stinging hairs can cause an unpleasant rash. However, as soon as the leaves have been cooked, they no longer sting and can be eaten without problem. For the following recipe we recommend you use the best fresh, young nettle leaves.
<urn:uuid:50693dc3-5b40-4d7f-8a8c-c36d4fe8f360>
CC-MAIN-2023-50
https://www.rausch.ch/ch/en/the-power-of-herbs/brennnessel.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.958335
490
3.375
3
A skipper must be prepared to manage the boat in all sea conditions — head seas, beam seas, and following seas. Each has its own characteristics and dangers. Each requires different operational maneuvers and techniques. Today we will look at Head Seas When you're taking the waves on your bow, you're running into a head sea. This usually poses little danger to the average powerboat. However, open-bow boats (referred to by lake-patrol rangers as "water scoops") are at greater risk than closed-bow boats. Most small, open-bow or low-freeboard boats should not be operated in heavy weather on large bodies of water at all. Larger vessels have a bow designed to meet waves. With an experienced skipper, they can safely handle moderate to severe conditions so long as the boat is trimmed (leveled) properly and operated at an appropriate speed. When trimming the boat, pay attention to the center of gravity, at the bow, the stern, the trim, and list. Here's how: Trim the boat so it's flat: A bow trimmed too low will cause the boat to plow through the water and plunge into and under oncoming waves, giving everyone a wet ride while taking on dangerous amounts of water. A bow trimmed too high may provide a drier ride, but the boat will pound and be very uncomfortable. The stern, already a vulnerable area, will be even lower in the water than normal. Engine trim should be adjusted so the props don't cavitate as the boat pitches, rolls, or makes sharp maneuvers through breaking waves. Generally, this means the outboard or outdrives should be in the full down position. Prevent list: Canting from side to side, or listing, reduces stability and is very dangerous. Vessels equipped with adjustable trim tabs or planes and engine trim provide the operator with options for improving the boat's ride and performance in heavy seas. As a general rule, trim tabs should be set so the vessel rides as level as possible. Lower center of gravity: Passengers and heavy objects should be moved to the center of the vessel to lower the center of gravity and increase stability. Gas cans, ice chests, and heavy gear need to be secured to prevent loose items from tumbling about and causing injury. In heavy weather, there's enough to worry about without dodging flying gas cans. Even a well-trimmed boat can get into trouble if it isn't operated at a proper speed for the conditions. Almost everyone tries to go too fast. Pounding is hard on the vessel and crew and should be avoided. One boat I saw that had been operated on a choppy day for only a few hours by an inexperienced Park Service employee looked as if it had been in combat. Pounding through waves had stripped screws and loosened the cabin bulkhead; the dash was held in place only by the instrument wiring. Heavy-weather boating is displacement boating. Don't even think about getting up on plane. Never go fast enough to fly through the wave crests or cause the props to clear the water. Too much speed can result in the bow plunging under waves as the vessel pitches over the crest into a trough. I've seen good, seaworthy boats flooded or sunk because the operator didn't slow down and let the bow rise with each wave. The bigger the chop, the slower the speed. Operating in head seas requires constant tending of the helm and throttle to allow the boat to ride up and down with each wave. Slow down and angle into and through each crest, then resume course and speed up. If your prop comes out of the water as you pitch over a crest, throttle back to avoid racing the engine. In choppy seas over four feet, you will just barely make headway when meeting the seas on your bow. One of my worst experiences with a head sea occurred one winter day when I was dispatched to rescue a sinking vessel in the main body of the lake. I headed out of a protected cove into the largest combers I'd ever seen (a comber is a large wave that has reached its peak and broken into foam). As each successive wave struck, it buried the forward half of the boat in swirling, foaming water. In those conditions, I could not continue meeting the waves head on. Instead, I began tacking into the seas, zigzagging to take the waves on the bow quarters. Taking the waves at an angle converts some of the severe pitching motion to rolling motion, giving a more comfortable ride at a slightly faster speed. To tack in a head sea, select a course that meets the seas at an angle of about 45 degrees. After traveling in one direction for a while, change direction 90 degrees to take the seas at roughly 45 degrees from the other side. How long you stay on one course before changing direction to the other angle is a judgment call. Because turning in high seas presents some risk and requires an alert, skillful operator, travel as far as you can in one direction before changing course. The Art Of "Heave To" There can come a point when the seas grow so large that it's no longer safe to try to make headway. When this happens, you can "heave to." Head into the waves, reduce speed while maintaining steerage-way, and hold your position. Heaving to under power allows you to wait for the storm to pass while taking the seas from a relatively safe direction. This survival technique will reduce pitching and reduce or eliminate rolling, the motion that frequently causes seasickness. As one wit put it, "Heave to or your crew will heave, too!"
<urn:uuid:58b5dd13-3265-4bba-a27d-35407c0dc07c>
CC-MAIN-2023-50
https://www.royscottmarine.com/Scott-Marine-Blog/2022/3/HEAD-SEAS
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.958735
1,159
2.625
3
HALIFAX, CANADA — Somali-born refugee Ali Duale has positive memories of his arrival in Canada’s Atlantic province of Nova Scotia, where he first entered his hotel room to find a welcoming note in his native language along with hygienic supplies and a check to pay for anything else that he needed. Twenty-five years later, Duale is repaying the province with his service as an elected member of the provincial legislature representing a district in Halifax, the provincial capital. That service, he says, is all about his sense of community. “The word community to me has many meanings,” Duale told VOA in a recent interview. “I’m a Muslim, I’m Black, I’m a refugee, I’m a newcomer, I’m a Nova Scotian, I’m a Haligonian. Each one has a meaning to me and that’s what brought me to what I am today.” Duale has a message for any other Somalis hoping to make a new home in Nova Scotia, an often-overlooked part of Canada with a sparse population, an otherworldly landscape and a quaint ocean-faring lifestyle in the fishing towns that dot its coast. “It doesn’t matter how much education you have, or experience,” Duale told VOA. “Quite honestly, most of the time the newcomers, irrespective of their profession … it will not take less than five or 10 years to establish here or settle down. It’s a great place to be but also people need to prepare for the reality of life here.” In spite of the warm welcome he received, Duale said he would like to see Nova Scotians do an even better job of welcoming new refugees. “When people come here, as you know, these refugees have gone through a lot of mental issues, a lot of difficulties. We need to be more kind. We need to treat them with respect, and we need to not be judgmental. … Other than that, I think that we’re doing OK.” The province is perhaps an unlikely place for an African migrant to end up. Blacks account for only about 23,000 of the province’s roughly 1 million inhabitants, and of those, fewer than 2,000 are foreign-born. But people of African origin have a long history in Nova Scotia, dating back to Mathieu de Costa, who served as a translator speaking to indigenous people when French explorer Samuel de Champlain visited the coastline in the early 1600s, according to a provincial government website. During the American Revolution in the 1770s, hundreds of African slaves escaped behind British lines and were transported to Nova Scotia, where they were joined two decades later by a group of rebellious slaves deported from Jamaica, known as Maroons. Many were later transported to what is now Sierra Leone. In subsequent years the province became a destination for escaped American slaves spirited north along what was known as the “Underground Railroad.” A thriving Black community known as Africville grew up near the Halifax harbor, where it remained until it was pushed out by industrial expansion in the 1960s. Today, opportunities are available to Africans in Nova Scotia if they are persistent, according to Oluwaseyi Sanni, a lawyer from Nigeria who hopes to practice law in Halifax. While working toward his Canadian law degree, Sanni has been an editor and researcher for Afronomicslaw, a blog about African economics, politics and debt. “Well, I guess I could say that finding a desirable job was not as easy as I imagined it would be when I moved here,” Sanni told VOA. “I learned that just like everywhere, there is a sense of resilience and diligence required to getting one’s desired career goals. The key is in being dedicated to whatever one finds their hands to do.” Currently, Sanni is working on one of the most famous legal projects in Nova Scotian history, the inquiry into a 2020 mass shooting that started in Portapique, Nova Scotia, and left 22 people dead. “I am not at liberty to go into details about my work at the Mass Casualty Commission as the proceedings are still ongoing,” Sanni told VOA. “However, I will say it has been a huge privilege being part of such important work. It has also been a learning curve for me as well.” “Nova Scotia has lots of Africans and this potentially makes it easy to get settled when one arrives here,” Sanni added. “However, my advice would be to explore friendships and relationships that transcend race. Some of the deepest bonds I have established have been with people from other races.” That sentiment is warmly welcomed by Canadian Minister of Immigration Sean Fraser, who represents a Nova Scotia district in the federal parliament in Ottawa. “In Canada, diversity is one of our greatest strengths,” he said in a statement provided to VOA for this article. “Our government is committed to an immigration system that contributes to economic growth, supports diversity and helps build vibrant, dynamic and inclusive communities from coast to coast to coast, including right here in Nova Scotia.” “Atlantic Canadians are known for their hospitality and welcoming nature, making us one of the world’s top destinations for international talent,” Fraser added. “We all benefit from new energy and ideas brought here by people who choose our province to build careers and raise their families. We’ll continue to ensure that those of African descent equally and fully participate in the economic, social and political institutions in Canada.”
<urn:uuid:e07e3168-41c1-4cd8-bf1a-6abc8d253aae>
CC-MAIN-2023-50
https://www.saafistudio.com/african-migrants-make-new-lives-in-atlantic-canada/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.974542
1,194
2.5625
3
When Lisa Tran set out to investigate patterns in liquid crystals, she didn't know what to expect. When she first looked through the microscope, she saw dancing iridescent spheres with fingerprint-like patterns etched into them that spiraled and flattened as the solution they were floated in changed. The sight was so beautiful that Tran, a graduate student in the Department of Physics and Astronomy in the University of Pennsylvania's School of Arts and Sciences, submitted a video of it to the Nikon Small World Competition and ended up winning fifth place. But the importance of the results stretch far beyond their aesthetic appeal, with possible applications in biosensing and energy harvesting. Liquid crystals, fluids with aligned phases of constituent molecules, are used in everything from computer and television displays to mood rings. Since liquid crystals are made of rod-like molecules, they have special optical properties, such as changing color as they interact with electrical signals or light. For this research, Tran confined the liquid crystals within droplets, creating shells floating in water. Tran and her advisor, Randall Kamien, the Vicki and William Abrams Professor in the Natural Sciences at Penn, described the droplets as "fancy bubbles." To create patterns, Tran then added surfactants, or soapy molecules, to the water. "The way that soap usually works," Tran said, "is that you mix it with water and it forms small droplets with the oil to remove it from your hands or your plate." Because liquid crystals are similar to oil, the surfactants were attracted to the liquid crystal shells, causing the molecules to order in different ways and create striking patterns. The more soap she added to the solution, the more the patterns changed. Adding water caused the patterns to reverse. Being able to control the patterns that form on the liquid crystals could be useful in creating patchy colloids, microscopic particles suspended in water that are functionalized, meaning one can attach molecules to specific spots on the particle. "If you think about a ping pong ball, it's completely uninteresting," Kamien said. "But then you think about a golf ball, which is similar in size, but there are dimples on it. So the thing about Lisa's work is that by controlling the patterns that you see optically, it physically textures the surface, which enables you to attach things to it at particular places." The paper, published in Physical Review X, was led by Tran and Kamien in collaboration with Kathleen Stebe, the Richer & Elizabeth Goodwin Professor, and professor Daeyeon Lee, in the Department of Chemical and Biomolecular Engineering in the School of Engineering and Applied Science. They also collaborated with the group of Teresa López-León from the École Supérieure de Physique et de Chimie Industrielles de la Ville de Paris. The research is a key component in one of the interdisciplinary research groups of Penn's recent $22.6 million NSF Materials Research Science and Engineering Center grant. The group is working to make assemblies of nanocrystals on hard templates and within soft materials that hold promise for applications in sensing, energy conversion and optical-signal processing. Tran's experiment was inspired by previous research done by Maxim Lavrentovich, a Penn postdoctoral fellow at the time who is now an assistant professor at the University of Tennessee, Knoxville. Working with Kamien, Lavrentovich investigated how different patterns on pollen grains were specific to different species of plants, similar to butterfly wings. Since liquid crystals are also known for forming different patterns, Tran investigated what would happen if the molecules were confined to a sphere and caused to form patterns. She was hoping to see how they would pack and if they would match some of the patterns they had seen for pollen grains. Although initially the researchers used polarizing microscopy to investigate this, they found that they could see the droplets without a microscope by just holding the solution to the light. Since the liquid crystal responds to what's going on around it, looking at the patterns that the soap molecules induce on the shells can be used as a biosensor. "If you can get them to change their color or texture just because there's some poison in the test tube with them," Kamien said, "then you can see it with your eyes, and you don't even need a microscope." To follow on this research, Tran is interested in incorporating nanoparticles with different properties to create nanowires, which could be used as a way of making more energy-efficient harvesting devices that can be tuned to the light in their environment. "If you had nanoparticles that were all metal," she said, "you could get them to follow along the line and, if you cross link them, such that they're rigid, and wash away the liquid crystal, then you end up with this sort of patterned nanowire which could then be used for further applications." According to Kamien, one of the most interesting things they learned from this research is that they don't need fancy equipment to see how things organize themselves on the nanoscale. "The idea," he said, "that we can manipulate things that are so small with big hands and look at them on large-length scales is amazing to me. By squirting something into the solution we can change what the patterns look like. We're not just deducing things about them; we're controlling them. We're getting them to dance for us. It's true that electronics are doing the same thing with electrons, but you can't see the electrons. This interplay between optics and structure is exciting." This research was supported by National Science Foundation MRSEC Grant DMR1120901, U.S. Department of Energy Grant DE-FG02-05ER46199 and a Simons Investigator grant from the Simons Foundation. Cite This Page:
<urn:uuid:33c4d9f5-03fb-420b-92e1-cd13d1580fc2>
CC-MAIN-2023-50
https://www.sciencedaily.com/releases/2017/11/171101151220.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.959863
1,215
2.875
3
“I Have, Who Has?” is an interactive game that gets students engaged (and up and moving if you so desire). It is great for developing oral language, number vocabulary, taking turns, and listening practice. This game was developed with dual language teachers in mind, as the English numbers are in blue. There are two versions included to practice numbers 0-20 or 0-30, whichever option is best for your students. So, how do you play? 1. Pass out a card to each child. If you have cards left over, keep passing them out until there are no cards left. (If children have multiple cards, they can spread them out in front to see better. They don’t need to be kept secret.) 2. The child with the Green “GO” sign in the top left corner of their card begins. They will stand up and say “I have three. Who has one?” 3. The child with one will stand up and read their card. “I have one. Who has…?” 4. Play continues until the game ends with the “STOP” card. That student answers “I have … STOP!” to signal the end of the game. Habla español? Great! Check out the Spanish version here. NOTE: This “I Have…Who Has?” Number Game is included in two different bundles. ♦ If you are looking for more math resources, you can get this game, along with five others for 30% off in the “I Have…Who Has?” Math Bundle! – Number Words – Tally Marks – Ten Frames – Counting Fingers ♦ If you teach in a dual language classroom or have a bilingual homeschool…save even more when you buy this English Bundle and the Spanish Bundle together. BUY THE English/Spanish COMBO BUNDLE HERE! If you would like to preview a version of this game, it is available as a subscriber freebie here on our blog.
<urn:uuid:25c5df0a-2d6b-4843-93cc-dc885d92386f>
CC-MAIN-2023-50
https://www.spanglishschoolhouse.com/shop/i-have-who-has-tally-marks/?add-to-cart=1524
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.941636
436
3.578125
4
Unknown Facts about Shivaji Shivaji was a legendary personage in the history of India who carved an unparalleled niche for his achievements as a ruler and the savior of Hinduism from the onslaught of the Moghals. Heralded as Chhatrapati Shivaji Mahraj, he has countless tales of bravery to his credit. However, there are several interesting facts that the history has not told us about this invincible ruler. Here are a few interesting ones. The origin of his name Unlike most others might believe, Shivaji was not named after Lord Shiva, but only after a regional deity called by the name Shivai. As against the fanatic Muslim invaders, Shivaji was a secular king who accepted his subjects following any religion they wished to. Respected Hindu converts Shivaji helped those who wished to convert to Hinduism from other religions. In fact, he gave his daughter in marriage to one who converted himself into a Hindu. Shivaji only fought the Muslim invaders to save Hinduism. However, he never hated Muslims. He had a lot of Muslim friends. There were several Muslims in his military ranks. Once, Shivaji even helped Aurangazeb to conquer Bijapur. However, the mission backfired since two of his officers invaded the Moghal territory near Ahmednagar. An expert in warfare When Shivaji started his career as a ruler, his father had left for him only 2,000 soldiers. Eventually, Shivaji worked hard to swell his army to the size of 10,000 soldiers. He had always known the importance of a good army and he had equipped himself with amazing war techniques and strategies. He had a very strong intelligentsia in his army that helped him devise an advanced war strategy called guerilla warfare. Cared for his soldiers Shivaji never allowed his soldiers to become martyrs for the sake of being called so. During crucial times when they were left alone at a crucial front, he advised them to take back and get into the group once again to play a careful move. Builder of a strong naval fleet Shivaji was a smart fighter. He understood the importance of a powerful naval fleet to protect the country form foreign invaders. This idea was never thought of earlier to his period by his forerunners. The one-one battle Afzal Khan was a very strong person and a veteran general who had a much stronger and well built physique than Shivaji. Called for a duel with him, Shivaji tactfully wore tiger claws in his fingers and killed Afzal Khan to death. Shivaji greatly respected women and never captured women as prisoners from the territories he captured. He never allowed anyone to harm women in his territory. Crimes against women were met with serious and dreadful punishments. Valued people and skills Shivaji showed mercy towards those who surrendered to him and pleaded for protection. He valued them as people and even accepted them into his own army. Discarding their background, he would only value their skills and talents. Compassionate and just Shivaji ensured that the soldiers of his army were never given any personal weapons so that they had fewer chances to harm common people. He had given strict instructions that all that were looted from the enemy territories were properly accounted and handed over to the Maratha treasury. He never allowed any raids on religion places and also households.
<urn:uuid:3dd37549-b2fd-4e58-b141-b2a823fc35e6>
CC-MAIN-2023-50
https://www.speakingtree.in/allslides/unknown-facts-about-shivaji
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.992456
696
2.84375
3
Question 1 Report Solve the simultaneous equations y = 3x; 4y - 5x =14 The first equation can be rearranged as x = y/3. Then substituting this value of x into the second equation, we get: 4y - 5(y/3) = 14 Multiplying both sides by 3, we get: 12y - 5y = 42 7y = 42 y = 6 Substituting y = 6 into the first equation, we get: x = y/3 = 2 Therefore, the solution to the simultaneous equations is x = 2 and y = 6. So the answer is 2,6.
<urn:uuid:bfe4d141-2cd0-4d3c-902f-f08b587f1cc9>
CC-MAIN-2023-50
https://www.supergb.com/cbt/assessment/78ce253a-e25a-4269-bbc1-bd5b407176a2/question/de0f16bf-4f4f-46cf-a900-393a1c3c7247
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.889961
133
3.1875
3
In this day and age, data security is probably one of the biggest concerns for any business. All businesses have a ton of data at their disposal – transactions, knowledge, communications, consumer data, infrastructure details, etc. For all businesses, it is beyond important to ensure maximum security for all of its data. What is Multi-Factor Authentication? Multi-Factor Authentication is an effective way to add another layer of enhanced security to your devices and infrastructure. It makes use of multiple credentials for identity and access management. For instance, instead of simply asking for a biometric scan and a password, it may also ask you for a code, or another biometric scan. The reason Multi-Factor Authentication is opted for is because traditional usernames and passwords are vulnerable to breaches and hacks. Thus, creates multiple layers of security, thus thwarting hacking attempts. How does Multi-Factor Authentication work? To begin to understand how MFA works, it is important to first note that there are two types: - Device Multi-Factor Authentication: An authentication process that implements the process directly at the point of login to a system. - Application Multi-Factor Authentication: An authentication process that implements the process upon attempting to gain access to one or more applications The process, however, is the same in both the cases. When you try to access any particular file, folder, application or device, the authentication system will ask for the factors one by one to validate your ID. Once you’ve proven your ID to the system, you are then granted access. How secure is Multi-Factor Authentication? MFA is good at identifying login attempts that are out of the ordinary and flags them. In such a situation, this adaptive technology may tighten security by requesting additional credentials. Therefore, while the authentication process isn’t exactly Pentagon secure, it does ensure breaching or hacking attempts are flagged and blocked as far as possible. It has evolved as the single most effective control to insulate an organization against remote attacks Importance of Multi-Factor Authentication MFA is essential for your organization. Here are a few reasons why: - Identity theft is a growing threat – Identity theft is a rather common, easy, low-risk, high-reward type of crime and a major threat to all businesses. Password theft is constantly evolving as hackers employ methods like keylogging, phishing, and pharming. Therefore, it is a must in these times. - Your anti-virus just isn’t enough – Anti-virus systems and advanced firewalls are necessary security elements, as are vulnerability tests. Without authentication, though, your system is susceptible to intruders. - They won’t just take your data – Cyber criminals do more than merely steal data. Often they destroy data, change programs or services, or use servers to transmit propaganda, spam, or malicious code. MFA helps prevent all of these. - Multi-Factor Authentication is already ubiquitous – People are accustomed to authentication procedures in their personal as well as professional lives. Social media, banking, gaming, and email platforms have all rapidly adopted MFA. Bringing it into your workplace is no longer an option, but a basic security measure. Types of Multi-Factor Authentication Factors Generally, MFA works by requiring two or more of the following authentication factors: - Something you know – this could be either a password, a pin or a code that you set up for the system. - Something you have – this could be either a QR code to scan on an ID or badge, or maybe even an OTP sent to your mobile number or email address. - Something you inherited – this could include any form of biometric authentication such as a facial scan, fingerprint scan or even a retina scan. - Somewhere you are – this could be either to a specific computing network or utilizing a GPS signal to identify the location. In order to access the desired file or folder, you will have to provide the aforesaid credentials one by one to prove to verify their identity to the system. When to use Multi-Factor Authentication? As a business, it is important to know if you do require MFA or not. Pingidentity(1) shows the graph that will help you decide whether or not you should implement it or not. For starters, it is important to understand that you may not need MFA throughout your entire organization. For example, entry level employees and interns may not need Multi-Factor Authentication since they would just have viewing access to your data such as sales, transaction, customer profiles etc. Higher level management and employees, on the other hand, should definitely be given it as they are the ones who would most likely edit the data for projection and strategy purposes. Pros and Cons of using Multi-Factor Authentication The Pros are as follows: - Protects sensitive information: Your company would most likely be holding a lot private and sensitive user data such as phone numbers, addresses, payment option details for consumers as well as employees. Deploying a Multi-Factor Authentication system ensures that all of this data is safe guarded. - Extremely secure: If a hacker has somehow acquired a user’s password to a system, they cannot gain access unless they have the token (which is in the user’s possession), and obviously the biometric scans. Thus, it is extremely secure. - Lost devices? Not a problem: Without MFA, a lost, stolen or misplaced device could create havoc in the IT department. Device-based Multi-Factor Authentication ensures that lost devices don’t mean that your information is compromised. The Cons are as follows: - Blocked access: If you haven’t set up backup resources for authenticating user access, you cannot be granted access to a particular application or system. So a lost possession, injured finger (for biometric) would mean you would have to immediately run to the IT guys lest your login attempt be flagged. - Can be expensive: MFA can be quite expensive if an organization uses a solution that requires installation of on-premise hardware and has to integrate it with existing identity solutions. - Time-consuming:The time needed to log in on your system and verify using a mobile device can be inconvenient, especially if you’re in a rush. Difference between Multi-Factor Authentication and Two-Factor Authentication There is but one difference between MFA and 2FA – the number layers of security. Two-Factor Authentication always employs two of the different factors to verify the user’s identity. Multi-Factor Authentication, on the other hand, could involve two or more of the factors. “Multi-Factor” just means any number of factors greater than one. An adaptive Multi-Factor Authentication system would add security layers until the login attempt does not seem suspicious. Applications and Providers of Multi-Factor Authentication There are mainly 4 applications of Multi-Factor Authentication systems: - Time-based One-Time Password (TOTP) – When you’re logging in to access a particular file or folder and the application or device is TOTP protected, then it send an OTP, or a one-time password, to your mobile number which would only be valid for a specific time period, say 10 minutes. - Short Message Service (SMS) – SMS verification works by asking the user to enter a particular mobile number upon login attempt. The system then sends an SMS to said number. If the SMS is delivered and instructions completed, access is granted. - Electronic Mail (Email) – Email verification is another common application of MFA, wherein user identity is verified by sending an email with a redirect link. - Push Notifications – If a login attempt is made on another device, the user is prompted with a push notification on the original device and access is granted from there. The best providers of Multi-Factor Authentication systems are: - Duo Security Duo Security’s(2) frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. It addresses security threats before they become a problem by verifying the identity of users and the health of their devices. - Google Authenticator Google Authenticator(3) implements a two-step verification service along with a Time-based One-time Password Algorithm and HMAC-based One-time Password algorithm, for authenticating users of software applications. LastPass(4) provides simple control and unified visibility across every entry point to your business from single sign-on (SSO) and password management to adaptive multifactor authentication (MFA). LastPass Identity gives superior control to IT teams. - Ping Identity Ping Identity(5) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory and more. Auth0(6) provides the simplicity, extensibility, and expertise to scale and protect identities in any application by making use of Multi-Factor Authentication systems. Frequently Asked Questions about Multi-Factor Authentication Q. Is username and password Multi-Factor Authentication? A. It is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence. Therefore, a simple username and password is not MFA. Q. How to defend against Multi-Factor Authentication attacks? A. It is very easy for hackers to breakthrough a Two-Factor Authentication system. Multi-Factor Authentication attacks are rare as it is difficult for hackers to obtain all three factors. Companies must, however, train their employees to identify phishing emails and be vary from them. Q. How to add Multi-Factor Authentication? A. Enabling multi-factor authentication (MFA) on your account will require an additional identity verification step at the time you log in. Once configured and enabled for an account, our system will require the use of an authentication code generated by an authenticator application each time you log in to your account. Users can set this up for themselves, or as an alternative, admins may set this up for each user. Multi-factor authentication allows for a flexible and manageable way to balance the overall customer experience with modern security requirements. Your login process, access to sensitive information, and security are of topmost concern for many companies, employees, and customers. Taking care of these matters show you care and are taking extra precautions and measures to defend your systems.
<urn:uuid:3fddcd8f-ae57-466e-b863-17dae8064c42>
CC-MAIN-2023-50
https://www.techfunnel.com/information-technology/what-is-multi-factor-authentication/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.921803
2,174
3.03125
3
According to estimates in the 2017 Social Security Trustees Report, the Trust Fund will be fully depleted by 2034, at which time Social Security revenues will only cover approximately threequarters of promised benefits. The fiscal insolvency of Social Security is driven in part by growth in the overall life expectancy of the population, which strains the federal budget as retirees on average collect benefits over a longer retirement period.1The baby boom phenomenon, declining fertility rates, and other factors are also contributing to the mismatch between Social Security taxes collected and benefits paid. To restore fiscal balance to the Social Security system, policy makers must increase taxes or reduce outlays or both.2The exact magnitude of the tax increase or benefit cut that would be required to restore solvency depends on a variety of assumptions. In particular, accounting for household labor supply and saving decisions, as well as the aggregate effects of these decisions on the tax base and GDP, can dramatically affect the magnitude of reforms needed to restore solvency (Bagchi (2016)). In thinking about the design of potential reforms, one fact really stands out: the increase in life expectancy has not occurred equally among the rich and poor. The largest gains have occurred among the wealthy. For instance, the male life expectancy gap between the richest and poorest quintiles in the US is 5.1 years for the 1930 birth cohort and is 12.7 years for the 1960 birth cohort (Auerbach et al. (2017)).3The increasing longevity gap between the rich and poor is not limited to the US. For example, Haan, Kemptner, and Lüthen (2017) have documented an increasing gap for Germany. In light of this fact, we develop simple reform options that address differential increases in longevity and restore solvency to the Social Security system. Specifically, this paper does four things. First, we develop a simple way to summarize the degree of progressivity within a Social Security system. Our measure of progressivity is the variance of the implicit transfer share. The process for computing this summary statistic is as follows. We begin by computing the implicit transfer received by each wage type in the wage distribution, which is the difference between the benefits collected by retirees of a given wage type and the taxes paid by that wage type. We then express the implicit transfer for each wage type as a share of the total taxes paid by that type, and we refer to this as the implicit transfer share. Finally, we compute the variance of the implicit transfer share across all wage types in the wage distribution. The result is a summary statistic that characterizes the progressivity of a Social Security system.4We should mention that our discussion of the progressivity of Social Security is limited to individuals below the tax and benefit cap. All individuals above the cap pay the same taxes and receive the same benefits. Second, using our measure of progressivity, we show that growth in the gap in life expectancy between the rich and poor (as in Auerbach et al. (2017)) erases three-quarters of the progressivity of the US Social Security system. Whether the government chooses to restore fiscal solvency with an across-the-board tax increase or an across-the-board proportional benefit cut, the end result is the same: the variance of the implicit transfer share for the 1960 birth cohort is just one-quarter of its value for the 1930 birth cohort. In other words, three decades of growth in the life expectancy gap unwinds most of the progressivity of the Social Security system. Third, we develop two simple reform options that make the system fiscally sound without disrupting its progressivity. We refer to these as “fair” reforms for convenience and simplicity.5We realize that ìfairîis a subjective term. For our purposes, a fair reform is one that preserves the progressivity of the Social Security system. We use this terminology as a simple way to emphasize that we focus on distributional issues in this paper The first reform involves increasing the Social Security tax rate the most among wage categories that experience the largest gains in life expectancy. To be precise, policy makers could adjust the Social Security tax rate across the wage distribution to preserve the variance of the implicit transfer share and hence preserve the progressivity of Social Security. The second reform follows the same principle by cutting benefits the most among wage categories that experience the largest gains in life expectancy. This, too, could be done in a way that restores fiscal solvency while keeping the variance of the implicit transfer share constant across cohorts. Fourth, we estimate the welfare effects associated with fair reforms relative to across-theboard reforms. We augment the textbook life-cycle model with survival risk (Bütler (2001), Yaari (1965)) to include heterogeneity in wage earnings, heterogeneity in survival probabilities, and a Social Security program. We assume an individual’s wage earning type is random and welfare is measured by ex ante expected utility. In our baseline model, individuals would be willing to give up 0.8% of their total lifetime consumption to live in a world with fair tax reform rather than a world with an across-the-board tax increase. Similarly, individuals would give up 3.0% of their lifetime consumption to live in a world with fair benefit reform rather than a world with an across-the-board proportional benefit cut. The precise magnitude of these welfare gains depends on the degree of risk aversion of the individual, and these gains tend to vanish as we approach risk neutrality. Finally, two important qualifications are in order. First, we do not tackle the (philosophical) question of what the policy goal should be. Likewise, we do not claim that our reforms satisfy a first-best strategy, nor do we provide a comprehensive welfare ranking of the many potential Social Security reforms that could be pursued. Instead, we show what would be required if the goal is to preserve the progressivity of the implied transfers. Second, our assumption that wage heterogeneity is the result of underlying uncertainty is non-trivial. A different view is that wage heterogeneity is entirely or in part the result of heterogeneity in effort. If so, then the role for insurance is less clear than when low wages represent unlucky draws from a probability distribution. While we do not weigh into this complex debate, we emphasize that the positive welfare effects of our simple reforms rely heavily on our assumption that wage earnings are uncertain. 1.1. Literature Review The Social Security Administration (SSA) regularly evaluates different policy proposals that might restore solvency to the Social Security system. As of February 28, 2017, the Office of the Chief Actuary reported the fiscal impact of 60 different proposals for reforming Social Security in their analysis entitled Summary of Provisions that would Change the Social Security Program.6In addition, policy makers submit dozens of proposals each year to the Office of the Chief Actuary, who then in turn provides detailed calculations and projections in response to each proposal. Visit ssa.gov for details. The reform options that we study are similar to some of the proposals evaluated by the SSA. For instance, Proposal B3.1 calls for benefit reductions across the income distribution that (coincidentally) align fairly closely with the benefit reform option that we consider. In fact, many of the proposals that they consider involve targeted cuts to the benefits of those in the upper portion of the income distribution. Proposal B2.1 is perhaps closest to the benefit reform that we study because it involves automatic reductions in future Social Security benefits in response to growth in life expectancy. However, that proposal calls for across-the-board reductions in benefits in response to aggregate increases in life expectancy, while we study a reform option that links benefit reductions to life expectancy gains by wage category. Broadly speaking, many of the proposals evaluated in recent years by the Office of the Chief Actuary focus on protecting the financial position of low-income households.7Again, see the February 28, 2017, publication of the Office of the Chief Actuary entitled Summary of Provisions that would Change the Social Security Program. While across-the-board tax increases and benefit cuts are useful guides for thinking about the overall magnitude of the fiscal adjustments that are needed to restore solvency, policy makers are currently considering a wide range of different reform structures. The options developed in our paper show what is required if policy makers wish to make the system fiscally sound without disrupting its progressivity. The academic literature on Social Security is too extensive to properly summarize here. Instead, we briefly highlight a few strands of literature that are relevant to our paper. In the US and in many other countries around the world, the Social Security benefit-earning rule is progressive in the sense that benefits as a fraction of pre-retirement earnings are larger for the poor than for the rich. From the perspective of economic theory, one may rationalize this feature of Social Security as insurance against bad earnings realizations (e.g., see Cremer, De Donder, Maldonado, and Pestieau (2008) and Cremer and Pestieau (2011)). However, other researchers challenge this rationale for Social Security. For instance, Bagchi (2015) argues that distortions to labor supply decisions unwind most of the welfare gains from Social Security’s insurance role, and Bagchi (2017) argues that the optimal benefit-earning rule is linear rather than progressive because high mortality risk among the poor would lead to heavy discounting of the consumption of the elderly poor in the calculation of utilitarian social welfare. Alternatively, in the model that we develop, maintaining the progressivity of Social Security is welfare improving relative to reforms that do not preserve the progressivity. In addition to income insurance, Social Security pays benefits as a life annuity, which allows individuals to hedge their longevity risk. This feature is especially helpful in the absence of private annuity markets but can make adverse selection problems worse in their presence (Hosseini (2015)). Also, Social Security crowds out equilibrium bequest income, which can unwind the welfare gains from mandatory annuitization even in the absence of a bequest motive (Caliendo, Guo, and Hosseini (2014)). However, Social Security’s life annuity feature confers large welfare gains in our model because we conduct a micro-level welfare analysis with closed annuity markets. Haan, Kemptner, and Lüthen (2017) calculate how the increasing longevity gap affects the distribution of Social Security wealth in Germany, which is similar in spirit to our calculations of the implicit transfer share by income group and by cohort in the US. In addition to differences in the German and US Social Security systems, the papers diverge in that Haan, Kemptner, and Lüthen focus on surviving spouse issues while we study potential reform options. Holzmann, Alonso-Garcia, Labit-Hardy, and Villegas (2017) propose reform options for nonfinancial defined contribution (NDC) pension systems. Their options are designed to eliminate the regressivity in NDC systems imposed by pooled annuities under differential mortality. Although we study a pay-as-you-go Social Security system rather than an NDC system, the principle behind their reform options is essentially the same as the reforms that we study. They suggest that annuities in NDC systems should be individualized rather than based on average life expectancies, or that the contribution rate in the NDC system should be individualized. In addition, the implicit transfer shares that we compute for Social Security are conceptually similar to the subsidy rates that they compute for NDC systems.8In fact, their overall measure of redistribution in an NDC pension system, defined as the sum of the absolute value of the subsidy rates, is similar to our measure (the variance of the implicit transfer share). While these summary statistics are conceptually similar, our variance calculations depend on the characteristics of the wage distribution and on the shape of the benefit-earning rule in Social Security. Our paper differs from theirs because they focus on NDC systems while we measure the degree of progressivity in Social Security and we study reforms that maintain the system’s progressivity in the face of a growing life expectancy gap. Finally, our paper is motivated by the well-known observation that differential mortality risk between the rich and poor can partially undo the progressivity of the benefit-earning rule (e.g., Coronado, Fullerton, and Glass (2011)). We focus on the implications of growth in the life expectancy gap, and we study reform options that are designed specifically to address this phenomenon. 2. The Facts In this section we develop a simple way to summarize the degree of progressivity in the current Social Security system. We then use this method to analyze the impact of the growing gap in life expectancy on the progressivity of Social Security. 2.1 Our Measure of Progressivity In order to introduce our measure of progressivity, we need to build up some notation and assumptions. Age is continuous and is indexed by . At each moment in time an infinitely divisible cohort of unit mass is born. Individuals are born at and die no later than . At birth, individuals realize their earning type, , which is a random variable with p.d.f. and support normalized to the unit interval . Individuals earn wages at rate w until they retire at age , after which they collect a constant Social Security benefit in the form of a life annuity. Wage income is taxed at the Social Security tax rate . For simplicity, we abstract from population growth and wage growth. The probability of surviving to age from the perspective of age 0 is , where and for all . For consistency with the data, we assume the rich have a higher probability of survival to each age than do the poor, for all . Hence, individuals in our model face two types of risk. First, they face ex ante risk (before birth) about their wage type. This risk is cleared up as soon as they are born, and after birth there are no idiosyncratic shocks to wages over the life cycle. The purpose of this risk in our model is to create heterogeneity in wage earnings. Second, individuals face ongoing risk over the life cycle about the timing of death, and the distribution of this risk depends on the wage type. However, there is no aggregate risk in the model since the distributions of both risks are known and the population mass is infinitely divisible and therefore covers the full support of realizations (law of large numbers). For modeling purposes, the aggregate Social Security budget is balanced at each moment (pay-as-you-go). In other words, the tax rate must satisfy the government’s budget constraint for a given benefit-earning rule so that aggregate taxes and benefits are equal Notice that the budget doesn’t need to balance separately for each wage type. Instead, Social Security pools the contributions of all workers to pay an annuity to retirees, and there is cross subsidization across wage groups because benefits depend on wages and because survival probabilities depend on wages. To measure redistribution, note that each earning type receives an implicit transfer defined as the difference between what that type receives in benefits and what they pay in taxes9There are two equivalent ways to interpret . It is the contemporaneous transfer at a moment in time that flows to retirees of a given wage type, above and beyond what workers of that wage type contribute to the system. Or, equivalently, in a life-cycle (longitudinal) sense it is the difference between expected benefits and expected taxes (i.e., the net present value of Social Security transfers over the life cycle with a zero discount rate). where the average transfer must be zero to satisfy the aggregate budget constraint, For convenience, let be the implicit transfer share, which is the implicit transfer received by type as a share of total taxes paid by type , While there are a variety of ways to define the degree of progressivity of a Social Security system, we conveniently define the degree of progressivity as the variance of the implicit transfer share Our measure of progressivity has the advantage of summarizing the progressivity of the current system with a single statistic. Notice that the special case of a (Bismarckian) system devoid of any redistribution would have for all and follows mathematically. For all other systems with at least some redistribution, . We should mention one caveat with our measure of progressivity. A regressive system would also lead to positive variance of the implicit transfer share. Therefore, our measure of ìprogressivityîactually picks up any type of redistribution, but this distinction is immaterial for our paper because all of our numerical simulations correspond to the actual (progressive) distribution of the implicit transfer share in the US. 2.2. The Effect of a Growing Life Expectancy Gap on the Degree of Progressivity To assess how the growing gap in life expectancy across the rich and poor affects the progressivity of Social Security, we need to calibrate three functions: , , and . The Social Security benefit-earning rule b(w) is a piecewise linear function of an individual’s 1 wage. Following Alonso-Ortiz (2014) and others, we assume the Social Security bend points are the following constant multiples of the economy-wide average wage, 0.2, 1.24, and 2.47. Social Security replaces 90% of the individual’s wages up to the first bend point, 32% of wages between the first and second bend points, 15% of wages between the second and third bend points, and 0% of wages beyond the third bend point. In order to develop numerical examples, we assume that wages follow a beta distribution with density as in Slavov, Gorry, Gorry, and Caliendo (2017) To abstract from the portion of the wage distribution above the third bend point, they calibrate so that the top wage earner with earns 2.47 times that of the average earner.10We do not extend our analysis to individuals beyond the taxable wage cap (third bend point). In reality, wage earnings above the tax cap are not taxed and such earnings are not relevant for benefit calculations either because benefits are likewise capped. So there is no reason to include individuals above the tax cap in our analysis (except possibility in the sense that our distribution should have a mass point at the tax cap, which is not possible with the beta distribution that we are Since , they set to ensure that for any choice of . Then, to approximate the dispersion of wages they choose , which delivers the following Gini coefficient Based on estimates in Leonesio and Del Bene (2011), we assume that a Gini coefficient of 0.3463 is fairly close to the Gini coefficient in 1980 when the 1930 cohort from Auerbach et al. (2017) turned 50.11Leonesio and Del Bene do not report a Gini coefficient for 1980, but they estimate a Gini coefficient in 1981 equal to 0.381. Of course, wages have become more dispersed in the last few decades, but our focus is on the implications of a growing gap in life expectancy so we intentionally hold fixed throughout the analysis. While our calibration of the wage distribution is obviously an approximation of the true distribution, we emphasize that the reform options that we develop below do not rely on the particular wage distribution that we assume. We make assumptions about the wage distribution in order to understand the potential welfare effects of the reforms that we study. Auerbach et al. provide data on life expectancies at age 50 by income quintile for the 1930 and 1960 birth cohorts. We calibrate the function using their life expectancy estimates for the 1930 cohort as the baseline, and then we examine how the 1960 life expectancy estimates change the progressivity of Social Security. Note that additional years of life expectancy conditional on surviving to some age for type is We assume work starts at age 18 and lasts until retirement age 67, with death occurring no later than age 100.12 12 In reality, different wage types might have different career lengths, but we wish to abstract from this layer of heterogeneity and focus exclusively on the growing gap in life expectancy We normalize the economic lifespan onto the unit interval so that age 18 corresponds to model age 0 and age 100 corresponds to model age . Likewise, age 50 corresponds to model age . The life expectancy of the 1930 cohort at age 50 is 31.7 years for the richest group (or 31.7=82 = 0.387 in model units) and 26.6 years for the poorest group (or 26.6=82 = 0.324 in model units). We assume survival functions take the form where the parameter is specific to each wage type. We choose the survival functions for the top and bottom of our earnings distribution in order to replicate the life expectancy gap documented by Auerbach et al. In other words, is calibrated such that and is calibrated such that , while all other x values are a convex combination Doing so gives and . Our approach is an approximation of the mapping from the wage distribution to life expectancy. Using the benefit-earning rule and wage density given above, we find that the balanced-budget tax rate is 11.2% if we use the survival probabilities for the 1930 birth cohort. More to the point, the variance of the implicit transfer share is .13Note that we are not trying literally to replicate the history of taxes paid and benefits received among the 1930 cohort. The Social Security tax rate grew dramatically over their working lives and we are not trying to calculate the return that they earned. Instead, we are trying to understand the degree of redistribution inherent in the current tax and benefit schedule under life expectancies from the 1930 cohort. Then, we want to compare how the degree of progressivity changes as we move to the survival probabilities associated with the 1960 cohort. Next, we compare to the 1960 birth cohort. We hold the benefit-earning rule and the wage density fixed and move to the survival probabilities associated with the 1960 cohort so that we can examine the implications of the growing gap in life expectancy on the Social Security budget. The life expectancy of the 1960 cohort at age 50 is 38.8 years for the richest group (or 38.8=82 = 0.473 in model units) and 26.1 years for the poorest group (or 26.1=82 = 0.318 in model units). Following the same procedure as above gives and . This change in longevity makes the system insolvent under the current tax and benefit schedule. For across-the-board tax reform, we find that the balanced-budget tax rate must rise to 14.5%, and the variance of the implicit transfer share shrinks to .14Despite the simplicity of our model setting, we note that the across-the-board tax increase needed to restore fiscal solvency to Social Security in our model is very similar to the required tax increase estimated in recent drafts of the Social Security Trustees report. In other words, a pay-as-you-go system would lose nearly three-quarters of its progressivity as the life expectancy gap widens. Of course, fiscal solvency could be achieved through a proportional benefit cut as well. Rather than increase the tax rate from 11.2% to 14.5%, our model suggests that reducing the entire benefit schedule to 77.47% of its current level would also restore solvency.15As with the tax increase, we note that the across-the-board benefit cut needed to restore fiscal solvency to Social Security in our model is very similar to the required benefit cut estimated in recent drafts of the Social Security Trustees report. Doing this also causes the variance of the implicit transfer share to shrink to , the same as for the case of a tax increase, and again the pay-as-you-go system loses nearly three-quarters of its progressivity as the life expectancy gap widens. Across-the-board tax increases and across-the-board proportional benefit cuts have the same destructive effect on the progressivity of the Social Security system. Figure 1 plots the data behind these results in order to visualize the magnitude of the implicit transfer shares as well as the loss in progressivity from a widening life expectancy gap. For the 1930 cohort, the shares are calculated using current Social Security taxes and benefits. For the 1960 cohort, the shares are calculated under the assumption that policy makers have pursued either an across-the-board tax increase or an across-the-board proportional benefit cut (the shares are the same irrespective of whether it is the former or the latter reform). For example, the largest transfer recipients (individuals at the first bend point) in the 1930 cohort receive benefits that are 89% larger than the taxes that they pay, while benefits are 53% larger than taxes paid for the same recipients in the 1960 cohort. Almost all individuals above the mean wage (approximately ) in the 1960 cohort receive a larger transfer share than their counterparts in the 1930 cohort. 3. Two Reforms In this section we develop two reforms to Social Security. One is a tax increase and the other is a benefit cut. But rather than across-the-board reforms that would ignore the growing gap in life expectancy, both of the reforms that we develop are “fair” in the sense that they maintain the progressivity of the Social Security system. While growth in life expectancies creates a major fiscal challenge for policy makers, we explore targeted reforms that not only close the fiscal gap but do so in a way that recognizes that life expectancy gains have not occurred evenly across the income distribution. Before presenting the reform options, it is helpful to note that the implicit transfer share can be rewritten for convenience as where is the ratio of workers to retirees among type- individual With this notation in mind, we discuss two reform options. 3.1 Option #1: Fair Tax Reform This potential reform maintains the progressivity of Social Security through a simple tax adjustment that responds to asymmetries in life expectancy growth across the wage distribution. The basic idea is that wage types who experience the greatest gains in life expectancy would face the greatest increase in their contribution rate. Specifically, notice that to hold the variance of the implicit transfer share constant over time, it is enough to hold the transfer shares themselves constant over time for each . One way to do this is to hold constant over time the product within each wage type while leaving benefits intact. That is, policy makers could create a wage-dependent (progressive) tax that adjusts according to the following rule for some future calendar date If we establish a base calendar year , then policy makers could maintain the progressivity of Social Security that exists in that base year by charging a progressive tax that evolves over time as the ratio of workers to retirees evolves within each wage type. Notice that any wage type that experiences a reduction in the ratio of workers to retirees would need to contribute more to the system, and those wage types with the greatest longevity gains (the largest reduction in the ratio of workers to retirees) would face the largest increases in their contributions because they are responsible for placing the most strain on the Social Security budget. Figure 2 plots the fair tax reform function relative to across-the-board tax reform. 3.2. Option #2: Fair Benefit Reform Another way to maintain the variance of the implicit transfer share (and therefore preserve the progressivity of Social Security) is to reform benefits in a way that responds to asymmetries in life expectancy growth across the wage distribution. To do this, we can hold benefits constant over time relative to the worker-to-retiree ratio, , within each wage type. In other words, to hold constant over time it is enough to hold constant over time within each wage type (holding the tax rate constant). To do so would require a progressive benefit cut according to the following rule for some future date Like the fair tax reform option, this too brings fiscal balance to the Social Security system while preserving its progressivity. Figure 3 plots the fair benefit reform rule together with the across-the-board reform. Across-the-board reform keeps all of the bend points the same but reduces the slopes of the three segments from their current values of 90%, 32% and 15% down to 70%, 25%, and 12% (each new slope would be 77.47% of the current slope). But we showed previously that doing this would erase three-quarters of the progressivity of Social Security. The fair benefit reform option would also involve keeping the location of the bend points intact, but the slopes of the segments would change from their current values of 90%, 32% and 15% down to 86%, 21%, and 9%.16The three segments in our fair benefit reform do not actually have constant slopes, so we report the average slope of each segment as an approximation. To summarize, the reform options that we study have three important features. First, as the overall longevity of the population increases, the Social Security system would automatically adapt to maintain its fiscal solvency. Second, asymmetric changes in longevity across income classes (such as the recent widening of the gap in life expectancy across the wage distribution) would be accounted for in a way that maintains the degree of progressivity inherent in the base year. Third, the required adjustments to either taxes or benefits are very simple to make; policy makers would only need to know the ratio of workers to retirees by wage category in order to make the adjustments. While we have studied tax reform and benefit reform separately, one could design a hybrid reform option. Policy makers could pursue a mixture of tax and benefit reforms, and this could be done in a way that maintains progressivity. For instance, a small, uniform tax increase could be coupled with a targeted benefit cut that is designed to preserve the variance of the implicit transfer share. Moreover, it may be possible to preserve the variance of the implicit transfer share by adjusting the normal retirement age to be wage specific. We have presented only two of a variety of possible reforms. 4. Welfare Analysis Our purpose here is to estimate the potential welfare effects associated with fair tax and benefit reforms relative to across-the-board reforms. We use a standard, Yaari-style model that has been augmented to include heterogeneity in wages, heterogeneity in survival risk, and a Social Security program. Individuals consume and save rationally in the face of longevity risk and take into consideration Social Security taxes and benefits. An individual’s consumption is and utility from consumption is , where and . Future utility is discounted at rate . Annuity markets are closed, and for simplicity all saving is done in a risk-free account, , with interest rate . At individuals learn their wage type , and they take as given , , and choose according to We denote the solution consumption path . For CRRA utility , Ex ante welfare is defined as17Our welfare measure has two equivalent interpretations. While we speak of the ex ante welfare (expected utility) of individuals who have not yet realized their wage type, our welfare measure can be interpreted equivalently as utilitarian social welfare with heterogeneity in wage type. Alternatively, we could consider welfare from the perspective of individuals at various stages of the life cycle. Such an approach would allow us to study the fraction of individuals that would vote for different reform options Define as the optimal consumption rule in a world where across-the-board reforms are pursued immediately (at ), and as the optimal consumption rule in a world where fair reforms are pursued immediately.18We assume reform happens immediately to abstract from uncertainty about the timing and structure of policy reform. See Bütler (1999), Gomes, Kotlikoff, and Viceira (2012), Luttmer and Samwick (2012), Caliendo, Gorry, and Slavov (2015), and Kitao (2017) for studies that estimate the welfare cost of uncertainty about Social Security reform The compensating variation, , is defined as the percentage of lifetime consumption that individuals are willing to give up to live in a world with fair reform The idea here is that reform is going to take place one way or another in our model, and we calculate the welfare gains associated with fair reform relative to across-the-board reform. Unless we say otherwise, we use in the calculations below. Larger values of will enhance the welfare gains from fair reform, while smaller values will reduce the welfare gains. We begin with the assumption , but we will report sensitivity analysis on this assumption. We emphasize that our welfare analysis is simplified in at least three ways. First, our ex ante welfare measure is a steady-state measure that does not take into account the effects on transition generations. Such generations would be surprised by an announcement at any particular date and their lifetime well-being would be different than those born under the new system. Ignoring transition generations would tend to overstate the welfare gains from fair tax reform. For example, the welfare of workers who are close to retirement does not depend very much on whether the government pursues a fair tax reform or an across-the-board tax reform since these workers are almost done paying taxes anyway. Second, while our ex ante “behind the veil” welfare measure is standard, we could have used other welfare weights across the income distribution. For instance, we could put more weight on individuals in the low end of the distribution than is implied by the probability density function, and doing so could increase the welfare gains associated with the fair reforms that we study. Moreover, an improvement in our ex ante welfare measure does not imply a Pareto improvement in the sense that the individual is ex post better off for any wage realization. Third, while our analysis captures the standard connection between risk aversion and willingness to insure risk, the welfare effects generated by our model are simple approximations that do not capture the effects that different reform options might have on labor supply, capital formation, and factor prices. 4.1. Welfare Gains from Fair Tax Reform We first compute the welfare gains from fair tax reform. To do this, we calculate consumption in the across-the-board reform world by solving the individual’s optimization problem with a constant Social Security tax rate of 14.5% over the entire life cycle since this is the common tax rate that, according to the calculations in our model, would be required to balance the aggregate Social Security budget. Likewise, we calculate consumption in a separate world with fair tax reform by solving the individual’s optimization problem with a wage-dependent Social Security tax as calculated in the previous section to maintain progressivity (i.e., to ensure the variance of the implicit transfer share is the same for the 1960 and 1930 birth cohorts). In both worlds, we use the survival probabilities associated with the 1960 cohort as well as the current Social Security benefit-earning rule. We find = 0.8%. This exercise tells us the fraction of lifetime consumption that an individual would agree to give up, ex ante, to be born into a world with fair tax reform rather than a world with across-the-board tax reform. Rational, forward-looking individuals in our model will give up 0.8% of their entire lifetime consumption expenditure. These large welfare gains are because fair reform acts as an insurance device for individuals facing ex ante uncertainty about their wage type. The coefficient of relative risk aversion plays a vital role in the welfare calculations. This parameter is unobservable and subjective, and the welfare results are sensitive to its value. While the value that we are using falls within the range of values commonly used in the related literature, small changes in this parameter can cause significant changes in the welfare results. For instance, if then the = 1.5%, which is nearly twice the size of the welfare gain when . On the other hand, if then the = 0.1% and hence the welfare gain from fair reform is small. The direction of these results is intuitive: individuals become virtually indifferent between across-the-board reform and fair reform as their risk aversion tends to zero. The parameters and do not affect the welfare calculations at the level of precision that we are reporting. For instance, holding at its baseline value of 1.5, we continue to obtain = 0.8% for all three of the following parameterizations: and ; and ; and 4.2. Welfare Gains from Fair Benefit Reform Alternatively, we repeat a similar exercise but for the case of benefit reform. We calculate consumption in the across-the-board reform world by solving the individualís optimization problem when Social Security benefits for each wage type are 77.47% of their current level (to keep the program solvent). This is known at to abstract from policy uncertainty. And we calculate consumption in a separate world with fair benefit reform by solving the individual’s optimization problem where the reduction in benefits maintains the progressivity of Social Security as described previously in our paper. In both worlds, we use the survival probabilities associated with the 1960 cohort and we leave the Social Security tax rate at its original level. We compute the compensating variation associated with fair benefit reform, which tells us the fraction of lifetime consumption that an individual would give up, ex ante, to be born into a world with fair benefit reform rather than across-the-board benefit reform. We find . This is an enormous welfare gain by any standard. Fair benefit reform, relative to across-the-board benefit reform, is a particularly valuable hedge against bad wage realizations. As with the case of tax reform, the coefficient of relative risk aversion plays an important role in the welfare calculations. Small changes in this parameter can have large welfare implications. For instance, if then the , which is nearly twice the size of the welfare gain when. On the other hand, if then the . Our basic point does not depend on the precise value of that we use, but the magnitudes of the welfare effects certainly do. The parameters and have a small effect on the welfare calculations. Holding at its baseline value of 1.5 we obtain: when and ; when and ; and when . The decision between targeted (fair) tax reform and targeted benefit reform is a difficult policy decision that is beyond our scope. A number of additional (unmodeled) factors would potentially be important to policy makers in such a consideration. For instance, we abstract from labor supply decisions and from other forms of taxation that affect the total tax burden facing households, including income and investments taxes. We also abstract from irrational behavior and instead assume individuals make optimal saving decisions; hence, we do not consider Social Securityís potential role in providing income protection for retirees who undersave. A deeper analysis of these issues may be important in the overall decision between a tax increase and a benefit cut. Our focus is to separately consider tax and benefit reforms, and to quantify the magnitude of the adjustments that would be needed to pursue distributionally-neutral reforms. High earners in the US have experienced large gains in life expectancy while those at the bottom of the earnings distribution have experience little or no gain in life expectancy. Therefore, high earners (on average) are responsible for the bulk of the projected fiscal strain on the Social Security system. We develop a measure of the progressivity of the Social Security system, and we track the degree to which the progressivity of the system is eroded by growth in the life expectancy gap. We find that the erosion of progressivity is economically significant, and we study welfare-improving reforms that are designed to maintain the progressivity of the system in the face of a widening life expectancy gap. Auerbach, Alan J., Kerwin K. Charles, Courtney C. Coile, William Gale, Dana Goldman, Ronald Lee, Charles M. Lucas, Peter R. Orszag, Louise M. Sheiner, Bryan Tysinger, David N. Weil, Justin Wolfers, Rebeca Wong (2017), How the Growing Gap in Life Expectancy May Affect Retirement Benefits and Reforms. National Bureau of Economic Research, Working Paper 23329. Alonso-Ortiz, Jorge (2014), Social Security and Retirement across the OECD. Journal of Economic Dynamics and Control 47, 300-316. Bagchi, Shantanu (2015), Labor Supply and the Optimality of Social Security. Journal of Economic Dynamics and Control 58, 167-185. Bagchi, Shantanu (2016), Is the Social Security Crisis Really as Bad as we Think? Macroeconomic Dynamics 20, 737-776. Bagchi, Shantanu (2017), Differential Mortality and the Progressivity of Social Security. Working Paper, Towson University. Bütler, Monika (1999), Anticipation Effects of Looming Public-Pension Reforms. CarnegieRochester Conference Series on Public Policy 50(1), 119-159. Bütler, Monika (2001), Neoclassical Life-Cycle Consumption: A Textbook Example. Economic Theory 17, 209-221. Caliendo, Frank N., Aspen Gorry, and Sita Slavov (2015), The Cost of Uncertainty about the Timing Social Security Reform. Utah State University Working Paper. Caliendo, Frank N., Nick L. Guo, and Roozbeh Hosseini (2014), Social Security is NOT a Substitute for Annuity Markets. Review of Economic Dynamics 17, 739-755. Coronado, Julia Lynn, Don Fullerton, and Thomas Glass (2011), The Progressivity of Social Security. B.E. Journal of Economic Analysis & Policy 11(1), 1-45. Cremer, Helmuth, Philippe De Donder, Dario Maldonado, and Pierre Pestieau (2008), Designing a Linear Pension Scheme with Forced Savings and Wage Heterogeneity. International Tax and Public Finance 15(5), 547-562. Cremer, Helmuth and Pierre Pestieau (2011), Myopia, Redistribution and Pensions. European Economic Review 55(2), 165-175. Gomes, Francisco J., Laurence J. Kotlikoff, and Luis M. Viceira (2007), The Excess Burden of Government Indecision. National Bureau of Economic Research, Working Paper 12859. Haan, Peter, Daniel Kemptner, and Holger Lüthen (2017), The Increasing Longevity Gap by Lifetime Earnings and its Distributional Implications. DIW Berlin Working Paper. Holzmann, Robert, Jennifer Alonso-Garcia, Heloise Labit-Hardy, and Andrés M. Villegas (2017), NDC Schemes and Heterogeneity in Longevity: Proposals for Redesign. ARC Centre of Excellence in Population Ageing Research, Working Paper 2017/18. Hosseini, Roozbeh (2015), Adverse Selection in the Annuity Market and the Role for Social Security. Journal of Political Economy 123, 941-984. Kitao, Sagiri (2017), Policy Uncertainty and Cost of Delaying Reform: The Case of Aging Japan. Review of Economic Dynamics, forthcoming. Leonesio, Michael V. and Linda Del Bene (2011), The Distribution of Annual and Long-Run US Earnings, 1981-2004. Social Security Bulletin 71(1), 17-33. Luttmer, Erzo F. P. and Andrew A. Samwick (2012), The Welfare Cost of Perceived Policy Uncertainty: Evidence from Social Security. Dartmouth College Working Paper. Slavov, Sita, Devon Gorry, Aspen Gorry, and Frank N. Caliendo (2017), Social Security and Saving: An Update. Working Paper, George Mason University. Yaari, Menachem (1965), Uncertain Lifetime, Life Insurance and the Theory of the Consumer. Review of Economic Studies 32(2), 137-150.
<urn:uuid:7ae35d78-6ee2-442c-b03a-20ab6bf58c10>
CC-MAIN-2023-50
https://www.thecgo.org/research/social-security-and-the-increasing-longevity-gap/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.931369
8,986
2.53125
3
By 9.30am today I will have skyped Malawi, emailed Ghana, Facebooked Nepal, paid a bill online and used the satnav on my mobile phone. It feels a long time since we first got colour TV at home and, years later, when I accessed the internet using a dial-up modem. When I recalled these moments to my son he yawned. Aged, 19, he doesn’t remember a time before ubiquitous connectivity. According to a new report from the World Bank, more than 40% of the global population now has internet access. On average, eight in ten people in the developing world own a mobile phone. Even in the poorest 20% of households this number is nearly seven in ten, making cellphones more prevalent than toilets or clean water. There is no doubt that the world is experiencing a revolution of information and communication technology, bringing about rapid change on a massive scale. But despite great expectations for the power of digital technologies to transform lives around the world it has fallen short and is unevenly distributed, with the most advantages going, as ever, to the wealthy. The World Bank argues that increasing connectivity alone is not going to solve this problem. Around the world, digital investments bring growth, jobs and services. They help businesses become more productive, people to find better life opportunities and governments to deliver stronger public services. At their best, the report finds that inclusive, effective digital technologies provide choice, convenience, access and opportunity to millions, including the poor and disadvantaged. For example, in the Indian state of Kerala the community action project Kudumbashree outsources information technology services to cooperatives of women from poor families – 90% of whom had not previously worked outside the home. The project, which supports micro-credit, entrepreneurship and empowerment, now covers more than half the households in the state. The World Bank also emphasises that the poorest individuals can benefit from digital technologies even without mobile phones and computers. Digital Green, an NGO working with partners in India, Ethiopia, Afghanistan, Ghana, Niger and Tanzania, trains farmers using community-produced and screened videos. Many governments are using the most of positive digital dividends to empower their citizens. In countries with historically poor birth registration, for example, a digital ID can provide millions of people with their first official identity. This increases their access to a host of public and private services, such as voting, medical care and bank accounts, enabling them to exercise their basic democratic and human rights. For every person connected to high-speed broadband, five are not. Worldwide, around four billion people do not have any internet access, nearly two billion do not use a mobile phone, and almost half a billion live outside areas with any mobile signal. Divides persist across gender, geography, age and income. Those who are not connected are clearly being left behind. Yet many of the benefits of being online are also offset by new risks. The poor record of many e-government initiatives points to high failure of technology and communications projects. Where processes are already inefficient, putting them online amplifies those inefficiencies. In Uganda, according to the World Bank, electronic tax return forms were more complicated than manual ones, and both had to be filed. As a result, the time needed to prepare and pay taxes actually increased. The report cites the risk that states and corporations could use digital technologies to control citizens, not to empower them. The general disruption of technology in the workforce is complex and yet to be fully understood, but it seems to be contributing to a “hollowing out” of labour markets. Technology augments higher skills while replacing routine jobs, forcing more workers to compete for low-skilled work. This trend is happening around the world, in countries of all incomes, demonstrated by rising shares in high and low-skilled occupations as middle-skilled employment drops. The World Bank notes that: The digital revolution can give rise to new business models that would benefit consumers, but not when incumbents control market entry. Technology can make workers more productive, but not when they lack the know-how to use it. Digital technologies can help monitor teacher attendance and improve learning outcomes, but not when the education system lacks accountability Not surprisingly, the better educated, well connected, and more capable have received most of the benefits —- circumscribing the gains from the digital revolution. The report emphasises that investment in connectivity itself is not enough. In order to achieve the full development benefits of digital investment, it is essential to protect internet users from cybercrime, privacy violations and online censorship, and to provide a full set of “analogue complements” alongside. These include: Ultimately, while the World Bank continues to champion connectivity for all as a crucial goal, it also recognises the tremendous challenge in achieving the essential conditions needed for technology to be effective. In my privileged home, digital technology brings me choice and convenience. It will be a long time before the digital revolution brings similar returns for everyone, everywhere.
<urn:uuid:ccee57b0-66c0-4b5e-bf7e-36e04c835501>
CC-MAIN-2023-50
https://www.thenewsminute.com/article/connecting-everyone-internet-won-t-solve-world-s-development-problems-38516
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.945268
1,024
2.96875
3
[ pˈat͡ʃɪsˌandɹə pɹˈɒkʌmbənz], [ pˈatʃɪsˌandɹə pɹˈɒkʌmbənz], [ p_ˈa_tʃ_ɪ_s_ˌa_n_d_ɹ_ə p_ɹ_ˈɒ_k_ʌ_m_b_ə_n_z] Related words: pachysandra procumbens meaning, pachysandra procumbens leaves, pachysandra procumbens invasive, pachysandra procumbens wiki, pachysandra procumbens plant care, pachysandra procumbens plant, pachysandra procumbens planting instructions How to use "Pachysandra procumbens" in context? The Pachysandra Procumbens is a shrub that can be found in many parts of the United States. The plant is Native to North America, and it is a member of the lily family. The Pachysandra procumbens grows to be about 3 feet tall, and it has fragrant white or pink flowers that can be seen in late spring and early summer. The leaves of the Pachysandra procumbens are spreads out and they have a slightly serrated shape. Word of the Day
<urn:uuid:0fc55924-0663-4c50-84ac-38ce4597bfe0>
CC-MAIN-2023-50
https://www.thesaurus.net/pachysandra%20procumbens
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.814456
307
3.0625
3
Indian economy is one of the fastest growing economies in the world. But it was a completely different scenario in 1991. The year when new policies and reforms were introduced. The year which serves as a backbone to many of the current policies and decisions. So, how exactly was the situation of India during the time of 1991? What were the major economic reforms in India that took place and changes the scenario? Let us study this in detail. Economic Reforms in India It was during Narasimha Rao’s government in 1991, that India met with the economic crisis which occurred due to its external debt. Due to debt, the government was not able to make the payments for the borrowings it had made from the foreign countries. As a result, the government had to adopt new measures to reform the conditions of the Indian economy. There were many programs and initiatives introduced primarily consisted of liberalization, privatization, and globalization. Browse more Topics under Liberalization Privatisation And Globalisation The Crisis of 1991 and the Reforms The crisis of 1991 happened largely due to inefficient management of the economy of India in the 1980s. The revenues that government was generating were not enough to meet the ever increasing expenses. Thus, the government had to borrow to pay for the debts and thus was caught in a term called debt-trap. Debt-trap is the deficit that occurs due to an increase in government expenses in comparison to the government’s revenue. Due to the failure of earlier economic policies till 1990 there was a need for need for new economic policies. The situation was worsening as India had foreign reserves which could last only for the next two weeks. There was a shortage of new loans and Indian people living abroad (NRIs) were withdrawing money in large amounts. There was a little confidence for international investors towards the Indian economy. These points will highlight the need for a new economic policy in India. Crisis in Gulf countries, increase in fiscal deficit, prices rising, the worse balance of payments, public sector units (PSUs) performing badly, and many more. The Emergence of New Reforms India approached the world and international monetary fund for loan and received $7 million to manage their crisis. As a result to this, international firms and agencies expected that India will open up the door in the country by removing various restrictions majorly on private sector and thereby removing the trade restrictions between India and the other foreign countries. India agreed to the terms and conditions and as a result, new reforms were introduced. These economic reforms in India are structurally classified as liberalization, globalization, and privatization. Liberalization was brought up with the fact that any restrictions which became a hindrance to development and growth will be put to an end. Largely, this reforms made government regulations and policies lose. It allowed for opening up of economic borders for foreign investment as well as multinationals. There were many economic reforms introduced under liberalization. These included expansion of production capacity, abolishing industrial licensing by the government, de-reserving producing areas, and freedom to import goods. Privatization largely refers to giving more opportunities to the private sector, such that the role of the public sector is reduced. The main objectives of privatization are reducing the workload of the public sector, providing better goods and services to the end users, improving the government’s financial condition, and many more. Privatization is a way to allow the entry of foreign direct investments and bringing healthy competition into the economy. Globalization in simpler terms is to connect with the world. In this context, globalization means the integration of the economy of India with that of the world. Thus, it encourages private and foreign investment and also foreign trade. Globalization attempts to establish the links in such a way that the Indian happenings can be met by the world or vice versa. Major Highlights on the Economic Reforms in India - During the reform period, the growth in service was increasing, while the agriculture sector saw a decline, and the industrial sector was fluctuating. - The opening up of the Indian economy led to a sharp increase in the FDIs and foreign exchange reserve. - This foreign investment includes foreign institutional investment and direct investment. - India is one of the successful exporters of engineering goods, auto parts, IT software, textiles during the time of the reforms. - The price rise during the reforms was also kept under control. Failures of the Economic Reforms in India - The agriculture sector was neglected and the public investment in this sector was reduced and hence the infrastructure areas were affected. - The subsidies on the fertilizers were removed and hence it led to an increase in the cost of production which affected many marginal and small farmers. - Further, many policies were introduced which reduce the import duties on agriculture products, reduce the minimum support price increased the threat of international organizations competing with th3 the local farmers. - The industrial sector saw uneven growth. - The imports were made cheaper as a result of which the demand for the industrial goods reduced. - The globalization which allowed for free trade between the countries affected adversely on the local industries and thus affected employment opportunities. - The reforms led to an increase in economic colonialism. - It also led to the erosion of culture. - The investments in many infrastructural facilities like power supply were inadequate. Solved Question for You Q. In what two groups can be the reforms be categorized? Answer: The reforms can be categorized into - Stabilization Measures - Structural Reform Policies. Stabilization measures are short-term in nature and attempt to control the crisis situation by maintaining sufficient foreign exchange reserves. Structural reform policies are long-term policies that attempt to improve the overall economic condition by increasing the international competitiveness and removing the rigidities and other restraining obstacles. This concludes our discussion on the topic of the major economic reforms in India.
<urn:uuid:7a23246d-9b3b-4673-83dc-33f08a4a9fa8>
CC-MAIN-2023-50
https://www.toppr.com/guides/economics/liberalization-privatisation-and-globalisation/indian-economy-during-reforms/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.969977
1,210
3.484375
3
Ever since the discovery of his lost grave in Leicester, the eyes of the world have been drawn to the twists and turns surrounding England’s King Richard III… Annette Carson, acclaimed author and expert on Richard’s reign (and one of the team who found him), has published A Small Guide to the Great Debate, a brief summary of the main arguments concerning his actions and reputation. Carson has researched and written extensively on Richard III. Her book Richard III: The Maligned King (The History Press, 2008) was revised in 2013 and sold out within 3 months. The print edition of A Small Guide was published on 1 July this year and is already stocked, in hundreds, by visitors’ centres at Leicester, Bosworth Battlefield and elsewhere. Written as a succinct, straightforward summary of the facts, this short handbook outlines how King Richard came to be portrayed as a monster-villain by the Tudors, and how a backlash in later centuries created the ‘Great Debate’ over his reputation, which still rages today. It also analyses the mystery of the ‘Princes in the Tower’, examining what people actually said and did at the time of their disappearance, and who profited from their removal. The book sets out all the main theories and arguments, together with their strengths and weaknesses, in a non-scholarly style, without imposing judgements and conclusions. An invaluable reference resource, it invites readers to weigh up the evidence and make up their own minds. Recommended for anyone interested in Richard III, for libraries and also as a reference for the media, A Small Guide sticks to the verifiable facts while offering insights you won't find in conventional history books.
<urn:uuid:58449b8b-c72c-4188-9df9-e7819e6b49df>
CC-MAIN-2023-50
https://www.troubador.co.uk/bookshop/history-politics-society/richard-iii-a-small-guide-to-the-great-debate
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.960042
351
2.625
3
Anti Bird Nets Karmanghat Birds are a very common sight in big cities. These birds include crows, pigeons, sparrows and other birds of the same family. Wherever birds are there, bird nests and bird droppings are close by. These birds are on the constant lookout for a safe spot to build their nests and lay their eggs. These nests are built in small spaces which are protected by shelter from various weather phenomenon. Along with it, these nests are built very close to food sources. Given the circumstances and the requirements to build a nest, the most common places are old buildings, air vents, ducts, balconies, heritage sites, residential or apartment complexes and commercial buildings. Once a safe spot is chosen by the bird, a great amount of effort and time is spent in finding the right materials to build their nests. The most common way to find these materials by the destruction of their surroundings. This results in a great deal of physical damage. The usual targets are roof tiles, concrete, wires or cables, insulators and any sort of fabrics. Birds usually steal clothes left out to dry in an effort to build a comfortable nest to lay the eggs and raise their young. The real problem starts after the nest is built. Some of the major problems are listed below - Bird Droppings: Bird droppings are the most common sight in a big city infected with birds. These bird droppings give out a very foul smell which is unbearable and quickly spreads throughout the building. These bird droppings are extremely hard to clean and are the source of multiple communicable diseases. These are considered to be extremely dangerous to people especially young children and old people who do not have a strong immune system. We can prevent this from happening is by buying anti-bird nets. - Diseases: Birds are universally known to be carriers of hundreds of types of parasites, bacteria, viruses and other micro-organisms. These minute creatures are the source of many infectious diseases. During a pandemic time like this, extra precaution has to be taken to ensure the safety of everyone involved. The easiest way to do this is by installing Anti-Bird nets. - Noise: It is a common knowledge that birds are loud and noisy. These birds are a nuisance to the entire community and are constantly disrupting the peace and quiet. It is far worse if there is a new born baby in the house or the society. The smallest noise could wake the baby up and cause huge amounts of trouble. The simple solution to this problem is the installation of anti-bird nets. - Aggressive Behaviour: Animals and birds are very instinctive. The show aggressive behaviour when they are threatened. This aggressive behaviour increases exponentially when their young is considered. Once the eggs are laid, birds are territorial and display aggressive behaviour in an attempt to protect their nest and young. Numerous reports show bird attacks are very common in large cities. We can prevent this attack by using anti-bird nets.
<urn:uuid:ae3f0dfb-16f7-4935-b8d4-a43ab04c4034>
CC-MAIN-2023-50
https://www.tulasisafetynets.com/anti-bird-nets-in-karmanghat.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.960157
603
2.953125
3
Diversity and Social Justice Character Strengths & Virtues in Context Research in the field of positive psychology has often taken a universal or etic approach to constructs like character strengths and virtues. However, virtue ethics traditions tend to emphasize ways character strengths and virtues are shaped by particular cultural, religious, and philosophical traditions. Thus, we believe it is crucial to value and explore diverse understandings of character strengths and virtues and ways these constructs need to be nuanced and adapted across differing contexts. We find it helpful to utilize a dialectical approach to research using both etic and emic approaches to investigate generalizable patterns and exceptions to those patterns that are unique to particular persons and contexts. Our team includes scholars who experts in integrating research and practice on strengths and virtues with diversity awareness and cultural and religious contextualization. Social Justice & Positive Psychology There are important questions to ask about systemic justice and social power in relation to positive psychological functioning. We are encouraged by emerging efforts to bring positive psychology into conversation with critical psychology, multicultural psychology, and indigenous forms of psychology. Certain character strengths and virtues (e.g., hope, humility) have been found to be positively related to commitments to social justice, yet it is also important to better understand ways forces of social oppression tax human resilience and can compromise the expression of certain strengths and virtues. While the cultivation of healthy virtues often leads to flourishing, we are also listening to scholars who have noted the “burdened virtues” (Tessman, 2005) of some oppressed groups who have necessarily developed certain strengths for survival rather than well-being. Diversity & Flourishing Human flourishing also needs to be further investigated with (a) attention to diverse understandings of flourishing and (b) consideration of systemic and sociocultural factors that impact differences in flourishing. Holistic and communal forms of well-being represent mental health goals that better fit the cultural worldviews and values of many clients than does the disease model focus on symptom alleviation that dominates mental healthcare in the United States (US). Therefore, we are conducting clinical studies that assess holistic forms of well-being and flourishing as both processes and outcomes in various approaches to treatment while also tracking reductions in symptoms. Dismantling the mental health consequences of white supremacy, systemic racism, and other forms of oppression in the US also requires clinical research and practice that (a) examines pathways to flourishing for all people, not just dominant group members, and (b) interrogates organizational dynamics in mental healthcare that perpetuate prejudice and inequities in flourishing. We are investigating the thesis that respecting and valuing human diversity is a vital aspect of positive mental health and flourishing in our contemporary world.
<urn:uuid:542f34cd-9a4a-4dfb-90c9-09a4aa669dfe>
CC-MAIN-2023-50
https://www.virtueandflourishing.com/diversity-considerations
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.944439
540
2.515625
3
Charcot-Marie-Tooth disease (CMT) is a genetically and clinically heterogeneous polyneuropathy characterized by progressive motor and sensory deficits. It is one of the most common inherited causes of neuropathy. Symptoms of weakness in the limbs and sometimes the hands are often first noted in late childhood or early adulthood. It may be accompanied with mild to moderate sensory loss and sometimes neuropathic pain. There is usually some atrophy of small muscles in the hands and feet. Deep tendon reflexes are often depressed, and it is common for pes cavus (a fixed plantar flexion, ie, the arch of the foot does not flatten when bearing weight) and hammer toes to develop. Several dominant forms of CMT are related to mutations in a tRNA synthetase and activation of a integrated stress response. CMT can be subdivided into two large groups on the basis of electrophysiologic criteria: CMT1 is the demyelinating form and CMT2 the axonal form. Patients with primarily distal motor neuropathy are sometimes considered to comprise a third type. Nerve conduction velocity is reduced and electromyography can also be diagnostically helpful. It may be helpful to look for characteristic changes such as loss of myelinated fibers and the presence of focal myelin sheath folding in sural nerve biopsies. Early-onset glaucoma, optic atrophy, and sensorineural hearing loss are found in some families. Dementia and intellectual deficits are not generally a part of CMT. ICD10CM: G60.0 – Hereditary motor and sensory neuropathy SNOMEDCT: 398100001 – Hereditary motor and sensory neuropathy Differential Diagnosis & Pitfalls Various features of CMT may be mimicked by other disorders. The hereditary motor neuropathies do not have sensory features, while the hereditary sensory neuropathies usually have few motor symptoms. Sporadic disease in individuals without a family history is more likely to have a neuropathy due to inflammation or infections. HIV, syphilis, an occult neoplasm, vitamin deficiency (eg, thiamine), or metal intoxication may have an associated neuropathy. Diabetes mellitus and alcohol use disorder must be ruled out.
<urn:uuid:d9310d0d-f42d-42aa-b38a-206fe432b611>
CC-MAIN-2023-50
https://www.visualdx.com/visualdx/diagnosis/charcot-marie-tooth+disease?diagnosisId=52628&moduleId=101
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.923826
468
3.328125
3
What did we find about the production of woollen cloth in Wales? Wool has been spun and woven in Wales for hundreds of years, but only became an important cottage industry when Cistercian monasteries were established in the 12th century. The monks appear to have supported the development of trade and built fulling mills, enable the production of cloth that became known for it's quality. By 1450, there was a busy export trade in woollen cloth from Wales and this was controlled by the Shrewsbury Drapers Company who received a Royal Charter in 1462 and had a virtual monopoly to buy Welsh wool and sell it on, becoming very wealthy, click HERE to go to the informative Shrewsbury Drapers Company site. Nigel Hinton, is a Freeman of the Shrewsbury Drapers and the author of 'Shrewsbury Drapers Company 1462-2017, The Legacy'. Nigel, and fellow Draper Gaynor, have been very active in the project and Nigel prepared an essay for us about the history of the Shrewsbury Drapers - click HERE Nigel also introduced us to the writing of William Davies in 'General View of the Agriculture and Domestic Economy of North Wales', published in London in 1810 Click HERE to get to the National Library of Wales on line eversion of this book recalling information collected in 1799 about the trade in wool in Mid Wales. Wikipedia has an excellent site on the Welsh Woollen Industry, which is updated regularly - last one on 25 12 19. It provides a lot of information very clearly and several members of the project team have mentioned that we should thank the writer of the page which has got better and better during the year!
<urn:uuid:2a5d20bd-f580-465f-8b00-b01959531e2e>
CC-MAIN-2023-50
https://www.welshplains.cymru/index.asp?pageid=707383
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.974242
356
3.109375
3
Farmers' livelihoods are at risk as some discover 'forever chemicals' in the soil DEBBIE ELLIOTT, HOST: The discovery of so-called forever chemicals is upending the lives and livelihood of a young farming couple in rural Maine. They are among a small but growing number of farmers nationwide affected by an agricultural practice that has left a toxic legacy in some places. Kevin Miller with Maine Public Radio reports. KEVIN MILLER, BYLINE: The temperature was in the single digits one recent morning as Johanna Davis and Adam Nordell walked along a snowy path to a large greenhouse on Songbird Farm. Inside, it was less frigid but still cold. Yet underneath thin sheets of fabric, clumps of green were sprouting from the icy earth. ADAM NORDELL: Spinach is amazing. Spinach can just hang out in the bone-cold frozen soil at 15 degrees below. And then once it warms up, it is able to move water around and perk right up. MILLER: Adam and Johanna had planned to sell spinach and other leafy greens this winter, but all of their plans for this 20-acre vegetable and green farm are now on hold. Just before Christmas, the couple learned the water they drink and give to their toddler son contained 400 times more PFAS than the state of Maine says it's safe to drink. Soils and some crops on their organic farm are also contaminated. JOHANNA DAVIS: Complete crisis, just devastated, heartbroken, really angry. MILLER: PFAS has been widely used to manufacture everything from nonstick cookware and waterproof ski jackets to fast food wrappers and grease-resistant paper plates. But some of the chemicals have been linked to cancer, kidney malfunction, high cholesterol and decreased vaccine response in children. Critics have dubbed PFAS, which is short for per- and polyfluoroalkyl substances, as forever chemicals because they don't break down easily, including during wastewater treatment. For decades, sewage treatment plants provided free sludge to farmers for fertilizer. More than 5 billion pounds of these biosolids were spread on land in 2019, according to federal data. LINDA LEE: PFASes in the biosolids aren't affecting plant health. MILLER: Linda Lee is a Purdue University professor studying the connection between sludge and PFAS contamination. LEE: But we are concerned that if they leach to quantities that are of concern in our groundwater, we're not happy. Lee says while PFAS do show up in waste because they're so ubiquitous in consumer products, your average household sludge is likely not an issue. When the PFAS levels are extremely high in sludge, there's almost always an industrial source involved. LEE: I do have concerns about any of the paper mill industries that are using PFAS as coatings. That could really put a high load in the waste products. MILLER: PFAS have also cropped up on farms in other states, including New Mexico, Colorado and Alabama. Michigan officials recently found high levels on a cattle farm that provided beef to local schools. Two Maine dairy farms are shut down, but state officials and agricultural leaders are bracing for more. MELANIE LOYZIM: It's like a nightmare you can't wake up from. MILLER: Melanie Loyzim is commissioner of the Maine Department of Environmental Protection, which identified 700 high-risk sites based on decades of sludge-spreading permits. LOYZIM: People's homes and livelihoods have been destroyed, and the scale of the tragedy keeps growing with every sample we take. MILLER: Johanna Davis and Adam Nordell say records show sludge was spread decades before they bought their farm in 2014. One source was a treatment plant that processes waste from a paper mill that reportedly used PFAS. Inside their farmhouse by a warm woodstove, the couple vacillates between fear, anger and frustration. They're most concerned about their 3-year-old son, given research on how PFAS affects developing bodies. And they're worried about other people. DAVIS: You know, who is drinking water right now that's as high as ours? You know, who's about to have a baby? Who's - you know, about thinking about having a baby? You know, I mean, it's so too late. It's so too late to be telling everybody this, and it can't be soon enough. MILLER: Maine lawmakers set aside $30 million in the current budget to cover the costs of testing those 700-plus sites and to assist homeowners. And state officials are exploring ways to compensate affected farmers, like Adam and Johanna. But the state is also reviewing proposals from legal firms willing to represent Maine in lawsuits against the chemical manufacturers. For NPR News, I'm Kevin Miller in Unity, Maine. (SOUNDBITE OF MUSIC) Transcript provided by NPR, Copyright NPR.
<urn:uuid:c5c3e7ca-ebe4-40d0-826b-aa32c8d8d207>
CC-MAIN-2023-50
https://www.wglt.org/2022-03-13/farmers-livelihoods-are-at-risk-as-some-discover-forever-chemicals-in-the-soil
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.959625
1,040
2.59375
3
If you thought hermits led austere, frugal lives of solitude you would only be partly right. A new book by Simon Roffey, Reader in Medieval Archaeology at the University of Winchester unearths some surprising facts about hermits. Some were medieval celebrities sought out by royalty and bishops while others lived in relative luxury supported by noble patronage. Simon has made the first comprehensive archaeological study of the UK’s hermitages, anchorite cells and eremitic communities. Although many hermits were men of faith, or mystics, seeking a life of contemplation they often had jobs as ferrymen, guides or lighthouse keepers. ““The majority were religious, and some were made saints, like St Cuthbert. To live as a hermit was considered by many churchmen to be the religious life par excellence,” says Simon. “And many lived a life of intense prayer and devotional practice.” Many hermits became famous. St Robert of Knaresborough developed such a reputation as a wise and holy man that King John visited him in his Yorkshire cave hoping to glean some sage advice. The occupant of Warkworth Hermitage lived in a complex cave hewn out of a cliff-face which had an inner chamber, chapel and kitchen. The hermit in residence was kept in relative comfort thanks to a stipend from the Duke of Northumberland. Both Warkworth and the hermitage at Pontefract show evidence of seating – in effect waiting rooms – suggesting the hermits were far from solitary and there was a queue of people to see them. Most hermits were male, but most anchorites were women. Anchorites lived in closed-off cells attached to religious communities. Many of these have survived to this day as vestries and store houses. Simon explains that despite their voluntary incarceration, these female mystics, many from high-born families, often had servants and pets. So being a recluse did not mean you had to be on your own. In fact, there were whole eremitic communities, such as Skellig, off the coast of Ireland, where the monks lived alone together in single-person stone huts. The reformation in the mid-sixteenth century destroyed the eremitic way of life but Simon says hermitages started to re-appear in the eighteenth century in the form of ornamental hermitages designed to give a religious aesthetic to the gardens and palaces of the aristocracy. One example being the 'hermitage' built in the designed gardens at Stowe in Buckinghamshire. An Archaeological History of Hermitages and Eremitic Communities in Medieval Britain and Beyond by Simon Roffey is published by Routledge. Simon is pictured above with statue of St Robert of KnaresboroughBack to media centre
<urn:uuid:7bda1b0e-698d-4573-850c-0432b0ac2886>
CC-MAIN-2023-50
https://www.winchester.ac.uk/news-and-events/press-centre/media-articles/simon-shines-some-light-on-the-life-of-medieval-hermits.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.976716
599
3.4375
3
Why Are Cats Afraid of Balloons? Popping the Fear Myth Cats are fascinating creatures known for their playful and curious nature. However, there's a common myth that cats are terrified of balloons. In this article, we'll explore the truth behind this notion, delving into why some cats may exhibit fear towards balloons and how you can help your feline friend overcome this fear. Understanding the Fear Why Are Cats Afraid of Balloons? The Role of Instinct Cats are natural hunters, and their instinctual response to unexpected sounds or movements is to associate them with potential threats. Balloons, resembling large, floating objects, can trigger this survival instinct. Signs of Fear How to Recognize Fear in Your Cat It's crucial to understand when your cat is afraid. Common signs include dilated pupils, flattened ears, a puffed-up tail, and hissing or growling. Recognizing these signs can help you respond appropriately. The Fight or Flight Response Cats may react to their fear of balloons by either fleeing the scene or becoming aggressive. Understanding this response can prevent accidents or injuries. Helping Your Cat Overcome Balloon Fear One effective method is to desensitize your cat to balloons gradually. Start by placing a deflated balloon in the room and observe your cat's reaction. Over time, slowly inflate the balloon, allowing your cat to get used to it. Offer treats and playtime around balloons to create positive associations. This can help your cat associate balloons with enjoyable experiences rather than fear. Myth: All Cats Fear Balloons Not all cats are afraid of balloons. Some may be indifferent, while others may even find them amusing. It varies from cat to cat. Myth: Fear Cannot Be Overcome With patience and positive reinforcement, most cats can overcome their fear of balloons. In conclusion, while the myth that cats are universally afraid of balloons persists, it's essential to understand that each cat is unique. By recognizing the signs of fear and employing gentle methods to help them overcome it, you can ensure a happier and more relaxed feline companion. Are there specific breeds of cats more prone to balloon fear? No, balloon fear is not linked to any specific cat breed. It depends on the individual cat's temperament and experiences. Can balloon fear lead to long-term anxiety in cats? In rare cases, extreme and prolonged exposure to a fear-inducing stimulus like balloons could contribute to anxiety. However, most cats can recover with proper care. Should I discipline my cat if it reacts fearfully to balloons? No, disciplining your cat can worsen their fear. Instead, focus on creating positive associations and providing a safe environment. Can balloons be dangerous for cats? In some cases, if a cat attempts to play with or bite a balloon, it can pop and startle the cat. It's essential to supervise their interactions with balloons. Are there other common fears or phobias in cats?
<urn:uuid:b75bdf4e-7f86-4283-aa13-e0a8b58b2233>
CC-MAIN-2023-50
https://www.wingsbirdpro.com/2023/09/why-are-cats-afraid-of-balloons-popping.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.925628
617
2.796875
3
Independent Evaluation of Hirola Antelope Beatragus hunteri Conservation Status and Conservation Action in Kenya. Technical Report, September 2000. 189 Seiten. DOI: 10.13140/RG.2.1.1129.2246 The hirola (or Hunter’s antelope) Beatragus hunteri is a "Critically Endangered" genus and species endemic to south-east Kenya and south-west Somalia. This report compiles much of the information that is available on this species, and reviews and evaluates its taxonomy, abundance, distribution, and conservation status. This report also evaluates the major activities implemented on behalf of the conservation of the hirola and makes recommendations for the conservation of this species/genus both in situ and ex situ. The hirola is one of the world’s most threatened genera of large mammal. This species is now either in low numbers or extinct in Somalia. The natural population in Kenya declined from about 14,000 individuals in the l970s to somewhere between 500 and 2,000 animals today.The historic range of the hirola in Kenya and Somalia is estimated at roughly 38,400 km2. The range of the hirola in Kenya declined from about 17,900 km2 in the 1960s to approximately 7,600 km2 in 1996. Today, only the central portion of the species’ historic range in Kenya is occupied. In 1963, a founder population of 10-20 hirola was released into Tsavo East National Park. This population grew to 79 individuals by 1996. In 1996, another 29 hirola were placed into this population. There were an estimated 105 hirola in the Tsavo population in 1998. This population now ranges over an area of ca. 600 km2. The decline of the hirola on the species’ natural range is probably due to a combination of factors, including disease, drought, poaching, competition with livestock, habitat loss and degradation. This report discusses the possible contribution of each of these factors to the decline of the hirola. The most likely scenario is that a combination of rinderpest and food shortage (due to drought, competition with livestock and habitat loss/degradation) caused the natural population of hirola to crash between 1983 and 1985, from at least 10,000 animals to fewer than 2,000 animals. Continuing disease and poaching on the natural range have probably combined to prevent this population from recovering. The following are among the more important recommendations put forth in this report for the conservation of the hirola: - Transfer the focus of the field research programme from the ex situ population in Tsavo East National Park to the in situ “natural population” in Garissa District and increase the number of Kenya and Somali researchers. - Abandon attempts to determine the absolute size of the natural population of hirola and begin a monitoring program that provides information on relative population size and population trend. - Future translocations from the natural population to new sites should only capture yearlings. This should be done by darting from a helicopter. There appears to be no good rational for capturing adults or for capturing entire groups. - Retain at least part of the populations of newly translocated hirola in large (4-10 km2) bomas. This should significantly enhance population establishment and growth. - Every effort needs to be made to save the hirola in situ while establishing several ex situ populations and a captive population as “insurance” against the possible failure to save the in situ population. To help ensure the long-term survival of the hirola, five additional populations should be established in Kenya and a viable captive population must be established outside of Kenya. The priority site for the introduction of the next population of hirola on a KWS managed area is Meru National Park, followed by Tsavo West National Park. The priority site for the establishment of a hirola population on a private game sanctuary is the Ol Jogi (Pyramid) Wildlife Sanctuary, followed by the Athi River Game Ranch. Most of the founder animals for these new populations should come from the natural population in Garissa District, after careful and full negotiation with local stakeholders. As an initial undertaking, however, consideration should be given to translocating the threatened Mackinnon Group of 15 hirola from the heavily poached Kulalu Ranch (east of Tsavo East National Park) to the Ol Jogi (Pyramid) Wildlife Sanctuary. - KWS, with assistance from the Hirola Management Committee, should reestablish its presence within the natural range of the hirola. The priority should be to reestablish the KWS base at Ijara, followed by reestablishment of the KWS base at Massa Bubu. - KWS, with assistance from the Hirola Management Committee, needs to renew and greatly expand its conservation education, public awareness and public relations work within the natural range of the hirola, particularly in Garissa District. This might be achieved largely by working with and through the Harroru Community Hirola Conservation Group, the Garissa Development Committee and the Garissa District Administration. Preliminary observations on the circadian variation in site fidelity in Atelopus hoogmoedi (Lescure, 1974) (Anura, Bufonidae). Amphibian & Reptile Conservation 11(1) [General Section]: 45–50 (e136). Anhand von 14 markierten Männchen wurde die Ortstreue von Atelopus hoogmoedi überprüft. "In conclusion our observations, although sparse, seem to confirm that Atelopus hoogmoedi does indeed show strong diurnal and nocturnal site fidelity, during breeding and non-breeding seasons. Although several hypotheses may explain this, the fact that perch site return rate is the highest after dark supports the predation evasion hypothesis." Habitat Degradation and Seasonality Affect Physiological Stress Levels of Eulemur collaris in Littoral Forest Fragments. PLoS ONE 9(9): e107698. https://doi.org/10.1371/journal.pone.0107698 The littoral forest on sandy soil is among the most threatened habitats in Madagascar and, as such, it represents a hot-spot within a conservation hot-spot. Assessing the health of the resident lemur fauna is not only critical for the long-term viability of these populations, but also necessary for the future re-habilitation of this unique habitat. Since the Endangered collared brown lemur, Eulemur collaris, is the largest seed disperser of the Malagasy south-eastern littoral forest its survival in this habitat is crucial. In this study we compared fecal glucocorticoid metabolite (fGCM) levels, a measure of physiological stress and potential early indicator of population health, between groups of collared brown lemurs living in a degraded forest fragment and groups occurring in a more preserved area. For this, we analysed 279 fecal samples collected year-round from 4 groups of collared brown lemurs using a validated 11-oxoetiocholanolone enzyme immunoassay and tested if fGCM levels were influenced by reproductive stages, phenological seasons, sex, and habitat degradation. The lemurs living in the degraded forest had significantly higher fGCM levels than those living in the more preserved area. In particular, the highest fGCM levels were found during the mating season in all animals and in females during gestation in the degraded forest. Since mating and gestation are both occurring during the lean season in the littoral forest, these results likely reflect a combination of ecological and reproductive pressures. Our findings provide a clear indication that habitat degradation has additive effects to the challenges found in the natural habitat. Since increased stress hormone output may have long-term negative effects on population health and reproduction, our data emphasize the need for and may add to the development of effective conservation plans for the species. L'écologie de la mone de Campbell (Cercopithecus campbelli lowei) en Côte d'Ivoire. La Terre et la Vie 1969/2: 135-163. Lowe's guenon (Cercopithecus campbelli lowei) is still one of the commonest monkeys of the Ivory Coast. It is found in all forest types, from old mature rain forest to secondary growth. Although these monkeys spend most of their time in the middle and lower layers of the forest, they occasionally visit the canopy or descend to the ground. The various types of locomotion are described and illustrated. Most of the detailed information obtained on the ecology and behaviour of the Lowe's guenon is based upon observations made from 1967 to 1969 on a wild troop living on the grounds of the Swiss Research Center, at Adiopodoumé. The history of this group has been recorded since 1964. Comparative observations were made on various wild troops in western Ivory Coast, and on 2 free ranging pets at the Lamto field station in 1967. The home range of the Adiopodoumé troop is small, covering about 3 hectares. The monkeys use the same sleeping trees for long pcriods of time and regularly visit fruit trees and places where they are given bananas. There is no rigid daily time schedule, and most of the home range is visited every day. The wild troop does not allow adult foreign conspecifics to settle on its territory, but a one year old male infant was accepted in February 1969. The staple food of the Lowe's guenon consists of fruits, flowers and leaves. Thirty two species of food plants are recorded. The monkeys are also very fond of insects, which they activcly hunt both in trces and on the ground. Insect hunting is selective, some unpalatable species being deliberately rejected. Water is licked from leaves and branches, or scooped out of tree holes. Breeding is seasonal, all infants bcing born between midNovember and mid-January, at the very end of the long rains and the beginning of the dry season. Thus the females appear ta conceive during the annual peak in rainfall and during the annual decline in temperature. The social structure of the troop is described. Although it includes more males than females, the Adiopodoumé troop is a «one male group», centered around the adult male. He acts as a leader and spends a great deal of time watching. The «warning bark» is his prerogative. Unlike mature females who readily act as «aunts», the adult male does not show interest in infants, even newborn ones, and juveniles. However he allows them to play close to him. Subadult males are bolder and more inquisitive than any other troop member. Juveniles and infants are very active players. No overt and rigid social hierarchy exists within the troop, although in certain circumstances younger individuals give way ta older ones. Early in 1969 a splitting of the group was observed. It took place progressively and quietly. In February, two males, 4 and 3 years old, and one 4 year old female, began to separatc from the rest of the troop during the day, returning to the traditional sleeping trees at night. They left the troop's home-range for good around the lst of March. Lowe's guenon often associates with other species of Cercopithecus (C. petaurista mainly) and Colobines (Colobus polykomos and C. badius). These mixed troops are more than chance aggregations of different species on the same food trees. In Lamto, the two free ranging male Cercopithecus campbelli lowei reacted immediately to the distress calls of a young female C. petaurista living with them, and would come to her rescue if she was in danger. Interactions with other Vertebrates are described. Reactions to soaring birds of prey are not stereotyped: in Adiopodoumé, the monkeys were not afraid of the common black kites, whereas an approaching buzzard sent them «diving» into thick foliage. Play interactions were observed with roosting hornbills, and even a pet mongoose. Breeding periodicity, which permits an eventual use of seasonal food surpluses, and the ability to descend to the ground and cross open spaces, might « pre-adapt » this forest monkey to life in wooded savannas. These two characteristics certainlv help one to understand the wide range of Lowe's guenon and its ability to live in the forest-savanna boundary. Habitat preference of the Preuss's guenon (Cercopithecus preussi), on Bioko island, Equatorial Guinea. Human Evolution: 19, Artikelnummer: 239 (2004) The Press's guenon (Cercopithecus preussi) is considered to be one of the most threatened African primates. There is little information on the ecology and status of this primate on Bioko island, where it is found in the form of an endemic subspecies. The Press's, guenon shows preference for the Schefflera forest and the mountain habitat on Bioko island. As on the mainland they also have semitterrestrial habits and are found usually at the understorey of the forest. Competitive exclusion between this guenon and other guenon species could be an explanation of these ecological preferences. Habitat use and vertical stratification of the activity in the forest canopy seem to reduce competition with other sympatric primate species that inhabit on the island. Habitat destruction, and isolation in a reduced habitat, show to be the major threats for the survival of this primate on Bioko island. Predicted distributions and conservation status of two threatened Southeast Asian small carnivores: The banded civet and Hose 's civet. Mammalia 77(3): 261–271. DOI 10.1515/mammalia-2012-0110 Knowledge of the distribution and habitat preferences of a species is of paramount importance when assessing its conservation status. We used accurately recorded occurrence records and ecological niche modelling to predict the distribution of two threatened and poorly known small carnivore species that occur in Southeast Asia, the banded civet (Hemigalus derbyanus) and Hose’s civet (Diplogale hosei), and analysed their spatial niche differentiation for habitat and elevation. We then identified possible anthropogenic threats, and used our modelling predictions to recommend surveying priorities. The predicted distribution of the banded civet was principally in lowland evergreen forest in southern Myanmar/Thailand, Peninsular Malaysia, Sumatra, Borneo and three Mentawai Islands (Siberut, Sipora and South Pagai), and for Hose ’ s civet in evergreen forest across the higher elevation regions of Borneo. Our niche analyses suggested that there is a tendency for these two species to separate spatially along an elevation gradient: the banded civet is mainly found in lowland areas, whereas Hose ’ s civet primarily occurs at higher elevations. Our study strongly indicated that these two viverrids are forest-dependent species that may be threatened by forest loss, degradation and fragmentation. Field surveys should be prioritised in areas where each species is predicted to occur and no records currently exist. Rediscovery of the Mount Nimba Reedfrog, Hyperolius nimbae LAURENT, 1958, in western Ivory Coast (Anura: Hyperoliidae). HERPETOZOA 29(1/2): 3-13 Die vorliegende Arbeit berichtet über die Wiederentdeckung von Hyperolius nimbae LAURENT, 1958, einer Riedfroschart, die nur vom Fuß der östlichen Flanke des Mount Nimba im Westen der Elfenbeinküste bekannt ist. Die Art wurde 1958 beschrieben und 1963 zum letzten Mal beobachtet. Siebenundvierzig Jahre später wurden innerhalb des bekannten Verbreitungsgebietes kleine Populationen dieses Riedfrosches in der Nähe der Dörfer Dagbonpleu, Danipleu, Kouan-Houlé und Zéalé wiederentdeckt. Allerdings konnten nur insgesamt sieben Exemplare registriert werden. Die Lebensräume zeigten unterschiedliche Grade der degradierung von Sumpfwäldern bis zu Reisfeldern in degradiertem Wald oder Sekundärwuchs. Der starke menschliche Einfluß im Gebiet, besonders seine landwirtschaftliche Nutzung, könnte das langfristige Überleben der Art gefährden. Die Autoren empfehlen eine intensive weitere Suche nach bestehenden Populationen und deren Monitoring, um die Gefährdung für das Überleben von H. nimbae abzuschätzen. Social organization of hamadryas baboons: A field study. 187 Seiten, 68 Abbildungen, 17 Tabellen. Bibliothec Primatologica No. 6. S. Karger Verlag, Basel, New York. Die Arbeit ist das Ergebnis einer Feldstudie, die von Fred KURT† und Hans KUMMER† 1960/61 in Äthiopien durchgeführt wurde. Sie klärt die soziale Organisation des Mantelpavians: Mantelpaviane sind in einem komplexen, mehrschichtigen Sozialsystem organisiert. Die kleinsten sozialen Einheiten sind Harems, die bis zu 15 Tiere umfassen können und aus einem Alpha-Mann, mehreren von ihm monopolisierten Weibchen, deren Jungtieren und einigen jungen Männchen bestehen. Zwei bis drei solcher Ein-Mann-Gruppen bilden zusammen einen Clan, dessen Mitglieder zusammen auf Futtersuche gehen und sozial interagieren. Mehrere Clans schließen sich zu einer bis zu 100 Individuen bestehenden Bande zusammen, die zusammen in einem gemeinsamen Streifgebiet von 10-40 km2 umherziehen. An Schlafplätzen können sich mehre Banden zu einer großen Herde treffen und die Nacht gemeinsam verbringen. Ferner gibt es ein Kapitel zur Fortpflanzung und ein Ethogramm.
<urn:uuid:5005e6e6-eb85-4711-ba5e-22eda1d304d3>
CC-MAIN-2023-50
https://www.zootier-lexikon.org/index.php?option=com_k2&view=itemlist&task=tag&tag=Feldstudie
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.815563
4,059
3.375
3
The Rambam begins Sefer HaMitzvot, the “Book of Commandments”, with a list of the 248 positive (“to do”) mitzvot in the Torah. For each, he provides an exact source to where that mitzvah is given in the Torah. After this list is complete, he will go into the 365 negative (“not to do”) mitzvot in the Torah. Altogether, the Torah contains 613 commandments. Summary: The first mitzvah of Judaism is to know that there is a God. The second mitzvah is to know that God is One. The third mitzvah is to love God. The fourth mitzvah is to fear God. The fifth mitzvah is to pray to God. The sixth mitzvah is to “cleave” to God, and seek to grow ever-closer to Him. The seventh is to swear only in the name of God. The eighth is to walk in God’s ways – “just as God is compassionate, you be compassionate; just as God is merciful, you be merciful”, etc. The ninth is to sanctify God’s Name (kiddush Hashem) – to be a model citizen so that people see what a truly God-serving person is, and will be inspired to draw closer to God as well. The tenth mitzvah is to recite Shema Israel twice a day, morning and night. The eleventh mitzvah is to learn and teach Torah. The twelfth and thirteenth mitzvahs are to put on tefillin on the head and arm (each is a separate mitzvah!) The fourteenth is to wear tzitzit fringes on the corners of one’s clothes. The fifteenth is to affix a mezuzah on the doorposts. The sixteenth is the mitzvah of Hak’hel where, in ancient times, the entire nation would gather in Jerusalem every seventh year to hear a public reading of the Torah. The seventeenth mitzvah is for each Jew to write a Torah for himself. Since it is difficult to write an entire Torah, and requires much training, this mitzvah can be fulfilled by contributing a donation towards the production of a Torah scroll, or even helping to ink in a single letter. The eighteenth is for a king of Israel to write an additional Torah scroll for himself, to ensure he will abide by it when he rules. The nineteenth is to recite birkat hamazon, the “grace after meals”, to thank God for one’s food. The twentieth is to build (or rebuild, or contribute to the building of) the Temple in Jerusalem. Insight: The 248 positive mitzvot of the Torah correspond to the 248 evarim, or parts of the human body. (Some list these 248 as all the bones and major joints of the body, while others enumerate them as the 206 bones in an adult human body, plus 42 major organs.) Meanwhile, the 365 negative commandments correspond to the 365 major gidim, or nerves, of the body. They also correspond to the 365 days of the solar year. One who keeps all 613 commandments therefore keeps their entire body spiritually healthy. For those who like gematria (Jewish numerology), the value of “Moshe Rabbeinu” (משה רבינו) is 613, since Moses is the one that brought us the 613 commandments from God! For a summary of the first 20 mitzvot, with further explanation, see the following short video:
<urn:uuid:35de694f-7024-4cc2-9597-2eee2e03ef65>
CC-MAIN-2023-50
https://yadhachazakah.com/tag/tzitzit/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.93406
784
3.25
3
Local leaders are calling for moderated expectations for what reparations will actually look like for Black California residents. California is one of multiple states negotiating over economic reparations for Black Americans whose ancestors were victimized by the Atlantic slave trade and its aftermath. While the state of California was designated as a free state when it joined the Union in 1850, their plans include restitution for actions like redlining and policing of the Black community in the past. The Wall Street Journal reported that California’s reparations task force is prepared to issue a nearly-1,000 page report to California’s legislature later in June, noting that this group is “likely to suggest dozens of measures that could cost hundreds of billions of dollars.” The same publication also observed that state political leaders, including Black legislators who are in favor of reparations in some form, warn it could take years for many of the task force’s recommended policies to be implemented. “Direct financial compensation to Black Californians, they said, may not happen at all,” The Journal wrote. He is reportedly not the only state leader who cautions that reparations may be more complicated than merely sending checks to countless California citizens. “The Legislative Black Caucus, which includes Bradford, is expected to lead any effort to act on the task force’s recommendations,” The Journal noted. “While many members have said they support monetary reparations, some have also said programs to help Black descendants of slaves access higher education, buy a home or start a business may be more feasible in the short term.” The Journal noted that the task force has outlined a historical case of why reparations are owed, despite California’s history as a free state in theory. The Journal noted that many local taxpayers are debating the idea of making payments for historical misdeeds. “Who is paying for this?” One public letter to the task force asked. “Should Japanese-Americans whose families were interned pay? Or women, who were long considered chattel and couldn’t even own property during slavery[,] pay?” California’s plan to grant reparations to its Black residents could cost the state $800 billion – nearly triple the state’s existing budget – economists predicted in a preliminary estimate in March. However, leaders like California Secretary of State Shirley Weber, a former state senator who helped pass the law establishing the task force in the first place, noted to the Journal that actually implementing a reparations policy is no easy task with budget restraints. “Because now you’re talking resources, now you’re talking investment,” she said. Weber also said that giving people money directly may not even the best way to enrich their lives.
<urn:uuid:0c448cf2-b852-4608-ae14-20eda9ed2945>
CC-MAIN-2023-50
https://zeelonggroup.com/black-californians-told-broader-view-reparations-expect-cash-payments/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.961711
577
2.71875
3
A healthy mouth is a non-acidic, neutral, or alkaline mouth, with a pH 7.0 or above. Tooth roots begin to dissolve as this pH gets a tiny bit below neutral (at pH 6.5) and, when acidity levels dip to pH 5.5 or lower teeth will erode, become discolored, and be at risk for cavities. All acidity weakens teeth, but it is the amount of time that acids are in contact with teeth that determines the severity of the damage. Erosion and decay are worse when people sip drinks or nibble acidic foods. For healthy teeth, exposure to acidity must be kept to a minimum. Teeth actually become stronger and re-mineralize when the mouth is alkaline at a pH 7.5 or above. Your saliva pH People with acidic saliva often experience dental problems because their own saliva damages teeth. These folks wonder why they have uncontrollable cavities, broken fillings, gum recession or sensitivity, despite their efforts to brush and floss. The solution is to protect teeth with xylitol, and find ways to alkalize the mouth as often as possible. Zellie's Mints and Gum are an immediate solution for mouth acidity, changing the mouth pH quickly into a safe zone. How long does xylitol protect teeth from acidity? The answer depends on the pH of your “natural” saliva. Saliva filters into the mouth, derived from body liquids, which reflect the pH and chemistry of your body. The effects of stress, hormone changes, sleep deprivation, and poor nutrition makes saliva acidic. As acidic saliva flows into the mouth it will negate the alkalizing benefit of xylitol. People with acidic saliva may need an individualized xylitol regimen to protect their teeth adequately. If your salvia is naturally alkaline, one or two Zellie's after eating or drinking will usually be sufficient to protect teeth from food or drink acidity. How eating affects mouth pH All the food we eat and the drinks we drink change mouth pH. Mouth pH can fluctuate wildly, from the strong acidity of citrus fruits, juices, and wines (pH 2.2 or lower) to the alkaline pH of chicken soup and salty nuts (pH 8.5 or higher). Pure xylitol (like in Zellie's) prevent cavities by helping turn an acidic mouth into an alkaline mouth, in minutes. The best time to benefit from xylitol is to enjoy Zellie's at the end of every meal, drink or snack. How to alkalize your saliva The pH of fluids circulating around the human body (including the saliva in your mouth) register in a narrow pH range. The pH of blood should be approximately pH 7.3 (slightly alkaline) while healthy saliva should register 7.0 (neutral). When the pH of body fluids is alkaline and above 7.0 it indicates an oxygen-rich environment (which is an ideal state for good health). When pH levels are below 7.0 (acidic) this indicates an oxygen-deprived environment, which primes our body for disease and our teeth for de-mineraliztion and cavities. Xylitol helps defend teeth by alkalizing the mouth. However, for total health, it is important to work to alkalize your body. Doing this, will not only benefit your health but it will help to alkalize saliva for additional mouth and tooth protection. Natural saliva variation There are times in life when, no matter what you do, saliva seems to become acidic. The hormones of pregnancy appear to change saliva and put women’s teeth at risk for acidic damage. Stress and sickness also create times of mouth acidity. Other variations occur like a rhythm, with daily fluctuations in pH and flow rate (diurnal variation). Saliva is least protective at night and in the early hours and most alkaline and protective in the afternoon. Improving saliva pH You can achieve improvement in saliva pH by making lifestyle and habit adjustments (reduce stress, exercise, sleep etc), and you can also influence saliva pH by selecting specific foods to eat, foods to help “alkalize” the body. As we digest foods, their by-products or nutrients are absorbed into our body. Not all food provides good nutrients, and some create acidic by-products that work against us. Most experts agree we need at least 80% of our daily foods to be the kind that help us maintain a neutral or alkaline body pH. If you eat alkalizing veggies and fruits, your body will not fully benefit from them without the correct enzymes to mange the absorption of their nutrients into the body. Some fermented and raw foods provide enzymes, but these may not be adequate. If you have a good diet, I often recommend additional raw probiotics (pill form) pineapple (bromelain), and papaya (papain) – perhaps a little at each meal – to ensure maximum nutrition for your body and mouth. Don’t get confused! The most confusing detail is that one or two products that alkalize the body are, in fact, acidic in the mouth. The two best examples are: a) Lemons are one of the best products to alkalize your body, but they have such a low pH in the mouth, drinking lemonade can destroy teeth. b) Spinach is good to alkalize the body, but the oxalic acid in spinach can destroy the healthy pellicle on teeth and make them sensitive. If you eat lemons or spinach –be sure to incorporate them into meals and end the meal with some Zellie's. Fortunately many alkalizing foods are not damaging to teeth: foods like watermelon, asparagus, mushrooms, mango, apples, and garlic. Foods and drinks to avoid Many popular soft drinks create body acidity and feed acid-producing bacteria in the mouth, promoting gum disease and cavities. These drinks contain acids plus lots of sugar and/or high fructose corn syrup. The worst may be carbonated soft drinks– especially if they contain additional caffeine. Addicted to soda? People with gum disease often have a kind of bacteria in their mouth that affects their taste buds, making water unpalatable. If you dislike water, and have bad gums, try adding one teaspoons of xylitol into water and sip this, in place of soda, for a week. You may find your taste buds recover and your desire for soda is reduced. Limiting or eliminating soda will be good for your gums, teeth and body health!
<urn:uuid:0973f75e-d5a1-45ed-ad18-44de11919ea3>
CC-MAIN-2023-50
https://zellies.com/blogs/news/change-your-ph-and-improve-your-teeth-and-gums
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00100.warc.gz
en
0.930647
1,381
3.421875
3
Produce a series of approximately 12 photographs that are made on, or explore the idea of, a journey through a landscape. The journey that you undertake may be as long or as short as you like. You may choose to re-examine a familiar route, such as a commute to work or another routine activity, or it may be a journey into unfamiliar territory. You may like to apply some of the psychogeographic methods explored within part 2. Travel by any means available. Introduce your work with a supporting text (around 500 words ) that: ● Describes how you interpreted this brief. ● Describes how your work relates to aspects of photography and visual culture addressed in Part Two. ● Evaluates the strengths and weaknesses of your work, describing what you would have done differently or how you might develop this work further. ● Identifies what technical choices you made to help communicate your ideas, and also references relevant artists and photographers who have influenced the creative direction of your project. ● Considers which presentation method will best communicate the nature of your journey through the landscape to an audience. ● Explains your reasons for selecting particular views, and arriving at certain visual outcomes. How has the history of the landscape through which you travelled informed what you choose to photograph. Look at the assessment criteria again. Think about how well you have done against the criteria and make notes in your learning log. Send your work and your supporting text, as well as extracts from your learning log or link to your blog, to your tutor by the method you’ve agreed with them. If you have any preliminary ideas about your critical review (Assignment Four), share these with your tutor now – or as soon as you feel ready. Make sure that all work is clearly labelled with your name, student number and the assignment number. You don’t need to wait for your tutor’s response before starting Part Three. LP&E , pp.93-4 [3Feb22] The idea for this Assignment sprang from a piece of junk mail showing the towers of Canary Wharf from Greenwich Observatory. Aware of the significance of the financial centre to the country's prosperity and how this was encapsulated by its domination of the skyline, I decided to journey towards the towers, photographing landmarks and always showing the towers in the background. This was soon refined to seeking public art for the foreground subject. I found it incongruous at first to make vertical images of instinctually horizontal subjects, but as both highrise buildings and most public art is taller than it is wide, this was the logical choice. And consistency of format is important (or was, at least to my EyV tutor). I took some reassurance from my recent acquaintance with Robert Adams Listening to the River: Seasons in the American West (1994) which is comprised entirely of vertical landscapes. It is an interesting experience to express such a duality: ostensibly seeking public art for subjects, I was actually photographing the towers of Canary Wharf. In retrospect, I seem to take this approach quite often, imagining viewers thinking that they (or perhaps I) am/are looking at one thing, then gradually realize that the underlying subject is something else. Examples are the overlays in I&P Assignment 5; dogs or people in I&P Assignment 3 and, to some extent, merging my body with a statue in C&N Assignment (Blackburn 2021a, 2021b and 2020). Background as subject is confusing to photograph and hopefully it also confounds the audience a little. An early intention was to label the images statue name and canary wharf but that would belabour the point and so it is just artist, statue name and location. I am not aware of any direct read-across to the photographers in Part 2, although I admire the work of Weston and Baltz. I would still cite Brandt and Kenna as landscape influencers. My journey was more modest and local than those described in Part 2 and the photographs concentrated on the inanimate. This series is complete both in terms of journey's end and the exhaustion of target subjects, but the device of showing two subjects, one variable, one (in some way) fixed has potential for re-use. Word count 358 In the reflection on the first Assignment (Blackburn, 2021c), I referred to and defined "strong" images and I intend to expand on that idea as this course progresses. Ideally, each image in a submission should have merit in itself and also contribute to the series as a whole. John Szarkowski wrote of photography as an "act of pointing" (quoted by Stephen Shore in his memorial essay for Szarkowski, 2008) that might "elevate the act of pointing to a creative plane", bringing sights " to our attention … that had been unseen before, or seen dumbly, without comprehension." Making photographs that provide an original view of their subjects is one of my aims in depicting urban landscapes. I believe that this series does so. As noted in the introduction, this task, as the plan developed, provided an interesting challenge in always showing two subjects, one of them constant. While I have learned on this course to be more aware of backgrounds, my approach for this assignment promoted the background to equal status with the foreground subject. The implications and demands which that made on lens choice and depth of field added to the creative options. Looking at progress on the Learning Outcomes: L01 visual and conceptual strategies - this is, as far as I am aware, an original approach. If it is derivative, it is unknowingly so. L02 social, cultural and ethical considerations - the subtle secondary purpose of this series is to imply the pervasive power, influence and effect of the financial service industries in the UK economy. The images seek to do this by stealth and the casual viewer may remain unaware of the intention. L03 exploring a range of ideas - The nature of this series, while retaining its core concept of dual subjects, developed a more coherent purpose over the first few forays. The progress and thought processes during the project are described in the online blog (Blackburn, 2021d). L04 research, managing time and resources - Seven visits were made to various sites for this Assignment. The main constraints were personal health issues and the weather: happily, Covid restrictions (other than those of personal choice) were lifted towards the end of the process. L05 autonomy, voice, and communication - I continue to interact wherever possible with fellow students in general and course-specific forums and in the wider photographic circles of LIP (London Independent Photography), RPS (Royal Photographic Society) and elsewhere. I am content with progress on my autonomous voice. Word count 403 LPE Assignment 2 References Alexander, J, Conroy, A, Hughes, A, & Lundy, G (2019) Landscape, Place and Environment [LPE]. Barnsley: Open College of the Arts. Blackburn, N. (2020) Submission [online]. cn.baphot.co.uk. Available from http://cn.baphot.co.uk/?page_id=62 [Accessed 26 February 2022]. Blackburn, N. (2021a) Eltham Archive [online]. ip.baphot.co.uk. Available from http://ip.baphot.co.uk/?page_id=139 [Accessed 26 February 2022]. Blackburn, N. (2021b) 100 Dogs [online]. ip.baphot.co.uk. Available from http://ip.baphot.co.uk/?page_id=101 [Accessed 26 February 2022]. Blackburn, N. (2021c) Aspects of the Vauxhall Crossing [online]. lpe.baphot.co.uk. Available from http://lpe.baphot.co.uk/assignments/assignment-1/asg1-submission/#ref [Accessed 26 February 2022]. Blackburn, N. (2021d) Blog [online]. lpe.baphot.co.uk. Available from http://lpe.baphot.co.uk/assignments/assignment-2/asg2-blog/ [Accessed 26 February 2022]. Canary Wharf Group (n.d.) Canary Wharf Art Map [online]. canarywharf.com. Available from https://canarywharf.com/artwork/art-map/ [Accessed 11 February 2022]. Greenwich Peninsula (2022) CLUBHOUSE ON THE TIDE [online]. greenwichpeninsula.co.uk. Available from https://www.greenwichpeninsula.co.uk/whats-on/events/clubhouse-on-the-tide/ [Accessed 11 February 2022]. Shore, S. (2008) Memorial for John Szarkowski, Century Association Yearbook [online]. stephenshore.net. Available from http://stephenshore.net/writing/szarkowski.pdf [Accessed 25 February 2022]. The Line (n.d.) The Line, Map [online]. the-line.org. Available from https://the-line.org/map/ [Accessed 11 February 2022]. Wikipedia (2022a) List of public art in the Royal Borough of Greenwich [online]. wikipedia.org. Available from https://en.wikipedia.org/wiki/List_of_public_art_in_the_Royal_Borough_of_Greenwich [Accessed 11 February 2022]. Wikipedia (2022b) List of public art in the London Borough of Tower Hamlets [online]. wikipedia.org. Available from https://en.wikipedia.org/wiki/List_of_public_art_in_the_London_Borough_of_Tower_Hamlets [Accessed 11 February 2022].
<urn:uuid:0c2ec8d6-a9ae-4e1d-b13c-98082f829a8f>
CC-MAIN-2023-50
http://baphot.co.uk/pages_lpe/lpe_asg_2_3_sub.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.94284
2,076
2.53125
3
There is a long history of lottery. Its earliest recorded form dates back to the 17th century, when various Dutch towns began holding public lotteries to raise money for poor people and for fortifications. In fact, lottery proceeds were so lucrative that it was soon hailed as an easy, painless method of taxation. Today, the oldest continuously operating lotto is the Staatsloterij in The Hague, which was established in 1726. The word “lottery” comes from the Dutch noun meaning “fate”. The format of the lotto differs widely, with fixed prizes being offered, such as cash or goods, or a percentage of the proceeds. The traditional format of lotteries is a random draw, with numbers randomly drawn. Recently, however, many lotteries have been created in which purchasers can pick their numbers. In such a scenario, multiple winners may arise. In such a scenario, it is important to stick to your numbers and avoid following the lotto fever. The author of How to Win the Lottery, Robert Lustig, received many emails from people asking for his lotto winning numbers. He discouraged this and recommended that people not buy “quick pick” numbers as it is important to pick a good number. However, his method involves patience. While this may sound too complicated for many people, it is one of the most successful ways to increase your chances of winning the lottery. If you can spare the time to learn about the secrets of winning the lotto, you’ll be a winner. The best lottery payout plans allow the winner to invest a portion of the money to earn more money in the future. In the U.S., winnings aren’t always paid out in a lump sum, but winners can choose to receive an annuity instead. This type of lottery payout option is less than the advertised jackpot, especially when you consider the time value of money and apply income taxes. Moreover, the payments are taxed differently based on the jurisdiction. If you win the lottery, the money is awarded to a beneficiary by the lottery company. However, if you decide to use the lump sum option, your beneficiaries will have to pay taxes on it. The annuity payout is less exciting up front, but will allow your beneficiaries to take advantage of lower taxes. So, if you’re planning to pass away in the next few years, consider an annuity payout instead of a lump sum.
<urn:uuid:c1c42cfd-d2ae-45b3-98d9-dfac199efd9c>
CC-MAIN-2023-50
http://cabellomaltratado.com/secrets-of-winning-the-lotto/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.977452
507
2.71875
3
If you are currently become an adult or still growing up but still not paying attention to your teeth, then stand in front of the mirror and you will find that you have a cavity. See it closely and you will find that your teeth are having some black marks and these are called cavities. In fact cavities are happen due to improper care of the teeth so let’s see some ways of overcoming the problem of cavities. The most important thing to remember is – Brush your teeth! Take two to three minutes each time. Brush both sides of each tooth together with the edges and the gum line. Brush your teeth at least twice a day but the more the better. Floss your teeth daily and make it as your habit. However the recommended thing to is to floss after every meal. Floss helps to remove food particles from between teeth and under your gum line. Avoid eating too much foods which contain sugar. Foods with sugar assist the growth of bacteria in your teeth. Make sure you brush your teeth after eating something sweet. Drink milk daily. Milk is a good source of calcium and helps to build strong teeth. The drink adequate water to support your teeth. You can also Use oral care supplement products such as mouthwash to kill germs in order to prevent cavities from happen. Go to your dentist at least twice a year or every 6 months for dental checkups and cleanings. Seek advices from your dentist on the best tips that you can do to maintain your teeth and prevent cavities. Cavities weaken the teeth and might result in your teeth need to be pulled of, and this is something that you shouldn’t want so take care of your teeth while you have them and make sure that you have good teeth so you can have a cool smile ever!
<urn:uuid:da6afa63-10e8-4261-806e-54bde8bfbbc1>
CC-MAIN-2023-50
http://dailyhealthcare.net/overcoming-the-problem-of-cavities/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.967765
371
3.03125
3
Since human beings are the ultimate beneficiaries of the development plans, programmes and projects, it is imperative for planning to take cognizance of population dynamics of the metropolis. Population Size and Growth Rates The Kumasi metropolis is the most populous district in the Ashanti Region. During the 2000 Population Census it recorded a figure of 1,170,270. It has been projected to have a population of 1,625,180 in 2006 based on a growth rate of 5.4% p.a and this accounts for just under a third (32.4%) of the region’s population. Kumasi has attracted such a large population partly because it is the regional capital, and also the most commercialised centre in the region. Other reasons include the centrality of Kumasi as a nodal city with major arterial routes linking it to other parts of the country and also the fact that it is an educational centre with two State Universities, a Private University, a Polytechnic, two Teacher Training Colleges, Secondary Schools and a host of Basic Schools. Tables 2 and 3 give the size and growth patterns of Kumasi. Ashanti Region is currently the second most urbanised in the country, after Greater Accra (87.7%). The large urban population in the region is mainly due to the fact that the Kumasi metropolis is not only entirely urban but accounts for a third of the region’s population. The growth of industries and the large volume of commercial activity in and around Kumasi as well as the high migrant number may account partly for the relatively high urban population. It has been estimated to have a daytime population of about 2 million. The population has grown rapidly over the inter-censal periods from 346,336 in 1970, 487,504 in 1984 to 1,170,270 in 2000. Based on these the census reports the estimated population growth rate as 5.47 per cent (Table 2 and 3). Age and Sex Structure The age and sex structure of the population are analysed in view of the fact that the development problems and needs of a population vary from one age group to the other. The age structure of the population in the metropolis is skewed towards the youth (2000 Population census). The highest proportions of the population are in the age cohorts 0 – 4 years (13.2%) and 5 – 9 years (12.4%). Cumulatively, 39.9 per cent of the population is below 15 years, in contrast to other districts, which range from 40 to 47 per cent. This may be an indication of a slow, incipient decline in fertility. There are more males (50.2%) than females (48.8%) in the metropolis. The population of the Central Business District comprising Adum, Asafo and Ashtown continue to reduce over the years. According to the census reports, Adum recorded 12,991 in 1970, 9,693 in 1984 and 8,016 in 2000. This is anticipated to further fall. On the other hand areas such as Ayigya, Dichemso and Tarkwa Maakro, which were small communities in 1960 and 1970, have grown into densely populated residential areas with 20,000 – 40,000 people. Areas comprising the CBD therefore continue to reduce in terms of human numbers whereas the population in the new developing areas increases. This is accounted for by the mere reason that residential accommodations in the former are being converted into commercial use. Ashanti Region has a relatively high population density of 148 per sq. km, having increased steadily from 45 persons per sq. km in 1960 and 61 persons per sq. km in 1970 to 86 persons per sq. km in 1984. The region’s population density was around the fifth in the country up to 1984, rose to the third densely populated region (148 per sq km) after the Greater Accra (895 per sq.km) and the Central Region (162 per sq. km) in 2000. The high density of population of the region may be explained by the fact that it has the second largest economy in the country after the Greater Accra Region, which tends to attract people from all walks of life to the region. The Kumasi Metropolitan Area has a total surface area of 254 sq km (2000 population census) with a population density of 5,419 persons per sq. km. The Kumasi metropolis is second to the Accra metropolis (5,530). The average household size in Ashanti is 5.3 persons, the same as the Brong Ahafo. It is however lower than only the three Northern regions. The average household size in the Metropolis is 5.1. The average number of households per house is 3.4. This relatively large number of households per house is due largely to the large population in the metropolis. Children constitute 34.0%, the highest proportion of household members in the metropolis. Several factors may account for this high proportion of children of household heads. In addition to minors who may still be living with their parents, there could also be children, particularly females, who might move to stay with their parents in accordance with tradition, during the latter part of pregnancy, well into the post natal leaning period, before returning to their spouses. Divorced, widowed, unemployed or even destitute children may fall back to live with their parents while sorting themselves out. All these are manifestations of the fallback support system that is the bedrock of the traditional family structure. Other relatives form the second highest proportion of the population in households in the metropolis after children, constituting between 12.9% and 43.3%. The high proportion of other relatives in households in the metropolis is attributable to a number of socio-economic factors. The urban setting attracts people to come and stay with relatives whilst actively searching for jobs or their own dwelling units. The household size structure in the metropolis has been analyzed and the results are as presented in Table 5. The results in Table 4 show a dominance of single person households in the metropolis. For instance, single households alone constituted 21.1% and 23.3% of all households in the metropolis in 1984 and 2000 respectively. Similarly, single households dominated with male single household heads constituting 16.8% as against 4.2% for females in 1984. The dominance of single person households, especially among the male population in the metropolis, could be attributed to a number of cultural, administrative and economic factors. Culturally, some Asantes who dominate all tribes in the metropolis often prefer living in separate houses from their families. Also, most immigrants who arrive in the city often leave their families behind until they are settled. On administrative grounds, the city being the regional capital has attracted a lot of officers. The 2000 census results show that 76.9 percent of the population aged 15 years and older in the region is economically active. The proportion of the economically active population that is those who worked, for at least one day, in seven days prior to the census was 71.4% in the Kumasi metropolis. The proportion of the unemployed population in the Kumasi Metropolis is 16.0%. The unemployment rates are more pronounced in the metropolis than the remaining urban areas. This general trend is the same for both sexes and may be as a result of the high rural urban drift, apparently in search of non-existent jobs. Students form the highest proportion of those who are not economically active in the metropolis, whereas the aged together with the retired form a relatively high proportion. According to the 1998 Children’s Act, children less than 13 years of age are not expected to work whilst those aged 13 – 15 years can only do light work. As established by the Ghana Child Labour Survey (Ghana Statistical Service, 2001) such children have to work in order to support the family mainly due to poverty. The census results showed that about a tenth of children (8.7%) aged 7 – 14 years in Ashanti Region worked at least one day within the seven days prior to the census. In the Kumasi Metropolis, 5.5% to 16.4% of children aged 7 – 14 years worked during the period. In the Kumasi Metropolis, 49.9% of children in this age group worked in the wholesale and retail trade in the private informal sector. Kumasi has been identified as a major transit point in the trafficking of child labour. The ILO/IPEC in collaboration with KMA are working assiduously to put in place mechanisms to stem the tide of the Worst Forms of Child Labour (WFCL) in the Metropolis. Ten (10) communities where the problem is most prevalent are being targeted. These are Asawase, Bantama/Race Course, Aboabo/Sawaba, Adum, Asafo, Dichemso, Anloga, Roman Hill/Railways, Akwatia Line and Moshie Zongo. It also calls for the government and other Child Support Organizations to take advantage of the new data on working children to implement more effectively the projects and programmes intended to enhance the welfare of children. The project seeks to recognise and collaborate with the religious bodies, youth groups, child issues - related NGOs, Transport organizations, Night Guards, Restaurant Owners, Assemblymen and Opinion leaders Migration, one of the three factors of population change, is discussed in terms of place of birth, place of enumeration and the population born elsewhere (in or out of Ghana). About two-thirds (65.7%) of the population in the Ashanti Region were born where they were enumerated, the remaining one-third (34.3%) are immigrants to the region. The strategic location of Kumasi and its status as a brisk administrative and commercial centre has made the city a destination of both internal and international migrants. The Metropolis attracts a number of migrants from several parts of Ghana and neighbouring African countries such as Togo, Burkina Faso, Mali, Nigeria, Ivory Coast and abroad especially, Europe. Table 7 shows the growth rate of the city’s population due to migration. The results presented in Table 7 reveal that migration is a key contributing factor to the phenomenal growth of 60.8 percent and 53.1 percent of the city’s population growth in 1960 and 1970 respectively and again in 2000 48.6%. This has been projected to 57.4% and 56.7% in 2005 and 2009 respectively. Rural - Urban Split During the period 1960 – 2000, the region’s population distribution was transformed from three-fourth (75.1%) rural in 1960 to a little over half (51.3%) urban in 2000 (Population Census Report). This transformation was fastest during the period 1984 – 2000. The region is currently the second most urbanized in the country after Greater Accra. The large urban population in the region is mainly due to the fact that the Kumasi Metropolis is not only entirely urban but accounts for a third (32.4%) of the region’s population. The growth of industry and the increase in commercial activities may, partly account for the high urban population. It has however been estimated that 48%, 46% and 6% of the Metropolis are urban, peri-urban and rural respectively (Metro Agric. Directorate). Date Created : 11/28/2017 3:25:34 AM
<urn:uuid:ffb44fb9-8e55-42ec-a409-8eddad5c92f4>
CC-MAIN-2023-50
http://ghanadistricts.gov.gh/Home/LinkDataDistrict/6644
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.950669
2,340
2.84375
3
Why veterinarians recommend the use of Lasix as a race-day medication story by Kimberly French Patented for human medicine in 1959 and approved for use in 1964, furosemide, also known as Lasix or Salix, was first implemented in the racing industry in the late 1960s and early 1970s. Its purpose, then as it is now, was to manage the effects of exercise-induced pulmonary hemorrhage (EIPH). Over the course of the last four to five decades, this drug’s use in North American Thoroughbred, Standardbred and Quarter Horse racing has been frequently employed. Yet the presence of furosemide in the sport has been a hot-button issue and continues to be so. While certainly more research can and will be performed to develop other treatments for EIPH, the current and past stance by the American Association of Equine Practitioners (AAEP) is that administering furosemide on race day remains the most effective method to combat EIPH. “The AAEP’s current policy on race-day medication administration endorses the use of furosemide to help mitigate the occurrence of exercise-induced pulmonary hemorrhage in the racehorse,” wrote former AAEP president R. Reynolds Cowles in a June 5, 2017, statement from the organization. “This policy is based on the overwhelming body of international scientific and clinical evidence. “H.R. 2651 seeks to end the administration of furosemide on race day, which conflicts with the AAEP’s long-held position. While we are optimistic that current research projects will yield an alternative treatment for EIPH which does not require race-day administration, as doctors of veterinary medicine we cannot abandon our current policy until science provides an efficacious option for protecting the health and welfare of the horse.” Cowles’ response was to the introduction of legislation referred to generally as the Horse Racing Integrity Act, which would ban the use of furosemide as a race-day medication. The act, now referred to as H.R. 1754, was reintroduced this March after failing to advance out of committee and is virtually identical to its predecessor. What Is Epistaxis and/or EIPH? According to a 2012 study published in The International Journal of Applied Research in Veterinary Medicine evaluating the use of furosemide to prevent epistaxis, this condition is “bleeding from the nose in racing horses” and it “has been observed by horsemen since the 17th century.” It is estimated more than 90 percent of all racehorses experience some type of bleeding, with 3 to 5 percent presenting with epistaxis, or bleeding from the nose. When furosemide first was used, bleeding from the nose was the primary symptom of EIPH. With the introduction of endoscopic evaluations, veterinarians learned EIPH could cause a horse to bleed deep within the lungs without blood ever coming through the nasal cavity. They also learned EIPH occurred much more frequently in horses than was originally thought and could present itself in any horse, including performance and show horses, that engage in rigorous exercise. “Exercise-induced pulmonary hemorrhage refers to the condition in which blood is present in the airways following exercise,” states a 2009 presentation from the Proceedings of the Geneva Conference on Equine Medicine. “The most frequent classification of horses as EIPH positive or negative is currently based on post-exercise endoscopy of the upper airways, including trachea. Until the introduction of endoscopy and surveys of horses following racing, it was generally considered that only few horses experienced EIPH, as the occurrence was essentially based only on the appearance of blood at the nostrils (epistaxis). “Even today, the lay perception of a horse classified as a ‘bleeder’ is frequently that which either has profuse amounts of blood in the trachea following training or racing or exhibits epistaxis. However, EIPH should now be considered ubiquitous in horses undertaking fast or intense exercise. The severity of the condition varies from horses showing a small increase in the number of red blood cells in the lower airways only detectable using sensitive techniques such as bronchoalveolar lavage (BAL) to those showing marked epistaxis, with all grades in between.” Many theories have been advanced to determine exactly what caused EIPH and/or epistaxis, yet none have fully explained the condition. Some scientists have claimed a horse bleeds while engaging in rigorous exercise because of the high pulmonary vascular pressures in the lungs, but this hypothesis does not explain where the bleeding begins or how EIPH can become more severe over time. Another theory is based on locomotory forces through which bleeding begins in the bottom of the lung, near its back. Its basis lies in the fact a horse has no bone attachment to the spine from his or her forelegs and when galloping the spine causes the shoulder to compress into the rib cage. Due to the nature and area of this compression, capillary disruption begins in the lungs. Representatives at the Geneva Conference, however, had their own point of view on what causes EIPH and/or epistaxis. “A more pragmatic view of EIPH may be that it is a multi-factorial condition involving airway, vascular, cardiac and locomotory components and that the contribution of different factors varies between individual horses and possibly even within the same horse over time,” the presentation states. How Does Lasix Help? Furosemide aids in preventing EIPH and/or epistaxis because it is a diuretic, meaning it eliminates excess fluid buildup created by liver or kidney disease, heart conditions or high blood pressure. It operates by prohibiting the kidney from absorbing minerals, which in turn increases urine production. The urine release spurred by furosemide lowers hydrostatic pressures, which are those pressures exerted by intravascular fluid (such as blood plasma) or extravascular fluid on the wall of a blood vessel in a horse’s body. The release of this pressure can reduce the severity of pulmonary bleeding by 50 to 70 percent, but does not eradicate the risk entirely. A 2009 study which appeared in the Journal of the American Veterinary Medical Association evaluated 167 Thoroughbreds in South Africa to determine whether race-day administration of furosemide did reduce the risk of EIPH under normal racing conditions. “Horses were substantially more likely to develop EIPH or moderate to severe EIPH, following administration of saline solution than following administration of furosemide,” stated the article. “In addition, 81 of the 120 (67.5 percent) horses that had EIPH after administration of saline solution had a reduction in EIPH severity score when treated with furosemide. “Results indicated that prerace administration of furosemide decreased the incidence and severity of EIPH in Thoroughbreds racing under typical conditions in South Africa.” Lasix Saves Lives According to the 2012 evaluation in The International Journal of Applied Research in Veterinary Medicine, administering furosemide could prevent or eliminate acute/sudden deaths from EIPH while a horse is competing or training, which in turn could save the lives of their human handlers. “Acute/sudden deaths during racing due to EIPH occur when the hemorrhage is sufficiently voluminous to acutely interfere with respiration/blood oxygenation such that the horse collapses and dies acutely on the racetrack,” the article states. “Although acute/sudden death from EIPH has long been known to equine practitioners, more recent work has shown that acute/sudden death from EIPH can occur without blood being visible in the nostrils as shown by the work of Gunson and her colleagues and others. “Review of the relevant literature, including the 1988 paper by Gunson and coworkers suggests that in the U.S. such acute deaths during racing or training occur approximately once per every 1,500 Thoroughbred races, and that a substantial proportion, approximately 60 percent of acute deaths during racing, are due to EIPH. As such the data presented here suggests that pretreatment with furosemide is likely to reduce the instance of such EIPH related sudden deaths during racing by approximately 80 percent, a very significant contribution to equine and human safety in racing.” The evaluation concluded with a concise, yet stout, recommendation in the use of furosemide on race day. At the conclusion of its 2012 board of directors meeting, the USTA issued its official stance on the use of furosemide, which echoed the opinion of the AAEP and that of The International Journal of Applied Research in Veterinary Medicine’s 2012 evaluation. “The use of the therapeutic substance furosemide (Salix, Lasix) under controlled conditions should be continued as the most effective and humane treatment of the racehorse.” HB To comment on this story, email us at [email protected].
<urn:uuid:55355dc3-cb4e-4b8f-b937-46bea4d9f227>
CC-MAIN-2023-50
http://harnessracingfanzone.com/horse-care-furosemide-facts/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.95786
1,908
2.640625
3
Raccoon and the Blind Men by Oliver LaMère retold by Richard L. Dieterle Once there was a village in which two old blind men lived together in an oval lodge. To find their way out and back again to their lodge when they had to answer a call of nature, they strung a long rope from their lodge to a distant tree trunk. When the mischievous Raccoon passed by he suddenly had an idea for a good joke: he took the rope and untied it from the tree trunk and retied it to a tree hanging over the edge of the lake shore. He stood by and patiently watched for the men to come out. The first man came out of the lodge holding on to the rope. Soon the second one emerged and followed after him along the same rope. The first blind man came to the end of the rope, took one step farther, and promptly fell into the lake. Not much later the second man came along and did the same thing. The first blind man accused the other of pushing him in, and soon they were loudly arguing with each other. All the while Raccoon was beside himself with laughter. When the villagers found out about this they went hunting for the raccoon. As hard as he tried, Raccoon could not control his laughter, and soon the villagers found him. After they shot him dead, they took his hide and fastened it to a tree trunk.1 Commentary. "fell into the lake" — raccoons have the odd habit of taking their prey and "washing" them in water before eating them. (Few scientists actually believe that they are washing their food, but just what they are doing is a subject of speculation.) Thus the raccoon causes many other animals to take an unwilling bath, in a way that looks like a cruel joke. "Raccoon could not control his laughter" — in contemporary America, raccoons are noted for the mischief they cause in invading trash cans to eat discarded food. They generally come out only in the dark when all humans are blind, but the noise they make in the course of this mischief usually gives them away, making it easy for hunters to dispatch them. "a tree trunk" — ne other waiką associates tree trunks with raccoons. The association may derive at least partly from raccoons using the water that collects in tree stumps to emerse their food before eating it. However, there is probably much more to it. Comparative Material: A Lakota story has some interesting similarities to our Hocąk tale. One day as Hare was wandering about, he encountered a solitary lodge that looked very much like an oak tree. There inside he found an old man who had gone completely blind. The grandfather told Hare that the Great Spirit had provided for him by giving him bags of food of the very best kind so that he would not be in want; furthermore, a rope path had been constructed to the lake, and another one out into the woods where firewood could be gathered. Hare thought this an idyllic life, and offered to trade his own eyes for the grandfather's lodge. The grandfather warned him, but Hare would not be dissuaded. So the two of them made the trade. Hare loved the easy and tasty food, but had to go to the lake to fetch some water. Unlike the old grandfather, Hare walked briskly and when he stumbled, he pulled half the rope down. Soon he was navigating without any guide and suddenly fell down a slippery slope into the lake. Later he went out to fetch firewood, but broke that rope too, and could not find his way back. So he called upon his brother, who could always hear him, for aid. His brother brought the grandfather back and the traded back again. The old man liked the bow and arrow, but was too feeble to easily use them and was glad to be back to his lodge in the oak tree.2 The Hidatsa story replaces Raccoon with Coyote. One day Coyote was traveling about when he came across a lodge with a string attached to it leading down to the river bank. There he saw an old man fishing. Inside the lodge was another very old man sleeping. He soon discovered that both these men were blind. The man at the river caught a fish, but Coyote quietly scooped it up and brought it back to the lodge. The other man got up and began to prepare a kettle for the fish he found inside. Meanwhile, the other old man noticed his fish was missing. The second man told him that he had a fish, and that they could share it, but Coyote had taken the fish and eaten everything but the bones, which he threw back into the pot. When they took out the fish, they found only bones. Each accused the other of having eaten it. Coyote swatted each with a hot poker, and they were soon fighting one another. Eventually, they realized that they had been hit with a single stick, but by then Coyote had gone back to the village.3 Stories: featuring raccoons as characters: The Abduction and Rescue of Trickster, The Were-fish, Lake Wąkšikhomįgra (Mendota): the Origin of Its Name, The Spirit of Maple Bluff, Bladder and His Brothers, The Raccoon Coat, Trickster and the Mothers; mentioning blind people: A Raccoon Tricks Four Blind Men, Hare Visits the Blind Men, The Raccoon Coat, Big Eagle Cave Mystery, The Roaster, Eats the Stinking Part of the Deer Ankle, Owl Goes Hunting. Themes: blindness:The Raccoon Coat, A Raccoon Tricks Four Blind Men, Hare Visits the Blind Men, Big Eagle Cave Mystery, Thunderbird and White Horse; people are led astray by a raccoon: A Raccoon Tricks Four Blind Men, Bladder and His Brothers; people who can't see are misdirected: Trickster Eats the Laxative Bulb; a spirit tricks men into fighting one another: A Raccoon Tricks Four Blind Men, Hare Visits the Blind Men. 1 Charles Edward Brown, Moccasin Tales (Madison, Wisc.: State Historical Museum, 1935) 4-5. Informant: Oliver LaMère of the Bear Clan. 2 Zitkala-Ṣa, "Mastin, the Rabbit," Old Indian Legends (Lincoln: Univesity of Nebraska Press, 1901) 147-151. 3 Mrs. Good Bear, "38. Coyote and Two Blind Men," in Martha Warren Beckwith, Mandan and Hidatsa Tales: Third Series (Poughkeepsie: Vassar College, 1934) 287.
<urn:uuid:6f033554-7e96-457c-bc7b-da27609bfa54>
CC-MAIN-2023-50
http://hotcakencyclopedia.com/ho.RaccoonAndBlindmen.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.977881
1,406
3.171875
3
Binocular Disparity Energy, Gabor Filter, This binocular disparity energy (BDE) model has linear spatial filters that are 3-D Gabor functions (Gaussian times sinusoid) and a Gaussian temporal filter. This model combines the spatial filter model described by Ohzawa et al (1990) with a temporal filter to generate direction selective responses. - Ohzawa I, DeAngelis GA, Freeman RD (1990) Stereoscopic Depth Discrimination in the Visual Cortex: Neurons Ideally Suited as Disparity Detectors. Science 239:1047-1051. - Adelson EH, Bergen JR (1985) Spatiotemporal energy models for the perception of motion. J Opt Soc Am A 2:284-299. The visual stimulus is processed (convolved) by four linear Gabor filters. The icons on the top row show x-t slices of the 3D filters, while the bottom row shows x-y slices for each subunit. The signals from the left and right (even filters) and fl2 filters) are also inverted, and these positive and negative filter outputs are combined and half-squared. The four resulting signals are added to form , the binocular disparity energy with direction selectivity. The raw signal (bde) is then offset, scaled and half-wave rectified (although the signal is typically already non-zero unless the scaling or offset has introduced negative values), and it is used to drive a Poisson spiking mechanism. The spikes are time shifted to simulate a neurobiological latency. See the model (.moo) files for the parameters that govern these computations.
<urn:uuid:3b1651fc-e654-4c8d-bdc9-0b279f598513>
CC-MAIN-2023-50
http://imodel.org/m/13/BDE_Gabor_DS/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.800806
369
2.625
3
Gender differences in the experience of loneliness among adolescents in Jakarta Adolescence is a transition period from childhood to adulthood. During this period, adolescents are prone to problems, one of those problems being loneliness. This research aimed to find out gender differences in the experience of loneliness among adolescents in Jakarta. Six hundred sixty-two participants, which consisted of 318 male and 344 female students aged between 15-20 years old, were selected from five schools by using multi-stage random sampling. 6-Item (short) De Jong Gierveld Loneliness Scales were used to measure loneliness. Data was collected through school-based research conducted on senior high school students in the Special Capital Region of Jakarta. The results show that there are significant differences in loneliness between male and female adolescents in overall, emotional and social dimensions. Female adolescents had significantly higher scores of loneliness compared to male adolescents, not only overall but also in emotional and social dimensions. Brehm, S. S., Miller, R. S., Perlman, D., & Campbell, S. M. (2002). Intimate relationships (3rd ed.). New York: McGraw-Hill. Cacioppo, J. T., & Hawkley, L. C. (2009). Perceived social isolation and cognition. Trends in Cognitive Sciences, 13(10), 447–454. https://doi.org/10.1016/j.tics.2009.06.005 Chen, L.-J., & Chung, S.-K. (2007). Loneliness, social connectedness, and family income among undergraduate females and males in Taiwan. Social Behavior and Personality: An International Journal, 35(10), 1353–1364. https://doi.org/10.2224/sbp.2007.35.10.1353 Cheng, H., & Furnham, A. (2002). Personality, peer relations, and self-confidence as predictors of happiness and loneliness. Journal of Adolescence, 25, 327–339. https://doi.org/10.1006/yjado.475 De Jong Gierveld, J., Van Tilburg, T., & Dykstra, P. (2006). Loneliness and Social Isolation. In A. Vangelisti & D. Perlman (Eds.). In The Cambridge Handbook of Personal Relationships (Cambridge Handbooks in Psychology, pp. 485–500). https://doi.org/10.1017/CBO9780511606632.027 De Jong Gierveld, J., & Van Tilburg, T. (2006). A 6-item scale for overall, emotional, and social loneliness: Confirmatory tests on survey data. Research on Aging, 28(5), 582–598. https://doi.org/10.1177/0164027506289723 Engels, R. C. M. E., Finkenauer, C., Meeus, W., & Deković, M. (2001). Parental attachment and adolescents’ emotional adjustment: The associations with social skills and relational competence. Journal of Counseling Psychology, 48(4), 428–439. https://doi.org/10.1037/0022-0188.8.131.528 Field, A. (2013). Discovering statistics using IBM SPSS Statistics (4th ed.). London: SAGE Publications. Garvin. (2017). Hubungan kecerdasan sosial dengan kesepian pada remaja (The relationship between social intelligence with loneliness among adolescent). Jurnal Muara Ilmu Sosial, Humaniora, Dan Seni, 1(2), 93–99. González-Jiménez, A. J., & Hernández-Romera, M. del M. (2014). Emotional dependency based on the gender of young adolescents in Almeria, Spain. Procedia - Social and Behavioral Sciences, 132, 527–532. https://doi.org/10.1016/j.sbspro.2014.04.348 Goossens, L. (2006). Emotion, affect, and loneliness in adolescence. In S. Jackson & L. Goossens (Eds.). In Handbook of Adolescent Development (pp. 51–70). New York, NY, US: Psychology Press. Gravetter, F. J., & Forzano, L.-A. B. (2012). Research methods for the behavioral sciences (4th ed.). Belmont: Wadsworth, Cengage Learning. Gravetter, F. J., & Wallnau, L. B. (2017). Statistics for the behavioral sciences (10th ed.). Boston: Cengage Learning. Gürsoy, F., & Bıçakçı, M. Y. (2006). A study on the loneliness level of adolescents. Journal of Qafqaz University, 140–146. Harris, R. A., Qualter, P., & Robinson, S. J. (2013). Loneliness trajectories from middle childhood to pre-adolescence: Impact on perceived health and sleep disturbance. Journal of Adolescence, 36, 1295–1304. https://doi.org/10.1016/j.adolescence.2012.12.009 Heinrich, L. M., & Gullone, E. (2006). The clinical significance of loneliness: A literature review. Clinical Psychology Review, 26, 695–718. https://doi.org/10.1016/j.cpr.2006.04.002 Karnick, P. M. (2005). Feeling lonely: Theoretical perspectives. Nursing Science Quarterly, 18(1), 7–12. https://doi.org/10.1177/0894318404272483 Kaur, J., Cheong, S. M., Naidu, B. M., Kaur, G., Manickam, M. A., Noor, M. M., … Rosman, A. (2014). Prevalence and correlates of depression among adolescents in Malaysia. Asia-Pacific Journal of Public Health, 26(5S), 53S-62S. https://doi.org/10.1177/1010539514544356 Kelly, B. D., O’Callaghan, E., Waddington, J. L., Feeney, L., Browne, S., Scully, P. J., … Larkin, C. (2010). Schizophrenia and the city: A review of literature and prospective study of psychosis and urbanicity in Ireland. Schizophrenia Research, 116, 75–89. https://doi.org/10.1016/j.schres.2009.10.015 Knox, D., Vail-Smith, K., & Zusman, M. (2007). The lonely college male. International Journal of Men’s Health, 6(3), 273–279. https://doi.org/10.3149/jmh.0603.273 Krause-Parello, C. A. (2008). Loneliness in the school setting. The Journal of School Nursing, 24(2), 66–70. https://doi.org/10.1177/10598405080240020301 Lasgaard, M., Goossens, L., Bramsen, R. H., Trillingsgaard, T., & Elklit, A. (2011). Different sources of loneliness are associated with different forms of psychopathology in adolescence. Journal of Research in Personality. https://doi.org/10.1016/j.jrp.2010.12.005 Lee, R. M., & Robbins, S. B. (2000). Understanding social connectedness in college women and men. Journal of Counseling and Development, 78(4), 484–491. https://doi.org/10.1002/j.1556-6676.2000.tb01932.x McWhirter, B. T., Besett-Alesch, T. M., Horibata, J., & Gat, I. (2002). Loneliness in high risk adolescents: The role of coping, self-esteem, and empathy. Journal of Youth Studies, 5(1), 69–84. https://doi.org/10.1080/1367626012011177 9 Parker, J. G., Low, C. M., Walker, A. R., & Gamm, B. K. (2005). Friendship jealousy in young adolescents: Individual differences and links to sex, self-esteem, aggression, and social adjustment. Developmental Psychology, 41(1), 235–250. https://doi.org/10.1037/0012-16184.108.40.206 Pedersen, S., Vitaro, F., Barker, E. D., & Borge, A. I. H. (2007). The timing of middle-childhood peer rejection and friendship: Linking early behavior to early-adolescent adjustment. Child Development, 78(4), 1037–1051. https://doi.org/10.1111/j.1467-8624.2007.01051.x Pinquart, M., & Sörensen, S. (2001). Gender differences in self-concept and psychological well-being in old age: A meta-analysis. Journal of Gerontology: Psychological Sciences, 56B(4), 195–213. https://doi.org/10.1093/geronb/56.4.P195 Qualter, P., & Munn, P. (2002). The separateness of social and emotional loneliness in childhood. Journal of Child Psychology and Psychiatry, 43(2), 233–244. https://doi.org/10.1111/1469-7610.00016 Rubin, K. H., Coplan, R. J., & Bowker, J. C. (2009). Social withdrawal in childhood. Annual Review of Psychology, 60, 141–171. https://doi.org/10.1146/annurev.psych.60.110707.163642 Santrock, J. W. (2016). Adolescence (16th ed.). New York: McGraw-Hill Education. Schinka, K. C., Van Dulmen, M. H. M., Bossarte, R., & Swahn, M. (2012). Association between loneliness and suicidality during middle childhood and adolescence: Longitudinal effects and the role of demographic characteristics. The Journal of Psychology, 146(1–2), 105–118. https://doi.org/10.1080/00223980.2011.584084 Umami, R. (2015). Gambaran loneliness dan kecenderungan psikotik pada remaja yang ditinggal orangtua bekerja sebagai buruh migran di luar negeri (Loneliness and psychotic tendencies in adolescents who are left behind by parents working as migrant workers abroad). (Undergraduate Thesis), Universitas Indonesia, Jakarta. Van Os, J., Kenis, G., & Rutten, B. P. F. (2010). The environment and schizophrenia. Nature, 468, 203–212. https://doi.org/10.1038/nature09563 Yang, J. (2009). Relationship between gender traits and loneliness: The role of self-esteem. Waltham: Brandeis University. Zhang, F., You, Z., Fan, C., Gao, C., Cohen, R., Hsueh, Y., & Zhou, Z. (2014). Friendship quality, social preference, proximity prestige, and self-perceived social competence: Interactive influences on children’s loneliness. Journal of School Psychology, 52, 511–526. https://doi.org/10.1016/j.jsp.2014.06.001 - There are currently no refbacks. HUMANITAS: Indonesian Psychological Journal ISSN 1693-7236 (print), 2598-6368 (online) Email : [email protected] This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
<urn:uuid:db6c8a73-8b83-4f87-b508-e0270891f207>
CC-MAIN-2023-50
http://journal.uad.ac.id/index.php/HUMANITAS/article/view/11311
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.657113
2,739
2.671875
3
Schemes Of Work 100% Completed Lesson Notes 100% Complete Necta Reviews 90% Complete Lesson Plan For Teachers 60% Complete ADVANCED CERTIFICATE OF SECONDARY EDUCATION EXAMINATION 151/1 ECONOMICS 1 (For Both School and Private Candidates) Time: 3 Hours Wednesday, 13th February 2013 a.m. 1. This paper consists of eight (8) questions in sections A and B. 2. Answer five (5) questions choosing at least two (2) questions from each section; and one (1) question from either section A or B. 3. Each question carries twenty (20) marks. 4. Non programmable calculators may be used. 5. Cellular phones are not allowed in the examination room. 6. Write your Examination Number on every page of your answer booklet(s). Answer at least two (2) questions from this section. 1. (a) Briefly explain the following economic terms: (i) Normative statements (iii) Market economy (b) Why micro economics is important in studying economics? (Give six points). 2. (a) What is meant by the term price elasticity of demand? (b) Explain eight factors that affect price elasticity of demand. 3. (a) Explain five conditions for price discrimination to exist. (b) Give five reasons to justify Industrial Localization. 4. (a) Briefly explain five features of Land as a factor of production. (b) Critically, examine five factors that affecting land productivity. 5. (a) Explain five main types of unemployment. (b) Elaborate five causes of unemployment in Tanzania. 6. (a) Describe why the long run cost curve is flatter than short run cost curve. (b) With the help of diagrams explain why the average cost curve is U-shaped. (c) Evaluate six wastes of monopolistic competition. 7. (a) “Perfect competition market does not exist”. Justify the statement by giving five points. (b) Distinguish between monopoly and oligopoly markets (give five points). 8. (a) Elaborate seven causes of increase in inflation rate. (b) Explain three monetary measures against inflation. Get Schemes Of Work In Zero Waiting Time Biology Made Simple Step 4 Ready On The Market!Get Your Copy Now Chemistry Made Simple Step 1 Chemistry Made Simple Step 2 Chemistry Made Simple Step 3 Chemistry Made Simple Step 4
<urn:uuid:6e800038-cd6d-45d0-8d5a-679d125cdbdd>
CC-MAIN-2023-50
http://learninghubtz.co.tz/form6-necta-qns-ans.php?sub=ZWNvbm9taWNz&yr=MjAxMw%3D%3D
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.854589
554
3.453125
3
My Coding > Programming language > Python LIST HowTo Python LIST HowTo (Page: 1) Go to Page: List in Python is a traditional array with a lot of methods of managing it. Every cell of list can have it’s own type. How to remove first element from list in Python There are few different ways to remove first element from list in Python. 1. removing element with list.pop() function Function pop(i) will remove element number i and return it. If this element is not present – function will rise an error: IndexError 2. removing element with del function Function del(list[i]) will remove given element. If this element is not present – function will rise an error: IndexError 3. removing element with list.remove() function Function list.remove(list[i]) will remove given element. If this element is not present – function will rise an error: IndexError 4. removing element with slicing slices will produce new list with subset of elements. Making this list from second element and assigning this new list to our list will do remove first element How to remove few element from list in Python 1. removing few element with del function Function del(list[i:j]) will remove elements described in this slice. If some of those elements are not present – function will not do any action against absent elements 2. removing few element with slicing Removing few elements with slicing is actually reverse task. We can leave untouched few elements with slicing. So if you want to remove selected slice [1:4], you need to use concatenation of two parts How to compare two lists If you need to compare two lists in Python you have two different cases. What do you want to know – is the elements are the same in the list, or they are stored in the same order as well. How to compare two lists for full identity Use operator == to make full comparison of two lists How to compare two lists for content only If you are interesting to compare that two lists contains the same elements without comparing order, the easiest way is to compare sorted lists. Use operator == over the sorted() function How to iterate over list in Python Iteration with range(len()) Traditional way for iterate through the list with indexes is to use range(len()) set of functions. Iteration over values in the list For most of the common tasks it is easier to iterate over the values of the list. Yuo should understand, that val is a shallow copy of the value. Modification of val will not make any impact on the original list Iteration with enumerate() enumerate() is a very convenient build-in function, also preferable to iterate over the list in Python. Last 10 artitles 9 popular artitles |© 2020 MyCoding.uk -My blog about coding and further learning. This blog was writen with pure Perl and front-end output was performed with TemplateToolkit.|
<urn:uuid:d1cb5959-2138-4afe-b010-28e37e3c9714>
CC-MAIN-2023-50
http://mycoding.uk/a/python_list.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.84808
639
3.703125
4
Principle #1: God is the Author of Free Government If there is no higher power to which a man can appeal, than to the powers and laws of men derived from conquests and dependent upon the temperaments and whims of men, then there is no rule of law. The rule of law depends upon God given rights. What is the rule of law? The Merriam-Webster online dictionary defines it as: Rule of law: A situation in which the laws of a country are obeyed by everyone. This is of course is a terrible definition! I truly hope that students who come across this definition would be properly corrected and instructed in the principles of freedom that our founders taught and understood, but somehow I doubt it. If the rule of law were to simply mean that one is obliged to obey the laws of the land as a duty of citizenship regardless of the nature of the laws under which they are bound, then any law or action of enforcement by a government, no matter how grossly it abuses it's citizens, would be considered legitimate. Therefore, even governments of tyranny could claim to be operating under the rule of law. Notice I say under the rule of law. It is instructive that a government operates under the rule of law rather than lording over the rule of law. The Rule of Law is dependent upon the Laws of Nature and Nature's God and government's who violate these natural rights of their citizens are outside the Rule of Law as understood and articulated by our founding fathers. "Good and wise men, in all ages, have embraced... a theory... that the deity, from the relations, we stand in, to himself and to each other, has constituted an eternal and immutable law, which is, indispensibly, obligatory upon all mankind, prior to any human institution whatever." (Alexander Hamilton, The Farmer Refuted, 1775) "This law of nature, being coeval with mankind and dictated by God himself, is of course superior in obligation to any other. It is binding over all the globe, in all countries, and at all times: no human laws are of any validity, if contrary to this; and such of them as are valid derive all their force, and all their authority, mediately or immediately, from this original." (Of the Nature of Laws in General, William Blackstone) This is what is called the Law of Nature Our founders taught the principle of the Rule of Law as the prerequisite principle to all forms of legitimate and free governments. Only governments who recognize God as the author of free government and establish and act within legal parameters that respect and protect the God given rights of their citizens, and adjudicate such law with equity among all its citizens, could be considered living under the rule of law. "Upon this law, depend the natural rights of mankind, the supreme being gave existence to man, together with the means of preserving and beatifying that existence. He endowed him with rational faculties, by the help of which, to discern and pursue such things, as were consistent with his duty and interest, and invested him with an inviolable right to personal liberty, and personal safety. Hence, in a state of nature, no man had any moral power to deprive another of his life, limbs, property or liberty…" Too many Americans in our times are untethered from the absolute truths of the eternal principles of freedom. They have the dangerous idea that it is the government that gives rights and the government has the legitimate power, when the majority decide it is right, to take away those rights. We will further discuss this principle in greater detail in principle #3 of the "Six Foundational Principles of Free Republics," but for now we must understand the source of our rights and our law if we are to retain our freedoms. "The sacred rights of mankind are not to be rummaged for, among old parchments, or musty records. They are written, as with a sun beam, in the whole volume of human nature, by the hand of the divinity itself; and can never be erased or obscured by mortal power.” (“The Farmer Refuted: or, a more comprehensive and impartial View of Dispute between Great Britain and the Colonies,” by Alexander Hamilton, Feb 25, 1775)
<urn:uuid:e5518d99-6aab-4aec-bda9-9aaef0a5467b>
CC-MAIN-2023-50
http://principles.freedomed.net/2020/07/the-rule-of-law-depends-upon-god-given.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.970436
881
2.671875
3
Ac. Krtashivananda Avt. What is the democratic way of life? It includes faith in human relations, tolerance, respect for opinions even if contradictory, equal justice and rights for all, freedom of thought and expression, to act according to one’s conscience, to do one’s rightful duty without fear, to support a government which a person has a voice in making and dissolving, and to promote morality cause and advance proper reforms without fear of a repugnant reaction from the ruling class. Democracy may mean either a form of society, or a form of government. Democracy as a form of social organization rests on the principle of social equality. It presupposes the absence of caste, race or class distinction. Democracy becomes meaningful, however, only when the members of the society have equal economic rights and when ultimate power rests with the people. Democracy as a form of government means a government in which the people exercise indirect control over the government through their elected representatives. In modern times, democracy implies something more than a form of government – a type of society. Today political thinkers are realizing that the democratic ideal will remain imperfect unless the entire field of economic activity is democratized. The main features of modern democracy in its political aspect are: - Indirect popular rule in the form of universal franchise - Rule of government - Responsible government - Alternation of power - Decentralization of power through the institution of local government Democratic principles today apply only to the government structure. There still exists an undemocratic social, economic and judicial order. In order to be real, democracy must be a combination of social, political and economic democracy, with the opportunity for all to get equal justice from its judicial system. The ideals of liberty and equality cannot be realized by giving voting rights only; they must be extended to social and economic life and especially to the sphere of dispensation of justice. According to H.E. Burns, “The greatest weakness of modern democracy is that it must work through representative government, which in turns requires a political party. This far this has proved fatally deficient as the main agency of democratic government. Parties create political confusion and instability by rigid adherence to outdated political theories. They encourage both political corruption and autocracy as a result of the inevitable development of party machines. When wither two-party or block systems break down, there is a tendency to resort to a one-party system, which is one of the main unscrupulous traits of political totalitarianism.” (H.E. Burnes, Cultural and Intellectual History of the Western World, Dover, NY 1965) The factors essential for the success of democracy are as follows: - People should be educated, in the sense that people should have sufficient political intelligence and general understanding - Moral consciousness must be sufficient to protest against political corruption and selfish leadership - Social consciousness should be high enough to counter the influence of casteism, racism and other narrow sentimental influences - The minimum requirements of each individual must be guaranteed Democratic rights may be broadly classified under two headings – civil and political. Rights enjoyed by citizenry constitute their civil liberties. The fundamental civil rights are: a) Right to life, which implies protection of life b) Right to personal freedom c) Right to work d) Right to property, limited but sufficient to provide the basic necessities of life (both consumer and capital properties) e) Right to association f) Right to religion and conscience g) Right to contract h) Right to speech and media i) Right to family life j) Right to education Absolute personal freedom, which may the corollary of unbridled passion and selfish materialism, is detrimental to democracy. Political rights are the content of political liberty, and include the following: a) Right to vote b) Right to be elected as a member of the legislature c) Right to hold public office in any service of the government d) Freedom of opinion, which implies the right to discuss and criticize government measures Regarding the right to vote, Prout proposes that it be qualitative and not quantitative. This will be discussed below. Duties of the citizen Duty means obligation. There are legal and moral duties of citizens which include: a) Obedience to the law b) Allegiance to the state c) Service to society d) Support of public officials e) Payment of taxes Duties of the state The duties of the state, in a nutshell, are to ensure political and economic freedom and to create a congenial social environment for all-round progress in all spheres of life. Modified direct democracy People today in many countries have lost their confidence in the efficiency of the representative form of government, and consequently there is growing distrust in it. Not only underdeveloped countries, but countries like Italy, France and Japan have recently faced turmoil due to inefficiency and corruption in high office. To extend the authority of the people over the legislature some direct democratic methods ought to be introduced. These include: Referendum – The referendum is a method of legislation by which legislative proposals or constitutional questions are submitted to popular vote for reconsideration after they have been passed by the legislature. Initiative – The initiative is a method that affords an opportunity to the electorate to make independent proposals for legislations. Plebiscite – The plebiscite provides a means of submitting certain questions of great public importance and highly controversial character to vote of the people. The verdict of the people may or may not be binding on the government, but it influences formation of future policy. Recall – The system of recall provides for compelling an elected office to resign or to submit to re-election. Thus, elected officers are made responsible to the electorate. The above methods can be used successfully in matters of vital importance and in provinces and smaller nations. In the 19th century it was believed that, “Universal suffrage could once change the character of society from a state of watchfulness, doubt and suspicion to that of brotherly love, reciprocal interest and universal confidence.” (Sivnath Chakravarty, An Introduction to Politics, Modern Book Agency, Calcutta 1977) But what is the condition of democracy today? Does the system of franchise reflect the will of the people? Does it create a world of mutual trust, confidence and unity? What are the shortcomings of the present system of election in democratic countries? According to Erich Fromm, “The problem of democracy today is not any more the restriction of franchise but the manner in which the franchise is exercised. How can people express ‘their’ will if they do not have any will or conviction of their own, if they are alienated automatons, whose tastes, opinions and preferences are manipulated by the big conditioning machines? Under these circumstances universal suffrage becomes a fetish. If a government can prove that everybody has a right to vote, and that the votes are counted honestly, it is democratic. If everybody votes, but the votes are not counted honestly, or if the voters are afraid of voting against the governing party, the country is undemocratic. “It is true indeed that there is a considerable and important difference between free and manipulated elections, but noting this difference must not lead to forgetting the fact that even free elections do not necessarily express ‘the will of the people’. If a highly advertised brand of toothpaste is used by the majority of the people because of some fantastic claims it makes in the propaganda, nobody with any sense would say that the people have ‘made a decision’ in favor of it. All that could be claimed is that the propaganda was sufficiently effective to coax millions of people into believing its claims. “In the alienated society the mode in which people express their will is not very different from that of their choice in buying commodities. They are listening to the drums of propaganda, and facts mean little in comparison with the suggestive noise, which hammers at them. In recent years, we have seen more and more how the guidance of public relations counsels determines the political propaganda. Accustomed to make the public buy anything for the build-up of which there is enough money, they think of political ideas and political leaders in the same terms. They use television to build up political personalities as they use it to sell a soap product; what matters is the effect, in sales or votes, not the rationality or usefulness of what is presented. This phenomenon found a remarkably frank expression in recent statements about the future of the Republican Party [USA]. They are to the effect that since one cannot hope the majority of voters will vote for the Republican Party, one must find a personality who wants to represent the Party – then he will get the votes. In principle this is not different from the endorsement of a cigarette by a famous sportsman or movie actor.” (Erich Fromm, The Sane Society, Holt Rhinehard and Winston, New York 1973) Although the above was written in the year 1962, it was a prophetic expression about subsequent presidential elections in the United States. According to PROUT, the right of people to vote only upon acquiring a certain age is fundamentally defective. The qualities of a candidate cannot be judged by the majority unless the majority itself has acquired a fair level of consciousness. Common people remain engrossed in satisfying their common needs. They are reluctant and uninterested in finding a true leader. Some argue that fair education for the masses is an answer to that. But it has proved futile even in developed countries. Much energy and resources are being spent on literacy in these countries. But people are not satisfied with the order or values thriving under their elected democrats. In this regard PROUT suggests that voting rights be resorted according to moral integrity and social awareness. “The human society is continually striving to arrive at a synthesis through analysis, some sort of unity through diversity. The natural obstructions of small clans, narrow communal interests, geographical distances and intractable customs and usages – none of these obstacles could hinder the steady and silent movement towards a supreme goal. That is why the policy of apartheid , the vanity of racial superiority, national chauvinism or regionalism – these relative doctrines or social philosophies-could not thwart the progress of human society. The outdated ideals of nationalism are crumbling to pieces today. the newly awakened humanity of today is anxious to herald the advent of one universal society under the vast blue sky. The noble and righteous persons of all countries, bound by fraternal ties, are eager to assert in one voice, wit one mind, and in the same tune that human society is one and indivisible. In this voice of total unity and magnanimity lies the value and message of eternal humanism.” Shrii Prabhat Rainjan Sarkar From World Government, a Reality of the 21st Century Published by PROUT Research Institute, Copenhagen
<urn:uuid:bf88337f-b5e0-43c1-a2d7-4aa30b79c736>
CC-MAIN-2023-50
http://proutglobe.org/2011/05/democracy-in-practice/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.946039
2,257
3.984375
4
Low-income Americans have borne the brunt of the coronavirus pandemic. They may also get left behind in the recovery. Steep declines in ridership during the crisis have pushed public transit systems across the U.S. into deep financial distress. Though Congress included allocations for transit in the CARES Act, cities said it won’t be nearly enough. Even major systems in large metro areas like New York City and Washington, D.C., have serious concerns about long-term survival without more sustained support. Failure of transit systems would be a disaster for the large proportion of low income households that depend on buses and trains to get to work and elsewhere – not only in urban areas, but in rural ones too. I’m currently in the middle of a two-year study of transport inequality in the U.S. One of my early findings is that about 20% of the poorest households don’t own a vehicle. That would make them entirely reliant on public transportation, compared with 6% for all households. For my study, I looked at the income and vehicle data from 2013 to 2017 for households in the bottom quintile of the income distribution in each of the country’s 709 commuting zones, which represent local economic clusters. In urban areas, 21% of these low-income households didn’t have a single vehicle. In rural areas, it was slightly lower but still significant at 16%. The share without a car varied widely among states, from over half of the poorest households in New York to just 6.8% in Utah. Dependence on transit also mirrors the deep racial inequalities in America. Almost a third of low-income African American households didn’t own a vehicle. Even among black households of all income levels the share without a car is very high at 16%. Even before the present crisis, America’s inadequate transport infrastructure was being seen as a driver of inequality, limiting access to jobs, education and other services for poorer households. Higher unemployment rates and longer duration of joblessness had also been linked to limitations in transit access in certain regions of the country. If cities and states have to drastically cut back public transportation availability over the long term, it could exacerbate these inequalities. Higher-income households with access to cars will be able to more easily return to their commutes as the crisis eases. And those who, prior to the outbreak, used mass transit might be more weary of returning to the subways and buses, which would worsen the funding problems. Any long-term disruptions, however, will bring devastating isolation to a large number of low-income households across the country. Their ability to get to work or even look for work once the lockdown ends will be severely hampered if transit systems are not adequately supported to maintain at least pre-crisis service levels.
<urn:uuid:24606b23-d4c5-4ce5-abcf-14157491a9de>
CC-MAIN-2023-50
http://urbanpulse.net/4963/coronavirus-lockdowns-are-pushing-mass-transit-systems-to-the-brink-and-low-income-riders-will-pay-the-price/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.964702
580
2.859375
3
The History of Reading In the late-eighteenth and early-nineteenth centuries, reading was a privileged skill available to the upper-class elite. Books were very expensive items and most of the population were unable to afford them. One of the more famous and prestige bookshops of the period was 'The Temple of Muses', situated in Finsbury Square, London. Founded by James Lackington in 1778, the architecturally stunning store had a frontage of 140 feet and the premise was so large that it was reported a coach and six would be able to drive around the huge circular counter in the centre of the shop. Lackington later sold the bookshop to Jones and Company where it continued to thrive, selling books at the lowest possible rates whilst maintaining an attractive and prosperous space for individuals to read and browse the latest texts. The Temple of Muses burnt down in 1841. In the early nineteenth century, it was very common for individuals to be able to read but not be able to write, although these statistics are likely influenced by economic factors as well as capability: paper was expensive, and writing with a quill time consuming and difficult, and therefore not that common. However, most illiterates had had contact with at least one literate person, which meant that to experience a text you do not have to read it. Newspapers were read out loud in public houses and Dickens's serialised novels were commonly read aloud in the home by a literate family member. In the 1830s and 1840s a new form of printed text emerged: a lengthy prose fiction serialised in one-penny or twopenny weekly parts. These were usually stories involving adventure or Gothic-like elements. Many had no planned, pre-written end; they just continued until the public were no longer interested in the story. Some penny weekly novels in the 1850s and 1860s were serialized over four or more years. Increased production of this sort could only be supported by an increasingly literate population. In 1870 the Education Act (sometimes called the Forster Education Act) was introduced by parliament. Drafted by W. E. Forster, the act campaigned for free, compulsory and non-religious education for all children, and helped to establish the foundation for generalised literacy rates across England in the late-Victorian era. The Novel and Serialised Fiction Most Victorian novels were published in three volumes called the triple-decker or three-volume novel at 31s. 6d, or 10s. 6d per volume. This price, although too expensive for the average purchaser, enabled the publisher to cover their costs whilst allowing for a reasonable payment to go to the author. Those who could not afford to buy new novels used the circulating libraries newly established across the country. A novel divided into three parts could create demand, and the income from the first part could also be used to pay for the printing costs of the later parts. Furthermore, as most individuals obtained their books from the circulating libraries, the librarian at these premises had three volumes bringing in money, rather than one. The particular style of mid-Victorian fiction - a complicated plot reaching its conclusion through marriage and the acquisition of property - was well adapted to the form. One of the more famous of the circulating libraries was the Mudie's Lending Library and Mudie's Subscription Library established in London by Charles Edward Mudie from 1852. The lending libraries such as 'Mudie's' had a strong influence over publishers and authors as they were able to reach a much larger section of the reading public. Such was the strength of Mudie's influence that he was also crucial in the success of scientific volumes, purchasing 500 copies of the first publication of Charles Darwin's On the Origin of Species. The decline of Mudie's eventually came as a result of the rising number of government-funded public libraries, which were much cheaper and accessible to a wider range of the population. Authors and publishers were anxious to increase their sales by reducing the price of new fiction. Dickens was one of a number of authors who tried to break through the rigid system of the three-decker novel. Using the idea of the lower-class form of the weekly-part novel as a model, he started to publish his fiction on a monthly basis at a shilling per instalment. Unlike the previous serialised fiction, there was a limited number of twenty parts serialised over nineteen months (the final part was a double issue at two shillings). Up to this point book sales had been small. However, the advent of serialised fiction popularised by Dickens's work meant that at the end of the nineteen months, the reader had an entire novel for a pound rather than thirty-one shillings and sixpence. Novels issued in several monthly parts were framed by advertisements for a variety of items pitched towards the middle-class reader. They were surrounded by news reports, critical articles, and the latest reviews. This meant that for Victorian readers, the novel was not a self-contained entity but rather a text surrounded by a material framework of various fonts and images, which created a different reading process when reading the novel as we would encounter when reading a work of fiction today. In 1849 the publishing house Routledge started the first Railway Library. The books were cheap, priced at one shilling per volume, and designed to be read whilst traveling by train. The library proved to be a great success because railway carriages were lit and, unlike when traveling in a horse-drawn vehicle, the ride was steady enough to read without becoming ill. This made train journeys the ideal environment in which to encourage reading and promote fiction. These perpetuating effects are evident in the success of the Railway Library venture; by the time it came to an end in 1898, it had published 1277 volumes. Once a serial had been completed, it was often reprinted in a cheaper (usually 6 shilling) one-volume edition, and then again as a yellowback available in the Railway Libraries. The second-half of the nineteenth century saw the 6 shilling novel emerge as the preferred form for publishing new fiction. Faced with the growth of free, government-funded libraries, the circulating libraries decided to take necessary action in an attempt to ensure their continuation. In 1894 they announced that they would pay no more than 4 shillings a volume for fiction – a declaration that signaled the beginning of the end for the pricey three-decker novel. By the end of the nineteenth-century, railway travel, circulating libraries, and affordable serialised fiction had brought books within the reach of many members of the newly-literate working-class population, who had previously been excluded from the world of the book. The history of nineteenth-century printing is tightly interwoven with that of illustration. Many serialised novels were accompanied by illustrations depicting scenes from the text, ranging from full double-page images in illustrated newspapers such as The Graphic to tiny vignettes enclosing the first letter of the opening chapter in periodicals such as The Cornhill. The expansion of literacy in the early-nineteenth century was associated with pictures since learning the letters of the alphabet involved pictorial prompts. Illustration was incredibly popular and common place: Dickens' publications were accompanied with drawings by Phiz (Hablot Knight Browne) or George Cruikshank, and ten of Thomas Hardy's novels were first serialised with accompanying illustrations in magazines or newspapers. Poetry collections were also printed with detailed images included in the pages: the Moxon edition of Tennyson's Poems (1857) was a fully-illustrated collection of the poet's works, drawn by several pre-Raphaelite artists including Dante Gabriel Rossetti. The engraved boxwood block was the most significant piece of technology which dominated early Victorian book illustration. The illustrations used to accompany prestigious fiction by such authors as Dickens and Hardy were of the highest quality, made from wood engravings painstakingly crafted by engravers from the artist's original design. Eric de Maré acknowledges the splendour and success of the wood-block industry of the nineteenth century in the following quotation: 'When these publications were illustrated, as so many were, the wood-block was the only means – helped by the metal stereo and electrotype, by which pictures could be printed with text in a single pressing on the same page. It required the growth of a great craft industry, the finest of the century'. The above remark identifies the wood-block as being the most significant mode of production behind Victorian illustration. De Maré explains how the technological advancement of the wood-block enabled the image to be printed on the same page as the text. This development simplified the reading experience and enhanced the correlation between word and image, thereby aiding the popularisation of illustration and its use in periodicals. Even those who were illiterate or semi-literate could gain immediate access to the fiction via the visual image without having to read the printed text. The high standard of illustrations used by publications such as The Graphic and The Cornhill stem from the consistent use of classically trained artists, who were able to produce quality work which helped popularise illustration and increase demand for images. The quality of these illustrations and a confidence in their prestigious nature is exemplified in the serialisation of Hardy's Tess of the d'Urbervilles in The Graphic. Four artists were employed to work on the different illustrations at significant cost, including the famous Hubert von Herkomer, whom the other three artists trained under. - Eric de Maré,The Victorian Wood-Block Illustrators (London: G. Fraser, 1980) p. 7.
<urn:uuid:20937a33-e445-4b92-a688-5efe3932f590>
CC-MAIN-2023-50
http://writersinspire.podcasts.ox.ac.uk/content/victorian-publishing-history
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.97838
1,982
3.328125
3
Digital Addiction: The Rising Concern in the Digital Ageby Dr Don Yates Sr PhD Entrepreneur, Mentor, Advisor, CEO In today's digital age, it is becoming increasingly common for individuals to develop an addiction to technology. This phenomenon, known as digital addiction, is characterized by an excessive and compulsive use of digital devices, such as smartphones, tablets, and computers, often resulting in negative consequences for one's mental and physical well-being. Understanding the impact of digital addiction is vital as it affects individuals of all ages and can significantly impact their daily lives. This article aims to delve into the various aspects of digital addiction, including its signs and symptoms, the role of technology in fueling addiction, its impact on mental health and physical well-being, risk factors, prevention and management strategies, seeking professional help, the importance of digital detoxes, building healthy digital habits, and promoting digital well-being in a hyperconnected world. What is Digital Addiction? Digital addiction, also known as technology addiction or internet addiction, refers to the excessive and compulsive use of digital devices, leading to negative consequences in various aspects of an individual's life. This addiction can manifest in an obsession with activities such as social media, online gaming, streaming services, or constantly checking emails and messages. Individuals struggling with digital addiction often find it difficult to control their use of digital devices and experience withdrawal symptoms when attempting to limit or abstain from their usage. Understanding the Impact of Digital Addiction Digital addiction can have significant implications on an individual's life. Excessive use of technology can disrupt personal relationships, hinder academic or professional performance, and lead to a decline in physical and mental health. The constant need to be connected and engaged with digital devices can result in social isolation, reduced productivity, and an overall decreased quality of life. Understanding the impact of digital addiction is crucial to recognize the gravity of the issue and take necessary steps to prevent or manage it effectively. Signs and Symptoms of Digital Addiction Identifying the signs and symptoms of digital addiction is essential for early intervention and treatment. Common indicators include an inability to control digital device usage, neglecting personal responsibilities, preoccupation with digital activities, irritability or restlessness when unable to access devices, withdrawal from offline activities, and a decline in social interactions. Physical symptoms such as eye strain, headaches, and disturbed sleep patterns may also be present. Recognizing these signs and symptoms can help individuals and their loved ones address the issue promptly. The Role of Technology in Fueling Digital Addiction Technology plays a significant role in fueling digital addiction. The design of digital platforms, apps, and games is often intentionally created to be addictive, employing techniques such as notifications, rewards, and infinite scrolling to keep users engaged. Social media platforms capitalize on the desire for constant validation and connection, fostering addictive behaviors. The availability and accessibility of digital devices also contribute to the development and exacerbation of digital addiction. How Digital Addiction Affects Mental Health Digital addiction can have profound effects on an individual's mental health. Excessive use of digital devices can lead to increased stress, anxiety, and depression. Constant comparison and exposure to curated versions of others' lives on social media can contribute to feelings of inadequacy and low self-esteem. Moreover, digital addiction can disrupt sleep patterns, exacerbating mental health issues. It is crucial to recognize the impact of digital addiction on mental well-being and prioritize mental health in the age of technology. Physical Consequences of Digital Addiction Digital addiction is not limited to mental health; it can also have physical consequences. The sedentary nature of excessive screen time can lead to a sedentary lifestyle, contributing to obesity and other health conditions. Prolonged use of digital devices can strain eyesight and cause issues such as digital eye strain and dry eyes. Additionally, poor posture while using devices can lead to musculoskeletal problems, including neck and back pain. Being aware of these physical consequences highlights the importance of maintaining a healthy balance between digital device usage and physical activity. Identifying Risk Factors for Digital Addiction Certain risk factors may make individuals more susceptible to digital addiction. Psychological factors such as low self-esteem, loneliness, or a pre-existing mental health condition can increase vulnerability. Additionally, environmental factors, including a lack of parental control or supervision, easy access to digital devices, and excessive exposure to technology, can contribute to the development of digital addiction. Recognizing these risk factors can aid in prevention efforts and targeted interventions. Strategies to Prevent and Manage Digital Addiction Preventing and managing digital addiction requires a multifaceted approach. Setting clear boundaries and limitations on device usage, practicing digital mindfulness, and engaging in offline activities are effective strategies to prevent the onset of addiction. For those already struggling with digital addiction, gradually reducing screen time, seeking support from loved ones, and engaging in alternative hobbies or activities can aid in managing and overcoming addiction. Seeking Professional Help for Digital Addiction In severe cases, seeking professional help is essential for individuals battling digital addiction. Mental health professionals, such as psychologists or counselors, can provide the necessary guidance and support needed to address the underlying causes of addiction and develop coping strategies. Additionally, support groups and addiction treatment centers specializing in technology or internet addiction can offer valuable resources and a supportive community for individuals seeking recovery. The Importance of Digital Detoxes Digital detoxes, or periods of intentional disconnection from digital devices, are becoming increasingly important in combating digital addiction. Engaging in regular digital detoxes allows individuals to reset their relationship with technology, reevaluate their digital consumption habits, and prioritize self-care and well-being. These periods of disconnection can help individuals regain control over their device usage, reduce dependency, and foster a healthier relationship with technology. Building Healthy Digital Habits Building healthy digital habits is crucial in maintaining a balanced and mindful approach to technology usage. This involves setting aside designated times for device usage, implementing digital-free zones, and establishing routines that prioritize offline activities and social interactions. By consciously choosing when and how to engage with digital devices, individuals can develop healthier habits and mitigate the risk of digital addiction. Promoting Digital Well-being in a Hyperconnected World Promoting digital well-being requires a collective effort from individuals, families, educators, and policymakers. Educating individuals about the risks and consequences of excessive technology use, implementing digital literacy programs, and fostering open discussions around healthy device usage are essential steps. By creating a culture that values and encourages healthy technology habits, we can strive towards a hyperconnected world that prioritizes the well-being of its users. In today's technologically driven society, digital addiction has become a pervasive issue affecting individuals worldwide. Recognizing the signs, understanding the impact, and implementing strategies to prevent and manage digital addiction are crucial for maintaining a healthy balance between technology and one's overall well-being. By prioritizing mental and physical health, seeking support when needed, and fostering healthy digital habits, individuals can navigate the digital landscape in a way that enhances their lives rather than hindering them. In this hyperconnected world, it is essential to promote digital well-being and ensure technology remains a tool for empowerment rather than a source of addiction. Created on Sep 15th 2023 12:06. Viewed 405 times.
<urn:uuid:1ff934ae-4b8e-41d9-acf1-3337e7243d26>
CC-MAIN-2023-50
http://www.apsense.com/article/digital-addiction-the-rising-concern-in-the-digital-age.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.915532
1,477
3.28125
3
The ability to eat well has often been an achievement throughout history in cultures across the globe. That may be why a buxom bride was often sought in many cultures where food might be limited. Women with larger hips, a more pronounced chest, and even those with plenty of curves that are missing from today’s Western models might have been considered more beautiful than those with perfectly symmetrical or stunning facial features. The ideal wife used to be one able to provide plenty of children for her husband. Wide hips were often considered more beautiful because it was assumed the woman would produce many children. For those looking at chests, the larger ones were thought to be able to provide plenty of nourishment for new-borns. These were seen as a form of beauty in hard times, and there are still cultures today that consider them essential. Wide hips and protuberant chests were often just the start of beauty in these types of cultures. A curvier woman was often one able to eat well, and it marked her family as one that could provide a beneficial alliance to a prospective groom. He may not have wanted to look at her face, but the rest of her might have been a dream come true. There are plenty of measures available when it comes to beauty, yet this type of cultural definition is one that defined both the ability to procreate successfully while being attached to a family with resources. It may not be seemly in many modern cultures to define beauty in this manner, yet those needs continue to exist throughout the world.
<urn:uuid:fadc897e-a250-4415-a169-b59809ae49f2>
CC-MAIN-2023-50
http://www.harmonicfestival.co.uk/a-buxom-bride
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.988892
309
2.53125
3
Every hour of every day, someone in North America dies of oral cancer, the sixth most common diagnosed form of the disease. The five-year survival rate is only 50 percent, and oral cancer is one of the few cancers whose survival rate has not improved. This grim statistic may make you think that oral cancer is a particularly deadly form, when in fact the high death rate has more to do with how late in its development oral cancer is detected. Routine screening is the key to early detection and survival, and in our continuing efforts to provide the most advanced technology and highest quality care available to our patients at Soundental, we proudly screen our patients for oral cancer. So, who’s at risk for oral cancer? Anyone can develop oral cancer, but some people are at a higher risk. These high-risk groups include those over the age of 50 and men, who are twice as likely as women to develop the disease. Smoking or chewing smokeless tobacco products, consuming alcohol excessively, and constant exposure to the sun at a young age are also risk factors. How is oral cancer detected? Drs. Richmond Hung, Beth Bureau, Michael Margolies, and Sheldon Natkin and our team at Soundental suggest our patients perform a monthly self-examination to check for unusual red or white patches, sores, lumps, or thickenings anywhere inside the mouth, on the lips, or in the throat and neck area. We encourage you to give us a call at our convenient West Haven, CT office if you find any of these symptoms or if you have trouble swallowing or experience a chronic sore throat and hoarseness. During your visit, Drs. Richmond Hung, Beth Bureau, Michael Margolies, and Sheldon Natkin will inspect the oral tissues and neck to determine if abnormalities are present. What happens if oral cancer is detected? If we discover abnormal tissues during your visit, a biopsy will be required. The results from the biopsy will be sent to a laboratory to determine if the cells are cancerous or precancerous. If a diagnosis of cancer is made, surgery, as well as treatment such as chemotherapy or radiation may be necessary. Drs. Richmond Hung, Beth Bureau, Michael Margolies, and Sheldon Natkin and our team will work closely with your oncologist and other members of your medical team to ensure that you achieve the best possible oral health care both during and after treatment. Finding out you have oral cancer can be devastating news. If you are concerned that you might be at risk for developing oral cancer, talk to us about screenings and other things you can do to reduce your risk. Through a routine visual inspection, Drs. Richmond Hung, Beth Bureau, Michael Margolies, and Sheldon Natkin and our team at Soundental can often detect premalignant abnormalities and cancer at an early stage when treatment is both less expensive and more successful, and can potentially save your life. Ask us about a screening during your next visit!
<urn:uuid:e2914e84-4801-442c-acca-e9d03873c2f4>
CC-MAIN-2023-50
http://www.soundental.com/blog/2017/12/early-detection-is-key-to-treating-oral-cancer
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.94288
612
2.859375
3
In 1908 – Scottish electrical engineer, Alan Archibald Campbell-Swinton, published a brief letter in the journal Nature, describing the essentials of making and receiving television images. He described using an electron gun in the neck of a cathode-ray tube to shoot electrons toward the flat end of the tube, which was coated with light-emitting phosphor. Others like Farnsworth and Baird would make just such devices years later. In 2002 – Kevin Warwick had his chip removed. Warwick implanted the chip earlier that year in order to experiment with human-computer interaction, culminating in a direct connection to his wife. In 2009 – The Lunar Reconnaissance Orbiter (LRO), a NASA robotic spacecraft was launched on its mission to colelct information abotu the Moon, particularly around the poles.
<urn:uuid:9d3d2bbc-142a-4aa5-a6b7-90b8fed8e0d5>
CC-MAIN-2023-50
http://www.tommerritt.com/tech-history-today-june-18/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.94887
164
3.03125
3
Invest time in unpaid advertising methods to spice up your business. Dalam arti seperti itu terdapat alat seperti slide rule, jenis kalkulator mekanik mulai dari abakus dan seterusnya, sampai semua komputer elektronik yang kontemporer. Istilah lebih baik yang cocok untuk arti luas seperti “komputer” adalah “yang mengolah informasi ” atau ” sistem pengolah informasi” Selama bertahun-tahun sudah ada beberapa arti yang berbeda dalam kata “komputer”, dan beberapa kata yang berbeda tersebut sekarang disebut sebagai komputer. Memory is without doubt one of the most important things that’s included into computer systems, be it computers or PCs. There are various laptop memory varieties put in, depending upon the precise want for functioning and specifications of the system. The computer reminiscence relates to the many gadgets and elements that are chargeable for storing information and purposes on a brief or a permanent foundation. It allows an individual to retain the knowledge that is stored on the pc. Without it, the processor wouldn’t be capable to discover a place which is needed to retailer the calculations and processes. There are various kinds of memory in a computer which can be assigned a task of storing several varieties of data. Each has certain peculiarities and capacities. Usually, pc instructions are easy: add one number to another, transfer some information from one location to a different, send a message to some exterior system, and many others. These instructions are learn from the computer’s reminiscence and are typically carried out ( executed ) within the order they got. Nonetheless, there are normally specialised directions to tell the pc to leap forward or backwards to some other place in this system and to hold on executing from there. These are called “soar” instructions (or branches ). Furthermore, leap directions may be made to occur conditionally in order that completely different sequences of instructions could also be used relying on the result of some earlier calculation or some external occasion. Many computer systems instantly assist subroutines by providing a kind of bounce that “remembers” the placement it jumped from and another instruction to return to the instruction following that bounce instruction. Put simply, LSI key phrases are terms semantically associated to your subject Every LSI keyword, teams of words, or phrase you employ is relevant to the primary key phrase you are concentrating on. However, they’re not at all times synonyms—LSI also searches for concepts commonly discovered in conjunction with your major keywords. Google can devalue whole websites, individual pages, template generated links and particular person links if Google deems them pointless†and a ‘poor person expertise’. If you will get a Wikipedia web page – get one!. Hold it up to date too. For the remainder of us, we’ll just need to work more durable to prove you are a real enterprise that has earned its rankings. Start getting more certified traffic, increased sales, and higher rankings on SERPs by requesting search engine optimzation companies for your corporation website. To be clear, keywords are still an essential part of SEO, and keyword research might help information your technique. High quality of your content material: Speaking of excessive-high quality content , that you must create it if you wish to obtain excessive-high quality hyperlinks. You want to be sure that your web site offers content material with a high word depend (Google loves long content), easy readability, fast load pace, and unique information. These all ship nice signals to Google and show you how to to rank greater in results pages. Having developed shut ties to the American navy through the Manhattan Challenge, Von Neumann was capable of modify the US Army’s inflexible, mechanical, and laborious-wired ENIAC computer right into a stored-program machine. Afterward, he won approval to develop a brand new and improved laptop at the Institute for Advanced Research, which was the primary trendy, binary arithmetic laptop system. Importantly, it applied the saved-program idea but with the innovative twist of using the identical reminiscence area for instructions as well as the data used by the program.
<urn:uuid:8ee35f0f-f5cd-4690-ab9b-38dfa83607b4>
CC-MAIN-2023-50
https://24img.com/jobs-career-wage-and-schooling-information.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.856189
945
2.515625
3
Every Crystal is Unique! You'll Receive One Similar to the Photographs pictured above Labradorite is an igneous mineral that is composed of calcium and sodium feldspar. It is found in large quantities in the Canadian province of Newfoundland and Labrador, where it was first discovered in the late 1800s. Labradorite is known for its unique iridescence and play of colors, which are caused by light reflecting off of the different layers of feldspar. It is thought to have been used as a talisman or amulet by the ancient Inuit people. Labradorite was also used by shamans and healers to help bring balance and harmony to the body. Labradorite is used in jewelry and decorative pieces today due to its stunning iridescent qualities. Geologists believe that Labradorite was formed from molten magma that cooled slowly deep beneath the Earth's surface. Labradorite is mined in several countries, including Russia, Canada, and India. The most valuable type of Labradorite is known as the "Rainbow Moonstone". The ankh was an important symbol in Ancient Egypt, representing life and immortality. It was closely associated with the gods and goddesses of the day, particularly Osiris and Isis, and was often used in amulets, jewelry and other religious artifacts. It was believed to be a powerful symbol of protection, granting strength, health and long life.
<urn:uuid:a2912431-7325-472f-922c-f8607863bdaf>
CC-MAIN-2023-50
https://3rdgalaxiart.com/products/fully-wrapped-labradorite-ankh
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.980543
281
3.140625
3
Most programmable logic controller (PLC) programs will include a counter instruction. The Productivity 2000 Series PLC has two different counter instructions for your program. These can be used in several different ways to adapt to your application. Basically, counters are used to count up or down to a specific limit. When the limit is reached, the output is turned on. Counters can be made from a few different instructions from the PLC. The math instruction uses the one-shot (leading edge) input to add 1 to an internal register to keep track of the counter’s value. A comparison is used to compare this counter value to a set value (SV). The output is turned on if it is greater than or equal. Another input is used for the reset of the counter value. Copy is used to move the reset value into the counter value. This reset will usually override the counting application. Breaking down the counter’s essential operation will help us understand our application and how we can utilize counters in our automation programs. The productivity suite software has Simple Counters (SCNT) and the Counters (CNT) instructions. We will be reviewing these instructions and looking at how to implement them in our ladder logic program. Let’s get started. Previously in this Productivity 2000 series PLC, we have discussed: P2000 Hardware Features – Video Productivity Suite Software Install – Video Communication (System Configuration) – Video First Program – Video Debug Mode – Video PLC Program Documentation – Video PLC CPU Display – Video PLC Online Programming – Video PLC Tag Database – Video Ladder Logic Contacts – Video Ladder Logic Outputs – Video Timers – Video Simple Counters (SCNT) Timing Diagrams – Productivity Counters When dealing with all counters, we must look at the timing charts. This will help in understanding how your application will need to function. As a system integrator, this ability can prove very useful to you in the field when commissioning your automation system. The Secret of Using Counters is a good refresher on using timing charts. Here is the YouTube video for this post: PLC Counter Programming – 3 Things to Know We will first use the simple counters instruction. Using the Structure, the preset value, current value, and done bit are automatically assigned to the structure name. The addresses can be entered individually or through the Structure. We have the One-Shot selected. This means that the counter will count as 1 for every transition from off to one of the inputs. The following post will explain the one-shot circuit in the PLC. How to Make a One-Shot in the PLC – Video Select Use Structure. The name will be Simple_Counter. When we do this, the following parameters are set: Simple_Counter.Current – 32bit integer Simple_ Counter.Done – Boolean Simple_ Counter.Preset – 32bit integer The following tags are then displayed. We will choose the preset value and current value to be retentive. If power is lost or the PLC mode changes from run to program mode, the values specified as retentive will remember. The initial preset value will be 5. When switch one transitions from off to on (one-shot), the counter current value will increment by 1. Once the current value equals the preset value (5), the done bit will be set. The second rung of your ladder will turn on Out1 when the Done bit is on. Reset of the counter (Current value set to zero.) is done by the second input of the simple counter. In our case, it is switch 2. Note: The reset always overrides the count value input. This will set up the following parameters: Counter.Current – 32bit integer Counter.Equal – Boolean Counter.Greater – Boolean Counter.Less – Boolean Counter.Preset – 32bit integer Counter.Reset – 32bit integer Our first input (Switch3) will be the count-up. When this transitions from off to on the counter current value will increment by 1. The second input (Switch4) will be the countdown. When this transitions from off to on the counter current value will decrement by 1. When both counter-up and counter-down inputs are triggered simultaneously, the counter-current value will not change. The reset input will be done with Switch5. When activated, the reset value will be placed in the current value. This reset will override the up and down count inputs. Watch the video below for the counter instructions used in our Productivity 2000 Series PLC. Download the Productivity 2000 PLC ladder logic counters program here. Productivity 2000 Series PLC from Automation Direct Overview Link (Additional Information on the Unit) Configuration (Configure and purchase a system – BOM) User Manual and Inserts (Installation and Setup Guides) Productivity Suite Overview (Features of the fully functional free software package for the Productivity Family of PLC (PAC) controllers) Productivity Suite Programming Software (Free Download Link) This software contains all the instructions and helps files for the Productivity Series. Watch on YouTube: Productivity 2000 PLC Ladder Logic Counter If you have any questions or need further information, please contact me. If you’re like most of my readers, you’re committed to learning about technology. Numbering systems used in PLCs are not challenging to learn and understand. We will walk through the numbering systems used in PLCs. This includes Bits, Decimal, Hexadecimal, ASCII, and Floating Point. To get this free article, subscribe to my free email newsletter. Use the information to inform other people how numbering systems work. Sign up now. The ‘Robust Data Logging for Free’ eBook is also available for free download. The link is included when you subscribe to ACC Automation.
<urn:uuid:70756fd0-2bf0-47e8-934d-274efa40c79b>
CC-MAIN-2023-50
https://accautomation.ca/productivity-2000-plc-ladder-logic-counter/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.810935
1,252
3.03125
3
The state of Alaska has a mandate to sustainably manage wildlife species for the benefit of hunters, which means they sometimes manage — even kill — certain species, like bears and wolves, to increase the numbers of others, like caribou. But the National Parks Service — which oversees about 48 million acres of national parks and preserve land in Alaska — does not prioritize some animals over others. The different approaches of the two groups may come to a head in U.S. District Court case Alaska v. Zinke, Wildlife Wednesdays speaker Jim Adams explained at a lecture at the University of Alaska Southeast in front of a crowd of 75. Adams is the director for the Alaska region of the National Parks and Conservancy Association. The National Park Service has a “dual mandate,” he said, which puts it in contrast with the state: They’re required to manage their lands for the benefit of users as well as future generations. That means the NPS lets nature take its course. If an increase in bears leads to less deer, that’s not something the NPS will intervene with. Not so with the state of Alaska. “The service does not engage in activities to reduce the number of native species to reduce the numbers of harvested species, nor does the service permit others to do so on lands managed by the National Park Service,” Adams said. “The state has a different management philosophy around wildlife.” That difference manifests itself in how the state of Alaska, through Fish and Game, regulates bear hunting: they allow it. It’s not allowed on National Parks land. State- and federal-run agencies have disagreed about several regulations in the past, so this is not anything shocking. But bear hunting has become a very controversial subject in North America, particularly given that neighboring – at least in Southeast Alaska – British Columbia recently announced that it’s banning grizzly bear hunting.
<urn:uuid:b2bb4a83-6312-41db-8aa8-614aa3e69806>
CC-MAIN-2023-50
https://aksportingjournal.com/differing-views-bear-hunting/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.948708
397
3.15625
3
Your mouth contains both good and bad bacteria. When you eat a lot of sugary foods, harmful bacteria produce acids that remove some of the minerals from your tooth enamel. Although your saliva consistently restores the mineral content of your enamel, the process becomes harder if you consume more sugar. Over time, your enamel will slowly weaken, leading to cavities, tooth decay, and a myriad of other oral health issues. While you can still indulge in your favorite sweet treats occasionally, it’s best to reduce your sugar cravings to avoid negative effects on your oral health. So, if you have a sweet tooth, here are some tips to help you overcome your sugar cravings and improve your dental wellness. Replace Treats with Healthier Options Several foods are sweetened by natural sugars, which are healthier options compared to added sugars. Instead of indulging in a slice of cake, consider a piece of fruit! Apples, bananas, oranges, and strawberries are great examples of tasty fruits that can satisfy your craving without added sugars. Sometimes, you might have a sugar craving because you’re dehydrated. Pour yourself a large, refreshing glass of water to help eliminate the temptation. Water is also better for your oral and overall health compared to sports and energy drinks. You might also opt for tap water instead of bottled water, as it contains more fluoride that helps strengthen tooth enamel. Find Sugar-Free Alternatives Commercial sweeteners make sugar-free products taste more like the sugared foods they’re based on. That means you can enjoy a sweet treat without the harm of real sugar. Consider chewing sugar-free gum to indulge in a sugar craving without risking damage to your teeth. It’s usually sweetened with sorbitol or xylitol, which doesn’t promote bacteria growth like regular sugar. Eat Balanced Meals It can be easy to mistake the general feeling of hunger for a sugar craving. Try fending off the craving by indulging in a healthy, balanced meal. A combination of vegetables, protein, and healthy carbs and fats can keep you full for much longer than a single sugary snack. It will also stabilize your blood sugar, which can reduce sugar cravings. Consider Fermented or Sour Foods Instead If you have a sweet tooth, consider eating something sour or bitter instead. It can help counteract your sugar cravings. One simple example is drinking water infused with lemon. In addition to their sour taste, many fermented foods also deliver probiotics that can fight the bacteria that thrive on sugar. Enjoy in Moderation It can be hard to imagine quitting sugar cold turkey. And when you cut out sugar entirely, you increase your chances of binging on the foods you’ve missed. So, it’s okay to enjoy a donut or cupcake now and then. While excessive sugar is harmful to your oral health, the occasional sweet treat won’t destroy your teeth as long as you maintain an effective oral hygiene routine. The bottom line is to enjoy sweets in moderation! The post How to Reduce Sugar Cravings for Better Oral Health first appeared on Dental Signal.
<urn:uuid:fb96216e-9858-47ed-a6b3-7d8b11337fc2>
CC-MAIN-2023-50
https://alhambradentalplaza.com/how-to-reduce-sugar-cravings-for-better-oral-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.921957
647
2.890625
3
A lottery is a method of distributing prizes (usually money or goods) among a group of people by lot or chance. It is most commonly a form of gambling, in which players purchase chances to win a prize by a drawing. Modern lotteries often use a computer to randomize the selection of winning tokens or symbols. The casting of lots to determine fates and fortunes has a long record in human history, including several examples in the Bible. The drawing of lots to distribute wealth has more recently been used for public works projects, military conscription, commercial promotions, and even for selecting members of a jury. While the lottery has many critics, it is still popular in America and around the world. In fact, Americans spend over $80 billion on tickets each year. While it is not recommended to make a living from playing the lottery, it can be an enjoyable hobby that gives you the opportunity to dream about winning the jackpot. However, before you start playing the lottery, you should know a few things about it. The first and most important thing to remember is that the odds of winning are very small. In fact, you are more likely to be struck by lightning than win the lottery. It is also important to avoid superstitions and sloppy play when choosing your numbers. In addition, you should choose a diverse range of numbers. Make sure that there are low, high, and odd numbers represented. Then, try to find a number that has the best ratio of success to failure. You can calculate this by using a lottery codex calculator. Lotteries have a broad appeal because they feed the human desire to dream big. However, they also have a specific constituency that includes convenience store operators; lottery suppliers (who regularly contribute to state political campaigns); teachers (in states where some of the revenue is earmarked for education); and state legislators (who are accustomed to receiving substantial contributions from lottery vendors). While winning the lottery is a great way to get rich, it is not an easy task. You should be prepared for the huge tax bill, and you should not spend your winnings on luxuries. It is advisable to invest your winnings in a business or real estate. You should also consider donating some of it to charity. This is not only the right thing to do from a societal perspective, but it will also give you the satisfaction of knowing that you are helping others. However, you should also remember that money alone does not bring happiness. Therefore, it is important to balance your life by focusing on your mental and physical health. Lastly, you should never forget that your family and friends are the most important things in your life. Lastly, you should practice the art of balancing your work and life to ensure that you are happy in the long run. With that said, good luck!
<urn:uuid:729c56b7-233f-48c5-b4b2-846a6347a412>
CC-MAIN-2023-50
https://amazing-glutathione.com/what-is-a-lottery-3/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.975222
568
2.75
3
Technology is the process of applying scientific knowledge to practical situations, creating new products and services and contributing to the value created in society. It is used in everyday life and affects everyone. 1. Education with Technology The use of technology in the classroom makes teaching a fun, engaging and interactive experience for students of all ages. From virtual reality (VR) and augmented reality (AR) to touchscreen boards, teachers can engage students of all ages and help them learn more effectively. 2. Gamification in Education Using educational games in the classroom is a powerful tool for increasing student engagement and improving student performance, as well as for enhancing classroom management. For example, Kahoot and Cool Math Games offer interactive, reward-motivated learning experiences that help students become active learners. 3. Self-Directed Learning with Technology Taking into account the latest research on learning, teachers are now able to differentiate instruction in a way that is more tailored to each student’s individual needs. They can customize study, work and testing environments for students to maximize learning time and minimize distractions, and they can privately message students to provide reminders to stay on track with assignments. 4. Technology in Medical Field Another advantage of using technology is that people can be treated faster and better thanks to it. They can even be in a hospital environment without feeling uncomfortable or in pain, which is a significant change for people. 5. Tech-Driven Business Efficiency Technology can also be utilized in the workplace for improved efficiency, particularly in areas where employees have to do repetitive tasks. For example, replacing machining steps with a metal-forming machine or enabling your point-of-sale system to seamlessly integrate with your bookkeeping software can save you time and reduce human error. 6. Technology for the Benefit of Society The world would be a much different place if technology wasn’t around, and it has made many aspects of life easier and more comfortable. From the ability to send messages through text to the ability to connect with loved ones on the other side of the world, technology has had a positive impact on people’s lives. 7. Technology and Health Despite the fact that technology has improved our lives, it can be detrimental to our physical and mental health. Countless people are distracted from their daily tasks by their devices, which can lead to various health issues. Some suffer from eye problems, obesity and sleeplessness as a result. 8. Technology for the Benefit of the Community Whether it is for economic, social or environmental reasons, technology can be a great force for good. It can make our lives simpler and increase the utility of products and services, helping us to create more wealth and improve our quality of life. 9. Technology and the Law Although the exact definition of the word “technology” is not always clear, it generally refers to tools and machines that have been designed and built by humans to solve real-world problems. This can include simple tools, such as a crowbar or wooden spoon, to more complex machines, such as space stations or particle accelerators.
<urn:uuid:1dfd81a4-7e52-4e00-a0bd-9e93c278250e>
CC-MAIN-2023-50
https://ampersandlogansquare.com/7-ways-technology-affects-everyone/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.951714
629
3.359375
3
Camouflage is a common and effective defence or stealth mechanism. It is used by many animals to blend into their surroundings and avoid detection by predators or prey. Some animals have evolved the ability to change color, shape, or texture to match their surroundings, while others have developed patterns that break up their outline and make them harder to spot. Camouflage can serve a variety of purposes for different animals. Some species use it to avoid being eaten by predators, while others use it to sneak up on prey or to hide from potential threats. For some animals, camouflage also plays a role in mating and social behavior, allowing them to blend in and go unnoticed while observing or attracting mates. Or to regulate temperature in harsh environments. In this post, we’ll take a closer look at some of the different animals that camouflage, how they do it, and why. 15 Animals That Camouflage Chameleon (Family: Chamaeleonidae) From the minute baby chameleons are born, there are predators only happy to make a meal out of them. They don’t hang about on the ground for long. Their instincts are to get off the ground or into the trees and this is usually their first port of call. This might protect them from ground predators, but they are still vulnerable to the threat from above. Two of the biggest predators are the Serpent-Eagle and the Banded Kestrel. These birds of prey feed on chameleons more than any other animal. With the many threats they face, it’s important for them to have good defences, and the best defence they have is the ability to change color and camouflage. Across the range of species they can do this in a variety of ways. Some, alter the brightness of their skin, taking on darker or lighter hues. Others can change their color entirely. They don’t only use their color change facilities for camouflage, but also as a means of social signalling, such as to indicate aggression or submission to other chameleons. The color change is also a thermic reaction to temperature and other environmental conditions. Some other lizards, like the horny toad for example, camouflage too. But none quite as effectively as the chameleon. Stick Insects (Order: Phasmatodea) Stick insects are insects in the order ‘Phasmatodea’ and are represented by species on every content except Antarctica. The order gets its name from the Greek ‘phasma‘, which translates as ‘apparition’ or ‘phantom’, and refers to their ability to take on the resemblance of plants rather than insects. It is this mimicry, and natural camouflage that makes them difficult for predators to see. Allowing them to evade detection right in the face of danger. Not all phasmids look like sticks, some look like leaves but in either case, the body usually has ridges that resemble leaf veins or bark to complete the camouflage. Across the range of species, their size and appearance can differ greatly. Stick insects can be as small as 1.5 cm (0.6 in) to as large as 63 cm (25 in) in length. The largest of all species can weigh as much as 65 g, and females are usually larger than males. Scorpionfish (Order: Scorpaenidae) There are 454 species of scorpionfish across 65 genera in the order of Scorpaenidae. Some of these fish are found in the Atlantic Ocean, but most are in the Pacific Ocean and Indian Ocean. They are amongst some of the most peculiar looking and ugly fish around the world. Some scorpionfishes are renowned for being amongst the most venomous fish in the world, and rather than using camouflage to evade predation, they use it to lure in prey for an easy meal. Typically these fish have a flat or compressed body, with spines and ridges and it is in these spines that their venom is housed. Many of these fish are ambush predators, laying in wait in the bottom of the sea floor, covered in sediment and debris, waiting to strike at any passing prey. Others have coloration that blends them into their background, while there are some, such as ‘Scorpaenopsis diabolus‘ that exhibit biofluorescence that may also assist with camouflage. Flower Mantis (Order: Mantodea) Flower mantis are represented by many different species across several different genera in the order Mantodea. These insects get their name from the specific type of camouflage that they use. They are all known to use a form of ‘aggressive mimicry’ where they have developed specific colorations and behaviors that enable them to mimic flowers within their habitats. These insects use their aggressive mimicry both as a defensive mechanism, and to attract their prey. They will position themselves on or within a flower and remain still, taking on the appearance of the flower itself. When a prey insect approaches, the flower mantis will strike and take its meal. In some cases the flower mantis can also absorb UV light in the same way that the flower would that they are copying. This adds another layer to their predatory mimicry. A bit part of the flower mantis diet, are pollinator insects like wasps and bees. These are the prey that will visit flowers often, and can be tricked by the mimicry. Because of their reliance on imitating these flowers to provide food and camouflage, flower mantis species are diurnal insects. Orange Oakleaf (Kallima inachus) On the upper portion of their wings, these butterflies have vibrant symmetrical colors of blue into amber and a black apex. On the underside of the wings, they have the appearance of an old, dried leaf. They have darkened veins, that resemble the veins of a leaf, and a variety of brown tones and spots that give an incredible representation of this type of camouflage. The orange oakleaf are hunted by many types of bird, and to evade their predators they will start to fly erratically and descend into foliage. Once in the presence of cover they will land and become very still, with their wings folded up to display their camouflage underside. Nightjar (Family: Caprimulgidae) Nightjars, are medium sized birds of the family Caprimulgidae, which is comprised of three different subfamilies. They can be either crepuscular or nocturnal depending on the species and on their habitat. They can be found on every continent except Antarctica, but they are also ascent from the northern polar regions in Russia and North America, as well as some island groups including New Zealand. Most of the known 89 species live in the ‘old world’. Nightjars have adapted some behaviour as well as a distinctive plumage that help them to camouflage in the wild. They can often be hard to spot in their ground nests because their soft coat feathering is colored to resemble bark, ground debris or leaves. They blend into the background. When perched on a branch they are also known to perch along rather than across the branch, so facing the direction that the branch is reaching. This can make it difficult to spot movement and helps to keep them safe from predators when resting through the day. Crab Spider (Family: Thomisidae) Crab Spiders are the name given to the 2,100 species of spider of the 170 genera within the family Thomisidae. All of the spiders in the is family are ambush predators rather than web spinners, and they apply many different camouflage skills to secure their prey. They are called crab spiders because of their shape, particularly of their legs, and the way they move. They have two front legs that are usually longer, stronger and more sturdy than the rest of the legs. Some species, such as the Misumena vatia and Thomisus spectabilis exhibit the ability to change their color to mimic the flower they are sitting on. This change in color takes place over a few days, but allows them to camouflage skilfully to avoid detection and ambush their prey. Some species are able to mimic bird droppings, and will sit out in the open amongst leaves and bark where they wait in ambush. These spiders are exceptional ambushers, and are capable of devouring prey like butterflies, much larger than themselves. Snapping Turtle (Family: Chelydridae) Snapping turtles, are members of the family Chelydridae, of which there are two extant generae – Chelydra and Macrochelys. The largest species of snapping turtle, the Alligator Snapping Turtle (Macrochelys temminckii) is known to use aggressive mimicry to lure and catch their prey. Their massive shells are often covered in algae, and they have yellow patterns around the eyes that help to keep it camouflaged. They also have measures of camouflage on the inside of their mouths, with a worm-shaped appendage on the tip of their tongue that they use to lure in fish with the promise of a meal. Once close enough, the snapping turtle will lunge and take the fish. Even as baby snapping turtles, these large fresh water reptiles have a bad reputation for having a nasty bite. In most cases, this is an exaggeration, but with the Alligator Snapping Turtle, the reputation is well earned. They can be aggressive and are likely to lunge rather than retreat. Leafy Seadragon (Phycodurus eques) The Leafy Seadragon is a type of dragonfish that is found in the waters off the south and west of Australia. They are the only species within the genus Phycodurus. They are known for their long, leaf-like appendages, which they use to camouflage themselves in the seaweed. These small fish grow lobes of skin that give it the illusion of appearing like seaweed. They complete this illusion with their very slow, drifting or floating motion, which is powered by their small pectoral and dorsal fins. Depending on a range of biological and environmental factors, some leafy seadragons may also be able to chance color to blend into their environment. The leafy seadragon eats a diet of small crustaceans, but does not seem to use its camouflage to aid with this, using it purely as a form of passive defence. They are solitary animals other than when mating, and they are independent immediately after they are born. Seahorse (Genus: Hippocampus) There are 46 different species of seahorse, in the genus Hippocampus which can be found in warm shallow waters all over the world. The head of the seahorse resembles a horses head and its body has an elongated tail covered by about 50 rectangular bony plates. The seahorse is a true fish, with a dorsal fin located on the lower body and pectoral fins located on the head near their gills. Some species of seahorse are partly transparent, with exceptional camouflage. They are often not spotted in aquariums despite being there and are also not often seen in pictures. Like chameleons, seahorses can change color so they match their surroundings in the sea grass. This camouflage protects them from predators such as crabs although, with their bony armour, there are very few animals that can eat them anyway. They are very slow movers, so camouflage is their primary method of defence. Leopard (Panthera pardus) The Leopard (Panthera pardus) is one of the classical ‘big cats‘, and one of the five extant species in the genus Panthera. They are characterized by their striking fur of dark spots grouped in rosettes, that allow them to camouflage against their habitat. Leopards are opportunistic hunters and this camouflage comes in handy for approaching their prey as closely as they can before pouncing. The spotty pattern that covers their coat, helps to camouflage them against dense vegetation with patchy shadows. Those individuals living in arid regions are a paler yellow in color to those living in forests and mountains, who are much darker and deep golden. Where leopards are the only big cats in a territory, they are apex predators. But where their territory overlaps with lions, they can find themselves the target of the larger cat. In these cases, the leopard does not use it’s camouflage as a method of defence, it will run away rather than use its stealth. Giraffe (Giraffa camelopardalis) The Giraffe is one of two existing species in the family Giraffidae, but is the only member with its characteristically long neck and pattern. It is the tallest animal on Earth, and it’s range exists in local patches across Africa, from Chad to South Africa. There are 9 recognized subspecies across this range. Along with their height, giraffes have an incredible array of adaptations. For example, their skin coloring provides excellent camouflage, as it has many different patches of variable size and color. This camouflage is particularly effective in the light and shade patterns of savannah woodlands. It is said that even from a few meters away if can be hard to spot a giraffe. This is important for calves, but as adults, they are ever watchful for predators and will use their physical size and advantage to fight rather than hide. Arctic Hare (Lepus arcticus) The Arctic hare (Lepus arcticus) is a species of hare found in the Arctic regions of North America and Greenland. This hare is well adapted to life in the harsh Arctic environment, and its white fur helps it to blend in with the snow and ice. They are burrowing animals, (which is rare for a hare), and will dig holes out of the snow for warmth and rest. The Arctic hare has a thick coat of fur that provides excellent insulation in the cold climate, but it also serves as a form of camouflage. Seasonal moulting helps them to remain camouflaged throughout the year. During the winter months, the hare’s coat turns completely white, which makes it nearly invisible in the snowy landscape. In the summer, the fur changes to a brownish-gray color, which helps the hare blend in with the rocks and tundra. Camouflage is crucial for the Arctic hare’s survival, as it helps to protect these herbivores from predators such as wolves, foxes, and birds of prey. By blending in with the environment, the hare can avoid detection and increase its chances of escaping harm. Additionally, the Arctic hare has large hind feet, which help it to move quickly over the snow and ice. They can run at speeds up to 40 mph! Arctic Fox (Vulpes lagopus) The Arctic Fox, is a small species of fox native to areas within the Arctic Circle. It is sometimes also known as the Polar Fox, or the Snow Fox. These foxes have a thick, coat of fur which comes in two different shades. They can come in a ‘blue’ coat or a ‘white’ coat. In each case, the coat provides them with insulation in their harsh, cold environment, but those with the white coat also benefit from camouflage against their snowy environment. Climate change is having a major impact on this species however, and on the advantage of their camouflaged coats. With snow cover receding the white coat doesn’t provide the cover in some areas as effectively as it once did. As these foxes are not as big or powerful as their rival cousins the red fox, they are losing ground to these invaders that are pushing further north as the climate warms. Long-Eared Owl (Asio otus) This species of owl is superbly camouflaged but can often be identified by their long, low hoots. They are nocturnal hunters that roost in dense foliage and hunt over open ground. When roosting or sitting silently in the trees, hunting, these owls are incredibly well camouflaged. They blend into the background with coloring that melts into the greens and browns of the tree cover that they prefer. Long eared owls are important to their ecosystem. They help to control the populations of prey in the area. Their diet mainly consists of small rodents, especially voles, but they can adapt their prey depending on availability.
<urn:uuid:70770fb6-1311-49b3-ab76-5737913582e1>
CC-MAIN-2023-50
https://animalcorner.org/blog/animals-that-camouflage/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.967645
3,428
3.671875
4
What is a resident-owned community and what does it mean for homeowners? In a resident-owned community, tenants form a non-profit business called a corporation. Each household is a Member of the Corporation and an equal owner of the land. As a group, the Corporation owns the land and manages the Community. The Members continue to own their own homes individually. There are many benefits to living in a resident-owned community, including control of monthly lot rent, repairs and improvements, lifetime security against unfair eviction, liability protection (Members are not personally liable for Corporation loans), and a strong sense of community. Everyone has a say in the way the Corporation is run, and major decisions are made by democratic vote.
<urn:uuid:ef59dff6-d7ba-426e-b347-91ad76f7901b>
CC-MAIN-2023-50
https://animasviewmhp.coop/faq/what-is-a-resident-owned-community-and-what-does-it-mean-for-homeowners/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.96804
148
2.5625
3
Answer: Option D International Human Solidarity Day is organized across the world on 20th December. It is a day to celebrate our unity in diversity and also a day to remind governments to respect their commitments to international agreements. The General Assembly, on 22 December 2005, by resolution 60/209 identified solidarity as one of the fundamental and universal values. |Note:||The above multiple-choice question is for all general and Competitive Exams in India.|
<urn:uuid:2c7217dd-0522-4a7a-a7c5-0261a897b123>
CC-MAIN-2023-50
https://answeringexams.com/international-human-solidarity-day-was-observed-on/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.89727
93
3.5625
4
Special relativity is one of the core concepts of relativity. Michelson Morley Experiment A key component of classical physics was the existence of the all pervading ether. According to this concept, the speed of light should have changed with the rotation of the earth in ether - light moving in the direction of motion of earth should have moved slower with respect to the earth than light moving in the opposite direction, as everything had an absolute speed relative to ether. Classical physicists believed this, but nobody had been able to prove it. In 1887, Albert Michelson and Edward Morley designed the most famous experiment ever to prove this and put it beyond doubt. As the legend goes, they failed and created history. The Principle of Relativity This is the most fundamental theorem of physics. According to it, there is nothing called absolute uniform motion. All motion is relative. We all know that (if we consider the motion of a train to be uniform) the landscape seems to be moving by someone in the train, and the train seems to be moving by to someone outside. The Principle of Relativity says it is impossible to ascertain that one of them is correct while the other is wrong. The Speed of Light Postulate The speed of light is the same for all people - regardless of their relative uniform velocities. This was something that was proved by Michelson and Morley, but can also be gathered from a simple thought experiment. Suppose you are sitting in a vessel that is moving at the speed of light. If the speed of light is not constant, it should be zero relative to you. Then if you look back, the part behind you should be dark, as it is impossible for the light from there to reach you. So you can ascertain that you are moving, which is a violation of the Principle of Relativity. In the beginning of the 20th century Albert Einstein was working as a clerk in the Swiss patent office of Bern. He is said to have had a brainwave in 1905, which led to the birth of special relativity. Though nowhere near as revolutionary as General Relativity, it was quite enough to make Einstein famous in the world of physics. Relativity of Simultaneity Simultaneity is not absolute. If two events seem simultaneous to A, they will not seems simultaneous to B if B is moving relative to A. This effect is appreciable if their relative velocity is near the speed of light. Relativity of Time Time is not absolute either. The time interval between two events will be different for two people moving relative to themselves. This difference is significant only if their relative velocity is near the speed of light. Relativity of Length Finally, length is not absolute. The length of a moving train will be different for two people if one is standing on the train while the other is outside on the ground (in fact, any relative motion between them will suffice). As you may have guessed, this difference is noticeable only if the speed of the train (which is the relative velocity between them) is near the speed of light.
<urn:uuid:c5cfdcaa-cacd-4ffe-b3fd-aea7d1ed1cb4>
CC-MAIN-2023-50
https://artofproblemsolving.com/wiki/index.php/Special_relativity
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.971593
629
4.40625
4
What is Mental Wellbeing and How to Improve It If you're feeling low, anxious or stressed, you may be considering whether your mental wellbeing is to blame. Poor mental wellbeing can cause you to feel low and it can be hard to feel better without changing some habits. Your mental wellbeing is important to your mental health and your overall health. Keeping good mental wellbeing can help you to feel more positive and confident. We've been doing some research into mental wellbeing and how you can improve it. In this blog post, we're going to be looking at mental wellbeing, how it differs from mental health, what good mental wellbeing looks like and how to improve your mental wellbeing. To find out more, keep reading. What is mental wellbeing? So, what actually is mental wellbeing? Mental wellbeing encompasses your thoughts and feelings and how you cope with negativity and resistance in your life. Your mental wellbeing can influence your mental health, but they are not one and the same. Good mental well-being is a state of overall wellbeing and a concept of positivity that helps you to deal with the normal stresses of everyday life. It means knowing how to cope and not feeling overwhelmed. If you are experiencing poor mental wellbeing, you may find this more difficult.Though not one and the same, good mental health can be influenced by good mental wellbeing. To find out more about the differences between mental wellbeing and mental health, keep reading. How does mental wellbeing differ from mental health? Though often used interchangeably, mental health and mental wellbeing are not the same. To be truly mentally healthy, you don't simply need to be free from mental illness or a mental health condition. Good mental health is influenced by good mental wellbeing and bad mental wellbeing, especially for a prolonged amount of time, can lead to poor mental health. Mental wellbeing is considered more a state of being where you feel more positive and are able to deal with normal stresses in a healthy way, while mental health may refer to a number of different concepts, including mental health conditions. Good mental wellbeing is essential for good mental health, but you don't necessarily need to be free from mental health conditions to have good mental wellbeing. For instance, someone with a mental health condition may learn to deal with their condition in a healthy way and thus can eventually have better mental wellbeing. In the next section, we'll be discussing what good mental wellbeing actually looks like. What does good mental wellbeing look like? To understand what good mental wellbeing means, it will be useful to learn what good mental wellbeing looks like. Good wellbeing can look like: - Feeling confident in yourself and your choices - Being able to maintain relationships and build new ones - Feeling that you have a purpose - Feeling like you are being productive in your life - Having the ability to cope well with the normal stresses of everyday life - Being able to manage change well Mental wellbeing is not the absence of negative thoughts and feelings but more the ability to be able to deal with them. This negativity is common in life and being able to deal with it means being able to cope with mental distress. Mental wellbeing is not solely about having positive feelings. Mental health and wellbeing are subjective. Well-being could mean different things to different people and these attributes of good mental wellbeing can look different in different people. Our mental well-being is affected by lots of different things. These include our relationships, such as those with friends and family members. It is also affected by our physical and emotional health. How to know if my mental wellbeing needs improvement? If you feel you may need to improve your mental wellbeing, you may be wondering what poor wellbeing actually looks like. Perhaps you're concerned about a friend or family member or are looking for help yourself. If any of these apply to you, take a look below to find out more about what poor mental health looks like. - Feeling sad, low, or down - Feeling confused - Lacking concentration - Excessive fears and worries - Extreme mood changes - Withdrawal from friends and activities - Significant tiredness - Detachment from reality - Inability to cope with normal stress from daily life - Problems with alcohol and drugs - Major changes in eating habits - Excessive anger and hostility Maintaining good mental health can be difficult sometimes, especially for those with an undiagnosed mental illness or condition. To find out more about mental health conditions, take a look at the next section. A note on mental illness Mental illnesses or mental health conditions refer to conditions that affect the way someone thinks and feels, according to the World Health Organization. Common mental health conditions include anxiety and depression. If you are concerned about yourself or a family member or friend, and wondering whether they may have one of these mental health conditions, be sure to speak with a mental health professional to find out more. Mental illness or mental health conditions cause mental health difficulties, but those with mental health conditions are not unable to have positive mental health. The link between physical and mental health When looking into mental health, you are likely to come across information on the link between physical and mental health. Though this connection has consistently been made throughout the history of complementary medicine, the link isn't spoken about as much as it should be. Poor physical health can affect mental health and vice versa. Poor mental health can lead to physical symptoms like headaches, nausea, digestive issues and more, and poor physical health can lead to poor mental health. While one affects the other in a negative way, they can also affect each other in positive ways. This means that exercising and eating well can actually support good mental health. Getting exercise every week can help to release feel-good hormones like endorphins which help you to feel happy. Getting good sleep can also help you to feel better mentally too. For more on how to improve your mental wellbeing, keep reading now! How to improve mental wellbeing Improving your mental well-being is quite simple. Though it may seem like an uphill struggle, these few simple steps can help you to feel better soon. Take a look below to find out more. Learning how to reframe unhelpful or negative thoughts This is a step that may take more work than others. Overwhelming anxiety and negative thoughts can have a real effect on your mental wellbeing but learning how to deal with them can be much more difficult than it seems. There are some techniques you can learn to help you with this. One of the best ways to learn to reframe negative thoughts is to practice meditation. Meditative practice can teach you how to accept these negative thoughts and then move past them without worrying. Learning to see something as a negative and unhelpful thought can help you not hyper-focus on these issues and feel much less anxious. Learn to be in the present This next step involves moving your meditative practice into your daily life. This process is called mindfulness and involves learning to notice the things around you, learning to live in the present, and practising grounding techniques. Mindfulness is a well-known practice and is often used in mental health therapy to help people to live in the moment and feel more gratitude for the life around them. Get better at sleep We all love to sleep but sometimes we can't seem to get enough of it. Maybe you can't seem to sleep for more than a few hours, or maybe you seem to be sleeping for much longer than you should be, either way, getting healthy sleep is important. If you're struggling to sleep, you could consider misting your pillow with essential oil-based pillow mist, diffusing sleep-friendly essential oils like chamomile oil and lavender oil, or try taking a magnesium supplement to encourage healthier sleep. Getting enough sleep is important for both your physical health and your mental health. Sleep helps your body to fight off disease and repair and rejuvenate, but it also helps to improve focus and concentration and can help you to feel more positive. Connecting with others Taking the time to socialise and connect with other humans is one of the best things you can do for your mental health. Whether a Zoom catch up or a quick coffee date, spending time with others can help you to feel more grounded and more grateful. Spend time with family, where it is possible, and foster healthy friendships that make you feel good about yourself. Don't maintain toxic relationships and don't feel guilty if you remove negative people from your life. Live in a healthy way We've discussed the link between physical and mental health which is why this step is here. Keeping your physical health boosted can help to keep your mental health in good shape. You should ensure you get enough exercise. The WHO suggests getting 150 minutes of moderate aerobic activity a week, so whether you do a high-intensity resistance band workout or a soothing and calming yoga session, moving your body is good for your mental health as well as your physical health. Along with exercise, ensuring you eat a well-balanced diet, filled with grains, beans, pulses, fruit, and veg, can help to maintain your physical health. Ensure you're eating nutritious meals and try reducing your sugary snack intake too, instead you should snack on healthier options like nuts and seeds, and popcorn. Do things for yourself Sometimes referred to as self-love, doing things that make your soul happy can help to boost your mental health. Self-love can be anything from taking time to burn your favourite candle while reading a good book to immersing yourself in a calming bath using fragrant bath salts. Self-love isn't all face masks and good skincare though. You should also practice healthy self-talk, where you speak kindly to yourself, and make healthy decisions as well as learn to say no when you know you are unable to carry something out. Self-love is all about allowing yourself the time and space to be happy and can mean different things to different people. Your mental well-being is incredibly important to your mental health. Feeling positive and confident in yourself can help you to cope with everyday stresses and ensure you are able to deal with change. Poor mental wellbeing for a prolonged amount of time may lead to a mental health condition and so keeping your mental wellbeing boosted can be in your best interests. There are many ways you can boost your mental wellbeing, from connecting with others and practising self-love to learning to be in the present and reframing negative thoughts. Trying these few steps can help you to feel better quickly. If you are concerned about yourself or a family member, remember there is no shame in seeking help for mental health issues. Frequently Asked Questions How can I improve my mental wellbeing? There are many ways that you can improve your mental well-being. These include getting out and connecting with others. This means building and maintaining healthy friendships. You could also try practising mindfulness and meditation to help you live in the present and reframe unhelpful thoughts. Along with this, you should aim to maintain good physical health through a good diet and exercise and try to get a good amount of sleep too. What is good mental wellbeing? Good mental wellbeing means feeling confident and sure of yourself. It means you are able to cope with change and the normal stresses experienced in everyday life. Good mental wellbeing also means having good self-esteem and feeling like you have a purpose. Someone with good mental wellbeing will feel productive too. Good mental wellbeing is not the absence of negativity but the idea that you can deal with negativity when it comes your way. Why is mental wellbeing important? Good mental wellbeing is important as you are able to deal with changes in your life and are able to cope with the stresses of modern life. Mental wellbeing is linked to mental health and if you have prolonged poor mental wellbeing, this could lead to poor mental health. Your mental wellbeing is important to your sense of purpose, your self-confidence and your productivity. What affects mental wellbeing? Your mental well-being is affected by your relationships with other people. Ensuring that your relationships are healthy is good for your mental wellbeing. Mental wellbeing is also impacted by your physical health, which, if poor, can lead to poor mental wellbeing. Finally, mental wellbeing is also linked to your emotional health. Poor emotional health can lead to negative thoughts and feelings and lead to poor mental wellbeing.
<urn:uuid:642aa38d-3905-4159-bbd4-964c1af64eb4>
CC-MAIN-2023-50
https://australianorganicproducts.com.au/blogs/zen/what-is-mental-wellbeing-and-how-to-improve-it
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.96289
2,549
3.265625
3
Riding a bike is a big responsibility. In places where there is a lot of traffic, there is always a serious risk of accidents. That’s why you need to follow safety rules to help prevent injuries and accidents. For example, it is important to always wear a helmet and follow the rules of the road. Not to worry though—bicycling has many benefits that will encourage you to bike again and again. Five of them are important and we want to highlight them here. 1. Reduction in Air Pollution By changing our bad habits, we will get closer to making our life eco-friendly. The first thing that we will get from biking is a reduction in air pollution. Many people use the car twice a day. More precisely, we get into our car at least twice – when we go to work and when we need to go back home. If we’re going to pick up the kids from school or go to the grocery store, that number can be huge. On the other hand, riding a bike uses minimal fossil fuels. This means that riding your bike provides a pollution-free mode of transportation. If you replaced a car with a bike every time you go to work, you would save about 3000 pounds of greenhouse gas emissions each year. 2. No Non-renewable Fuel Is Burned Did you know that in 2019 alone, the United States consumed approximately 20.5 million barrels of oil per day? The two most common types of oil used are diesel and gas. Can you even imagine how much oil we spend per day now? Fortunately, bike riders make a huge contribution to reducing petroleum consumption. Logically, the whole planet Earth would profit from this. 3. No More Congestion/Parking Issues The picture of streets full of bikes is some kind of utopia. Every car driver understands how it feels when you are stuck in traffic. You start losing your temper and often we are close to some kind of accident. Here’s another positive effect of cycling – the number of accidents is likely to come down because drivers won’t be as impatient. Plus, people living in urban areas know how difficult it can be to hear traffic noise early in the morning. You cannot sleep properly at night. Living in that kind of environment can lead to some psychological and health issues. Our mental health is more important than our physical health. Logically, it is not always possible to step into a more peaceful area. Because of this – let’s make urban spaces bike-peaceful! 4. Now There Is No Need to Destroy Nature In fact, many families around the world only have one car. Still, the average number of vehicles per American household is 1.88. This means that some families have more than one car in their garages. Imagine how many cars there are in Los Angeles, Seattle, Washington D.C., Chicago, etc. If the number of cars on the roads continues to increase, then we will have to develop new roads. Why would we replace beautiful parks with roads? If we all started cycling, there would be many more green areas. 5. Improve Personal Health We told you about the environmental benefits of riding a bike. Yet, each and every person on this planet can get some personal benefits as well. Bike riding is often associated with improvements in physical health. This habit promotes mental and emotional health. It also improves your balance and posture, cardiovascular endurance, flexibility, strength, and overall mood. Plus, riding your bike gives you a chance to get outside and get some fresh air. The personal health benefits of bike riding are considerable. In short, there are countless reasons why biking is a healthy and environmentally friendly activity – it’s also a lot cheaper than driving a car.
<urn:uuid:78271ef1-4866-4f0f-ad8a-1c0dff0b64f0>
CC-MAIN-2023-50
https://autoblish.com/health-and-environmental-benefits-of-riding-your-bike/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.959614
783
3.125
3
Common cold is a condition of viral infection in the upper respiratory tract. It can occur anytime throughout the year but more often occurs in winter months. People with low immunity or children get affected with common cold more frequently. Symptoms of common cold include fatigue, sneezing, sore throat, running nose, headache, cough, loss of appetite, muscle ache and mild fever with chills. Low immune power and aggravation of Kapha dosha are the major reasons behind the occurrence of Common cold. Common cold occurs when the digestive fire (Agni) is not much capable of burning waste material (toxins) in the body and results in formation of phlegm. The food items which pacify Kapha dosha are ideal to take in the common cold. Diet for Common Cold If you are also suffering from common cold. You should follow a proper diet chart along with the intake of herbal medicines. Adapting good eating habits will pace up your recovery rate. Early morning- Warm water Breakfast- Veg Idli/ Veg Poha/ Veg Vermicelli (Sewian)/ Veg Dalia/ Veg Semolina (Upma)/ Besan pancake/ Brown bread sandwich/ Chapati with Veg or Dal/ 2 egg-whites Mid-morning- Coconut water/ Herbal tea/ Fruit juice/ Fruit Lunch- Chapati with Vegetable or Dal + Salad Evening- Rice flakes snack/ Roasted grams/ Green tea/ Herbal tea Dinner- Chapati + Dal or Vegetable Food to consume and avoid in common cold |FOODS TO CONSUME||FOODS TO AVOID| |Cereals: Quinoa, Buckwheat, Millet, Corn, Amaranth, Rye, Granola and Barley||White rice| |Fruits: Litchi, Papaya, Apricots, Pomegranate, Cranberries and Apples||Dates, Bananas, Strawberry, Raspberry, Pear, Peach, Orange, Melons, Mango, Grapes, Figs, Cherries and Prunes| |Vegetables: Garlic, Ginger, Sweet Potato, Potato, Radish, Cauliflower, Onion, Peas, Mushroom, Lettuce, Green beans, Cilantro, Chard, Carrot, Asparagus, Celery, Cabbage and Broccoli||Okra, Taro roots and Eggplant| |Pulses: All types of Pulses||Nil| |Dairy Products: Cow ghee||Ice cream, Cheese, Sour cream, Buttermilk, Yogurt, Sour cream, Milk and Cottage cheese| |Spices: Nutmeg, Mint, Parsley, Fenugreek, Cumin, Cilantro, Cinnamon, Basil, Asafetida, Turmeric, Mustard, Cloves, Cardamom and Black pepper||Nil| |Drinks: Herbal tea, Green juice, Homemade soups and Coconut water||Caffeinated drinks, Carbonated drinks, Squashes, Sweetened drinks, Alcohol, Whole milk drinks, Packaged and canned drinks| |Flesh foods: Egg-white, Chicken (twice a week)||Turkey, Duck, Fishes (Bluefin tuna, Marlin, King Mackerel, Swordfish, Shark, Tilefish), Red meat (Pork, Lamb, Beef), Processed and fried meat| |Seeds and Dry fruits: Sesame seeds, Sunflower seeds, Flaxseeds, Chia seeds, Pumpkin seeds, Cashew, Pistachio, Peanuts, Walnut, Ground nuts, Raisins and Almond||Nil| |Oils: Coconut oil, Almond oil, Sesame oil, Peanut oil, Sunflower oil and Mustard oil||Palm oil| | Other foods: Soya milk, Jaggery and Honey These food items are good to eat during the common cold as they pacify Kapha dosha and relieve common cold. | Refined sugar, Artificial sweeteners, Pickles, Junk food, Fried food, Bakery and Processed food Above mentioned food items should be avoided as they can induce the Kapha dosha and make the common cold worse. - Avoid skipping meals especially breakfast - Don’t do over-eating - Consume 8-10 glasses of lukewarm water - Avoid packaged foods as much as you can - Go for a walk for at least 45 minutes Find a Diet Consultation Online: Get personalized diet chart for common cold At Life Aveda, we provide personalized diet consultation. In this, a doctor discusses the medical history of patients, do the root analysis on causes. After the deep analysis, doctor suggest a diet chart for common cold as per their needs and requirement. To book a Consultation call on us at +91 7743002520 or click on the button to schedule an appointment with our expert doctors. NOTE- These dietary guidelines may vary from patient to patient according to their medical parameters. These are generalized guidelines that might helpful for Common Cold Patients.
<urn:uuid:1dfee40f-c16c-4856-bbfa-490ea7c87f97>
CC-MAIN-2023-50
https://avedaayur.com/diet-chart-for-common-cold
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.876868
1,069
3.265625
3
In recent decades, the problem of the constantly increasin level of anthropogenic load on the environment is becoming more and more acute. Some of the most dangerous pollutants entering the environment from industrial emissions are heavy metals. These pollutants are not susceptible to biodegradation over time, which leads to their accumulation in the environment in dangerous concentrations. The purpose of this work is to study the sustainability of cultivated and wild plants of the Poaceae family to aerotechnogenic pollution in the soil. The content of heavy metals in couch grass (Elytrigia repens (L.) Nevski), meadow bluegrass (Poa pratensis L.) and soft wheat (Triticum aestivum) plants grown in the impact zone of Novocherkassk Power Station has been analyzed. Contamination of cultivated and wild cereals with Pb, Zn, Ni and Cd has been established. It has been shown that the accumulation of heavy metals is individual for each plant species. An average and close correlation have been established between the total HM content and the content of their mobile forms in the soil and their content in plants. For the plants studied, the translocation factor (TF) and the distribution coefficient (DC) of HM have been calculated. The TF is formed by the ratio of the concentration of an element in the root plant dry weight to the content of its mobile compounds in the soil. The DC value makes it possible to estimate the capacity of the aboveground parts of plants to absorb and accumulate elements under soil pollution conditions and is determined as the ratio of the metal content in the aboveground biomass to its concentration in the roots. TF and DC values have shown a significant accumulation of elements by plants from the soil, as well as their translocation from the root system to the aboveground part. It has been revealed that even within the same Poaceae family, cultural species are more sensitive to man-made pollution than wild-growing ones.
<urn:uuid:aa4388ff-3a8a-4fdd-a999-e1624097743d>
CC-MAIN-2023-50
https://avesis.omu.edu.tr/yayin/192a4524-3121-4668-ae0e-8004b20a5688/sustainability-of-agricultural-and-wild-cereals-to-aerotechnogenic-exposure
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.946046
394
2.984375
3
Mental health is a big issue for children and adolescents. In any given year, 1 in 5 young people aged 13-18 experience a mental health disorder. And yet, only about 20% of these young people receive treatment. There are many different types of mental health disorders that can affect children and adolescents, including anxiety disorders, depression, conduct disorder, and attention-deficit/hyperactivity disorder (ADHD). Some of these disorders can be quite serious and even lead to suicide. It’s important to get help if you think your child is struggling with a mental health disorder. There are many effective treatments available. There are a few key things you can do to support your child if you think they are struggling with a mental health disorder: Talk to your child about what they’re going through It’s important to talk to your child about their feelings and experiences. This can help them feel more comfortable talking about their mental health and can also help you better understand what they’re going through. Encourage them to get help If you think your child is struggling with a mental health disorder, call a mental health professional or encourage them to get help. Help them stick to their treatment plan If your child is getting mental health treatment, help them stick to their treatment plan. This may include things like going to therapy or taking medication. It’s important to follow through with treatment in order for it to be effective. Be there for them Make sure you are there for your child. Show them support and understanding. Let them know you love them and that you will help them get through this. Seek help for yourself if needed It’s also important to take care of yourself if you are supporting a child with a mental health disorder. Taking care of yourself will help you be better able to take care of your child. If you need support, there are many resources available, such as support groups for parents of children with mental health disorders. Aware is a woman-owned company that wants to make a difference by protecting our children, our communities, and eventually the world. If you think your child may be struggling with a mental health disorder, please seek help. There are many resources available to you, including professional counseling and therapy services, as well as online resources such as this blog post. You are not alone!
<urn:uuid:770d641a-aba0-439a-b438-34c87eb68215>
CC-MAIN-2023-50
https://awarenyc.com/supporting-children-with-mental-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.973059
487
3.75
4
The quality of fabric, yarn or fibre assessed by the reaction obtained from the sense of touch. Comprising the judgment of roughness, smoothness, harshness, pliability, thickness, softness, etc. Mechanical instrument used for the removal of wool from a sheep. Yarns which are spun by hand using a spinning wheel or electric spinner. |Hauteur (H, mm)|| Hauteur is mean fibre length in a top. Hauteur is usually regarded as a numerical average (i.e.. Assumes no relationship between fibre length and diameter), but is actually a length-biased distribution. The variation in the length is expressed as CVH%. Young sheep approx. 12-18 months of age. In Australia, hogget wool comes from young sheep that are usually shorn as lambs, with the first fleece then known as hogget wool. Term applied to wool which is unnaturally fine, due to under-nourishment over an extended period. Readily absorbs moisture from the atmosphere.
<urn:uuid:ad3c72b6-0e85-4b8a-8993-27575d5c67f9>
CC-MAIN-2023-50
https://awtawooltesting.com.au/index.php/en/resources/glossary-of-terms/H
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.913315
218
3.34375
3
“Knowing via Being” is a philosophical concept that suggests that true knowledge can only be attained through direct experience or immersion in a subject. This idea contrasts with traditional forms of knowledge acquisition, such as reading books or being taught by a teacher, which rely on second-hand information. Being is an important part of knowing and understanding the world around us that is beyond intellectual knowledge and book-learning. It involves the use of our senses, such as sight, sound, smell and taste, to experience the environment. This helps us to build an understanding of the physical and natural world, as well as our own emotions and responses to situations. Being also allows us to gain insight into the customs, norms and beliefs of different cultures, which can help us to make informed decisions when interacting with people from different backgrounds. Moreover, being is essential for developing our intuition and creativity, which can help us to come up with innovative solutions to problems. All in all, being plays an important role in our ability to know and understand the world around us and it is particularly important regarding spiritual awakening. Proponents of what is also called “Being Understanding”, argue that direct experience is necessary for a deep understanding of a subject. For example, a musician who has spent years practising and performing will have a deeper understanding of music than someone who has only read about it in a book. Similarly, a scientist who has spent years conducting research in a lab will have a deeper understanding of their field than someone who has only read about it in a textbook. The same is true for many areas of knowledge. For example, in philosophy, a student who has spent time reflecting on and discussing the ideas of various thinkers will have a far deeper understanding of the subject than someone who has only read about it in a book. Similarly, a student of history who has visited the places they are studying and spoken to people who have lived through the events they are researching will have a far deeper understanding than someone who has only read about it in a textbook. This way of knowing is also applicable to our everyday lives. We often gain a deeper understanding of ourselves and our relationships with others through direct experience. This can be a result of spending time with people, travelling to new places, and reflecting on our past. We gain a far deeper understanding of our lives through direct experience than we ever could from reading a book. This knowing can also be applied to personal growth and self-discovery. Many spiritual and self-help teachings emphasize the importance of direct experience in understanding oneself and the world around us. For example, meditation practices are often used to help individuals gain a deeper understanding of their thoughts and emotions through direct observation and introspection. However, it should be noted that this way of knowing does not mean that other forms of knowledge acquisition, such as reading and being taught, are unimportant. These methods can provide valuable information and context that can supplement direct experience. Additionally, direct experience alone may not be sufficient for certain fields such as mathematics, history, and theoretical physics, where the knowledge is based more on logical reasoning and abstract concepts. So, what is ‘Knowing via Being?’ In this light,”Knowing via Being” is a philosophical concept that suggests that true knowledge can only be attained through direct experience or immersion in a subject. While it is important to supplement this knowledge with other forms of knowledge acquisition, direct experience can provide a deeper understanding of a subject and personal growth.
<urn:uuid:d1ca133d-4fd3-48a3-8cb8-7e845a5ab5bf>
CC-MAIN-2023-50
https://beingyoga.com/what-is-knowing-via-being/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.970728
706
3.5
4
The British Empire was a global empire that originated with the British Isles. At its height, it was the largest empire in history and, for over a century, was the foremost global power. The British Empire is considered one of the greatest empires in human history, especially for its role in spreading Western culture around the world. It also played a major role in the development of the English language, which became the lingua franca of the Empire and, later, of the world. The British Empire also had a significant impact on politics, economics, science, andtechnology. In many ways, it was responsible for setting the foundations for the modern world. Empire’s should be measured by their legacy, not their longevity. Quality, in terms of what influences endure, is how to judge an empire’s contribution to the world. The British Empire’s legacy is one that has had a positive effect on the lives of billions. It’s ironic to watch people complain and condemn, in English, the British Empire and its colonies in a medium invented by an Englishman (the World Wide Web, Sir Tim Berners-Lee). It’s reminiscent of that sketch in Monty Python’s Life of Brian in which the rebel leader asks the question, “What have the Romans ever done for us?!“ One by one the answers come: the aqueduct, sanitation and public health, the roads, irrigation, medicine, education, the wine (very popular), public baths, public safety, and peace. Of course it’s true that there were terrible events, cruel people, catastrophic errors of judgement and other examples of the corruption of the human soul but then there were all these things in every empire before or since. If the British Empire is to be judged only on these aspects then so must every other one and it’s surprising just how many there have been. The capacity for cruelty and barbarism at one end of the spectrum, and spiritual, artistic, and scientific achievement at the other end is something that all humans possess. The net result is that the British Empire may not have lasted the longest but it was the biggest (23.8% of the world’s land area) and its influence is being felt all over the world today, and that’s likely to continue for many years ahead. What have the Britons ever done for us? The list of British inventions is long and comprehensive. It covers just about every aspect of human life. If you want a more detailed list you can divide this down into lists of English, Scottish, and Welsh inventions. All the above are practical things. They are inventions that have contributed to the worlds of engineering, medicine, agriculture, science, technology etc. They have enhanced people’s lives making them better and more productive. They have enriched and improved the lives of billions. The list of inventions don’t take into account Britain’s contribution to the world in terms of everything from art, culture, music, government, architecture, and language, to sports, the postal service, and sense of humour. The English parliamentary and judicial systems were adopted and absorbed by many former colonies. English is the first language of over 400 million people. It’s also spoken and understood by about 1.5 billion people around the world. Oh, and let’s not forget what we won the Battle of Britain and held out against the Nazis when the rest of Europe was under the jackboot. Despite all this, mention the British Empire anywhere and you’re likely to provoke some vitriol from those obsessed by the Slave Trade. Briton’s make an easy target for these arguments because we are, generally speaking, open and honest about our country’s past. However, the people who cannot see anything else but this part of our history are often the same ones who seem unable to confront the Arab nations about their participation in the northern and eastern African slave trades. Nor can they admit to the uncomfortable truth that many Africans become wealthy by participating in the slave trades with both the Europeans and the Arabs. It was called the Slave Trade for a reason. African tribes enriched themselves by capturing and selling members of rival tribles to European and Arab buyers. The British Empire’s Legacy It should be apparent, even if it is only grudgingly admitted by some, that the net result is of British Empire’s legacy is one of enormous good to the world. It is recognition of this combined with the long and fascinating history of Britain from the Stone Age to the present that makes me proud to be British. It is also what draws millions of tourists to visit Britain each year to marvel at our landmarks, whether they were built 500 or 5,000 years ago. In the years to come that influence will continue to reverberate around the world but it’s not a series of waning ripples from a past event. It is a strong pulse emanating from the beating heart of Albion as it continues to grow and develop as a nation.
<urn:uuid:a73a8a34-3f03-4f08-abe2-f8a74227a83d>
CC-MAIN-2023-50
https://benlovegrove.com/the-british-empires-legacy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.964816
1,050
3.390625
3
February 02, 2018 For many, owning a diesel-powered vehicle is not just a point of pride, but also a means to a living. Diesel vehicle owners count on these powerful workhorses to provide the necessary torque in heavy-duty applications. The higher energy content of diesel fuel provides more power and fuel economy in most vehicles compared to their gasoline-powered counterparts. Diesel fuel, like gasoline, is a mixture of many different components combined to make a desirable “concoction” of combustion. In addition, much like gasoline, diesel comes in an array of grades that may or may not use of bio-fuel components. For example, gasoline is separated by octane number for “87 regular”, “89 plus”, or “91 premium” grades of fuel. Diesel also has different grades, primarily classified as #2 diesel (regular) and #1 diesel (premium). It is further separated for tax exemption purposes as “ON-ROAD Diesel” or “OFF-ROAD Diesel”. Off-road diesel is often dyed red and to be used only by construction or agricultural equipment that does not regularly make use of tax-dollar pavement. Heavy fines await anyone caught using off-road fuel in a normal on-road vehicle. The key difference between gasoline and diesel is the range of components make up each of these energy sources. Molecules in diesel are much larger and compact well against each other, making them quite dense. On average, one gallon of gasoline fuel weighs about 6.2 pounds. Diesel fuel however, tips the scales slightly more at 6.9 pounds per gallon average. Denser fuel = more energy, sounds simple enough! It is this characteristic of “compaction” however, that becomes the undoing for diesel fuel use in cold weather. When temperatures drop, the bonds between diesel fuel molecules become more rigid and they begin to bind strongly. The process continues until thin sheets of diesel are bound together forming a waxy substance within the fuel. It may be first noticeable by a slightly hazy appearance within the fluid.** Over time, enough of these wax bits become clogged in fuel filters and prevent the flow of fuel. If the process continues further, the fuel may gel completely forming a semi-solid of waxy goo. In this state, the fuel can no longer flow to the engine and the vehicle is unable to run! The term “gelled” is a commonly coined phrase for inoperable equipment in cold environments. Frozen water molecules in diesel fuel aid in the wax formation process by giving the wax a template to build on. Biodiesel blends tend to hold greater water content more readily in suspension and further exacerbate the effect. Once a fuel source begins the formation of wax and gel, there are few options to undo the process. There is no pour-in-the-tank product that can quickly and effectively dissolve already gelled fuel. By far the best method is preventing wax and gel formation before cold temperatures arrive. Anti-gel additives prevent the formation of wax layers and gel formation by inhibiting diesel fuel binding to itself. Many additives inhibit the formation of waxes in diesel fuel, allowing the fuel to flow freely well below typical untreated operating temperatures. The repetitive pattern which diesel wax forms can be interrupted to keep fuel fluid, and wax particles small. 2. Mix the cold fuel with high quality #1 diesel or kerosene Ideally, this would dissolve the wax. This method is quite costly, and usually requires large quantities of fluids for the desired effect. Using mixtures of #1 Diesel or Kerosene also lead to reduced fuel economy as they contain lower energy content.* Constant heating of the fuel can effectively melt diesel fuel wax and restore flow. Large amounts of fuel can take time to heat and is often difficult to do in cold weather. Most diesel vehicles have a heating element in or near the fuel bowl filter to assist the melting process. However, many times the filter is overcome with wax faster than the heater can handle, leading to engine stalling and shutdown. Discarting and replacing the fuel filter is often necessary to restore fuel flow when gelled. If the vehicle will run long enough to warm up, often it will generate enough heat to stay running. The temperature at which fuel gels depends on many factors, including seasonal changes. Normally suppliers of diesel don’t want their fuel to gel up so they take a few steps to prevent that from happening. Often it is usually not enough.The potential for diesel fuel to gel can be substantially lowered using anti-gel additives. Combined with optimal blending of light diesel fuels, equipment can start and function in extremely inclement weather.*** BG has several diesel fuel additives that greatly inhibit the formation of wax formation and gelling. Here in Kansas, we can see temperatures near zero degrees Fahrenheit in the winter. I regularly treat the fuel in my diesel truck with BG DFC Plus® with Cetane Improver, PN 248, and have yet to see my truck gel. A few friends of mine in Minnesota prefer BG DFC Plus® HP Extra Cold Weather Performance, PN 238, and have had no issues this winter despite -35 degree temps. By augmenting diesel fuel with additives from BG, equipment owners can reap the benefits of this energy-dense fuel source in any climate. I’ll talk more about that in my next article. With chemistry, there is always a solution. By Clinton J. Meyer Technical Service Representative ACS Certified in Chemistry and Biochemistry **Auroux, Aline. Calorimetry and Thermal Methods in Catalysis. Springer-Verlang Berline Heidelberg 2013. Print. *** Alleman, Teresa L. and McCormick, Robert L. Biodiesel Handling and Use Guide (fifth Edition). U.S. Department of Energy: Energy Efficiency & Renewable Energy. DOE/GO-102016-4875. November, 2016. Print. Online document.
<urn:uuid:a89a0dcd-57d8-4ef5-9068-3686b86a29c6>
CC-MAIN-2023-50
https://bgfindashop.com/articles/what-happens-to-diesel-fuel-in-cold-weather/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.937272
1,252
2.890625
3
Most antibiotics in livestock farming are used in aquaculture, but significant amounts are also used in terrestrial livestock species, particularly in poultry and pigs. Approximately 70% of antibiotics are used for non- therapeutic purposes, i.e. many antibiotics are used in sub- therapeutic doses and over prolonged periods, which leads to the development of genes that confer antimicrobial resistance to animal pathogens. These genes can subsequently be transferred to human pathogens and it is estimated that 75% of recently emerging diseases in humans are of animal origin. Antimicrobial resistance (AMR) problems are further exacerbated by the fact that antibiotic resistance genes were found in bacteria long before antibiotics were ever used on super-pathogens in farm animals. AMR is a worldwide problem, which clearly affects both animal and human health, and hence it is truly One Health issue. Antimicrobial resistance and O’Neill’s Review Recognising that the problem is severe and rapidly growing, the UK Government’s Department of Health and the Wellcome Trust commissioned a Review on Antimicrobial Resistance1 in July 2014. The aim of the review, chaired by macroeconomist Jim O’Neill, was to examine the growing threat of AMR from an economic perspective and to recommend solutions. The review was published on 19 May 2016. According to the report, antimicrobial drugs are becoming less effective and the world is not developing enough new ones to keep up. Drug-resistant infections and super-pathogens could kill 10 million people a year by 2050 – the equivalent of one person every three seconds. The report concluded that a comprehensive global action plan is needed to highlight the problem. The document sets out 10 areas to tackle antimicrobial resistance globally. Recommendations include targets set by individual countries for antibiotics use in agriculture, giving governments the flexibility to decide how they will reach lower levels. Quicker progress is needed on banning or restricting antibiotics that are vital for human health from being used in livestock farming. The Review included eight thematic papers that address different aspects of the problem of AMR. These are as follows: - Antimicrobial Resistance: Tackling a crisis for the health and wealth of nations (published in December 2014); - Tackling a global health crisis: Initial steps (February 2015); - Securing new drugs: The pipeline of antibiotics (May 2015); - Rapid Diagnostics: Stopping unnecessary use of antibiotics (October 2015); - Safe, secure and controlled: Managing the supply chain of antimicrobials (November 2015); - Antimicrobials in agriculture and the environment: Reducing unnecessary use and waste, (December 2015); - Vaccines and alternative approaches: Reducing our dependence on antimicrobials (February 2016); - Infection prevention, control and surveillance: Limiting the development and spread of drug resistance (March 2016). Use of antibiotics in livestock farming remains stubbornly high The European Medicines Agency (EMA), however, recently published a report2 showing that the amount of antibiotics used in animal production is not reducing and that many European countries are failing to put an end to excessive overuse of antibiotics in farming. In fact, the use of antibiotics in livestock3 still remains more than twice as high as in humans. The EMA data show that the average European level of antibiotic use in livestock is 152 mg/kg, over three times higher than suggested level at the O’Neill’s Review, who recommended that high-income countries should aim for a short-term target of 50 mg of antibiotic per kg of livestock1. Over 91% of European farm antibiotics were used for mass medication in feed or drinking water and a large proportion of this was for routine disease prevention in intensively farmed pigs and poultry. In the 25 European countries which provided comparable data, sales of farm antibiotics per unit of livestock went down by just 2% in 2014 compared with 2013. If such a trend is maintained, it would take 65 years for Europe to reach the O’Neill’s target. In 2014, overall use of the antibiotics classified as “critically important in human medicine” by the World Health Organization such as the antibiotic Colistin, which is used as a last-resort for treating infections in humans, increased to record levels. These data indicate that the excessive use of antibiotics in intensive livestock farming is a direct consequence of the failure to ban routine preventative mass medication by most countries. It also confirms that reliance on voluntary approaches is not working. The European Parliament has proposed a ban on all routine antibiotic use, but this has not yet been accepted by the Council of Ministers or the Commission. In January 2017, discussions are due to commence between the European Commission, the European Parliament and the Council of Ministers on future veterinary medicines legislation. Very high levels of antibiotic-resistant pathogens are also present in meat A recently commissioned study by the Alliance to Save our Antibiotics and carried out at Cambridge University, examined 189 pork and poultry meat samples of UK origin from the seven largest supermarkets in the UK. Resistance of E. coli isolates to a wide range of critically important antibiotics (CIAs) was tested. High levels of resistance to CIAs were detected in chicken meat, with 24% of samples testing positive for ESBL E. coli (extended-spectrum beta-lactamase E. coli)4, a type of E. coli resistant to modern cephalosporins. This is four times higher compared with the levels found in a similar study in 2015, in which 6% of chicken meat tested positive for ESBL E. coli. Over one-half of the E. coli samples from pork and poultry (51%) were resistant to Trimethoprim, which is used to treat over half of lower urinary-tract infections in humans and 19% of the E. coli samples were resistant to Gentamicin. The findings provide evidence that the overuse of antibiotics used to mass medicate livestock is likely to be undermining the treatment of E. coli infections in humans, and highlight the need for an effective monitoring system and for improvements in antibiotic stewardship. Antimicrobial resistance is truly One Health issue One Health concept recognises that the health of people is connected to the health of animals and the environment. It has been described as “the collaborative effort of multiple disciplines – working locally, nationally and globally to attain optimal health for people, animals and our environment”5. Excessive use of antimicrobials in intensive livestock farming is a global problem, which clearly affects both animal and human health. It is also clear that without a drastic reduction in the use of antibiotics in intensive livestock farming, we could be facing a grim post-antibiotic era, for the sake of producing cheap meat. CABI also publishes a number of authoritative scientific information resources, including CAB Direct, Global Health Database, Animal Science Database and VetMed Resource, which all aim to cover veterinary and human antibiotic resistance comprehensively. At the time of writing, CAB Direct Database contains more than 10,800 references on antimicrobial resistance. - 1. O’Neill J, 2016. Review on Antimicrobial Resistance, 2016. Tackling Drug-Resistant Infections Globally: final report and recommendations. London: HM Government and the Wellcome Trust. - 2. European Medicines Agency, 2016. Sales of veterinary antimicrobial agents in 29 European countries in 2014, Sixth ESVAC report. - 3. ECDC/EFSA/EMA, 2015. First joint report on the integrated analysis of the consumption of antimicrobial agents and occurrence of antimicrobial resistance in bacteria from humans and food-producing animals. - 4. Holmes A, 2016. Report: Antibiotic-resistant E. coli on supermarket meat – a serious threat to human health. Alliance to Save Our Antibiotics. - 5. AVMA, 2008. One health: A new professional imperative. One Health Initiative Task Force Final Report. Shaumburg IL, American Veterinary Medical Association. Related News & Blogs In sub-Saharan Africa, economic growth from agriculture is 11 times more effective at reducing extreme poverty compared with any other sector. In Kenya, 71% of the rural population work in the agriculture sector, accounting for nearly 70% of export ear… 2 November 2023
<urn:uuid:fc31fbc8-3df6-4281-9bd3-5299ab7c900a>
CC-MAIN-2023-50
https://blog.cabi.org/2016/10/28/excessive-use-of-antimicrobials-in-intensive-livestock-farming-as-one-health-issue/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.933694
1,716
3.40625
3
2019 JoVE Librarian Travel Award Winning Essay Advances in technology have resulted in research teams working in a hybrid environment; data streaming from lab instruments and calculations, notes, etc. written in a print notebook. Some researchers have addressed this by printing out the data and images and pasting it into their notebooks. In addition, research has become more interdisciplinary resulting in collaborative research among groups not necessarily co-located. Tools are needed to facilitate efficiency. A lead researcher, who was having trouble managing his rather large research group asked for assistance. I had learned about Electronic Lab Notebooks, ELNs while attending a conference in 2008 so began seeking a solution for his problem. This led to working with the Associate VP for Research, the Director of the Center for High Performance Computing, CHPC and personnel from campus IT. The market for ELNs for academia was new and in a state of flux. Too many ELNs were developed by graduate students or faculty to solve their respective problems who had no sustainable business plan. Some were bought out, others disappeared and most were clunky to use. They advertised that their products were multidisciplinary, but most were geared towards pre-clinical studies, i.e. biology and chemistry. I set up demonstrations for researchers to review the different products, then set up a pilot study to determine issues with integrating ELNs campus-wide, submitted an RFP and finalized a contract with LabArchives. A roll-out was initiated fall 2016 and to date we have over 600 users. By introducing campus researchers to an ELN, I have increased the efficiency and, therefore, productivity of numerous labs in medicine, engineering, chemistry, biology, and geology. The ELN provides a space for uploading all electronic data and images, one at a time or in batches directly from instrumentation. It provides a platform for recording anything that is usually recorded in a print notebook and all entries are stamped with the date and person recording the information. Nothing is deleted from the system so there is an audit trail to allow for going back to review. Entries can be tagged and the search function allows for searching by tag, personnel, date, notebook, etc. The search function is especially useful in a lab where the lead investigator has had numerous postdocs, graduate students and visiting scientists. Change-over in lab personnel makes it difficult to locate information from a previous project. The lead investigator may be able to find it, but having the ELN search function allows anyone to quickly find needed information. Since the ELN is web-based on secure servers, multiple labs collaborating on the same project can have access to the same notebooks and information. The notebooks can also be organized so that team members have access to only the information they need for their work. Lead researchers can access what they need, leave a note for a postdoc without having to set up a face-to-face meeting. This is especially important since conference attendance, vacations and life’s events can take researchers away from the lab. Having an ELN keeps researchers in contact with their research whenever and where ever they are located. Project meetings can be held virtually with all attending having access to the required information. No need to find a conference room to schedule and travel to the room! To accommodate researchers, I teach workshops to introduce and get them started setting up and using the ELN. Setting up an ELN involves understanding how the team is organized and works. What is the workflow? Is there a common vocabulary? How is the work documented? My workshops are regularly scheduled or when requested I provide the same service to a specific research group. After the workshop I answer queries by phone and email. If the question is more involved I can either visit the lab or use Zoom to demonstrate features and/or troubleshoot a problem. I also developed a CampusGuide, LabArchives for reference and send out information using the campus newsletters. My work introducing ELNs to researchers has been very rewarding because I have been able to solve a few of the problems brought on by new technology and the increasing complexity of research questions. I have been able to enhance the efficiency of research groups and increase their productivity.
<urn:uuid:bc52ac3e-f9ba-40f3-afb0-ae813e7f0680>
CC-MAIN-2023-50
https://blog.jove.com/librarian-blog/librarians-career-advancement/increasing-lab-productivity-by-integrating-elns
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.96875
847
2.515625
3
Class on Mathematical Reasoning This class integrates the language learning of Chinese and mathematics – the foundation of all sciences. The lessons will be taught mainly in Chinese to build critical understanding and reasoning process of mathematics. It is the “Content Teaching” developed and promoted by various Chinese Flagship programs in the US. Our teacher will cover the main topics in PSAT preparation guideline, such as the number system, algebra, geometry, permutations, combinations, and probability. Fun and practical examples will be given to keep students interested and focused. So we will tell the difference between speed and acceleration, identify the perfect lemonade recipe, and understand why the house always wins. The class will be taught by Lillian Wang, a retired software engineer. Lillian has a master degree in Computer Science from the University of Southern California. The highlights of the lessons are in both traditional and simplified Chinese, English, as well as Pinyin. All junior high and high school students are welcome to apply. The fee is $100 per student. There will be 10 lessons in a semester, 2 hours each time on Sundays. Time to be determined. 「數學推理班」是以中文為主﹐數學為輔的「內容教學」– Content Teaching。以益智數學帶領孩子思考數學問題﹐訓練他們的邏輯推理能力﹐提供孩子們另一個學習/加強中文的環境。 Please contact Principle Luh Jang Chen at 541-760-6097 if you have questions. Posted in Schedule & Registration by CorvallisCS with .
<urn:uuid:fb3f1957-6413-4def-9898-26bbbda7d085>
CC-MAIN-2023-50
https://blog2.huayuworld.org/corvalliscs/2012/08/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.797359
425
2.953125
3
Helping All Children Embedded Instruction is an evidence-based multi-component approach for planning, implementing, and evaluating instruction for preschool children with disabilities in inclusive settings. The Tools for Teachers professional development package has been shown to increase teachers confidence and competence with embedded instruction and promote positive outcomes for children (Snyder et al. 2018). Embedded Instruction California Project The Embedded Instruction grant connects the DRDP (2015; California Department of Education 2016) assessment to curriculum and instructional practices to strengthen the relationship between assessment and instruction and provide planned and intentional instruction for children with disabilities during everyday activities. Local educational agencies (LEAs) within California will work with experts and researchers in the area of embedded instruction to pilot these techniques and practices in their early childhood programs. Listen to the embedded instruction team talk about the project and embedded instruction in California. Listen to a California preschool teacher talk about how using the DRDP (2015) and embedded instruction has helped her to enhance outcomes for a child with disabilities in her classroom. As part of the project, participating teachers engage in the Tools for Teachers professional development and practice-based coaching program to learn about embedded instruction practices. Teachers gain the knowledge, skills, and confidence to use embedded instruction practices. If you would like to find how your teachers can participate send an information request to [email protected] The Tools for Teachers professional learning and development package uses an approach to coaching called practice-based coaching. Practice-based coaching (PBC) is a cyclical process involving (1) planning goals and action steps informed by a strengths and needs assessment, (2) engaging in focused observation, and (3) reflecting on and sharing feedback about teaching practices. A growing body of research has highlighted the importance of coaching and practice-based coaching for effectively supporting teachers to use and sustain new practices such as embedded instruction (Snyder, Hemmeter, and Fox 2015). Listen to two California teachers who participated in practice-based coaching talk about their experiences.
<urn:uuid:ec87f5b3-97ac-402b-a659-e97b7ba6c92e>
CC-MAIN-2023-50
https://ca.embeddedinstruction.net/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.943299
406
3.390625
3
Stress analysis and crack lengths CADAM3D is based on the gravity method and beam theory for the calculation of stresses along a cracked plane (Figure 194A). The shear stresses are calculated assuming a parabolic distribution for non-cracked sections (USBR 1976). For cracked sections (Figure 194B), the shear stress distribution on the uncracked ligament is influenced by the stress concentration and will be modified according to a more or less triangular distribution (Lombardi 1988). Shear stresses for a cracked joint are not calculated by CADAM3D. Sliding stability analysis is performed using the resultant of shear stresses acting on the ligament. However, to validate the orientation of the analysis plane, the magnitude and orientation of the principal stresses acting on the ligament should be studied. For this purpose, simplified calculations can be performed by assuming a shear stress distribution that satisfies equilibrium. Figure 194 Effect of cracking on uplift pressure and stress distribution In many cases, when a crack propagates along a joint in contact with the reservoir, the water pressure penetrates the crack producing uplift pressures. Figure 194B shows an example of the increase of the full uplift pressure in a crack. It is obvious that the calculation of crack length is coupled with the increase of uplift pressures in the cracks. Analytical calculation of crack length: Analytical formulae have been developed to calculate the crack length for simple cases of gravity dams without drains assuming that the tensile strength is zero (Corns et al. 1988a, USBR 1987, FERC 1991). More complex cases considering the presence of drains and tensile strength, using beam theory, have been reported (ANCOLD 1991, Lo et al. 1990 with a linear distribution of normal stresses). However, to consider a range of more complex cases such as inclined joints with different drainage conditions, it is more efficient to calculate the crack length using an iterative method (USBR 1987). Iterative method to evaluate crack lengths: CADAM3D uses an iterative procedure to calculate the crack length (Figure 195). When the crack initiation criterion indicates the development of a crack, the iterative procedure begins. The crack length is progressively increased, and the uplift pressures are adjusted according to the specified drainage conditions until the crack propagation criterion indicates crack arrest. As mentioned previously two different cracking criteria are available in CADAM3D: initiation and propagation. Figure 195 Iterative procedure for calculating crack length The uplift pressures can be considered as external forces and the stresses at the crack tip, σn, are calculated while including the uplift pressures in the force resultant (USACE 1995, USBR 1987 (crack propagation procedure)). These calculations produce a linear distribution of normal stresses even in cases where a nonlinear distribution of uplift pressures is present due to drainage. ΣV = Sum of all vertical forces including uplift pressure A = Area of uncracked ligament ΣM = Moment relative to the centroid of the uncracked ligament caused by all loads including uplift pressures. I = Moment of inertia of uncracked ligament. c = Distance between the centre of gravity of the uncracked ligament and the position where stresses are calculated. Initiation (crack propagation) from U/S and D/S faces When performing static or seismic stress analysis, cracks can be initiated and propagated from either upstream and/or downstream face. CADAM3D only considers the upstream-downstream inclination of the plane - the cross- stream inclination is not considered (an average elevation plane can be used in this case). Figure 196 shows the distribution of uplift pressures along a cracked inclined joint. In this case, the uplift pressures are applied in the direction normal to the crack for stress and stability analysis. Using, in this case, the geometric properties (area, inertia) calculated in a local axis system along the inclined plane. Figure 196 Dam with sloped joint (A): uncracked; (B) cracked
<urn:uuid:f9f489aa-834e-4d5e-ae29-f806587e7e87>
CC-MAIN-2023-50
https://cadam3d.com/help/Stressanalysisandcracklengths.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.905202
829
2.78125
3
One crucial aspect of planning any voyage is determining the expected travel time. This information aids in developing accurate schedules, optimizing resources, and enhancing overall safety. A Travel Time by Boat Calculator serves as an invaluable tool for these calculations, making them quick and accurate. The Travel Time by Boat Calculator works based on the simple principle of “time equals distance divided by speed”, commonly written as T = D/S. This principle comes from the fundamental definitions of speed and time in physics. Here’s how it works: given the total distance (D) of the journey in nautical miles and the average speed (S) of the boat in knots, the calculator will divide the distance by the speed to get the travel time (T), typically presented in hours. For example, if a boat is to travel 100 nautical miles at an average speed of 10 knots, the calculator will perform the operation 100 / 10 to give a result of 10 hours. This means that under these conditions, the journey should take approximately 10 hours to complete. The Travel Time by Boat Calculator is a handy tool for anyone involved in marine navigation, whether professionally or recreationally. By inputting just two values – the total distance and the boat’s average speed – users can get an accurate estimate of their travel time. Such tools aid in planning and safety, demonstrating the usefulness of technology in marine endeavors. Please note that real-world conditions, including weather and sea state, can affect travel times, so always allow for some flexibility in your planning.
<urn:uuid:de5d0448-a279-42d0-ba3b-a0add4a1e018>
CC-MAIN-2023-50
https://calculatorshub.net/marine-calculators/travel-time-by-boat-calculator/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.933493
313
3.078125
3
The autofocus system of a camera is currently one of the most critical and valued functions. What is focusing on a camera? In the entry on the depth of field, we saw that in photography, an element of the scene is considered to be in focus when the points of the image that correspond to that element are minimal (they form a circle of confusion so small that the human eye sees it as a point). In practice, when we see an image, the elements in focus appear with much contrast, its edges and lines are very well appreciated, the separations between its parts are sharp and differentiated. Items that are not in focus appear blurrier, to the point that they may become unrecognizable. The focusing process involves moving the lens relative to the sensor plane: - In the case of a simple lens, when we move the lens away from the sensor, we focus on closer objects. - If we bring the lens closer to the sensor, we focus on more distant objects. There will come a time when the lens’s focus practically coincides with the plane of the sensor. In that case, we will be focusing on infinity: all distant objects (from a certain distance) will be in focus. At the other extreme, to focus on objects very close to the camera, the lens has to be separated from the sensor’s plane. In macro photography, specific objectives that allow focusing from very close or extension tubes with shared goals are used to ‘move away’ the optical center and focus with the camera very close to the subject to achieve higher magnification. Camera lenses are made up of a lens system, but the principle of focus is the same. What usually happens is that not all the lenses move within the objective, but rather a specialized group of lenses whose adjustment is equivalent to moving the system’s optical center. Most lenses include a manual focus ring on interchangeable lens cameras (reflex cameras and mirrorless cameras). The first autofocus cameras emerged around 1980. All cameras include automatic focus systems, some of them even without the possibility of manual focus. In advanced compact and interchangeable lens cameras, there is the option of working with autofocus (this is common in most situations) or with manual focus using the lens’s focus ring. The autofocus system works as follows: - The camera incorporates a detector that analyzes typically a small part of the image (the area of the scene that you want to focus on) - The electronic system decides if that piece of the image has contrast or if it is blurred. - Contrast is usually detected from abrupt transitions between elements of the scene: edges, lines, textures. - If the system determines that the image is blurred, it sends the order to move the focus lens slightly. And re-evaluate. There comes a time when the system determines that it has achieved the maximum contrast, the full focus, for the area we want to focus on. What is the ideal focus system like? It would be a system that: - Get the focus fast, the faster, the better, ideally instantaneous. - Get a precise focus on the point of the scene we want to focus on - Get the focus on any circumstance. Such an ideal system does not exist, although focusing systems are becoming faster, more precise, and versatile. You should also note that the focusing speed depends on the entire system as a whole: detector precision, an algorithm for adjusting the lenses’ position (how and how much the lens has to move), speed, and accuracy of the focusing motor. And it also depends on external conditions: the amount of light in the scene, the texture of the object we focus on. We are going to see what are the techniques that are currently used in focusing systems, with their pros and cons. Phase detection focus (reflex) It is the system used by most SLR cameras. The mirror of an SLR camera is made up of two mirrors. The primary mirror sends the image to the optical viewfinder. However, it is a mirror that lets a certain amount of light pass to a second mirror, called a secondary mirror or sub-mirror, reflecting the image towards the phase detector. The phase detector is a light sensor, which works similarly to the image sensor. However, this sensor only receives a tiny part of the scene, for example, an area in the center of the image (or the location indicated by the focus point selected on the camera). The focus sensor is specialized in detecting the scene’s light transitions, for example, an edge of an object, a line, a texture, something that generates a significant contrast between two points of light. This transition turns into an electrical signal, which we could imagine as a spike. For each focus point, two separate sensors triangulate. Each of them receives the same image of the area we want to focus on. When the image is in focus, the peaks of the two electrical signals coincide. When the image is out of focus, the peaks don’t match, and the electronics can calculate precisely where the lens needs to move and how far we are from the focus point. Some focus points only detect vertical transitions (vertical lines or edges of the scene), others only horizontal changes, and some focus points detect both are called focus points cross (cross-type AF point). The phase-detection focusing system is speedy and entirely accurate. As it is known at all times where the lens has to move, it is a system that works very well both for fast focus and for tracking moving objects since the electronic part can even introduce a certain margin of prediction. For phase detection to work correctly, a certain amount of light is required in the scene. It is also necessary that the set contains those horizontal or vertical lines, borders in short, that the location (at least at the point of focus) has a particular texture. One of the disadvantages of the system is its construction complexity. The problem comes because the phase detection sensors are located in a different plane from the image sensor. They do not precisely detect what reaches the primary sensor. They are independent elements. Therefore, the entire system must be entirely built (mechanical part) and synchronized (mechanical and electronic component). Each camera, one by one, has to be calibrated with great precision. Otherwise, it will present back focus or front focus problems; all the images will appear out of focus. Another problem with the traditional phase detection approach in SLRs is that this system is no longer operational when the mirror is raised. For this reason, when we use the screen (live view) for photography instead of the optical viewfinder, the focus is usually slower and sometimes much slower depending on the camera. And the same is true when using the SLR camera for video, as the mirror remains raised all the time. The pure phase-detection focusing system (using separate sensors) is not suitable for video. Phase Detection Focusing is known in English as PDAF ( Phase Detection Auto Focus ). This nomenclature is also used to refer to systems that use hybrid focus: phase + contrast, both in cameras and mobile phones. Contrast detection focus It is the system used by most compact cameras and many SLRs when working in live view mode (through the screen). From a technical point of view, it is a straightforward system. It does not need external elements, or additional sensors, or complex electronics, or calibration. Once we select the area we want to focus on in the scene, the processor analyzes it directly from the sensor’s image. The system sweeps, moving the focusing lens, and at each position, calculates the contrast level of the image. Scanning stops when the maximum contrast level is determined, and the processor moves the lens to that position. In principle, it is a trial and error process because the system does not know where to move the lens or how much to move it, and therefore it is a relatively slow process compared to phase detection. Traditional contrast detection focus movement is typical: lens travels forward, backward travel, ahead of a little kind of back and forth until you get focus. In English, it is known as autofocus hunting. When continuous focus is activated, this swing is constant because the camera has to ensure in real-time that the distance between the camera and the object we are focusing on has not changed. In photography, this effect (with continuous focus) can be annoying when viewing the scene through the electronic viewfinder or the rear screen. The photograph itself, the final image, appears correctly in focus. The video (with continuous focus) is more problematic because the algorithms have to track the contrast of the area of interest. At the same time, they have to minimize the focus hunting effect that can become very annoying. A balance has to be found between the system’s response to changes in the scene and the focus’s precision. That is why plans based on video contrast-detection tend to have slower reactions and transitions (going from focusing on one object to another located on different planes) are not as smooth. However, contrast detection also has advantages: - The focus plane is the sensor plane, with no back focus / front focus problem. It is a process that feeds itself; therefore, when the focus is achieved, it is usually exact (maximum contrast) - No need for specific focus points; you can focus using any area of the image - Focus can be achieved with less light in the scene - Can find focus in locations where there are no very sharp vertical/horizontal edges - Very complex recognition and predictive algorithms can be applied, for example, face recognition for faster focus and tracking The contrast-detection approach is known in English by the acronym CDAF ( Contrast Detection Auto Focus ). This nomenclature is also used to refer to systems that do not use a hybrid approach, for example, in cameras or mobiles that only rely on contrast detection. Hybrid focus built into the image sensor This is probably the future system, which is already used in practically all cameras today with different variants. The idea is straightforward: instead of using a separate sensor to do phase detection, why not use the image sensor itself? Image sensors using hybrid technology include areas (pixels) dedicated exclusively to phase detection. These unique pixels are distributed throughout the sensor area. There may be many phase-detection zones on the sensor. For example, the Sony a6000 EVIL (mirrorless) camera includes 179 phase-detection points throughout the entire area of its APS-C sensor. In general, these phase detectors built into the image sensor are not as effective as the independent phase detectors of SLRs. One has to think that independent detectors are specialized sensors. With precise and high-speed electronics, internal optics are also optimized for phase detection and separation between pairs, allowing a more accurate triangulation. But the advantage of the hybrid system is that the phase detectors are precisely in the sensor plane (they are part of it). No calibration error problems. Another great advantage is that the two focusing techniques can be combined. Phase detection tells the processor to move the lens very quickly, and contrast-detection is responsible for fine-tuning the focus and achieving the highest possible contrast. Furthermore, compelling prediction algorithms can be implemented, using many phase-detection points simultaneously and many contrast-detection areas. All manufacturers are developing new technologies and algorithms based on hybrid phase/contrast detection. The speed and precision of focus based on this technology are increasing. One of the drawbacks of hybrid focusing systems is that the cells dedicated to the focusing system do not contribute to light detection to generate the final image. We can imagine a photo with ‘gaps’ that correspond to the position of those focus points. The camera internally has to do some interpolation to reconstruct a complete image. And this process can lead to a noticeable banding effect, especially when using a very high ISO or recovering shadows in the development/editing process. In these extreme situations, a pattern can be seen in the image, usually in bands of different tones or colors. Under normal conditions, these effects or patterns in the image are invisible. In the video, the hybrid focus system’s advantage is that the phase detection part knows if the camera’s distance and the scene’s object have changed. It does not have to analyze the contrast (trial and error) continuously. The focus hunting effect is greatly minimized. With the face (and eyes) detection algorithms, the phase-detection system helps determine how far away the main subject is. The method based on contrast detection is in charge of analyzing and detecting the patterns (face, eyes, etc.). In a system based solely on contrast detection, it is sometimes challenging to identify a look in an image that is totally out of focus, without distinctive features or patterns. Dual Pixel CMOS Focus This Canon technology is a hybrid focus system. It uses phase-detection built into the image sensor, but all the sensor pixels are used for phase-detection focusing. Each sensor’s pixel comprises two independent cells (two photodiodes, A and B), each with its micro-lens. At the moment of focusing, each pair of cells (in the area we are focusing on) works as a phase detector and triangulates the distance to the object and focus. Another way of looking at it would be to think that the camera has two images: one formed from cells A and the other formed from cells B. By superimposing these two images and seeing their differences, the camera can determine where it has to move the image. Focus lens. The contrast-detection system and the above algorithms can be in charge of fine adjustment or detecting and tracking patterns (e.g., faces, eyes, etc.). When the shutter button is pressed, each pixel pair is combined to generate the image information, as if it were a single photodiode. This type of approach works very well, for example, for video, for tracking objects. Once the thing we want to focus on is ‘hooked,’ it allows a relatively precise and fast-tracking throughout the entire scene since the ‘focus points’ are evenly distributed throughout the sensor. The Dual Pixel system is not as fast as the traditional phase detection approach for photography (that of specialized SLR cameras), although these types of systems evolve with each generation of cameras. We discussed the same reasons in the hybrid approach: the independent phase detector is optimized for this task. The physical separation of each pair of sensors makes triangulation easier. One drawback of the system is the price. Building a Dual Pixel sensor is more expensive than building a traditional sensor or a hybrid sensor (Hybrid CMOS). In the video, the Dual Pixel system behaves similarly to the generic hybrid system. The phase-detection part gives the initial push to estimate where the scene’s main object is located, and the face, eye, or object tracking detection algorithms do the fine-tuning. The two systems: phase + contrast, are continually providing information to the camera. Panasonic DFD focus Panasonic cameras (starting with the Panasonic GH4) use a DFD system (Depth from Defocus) based on contrast detection. As we saw in the corresponding section, contrast detection has the problem that the system does not know where to move the focusing lens or how much to impact it. The fundamental contrast-detection algorithm analyzes the image as the focus moves until the contrast level (in the area we are focusing on) reaches a maximum. Let’s assume that 10-15 pictures of the scene are analyzed until the exact point of focus is found. The DFD algorithm is based on the following: - The camera analyzes the first image and compares it with the next (with the focusing lens in another position). - The camera searches its database for the characterization of the lens it uses and from that information. It can calculate how far the focusing lens has to move by analyzing the images and how far the focusing lens has to move. - Once the focus lens is in position, fine-tuning is performed by trial and error (as in necessary contrast detection). The Depth from Defocus system’s advantage is that the camera only has to analyze 4-5 images and the focus lens travel is much less in most cases. The lens makes two initial movements, a direct action towards the estimated area and then a couple of correction movements (compared to the 10-15 moves it would make in pure contrast detection). That translates into shorter response times. The downside of DFD is that it only works when the camera uses individual lenses: the ones that Panasonic has characterized, which are precisely its lenses. DFD does not work with non-Panasonic lenses. And when a new lens comes out, the camera firmware needs to be updated so that the DFD system recognizes it. With other lenses, the camera uses the base contrast-detection focusing system. In the video, the DFD system is faster when making transitions between shots. For example, when focusing from a close object to a distant one. But once the object is in focus (if we use continuous focus), the system has to periodically check that the distance between the object and the camera has not changed. And you have to minimize the effect of focus hunting (micro variations of focus) as much as possible. Again, that balance makes DFD systems less responsive to the scene’s changes than cameras with hybrid focus systems.
<urn:uuid:cd5b17c6-65f0-4cad-8aba-839dc99153e6>
CC-MAIN-2023-50
https://camera-enthusiast.com/how-autofocus-works-on-cameras
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.943297
3,678
3.703125
4
Ever since there were social norms there has been a rising amount of cases of eating disorders Ever since there were social norms there has been a rising amount of cases of eating disorders. The first ever eating disorder was documented by a French physician by the name of Louis-Victor Marcé in 1859 where he diagnosed a patient with anorexia. Since then there has been 16 newly founded eating disorders. Every eating disorder is dangerous and needs to be taken very seriously, but in the society, we live in today we make many jokes about them. The gender that is mainly affected by eating disorders is females. In a study done by The Alliance for Eating Disorder Awareness shows that 1 in 5 women struggle with an eating disorder. It also showed that “eating disorders affect up to 24 million Americans and 70 million individuals worldwide.” (ndsu.EDU) 90% of people with eating disorders are women within the ages of 12 and 25. The study also showed that the leading cause of an eating disorder is dieting. In addition, the study showed that “society starts females at a younger age where 51% of 9 and 10-year old’s feel better about themselves if they are on a diet” (nsdu.edu). These younger girls see models being super skinny and want to emulate them so much that they start to look at themselves and see themselves as “fat” so they start to diet. Studies have shown that it is mostly teenagers that are affected by eating disorders, but clinics have shown that it is usually females between the ages of 20-30 that seek therapy. This is probably due to the fact that younger people hate going to the doctors which would cause them not to seek professional help. When a younger person goes to the doctor for an eating disorder it is usually the parent who brings them in, so they can get help. This shows that younger girls as well as teenage girls only care about being attractive and that they don’t value being healthy. Creighton University described an eating disorder as Eating disorders are “complex conditions that arise from a combination of long-standing behavioral, emotional, psychological, interpersonal, and social factors”. The study went in depth on how there isn’t just one factor that causes an eating disorder. They categorized the factors into seven different categories which are psychological, interpersonal, social, excessive, dieting, genetics, and other factors that can contribute to them. For the psychological factor it classified them into two studies in which they received similar results between patients. They classified some of the causes of anorexia as a “fear of growing up, inability to separate from the family, need to be pleased or liked, perfectionism, depression, anxiety, anger, or loneliness, lack of self-esteem to go along with high family expectations.”(Creighton) For bulimia they classified some of the causes as “difficulty regulating your mood, being depressed, anxious, anger, or lonely, also you are more impulsive and will sometimes become involved in shoplifting or abuse substances. In addition to substance abuse it says that you could have been sexually abused, have family disfunction, or low self-esteem”. (Creighton) Within the classification of interpersonal, the study says that you could have a troubled family and poor relationships with your peers, you could also have a problem expressing your emotions and feelings, you have been bullied or made fun of because of your weight, or you have had a history of being abused both sexually and physically. The social category from this study is from how society’s view plays a role and how different norms like having to be fit play a role in eating disorders. The excessive exercise is actually classified as a form of anorexia and they are still studying the causes of it because it is a newer form of an eating disorder. In addition to the new study on exercise it shows that dieting is just as bad because it makes us feel as if we need to lose more weight even though we are a healthy weight. According to the DSM-5 you have an eating disorder if you fit into 2 out of the 3 categories. First, you have a restriction of energy intake relative to requirements leading to a low body weight for your age, sex, and physical health. Second, you have an intense fear of gaining weight or becoming fat even if you are underweight. Third, you have a disturbance in the way in which one’s body weight or shape is experienced, undue influence of body weight or shape on self-evaluation, or denial of the seriousness of the current low body weight. (DSM-5). The disorders are often associated with other illnesses like depression, but they can be alone. Eating disorders are awful and can be fatal. Everywhere somebody looks today, someone will notice a skinny girl on a sign and that is because our culture values women being skinny, not just teenagers and those in their twenties. This plays true to the fashion models, which a lot of women idolize. They are tall and skinny, and they set the beauty standards for today’s women with unrealistic goals. Women today are valued based off of how they look, regardless of how many accomplishments they’ve achieved. A woman can be very successful, and she will still be judged off of her appearance. From a young age, females are taught that they have to be beautiful, and in school the pressure on them is a lot stronger than what guys go through because they always need to have a “summer body” or be working toward one. A horrible eating disorder that is growing rapidly is anorexia nervosa. This disease is when a person has lost their appetite for food. This eating disorder occurs because the person views themselves as overweight even if they are underweight. these people tend to monitor their weight closely and tend to take in as little calories as possible. Some symptoms of anorexia are having an extremely low body weight, severe food restriction, unwillingness to maintain a normal weight, and an intense fear of gaining weight. Treatment for someone with anorexia is challenging but is easiest to monitor them in a hospital. While monitoring them you want to pay close attention to their vitals because their body is malnourished. In most cases you will have to feed the patient through a tube in the beginning of treatment because they will resist the food. The next thing that you will have to do is help them get to and maintain a healthy weight and have them meet with a nutritionist multiple times, so they can set up a meal plan to follow. After you help them meet and maintain a healthy weight you want them to go through therapy so that you can help them go through the wrong weight gaining beliefs and teach them new ones. (Mayo Clinic) Another eating disorder that is growing rapidly is bulimia nervosa. Bulimia nervosa is another fatal eating disorder if left untreated. “Bulimia is when people have recurrent and frequent episodes of eating unusually large amounts of food and feel a lack of control over the episode.” (National Institute of Mental Health). The excessive eating is then followed by forced vomiting, laxative use, fasting, and excessive exercise. People with bulimia usually maintain a healthy weight but they also fear gaining weight, want to lose weight desperately and are unhappy with their body image. The binge eating can occur from several times a week to many times a day. Some other symptoms of Bulimia are sore throat, swollen salivary glands, acid reflux, and severe dehydration with an electrolyte imbalance. This is another eating disorder that affects more females than males, and it usually begins in the late teenage years to early adult years. “Many individuals who suffer with binge eating disorder use food as a way to cope with or block out feelings and emotions they do not want to feel” (www.mirror-mirror.org) When you are receiving treatment for bulimia you will go through psychotherapy and will more than likely be given antidepressants. Treatment is usually set up through team work which includes you, your family, your primary care and your therapist. If you don’t have a severe case of bulimia you will most likely be able to go home and treat it. The team will set you up with a nutritionist, so you can learn about what you are doing to your body and they can tell you what to eat to help your body while you are recovering. Bulimia is a very serious eating disorder and it’s on you to want to fix it because they can set you up with the things you need but you have to execute the plan. Although most studies show that women are more likely to have an eating disorder than men our society is evolving and with that men are getting more sensitive. This is because we are evolving from a time that we had to be hunters. Now in society we don’t have to provide meals for our family. In addition to that we have a lot newer and stricter social norm than we are used to and that puts a lot of stress on how our appearance should be. A survey showed that an estimated 1 million men have an eating disorder.(nationaleatingdisorders.org) This number has risen since eating disorders have been discovered tremendously. The number of cases of males is rising greatly due to our society being more accepting. In a recent study by National eating disorders showed that one in three males will be diagnosed with an eating disorder. (Nationaleatingdisorders.org) But men still don’t want to seek help because our culture shows that as being weak. When a man finally goes and gets help they receive similar results to women, but all treatment is different, and this is because guys have a higher chance of death resulting from having an eating disorder. “A gender-sensitive approach with recognition of different needs and dynamics for males is critical in effective treatment. Men and boys in treatment can feel out of place when predominantly surrounded by women, and an all-male treatment environment is recommended—when possible.” (Nationialeatingdisorders.org) for example Anorexia Nervosa effects males differently than females. One way that it differs is that males with the disorder have a lot lower levels of vitamin D and testosterone. The increased amount of eating disorders in men is coming because society is setting stricter standards on how they should look. Society believes that a man should have a fit body with a lot of muscles which is unrealistic. This stands true for another reason and that is that men think that they need a muscular body to be sexually attractive. “The desire for increased musculature is not uncommon, and it crosses age groups. 25% of normal weight males perceive themselves to be underweight and 90% of teenage boys exercised with the goal of bulking up.” (nationaleatingdisorders.org) Muscle dysmorphia is a new disorder that mainly effects men and is very common in body builders. This disorder makes the person think that they do not look muscular enough, so they only eat foods that help promote muscle gain. The person will also spend many hours at the gym, pay a lot of money on supplements in order to promote muscle growth. If that fails, the person will develop unhealthy eating habits to try to promote gains but that will cause them to get fatter or lose weight. If they don’t feel like anything is working the person could begin using steroids which would be very detrimental to their health. There are many ways in which you can help with the problem of body image effecting boys. First you can tell them that they don’t have to be super fit to look attractive. Another way is to tell them that they don’t have to rush to become fit because it is healthier to lose weight and gain muscle more slowly. If a child develops an eating disorder it is possible to give them more exercises and diets that are appropriate for his age. These are some of the many ways in which you can help prevent your kid from developing an eating disorder. Treatment for men with an eating disorder is very similar to females. Family members would want to set up support groups. Have them meet with nutritionists to set up a healthy diet. teach them different ways to exercise because you don’t want them to rush back into after treatment has started for them. If the disorder is very bad and they won’t change then put them in the hospital, so they can be monitored closely, and the person will go see a psychiatrist to figure out what is causing the problem, and then the doctor will develop a plan for the patient to get healthy. One strange eating disorder that is not spoken as often about as anorexia and bulimia is pica. Pica is an eating disorder in which someone may be drawn to ingest or otherwise consume non-food objects at least once a month (medscape.com) While babies and young children may consume small toys when they are young, it is perfectly natural. Pica is diagnosed when that behavior may be considered inappropriate or occurs very frequently. The frequent consumption of non-food items can lead to blockages of the digestive tract as well as malnourishment. Pica is found more often in children and pregnant women although it can affect many, over different cultures and backgrounds. It is theorized that both nutrient deficiencies and a tendency towards obsessive-compulsive behaviors may make certain individuals more inclined to show symptoms of pica. Therapy and nutrient supplementation can be successful in treating pica, however there are no official treatment guidelines. Overall, depression and personal strive seem to be a common thread in eating disorders. One broad treatment that seems to be effective for the large majority of them is cognitive behavioral therapy. Cognitive behavior therapy treats the mental and emotional aspects of eating disorders. Both cognitive factors and behavioral factors play a large role in eating disorders and cognitive behavioral therapy can treat this rapidly. If correctly executed people will go into remission and possibly cure their disorder. This is a good therapy because it doesn’t require medications and therefore has practically no side effects. Eating disorders are a very dangerous problem that is growing very rapidly. These eating disorders are curable but can be fatal if you don’t go and seek medical help. The main cause of all these eating disorders comes from our societies because we value ones looks over everything else. We need to do something about that quickly because people are going to find other ways to get the look that they put out. I can also see that the number of men with eating disorders is going to rise quickly as well because of all the pressure that we have on us to look a certain way. Eating disorders are very dangerous and shouldn’t be taken lightly.
<urn:uuid:cddd739d-6812-46ce-8da0-bafd6427f3ea>
CC-MAIN-2023-50
https://campuscrosswalk.org/ever-since-there-were-social-norms-there-has-been-a-rising-amount-of-cases-of-eating-disorders/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.976435
3,021
2.859375
3
Starda is a small, red dwarf star located in the constellation Starda today Virgo. It is one of the nearest stars to the Sun, Starda today a distance of only about 6.5 light years. Starda is a very faint star, with an apparent magnitude of only about 11. Toeay is too faint to be seen with the naked eye. Starda is a red dwarf star. Red dwarf stars are the most common type of star in the universe. They are small, cool Starda today with masses about one-tenth that of the Sun. Starda has a mass of about 0.09 solar masses and a surface temperature of only about 3,000 degrees Kelvin. Red dwarf stars like Starda are very long-lived. They burn their fuel very slowly and can live for billions of years. In fact, Sgarda dwarfs are thought best online casinos in the world with fast payouts be the click Starda today of просто best online casinos online in India полезное in the universe. Starda is not currently source to have any planets. However, many red dwarf stars are known to have planets. In fact, it is thought that most red dwarf stars have planets. The planets around red dwarf stars are often very Starda today from the planets in our Solar System. They are often much closer to their star than the planets in our Solar System are to the Sun. This means that they are often Stafda hot. The study of red dwarf allintext: the best online casinos in India for money like Starda is important because they can teach us about the formation and evolution of planets. They can also teach us about the habitability of planets around other stars.
<urn:uuid:f5b6475b-6367-4b12-a16e-f44e9dc71395>
CC-MAIN-2023-50
https://casinositesindia.website/casino-rate-access/starda-today/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.962015
373
3.140625
3
A new device that pairs a solar cell with heat harvesters captures more of the sun’s energy and converts it into electricity than the solar cell alone (ACS Nano 2015, DOI: 10.1021/acsnano.5b04042). If the hybrid device can be scaled up to larger sizes, it could be used to make energy-saving windows, among other applications, the researchers say. “Commercial solar panels only harvest part of the radiation they’re exposed to,” says Eunkyoung Kim, who develops organic polymers at Yonsei University, in Seoul. The rest of the solar spectrum is lost, much of it as heat. To capture that heat, researchers have tried combining solar cells with pyroelectric or thermoelectric devices that convert heat into electricity. But bringing all the components together is challenging, Kim says. The right materials have to be selected so that light and heat can transfer through one part of the device into the others. Previous hybrid devices didn’t have enough power output, says Kim. She decided to engineer clear conductive polymers to make the device more efficient and with sufficient voltage to power electrochromic windows that darken in response to electricity. Kim and her colleagues built a multilayer device that combines different types of energy harvesters to capture more of the available visible light and heat. The top layer is a dye-sensitized solar cell, which has a low efficiency, but has the benefit of being transparent. Solar radiation that’s not captured and converted into electricity passes through to the layers below. The second layer is the key to the device: a stack of polymer electrodes made of transparent, pyroelectric polymer coated on both sides with conductive, transparent PEDOT polymer. This part of the device converts uncaptured visible light into heat, and some of the heat into electricity. Finally this photothermal/pyroelectric layer is glued with conductive paste to a thermoelectric layer that converts remaining heat into electricity. Adding the heat conversion devices to the solar cell boosted the overall efficiency by 20% compared to the solar cell alone, Kim says. The hybrid device also gets an important boost in its voltage output—enough to power a light-emitting diode and an electrochromic display, which the solar cell alone can’t do. Kim wants to make larger versions of the device to power windows that would darken in response to sun and heat, keeping a building cooler. Under concentrated light, the hybrid device has a power conversion efficiency of 41.3%. Rachel A. Segalman, a chemical engineer at the University of California, Santa Barbara, who works on thermoelectric materials, says combining different kinds of heat-converting devices with a solar cell, instead of just using either a pyroelectric or a thermoelectric device, is an “intriguing” idea. It’s analogous to tandem solar cells, she says, which use multiple layers of materials to capture a broader spectrum of visible and infrared light. Still, the resulting power conversion is low, Segalman says. Even if each component has high efficiency, much can be lost in the connections between them, reducing the overall efficiency of the device. Kim says she’s working on improving the output of the hybrid system, first by optimizing the performance of each component, for example by using nanostructured materials. She is also making devices with a larger area, which would be needed to make energy-saving windows.
<urn:uuid:590b9207-1579-4629-964a-abaa9b5cc66f>
CC-MAIN-2023-50
https://cen.acs.org/articles/93/web/2015/09/Hybrid-Device-Harnesses-Light-Heat.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.926928
732
3.84375
4
If you're seeing this message, it means we're having trouble loading external resources on our website. If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked. Course: US history > Unit 8 - Introduction to the Civil Rights Movement - African American veterans and the Civil Rights Movement - Brown v. Board of Education of Topeka - Emmett Till The Montgomery Bus Boycott - "Massive Resistance" and the Little Rock Nine - The March on Washington for Jobs and Freedom - The Civil Rights Act of 1964 and the Voting Rights Act of 1965 - SNCC and CORE - Black Power - The Civil Rights Movement - On December 1, 1955, Rosa Parks , a black seamstress, was arrested in Montgomery, Alabama for refusing to give up her bus seat so that white passengers could sit in it. - Rosa Parks’s arrest sparked the Montgomery Bus Boycott , during which the black citizens of Montgomery refused to ride the city’s buses in protest over the bus system’s policy of racial segregation. It was the first mass-action of the modern civil rights era, and served as an inspiration to other civil rights activists across the nation. - Martin Luther King, Jr. , a Baptist minister who endorsed nonviolent civil disobedience, emerged as leader of the Boycott. - Following a November 1956 ruling by the Supreme Court that segregation on public buses was unconstitutional, the bus boycott ended successfully. It had lasted 381 days. Rosa Parks’s arrest Origins of the bus boycott, the boycott succeeds, what do you think, want to join the conversation. - Upvote Button navigates to signup page - Downvote Button navigates to signup page - Flag Button navigates to signup page - History Classics - Your Profile - Find History on Facebook (Opens in a new window) - Find History on Twitter (Opens in a new window) - Find History on YouTube (Opens in a new window) - Find History on Instagram (Opens in a new window) - Find History on TikTok (Opens in a new window) - This Day In History - History Podcasts - History Vault - History Travel Montgomery Bus Boycott By: History.com Editors Updated: January 10, 2023 | Original: February 3, 2010 The Montgomery Bus Boycott was a civil rights protest during which African Americans refused to ride city buses in Montgomery, Alabama, to protest segregated seating. The boycott took place from December 5, 1955, to December 20, 1956, and is regarded as the first large-scale U.S. demonstration against segregation. Four days before the boycott began, Rosa Parks , an African American woman, was arrested and fined for refusing to yield her bus seat to a white man. The U.S. Supreme Court ultimately ordered Montgomery to integrate its bus system, and one of the leaders of the boycott, a young pastor named Martin Luther King Jr. , emerged as a prominent leader of the American civil rights movement . Rosa Parks' Bus In 1955, African Americans were still required by a Montgomery, Alabama , city ordinance to sit in the back half of city buses and to yield their seats to white riders if the front half of the bus, reserved for whites, was full. But on December 1, 1955, African American seamstress Rosa Parks was commuting home on Montgomery’s Cleveland Avenue bus from her job at a local department store. She was seated in the front row of the “colored section.” When the white seats filled, the driver, J. Fred Blake, asked Parks and three others to vacate their seats. The other Black riders complied, but Parks refused. She was arrested and fined $10, plus $4 in court fees. This was not Parks’ first encounter with Blake. In 1943, she had paid her fare at the front of a bus he was driving, then exited so she could re-enter through the back door, as required. Blake pulled away before she could re-board the bus. Did you know? Nine months before Rosa Parks' arrest for refusing to give up her bus seat, 15-year-old Claudette Colvin was arrested in Montgomery for the same act. The city's Black leaders prepared to protest, until it was discovered Colvin was pregnant and deemed an inappropriate symbol for their cause. Although Parks has sometimes been depicted as a woman with no history of civil rights activism at the time of her arrest, she and her husband Raymond were, in fact, active in the local chapter of the National Association for the Advancement of Colored People ( NAACP ), and Parks served as its secretary. Upon her arrest, Parks called E.D. Nixon, a prominent Black leader, who bailed her out of jail and determined she would be an upstanding and sympathetic plaintiff in a legal challenge of the segregation ordinance. African American leaders decided to attack the ordinance using other tactics as well. The Women’s Political Council (WPC), a group of Black women working for civil rights, began circulating flyers calling for a boycott of the bus system on December 5, the day Parks would be tried in municipal court. The boycott was organized by WPC President Jo Ann Robinson. Montgomery’s African Americans Mobilize As news of the boycott spread, African American leaders across Montgomery (Alabama’s capital city) began lending their support. Black ministers announced the boycott in church on Sunday, December 4, and the Montgomery Advertiser , a general-interest newspaper, published a front-page article on the planned action. Approximately 40,000 Black bus riders—the majority of the city’s bus riders—boycotted the system the next day, December 5. That afternoon, Black leaders met to form the Montgomery Improvement Association (MIA). The group elected Martin Luther King Jr. , the 26-year-old-pastor of Montgomery’s Dexter Avenue Baptist Church , as its president, and decided to continue the boycott until the city met its demands. Initially, the demands did not include changing the segregation laws; rather, the group demanded courtesy, the hiring of Black drivers, and a first-come, first-seated policy, with whites entering and filling seats from the front and African Americans from the rear. Ultimately, however, a group of five Montgomery women, represented by attorney Fred D. Gray and the NAACP, sued the city in U.S. District Court, seeking to have the busing segregation laws totally invalidated. Although African Americans represented at least 75 percent of Montgomery’s bus ridership, the city resisted complying with the protester’s demands. To ensure the boycott could be sustained, Black leaders organized carpools, and the city’s African American taxi drivers charged only 10 cents—the same price as bus fare—for African American riders. Many Black residents chose simply to walk to work or other destinations. Black leaders organized regular mass meetings to keep African American residents mobilized around the boycott. Integration at Last On June 5, 1956, a Montgomery federal court ruled that any law requiring racially segregated seating on buses violated the 14th Amendment to the U.S. Constitution . That amendment, adopted in 1868 following the U.S. Civil War , guarantees all citizens—regardless of race—equal rights and equal protection under state and federal laws. The city appealed to the U.S. Supreme Court , which upheld the lower court’s decision on December 20, 1956. Montgomery’s buses were integrated on December 21, 1956, and the boycott ended. It had lasted 381 days. Bus Boycott Meets With Violence Integration, however, met with significant resistance and even violence. While the buses themselves were integrated, Montgomery maintained segregated bus stops. Snipers began firing into buses, and one shooter shattered both legs of a pregnant African American passenger. In January 1957, four Black churches and the homes of prominent Black leaders were bombed; a bomb at King’s house was defused. On January 30, 1957, the Montgomery police arrested seven bombers; all were members of the Ku Klux Klan , a white supremacist group. The arrests largely brought an end to the busing-related violence. Boycott Puts Martin Luther King Jr. in Spotlight The Montgomery Bus Boycott was significant on several fronts. First, it is widely regarded as the earliest mass protest on behalf of civil rights in the United States, setting the stage for additional large-scale actions outside the court system to bring about fair treatment for African Americans. Second, in his leadership of the MIA, Martin Luther King Jr. emerged as a prominent national leader of the civil rights movement while also solidifying his commitment to nonviolent resistance. King’s approach remained a hallmark of the civil rights movement throughout the 1960s. Shortly after the boycott’s end, he helped found the Southern Christian Leadership Conference (SCLC), a highly influential civil rights organization that worked to end segregation throughout the South. The SCLC was instrumental in the civil rights campaign in Birmingham, Alabama, in the spring of 1963, and the March on Washington in August of that same year, during which King delivered his famous “I Have a Dream” speech . The boycott also brought national and international attention to the civil rights struggles occurring in the United States, as more than 100 reporters visited Montgomery during the boycott to profile the effort and its leaders. Rosa Parks, while shying from the spotlight throughout her life, remained an esteemed figure in the history of American civil rights activism. In 1999, the U.S. Congress awarded her its highest honor, the Congressional Gold Medal. Sign up for Inside History Get HISTORY’s most fascinating stories delivered to your inbox three times a week. By submitting your information, you agree to receive emails from HISTORY and A+E Networks. You can opt out at any time. You must be 16 years or older and a resident of the United States. - Alabama Review The Montgomery Bus Boycott and the Fall of the Montgomery City Lines - Felicia Mcghee - The University of Alabama Press - Volume 68, Number 3, July 2015 - pp. 251-268 - View Citation Project MUSE Mission Project MUSE promotes the creation and dissemination of essential humanities and social science resources through collaboration with libraries, publishers, and scholars worldwide. Forged from a partnership between a university press and a library, Project MUSE is a trusted part of the academic and scholarly community it serves. 2715 North Charles Street Baltimore, Maryland, USA 21218 +1 (410) 516-6989 [email protected] ©2023 Project MUSE. Produced by Johns Hopkins University Press in collaboration with The Sheridan Libraries. Now and Always, The Trusted Content Your Research Requires Built on the Johns Hopkins University Campus Montgomery Bus Boycott December 5, 1955 to December 20, 1956 Sparked by the arrest of Rosa Parks on 1 December 1955, the Montgomery bus boycott was a 13-month mass protest that ended with the U.S. Supreme Court ruling that segregation on public buses is unconstitutional. The Montgomery Improvement Association (MIA) coordinated the boycott, and its president, Martin Luther King, Jr., became a prominent civil rights leader as international attention focused on Montgomery. The bus boycott demonstrated the potential for nonviolent mass protest to successfully challenge racial segregation and served as an example for other southern campaigns that followed. In Stride Toward Freedom , King’s 1958 memoir of the boycott, he declared the real meaning of the Montgomery bus boycott to be the power of a growing self-respect to animate the struggle for civil rights. The roots of the bus boycott began years before the arrest of Rosa Parks. The Women’s Political Council (WPC), a group of black professionals founded in 1946, had already turned their attention to Jim Crow practices on the Montgomery city buses. In a meeting with Mayor W. A. Gayle in March 1954, the council's members outlined the changes they sought for Montgomery’s bus system: no one standing over empty seats; a decree that black individuals not be made to pay at the front of the bus and enter from the rear; and a policy that would require buses to stop at every corner in black residential areas, as they did in white communities. When the meeting failed to produce any meaningful change, WPC president Jo Ann Robinson reiterated the council’s requests in a 21 May letter to Mayor Gayle, telling him, “There has been talk from twenty-five or more local organizations of planning a city-wide boycott of buses” (“A Letter from the Women’s Political Council”). A year after the WPC’s meeting with Mayor Gayle, a 15-year-old named Claudette Colvin was arrested for challenging segregation on a Montgomery bus. Seven months later, 18-year-old Mary Louise Smith was arrested for refusing to yield her seat to a white passenger. Neither arrest, however, mobilized Montgomery’s black community like that of Rosa Parks later that year. King recalled in his memoir that “Mrs. Parks was ideal for the role assigned to her by history,” and because “her character was impeccable and her dedication deep-rooted” she was “one of the most respected people in the Negro community” (King, 44). Robinson and the WPC responded to Parks’ arrest by calling for a one-day protest of the city’s buses on 5 December 1955. Robinson prepared a series of leaflets at Alabama State College and organized groups to distribute them throughout the black community. Meanwhile, after securing bail for Parks with Clifford and Virginia Durr , E. D. Nixon , past leader of the Montgomery chapter of the National Association for the Advancement of Colored People (NAACP), began to call local black leaders, including Ralph Abernathy and King, to organize a planning meeting. On 2 December, black ministers and leaders met at Dexter Avenue Baptist Church and agreed to publicize the 5 December boycott. The planned protest received unexpected publicity in the weekend newspapers and in radio and television reports. On 5 December, 90 percent of Montgomery’s black citizens stayed off the buses. That afternoon, the city’s ministers and leaders met to discuss the possibility of extending the boycott into a long-term campaign. During this meeting the MIA was formed, and King was elected president. Parks recalled: “The advantage of having Dr. King as president was that he was so new to Montgomery and to civil rights work that he hadn’t been there long enough to make any strong friends or enemies” (Parks, 136). That evening, at a mass meeting at Holt Street Baptist Church , the MIA voted to continue the boycott. King spoke to several thousand people at the meeting: “I want it to be known that we’re going to work with grim and bold determination to gain justice on the buses in this city. And we are not wrong.… If we are wrong, the Supreme Court of this nation is wrong. If we are wrong, the Constitution of the United States is wrong. If we are wrong, God Almighty is wrong” ( Papers 3:73 ). After unsuccessful talks with city commissioners and bus company officials, on 8 December the MIA issued a formal list of demands: courteous treatment by bus operators; first-come, first-served seating for all, with blacks seating from the rear and whites from the front; and black bus operators on predominately black routes. The demands were not met, and Montgomery’s black residents stayed off the buses through 1956, despite efforts by city officials and white citizens to defeat the boycott. After the city began to penalize black taxi drivers for aiding the boycotters, the MIA organized a carpool. Following the advice of T. J. Jemison , who had organized a carpool during a 1953 bus boycott in Baton Rouge, the MIA developed an intricate carpool system of about 300 cars. Robert Hughes and others from the Alabama Council for Human Relations organized meetings between the MIA and city officials, but no agreements were reached. In early 1956, the homes of King and E. D. Nixon were bombed. King was able to calm the crowd that gathered at his home by declaring: “Be calm as I and my family are. We are not hurt and remember that if anything happens to me, there will be others to take my place” ( Papers 3:115 ). City officials obtained injunctions against the boycott in February 1956, and indicted over 80 boycott leaders under a 1921 law prohibiting conspiracies that interfered with lawful business. King was tried and convicted on the charge and ordered to pay $500 or serve 386 days in jail in the case State of Alabama v. M. L. King, Jr. Despite this resistance, the boycott continued. Although most of the publicity about the protest was centered on the actions of black ministers, women played crucial roles in the success of the boycott. Women such as Robinson, Johnnie Carr , and Irene West sustained the MIA committees and volunteer networks. Mary Fair Burks of the WPC also attributed the success of the boycott to “the nameless cooks and maids who walked endless miles for a year to bring about the breach in the walls of segregation” (Burks, “Trailblazers,” 82). In his memoir, King quotes an elderly woman who proclaimed that she had joined the boycott not for her own benefit but for the good of her children and grandchildren (King, 78). National coverage of the boycott and King’s trial resulted in support from people outside Montgomery. In early 1956 veteran pacifists Bayard Rustin and Glenn E. Smiley visited Montgomery and offered King advice on the application of Gandhian techniques and nonviolence to American race relations. Rustin, Ella Baker , and Stanley Levison founded In Friendship to raise funds in the North for southern civil rights efforts, including the bus boycott. King absorbed ideas from these proponents of nonviolent direct action and crafted his own syntheses of Gandhian principles of nonviolence. He said: “Christ showed us the way, and Gandhi in India showed it could work” (Rowland, “2,500 Here Hail”). Other followers of Gandhian ideas such as Richard Gregg , William Stuart Nelson , and Homer Jack wrote the MIA offering support. On 5 June 1956, the federal district court ruled in Browder v. Gayle that bus segregation was unconstitutional, and in November 1956 the U.S. Supreme Court affirmed Browder v. Gayle and struck down laws requiring segregated seating on public buses. The court’s decision came the same day that King and the MIA were in circuit court challenging an injunction against the MIA carpools. Resolved not to end the boycott until the order to desegregate the buses actually arrived in Montgomery, the MIA operated without the carpool system for a month. The Supreme Court upheld the lower court’s ruling, and on 20 December 1956 King called for the end of the boycott; the community agreed. The next morning, he boarded an integrated bus with Ralph Abernathy, E. D. Nixon, and Glenn Smiley. King said of the bus boycott: “We came to see that, in the long run, it is more honorable to walk in dignity than ride in humiliation. So … we decided to substitute tired feet for tired souls, and walk the streets of Montgomery” ( Papers 3:486 ). King’s role in the bus boycott garnered international attention, and the MIA’s tactics of combining mass nonviolent protest with Christian ethics became the model for challenging segregation in the South. Joe Azbell, “Blast Rocks Residence of Bus Boycott Leader,” 31 January 1956, in Papers 3:114–115 . Baker to King, 24 February 1956, in Papers 3:139 . Burks, “Trailblazers: Women in the Montgomery Bus Boycott,” in Women in the Civil Rights Movement , ed. Crawford et al., 1990. “Don’t Ride the Bus,” 2 December 1955, in Papers 3:67 . U. J. Fields, Minutes of Montgomery Improvement Association Founding Meeting, 5 December 1955, in Papers 3:68–70 . Gregg to King, 2 April 1956, in Papers 3:211–212 . Indictment, State of Alabama v. M. L. King, Jr., et al. , 21 February 1956, in Papers 3:132–133 . Introduction, in Papers 3:3–7 ; 17–21 ; 29 . Jack to King, 16 March 1956, in Papers 3:178–179 . Judgment and Sentence of the Court, State of Alabama v. M. L. King, Jr. , 22 March 1956, in Papers 3:197 . King, Statement on Ending the Bus Boycott, 20 December 1956, in Papers 3:485–487 . King, Stride Toward Freedom , 1958. King, Testimony in State of Alabama v. M. L. King, Jr. , 22 March 1956, in Papers 3:183–196 . King to the National City Lines, Inc., 8 December 1955, in Papers 3:80–81 . “A Letter from the Women’s Political Council to the Mayor of Montgomery, Alabama,” in Eyes on the Prize , ed. Carson et al., 1991. MIA Mass Meeting at Holt Street Baptist Church, 5 December 1955, in Papers 3:71–79 . Nelson to King, 21 March 1956, in Papers 3:182–183 . Parks and Haskins, Rosa Parks , 1992. Robinson, Montgomery Bus Boycott , 1987. Stanley Rowland, Jr., “2,500 Here Hail Boycott Leader,” New York Times , 26 March 1956. Rustin to King, 23 December 1956, in Papers 3:491–494 . Rosa Parks, Martin Luther King Jr., and the Montgomery Bus Boycott Written by: Stewart Burns, Union Institute & University By the end of this section, you will:. - Explain how and why various groups responded to calls for the expansion of civil rights from 1960 to 1980 Use this narrative with the Jackie Robinson Narrative, The Little Rock Nine Narrative, The Murder of Emmett Till Narrative, and the Rosa Parks’s Account of the Montgomery Bus Boycott (Radio Interview), April 1956 Primary Source to discuss the rise of the African American civil rights movement pre-1960. Rosa Parks launched the Montgomery bus boycott when she refused to give up her bus seat to a white man. The boycott proved to be one of the pivotal moments of the emerging civil rights movement. For 13 months, starting in December 1955, the black citizens of Montgomery protested nonviolently with the goal of desegregating the city’s public buses. By November 1956, the Supreme Court had banned the segregated transportation legalized in 1896 by the Plessy v. Ferguson ruling. Montgomery’s boycott was not entirely spontaneous, and Rosa Parks and other activists had prepared to challenge segregation long in advance. On December 1, 1955, a tired Rosa L. Parks left the department store where she worked as a tailor’s assistant and boarded a crowded city bus for the ride home. She sat down between the “whites only” section in the front and the “colored” section in the back. Black riders were to sit in this middle area only if the back was filled. When a white man boarded, the bus driver ordered four African American passengers to stand so the white passenger could sit. The other riders reluctantly got up, but Parks refused. She knew she was not violating the segregation law, because there were no vacant seats. The police nevertheless arrived and took her to jail. Parks had not planned her protest, but she was a civil rights activist well trained in civil disobedience so she remained calm and resolute. Other African American women had challenged the community’s segregation statutes in the past several months, but her cup of forbearance had run over. “I had almost a life history of being rebellious against being mistreated because of my color,” Parks recalled. On this occasion more than others “I felt that I was not being treated right and that I had a right to retain the seat that I had taken.” She was fighting for her natural and constitutional rights when she protested against the treatment that stripped away her dignity. “When I had been pushed as far as I could stand to be pushed. I had decided that I would have to know once and for all what rights I had as a human being and a citizen.” She was attempting to “bring about freedom from this kind of thing.” Perhaps the incident was not as spontaneous as it appeared, however. Parks was an active participant in the civil rights movement for several years and had served as secretary of both the Montgomery and Alabama state NAACP. She founded the youth council of the local NAACP and trained the young people in civil rights activism. She had even discussed challenging the segregated bus system with the youth council before 15-year-old Claudette Colvin was arrested for refusing to give up her seat the previous March. Ill treatment on segregated city buses had festered into the most acute problem in the black community in Montgomery. Segregated buses were part of a system that inflicted Jim Crow segregation upon African Americans. In 1949, a group of professional black women and men had formed the Women’s Political Council (WPC) of Montgomery. They were dedicated to organizing African Americans to demand equality and civil rights by seeking to change Jim Crow segregation in public transportation. In May 1954, WPC president Jo Ann Robinson informed the mayor that African Americans in the city were considering launching a boycott. The WPC converted abuse on buses into a glaring public issue, and the group collaborated with the NAACP and other civil rights organizations to challenge segregation there. Parks was bailed out of jail by local NAACP leader, E. D. Nixon, who was accompanied by two liberal whites, attorney Clifford Durr and his wife Virginia Foster Durr, leader of the anti-segregation Southern Conference Educational Fund (SCEF). Virginia Durr had become close friends with Parks. In fact, she helped fund Parks’s attendance at a workshop for two weeks on desegregating schools only a few months before. The Durrs and Nixon had worked with Parks to plot a strategy for challenging the constitutionality of segregation on Montgomery buses. After Parks’s arrest, Robinson agreed with them and thought the time was ripe for the planned boycott. She worked with two of her students, staying up all night mimeographing flyers announcing a one-day bus boycott for Monday, December 5. Because of ministers’ leadership in the vibrant African American churches in the city, Nixon called on the ministers to win their support for the boycott. Reverend Martin Luther King Jr., a young and relatively unknown minister of the middle-class Dexter Avenue Baptist Church, was unsure about the timing but offered assistance. Baptist minister Ralph Abernathy eagerly supported the boycott. On December 5, African Americans boycotted the buses. They walked to work, carpooled, and took taxis as a measure of solidarity. Parks was convicted of violating the segregation law and charged a $14 fine. Because of the success of the boycott, black leaders formed the Montgomery Improvement Association (MIA) to continue the protest and surprisingly elected Reverend King president. Rosa Parks, with Martin Luther King Jr. in the background, is pictured here soon after the Montgomery Bus Boycott. After earning his PhD at Boston University’s School of Theology, King had returned to the Deep South with his new bride, Coretta Scott, a college-educated, rural Alabama native. On the night of December 5, 1955, the 26-year-old pastor presided over the first MIA mass meeting, in a supercharged atmosphere of black spirituality. Participants felt the Holy Spirit was alive that night with a palpable power that transfixed. When King rose to speak, unscripted words burst out of him, a Lincoln-like synthesis of the rational and emotional, the secular and sacred. The congregants must protest, he said, because both their divinity and their democracy required it. They would be honored by future generations for their moral courage. The participants wanted to continue the protest until their demands for fairer treatment were met as well as establishment of a first-come, first-served seating system that kept reserved sections. White leaders predicted that the boycott would soon come to an end because blacks would lose enthusiasm and accept the status quo. When blacks persisted, some of the whites in the community formed the White Citizens’ Council, an opposition movement committed to preserving white supremacy. The bus boycott continued and was supported by almost all of Montgomery’s 42,000 black residents. The women of the MIA created a complex carpool system that got black citizens to work and school. By late December, city commissioners were concerned about the effects of the boycott on business and initiated talks to try to resolve the dispute. The bus company (which now supported integrated seating) feared it might go bankrupt and urged compromise. However, the commissioners refused to grant any concessions and the negotiations broke down over the next few weeks. The commissioners adopted a “get tough” policy when it became clear that the boycott would continue. Police harassed carpool drivers. They arrested and jailed King on a petty speeding charge when he was helping out one day. Angry whites tried to terrorize him and bombed his house with his wife and infant daughter inside, but no one was injured. Drawing from the Sermon on the Mount, the pastor persuaded an angry crowd to put their guns away and go home, preventing a bloody riot. Nixon’s home and Abernathy’s church were also bombed. On January 30, MIA leaders challenged the constitutionality of bus segregation because the city refused their moderate demands. Civil rights attorney Fred Gray knew that a state case would be unproductive and filed a federal lawsuit. Meanwhile, city leaders went on the offensive and indicted nearly 100 boycott leaders, including King, on conspiracy charges. King’s trial and conviction in March 1956 elicited negative national publicity for the city on television and in newspapers. Sympathetic observers sent funds to Montgomery to support the movement. In June 1956, the Montgomery federal court ruled in Browder v. Gayle that Alabama’s bus segregation laws violated the Fourteenth Amendment’s guarantee of equality and were unconstitutional. The Supreme Court upheld the decision in November. In the wake of the court victories, MIA members voted to end the boycott. Black citizens triumphantly rode desegregated Montgomery’s buses on December 21, 1956. A diagram of the Montgomery bus where Rosa Parks refused to give up her seat was used in court to ultimately strike down segregation on the city’s buses. The Montgomery bus boycott made King a national civil rights leader and charismatic symbol of black equality. Other black ministers and activists like Abernathy, Rev. Fred Shuttlesworth, Bayard Rustin, and Ella Baker also became prominent figures in the civil rights movement. The ministers formed the Southern Christian Leadership Conference (SCLC) to protest white supremacy and work for voting rights throughout the South, testifying to the importance of black churches and ministers as a vital element of the civil rights movement. The Montgomery bus boycott paved the way for the civil rights movement to demand freedom and equality for African Americans and transformed American politics, culture, and society by helping create the strategies, support networks, leadership, vision, and spiritual direction of the movement. It demonstrated that ordinary African American citizens could band together at the local level to demand and win in their struggle for equal rights and dignity. The Montgomery experience laid the foundations for the next decade of a nonviolent direct-action movement for equal civil rights for African Americans. 1. All of the following are true of Rosa Parks except - she served as secretary of the Montgomery NAACP - she trained young people in civil rights activism - she unintentionally challenged the bus segregation laws of Montgomery - she was well-trained in civil disobedience 2. The initial demand of those who boycotted the Montgomery Bus System was for the city to - hire more black bus drivers in Montgomery - arrest abusive bus drivers - remove the city commissioners - modify Jim Crow laws in public transportation 3. The Montgomery Improvement Association was formed in 1955 primarily to - bring a quick end to the bus boycott - maintain segregationist policies on public buses - provide carpool assistance to the boycotters - organize the bus protest 4. As a result of the successful Montgomery Bus Boycott, Martin Luther King Jr. was - elected mayor of Montgomery - targeted as a terrorist and held in jail for the duration of the boycott - recognized as a new national voice for African American civil rights - made head pastor of his church 5. The Federal court case Browder v. Gayle established that - the principles in Brown v. Board of Education were also relevant in the Montgomery Bus Boycott - the Montgomery bus segregation laws were a violation of the constitutional guarantee of equality - the principles of Plessy v. Ferguson were similar to those in the Montgomery bus company - the conviction of Martin Luther King Jr. was unconstitutional 6. All the following resulted from the Montgomery bus boycott except - the formation of the Southern Christian Leadership Conference (SCLC) - the emergence of Martin Luther King Jr. as a national leader - the immediate end of Jim Crow laws in Alabama - negative national publicity for the city of Montgomery Free Response Questions - Explain how the Montgomery Bus Boycott affected the civil rights movement. - Describe how the Montgomery Bus Boycott propelled Martin Luther King Jr. to national notice. AP Practice Questions Rosa Parks being fingerprinted by Deputy Sheriff D. H. Lackey after her arrest in December 1955. 1. Which of the following had the most immediate impact on events in the photograph? - The integration of the U.S. military - The Supreme Court decision in Plessy v. Ferguson - The Supreme Court decision in Brown v. Board of Education - The integration of Little Rock (AR) Central High School 2. The actions leading to the provided photograph were similar to those associated with - the labor movement in the 1920s - the women’s suffrage movement in the early twentieth century - the work of abolitionists in the 1850s - the rise of the Ku Klux Klan in the 1920s 3. The situation depicted in the provided photograph contributed most directly to the - economic development of the South - growth of the suburbs - growth of the civil right movement - evolution of the anti-war movement Burns, Steward, ed. Daybreak of Freedom: The Montgomery Bus Boycott. Chapel Hill, NC: University of North Carolina Press, 1997. Garrow, David J, ed. Montgomery Bus Boycott and the Women Who Started It: The Memoir of Jo Ann Gibson Robinson . Nashville, TN: University of Tennessee Press, 1987. Greenlee, Marcia M. “Interview with Rosa McCauley Parks.” August 22-23, 1978, Detroit. Cambridge, MA: Black Women Oral History Project, Harvard University. https://iiif.lib.harvard.edu/manifests/view/drs:45175350$14i Branch, Taylor. Parting the Waters: America in the King Years 1954-63 . New York: Simon and Schuster, 1988. Brinkley, Douglas. Rosa Parks . New York: Penguin, 2000. Rosa Parks Museum, Montgomery, AL. www.troy.edu/rosaparks Williams, Juan. Eyes on the Prize: America’s Civil Rights Years, 1954-1965 . New York: Penguin, 2013. Life, Liberty, and the Pursuit of Happiness In our resource history is presented through a series of narratives, primary sources, and point-counterpoint debates that invites students to participate in the ongoing conversation about the American experiment. Montgomery bus boycott. The Montgomery Bus Boycott was one of the first successful mass actions of the African-American Civil Rights Movement. The boycott is often understood in overly-simplified terms - the result of Rosa Parks refusing to give up her seat. In this lesson, students build a more complex understanding of the causes and context of the boycott as they analyze four historical documents. Image: Photo of Black residents walking during the Montgomery Bus Boycott in 1955. From BlackPast.org . Civil Rights Movement in Context - Skip to global NPS navigation - Skip to the main content - Skip to the footer section The montgomery bus boycott. Years before the boycott, Dexter Avenue minister Vernon Johns sat down in the "whites-only" section of a city bus. When the driver ordered him off the bus, Johns urged other passengers to join him. On March 2, 1955, a black teenager named Claudette Colvin dared to defy bus segregation laws and was forcibly removed from another Montgomery bus. Nine months later, Rosa Parks - a 42-year-old seamstress and NAACP member- wanted a guaranteed seat on the bus for her ride home after working as a seamstress in a Montgomery department store. After work, she saw a crowded bus stop. Knowing that she would not be able to sit, Parks went to a local drugstore to buy an electric heating pad. After shopping, Parks entered the less crowded Cleveland Avenue bus and was able to find an open seat in the 'colored' section of the bus for her ride home. Despite having segregated seating arrangements on public buses, it was routine in Montgomery for bus drivers to force African Americans out of their seats for a white passenger. There was very little African Americans could do to stop the practice because bus drivers in Montgomery had the legal ability to arrest passengers for refusing to obey their orders. After a few stops on Parks’ ride home, the white seating section of the bus became full. The driver demanded that Parks give up her seat on the bus so a white passenger could sit down. Parks refused to surrender her seat and was arrested for violating the bus driver’s orders. Organizing the Boycott Montgomery's black citizens reacted decisively to the incident. By December 2, schoolteacher Jo Ann Robinson had mimeographed and delivered 50,000 protest leaflets around town. E.D. Nixon, a local labor leader, organized a December 4 meeting at Dexter Avenue Baptist Church , where local black leaders formed the Montgomery Improvement Association (MIA)to spearhead a boycott and negotiate with the bus company. Over 70% of the cities bus patrons were African American and the one-day boycott was 90% effective. The MIA elected as their president a new but charismatic preacher, Martin Luther King Jr. Under his leadership, the boycott continued with astonishing success. The MIA established a carpool for African Americans. Over 200 people volunteered their car for a car pool and roughly 100 pickup stations operated within the city. To help fund the car pool, the MIA held mass gatherings at various African American churches where donations were collected and members heard news about the success of the boycott. Roots in Brown v Board Fred Gray, member and lawyer of the MIA, organized a legal challenge to the city ordinances requiring segregation on Montgomery buses. Before 1954, the Plessy v. Ferguson decision ruled that segregation was constitutional as long as it was equal. Yet, the 1954 Brown v. Board of Education U.S. Supreme Court decision outlawed segregation in public schools. Therefore, it opened the door to challenge segregation in other areas as well, such as city busing. Gray gathered Aurelia Browder, Susie McDonald, Claudette Colvin and Mary Louise Smith to challenge the constitutionality of the city busing laws. All four of the women had been previously mistreated on the city buses because of their race. The case took the name Browder v. Gayle. Gray argued their 14th Amendment right to equal protection of the law was violated, the same argument made in the Brown v. Board of Education case. On June 5, 1956, a three-judge U.S. District Court ruled 2-1 that segregation on public buses was unconstitutional. The majority cited Brown v. Board of Education as a legal precedent for desegregation and concluded, “In fact, we think that Plessy v. Ferguson has been impliedly, though not explicitly, overruled,…there is now no rational basis upon which the separate but equal doctrine can be validly applied to public carrier transportation...” The city of Montgomery appealed the U.S. District Court decision to the U.S. Supreme Court and continued to practice segregation on city busing. For nearly a year, buses were virtually empty in Montgomery. Boycott supporters walked to work--as many as eight miles a day--or they used a sophisticated system of carpools with volunteer drivers and dispatchers. Some took station-wagon "rolling taxis" donated by local churches. Montgomery City Lines lost between 30,000 and 40,000 bus fares each day during the boycott. The bus company that operated the city busing had suffered financially from the seven month long boycott and the city became desperate to end the boycott. Local police began to harass King and other MIA leaders. Car pool drivers were arrested and taken to court for petty traffic violations. Despite all the harassment, the boycott remained over 90% successful. African Americans took pride in the inconveniences caused by limited transportation. One elderly African American woman replied that, “My soul has been tired for a long time. Now my feet are tired, and my soul is resting.” The promise of equality declared in Brown v. Board of Education for Montgomery African Americans helped motivate them to continue the boycott. The company reluctantly desegregated its buses only after November 13, 1956, when the Supreme Court ruled Alabama's bus segregation laws unconstitutional. Beginning a Movement The Montgomery bus boycott began the modern Civil Rights Movement and established Martin Luther King Jr. as its leader. King instituted the practice of massive non-violent civil disobedience to injustice, which he learned from studying Gandhi. Montgomery, Alabama became the model of massive non-violent civil disobedience that was practiced in such places as Birmingham, Selma, and Memphis. Even though the Civil Rights Movement was a social and political movement, it was influenced by the legal foundation established from Brown v. Board of Education. Brown overturned the long held practice of the “separate but equal” doctrine established by Plessy. From then on, any legal challenge on segregation cited Brown as a precedent for desegregation. Without Brown, it is impossible to know what would have happened in Montgomery during the boycott. The boycott would have been difficult to continue because the city would have won its challenge to shut down the car pool. Without the car pool and without any legal precedent to end segregation, the legal process could have lasted years. Those involved in the boycott might have lost hope and given up with the lack of progress. However, the precedent established by Brown gave boycotters hope that a legal challenge would successfully end segregation on city buses. Therefore, the influence of Brown on the Montgomery Bus Boycott and the Civil Rights Movement is undeniable. King described Brown’s influence as, “To all men of good will, this decision came as a joyous daybreak to end the long night of human captivity. It came as a great beacon light of hope to millions of colored people throughout the world who had had a dim vision of the promised land of freedom and justice . . . this decision came as a legal and sociological deathblow to an evil that had occupied the throne of American life for several decades.” You Might Also Like - selma to montgomery national historic trail - montgomery bus boycott - civil rights Selma To Montgomery National Historic Trail Last updated: September 21, 2022 Primary Sources: Civil Rights in America - Events: Montgomery Bus Boycott (1955) - Alcatraz Occupation (1969) - Brown v. Board of Ed. (1954) - Central High (Little Rock, AK) - Chicago Race Riot (1919) - Dakota Access Pipeline/Standing Rock - Emmett Tilll Murder (1955) - ERA: Equal Rights Amendment - Freedom Riders (1961) - Freedom Summer (1964) - Japanese Internment (1942) - Loving v. Virginia (1967) - March on Washington (1963) - March on Washington Movement (1940s) - Memphis Sanitation Workers Strike (1968) - Mendez v. Westminster School District (1947) - Miss America Protests (1968) - "Mississippi Burning" Case (1964) - Montgomery Bus Boycott (1955) - Osage Indian Murders (1920s) - 16th St. Church Bombing (1963) - Selma to Montgomery March (1965) - Scottsboro (1931) - Sleepy Lagoon & Zoot Suit Riots (1943) - Slavery & Abolition This link opens in a new window - The Southern Manifesto (1956) - Suffrage - Women - Tulsa Race Massacre (1921) - University of Alabama (1963) - University of Mississippi (1962) - Wounded Knee Occupation (1973) Online Sources: Montgomery Bus Boycott (1955) - An Act of Courage, The Arrest Records of Rosa Parks - An African-American Woman Describes Segregated Buses in Montgomery, Alabama more... less... "During the Montgomery bus boycott, researchers from Fisk University in Nashville, Tennessee visited Montgomery to learn more about the boycott and document it. Researcher Willie Lee interviewed an African-American woman who worked as a domestic, who described how black riders had been treated on the buses. She was interviewed at one of the several car pool stations established to transport the boycotters." - African-American Women Threaten a Bus Boycott in Montgomery more... less... "This letter from the Women's Political Council to the Mayor of Montgomery, Alabama, threatens a bus boycott by the city's African Americans if demands for fair treatment are not met." - Bayard Rustin Explains Car Pools in the Montgomery Bus Boycott more... less... "African-American civil rights activist Bayard Rustin advised Rev. Martin Luther King, Jr., on the Montgomery bus boycott. In this excerpt from his diary, Rustin describes how the city's black residents found ways to get to and from work without using the buses." - Browder v. Gayle, 142 F. Supp. 707 (M.D. Ala. 1956) - Documents From the Montgomery Bus Boycott 1955-1956 (CRMV) - Interview with Rosa Parks (video) more... less... "Interview with Rosa Parks conducted for Eyes on the Prize I. Discussion centers on life in Montgomery, her decision to refuse to comply with segregation on the bus line, and the bus boycott." - INVESTIGATE: Why did the boycott of Montgomery's buses succeed? more... less... Provides a selection of related primary sources. - Local Activists Call for a Bus Boycott in Montgomery more... less... "This leaflet, produced by Jo Ann Robinson and others in response to Rosa Parks' arrest on December 1, 1955, called for all African Americans to stay off city buses on Monday, December 5. Robinson was president of the Women's Political Council, an organization of African-American professional women who worked for greater political influence from the Black community. She was later arrested for her role in the boycott." - Montgomery Bus Boycott (1955-1956) [King Encyclopedia] - Montgomery Bus Boycott (Civil Rights Digital Library) - The Montgomery Bus Boycott: They Changed the World more... less... A website from the Montgomery Advertiser newspaper that includes photos, interviews, etc. - Montgomery Improvement Association Advises on Integrated Bus Patronage more... less... "The U.S. Supreme Court decision that ended the Montgomery bus boycott introduced integrated public transportation to the city in December 1956. Anticipating mixed reactions to the boycott's success, the Montgomery Improvement Association distributed this pamphlet as an advisory guide to passengers reboarding the buses after a year of protest." - The Other Rosa Parks: Now 73, Claudette Colvin Was First to Refuse Giving Up Seat on Montgomery Bus - The Power of African American Women Disc 1 more... less... Part 1: "Commentary of a Black Souther Busrider" by Rosa Parks (April 1956 interview) Part 2: "We Want To Be Free" by Dorothy Dandridge (speaking at a Freedom Rally at Wrigley Field, 26 May 1963) Part 3: "The Negro In American Culture" by Lorraine Hansberry (From a panel on Black perceptions of the American setting in art. WBAI, 10 january 1961) - The Power of African American Women Disc 8 more... less... "The Power Of African-American Women" Four part program which examines the work and impact of several African-American women: Sweet Honey in the Rock, Shirley Chisholm, Fannie Lou Hamer, and Rosa Parks. - Rare 1956 Interview with Parks During the Montgomery Bus Boycott more... less... "Rosa Parks, interviewed in April 1956 by Pacifica radio station KPFA. The interview comes from the “”:In Pacifica Radio Archives." - Reverend Abernathy Recalls the Montgomery Improvement Association's First Meeting more... less... "In the following excerpt, Reverend Ralph Abernathy remembers the first mass meeting of the Montgomery Improvement Association (MIA) at a local Baptist church on the first day of the boycott. After this, the MIA held regular weekly meetings until the boycott ended." - Rosa Parks Papers (Library of Congress) more... less... "The papers of Rosa Parks (1913-2005) span the years 1866-2006, with the bulk of the material dating from 1955 to 2000. The collection contains approximately 7,500 items in the Manuscript Division, as well as 2,500 photographs in the Prints and Photographs Division. The collection documents many aspects of Parks's private life and public activism on behalf of civil rights for African Americans." Library of Congress Book Sources: Montgomery Bus Boycott (1955) - A selection of books/e-books available in Trible Library. - Click the title for location and availability information. Search for More - Suggested terms to look for include - diary, diaries, letters, papers, documents, documentary or correspondence. - Combine these these terms with the event or person you are researching. (example: civil war diary) - Also search by subject for specific people and events, then scan the titles for those keywords or others such as memoirs, autobiography, report, or personal narratives. - << Previous: "Mississippi Burning" Case (1964) - Next: Osage Indian Murders (1920s) >> - Last Updated: Oct 24, 2023 2:35 PM - URL: https://cnu.libguides.com/civilrightsevents BlackPast is dedicated to providing a global audience with reliable and accurate information on the history of African America and of people of African ancestry around the world. We aim to promote greater understanding through this knowledge to generate constructive change in our society. (1955) martin luther king jr., “the montgomery bus boycott”. The Montgomery Bus Boycott speech reprinted below is one of the first major addresses of Dr. Martin Luther King. Dr. King spoke to nearly 5,000 people at the Holt Street Baptist Church in Montgomery on December 5, 1955, just four days after Mrs. Rosa Parks was arrested for refusing to relinquish her seat on a Montgomery city bus. That arrest led to the first major civil rights campaign in the Deep South in half a century. In this speech King urges the audience which has just voted to boycott the buses to continue that campaign until they achieve their goal of ending the humiliation and intimation of black citizens there and elsewhere in Montgomery or to use his words, “..to gain justice on the buses in the city.” My FRIENDS, we are certainly very happy to see each of you out this evening. We are here this evening for serious business. We are here in a general sense because first and foremost we are American citizens and we are determined to apply our citizenship to the fullness of its meaning. We are here also because of our love for democracy, because of our deep-seated belief that democracy transformed from thin paper to thick action is the greatest form of government on earth. But we are here in a specific sense, because of the bus situation in Montgomery. We are here because we are determined to get the situation corrected. This situation is not at all new. The problem has existed over endless years. For many years now Negroes in Montgomery and so many other areas have been inflicted with the paralysis of crippling fears on buses in our community. On so many occasions, Negroes have been intimidated and humiliated and impressed-oppressed-because of the sheer fact that they were Negroes. I don’t have time this evening to go into the history of these numerous cases. Many of them now are lost in the thick fog of oblivion but at least one stands before us now with glaring dimensions. Just the other day, just last Thursday to be exact, one of the finest citizens in Montgomery not one of the finest Negro citizens, but one of the finest citizens in Montgomery-was taken from a bus and carried to jail and because she refused to get up to give her seat to a white person. Now the press would have us believe that she refused to leave a reserved section for Negroes but I want you to know this evening that there is no reserved section. The law has never been clarified at that point. Now I think I speak with, with legal authority-not that I have any legal authority, but I think I speak with legal authority behind me -that the law, the ordinance, the city ordinance has never been totally clarified. Mrs. Rosa Parks is a fine person. And, since it had to happen, I’m happy that it happened to a person like Mrs. Parks, for nobody can doubt the boundless outreach of her integrity. Nobody can doubt the height of her character nobody can doubt the depth of her Christian commitment and devotion to the teachings of Jesus. And I’m happy since it had to happen, it happened to a person that nobody can call a disturbing factor in the community. Mrs. Parks is a fine Christian person, unassuming, and yet there is integrity and character there. And just because she refused to get up, she was arrested. And you know, my friends, there comes a time when people get tired of being trampled over by the iron feet of oppression. There comes a time, my friends, when people get tired of being plunged across the abyss of humiliation, where they experience the bleakness of nagging despair. There comes a time when people get tired of being pushed out of the glittering sunlight of life’s July and left standing amid the piercing chill of an alpine November. There comes a time. We are here, we are here this evening because we’re tired now. And I want to say that we are not here advocating violence. We have never done that. I want it to be known throughout Montgomery and throughout this nation that we are Christian people. We believe in the Christian religion. We believe in the teachings of Jesus. The only weapon that we have in our hands this evening is the weapon of protest. That’s all. And certainly, certainly, this is the glory of America, with all of its faults. This is the glory of our democracy. If we were incarcerated behind the iron curtains of a Communistic nation we couldn’t do this. If we were dropped in the dungeon of a totalitarian regime we couldn’t do this. But the great glory of American democracy is the right to protest for right. My friends, don’t let anybody make us feel that we are to be compared in our actions with the Ku Klux Klan or with the White Citizens Council. There will be no crosses burned at any bus stops in Montgomery. There will be no white persons pulled out of their homes and taken out on some distant road and lynched for not cooperating. There will be nobody amid, among us who will stand up and defy the Constitution of this nation. We only assemble here because of our desire to see right exist. My friends, I want it to be known that we’re going to work with grim and bold determination to gain justice on the buses in this city. And we are not wrong, we are not wrong in what we are doing. If we are wrong, the Supreme Court of this nation is wrong. If we are wrong, the Constitution of the United States is wrong. If we are wrong, God Almighty is wrong. If we are wrong, Jesus of Nazareth was merely a utopian dreamer that never came down to earth. If we are wrong, justice is a lie. Love has no meaning. And we are determined here in Montgomery to work and fight until justice runs down like water, and righteousness like a mighty stream. I want to say that in all of our actions we must stick together. Unity is the great need of the hour, and if we are united we can get many of the things that we not only desire but which we justly deserve. And don’t let anybody frighten you. We are not afraid of what we are doing because we are doing it within the law. There is never a time in our American democracy that we must ever think we’re wrong when we protest. We reserve that right. When labor all over this nation came to see that it would be trampled over by capitalistic power, it was nothing wrong with labor getting together and organizing and protesting for its rights. We, the disinherited of this land, we who have been oppressed so long, are tired of going through the long night of captivity. And now we are reaching out for the daybreak of freedom and justice and equality. May I say to you my friends, as I come to a close, and just giving some idea of why we are assembled here, that we must keep-and I want to stress this, in all of our doings, in all of our deliberations here this evening and all of the week and while—whatever we do, we must keep God in the forefront. Let us be Christian in all of our actions. But I want to tell you this evening that it is not enough for us to talk about love, love is one of the pivotal points of the Christian face, faith. There is another side called justice. And justice is really love in calculation. Justice is love correcting that which revolts against love. The Almighty God himself is not the only, not the, not the God just standing out saying through Hosea, “I love you, Israel.” He’s also the God that stands up before the nations and said: “Be still and know that I’m God, that if you don’t obey me I will break the backbone of your power and slap you out of the orbits of your international and national relationships.” Standing beside love is always justice, and we are only using the tools of justice. Not only are we using the tools of persuasion, but we’ve come to see that we’ve got to use the tools of coercion. Not only is this thing a process of education, but it is also a process of legislation. As we stand and sit here this evening and as we prepare ourselves for what lies ahead, let us go out with a grim and bold determination that we are going to stick together. We are going to work together. Right here in Montgomery, when the history books are written in the future somebody will have to say, “There lived a race of people a black people, ‘fleecy locks and black complexion’, a people who had the moral courage to stand up for their rights. And thereby they injected a new meaning into the veins of history and of civilization.” And we’re gonna do that. God grant that we will do it before it is too late. As we proceed with our program let us think of these things. But just before leaving I want to say this. I want to urge you. You have voted [for this boycott], and you have done it with a great deal of enthusiasm, and I want to express my appreciation to you, on behalf of everybody here. Now let us go out to stick together and stay with this thing until the end. Now it means sacrificing, yes, it means sacrificing at points. But there are some things that we’ve got to learn to sacrifice for. And we’ve got to come to the point that we are determined not to accept a lot of things that we have been accepting in the past. So I’m urging you now. We have the facilities for you to get to your jobs, and we are putting, we have the cabs there at your service. Automobiles will be at your service, and don’t be afraid to use up any of the gas. If you have it, if you are fortunate enough to have a little money, use it for a good cause. Now my automobile is gonna be in it, it has been in it, and I’m not concerned about how much gas I’m gonna use. I want to see this thing work. And we will not be content until oppression is wiped out of Montgomery, and really out of America. We won’t be content until that is done. We are merely insisting on the dignity and worth of every human personality. And I don’t stand here, I’m not arguing for any selfish person. I’ve never been on a bus in Montgomery. But I would be less than a Christian if I stood back and said, because I don’t ride the bus, I don’t have to ride a bus, that it doesn’t concern me. I will not be content. I can hear a voice saying, “If you do it unto the least of these, my brother, you do it unto me.” And I won’t rest; I will face intimidation, and everything else, along with these other stalwart fighters for democracy and for citizenship. We don’t mind it, so long as justice comes out of it. And I’ve come to see now that as we struggle for our rights, maybe some of them will have to die. But somebody said, if a man doesn’t have something that he’ll die for, he isn’t fit to live. Do you find this information helpful? A small donation would help us keep this available to all. Forego a bottle of soda and donate its cost to us for the information you just learned, and feel good about helping to make it available to everyone. BlackPast.org is a 501(c)(3) non-profit and our EIN is 26-1625373. Your donation is fully tax-deductible. Cite this entry in APA format: Source of the author's information:. Josh Gottheimer ed., Ripples of Hope Great American Civil Rights Speeches (New York: Basic Civitas Books, 2003). Home — Essay Samples — Social Issues — Social Movements — Montgomery Bus Boycott Essays on Montgomery Bus Boycott Rosa parks and black history month, how the montgomery bus boycott impacted the civil rights of the african-american, made-to-order essay as fast as you need it. Each essay is customized to cater to your unique preferences + experts online Analyzing The Efficacy of The Bus Boycott in Montgomery, United States Segregation of bus passengers and rosa parks, the montgomery bus boycott – the start of the fight for freedom, the effectiveness of boycotting as a way to affect societal issues, let us write you an essay from scratch. - 450+ experts on 30 subjects ready to help - Custom essay delivered in as few as 3 hours Causes and Effects of The Montgomery Bus Boycott The role of black churches and community during the montgomery bus boycott, a study of the background of the montgomery bus boycott by bernard law as a way of resisting apartheid and racial bias in the united states, rosa parks and her role in the civil rights movement, get a personalized essay in under 3 hours. Expert-written essays crafted with your exact needs in mind An Individual's Power to Change The Society: American Activists Rosa parks: mother of the modern-day civil rights movement, relevant topics. - Civil Disobedience - Me Too Movement - Emmett Till - Women's Rights - Pro Life (Abortion) - I Have a Dream - Gun Violence - Gun Control No need to pay just yet! - Instructions Followed To The Letter - Deadlines Met At Every Stage - Unique And Plagiarism Free
<urn:uuid:1244b662-5b69-40d0-a07e-c66366b30fd7>
CC-MAIN-2023-50
https://charunivedita.online/essay-analysis/montgomery-bus-boycott-essay-pdf
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.954456
13,673
4.0625
4
Expository Essay Examples Free Expository Essay Examples For Students Published on: Aug 14, 2018 Last updated on: Nov 15, 2023 People also read Complete Guide to Expository Essays: Writing Help and Topics Interesting Expository Essay Topics For Your Next Paper How to Write an Expository Essay Outline Like a Pro Types of Expository Writing - Definition and Examples Ultimate Guide to Writing an Expository Essay About a Person Learn to Write an Expository Essay About Yourself Learn the Basics of Crafting an Expository Essay about a Book Learn to Write Expository Essay About Mental Health - Examples & Tips How to Write an Expository Essay about Bullying: A Guide Expository Essay About Dogs: Steps, Examples & Topics A Guide to Writing an Expository Essay about Education Expository Essay About Friendship: A Writing Guide Discover How to Write Expository Essays About Music – A Step-by-Step Guide Share this article Are you a student struggling to understand the intricacies of expository essay writing? Do you find yourself in need of clear guidance and practical examples to master this essential skill? Look no further! In this guide, we'll look into 10+ expository essay examples, providing you with the knowledge you need to start writing. From understanding the fundamentals to dissecting real examples, we've got you covered. Let's get started on this journey! On This Page On This Page --> What is Expository Essay Writing? An expository essay is a form of academic writing that aims to inform, explain, or describe a particular topic to the reader. The primary purpose of an expository essay is to provide a clear presentation of facts, ideas, or concepts, often without the writer's personal bias or opinion. The expository essay is a genre of essay that is similar to a descriptive essay . There are several types of expository writing , including: - Definition essay - Classification essay - Process analysis essay - Cause and effect essay - Problem solution essay - Compare and contrast essay Newspaper articles, journals, and essays that define and explain a particular topic demonstrate expository essay writing. Read the examples and learn to write a good expository essay for your school or college assignment. Paper Due? Why Suffer? That's our Job! Expository Essay Examples While writing an expository essay, you might face difficulties in formatting and logically connecting your information. Below we have presented some amazing examples to help you understand how to write and organize an expository essay. Expository Essay Outline Examples Whenever you write an expository essay, the first thing you should do is craft an outline. The expository essay outline gives shape to your essay and keeps you organized. Here are some good expository essay outline examples that you can follow to outline your essay. Expository Essay Outline Example Expository Essay Outline Template Sample Expository Essay Format Example While writing an essay, you need to follow a proper format to present your information in a logical sequence. The typical 5 paragraph essay consists of 1 introduction, 3 body, and 1 conclusion paragraph. Below we have given expository essay format examples in both APA and MLA format to help you understand the formatting. Check out: Expository Essay Examples APA Format Expository Essay Examples MLA Format Short Expository Essay Examples As we have discussed above, expository essay writing requires you to describe and explain a particular subject in detail. Achieving this level of detail can be quite challenging when working with a limited word count. To illustrate how to effectively convey information within limited words, we have provided a short expository essay example. Short Expository Essay Example Expository Essay Examples for Middle School Here are some informative expository essay examples for middle school students to help you grasp the basics of expository essay writing. Expository Essay Example For Middle School Expository Essay Example Grade 7 Expository Essay Examples 5th Grade Expository Essay Examples 4th Grade Expository Essay Examples for High School Here are some helpful expository essay examples PDFs for high school students. Check out: Expository Essay Examples For High School Expository Essay Examples for College Looking for a college-level expository essay example? Check out the pdf below: Expository Essay Examples For College Expository Essay Examples University Here are some good sample expository essay pdf examples for university students. Expository Essay Example About Life Expository Essay Examples About Covid 19 Informative Expository Essay Example How to Write an Expository Essay - Example While writing an expository essay, you need to follow a proper structure. So that you can easily present your information and evidence in a logical sequence. Here is a step-by-step process of how to write an expository essay: Step 1. Choose an Appropriate Topic - Brainstorm different ideas to select a compelling expository essay topic. Check out our expository essay topics blog for inspiring ideas. - Ensure it has the potential to turn into an informative essay by being able to explain and inform effectively. Step 2. Craft an Engaging Introduction - Begin with a captivating hook statement to grab the reader's attention. - Provide a brief background on the chosen topic to clarify its relevance. - Formulate an informative thesis statement that encapsulates the core idea of your essay. Step 3. Develop the Body Paragraphs - Start each body paragraph with a clear topic sentence , representing the main idea of that particular paragraph. - Support the topic sentence with credible evidence, facts, or examples that bolster your thesis statement. - Ensure a smooth transition between paragraphs for a logical flow of ideas. Step 4. Conclude Effectively - Start the essay conclusion paragraph by reasserting your thesis statement. - Summarize the key points and main arguments presented in the essay. - Encourage the reader with a call to action, prompting them to contemplate or engage further with the topic. Step 5. Proofread and Edit - Proofread your essay for grammatical and spelling mistakes and check if the information is presented in a proper sequence. - Write multiple drafts and edit as needed to ensure your essay is free of errors. Tough Essay Due? Hire Tough Writers! In conclusion, these expository essay examples offer a valuable resource for students. They serve as effective learning tools, providing insight into the art of expository writing. By studying these examples, students can improve their writing skills, and gain a deeper understanding of essay structure. Need assistance with expository essay writing? Finding a website to write my essay ? MyPerfectWords.com is a legitimate essay writing service that provides top-notch essays at reasonable prices. Our expository essay writing service will craft 100% original and non-plagiarized essays within a short deadline. Stop being worried and place your order now to hire the best essay writers! Frequently Asked Questions What are 3 examples of expository. The three main examples of expository are; - Scientific reports - Magazine articles - Academic essays What are the 4 characteristics of expository text? The main characteristics of expository text are; - Organization of the text What is the first important step in writing an expository essay? To write an expository essay, you must first decide how to structure your work. An expository essay generally contains an introduction, followed by three body paragraphs and a conclusion. Caleb S. (Literature, Marketing) Caleb S. has been providing writing services for over five years and has a Masters degree from Oxford University. He is an expert in his craft and takes great pride in helping students achieve their academic goals. Caleb is a dedicated professional who always puts his clients first. Paper Due? Why Suffer? That’s our Job! We value your privacy Website Data Collection Are you sure you want to cancel? Your preferences have not been saved. Get 50% OFF Yearly and Lifetime Subscriptions this Black Friday - Features for Creative Writers - Features for Work - Features for Higher Education - Features for Teachers - Features for Non-Native Speakers - Learn Blog Grammar Guide Community Academy FAQ - Grammar Guide Expository Writing: Definition and Examples Table of Contents What is expository writing, what is an expository paragraph, expository writing examples, how prowritingaid can help you with expository composition. One of the most common types of writing is expository writing. Whether you’re a student taking an English class or a professional trying to communicate to others in your field, you’ll need to use expository writing in your day-to-day work. So, what exactly does this term mean? The short answer is that expository writing refers to any writing designed primarily to explain or instruct. Read on to learn the definition of expository writing as well as some examples of what this type of writing can look like. Before we look at examples of expository writing, let’s start with a quick definition of what this term actually means. Expository Writing Definition The term expository writing refers to any writing that’s designed to explain something. We use the word expository to describe any passage of writing that’s supposed to present information and help you understand it in an objective way. Some common examples of expository writing include academic essays, textbooks, instructional guides, and news reports. Good expository writing should be factual, objective, and clear. To better understand what this term means, think about the difference between a scientific article, a short story, and an advertisement. The scientific article is considered expository writing because its primary purpose is to explain a particular topic in more detail. It presents data, analyzes what that data means, and focuses on the facts. On the other hand, the short story isn’t considered expository writing, because its core purpose isn’t to explain or inform—instead, it’s probably trying to entertain you or to take you on a journey. Short stories are narrative writing. Similarly, an advertisement isn’t expository writing because its core purpose isn’t to explain or inform—instead, it’s trying to persuade you to buy what it’s selling. Advertisements are persuasive writing. Here’s a quick rundown of what expository essays should and shouldn’t do. An expository essay should: Teach the reader about a particular topic Focus on the facts Follow a clearly organized structure Present information and details from credible sources An expository essay should not: Try to change the reader’s mind about something Present the author’s personal opinions Include made-up narratives or stories Follow experimental or nonlinear structures An expository paragraph is exactly what it sounds like—a paragraph of expository writing. A well-written expository paragraph should follow a specific format to make it as clear and easy to read as possible. Most expository paragraphs do the following things: Start with a topic sentence, which explains what the paragraph will be about Then, include 3 – 5 body sentences that provide supporting details for the topic sentence Finally, wrap things up with a closing sentence that summarizes what the paragraph has said Writing an expository paragraph is a great way to practice expository writing. That’s because the paragraph follows the same structure as a more complex expository essay, just on a smaller scale. Most expository essays should follow this format: Start with an introductory paragraph that includes the thesis statement, which tells the reader the core statement of the essay Then, include 3 – 5 body paragraphs that provide factual evidence to support the thesis statement Finally, wrap things up with a concluding paragraph that summarizes what the body paragraphs and thesis statement said You can see the similarities between the two formats. If you can write a fantastic expository paragraph, you’ll be well-prepared to move on to writing a full expository essay. Example of Expository Paragraph Here’s an example of an expository paragraph that follows the structure described above. The leading cause of death in the United States is heart disease, which can be fatal if it leads to heart attack or cardiac arrest. Heart attacks occur when a blockage in the coronary artery prevents oxygenated blood from reaching the heart. Cardiac arrests occur when the heart stops pumping entirely, which prevents the patient from breathing normally. Both of these problems can be deadly, even in seemingly healthy people who don’t have noticeable risk factors. As a result, heart disease is an important problem that many doctors and scientists are researching. Good writing = better grades ProWritingAid will help you improve the style, strength, and clarity of all your assignments. There are many ways you can present information in an expository essay. Here are four of the most popular ways, along with examples of each one. Problem and Solution Essay A problem and solution essay presents the reader with a problem and then considers possible solutions to that problem. Here’s an example passage you might find in a problem and solution essay: Among the many proposed solutions to rising carbon emissions, one promising possibility is carbon trapping. Scientists are figuring out how to pull carbon emissions out of the atmosphere and trap it in less harmful forms, such as by injecting carbon dioxide underground so it will turn to stone. Compare and Contrast Essay This type of essay takes two subjects and compares and contrasts them. It focuses on highlighting the differences and similarities between those two things. Here’s an example passage of this type of expository writing: Though country music and R&B music have very different sounds, they also share many similarities. For one thing, both types of music embody a specific cultural identity. For another, both genres trace their roots back to the 1920s, when the Victor Talking Machine Company signed singers from the American South. In a classification essay, you describe the categories within a certain group of things. Here’s an example passage you might find in a classification essay: There are three ways in which artificial intelligence might become stronger than humans in the future: high speed, high collective intelligence, and high quality. A speed AI would be able to perform calculations and experience the world much faster than humans. A collective intelligence, like a hive mind, would be able to break down a complex task into several parts and pursue them simultaneously. Finally, a quality AI would simply be able to solve more complex problems than humans could. In a process essay, you give the reader the steps for completing a specific process. This is similar to a how-to guide or an instruction manual. Here’s an example passage you might find in this type of expository writing: Caramelize the chopped onions in a frying pan. When the onions have caramelized, mix in the bell peppers, mushrooms, and tomatoes and stir for 4 – 6 minutes or until all the ingredients have softened. If you want to add meat, you can add ground beef and cook for another 4 – 6 minutes. Season with salt and pepper to taste. Good expository writing should be easy to read. After all, the purpose of exposition is to explain things to your readers, and you won’t be able to accomplish that if they have trouble understanding your writing. That’s why ProWritingAid can help you write an expository essay. The grammar checker can help you ensure your sentences flow well, you’re not missing any necessary punctuation, and all your words are precise and clear. Good luck, and happy writing! Hannah is a speculative fiction writer who loves all things strange and surreal. She holds a BA from Yale University and lives in Colorado. When she’s not busy writing, you can find her painting watercolors, playing her ukulele, or hiking in the Rockies. Follow her work on hannahyang.com or on Twitter at @hannahxyang. Get started with ProWritingAid Drop us a line or let's stay in touch via : Expository Essay Guide Expository Essay Examples Last updated on: Nov 20, 2023 5+ Expository Essay Examples to Help you Get Started By: Donna C. Reviewed By: Jacklyn H. Published on: Mar 22, 2023 Want to write an expository essay that will elevate your grades? Don't know what to do and what to avoid? It can be hard to know where to start when you're writing an expository essay. Do you begin with the facts or with your own opinion? How do you structure your argument? Let us guide you with expository essay examples! On this Page What is an Expository Essay? An expository essay is a form of writing which examines and investigates a certain idea or concept in order to present evidence that supports the ideas. It is used to evaluate the analytical skills of students in both middle school and high school. Writing an expository essay often requires one to thoroughly research the topic, and use primary and secondary sources. Such writings are designed to explain facts, ideas, and concepts in an objective and informative manner. This form of writing relies on presenting hard evidence in the form of statistical data, charts, graphs, and other visual presentations to support the information. By utilizing these methods of presentation, it becomes easier to explain the facts clearly. Here is a complete guide that will help you learn more about writing an expository essay . The expository essay examples will demonstrate how to write an expository essay without missing anything. These examples will help you in understanding the basics and once you are through them, you will be ready to write your essay in no time. THE RISE OF TEENAGE GANGS AND ITS CONSEQUENCES WAYS STUDENTS CAN SPEND THEIR LEISURE TIME THE HISTORY OF CHESS THE HISTORY OF THE AMERICAN FLAG AN ANALYSIS OF CULTURAL DIVERSITY AND WHY DOES IT MATTER WHY DO WE NEED EXCELLENT COMMUNICATION SKILLS STEPHEN HAWKING - A LIFE HISTORY WASTE MANAGEMENT FACTS AND FUTURE Tough Essay Due? Hire Tough Writers! You can generate even more examples specific to your topic and area of study using our AI essay generator for free! How to Write an Expository Essay Outline? An expository essay outline is just like any other essay and because you have been writing essays since your school years, you will have no difficulties. However, the difficult part is to know the type of information that will go into each section. We have divided and explained the entire process that is essential to write an expository essay successfully. The Prewriting Phase For an effective essay, you need to plan the entire essay before writing. Many students try to do the essay without planning and end up nowhere. Instead of just getting into the paper writing process, brainstorm and think about how you can present the ideas in a structured manner. Make points of what you will add in each section. Preparing the First Draft After brainstorming and noting down every main detail and theme, prepare the first draft of the essay. Add what points you will add in each section. An expository essay structure has the following sections: - Introduction: An introduction is the first section of an essay. It is a brief mention of the main points and themes of the essay. It includes the background of the main topic and some information about it. However, everything is added briefly. - Thesis Statement: A well-defined but brief thesis statement will elevate your essay and inform the readers about the main theme of your essay. However, the thesis statement should be brief and should not present the whole theme of the essay. - Body Paragraphs: Generally, these are three in number and present three main ideas. These paragraphs of the essay examine, analyze and present the main ideas along with the supporting evidence. Each sentence must begin with a topic sentence and expound on the main idea of that paragraph. - Conclusion: It is the last encounter between you and the readers and this is why it must be strong and memorable. Restate your thesis statement and the overall essence of the essay. You can do it by mentioning the main points briefly or by just presenting the answer to the main essay question. Revision is the most important part of the writing process. In this phase, you can revise, modify and restructure your essay and rectify it according to the guidelines and main essay question. Some of the things to consider while revising your essay are: - Have you answered the main question properly and completely? - Does your essay meet all the guidelines of the instructor? - Have you added all the main ideas in the essay? - Is there a proper transition between the sentences and paragraphs? - Are all the paragraphs consistent and well-structured? Answering these questions is a must and therefore, you should never miss this part. After you are done, proofread the entire essay before submitting it. It may seem daunting and dull but, just like revision, proofreading is also important. Proofread the essay thoroughly and see if everything is in line. At this stage, you can still make the changes. We hope that these tips will act as a writing guide for you and will help you in writing an excellent expository essay. Paper Due? Why Suffer? That's our Job! What are the Other Types of Expository Essays? This type of essay is further divided into the following types of expository writing. These are explained below Descriptive Essay: This essay requires describing a place, person, or event in detail. It includes great sensory details and is written to persuade the reader to see the writer’s viewpoint. Definition Essay: A definition essay describes a certain phrase or term in detail. The topics can be concrete or abstract in nature and include the explanation of both literal and contextual meanings of the chosen word. Compare and Contrast: These essays explain two or more things by comparing and contrasting them. They highlight the main points and describe the chosen objects by elaborating their various elements and qualities. Classification Essay: The writer breaks down the main essay topic and divides it into several classes and categories and explains them one by one. Process Essay: The writer breaks down a process and explains it in detail. This could be a manufacturing process, a recipe, and even a writing process. It explains the how-to process and how to do it in detail. Cause and Effect Essay: This essay describes the reasons behind a phenomenon or happening. It explains why something happens and what are the causes behind them. In short, a cause and effect essay explains the relationship between a certain event and its reasons. Get Professional Writing Help! All in all, an expository essay is a very useful tool that helps students improve their writing skills. If you're still having trouble with your essay, don't hesitate to ask for help. But don't worry! If you are looking up “who can write my essay for me?” Well, you’re in the right place! 5StarEssays.com is an experienced and skilled essay writing service that works with students that are looking for some help. All of our professional writers have exceptional writing skills and will provide a top-quality essay within your deadline. This is what makes us the best. Order your essay now. Donna has garnered the best reviews and ratings for her work. She enjoys writing about a variety of topics but is particularly interested in social issues, current events, and human interest stories. She is a sought-after voice in the industry, known for her engaging, professional writing style. Was This Blog Helpful? - Expository Essay - A Complete Guideline to Help You Write - Expository Essay Topics Recommended by Experts - How to Write an Expository Essay Outline - Complementary Template Added People Also Read - apa vs mla format - thesis statement examples - argumentative essay outline - lab report writing Burdened With Assignments? © 2023 - All rights reserved - Homework Services: Essay Topics Generator 2000+ SATISFIED STUDENTS 95% Satisfaction RATE 30 Days Money-back GUARANTEE 95% Success RATE © 2023 5StarEssays.com. All rights reserved. LOGIN TO YOUR ACCOUNT - LOG IN Processing... SIGN UP TO YOUR ACCOUNT - Your phone no. - Password Password must be minimum 8 characters. - Confirm Password - SIGN UP Processing... - SEND PASSWORD Quick and Easy Guide on How to Write an Expository Essay Understanding What Is an Expository Essay If you clicked on this article, then you must have recently been assigned an expository essay homework. There is also a possibility that you are here because you enjoy exploring different ideas and concepts rather than solely scratching the surface. Well, that explains why you decided to research more about expository essay writing. We won't leave you hanging, so let's delve right into the expository essay definition. It's only reasonable to first give you a clear explanation of what is an expository essay and what this kind of paper tries to accomplish. Simply put, an expository essay presents information on a topic. It explains something about a situation, person, idea, or occurrence and communicates knowledge about it to the reader. It does not attempt to persuade the reader of a certain point of view or present a convincing case. An expository essay depends on facts rather than personal opinion since it aims to inform the reader about a subject. Expository writing involves anything from sharing your day to outlining a job assignment. Therefore it wouldn't be unfair to say that it is the most popular type of writing in the world. Expository Essay Topics Speaking of the above, there must be plenty of options to write your expository paper on, right? You're correct! But one needs a properly worded title that would make great expository essay topics. That's why our research paper service covered some interesting areas below. You can browse myriads of choices and find one that is just right for your endeavor! Expository Essay Topics About Education - School Dress Codes: A Physical And Mental Stress - The Idea Of Free Higher Education - The Issue With High School Massacres - The Importance of College Success - STEM versus STEAM educational approaches - How literate people differ from uneducated ones - The advantages of studying foreign languages. - What changes should be made to the educational system in your nation? - Does 'educated' have the same connotation as 'smart'? - Can someone receive a top-notch education at home? Expository Essay Topics About Mental Health - Is it true that music impacts our mental and physical health? - Are acts of heroism and patriotic acts typical in terms of mental health? - Is there a need to increase mental health benefits under health insurance? - Comparatively speaking, does the American mental health system lag behind other nations? - Effects of mental health law - The connection between antisocial personality disorder and parenting methods - Learning-disabled kids can benefit greatly from school programs. - How social anxiety is influenced by digital communication - Patients with mental illness receiving physical care - Issues with mental health and grief therapy Expository Essay Topics About Society - Advertisements seen via the lens of social science. - Prejudices towards African Americans. - The social implications of feminism. - Global refugee crisis. - Constructing a wall to separate Mexico and the US. - The psychology of implicit racial prejudice and discrimination - The effects of racism at work on the economy and mind. - Gender roles in society: shifting perspectives and effects on families. - Who was responsible for the cost of the War on Terror? - Is peace education receiving enough attention from society? Expository Essay Topics About Politics - The connection between politics and religion - What are the pros and drawbacks of democracy? - How powerful are NGOs? - What are the UN's primary responsibilities? - What are the disadvantages of not having a state? - Has the US soured relations with its European allies? - What does the Human Development Index mean? - Celebrity Influence in political campaigning - What objectives does the anti-globalization movement seek to achieve? How to Write an Expository Essay with an Expository Essay Outline Outlining is one of the most vital steps for knowing how to write an expository essay. Many believe that creating an outline is a waste of time, but in reality, the more complete your expository essay plan is, the fewer hours you will have to devote to research and writing. An expository essay outline divides each paragraph of the essay into various components. By doing so, you may divide a more complex activity into more manageable components and better understand how various pieces of information will work together. Let's go through each section of the expository essay format prepared by our writer. So, how to start expository essay on a strong note? Consider opening with a bold claim that is related to your topic. After that, go on to briefly describe your subject's significance. Finally, make a statement about your essay's core thesis or objective. - Background information - Thesis statement II. Body Paragraphs In your first body paragraph. introduce the first major point that backs up your primary statement. Then, support your claim with instances or facts, and then explain how these examples or evidence link to your thesis and support your core notion. Remember to include a transitional sentence that relates to the following paragraph. If you follow a five paragraph essay format, then feel free to develop three body paragraphs with the similar order. - Topic sentence In your concluding paragraph, try restating your thesis statement in a different way to successfully conclude your work. Then put your essay's essential ideas in a brief summary before concluding with a powerful remark that will stay with your readers. - Restate thesis - Closing sentence Need some help with your homework? Get help from professional writers! Leave us a notice and we'll make your tasks asap. How to Write an Expository Essay Even though you now know a lot about the expository essay format, there are other things to keep in mind as well. In this section, we'll go over the specific steps you should take when figuring out how to write an expository essay. The absolute first thing you should do when given an expository essay assignment is to carefully go over the guidelines. Make sure you completely understand what is required of you. If it is for class, you may be limited to certain topics and word counts, there may be restrictions on the quality of sources you can use, etc. You might write an incredible essay but get a low grade because you missed out on some small restriction or guideline. Once you know exactly what you are supposed to do, it's time to think about different concepts you would like to explain. Make sure you are aware of the different types of expository essays so that when you brainstorm topics you have a tentative idea of what type of expository essay would be best suited for that topic. Think about what has been covered in class, what the teacher might expect, and what you find interesting to try and come up with a list of topics. Do a little bit of research on each topic to figure out whether you can easily find reputable sources and to gain a further understanding of the topic. After keeping all these things in mind, you should end up with an expository essay topic that is appropriate, engaging, and high-scoring. Fill Up an Outline Once you have zeroed in on a topic it's time to do research. One of the best ways to plan your writing is to use an expository essay outline to organize interesting information. While conducting research focus on the body paragraphs rather than on the introduction or conclusion. Think about three main ways you can explain the topic and put information that fits into those subtopics under the appropriate body paragraphs. While conducting research and filling out an outline, think about potential thesis statements. Coming up with a thesis statement too early will restrict your research, so it is better to develop a thesis statement as you find out more and more information. That being said, by the end of the planning stage you should have a finalized thesis statement Planning out your essay beforehand will give direction to your research, cut down on the amount of time you spend on the assignment, improve the overall flow of the final essay, and make the actual writing process much easier. Write the First Draft Now is the time to translate your outline into full sentences. It is often useful to leave the writing of the introduction till the end because after writing the body paragraphs you will have a better idea of what to say in an introduction, but make sure that you write down your thesis statement. Use the information you have found to create a cohesive analysis of the topic in each body paragraph. Make sure that the information you present is on topic and connects to the other facts around it. Think about what the purpose of each body paragraph is and question whether the information you are presenting fits that purpose or not. Make sure to use transition words within the paragraph and use transition sentences between paragraphs to improve overall comprehensibility and flow. Finalize Your Draft Go over the first draft of the essay and focus on whether the different paragraphs make sense or not. Don't be afraid to reorganize sections or completely get rid of some pieces of information. As you write your draft, new ways of expressing the information can come to mind that will make the overall essay more powerful. Make sure that you are not trying to make a persuasive argument and that you are using facts rather than opinions as evidence. Go over each sentence to make sure that it is clear and that it fits the purpose of the paragraph it is in. Look at the information you have included and make sure that it is useful and enhances understanding of the topic. It is better to have less information than more if the information is distracting or does not add anything to the essay. Try and read the paper as if it is the first time you are coming across the topic to see if it makes sense or not. Congratulations, you are just one step away from being able to submit an expository essay! Editing and Proofreading Go over the final draft of your essay and check for formatting errors, grammatical errors, spelling mistakes, etc and make sure that it complies with all the guidelines of the assignment. Finally, ask a friend or relative to go over the paper to do the last check. If you feel like you still need to make a lot of changes, don't be disheartened, spend the extra time to make the changes or reach out to expository essay writing service . Expository Essay Examples One of the best ways to learn how to write an expository essay is to look at an expository essay example. Looking at expository essay examples can give you a deeper understanding of what is expected as well as how to write an essay that flows well. Make sure that you use any examples you find as inspiration rather than a place to directly source information or text! Expository Essay Example The shift from traditional to current methods in treating diseases has improved the quality of many services, products, and processes. However, many regions worldwide are still applying traditional medicines (Stefanov et al., 2020). Therefore, conventional western medicine and alternative Eastern medicine are two recognized approaches to treating multiple diseases. Researchers have developed the foundational differences between these two approaches that have helped establish the pros and cons of each. Each approach has advantages and drawbacks. There have been debates on which approach is cheaper in terms of time and cost of treatment. Also, there is ongoing concern on which approach is safer than the other. As of 2019, there were over 3.5 billion social media users globally, and this figure still increases by 9% each year. It is impossible to deny that social media has become an important part of many people’s lives. There are various positive effects linked with the platforms, including better connectivity. However, addiction to social media platforms, the increased comparisons between individuals, and the fear of missing out have increased depression and sadness. Social media addiction has become rampant, which has negatively influenced the lives of many individuals in society. Checking and scrolling through the different social media platforms has become increasingly popular over time, leading to excessive and compulsive use. FAQs on Expository Essay Writing If the information was not quite enough for you to create an outstanding paper, our college essay writer has yet to supply you with further details about expository essays. Below you'll find the most frequently asked questions on this matter, so you won't have to spend extra time and effort researching any unanswered questions. What are the Different Types of Expository Essays? Since expository writing may take various forms, understanding the different sorts of essays will help you pick a topic and organize the essay's general trajectory and framework. - Process Essays - In a typical process essay, the introduction presents what you will learn, the body paragraphs offer step-by-step instructions, and the conclusion discusses the significance of what you have taken away. - Compare and Contrast Essays - The purpose of comparing and contrasting is to present facts and allow readers to reach their own conclusions. This is still an expository essay and not an evaluation of one over the other. A contrast essay may highlight differences, similarities, or both. - Cause and Effect Essays - Cause and effect essays examine the reasons behind events or speculate on possible effects. They can also draw attention to relevant connections or provide details about a cause or consequence. - Classification Essays - In classification essays, distinct items in the same category are compared, stressing their differences while pointing up the similarities that place them in the same category. Classification essays may be quite intriguing when attempting to classify something into a category it often does not belong to. - Definition Essays - Apart from an argumentative essay format , the basic objective is to define a topic by providing information. In contrast to just providing the word's dictionary definition, a definition essay also builds on the term's general notion while thoroughly defining it. What is the Most Important Part of the Expository Essay Structure? The core of the outline for expository essay is your thesis. It's what your essay's audience will remember. It is critical to select a thesis statement that is both intriguing and provocative yet accurate and true. It is what makes the structure of expository essay powerful and constructive. What is the Main Idea in Expository Writing? Identifying the core concept, or the most crucial message the author wishes to convey, is the fundamental objective for all expository papers. The text's main concepts are frequently introduced early, generally in the introductory paragraph. Using headings, subheadings, and other emphasis techniques, you may further emphasize key ideas. Main concepts, meanwhile, can also be inferred from the text and not explicitly expressed. Occasionally, you must draw the major concept from the text's specifics, assertions, and justifications. Now that you know whats an expository essay, you must agree that writing an expository essay is a great method to learn how to effectively communicate information while also pursuing an interest of yours. Therefore, there are many ways in which knowing how to convey ideas and explain things will help you both professionally and individually. And if you ever feel like you need an extra push towards pursuing your dream academic life, consider us your go-to college life partner. We won't criticize you no matter how many times you need essay writing help . The EssayPro team is loyal, always reliable, and never judgmental! Want to Ace Your Expository Writing? Your wish is our command - order now and experience the excellence of our expert writers! Have a language expert improve your writing Run a free plagiarism check in 10 minutes, generate accurate citations for free. - Knowledge Base - How to write an expository essay How to Write an Expository Essay | Structure, Tips & Examples Published on July 14, 2020 by Jack Caulfield . Revised on July 23, 2023. “Expository” means “intended to explain or describe something.” An expository essay provides a clear, focused explanation of a particular topic, process, or set of ideas. It doesn’t set out to prove a point, just to give a balanced view of its subject matter. Expository essays are usually short assignments intended to test your composition skills or your understanding of a subject. They tend to involve less research and original arguments than argumentative essays . Table of contents When should you write an expository essay, how to approach an expository essay, introducing your essay, writing the body paragraphs, concluding your essay, other interesting articles, frequently asked questions about expository essays. In school and university, you might have to write expository essays as in-class exercises, exam questions, or coursework assignments. Sometimes it won’t be directly stated that the assignment is an expository essay, but there are certain keywords that imply expository writing is required. Consider the prompts below. The word “explain” here is the clue: An essay responding to this prompt should provide an explanation of this historical process—not necessarily an original argument about it. Sometimes you’ll be asked to define a particular term or concept. This means more than just copying down the dictionary definition; you’ll be expected to explore different ideas surrounding the term, as this prompt emphasizes. Here's why students love Scribbr's proofreading services Discover proofreading & editing An expository essay should take an objective approach: It isn’t about your personal opinions or experiences. Instead, your goal is to provide an informative and balanced explanation of your topic. Avoid using the first or second person (“I” or “you”). The structure of your expository essay will vary according to the scope of your assignment and the demands of your topic. It’s worthwhile to plan out your structure before you start, using an essay outline . A common structure for a short expository essay consists of five paragraphs: An introduction, three body paragraphs, and a conclusion. Like all essays, an expository essay begins with an introduction . This serves to hook the reader’s interest, briefly introduce your topic, and provide a thesis statement summarizing what you’re going to say about it. Hover over different parts of the example below to see how a typical introduction works. In many ways, the invention of the printing press marked the end of the Middle Ages. The medieval period in Europe is often remembered as a time of intellectual and political stagnation. Prior to the Renaissance, the average person had very limited access to books and was unlikely to be literate. The invention of the printing press in the 15th century allowed for much less restricted circulation of information in Europe, paving the way for the Reformation. The body of your essay is where you cover your topic in depth. It often consists of three paragraphs, but may be more for a longer essay. This is where you present the details of the process, idea or topic you’re explaining. It’s important to make sure each paragraph covers its own clearly defined topic, introduced with a topic sentence . Different topics (all related to the overall subject matter of the essay) should be presented in a logical order, with clear transitions between paragraphs. Hover over different parts of the example paragraph below to see how a body paragraph is constructed. The invention of the printing press in 1440 changed this situation dramatically. Johannes Gutenberg, who had worked as a goldsmith, used his knowledge of metals in the design of the press. He made his type from an alloy of lead, tin, and antimony, whose durability allowed for the reliable production of high-quality books. This new technology allowed texts to be reproduced and disseminated on a much larger scale than was previously possible. The Gutenberg Bible appeared in the 1450s, and a large number of printing presses sprang up across the continent in the following decades. Gutenberg’s invention rapidly transformed cultural production in Europe; among other things, it would lead to the Protestant Reformation. The conclusion of an expository essay serves to summarize the topic under discussion. It should not present any new information or evidence, but should instead focus on reinforcing the points made so far. Essentially, your conclusion is there to round off the essay in an engaging way. Hover over different parts of the example below to see how a conclusion works. The invention of the printing press was important not only in terms of its immediate cultural and economic effects, but also in terms of its major impact on politics and religion across Europe. In the century following the invention of the printing press, the relatively stationary intellectual atmosphere of the Middle Ages gave way to the social upheavals of the Reformation and the Renaissance. A single technological innovation had contributed to the total reshaping of the continent. If you want to know more about AI tools , college essays , or fallacies make sure to check out some of our other articles with explanations and examples or go directly to our tools! - Ad hominem fallacy - Post hoc fallacy - Appeal to authority fallacy - False cause fallacy - Sunk cost fallacy - Choosing Essay Topic - Write a College Essay - Write a Diversity Essay - College Essay Format & Structure - Comparing and Contrasting in an Essay - Grammar Checker - Paraphrasing Tool - Text Summarizer - AI Detector - Plagiarism Checker - Citation Generator An expository essay is a broad form that varies in length according to the scope of the assignment. Expository essays are often assigned as a writing exercise or as part of an exam, in which case a five-paragraph essay of around 800 words may be appropriate. You’ll usually be given guidelines regarding length; if you’re not sure, ask. An expository essay is a common assignment in high-school and university composition classes. It might be assigned as coursework, in class, or as part of an exam. Sometimes you might not be told explicitly to write an expository essay. Look out for prompts containing keywords like “explain” and “define.” An expository essay is usually the right response to these prompts. An argumentative essay tends to be a longer essay involving independent research, and aims to make an original argument about a topic. Its thesis statement makes a contentious claim that must be supported in an objective, evidence-based way. An expository essay also aims to be objective, but it doesn’t have to make an original argument. Rather, it aims to explain something (e.g., a process or idea) in a clear, concise way. Expository essays are often shorter assignments and rely less on research. Cite this Scribbr article If you want to cite this source, you can copy and paste the citation or click the “Cite this Scribbr article” button to automatically add the citation to our free Citation Generator. Caulfield, J. (2023, July 23). How to Write an Expository Essay | Structure, Tips & Examples. Scribbr. Retrieved November 21, 2023, from https://www.scribbr.com/academic-essay/expository-essay/ Is this article helpful? Other students also liked, academic paragraph structure | step-by-step guide & examples, how to write topic sentences | 4 steps, examples & purpose, how to write an argumentative essay | examples & tips, what is your plagiarism score. How to Write an Expository Essay Does Expository Writing Have You Confused? Maybe you find yourself on this page because your instructor asked you to write an expository essay, and you aren't exactly sure what's expected of you—if so, you've certainly found the right place. Expository writing, or exposition, is a type of discourse used to describe, explain, define, inform, or clarify. It literally means "to expose." Exposition can be found in writing or oral discourse, but for the sake of this article, we'll stick with expository writing. You are likely familiar with expository writing already, even if the name sounds unfamiliar. Common examples include newspaper articles, how-to manuals, and assembly instructions. Expository writing is also the most frequent type of academic writing ! Present the facts, and only the facts If you are asked to write an expository essay, then you are essentially being asked to present the facts; there is no place for bias or opinion in expository writing. In a way, this makes writing simple—it is a matter of gathering and presenting the facts about a certain topic. Something important to keep in mind when writing exposition is that you should not assume your readers have any knowledge of the topic; don't gloss over basic or important details, even if you think they're common knowledge. When writing expository essays, it is best to use third person narration, although second person is acceptable in some instances, such as for instructions—or articles on expository writing. Characteristics of expository writing There are a few characteristics of expository writing you should remember when crafting an expository essay. The first is to keep a tight focus on the main topic, avoiding lengthy tangents, wordiness, or unrelated asides that aren’t necessary for understanding your topic. In the same vein, be sure to pick a topic that is narrow, but not so narrow that you have a hard time writing anything about it (for example, writing about ice cream would be too broad, but writing about ice cream sold at your local grocery store between 5:00 and 5:15 pm last Saturday would be too narrow). You must also be sure to support your topic, providing plenty of facts, details, examples, and explanations, and you must do so in an organized and logical manner. Details that can support your expository writing include: - Descriptive details - Charts and graphs Formatting an expository essay The typical format for an expository essay in school is the traditional five-paragraph essay. This includes an introduction and a conclusion, with three paragraphs for the body of the paper. Most often, these three paragraphs are limited to one subtopic each. This is the basic essay format, but expository writing does not need to be limited to five paragraphs. No matter how long your essay is, be sure your introduction includes your thesis statement and that the paper is based on facts rather than opinions. And, as with all good essay writing , make sure to connect your paragraphs with transitions. Methods for writing an expository essay There are a few different methods for writing an expository essay. These include: - Compare and contrast - Cause and effect - Problem and solution - Extended definition Generally, you will want to pick one method for each piece of expository writing. However, you may find that you can combine a few methods. The important thing is to stay focused on your topic and stick to the facts. Now that you have a clearer understanding of expository writing, you're ready to write your essay. One final tip: be sure to give yourself plenty of time for the writing process. After you've completed your first draft, let your paper sit for a few days—this lets you return to it with fresh eyes. If you'd like a second opinion, our essay editors are always available to help. Image source: picjumbo_com/Pixabay.com Let’s Make an Impact on Your Reader Hire one of our expert editors , or get a free sample. Have You Read? "The Complete Beginner's Guide to Academic Writing" Essay Writing: Traffic Signals for the Reader Five Habits to Avoid in Your Academic Writing How to Write a Great Thesis Statement Upload your file(s) so we can calculate your word count, or enter your word count manually. We will also recommend a service based on the file(s) you upload. English is not my first language. I need English editing and proofreading so that I sound like a native speaker. I need to have my journal article, dissertation, or term paper edited and proofread, or I need help with an admissions essay or proposal. I have a novel, manuscript, play, or ebook. I need editing, copy editing, proofreading, a critique of my work, or a query package. I need editing and proofreading for my white papers, reports, manuals, press releases, marketing materials, and other business documents. I need to have my essay, project, assignment, or term paper edited and proofread. I want to sound professional and to get hired. I have a resume, letter, email, or personal document that I need to have edited and proofread. Prices include your personal % discount. Prices include % sales tax ( ). - Food & Beverages - Marketing Examples 6+ Expository Essay examples & Samples in DOC Short Expository Essay Expository Essay Sample What Is an Expository Essay? How to write an expository essay. - Introduction. In essay writing, an introduction should always be present. Here you will have to present a brief explanation or short essay description about your idea. - Main discourse. Most people only write three to four paragraphs to present the evidences or to expand the idea. However, your style should be to present the first idea that should correlate with the second one and so on and forth. - Conclusion. Here you just simply have to summary writing or present the whole point or explanation of the idea. Basic Expository Essay High School Expository Essay Guidelines to Write Expository Essay - Do an intensive research. Oftentimes, the problem with expository writers is that they don’t have enough points to present for the idea. Do your research. - Widen your vocabulary. It is easier to write when you have the right words to use. You don’t have to browse your dictionary from time to time. - Design a method. Be a little creative. There may be some methods that people use to write but it is still better if you have one for your own. Benefits of Expository Essay More design, 11+ writing examples in pdf, 7+ self-introduction essay examples, samples, 32+ free writing examples, how to give your essay contest entries a winning edge, how to outline an essay, steps for writing contest-winning essays, how to start your college essay, 10 essay writing examples & samples. - id; ?>)" rel="noopener" role="button" tabindex="0" aria-label="postclick">6+ Informative Essay Examples, Samples - id; ?>)" rel="noopener" role="button" tabindex="0" aria-label="postclick">7+ Short Essay Examples, Samples
<urn:uuid:1ec8465c-1f8d-4b58-b9e6-ff09083fcba7>
CC-MAIN-2023-50
https://charunivedita.online/essay-analysis/what-are-the-examples-of-an-expository-essay
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.908128
11,712
3.453125
3
Understanding Zimbabwe’s water-gender -climate change nexus through intersectionality Equitable access to water and sanitation is a challenge in most urban and rural areas in Zimbabwe. According to UN-Water, about 30% of the population in Zimbabwe uses a safely managed drinking water service (SDG indicator 6.1.1, 2020). In comparison, about 26% of the population in the Southern African country use a safely managed sanitation facility. When the conversation around urban water management in Harare arises, it’s hard for residents not to get angry. About 50 percent of Harare’s 4.5 million residents receive municipal water once a week. When the water does come, it may come out dirty. Not only are local authorities endangering citizens with poor quality and potentially contaminated water, but they also chip away the trust between themselves and citizens. For those with economic resources to secure private access to “clean and safe” water on their property; purchasing bulk water or drilling boreholes are alternative coping mechanisms. Bulk water delivery is a lucrative business in Zimbabwe’s urban areas. Mudenda (2013) states that these companies are regulated by Statutory Instrument 90 of 2013 Chapter 20:25. The SI came to being as Private Bulk Water Companies had entered water provision uninvited and unregulated by the state. The SI defines bulk water services, sets out the criteria for registration, operations, and quality assurance of water provided by these entities. Even though this regulation exists, Mudenda’s study in Harare reveals that in 2013, only 4 bulk water companies were registered with government authorities. Participants of the study cited high costs for registration, lack of monitoring from state authorities, and a long list of demands from the government. In the absence of state provision and supervision of water delivery, residents fall victim to unscrupulous business practices, which directly impact their health. It also illustrates that the commercialization of water provision doesn’t always translate into efficient or effective ways of distributing water among populations. Other layers hindering equitable access to clean water as outlined in Sustainable Development Goal 6, include systematic gender inequalities and chronic underinvestment by government authorities in water and sanitation infrastructure. These factors result in women and girls losing time for economic, leadership, and educational activities as they search for alternative sources of water in Harare. UNDP Zimbabwe states that women and girls can spend up to 8–9 hours waiting at crowded boreholes and wells. Carrying out this also exposes them to physical and sexual harm while searching for water. However, the conversation of water management cannot neglect the impact of climate change on this essential service. During the 2018–2020 period, Zimbabwe faced a prolonged drought. This affected the availability and quality of water supply from catchment areas and ground sources. In a water-scarce country like Zimbabwe, this had a damaging effect on agricultural production, energy production, and consumption. Alternative water sources such as boreholes and water wells had dried up during this period. While the heavy rains from the 2020–2021 rainy season contributed to increased dam levels in Zimbabwe, the national water authority, ZINWA states that this current water supply to urban areas will only last 21 months. Whilst water urban management in Zimbabwe is often criticized as a politicized process, residents and state authorities need to take stronger action towards adapting to and mitigating climate change. At face value, it appears that these myriads of challenges emerging from the urban water-climate change nexus impact all residents the same. The framework of intersectionality proves that this is not the case. Through intersectionality, one can assess how multiple and overlapping systems of discrimination affect different groups' interaction with water access, resource management, and climate change. It moves the urban water management- climate change conversation towards understanding how power shapes individuals varied experiences with water access. From this perspective, citizens and state authorities can recognize that community borehole points have not been designed to incorporate the specific needs of women and girls with disabilities to facilitate their access to water. In this example, it's clear that ableism and sexism hinder women and girls with disabilities from their human right to clean water. The interactions of gender, disability, and economic status demonstrate how existing water access intervention strategies and programs define “women” and women’s problems as homogenous. As extreme weather patterns such as drought and flooding become frequent in urban and rural areas in Zimbabwe, one cannot help to observe the uneven preparedness among citizens. Individuals differently experience access to information about climate science and education, control over water, and knowledge about safety measures during disasters; due to their economic status, gender, sexuality, disability, race, or location. In the era of SDGs and global commitment to leaving no one behind, we cannot continue to have marginalized groups invisible. It’s critical that policymakers, implementers, and citizens adopt an intersectional lens to the water-gender-climate change nexus in Zimbabwe. In doing so, we can ensure that generations of Zimbabweans will have access to equitable and safe water.
<urn:uuid:8957855b-def0-4cc1-9c2d-6438f2f40e8b>
CC-MAIN-2023-50
https://chidonyaruwata.medium.com/understanding-zimbabwes-water-gender-climate-change-nexus-through-intersectionality-a1e3ce7d7c93?source=user_profile---------2----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.940946
1,030
3.3125
3
Birds that lay blue speckled eggs Found in North America, the Turdus migratorius is a commonly known bird with striking blue speckled eggs. The American Robin’s eggs can sometimes look similar to those of the Eastern Bluebird, but unlike the latter species, they are typically a paler blue shade. These birds often build their nests in trees or shrubs, using mud as a binding agent and lining them with grass or other soft materials. Interestingly, American Robins rely heavily on sight rather than smell when locating food sources. They feed on various insects and worms but may also switch to berries and fruits during the winter months when their preferred prey is scarce. These birds are found throughout North America and are well-known for their cheeky, alert nature. To attract American Robins to your garden, consider planting fruit-bearing trees such as crabapples, cherries or serviceberries as well as shrubs such as viburnum or elderberry bushes. Providing open areas of ground for them to forage in and clean water sources will also be beneficial for these feathered visitors. Why have a boring egg when you can have a blue speckled one? The Eastern Bluebird knows how to keep their eggs on trend. This bird is a small thrush with an eye-catching blue color on its head and back. Its breast is reddish-brown, and its wings and tails are blue-black. Their size ranges between 6 to 8 inches, and the weight of males is around 30g while females weigh 27g. Eastern Bluebirds are well-known for their eggs that are blue-green or sky-blue with speckles. They usually breed from March through August, laying three to seven eggs per clutch. Eastern Bluebirds can be found in live oak woodlands, gardens, parks, pastures, meadows, and suburban areas throughout eastern North America. They have a low tolerance for cold temperatures and migrate to warmer regions during winters. Eastern Bluebirds take part in interesting behavior when they feel threatened because they mob their predator by flying around them until they’re tired. These birds regularly use nest boxes provided by humans for breeding purposes since it helps protect them from predators such as raccoons or snakes. Humans also help supplement their diet with Larvicide-treated mealworms that enhance their health during breeding times. According to Cornell Lab of Ornithology, eastern bluebird populations declined severely during the late 1800s due to habitat loss by deforestation and competition from House Sparrows and European Starlings introduced into North America at that time. Why settle for a regular bluebird when you can have a mountain bluebird that lays blue speckled eggs? It’s like getting a bird and a mood ring all in one. This bird is known for its stunning blue plumage with a white underbelly. The Mountain Bluebird frequently lays blue-speckled eggs in nests made from grasses and small rootlets. These birds are mostly found in open fields or along roadsides in the western part of North America. Mountain Bluebirds are migratory birds that breed in high-elevation areas such as the Rocky Mountains. During winter, they move to lower elevations where there is not much snow cover. They often mate with the same partner each year and take turns incubating their eggs. Interestingly, Mountain Bluebirds are also cavity nesters. They will use abandoned woodpecker holes or natural cavities found in trees or fence posts to build their nests. For this reason, it’s important to provide nest boxes for them if you want to attract them to your yard. If you’re interested in attracting Mountain Bluebirds to your property, consider putting up a nest box that’s placed on a pole or tree 5-15 feet off the ground and open areas nearby for their food source such as insects and other arthropods. It’s also crucial to maintain the nest boxes regularly, clean them out between seasons, and make sure there aren’t any predators around that can harm the birds or their young ones. You’ll go blue in the face trying to find a better spot for a House Finch’s blue speckled eggs than a cozy nest. The Carpodacus mexicanus, a member of the finch family, is recognized for its vibrant red plumage and melodious song. This small passerine bird is commonly known as the House Finch, also called a Ligonier Finch or Linnet. However, what sets this species apart is its ability to produce blue speckled eggs during breeding season. During mating season, male House Finches can be seen singing from high perches in an attempt to attract female partners with their musical abilities and bright coloring. When a female selects a mate, they will build a neat cup-shaped nest using twigs, grasses, and feathers in concealed spots like bushes or tree branches before laying their eggs. The House Finch’s unique egg coloration comes from pigments deposited on the exterior during formation. The base color of most finch eggs is white or beige, but the addition of blue pigment creates the speckling effect that gives these eggs their distinct appearance. Don’t miss your chance to glimpse these beautiful birds and experience their unique nesting habits firsthand. Get outside and explore nature by observing finches’ behavior in their natural habitats; maybe you’ll be lucky enough to spot one nesting with its beautiful blue-speckled eggs! Why settle for regular white eggs when you can have a blue speckled one? Just ask the California Scrub-Jay, they’ve got the trendy egg game down pat. This species is an intelligent bird that can be found on the Western side of North America. With its sparkly blue feathers, it is a striking bird and stands out as one of the most impressive corvids. The California Scrub-Jay is known for laying blue speckled eggs in nests that are often built from twigs and small branches. These jays will eat insects, seeds, nuts, and even small animals; they are opportunistic feeders and can also adapt to human environments. This jay has a special feature – storing food in caches! That’s right; they actually store nuts and acorns for future use. These birds are also social creatures that have been observed playing skills with each other. Did you know that these Jays can mimic human voices? They have been reported to imitate alarms, car horns, telephones ringing and even cats meowing! As these beautiful birds become more common in urban areas, it’s not too unusual for people to report hearing a conversation but upon investigation discovering that they’ve just overheard a california scrub-jay. Pro Tip: If you want to attract Scrub-Jays to your garden or property, try offering peanuts or whole sunflower seeds- they’ll love it! However, always remember never to catch or touch any wild animal without proper permission or supervision. Why go to the museum when you can just look at an European Starling’s nest of blue speckled eggs for free? Renowned for their iridescent plumage, metallic sheen on their feathers, and intelligence, the speckled birds belonging to the Sturnidae family are commonly known as Starlings. The European Starling is one such species found in Europe, North Africa and Western Asia. These birds stand out with an unmistakable appearance – jet-black with a metallic green sheen in adults during breeding season or winter and speckled feather plumage that appears as white spots during non-breeding months. Starlings are widely recognized for their excellent mimicry skills that allow them to imitate sounds of other bird songs, human speech or machinery. They lay blue speckled eggs in small or large nesting colonies built in cavities like tree-holes, rooftops, drainpipes and nest boxes. They prefer loose colonies with many resident pairs around the same vicinity. Interestingly enough, European Starlings disperse their eggshells away from the nest shortly after hatching of their young ones. Doing this helps them keep predators from locating the nest by scenting crushed shells. Bonus fact: Starlings often fly in murmurations-large flocks that shape-shift resulting due to collective synchronized movement with sometimes thousands of individuals changing shapes together. Pro Tip: If you’re trying to attract European Starlings and provide nesting material for them, remember that they enjoy coconut matting strips or shredded paper pieces along with materials such as feathers to build their nests! Why settle for regular brown eggs when you can have a fabulously unique blue speckled egg from a Song Sparrow? It’s like the bird is throwing a party in your breakfast. This small passerine bird is scientifically known as Melospiza melodia. It belongs to the Passeriformes Order and Emberizidae Family. The Song Sparrow’s characteristic features include brown upperparts with streaks on its back, a grayish-brown or beige belly, and dark brown stripes on its white chest. Known for their melodious singing, these birds are common in North America and preferred habitats include brushy areas close to water sources like streams, marshes and gardens. They incubate eggs twice annually with nests usually built near the ground level. Not only do these songbirds lay blue speckled eggs, but they also have a unique style of building their nests that utilize materials such as grass, rootlets, and leaves arranged in a cup-shaped structure. Their feathers are often the primary component for constructing the inner lining of their nests. The Song Sparrow has about 30 subspecies spread across North America that varies in size and coloration depending upon their geographic location. Some subspecies like ‘Sooty Fox Sparrow‘ and ‘Lincoln’s Sparrow‘ closely resemble Song Sparrows in their appearance. Interestingly enough, according to a study by the National Audubon Society, Song Sparrows have been observed using cigarette filters to line their nests due to their material ability of repelling mites/lice away from affecting their younglings – now that’s an innovative use! Why lay regular eggs when you can glam it up with a trendy blue speckled look? The Northern Mockingbird knows how to keep its chicks stylish. This avian marvel is renowned for its stunning plumage and remarkable ability to mimic other bird songs. It’s a common sight in North America and can lay blue-speckled eggs with ease. The Northern Mockingbird is famous for its territorial disputes, often defending its nest from potential predators or rivals. These birds have excellent aerial skills and can swoop down on unsuspecting prey with precision and speed. Pro Tip: If you want to attract these beautiful birds to your yard, consider planting fruit-bearing trees or bushes as they are known to be avid fruit eaters. If you’re looking for a bird with an identity crisis, meet the Eurasian Collared-Dove – it sounds like it belongs in a tuxedo but looks like it just rolled out of bed. These doves, with a distinct black neckband, are part of the bird species that lay blue speckled eggs. They have managed to expand their range in many parts of the world due to successful breeding and adapting well to human-made habitats. Known for their melodious cooing calls, the Eurasian Collared-Dove is easy to recognize among other species. These birds prefer open areas such as parks, gardens and residential areas as nesting sites. Due to their ability to breed throughout most of the year, they can raise multiple broods annually. Interestingly, these doves seem to form monogamous pairs that mate for life. A true fact by Cornell University suggests that they were introduced into The Bahamas from Cuba in the 1970s and then rapidly expanded throughout Florida during the 1980s and 1990s. Why settle for plain white eggs when you can have a splash of blue? The Red-whiskered Bulbul knows how to jazz up its nursery décor. This bird species, commonly found in Asia, lays blue speckled eggs. With its distinctive red-tinged feathers and white cheek patches, the Red-whiskered Bulbul is often sought after by bird enthusiasts. Its melodic chirping coupled with an active lifestyle make it a joy to observe in the wild. Interestingly, the male and female Red-whiskered Bulbul share responsibilities when it comes to incubating their eggs. While the female primarily takes on this task during the day, the male takes over at night. This shared responsibility ensures that their eggs are kept warm and safe until they hatch. It’s worth noting that while this particular species is known for its blue speckled eggs, not all birds of this color lay them. Egg coloration can vary widely across different bird families and even within certain species. The variation in eggshell pigmentations can be attributed to genetics and environmental factors like diet. Studies have shown that Red-whiskered Bulbuls are avid insectivores, particularly enjoying beetles, termites and ants. However, they don’t shy away from fruit either – sometimes supplementing their diet with berries or figs. In fact, it’s beneficial for these birds to consume fruits since they provide essential vitamins and nutrients needed for healthy growth. According to scientific reports from “The Wilson Journal of Ornithology,” some populations of Red-whiskered Bulbuls have been introduced to regions outside of their natural range, resulting in successful establishment of breeding colonies. Why settle for plain white eggs when you can have ones with a touch of polka dots and stripes? Factors that influence egg color and patterning Examining the hereditary elements that play a role in egg color and patterning is crucial. To expound on this heading, we can present a table with relevant genetic factors. For instance, depending on the breed of chicken, genes impart shell color variations such as brown, white, blue and green. Additionally, feathering patterns such as mottling and barring are believed to be connected to distinct genetic formulas. One lesser-known detail pertains to how the mother hen’s diet affects egg pigmentation through yolk formation. Specifically, enzymes are responsible for depositing specific pigments into the yolk, which can influence final expected eggshell coloration. A unique story tells of how a rare breed of Indonesian chickens called Ayam Cemani lays pitch-black eggs due to excess melanin-imbued pigment. These eggs sell for premium prices and have long been regarded as lucky charms by mystics in the area. Understanding the genetics behind egg appearance is crucial for farmers and scientists alike. With this knowledge at hand, better breeding strategies to yield desirable characteristics become possible. Not all breakfasts are created equal – chickens on a diet of tomato sauce produce eggs with a reddish tint, while those indulging in kale will lay eggs of a pale green hue. Foraying into the nutritional praxis of egg laying animals, reveals a distinct “diet” connection to the color and pattern of their eggs. To comprehend this further, a few points make clear sense. - Vibrant feeder organisms can influence pigmentation causing darker eggs. - Supplements like beta-carotene enriched diets produce deeper yolk and egg color. - Studies show that birds fed with marigold flowers produce more yellow/orange yolks and hence brighter eggs. It is also noteworthy that diet cannot be the sole contributor to egg patterning or coloring as there are some genetic traits that come into play as well. Nevertheless, optimal nutrition can help express the full potential of genetically available colors and patterns in eggs. Choosing to incorporate suitable animal feed can go a long way towards enhancing egg quality. For instance, supplementing chicken diets with Red pepper significantly increased carotenoid concentration in their egg yolk elevating its orange hue. Similarly, feeding fish with Astaxanthin is shown to enhance the color intensities of their eggs. Mother Nature dyes her Easter eggs with a little help from environmental factors. The surroundings and atmosphere can affect the color and patterning of eggs. Light intensity, temperature, and humidity are crucial factors that play a role in determining egg color. A higher temperature during egg formation can result in lighter shades of eggshell colours. Similarly, increased light intensity during the laying process leads to darker hues, while reduced humidity can cause blemishes or rough textures on eggs. Interestingly, an imbalance in natural pigments also influences egg colors. For instance, a lack of carotenoids (the pigments responsible for yellow or red-orange tones in yolks) would weaken the vibrant hue of the yolk. Additionally, genetics play an important part in determining eggshell patterning. Some chickens have beautiful speckled or striped designs due to unique genetics. Understanding the environment can help farmers and poultry enthusiasts cultivate their flock’s ideal conditions for producing vibrant-looking eggs that are desirable to buyers worldwide. Don’t miss out on the opportunity to impress your local markets with richly hued eggs from your flock! Follow these tips to create optimal environments and genetic pairings for your birds’ eggs based on their desired colors and patterns. Egg color and patterning may be important for survival in the wild, but let’s be honest – we’re all just here for the Instagram-worthy breakfast pics. Importance of egg color and patterning Camouflage from predators Egg patterning and color are highly significant in helping them stay safe from predator attacks. The camouflage provided by the eggs makes them less conspicuous to predators such as birds, reptiles, and mammals that rely on sight to hunt their prey. This defense mechanism allows eggs to blend into their surrounding environments seamlessly, providing them with a greater chance of avoiding detection. Egg coloration and patterning have evolved over time to match their habitat’s specific colors, such as brown, green, or blue speckling for woodland environments or blotches of white and gray for rocky areas near water sources. Some eggs even mimic leaves or rocks so perfectly that it is difficult for predators to differentiate between the egg and its surroundings. In addition to providing camouflage against predators, some egg patterns serve other purposes, such as marking which eggs belong to which bird species in communal breeding grounds. Egg patterns also convey important visual cues that stimulate parental behavior in birds. Understanding the significance of egg colors and patterns can help individuals appreciate the intricate ways nature works and potentially inspire increased conservation efforts for vulnerable bird species. By recognizing the importance of preserving natural habitats and decreasing human disruption in delicate ecosystems across the world, we can contribute towards wildlife protection efforts. The ability of eggs to utilise this evolutionarily crafted defense mechanism offers us an insight into our own behaviour towards environmental preservation by highlighting how seemingly insignificant details make a huge impact on survival in the wild. Who needs flashy feathers when you can impress potential partners with eggs that would make even Jackson Pollock proud? Attracting a mate The significance of egg color and patterning is crucial in attracting a compatible mate. - Bright and bold patterns can indicate robust health and genetic fitness, leading to increased mate attraction. - The color and patterning of eggs can help protect them from predators or harsh environmental conditions which ultimately improve offspring survival rate. - Lastly, certain species use egg coloration as a means of communication and recognition between mates during courtship. Interestingly, birds belonging to different regions have evolved diverse traits such as size and color in their eggs to attract partners specific to their area. In one instance within the bird family, King Penguins use unique vocalizations to identify their mates. This is even more remarkable given that they lay only one egg per breeding season with no second chances. The correct identification is imperative for sustaining the continuity of their lineages. Looks like the birds are taking their role as parents very seriously, playing a game of ‘egg-spy’ to identify their own offspring. Identification of eggs by parents Identification of Eggs by Parent Birds Egg identification is a crucial process in bird reproductive behavior. Parent birds recognize their own eggs to ensure proper incubation and hatching. There are various ways that parent birds identify their eggs, including: - By memorizing the unique pattern of spots on each egg - Using their sense of smell to detect chemical signals from the egg - Identifying the color and texture of the shell - Using visual cues, such as the shape or size of the egg Knowing which eggs are theirs enables parent birds to dedicate appropriate care and effort to each egg. It’s important to note that some bird species lay eggs that mimic those of other species in order to trick them into caring for their young. A fascinating example is that of the common cuckoo, whose chicks push out the host bird’s eggs before hatching, fooling them into raising a chick that isn’t theirs. This article may have cracked some eggs, but it’s clear that the importance of egg color and patterning is no yolk. The color and pattern of bird eggs vary widely across species, but many birds that nest in trees or bushes opt for blue-speckled eggs. Certain birds like robins, blue jays, eastern phoebes, and American goldfinches lay speckled blue eggs. Speckles on the eggshells help to camouflage them and prevent detection from predators. Knowing which birds lay what kinds of eggs can be beneficial for bird-watching enthusiasts or those studying avian ecology. Interestingly, the gene responsible for the color of a bird’s feathers also affects the hue of their eggs. Therefore, some species have pink or brown-speckled eggshells. Additionally, studies have shown that certain bird species with specific eggshell patterns such as those having dense and bigger spots on their eggs have higher predation rates than others. When it comes to making nests and laying eggs, each species has its unique style and preferences. For instance, bowerbirds paint their shallow nests with colorful objects such as berries or flower petals to attract mates while ostriches build enormous communal nests where several females will lay their colossal eggs inside. One ornithologist shared a story about observing a common loon building a bulky cup-shaped nest while doing research in Canada’s boreal forest. After several days, he witnessed the female lay her speckled aqua-blue egg right into the groomed center of the bulky mass. The experience was incredibly rewarding and gave him an intimate look into how different birds built nests and laid their unique-colored eggs in distinct environments. Frequently Asked Questions Q: What birds lay blue speckled eggs? A: Several bird species lay blue speckled eggs, including the American robin, eastern bluebird, and spotted towhee. Q: Are blue speckled eggs safe to eat? A: Blue speckled eggs are safe to eat as long as they come from a domesticated chicken or other bird specifically raised for egg production. It is not recommended to consume eggs from wild birds. Q: Why do some birds lay blue speckled eggs? A: The coloration of a bird’s eggs is primarily determined by genetics, but can also be influenced by diet and environmental factors. The blue speckled pattern is thought to provide camouflage and protection from predators. Q: Do all blue speckled eggs look the same? A: No, the appearance of blue speckled eggs can vary among bird species. Some may have lighter or darker shades of blue, and the speckling may be more or less pronounced. The size and shape of the eggs can also differ. Q: How can I attract birds that lay blue speckled eggs to my backyard? A: Providing food, water, and suitable nesting sites can attract birds to your yard. Research the specific habitat and nesting preferences of the bird species you are interested in attracting and tailor your efforts accordingly. Q: Can I keep birds that lay blue speckled eggs as pets? A: It is illegal to keep most wild birds as pets in the US. Domesticated chickens, which can lay blue speckled eggs, are commonly kept for egg production and backyard farming.
<urn:uuid:f4625142-be01-4ead-8a0c-0e84eb4f8129>
CC-MAIN-2023-50
https://chipperbirds.com/what-birds-lay-blue-speckled-eggs/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.951386
5,078
3.40625
3
All forested areas around the world from woods to jungles are critical in global climate action. As deep resources of carbon recycling, they help to mitigate the negative effects of CO2 emissions caused by humans. These emissions are causing warmer temperatures across the world, increases in extreme weather events such as floods, droughts, severe storms etc, which result in damage to local ecosystems, upon which many poorer people depend for their livelihoods. The continent of Africa is the only major region of the world not to have experienced substantial and widespread economic development. As such it is a significant region for the future of sustainable global forestry. African forests have the potential to supply timber and other forest-based products to meet growing demand within domestic markets and abroad, and while some of these resources are being depleted unsustainably, there is still time to convert the potential of the forests into long term and sustainable economic benefits. There is a strong commercial future in Africa available for sustainable commercial forestry, which has the unique ability to catalyse economic, social, and climate-smart transformation. But despite the immense potential of Africa’s huge resource-rich forests, commercial investments in forestry have slowed to almost zero across the continent in the past 20 years as population has shifted to urban areas. The growth in new plantations during this time has been minimal, and there has been a reduction in government-owned forested land. Real and perceived financial barriers such as low returns on investments and high perceived risks have dissuaded investors from fully investigating the potential to develop Africa’s forests to their maximum sustainable capacity and for the equal benefit of rural communities. There are technical and regulatory barriers, mostly different in each African country: high establishment costs; insufficient operational scale; lack of management expertise and industrial processing facilities, among many other challenges. In addition, Africa’s forests are becoming vulnerable to climate change and global warming impacts. But these challenges produce unique opportunities at a unique time if the appropriate policies and institutional frameworks are put in place to recognise the role of the private sector, the limitations of the public sector, and public-private partnership engagements, as well as the incorporation of multilateral environment agreements into national plans and programmes. Trees, forests, people and environment are intricately related through food chains, life support systems, maintenance of the hydrological cycle and provision of other environmental services. Forests are far more significant in how they can work in a sustainable process than in what they are or represent. For example, they protect and maintain sources of genetic materials for plant breeding programmes to improve food crops and produce herbal remedies and generic drugs. Forest biomes support flora and fauna that serve agronomic purposes, such as pollination. Africa needs to invest much more in itself if it wants more foreign investment. International partnerships and understandings have to be the best way forward. But, initially, Africa may lack information more than it lacks money. It urgently needs more information on climate change impacts on African forests and the complex relationships relating to climate change that face African communities across the continent. The challenges of getting the policies and incentives right go beyond getting information on the impacts of climatic factors on forests. They extend also to acquiring knowledge and information on the interaction between the different climate change factors. In most of Africa, there is no reliable or updated information on forest and tree resources because of the lack of permanent sampling plots for monitoring long term changes. This has resulted in Africa suffering gaping holes in the data needed for informed decision making. The African forest sector is the most lucrative investment in the longer term. For now it needs effective monitoring, protection capabilities, and detection activities to face the increasing short term challenges caused by human and climate change impacts. But the forestry sector in many African countries could be growing the beanstalk to economic transformation.
<urn:uuid:541be05e-cc9a-4a78-9e8e-3c981975e6e0>
CC-MAIN-2023-50
https://clement.co.uk/the-beanstalk-to-economic-transformation-african-forests-climate-action-and-sustainable-development/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.945333
774
3.4375
3
by Alan Carpenter The EC Bar Ranch includes 400 acres along 2.5 miles of Nutrioso Creek in the White Mountains in eastern Arizona’s Apache County. Comprising less than 1% of the land in Arizona, riparian ecosystems are diverse communities of plants and animals established along the edges of waterways like Nutrioso Creek. Because of their structure and proximity to water, riparian habitats are very susceptible to invasion by alien species, stress by humans, and animal activity. These invasions, particularly by plants, can then permanently alter riparian ecological processes. |Nutrioso Creek before| The ranch was homesteaded in 1880’s and has operated as a cattle ranch during its existence. When Jim Crosswhite acquired the ranch in 1996, he became the principal steward of the Little Colorado River spinedace, a threatened fish species, which lived in Nutrioso Creek. The creek’s riparian zone was rated as nonfunctional and in a downward trend due to exposed streambanks; it was designated an “impaired water” by the state. For most land owners, taking care of a threatened species and having a stream polluted with sediment would not be very appealing. However, Jim Crosswhite saw things differently. Rather than complain about his fate, he decided to do something constructive. He saw the potential to improve the profitability of his livestock operation, improve the habitat for the spinedace, and to improve the water quality of Nutrioso Creek. He believed that private initiative, backed by governmental assistance, would improve water quality and property values for all land owners in the Nutrioso basin. Everybody would win. This would also help keep farming and ranching operations in business and would therefore help forestall subdivision and residential development. Jim found that state and federal agencies were interested in providing expert advice and cost-share funds to help private landowners meet conservation goals for the spinedace and to improve the condition of Nutrioso Creek. He wrote numerous proposals for funding and, as the proposals were approved, began to implement them. In July 2000, the AZ Department of Environmental Quality (ADEQ) completed the Nutrioso Creek Total Maximum Daily Load (TMDL) study for turbidity. The report concluded that exposed stream banks along 7 miles of the 27-mile creek were aggravated by historically heavy activity from livestock and elk, resulting in an excessive amount of turbidity. The report recommended a number of improvements on the EC Bar Ranch and on 4 miles of Apache National Forest land. While many water quality improvement practices were already underway on the ranch, they needed to be expanded to other sections of the creek to meet turbidity standards in order to change Nutrioso Creek from an impaired water source. Improvements in Nutrioso Creek wetland habitat would also help in delisting of the spinedace. The TMDL report made a number of recommendations, including a variety of Best Management Practices (BMPs), to be utilized as part of the implementation strategy to help reduce sediment loading to Nutrioso Creek, which Jim is now in the process of implementing. For example, the areas where historic overgrazing occurred could be fenced to keep out cattle and elk during critical growing periods (see photo at right). Cattle grazing in the riparian corridor could be confined to only the dormant winter months, which would allow for the emergent plants in the spring to grow and protect the streambank. So, Jim fenced the riparian areas along the creek. Though many ranchers don’t like the idea of fencing riparian zones, Jim notes that “It’s not like, ‘fencing will take away my land,'”. “You fence it to grow more grass, which livestock can graze in the wintertime.” The TMDL report also recommended installation of stream grade stabilization structures to help protect the creek banks during high critical flow events. The structures could also be used to help dissipate stream velocities and thus dissipate stream energy and erosional forces during high flows. The report recommended off-channel water wells and wildlife guzzlers to allow for more water to remain in the stream itself and allow the riparian corridor to be fenced without the need to include water gaps for wildlife and cattle to drink from the stream. This would allow for irrigation of the revegetation projects along the stream corridor. So, Jim drilled a well and created off-channel water supplies for cattle and wildlife. Other recommendations in the TMDL report were to revegetate the riparian corridor with willow plantings and grass seeding using a Critical Area Planting method as outlined by the National Resources Conservation Service. These plantings could be supplemented with sprinkler irrigated water until they took hold on the established banks and stream course. The plantings on the upland areas beyond the stream corridor could be sprinkler irrigated until the root systems were established. These plantings would help protect the erosive soils and act to dissipate stream energy during critical flow. A Riparian Restoration Implementation Plan was created to identify locations for vegetative plantings and stream structures necessary to meet water quality objectives, and willows were planted in strategic locations along the creek. An additional recommendation was a sprinkler irrigation system combined with a pipe to line the irrigation ditch to increase irrigation efficiencies and allow for more water to stay in the stream and thus increase the stream-flow year round. Combined with other projects and aspects of implementation, these tools would allow for effective revegetation and removal of cattle and wildlife from the stream course for the majority of the year by creating more forage in the managed rangeland and an alternative water source created from the groundwater wells. So, Jim laid pipe in his earthen ditches (see photo at right). Part of the irrigation water flows into a 250,000-gallon water tank salvaged from a nearby sawmill. The tank allows him to collect water slowly, leaving more water in stream for habitat during dry times while continuing to supply his sprinkler irrigation guns, which he installed to irrigate pastures and riparian vegetation. Sprinklers operate more efficiently than the flood irrigation they replaced, and the reduced return flow is less likely to erode soil into the channel. Another recommendation was to remove rabbitbrush and re-seed with grasses to create more forage for cattle, to reduce their reliance on the vegetation of the stream corridor, and to allow for their removal from the riparian corridor with the use of fences and altered range management. This is what Jim has done. From a watershed standpoint, the removal of rabbitbrush and re-introduction of grasses improved species diversity and composition. Also, the grasses provide a more stable root mass than the rabbitbrush, thus increasing the soil stability of the rangelands and decreasing the amount of sediment contributed from sheet flow and wind erosion over these rangelands. The TMDL plan also recommended monitoring because it is an important tool in decision making. The ADEQ periodically monitors turbidity levels on the ranch. Recent data indicate that turbidity is not increasing with high water events, as in the past. In addition to lowering turbidity, conservation practices are improving water quality, riparian habitat, and ranching economics. Elk use, fish, and other wildlife are also being monitored, as is vegetation. Another recommendation of the TMDL report was outreach. This would be important in helping others interested in implementing conservation practices to improve water quality, wildlife habitat, and ranching economics. Jim has been featured in a number of newspaper and magazine articles, and he hosts tours of his ranch. His web site has a wealth of useful information about riparian area management and obtaining grants to fund projects. You can visit it at http://www.ECBarRanch.com. What about the ranching end of all these conservation improvements? Have they made a difference in Jim’s cattle operation? He made a strategic decision not follow the local custom of having a cow-calf operation. Restrictions of public land grazing allotments are forcing ranchers to increasingly graze their cattle on private lands, but the private land base cannot support large enough operations to be financially viable. Jim found that a yearling operation fit his situation very well. He buys as many as 300 weaned calves in September at lower prices, grazes them on the grass that he produced over the summer, and sells them 200 pounds heavier from January to March when cattle prices are higher. He also avoids the labor and expense associated with breeding, calving, and year-round animal maintenance. |Nutrioso Creek after| As a result of Jim’s stewardship and the support he has received from public agencies, the entire 2.5 miles of riparian corridor on the ranch has improved to an upward trend with some places now in proper functioning condition, with stable wetland habitat and abundant forage for dormant season grazing. As Jim sees the future, the spinedace will recover so it can be delisted, water quality in Nutrioso Creek will improve to the point that the creek will no longer be classified as impaired, more grass will grow along the creek, and he can fatten more cattle. Everybody wins.
<urn:uuid:60c6c90b-c89f-416f-aef8-dc9090bb2633>
CC-MAIN-2023-50
https://coloradoriparian.org/2003/04/25/ec-bar-ranch-conservation-projects/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.965362
1,895
2.953125
3
EVERY BODY'S ENERGY THE MOST IMPORTANT SUPPLEMENT YOU CAN TAKE Creatine exists in all cells. It's like a battery that powers your body's cellular energy and renewal. Your body craves creatine, but it only produces 50% of what is needed for optimal cellular energy and performance. DECADES OF FITNESS WISDOM, NO LONGER A SECRET WHY CREATINE HCl? FREQUENTLY ASKED QUESTIONS ASK THE FOUNDER CON-CRĒT® Founder and creator Mark Faulkner answers your most frequently asked questions. As the former head of a forensic toxicology lab, Mark has countless years of experience in the health and wellness industry. Creatine is nitrogenous organic acid which naturally occurs in vertebrates and helps to supply energy to muscle and all cells of the body. It’s a compound that’s involved in the formation of adenosine triphosphate (ATP) – the body’s universal energy molecule. Creatine is made in the liver of the human body but is produced to fulfill only approximately half of the daily creatine required by the body. It is biosynthesized from three different amino acids - arginine, glycine, and methionine. The balance of required creatine is taken in by nutritional food sources in the daily diet, mainly from meat (although much of it is destroyed by cooking). Approximately 95% of the body’s creatine ends up being stored in the skeletal muscles, and the remaining 5% is found in brain, heart, testes, inner ear, hair cells and other organs and cells. Once it's used in the formation of ATP, creatine is converted to creatinine and is excreted by the body. When you consume food, your body absorbs the nutrients like glucose to provide fuel for your cells to operate. When your body absorbs glucose, it undergoes glycolysis to convert the glucose to cellular fuel in order to energize your body. Following glycolysis, your body begins the Krebs cycle (also known as the citric acid cycle), which serves as the main source of energy for your cells. The Krebs Cycle produces many molecules for your body but one of the most significant of these molecules is ATP (Adenosine triphosphate) which is the body’s universal energy molecule used to power all cells. Once ATP is used/burned by the cells, the bi-products are ADP (Adenosine diphosphate) and a loose phosphate. In order to “recycle” the ATP and thereby further energize your body’s cells (because the Krebs Cycle can’t make more ATP fast enough), creatine molecules pick up the loose phosphates and reattach them to ADP to quickly regenerate ATP, thus providing your cells with additional energy. Yes. Creatine has countless benefits for your entire body as the molecule works to energize all your body’s cells. It is absolutely needed and used by every cell in the body! Creatine helps support your immune system, improve brain function, and provide a stimulant free energy source for your whole body. CON-CRĒT® Patented Creatine HCl is the #1 bioavailable creatine with 59X greater solubility and 70% greater plasma uptake than standard creatine (see below). Backed by 8 US Patents, CON-CRĒT® is also the only micro-dosing creatine and is thereby able to avoid any of the unpleasant side effects normally caused by other forms of creatine. Because CON-CRĒT® is concentrated creatine, there is no bloating, water retention, cramping or other digestive issues when used as directed. CON-CRĒT® has proven to be the most soluble and potent creatine on the market and was proven in multiple academic studies to be at least 59X more soluble* than creatine monohydrate. This is significant because creatines vary in performance largely based on solubility. And the reason solubility is crucial is that when you increase creatine solubility (the ability to dissolve), you enhance creatine delivery (absorption into body and ultimately into the muscles). Solubility is important – while there are significant studies that examine the percentage of water in the human body, it is widely agreed that the typical male has approximately 69% of their body mass comprised of water. For females, this number is approximately 55% (due to the higher proportion of body fat). Obviously, water is a critical component of life, and instrumental in maintaining health and wellness. These facts point to the significance of CON-CRĒT being soluble and stable in water. The essence of solubility importance lies in the fact that for creatine to be absorbed into the bloodstream and penetrate the muscles, it must be soluble. Solubility is a critical factor in the absorption of creatine and its efficacy. As referenced above, this also ends up being related to bioavailability and plasma uptake. The findings of research conducted with two major universities and performed by testing blood plasma in human subjects after oral dosing were presented at the ISSN Conference in June 2009. The results of this second study showed convincing evidence of a significant improvement in plasma uptake with creatine hydrochloride. In the study, CON-CRĒT demonstrated up to 70% increase** in plasma uptake compared to creatine monohydrate (CM). These results reinforced the notion that CON-CRĒT is the most readily absorbed creatine form available. This fact is the reason that CON-CRET does not require loading of large initial doses or cycling on and off the supplement. CON-CRET is available in powder and capsule forms, and each serving of CON-CRĒT is equivalent to the potency of over 3 – 5 grams of creatine monohydrate. * CON-CRĒT has repeatedly shown to have at least 59X greater aqueous solubility than creatine monohydrate when stirred for 2 minutes or less (See website for study summary. Research on file.) ** CON-CRĒT was shown in this double blind, placebo-controlled, balanced crossover study to have an FDA bioequivalence of up to 70% greater plasma uptake when assessing area under curve (AUC) calculations at various time intervals post dosing (See website for study summary. Research on file.) No. Because CON-CRĒT® Creatine HCl is concentrated creatine and has far superior uptake to other forms of creatine, there is no need to load or cycle the product. You simply use it according to directions for improved performance and health. Due to its superior bioavailability and rapid absorption, individuals can see and feel the benefits of creatine in as little as 1-3 workouts. OUR COMMITMENT TO YOU To provide innovative and science-backed products every-body needs for optimal health and wellness. MADE IN THE USA CON-CRĒT's plant in Plattsmouth, Nebraska is the first and only creatine manufacturing plant in the United States of America. NSF CERTIFIED FACILITY CON-CRĒT is certified by the National Sanitation Foundation, ensuring adherence to strict standards, testing, and procedures set and enforced by the NSF in order to protect public health and provide the safest possible product. GMP CERTIFIED FACILITY CON-CRĒT is a certified Good Manufacturing Practice brand, so you can be confident that it is a safe, clean product that is made with the upmost care and precision. SAFE QUALITY FOOD CERTIFIED CON-CRĒT is certified for the safe quality food program by the NSF which helps reduce variation in the manufacturing process and ensure safe, quality food products through all stages of production.
<urn:uuid:2121f664-1890-4c8a-be29-4905bec6549d>
CC-MAIN-2023-50
https://con-cret.com/products/con-cret%C2%AE-patented-creatine-hcl%C2%AE-capsules
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.933104
1,627
2.625
3
“… if constitutionally we elect a President, and therefore you undertake to destroy the Union, it will be our duty to deal with you as old John Brown has been dealt with.” – Abraham Lincoln, December 3, 1859 John Brown had been hanged for treason on December 2, 1859. Brown had lead a raid on the federal arsenal in Harper’s Ferry, Virginia on October 16. Brown and his group had intended to secure weapons to arm slaves for a revolt against their masters. The United States Marines, commanded by Colonel Robert E. Lee captured the raiders, foiling the plan. On November 2, Brown received his death sentence.
<urn:uuid:7e5f6f97-9ef0-4413-baf5-093a96cc9243>
CC-MAIN-2023-50
https://constitutingamerica.org/tag/perpetual-union/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.983654
136
2.890625
3
This paper reviews different methods for measuring iron absorption by using stable or radioisotopes. Methods using stable isotopes are of special interest because of the absence of radioactive exposure. The oldest method is fecal monitoring, which has two drawbacks: the necessity of obtaining a complete collection of the unabsorbed isotopes and sample inhomogeneity. The plasma iron tolerance test seems to be a promising method, although interfering factors should be taken into account, such as gastrointestinal transit time and rate of entry of iron from the gastrointestinal mucosal cell into the bloodstream. The method of choice for measuring iron absorption seems to be the analysis of the incorporation of both an orally and an intravenously administered stable iron isotope into erythrocytes. The only disadvantage of this method is the rather large amount of stable isotopes required. This may be overcome by measuring incorporation of the isotopes into a reticulocyte-rich erythrocyte fraction.
<urn:uuid:c5efb972-f68c-4c44-8004-1ae3d80ffde1>
CC-MAIN-2023-50
https://cris.maastrichtuniversity.nl/en/publications/methods-to-measure-iron-absorption-in-humans-a-review
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.926227
189
3
3
How to contact Canadians the right way Download this guide in PDF. This Guidebook is for general information only. You should always seek independent legal advice for any specific problem or issue. Respecting Citizens’ Rights Democracy depends on well-informed voters making sound decisions about the individuals and political parties they choose to represent them in Parliament. Those seeking office have access to a vast array of communications methods to connect with potential supporters to explain their personal motivation and platforms during election campaigns. However, the desire to connect with voters must be tempered with respect for Canadians’ privacy and the protection of their right to refuse to be contacted by individuals or political groups if they so choose. During an election campaign, political candidates and parties and their supporters are obliged to follow certain rules related to contacting Canadians, some of which are enforced by the Canadian Radio-television and Telecommunications Commission (CRTC): - Voter Contact Registry: Certain entities must register with the CRTC if making telephone calls to Canadians during an election period. - Unsolicited Telecommunications Rules: Any unsolicited calls made by or for political groups must respect certain CRTC rules. - Canada’s Anti-Spam Legislation (CASL): Individuals and organizations must make sure that text messaging and other forms of commercial electronic messages respect Canada’s Anti-Spam Legislation. Voter Contact Registry The Canada Elections Act and the Telecommunications Act were amended in 2015 to help protect Canadians from rogue and misleading telephone calls during elections. The legislation ensures that those who contact voters during an election do so transparently. The Canada Elections Act and the Telecommunications Act give the CRTC the responsibility to establish, maintain and enforce a Voter Contact Registry. What these terms mean: Calling Service Provider - a person or group that carries on a business whose activities include making calls for, or on behalf of, another individual or group. Automatic Dialing-Announcing Device (ADAD) - any equipment with the ability to store or produce telephone numbers used alone or in conjunction with other equipment to deliver a pre-recorded or synthesized voice message to telephone numbers. Voter Contact Calling Services - Calls made during an election period, including: - promoting or opposing a registered party, its leader, a candidate or a nomination contestant or any position on an issue with which such a party or person is associated; - encouraging electors to vote or to refrain from voting; - providing information about the election, including information about voting hours and the location of polling stations; - gathering information about how electors voted in past elections or will vote in the election, or their views on a registered party, its leader, a candidate or a nomination contestant or any other issue associated with a party or person; and, - raising funds for a registered party, a registered association, a candidate or a nomination contestant. Third Party – a person or a group, other than a registered party, registered association, candidate or nomination contestant. Planning to make calls through a calling service provider? Specific rules apply when you enter into an agreement with a calling service provider to make voter contact calls. If you have hired the services of one of these firms to make such calls – either live or through an automatic dialing-announcing device (ADAD) – you must provide the calling service provider with your name, address, telephone number, along with a copy of a piece of identification authorized by the CRTC. If you have a general agreement with a calling service provider who makes calls on your behalf, that provider can make voter contact calls provided you specifically authorize it to begin making them before the first one is made. At that time, you will need to provide your name, address and telephone number, along with a copy of a piece of identification authorized by the CRTC. Before the first call is made, you must authorize the calling service provider to begin making voter contact calls. At that time, you will need to provide your name, address and telephone number, along with a copy of a piece of identification authorized by the CRTC. For more information on the types of authorized ID accepted by the CRTC, please consult Compliance and Enforcement Information Bulletin CRTC 2015-110. Who needs to register? If you are making calls to Canadians during a federal election period for any purpose related to an election, you may have to register with the CRTC within 48 hours of making the first call. Text description for infographic Political entities, including candidates and political parties, corporations, trade associations and other persons or groups using calling service providers to make voter contact calls, either live or using an automatic dialing and announcing device (automatic dialer), will need to register with the CRTC. The calling service provider will also need to register. In addition, anyone using their own internal services to make voter contact calls using an automatic dialer will have to register with the CRTC. With the exception of third parties who are corporations or groups, those who make live voter contact calls using their own internal services will not have to register. Who needs to register? - Anyone using ADADs to make robocalls to contact voters. - Anyone using a calling service provider to contact voters. - Calling service providers who contact voters on behalf of someone else. - A third-party group or corporation that uses its internal telephone services to make live calls to voters. Who does NOT need to register? You are one of the following: - A candidate - A nomination contestant - A political party - An electoral district association - An individual AND you are using your own internal services to make live calls to voters. How to register Those required to register with the Voter Contact Registry can do so online with the CRTC once a federal election is called at crtc.gc.ca/eng/phone/rce-vcr/. Registrants must do so within 48 hours of making the first call. All registrants must have login credentials. You can either: - Log in with a Sign-In Partner User Identification (ID) and password you may already use, such as for online banking; or, - Log in with GCKey (Government of Canada User ID and password). If you do not already have a GCKey, you will be able to create one once you begin the registration process. Registration involves two components: - Information necessary to file a registration notice - ID requirements Information necessary to register All registrants must provide the following: - First and last name - Email address - Phone number - Mailing address - Type of calls being made (live, by ADAD or both) If you have entered into an agreement with, or you are a calling service provider, you will need to provide additional information: - Name of the calling service provider; - First and last name of the person or name of the group that has entered into an agreement with the calling service provider. Calling service providers do not have to provide a copy of identification when filing a Registration Notice. All other registrants must provide a copy of a valid piece of identification issued by a federal, provincial or territorial government, or international equivalent. It must include the registrant’s name and photo, and be accompanied by an attestation from a notary (or a Commissioner of Oaths in Quebec) certifying that the reproduction of identification in question is a true copy of the original. Acceptable types of ID include: - Driver’s licence - Provincial health card - Secure Certificate of Indian Status - Canadian Forces identity card - Permanent residency card - Valid Canadian or foreign passport - NEXUS card Please see Compliance and Enforcement Information Bulletin CRTC 2015-110 for more information on ID requirements for the Voter Contact Registry. The copy of your identification and attestation must be in one of the following file formats: The maximum size allowed for each file is 5Mb. Publishing Registration Notices In accordance with the new provisions of the Canada Elections Act, the CRTC is required to publish registration notices promptly, but no later than 30 days after polling day. Notices will now be published regularly. You have an obligation to keep records of every telephone number called, copies of any scripts used for live calls as well as recordings of each message conveyed by an ADAD. A record must also be kept of every date the script or message was used. If you are a calling service provider, you must maintain copies of the scripts for three years following an election. Everyone else [e.g persons, groups or third parties] must keep the scripts for one full year after the end of the election. Rules for Unsolicited Telecommunications made by or on behalf of political entities When making unsolicited calls, there are rules regarding unsolicited telecommunications that need to be followed. The rules are covered under the Telemarketing Rules and the Automatic Dialing-Announcing Device (ADAD) Rules. Some of these rules apply to political parties or candidates, or organizations that represent such parties or candidates. Political entities such as political parties, riding associations and candidates are not subject to the National Do Not Call (DNCL) Rules. This means that they can make calls to individuals who are registered on the National DNCL, provided they maintain and respect their internal do not call list and identify themselves and the purpose of the call. The Telemarketing Rules apply to calls that are made for the purpose of solicitationFootnote 1. For example, certain rules apply when a political party or candidate, or an organization representing such a party or candidate, calls people to request campaign donations. However, if a political party, a candidate or an organization representing such a party or candidate calls people to learn about voter preferences or to inform people about the location of polling stations, the rules do not apply. What are my obligations under the Telemarketing Rules? - The call must begin with a clear message identifying: (1) the name of the individual making the call, (2) the name of the telemarketer and (3) the name of the political organization on whose behalf the call is made if it is different from the telemarketer’s name. - Telemarketers must provide a local or toll-free number, when requested, where citizens can access an employee or another representative of the telemarketer to ask questions, offer comments about the call or make a do-not-call request. The name and email or postal address of an employee or another telemarketer representative must be provided, upon request. The contact information must remain valid for a minimum of 60 days. - The screen on the called-person’s phone must display a number where the telemarketer can be reached, unless number display is unavailable for technical reasons. The contact information must remain valid for a minimum of 60 days. - Every telemarketer or its client must maintain an internal do-not-call list, and refrain from calling anyone who has requested no further calls. Telemarketers must process do-not-call requests immediately. Telemarketers or their clients must update their internal do-not-call lists within 14 days of consumers’ do-not-call requests and keep numbers on the lists for three years. - Sequential dialing, which involves calling every possible phone number in a telephone exchange drawn from a computer-generated list of numbers, is prohibited. - Calls must not be made to emergency lines or healthcare facilities. Calls made by or on behalf of certain political entities such as political parties, candidates or nomination contestants and their official campaigns are not allowed to use ADADs for the purpose of solicitation. The only exception to this rule is if the person being called has expressly agreed to receive that specific political entity’s ADAD solicitation calls. ADADs can be used to make calls that are not to solicit donations, but certain rules apply to these calls. What are my obligations under the ADAD Rules? - ADAD calls must begin with a clear message identifying the person or group on whose behalf the call is being made. The message must also: - briefly describe the purpose of the call; - include an email address or a postal mailing address and a local or toll-free number where representatives of the organization sending the message can be reached. The numbers and addresses must be valid for at least 60 days after the call has been made. - If the ADAD message is longer than 60 seconds, the identification information must be repeated at the end of the call. - The screen on the called-person’s phone must display the originating calling number or an alternate number where the political organization can be reached, except where number display is unavailable for technical reasons. This contact information must remain valid for 60 days. - Anyone initiating automated calls must make all reasonable efforts to ensure that the equipment disconnects within 10 seconds after the person receiving the call hangs up - Calls can only be made from 9:00 a.m. to 9:30 p.m. on weekdays (Monday to Friday) and 10:00 a.m. to 6:00 p.m. on weekends (Saturday and Sunday) unless individual provinces or territories impose more restrictive hours. - Sequential dialing is prohibited. - Calls must not be made to emergency lines or healthcare facilities. Canada’s Anti-Spam Legislation Telephone calls are just one way to reach to out to potential voters. A wide array of technological tools are available to individual candidates and political organizations – some of which are subject to specific rules enforced by the CRTC. Canada’s Anti Spam Legislation (CASL), for instance, may apply to some communications that might be undertaken during an election. CASL has rules regarding commercial electronic messages (CEMs). A CEM is a message that encourages participation in a commercial activity, including, but not limited to offering, advertising or promoting a product, a service or a person. - SMS text message - Instant messaging Political parties and candidates are largely excluded from CASL. CEMs sent by or on behalf of a political party or a person who is a candidate for publicly elected office, are excluded from CASL, if the primary purpose of the CEM is to solicit a financial donation or non-monetary contribution. If you are sending a CEM to an electronic address, and the primary purpose of the message is not to solicit a contribution/donation, then you need to comply with three requirements. You need to: - obtain consent; - provide identification information; and - provide an unsubscribe mechanism. Further information on CASL and how it may apply to political parties and candidates can be found at crtc.gc.ca/eng/internet/anti.htm . What happens if you violate these obligations? An important part of the CRTC’s strategy to encourage compliance with the rules is ensuring that political entities such as political parties and candidates have the information they need to understand their obligations. The CRTC’s goal is to promote compliance in the most efficient way possible while preventing violations. When the rules are broken, the CRTC has a number of tools at its disposal to make sure that the obligations governing communications with Canadians during elections are respected and their rights protected. Investigators use their discretion in selecting and applying the enforcement response most appropriate to the circumstances at hand. Possible enforcement responses include: - A Warning Letter, to bring to the attention of the individual or organization an alleged violation in order for corrective action to be taken; - A Citation, which identifies alleged violations and sets out the specific corrective action to be taken within a certain time frame. The names of individuals and organizations that receive a Citation are published on the CRTC’s website; - A Notice of Violation, which is an enforcement measure issued for more serious violations. It may carry with it an administrative monetary penalty. The Notice is published on the CRTC’s website; and, - A Negotiated Settlement or Undertaking. When an investigation identifies violations and specific actions by a business or individual are required to restore compliance, CRTC staff may contact the affected party to discuss and negotiate a settlement. As part of the agreement, the individual or organization is usually required to admit liability, stop violating the rules and develop a compliance program. Negotiated Settlements in relation to the Unsolicited Telecommunications Rules also usually involve the individual or organization accepting the issuance of a Notice of Violation along with an administrative monetary penalty. Negotiated settlements can be an effective option for organizations that have breached the rules, as they save time and reduce costs while achieving compliance. Monetary penalties vary depending on the nature and scope of the violation. Under the Telecommunications Act, for violations of the Unsolicited Telecommunications Rules and/or the Voter Contact Registry requirements, the CRTC has the authority to impose: - Up to $1,500 per violation for individuals - Up to $15,000 per violation for a corporation The maximum administrative monetary penalties are significantly higher in the case of a CASL violation. The CRTC has the authority to impose a maximum penalty of $1,000,000 per violation in the case of an individual and $10,000,000 per violation in the case of a corporation or any other person. For violations under the Voter Contact Registry, the following factors will be taken into consideration when determining the amount of a fine: - The nature and scope of the violation; - Any benefit that the person obtained from the commission of the violation; - The person’s ability to pay the penalty; - The person’s history of compliance with the requirements of the Voter Contact Registry and any relevant history of compliance with the Rules; and - Any other relevant factor. The total amount of the financial penalties can add up quickly. For instance, each day of non- compliance may constitute a separate violation. Please refer to Compliance and Enforcement Regulatory Policy CRTC 2015-109, for further detail. Find out more If you are looking for information about how to register with the Voter Contact Registry or how to make sure you comply with the rules, you can find helpful information at: You can also get information on the other obligations that may apply to political organizations during election periods at: - Telemarketing and ADAD Rules - Canada’s Anti Spam Legislation: crtc.gc.ca/eng/internet/anti.htm or fightspam.gc.ca - Date modified:
<urn:uuid:4599401b-182c-4405-aecb-ae25cf7973bc>
CC-MAIN-2023-50
https://crtc.gc.ca/eng/phone/rce-vcr/guidepol.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.922929
3,835
2.609375
3
Who doesn’t like good, glowing skin? For sure, everybody does! Achieving good healthy skin is not only through applying skincare products on the outside but also by making sure that you consume the right things for your health on the inside. For many Asians, this healthy living means drinking Pu Erh Tea. In general, teas possess a lot of health advantages. However, it is essential to note that not all teas are made equal – especially Pu Erh Tea. A post-fermented tea, Pu Erh, is not just any other tea. For thousands of years, Pu Erh has been utilized in Asia for various purposes, including detoxification of toxins in the body that results in better and healthier-looking skin. So, if you are curious why many people have highly used Pu Erh for improving the skin, then this article is made for you! Keep on reading to know how and what are the skin benefits of drinking Pu Erh Tea. What is Pu Erh Tea? Pu Erh tea is a tea made initially in Yunnan, China. Ancient People greatly preferred Pu Erh tea during the Eastern Han Dynasty because it ferments and does not spoil even after lengthy travels. With that, Pu Erh tea is a fermented tea that ages just like wine as time goes by. Pu Erh tea is produced from the stems and leaves of Camellia sinensis. The parts of this plant are harvested and processed through different stages of rolling, sun drying, fermentation, and oxidation. These distinct processes produce the two types of Pu Erh tea: Raw Pu Erh, also known as Sheng, and Ripe Pu Erh, also known as Shou. Unlike Raw Pu Erh, which is simply pressed into tea blocks or tea cakes, ripe Pu Erh undergoes an accelerated aging or fermentation process known as wet-piling. The Science Behind Pu Erh Tea's Skin Benefits There are several factors affecting skin health, particularly skin aging. These factors include breakdown and reduction in extracellular matrix, environmental and oxidative stress, and decrease in the skin's natural defense. Pu Erh tea is made from the stems and leaves of Camellia sinensis found in Yunnan, China. A study by Bonte et al. in 2016 examined the chemical and physical properties of Camellia sinensis leaves for the possible application in the skincare and cosmetic industry. The study revealed that the ancient plant contains a significant amount of polyphenol compared to other tea like green tea. In addition to that, Pu Erh also includes more specific catechins and catechin oligomer compositions that are vital in protecting the skin's structural integrity. These compounds are essential in maintaining Elastin, the primary protein altered in skin aging. The loss of biomechanical properties of the skin in aging is due to the deterioration of Elastin, and Pu Erh has the potential to combat such a harmful process. Also, the study conducted by Bonte et al. in 2016 has revealed that the Pu Erh has a high concentration of Heme Oxygenase enzyme. This enzyme is known to have cellular protective effects against oxidative damage to maintain the healthy function of skin tissues. The cellular expression of the enzyme is also directly linked to pollution exposure. The study showed that Pu Erh extracts have protective effects on cells exposed to toxins. Such findings are evidence relating to the potential detoxifying and protective properties of Pu Erh to the skin. Furthermore, a study by Zhang et al. in 2012 has isolated eight compounds from the water extract of Pu Erh tea. These compounds were identified as gallic acid, (+)-catechin, (−)-epicatechin, (−)-epicatechin-3-O-gallate, (−)-epigallocatechin-3-O-gallate, (−)-epiafzelechin-3-O-gallate, kaempferol, and quercetin. These compounds were then studied for their intrinsic activity against oxidative stress and damage. The study showed that the compounds' antioxidative activities were significantly higher than Vitamin C, with quercetin having the highest protective ability. This finding suggests that Pu Erh tea is an excellent source of natural antioxidants which can help combat the signs of skin aging and promote better and healthier skin. In addition, it has been already proven by studies, such as that of Su et al. in 2011, that Pu Erh has antibacterial activity against a wide range of pathogens, including E. coli. Today, more studies are being conducted on the potential application of Pu Erh tea in reducing the incidence of acne formation and managing its complications. How to Prepare Pu Erh as part of your skin regimen? Now that you know the effects of Pu Erh on your skin health, you are ready to prepare and incorporate Pu Erh tea into your skin regimen. You must note that Pu Erh tea is sold either as in compressed tea leaves in tea cakes or blocks or sold as loose tea leaves. About one teaspoon of leaves is needed in every cup of 150 ml of water. Conventionally, you can make a Pu Erh tea utilizing a Yixing teapot and a Gaiwan tea set. However, you can use whatever teapot you have at home to brew the Pu Erh leaves in modern times. To brew Pu Erh leaves, here’s what you should do: - Get the right amount of loose-leaf Pu Erh. If you have a compressed Pu Erh tea cake instead of the loose one, use a tea needle or a small pick or spoon to remove about 4 grams of Pu Erh for every 8 ounces of water. - Put your Pu Erh tea leaves in a tea infuser. You can also utilize a tea kettle with an already installed infuser or a tea basket or pincer infuser, and an ordinary kettle. - You should rinse the Pu Erh tea leaves with a small amount of hot water. After that, you should swirl the hot water around the Pu Erh leaves for a few seconds, then discard the hot water. - After rinsing the Pu Erh tea leaves, heat the water in the tea kettle until the water temperature reaches about 195 degrees Fahrenheit. - After heating the water, pour it into a teacup and place the tea infuser with the loose Pu Erh tea leaves in the cup. You must not use Boiling water because it can cause some bitterness in the flavor of the Pu Erh tea. - Generally, the steeping time of Pu Erh tea is about 3 to 5 minutes. However, to find your preferred flavor, you can steep for two minutes and taste the Pu Erh tea every 30 seconds. Once your preferred taste has been achieved, you can then stop steeping. Now, you can enjoy the Pu Erh tea drink before, during, or after applying your skin care! Pu Erh tea has been consumed for thousands of years, definitely for every right reason. Pu Erh tea has several health benefits, including promoting skin health and combating signs of aging. With studies proving that Pu Erh tea has many antioxidative and protective effects on the skin’s cellular level, it is just really right to incorporate drinking Pu Erh tea on your skincare regimen! - Bonte, Frederic; Ulrichova, Jitka; Saladin, Regis (2016). Skin Antiaging and Detoxifying Properties of Ancient Tea Forest Pu’er Tea. Free Radical Biology and Medicine, 100(), S80–.doi:10.1016/j.freeradbiomed.2016.10.198 - Dr. Axe. 2019. What Is Pu-Erh Tea? Plus, 9 Benefits of This Lesser-Known Tea. Retrieved from: https://draxe.com/nutrition/pu-erh-tea/. Retrieved on 11 March 2022. - Healthline. 2020. Pu-erh Tea: Benefits, Dosage, Side Effects, and More. Retrieved from: https://www.healthline.com/health/food-nutrition/pu-erh-tea-benefits#dosage. Retrieved on 11 March 2022. - Roda G, Marinello C, Grassi A, et al. Ripe and Raw Pu-Erh Tea: LC-MS Profiling, Antioxidant Capacity and Enzyme Inhibition Activities of Aqueous and Hydro-Alcoholic Extracts. Molecules. 2019;24(3):473. Published 2019 Jan 29. doi:10.3390/molecules24030473 - Su Y, Zhang C, Wang Y, Li P. Antibacterial property and mechanism of a novel Pu-erh tea nanofibrous membrane. Appl Microbiol Biotechnol. 2012 Feb;93(4):1663-71. doi: 10.1007/s00253-011-3501-2. Epub 2011 Aug 20. PMID: 21858494. - WebMD. 2020. Pu-Erh Tea - Uses, Side Effects, and More. Retrieved from: https://www.webmd.com/vitamins/ai/ingredientmono-1169/pu-erh-tea. Retrieved on 11 March 2022. - Zhang HM, Wang CF, Shen SM, et al. Antioxidant phenolic compounds from Pu-erh tea. Molecules. 2012;17(12):14037-14045. Published 2012 Nov 27. doi:10.3390/molecules171214037
<urn:uuid:6b494736-885f-4507-9de1-225ccce3e7d6>
CC-MAIN-2023-50
https://cspuerh.com/en-gb/blogs/news/the-skin-benefits-of-drinking-pu-erh-tea
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.926611
2,004
2.53125
3
Developing new drugs takes time and money, which is why repurposing existing ones to fight coronavirus makes so much sense. THEO PANAYIDES speaks to a local scientist involved in a study showing how successful a prostate cancer drug could be Like most people, I spend an unhealthy amount of time reading about Covid-19 and trying to understand it – especially as regards early treatment with repurposed (i.e. already existing) drugs, which is surely the most neglected part of our pandemic response. I don’t often find a Cyprus connection in my reading, in fact I never do. After all, we don’t even have access to ivermectin (the most high-profile repurposed drug) on this sad little island. A couple of weeks ago, however, I was reading an account of a clinical trial which took place in Brazil from October to December last year. The article – provisionally accepted in the peer-reviewed journal Frontiers in Medicine – is titled ‘Proxalutamide (GT0918) Reduces the Rate of Hospitalization for Covid-19 Male Outpatients: A Randomized Double-Blinded Placebo-Controlled Trial’. The results of the trial are rather stunning. The participants were men (their sex is relevant, as we’ll see later) who had been diagnosed with Covid but weren’t yet hospitalised, being in those first few days of the disease when people stay at home taking Panadol and ‘watchfully waiting’ (i.e. doing nothing), after which most recover but some deteriorate sharply. To quote from the article: “A total of 268 men were randomized in a 1:1 ratio. 134 patients receiving proxalutamide and 134 receiving placebo… The 30-day hospitalization rate was 2.2 per cent in men taking proxalutamide compared to 26 per cent in placebo”. That’s a 91 per cent reduction (35 people went to hospital from the control group, only three with proxalutamide), a massive gain for any health system – especially in Brazil, where hospitals are currently swamped. The article has 14 authors from various countries, credited along with their affiliations – and, going down the list, I was pleasantly surprised to find Andrija Stanimirovic whose credit reads: “School of Medicine, European University Cyprus”. Professor Stanimirovic – as he explained to the Cyprus Mail in a Zoom call from Zagreb – is actually based in Croatia, but he is indeed an Adjunct Professor at our own European University and comes to Nicosia two or three times a year. He’s also part of a large group of researchers from various countries who share expertise on various matters – albeit mostly “investigations for vitiligo, psoriasis and other skin diseases”. The group are not, by and large, infectious disease specialists; in fact they’re mostly dermatologists, which is also Stanimirovic’s own specialty. Their involvement with Covid-19 began last year, when one of their number (Prof. Vano-Galvan in Madrid) made the observation that not only were more men than women being struck with Covid, but there also seemed to be a correlation between severe illness and “androgenetic alopecia”, commonly known as male-pattern baldness. Given that baldness reflects high testosterone levels (and also taking into account the fact that prepubescent kids hardly ever suffer severe Covid), it made sense to conclude that male hormones known as androgens play a part in the disease – especially since coronavirus has been proven to affect so-called pneumocyte (Type II) cells in the lungs, whose receptors are also among the pathways for androgens. Enter the medicines known as anti-androgens, used primarily to treat prostate cancer. Bicalutamide, “a very old anti-androgen”, showed good results – and now comes proxalutamide, which has also shone in a couple of other trials. (It should be noted that Stanimirovic and most of his fellow dermatologists weren’t directly involved in collecting clinical data, playing an advisory role in preparing the study; the research was led by principal investigator and ‘guiding spirit’ Prof. Andy Goren, from Applied Biology Inc, USA.) Proxalutamide is technically a repurposed drug, having been originally registered for prostate cancer – but it’s also a new drug, since it was only registered in 2014 and hadn’t been fully trialled, pre-pandemic. The time-lag is not unusual, after all “to develop a drug for a disease, from scratch, you need on average three to 12 years and it costs approximately – for a severe disease – $2 billion”. This is actually one of the biggest problems we’ve faced in the past year. Developing new drugs for Covid-19 takes time and money – but, since repurposed drugs are old, cheap and already known to be safe, using them wouldn’t make money for pharmaceutical companies and actually gets in the way of producing new drugs. The tragic result is that, even though dozens of drugs are potentially effective against Covid-19 – and have been since Day One – they’ve largely been ignored and even demonised. “Let me speak about how to fight against the pandemic,” says Stanimirovic, who has a Master’s in Public Health and has also treated Covid patients in Croatia. “You always have three ‘legs’. The first leg is protective measures, like wearing masks, disinfection and social distancing. No. 2 is vaccination, of course. If you can vaccinate 70-80 per cent of the population, then you can prevent the virus.” In reality, however, many people can’t be vaccinated – or may harbour reasonable doubts about current vaccines – “so number three, proper medications, is a must”. Stanimirovic is not anti-vaccine, and has had both shots himself – but the two solutions, vaccines and early treatment, aren’t mutually exclusive. “We must combine all possible weapons to fight the pandemic”. Indeed, he muses, “at the end of the day, I think that one of the medications will resolve the situation, not vaccination”. Isn’t the vaccine the most efficient solution, though? “Vaccination is efficient – but, you know, we have new strains. Now you have the delta strain, in South America you have the lambda strain. The virus will mutate, we’ll have to vaccinate ourselves every year with maybe trivalent or quadrivalent vaccines. We cannot predict the biological behaviour of the virus.” The future may well lie in nasal sprays, of the kind now being developed in Russia, Israel and the US, which would inhibit coronavirus from even entering the body. “I think they can resolve the pandemic much better and in a much more, let’s say natural way than vaccination. And, if we combine vaccination and this, the story will be over.” Vaccines have one incontestable advantage over medicines, of course. They prevent you from getting sick in the first place (though nasal sprays and indeed some drugs, like ivermectin, also work prophylactically) – a vital point, since even non-hospitalised patients can develop the dreaded ‘long Covid’. On the other hand, what keeps being forgotten is that early treatment must come early, before the sickness can spread, robbing the virus of those crucial few days to replicate. “In the first two to five or six days of the disease,” instructs the professor. “If you wait seven, eight, 14 days and you have the cytokine storm, and you have a patient on a ventilator or with oxygen supply, [the drugs] are not so convincing”. Yet, throughout the past year, health authorities have preferred to do the opposite, letting patients deteriorate and only intervening when it’s almost too late. Even with proxalutamide, it’s worth noting that media attention has been quite selective. Reuters, for instance, published an article on June 23 (‘Experimental prostate cancer drug may improve Covid-19 survival’) – but the article doesn’t even mention the outpatient trial in which Stanimirovic participated. Instead it focuses on another trial, which also showed spectacular results but was carried out – significantly – on hospital patients. Indeed, the handful of repurposed drugs which have been approved in the past 16 months (dexamethasone, remdesivir) have been almost exclusively for hospital use. One may well conclude that Covid-19 is being deliberately pushed as a hospital illness, as opposed to an illness which almost everyone could fight at home, with medicines. One might also speculate (though Stanimirovic doesn’t actually say this) that keeping the focus on hospitals ratchets up fear and enables the taking of political decisions – especially restrictions and lockdowns, which are always being justified with reference to hospitals being inundated and the health system being close to collapse. Stanimirovic confirms, from his own practice, that many repurposed drugs also work for Covid – not just relatively fancy ones, like anti-androgens, but common everyday drugs. (Vitamin D is also helpful, and for instance the NHS now recommends high daily doses as prophylaxis.) “I have very good experience with famotidine,” he says, famotidine being a 35-year-old, over-the-counter drug used for gastritis and gastric ulcers which, “if taken very early”, can prevent deterioration in most Covid patients. “It’s practically free of side effects and very, very cheap”. And of course there’s ivermectin, the gold standard of repurposed drugs, its dozens of clinical studies collated last week in a meta-analysis by Andrew Bryant and Tess Lawrie in the American Journal of Therapeutics which, says the professor, proves its efficacy beyond any reasonable doubt. (His own experience bears this out, he adds.) “So it has finally been proven now, three days ago, that ivermectin is clinically efficacious. And I think it could change – in the rest of this year, and next year – the face of the global pandemic.” Is he being over-optimistic? Is he perhaps being naïve? After all, ivermectin (like most of the older drugs) is still officially blocked by the likes of the WHO and EMA. The chances of the Cyprus government approving it anytime soon – even alongside the vaccine – are practically nil, whatever some meta-analysis might say. “Cyprus behaves like the EU,” he sighs when I mention this, “they wait for approval from Brussels or Strasbourg. I understand, it’s the same in Croatia and elsewhere.” Our centralised, technocratic system, waiting for instructions from on high and stifling any initiative, may work smoothly enough in normal times – but it’s wildly unsuited to a crisis like a pandemic. “We have big problems, here in Croatia and in other countries, to make our health regulators understand that this is not a normal situation. You cannot wait three or four years!” Meanwhile, scientists use their expertise, try to think outside the box – and keep hoping that someone will listen.
<urn:uuid:d593f082-e76d-4462-9c98-9d3a069e46db>
CC-MAIN-2023-50
https://cyprus-mail.com/2021/06/27/all-weapons-needed-to-fight-the-pandemic/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.964671
2,492
2.59375
3
China has built a 9.5 m wide propellant tank, aiming to develop the Long March 9 rocket with a carrying capacity of 150,000 kg of cargo. China Institute of Launch Vehicle Technology (CALT) Announcing the successful production of a 9.5m diameter propellant tank, making the necessary progress to produce a fuel tank that is durable but also thin and light enough to be used for rocket launches, Space reported on July 7 . The fuel tank has a diameter of 9.5 m. The fuel tank has a diameter of 9.5 m. (Photo: CALT) The new fuel tank was built to the specifications of an older model Long March 9 rocket, which cannot be reused, according to China’s plans. They then moved on to a new reusable rocket design with a diameter of 10.6 meters, but materials and techniques such as friction stir welding would still work for the new plan. China’s currently most powerful and largest missile line is Truong Chinh 5 With a diameter of 5 m, it can carry cargo weighing around 22,000 kg into low Earth orbit (LEO). The Truong Chinh 9 is expected to be launched for the first time in 2030 and can transport cargo weighing between 140,000 and 150,000 kg to LO. This rocket will be used for construction International Lunar Research Station (ILRS) according to China’s plan. It could also help launch solar power infrastructure into outer space and deep space missions. CALT is part of China Aerospace Science and Technology Society (CASC) – the main entrepreneur of this country in the space sector. Other divisions of CASC operate in many areas such as rocket manufacturing, spacecraft development and manufacturing, and new engine design. CALT is also developing a new launch vehicle to carry astronauts to the Thien Cung space station and a larger version to send people to the Moon. The first launch is expected to take place in 2027. Article source: VNE If there is an error in the article China revealed super heavy rocket fuel tanks, or if the content is inaccurate, please contact us so we can fix it. China is manufacturing a 9.5 m wide propellant tank, aimed at developing the Long March 9 rocket with a carrying capacity of 150,000 kg of cargo. Institute of Technology…
<urn:uuid:c9883a5c-13d1-4436-83cd-974b6a62d67e>
CC-MAIN-2023-50
https://deepsky2000.net/china-unveiled-fuel-tank-for-super-heavy-rockets/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.935121
481
2.515625
3
Fruska gora - Serbia LTER site Fruška gora is located on Fruska gora mountain, an isolated island mountain in Pannonia plain, completely surrounded by lowland. Its highest peak Crveni cot has 549m. Its location, specific geological history and different microclimatic conditions (from lowland semiarid climate to the relatively cold and humid submontane climate) are of great interest to researchers. Thanks to unique and very rich deposits of fossil fauna and flora, Fruška gora is called the 'mirror of geological past'. More than 90% of the area is covered by deciduous forests with varied types of climatogenous forest communities that have been under constant and increasing pressure from surrounding urban areas, building, traffic, agriculture and economic use. The dominant forests are mesophillous mixed forests of sessile oak (Qeuercus petraea) and European hornbeam (Carpinus betulus), orographically conditioned beech forests, as well as thermophilous forests of Turkey oak (Quercus cerris), pubescent oak (Quercus pubescens) and (Quercus frainetto). Fruska gora counts around 1500 of plant species which is more than 1/3 of the total Serbian flora. General Characteristics and Status Affiliation and Network Specific Information
<urn:uuid:e8ae5d77-e910-47fe-a263-101ac06ebd2e>
CC-MAIN-2023-50
https://deims.org/f1c571d2-11e3-4072-ac66-073600ce152c
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.880922
290
2.96875
3
We live in an age in which it’s difficult to go more than an entire week without reading a story about hacks or data breaches that expose millions and billions of personal details to hackers. Because of this, many people are seeking ways to keep their personal information secure online. It is crucial to understand how to safeguard personal information in your digital business to meet your legal obligations and to ensure the privacy of your customers. Here are some tips to help you get started. 1. Identify Personal Data Personal data, as defined in laws on data protection, refers to any information which identifies an individual or is used to do so. In today’s digital age this could include anything from emails to biometrics. However, a lot of information that is considered to be personal may be excluded from the personal data category if there are specific browse around these guys qualifying circumstances. For example when an organization collects various kinds of data about individuals and they’re all asked to provide their job title it’s probably not personal information since it cannot be used to identify a single particular person. Many organizations are required by law to limit the amount of personal information that they collect. This is generally beneficial, since it reduces the likelihood of a data breach. Many data protection laws require a higher level of security for sensitive personal data than the standard personal data. This is because a breach can have more damaging effects or consequences for the person who is affected.
<urn:uuid:700ebf49-a46a-4856-8866-94a4a3e60878>
CC-MAIN-2023-50
https://devends.com/2023/10/03/how-to-protect-the-personal-data-that-goes-into-your-digital-business/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.942837
294
2.578125
3
Integrated research can help prevent India’s “City of Lakes” from running dry There is an urgent need for the scientific management of surface and groundwater in the Ayad river basin, says Dr. Sonal Bindal, senior researcher behind the Danida supported research project Integrated Water Resources Assessment of Udaipur District. Udaipur in northern India is known as the ‘City of Lakes’ but the thousands of people living in the area are threatened by a lack of clean water in the future. A Danida supported research project aims to provide the basis for securing the availability of quality water in Udaipur for the coming decades. Water is life, but in India, a constant and clean water supply for the more than one billion citizens cannot be taken for granted. Especially in rapidly urbanizing areas, the supply of clean water is under increasing pressure. A water management system is key A number of factors contribute to the problem: from industrialization and new, intensified agricultural methods, to pollution, population growth and climate change. Urban areas in particular are under threat, and in Udaipur, where the seasonal Ayad River flows through the city, a team of Danida supported Indian and Danish researchers are now looking into the city’s water management system to improve the basis for securing clean water for the thousands of people living in the area. We will evaluate the water management in Udaipur using modern technological and creative solutions established through civil partnerships, says Dr Sonal Bindal, the senior researcher behind the Danida supported research project Integrated Water Resources Assessment of Udaipur District. She explains that there is an urgent need for the scientific management of surface and groundwater in the Ayad river basin. In order to ensure a sustainable water supply and prosperity, the researchers will develop a hydrological model and a decision support system for both surface and groundwater supplies in the area. The system will account for factors such as water inflow, availability and runoff efficiency. Local people as citizen scientists To ensure that the system remains sustainable in a long-term perspective, the researchers are working with the local people who serve as citizen scientists. They hereby contribute to the collection of relevant data and information on water issues. Citizen science is a documented and efficient methodology to involve stakeholders in the management, says Dr Sonal Bindal, who emphasizes that there are several other advantages to involving non-professional scientists. One of them is accessibility to areas that otherwise are hard to get to. Another is the continuous frequency of measurements. The hydrological model to be developed will include surface and subsurface flow processes and will be driven climatic factors such as rainfall, temperature, rainfall, and humidity. The model will be based on data and information of land surface and geological characteristics and will be validated against surface and subsurface measurements. The model will also use data from satellites. It will be used for evaluating past, current, and future water conditions in the region. The research project Integrated Water Resources Assessment of Udaipur District is a collaboration between Danish and Indian research institutions and universities. Udaipur Municipal Corporation and the Municipality of Aarhus as well as Aarhus Water in Denmark are also involved. The assessment carried out by the research project will provide the collaborating academic agencies, local government and government departments with essential know-how for improving the water management to ensure the future water quality and supply in Udaipur. Dr Sonal Bindal is a Senior Researcher- Hydrology (Post-Doc) at the India-Denmark Development Research Corporation She holds a PhD degree in Water Resources Management from TERI University, India. She is supporting the multi-institutional team of internationally recognized scientists and the Royal Embassy of Denmark, New Delhi in accelerating ‘water’ sector specific cooperation between Denmark and India. The article “New research can help prevent India’s “City of Lakes” from running dry” is re-worked from a press release that Dr Sonal Bindal drafted during the communication training seminar Bridging the Gap. Science for the public, April 2021. The seminar was for Danida supported researchers in Asia. The partners behind Integrated Water Resources Assessment of Udaipur District are the University of Copenhagen, Geological Survey of Denmark and Greenland (GEUS), Denmark; Water Air Food Awards (WAFA), Denmark; Vidya Bhawan Society (VBS), India; DHI India; Development Alternatives (DA), India. The research project is funded by Danida.Go back to all stories
<urn:uuid:42b465b6-dd82-47db-a0f4-bf1f4ebe214d>
CC-MAIN-2023-50
https://dfcentre.com/integrated-research-can-help-prevent-indias-city-of-lakes-from-running-dry/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.929903
940
3.015625
3
CRC and Medicinal Plants Annona muricata, Chenopodium quinoa, Matricaria chamomilla, Moringa oleifera, colorectal cancer, medicinal plants Alternative and Complementary Medicine | Diseases | Medicine and Health Sciences Colorectal cancer (CRC) is one of the highly prevalent and deadly cancers worldwide. Surgery, chemotherapy and radiotherapy are the conventional treatment modalities for CRC; however, they cause adverse side effects and can be associated with cancer resistance and relapse. Currently, traditional herbal medicine is becoming increasingly studied and used in combination with conventional treatments in CRC. Various medicinal plants have shown promising anticancer effects against CRC concomitant with negligible side effects. For example, Annona muricata (soursop), Chenopodium quinoa (quinoa), Matricaria chamomilla (chamomile), and Moringa oleifera (moringa) have shown remarkable antiproliferative effects against CRC both in vitro and in vivo. Therefore, it is warranted to document the recuperative role of these potential medicinal plants in CRC. It is also important to provide scientific explanations for these effects by establishing their effects on key signaling pathways implicated in colorectal carcinogenesis. In this review, a summary of key signaling pathways that are altered in CRC is presented. The antiproliferative effects of selected medicinal plants against CRC as well as their underlying mechanisms of action are also discussed. Author ORCID Identifier "ANTIPROLIFERATIVE EFFECTS OF SOME MEDICINAL PLANTS ON COLORECTAL CANCER: A MINI REVIEW," BAU Journal - Health and Wellbeing: Vol. 5: 1, Article 5.
<urn:uuid:aa05bc2d-83d8-41e4-9da7-5096f0af8d01>
CC-MAIN-2023-50
https://digitalcommons.bau.edu.lb/hwbjournal/vol5/iss1/5/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.862416
363
2.890625
3
Theoretical estimates of the westward drift Department of Mathematical Sciences; Department of Computer Science Virtually all dynamo models may be expected to give rise to a permanent differential rotation between mantle and core. Weak conductivity in the mantle permits small leakage currents which couple to the radial component of the magnetic field, producing a Lorentz torque. Mechanical equilibrium is achieved when a zero net torque is established at a critical rotation rate. An estimate of the drift is determined easily given the magnetic field structure predicted by any dynamo model. The result for the drift rate at the core-mantle interface along the equator is given by the product of three factors Uφ*=UφR λ* L* The first of these is a geometrical factor which depends only on the structural character of the field. For a variety of model fields, this factor ranges from 16 to 35. The second factor is the ratio of r.m.s. toroidal to poloidal field. This ratio is an (implicitly) adjustable parameter of both α2 and α-ω dynamos, and is a measure of the relative efficiency of the generation process for each component. The third (dimensional) term is the ratio of core magnetic diffusivity to core radius, 10-4 cm s-1. The result is essentially independent of the value of mantle diffusivity and its effective depth. The sign of the result may be positive or negative. For α2 dynamos a westward drift is produced by choosing α > 0 in the Northern Hemisphere, which constitutes a dynamical assertion about the dynamo process. For an r.m.s. toroidal field of the order of 15 Gs, based on fairly general considerations, a drift rate comparable to observation is expected. Physics of the Earth and Planetary Interiors Theoretical estimates of the westward drift. Physics of the Earth and Planetary Interiors, Retrieved from: https://digitalcommons.mtu.edu/michigantech-p/5423
<urn:uuid:680bf3a0-58e7-49f3-89f1-58bcf6df4d2c>
CC-MAIN-2023-50
https://digitalcommons.mtu.edu/michigantech-p/5423/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.856217
426
3.0625
3
When it comes to cooking, following a recipe is essential for achieving the desired outcome. A recipe provides a list of ingredients and instructions on how to combine them to create a specific dish. However, one crucial aspect of a recipe that is often overlooked is the yield. The yield of a recipe refers to the number of servings or the amount of food that the recipe will produce. Understanding the yield of a recipe is essential for meal planning, budgeting, and ensuring that you have enough food for your guests. In this article, we will delve deeper into the concept of yield in recipes and why it is crucial to consider when cooking. - 1 What is Yield in Recipes? - 2 Factors Affecting Yield in Recipes - 3 Calculating Yield in Recipes - 4 Examples of Yield in Recipes - 5 Importance of Yield in Recipes What is Yield in Recipes? Yield in recipes refers to the number of servings or the amount of food that a recipe will produce. It is usually indicated at the top of a recipe, along with the list of ingredients. The yield can be expressed in various ways, such as the number of servings, the weight of the final dish, or the volume of the final dish. For example, a recipe for a pasta dish may have a yield of 4 servings, while a recipe for a cake may have a yield of 1 9-inch cake.Read:How to bake a cake recipe The yield of a recipe is essential for several reasons. Firstly, it helps you determine the amount of food you need to prepare for a specific number of people. If you are cooking for a large group, you may need to double or triple the recipe to ensure that there is enough food for everyone. On the other hand, if you are cooking for a small family, you may need to adjust the recipe accordingly to avoid having too much leftover food. Secondly, knowing the yield of a recipe is crucial for budgeting. By understanding how much food a recipe will produce, you can estimate the cost of the ingredients and plan your grocery shopping accordingly. This can help you avoid overspending on ingredients or buying too much food that may go to waste. Lastly, the yield of a recipe is essential for meal planning. If you are following a specific diet or trying to maintain a healthy lifestyle, knowing the yield of a recipe can help you plan your meals and portion sizes accordingly. This can be especially helpful for those who are trying to lose weight or manage their calorie intake. Factors Affecting Yield in Recipes While the yield of a recipe is usually indicated at the top, it is not always accurate. Several factors can affect the yield of a recipe, and it is essential to be aware of them to ensure that you get the desired outcome.Read:won ton recipes The type and quality of ingredients used in a recipe can significantly affect its yield. For example, if you use large eggs instead of medium eggs in a cake recipe, the final product may be larger, resulting in a higher yield. Similarly, using fresh, high-quality produce can also affect the yield of a recipe. For instance, if you use ripe, juicy tomatoes in a pasta sauce recipe, the final dish may have a higher yield compared to using canned tomatoes. The way you measure ingredients can also affect the yield of a recipe. For dry ingredients, such as flour and sugar, using the correct measuring cups and leveling off the top can make a significant difference in the final yield. Similarly, for liquid ingredients, using a liquid measuring cup and ensuring that the liquid is at the correct level can affect the yield. Inaccurate measuring can result in too much or too little of an ingredient, which can affect the final yield of the recipe. The cooking method used can also affect the yield of a recipe. For example, if you are making a soup or stew, the longer you cook it, the more liquid will evaporate, resulting in a thicker consistency and a lower yield. On the other hand, if you are making a dish that requires baking, the yield may increase if the dish rises or expands during the baking process.Read:Can mackerel recipes Altitude and Climate Altitude and climate can also affect the yield of a recipe. For instance, if you live in a high-altitude area, the air pressure is lower, which can cause baked goods to rise and expand more than usual. This can result in a higher yield for the recipe. Similarly, if you live in a humid climate, the moisture in the air can affect the consistency of the final dish, resulting in a different yield compared to someone living in a drier climate. Calculating Yield in Recipes While the yield of a recipe is usually indicated at the top, there may be times when you need to calculate it yourself. This can be especially helpful if you are adjusting a recipe to make more or less of it. Calculating the yield of a recipe is a simple process that involves dividing the total amount of food produced by the number of servings or portions. For example, if a recipe for a pasta dish has a yield of 4 servings and produces 4 cups of pasta, the yield per serving would be 1 cup (4 cups/4 servings = 1 cup per serving). Similarly, if a recipe for a cake has a yield of 1 9-inch cake and produces 12 slices, the yield per serving would be 1 slice (12 slices/1 cake = 12 slices per cake). It is essential to note that the yield of a recipe is an estimate and may vary depending on the factors mentioned earlier. Therefore, it is always a good idea to have some extra ingredients on hand, just in case the yield is higher than expected. Examples of Yield in Recipes Let’s take a look at some examples of yield in recipes to better understand how it works. Example 1: Chicken Stir-Fry - 1 lb boneless, skinless chicken breast, cut into bite-size pieces - 2 tablespoons vegetable oil - 1 red bell pepper, sliced - 1 green bell pepper, sliced - 1 onion, sliced - 1 cup broccoli florets - 1 cup snow peas - 1/4 cup soy sauce - 2 cloves garlic, minced - 1 teaspoon ginger, grated - Salt and pepper, to taste Yield: 4 servings - In a large skillet, heat the vegetable oil over medium-high heat. - Add the chicken and cook until browned, about 5 minutes. - Add the bell peppers, onion, broccoli, and snow peas to the skillet and cook for an additional 5 minutes. - In a small bowl, mix together the soy sauce, garlic, ginger, salt, and pepper. - Pour the sauce over the chicken and vegetables and stir to combine. - Cook for an additional 2-3 minutes, until the sauce thickens. - Serve over rice or noodles. In this recipe, the yield is 4 servings, and the total amount of food produced is approximately 6 cups. Therefore, the yield per serving would be 1.5 cups (6 cups/4 servings = 1.5 cups per serving). Example 2: Chocolate Chip Cookies - 1 cup unsalted butter, softened - 1 cup granulated sugar - 1 cup brown sugar - 2 eggs - 2 teaspoons vanilla extract - 3 cups all-purpose flour - 1 teaspoon baking soda - 1 teaspoon salt - 2 cups semisweet chocolate chips Yield: 24 cookies - In a large bowl, cream together the butter, granulated sugar, and brown sugar until light and fluffy. - Add the eggs, one at a time, mixing well after each addition. - Mix in the vanilla extract. - In a separate bowl, whisk together the flour, baking soda, and salt. - Add the dry ingredients to the wet ingredients and mix until just combined. - Stir in the chocolate chips. - Drop spoonfuls of dough onto a baking sheet lined with parchment paper. - Bake at 375°F for 8-10 minutes, until the edges are golden brown. - Cool on a wire rack before serving. In this recipe, the yield is 24 cookies, and the total amount of dough produced is approximately 3 cups. Therefore, the yield per cookie would be 2 tablespoons (3 cups/24 cookies = 2 tablespoons per cookie). Importance of Yield in Recipes As mentioned earlier, understanding the yield of a recipe is crucial for several reasons. Let’s take a closer look at why it is essential to consider the yield when cooking. Knowing the yield of a recipe can help you plan your meals and portion sizes accordingly. This is especially helpful for those who are trying to maintain a healthy lifestyle or manage their calorie intake. By understanding the yield, you can ensure that you are not overeating or under-eating, which can affect your health and well-being. Understanding the yield of a recipe can also help you budget for your grocery shopping. By knowing how much food a recipe will produce, you can estimate the cost of the ingredients and plan your meals accordingly. This can help you avoid overspending on ingredients or buying too much food that may go to waste. Reducing Food Waste By knowing the yield of a recipe, you can avoid making too much food and reduce food waste. This is especially important for those who are cooking for a small family or for individuals who live alone. By adjusting the recipe to produce the desired yield, you can avoid having leftover food that may go to waste. Accurate Nutritional Information Understanding the yield of a recipe is also crucial for calculating accurate nutritional information. By knowing the yield, you can determine the serving size and calculate the nutritional information per serving. This is important for those who are following a specific diet or have dietary restrictions. The yield of a recipe is an essential aspect that should not be overlooked when cooking. It refers to the number of servings or the amount of food that a recipe will produce and is crucial for meal planning, budgeting, and ensuring accurate nutritional information. Several factors can affect the yield of a recipe, such as ingredients, measuring techniques, cooking methods, and altitude and climate. By understanding the yield and how to calculate it, you can ensure that you get the desired outcome when following a recipe. So the next time you are in the kitchen, don’t forget to consider the yield of the recipe to make your cooking experience a success.
<urn:uuid:b2cd791b-8e12-436e-8a34-92711804af35>
CC-MAIN-2023-50
https://digitalpopcorn.net/what-is-the-yield-of-a-recipe/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.932238
2,160
3.15625
3
This section offers data and statistical reports on acute health conditions caused by pathogens and chronic conditions, reported by primary care providers and health care institutions. - Asthma Data - Cancer Data - Carbapenem Resistant Enterobacteriaceae (CRE) Surveillance - Chronic Disease Profiles - Chronic Hepatitis Surveillance - Communicable Disease Surveillance Data - Health of Washington State Report - Heart Disease, Stroke, and Diabetes - HIV/AIDS Data and HIV Factsheets and Surveillance - Newborn Screening Statistics - Oral Health - Sexually Transmitted Disease - Tuberculosis Data and Reports - West Nile Virus The department maintains data and statistical reports on diseases and conditions. Sources of data include reports by health care providers, hospitalization data, death records, studies, and community surveys. These data summarize trends in notifiable communicable diseases reported by local health jurisdictions to the department. Reported cases often represent only a fraction of the actual burden of disease. The accuracy of this information has limitations, due to: - Sick people who do not seek healthcare - Healthcare providers and others who do not always recognize, confirm or report notifiable conditions. A chronic disease persists over a long period of time or recurs. Some chronic diseases, such as chronic hepatitis and HIV are caused by pathogens (germs). Others are causes by behaviors (some types of heart disease, cancer, etc), the environment (some asthma and cancer), or genetics (some birth defects and cancer). Sometimes the cause of chronic conditions is not fully known or there may be a combination of causes. Chronic diseases or conditions include: - Birth defects (and other special healthcare needs of children) - Chronic hepatitis - Heart Disease and Stroke An acute disease is a disease with a rapid onset and/or a short course. Many acute diseases are caused by pathogens (germs). Acute diseases include: - Sexually Transmitted Diseases - Other communicable diseases (including: enteric/foodborne disease, vaccine preventable disease, zoonotic disease, acute hepatitis)
<urn:uuid:eb6e2e37-9d92-4f08-8683-33414dc8f13b>
CC-MAIN-2023-50
https://doh.wa.gov/data-and-statistical-reports/diseases-and-chronic-conditions
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.888106
429
2.890625
3
This is a neat story as thus far 3D printing has been limited to mostly bone reconstruction areas and dental areas but now the tissue was actually re-created in the windpipe area. It’s amazing where the technology is going and the doctors has to get FDA approval for the process as it had not yet been tried on humans, only animals. Woman Receives Jaw Transplant-Created by a 3D Printer–She Can Swallow Again at 83 Years of Age-Regenerative Printed Medicine At Wake Forest they are “printing” kidney’s as well using stem cells and this is all at the beginning stages and you can revisit this TED presentation whereby the kidney was being printed in real time back in 2011. BD Kaiba Gionfriddo was six weeks old when he suddenly stopped breathing and turned blue at a restaurant. Kaiba’s parents quickly rushed him to the hospital where they learned that his left bronchial tube had collapsed because of a previously undetected birth defect. During the next few weeks the life-threatening attacks recurred, increasing in number until they became everyday events. Physicians and researchers, however, used some of the most sophisticated bioengineering techniques available to 3-D print a synthetic tube to hold the baby's airway open. Kaiba had the surgery in January 2012 and hasn’t suffered an airway collapse since. Problems with the trachea, however, lend themselves to 3-D printed solutions because the organ's ridged tubelike structure is simple. After testing their idea in piglets, Green and his colleagues were confident a printed device would work. Scott Hollister, a professor of biomedical engineering at Michigan was in charge of designing sleeve that would wrap around the outside of the floppy airway. The sleeve's structure allows it to expand as the airway grows and develops while simultaneously resisting spasms that pull inward, thereby collapsing the airway. The team first used a computed tomography (CT) scan to sketch out Kaiba’s airways. From those images, they then sculpted a three-dimensional printed cast that had the same shape as Kaiba’s collapsed bronchus. Using that cast they created the sleeve or splint that would wrap around the bronchus. It took several tries but the researchers were eventually able to create a perfect fit. The next step was to sew the tissue of Kaiba’s bronchus to the inside of the sleeve. The team needed to obtain an emergency-use approval from the U.S. Food and Drug Administration before they could implant the device. "When we put the splint on, we saw his lungs move for the first time," Green says. As Kaiba grows, the device should expand with him.
<urn:uuid:1d39fb57-fc46-420b-b0cb-a8aa9d92bfae>
CC-MAIN-2023-50
https://ducknetweb.blogspot.com/2013/05/3d-printing-technology-saves-life-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.979781
570
3.015625
3
Single PCBs or PCB Arrays? What are PCBs? Printed circuit boards or ‘PCB’ is a non-conductive material with conductive lines that are printed or etched on them. The purpose of PCB is to serve as a platform to mount electronic components and the traces help guide the connection of components together to form a working circuit or an assembly. Printed circuit boards are widely used to assemble today’s modern electronics. They involve a bundle of one or more insulating layers and one or more copper layers that contain the signal traces and the powers and grounds; the design of the layout of PCBs can be compared to that of the electrical circuit. - Single Layer PCB – A single-layer PCB is a device that has a copper layer on one side of the board. This type of PCB has components on one side and the pattern to conduct electricity on the other side. A single layer PCB is useful for simpler electronic devices and is a cheaper option. - Double Layer PCB – A double layer PCB has a copper layer on both sides of the board. This type of PCB has components and patterns on both sides of the boards. A double layer PCB is used on devices such as vending machines, phone systems, car dashboards, etc. - Multi-Layer PCB – These types of PCB have more than three layers of copper. A multi-layer PCB is more durable than other types of PCB and is used on more complex devices like computers, phones, heart monitors, etc. What is a PCB Array? A PCB array means that many PCBs have been combined together to create a larger connected board. This is very helpful for manufacturers because this means a bigger board can be loaded into the machine instead of putting one PCB at a time. This can actually increase the rate of manufacturing. A PCB array design depends on various factors such as: - Size – Depending on the number and size of PCBs that can be put into an array the size of array can vary. If small PCBs are attached then array will be smaller likewise if big PCBs are attached then array will be bigger. It also depends on number of PCBs attached in array. - Rails – To make sure that people are comfortable using the PCB array we attach extra PCB material to the sides to make it easier to handle. You can choose to put the rails on 2 or 4 sides. - Markers – Also known as fiducials they are used to ensure your assembly equipment aligns the boards properly. The standard procedure is to put three markers on the rails of the board but extra fiducials can also be added on the individual PCB to make the assembly process easier. - Tooling Holes – These holes are placed in the corners of the arrays in the rails to make it easier to align the circuit board better. These holes are used to attach the board and are usually non-plated so that they don’t interfere with the electronic components in the PCB. - Depanelization – An array can be depanelized to its individual PCB boards if it is ever needed. This depends on the method you choose to connect the boards together to make an array. - Scoring – This means a V groove is put on opposite sides of the PCB array. Scorning is faster and makes the array more stable as well as takes less space between the PCB boards. - Tab Routing – This is used to tab all sides of the array to panel it properly. Tab routing is easier to break apart into single PCBs and is great for more odd-shaped electronic devices. You can remove the PCB anytime using this method and it makes assembly easier. Advantages of Using PCB Array One of the main advantages of the PCB array is the increase in efficiency during the fabrication process. Rather than handling several individual small PCBs, the fabricator can operate on one large panel. This greatly improves the manufacturing process as the fabricator can make multiple boards in one sitting. Another advantage of the PCB array is the ability to increase the efficiency of manufacturing large quantities of PCBs. Arrays allow manufacturers to load parts at a quicker rate as they can load a whole array of PCBs simultaneously as opposed to just loading them one at a time. The boards are loaded through the use of automation known as ‘pick and place’ machines. The machine simply picks up parts and place them down on the boards. It is worth noting that arraying the boards will typically raise the cost of individual boards because fewer boards are produced on a production panel compared to just running as an individual board. Although you might see an increase in the cost of individual boards, the cost of assembling them will be decreased because of the array configuration. Disadvantages of Using PCB Arrays One of the main disadvantages of PCB arrays is the increment increase in the size of each individual PCBs. Although it is only a small increase in size, designers who will later utilize the individual PCBs will have to build their technology around the size of the finished PCB. In order to join the PCBs together into a panel, manufacturers may use a process known as ‘tab routing’. In this process, space in between PCB is removed, leaving only a few small tabs to connect them. To separate the PCBs will require the breaking of the tabs, however, this will leave small edges which will require an additional process to smoothen them. Depanelizing PCBs from an array requires a delicate process as it may lead to quality and functionality problems if it is removed too forcefully. Detaching a PCB from an array will impose physical stress on the PCB, which is why the designer will need to take into consideration spacing out critical areas of the circuit away from the breaking zone. If this is not taken into consideration, it may result in the development of hairline cracks in the fine traces after the process of separation, and this can cause intermittent electrical operation. Should You Choose Single PCB or Array? The answer largely depends on the needs of your business as both single PCB and array serve their own purposes. Is your business trying to cut costs by producing large quantities of small PCBs with a low number of SMDs on each board? Or do you require individual PCBs that are very thin where using an array is not possible? Choose the one which is most suited to increase manufacturing efficiency for your business.
<urn:uuid:ffd2d2b1-ebe2-4b4a-9f9d-a648ee6d312e>
CC-MAIN-2023-50
https://ecitech.com/pcb/single-pcbs-or-pcb-arrays/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
en
0.948811
1,311
4.03125
4