text
stringlengths 205
677k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 15
2.02k
| file_path
stringlengths 125
126
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 47
152k
| score
float64 2.52
5.16
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
As Look, in the sky! It’s a bird … it’s a plane … it’s Clark Kent, er, a Clark’s grebe!
Actually, a Clark’s grebe IS a bird, and it would most likely be in water, rather than in the air, as grebes are seldom seen in flight. Grebes are aquatic diving birds and are very good at maneuvering underwater. They do this to hunt for food and to avoid predation.
Their look and behavior have fascinated me since I was a kid. Clark’s and western grebes are closely related and are very similar in appearance. In fact, until the 1980s, Clark’s grebes were thought to be a light morph of western grebes. As a young birder, I had seen photos of both species in books, and knew that I wanted to see them with my own eyes.
Then, around 1987, I saw a pair of western grebes at Hagerman National Wildlife Refuge at Lake Texoma. It was a rare sighting for sure, and, when I reported it to refuge staff, they doubted me. I guess it was because of my young age that they didn’t believe me, but when I returned a week later, many other people had seen them, and it was all the rage. Sweet vindication! And I saw them first. However, I didn’t see a western grebe again until October of this year when I traveled to Hackberry Flat Wildlife Management Area to observe one. It was definitely worth the drive.
And, when I recently learned there was a Clark’s grebe at Lake Hefner in Oklahoma City, an even rarer visitor to the state than the western, and a species I had never seen before, I made the trip up there Oct. 7. It took a little while for me to locate it, but once I did, it too was well worth the drive, and the search. I couldn’t get close enough for great photos, but I was able to get some decent pics, and observe the bird and its behavior for a few hours.
It was quite successful at catching fish, and I also noticed when it rested or slept, it did so in the company of other grebes, such as horned and eared. Pretty smart, if you ask me. Now, I don’t know if the bird is still there, but it was sighted Sunday at Lake Hefner, around Prairie Dog Point. The bird has been there for a few weeks, and, was once hanging out with a western grebe, but that bird left a little more than two weeks ago.
However, a western grebe was later sighted at nearby Lake Overholser and is possibly the bird from Lake Hefner. My advice, if you’re interested, is to sign up for eBird’s rare bird alerts for Oklahoma. Checking it daily is a good way to know when and where rare birds are being seen. Grebes, like loons, are specialized for diving in water. Their feet are located far back on their bodies. While they are awkward on land because of the feet location, they are brilliant under the water’s surface, like fish-seeking torpedoes. They have dense, waterproof plumage and lobed toes, which aide the process.
Clark’s grebes, and westerns too, are known for their spectacular ritualized dance. This dance occurs between a male and female for reassurance of their commitment to each other. It is smooth and elegant, and, at the climax of the dance, the birds stretch out their necks and run across the surface of the water together for quite some distance, then dive into the water. It really is quite spectacular. I’ve seen it dozens of times on film, but I’ve never witnessed it with my own eyes. It’s definitely on my list of things to see before I die, however. According to eBird, Clark’s grebes have been spotted at least two times in Comanche County, presumably at Lake Lawtonka.
Large, slender black and white grebe with yellow-orange bill which is long and thin (see photo). Upper mandible is straight, while the lower mandible is upturned. It sort of makes the bill appear to curve upward. To me, the birds look like they’re smiling. In winter, the black coloring on the backs of these birds is not as dark as it is during the breeding season (see photo). The way I differentiate between a Clark’s and a western is, the red eyes of the Clark’s grebe are surrounded by white on the face, while the black cap of a western extends below the eyes. Also, Clark’s grebes have bills which are more orange than the west- ern’s yellowish bill.
Clark’s grebes are birds of the American West. Their common breeding areas are in Southern Colorado and Northern New Mexico, and an area where California, Nevada and Oregon meet. The uncommon breeding range includes most of the western states and up into the Dakotas. They winter along the West Coast, an area of southern New Mexico and West Texas, and sometimes along the Gulf Coast.
Mostly fish. However, according to the Cornell Lab of Ornithology, they also eat salamanders, worms, grasshopper and other aquatic insects and larvae.
Large freshwater lakes and marshes the edges of which have emergent vegetation such as reeds and rushes, according to the Cornell Lab. In winter, they can also be found along ocean shores and tidal bays.
Odds and ends
• According to the Cornell Lab, western and Clark’s grebes were considered the same species until 1985, when scientists discovered that the two species rarely interbreed, despite sometimes living on the same lake. They also make different calls and have substantial DNA differences.
• The Clark’s grebe was named after John Henry Clark, a 19th-century American surveyor, naturalist and collector.
As I mentioned before, a good way to know what’s going on in the state, bird-wise, is to sign up for alerts at eBird — https://ebird.org/alerts. There have been a lot of rare sightings so far this fall. Lots of rarities at Hef- ner, Carl Blackwell Lake near Stillwater and Lake Tenkiller near Vian, among others. This is an irruption year for many species of birds. Purple finches are being seen all over the state, so keep your eyes peeled.
I will continue to feature sparrows in the coming weeks, but I may feature other species once in a while, especially if their presence in the state is timely. Randy Mitchell is a freelance writer and photographer. He has been an avid birdwatcher, nature enthusiast and photographer for 40 years. Reach him at [email protected].
|
<urn:uuid:d9b1aab5-c5fb-4a58-8717-4d99c65d3817>
|
CC-MAIN-2023-50
|
https://thechronicle.news/a-rare-visitor-indeed/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.975257 | 1,458 | 2.875 | 3 |
Single digit addition and subtraction problems displaying top 8 worksheets found for this concept. They will not teach students how to subtract or what the connection is between addition and subtraction.
Below are three versions of our grade 1 math worksheet with word problems involving the addition of single digit numbers.
Single digit addition and subtraction problems. See if your students are paying attention this is great for classroom work homeschooling or even just to practice over breaks. Single digit addition worksheet is composed of the following. The subtraction worksheets below are meant to be used for practice testing or as a teaching skill.
These single digit addition worksheet is a good resource for children in kindergarten 3st grade 3nd grade 3rd grade 4th grade and 5th grade. Single digit addition and subtraction worksheet single digit addition and subtraction worksheet. It is free and i hope it helps you with you.
Some problems will include irrelevant data so that students have to read and understand the questions rather than simply. Mixed addition and subtraction single digit numbers below are six versions of our grade 1 math worksheet with word problems involving addition and or subtraction of mostly single digit numbers. Single digit addition activities single digit addition exercise single digit addition practice and single digit addition problems.
Mixed problems are ideal for encouraging students to read problems carefully so as to construct the proper equation. Single digit addition and subtraction problems. Single digit addition worksheets for kindergarten and grade 1 contain standard addition drills addition with more addends in either vertical or horizontal form color by addition addition tree cut glue activity based on comparing sums matching equivalent addition equations word problems and more.
Adding single digit numbers. Single digit subtraction worksheet 0. Presenting a mixed review of addition and subtraction of single digit 2 digit 3 digit 4 digit and 5 digit numbers each pdf practice set is designed to suit the learning needs of elementary school children.
10 problems single digit subtraction worksheet 10 problems single digit subtraction worksheet 10 problems single digit subtraction worksheet 10 problems k oa a 5 fluently add and subtract within 5. Subtracting single digit facts is a skill that students generally learn after or while they are learning single digit addition facts. K oa a 5 fluently add and subtract within 5.
All sums are less than 18. This 2 page worksheet has a number line at the top with 36 single digit addition and subtraction math problems to answer. Some of the worksheets for this concept are subtraction word problems single digit subtraction single digit subtraction subtraction workbook 1 addition word problems single digit addition math problems name date one digit addition and.
Worksheets math grade 1 word problems addition single digits. Single digit addition worksheet 0 to 5 single digit addition worksheet 0 to 5 single digit addition worksheet 0 to 5.
|
<urn:uuid:394315d2-9735-4bc1-b9a5-9cdeeeaab444>
|
CC-MAIN-2023-50
|
https://thekidsworksheet.com/single-digit-addition-and-subtraction-problems/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.914173 | 579 | 3.9375 | 4 |
By Mariana Meneses
Among the many current developments in transportation technologies, we explore three that may or may not reshape the landscape of transportation: Electric Vehicles (EVs), Hyperloop technology, and the reemergence of supersonic flight, shedding light on the possible future of how we move from point A to point B.
Electric vehicles: a mountain goat on wheels?
Electric vehicles (EVs) have revolutionized the automotive industry, offering a more sustainable and eco-friendly mode of transportation.
Although marketed as an eco-friendly solution, there remain many challenges with EVs. These include carbon emissions in their production, recycling of their components, and the significant amount of water used in the mining of scarce resources like lithium for their batteries. EV batteries significantly increase the weight of the vehicles, posing human safety issues in collisions and adding pollution from the increased quantity of rubber particles given off by their tires.
However, as governments continue to invest in technology and infrastructure, and implement regulations, ongoing scientific advancements hold the potential for breakthroughs.
As Brazilian science communicator Davi Calazans explains, in the absence of human-engineered infrastructure like roads, the complexities and limitations of wheels are significant challenges in natural environments. Evolution didn’t create wheels, but favors other forms of locomotion such as limbs, wings, and fins that are better suited to navigate diverse situations.
Despite the environmental benefits of electric vehicles (EVs), their cost-effectiveness continues to pose a significant hurdle for their widespread acceptance, given their higher initial cost compared to fossil fuel-burning vehicles. Furthermore, many locations provide very limited or no charging infrastructure, rendering it difficult for individuals lacking home charging facilities to depend on EVs as their primary means of transportation.
Aiming to inform policy makers and stakeholders about policy frameworks and market systems for electric vehicle adoption, a 2023 report from the International Energy Agency identifies and discusses recent developments in electric mobility across the globe. It examines key concerns such as electric vehicle and charging infrastructure deployment, battery demand, electricity consumption, oil displacement, greenhouse gas emissions, and related policy developments.
According to the Global EV Outlook 2023 projections, there are many potentially different scenarios we could face by 2030.
Under the Stated Policies and Announced Pledges scenarios, global electric vehicle (EV) sales could increase by around fourfold from 2022 to 2030. By 2030, EV sales are projected to reach over 70 million vehicles annually, representing approximately 60% of all vehicles sold. Under the Net Zero Emissions by 2050 Scenario, the number of EVs grows more rapidly, at an average annual rate of around 40%, reaching 380 million EVs on the roads in 2030.
The report shows that EV deployment leads to an increase in electricity consumption, implying a potential need to expand power generating capacity.
As they displace petroleum consumption, EVs may lead to revenue and employment losses in the oil and gas industry. The report also highlights implications for tax revenues, showing that governments may need to consider alternative forms of taxation in response to changing transportation systems. Finally, the report analyzes the consequences of EV deployment on greenhouse gas emissions, showing that while EVs themselves produce no direct emissions, there are significant emissions in their production, electricity use, and battery disposal which still need to be addressed to maximize environmental effectiveness.
The harms of climate change are becoming increasingly evident, with rising global temperatures, extreme weather events, melting ice caps, and sea-level rise taking center stage among many issues.
These changes not only threaten vulnerable ecosystems and wildlife but also have significant ramifications for human survival, including concerns about food security, water availability, and public health.
Climate change is deeply connected to the burning of fossil fuels, which releases greenhouse gases into the atmosphere and disrupts Earth’s natural heating and cooling cycles. Since vehicles powered by gasoline and diesel fuels account for 29% of annual greenhouse gas emissions, EVs play a pivotal role in curbing these climate-disrupting gases and fostering a cleaner and healthier environment. EVs also have the potential to be charged by renewable energy sources, such as wind and solar. Plus, as battery technology continues to evolve, electric vehicles can become more affordable, lightweight, and efficient with longer ranges between charges.
Governments worldwide acknowledge the significance of EVs in combating climate change, and many are introducing measures like tax credits and subsidies to promote their usage and affordability.
As reported by The New York Times, the U.S. government is actively pushing for the rapid adoption of electric cars in the fight against climate change. President Biden’s executive order aims for 50% of new car sales to be all-electric by 2030, while the US Environmental Protection Agency (EPA) is proposing regulations to curtail tailpipe pollution from gasoline-powered vehicles.
Nevertheless, it is crucial to ensure a swift transition to EVs and other fossil fuel-free transportation technologies that align with climate targets while remaining affordable and accessible to consumers.
It is worth noting that advancements in battery technology are vital for the growth of EVs.
As batteries become more powerful and efficient, electric cars can offer longer driving ranges and faster charging times, making them more practical for consumers. Improvements in battery technology will also have environmental benefits. Recycling and repurposing used EV batteries can reduce waste and the need for new materials, and sustainable manufacturing processes can minimize the carbon footprint of electric vehicles.
Thus, research and innovation in battery technology are crucial to improve performance, reduce environmental damage, and expedite the transition to a low-carbon transportation system.
Hyperloop: there are still believers
Announced as the future of high-speed transportation, hyperloop technology could still, perhaps, be only a few years away from reality. In theory, this technology could allow us to travel more safely, less expensively, and faster than we do today.
But there have been – and still seem to be – many obstacles before we get there.
The idea to use tubes for transportation is not new. For a long time, written messages and physical items were exchanged through the pneumatic tube system (also known as capsule pipelines). The idea of putting trains inside vacuum tubes is also not new. The first mention of a ‘vactrain’ dates to 1904, when it was proposed by engineer and physicist Robert Goddard, and since the 1970s there has been a plan to build a network of high-speed trains inside near-vacuum tunnels in Switzerland.
So, why isn’t the hyperloop a reality yet?
“These are systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum. In the late 19th and early 20th centuries, pneumatic tube networks gained acceptance in offices that needed to transport small, urgent packages, such as mail, other paperwork, or money, over relatively short distances, within a building or, at most, within a city” (Wikipedia).
In 2013, Elon Musk published the Hyperloop Alpha, an open source document with a detailed outline for the Hyperloop technology.
But he also needed a prototype and so, from 2015 to 2019, his company SpaceX sponsored competitions in which teams presented prototypes for testing. The winning design, from the Technical University of Munich, became the basis for future versions of the technology.
Once completed, the passenger capsules inside the sealed tubes are supposed to travel faster than a bullet train, and even faster than a commercial jet aircraft. You could ask: why don’t we just build faster planes? The problem can be summarized in two words: air resistance. For a plane to travel at supersonic speeds, impractical quantities of fuel would be required, as explains physicist Dr. Sabine Hossenfelder.
“At such high speed, air resistance rises rapidly. Even if you manage to prevent the plane from melting or simply falling into pieces, you still need a lot of fuel to counter the pressure of the atmosphere. You could instead try flying so high up that the atmosphere is incredibly thin. But you have to get there in the first place, and that too consumes a lot of fuel.”
The Hyperloop consists of magnetic capsules, or pods, levitating inside a tube and traveling at supersonic speeds.
That’s why it needs airtight tubes, in a near-vacuum state so there is no air drag and the capsules can reach the intended high velocities.
Musk’s 2013 proposal, which initially featured air-cushions, has seen improvements like magnetic levitation (maglev) to reduce friction between pods and the tube-shaped track.
However, maglev introduces challenges like the need for costly cryogenic systems to reduce operating temperatures, and maintaining a vacuum over long distances.
In Musk’s 2013 plan, each capsule would be able to transport 28 or more passengers, and the system would have an hourly capacity of 30,000 passengers. A trip from Los Angeles to San Francisco, requiring 600 kilometers by road, would be completed in 45 minutes for a cost of less than one hundred dollars per passenger.
According to Sara McBride, for Bloomberg, as of 2023, the Hyperloop concept is still being pursued, but it has faced significant challenges.
Despite the vision of transporting passengers between cities at nearly the speed of sound, no startup has succeeded in creating a fully functional Hyperloop system after ten years and hundreds of millions of dollars invested. Some companies, like the Richard Branson-backed startup Hyperloop One, have pivoted to moving freight. Hyperloop Transportation Technologies Inc., one of the longest-standing leaders in the arena, even abandoned an attempt to go public. These challenges raise questions about the real-world viability of the Hyperloop system. However, there are still proponents who believe in the technology and continue to work on it.
As of 2023, supersonic flight is still a significant area of interest in the aviation industry even after the cancellation of costly Concorde service operated by British Airways and Air France from 1976-2003.
Several companies are developing supersonic aircraft with the aim of reducing travel times significantly. For instance, according to BBC, in 2021, United Airlines announced plans to buy 15 new supersonic airliners and return supersonic speeds to aviation by 2029. Similarly, as reported by the World Economic Forum, American Airlines has committed to buy up to 20 Overture jets developed by Boom Supersonic. However, there are challenges to overcome, including noise pollution, fuel consumption, and the need for sustainable aviation fuels.
Despite these challenges, the development of supersonic flight is seen as a promising advancement in aviation.
According to the World Economic Forum, new aircraft technologies, such as Boom’s Overture, are being designed with a focus on environmental sustainability.
Their developers aim to achieve carbon neutrality, striving for a net zero carbon footprint by balancing the amount of carbon emissions the aircraft produce with the amount they offset or eliminate. One of the ways they plan to do this is by using sustainable aviation fuels. These are fuels produced from sustainable resources like biomass that can significantly reduce aviation’s carbon footprint compared to conventional jet fuel. However, a major challenge lies in scaling up the production of these sustainable fuels which currently make up a small fraction of the fuel used in air travel.
Increasing their production is crucial for reducing the overall carbon emissions of the aviation industry and making air travel more environmentally friendly.
The adoption of sustainable transportation solutions is a fraction of the multifaceted endeavor required to combat the formidable challenge of today’s climate crisis.
To establish a truly sustainable system, our primary focus should center on prioritizing the transition to renewable energy sources. This entails channeling investments into the development of infrastructure for renewable energy generation and storage, concurrently advocating for energy efficiency and conservation strategies. By joining forces on multiple fronts, we can chart a path towards a genuinely sustainable system that not only addresses the perils of climate change but also nurtures a healthier planet for future generations.
Interested in exploring related topics? Discover these recommended TQR articles:
- Saving the Planet: Nobel Prize Recognizes Climate Science, but Will Mindsets Change in Time to Sustain Nature’s Potential and Value?
- Searching For Martian Life with X-Ray Crystallography
- Technology Fuels Advances in Citizen Science
- Beyond the Binary: Can Machines Achieve Conscious Understanding?
- Minding the Future: The State of Global AI Regulations
|
<urn:uuid:79123ce0-0ab3-4b93-88d2-568a7054a9d6>
|
CC-MAIN-2023-50
|
https://thequantumrecord.com/science-news/evs-hyperloop-supersonic-flight-future-of-transportation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.94276 | 2,546 | 3.265625 | 3 |
In today’s digital era, language learning has never been more accessible or engaging, thanks to a plethora of innovative apps designed specifically for young learners.
From interactive educational apps to captivating language games, these resources are revolutionizing language acquisition for children.
Let’s delve into the world of language learning apps for kids, exploring the best Spanish and English language apps that offer immersive, multisensory experiences.
Language Learning Apps for Kids: Making Language Acquisition Fun and Interactive
1. Interactive Educational Apps:
Interactive educational apps are the cornerstone of effective language learning for kids. These apps engage children with colorful visuals, exciting activities, and interactive lessons, creating a stimulating environment for language acquisition.
2. Phonics Apps for Kids:
Phonics apps play a vital role in teaching young learners the foundations of language. By focusing on letter sounds and pronunciation, these apps enhance children’s phonetic awareness, making it easier for them to grasp the nuances of Spanish and English.
3. Language Immersion Apps:
Language immersion apps provide a deep dive into the world of Spanish and English. Through immersive experiences, children are surrounded by the language, helping them absorb vocabulary, sentence structures, and cultural context effortlessly.
4. Gamified Language Learning:
Gamification transforms language learning into a playful adventure. By incorporating rewards, challenges, and interactive games, gamified apps keep kids motivated and eager to explore, reinforcing their language skills in an enjoyable way.
5. Visual and Auditory Learning Tools:
Visual and auditory learning tools are essential components of language apps for kids. These tools stimulate multiple senses, enhancing retention and understanding. Interactive visuals and engaging audio elements make the language learning process memorable and effective.
6. Language Learning Through Play:
Learning through play is a fundamental approach in children’s education. Language learning apps leverage this concept by integrating educational content into playful activities, ensuring that kids have fun while acquiring valuable language skills.
7. Language Learning on Smartphones:
The convenience of smartphones has revolutionized language learning, making it accessible anytime, anywhere. With language learning apps on smartphones, kids can practice Spanish and English during car rides, waiting in line, or any other moment, transforming everyday situations into learning opportunities.
8. Engaging Language Apps for Kids:
Engaging language apps captivate children’s attention and maintain their interest throughout the learning process. These apps are designed with vibrant graphics, interactive lessons, and exciting challenges, ensuring that kids stay motivated and enthusiastic about learning Spanish and English.
Exploring the Best Spanish and English Language Apps for Kids
1. Duolingo Kids:
Duolingo Kids offers interactive lessons in Spanish and English, combining education and entertainment seamlessly.
This app focuses on phonics, enhancing children’s pronunciation skills in both Spanish and English.
3. Gus on the Go:
Gus on the Go provides interactive vocabulary lessons, making language learning enjoyable through engaging games.
ABCmouse offers comprehensive language lessons, fostering a love for Spanish and English through interactive activities.
5. Monkey Junior:
Monkey Junior utilizes interactive lessons, stories, and games to enhance language skills in both Spanish and English.
Lingokids offers a diverse range of activities, teaching Spanish and English vocabulary and grammar through interactive experiences.
FluentU immerses kids in real-world videos and interactive captions, enhancing language skills in Spanish and English.
8. Dora the Explorer Apps:
Based on the popular TV show, Dora the Explorer apps engage kids with interactive adventures, teaching Spanish and English while having fun.
Spanish School Bus offers engaging games and activities to teach Spanish vocabulary and phrases, making language learning enjoyable.
10. Endless Spanish:
Endless Spanish introduces kids to Spanish words and sentences through captivating animations and interactive games, promoting language acquisition in a fun way.
This app combines educational games and interactive content to teach vocabulary, pronunciation, and basic phrases in both English and Spanish.
Fun Spanish offers interactive lessons, quizzes, and stories to teach Spanish vocabulary and grammar, making learning enjoyable and effective.
Learn Spanish for Kids provides a variety of lessons, games, and quizzes to teach Spanish vocabulary and basic grammar, fostering language skills in an interactive manner.
14. ABC PocketPhonics:
ABC PocketPhonics focuses on teaching English phonics and letter sounds through engaging activities, enhancing children’s reading and pronunciation skills.
Mondly’s app offers interactive lessons, quizzes, and games, catering to both Spanish and English learners and promoting language skills effectively.
16. Hello English Kids:
Hello English Kids introduces children to English through interactive games, puzzles, and conversations, making language learning fun and interactive.
Mondly’s Spanish version provides interactive language learning experiences, including lessons, quizzes, and games, tailored for young learners.
In today’s rapidly evolving digital landscape, language learning for kids has taken on an exciting new dimension, thanks to the wealth of interactive Spanish and English language apps available. These apps offer a captivating blend of education and entertainment, transforming the often challenging task of learning a new language into a delightful adventure for young learners.
By embracing the power of interactive educational apps, children can immerse themselves in a world of vibrant visuals, engaging activities, and gamified experiences, all carefully designed to enhance their language skills. The diverse range of apps, from phonics-based games to immersive language immersion experiences, ensures that every child’s learning style is accommodated.
As parents and educators, providing access to these top-quality language apps opens the door to a rich linguistic journey for our children. These apps not only teach vocabulary and grammar but also instill a love for languages from an early age. The convenience of mobile learning allows kids to explore the intricacies of Spanish and English wherever they go, seamlessly integrating learning into their daily lives.
In the end, the benefits of interactive language apps extend far beyond the screen. They empower children with essential language skills, boost their confidence, and nurture a lifelong love for learning. As we witness our children confidently navigate the complexities of languages, we can take pride in knowing that we have equipped them with invaluable tools that will serve them well in an interconnected global world. So, embark on this exciting language learning journey with your child, and watch them flourish into bilingual, confident communicators, ready to embrace a world of endless opportunities.
Dive into our comprehensive guide on crafting a balanced digital life for your kids, where screen time meets green time. Click to learn the secrets of integrating tech with touch – it’s time to redefine family time!
|
<urn:uuid:490ed6f9-f68c-4f85-8dce-4534bc924ef3>
|
CC-MAIN-2023-50
|
https://tiredmomsupermom.com/top-spanish-and-english-apps-for-kids/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.894445 | 1,366 | 3.21875 | 3 |
Time to get into great sleep habits with these tips.
The holidays, with fun-filled days and unscheduled activities, can make it hard for children to get back into a routine – particularly if they’ve had irregular bedtimes and disrupted routines. Starting school can be a shock to your child’s system, as structured days with lots of learning and brain work can exhaust even the most conscientious of students. It’s critical to re-establish good sleep routines as quickly as possible, as lack of sleep can negatively impact children’s behaviours and ability to learn.
1. Gradually go to bed earlier
If your child is used to staying up late, start by setting their bedtime five to 10 minutes earlier, then gradually move it back to the time you want them to go to bed. Do this over several nights or a few weeks if possible, so your child has time to get used to the change.
2. Get organised before bed
There are few things worse than dealing with grumpy, tired children in the morning – so do as much as you can the night before, when they’re still fresh! Lay out uniforms, pack lunches, prepare backpacks, set the breakfast table with everything that doesn’t need refrigerating, and even put some toothpaste on their toothbrush ready for the morning.
3. Stick to the plan on weekends
Although it’s tempting to let your kids sleep in on the weekends, it’ll be better in the long run if you can stick to the same waking and sleeping schedule on Saturday and Sunday, too – then Monday won’t be such a struggle.
4. Set up a good sleep routine
Together with your child, develop an actionable sleep routine that they can follow each night. It might start with laying out tomorrow’s clothes, then a bath or shower, brushing teeth, reading a book together, and turning out the light. Write it down or create a picture chart and post it where it’s easy for your child to see and get used to.
5. No screen time
The light from devices like phones, tablets, computers, or TVs can sabotage sleep. Research tells us that using electronic devices before bedtime can actually stimulate us rather than settle us, making it harder for children to fall asleep and stay asleep. Start cutting off device time two hours before bedtime. If this is too drastic, start by reducing screen time 30 minutes before bedtime, then 45 minutes, then an hour, and so on.
|
<urn:uuid:b3b22cb9-d8e0-4fd2-8637-b82492e84218>
|
CC-MAIN-2023-50
|
https://totstoteens.co.nz/parenting/sleep/5-healthy-sleep-habits/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.938038 | 525 | 2.734375 | 3 |
The Story of Oysters
produced in Knysna
One of the restaurants at the Knysna waterfront where oysters are obtainable
Knysna is the oyster capital of South Africa.
Each year in the July school holidays the town puts on an Oyster festival.
As part of the festivities a number of cycle races and road marathons are held.
These activities are extremely popular with the public and accommodation is hard to come by during the festival.
Also on the menu is the Knysna oyster which gives the festival its name.
Since the early days of Knysna, oysters have been readily available in the area but due to demand collecting them in the wild is no longer commercially viable.
The cultivation of oysters was first muted in 1946 by a retired wine merchant in the Knysna area.
After two years of research and an inspection of the Knysna lagoon a Dutch oyster farmer was employed to start an oyster farm.
Various species of oyster were imported and a bottom farming method was employed which turned out to be unsuccesful.
It was then decided to try and use the local oysters but catching the natural spats using various methods also turned out to be unsuccessful from a commercial point of view.
The main problem being a lack of knowledge of the local conditions which made methods used successfully in Europe unsuitable in Knysna.
Local predators and pests also fed on the baby oysters creating more problems for the farmers.
Between 1965 and 1970 various methods of cultivating oysters in the lagoon were tried most of which had limited success.
A hatchery was established in the lagoon near Belvedere but was closed down because of problems with pollution, bacteria and the slow growth of the oysters being cultivated there.
It was then decided to import the oyster seeds from overseas.
3 - 4mm oyster seeds are imported from either Chile or France and on arrival in South Africa are placed into a specially designed nursery in Port Elizabeth where the oysters lie in bins with mesh screens for bottoms and fresh salt water is pumped through them.
The oyster seeds grow quickly and after about three months grow to between 10 and 12 mm in length.
When they reach this size they are removed from the oyster bins and transferred to the Knysna lagoon where the next phase of their development begins.
In Knysna the oysters are placed in fine mesh bags and are tied onto inter tidal racks anchored in the lagoon where they are exposed to the elements during low tide and are submerged at high tides.
This exposure reduces the risk of parasites and keeps the bags that the oysters are kept in free from marine organisms that would attach themselves if the bags were constantly underwater.
During this phase the oysters are regularly graded and by spending time out of the water their shells are strengthened and they become accustomed to living out of water extending their future shelf life.
Unfortunately during this process more than 40% of the oysters do not survive.
After about nine months the oysters have grown to about 45mm and are then ready for a move back to Algoa Bay for the final process of their cultivation.
On arrival in Algoa Bay the oysters are placed in lantern nets which are attached to long ropes which are kept afloat by buoys far out in the bay.
Here they live for about three months in the open sea in perfect conditions for oysters.
When they reach marketable size and the plumpness of sea grown oysters they are harvested and brought back to land where they are scrubbed and graded into different sizes.
They are then placed in crates and kept in cement tanks filled with fresh sea water which is drained for a number of hours each day.
The oysters are now ready for delivery to the markets.
It's a strange thought but in many instances the oysters you buy in Knysna will be more well travelled than you or me are.
© 2023 Turtle SA - All Rights Reserved
|
<urn:uuid:bccd3dbf-6ea2-4e0b-bcdb-5889fbf02302>
|
CC-MAIN-2023-50
|
https://turtlesa.com/knysnaoysters.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.971121 | 828 | 2.9375 | 3 |
The lottery is a form of gambling in which players pay a small sum of money for the chance to win a prize, often large amounts of cash. It differs from other forms of gambling, including betting on sports events and in casinos, because a prize must be won by chance rather than by skill or knowledge. It is considered a legitimate source of revenue for governments, and is a popular way to raise funds for a variety of purposes. However, critics of the lottery point to the social problems of compulsive gamblers and its regressive impact on poorer people.
The practice of distributing property and other objects by toto macau lot has a long history, as evidenced by several biblical examples. It was also used in ancient Rome for giving away slaves and other commodities during Saturnalian feasts and other entertainments. Francis I of France introduced public lotteries after seeing them in Italy during his campaigns. In modern times, lotteries are usually conducted by government-sanctioned associations or private promoters. They can be organized to distribute prizes such as goods, services, and even free public education.
In the early days of lotteries, a number of abuses were discovered, which strengthened the arguments of those opposed to them and weakened their defenders. However, in the 1700s and 1800s, lotteries provided substantial revenue for projects such as building the British Museum and rebuilding Faneuil Hall in Boston. They helped establish Harvard, Dartmouth, Yale, and other American colleges. In addition, they were a valuable means of obtaining “voluntary taxes” to finance public works projects.
A key element of all lotteries is the drawing, a procedure by which winning numbers or symbols are selected from a pool or collection of tickets and their counterfoils. The pool must be thoroughly mixed by some mechanical means, such as shaking or tossing, before the winner is determined. A percentage of the total pool normally goes to the cost of organizing and promoting the lottery, and another percentage is reserved as incomes and profits for the organizers or sponsors. Of the remainder, the prize money is distributed to winners.
Many modern lottery games are based on computer technology. While this makes the results more accurate, the basic principles of winning remain the same: locating and marking groups of singletons. To develop your own technique, try charting the digits that mark the playing space, counting how many times each number repeats on the ticket and looking for spaces where there are only one or two repeated digits. This is known as the one-toning method, and it can increase your chances of winning by 60-90%. Experiment with other scratch off tickets to see if you can discover any repetitions that signal a high probability of a winning combination. If you do, stick with it until the jackpots start to disappear. Then, you can move on to the next game. Good luck!
|
<urn:uuid:7d984cc6-dfe1-4f7c-8e85-3e3305b1d18e>
|
CC-MAIN-2023-50
|
https://tyeband.com/tag/togel-macau-hari-ini/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.975749 | 583 | 3.109375 | 3 |
UN-Habitat is supporting the 8th National Socio-Economic Development Plan (NSEDP) and the long-term development agenda of the Government of Lao PDR with an overall goal of graduating from its Least Developed Country (LDC) status by 2020, through supporting sustained inclusive economic growth, enhancing human development and reducing the effects of natural shocks. UN-Habitat in Lao PDR is especially focusing on strengthening areas in: Urban Legislation, Land and Governance; Urban Planning and Design (with a particular focus on climate change); and Urban Basic Services, allowing for a holistic approach in addressing the countries diverse challenges and needs.
Lao PDR is characterized by rapid and uncontrolled urbanization as a result of rural-urban migration. Although many parts of Lao PDR are still predominantly rural, with more than two thirds (67.1 per cent) of the people living in areas defined as rural. At the same time, Lao PDR is facing the highest urbanization rate in Asia, at a rate of 4.9 per cent, which is more than twice the global average of 2 per cent. This poses a huge pressure on urban and emerging urban settlements.
Additionally, some houses in urban areas are still without electricity and about 10 per cent of urban areas of the country have not yet been covered by an improved source of drinking water. Also, about 40% of everyday waste produced, approximately 6 kg/person, are disposed at the road side, back yard, water way or by open burning. The untreated water has become a cause of concern in most cities.
“We are very proud and happy to have received this classroom. We will definitely be utilising this space in our lessons.”
Ms. Inthavane Orachith, Teacher at a school where a new water classroom was added, as a part of a community-based water, sanitation and hygiene project
Donors and partners
UN-Habitat will follow the vision of the United Nations Partnership Framework 2017-2021 to address the priorities of Lao People’s Democratic Republic. Thus, three pillars will guide its work: inclusive growth, livelihoods and resilience, human development and governance. UN-Habitat will look for opportunities to further public-private partnerships with the aim of ensuring the sustainability of the actions and supporting the Government’s Sam Sang Policy.
Building on the experience of the Global Land Tool Network, and in partnership with local government organizations, UN-Habitat will address existing urban land problems and opportunities, utilizing a wide range of tools, including land readjustment.
In response to addressing the necessity of risk reduction and rehabilitation, UN-Habitat will draw upon agency-wide expertise to engage in both reducing urban risk and responding to urban crises through its Resilient Cities Programme and Settlements Recovery Programme, respectively, in partnership with the United Nations International Strategy for Disaster Reduction and the Making Resilient Cities Campaign.
|
<urn:uuid:69b1f603-4314-4e34-a692-288cadba7976>
|
CC-MAIN-2023-50
|
https://unhabitat.org/cn/node/142340
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.936127 | 609 | 2.703125 | 3 |
Songdo, Republic of South Korea 10 April 2019-- UN-Habitat is using the ongoing National Adaptation Plans (NAP) Expo in South Kora to promote a new guide it has developed.
The NAP Expo format provides the opportunity for UN-Habitat to present its newest guide on Addressing Urban and Human Settlement Issues in National Adaptation Plans and to gauge interest in and respond to country requests on strengthening human settlement components in their National Adaptation Planning process.
Currently, adaptation needs and priorities of countries expressed in the Paris Agreement and NDCs are tremendous. To date, 113 countries have included urban or urban related adaptation priorities in their Nationally Determined Contributions (NDCs), and many of these -73 countries - are focused on city level climate change adaptation action in cities.
The annual event in Songdo event organized by the Least Developed Countries Expert Group (LEG) under the UNFCCC is meant to promote exchange of experiences and foster partnerships between a wide range of actors and stakeholders on how to advance National Adaptation Plans (NAPs). The event brings together over 300 experts and representatives from national governments, international organizations, private sector organizations and academia.
Integrating urban and human settlements issues into NAPs should enable countries to more comprehensively address the needs of urban communities and related urban economic activities to adapt to climate change. Another major opportunity is for national governments to harness the opportunities of cities for large scale adaptation impact and project development, a major focus of this year’s NAP Expo, held at the doorsteps of the Green Climate Fund (GCF).
For UN-Habitat, the NAP process offers a great opportunity to help countries achieve more resilient and sustainable urban development, critical to the achievement of the goals and targets of Sustainable Development Goals (SDGs) 11 (Sustainable Cities and Communities) and 13 (Climate Action). The NAP guide prepared by UN-Habitat constitutes a step forward in supporting cities and countries to strategically scale-up urban adaptation action planning. This guide comes as a supplement to the UNFCCC’s NAP technical guidelines and is designed to support national city and city level planners, experts and decision-makers working on climate change issues to better understand the need and opportunities that adaptation actions can bring in human settlements, and particularly how this links with broader goals and ambitions laid out in the NDCs under the Paris Agreement.
Upcoming urbanization and climate change trends are likely to increase the vulnerability of cities under the growing threats from sea level rise, extreme variations in climate and related disasters. The need for new infrastructures to accommodate growing urban population needs represent an opportunity for cities to apply more cost-effective measures to address climate adaptation (and mitigation), scale-up action, and attract adaptation finance.
Fundamental questions guided the session, pointing out and describing how to leverage finance for the effective implementation of NAPs and which cooperation and coordination mechanisms are needed between national, sub-regional and local governments, key private and civic society actors.
This launch, in the presence of the Green Climate Fund and several partner governments, is another invitation from UN-Habitat to countries and cities to scale up and accelerate the implementation, as UN-Habitat still stands ready to support Member States in integrating Human Settlements more strongly into National Adaptation Planning and action.
|
<urn:uuid:222f0ca6-684b-46a9-befa-f6d821777860>
|
CC-MAIN-2023-50
|
https://unhabitat.org/un-habitat-re-launches-guides-on-addressing-human-settlements-in-national-adaptation-plans-at-nap-expo-2019
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.921262 | 688 | 2.625 | 3 |
Article 2 of the UN Convention on the Rights of Persons with Disabilities (hereinafter the “Convention”) provides that discrimination on the basis of disability is any distinction, exclusion or restriction on the basis of disability which has the purpose or effect of impairing or nullifying the recognition, enjoyment or exercise, on an equal basis with others, of all human rights and fundamental freedoms in the political, economic, social, cultural, civil or any other field. It includes all forms of discrimination, including the denial of reasonable accommodation.
It further provides that reasonable accommodation refers to necessary and appropriate modifications and adjustments not imposing a disproportionate or undue burden, where needed in a particular case, to ensure to persons with disabilities the enjoyment or exercise on an equal basis with others of all human rights and fundamental freedoms.
The said article 2 states that universal design is the design of products, environments, programmes and services to be usable by all people, to the greatest extent possible, without the need for adaptation or specialised design. It further states that universal design shall not exclude assistive devices for particular groups of persons with disabilities where this is needed. South Africa became party to the Convention in November 2007, and is thus obliged to uphold these principles.
As indicated above, the COVID-19 outbreak has compelled many organisations to change the way they conduct their affairs in order to continue operating while curbing the spread of the virus. This note serves as a reminder that as important as it is to adapt to the “new “normal”, organisations should not unwittingly discriminate against employees on the basis of disability.
Changes made to a given work environment should be such that they can be accessible to as many people, while requiring little or no adaptation. However, where it is necessary, adaptations should be made in-keeping with the changing operational requirements. As is often the case, however, many organisations do not know what measures to put in place in order to give effect to what they already understand to be their legal obligations. Here are some of the factors to keep in mind.
The Code of Good Practice on the Employment of Persons with Disabilities (hereinafter the “Code”) should be every employer’s point of reference. The Code serves as a guide for employers and employees to promote equal opportunities and the fair treatment of persons with disabilities as required by the Employment Equity Act (hereinafter the “EEA”). The Code serves as a guide for employers and employees on important aspects of promoting equal opportunities and fair treatment for people with disabilities as mandated by the EEA.
It is important to be aware that the Code is not itself an authoritative source of law, nor does it create new employment rights and responsibilities. The Code states that although failure to observe its provisions does not render anyone liable for breach, courts and dispute resolution tribunals must nevertheless consider it when interpreting the EEA. The Code covers an array of aspects such as the definition of disability, reasonable accommodation for people with disabilities, avoiding unfair discrimination and achieving employment equity, amongst others. The Code paints in broad strokes because every person and situation is unique, and thus employers may reasonably depart from the standard provisions in order to create solutions that are unique to a particular workplace.
Section 1 of the EEA defines people with disabilities as people who have a long-term or recurring physical or mental impairment which substantially limits their prospects of entry into, or advancement in, employment. There is a 3-prong test to determine if one is covered by the definition in the EEA:
- A person must have an impairment, which may either be physical or mental, or a combination of both. A physical impairment means “a partial or total loss of a bodily function or part of the body. It includes sensory impairment such as having a hearing or visual impairment”. A mental impairment is a clinically recognised condition or illness that affects a person’s thought processes, judgement or emotions. This includes conditions such as intellectual, emotional and learning disabilities. For reasons of public policy, certain conditions or impairments may not be considered disabilities.
- The impairment must also be long-term or recurring. Long-term means that the impairment has lasted or is likely to last for 12 months. Recurring means that is likely to happen again and to be substantially limiting. Even though the condition goes away periodically, it returns and it is never cured. Progressive conditions are those that are likely to develop or change or recur. People living with progressive conditions or illnesses are considered as people with disabilities once the impairment starts to be substantially limiting. Progressive or recurring conditions which have no overt symptoms or which do not substantially limit a person with no disability, for example a person with cancer, tuberculosis or HIV would not be covered under the EEA until the symptoms substantially limit the person’s ability to perform their job.
- Lastly, the impairment must be substantially limiting, which means that its nature, duration, or effects substantially limit a person’s ability to perform essential functions of the job for which he/she is being considered. If the effects of the impairment are not substantially limiting, even if they are physical and/or mental, are long-term or recurring, then the person is not covered under the Act. Qualified experts may be used to assist the employer to determine whether a particular impairment is substantially limiting or an applicant or employee may be able to provide information sufficient to document this.
Another useful tool for employers is the Technical Assistance Guidelines on the Employment of People with Disabilities, which sets out how employers can abide by the definitions in the EEA and practically implement the provisions outlined in the Code.
In 2016 the Labour Court (hereinafter “LC”) heard the matter of Smith v Kit Kat Group. The LC conducted an enquiry into appropriate relief in the event where an employee had been unfairly discriminated against on the grounds of disability. In this matter the employee had suffered facial disfigurement resulting from a failed suicide attempt, which then caused a speech impairment. The employee was away from work for a few months, during which time the employer constantly assured the former that he would be well-received once he was ready to return.
When the employee eventually returned to tender his services to the employer he was told that his physical features were not acceptable, and that he was a constant reminder to the other employees of the unfortunate event. He was also told that his speech impairment made it difficult for other employees to understand him.
Not only did the employer not accept the employee’s return to service, but he did not take any steps to address the employee’s predicament. The employee then referred a discrimination dispute to the CCMA in terms of section 10 of the EEA. Resulting from a failed conciliation, the employee referred a dispute to the LC.
With reference to the Code, the LC assessed the employee’s state of affairs and concluded that the employee had a disability which was caused by his suicide attempt. The court then concluded that the employee was discriminated against on the grounds of disability. The LC stated that the employer had a duty to accommodate the employee, which stems from the obligation not to discriminate against the employee. The court found that the employer breached this obligation and awarded compensation and damages amounting to thirty months’ remuneration.
Employers are urged to assess how changes made in the work environment may have affected what was sufficient accommodation before the outbreak of the COVID-19 pandemic, not only to remain compliant with the law, but to also respect to the innate dignity of the concerned employees.
This article is intended for information purposes only. Mention is not necessarily made of all the finer nuances as set out in the relevant legislation. This article should under no circumstances be construed as formal legal advice.
© VDT Attorneys
|
<urn:uuid:a20df44d-1d37-4e6b-a75a-ca549cf30d9e>
|
CC-MAIN-2023-50
|
https://vdt.co.za/employment-law/reasonable-accommodation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.967617 | 1,594 | 2.875 | 3 |
Trying to graph a line from a given slope and y-intercept? Think you need to find an equation first? Think again! In this tutorial, see how to use that given slope and y-intercept to graph the line.
The coordinate plane has two axes: the horizontal and vertical axes. Learn about these axes and the name for their point of intersection by watching this tutorial!
When you have a linear equation, the y-intercept is the point where the graph of the line crosses the y-axis. In this tutorial, learn about the y-intercept. Check it out!
You can't learn about linear equations without learning about slope. The slope of a line is the steepness of the line. There are many ways to think about slope. Slope is the rise over the run, the change in 'y' over the change in 'x', or the gradient of a line. Check out this tutorial to learn about slope!
Ordered pairs are a fundamental part of graphing. Ordered pairs make up functions on a graph, and very often, you need to plot ordered pairs in order to see what the graph of a function looks like. This tutorial will introduce you to ordered pairs!
To graph a function or plot an ordered pair, you need to use a coordinate plane, so you should learn all about it! In this tutorial, you'll learn about the y-axis and see where it's located in the coordinate plane.
|
<urn:uuid:a71f5657-0718-47e1-896e-1c37417065f0>
|
CC-MAIN-2023-50
|
https://virtualnerd.com/algebra-2/linear-equations-functions/graphing-equations/graph-lines-find-points/graph-line-given-slope-intercept
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.932869 | 301 | 4.4375 | 4 |
Pupose of this Unit 30 Information Systems in Organisations Assignment is to provide learners with an understanding of how organisations use information systems to help them manage their specific needs.
Information has been described as the backbone in business success, Information is vital to communication and a critical resource for performing works in organizations daily activities. Business managers spend most of their day in meetings, reading, writing, and communicating with other managers, subordinates, customers, vendors, and other constituents via telephone, in person, or by e-mail. Indeed, management itself is information processing. You are required to address the task as specified and research a particular organization such as Tesco, Morison, or Asda to address the learning outcomes as specified: Please note that the research and subjective skill needs to exhibit transferable skill by reflecting it to the chosen organization
P1.1 Evaluate the information needs of the different functional areas of your chosen organisation Eg production, sales/marketing, finance/accounting, human resources Management
The objective of this task is to address and exhibit an understanding of different types of information systems and where they can be applied in organisations, and also how to use information systems to solve business organisations business problems.
P2.1 Discuss at least 5 different types of information systems in organisation and give examples of each and where they can be applied
P2.2- Information systems applications can be used to solve business problems, investigate the current trend in relation to:
Operational excellence, new products, services, and business models, Customer and supplier intimacy, improved decision making, and Competitive advantage
P2.3 Evaluate the suitability of information systems for different functional areas of your chosen organisation.
The objective for this task is to address and exhibit an understanding of how to use of information systems to produce management information.
P3.1 use an information system to generate valid, accurate and useful information for a given problem.
In your selected organisation, describe how to use an information system to generate valid, accurate, and useful information for any given problem of your choice
P3.2 Evaluates alternative methods of solving the problem identified in P3.1
|
<urn:uuid:96de7933-3ec1-46a6-a1ce-b9253887b7f1>
|
CC-MAIN-2023-50
|
https://w4writers.com/unit-30-information-systems-in-organisations-assignment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.913451 | 438 | 3.265625 | 3 |
The enigmatic body shape of a tropical whip sponge collected in Western Australia has resulted in the creation of a new family and genus of sponges.
The species was first described from Indonesia as Dendrilla lacunosa by Hentschel in 1912 and 100 years later found in abundance in the Pilbara and Kimberley regions of Western Australia during fieldwork for the Western Australian Marine Science Institution’s (WAMSI) Dredging Science Node project focussing on filter feeders.
This is where the puzzle begins.
Although the Western Australian specimens were identified as Dendrilla lacunosa by Dr Jane Fromont, sponge taxonomist at the Western Australian Museum (WAM), its large, whip-like morphology was extremely unusual for Dendrilla sponges, which are usually small and delicate, so Jane decided to enlist the help of an international team to discover if this really was a Dendrilla or not.
It turns out Jane’s initial hunch that this was a strange sponge was true. With her international colleagues Drs Jean Vacelet (France), Dirk Erpenbeck and Hermann Erhlich (Germany) and Cristina Diaz (USA), a new family of sponges has been established. The new family, Ernstillidae, and the new genus Ernstilla are named for Ernst Hentschel who originally described the species.
It took some excellent sleuthing to discover where this sponge species really belongs. Molecular results placed it far away from other Dendrilla species, in fact in a different subclass! Analysis of its skeleton, which was found to contain chitin, confirmed that this sponge belonged in a different subclass and was not Dendrilla. However, some of its characters are unusual, such as the shape of its filtering chambers and the branching nature of its skeleton, so much so that it did not fit into any family or genus currently known, hence the new names.
New species of sponges are described after exhaustive research to be absolutely certain they are new, and many more sponges await new species descriptions, but it is far less common to find a new family or genus. Only the team work of international experts could have resolved this enigma.
To give context to the change of taxonomic position of this sponge from one subclass to another, the shift is comparable to humans (Homo sapiens) being taken out of the subclass Placentalia where all Primates belong, and being placed in Marsupialia with the kangaroos!
The WAMSI Dredging Science Node is made possible through $9.5 million invested by Woodside, Chevron and BHP as environmental offsets. A further $9.5 million has been co-invested by the WAMSI Joint Venture partners, adding significantly more value to this initial industry investment. The node is also supported through critical data provided by Chevron, Woodside and Rio Tinto Iron Ore.
|
<urn:uuid:ec255802-8289-44b4-87bc-62ec5a23f6e1>
|
CC-MAIN-2023-50
|
https://wamsi.org.au/news/new-name-for-a-tropical-whip-sponge/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.960267 | 608 | 3.765625 | 4 |
When the official Obama portraits were unveiled at the National Portrait Gallery in Washington D.C. earlier this year it set off a wave of discussion we don’t typically have every day in this country. A conversation about fine art. And for a few days, we wrestled together with some big questions – about what constitutes good art, or fair representation.
In America, those questions hit harder in African American circles, because of the history of imagery and depiction that has at times mocked black people, demeaned black culture, and stripped African Americans of their rights to self-identity.
But not everyone immediately understands why it’s different – why African American portraiture, for instance, is different than it is for white people.
Dr. Mary Schmidt Campbell is president of Spelman College, a fine arts scholar, and dean emerita of the Tisch School of Arts and Associate Provost for the Arts at New York University. She tells Detroit Today the Obama portraits by Kehinde Wiley and Amy Sherald bear some of the same notes seen in royal portraiture.
“There is something quite regal about them,” says Campbell. “It’s almost as if they’ve deliberately taken them out of just an American or just a Western context, and they placed them in a much bigger context of what it means to carry the weight of their roles [and] the world in general.”
“They don’t exist in any one particular time and space. They exist in a universal time and space.”
She will be the keynote speaker at a conference next week called Terms of the Debate: The Battle for the Black Body, 19th Century to the Present Reception, at Harvard University.
|
<urn:uuid:b7b8ee42-353e-41fd-b9e6-3bcd8eb6afb9>
|
CC-MAIN-2023-50
|
https://wdet.org/2018/03/16/president-of-spelman-college-on-obama-portraits-and-african-american-fine-art/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.948753 | 364 | 3.3125 | 3 |
🧑🏭 Labor Union Role in Advocating for Workers' Rights Quiz
Understanding the Role of Labor Unions in Advocating for Workers' Rights
This quiz will test your knowledge about the role of labor unions in advocating for workers' rights. Let's see how much you know!
Just completed our "Understanding the Role of Labor Unions in Advocating for Workers' Rights" quiz? Great job! This interactive tool is designed to deepen your understanding of labor unions and their critical role in advocating for workers' rights. But there's always more to learn!
Did you know that the core purpose of labor unions is to protect workers' rights? They act as a collective voice, standing up against unfair labor practices and advocating for better working conditions. Learn more about the role of labor unions here.
Unions also play a vital role in educating workers about their rights. They ensure that workers are informed and empowered to advocate for themselves. This is especially important in a landscape where some perceive America as hostile to workers' rights.
Workers' rights in the US are often perceived as inferior due to a variety of factors, including the influence of corporate interests, lack of labor unions, and workers being unaware of their rights. If you're interested in this topic, you might find our article on Pennsylvania labor laws enlightening, as it offers a glimpse into how different states approach workers' rights.
But remember, knowledge is power. Being aware of your rights as a worker and understanding the role of labor unions in advocating for these rights is the first step towards ensuring fair treatment at work. If you're curious about how labor disputes have historically impacted workers' rights, check out our FAQ on the subject.
At Weary Worker, we're committed to providing you with up-to-date, comprehensive information on labor laws and workers' rights across the United States. Stay informed, stay empowered!
|
<urn:uuid:7986d127-3046-4190-affc-432c2c844e69>
|
CC-MAIN-2023-50
|
https://wearyworker.com/quiz/labor-union-role-in-advocating-for-workers-rights-quiz
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.967155 | 386 | 2.890625 | 3 |
Education outside the classroom (EOTC) is an important part of school life at Wentworth Primary School. EOTC is curriculum-based teaching and learning activities that go beyond the walls of the classroom. It includes any activity that takes place outside the school ranging from a museum or marae visit, to a sports trip, field trip, or outdoor education camp.
Excursions and Field Trips
In addition to our School Camps, Learn to Sail day, Trip to Wellington and other sporting activities, our excursions and field trips provide unique and stimulating learning opportunities that support our student’s learning and achievement.
Have a look at some of the fun things we have enjoyed:
Tiri Tiri Matangi
Ti Point Reptile Park
|
<urn:uuid:f153baf4-611f-44b4-9a3a-4a2d1ee0b63b>
|
CC-MAIN-2023-50
|
https://wentworth.school.nz/primary/primary-school-events/eotc/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.934022 | 154 | 2.71875 | 3 |
This poster comments on one of the main challenges many people faced during World War I, which was starvation. Because the war was happening, many Europeans, especially women and children, did not have access to enough food to sustain themselves. This poster was created by the United States food administration, supposedly to entice citizens to buy war bonds or support the war financially in some other way, including donating food to the war effort.
The first notable aspect of this poster is the people the artists chose to depict. There is only women and children present in this poster, which points to the target demographic this propaganda was aimed at. The people in the foreground appear to be a woman and her two children. Seemingly, this piece targeted people who were able to contribute to the war effort in a meaningful way from the home front. This poster was aimed specifically at those groups because they were not fighting in the war and perhaps were capable of contributing in other ways. The artists make the image dreary and sad by their choice of color; they use dull colors like blues, blacks, and whites to get across the desperation they intended to depict. Additionally, the art style adds to the message of the poster because the “sketch-like” style the artists employ amplifies those same emotions. Overall, the people in the poster capture the emotions the artists wanted to show as well as the audience they wanted to target.
The second significant aspect of this poster is that the artists were clearly depicting a European setting in the image. The buildings in the background, especially the church on the left, demonstrate the architecture of many European towns. This is important because this poster was targeted at American citizens, so the artists wanted to create a connection between those citizens and the people in Europe who were living through the war itself. This connects with the text on the poster: “Don’t waste food while others starve,” because it incentivized Americans to support a war that was not even in their home country. There is an aspect of self-sacrifice as well, encouraging people to give up any food they do not absolutely need for the greater good. This choice made by the artists is an interesting one, yet it makes sense in the context of the piece they created and adds an aspect to the work that unifies Americans and their allies in Europe.
The last aspect of the poster that grabs the audience’s attention is the people between the foreground and the background. They are a faceless mass of people suffering from the food drought just as much as those in the foreground. Their anonymity makes their status more relatable to the audience because they are not just characters in a poster; they are citizens who could represent any American if the war did eventually come to American land. On the other hand, they are also a representation of the countless European citizens who did suffer from the war. This interpretation would tap into the empathy of the American people and their willingness to help others from foreign nations; it might also give light to an idea of American “moral superiority” for their willingness to help others. This poster presents both sides of the conflict: how American citizens need to be ready if the war did come to their shores, and how they should view the war through the lens of European citizens who were seeing the atrocities firsthand.
|
<urn:uuid:ef20a50c-182d-4ef8-9202-551fe5de1ebf>
|
CC-MAIN-2023-50
|
https://wewantyou.us/2023/10/dont-waste-food-while-others-starve/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.982849 | 672 | 3.8125 | 4 |
As much as you wish they could sometimes, your partner cannot read your mind. And you cannot read theirs either. We are very smart, perceptive creatures and often feel like we can pick up on patterns in our loved ones’ lives. Sometimes people become so predictable, it feels like we can anticipate others’ needs. Even though we get lucky with predicting or anticipating behavior or needs sometimes, we cannot do this in every situation. While predicting patterns can be harmless and even helpful at times; it is a precedent that can be harmful for people in relationships.
Sometimes we may want our partners to ask the right question or say the right thing to make us feel better. No matter how long you have been in a relationship, this is not realistic for us to expect out of others. We may often be disappointed if we do set our expectations to this unrealistic standard. In addition, unrealistic expectations often lead to inaccurate assumptions about ourselves, our partners, or our relationships. This can contribute to more arguments, miscommunication, and resentment over time.
We will take a look at an example to help illustrate how mind-reading can cause problems.
Your partner has the same day off of work as you this week. To meet your social needs, you may intend to spend the whole day together. You may assume this is what your partner wants to do on their day off as well because that is what you have done several times in the past. When the day comes, you find out your partner has errands to run and a friend coming over to catch up.
Not communicating your intentions has resulted in not being able to spend much time with your partner. This may also spark unhealthy assumptions such as, “They don’t want to spend time with me,” “They would rather spend time with their friend,” “They want to break up with me,” etc. In reality, your partner may have procrastinated important errands and cancelled on this friend last week in order to spend time with you after work. Now, they feel they need to prioritize errands and meet with this friend not only to support their own mental health, but also to maintain this important friendship.
As you may see in this example, both people had different expectations for their day and did not communicate their plans/intentions with each other. This emphasizes the importance of communication of our needs and directly asking for the things we want and need in relationships. If this couple communicated about their expectations for the day off, they could have possibly come to a compromise by running errands together or waking up early enjoy breakfast together before focusing on their own self-care for the day. While you may not be able to spend the whole day with your partner like you would prefer; at the very least, you will learn your partner’s reasoning behind the choices they made for the day. This may prevent you from going down the rabbit hole of unhealthy assumptions.
Communication, specifically assertive communication, is vital to healthy relationships. Asserting our needs, expressing our emotions, and asking for help are necessary building blocks to healthy, positive, and lasting relationships. Oftentimes, we think “love should be easy” and if things do not work out the way we expect them to, that means the relationship is “too much work.” This can be a relationship-ending assumption. The truth is that relationships require work; hard work, from both parties continuously throughout the relationship! It is not our partner’s job to anticipate our needs and perform them. It is our job to figure out what we need, and to communicate that directly to them.
Not only is assertiveness important in our romantic relationships, but also with family and friends, with coworkers and employers, as well as in situations with strangers. Yes, being assertive, asking for help, and talking about our feelings can be challenging. In order to create and establish lasting and meaningful relationships, we need to continuously work to communicate with others. Speaking with your therapist to practice this type of communication may be very helpful. Practicing assertiveness with safe people in low-pressure environments can make things feel easier when we need to communicate our needs in more important situations. I encourage you to take what you have read today and share this with your partner or loved ones. Even if you are already practicing assertive communication, a gentle reminder can be helpful sometimes!
|
<urn:uuid:2a50d5ca-e54c-45a7-97b5-e38fbbb80b3a>
|
CC-MAIN-2023-50
|
https://wibehavioralhealth.com/the-mistake-of-mind-reading/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.971039 | 901 | 2.515625 | 3 |
#shorts #largest island #US #Hawaii’s Big Island
Hawaii #square kilometers
Yo! Here are the five biggest islands in the US, from biggest to smallest: Hawaii’s Big Island, Kodiak Island, Puerto Rico, Prince of Wales Island, and Chichagof Island.
Big Island is home to the world’s largest active volcano, Mauna Loa. Kodiak Island is the land of the Sugpiaq people and is home to its own subspecies of brown bear, the Kodiak bear.
Puerto Rico is located in the Caribbean Sea and is home to a variety of tropical wildlife. Prince of Wales Island is in Alaska and was named after the Prince of Wales of England.
And finally, Chichagof Island is also in Alaska and is home to a subspecies of brown bear known as the ABC Islands bear or Sitka brown bear.
|
<urn:uuid:c3293f6b-a28b-4239-b198-cc62ce30b0fa>
|
CC-MAIN-2023-50
|
https://wiredhippie.com/you-wont-believe-whats-on-these-5-us-islands/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.948269 | 190 | 2.515625 | 3 |
In a society renowned for its low level of violent crime, two recent random mass stabbings have raised questions and concerns. These shocking incidents have left citizens bewildered and searching for answers regarding the nature of criminal acts in an otherwise peaceful environment. While such occurrences are rare, they pose the urgent need for a deeper understanding of the underlying causes and potential solutions to prevent further tragedies.
The unexpected nature of these random mass stabbings has shaken the foundation of a society accustomed to safety and tranquility. People are grappling to comprehend how such acts of violence can occur in their community, often regarded as one of the safest in the world. These incidents have ignited a sense of vulnerability and fear among citizens, prompting a renewed emphasis on the importance of crime prevention and public safety measures.
As authorities investigate the motives behind these attacks, one cannot ignore the pressing need to address the underlying factors that may contribute to such acts of violence. Societal issues such as mental health, social isolation, and access to weapons may play influential roles. It is crucial for stakeholders to engage in a constructive dialogue to understand these complex societal dynamics, in order to formulate comprehensive strategies for prevention.
The impact of these stabbings on the victims’ families and the community at large cannot be overstated. Lives have been irrevocably altered, and the trauma inflicted on survivors will resonate for years to come. Rebuilding a sense of security is paramount for those affected, as well as providing them with the necessary support to heal and move forward. Community mobilization efforts, counseling services, and coordinated responses from law enforcement agencies can all contribute to the process of recovery.
In light of these horrific incidents, there is an urgent need for society to reevaluate its safety measures, particularly in public spaces. Enhancing security protocols and surveillance systems can serve as crucial deterrents to potential criminals. In addition, investing in community policing initiatives and fostering stronger relationships between law enforcement agencies and the public can foster trust, cooperation, and timely reporting of suspicious activities. Together, these measures can heighten the overall security perception within the community.
Education also plays a pivotal role in preventing acts of violence. Developing programs that promote mental health awareness, conflict resolution skills, and early intervention strategies can assist in identifying individuals at risk of perpetrating violent acts. By equipping individuals with the necessary tools to identify and address underlying issues, the society can proactively work towards reducing the likelihood of such tragedies.
In conclusion, the occurrence of two random mass stabbings in a society renowned for its minimal violent crime rates has sparked concern and inquiry. The shocking and unexpected nature of these incidents necessitates an in-depth examination of their underlying causes. By addressing mental health, social isolation, access to weapons, and implementing comprehensive prevention strategies, the community can strive towards preventing further tragedies of this nature. It is crucial for authorities, stakeholders, and the public to come together and work towards rebuilding a sense of security, while simultaneously implementing measures that ensure the safety and well-being of all citizens.
|
<urn:uuid:c1f54858-406d-4486-941a-ca11d4bed230>
|
CC-MAIN-2023-50
|
https://woyem.net/world/dont-ask-why-south-korea-grapples-with-back-to-back-mudjima-stabbings-12517
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.939541 | 609 | 3.140625 | 3 |
The respiratory system is the set of organs that intervene in breathing. This system is responsible for the distribution of oxygen in the body.
It is responsible for capturing oxygen and removing carbon dioxide from the body. The organs of the respiratory system are not found in all living beings in the same way. Some animals have a type of breathing in which the cells do not carry oxygen to the rest of the body. Rather, his breathing is cutaneous. Examples of these animals are sponges or coelenterates.
Some beings have a respiratory system constituted by gills. Others, on the other hand, have lungs. It is said that, in terms of evolution, branchial breathing is more primitive than pulmonary respiration.
As for the respiratory system of humans, it has lungs and performs 26,000 breaths a day while a baby breathes up to 51,000 times a day.
Characteristics Of Respiratory System
The respiratory system is composed of different organs: nasal cavity, nasal cavity, oral cavity, pharynx (which is also part of the digestive system), larynx (here are the vocal cords), epiglottis (it is responsible for closing the trachea while the person is eating), trachea (cartilaginous tubes that retain dust particles), bronchi, bronchioles, lung alveoli and lung.
The main functions of the respiratory system are:
Provide the necessary oxygen for the body to live. When inhaling the person sucks oxygen. It is the respiratory system that is responsible for transporting it to the blood to provide oxygen to the different organs of the body.
Eliminate carbon dioxide from it, by exhaling the air.
Heat the air that is inspired.
Filter and clean the same oxygen.
For your study it is classified into 2 zones.
Driving area. Here are included all the anatomical areas that oxygen crosses before reaching the next zone (respiratory zone)
Respiratory zone It is the area where the exchange of gases happens.
4. Types of alveolar cells
In the respiratory system there are two types of cells that fulfill different functions:
Type I pneumocytes. These comprise between 95% and 97% of the total area of the lungs.
Type II pneumocytes. These cells are found in smaller quantities (only between 3% and 5%). They secrete a substance called pulmonary surfactant. Said substance avoids tension inside the alveoli. In this way they prevent them from collapsing. This surfactant is composed of phospholipids and proteins.
5. Properties of the lungs
Adaptability. That is, the lungs exchange air. This produces some expansion or expansion of the lungs.
Elasticity. Although they have the peculiarity of dilating, they contract thanks to this elasticity that they have and that is necessary thanks to the fact that they have elastin proteins.
Surface tension. It refers to the tension that occurs inside the alveoli.
Although the muscles do not belong to this respiratory system they act and intervene in the breathing.
The muscles involved in inspiration:
The muscles that intervene in the expiration:
External oblique abdomen
Oblique internal abdomen
Trasverso of the abdomen
Straight of the abdomen
7. Pulmonary ventilation
It is a process that allows both the movement of air into the lungs (inspiration) and outward (expiration). Although there are only two moments here, there is certainly another moment that is little taken into account: the moment without expiration or inspiration. That is, the moment of rest.
8. Lung capacity
There are different volumes of oxygen that enter the lungs. Thus they differ between:
Current volume. It is the normal or usual volume that enters the lungs.
Volume of the inspiratory reserve. It is called the type of oxygen that enters the lungs too much and does so in a forced manner.
Volume of the expiratory reserve. It is the amount of air that leaves the body in a forced and excessive way.
Vital capacity It refers to the amount of air that can expire after forced inspiration.
Volume of residual type. It is the amount of air that remains inside the lungs permanently. In the case of adult humans this amount can be up to 1.5 liters.
Total lung capacity. It is the maximum amount that the lungs can contain.
9. Unusual functions of breathing
Cough. It is a reflex action that can come from the nervous, respiratory or digestive systems.
The hiccups. It is an involuntary contraction of the diaphragm.
The sneeze. Which occurs as a response to an irritation from dust particles or odors.
Yawning. Related to the nervous system and associated with physical, mental fatigue and sleep levels of the person. This is also a way to increase the blood supply to the brain.
The sigh. It is a way to level the volume of air that enters the brain.
Laughter. From the point of view of the respiratory system, laughter comprises a series of actions that release air from the body in a short, weak and intermittent manner.
Some diseases or specific pathologies that affect the respiratory system:
Viral or bacterial infectious diseases.
Cancer of the lung, larynx, trachea, pharynx, etc.
|
<urn:uuid:243e9bf9-bca1-42d8-ad4e-759d69ecbec9>
|
CC-MAIN-2023-50
|
https://www.8sa.net/10-characteristics-of-respiratory-system-what-is-the-respiratory-system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.914291 | 1,111 | 3.625 | 4 |
Have you been diagnosed with Spinal Stenosis?
Have you looked on the internet in search of an answer?
Spinal Stenosis refers to a condition of the spine where the spinal canal is abnormally narrow. This could be a congenital condition or a result of a traumatic or degenerative condition such as osteoarthritis, disc ruptures or excessive ligament laxity.
Many people will be unaware of congenital spinal stenosis, acquired stenosis can be due to sporting or work related injuries, or accidents where the spine is forced into hyperflexion, hyperextension, or an compressive force on the spine initiates symptoms.
- Signs of stenosis range from:
- No symptoms to numbness,
- burning pain,
- temporary loss of sensation and muscle function in the arms and legs.
Episodes can typically last for a few minutes or several hours. Occasionally the symptoms will be brought on by exertion - walking, running etc. rest and bending forwards, or sitting down will often relieve symptoms.
Diagnosis of spinal stenosis is usually by spinal imaging, (X-Ray or MRI or CT scans). Painkillers and anti-inflammatories can be used for pain and symptomatic treatment.
Here at Stockwood Osteopathic & Sports Injury Clinic we have an IDD Therapy machine which can help with the symptoms brought on by Spinal Stenosis.
- Accurate diagnosis via physical examination and the use of an MRI scan the structures contributing to your injury can be identified and addressed.
- Treatment is targeted to the spinal levels which are causing the issues.
- A program of exercises can be prescribed to get you back to strength and fitness.
Targeted distraction of the spine by an IDD Therapy machine can be used to ease the symptoms of some spinal stenosis. In some cases spinal surgery may be necessary if no other treatments have been effective.
If you are curious to find out more download our Spinal Stenosis program follow this link Click HERE or call on 01280 390760.
|
<urn:uuid:04203251-d57e-417e-82e2-7ef4c48bb3bb>
|
CC-MAIN-2023-50
|
https://www.999ost.com/blog
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.907126 | 423 | 2.671875 | 3 |
Definition of Four Ps (Product, Price, Place, Promotion)
The Four Ps (Product, Price, Place, and Promotion) are fundamental marketing elements, forming the basis of the marketing mix. They represent a strategic approach to defining a product’s value proposition and reaching the target audience. “Product” refers to the goods or services offered; “Price” is the cost set for those goods or services; “Place” involves the distribution channels and methods; and “Promotion” encompasses advertising, PR, and other means of communication.
The phonetic pronunciation of this keyword is: /fɔːr piːz/ (Product, Price, Place, Promotion)Breaking it down:- Four: /fɔːr/- Ps: /piːz/- Product: /ˈprɒd.ʌkt/- Price: /praɪs/- Place: /pleɪs/- Promotion: /prəˈmoʊ.ʃən/
- Product refers to the goods or services being offered, taking into consideration the needs and demands of the target audience. It can also pertain to the design, packaging, and overall quality of the product.
- Price represents the financial value assigned to the product or service, and is carefully determined based on production costs, competition, target market, and perceived value. Pricing can heavily influence the consumer’s purchasing decision.
- Place focuses on the distribution channels chosen for making the product available to customers, such as physical stores, e-commerce platform, or a combination of both. The accessibility and convenience of the product’s availability can impact its success.
- Promotion involves communication strategies and tactics used to create awareness and generate interest in the product or service. Promotional activities include advertising, public relations, social media marketing, and sales promotions.
Importance of Four Ps (Product, Price, Place, Promotion)
The Four Ps (Product, Price, Place, Promotion) are crucial in digital marketing as they form the foundation of an effective marketing strategy. These elements help marketers to create a comprehensive marketing mix, ensuring that businesses cater to their target audience’s needs and preferences.
The Product encompasses the features and benefits of the goods or services being offered, while Price determines the optimal cost based on factors such as competition and perceived value. Place refers to the distribution channels, both online and offline, that facilitate access and availability of the offerings.
Lastly, Promotion involves utilizing various communication tools and techniques to promote and raise awareness about the brand and its offerings. Together, the Four Ps allow a business to create a well-rounded approach to building strong connections with consumers and achieving marketing objectives and overall business success.
The purpose of utilizing the Four Ps in digital marketing is to effectively address the key elements that dictate the success of a marketing strategy. Product, Price, Place, and Promotion serve as vital pillars allowing businesses to develop a comprehensive marketing plan which caters to the needs and preferences of their target audience, as well as optimizing their online reach. By focusing on the Four Ps, businesses can craft strategies that not only resonate with their audience but also facilitate seamless adaptation as markets and consumer behaviors evolve.
This ensures that companies maintain a competitive edge within their niche, driving customer engagement and consequently, sales. When utilizing the Four Ps, businesses can successfully create and deliver products or services that capture the interest of their target audience and correspondingly generate revenue. Product refers to identifying the unique selling points and features that make their offerings stand out in the market.
Price encompasses setting an appropriate pricing strategy that balances competitiveness with profitability. Ensuring accessibility and optimal positioning of the offerings is addressed under Place, which encompasses aspects such as the choice of online channels and distribution strategies. Finally, Promotion refers to the communication and marketing efforts that create awareness, stimulate interest, and engage potential clients, such as social media campaigns, search engine optimization, and content marketing.
In essence, the Four Ps serve as practical tools for companies to develop well-rounded digital marketing strategies that effectively cater to their target market, bolstering their online presence and profitability.
Examples of Four Ps (Product, Price, Place, Promotion)
Example 1: Apple Inc.- Product: Apple offers innovative and high-quality products, such as the iPhone, iPad, MacBook, AirPods, and various software.- Price: Apple uses a premium pricing strategy to reflect the high quality and advanced technology of its products, which allows them to maintain a strong brand image and attract loyal customers.- Place: Apple products are available in Apple retail stores, the online Apple Store, and authorized resellers worldwide.- Promotion: Apple promotes its products through extensive advertising campaigns, product launches, promotional events, and its website.Example 2: Coca-Cola- Product: Coca-Cola manufactures and sells a wide range of beverages including Coke, Diet Coke, Coke Zero, Sprite, Fanta, and other soft drinks.- Price: Coca-Cola uses competitive pricing for its products, keeping them affordable for consumers while maintaining a profitable margin. They also employ discounts and promotional pricing at certain times.- Place: Coca-Cola products can be found in supermarkets, convenience stores, vending machines, restaurants, and many other locations worldwide.- Promotion: Coca-Cola utilizes a variety of promotional strategies, including advertising campaigns, sponsorships, product placements, and community engagement initiatives.Example 3: Nike- Product: Nike offers an extensive line of athletic footwear, apparel, and accessories, targeting various sports such as running, basketball, soccer, and more.- Price: Nike uses a pricing strategy that combines value-based and competitive pricing. They offer a range of products at different price points, catering to various consumer segments.- Place: Nike products are available through their own retail outlets, online store, authorized retailers, and in partnership with department stores worldwide.- Promotion: Nike’s promotional efforts include advertising, celebrity endorsements, sponsorship of sports events and teams, and engaging with customers through digital platforms and social media.
FAQ Section: Four Ps (Product, Price, Place, Promotion)
What are the Four Ps?
The Four Ps is a concept in marketing that stands for Product, Price, Place, and Promotion. It is also known as the marketing mix. These elements are used to create a marketing strategy for a product or service, helping businesses to achieve their goals and reach their target market effectively.
Why are the Four Ps important?
The Four Ps are essential because they serve as a guide for businesses to develop a successful marketing plan. By focusing on these four elements, a business can create a strong foundation for its marketing efforts and better understand its target audience, ultimately leading to higher sales and greater brand awareness.
What is the role of the Product in the Four Ps?
Product refers to the actual item or service that a business is offering to its customers. This includes not only the physical product but also its features, design, quality, branding, and packaging. The product should be tailored to meet the needs and preferences of the target market, ensuring that it adds value to the customers and stands out from competitors.
How does Price factor into the Four Ps?
Price is the amount that customers are willing to pay for a product or service. It directly impacts the profitability and market positioning of a business. Several factors influence pricing decisions, including production costs, competition, target customer segment, and overall marketing objectives. Determining the right price requires research and analysis to find a balance that attracts customers while generating a profit for the business.
What does Place mean in the context of the Four Ps?
Place, also referred to as distribution, is all about ensuring that the product is available to customers when and where they need it. This includes selecting the appropriate sales channels, such as online or brick-and-mortar stores, and managing inventory to meet customer demand. Finding the ideal distribution channels helps in widening the product’s reach and increasing sales opportunities.
How does Promotion fit into the Four Ps?
Promotion refers to the communication strategies used to inform, persuade, and remind customers about a product or service. This encompasses advertising, public relations, social media, sales promotions, and other marketing tools. A successful promotion strategy raises awareness about the product’s benefits, engages the target audience, and ultimately, drives customer purchases.
Related Digital Marketing Terms
- Marketing Mix: The combination of the Four Ps (Product, Price, Place, Promotion) to create an effective marketing strategy.
- Target Market: The specific group of customers for whom a product is designed and marketed to, based on their needs, preferences, and demographics.
- Brand Positioning: The way a brand or product is perceived in the minds of consumers, which is primarily influenced by the combination of the Four Ps.
- Value Proposition: The unique selling points and benefits of a product or service, which differentiate it from competitors and justify its price.
- Integrated Marketing Communications (IMC): A strategic approach to coordinating all promotional activities across various channels, ensuring consistent messaging and reinforcing the impact of the Four Ps.
|
<urn:uuid:85ac2580-849f-469a-b590-06d175c65ea6>
|
CC-MAIN-2023-50
|
https://www.adogy.com/terms/four-ps-product-price-place-promotion/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.933652 | 1,858 | 2.890625 | 3 |
Aptamers, also called chemical antibodies, are small oligonucleotide sequences that bind to their targets (such as proteins, bacteria, viruses, or cells) with high specificity and affinity. Due to its high tissue penetration, rapid production, low synthetic cost, low immunogenicity, thermal stability, and ease of labeling, aptamers have the potential to overcome difficulties of treatment in pancreatic cancer (PC), one of the deadliest diseases with high mortality and short overall survival time.
Fig. 1 Application and development of aptamer in cancer: from clinical diagnosis to cancer therapy. (Han, Jing, et al.,2020)
Overview of aptamers
Aptamers refer to single-stranded oligonucleotides (DNA or RNA) of 20-100 nucleotides in length. They have a high affinity to the target markers, which is largely dependent on their unique three-dimensional structure, including loop, bugle, pseudoknot, G-quadruplex, and kissing hairpin. Due to similar recognition mechanisms, aptamers are often compared to antibodies. Aptamers are generated and selected from an initially larger pool of oligonucleotides by a repetitive in vitro process, namely exponential enrichment of phylogenetic ligands (SELEX). The SELEX process involves the iterative enrichment of a pool of oligonucleotides. The pool and the targets are incubated together to allow the identification of some sequences of the target. Bounded sequences are then separated from unbounded sequences and finally amplification of bounded sequences is performed.
|Comparison between antibody and aptamer|
|Targets||Mostly immunogenic macromolecular targets||Widely|
|Synthetic method and time||cell culture (4-6 months)||chemical synthesis (2-3 months)|
|Modification||Conjugated with signaling or binding molecule||Versatile|
|Size||50-100 kDa||15-30 kDa|
|Stability||Susceptible to high temperatures||Fairly stable at ambient temperature|
The service offering at Alfa Oncology
- Developing aptamer-based drugs for PC
Aptamers are produced and selected by SELEX technology. Our improved SELEX technology is characterized by reduced sample injection, high separation efficiency, high degree of automation, and economy. We are dedicated to offering high-quality aptamers to satisfy our customers’ specific requirements.
To improve aptamer's stability, specificity, pharmacokinetic, and pharmacodynamic properties, we are able to provide various biochemistry approaches to modify aptamers. Among them, chemical modification of aptamers is commonly used to increase the stability and applications of aptamers. Chimerization of aptamers is another type of modification that refers to binding to another aptamer, siRNA, protein, enzyme, biomolecule, or drug. Chimeric aptamers have greater stability and nuclease resistance and can be designed to bind specifically to tumor cells and deliver drugs to target cells.
- Developing aptamer-drug conjugates of PC
In addition to helping customers to develop direct-acting cancer aptamers, we also provide aptamer-drug conjugates (AptDC) development service for PC, involving RNA AptDC, DNA AptDC, and aptamer-siRNA conjugates. Based on a range of PC preclinical models, we can perform a wide range of preclinical assessments, including but not limited to:
-AptDC formation and binding assay
-Targeting and internalization of AptDC specific to PC cells
-In vitro and in vivo cytotoxicity of AptDC
-Nuclease resistance assay
Aptamers offer an attractive targeted therapy for PC. Alfa Oncology is committed to advancing our clients' development of aptamer-based therapy for PC. For more about our services, please contact us. We are glad to work with you!
- Han, Jing, et al. "Application and development of aptamer in cancer: from clinical diagnosis to cancer therapy." Journal of Cancer 11.23 (2020): 6902.
- Xiang, Dongxi, et al. "Nucleic acid aptamer-guided cancer therapeutics and diagnostics: the next generation of cancer medicine." Theranostics 5.1 (2015): 23.
- Li, Q., et al. "Aptamers: a novel targeted theranostic platform for pancreatic ductal adenocarcinoma." Radiation Oncology 15.1 (2020): 1-12.
|
<urn:uuid:b723a998-0f42-4ba2-9dcd-4dc5e2a2a0d6>
|
CC-MAIN-2023-50
|
https://www.alfaoncology.com/pancreatic-cancer/aptamer-based-therapy-development-for-pancreatic-cancer.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.874846 | 958 | 2.796875 | 3 |
Navigating the Waves of Ocean Freight and Incoterms – A Guide
Ocean freight is a prevalent transport mode in the logistics space. It’s the first choice for shipping bulk volumes of cargo. There are several dynamics to ocean freight and one is the shipping contract or agreement. The agreement is vital and the Incoterms were established to eliminate discrepancies or disputes in the shipping contracts. These Incoterms allocate the responsibilities of both parties involved in shipping cargo.
An ideal understanding of Incoterms and how it affects ocean freight will facilitate smooth shipping, which is why we bring you this post to learn useful information about Incoterms and navigate how it plays on risk and cost.
Understanding Ocean Freight
Ocean freight is a mode of transport that involves moving cargo or goods via sea. Your cargo is loaded onto vessels and shipped to the destination port via sea routes. It’s a mode of transport that has experienced several stages of evolution, spanning from traditional systems to current modern dynamics.
As the oldest solution for international shipping, it has played key roles and is still an important system to date. Let’s have a look at its role in global shipping.
- It provides global connectivity, which is a significant limitation for road and rail transport. Shipping routes connect ports in countries of the same and different continents.
- It provides versatility as it accommodates different types and volumes of cargo.
- It provides an ideal solution for moving bulk quantities of goods. The heaviest cargo can be moved via ocean freight.
- It provides a cost-effective way for shipping goods. One can easily transport large volumes of goods at relatively fair rates.
Key Players in Ocean Freight Shipping
Ocean freight proves effective courtesy of the key roles of each player. These players are equally important as they meet the needs of moving cargo via sea. These key players are the shippers, carriers, freight forwarders, and consignees.
- Shippers: These are the cargo owners who pay for the transportation services. The shippers are responsible for the negotiation of rates and documentation.
- Carriers: These are the brands or companies that offer ocean freight transportation services. They are the shipping lines or vessel owners that move the cargo from origin to destination.
- Freight Forwarders: These are the middle players between shippers and carriers. They are professional or logistics experts that help the shipper handle documentation, negotiate rates, and hand over the cargo to the carriers for transportation.
- Consignee: These are the receiving party. Consignee is the player at the destination who receives the cargo upon arrival.
Types of Ocean Freight Services
Shippers have different needs for their cargo. As a result, there are two main solutions in the ocean freight space to meet these needs.
Full Container Load (FCL
It is an ocean freight type where the shipping container carries only the cargo of a particular shipper. It’s ideal when the shipper wants to transport large volumes of cargo that can fill the entire container.
This is an ocean freight type that involves consolidating cargo from different shippers and transporting them in a single container. It is the ideal solution for small businesses or shippers with a low volume of cargo.
Factors Influencing Ocean Freight Rates
Freight rates are fees charged by carriers and authorities for the transportation of cargo via sea. These rates are dependent on several factors such as operational factors, market dynamics, and regulatory influences.
This involves every activity that facilitates the movement of the cargo to the destination port. Such activities include the loading and unloading of cargo, distribution of containers, etc. These activities are fulfilled with a price, so carriers impose a fee to cater to this cost.
This involves the forces of demand and supply. Times of high demand increase shipping activities which pushes up freight rates. When the forces of demand and supply are stable, freight rates tend to be stable.
Shipping rules and regulations influence ocean freight rates. These regulations such as security rules, customs duties, and tariffs attract cost. So, they are also considered in freight rates.
Overview of Incoterms
Incoterm is an acronym for International Commercial Terms. They are trade terms used to define the risk, cost, and responsibilities of buyers and sellers in the transportation and delivery of cargo in cross-border trade.
Importance of Incoterms in International Trade Contract
The Incoterms are established to eliminate confusion from international trade contracts. This is a very important feature as it provides a clear framework for cross-border trade contracts. Here is a breakdown that shows the importance of Incoterms.
- It allocates costs to the parties of the contract. So, each party knows what cost to handle in the trade or shipping process.
- It allocates responsibilities to the parties of the contract. As a result, everyone knows the extent of what they are supposed to handle.
- It explains the risk management strategy showing which party bears the risk in different situations.
- It serves as a global standard; hence, it is generally acceptable and eliminates disputes, legal issues, etc.
Explanation of Different Incoterms
There are several Incoterms ensuring order and understanding in international trade contracts. Let’s have a better understanding of these terms.
Free Carrier (FCA)
This depicts that the seller moves goods to a carrier chosen by the buyer and the buyer takes responsibility for the risk and transportation.
Ex Works (EXW)
This depicts that the seller is obligated to make goods available at the agreed location. Then the buyer takes responsibility for all costs and transportation.
Free on Board (FOB)
This depicts that the seller has the responsibility of taking goods to the port and loading them onto vessels. The buyer then bears the burden of risk and loss immediately after the goods are loaded onto the vessels.
Cost, Insurance, and Freight (CIF)
The seller is obligated to deliver the goods to the agreed port and bears the burden of cost, insurance, and freight.
Delivered Duty Paid (DDP)
The seller is obligated to deliver goods at the agreed place bearing all the costs and risks.
Delivered at Place (DAP)
The seller is obligated to deliver goods at the agreed location but the buyer bears the cost of duties and taxes.
Comparison of Seller and Buyer Risk Under Each Incoterm
- FOB (Free on Board): The buyer bears more of the risk than the seller.
- EXW (Ex Works): The buyer bears more risk than the seller.
- CIF (Cost, Insurance, and Freight): The seller bears all the risk.
- DDP (Delivered Duty Paid): The seller bears all the risk.
- FCA (Free Carrier): The buyer bears more risk than the seller.
- DAP (Delivered at Place): The buyer bears more risk than the seller.
Choosing the Right Incoterm for Your Shipment
There are several Incoterms but it becomes an issue if you don’t know the ideal Incoterm for your shipment. Let’s discuss pointers that will direct you in using the appropriate Incoterm for your shipment.
Consider Vital Factors
These are some defining factors that even triggered the existence of Incoterms in the first place:
There is absolute risk involved in the shipping and delivery of goods as cases of accidents, piracy attacks, loss, or damage of goods may occur. So, the risk has to be considered. Each Incoterm has a level of risk allocated to the buyer and seller. You need to understand the nature of your shipment and the risk ratio that best fits.
Each Incoterm has its dynamics for allocating cost. So, if you have limited finances, you should seek Incoterms that allocate more of the cost to the opposite party.
Control Over Shipment
The allocation of risk and cost somewhat defines the level of control over the shipment. If you desire more control, then you will have to embrace more responsibility for cost and risk. Then go for Incoterms with such conditions.
Evaluating the Nature of Goods and Level of Involvement
The nature of goods goes a long way in determining the level of involvement needed. Fragile goods may require more attention than normal goods. This will reveal the ideal Incoterm.
Case Examples Illustrating the Appropriate Incoterms for Specific Scenarios
Let’s make this concept a bit more practical, by putting it in a real-life scenario.
A seller in UAE wants to ship goods to a buyer in Kazakhstan. The buyer doesn’t want to be too involved due to their experience level. As a result, the seller in UAE will have to handle most of the processes like customs duties and transportation.
The ideal Incoterm for this case is DDP (Delivered Duty Paid), which depicts that the seller in UAE will take responsibility and bear the risks. Then the seller delivers the goods to the buyer’s chosen location.
A seller in Azerbaijan wants to ship goods to a buyer in Russia. The buyer expresses a desire to take control of transportation and bear the risk from the port of origin.
The ideal Incoterm is FOB (Free on Board). This depicts that the seller will move the goods to the port of origin and load them onto vessels. The buyer then takes responsibility after the seller has loaded goods onto the vessels.
There are several other cases and it’s advisable to seek the help of logistics experts like Al Sharqi.
Understanding the Implications of Incoterms on Costs and Liabilities
Breakdown of Relevant Factors Under Different Incoterms and Risk Mitigation
DAP (Delivered at Place)
- Cost: The buyer takes responsibility for transportation costs, duties, customs clearance, and documentation.
- Liability: Seller bears the risk till the goods get to the agreed location. Then the buyer bears the risk afterward.
- Mitigation: The buyer should ensure that efficient handling and transportation facilities be put in place.
EXW (Ex Works)
- Cost: The buyer is responsible for the cost of transportation, customs clearance, duties, and t taxes from the port of origin.
- Liability: The buyer bears the risk from the port of origin.
- Mitigation: The buyer should clarify with the seller regarding packaging and loading. Then ensure appropriate transport system and financial coverage.
CIP (Carriage and Insurance Paid To)
- Cost: The seller is responsible for moving goods to the carrier. The seller is also responsible for obtaining insurance.
- Liability: The seller bears the risk until the goods are handed over to the carrier after which the buyer bears the risk.
- Mitigation: The seller should ensure proper packaging of goods and do well to employ a competent shipping line.
DDP (Delivered Duty Paid)
- Cost: The seller assumes responsibility for transport to the destination. The seller also takes charge of custom clearance, duties, and taxes.
- Liability: The seller bears all the risk.
- Mitigation: Proper packaging system and the use of a competent shipping carrier is advised.
Best Practices for Smooth Ocean Freight Operations
Here is a rundown of things that must be in place to ensure the movement of cargo with ease, safety, and on time.
- There should be effective communication between all players. This includes the shipper, carrier, freight forwarder, and consignee. Everyone should know what’s happening with the cargo.
- There should be no attempt to boycott or play smart with documentation and compliance with customs regulations. Everything should be at 100%.
- Tracking and monitoring shipment progress is vital and it gives visibility down the chain. It’s ideal to work with carriers and forwarders that offer technological solutions for tracking shipments.
- Plan for the management of unexpected events
How Al Sharqi Can Help ?
With Al Sharqi, you can have a simplified experience on ocean freight and land the best Incoterm contracts. We have a strong foot in the industry and are experienced in navigating businesses through Incoterms and ocean freight.
- We offer both types of ocean freight solutions– FCL and LCL.
- We will help navigate the ideal Incoterm for your shipment.
- We offer ocean freight with the best practices and industry standards.
Learn more!! Reach out to Al Sharqi now.
Incoterms are global standards and useful for ocean freight agreements. With the Incoterms outlined in this post, you can now understand the terms for cost, liability, insurance, and more. These Incoterms help eliminate disputes in shipping agreements and ensure smooth ocean freight services. You are encouraged to consult more resources on this subject matter and seek the help of experts such as Al Sharqi.
Frequently Asked Questions
FCL (Full Container Load) involves a shipper filling a container with his cargo and then shipping it out. It is for large-volume shipments.
LCL (Less than Container Load) involves consolidating the cargo of different shippers into one container for shipping. It is for shippers with less volume of cargo.
Incoterms allocate and boldly assigns responsibility regarding cost and liability to the buyer and seller. For every Incoterm, the buyer and seller understand their roles.
- EXW (Ex-works)- The seller is obliged to make goods available in an agreed location while the buyer bears the risk and cost.
- DDP (Delivered Duty Paid)- The seller bears all the cost and risk until the goods get to the port of destination.
- DAP (Delivered at Place)- The buyer takes charge of the cost and risk after the seller has delivered the goods to the agreed locations
- FOB (Free on Board)- The seller is responsible for the goods up till it is loaded onto vessels. The buyer bears the risk after this point.
- FCA (Free Carrier)- The seller is responsible to deliver goods to the carrier. The buyers bear the cost and risk afterward.
- CIF (Cost, Insurance, Freight)- The seller is responsible for delivering the goods to the vessels and must take care of insurance and cost.
Consider the nature of your shipment if it requires you to give a high level of involvement in the process. Then consider your experience level to know what you can handle as this will let you know if you need to pass over the responsibility to the other party. Furthermore, consider cost and risk.
onsider the cargo type, size, dimensions, level of handling cargo will require, market conditions, and other factors as suggested by logistics experts.
- Gather appropriate information
- Understand the customs regulations properly
- Use the appropriate authorities for the documentation
- Ensure the paperwork is complete
- Provide all that is needed for documentation in the best possible way
There are multiple ways to handle unexpected delays and disruptions in ocean freight, including employing contingency planning to anticipate days of issues. Also, establish strong communication with carriers and forwarders.
Our customer service team is happy to assist you with planning your next booking.
|
<urn:uuid:94288f26-0f3a-4f22-b890-7c39e7904566>
|
CC-MAIN-2023-50
|
https://www.alsharqi.co/blog/navigating-the-waves-of-ocean-freight-and-incoterms/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.930745 | 3,109 | 2.53125 | 3 |
Activation Functions and their Derivatives – A Quick & Complete Guide
In the domain of deep learning, a neural network absent of an activation function resembles a linear regression model. These functions drive a neural network’s ability to handle intricate tasks by performing crucial non-linear computations. This article aims to delve into the derivatives, implementations, strengths, and limitations of various activation functions to help you make an informed choice and infuse non-linearity and precision into your neural network models.
This article was published as a part of the Data Science Blogathon.
Table of contents
- What is Activation Functions?
- Activation Functions in Linear Models
- Nonlinear Activation Functions
- Why Activation Functions?
- How to use it?
- What is a Good Activation Function ?
- Types of Activation Functions
- When to use which Activation Function in a Neural Network?
- Activation Functions and their Derivatives
- Implementation using Python
- Pros and Cons of Activation Functions
- Frequently Asked Questions
What is Activation Functions?
Activation functions are functions used in a neural network to compute the weighted sum of inputs and biases, which is in turn used to decide whether a neuron can be activated or not. It manipulates the presented data and produces an output for the neural network that contains the parameters in the data. The activation functions are also referred to as transfer functions in some literature. These can either be linear or nonlinear depending on the function it represents and is used to control the output of neural networks across different domains.
Activation Functions in Linear Models
For a linear model, a linear mapping of an input function to output is performed in the hidden layers before the final prediction for each label is given. The input vector x transformation is given by:
f(x) = wT . x + b
where, x = input, w = weight, and b = bias
Linear results are produced from the mappings of the above equation and the need for the activation function arises here, first to convert these linear outputs into non-linear output for further computation, and then to learn the patterns in the data. The output of these models are given by:
y = (w1 x1 + w2 x2 + … + wn xn + b)
These outputs of each layer are fed into the next subsequent layer for multilayered networks until the final output is obtained, but they are linear by default. The expected output is said to determine the type of activation function that has to be deployed in a given network.
Nonlinear Activation Functions
However, since the outputs are linear in nature, the nonlinear activation functions are required to convert these linear inputs to non-linear outputs. These transfer functions, applied to the outputs of the linear models to produce the transformed non-linear outputs are ready for further processing. The non-linear output after the application of the activation function is given by:
y = α (w1 x1 + w2 x2 + … + wn xn + b)
where α is the activation function
Why Activation Functions?
The need for these activation functions includes converting the linear input signals and models into non-linear output signals, which aids the learning of high order polynomials for deeper networks.
How to use it?
In a neural network every neuron will do two computations:
- Linear summation of inputs: In the above diagram, it has two inputs x1, x2 with weights w1, w2, and bias b. And the linear sum z = w1 x1 + w2 x2 + … + wn xn + b
- Activation computation: This computation decides, whether a neuron should be activated or not, by calculating the weighted sum and further adding bias with it. The purpose of the activation function is to introduce non-linearity into the output of a neuron.
Most neural networks begin by computing the weighted sum of the inputs. Each node in the layer can have its own unique weighting. However, the activation function is the same across all nodes in the layer. They are typical of a fixed form whereas the weights are considered to be the learning parameters.
What is a Good Activation Function?
A proper choice has to be made in choosing the activation function to improve the results in neural network computing. All activation functions must be monotonic, differentiable, and quickly converging with respect to the weights for optimization purposes.
Types of Activation Functions
The different kinds of activation functions include:
Linear Activation Functions
A linear function is also known as a straight-line function where the activation is proportional to the input i.e. the weighted sum from neurons. It has a simple function with the equation:
f(x) = ax + c
The problem with this activation is that it cannot be defined in a specific range. Applying this function in all the nodes makes the activation function work like linear regression. The final layer of the Neural Network will be working as a linear function of the first layer. Another issue is the gradient descent when differentiation is done, it has a constant output which is not good because during backpropagation the rate of change of error is constant that can ruin the output and the logic of backpropagation.
Non-Linear Activation Functions
The non-linear functions are known to be the most used activation functions. It makes it easy for a neural network model to adapt with a variety of data and to differentiate between the outcomes.
These functions are mainly divided basis on their range or curves:
a) Sigmoid Activation Functions
Sigmoid takes a real value as the input and outputs another value between 0 and 1. The sigmoid activation function translates the input ranged in (-∞,∞) to the range in (0,1)
b) Tanh Activation Functions
The tanh function is just another possible function that can be used as a non-linear activation function between layers of a neural network. It shares a few things in common with the sigmoid activation function. Unlike a sigmoid function that will map input values between 0 and 1, the Tanh will map values between -1 and 1. Similar to the sigmoid function, one of the interesting properties of the tanh function is that the derivative of tanh can be expressed in terms of the function itself.
c) ReLU Activation Functions
The formula is deceptively simple: max(0,z). Despite its name, Rectified Linear Units, it’s not linear and provides the same benefits as Sigmoid but with better performance.
Leaky Relu is a variant of ReLU. Instead of being 0 when z<0, a leaky ReLU allows a small, non-zero, constant gradient α (normally, α=0.01). However, the consistency of the benefit across tasks is presently unclear. Leaky ReLUs attempt to fix the “dying ReLU” problem.
PReLU gives the neurons the ability to choose what slope is best in the negative region. They can become ReLU or leaky ReLU with certain values of α.
The Maxout activation is a generalization of the ReLU and the leaky ReLU functions. It is a piecewise linear function that returns the maximum of inputs, designed to be used in conjunction with the dropout regularization technique. Both ReLU and leaky ReLU are special cases of Maxout. The Maxout neuron, therefore, enjoys all the benefits of a ReLU unit and does not have any drawbacks like dying ReLU. However, it doubles the total number of parameters for each neuron, and hence, a higher total number of parameters need to be trained.
The Exponential Linear Unit or ELU is a function that tends to converge faster and produce more accurate results. Unlike other activation functions, ELU has an extra alpha constant which should be a positive number. ELU is very similar to ReLU except for negative inputs. They are both in the identity function form for non-negative inputs. On the other hand, ELU becomes smooth slowly until its output equal to -α whereas ReLU sharply smoothes.
f) Softmax Activation Functions
Softmax function calculates the probabilities distribution of the event over ‘n’ different events. In a general way, this function will calculate the probabilities of each target class over all possible target classes. Later the calculated probabilities will help determine the target class for the given inputs.
When to use which Activation Function in a Neural Network?
Specifically, it depends on the problem type and the value range of the expected output. For example, to predict values that are larger than 1, tanh or sigmoid are not suitable to be used in the output layer, instead, ReLU can be used. On the other hand, if the output values have to be in the range (0,1) or (-1, 1) then ReLU is not a good choice, and sigmoid or tanh can be used here. While performing a classification task and using the neural network to predict a probability distribution over the mutually exclusive class labels, the softmax activation function should be used in the last layer. However, regarding the hidden layers, as a rule of thumb, use ReLU as an activation for these layers.
In the case of a binary classifier, the Sigmoid activation function should be used. The sigmoid activation function and the tanh activation function work terribly for the hidden layer. For hidden layers, ReLU or its better version leaky ReLU should be used. For a multiclass classifier, Softmax is the best-used activation function. Though there are more activation functions known, these are known to be the most used activation functions.
Elements of Neural Networks
- Input Layer: This is the first layer of the neural network, and it takes in the data that the network is going to learn from. For example, if you are training a neural network to recognize handwritten digits, the input layer would receive an image of a handwritten digit.
- Output Layer: This is the last layer of the neural network, and it produces the output of the network. For example, if you are training a neural network to recognize handwritten digits, the output layer would produce a prediction of which digit is in the image.
- Hidden Layers: These layers are in between the input layer and the output layer, and they do all the hard work of learning the patterns in the data. Neural networks with more hidden layers are better at learning complex patterns, like the ones that tell a cat from a dog.
- Neurons: Neural networks are made up of tiny processing units called neurons. They are connected to each other by weights, and they process the data that is passed to them from other neurons. The weights determine how much influence one neuron has on another neuron.
Activation Functions and their Derivatives
Implementation using Python
Having learned the types and significance of each activation function, it is also essential to implement some basic (non-linear) activation
functions using python code and observe the output for more clear understanding of the concepts:
Sigmoid Activation Function
import matplotlib.pyplot as plt import numpy as np def sigmoid(x): s=1/(1+np.exp(-x)) ds=s*(1-s) return s,ds x=np.arange(-6,6,0.01) sigmoid(x) fig, ax = plt.subplots(figsize=(9, 5)) ax.spines['left'].set_position('center') ax.spines['right'].set_color('none') ax.spines['top'].set_color('none') ax.xaxis.set_ticks_position('bottom') ax.yaxis.set_ticks_position('left') ax.plot(x,sigmoid(x), color="#307EC7", linewidth=3, label="sigmoid") ax.plot(x,sigmoid(x), color="#9621E2", linewidth=3, label="derivative") ax.legend(loc="upper right", frameon=False) fig.show()
- The sigmoid function has values between 0 to 1.
- The output is not zero-centered.
- Sigmoids saturate and kill gradients.
- At the top and bottom level of sigmoid functions, the curve changes slowly, the derivative curve above shows that the slope or gradient it is zero.
Tanh Activation Function
import matplotlib.pyplot as plt import numpy as np def tanh(x): t=(np.exp(x)-np.exp(-x))/(np.exp(x)+np.exp(-x)) dt=1-t**2 return t,dt z=np.arange(-4,4,0.01) tanh(z).size,tanh(z).size fig, ax = plt.subplots(figsize=(9, 5)) ax.spines['left'].set_position('center') ax.spines['bottom'].set_position('center') ax.spines['right'].set_color('none') ax.spines['top'].set_color('none') ax.xaxis.set_ticks_position('bottom') ax.yaxis.set_ticks_position('left') ax.plot(z,tanh(z), color="#307EC7", linewidth=3, label="tanh") ax.plot(z,tanh(z), color="#9621E2", linewidth=3, label="derivative") ax.legend(loc="upper right", frameon=False) fig.show()
- Its output is zero-centered because its range is between -1 to 1. i.e. -1 < output < 1.
- Optimization is easier in this method hence in practice it is always preferred over the Sigmoid function.
Pros and Cons of Activation Functions
|Type of Function||Pros||Cons|
|Linear||– Provides a range of activations, not binary. |
– Can connect multiple neurons and make decisions based on max activation.
– Constant gradient for stable descent.
– Changes are constant for error correction.
|– Limited modeling capacity due to linearity.|
|Sigmoid||– Nonlinear, allowing complex combinations. |
– Produces analog activation, not binary.
|– Suffers from the “vanishing gradients” problem, making it slow to learn.|
|Tanh||– Stronger gradient compared to sigmoid. |
– Addresses the vanishing gradient issue to some extent.
|– Still prone to vanishing gradient problems.|
|ReLU||– Solves the vanishing gradient problem. |
– Computationally efficient.
|– Can lead to “Dead Neurons” due to fragile gradients. Should be used only in hidden layers.|
|Leaky ReLU||– Mitigates the “dying ReLU” problem with a small negative slope.||– Lacks complexity for some classification tasks.|
|ELU||– Can produce negative outputs for x>0.||– May lead to unbounded activations, resulting in a wide output range.|
Activation functions serve to introduce non-linear properties to neural networks. Without them, neural networks perform linear mappings between inputs and outputs, essentially computing dot-products between input vectors and weight matrices. These successive dot-products result in repeated linear operations, which, in essence, are individual learn operations. To handle complex data, neural networks must approximate nonlinear relationships from input features to output labels. In the absence of these functions, neural networks cannot mathematically comprehend such intricate mappings, limiting their ability to tackle their intended tasks.
Frequently Asked Questions
A. These functions are mathematical operations in neural networks that introduce non-linearity. Common examples include Sigmoid, Tanh, ReLU, Leaky ReLU, and ELU.
A. In simple terms, these functions decides whether a neuron should be activated or not in a neural network based on the weighted sum of inputs. It adds non-linearity to the network’s output.
A. Three common activation functions are Sigmoid, Tanh, and ReLU (Rectified Linear Unit).
A. ReLU is used because it helps avoid the vanishing gradient problem and is computationally efficient. It’s suitable for most hidden layers in neural networks, promoting faster training.
The media shown in this article are not owned by Analytics Vidhya and is used at the Author’s discretion.
|
<urn:uuid:e0d521e8-72b7-415e-b5eb-02d12bdd2a7c>
|
CC-MAIN-2023-50
|
https://www.analyticsvidhya.com/blog/2021/04/activation-functions-and-their-derivatives-a-quick-complete-guide/?utm_source=reading_list&utm_medium=https://www.analyticsvidhya.com/blog/2022/01/introduction-to-neural-networks/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.855924 | 3,537 | 3.46875 | 3 |
Trauma-informed approaches provide a framework for preventing and addressing childhood trauma and building resilience in children and families. According to the Substance Abuse and Mental Health Services Administration (SAMHSA), “A program, organization, or system that is trauma-informed realizes the widespread impact of trauma and understands potential paths for recovery; recognizes the signs and symptoms of trauma in clients, families, staff, and others involved with the system; and responds by fully integrating knowledge about trauma into policies, procedures, and practices, and seeks to actively resist re-traumatization.”
The U.S. Department of Health and Human Services (HHS) has integrated trauma-informed approaches into a growing number of federal initiatives and programs; similar changes are happening at the state and community levels. These efforts often occur in silos, however, preventing stakeholders from learning from—and building off of—each other’s work.
This webpage includes links to materials ASPE has developed with James Bell Associates and Education Development Center as part of an effort to advance our understanding of trauma-informed approaches. This project examines trauma-informed efforts across sectors to assess what they look like in community settings, their impacts, and areas where further information is needed.
Overview of Research Summary and Select Program Profiles – This document provides an overview of the first two resources developed as part of ASPE’s Trauma-Informed Approaches project: a research summary and profiles of select trauma-informed programs. The overview includes key insights that emerged as part of these projects.
Research Summary: Review of Trauma-Informed Initiatives at the Systems Level – This research summary explores trauma-informed initiatives at the systems level and summarizes common program activities, targeted outcomes, and evidence of progress towards those systems-level outcomes.
Profiles of Select Trauma-Informed Programs – This resource highlights select trauma-informed programs from diverse sectors, geographic locations, and funding sources to give examples of the wide range of existing trauma-informed initiatives within communities.
Using Logic Models Grounded in Theory of Change to Support Trauma-Informed Initiatives – This Special Topics Paper outlines the rationale for using and supporting logic models grounded in theories of change to help build the evidence base for trauma-informed approaches.
Advancing Change to Support Trauma-Informed Initiatives and Build Evidence of Impacts – This issue brief summarizes information from a research summary, program scan, and expert convening to offer insights into critical questions for stakeholders.
|
<urn:uuid:77c524c9-f9c4-41b1-94ff-5aca094b9756>
|
CC-MAIN-2023-50
|
https://www.aspe.hhs.gov/reports/trauma-informed-approaches-building-resilience-children-families
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.923541 | 505 | 2.921875 | 3 |
What are 5 facts about Orion?
What are 5 facts about Orion?
Key Facts & Summary The Orion constellation’s most essential stars are Alnilam, Mintaka, and Alnitak, which shape Orion’s Belts. The shiniest star of Orion and the 7th brightest star in the night sky is Rigel. Rigel is blue colored and has a magnitude of 0.13. The Orion Nebula hangs off of Orion’s Belt.
What is special about Orion constellation?
Orion constellation is one of the brightest and best known constellations in the night sky. It lies on the celestial equator. Orion has been known since ancient times. The constellation is also known as the Hunter, as it is associated with one in Greek mythology.
How old is the Orion constellation?
32,000 to 38,000 years old
Archaeologists estimate that it is 32,000 to 38,000 years old. The distinctive pattern of Orion is recognized in numerous cultures around the world, and many myths are associated with it.
How was Orion named?
The Orion constellation is named after the hunter Orion in Greek mythology due to the constellation’s structure, which resembles the form of a hunter.
Did Orion use a bow?
It was only because of the god Orion from New Genesis, did Darkseid fail. Orion had forged (either during or before the battle) a bow of light that helped him succeed in defeating Darkseid and sending him away from Earth.
What animals did Orion hunt?
In Works and Days, Orion chases the Pleiades themselves. Canis Minor and Canis Major are his dogs, the one in front is called Procyon. They chase Lepus, the hare, although Hyginus says some critics thought this too base a prey for the noble Orion and have him pursuing Taurus, the bull, instead.
What was Orion punished for?
He was turned into a stag and was ripped apart by his own dogs. What was Orion punished for? a. He killed an animal sacred to Artemis.
Who made Orion?
According to their version of his myth Orion was born when three gods–Zeus, Poseidon and Hermes–urinated on a bull-hide and buried it in the earth to provide King Hyrieus with a son and heir.
Who named the Orion?
Orion is one of the 48 constellations first cataloged by the Greek astronomer Ptolemy in the second century. It was named after the hero of Greek mythology who was killed by Scorpius, the scorpion. It is one of the oldest constellations with roots in many ancient cultures.
What was Orion famous skill?
ORION was a handsome giant granted the ability to walk on water by his father Poseidon. He served King Oinopion (Oenopion) of Khios (Chios) as huntsman for a time, but was blinded and exiled from the island after raping the king’s daughter Merope.
What is the name of Orion’s dog?
Canis Minor and Canis Major are his dogs, the one in front is called Procyon. They chase Lepus, the hare, although Hyginus says some critics thought this too base a prey for the noble Orion and have him pursuing Taurus, the bull, instead.
How big is the Orion Arm?
The Orion Arm of the Milky Way is probably some 3,500 light-years wide. Initially, astronomers thought it was about 10,000 light-years in length. A new study – published in 2016 – suggests it’s more than 20,000 light-years long.
How did Orion go blind?
Thanks to his father, Orion had the ability to walk on water, which is how he reached the island of Chios. There, after drinking too much, he made sexual advances to Merope, the daughter of the local king. King Oenopion had him blinded and removed from the island.
What special features is found in Orion constellation?
The Orion Constellation. The most noticeable part of Orion is the pattern called Orion’s Belt. This Belt contains three brightly aligned stars, Alnitak (Zeta), Alnilam (Epsilon), and Mintaka (Delta). Alnitak is around 800 light-years away from earth and is 100,000 times more luminous than the Sun.
What planets are in the constellation Orion?
Orion’s Belt or The Belt of Orion is an asterism within the constellation. It consists of the three bright stars Zeta (Alnitak), Epsilon (Alnilam), and Delta (Mintaka). Alnitak is around 800 light years away from earth and is 100,000 times more luminous than the Sun ; much of its radiation is in the ultraviolet range, which the human eye cannot
What is the brightest star in the constellation Orion?
Rigel. Rigel is the sixth brightest star in the sky and is a blue supergiant. It is 85,000 times brighter than our sun and is located 863 light-years away.
Are there any planets in the Orion constellation?
The northern hemisphere is treated to views of the stars Procyon, Sirius, and Betelgeuse, as well as awe-inspiring views of the Orion Nebula, sculpted by the stellar winds of central bright stars. Jupiter is the lone planet lingering in twilight skies after sunset in February.
|
<urn:uuid:4425555e-0f2a-4090-afa2-af4940c4c003>
|
CC-MAIN-2023-50
|
https://www.atheistsforhumanrights.org/what-are-5-facts-about-orion/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.970719 | 1,140 | 3.265625 | 3 |
The importance of taking folic acid (for its role in the prevention of neural tube defects, as well as a healthy pregnancy) has finally reached our ears, and most people are well aware of the significance of this.
But scientists have now discovered that taking a folic acid supplement is not the ‘one-size-fits-all’ approach they originally thought it was.
Before I get technical, I want you to know the main reason women going into pregnancy need folic acid in the first place.
The contraceptive pill (and a few other medications) interfere with the absorption of folic acid in the body.
So, after a few months or years of taking the pill, many women have become depleted of this nutrient, as well as many other important vitamins, minerals and enzymes needed for optimal health for themselves and their growing baby.
That’s one of the many reasons most natural fertility practitioners will suggest women (and men) give their body a few months preconception time to get their nutrient levels up to scratch in preparation for a healthy pregnancy.
Folic acid is a synthetic chemical compound manufactured in a laboratory.
In order for folic acid to be absorbed and available to your body (metabolically active), it needs to go through a few steps that require the help of specific enzymes.
Some women are deficient in some of these enzymes.
Others may have digestive issues and are not able to efficiently absorb the enzymes.
Alternatively certain women may have a genetic variant that prevents the production of these enzymes.
All these issues may result in the inability of their body to metabolise (break down) this folic acid efficiently, so it will not be readily available for their needs.
Natural folic acid is a complex of related substances which are called Folates – Vitamin B9.
Folates are found mainly in green leafy veggies, organ meats, brewers yeast, eggs, beans, sprouts, oranges, bananas and strawberries.
These folates bypass many of those steps needed by synthetic folic acid, so they are regarded as more metabolically active, and they have also been shown to be actively transported into the brain.
Unfortunately the natural folates found in food are very sensitive to heat, air and light.
So, even though it’s always advisable to get your nutrients from whole foods rather than supplements, if you are preparing to get pregnant it is advisable to take a folate supplement to make sure your body acquires the right amount for the health of your baby.
There are a few different forms of folate complexes that have been made into supplements, the main ones being Folinic acid and 5-MTHF.
These are metabolically active and are usually prescribed for women who have issues with folic acid conversion – i.e. these women have a specific MTHFR variant.
It’s important to know that in order for folate to have a protective effect against neural tube defect, it should be started before conception and definitely during the first month of pregnancy as neural tube closure occurs by day 28 of pregnancy.
This is why I put so much emphasis on preconception care and I always thoroughly assess each and every one of my patients to make sure I give them the right supplement that’s perfect for their specific individual needs.
With all this in mind, I hope I have helped you understand that there shouldn’t be a ‘one-size-fits-all’ approach to folic acid supplementation.
Joanne Lipinski – Fertility Naturopath Melbourne
|
<urn:uuid:73ebe349-0627-4963-b9cd-72ed042628ad>
|
CC-MAIN-2023-50
|
https://www.babycreate.com.au/fertility/supplements/taking-right-form-folic-acid/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.967486 | 730 | 2.78125 | 3 |
What’s Plantar Fasciitis?
Plantar fasciitis is the irritation of this fascia usually due to overuse and repetitive strain injury. Although the name presents it as an inflammatory condition, inflammatory cells are often not present.
What is the plantar fascia?
The plantar fascia is the connective tissue which connects the heel to the metatarsal heads on the underside of the foot.
What are the risk factors?
- Flat feet
- Limited ankle dorsiflexion
- An excess amount of physical activity, particularly walking and running.
- Prolonged standing
It accounts for approximately 10% of runner related injuries and 11% – 15% of all foot symptoms requiring healthcare.
What are potential symptoms?
- Heel pain
- Pain on the first few steps of getting out of bed
- Pain eases as physical activity continues but worsens post activity.
How is it managed?
First line treatment for plantar fasciitis is conservative care with surgery being a last resort.
At Black Chiropractic Group, Drs. Michael & David Black will perform a verbal and physical examination to rule out other causes of your symptoms. Michael in most cases will use a combination of manual therapy such as massage and appropriate rehabilitative care with the aim of reducing pain and improving function of the foot and lower limb.
For more information, please contact Dr. Michael Black at Manningham Road Chiropractic Centre and Armadale Chiropractic Centre. Private health funds cover chiropractic care and some patients qualify for a Medicare EPC referral if they have a long-standing problem.
|
<urn:uuid:f7f01195-3119-412a-909d-ea5897881692>
|
CC-MAIN-2023-50
|
https://www.blackchiropractic.com.au/whats-plantar-fasciitis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.893735 | 342 | 2.625 | 3 |
What is Quadriceps Tendon Autograft for Anterior Cruciate Ligament Reconstruction?
Anterior cruciate ligament reconstruction using a quadriceps tendon autograft is a surgical procedure performed to replace a torn or damaged anterior cruciate ligament (ACL) of the knee with a part of the quadriceps tendon taken from your leg (autograft) to restore strength, stability, and function of the knee.
Tendons are bands of tough fibrous connective tissue that attach muscles to bones. Quadriceps tendon, located in the front of the thigh, attaches the quadriceps muscles to the patella (kneecap) and are responsible for straightening or extending the knee as well as flexing the hip.
An ACL injury most commonly occurs during sports activities that involve twisting or overextension of your knee. An ACL can be injured in several ways:
- Sudden directional change or slowing down
- Pivoting or twisting while your foot is firmly planted
- Landing from a jump incorrectly
- Suddenly stopping
- Direct blow to the side of your knee, such as during a football tackle
Anatomy of the Anterior Cruciate Ligament
Anterior cruciate ligament is one of the major stabilizing ligaments in the knee. It is a strong rope-like structure located in the center of the knee, running from the femur to the tibia. The ACL is one of the four major ligaments of the knee that connects the femur (thighbone) to the tibia (shinbone) and helps stabilize your knee joint. It prevents excessive forward movement of the lower leg bone (tibia) in relation to the thighbone (femur) as well as limits rotational movements of the knee. When this ligament tears, unfortunately, it does not heal on its own, and often leads to a feeling of instability in the knee warranting an ACL reconstruction.
Indications for Quadriceps Tendon Autograft for Anterior Cruciate Ligament Reconstruction
Quadriceps tendon autograft is indicated for ACL reconstruction due to its several advantages over other traditional autografts such as patellar and hamstring tendons. These advantages over other grafts include:
- Twenty percent more collagen fibrils per cross-sectional area
- Anatomically and biomechanically has more volume, strength, and thickness
- Cross-sectional area and length can be tailored to a patient’s need
- Customizable for both revision and primary surgeries
- No significant palpable defect, numbness, or pain in the harvest site
- Very low graft failure rate
- Minimal harvest site morbidity
- Excellent clinical outcome
Preparation for Quadriceps Tendon Autograft for Anterior Cruciate Ligament Reconstruction
Pre-procedure preparation for anterior cruciate ligament reconstruction with quadriceps tendon autograft will involve the following steps:
- A thorough examination by your doctor is performed to check for any medical issues that need to be addressed prior to surgery.
- Depending on your medical history, social history, and age, you may need to undergo tests such as blood work and imaging to help detect any abnormalities that could threaten the safety of the procedure.
- You will be asked if you have allergies to medications, anesthesia, or latex.
- You should inform your doctor of any medications, vitamins, or supplements that you are taking.
- You should refrain from medications or supplements such as blood thinners, aspirin, or anti-inflammatory medicines for 1 to 2 weeks prior to surgery.
- You should refrain from alcohol or tobacco at least a week before and 2 weeks after surgery.
- You should not consume any solids or liquids at least 8 hours prior to surgery.
- Arrange for someone to drive you home as you will not be able to drive yourself after surgery.
- A written consent will be obtained from you after the surgical procedure has been explained in detail.
Procedure for Quadriceps Tendon Autograft for Anterior Cruciate Ligament Reconstruction
The procedure is most often performed arthroscopically under general anesthesia.
Your surgeon will make two small incisions about 1/4-inch-long around your knee. An arthroscope, a tube with a small video camera on the end is inserted through one incision to view the inside of the knee joint. Along with the arthroscope, a sterile solution is pumped into the joint to expand it, providing your surgeon with a clear view and space to work inside the joint.
The torn ACL will be removed and the pathway for the new ACL is prepared. Your surgeon then makes an incision over the quadriceps tendon and removes the middle third of the quadriceps tendon, along with a bone plug from the upper end of the patella to prepare the new graft.
The arthroscope is reinserted into the knee joint through one of the small incisions. Small holes are drilled into the upper and lower leg bones (femur and tibia) where these bones come together at the knee joint. The holes form tunnels in your bone to accept the new graft. The graft is then pulled through these holes. The new tendon is then fixed to the bone with screws to hold it in place while the ligament heals into the bone.
The incisions are then closed with sutures and a dressing is placed.
Postoperative Care and Recovery
In general, postoperative care instructions and recovery after anterior cruciate ligament reconstruction with quadriceps tendon autograft will involve the following steps:
- You will be transferred to the recovery area where your nurse will closely observe you for any allergic/anesthetic reactions and monitor your vital signs as you recover.
- You will usually go home on the same day of the surgery.
- You may experience pain, inflammation, and discomfort in the operated area. Pain and anti-inflammatory medications are provided as needed.
- Application of cold and heat therapy on the operated area is also recommended to reduce inflammation and pain.
- You are encouraged to walk with assistance as frequently as possible to prevent the risk of blood clots.
- You are advised to keep your leg elevated while resting to prevent swelling and pain.
- Keep the surgical site clean and dry. Instructions on surgical site care and bathing will be provided.
- Refrain from smoking as it can negatively affect the healing process.
- Eating a healthy diet rich in vitamin D is strongly advised to promote healing and a faster recovery.
- Refrain from strenuous activities and lifting heavy weights for the first couple of months. Gradual increase in activities over a period of time is recommended.
- An individualized physical therapy protocol is designed to help strengthen your knee muscles and optimize knee function.
- Refrain from driving until you are fully fit and receive your doctor’s consent. Most patients will be able to drive after 6 weeks of surgery.
- You will be able to resume your normal activities in a couple of months; however, return to competitive sports may take 6 months to a year.
- A periodic follow-up appointment will be scheduled to monitor your progress.
Risks and Complications
Anterior cruciate ligament reconstruction with quadriceps tendon autograft is a relatively safe procedure; however, as with any surgery, some risks and complications may occur, such as:
- Blood loss
- Blood clots or deep vein thrombosis
- Anesthetic/allergic reactions
- Neurovascular injury
- Persistent pain in the operated area
- Loosening of the graft
- Failure of the graft
- Crepitus (crackling or grating feeling of the kneecap)
- Decreased range of motion
- Recurrence of injury to the graft
|
<urn:uuid:b9e5b601-1bb7-4f45-8531-b9807d785ec6>
|
CC-MAIN-2023-50
|
https://www.bradleysmithmd.com/quadriceps-tendon-autograft-for-anterior-cruciate-ligament-reconstruction-orthopedic-surgeon-sports-medicine-murray-ut/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.921632 | 1,635 | 2.5625 | 3 |
What is Scapulothoracic Arthroscopy?
Scapulothoracic arthroscopy is a minimally invasive surgical procedure for the treatment of shoulder conditions such as snapping scapula syndrome, bursitis, loose bodies, and benign tumors that have failed to respond to conservative treatment measures. The procedure involves small incisions and the placement of an arthroscope, a small flexible tube with a light and tiny camera at its end, and thin surgical instruments into the scapulothoracic joint to evaluate and treat the condition.
Anatomy of the Shoulder
The shoulder is a highly movable body joint that allows various movements of the arm. It is a ball and socket joint, where the head of the humerus (upper arm bone) articulates or connects with the socket of the scapula (shoulder blade), called the glenoid. The two articulating bone surfaces are covered with cartilage, which prevents friction during movement. The cartilage is lubricated by synovial fluid. Tendons and ligaments around the shoulder joint provide strength and stability to the joint. The scapulothoracic joint is located where the scapula joins the rib cage (thorax).
Indications for Scapulothoracic Arthroscopy
The most common indication for scapulothoracic arthroscopy is a shoulder condition called scapulothoracic bursitis, also known as snapping scapula syndrome. The condition is characterized by inflammation of the scapulothoracic bursa - a closed, fluid-filled sac - that sits between the scapula and the chest wall. The inflammation is due to injury or repetitive overuse from work or sports activities. The scapulothoracic bursa plays a significant role in the shoulder joint by enabling the shoulder blade to slide over the chest wall freely as the arm moves, providing smooth and pain-free motion. Scapulothoracic bursitis is experienced as the following:
- A constant dull ache, stiffness, or tenderness in the shoulder area.
- A feeling of instability or swelling.
- A sensation of snapping or grinding when moving the arm.
- Increased pain when performing overhead activities.
Your surgeon may recommend scapulothoracic arthroscopy for:
- Bursectomy (bursa removal) due to scapulothoracic bursitis
- Removal of loose bodies (free-floating pieces of debris in the joint)
- Removal of an osteochondroma (benign tumor)
- Bursectomy and partial superomedial scapulectomy due to snapping scapula syndrome
Preparation for Scapulothoracic Arthroscopy
Preoperative preparation for scapulothoracic arthroscopy involves the following steps:
- A thorough examination is performed by your doctor to check for any medical issues that need to be addressed prior to surgery.
- Depending on your medical history, social history, and age, you may need to undergo tests such as blood work and imaging to help detect any abnormalities that could compromise the safety of the procedure.
- You will be asked if you have allergies to medications, anesthesia, or latex.
- You should inform your doctor of any medications, vitamins, or supplements that you are taking, or any conditions you have such as heart or lung disease.
- You may be asked to stop taking blood-thinners, anti-inflammatories, or vitamins/herbal supplements for a week or two.
- You should refrain from alcohol and tobacco at least a few days prior to surgery and several weeks after surgery.
- You should not consume any solids or liquids at least 8 hours prior to surgery.
- Arrange for someone to drive you home as you will not be alert enough to drive yourself after surgery.
- Informed consent will be obtained from you after the surgery has been explained in detail.
Procedure for Scapulothoracic Arthroscopy
In general, the procedure for scapulothoracic arthroscopy will involve the following steps:
- You will be administered general or local anesthesia by your anesthesiologist.
- You will lie face down on the operating table and the operative site will be cleaned and marked with a sterile pen accordingly.
- The arm is adjusted in a “chicken wing” position, as this increases the space between the scapula and the posterior chest wall, enhancing arthroscopic visualization.
- Your surgeon makes 2 to 3 small keyhole incisions along the scapula.
- An arthroscope, a slender tubular device with a light and a small camera at its end, is inserted through one of the incisions into the scapula.
- The camera transmits the image of the inside of your scapulothoracic joint onto a monitor for your surgeon to view.
- Your surgeon then uses miniature surgical instruments to carry out the required repair such as the removal of inflamed bursal tissue, bony protrusions, tumors or loose bodies, as well as the release of any adhesions present.
- After adequate scapulothoracic repair has been achieved, your surgeon removes the scope and the instruments.
- The tiny incisions are then closed with stitches or small sterile bandage strips.
Postoperative Care and Recovery
In general, postoperative care instructions and recovery after scapulothoracic arthroscopy involves the following steps:
- You will be transferred to the recovery area where your nurse will closely observe you for any allergic/anesthetic reactions and monitor your vital signs as you recover.
- Following the surgery, your arm will be placed in a shoulder sling for 2 to 4 weeks to rest the shoulder and promote healing.
- You may notice some pain, swelling, and discomfort in the shoulder area. Pain and anti-inflammatory medications are provided as needed to address these.
- You may also apply ice packs on the shoulder area to help reduce swelling and pain.
- Antibiotics are prescribed for the risk of surgery-related infection.
- Keep the surgical site clean and dry. Instructions on surgical site care and bathing will be provided.
- Refrain from smoking, as it can hinder the healing process.
- Refrain from strenuous activities, lifting heavy weights, and driving for the first 6 weeks. A gradual increase in activities is recommended.
- An individualized physical therapy regimen is designed to help strengthen your shoulder muscles and optimize shoulder function.
- You will be able to resume your normal activities in a couple of months; however, a return to sports may take 4 to 6 months.
- A periodic follow-up appointment will be scheduled to monitor your progress.
Risks and Complications
Scapulothoracic arthroscopy is a relatively safe surgery; however, as with any surgery, the following risks and complications may occur:
- Damage to nerves or blood vessels
- Blood clots
- Anesthetic/allergic reactions
- Inadequate bursectomy or bony resection
- Persistence of pain and other symptoms
- The need for revision surgery
|
<urn:uuid:9ccf1e51-e480-432d-883d-46b9a86dc5ec>
|
CC-MAIN-2023-50
|
https://www.bradleysmithmd.com/scapulothoracic-arthroscopy-orthopedic-surgeon-sports-medicine-murray-ut/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.916822 | 1,523 | 2.828125 | 3 |
The BRC is supported by the Joint Nature Conservation Committee (JNCC) and the UK Centre for Ecology & Hydrology (UKCEH), a not-for-profit research institute which recieves support from Natural Environment Research Council (NERC) National Capability funding. The work of BRC is a major component of the National Biodiversity Network (NBN).
News from the Biological Records Centre
The UK has a long history of volunteer involvement in environmental monitoring, but we know that the diversity of citizen science, or community science, volunteers is not reflective of the wider population. What is the impact of this for society and for monitoring data, and how can we…
A practical guide provides advice for citizen scientists on monitoring pollinators in their local area, to encourage more people to provide much-needed data on how our insects are faring.
We know that many pollinators of wildflowers, including species of wild bees, hoverflies and moths,…
Around one in six species are at risk of becoming extinct in the UK, according to the most comprehensive study yet of our national wildlife. The …
What we do
Working in partnership with more than 80 recording schemes and societies, BRC provides a national capability to support and encourage biological recording for a wide range of plant and animal groups, improving how data is collected, made available and used.
BRC helps the recording community to publish atlases, data and other online resources to provide essential information which informs research, policy and the conservation of our heritage of wildlife. As part of this work we provide website hosting and development support.
We apply innovative use of technology and science excellence to help harness the enthusiasm and knowledge of naturalists, and enable them to collate and analyse their records.
Many CEH staff contribute towards the work of BRC; they are listed on our staff page.
Why we do it
The historical legacy of biological recording in Britain and Ireland is unique and inspiring. Many naturalists are committed to studying our flora and fauna, and BRC’s work helps to ensure that we make the most of their observations. The vast datasets built up through the expertise and commitment of the volunteer recording community enables a range of ecological questions to be addressed.
The value of recording data is enhanced through innovative use of technology and analytical methods, plus integration with other data sources on the ecology of species and the physical environment.
Distribution trends derived from the large-scale and long-term datasets provide evidence for many purposes, particularly in relation to understanding impacts of climate and habitat change, to informing policy to reduce negative impacts.
|
<urn:uuid:f19aa119-7e12-4123-84ff-0acb1a737e05>
|
CC-MAIN-2023-50
|
https://www.brc.ac.uk/?amp%3Bf%5Bauthor%5D=19&%3Bs=author&%3Bo=asc&f%5Bauthor%5D=885&s=title&o=asc&title=&type=All&bibcite_year=&keywords_target_id&field_research_themes_target_id=All&field_scheme_target_id=All&page=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.922845 | 533 | 2.90625 | 3 |
California residents who work in underground mines know what risk they face when it comes to fires. This risk becomes especially high when there are few evacuation routes and the ventilation system is not the best that it can be. Mine owners, for their part, should know the basics when it comes to fire prevention and protection.
Ventilation on demand, for example, can be a benefit by sending clean air only to those areas where people and machinery are present. Heavy machinery, after all, can produce toxic fumes that need to be cleared away. Atmospheric monitoring is essential to fire safety. Workers should be equipped with gas detection units.
Carroll Technologies, the maker of safety equipment for the mining industry, offers a monitor that tracks the operation of conveyor belts in particular. This same device can monitor the risk for worker falls and machine breakdowns. Also available from Carroll Technologies are portable multi-gas detection units, foam packs and fire-fighting equipment.
All equipment that tunnel operators bring into the mine should comply with the standards of the Mine Safety and Health Administration. Workers must be trained on the proper use of all equipment, including personal protective equipment. Breathing apparatuses are an especially important piece of PPE. Employees should know what evacuation routes to take as well.
If something goes wrong and workers are injured in a fire or explosion, then they will be left with injuries to tend to and perhaps a diminished capacity to earn a living. Under workers’ compensation law, victims may seek reimbursement for these losses. Unlike with a personal injury claim, there is no need to prove anyone’s negligence; nevertheless, a workers’ compensation claim can meet opposition. For this and other reasons, victims may want to retain legal counsel.
|
<urn:uuid:beac71c2-73c0-4e19-b229-2e7ffff718bc>
|
CC-MAIN-2023-50
|
https://www.butlerviadro.com/blog/2020/03/fire-protection-basics-for-underground-mines/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.945647 | 350 | 2.5625 | 3 |
This wonderful croton cultivar is widely cultivated in the Canary Islands since immemorial time. These older cultivars are hardier than others to wind and drought. It has lots of green in the leaves, so growth is very robust.
This wonderful croton cultivar is widely cultivated in the Canary Islands since immemorial time. Leaves are remarkably deeply cut, often trilobate. They have a very dark green background and a yellow part, often consisting in a perfect yellow stripe in the middle. These older cultivars are hardier than others to wind and drought. It has lots of green in the leaves, so growth is very robust.
Here it is called Rooster's Foot, Pata de Gallo. International names are Conspicua, Mrs. Fred Sander and Brasil, but names in this case are a bit controversial, because this is not a mothern hybrid with a registered name: it is an older type from the past.
Codiaeum shrubs are often commonly called crotons, and widely used in tropical gardens, because of their colourful glossy leaves. They are also cultivated as house plants througout the world. They are shrubs native to Malaysia and the larger islands in the Pacific. Crotons natural habitat is open forests and thickets. They do stand shade for months as well as indoor conditions, but they will grow best in high light and will enjoy some hours of direct sunlight. They are very good house plants for a bright room and will stand the dry air of heating much better than other plants. Allow the soil surface to dry slightly between watering. Crotons are sensitive to cold and should be kept above 8 C. They enjoy tropical or subtropical conditions, while they do not grow outdoors in the Mediterranean.
Botanical Illustration from http://christchurchcitylibraries.com/digitalcollection/illustrations/gee/Gee-0097.asp
|Minimum winter temperature||5 ºC to 15 ºC|
|
<urn:uuid:ae5e4c42-1035-40ac-8b48-e83b1688dbf0>
|
CC-MAIN-2023-50
|
https://www.canarius.com/en/plants/codiaeum-pata-de-gallo-.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.931452 | 407 | 3.046875 | 3 |
What is Classroom Based Physical Activity (CBPA)?
Any activities that get students out of their seat and moving their bodies throughout the day. CBPA does not have to be 30 minute bouts of movement, it can be simple 1-5 minute bursts of activity or 10 minute stretching sessions. CBPA can be used to help transition between subjects or classrooms, it can be pre-planned or a spur of the moment way to draw students back on task.
Why is CBPA Important?
Physical activity has health benefits that go far beyond weight loss and winning competitions. Getting kids active in their classroom can promote lifelong health, boost attention spans and learning, improve mood, and relieve stress. In a typical school day, kids spend a majority of their time in the classroom so providing extra opportunities to get up and moving can help kids reach the recommended goal of 60 minutes of activity in their day!
1. US Dept of Health & Human Services. Move Your Way.
2. CDC Healthy Schools. Physical education and physical activity.
In the classroom
This guide was created in response to teacher's requests for more options for CBPA. It can be used in a virtual or in-person classroom setting.
Each page contains a warm up, main exercise, and cool down guide for school staff to follow.
We want your feedback!
Access our survey HERE.
This resource provides simple and easy physical activity ideas that require very little preparation and no equipment.
These activities can be done with students standing next to their desks and many are adaptable to different ages, abilities, and settings.
This guide provides questions for consideration, key activities, and additional resources, including tools and templates, that teachers and physical activity champions can use to adopt, promote, enhance, and sustain physical activity in the classroom.
Download a step-by-step walkthrough of how to sign your class up for GoNoodle HERE.
GoNoodle helps teachers and parents get kids moving with short interactive activities.
Any teacher, anywhere, can create a free GoNoodle account and start using movement activities right away.
Use social media, such as YouTube and Pinterest, to find even more CBPA ideas for your classroom!
Try these tips to target your search for activities that can be applied to classrooms across all grade levels:
Use key phrases such as "classroom physical activity break"
Search for specific ages with phrases like "HIIT activity for 5th grade"
Check out resources created by other organizations, like this one by 12345 Fit-Tastic!
As a part of the Healthy Lifestyles Initiative, 12345 Fit-Tastic! provides resources to families, schools, and community members to promote healthy lifestyles for children of all ages.
The goals of the Healthy Schools Sector Work Group are to increase adoption of programs and policies rooted in best practices and increase access to physical activity and quality physical education in schools.
Learn more about the KCPA Plan HERE.
|
<urn:uuid:456d95dd-2446-4512-a38f-f7f6c1af1e5f>
|
CC-MAIN-2023-50
|
https://www.ciparesearchteam.org/stayactive-schools
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.933092 | 604 | 3.921875 | 4 |
Shift to Energy Efficiency in India Could End Blackouts, Save Money, and Boost GDP
ClimateWorks’ Network partners have come up with a solution that could eliminate India’s blackouts, boost its GDP by roughly half a trillion dollars, slash its greenhouse gas emissions, and save money for consumers. This solution, which relies on readily available technologies and established best practices, can be expanded worldwide to help nations reduce their reliance on costly, unreliable power sources and stimulate their economies while cutting carbon emissions.
“The Hundred Billion Dollar Bonus: Global Energy Efficiency Lessons From India” explains how shifting to currently available energy efficient appliances and other technologies could help India achieve these gains in just a few years. The report, which can be downloaded here, also shows how global collaboration can advance such benefits, helping countries save money and significantly reduce CO2emissions.
This edition of the ClimateWorks Network Knowledge Series was a joint effort of the Shakti Sustainable Energy Foundation and Lawrence Berkeley National Laboratory, with contributions from the CLASP, Prayas Energy Group, and the deputy assistant secretary for climate policy at the U.S. Department of Energy.
This article is taken from the ClimateWorks Foundation News & Report.
|
<urn:uuid:a96abe3e-5d9f-47e4-b2f6-48140370fe86>
|
CC-MAIN-2023-50
|
https://www.clasp.ngo/updates/shift-to-energy-efficiency-in-india-could-end-blackouts-save-money-and-boost-gdp/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.918228 | 246 | 3.046875 | 3 |
The U.S. Army Pueblo Chemical Depot (PCD), which reports to the U.S. Army Chemical Materials Activity (CMA), was responsible for the safe and secure storage of the chemical weapons stockpile in Colorado.
Located near Pueblo, Colorado, PCD was one of two remaining Army installations in the United States that stored chemical weapons. Encompassing approximately 23,000 acres, the depot’s mission has shifted and expanded since PCD was created in 1942. The depot ensured the safe, secure storage of the chemical weapons stockpile until it was destroyed, and is preparing for depot closure.
Safety and Security
The safety of workers, the public and the environment have been paramount to the success of the chemical weapons disposal mission.
Public Participation and Community Relations
To learn more about the Army’s chemical weapons disposal mission visit the Pueblo Chemical Stockpile Outreach Office.
|
<urn:uuid:e187a64f-4009-4c3e-ada1-5e2db551d209>
|
CC-MAIN-2023-50
|
https://www.cma.army.mil/PCD/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.952007 | 187 | 2.6875 | 3 |
Pulmonary Function Tests
Pulmonary Function Tests (PFTs) are a broad range of diagnostic procedures that measure two components of the respiratory system’s functional status: 1) the mechanical ability to move air in and out of the lungs, and 2) the effectiveness of providing oxygen to the body and removing carbon dioxide.
Pulmonary function tests are divided into five general areas:
- Lung Volume,
- Diffusion Capacity,
- Lung compliance, and
- Pulmonary Studies during Exercise Testing.
General indications for any of the pulmonary function tests include:
- To determine the presence of lung disease or abnormality of lung function,
- To determine the type of abnormality,
- To determine the extent of abnormality,
- To determine the extent of disability due to abnormal lung function, and
- To determine and evaluate one or more courses of therapy in the treatment of the particular condition.
General limitations for any of the pulmonary function tests include:
- All diagnostic tests payable by Medicare must be ordered by a treating physician and used in patient care. Community standards always apply.
- The various modalities to assess pulmonary function must be used in a purposeful and logical sequence.
- Tests performed as components rather than as a single test will be denied.
- Medicare does not cover screening tests. Medicare coverage excludes routine (screening) tests for asymptomatic patients with or without high risk of lung disease (e.g., prolonged smoking history). It also excludes studies as part of a routine exam, and studies as part of an epidemiological survey.
Medical necessity is an overriding requirement for Medicare coverage of diagnostic testing. When a diagnosis or evaluation can be made clinically or when test results are not necessary to manage the patient’s disease, then Pulmonary Function Testing is not reasonable and necessary. In addition, on routine visits for other medical conditions, when a patient claims to be stable or does not report clinically meaningful changes in pulmonary status, and physical exam and interview confirm this, repeat testing is unlikely to be necessary. Noridian has found that in many patients routine use of PFTs at each office visit is not a necessary and reasonable clinical practice and as such, cannot be reimbursed.
Providers should pay particular attention to guidelines for the usage of the CPT codes relative to Medicare’s standards of reasonable and necessary care found in the Billing and Coding article attached under Related Local Coverage Documents below.
Spirometry is performed by having the patient breathe into a mouthpiece that is connected to an instrument called a spirometer. The spirometer records the amount of air and the rate that it is breathed in and out over a specified amount of time (approximately 10 seconds). Some of the test measurements are obtained by normal breathing and other measurements require forced inhalation and exhalation.
Spirometry is most useful for assessing obstructive lung diseases such as asthma and chronic obstructive pulmonary disease (COPD).
Refer to the Billing and Coding article attached under Related Local Coverage Documents below for the CPT codes for Spirometry. Routine and/or repetitive billing for unnecessary batteries of tests is not clinically reasonable.
Specific indications for spirometry include:
- Detect the presence or absence of lung dysfunction suggested by history or clinically significant physical signs and symptoms,
- Detect the presence or absence of lung dysfunction suggested by other abnormal diagnostic tests (e.g., radiography, arterial blood gas analysis).
- Quantify the severity of known lung disease,
- Assess the change in lung function over time,
- Assess the change in lung function following administration of or a change in therapy,
- Assess the risk for surgical procedures known to affect lung function.
Limitations to performing spirometry are:
- Routine or repetitive batteries of tests are not clinically reasonable.
- In many scenarios, simple spirometry is a mainstay of pulmonary function testing and is usually sufficient to differentiate between obstructive and restrictive disorders and evaluate their severity. Extensive testing may often not be necessary for adequate clinical assessment.
- Post-bronchodilator spirometry is used to evaluate the reversible component of bronchospasm and to determine if the patient is a bronchodilator therapy candidate. Claims for spirometry will be subject to medical review as follows: there are clinical signs and symptoms consistent with bronchospasm; or spirometry without bronchodilator is abnormal; or reversibility or nonreversibility of bronchospasm has not been demonstrated. Repeat studies are covered only with clinically significant change, necessitating adjustment/augmentation of therapy, appropriately documented.
- General clinical contraindications to spirometry include: hemoptysis of unknown origin, pneumothorax, unstable cardiovascular status, thoracic/abdominal or cerebral aneurysms, recent eye surgery, recent thoracic or abdominal surgery, and presence of acute disease processes that interfere with test performance.
2. Lung volume
The entire lung volume is not measured by simple spirometry because it is larger than the air quantity exhaled/inhaled. Lung volume is measured when a person breathes nitrogen or helium gas through a tube for a specified period of time. The change in concentration of the gas in a chamber attached to the tube is measured before and after test breathing, allowing estimation of the lung volume. Measures include total lung capacity, residual volume, and functional residual capacity.
Lung volume tests are most useful for assessing restrictive lung diseases such as those caused by scarring inside the lungs or by abnormalities in the ribcage or muscles of the chest wall.
CPT codes for lung volume determination may be added when clinically relevant (see Section 4).
Indications for a lung volume test are as follows, when consistent with community standards of reasonable clinical practice:
- Evaluation of the type and degree of pulmonary dysfunction,
- Evaluation of dyspnea, cough, and other symptoms,
- Early detection of lung dysfunction,
- Follow-up and response to therapy,
- Preoperative evaluation,
- Track pulmonary disease progression,
- Assess the effectiveness of therapy for pulmonary conditions,
- Pre and post-op evaluations for Lung Volume Reduction Surgery (LVRS).
Limitations to performing a lung volume test are:
- Functional Residual Capacity (FRC) may be artificially high if the measurement is taken at a higher lung volume secondary to pain or anxiety,
- Subject cooperation is necessary,
- A complete evaluation may require the use of inhaled gases,
- Repetitive testing of total lung volume is not usually clinically necessary.
3. Diffusion Capacity
Diffusion capacity is measured when a person breathes in a measured amount of carbon monoxide for a very short time (often just one breath). While breathing out, the concentration of carbon monoxide is measured. The difference in the amount of carbon monoxide inhaled and the amount exhaled allows estimation of how rapidly gases can travel from the lungs into the blood.
Diffusion capacity tests are most useful for the assessment of how well the lung tissues transfer oxygen from the air inside the lungs, across thin membranes, into the blood.
Indications for diffusion capacity (DLCO) are as follows, when consistent with community standards of reasonable clinical practice:
- Evaluate and follow up parenchymal lung diseases associated with dusts or drug reactions or Sarcoidosis,
- Evaluate and follow up emphysema and cystic fibrosis,
- Differentiate between chronic bronchitis, emphysema, and asthma in patient with obstructive patterns,
- Evaluate the pulmonary involvement in systemic diseases (e.g., rheumatoid arthritis, systemic lupus),
- Help in the evaluation of some types of cardiovascular disease (e.g., primary pulmonary hypertension, pulmonary edema, acute or recurrent thromboembolism),
- Predict arterial desaturation during exercise in chronic obstructive pulmonary disease,
- Evaluate and quantify the disability associated with interstitial lung disease,
- Evaluate the effects of chemotherapy agents or other drugs known to induce pulmonary dysfunction,
- Evaluate hemorrhagic disorders.
Limitations to performing a diffusion capacity test are:
- Mental confusion or muscular incoordination preventing the subject from adequately performing the maneuver,
- Single breath DLCO requires breath holding at maximal inhalation. Some patients may be limited by syncopal symptoms triggered by an associated Valsalva or Muller maneuver which may slow the heart rate.
4. Lung Compliance
Lung compliance studies are performed only when all other PFTs give equivocal results or results which must be confirmed by additional lung compliance testing. Lung compliance measures the elastic recoil/stiffness of the lungs. It is more invasive than other PFTs, because the patient is required to swallow an esophageal balloon.
5. Pulmonary Studies during Exercise Testing
Pulmonary stress testing is done in two (2) forms.
- The simple pulmonary stress testing is a test that allows quantification of workload and heart rate activity, while measuring the degree of oxygen desaturation. This test is undertaken to measure the degree of hypoxemia or desaturation that occurs with exertion. It is also used to optimize titration of supplemental oxygen for the correction of hypoxemia.
- A more complex protocol involves the measurements of oxygen uptake, CO2 production, and O2. Indications for this protocol include the following:
- To distinguish between cardiac and pulmonary causes for dyspnea;
- To determine the need for and dose of ambulatory oxygen;
- To assist in developing a safe exercise prescription for patients with cardiovascular or pulmonary disease;
- To predict the morbidity of lung resection; or
- To titrate optimal settings in selected patients who have physiologic pacemakers.
Qualifications of personnel
Personnel who perform all pulmonary function tests should have verifiable training in all aspects of spirometry, lung volume, diffusion capacity, lung compliance, and pulmonary exercise testing, including equipment operation, quality control, and test outcomes relative to diagnosis and medical history.
This A/B MAC would anticipate that clinical practices with heavy emphasis on extensive batteries of complex pulmonary function tests and primary focus on treating severe pulmonary disease would often be managed by pulmonologists or by other physicians with specialized experience in respiratory disorders, and that such pulmonary testing centers would often have staff with specific training in respiratory therapy (for example, associate degree in respiratory therapy, licensure as a Respiratory Care Practitioner, or National Board of Respiratory Care (NBRC) certification).
According to National Regulations, clinics which are (a) not physician owned and which are (b) billing Medicare primarily for diagnostic tests may be required to enroll as IDTFs. For example, a nonphysician owner who establishes a diagnostic PFT clinic by leasing office space, equipment, and hiring technicians, and hires a retired ophthalmologist to provide off-site (general) supervision of diagnostic testing without treatment would be more appropriately enrolled as an IDTF.
|
<urn:uuid:a13f8e2a-cb29-4155-95aa-436a38d4763d>
|
CC-MAIN-2023-50
|
https://www.cms.gov/medicare-coverage-database/view/lcd.aspx?lcdId=34247&ver=37
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.909429 | 2,286 | 2.796875 | 3 |
The Story Of McDonald's: How McDonald’s First Got Its Start
McDonald's is an American multinational fast food corporation, founded in 1940 as a restaurant operated by Richard and Maurice McDonald, in San Bernardino, California, United States.
In October 1948, after the McDonald brothers realized that most of their profits came from selling hamburgers, they closed down their successful carhop drive-in to establish a streamlined system with a simple menu which consisted of only hamburgers, cheeseburgers, potato chips, coffee, soft drinks, and apple pie.
They rechristened their business as a hamburger stand, and later turned the company into a franchise, with the Golden Arches logo being introduced in 1953 at a location in Phoenix, Arizona.
In 1954, Ray Kroc, a seller of Prince Castle brand Multimixer milkshake machines, learned that the McDonald brothers were using eight of his machines in their San Bernardino restaurant. His curiosity was piqued, and he went to take a look at the restaurant. He was joined by good friend Charles Lewis who had suggested to Kroc several improvements to the McDonald's burger recipe. At this point, the McDonald brothers had six franchise locations in operation.
In 1956, Ray Kroc met Harry J. Sonneborn, a former VP of finance for Tastee-Freez, who offered an idea to accelerate the growth and investment grade of Kroc's planned McDonald's operation: Own the real estate that future franchises would be built on.
Kroc hired Sonneborn and his plan was executed through forming a separate company called Franchise Realty Corp. which was founded in order to hold McDonald's real estate. The new company signed leases and took out mortgages for both lands and buildings, in turn then passing these costs on to the franchisee with a 20-40% markup and a reduced initial deposit of $950.
Harry J. Sonneborn was able to raise the money for him, and Kroc bought the founding brothers out. This purchase laid the groundwork to positioning the company for an IPO and furthering the aim at making McDonald's the number one fast-food chain in the country.
The exact process of how the company was sold is not well-recorded; it is depicted as a hostile takeover by Ray Kroc in the movie The Founder but that portrayal is disputed, and interviews of the time speak of a more voluntary transition.
Kroc and Sonneborn had a falling out over expansion of the company, leading to Sonneborn's resignation in 1967. Kroc took over the title of CEO and president.
😋Products of McDonald's:
McDonald's predominantly sells hamburgers, various types of chicken, chicken sandwiches, French fries, soft drinks, breakfast items, and desserts. In most markets, McDonald's offers salads and vegetarian items, wraps and other localized fare. On a seasonal basis, McDonald's offers the McRib sandwich. Some speculate the seasonality of the McRib adds to its appeal.
|
<urn:uuid:ff57bfb9-5561-4123-aebc-08b93f91dead>
|
CC-MAIN-2023-50
|
https://www.crowdyworld.com/2022/04/the-story-of-mcdonalds-how-mcdonalds.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.969088 | 617 | 2.796875 | 3 |
Author of the commentary: Dr Sonia María Veiras. Hospital Clínico Universitario Santiago de Compostela. Head of the Anaesthesiology and Resurrection department. A Coruña province.
Between 2003 and 2009, haemorrhage, hypertensive disorders and sepsis were responsible for more than half of the cases of maternal deaths according to a WHO analysis. Most of these deaths occurred in underdeveloped and developing countries and could have been prevented. Reducing the maternal mortality rate has long been a global health goal pursued as one of the priorities in the United Nations Millennium Development Goals (Millennium Development Goals [MDG]), proposed around the year 2000. In first world countries, the incidence of peripartum haemorrhage is 5-15%, a figure that is surprising. In addition, the stressful situation that is generated by a haemorrhagic event in the obstetrics setting has much stronger emotional overtones than other bleeding situations.
This retrospective study by Zdanowicz includes Swiss birth records from 40 obstetric hospitals between 1998 and 2016 and analyses the variations in the consumption of packed red blood cells (RBCs) throughout that period. The sample studied is very large (more than 600,000 births) and the study period was divided into two unequal periods: from 1998 to 2011 and from 2012 to 2016. This partition is due to the fact that in 2012 new guidelines for treating anaemia in pregnancy were implemented in Switzerland. One difference that stands out between the two periods is the decrease in the number of ≥3 units of RBC administered, whilst the number of 1–2 units of RBC increased, in relation to the application of the new guidelines since 2012. The authors conclude that, with the increase of patients obtaining 1–2 units of RBC in peripartum haemorrhages from 2012, there is the potential for the application of patient blood management (PBM) strategies in the obstetric population.
There is a global trend, and the authors of this article also demonstrate it, towards an increase in the incidence of puerperal haemorrhage, in relation to the increase in the number of deliveries via vaginal instruments (forceps, suction cup) and the number of caesarean sections. Some other risk factors described in women today are: maternal age (there are older mothers), multiple pregnancies, fibroids, preeclampsia, chorioamnionitis, placenta previa, cervical laceration, uterine rupture and history of puerperal haemorrhage in previous pregnancies.
The use of the “4T” mnemonic rule is suggested for easy recognition of the aetiology of postpartum haemorrhage: Tone (uterine atony), Tissue (retention of products of conception), Trauma (injury to the birth canal) and Thrombin (coagulation disorders), with uterine atony a predominant cause of immediate postpartum haemorrhage and responsible for 6% of maternal deaths in developed countries according to some studies. In my view, the pregnant patient is subject to application of the first pillar of PBM when supplementation with iron and folic acid should be initiated almost from the moment of conception to reduce the incidence of anaemia. Iron supplementation has been shown to prevent maternal anaemia, and also appears to reduce the incidence
of low birth weight.
The second pillar of PBM, minimising bleeding, is pursued with the early application of uterotonics, the application of uterine massage/compression manoeuvres and the administration of tranexamic acid. However, the woman’s body prepares for the moment of childbirth by increasing clotting factors and reducing fibrinolytic activity.
Therefore, the full-term pregnant woman presents a procoagulant state.
Regarding the third pillar, the improvement of tolerance to anaemia is an individualised strategy, but in general terms, the puerpera is a healthy and vigorous patient who should tolerate low haemoglobin levels well, allowing rationalisation of transfusion. This statement has limits of course, and depends, among other things, on the speed and amount of blood lost in the puerperium.
The article makes one wonder about the utility of other blood saving tools such as the cellular recuperator, which is probably underused, partly because how abrupt and unexpected these bleeding situations are. Also noteworthy is the absence of references in the article about the use of viscoelastic tests in the management of puerperal haemorrhage.
1. Batool A Haider, Ibironke Olofin, Molin Wang et al. Anaemia, iron use and risk of adverse pregnancy outcomes: systematic review and meta-analysis. BMJ 2013, 346:f3443 doi:10.1136/bmj.f3443.
2. Lale Say, Doris Chou, Alison Gemmill et al. Global causes of maternal death: a WHO systematic analysis. Lancet Glob Health 2014;2(6):e323-33.
3. Emilia Guasch and Fernando Gilsanz. Massive obstetric hemorrhage: Current approach to management. Med Intensiva 2016;40(5):298-310.
4. Zulfiqar A. Bhutta and Robert E. Black. Global maternal, newborn and child health - So near and yet so far. N Engl J Med 2013;369(23):2226-35.
|
<urn:uuid:0e176be5-0d47-469e-bd78-37bba7b6a58e>
|
CC-MAIN-2023-50
|
https://www.cslbehring.nl/nieuwsbrief/2021/june-2021-red-blood-cell-transfusion
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.913417 | 1,143 | 2.53125 | 3 |
The Dutch national train company Nederlandse Spoorwegen (NS) has agreed to pay reparations to the descendants of Jews it transported to concentration camps during the Holocaust.
NS President Roger van Boxtel was quoted by the German newspaper Deutsche Welle as saying, “We have jointly decided … to found a committee. This committee will find out how we can arrange financial aid to those affected.”
The agreement is a result of a campaign by Salo Muller, whose parents were murdered in Auschwitz after being transported there by the NS. Though the NS had previously funded remembrance programmes in honour of the Holocaust, Muller campaigned for individual compensation.
“For me, this means that the NS realises that the suffering of many Jews has not ended,” Muller said in response to the news. “That’s why I am happy the NS recognises that it will be paid out for moral reasons.”
“I don’t think I would have dared dream of this outcome,” the BBC quoted him as saying. “For me it means that the NS recognised that this pain has not gone. The grief is still there for very many Jewish people.”
According to Deutsche Welle, the NS transported approximately 107,000 Jews to death camps, including the famed teenage diarist Anne Frank, while the Netherlands was occupied by the Nazis.
Despite being under orders from the Nazi regime, the NS was compensated for its services, eventually realising a profit of $2.8 million in today’s money.
“The NS adhered to a German command to make trains available,” said Dirk Mulder of the Center for Memory at Westerbork. “The Germans paid for this and the NS had to make sure that the trains ran on time.”
In 2005, the NS officially apologised for its part in the deportation and murder of Dutch Jews.
Source: World Israel News
|
<urn:uuid:9cb4fcd5-92a8-47bf-ae15-5f932b94802c>
|
CC-MAIN-2023-50
|
https://www.cufi.org.uk/news/dutch-train-company-to-pay-compensation-to-families-of-jews-it-transported-during-holocaust/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.973419 | 403 | 2.75 | 3 |
Stage : Normal Outward Behavior
Alzheimerâs disease usually starts silently, with brain changes that begin years before anyone notices a problem. When your loved one is in this early phase, they won’t have any symptoms that you can spot. Only a PET scan, an imaging test that shows how the brain is working, can reveal whether they have Alzheimer’s.
As they move into the next six stages, your friend or relative with Alzheimer’s will see more and more changes in their thinking and reasoning.
Other Forms Of Dementia Common In Younger People
Younger people are more susceptible to other, more unusual forms of dementia . Some examples are fronto-temporal dementia , Korsakoffs syndrome and HIV-related dementia.
Each form of dementia has characteristic symptoms, as well as more general symptoms of dementia. For example, fronto-temporal dementia affects the frontal lobe and/or the temporal parts of the brain, which deal with behaviour, emotional responses and language skills. If this part of the brain is damaged, a person may start to display inappropriate, disinhibited behaviour, such as swearing loudly and often. People with Lewy body dementia may experience visual hallucinations, irregular sleep patterns and falls. If care staff know this sort of information, they are far better equipped to respond to the particular needs of the individuals they are working with.
Dementia can be more severe in a younger person and is often associated with physical symptoms and rapid progression. This is particularly the case with rare forms of dementia such as Creutzfeldt-Jakob disease and HIV-related dementia.
To find out more about these and other forms of dementia go to the Alzheimers Society website and see its factsheet on Younger people with dementia.
Forgetfulness And Memory Loss
While forgetting where you placed your car keys may commonly occur with anyone at any age, and perhaps a bit more as you age, persistent forgetfulness or lapses in memory is typically a sign that something is wrong. For people with early onset Alzheimers, they may begin noticing abnormal and chronic lapses in memory as early as their 30s or 40s.
If youre missing where you are and how you got there, struggling to find the right words when conversing or consistently forgetting what your partner asked you to do, yet you feel as if youre too young to be experiencing these things, you may be developing some signs of early memory decline.
Recommended Reading: Senile Vs Dementia
How Common Is Dementia In Adults Under 65
Dementia can affect people as young as 30, although this is extremely rare. Most younger people with dementia are middle aged: in their 50s and early 60s. The term young onset dementia, or ‘early onset dementia’, or ‘working life dementia’ refers to people diagnosed with dementia under the age of 65.
You cant have dementia, youre too young.
A GP quoted in an Alzheimers Society report
In 2010 there were thought to be 64,037 people under 65 with dementia in the UK compared with just 16,737 in 1998. The majority of those affected in this younger age group 70 per cent are men. Younger people with dementia make up 8 per cent of the total number of people with dementia .
The chances of developing dementia before 65 are relatively small. Men aged between 30 and 59 have a 0.16 per cent chance for women it is 0.09 per cent. The chances increase slightly once a person reaches 60. Men aged between 60 and 64 have a 1.58 per cent chance of developing dementia for women it is 0.47 per cent. The chances of developing dementia are highest for people between 90 and 94 .
Pillar #: Vascular Health
Theres more and more evidence to indicate that whats good for your heart is also good for your brain. Maintaining your cardiovascular health can be crucial in protecting your brain and lowering your risk for different types of dementia, including Alzheimers disease and vascular dementia. And of course, addressing heart-health issues can also help you to lower your risk for a future heart attack or stroke.
Read Also: Neil Diamond Alzheimer’s
Pillar #: Regular Exercise
According to the Alzheimers Research and Prevention Foundation, regular physical exercise can reduce your risk of developing Alzheimers disease by up to 50 percent. Whats more, exercise can also slow further deterioration in those who have already started to develop cognitive problems. Exercise protects against Alzheimers and other types of dementia by stimulating the brains ability to maintain old connections as well as make new ones.
Aim for at least 150 minutes of moderate intensity exercise each week. The ideal plan involves a combination of cardio exercise and strength training. Good activities for beginners include walking and swimming.
Build muscle to pump up your brain. Moderate levels of weight and resistance training not only increase muscle mass, they help you maintain brain health. For those over 65, adding 2-3 strength sessions to your weekly routine may cut your risk of Alzheimers in half.
Include balance and coordination exercises. Head injuries from falls are an increasing risk as you age, which in turn increase your risk for Alzheimers disease and dementia. As well as protecting your head when you exercise , balance and coordination exercises can help you stay agile and avoid spills. Try yoga, Tai Chi, or exercises using balance balls.
Health Environmental And Lifestyle Factors That May Contribute To Alzheimer’s Disease
Research suggests that a host of factors beyond genetics may play a role in the development and course of Alzheimer’s disease. There is a great deal of interest, for example, in the relationship between cognitive decline and vascular conditions such as heart disease, stroke, and high blood pressure, as well as metabolic conditions such as diabetes and obesity. Ongoing research will help us understand whether and how reducing risk factors for these conditions may also reduce the risk of Alzheimer’s.
A nutritious diet, physical activity, social engagement, sleep, and mentally stimulating pursuits have all been associated with helping people stay healthy as they age. These factors might also help reduce the risk of cognitive decline and Alzheimer’s disease. Clinical trials are testing some of these possibilities.
Early-life factors may also play a role. For example, studies have linked higher levels of education with a decreased risk of dementia. There are also differences in dementia risk among racial groups and sexesall of which are being studied to better understand the causes of Alzheimers disease and to develop effective treatments and preventions for all people.
Don’t Miss: Is Bobby Knight Still Alive
Getting An Accurate Diagnosis
â with young onset is that dementia is not something that they think about initially. If youâre a woman, the first thing they think about is menopause and depression and anxiety and panic and sleep disorders and all those kinds of things.â â Faye, from Windsor Junction, Nova Scotia. Faye lives with young onset Alzheimer’s disease.
Diagnosing dementia can be a long and complicated process. For younger people, itâs even more complicated and frustrating. Healthcare providers are often reluctant to diagnose dementia in someone so young, and itâs common for a person who has young onset dementia to be misdiagnosed with another condition, such as depression.
As a a result, the person living with young onset dementia may not get the appropriate knowledge, treatment and support to fight the disease.
Tips For Starting And Sticking With An Exercise Plan
If youve been inactive for a while, starting an exercise program can be intimidating. But remember: a little exercise is better than none. In fact, adding just modest amounts of physical activity to your weekly routine can have a profound effect on your health.
Choose activities you enjoy and start smalla 10-minute walk a few times a day, for exampleand allow yourself to gradually build up your momentum and self-confidence.
Read Also: Color For Alzheimer’s Ribbon
Stage : Moderate Dementia
Patients in stage 5 need some assistance in order to carry out their daily lives. The main sign for stage 5 dementia is the inability to remember major details such as the name of a close family member or a home address. Patients may become disoriented about the time and place, have trouble making decisions, and forget basic information about themselves, such as a telephone number or address.
While moderate dementia can interfere with basic functioning, patients at this stage do not need assistance with basic functions such as using the bathroom or eating. Patients also still have the ability to remember their own names and generally the names of spouses and children.
Confusion About Location And Time
The person may experience confusion about places or times. They may have difficulty keeping track of seasons, months, or times of day.
They may become confused in an unfamiliar place. As Alzheimers disease progresses, they may feel confused in familiar places or wonder how they got there. They may also start to wander and get lost.
Recommended Reading: Dementia Color Ribbon
Memory Loss That Impedes Daily Activities
The most noticeable symptom of Alzheimers disease is often memory loss. A person may start forgetting messages or recent events in a way that is unusual for them. They may repeat questions, having forgotten either the answer or the fact that they already asked.
It is not uncommon for people to forget things as they get older, but with early onset Alzheimers disease, this happens earlier in life, occurs more often, and seems out of character.
What Are The Risk Factors
We do not know fully the risk factors for developing young onset dementia. For many people, it just seems to develop. In a proportion of younger people, there is a familial link. Individuals who have at least one close relative with dementia have a two to four times greater risk of developing dementia before the age of 65, most commonly Alzheimers disease. The effect is stronger for those where the close relative had young onset dementia.
A second major risk factor is Downs syndrome. Up to three-quarters of people with Downs syndrome over the age of 50 will develop dementia . This problem is increasingly evident as people with Downs syndrome are living longer now.
In addition, people from black and minority ethnic groups under the age of 65 years seem more likely to be diagnosed with dementia.
Don’t Miss: Alzheimer’s Neurotransmitters
How Do I Treat Early
Keep your body in good shape, too. Make sure you eat healthy food and get regular exercise.
These medicines can delay or improve your symptoms for a few months to a few years. They may give you more time to live independently.
Stage : Moderately Severe Decline
Your loved one might start to lose track of where they are and what time it is. They might have trouble remembering their address, phone number, or where they went to school. They could get confused about what kind of clothes to wear for the day or season.
You can help by laying out their clothing in the morning. It can help them dress by themselves and keep a sense of independence.
If they repeat the same question, answer with an even, reassuring voice. They might be asking the question less to get an answer and more to just know you’re there.
Even if your loved one can’t remember facts and details, they might still be able to tell a story. Invite them to use their imagination at those times.
You May Like: Does Diet Coke Cause Dementia
Getting Connected To Services After Diagnosis
â said, âOh, this is great, we have a diagnosis, what do we do now? Is there a pill, orâ¦?â And this is when the doctor said: âNo, thereâs no pill, thereâs nothing that we can do at all,â and youâll have to basically âgo home, get your affairs in order because you will die from this.ââ â from Ontario. Mary Beth lives with young onset frontotemporal dementia.
Even after an accurate diagnosis is made, a younger person with dementia is still likely to face obstacles. These obstacles may start with being unable to get more information about dementia or find referral to dementia-focused programs and services in their community.
We know that many people living with dementia go on to live very fulfilling lives for quite some time. Unfortunately, due to lack of knowledge and training, some healthcare providers still seem to offer little hope or support for life after diagnosis.
However, even if their doctor is helpful and can suggest practical next steps, there is another significant obstacle for the person diagnosed with young onset dementia to overcome.
What To Do If You Suspect Alzheimers Disease
Getting checked by your healthcare provider can help determine if the symptoms you are experiencing are related to Alzheimers disease, or a more treatable conditions such as a vitamin deficiency or a side effect from medication. Early and accurate diagnosis also provides opportunities for you and your family to consider financial planning, develop advance directives, enroll in clinical trials, and anticipate care needs.
Also Check: Progressive Aphasia Dementia
A Crushing Diagnosis: Early
We went to Kens primary care doctor. He suggested maybe it was depression, but Ken didnt feel depressed. The doctor put him on antidepressants anyway. The symptoms didnt go away. After seven or eight months, I thought, this is getting ridiculous. Thats when we went to see the neurologist who tested Ken and concluded he had early-onset Alzheimers a week before his 30th birthday.
At first, I thought the doctor was joking. I didnt know people could get Alzheimers so young. But the follow-up PET and CT scans confirmed the diagnosis. We were then told we had just 7 to 10 good years left with Ken. That was six years ago.
I didnt know a whole lot about Alzheimers. No one in either of our families had ever had it. I was working in hospice as a business coordinator at the time and there were people on my roster who had the disease, but they were old people.
What Ive learned is that Alzheimers disease is a type of dementia that destroys memory and mental function over time and causes changes in personality and behavior as I saw in Ken. Certain medications and treatments may help manage symptoms like memory loss, but there is no cure. If you get diagnosed when youre younger than 65, like Ken, its called early-onset Alzheimers. My husband is one of about 200,000 Americans who have this form of Alzheimer’s.
Who Has Alzheimers Disease
- In 2020, as many as 5.8 million Americans were living with Alzheimers disease.1
- Younger people may get Alzheimers disease, but it is less common.
- The number of people living with the disease doubles every 5 years beyond age 65.
- This number is projected to nearly triple to 14 million people by 2060.1
- Symptoms of the disease can first appear after age 60, and the risk increases with age.
Also Check: Bob Knight Dementia
Stage : Very Severe Decline
Many basic abilities in a person with Alzheimer’s, such as eating, walking, and sitting up, fade during this period. You can stay involved by feeding your loved one with soft, easy-to-swallow food, helping them use a spoon, and making sure they drink. This is important, as many people at this stage can no longer tell when they’re thirsty.
In this stage, people with Alzheimer’s disease need a lot of help from caregivers. Many families find that, as much as they may want to, they can no longer take care of their loved one at home. If thatâs you, look into facilities such as nursing homes that provide professional care day and night.
When someone nears the end of their life, hospice may be a good option. That doesn’t necessarily mean moving them to another location. Hospice care can happen anywhere. Itâs a team approach that focuses on comfort, pain management and other medical needs, emotional concerns, and spiritual support for the person and their family.
What Is The Difference Between Alzheimer’s And Dementia
First, some explanation of dementia vs. Alzheimer’s. According to the Alzheimer’s Association, dementia is a general term for a decline in mental ability that interferes with daily life. Not a normal part of aging, most dementias are typically caused by damaged brain cells.
Of all the dementias, Alzheimer’s disease is the most common, accounting for 60-80% of the cases. In other words, it is a specific disease while “dementia” is a general term for a life-altering decline in brain function .
Will I Get Alzheimer’s
After hearing all this information, the question we’ve probably all asked ourselves remains: will I get Alzheimer’s?
The simple answer is that, unfortunately, there’s no real way to tell. There are a number of risk factors that can increase your chances of developing the condition, but it is very rare that these factors will guarantee that you will get Alzheimer’s at some point.
Much more research is needed into the causes and risk factors associated with Alzheimer’s disease, but the good news is that this research is going on right now. The Jackson Laboratory is one such institution leading the charge with cutting edge discoveries, a strong focus on personalized medicine, and our renowned JAX Center for Dementia and Alzheimer’s Research.
Another institution internationally known for its research and charity is the Alzheimer’s Association. If you are concerned about signs or symptoms of dementia in yourself or a loved one, we recommend turning first to the Alzheimers Association Help & Support page. This page includes a many helpful articles, ways to connect with local support groups, and a 24/7 hotline for any Alzheimers and dementia related questions.
|
<urn:uuid:a697705e-444a-44b3-8a8b-1a7d08b534b0>
|
CC-MAIN-2023-50
|
https://www.dementiatalkclub.com/what-age-can-you-get-alzheimers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.952901 | 3,733 | 3.140625 | 3 |
"I think men are more open to helping their wives"
Gender roles occur in many parts of everyday family life.
Whether it’s cleaning, cooking, looking after siblings or even taking the bins out, there is often a gendered connotation added to these duties.
History serves that the burden of household duties is the responsibility of women. The age-old patriarchal breakdown of the home still has remnants in the modern world.
Although, it may not be as crystal clear as in the times of a traditional nuclear family.
In 2022, times have changed drastically. It is no longer abnormal for household duties to be distributed more equally.
We are no longer set on a rigid set of duties: husband goes to work; wife stays at home doing the housework and looking after the kids.
Girls achieve higher scores in school and are encouraged to follow their careers. The makeup of a ‘normal’ family is not what it once was.
However, for British Asians, it can be said that gendered household roles are very much apparent.
Women may still be encouraged to strive for academic success and to have career goals.
But is their upbringing within a household still bound to stereotypical expectations and roles? What is the perspective of British Asians when it comes to their duties within the home?
DESIblitz looks at real-life stories and opinions on gender roles within households.
Experiences Growing Up
For children, seeing certain habits when growing up impacts the way they live their lives once they are adults.
When kids are brought up with an expectation of roles within their home, it may perpetuate gender roles once they have children.
But for many British Asians, the gender roles they were burdened with are seen as an unfair ‘preparation for marriage’.
Tasnim Rahman, a 28-year-old public sector officer, speaks about her experience with gender roles growing up:
“It was heavily focused on ‘female’ household tasks.
“For example, we had to learn to cook, clean, and wash and we were expected to be self-dependent from an early age.
“There was a really big focus on looking after myself and a family for when I got married.
“But there was always an imbalance between my mum and dad.
“My dad did hardly anything with the house roles whilst my mum, sister and I did everything for him.”
For Tasnim, her gender role prepared her for a life of looking after other people. Tasnim feels as though she was always getting ready for a future of caring for her husband and family.
Although, she does touch upon the benefits of being taught the importance of certain tasks:
“I was taught to stand on my own two feet.
“My parents urged me to get a part-time job at 16 and I have been financially independent.
“I just do not see why the women in my family had to carry the burden whilst my dad did hardly anything.”
For women, this reality is not a new concept. For thousands of years, women have handled household chores.
The question arises, what are the roles for men in households growing up?
Nahid Wazed, a 28-year-old senior analyst comments on his gender roles growing up:
“My parents expected my brother and I to do the same as the women in the house.
“So cleaning, washing and other chores around the house were all things we had to do.
“The only aspect I felt that was dictated by gender was cooking. I feel like cooking is still a gendered role, it is seen as a woman’s job.
“My parents never expected us to cook but my sisters were taught.
“My brother and I did learn to cook but my sisters were expected to take it way more seriously.
“That was only when they were around 16, though.
“Up until then, my sisters and I had a similar upbringing with gender roles and there was not as much of a divide.”
For Nahid, the roles in his house were not as rigidly split as others.
His participation was a significant one and he feels as though his sisters were not left to carry the burden of all the household jobs.
Gender Roles as a Young Adult
Gender roles within the household are a product of a patriarchal society.
Women, in history, have played a subservient role to the men in their lives and there are countless stories that back this up.
The division of household labour is no different.
For British Asians in 2022, many still feel the pressures of gender roles.
Zahra Azim, a 20-year-old student, talks about her frustrations with the disparity between the roles of women and men she experiences within her home.
“Girls have to slave away in the kitchen whilst the men sit and do nothing. This is especially during dawats (family gatherings).
“Even if it is tea or deserts, women do it all.
“To make it worse, men eat first. It doesn’t make sense because they normally do not do anything.
“Girls are expected to know how to be hospitable, to know how to run a household.
“Parents say that this is so they are ready for marriage. Cooking, cleaning, it is all stuff that is drilled into girls.
“Obviously most people do that, but we are EXPECTED to do this for our mother in laws too.
“You must learn at home, and then do it for another family once you get married as well.
“Of course, it isn’t fair, there’s always going to be a difference between men and women within the house – that’s just the way it is.
“But there are things that men should and can do, but don’t.
“Something as simple as making tea. Girls are expected to make tea for everyone.”
Maria, a 20-year-old student shares her similar belief on gender roles within British Asian households.
“There is still an idea of men being the breadwinners and women being expected to play the ‘housewife’.
“I do not believe in that; it just feels like it is the norm.
“Something needs to change; we see a lot of men in the house who do not participate in jobs they could easily do.”
For the women we spoke to, there was a resounding belief that men still do not play an equitable part in household roles.
This is a belief shared by many men also. Mobin Chowdhury*, a student based in Birmingham, talks about his views on gender roles in 2022:
“I have always been lectured on why basic household chores should not be gendered as much as they are or have been in the past.
“My sister is much younger, so she was not around for the majority of my life.
“This meant my parents expected my brother and I to know how to play our roles in the house.
“There were no women apart from my mum in the house so the boys could not be lazy.
“My mum hates it how the women in British Asian households are expected to do the majority of jobs.
“She firmly believes that teaching her boys to get rid of notions of ‘gendered roles’ will help minimise the divide in the future.
“I agree with her. I see a lot of girls given the burden of carrying the household. It is not every household, but it is not as equal as it should be.
“I am lucky that I grew up helping my mum, it wouldn’t feel right if she was left to do it all.
“I believe that it is not as split in terms of gender roles as it was in the past.
“In 2022, we should be working to eliminate this feeling of gendered roles and I think a lot of women are passionate about this too.”
Mobin explains how a lack of women in the house acted as a chance to learn how to participate effectively in the home.
The difference between these genders within the home is still apparent.
In the Gender Equality Index 2021, it was estimated that women spend 2.3 hours on housework whilst men spend only 1.6 hours.
Life After Marriage
We have spoken about the link between gendered household roles and marriage. Many women feel as though they are given roles to prepare for marriage.
It is interesting to hear real-life stories and how gendered roles translate into married life.
Tasnim Rahman reveals her experience after her marriage.
“We are learning to separate the roles in the house more equally.
“I try to get my husband to do more around the house because he is not used to that.
“I persist in having a more equal balance and it has been good having to share the responsibility.
“There also needs to be a willingness for the husband to want to help out.
“It won’t work if the husband is completely against the idea.
“For me, it is about getting to a place where the balance of gender roles is at an equal position.”
Tasnim and her husband are both in full-time work. With the stresses of their occupations, it is no wonder she believes in a more equal balance of chores.
She touches upon her husband not being used to chores like cooking and cleaning.
That may be a product of the concept of ‘gendered roles’ during his upbringing. Of course, there could always be other reasons for it.
For women, having a partner who is willing to help out will emphasise this balance to their children and start a chain reaction for future generations.
Tasnia, a HR manager, speaks about her experience of being married:
“Our roles are pretty equal, he helps a lot.
“But he does not know how to cook, despite living out for university.
“He cleans and does the washing whilst I cook, we balance it out nicely.
“I have to teach him how to cook so that is really the only thing he does not do.
“I think that we both work but I know how to balance the household roles better than he does. Maybe I have had more practice.
“Overall, we have a nice balance, and it isn’t an unfair split. We can both improve but it is definitely a good balance.”
Cooking, again, is a chore which falls to the responsibility of a woman. The root of this may be that, as Nahid explained, cooking is still a gendered subject.
In many South Asian households, the women are the lead cooks. Only in South Asian-themed restaurants do we see a trend of male Desi cooks.
Additionally, gender roles within a marriage depend on the culture of the families.
For the women we have spoken to, their husbands are open-minded and believe that the roles should be split in a more equal way.
This is not the case for everyone. Milon, a 47-year-old shop manager, speaks about her roles when she married in 1993:
“When I got married, the times were different. I had to do a lot for not only my husband but for my in-laws as well.
“It was hard, I could not have a break and I did not enjoy it.
“But in those times, it was expected of the daughters-in-law to carry the burden of the households.”
“The men brought in the money but they did not do anything around the house.
“I had to cook, clean, wash clothes, iron them and look after the children when they came along.
“Nowadays things are better. In 2022, I think men are more open to helping their wives out.
“I also think a lot of people have a condition of not living with their in-laws when looking to get married. This is so they do not get forced to do all the housework.
“It is not perfect now but compared to back then it is miles better.”
Milon explains the dire situation that she, and many other South Asians, faced when getting married.
Cases like hers still occur, but it is far more likely that modern-day marriages are built on a more balanced system.
The Future of Gender Roles
The split between the first, second and third generations of Desi diaspora in the UK is clear to see.
Ideas of dating, marriage, sexuality and other issues have all changed dramatically.
So how do British South Asians feel about the future of gender roles within the homes?
DESIblitz spoke to Nadeem Patel*, a 21-year-old engineering student, about his thoughts:
“I think it will be less divided in the future. Men know how hard it can be for women to have all the roles in the house.
“A lot of men would not want their wives to only carry that burden.
“It is all to do with culture, we are very traditional sometimes as British South Asians.
“But it is up to men to want to help and for women to not expect anything less.
“I think in many cases, women will not settle for less and expect their men to help out.
“Hopefully our generation can be the one that limits the separation of gender roles in the home.”
The future is more promising than what it was in the 80s or 90s.
With the emergence of professional women, who are career-driven and successful, men have fewer excuses not to help out.
The ‘bread-winner’ role is less gendered. Men may still earn more in households but stats show that women are doing increasingly better in academia.
With more relationships consisting of two full-time workers, it can be said that women will have to carry less of the burdens brought by gender roles.
|
<urn:uuid:f8d261e2-9972-4627-b2ec-de098ea88e0e>
|
CC-MAIN-2023-50
|
https://www.desiblitz.com/content/have-gender-roles-changed-in-british-asian-homes
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.982753 | 2,982 | 2.59375 | 3 |
This book on "A Textbook on Rainfed Agriculture and Watershed Management (Theory and Praticals)" is a boon to the students of Agriculture as well as to all the people associated with agriculture. Various aspects of farming under rainfed agriculture have been deliberated and explored thoroughly in all the eleven chapters of this book. These chapteres compromise introductions, types and history of rainfed agriculture in India, problems and prospects of rainfed agriculture, soil and climactic conditions prevalent in reainfed areas in India, studies on cropping pattern of different rainfed areas in India, soil erosion, studies on drought. These chapters also emphasises on water harvesting technologies, management of crops in rainfed areas, contigent crop planning for aberrant weather conditions and watershed management. An attempt has also been made to provide pointwise and updated information in an easy and lucid language, so that all the students and even farmers knowing basic English can easily understannd different concepts discussed in this book. It also includes practical aspects of the syllabus as per the recommendations suggested under the 5th Dean Committee, ICAR New Delhi.
The unique features of the book are a summary and a question bank including multiple choice and other reviewed questions at the end of each chapter, that will definitely help the students to incucate the theory and practical aspects of rainfed agriculture and watershed management in depth. Hence this book will benefit both undergraduate and post graduate students of Agriculture.
- Published: 2021
- Publisher: S.K. Kataria & Sons
- ISBN-10: 9383992549
- ISBN-13: 9789383992546
- Dewey Decimal: 631.587
- ECHO Library: 631.587 MEV
|
<urn:uuid:cce90d23-b90c-44a9-9784-064640164dca>
|
CC-MAIN-2023-50
|
https://www.echocommunity.org/my/resources/08eae5eb-0a5b-4faf-8e4b-28d177b998ed
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.922761 | 357 | 3 | 3 |
Are your workers making mistakes? Could be air pollution messing with their brains.
Great companies focus on employees first and spend millions of dollars every year to fine-tune productivity. Now, accumulating evidence shows that air pollution is making your workforce not just sicker — but also less productive and more error-prone.
There's no hiding from the damaging health effects of air pollution. Less well-known, perhaps, is the fact that air pollution also directly affects the brain, decreasing cognitive performance and affecting behavior and mood.
This is true for indoor as well as outdoor workers, and it has a direct impact on the companies they work for.
Stock returns plunged nearly 12% with dirty air
- Stock traders in Germany were 10% less likely to sit down and trade when air pollution levels increased by relatively small amounts, even after accounting for investor, environmental and market-specific factors. A study of daily data from the S&P 500 index and from an air quality sensor near Wall Street also found stock returns to be nearly 12 percent lower on days with higher air pollution.
- Similar results were seen in New York Stock Exchange and Nasdaq data analyses. Researchers hypothesize that the stock returns dropped because pollution affected traders' mood and risk perception.
- Another study on the productivity of indoor workers at a pear-packing factory showed that an increase in fine particulate matter — a harmful pollutant that can easily get indoors — leads to a 6% decrease in packing speeds inside the factory.
- Meanwhile, international businesses in heavily air-polluted cities are having to offer a form of "hazard pay" to woo top talent. Coca-Cola, for example, offered a 15% bonus for employees willing to move to China, only to see some of them return home after citing pollution-related health concerns for themselves and their children.
Air pollution costs the global economy $225 billion each year in lost labor income. Foul air and traffic congestion routinely disrupt daily business operations in other ways as well.
Researchers have found that pollutants like particulate matter can cause inflammation in a person's blood stream that, in turn, can cause brain dysfunction.
Children exposed in the womb and in early life, and older adults exposed to heavy pollution over time, perform worse on cognitive testing. They also have a higher risk of neuro developmental or neurodegenerative disorders such as autism or dementia.
So the odds are, pollution is affecting the well-being of your entire workforce as well as your company's bottom line — regardless of which industry you're in, or whether you work in a corner office or on the factory floor.
Umpires and execs make bad calls
The increased errors in decision-making manifest themselves in surprising ways.
For example, baseball fans can expect more bad calls on days with higher levels of air pollution. One study found that umpires facing elevated levels of fine particulate matter and ambient carbon monoxide make an extra two incorrect calls per 100 decisions.
It raises a question: Is an executive who, say, makes an important call from a plane spewing exhaust on the tarmac — or who lives close to an expressway — also more prone to making mistakes?
There are ways to protect your business
There are a few things you can do right away to keep your employees safe and productivity high:
- Ask your mayor what the city is doing to monitor air pollution. Unbeknownst to you, they may already have some good resources.
- Advocate for cleaner air in the areas where you live and work. While the Trump administration is rolling back air quality protections, local politicians and business leaders have been stepping up, taking the lead and making moves.
- Incorporate air pollution into your company's sustainability goals — a win-win since it helps us tackle climate change while helping your employees thrive. Companies with fleets can make an immediate impact by implementing aggressive plans to transition the bulk of their large vehicles to zero-emission vehicles.
The cumulative effects of air pollution are damaging and deadly, and your competition is already taking action. Now it's your turn.
|
<urn:uuid:67a4c41b-f7b2-4484-abe2-73f0cbc58621>
|
CC-MAIN-2023-50
|
https://www.edf.org/blog/2019/06/25/are-your-workers-making-mistakes-could-be-air-pollution-messing-their-brains
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.949376 | 833 | 2.546875 | 3 |
One out of every 100 special education students was restrained by school personnel or secluded in school from his or her peers in the 2013-14 school year, presumably to quell behavior that teachers considered disruptive or dangerous.
That means nearly 70,000 special education students were restrained or secluded in that school year, the most recent for which data are available. For most students, this happened more than once: States reported more than 200,000 such incidents, so on average, a special education student was restrained or secluded about three times.
These statistics, based on an analysis by the Education Week Research Center of data collected by the U.S. Department of Education’s office for civil rights, represent the best national snapshot of these controversial practices.
The numbers are also, almost surely, dramatically understated.
The Department of Education’s Civil Rights Data Collection offers the only information available on the use of restraint and seclusion nationwide. The data that is captured show that students with disabilities and boys are most often subject to restraint and seclusion. State policy does not appear to fully determine variations in reported use of such practices.
• One out of 5 districts have students that were restrained or secluded during the 2013-14 school year.
• Nearly 70,000 students covered under the Individuals with Disabilities Education Act were restrained or secluded in 2013-14.
• Those students account for over 200,000 incidents of restraint or seclusion.
• One in every 100 students with disabilities is restrained or secluded.
• Four out of 5 students with disabilities who are restrained or secluded are males.
Source: Education Week Research Center analysis of Civil Rights Data Collection, 2017. Some student counts were rounded to protect individuals from being identified.
Many large districts, including New York City and Chicago, were among the nearly 80 percent of districts that reported no special education students being restrained or secluded.
Advocacy groups and news organizations have investigated restraint and seclusion incidents in individual states and have found large undercounts. This is true even in states such as Indiana and Maine that have their own reporting requirements separate from the federal collection of civil rights data.
The shaky recordkeeping has serious consequences for students, who are traumatized or injured at unknown rates; teachers, who say they aren’t getting the help they need to deal with troubled students; and advocates and policymakers, who say they want to end inappropriate use of these practices.
The data also show how challenging it is to regulate restraint and seclusion through policy. Whether students are restrained or secluded appears to have more to do with the culture of the school or district they attend than with any state rules or regulations meant to restrict the practice. Researchers at the University of New Hampshire,, found that the vast majority of the variance in reported restraint and seclusion rates is found among districts in the same state, all presumably governed by the same policies.
Many states are continuing to enact such restrictions, however.to emergency situations involving the safety of the student or others. In addition, districts must train key personnel in de-escalation and safe restraint procedures. The changes will take place in the 2017-18 school year.
Lt. Gov. Brian Calley, a Republican, led a commission that was asked to recommend reforms to the state’s special education program. For that work, he traveled around the state to hear parents’ concerns about restraint and seclusion.
“It’s really unbelievable, some of the things I’ve heard,” said Calley, who has a daughter with autism spectrum disorder. “The anecdotal evidence was just piling up that it was much more common than anyone cared to admit.”
Federal Efforts to Reduce Restraint
Recently, the issue has made it into federal policy: States must explain how they plan to reduce “aversive behavioral interventions” under the state plans that are required by the, which passed in 2015.
Several of the 16 plans submitted so far refer to supporting school districts as they implement positive behavioral supports and interventions, a framework to prompt good behavior. None of the plans submitted so far spell out a restraint-and-seclusion threshold that would trigger further state intervention to reduce the numbers.
In 2013, Kentucky enacted regulations that, for the first time, spelled out how restraint and seclusion could be used in its school districts.
The policy stipulates that such practices could only be used if a student’s behavior represents “imminent danger” to himself or others. The restraint or seclusion must end as soon as the danger has passed, and parents must be notified within 24 hours. The provisions closely matched a set of best practices that had been released a year earlier by the U.S. Department of Education.
But a year later, a then-16-year-old autistic student, Brennan Long, was left with two shattered thigh bones after being restrained in his Louisville school.
The fallout from that incident has continued since then. An investigation by the Louisville Courier-Journal found that the 100,000-student Jefferson County district, which includes Louisville, was dramatically underreporting cases of restraint and seclusion. In the same year that Long was injured, the district reported 174 restraint and seclusion incidents to the state. Upon further review, Jefferson County reported that restraint and seclusion incidents were far higher—4,165.
Several other concerns have come to light. Jefferson County was found to be one of five Kentucky school districts that trained some staff members in Aikido Control Training, a form of Japanese martial arts that includes prone restraint techniques. Prone restraints are banned under state regulations and have led to deaths in other situations. Further investigations found other troubling restraint cases, including a 2014 incident where a special education teacher held a student against a wall until he vomited as he attempted to break free.
In February, Stephen Pruitt, the state commissioner of education, said that Jefferson County would have to go through a top-to-bottom management audit. The superintendent of the school district, Donna Hargens, announced in April that she will resign at the end of the 2016-17 school year, her sixth leading the district. The relationship between Hargens and the county school board worsened in the wake of the scrutiny by the state.
What happened to Brennan Long, now 18, has yet to be fully explained. No criminal charges have yet been filed in the matter, but investigations continue. School staff members have said that Brennan was aggressive on the day he was injured, and taken to the ground by an aide in a procedure that nudged the student off-balance and allowed him to be lowered to the floor in a seated position. Kentucky Protection and Advocacy, a federally mandated agency that represents people with disabilities, said that the behaviors that staff members described, such as making loud noises, getting up from his chair, biting his arm, and putting his hands in his pants, were not aggressive. And the restraint had to have been more forceful to cause such serious injuries, the advocacy organization said. The aide that restrained Brennan remains employed by the district.
The Long family ended up settling with the school district for $1.75 million, and has continued to speak out on the case.
“It’s amazing to us that this is taking so long,” said Brennan Long’s father, Brian. “But we’re going to get to the bottom of this.”
“I’ve done a lot of work with restraint and seclusion. I’ve gotten laws passed that really limit the use of restraint and seclusion in lots of other settings. None of that has translated into the school setting,” said Leslie Morrison, the director of investigations for Disability Rights California, a federally funded organization that advocates and litigates on behalf of state residents with disabilities. “The resistance is remarkable to me.”
But when it comes to issues of behavior, it’s impossible to say there should only be a certain number of restraints or seclusions, said Sarah Ricker, the student assistance coordinator for the Maine education department. Such numbers are dependent on a student’s behavior and needs.
“What is high, what is low—we can only determine that over a period of time,” Ricker said. Maine restricts restraints to emergencies where a student’s safety is at risk, and teachers understand that, she said."I have not heard a teacher say they don’t know what they need to do.”
The last time a federal restriction on restraint and seclusion garnered some traction was nearly a decade ago. The National Disability Rights Network, which represents the state protection and advocacy organizations, released a report in 2009 called “” that catalogued dozens of cases of abusive restraint and seclusion incidents and four deaths linked to the practices.
The U.S. Government Accountability Office released a report the same year saying that it had found hundreds of abuse allegations over the prior two decades linked to restraint and seclusion in schools.
In 2010, Congress came close to enacting a federal policy restricting the practices, but the provision died in the Senate over hotly contested language that would have allowed restraint or seclusion to be written into a student’s individualized education program.
But that wasn’t the end of the federal government’s attempt to influence the issue. In 2012, thethat states could use as a starting place for their own regulations aimed at reducing restraint and seclusion. And, in the waning days of the Obama administration, the department’s office for civil rights sent out guidance to districts outlining how restraint and seclusion could be considered a violation of a student’s rights under the Americans with Disabilities Act, among other federal statutes.
But statewide policy changes don’t always make much of a difference at the school and district level. Researchers at the Carsey School of Public Policy at the University of New Hampshire analyzed federal data on restraint and seclusion that was collected during the 2009-10 and 2011-12 school years. Of the 10 states with the highest levels of restraints and seclusions, six had meaningful prohibitions meant to limit the practice, said Douglas Gagnon, who led the analysis.
Prohibitions against restraint and seclusion generally leave an opening for the practice to be used on an emergency basis, to protect the student or others from physical harm. But “it’s tough to really codify what’s an emergency, and what’s a threat,” Gagnon said.
Educators and the public are aware that achievement gaps often separate students of color from their higher-achieving white peers, leave low-income students lagging behind their better-off peers, and restrict opportunities for students with disabilities. Less obvious are the mechanisms and circumstances that contribute to those academic differences.
This installment is the third of a series intended to shed light on the “hidden inequities” that keep education from reaching the goal of leveling the playing field for all students. Each report is being produced by Education Week staff writers working in collaboration with the Education Week Research Center. Watch for the June installment, which will examine school closings and high student-mobility rates, their impact on educational quality, and their disparate effects on different school communities.
In 2013, Maine started requiring schools to document each use of restraint and seclusion. Disability Rights Maine, one of the nation’s federally funded and mandated protection-and-advocacy agencies, requested access to that data. In an April report, the organization found that in a state with about 30,000 students, ages 3-21, in special education,over the four years that the law has been in place.
But that number is also skewed by undercounting: Nearly one-third of the entities covered under Maine’s law failed to report data for all four years, the Disability Rights Maine investigation found.
California lawmakers in 2013 repealed a state requirement that mandated data collection on emergency interventions and required districts to create behavior-management plans for students with serious behavioral problems. The previous state law had imposed costs and requirements on California that were in excess of what the federal law required, state officials argued.
In the last year that state reporting was required,which include restraints and seclusions. Advocates believe many of those incidents were not linked to emergencies, however.
Last year, the federal Education Department’s civil rights officeafter investigating a case where a student was restrained more than 90 times in 11 months. Stuart Candell, who has autism and was 9 at the time, was often held face down by two to three adults, according to federal investigators. Prone restraint has been linked to suffocation deaths. The district was required to sever ties with any private schools that use the technique.
Now a 13-year-old in 7th grade, Stuart is not being restrained any more, said his mother, Bonnie Candell. While she did not know about all of the restraint incidents, she knew the school used the technique.
“You think, well, they must know what they’re doing,” Bonnie Candell said.
At the same time, federal data could be capturing overcounting. The 3,000-student Columbia-Brazoria district in southeast Texas is one of many across the country that stands out from neighboring school systems because federal data show a relatively high 82 restraint or seclusion incidents among 250 students with disabilities.
That’s wrong, said Lynn Grell-Boethel, the director of special education for the district for 16 years. A clerical employee was erroneously recording children being sent to the office as seclusions, she said, and police arrests were wrongly recorded as mechanical restraints. Typical seclusions, such as isolating a child in a special room for that purpose, are not allowed under Texas regulations.
The actual number of restraint incidents for students with disabilities in the 2013-14 school year, Grell-Boethel said, was seven.
The district is making efforts to reduce restraint rates, Grell-Boethel said.
“You really have to know the kid, and you really have to develop strong relationships with them,” she said. “These are community schools, so a lot of people in the schools know the family, know the kids, know the situation.”
The 42,000-student Marion County, Fla., district is also trying to lower its restraint and seclusion rates. Florida requires districts to report numbers and take corrective action if the incidents reported are higher than state averages. According to state data, the central Florida district reported 467 restraints and 377 seclusions in 2015-16, more than any other similar-sized state district.
Heidi Maier, who was elected superintendent in November, knew the issue would have to be addressed, said Elizabeth Fields, the district’s special education director. The school system is looking at a variety of methods, from eliminating seclusion rooms to providing more teacher training and setting up rooms where students can voluntarily calm themselves.
“We need a lot of verbal de-escalation training,” Fields said. “That needs to happen to all teachers. General education teachers are saying those kids are in my room, too.”
Reece L. Peterson, a special education professor at the University of Nebraska-Lincoln and an expert in reducing restraint and seclusion, supports more training, but he is sympathetic to teachers who say that’s just one more activity to fit into an already-packed schedule.
“What we need is a few states to be models of what could happen,” he said.
Research analyst Alex Harwin and Research Intern Jack Williams contributed to this report.
A version of this article appeared in the May 17, 2017 edition of Education Week as 70,000 Are Secluded, Restrained
|
<urn:uuid:7881b73c-a912-4142-9eac-849a2ee44e12>
|
CC-MAIN-2023-50
|
https://www.edweek.org/leadership/70-000-students-with-disabilities-secluded-restrained-in-school/2017/05
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.969831 | 3,280 | 2.984375 | 3 |
Scientists have called for an urgent study into the impact of nanoplastics on the world and global health amid fears that the knowledge to fully understand their impact is lacking.
A team from Empa and ETH Zurich have sought to examine the threat from nanoplastics which are smaller than microplastics and have concluded that there is no evidence to say they are a ticking time bomb there is no evidence to say they are not either.
“Wherever scientists look, they can spot them: whether in remote mountain lakes, in Arctic sea ice, in the deep-ocean floor or in air samples, even in edible fish – thousands upon thousands of microscopic plastic particles in the micro to millimetre range,” said the study. “This microplastic is now even considered one of the defining features of the Anthropocene, the age of the Earth shaped by modern humans.”
Microplastics are formed by weathering and physicochemical or biological degradation processes from macroscopic plastic products, such as the tons of plastic waste in the oceans.
However, the study added it is unlikely that these degradation processes will stop at the micrometre scale. And so there is growing concern about the potential harmful effects nanoplastics could have on various ecosystems.
“Numerous media reports suggest, through their sometimes highly emotional coverage, that we are facing a huge problem here,” says Empa researcher Bernd Nowack, who has long studied the material flows of synthetic micro- and nanoparticles. But Nowack says at present this statement can hardly be substantiated by scientific findings: “We don’t even know how much nanoplastics there is in the different ecosystems.”
He explained this is primarily because it is enormously difficult in terms of measurement technology to identify artificial nanoparticles made of plastic in environmental samples with thousands and thousands of (natural) particles of similar size.
Appropriate analytical methods would first have to be developed, says Denise Mitrano of ETH Zurich. And then it would be a matter of understanding exactly what risk the tiny plastic particles – some of which differ considerably in their chemical composition – pose to humans and the environment, in other words: how dangerous they ultimately are.
“So we can’t justifiably say we have a serious problem here – but we also can’t say we don’t,” added Nowack.
It is because the smaller particles become, the more likely they are to reach organs and tissues that are inaccessible to larger particles. The blood-brain barrier or placenta, for instance, prevents particles and macromolecules from passing through until they reach a certain size – or rather, smallness – thereby protecting the tissues and organs “behind” them, i.e. the brain and foetus, respectively, from potentially dangerous substances such as viruses and bacteria.
“Even if we ingest microplastics, for example through our food, they probably do not enter our bloodstream or our brain, but are simply excreted again,” said Peter Wick, head of Empa’s Particles-Biology Interactions lab, who studies the interactions of nanoparticles with biological systems. “With nanoplastics, we can’t be so sure.”
Because of the enormous gaps in current knowledge, research into nanoplastics has to be intensified, said the researchers.
“However, this should be done as systematically and broadly as possible – and with a cool head,” they added. “After all, emerging pollutants do not always turn out to be as dangerous as originally assumed.”
“Our society initially adopts a zero-risk attitude toward many things that are new and unknown,” Wick added. “And that’s understandable, especially in the case of nanoplastics, because, after all, who wants plastic in their food?”
The research said the solution to the problem, is as simple (at least in theory) as it is complex.
“On the one hand, a large proportion of nanoplastic particles are produced by the degradation of macro- and microplastics. Less plastic in the environment, therefore, reduces the amount of nanoplastics, and here every one of us can help stop polluting the environment with plastic waste,” it explained. “On the other hand, nanoplastics can also be created during the use of plastic products – for example, through abrasion – without the user being able to do anything about it. Indeed, our society is hardly possible without plastic.”
|
<urn:uuid:5ae22d0f-2454-4e90-a9c9-d0ef79ae9dee>
|
CC-MAIN-2023-50
|
https://www.emergingrisks.co.uk/nanoplastics-threat-requires-urgent-investigation-experts-warn/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.955464 | 953 | 3.359375 | 3 |
James Cook (October 27, 1728 - February 14, 1779) was a British explorer and astronomer who went on many expeditions to the Pacific Ocean, the Antarctic, the Arctic, and around the world.
Cook’s First Journey
Cook’s initial voyage lasted from August 26, 1768 to July 13, 1771, when he sailed to Tahiti on the Endeavor in order to observe Venus as it passed between the Earth and the Sun (this is called the transit of Venus, when Venus is visible as a small black dot moving across the Sun; the time of transit was used to calculate a more accurate distance between the Earth and the Sun). Cook was also searching for a large, southern continent that was thought to exist (but does not). Many scientists accompanied him on the voyage, including the botanist Joseph Banks.
During this expedition, he sailed from Plymouth, England, to Brazil, around Cape Horn (the southern tip of South America), and to Tahiti (April 11, 1769), where he stayed for months in order to observe the transit of Venus (in order to determine the distance from the Earth to the Sun). He then sailed to and named the Society Islands (named to honor the Royal Society, the organization that sponsored the trip).
Cook sailed to New Zealand on October 6,1769, where he and his crew fought with the Maori (the earliest inhabitants of New Zealand) and mapped much of the two major islands (the strait between these two islands is now named Cook Strait) and showed that is was not part of a larger southern continent.
He then sailed to and mapped eastern Australia (the Endeavor was stuck for a day on the Great Barrier Reef off northeastern Australia; the ship was damaged by coral and almost sank). They repaired the ship in northern Queensland, Australia (the site of Cooktown and the mouth of the Endeavor River), completing the repairs on August 6, 1770. Cook sailed through the strait between Australia and New Guinea, and reached Batavia, Java, in October, 1770, where about 30 members of the crew died from malaria (a disease carried by mosquitos). Cook replaced these crew members in South Africa.
On July 13, 1771, the Endeavor returned to England after a journey of almost three years.
Cook’s second expedition (1772-1775) took him to Antarctica and to Easter Island on a voyage intended to show there was no large southern continent. Cook’s two ships on this voyage were the Resolution and the Adventure. Again, many scientists accompanied him on the trip. A teenaged George Vancouver was a midshipman.
Cook left Plymouth, England, on July 13, 1772, and sailed to Cape Town, South Africa, and on to Bouvet Island, near Antarctica. He was the first person the cross the Antarctic circle. The two ships were separated in February, 1773, and met again in New Zealand in April, 1773. They then explored area north and east of New Zealand, including Tahiti and Tonga. The ships were again separated; Cook sailed south, reaching a record latitude 71 degrees and 10 minutes (roughly 1250 miles from the South Pole); the other ship returned to England (Captian Tobias Furneaux was the first to sail around the world from east to west). Cook then sailed from Cape Horn (the southernmost point of South America) to the Cape of Good Hope (the southernmost point of Africa) and back to England, arriving on July 29, 1775.
Cook’s last expedition (1776-1779) was a search for a Northwest Passage across northern North America to Asia - he searched from the Pacific Ocean side of the continent. Cook sailed from England on July 12, 1776, on the Resolution. Officers on the ship included George Vancouver and William Bligh (who would later be the captain of the Bounty and have his crew mutiny).
Cook arrived at Capetown, South Africa, on October 18, 1776, and sailed to the Indian Ocean and on to New Zealand (in early 1777), the Cook Islands, and Tonga. Heading for Alaska, Cook sailed to and named the Christmas Islands (arriving on December 25, 1777, hence the name). He then sailed to and named the Sandwich Islands (named for the Earl of Sandwich, one of Cook’s patrons). Cook searched for a Northwest Passage in Alaska, but was unsuccessful. He then returned to the Sandwich Islands.
Cook was killed by a mob on Feb. 14, 1779, on the Sandwich Islands (now called Hawaii). At the time, he was trying to take the local chief hostage to get the natives to return a stolen sailboat. The ship returned to England without Cook on October 4, 1780.
Cook was the first ship’s captain to stop the disease scurvy (now known to be caused by a lack of vitamin C) among sailors by providing them with fresh fruits. Before this, scurvy had killed or incapacitated many sailors on long trips.
|
<urn:uuid:12d9a079-528c-49a7-89d3-cf63963ae5a5>
|
CC-MAIN-2023-50
|
https://www.enchantedlearning.com/explorers/page/c/cook.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.974994 | 1,048 | 3.71875 | 4 |
Around six million people fish on coral reefs, and the fish they catch provide critical sources of protein, micronutrients and income for many millions more. However, coral reefs have been greatly degraded by local human pressures and global climate change. With reef degradation escalating it is essential to know how coral reef condition influences associated fisheries. Coral reef habitat loss is known to influence reef fish communities, and yet fishery yield estimates may not be as sensitive to these changes as expected. This project will tackle the issue of how coral reef fisheries respond to reef habitat decline using a range of approaches.
Specifically the project will ask: How do gradients of reef degradation influence the standing stock and productivity potential of key fishery species? How are yield and catch-per-unit-effort influenced by coral reef condition? What is the spatial and temporal overlap between reef habitat and fisheries landings? What are fishers perceptions of the fishery potential of differing coral reef habitat? By tackling the overarching question from diverse perspectives, the project aims to capture the ecological and fishery factors that determine how reef ecosystem decline will influence reef fisheries. With supervisory and project support at Lancaster University, UK, and Dalhousie University, Canada, the project offers unique opportunities for research and training in coral reef science.
Applicants should hold a minimum of a UK Honours Degree at 2:1 level or equivalent in subjects such as Marine Biology, Environmental Science, Ecology, or Geography. Applicants with Masters degrees, relevant research experience, or publications will be highly competitive. Exposure to statistical analyses and fisheries desirable.
For further details, please contact Professor Nick Graham ([email protected]).
|
<urn:uuid:bca5b8aa-e522-4b38-98c5-7d06a07dda4b>
|
CC-MAIN-2023-50
|
https://www.envision-dtp.org/2018/implications-of-coral-reef-degradation-for-fisheries/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.90097 | 343 | 2.859375 | 3 |
Assistant Professor Kang Hao Cheong and his research team from the Singapore University of Technology and Design (SUTD) have set out to apply concepts from quantum Parrondo’s paradox in search of a working protocol for semiclassical encryption. In a recent Physical Review Research letter, the team published the paper ‘Chaotic switching for quantum coin Parrondo’s games with application to encryption’ and discovered that chaotic switching for quantum coin Parrondo’s games has similar underlying ideas and working dynamics to encryption.
Parrondo’s paradox is a phenomenon where the switching of two losing games results in a winning outcome. In the two-sided quantum coin tossing game introduced by the authors, they showed in a previous work that random and certain periodic tossing of two quantum coins can turn a quantum walker’s expected position from a losing position into a fair and winning position, respectively. In such a game, the quantum walker is given a set of instructions on how to move depending on the outcome of the quantum coin toss.
Inspired by the underlying principles of this quantum game, Joel Lai, the lead author of the study from SUTD explained, “Suppose I present to you the outcome of the quantum walker at the end of 100 coin tosses, knowing the initial position, can you tell me the sequence of tosses that lead to this final outcome?” As it turns out, this task can either be very difficult or very easy. Lai added: “In the case of random switching, it is almost impossible to determine the sequence of tosses that lead to the end result. However, for periodic tossing, we could get the sequence of tosses rather easily, because a periodic sequence has structure and is deterministic”.
Random sequences have too much uncertainty, on the other hand, periodic sequences are deterministic. This led to the idea of incorporating chaotic sequences as a means to perform the switching. The authors discovered that using chaotic switching through a pre-generated chaotic sequence significantly enhances the work. For an observer who does not know parts of the information required to generate the chaotic sequence, deciphering the sequence of tosses is analogous to determining a random sequence. However, for an agent with information on how to generate the chaotic sequence, this is analogous to a periodic sequence. According to the authors, this information on generating the chaotic sequence is likened to the keys in encryption. Knowing just the keys and the final outcome (i.e. the encrypted message), this outcome can be inverted to obtain the original state of the quantum walker (i.e. the original message).
Assistant Professor Cheong, the senior author of the study remarked, “The introduction of chaotic switching, when combined with Parrondo’s paradox, extends the application of Parrondo’s paradox from simply a mathematical tool used in quantum information for classification or identification of the initial state and final outcome to one that has real-world engineering applications. Cheong added, “The development of a fully implementable quantum chaotic Parrondo’s game may also improve on our semiclassical framework and provide advances to bridge some of the problems still faced in quantum encryption”.
|
<urn:uuid:22a96c94-0b83-460a-9daf-9a440df7fe80>
|
CC-MAIN-2023-50
|
https://www.eurasiareview.com/16102021-using-quantum-parrondos-random-walks-for-encryption/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.928584 | 661 | 2.671875 | 3 |
Gas to solid formation is usually a result of significant temperature changes or chemical combination. These processes occur naturally and artificially. Gases combine organically with other materials to produce the processes of life, but function chemically using their characteristic chemical properties as gases. At different temperatures they're capable of different things. Chemical combination is the most common form of transformation into solids. Gases frequently combine with other chemicals to form solids.
Examples of Gas to Solid:
This diagram shows the nomenclature for the different phase transitions.
|
<urn:uuid:5cb4306f-b143-44a2-905c-f1e279cb4f84>
|
CC-MAIN-2023-50
|
https://www.examplesof.com/science/gas_to_solid.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.881578 | 106 | 3.8125 | 4 |
In this article, we will learn to convert a percentage to a number in Excel. Sometimes, we need to change the percentage formatting in number formatting for our desired output. In an Excel worksheet, we can easily show a percentage in a number format. Here, we will demonstrate five easy and quick ways to convert a percentage to a number in Excel.
What is Percentage?
In simple language, a percentage is a number or a ratio expressed as a fraction of 100. It is denoted by the percent (%) sign. Suppose, there are 300 students in a class, and 150 of them are male. If we divide the male students by the total number of students and multiply it by 100, then we will get 50%. It means there are 50% (fifty percent) male students or the percentage of male students is 50.
How to Convert Percentage to Number in Excel: 5 Methods
1. Convert Percentage to Number from the Home Tab
In excel, we can convert any percentage to a number using the Home tab. To explain this method, we will use a dataset that contains the information of sales amount of two months of some sellers. The amount of increase concerning the second month is calculated in Column E and shown in percentage. We will try to convert these percentages to numbers here.
Let’s follow the steps to learn more.
- In the first place, select the cell you want to convert to a number. We have selected Cell E6 here.
- Secondly, go to the Home tab and select the ‘Percentage’. A drop-down menu will occur.
- Thirdly, select Number from there.
- After that, the selected percentage will be converted into a number like below.
- Finally, use the Fill Handle to convert the other percentages.
- To show the decimal numbers, like the percentage values, just multiply the cell formula or the cell by 100.
Here, we used this formula to calculate the ratio of the increase. And then we multiplied it by 100.
- Hit Enter to see the result.
- Again, use the Fill Handle to see results in all cells.
2. Use Format Cells Window to Change Percentage to Number
We can also use the ‘Format Cells’ window to change a percentage to a number in Excel. We will use the same dataset here. Let’s observe the steps below to learn this method.
- In the beginning, select the cells you want to convert to numbers. We have selected Cell E6 to Cell E11.
- Now, go to the Home tab and select the Number dialog icon, like below. The ‘Format Cells’ window will appear.
- Similarly, you can also right-click the mouse and then select Format Cells to open the window.
- Then, select ‘Number’ and change ‘Decimal places’ to 2.
- Finally, click OK to see results like below.
3. Convert Percentage to Number with Excel Custom Formatting
Custom formatting is another way to convert percentages to numbers. It is also quick and gives various opportunities to display the results. For this method, we will again use the same dataset.
Follow the steps below to learn this technique.
- Firstly, select the range of cells you want to convert to numbers. We have selected Cell E5 to Cell E11 here.
- Now, open the ‘Format Cells’ window using the ‘Number’ dialog icon like Method-1.
- After that, select ‘Number’ and then, select ‘Custom’.
- Then, write 00 in the Type field.
- Finally, click OK to see results like below.
- Moreover, you can also show the output to four decimal points. To do that, write 0.0000 in place of 0.00.
- Click OK to see results like below.
4. Apply Formula to Convert Percentage to Number in Excel
Applying formulas in cells makes our task very easy in Excel. We can apply a formula to convert the percentages to numbers. For that, we will use the NUMBERVALUE function. The NUMBERVALUE function converts a number or percentage in text format to a numeric value. Here, we will use the same dataset but we need to create an extra column to apply the formula. Let’s follow the steps to learn more about this method.
- First, select Cell F6.
- Second, type the formula:
- Thirdly, hit Enter and drag the Fill Handle down to see the results.
- Now, you can use the ‘Format Cells’ to show only four decimals after a point.
- Then, to make the value of the numbers equal to the percentages, multiply the cells by 100.
- Finally, you can see the results below.
- Furthermore, use the Fill Handle to see results in all cells.
5. Use of ‘Copy & Paste Values’ to Convert Percentage to Number in Excel
In this method, we will use the ‘Copy & Paste Values’ feature of Excel. We will again add an extra column here.
Follow the steps to learn this technique.
- At first, select the cells you need to convert. We have selected Cell E6 to Cell E11.
- Now, we need to copy them. To copy, you can press Ctrl + C from the keyboard.
- Then, select the first cell of the Helper Column and Paste Values like below.
- After that, you will see results like below.
- Finally, use the ‘Format Cells’ window to display numbers to four decimal places.
Things To Remember
There is an important thing you need to remember while converting percentages to numbers. When you are using the ‘Copy & Paste Values’ method, make sure the Helper Column is in General format.
Download Practice Book
Download the practice book.
We have demonstrated five quick and easy ways to convert a percentage to a number in Excel. We have also discussed percentages at the beginning. I hope these methods will help you convert percentages into numbers very easily. You can also download the practice book to exercise. Last of all, if you have any queries or suggestions, feel free to ask in the comment section.
- How to Calculate Percentage of Total in Excel
- How to Convert Number to Percentage in Excel
- How to Divide a Value to Get a Percentage in Excel
- How to Calculate Reverse Percentage in Excel
- How to Convert Percentage to Whole Number in Excel
- How to Show One Number as a Percentage of Another in Excel
- How to Add a Percentage to a Number in Excel
- Make an Excel Spreadsheet Automatically Calculate Percentage
- Convert Number to Percentage Without Multiplying by 100 in Excel
|
<urn:uuid:ba4d9f1b-791e-4e18-94db-24599218033e>
|
CC-MAIN-2023-50
|
https://www.exceldemy.com/convert-percentage-to-number-in-excel/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.847593 | 1,411 | 3.875 | 4 |
pagoda [key], name given in the East to a variety of buildings of tower form that are usually part of a temple or monastery group and serve as shrines. Those of India (see stupa) are chiefly pyramidal structures of masonry, tapering to an apex and elaborately adorned with carving and sculpture. In China the pagoda, derived from India, is one of the most characteristic architectural types and in general is devoted to sacred usage. Octagonal, hexagonal, or square in plan, they are built in superimposed stories, sometimes as many as 15; from each story projects an upward-curving tiled roof. The material most commonly used is brick, often faced with slabs of glazed and colored tile. A few date back to the T'ang dynasty (a.d. 618–906). In Japan the pagodas were introduced from China with Buddhism. They are usually square in plan and five stories high, each story having its projecting roof. Generally made of wood, they exhibit superb carpentry craftsmanship. The Horyu-ji tower near Nara, of the 7th cent., is a noted example.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2023, Columbia University Press. All rights reserved.
See more Encyclopedia articles on: Architecture
|
<urn:uuid:31aea984-e806-485c-aef9-baa49860157d>
|
CC-MAIN-2023-50
|
https://www.factmonster.com/encyclopedia/arts/visual/architecture/pagoda
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.968071 | 271 | 3.78125 | 4 |
MCV4 Vaccine Booster for Rising Juniors
** Effective July 1, 2021, children 16 years of age and older, who are entering the 11th grade (including new entrants), must have received one booster dose of the meningococcal conjugate vaccine (MCV4), unless their initial dose was administered on or after their 16th birthday.
- Meningococcal disease is a serious bacterial illness that affects the brain and the spinal cord. Meningitis can cause shock, coma, and death within hours of the first symptoms. If your teen has not been vaccinated against meningococcal disease, we strongly recommend getting your 11th grader, aged 16 years or older, vaccinated before starting the 2022-2023 school year. Getting MCV4 (meningococcal conjugate vaccine) now will not only help protect your child against the ongoing threat of meningitis, but it will also meet the new school entry requirement.
- Ask your pediatrician or local health department about other shots your child may need, including:
- human papillomavirus (HPV) series,
- tetanus, diphtheria, pertussis shot (Tdap or Td booster),
- CoVid or annual flu vaccine;
- and catch-up immunizations, including chickenpox, MMR (measles, mumps, rubella), and hepatitis B.
If your child does not have health insurance or their health plan won’t cover these vaccines, call your local health department and ask about getting no-cost or low-cost vaccines. For more information, visit http://dph.georgia.gov/vaccines-children or call Forsyth County DPH @ 770-781-6900.
Please submit your completed vaccine record to:
Athena Fields, BSN-RN ([email protected]) or call 470-695-7823 x572115 if you have any questions.
|
<urn:uuid:d46d73a2-1e07-4fc7-9bb9-c359d5da7222>
|
CC-MAIN-2023-50
|
https://www.forsyth.k12.ga.us/Page/54039
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.907363 | 417 | 2.984375 | 3 |
Last modified: 2023-07-03 by
Keywords: estonia | subdivisions |
Links: FOTW homepage | search | disclaimer and copyright | | mirrors
by Antonio Broto, 31 July 2001
My knowledge of Estonian is close to nil, but I did do some checking with a dictionary and with a colleague teaching political science at the University of Tartu. 'Linn' in Estonian means 'castle' and also 'city', 'town' (as in Tallinn -City of the Danes), 'linnad' is plural. 'Vallad' is plural of 'vald', which as far as I could gather from the dictionary, originally means parish. From what I was told about Estonian administrative structure, the 'vallad' are rural municipalities while the 'linnad' are urban municipalities. 'Maakond' means county or province, 'maakonnad' is plural. IIRC I have seen the term 'district' is used for 'maakon' in vexillological literature, though 'county' was the translation offered from Tartu today. The 1993 local government act changed the relationship between the various layers and subdivisions. The counties, maakonad, are no longer a part of the local government structure, instead they have been transformed into regional departments of the central government.
Jan Oscar Engene, 13 June 1997
According to estonian site some linguistic comments. There are 4 sections for estonian state symbols. 1st one (Eesti vabariigi) is for state symbols . 2nd (Eesti maakonnad) for 1st level administrative divisions (maakond) . 3rd (Eesti vallad ja alevid) for 2nd level rural municipalities (valla & alev) . 4th (Eesti linnad) for cities (linn)
Gvido Petersons, 10 January 1999
Estonia (like in Latvia too) have 2 level administrative divisions. Administrative means with selfgovernment. 1st one is district (maakond). There are 15 districts. 2nd order administrative units are cities (linn) and rural parishes (valla). There are also boroughs (alev), former soviet time townships (alevik). Boroughs have some limited selfgoverning rules inside of parishes (valla).
Gvido Petersons, 12 January 1999
A word about the flags of the counties (maakoad). These are all based on the same model: Horizontal bicolour of white over green with the county arms in the centre of the white stripe. The book _EEsti vapid ja lipud: 16 sajand-1940_ by Tiiu Oja and Eero Medijainen (Tallinn, 1993) says the county flags were confirmed in 1939. Many Estonian civic flags existed before the Soviet occupation, including most of the county flags.
Jan Oscar Engene, 13 June 1997
I have dug into the Flag Bulletin archives and found an article by Arnold Rabbow that was published in FB Vol. III, No. 2 , Winter 1963-64, entitled "The Last 365 Days of Freedom: District Flags of Estonia" which is about the 'maakonnad' flags of white over green with the arms centered on the white stripe. Although much of the information is the same as that posted on the Estonian web site at <www.rk.ee>, there are some significant differences, particularly in the number of maakonnad there are. According to Rabbow, there were 11 maakonnad; the ee website says 15. Rabbow lists one not on that site and that site lists 5 not in the Rabbow article. Rabbow gives the arms of the two maakonnad which are listed on the site without illustrations ("POLE VEEL OLEMAS ... ...ON TULEMAS" whatever that means), Harjumaa and Valgamaa. Here is a chart listing the maakonnad from each source and the differences in or the additional arms listed in the FB.
Differences in Arms/flag in FB
|1. Harjumaa White Latin Cross on red|
|2. Hiiumaa||NOT LISTED|
|3. Ida-Virumaa||NOT LISTED|
|4. Jõgevamaa||NOT LISTED|
|5. Järvamaa||2. Järvamaa Waves do not touch edge of shield|
|6. Läänemaa||3. Läänemaa|
|7. Lääne-Virumaa||4. Virumaa|
|8. Põlvamaa||NOT LISTED|
|9. Pärnumaa||5. Pärnumaa|
|NOT LISTED||6. Petserimaa Yellow harp on blue|
|10. Raplamaa||NOT LISTED|
|11. Saaremaa||7. Saaremaa Waves do not touch edge of shield|
|12. Tartumaa||8. Tartumaa|
|13. Valgamaa||9. Valgamaa Div. diag. from canton, 4 W 5-pointed stars/B over W|
|14. Viljandimaa||10. Viljandimaa|
|15. Võrumaa||11. Võrumaa|
According to Rabbow, the arms were granted to the 11 maakonnad on 5 February 1937 by decisions No. 50-60 of the Head of State (President Konstantin Päts) and published in the "Estonian State Gazette" ("Riigi Teataja") of 31 March, 1937, No. 26, Arts. 224-234. He also says the see "EESTI, Teatmeteos, IV Osa, Kultuur, ERS-i ja EÜkS-i väljaanne" (Geislingen/St.: 1949), plate IV. Eight of the 11 district arms weredepicted on two Estonian welfare stamp issues of 1939 and 1940. The flags were granted to the 11 maakonnad on 7 August 1939 by President Päts; the decree was published in the "State Gazette" of 15 August 1939, No. 68, Art. 554. It was signed by President Päts, Prime Minister Charles Eenpalu, and the Minister of Justice A. Assor (acting for the Minister of the Interior). The Soviet union annexed Estonia on 6 August 1940; the 11 maakonnad were abolished formally in October 1950 when 39 rayony (administrative units) were established. I'm not sure what happened after 1989. Rabbow says the flags were all specified by the 1939 decree to be 110 x 220 cm (1:2) with the arms to be 42 cm in height.
Dave Martucci, 20 June 1997
At the end of the Second World War there were 11 counties (maakonnad, singular - maakond). 1945 Petserimaa is divided between Pskov Region in Russia SFSR and Võrumaa and Tartumaa in Estonian SSR (10 counties). 1946 new county of Hiiumaa is added (11 counties). 1949 new counties of Jõgevamaa and Jõhvimaa are added (13 counties).
On 26 September, 1950 all counties are divided between 39 districts (rajoonid, singular - rajoon). This were Abja, Antsla, Elva, Haapsalu, Harju, Hiiumaa, Jõgeva, Jõhvi, Kallaste, Keila, Kilingi-Nõmme, Kingissepa (1950-1952 Kuressaare), Kiviõli, Kose, Lihula, Loksa, Mustvee, Märjamaa, Orissaare, Otepää, Paide, Põltsamaa, Põlva, Pärnu, Pärnu-Jaagupi, Rakvere, Rapla, Räpina, Suure-Jaani, Tapa, Tartu, Tõrva, Türi, Valga, Vastseliina, Viljandi, Väike-Maarja, Vändra, Võru.
From 1952 to 1953 there were also 3 regions (oblastid, singular - oblast) - Pärnu, Tallinn, Tartu. All 39 districts were then subdivisions of regions.
1957 Loksa and Pärnu were abolished (37 districts).
1959 Antsla, Jõhvi, Kallaste, Kilingi-Nõmme, Kiviõli, Kose, Mustvee, Orissaare, Otepää, Pärnu-Jaagupi, Suure-Jaani, Tõrva, Türi, Vastseliina were abolished (23 districts).
1961 Lihula, Räpina abolished (21 districts).
1962 Abja, Elva, Keila, Märjamaa, Põltsamaa, Tapa, Väike-Maarja, Vändra were abolished. Pärnu was added. (14 districts)
1964 Kohtla-Järve was added. (15 districts)
The districts were divided to urban settlements (towns (linnad, singular - linn) and boroughs (alevid, singular - alev)) and to rural municipalities (külanõukogud, singular - külanõukogu). The number of these changed also over the period. 1986 there were 33 towns, 24 boroughs, 189 rural municipalities.
In addition to the districts there were 6 towns under direct government administration. Kohtla-Järve, Narva, Pärnu, Sillamäe, Tallinn, Tartu. These were not part of the districts even the four of these were sites for the district administration. Tallinn was divided to 4 subdivisions (linnarajoonid, singular - linnarajoon). Mererajoon, Kalinini, Lenini, Oktoobri.
On 1 January, 1990 all districts were renamed to counties. You have to note that the borders of current counties and municipalities don't match with the borders during the first Estonian Republic even if the names are same.
Source: Estonian Encyclopedia.
Erki Kurrikoff, 8 April 2001
|
<urn:uuid:acb6d3a1-3939-472d-be3d-a2b1850d9477>
|
CC-MAIN-2023-50
|
https://www.fotw.us/Flags/ee-sub.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.872633 | 2,299 | 2.828125 | 3 |
In 1972, when NASA took its famous image of Earth—the Blue Marble—from the Apollo 17, South was up. Yet, if you research the image right now, that will not be the case, for a conscious effort has been made to “fix” it; the Southern tip of Africa now conventionally points downwards. NASA went out of its way to flip our world upside down in order to fit expectations, but would Earth have looked so unfamiliar to the casual viewer had it not?
World maps for general use have a very non-confrontational, peaceful existence in the backgrounds of our lives. They appear on classroom walls, in educational textbooks, and even on wristwatches. This results in a passive attitude when it comes to consuming information on maps, and—with the exception of cartography enthusiasts, perhaps—there is implicit, unquestionable trust. Map-making is a complex process, making it relatively easy to have faith in the idea that those who created it knew what they were doing, and it’s not that they didn’t… but the question is how they were doing it.
In their open access book This is Not an Atlas: a Global Collection of Counter-Cartographies, the editors Severin Halder and Boris Michel (Kollektiv orangotango) write: “atlases proclaim truth, neutrality and objectivity, and consequently invoke authority and gravitas. Therefore, atlases and maps rarely allow for ambivalence or contradiction.” In other words, subjective bias of the map maker can be framed as universal fact.
The relative shapes, sizes and placement of geo-political information on maps have consequences on our spatial perception of the world. Often, you may hear someone referring to a certain region (along with its inhabitants) as being far away, based on their recollection of a general-use map. This may seem insignificant, but its effect is clear when empathy cannot be shown for those that are “far away.”
“The structuring of our world in this way has projected this image of a world of difference, of otherness, backing this illusion with geo-political constructions. The question is, then, is it possible to reimagine the world?”
In his 2008 paper Other/Otherness, Jean-François Staszak writes: “We, here, are the Self; they, there, are the Other […] If this otherness comprises a geographical dimension, it is because cultural surfaces are divided into supposedly homogenous spatial blocs (countries, zones, continents, etc.)” The structuring of our world in this way has projected this image of a world of difference, of otherness, backing this illusion with geo-political constructions. The question is, then, is it possible to reimagine the world?
By examining the Arabic world map found in the 12th century manuscript—or written book—of Al Sharif Al Idrisi (نزهة المشتاق في اختراق الآفاق; The Excursion of One Who is Eager to Traverse the Regions of the World), the world as we know it is suddenly a very foreign place: South is up, the Americas are hidden, no political borders exist, and the African continent twists its land mass, taking up most of the Southern half of the map.
Stumbling upon this map for the first time, I was instantly intrigued, and also quite lost, for it barely resembled what I was used to seeing. Instinctively, I immediately started searching for spaces I recognized, trying to place myself into Al Idrisi’s world. It was only appropriate that the first location I identified was my own home, Egypt (مصر), and then it struck me: the Nile was going upwards… the Mediterranean lay below the Egyptian coastline… the map was orientated towards the South!
It was a concept I had never considered prior to that moment. Later on, the Nile would become my beacon for recognizing the orientation of medieval world maps. Being a native Arabic speaker, I was able to access the information written on this map, and I suspect that the experience of encountering such an illustration for a non-Arabic speaker would vary. I read my way through, identifying other locations, trying to imagine how my perception would’ve been different had this been the only representation of the world I knew. With such an emphasis on the Southern East (portraying regions including Central and Southern Asia), centers of culture, influence and knowledge production—largely neglected in the mainstream present—emerge.
“How would the shapes of geographic features look when (re)collected through in-person observations or oral/visual transmissions?”
This illustration above identifies a mixture of many still-existing Arabic place-names, alongside a few mysterious ones, constructed from a plethora of first- and second-hand accounts from travelers and scholars, handed down through generations. Would such a map be considered invalid?
Above are slightly different, and older, takes on the world map, with the copies of Ibn Al Wardi’s illustrations showing the world in geometric formations. The Mediterranean is a thick horizontal line on the bottom right, while the Arabian Peninsula appears to be in the Indian Ocean’s grasp on the left. This makes me wonder, how would the shapes of geographic features look when (re)collected through in-person observations or oral/visual transmissions? In The Journey of Maps and Images on the Silk Road (2008), Dr. Andreas Kaplony theorizes that the specific simple shapes made it easier for copying and remembering, and faster in producing.
Advanced references in their time, the manuscripts mentioned so far were copied and distributed widely for centuries after their completion. This was a world with no satellites. Geographic compendiums or atlases such as these relied on the collective; building on the knowledge of the predecessors and gathering information through personal encounters.
“Each map [is] representing a view of the world centered on the peoples it was meant for, crafted through the ways of knowing by which it was encompassed.”
These maps embrace their subjectivity, and this was evident through the conscious centering on the 20 “regions” of the Islamic-majority lands (as is the case in Ibn Al Wardi’s). The same can be said about the naming of places: such is the case for “the land beyond the river (ما وراء النهر)”, which refers to the Amu Darya river, and roughly represents the lands of Central Asia. This subjectivity, however, was not exclusive to the Perso-Arabic-Islamic cultures of that time. Representations of the world have differed greatly among the ages and with the cultures that produced them. Each map representing a view of the world centered on the peoples it was meant for, crafted through the ways of knowing by which it was encompassed.
The Pre-Satellite Pluriverse
In this example of complex Medieval European cartography, the world map (Mappa Mundi) is circular, with East at the top. The reason for its orientation was informed by the centering of Christianity and positioning of Jerusalem at the centre of the world. It does not shy away from adding Biblical events to their locations, while coloring the Red Sea in, well, red.
Also circular in shape, the Korean world map shown in the middle is from a Ch’ŏnha chido (Atlas of the world) that was copied in the 19th century. This genre of map-making centers the world around China, surrounded by places and kingdoms floating in a sea encompassed by a strip of land.
Another example (right) shows a representation of the world through Jainism, an Indian religion founded in the 6th century B.C. Its philosophical view of the world is constructed into this 19th century map showing the domain of humans as two continents, one circular and one ring-shaped, surrounded by two ocean rings, followed by the realm outside of mortal activity.
The unapologetically subjective maps we’ve just seen might appear to contrast with the world maps we encounter in our present era, but is this current representation as hegemonic as it seems?
Forget Google Earth
Map projections present a whole set of challenges, for how can one illustrate a naturally spherical body onto a flat surface without distorting it immensely? While the existence of these projections is to serve specific purposes (i.e. navigation at sea), it is still worthwhile to observe them with the eye of a casual viewer; after all, they are still valid representations of the Earth. In the case of the notorious and widely dispersed Mercator, used on sites such as Google Earth, such distortions cause Greenland to be the size of Africa, although, in reality, Africa is 14 times larger. While it is useful for navigational purposes, it massively exaggerates the size of the lands near the poles, causing Europe and North America to look larger than they actually are, and possibly affecting the spatial perception of the untrained eye.
In the case of the Gall-Peters map (right), with it being an equal-area projection, the landmasses are of correct relative sizes, allowing Africa to flaunt its magnitude. This does come at a price, however, as the shape of the continents is distorted. Nowadays, general-use maps are typically those with compromised projections: their aim is to balance between size and shape distortions.
Now, what if these conventional maps were flipped on their head? Some attempts have been made to design world maps with South on top. This simple shift of perspective allows us to reimagine the world with fresh eyes. I invite you to try and locate yourself on the map shown below.
Who’s (not) there?
What about looking beyond landmasses to political borders and names? Who gets to be on the map and who doesn’t? In an article titled Maps, Technology and Decolonial Spatial Practices in Palestine, Palestinian-Iraqi writer Zena Agha outlines how the processes of cultural cleansing and systemic erasure were made tangible through the tools of cartography. In the 1950s, the Governmental Names Commission was established by the Israeli-occupation for the purpose of the Hebraicization of the names of Arab villages, perpetuating a notion that Arabic and Arabness was “foreign” and “alien” to the land: “The ultimate goal was to render Hebrew the only language through which to understand the landscape, thereby erasing the experiences and histories of the original inhabitants.” The article quotes the commission’s 1958 report which states that: “As long as the names did not appear in maps, they cannot take possession in life.”
“What about looking beyond landmasses to political borders and names? Who gets to be on the map and who doesn’t?”
Throughout my childhood, the Arabic maps I came across always had Palestine clearly labelled. (Whether this was an act of solidarity, or a plot by powerful bodies for gaining Arab public favor is beyond the scope of this article.) This was the knowledge that was ingrained in me; this was my reality. However, upon coming into contact with Google Earth and English-language maps, suddenly a different world was being presented to me; a world where Palestinians didn’t own their lands. Questions ran through my mind: don’t world maps show the truth? Are they not supposed to be objective? Who gets to make these decisions? The illusion of the objective map was forever shattered in my mind, and the thought of cartographic injustice remained with me ever since.
It was earlier this year when I came across the Equal Earth map website which boasts the tagline: “A world map for everyone.” I noticed how two options for the Arabic version of the map were presented—one which labels Palestine, the other, “Israel.” It felt almost as if I was being asked: which flavor of reality would you like to participate in today? And yet, the same option does not exist for the English version, which settled for including Gaza and the West Bank.
“Counter-cartographies present us with tools to challenge dominant narratives [...] As with many struggles for land, the map has become a tool for reclamation and resistance.”
The encounters mentioned so far put us face to face with the bleak reality of how maps can be devised to solidify the worldviews of those in power, but they also present us with the possibilities of engaging with the reverse process. To quote Ahmad Barclay in his article Mapping and “Truth”: Communicating the Erasure of Palestine, he reminds us that: “[…] maps, and the power that they represent — can be subverted within any given moment, and that a century of Zionist colonization is just a blink of an eye in the entirety of human history, let alone in the life of the planet itself.” Counter-cartographies present us with tools to challenge dominant narratives, and it is no coincidence that Palestinians (and their allies) utilize the image of the map of Palestine, with the indigenous place-names of their villages, in telling their stories and documenting their realities. As with many struggles for land, the map has become a tool for reclamation and resistance.
When I see a world map, I see an image of everyone on Earth. I also see the stories of those who have passed, and those who are to come. It is a portrait of a home experienced in different ways, existing within multiple realities. And although world maps offer a representation of the most objective object of all, they are a fertile ground for silent biases and covertly subjective representations. They shape our worldviews (quite literally), and it is time to acknowledge these subjectivities, embrace our coexisting realities, and reimagine our hegemonic textbook map.
Sherine Salla (she/her) is an Egyptian designer and researcher based in Cairo. Her work explores themes of (Arab) cultural identity through the perspective of design and material cultures, and the lens of decolonization. She is currently part of Archief Cairo; a multilingual lab for research, preservation and communication.
This text was produced as part of the Against the Grain workshop.
Title image: Left side: Manusyaloka Map according to Jain cosomological traditions, 19th-century. Right side: The Blue Marble, photographed by the Apollo 17 crew in 1972.
|
<urn:uuid:3cabe468-abf4-400a-aa67-6919d625bb5a>
|
CC-MAIN-2023-50
|
https://www.futuress.org/stories/south-is-up/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.956426 | 3,029 | 2.921875 | 3 |
The speed of light, we know, is the universe’s speed limit. Nothing can move faster than that through space.
Are we missing the point? Maybe it’s not so much that that’s the top speed through space; maybe that’s the only speed through spacetime, and everything is moving at it — you, me, light, trains, turtles, mountains, everything, always. “Slower” things are moving at the speed of light more in the time direction of spacetime than in the space direction. “Faster” things are moving at the speed of light more in the space direction of spacetime than in the time direction. What we call “acceleration” is (I speculate) nothing other than changing the direction of your constant motion, more timeward or more spaceward. Non-spaceward motion (i.e., standing still) is what we experience as the ordinary passage of time.
If this is anything like right, then it supplies an intuitive foundation for thinking about all kinds of weird mysteries: why the speed of light is a constant in all reference frames (the paradox that got Einstein thinking about relativity in the first place); what’s special about acceleration; and time dilation and the physical basis of the Lorentz transformation.
|
<urn:uuid:be9a2d1e-fcf4-4908-af76-4774680ba5f0>
|
CC-MAIN-2023-50
|
https://www.geebobg.com/2014/02/20/the-nature-of-reality-part-3b-the-speed-of-light/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.921279 | 277 | 3.171875 | 3 |
This year choosing books to include in our Recommended Reads for Kids – Black History Month Roundup has been more difficult than ever because there are dozens of excellent ones being published and more on the way. Here is just a small sample of great reads, from picture book to graphic novel to young adult fantasy that are available for kids and teens to enjoy.
A NEW YORK TIMES BESTSELLER
★Starred Review – Kirkus
The ABCs of Black History is the kind of inspiring book children and adults will want to return to again and again because there is so much to absorb. In other words, it’s not your mother’s ABC book. Written in uplifting rhyme by Pushcart Prize-nominated poet Rio Cortez, this gorgeous 60-page picture book is at once a look back in time and a look to the future for young Black children. However it is recommended reading for children of all races and their families.
Cortez has shined a lyrical light on places, events and figures familiar and less familiar from Black history with comprehensive back matter going more in depth. Take H for example: “H is for Harlem—those big city streets! / We walked and we danced to our own jazzy beat. / When Louis and Bessie and Duke owned the stage, / and Langston and Zora Neale Hurston, the page.” J is for Juneteenth and S, which gets double coverage, is for scientists and for soul. Adding to the hopeful tone of Cortez’s rhyme are Semmer’s bold and vibrant graphics which jump off the page. The dazzling colors pull you in and the variety of composition keep you hooked.
The ABCs of Black History is a book you’ll want to read together with your young ones and let your older children discover and savor on their own. It’s not only a visual and aural treat, it’s a sweeping celebration and exploration of Black culture and history that is beautiful, compelling, thought provoking and thoroughly unputdownable!
• Reviewed by Ronna Mandel
★Starred Reviews – Booklist, Kirkus, and Publishers Weekly
Adapted from the final chapter of Dovey Johnson Roundtree’s autobiography Mighty Justice, We Wait for the Sun is an intimate look at a tender moment in Dovey’s childhood. The book opens with a preface about the main character, Dovey, who grew up to be a legendary figure in the fight for racial equality-all through the influence of her beloved grandmother, Rachel Bryant Graham. Dovey loved to share stories of Grandmother Rachel; this book is the story she loved best.
In “the midsummer night” when it’s “dark and cool,” Dovey and her grandmother walk “through the darkness toward the woods” to pick blackberries. Lyrical language and textural illustrations awaken the senses and draw us into their adventure.
Other women join in and the trip goes deeper still into the forest. Staring at Grandma’s shoes, Dovey is literally following her grandmother’s steps into the darkness. But Grandma Rachel provides comfort and reassurance. “If you wait just a little, your eyes will learn to see, and you can find your way.”
Through such examples of wisdom and encouragement, it’s clear to see why Grandma Rachel was such an inspiration to Dovey and her later work as a civil rights lawyer. As they sit in the forest and listen to its “thousand sounds,” a double page spread shows an aerial view of their meditative moment, immersed in the magic of their surroundings.
And when they reach the berries, they’re every bit worth the wait-plump, juicy, and sweet-like the lush layers of purple, blue, and pink illustrations that display a beautiful berry-colored world as dawn, bit by bit, turns to day. Wrapped in each other’s arms, Grandma and Dovey watch the sun rise in its golden splendor. Grandma’s steadfast waiting for the light, despite the present darkness, is a moving message of hope, resilience, and bravery.
Back matter includes an in-depth note from co-author Katie McCabe chronicling Dovey’s fight against barriers in the law, military, and ministry. For anyone interested in the powerful ways family and history intersect, We Wait for the Sun is a must-have in every library. • Reviewed by Armineh Manookian
While white Americans eagerly embarked on carefree car travel around the country, in 1930s Jim Crow America the road was not a safe or welcoming place for Black people. In Opening the Road: Victor Hugo Green and His Green Book, Keila V. Dawson explores the entrepreneur Victor Green and his successful The Negro Motorist Green Book which was borne out of dire need.
Young readers will learn about the limitations that were in place restricting the freedoms of Black Americans to have access to the same conveniences whites did due to segregation laws. For instance, a road trip for a Black family meant bringing food, pillows, and even a portable toilet since most establishments along a route were for whites only. The same applied to hotels, service stations, auto-mechanics and even hospitals. And in “Sundown” towns, where Blacks could work but not live, those individuals had to be gone by sunset or risk jail or worse.
In this fascinating 40-page nonfiction picture book, Dawson explains in easy-to-understand prose exactly what obstacles faced Black travelers and why Green, a mail carrier, together with his wife Alma, decided to publish a directory. Inspired by a Kosher guide for Jews who also faced discrimination, Green began collecting information from people on his postal route about where safe places were in New York.
Eventually, with word-of-mouth expanding interest in Green’s book, he began corresponding with mail carriers nationwide to gather more recommendations for The Negro Motorist Green Book on more cities. Soon everyone from day-trippers to celebrities were using the Green Book. Green even made a deal with Standard Oil for the book to be sold in Esso gas stations where it “flew off the shelves.” Harris’s illustrations take readers back in time with colorful, realistic looking scenes of big old cars, uniformed service station attendants and locations in Black communities that opened their doors to Black travelers. Apart from a break during WWII, the book was sold until the need for it finally ended with the last edition in 1966-67.
Equality both on and off the road was the ultimate goal for Black Americans. That may have improved somewhat from when the first Green Book was published in 1936, but Victor did not live to see the Civil Rights Act of 1964 enacted, having passed away in 1960. However there is still a long road ahead because, unlike Victor’s Green Book, racism has not disappeared and being Black while driving can still be dangerous, even deadly.
Dawson dives into this in her five pages of back matter that include a clever roadway timeline graphic from the beginning of Green’s life in 1892 until the Green Book ceased publication. This is a helpful, thoughtfully written book to share with children to discuss racism, and a good way to begin a discussion about self-advocacy, ingenuity, and how to treat one another with respect. It’s also a welcome example of how Green channeled his frustration and dissatisfaction into a guide that ultimately changed people’s lives for the better. Click here for an essential Educator’s Guide. • Reviewed by Ronna Mandel
Junior Library Guild Selection
★Starred Review – Booklist
Kadir Nelson, in his interesting introduction to James Otis Smith’s graphic novel Black Heroes of the Wild West points out that cowboys, ranchers, homesteaders and other people from the Old West (west of the Mississippi River “during and after the American Civil War”) were historically portrayed in books, movies and TV through a white lens. In reality up to “a third of the settler population was African American.” I couldn’t wait to find out more about Mary Fields, known as “Stagecoach Mary” in her day, Bass Reeves, the first black Deputy U.S. Marshal west of the Mississippi, and “mustanger” Bob Lemmons, perhaps the original Texas horse whisperer.
All three individuals were forces to be reckoned with. First there’s Mary Fields, born into slavery in Tennessee. In her lifetime, she maintained fierce loyalty to friends, loved children, was generous to a fault, and had strength and energy second to none. She’s most noted, however, for her reputation as a banjo strumming, card playing, first African American female stagecoach driver who never missed a delivery and was not easily thwarted by wolves or bad weather.
I was blown away learning about Bass Reeves’s bravery in outwitting some murderous outlaws on the Most Wanted List. In the account Smith shares, Reeves single-handedly put himself into a dangerous situation by turning up as an impoverished loner looking for any kind of work to earn his keep. By cleverly offering up his services to the mother of the villains, earning her trust, and ultimately that of the bad guys too, he was able to capture them completely off guard. This plus thousands of other arrests cemented his place in history. The best part was how Smith’s illustrations conveyed Reeves in the particular scenario of capturing the outlaws by surprise which in turn surprised and satisfied me immensely.
Last but definitely not least is Bob Lemmons who was hired to corral wild mustangs and whose humane technique was not deadly to any of the horses, something other mustangers had not been able to manage. Smith takes readers on a journey of the senses along with Lemmons as he follows a group of mustangs he intends to wrangle, and details in both art and text how eventually Lemmons becomes one with the stallion leading the “manada” (mares and colts). “Bob knew their habits, their body language, their sounds. Like them, he flared his nostrils sniffing for danger.” You don’t have to be a horse lover to be impressed how Bob’s slow and steady approach made the mustangs think he was one of them.
Eight comprehensive pages of fascinating back matter round off this excellent middle grade read that will no doubt have tweens eager to find out more about these and other Black heroes. • Reviewed by Ronna Mandel
★Starred Review – Booklist
A NEW YORK TIMES BESTSELLER
The Gilded Ones is book one of a West African-inspired epic fantasy series that will grab you from its first page. When girls turn sixteen, they must undergo The Ritual of Purity where they are bled to see if they can become a member of their village. However, if a girl’s blood runs gold, then she’s found impure and faces a fate worse than death. If Deka’s father had the money, he would have sent her to the House of Purity the year before the ritual, keeping her protected from sharp objects. Instead, Deka must be careful while she worries and prepares.
When Deka fails, she’s tortured until a mysterious woman she names White Hands offers an option out. The empire’s being attacked by seemingly invincible Deathshriek creatures. Deka becomes an alkali soldier fighting alongside other girls like her with powers that make them nearly immortal.
Namina Forna says, “The Gilded Ones is a book about my anger at being a woman. Sierra Leone was is very patriarchal. There were things I was expected to do as a girl because I was a girl.” This emotion is harnessed into the story, revealing societal inequities in an intricately woven plot that will surprise and enflame you.
Deka has the best “sidekick” ever—a shapeshifter called Ixa. Though there are elements of romance, it’s strong females who rule the plot. This book provides a fresh look at the “gods and goddesses” trope. The Gilded Ones is fierce, brutal, and relevant. Read it. • Reviewed by Christine Van Zandt (www.ChristineVanZandt.com), Write for Success (www.Write-for-Success.com), @ChristineVZ and @WFSediting, [email protected]
Click here to read another Black History Month review.
Ruby Bridges This Is Your Time by Ruby Bridges (Delacorte Press)
The Teachers March! by Sandra Neil Wallace and Rich Wallace w/art by Charly Palmer (Calkins Creek)
Stompin’ at the Savoy by Moira Rose Donohue w/art by Laura Freeman (Sleeping Bear Press)
Overground Railroad by Lesa Cline-Ransome w/art by James Ransome (Holiday House)
R-E-S-P-E-C-T: Aretha Franklin, the Queen of Soul by Carole Boston Weatherford w/art by Frank Morrison (Atheneum BYR)
Finding a Way Home by Larry Dane Brimner (Calkins Creek)
Changing the Equation: 50+ Black Women in STEM by Tonya Bolden (Abrams BYR)
|
<urn:uuid:5f486dd6-ed18-49c0-a857-f624b44d133b>
|
CC-MAIN-2023-50
|
https://www.goodreadswithronna.com/tag/kadir-nelson/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.958577 | 2,834 | 2.84375 | 3 |
The Anatomy of an Index
Did you know that an estimated $13.5 trillion in assets are indexed or benchmarked to the Standard & Poor's 500 Composite Index, including $5.4 trillion in index assets?1,2
The S&P 500 is ubiquitous – we see it on the news, read about it in the newspapers, and very likely, see some of our own investments' performance compared against it. For an index that represents approximately 80% of the value of the U.S. equity market, it may be worthwhile to gain a better understanding of how it works.1
Cap & Criteria
The index, as we know it today, was introduced in 1957 and is maintained by the Standard & Poor's Index Committee. Contrary to popular belief, it is not comprised of the 500 largest companies in America, but is a collection of large-cap stocks representing a broad range of market sectors, including technology, energy, health care, and consumer staples, among others.3
There are a number of criteria a company must meet to be considered for inclusion in the index. Some of these criteria include the following: it must be a U.S. company, have an unadjusted market capitalization of $14.6 billion or more, have 50% of its stock available to the public, and have four consecutive quarters of positive earnings.3
Changes Over Time
Another common misconception is that the index is a static one. In fact, companies will be removed, from time to time, for reasons that include violation of one or more of the criteria used for adding companies or because of a merger, acquisition, or significant restructuring, including bankruptcy.
The turnover in the index's constituent companies was 3.6% in 2020 (per the most recent data available). According to one projection, the average tenure of companies in the index is expected to fall to 15-20 years this decade, as compared to the 30-35 year average tenure in the late 1970s.4
Add and Subtract
When changes are made to the index, many mutual funds and exchange-traded funds that seek to replicate the index may have to sell stocks that are being removed and buy the stocks that are being added in order to track the index. Keep in mind that amounts in mutual funds and ETFs are subject to fluctuation in value and market risk. Shares, when redeemed, may be worth more or less than their original cost.5
Mutual funds and exchange-traded funds are sold only by prospectus. Please consider the charges, risks, expenses, and investment objectives carefully before investing. A prospectus containing this and other information about the investment company can be obtained from your financial professional. Read it carefully before you invest or send money.
Investors cannot invest in an index. Also, index performance is not indicative of the past performance of a particular investment, and past performance does not guarantee future results. Investment choices designed to replicate any index may not perfectly track it, and their returns will be reduced by fees and expenses.
1. US.Spindices.com, May 31, 2022
2. The S&P 500 Composite index (total return) is an unmanaged index that is generally considered representative of the U.S. stock market. Index performance is not indicative of the past performance of a particular investment. Past performance does not guarantee future results.
3. Investopedia.com, 2022
4. Innosight, 2021
5. Keep in mind that the return and principal value of stock prices will fluctuate as market conditions change. And shares, when sold, may be worth more or less than their original cost.
The content is developed from sources believed to be providing accurate information. The information in this material is not intended as tax or legal advice. It may not be used for the purpose of avoiding any federal tax penalties. Please consult legal or tax professionals for specific information regarding your individual situation. This material was developed and produced by FMG Suite to provide information on a topic that may be of interest. FMG Suite is not affiliated with the named broker-dealer, state- or SEC-registered investment advisory firm. The opinions expressed and material provided are for general information, and should not be considered a solicitation for the purchase or sale of any security. Copyright FMG Suite.
|
<urn:uuid:ab6853fe-a326-4884-87af-557d14ae3ad4>
|
CC-MAIN-2023-50
|
https://www.gwrandall.com/resource-center/investment/the-anatomy-of-an-index
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.954132 | 882 | 2.71875 | 3 |
My female sexual partner has a bladder infection. Do I need a urine test to see if I gave it to her?
A. A woman's sexual partner doesn't need to be evaluated when she has a typical bladder infection, the most common type of urinary tract infection (UTI). The bacteria that cause UTIs aren't passed between partners. Women develop UTIs because they have short urethras (the tube that carries urine out of the bladder). Bacteria live on the skin, including the area around the end of the urethra. In women, these bacteria only need to travel a short distance from the urethral opening to get inside the bladder and cause an infection. While you did not transmit the bacteria, you may have played a role. Some women develop UTIs after intercourse. This is particularly true with vigorous or frequent sex. In these situations, it may help to change sexual positions and encourage her to urinate right after intercourse.
Image: © Tharakorn/Getty Images
As a service to our readers, Harvard Health Publishing provides access to our library of archived content. Please note the date of last review or update on all articles.
No content on this site, regardless of date, should ever be used as a substitute for direct medical advice from your doctor or other qualified clinician.
|
<urn:uuid:971db45a-92d1-4175-9dad-3055c11bc7ac>
|
CC-MAIN-2023-50
|
https://www.health.harvard.edu/diseases-and-conditions/did-i-cause-my-partners-bladder-infection
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.930875 | 267 | 2.78125 | 3 |
Think of inflammation as the body's natural response to protect itself against harm. There are two types: acute and chronic. You're probably more familiar with the acute type, which occurs when you bang your knee or cut your finger. Your immune system dispatches an army of white blood cells to surround and protect the area, creating visible redness and swelling. The process works similarly if you have an infection like the flu or pneumonia. So in these settings, inflammation is essential—without it, injuries could fester and simple infections could be deadly.
But chronic inflammation can also occur in response to other unwanted substances in the body, such as toxins from cigarette smoke or an excess of fat cells (especially fat in the belly area). Inside arteries, inflammation helps kick off atherosclerosis—the buildup of fatty, cholesterol-rich plaque. Your body perceives this plaque as abnormal and foreign, so it attempts to wall off the plaque from the flowing blood. But if that wall breaks down, the plaque may rupture. The contents then mingle with blood, forming a clot that blocks blood flow. These clots are responsible for the majority of heart attacks and most strokes.
A simple blood test called the hsCRP test can measure C-reactive protein (CRP), which is a marker for inflammation, including arterial inflammation. Nearly 25 years ago, Harvard researchers found that men with higher CRP levels—approximately 2 milligrams per liter (mg/L) or greater—had three times the risk of heart attack and twice the risk of stroke as men with little or no chronic inflammation. They also found that people with the greatest degree of arterial inflammation benefited the most from aspirin, a drug that helps prevent blood clots and also damps down inflammation.
Who needs an inflammation test
But many doctors don't routinely recommend the hsCRP test because for the most part, they believe the results would not change your treatment. If you're young and healthy and at low risk for heart disease, there is no evidence that knowing your CRP level is helpful. If you have heart disease, you should already be taking medications that lower your heart attack risk, such as a cholesterol-lowering statin. Like aspirin, statins also appear to work particularly well in people with arterial inflammation.
One study even showed that statins reduce the risk of death in people with average cholesterol levels but CRP levels of 2 mg/L or higher. So if you're middle-aged or beyond and have signs of looming heart trouble, like high blood pressure, high cholesterol, or a family history of heart disease, knowing that you have a high CRP level might nudge you toward more aggressive actions to protect your heart. These include doing regular aerobic exercise and (if needed) losing weight and quitting smoking.
Image: Wavebreakmedia Ltd./Getty Images
|
<urn:uuid:c2747232-857d-41af-9ee5-cc1a783df17e>
|
CC-MAIN-2023-50
|
https://www.health.harvard.edu/newsletter_article/ask-the-doctor-what-is-inflammation
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.93837 | 580 | 3.3125 | 3 |
- Health experts are discovering that there’s a multitude of symptoms that patients can have after their initial diagnosis of COVID-19.
- Symptoms of long COVID can include fatigue, chest pain, cough, and depression, among other impairments.
- Researchers are still learning who is at risk for long COVID.
While many of the symptoms of COVID-19 are resolved within a few weeks, some people experience symptoms that have lasted months and sometimes years later – a condition that is called long COVID.
Health experts are discovering that there’s a multitude of symptoms that patients can have after their initial diagnosis of COVID-19.
As COVID-19 has impacted so many people around the world, large data sets are being analyzed to understand the implications of the virus both in the short- and long-term settings.
For most individuals, many of the upper respiratory symptoms tend to dissipate after the initial infection in the first two weeks, but there are some that will continue to have additional symptoms for weeks and sometimes years afterward. These are new symptoms, both physical and psychological, that were not present prior to having COVID-19.
Although there are not a specific set of symptoms associated with long COVID, some of the more common physical manifestations include increased fatigue, brain fog, persistent cough, more frequent chest pain, and difficulty sleeping.
Some patients have also experienced functional disability as well creating challenges in completing their activities of daily living.
Dr. Sara Martin, Assistant Professor and Medical Director of the Adult Post-Acute COVID Clinic at Vanderbilt University Medical Center in Nashville, says “based on a recent review of symptoms coded related to post-acute sequelae of SARS COV-2 infection, or PASC, most common presenting symptoms to the Vanderbilt Adult Post-Acute COVID clinic are shortness of breath, fatigue, GERD, cognitive deficiencies, and anxiety.
Health experts are also starting to see psychological and cognitive complaints associated with COVID-19 as well. Many of these symptoms can include cognitive fog, dementia, epilepsy, and seizures.
A study published in the
According to the
In a recently published study in
According to the
However, researchers discovered that the risk of things like dementia, seizures, and brain fog were still present 2 years after an initial COVID-19 diagnosis
There currently is no clear reason why people have symptoms for the length of time they have them.
“It truly varies and we see a broad spectrum of recovery time. Some people recover within months and others have persistent symptoms a year or more post-infection with acute COVID,” Martin tells Healthline.
Anyone can experience long COVID-19 symptoms but the
“There is a well-recognized association of more severe disease is more likely to trigger long COVID symptoms,” said Dr. Nathaniel Erdmann, Assistant Professor at the University of Alabama at Birmingham Division of Infectious Diseases.
“Overall, there does seem to be a trend that long COVID burden is less for those that are getting infected with current strains either due to the virus or pre-existing immunity but, even with this improvement, we continue to see new cases of long COVID,” Erdmann tells Healthline.
He explains, “the simplest explanation for this is that long COVID is not a singular entity” and the body has multiple processes involved after being infected with a virus which can trigger persistent post-viral syndromes.
Although it is difficult to predict who is going to get long COVID and why, both Erdmann and Martin say that the best way to prevent getting long COVID is to get vaccinated
Many hospital systems have started to develop post-COVID-19 clinics to help treat people with post-immediate complications. These facilities are designed to help those who have had symptoms that are new after the initial COVID-19 infection including the physical and psychological manifestations after being sick.
Dr. Rajiv Bahl, is an emergency medicine physician, board member of the Florida College of Emergency Physicians, and health writer. You can find him at RajivBahlMD.com.
|
<urn:uuid:a80a5a65-2497-47ec-a5b4-dfe648d0e9e7>
|
CC-MAIN-2023-50
|
https://www.healthline.com/health-news/what-we-know-about-long-covid-and-how-long-symptoms-last
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.961302 | 859 | 2.734375 | 3 |
A Huge Fleet of Ghost Ships in American Waters is Creeping Towards the Ocean
On the Maryland side of the Potomac River, where the current twists and curves east, Mallows Bay is a fairly unassuming shelter. Stand on the bank and study the shallow water closely and your eye will drift across the ships ‘ partially submerged hulls, the eerie rotting wood and steel corpses of the Western hemisphere’s largest shipwreck fleet.
Some 230 vessels have been intentionally sunk in this drab spot only 30 miles down the river for Washington, D.C. They were hastily constructed steamships commissioned by the Emergency Fleet Corporation (later renamed the United States Shipping Board Merchant Fleet Corporation) to meet the demand of keeping supply lines open between the U.S. and Europe during the First World War.
On its formation in 1917 with the U.S. entry into the conflict, the Emergency Fleet Corporation seized control of existing ships. But there still weren’t enough for the incredible strain being put on the wartime supply lines, as more ships were being sunk by marauding U-boats than could be launched.
In the 1st two weeks of America’s involvement, 122 ships were sunk by German submarines. The EFC was tasked with the impossible: building 1,000 steamships over 300-feet long in 18 months.
The EFC was forced to requisition all merchant vessels over a certain tonnage currently under construction in the nation’s shipyards and rush them to completion as timber-only ships in an era of steel plate hulls.
In total half a million workers and 40 shipyards were pressed into service for the war effort, much to the irritation of the companies that owned them and the clients they were building them for — including Great Britain which had its own pressing need for more merchant vessels.
Captured enemy ships were also put to use to keep the Doughboys fed and fueled for the fight against Imperial Germany. They didn’t launch 1,000 ships in the end, only 264 by 1919 and of these just 76 had been put to use before the hostilities ended in November 1918.
In 1925 the fleet was deemed surplus to requirements. Steamships had become obsolete with the move towards diesel engines, and many of the rush jobs were of such poor construction that they couldn’t be used.
Left with so many ships and so little use, the corporation had them burned and scuttled — meaning deliberately sunk — in James River, and then towed to Mallows Bay for salvage.
In total 106 of the existing wrecks are First World War era merchantmen and if you zoom in on Google Earth you can see the skeletal outlines of vessels beneath the green rippled surface of the water.
Among the ships in the bay is the SS Aberdeen which was built in an amazing 17 days for the First World War, and the car ferry SS Accomac which only left service in 1964, but older vessels were dumped there too — including a Revolutionary War longboat and schooners from the 18th century.
The shallow water proved an asset, first during the Great Depression when locals made a living plundering the wrecks for scrap metal, then World War II when the steel needed to be salvaged for the war effort, and then in peace when the partially submerged wrecks were transformed into a habitat for fish and birds, including bald eagles.
Plants grow in sheltered nooks and crannies, and beavers undertake salvage of their own by gnawing at the rotting decks for wood. Now on the National Register of Historic Places, Mallows Bay is undertaking the process to be recognized as a National Marine Sanctuary.
According to LiveScience though, this ghost fleet is on the move. Findings presented to the American Geophysical Union in December 2018 by a group of fifth-grade students from JC Parks Elementary School in Maryland revealed how many of the ships have changed location, by comparing their charted positions over time.
Most of the ships, it turns out, has been moving eastward downriver — some by as many as 20 miles — creepily slowly and surely towards the ocean and an even deeper watery grave.
|
<urn:uuid:69fc4e95-5c8f-4677-a068-026b24759fc7>
|
CC-MAIN-2023-50
|
https://www.histecho.com/the-largest-ship-graveyard-in-the-hemisphere-is-right-near-dc/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.976723 | 856 | 3.015625 | 3 |
In 1519 the maverick conquistador rallied from near-certain annihilation to victory over the Aztec Empire—thanks to an earlier defeat at the hands of the Aztecs’ rivals, the Tlaxcaltecs.
Hernán Cortés marched boldly toward Tlaxcala in late August 1519, brimming with confidence. Since landing in Yucatán that spring, success had followed success. He had defeated a Maya army; demonstrated his cavalry and artillery to cow Aztecs along the Gulf Coast; allied with Cempoala, a Totonac city chafing under Aztec domination; and bullied another fortified Totonac city into submission.
Now he had made an irreversible decision. Rebelliously ignoring the orders of his patron, Cuban Governor Diego Velázquez, he founded Vera Cruz (north of modern-day Veracruz) and appointed a city council that authorized an inland expedition. To prevent desertions, he scuttled his ships and punished those agitating to return to Cuba. Leaving his wounded and infirm at Vera Cruz with six Lombard cannons, he marched inland.
With a force of 300 Spaniards, 50 Totonac warriors and 17 horses, Cortés headed toward the Aztec capital of Tenochtitlán (now Mexico City). As preColumbian Mexico had neither wheeled vehicles nor draft animals, 200 porters carried equipment and supplies.
Climbing onto the central plateau, they marched for two weeks, being received and fed by the towns en route, including Aztec tributaries, until they neared Tlaxcala. Cortés knew Tlaxcala opposed the Aztecs, but he was unsure of his own reception. The matter was clarified when he spotted a small party of Indians and sent horsemen to capture them.
To the Spaniards’ surprise, the Tlaxcaltecs fought back, wounding two men and three horses and killing two other horses before fleeing. Their resistance and effectiveness confounded Cortés’ prior experiences, which he had profoundly misinterpreted. He hadn’t realized most of the Maya army he defeated wasn’t a professional force, but consisted of conscripted commoners supporting a small cadre of trained elites. Cortés had also underestimated the Aztecs, who had only refused battle by royal order, and he had overestimated his Totonac allies, who were not especially warlike. His errors were exposed in this brief clash, Cortés’ first against trained indigenous soldiers. The small party of Tlaxcaltecs was a test of Spanish intentions that Cortés failed when he attacked.
His horsemen repulsed, Cortés brought up his main force, armed with swords, pikes, crossbows and harquebuses (matchlock muskets) and supported by mounted lancers and falconets (light cannons), all unknown in Mexico. In virtually every category Spanish arms were superior, pitting iron and steel against wood and stone, supported by the speed and power of cavalry.
In seeming retreat, the Tlaxcaltecs drew the Spaniards forward. When Cortés’ men were exposed, a concealed Tlaxcaltec army some 3,000 strong suddenly attacked.
Cortés was justly confident of his men, though whether they actually faced a 6-to-1 disadvantage is uncertain. These and other recorded numbers are approximations at best; they differ among the self-serving accounts of the conquistadors, who exaggerated both deeds and obstacles in hopes of receiving lands and money from the Spanish crown. Even more exaggerated, the Spaniards claimed a kill ratio of 20- or 25-to-1. If true, Cortés would have triumphed, and Spanish arms would have proven decisive. Although steel blades retained their edges, and swords and pikes were used to thrust as well as slash, Indian arms were not wholly overmatched. Their wooden broadswords and thrusting spears could only slash, but their obsidian blades were sharper than steel. Indeed, twice in the battle, Indians reportedly decapitated horses with a single stroke. And though obsidian blades were fragile, they could be replaced quickly.
Tlaxcaltec soldiers were well trained and disciplined. In the battle they soon overwhelmed the Spaniards, forcing them into a defensive posture. Cortés’ men held on until dusk, when the fight ended. For 17 Tlaxcaltecs claimed killed, four Spaniards had been seriously wounded, one mortally, and two horses were dead.
Spanish armor proved effective against Tlaxcaltec arms, keeping casualties low. But while most conquistadors had helmets, few could afford plate armor and instead wore an eclectic assortment of plate, mail and leather. Thus a disproportionate number of Spanish casualties were from wounds to unprotected areas—face, neck and chest via neck and arm openings in the armor.
Cortés regrouped. He feared using his cavalry, as he had only 13 horses left, some wounded, and dared not risk them in unsupported forays. Projectiles would prove his most effective weapon.
Projectiles weren’t a Spanish monopoly. Tlaxcaltec atlatls could throw darts more than 150 feet and were most effective when closing with the enemy. Their bows had a range between 300 and 600 feet, a distance their slings doubled. Distance and terrain features, however, obscured targets, limiting accuracy and effect of all weapons.
Spanish armor was effective at a distance, though even plate armor was not proof against atlatl darts at close range. Arrows were a problem as well. They may not have penetrated, but stone points often shattered on impact against breastplates, spraying fragments into the wearers’ eyes. And against mail, reed shafts split on impact, sending slivers through the mesh. The effectiveness of Spanish armor improved the farther at bay the Indians were kept.
Military crossbows could shoot a 1.5- to 3-ounce bolt more than 200 feet point blank. Harquebuses had a similar pointblank range with a 2- to 6-ounce ball, but half the crossbows’ maximum. Falconets boasted the greatest range: nearly 500 feet point blank and more than a mile maximum for a 2- to 10-pound ball.
Tlaxcaltec armor offered some protection. It consisted of quilted cotton, 2 to 3 inches thick, in jerkins that left the limbs unencumbered. Though light, cotton armor absorbed blows and slashes so effectively that many Spaniards later adopted it in preference to their own. Nevertheless, cotton armor wasn’t proof against the greater impact of Spanish projectiles, especially at close range.
The Spaniards, though battered, survived this initial battle with the Tlaxcaltec warriors. Withdrawal, Cortés’ best option, was politically impossible. His actions in defiance of Velázquez’s orders meant probable execution. Showing weakness would also alienate his Totonac allies and likely invite Aztec retaliation. Given such bleak choices, Cortés chose to remain in position, facing the Tlaxcaltecs.
An even larger Tlaxcaltec force attacked the Spaniards the following day, keeping them on the defensive.
Indigenous battles usually opened with an arrow and slingstone barrage at about 200 feet, covering the approach of frontline fighters, who wielded atlatls as they advanced. Once in contact, fighting shifted to the more effective broadswords and thrusting spears.
But since the Spaniards didn’t advance to meet them, it took the Tlaxcaltecs twice as long to close. All the while, Spanish fire tore into their formations, eventually driving back the assault.
Elated, the Spaniards charged after the fleeing Tlaxcaltecs, only to find themselves drawn into another ambush, surrounded and assailed from all sides. Again on the defensive, Cortés used his firepower to force a Tlaxcaltec withdrawal. During this brief respite, the Spaniards retreated to more defensible buildings nearby, having lost one dead, 15 wounded and four or five additional horses killed.
Though the wounded far outnumbered the killed in these battles, the consequences of a wound could be dire. Wounds to limbs or muscle tissue were rarely fatal. Both the Spaniards and Tlaxcaltecs set bones and sutured wounds, and both applied medicinal salves. But neither could effectively repair internal damage. Punctures of the abdominal cavity that damaged internal organs or introduced infections were virtual death sentences. And projectiles that caused such punctures were common in these fights.
In two days of combat, the Tlaxcaltecs hadn’t overrun the Spanish defenses, but neither had the Spaniards prevailed. It was a stalemate, but the advantage lay with the Tlaxcaltecs, who could secure additional men and supplies. Cortés’ position was more precarious. Over two days, the Spaniards had suffered at least two killed, perhaps 20 wounded, and lost at least six horses. Neither men nor horses were replaceable. Supplies were dwindling. The Spaniards had been resupplying at towns along their route, but that ended abruptly in Tlaxcaltec territory.
The next day brought another Tlaxcaltec attack. Their massive frontal assault began conventionally, and Cortés again concentrated on keeping them at bay. Using half his men to reload crossbows and harquebuses while the best shots fired, Cortés increased the overall rate of fire and forced the Tlaxcaltecs back beyond the effective range of their own arms. Once again the Spaniards staved off defeat, but at the cost of another man killed and 60 men and all remaining horses wounded. While the attacks were grinding the Spaniards down, the Tlaxcaltecs also suffered significant losses, as the Spanish arms commanded a larger killing zone. The next Tlaxcaltec ploy sought to remove that advantage.
Night attacks were rare in Mexico, typically employed only in raids. Initiated by drums or trumpets, battles usually began at dawn to maximize daylight. Audible commands were ineffectual over the din of battle. Instead, standards were used as visual signals. Strapped to the leaders’ backs, these light feather-and-cane insignias towered overhead and guided their respective units. But standards weren’t visible at night, nor could leaders use audible commands without sacrificing surprise.
In the face of superior Spanish firepower, however, the Tlaxcaltecs decided to take their chances. While the darkness would impede their own maneuvers and communications, the Spaniards would be similarly handicapped, as they couldn’t see to take advantage of their weapons’ greater ranges.
Spanish crossbows, harquebuses and falconets all fired at slower rates than Tlaxcaltec projectiles. Harquebuses required about 1l⁄2 minutes to load, prime and fire; crossbows took about a minute. Surprisingly, falconets were ready to fire in about half a minute, as they were breechloaders.
But even these slow rates of fire weren’t sustainable. Spanish arms were heavy, crossbows weighing about 15 pounds and harquebuses 2 to 5 pounds more. Soldiers’ arms quickly tired, becoming unsteady after half an hour’s fire.
Darkness hardly slowed Tlaxcaltec fire at all. Their arms were lighter and simpler to use, and they knew precisely where the Spaniards stood, immobile behind their defenses. In the absence of effective Spanish fire to keep them far enough back, the Tlaxcaltecs could exploit these higher rates of fire.
Though atlatls were shorter-range weapons, they could throw darts quickly, on a par with bows and slings, about six times per minute. Arrows were especially effective in volleys, as archers could be massed closer together than slingers. Yet slingers proved more effective against Spanish armor, because stones injured on impact, not penetration.
The Tlaxcaltecs’ night assault was launched from all directions at once. Archers, slingers and atlatlists remained stationary, assailing the Spaniards on three sides, while Tlaxcaltec swordsmen attacked from the fourth. Darkness had granted the Spaniards one advantage, however; their horsemen were able to counterattack without infantry support. The Tlaxcaltec attack on that side collapsed.
Nevertheless, 50 of Cortés’ 300 men were dead, most of the rest were wounded, and a dozen were ill. Food supplies were dwindling and, even more critical, so too were armaments, which could not be replenished in the field.
At one shot per minute per crossbow, an hour’s combat for all 32 crossbowmen translated to 200 to 350 pounds of expended bolts. Similarly, at one shot every one and a half minutes, the 15 harquebuses expended 600 two-ounce balls and an equal weight of gunpowder, or 130 pounds, and the four falconets expended 60 to 200 pounds of ammunition per hour. At these rates, each hour of vigorous combat with all weapons consumed 400 to 700 pounds of irreplaceable armaments. Just how many bolts, rounds, shot and gunpowder Cortés brought is not recorded, but Totonac porters toted all the armaments, and only 200 accompanied the expedition. The porters also had to carry food.
The party that left the Yucatán coast numbered 550 men, counting the Totonac warriors and porters, and the daily ration was more than two pounds of maize. At least half of the porters accompanying Cortés carried food, which at the conventional load of 50 pounds per porter meant 5,000 pounds of maize.
If the remaining 100 porters did carry bolts, rounds, shot and gunpowder alone (ignoring the four falconets, which jointly weighed at least 2,000 pounds and required litters employing some 40 porters), their collective weight meant the porters could only carry enough for seven to 12 hours of vigorous combat.
Cortés’ position was desperate. He continued to dispatch parties to nearby towns in search of food, but managed to sack only one, with fleeting benefit. Many of his men were near mutiny, openly demanding a return to the coast. By every measure but death, Cortés was defeated, and even death required no further Tlaxcaltec attacks, only a brief encirclement. He was simply incapable of defeating the Tlaxcaltecs, much less the powerful Aztecs.
Yet in less than two years, Cortés would stand in the ruins of Tenochtitlán and accept the Aztec surrender. How did he manage such a miraculous turnaround?
The answer lay with the Tlaxcaltecs. Had they decided to continue this battle and crush the Spaniards, Cortés would have been just another failed adventurer. But in a surprising decision based on geopolitics and domestic rivalries, Tlaxcala gave the Spaniards a reprieve.
In 1519 the Aztecs dominated the region. From their rise in 1428, they had extended their empire across most of central Mexico. Some cities allied with the empire, but more were conquered or intimidated into submission by the might of the Aztecs and their allies. The empire marshaled many tens of thousands of soldiers and dispatched them over vast distances. The soldiers were the best in Mexico, the product of schools that trained both commoners and nobles.
Yet independent, even hostile, states still existed, notably the Tlaxcaltec confederacy. These polities remained free not because they couldn’t be conquered, but because of the costs involved. The Aztecs conquered many distant states, but did not—and could not—control them all directly. Such control would mire their army in garrison duty. Instead, they left existing rulers in control, as long as they complied with Aztec demands. Tributaries paid tribute, but weren’t otherwise integrated into the empire. So it wasn’t caprice that left some polities unconquered. Distance was a factor, but relative military strength loomed larger.
Aztec conquests were motivated in large part by the need for tribute. The king possessed great but not absolute power: Chosen by and from the upper nobles (lords), he ultimately depended on their support, which required a continued and expanded influx of tribute to support king and lords. That, in turn, required continued expansion.
City-states in the region were relatively easy conquests. They rarely controlled more than an eight-mile radius—too small to afford protection from Aztec armies. Marching with their own supplies, the Aztecs could reach a city and defeat its army or intimidate its leaders into surrender.
On the other hand, confederacies and empires possessed larger armies and, more important, controlled larger territories. While these expanses remained vulnerable to attack, they also afforded a buffer, thanks to the Mesoamerican Achilles’ heel: logistics.
Narrow roads and the dynamics of marching meant each Aztec army of 8,000 men (a xiquipilli) averaged just 12 miles per day, comparable to distances traveled by preindustrial armies elsewhere. The best-supplied armies employed only one porter for every two soldiers, carrying just eight days of food for all three. Eight days meant the Aztecs could reliably march three days to their target, fight one day (usual against city-states), recuperate one day, then march back three days without resupply, for a combat radius of only 36 miles. Multiple xiquipillis could be dispatched on parallel routes simultaneously, but on single routes only one xiquipilli could leave per day. Each additional xiquipilli added another day at the assembly point, correspondingly reducing supplies. To expand their range, the Aztecs demanded food from their tributaries en route, thereby enabling their armies to strike hundreds of miles away.
This strategy lacked effect against confederacies and other empires. They could meet Aztec incursions at their borders, and defeat there meant only the loss of a peripheral area. A vanquished army could withdraw into its territory, where the Aztecs had no logistical support and couldn’t follow.
To conquer a confederacy or empire required a protracted effort over many years, further complicated by several factors. First, such undertakings promised few immediate returns—the whole point of conquest. They also diverted forces that could be employed to conquer easier tribute-paying targets elsewhere. And unless such campaigns were consistently successful, the Aztecs might appear weak and encourage rebellion by other tributaries. Even in a successful campaign, if the Aztecs were badly mauled, their authority would be thrown into doubt.
Rather than squander their army in protracted campaigns, the Aztecs engaged confederacies and empires in gradual and progressive intimidation with limited troops, freeing the main forces for warfare elsewhere, including along their enemies’ peripheral territory. Subduing complex polities became a lengthy process of gradual encirclement. The Aztecs would cut them off from allies and chip away at the edges until they could be crushed outright.
Tlaxcala had been engaged in such a conflict with the empire for nearly six decades, first as a partner to Huexotzinco and Atlixco before becoming the primary target over the past few decades. And that lengthy war was going against it.
One nearby major ally had been conquered; another had simply defected to the Aztecs. And while Huexotzinco was allied with Tlaxcala against the Spaniards, it was an unreliable partner; Huexotzinco had become an Aztec ally in 1512 and only became re-allied with Tlaxcala in 1517. Though still independent, Tlaxcala was encircled, watching its allies fall one by one.
In most Mexican states and empires, power was concentrated in a single leader whose political decisions were widely supported. By contrast, Tlaxcala was a confederacy of four provinces ruled jointly by four kings, so decisions weren’t monolithic and often masked significant divisions. Changing circumstances often led to abrupt, even contradictory, changes.
Two rulers—Xicoténcatl the Elder and Maxixcatl—vied for dominance. Xicoténcatl prevailed in urging that they fight Cortés, but Maxixcatl would benefit if he failed, particularly since his son, Xicoténcatl the Younger, commanded the army.
Thus after a few desperate days of battle, support swung to Maxixcatl, and the Tlaxcaltec council ordered the fighting halted. At first Xicoténcatl the Younger ignored the order, knowing if he persisted and won, his political status would improve. But when Maxixcatl withdrew his army, Xicoténcatl’s final daytime attack was doomed, forcing him to withdraw his own warriors.
Regardless of this internal power struggle, continued Aztec encroachment presented an even greater reason to halt the fighting. Encircled and beleaguered, Tlaxcala was perhaps no more than two decades from wholesale defeat by the Aztecs. The end appeared inevitable, and defeat of Cortés’ conquistadors would not improve their predicament.
It has long been conventional wisdom to attribute the Spanish conquest of Mexico to superior leadership, tactics or arms, but that is inaccurate. The Tlaxcaltecs simply realized that Spanish arms could achieve the one thing theirs could not: conquest of the Aztec Empire.
In indigenous warfare, maintaining a cohesive front was crucial, allowing combatants to focus on the enemy before them without concern for their sides or rear. Victory was usually achieved by disrupting the opposing line, pouring through en masse and turning its flanks. This was difficult, as both sides used the same weapons and tactics. The larger force almost always won, as it could extend its front much farther than its opponent. It was exceptionally difficult for equal or smaller forces to make such a breakthrough.
But in their clashes with the Spaniards, the Tlaxcaltecs had noted how effective falconets, harquebuses and crossbows were in breaking up their ranks. Unable to maintain formation in the face of Spanish fire, they couldn’t sustain their attacks despite superior numbers. The Spaniards were too few to exploit this advantage, but the Tlaxcaltecs recognized the tactical implications for their own army and acted on that insight.
By allying with Cortés, the Tlaxcaltecs could use the surviving 250 Spaniards with their weapons as shock troops to punch through enemy lines, enabling Tlaxcaltec troops to pour through and attack their opponents’ vulnerable flanks. Such an alliance would tip the regional balance of military power in Tlaxcala’s favor, even against superior numbers.
If Cortés recognized this advantage, he was helpless to implement it on his own, despite his many boasts. Only the Tlaxcaltecs could halt the attack on the Spaniards. Only they could initiate an alliance.
During the ensuing conquest of Mexico, additional landings brought more Spaniards, multiplying their number perhaps eightfold (about half survived), but they were never anywhere near a majority force. In the end they comprised no more than 1 percent of the forces arrayed against the Aztecs. The conquest was a Tlaxcaltec victory for which the Spaniards took credit.
Even in the final battles, the Aztecs would unhesitatingly attack Indian formations. The Tlaxcaltecs exploited that approach by dressing a few Spaniards as Indians and concealing them in their midst until the Aztecs were committed. Then the Spaniards would bring their arms to bear, disrupting the attackers and securing Tlaxcaltec victory.
The strategy was a stunning success. Tenochtitlán fell two years later, on August 13, 1521.
For further reading, pick up copies of Mexico and the Spanish Conquest and Aztec Warfare: Imperial Expansion and Political Control, both by Ross Hassig
Originally published in the May 2007 issue of Military History. To subscribe, click here.
|
<urn:uuid:66acab8f-814e-46fd-9c37-a98943ba7735>
|
CC-MAIN-2023-50
|
https://www.historynet.com/cortes-won-mexico-losing/?f
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.971877 | 5,068 | 3.9375 | 4 |
Asians are getting too little iron and too much arsenic from soil and water. Unfortunately the remedy for one problem may increase the impact of the other. The challenge is to find a remedy that takes care of both problems, says Prof. Joe Cummins.
It has been estimated that 40% of the world's women suffer some degree of iron deficiency. Anaemia is associated with learning difficulties in children, increased susceptibility to disease and reduced work capacity . Pre-menopausal women are most severely affected by iron deficiency, while men tend to retain iron (as indicated below, an iron overload diet may increase risk of cancer in males). Increasing iron in the diet is a desirable goal and rice is the preferred crop for genetic modification (GM) to increase iron in the diet, especially in Asia.
Researchers from the Japanese Electrical Power Research Institute increased the iron content of rice threefold by adding a seed-specific ferritin (an iron storage protein) from soybean under the control of a rice seed storage protein promoter . But although the iron content of the rice grain was increased significantly, there has been concern that the ferritin-bound iron may not be readily available in the digestive tract of mammals.
A Swiss research group transformed rice with a ferritin gene from snap beans under the control of a rice storage protein promoter accompanied by a fungal phytase gene also under the control of the storage protein promoter. The phytase gene produces an enzyme that increased iron availability during digestion. An endogenous rice metallothionein (a ubiquitous metal-binding cellular protein) was over-expressed in the transgenic rice to further aid in iron digestion by providing a form of iron readily taken up in the gut. An antibiotic resistance marker gene for the antibiotic hygromycin was added during the transformations of the rice. The iron content of the rice was doubled while, in contrast to the Japanese study , the iron was more readily available during digestion . The Swiss study was supported by the Rockefeller Foundation .
However, iron overload is a significant problem in males - it may lead to a condition called hemochromatosis in which the liver and other organs may be damaged, causing liver cancer or colorectal cancer. As much as one person in a hundred may carry a mutation (hereditary hemochromatosis) that makes them sensitive to iron overload at relatively modest iron intake levels . There is an association between increasing iron stores and risk of cancer .
In areas of the world where iron deficiency is commonplace, iron-enriched rice may prove beneficial, but the same iron-enriched rice could prove to be a liability in areas where iron intake is at high levels. Iron overload should be considered in the distribution of iron-enhanced rice. The need for labeling of iron rich rice products is evident.
Asia is facing a growing crisis in the use of arsenic-contaminated ground water for drinking and in irrigation of rice paddies. Arsenic pollution is a severe problem over Bangladesh/West Bengal [7)] and in the Red River Delta of Vietnam but it is also a chronic problem in Taiwan, China and Thailand . Most arsenic pollution is of natural origin, amplified by drawing water from contaminated deep aquifers, but China has arsenic pollution from burning high arsenic-containing coal . Arsenic has been shown (from studies in Taiwan) to cause cancer and circulatory problems at very low levels, the cancers include cancers of liver, lung, bladder and kidney . It has been estimated that the arsenic pollution of drinking water in the United States causes an average of 3000 cancer cases per year .
In Asia, the arsenic problem is amplified by the pollution of rice, the primary food source [7,8,11,12]. Arsenic has been accumulating in paddy soil, resulting in the contamination of the rice grain . Rice contributes to an estimated 30 to 60% of the dietary intake of arsenic in polluted regions .
There is hope that rice strains can be selected that take in less arsenic than the varieties of rice currently in use. It has been found that arsenic is sequestered on iron-plaques (rust-like deposits) on the surface of roots of rice varieties that accumulate reduced levels of arsenic in grain [11,12]. Rice paddies will continue to be polluted with arsenic in the soil because there is no practical method known to remediate the vast expanses of polluted soil. Breeding rice to reduce grain pollution seems to be an effective first step towards improving the diet in polluted areas and varieties with reduced grain content of arsenic are known.
There is a potential conflict in governmental and foundation programmes to develop and disseminate high-iron grain to alleviate iron-deficiency among rice consumers. The high- iron rice varieties currently under development include amplifying the expression of ferritin in grain and solubilising iron for uptake in the gut using a phytase gene from a fungus . Arsenic reduced the concentration of iron in the plant in rice varieties that form iron-plaques on the roots; but in varieties lacking the iron-plaques, iron uptake was not reduced in the presence of arsenic [11,12]. It appears that the iron-plaques sequester both iron and arsenic, so that both iron and arsenic are reduced in the rest of the plant.
The iron-enhanced grains designed to combat iron-deficiency are therefore, very likely to increase grain-arsenic levels in arsenic-polluted areas of Asia because the arsenic will not be sequestered on the root surface in iron plaques but instead will be taken into the shoot and end up in the rice grain. It seems a devil's bargain: either to make high-iron rice available at the cost of elevated arsenic or to make low-arsenic rice available without providing an alternate source of dietary iron.
But this dilemma only exists if one insists on GM rice as the only solution. It disappears instantly when one realizes that iron can be provided through other sources, such as beans and lentils which can easily be grown, and are rich sources of other essential nutrients besides.
Article first published 13/09/04
Got something to say about this page? Comment
|
<urn:uuid:ea1aeb26-e7b8-4e88-a92a-9f0496784b58>
|
CC-MAIN-2023-50
|
https://www.i-sis.org.uk/RIATLITMA.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.950947 | 1,252 | 3.28125 | 3 |
IT Glossary is your trusted guide to exploring technology phrases and definitions, from the world’s main IT analysis and advisory firm. In its present perspective, expertise has manifested itself increasingly within a technological system, during which governments, organizations, and people are integrated to an objective of maximizing effectivity and rationality. Bunge acknowledges that technology is about action, however an motion heavily underpinned by concept—that is what distinguishes expertise from the humanities and crafts and puts it on a par with science.
In researching this subject, we’ve got seen a variety of technology-associated solutions in the marketplace and, no offence to the programmers, are usually considerably more cumbersome than the processes that they replaced. Medical science is among the fields that basically benefits from technology.
The processor has to develop own particular know-how for their specific product based on the sort and characteristics of the products, type of packing materials, sort of retort, kind of sterilization method and so forth. Educational Expertise Research and Improvement, sixty one(four), 685-705.
A mix of excessive overhead in the United States and powerful cultural ties between the domestic and Asian info expertise industries have led many companies to outsource labor-intensive software programming to Asia. It is a terrific quantity to have in your bookshelf if want a quick overview of how over 100 main students, critics, historians, scientists, and authors thought about technology and technological advances.
The approaches are normally influenced by developments in STS, particularly the concept that technologies contain a script that influences not only individuals’s notion of the world but in addition human conduct, and the idea of the absence of a elementary distinction between humans and non-humans, including technological artifacts (Akrich 1992; Latour 1992; Latour 1993; Ihde and Selinger 2003).
|
<urn:uuid:2091be4d-2602-4ded-9529-a2c842e71769>
|
CC-MAIN-2023-50
|
https://www.ielda.com/definition-of-info-technology.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.94112 | 369 | 3.03125 | 3 |
Education technology (also known as “edtech”) too often seems like a luxury found only in well-off communities. But while it does have the potential to exacerbate inequities in education, it can actually serve as a great equalizer in improving the quality of education for children in need.
Call it “Equitable Edtech” – digital tools thoughtfully deployed to help close the learning gap for underserved students. Here are three ways edtech is working effectively in low-income markets.
Edtech can help teachers prioritize instruction for those most in need, without raising costs
For centuries, teachers have been expected to design lesson plans, deliver content, keep students engaged, and produce learning outcomes, day in and day out. These expectations are particularly challenging to meet in low-income countries, where teachers often have not had the opportunity or training to master the content they teach. They also face large, overcrowded classrooms with students who might be three to four years behind grade level. However, there is emerging evidence that technology-enabled solutions can help teachers better assess their students’ strengths and weaknesses and target instruction across a diverse classroom effectively. These solutions may have even larger relative benefits for the most underserved students.
For example, in 2013 Uruguay implemented bettermarks, a German-based adaptive learning platform for middle and high school math. It was installed across the entire country’s public school system for the equivalent of only US$1.50 per student per year. The platform provides teachers with an evaluation report for each student so instruction can be tailored to a student’s needs. A 2017 randomized control study by Centro de Investigaciones Económicas demonstrated that sustained usage by Uruguay’s public school students over three years produced increases in math scores by 2.6 standard deviations. The impact of the bettermarks platform could be roughly equated to having two months more of classes over three years, with that effect rising to four months over the same period for lower-income learners (or 1.33 months more classes per school year).
In the Uruguayan case, and in other effective edtech-enabled environments, technology doesn’t replace teachers, but supports them by clearly indicating where each student is on his or her learning path. By collecting and analyzing data on student competencies and gaps, edtech can enable teachers to target instruction more efficiently and effectively.
Edtech can deliver quality content and competency learning to all students
We have come a long way since the highly criticized “One Laptop per Child” that helped shape perceptions about students sitting alone watching screens with limited educational content. Yet, concerns remain about prolonged screen time as well as the educational value of classroom technology
Thankfully, we are now much better informed by years of research about what makes good pedagogy and sound instruction. That learning is now integrated within the best tech-based learning programs. There is robust evidence, for example, regarding project-based learning (PBL) and how collaboration between students on multidisciplinary projects helps improve mastery of content and instills 21st century competencies.
There is now additional evidence that integrating technology to power PBL boosts learning outcomes across income, racial, and ethnic lines. Startups such as Inveno and WhizJuniors, both based in India and focused on teaching coding and computational thinking skills, are adopting a project-based learning approach. Their curriculum combines real-world projects with the study of programming. In case of Inveno, students can run code on a programmable robot. WhizJuniors provides video instruction to students for developing their projects. Both Inveno and WhizJuniors train teachers in their pedagogy. Students store their “portfolios” of projects on a digital platform, where they are assessed and certified.
Edtech can be deployed in lower-resource schools, even those with low connectivity, while improving learning for lower-income students
There is a common claim that edtech only works in higher-income schools with fast broadband internet and highly trained teachers. While such environments certainly present an ideal context, lower-income communities that may have less-prepared teachers and low-to-no connectivity have also successfully implemented edtech solutions with significant results.
Bridge International Academies is a network of schools in some of the most marginalized communities across Africa and India. It uses tech to help deliver high-quality learning. A key element of its model uses tech to provide teachers with continual professional development support and teaching best practices. Bridge’s e-learning platform delivers lesson plans using teacher guides that can work over 2G (which is now available to 95% of the world’s population). That connects all Bridge’s classrooms and allows for real-time data collection of things like teacher attendance, lessons delivered and student performance. No matter how remote the classroom, the tech is delivering results.
Equitable edtech can potentially improve learning opportunities for children throughout the world, including the four billion living in communities with limited internet connectivity. As edtech investors here at Omidyar Network, where we both work, we are driven by UN Sustainable Development Goal number four, aiming to achieve inclusive and quality education for all by 2030. Edtech can be a great equalizer— but at the moment 617 million children and adolescents are leaving school without achieving minimum proficiency levels in reading and math. We need to utilize all tools available, including scalable edtech, to reach students and children most in need.
Amy Klement and Eliza Erikson are partners at Omidyar Network. Both are focused on global education initiatives. Disclosure: Omidyar Network is an investor in Bridge International Academies.
|
<urn:uuid:59ba66bc-c39e-401b-b612-82ce7d2b062c>
|
CC-MAIN-2023-50
|
https://www.imaginablefutures.com/learnings/how-technology-can-help-underserved-children-learn/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.948269 | 1,166 | 3.5625 | 4 |
The effect of moss bag shape in the air monitoring of metal(oid)s in semi-arid sites: Influence of wind speed and moss porosityRevista : Atmospheric Pollution Research
Volumen : 10
Número : 6
Páginas : 1921-1930
Tipo de publicación : ISI Ir a publicación
The moss bag technique has been widely used in Europe for the monitoring of metal(oid)s in the air. However, the effect of moss bag shape and moss porosity in the capture and retention of metal(oid)s linked to particulate matter (PM) has not been studied in detail. The objective of the study was to compare the capture of metal(oid)s in air between two shapes of moss bag, rounded bag (traditional shape) and semi-sphere bag. The factors and methods considered were i) wind speed and porosity characteristics of the medium (moss-matrix), evaluated by modeling and simulations in 3D with the COMSOL platform, and ii) net accumulations (NE) of Cu, Fe, Al, Zn, Sb, Ba and Pb with the moss bag technique. Exposure period was 30 days (August to November) in two districts of Santiago de Chile (Las Condes and Ñuñoa). Results revealed that i) semi-sphere bag had a greater accumulation by sedimentation of PM (>2.5 μm), mainly in its upper zone, with the most effective (average) porosity range for the capture and retention of PM being 0.45 to 0.7, and ii) the semi-sphere moss bag had higher NE for Al, Zn, Sb and Pb and lower coefficients of variation for Fe, Al, Pb, Ba and Cu. Our results show that in high wind speeds events, the shape of the moss bag can determine PM retention.
|
<urn:uuid:648dfe69-ab77-4440-8d6c-f7a00448b260>
|
CC-MAIN-2023-50
|
https://www.ing.uc.cl/publicaciones/the-effect-of-%C2%93moss-bag%C2%94-shape-in-the-air-monitoring-of-metaloids-in-semi-arid-sites-influence-of-wind-speed-and-moss-porosity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.909654 | 393 | 2.640625 | 3 |
Wingspan of 17-21 mm. Forewings brown to dark grey basally and white with bluish-grey, brown or black strokes distally. An isolated black spot is present near the border of the light and dark parts. Hindwings are grey-brown with a concolorous fringe. Head and thorax dark brown.
Initially larvae are yellow in colour, before becoming greyish-green. Pinacula small and black. Head shining black and prothoracic plate black with a pale anterior margin and pale medial groove. Anal plate blackish-brown and thoracic legs dark brown or black.
Oval and flattened, finely reticulated. Translucent at first and becoming yellowish-white with age. Laid singly or in small batches of 2-4 eggs on the underside of leaves.
Europe across to Asia minor and Siberia. Also introduced to North America.
Apple (Malus), cherry, plum, apricot and almond (Prunus)
Larvae attack opening buds and spin flower buds together to feed. Leaves are also bound together with silken threads.
|
<urn:uuid:4548efe1-ec50-4f81-af8b-a1cf77e34ddb>
|
CC-MAIN-2023-50
|
https://www.internationalpheromones.com/product/marbled-orchard-tortrix-hedya-nubiferana/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.897142 | 231 | 2.625 | 3 |
Growing deciduous fruits, chilling and dormancy breaking research under low chill conditions
This paper contains an overview of the experiments carried out at the experimental areas of the Cukurova University both in Adana (subtropical) and in Pozanti during 1986 and 2014. The main aim of the research was to grow deciduous fruit trees under subtropical climatic conditions (Adana-Cukurova) and compare the data of subtropical conditions with the data of the continental climatic conditions (Pozanti). The studies began with an experiment on the physiology of dormancy and the effects of different methods on breaking dormancy of peaches and nectarines under subtropical conditions. The experiments continued on other temperate fruit species grown with insufficient chilling accumulation. Results of these experiments showed increasing negative effects of climate change on temperate fruit trees under subtropical conditions of the Mediterranean region. The chilling requirements of the experimented species and cultivars and the chilling accumulation in the studied areas were determined. Alternating chilling hours, dormancy release chemicals, evaporative cooling method applied to break dormancy. Even low chill cherries could grow and set reasonable fruits with the application of some practices under limited chilling conditions. However, with the global warming, some other problems raised such as multiple and twin fruits, because of the very high temperatures during the physiological and morphological differentiation periods of the buds. To solve this situation, the experiments carried out using shading, fogging and kaolin applications.
Küden, A.B. (2020). Growing deciduous fruits, chilling and dormancy breaking research under low chill conditions. Acta Hortic. 1280, 145-154
temperate fruits, subtropical conditions, insufficient chilling accumulation, double fruit, effects of climate change
|
<urn:uuid:40698f51-dee1-4710-9735-6e9a9ba46f5f>
|
CC-MAIN-2023-50
|
https://www.ishs.org/ishs-article/1280_20
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.896152 | 364 | 3.046875 | 3 |
A future classroom may not be led by a robot with arms and legs, but it may be guided by a digital brain.
It may seem like this: a room as big as a basketball court;
More than 100 students were plugged into laptops;
There are also 15 teachers and teaching assistants.
It's not just the future, it's David Budi's sixth grade math class.
A high school in Brooklyn near Coney Island.
Under the hum of all humans, something other than humans is running this program: algorithms.
Drive us to Google search or select complex computer calculations of what we see on our Facebook page.
The algorithm selects students to sit together.
Algorithms measure what children know and how much they know.
They choose the problem that the children should solve and provide the teacher with the next lesson.
This combination of human capital and technology is called "mixed learning ".
"Whether or not it upset you, the show seems to be serving little BudiHigh well.
A recent study of 15 schools using one-on-one teaching has mixed results, but shows that they are better than their peers on the national average.
"It can be used as an effective tool, but so far it has a moderate and unstable effect on student performance," said Harvard University researcher Justin Ritchie, who
He believes that teaching a person can mechanize some of the more common parts of teaching, such as grading and evaluating whether students have mastered a topic.
However, he added that this also ultimately led to the teaching of standardized tests and there was no better effect than some non-standardized tests
So how does it work?
When these sixth graders are in class, they either log in to their laptop or check the monitor in front of the room.
It tells every student where to go
The room is accurate.
It is divided into 10 parts by bookshelf and small partition, such as "Botanical Garden" and "Brighton Beach ".
"The computer also tells them what class to take.
Today, most of the students in the big room are doing personal work on laptops, and this class is called "virtual teaching" and "virtual reinforcement ".
"There are also some people working in groups under the leadership of teachers.
In "Qiu Yuan", Devon Myers, who taught seven years of books, is conducting a teaching called "on-site investigation.
"He stood silently next to a smart board and clicked on the mouse.
At the beginning of this class, it may be the cousin of iPhone Siri.
"How do you say two-point-zero-five-three?
To read this, divide it into two parts, "command the sound of the disengage from the speaker of the computer.
Does anyone know what you said?
"The girl Sabrina Giagrande, who has already answered a few questions, stretched her hand into the sky as if it had been held and shaken by invisible force.
Miles pushed his 20 uninterested classes and urged others to answer, but eventually obeyed Sabrina: "Two Fifty
"That's right," he said.
"In this lesson, you have learned to name a few decimal digits per thousand by using the place value," the sound of the algorithm informed the class on one thing --of-fact tone.
Whether they get it or not, the algorithm will eventually find out.
At the end of the course, the children did a short quiz called exit sheet, which the algorithm used to measure what they learned.
In five questions, this outbound sheet provides the algorithm with information on which students will be grouped together the next day, and what each of them will do. In a sixth-
In theory, from fourth grade math to eighth grade math, students may be doing everything. Around 5 p. m.
Every day, teachers receive alerts about how students will group and what classes they need to teach.
Many of the teachers I spoke to gave cautious praise to the show.
Aaron Caswell, he's in M. S.
Another high school in Brooklyn, aged 88, said all this tidying up made him a better teacher.
But he added that it is not easier to help his students learn than before.
Since he only gets the material 16 hours in advance, it means that he has to be ready to create classes at any time and make plans for students who need extra help.
"You still have to make teaching your own," he said . ".
But not everyone does.
"A lot of people just give them [
Do what they say: "This is my script, these are my children.
He said: "It doesn't work to teach a person in this way.
In myers course in little budy
Some students seem to be engaged and some seem distracted.
The sixth-grade student in a corn row stabbed his pen into the rubber pulp of the eraser, which made people satisfied and obsessed with the bursting foam package.
He went through the material earlier in the time and said he was tired of the idea of doing it again.
The class was divided into two 35 minutes, and in the first class Christien did a "virtual teaching" tutorial.
With headphones, he went through a seriesin-the-
Blank multiple choice questions.
"In this lesson, you will learn how to recognize decimals as a few percent and a few thousand," an optimistic voice said in his headphones, while a beating '80'
If he answers the question correctly, he can move on.
If he doesn't, the computer will try to tell him where something went wrong.
"Sorry, this is not correct," said the voice . ".
"You want to write decimals with 40 and 50 --
3‰ of the standard form.
We will answer this question using the location value diagram.
The problem with algorithms, critics argue, is that they make it easier to teach standardized tests and ultimately weaken the rich teaching.
For example, according to Reich, a Harvard researcher, computers are good at measuring the simple computational tasks required for standardized testing, but not critical thinking.
He believes that this has an impact on later students: mathematical work that requires human participation usually involves higher-
The work of computing mathematics has been done by computers.
"If you care about children having a complete life in the math world in the future, then it's a terrible system," he said . ".
But these are high
BET testing is important.
If I were the principal and had children on skilled boundaries, I would use these procedures to move them to the other side.
"In fact, the bad test result is little Budi.
High signed the main driving force of the project.
"We haven't gained anything in mathematics for a long time.
Why not try the new one?
Said President Dominique De Angelo.
De Angelo believes that part of the success comes from teaching as a robot enforcer.
He knows exactly what lesson plans his teachers are reviewing every day and whether they have passed them.
"Go to school on Monday after Thanksgiving.
"You showed me how many teachers are doing some strong guidance," he said . ".
"The design of this project forces this problem.
"In a sense, teaching a person is" adaptive "and" self"
"It's a form of artificial intelligence, and it's important because schools are doing better in their second year of study.
In fact, their average performance is 47% higher than their national counterparts.
Colleagues in the company
Founder Joel Rose believes that this is due not only to the improved ability of the algorithm itself, but also
The school year is getting more adapted to the program and learning how to train teachers to use the software better.
"You have to build a plane while flying," Rose said of mixed learning . ".
"Fortunately, we have worked with good schools that understand this.
But not all cooperative schools understand that.
The progress of some schools is average, while the results of other schools have declined.
Two of the three schools in New York dropped out of school. (
Neither school responded to our request for comment. )
The city has managed to raise $9 million in external funding for the pilot project, which will last for three years, raising another important question: as many supporters have said, in fact, mixed learning is cheaper than traditional teaching?
A recent study found that this is not the case in a successful project.
Initially, the cost of mixed learning was higher, but he believes that once the project gets better, the school invests in hardware and one day it will become cheaper.
The big question aside from the money question is: did the children really learn more?
Algorithms may be better task management than people.
When grading assignments and tracking student progress, they may reduce the workload of a large number of teachers.
They can keep up with the changes in standardized testing more easily.
It is not clear yet that normalization begins to disappear from other educational signs-creativity and critical thinking.
|
<urn:uuid:5a0e6f4b-5ec3-4125-8022-977af12cff50>
|
CC-MAIN-2023-50
|
https://www.itatouch.com/aiwz-meet-the-classroom-of-the-future-smart-board-computer
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.973425 | 1,898 | 3.71875 | 4 |
- past participle
- present participle
the sound made by a hen after laying an egg
yak, yack, yakety-yak, chatter, cackle (noun)
a loud laugh suggestive of a hen's cackle
talk or utter in a cackling manner
"The women cackled when they saw the movie star step out of the limousine"
squawk shrilly and loudly, characteristic of hens
emit a loud, unpleasant kind of laughing
The cry of a hen, especially when laying an egg
A laugh resembling the cry of a hen.
To laugh with a sound similar to a hen's cry.
Discuss this bahasa indonesia cackle translation with the community:
Use the citation below to add this dictionary page to your bibliography:
"cackle." Kamus.net. STANDS4 LLC, 2023. Web. 9 Dec. 2023. <https://www.kamus.net/english/cackle>.
|
<urn:uuid:359968ff-c469-4fb2-b996-81c1a287fb98>
|
CC-MAIN-2023-50
|
https://www.kamus.net/english/cackle
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.756435 | 213 | 2.703125 | 3 |
A vehicle's heating system is mainly celebrated for its ability to keep passengers warm during every commute in the colder seasons. The air conditioning and heating systems are parallel in their roles and skills to maintain a comfortable ride, whether in cold or warm weather. These systems also contribute to the support of the engine and its functionality with the shared role of decreasing the chance of overheating and possible breakdowns. Many components make up the heating system, all of which have different functions and abilities.
What makes up a heating system?
The heating system in a vehicle is comprised of many different parts. Still, they all serve the purpose of one or two things: either heating the passengers of the vehicle or supporting the engine from overheating. The parts that make up the heating system are as follows:
- Heater core
- Blower/motor fan
- Heater hoses
- Heater control valve
- HVAC (heating, ventilation, air conditioning) control panel
These components play different roles, but all contribute to blowing heated air out of the cabin to warm up every passenger in a vehicle. As stated before, the heating and air conditioning systems share a similar purpose: to eliminate excessive heat in the engine.
How does the Heating System work?
The heating system reflects the cooling system because it uses the coolant fluid to keep the engine cool and the passengers from either being too hot or too cold. The primary part of the heating system is the heater core. The heater core is located in the vehicle's dashboard, is similar to a radiator in its functionality, and is the avenue in which the heater fan blows air through to be released through the vents. Coolant flows from the heater core and is then regulated by the heater valve to produce warm air. Like a radiator, excess heat is detected from the engine, and the coolant fluid is released and sent to the engine to absorb that heat. That heat must be released somewhere, which is where the heating system comes into play. The heating system either absorbs the heat to be released to warm up passengers or absorbs the heat to eliminate overheating within the engine. The heating system works alongside the cooling system to support the engine, which is a significant role that requires a lot of labor. Like every other vehicle component, maintenance, repairs, and replacements come about due to normal wear and tear and improper maintenance practices. Vehicle parts are built to last as long as possible but are capable of declining in performance and eventually giving out completely.
Heating System Maintenance Tips
Being that the heating system works closely with the engine and its parts, it is highly recommended to make professional inspections and routine maintenance a necessity. Experts suggest having the heating system in a vehicle looked at as soon as heating capabilities begin to show poor performance of any kind because not only can it impact the passengers resulting in an uncomfortable ride, but it can also take away from its primary role of supporting the engine's temperatures. For this reason, professionals highly support a regularly scheduled maintenance routine to have the components inspected and adequately replaced or repaired using top-of-the-line parts.
|
<urn:uuid:ec97ff0e-0732-404e-aa2c-80e16bf0daa0>
|
CC-MAIN-2023-50
|
https://www.keithsautofresno.com/blog-details?objId=102b3912-c912-4c94-8d7c-e95e80309fd9
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.964045 | 627 | 3.484375 | 3 |
The battery in your vehicle requires regular maintenance, just like your oil. In fact, your vehicle’s battery could be in poor condition, and you do not even know it. The battery provides the power your vehicle needs to keep moving. Generally, your battery will stay charged from your alternator as you drive, but if you leave your vehicle sitting for an extended period of time or it is an old battery, this may not occur. You do not want to be out and about and be stuck and stranded due to a dead battery. There are many ways to help preserve your battery so that this does not happen to you. If you do experience battery issues or need battery replacement, see our automotive repair shop for all your battery needs.
How long does your vehicle’s battery last?
The battery in your vehicle typically lasts between 3 and 5 years. This is mainly due to the changes in weather, such as driving during the hot summer days. Your engine is producing a lot of heat, and with the weather scorching down on your battery well, this can severely affect your battery’s overall lifespan. This is also because there is fluid in your battery, and this fluid evaporates, which changes how well it can hold a charge. With all of this said, this entails that vehicle batteries typically last longer in colder climates. Regardless of your environment, taking proper precautions and maintaining your battery is essential.
Steps you can take to preserve your battery
There are several things you can do to help preserve your battery. These suggestions are the best ways to ensure your battery has a long life!
- Keep your battery fastened tightly- Vibrations can significantly reduce the longevity of your battery, so keeping it securely fastened will prevent excessive vibrations
- Keep your battery clean- a dirty battery can corrode or create mild short circuits, eventually creating a dead battery. Keeping them clean and free of corrosion will help prevent this.
- Minimize heat- Extreme heat is brutal on your battery. Prevention includes parking in the shade or a garage.
- Avoid short trips- Your vehicle's battery can't fully charge during short trips. Drive your automobile frequently and for long stretches of time to keep the battery charged.
- Don’t leave the lights on- Keeping your headlights or interior lights on while the engine isn't running is hard on the battery. Always turn off all accessories before leaving the vehicle, and ensure the lights are out before you leave.
- Use your vehicle- Batteries inherently lose charge over time, a process known as "self-discharge," regardless of the brand. Drive your vehicle so your alternator can recharge your battery.
Receiving regular battery service
Regular maintenance work is required for the engine in your vehicle. One of the many parts of an engine that might fail if not properly maintained is the vehicle battery. Keep your battery on the list of maintenance items to check, so you're never caught with a bad or dead battery. Our automotive repair shop can help. We have expert technicians and technology to see if your vehicle needs a new battery, and we can also handle all your battery replacement needs as well!
|
<urn:uuid:79713189-c0b3-4878-94cc-ceaaf61103bc>
|
CC-MAIN-2023-50
|
https://www.keithsautofresno.com/blog-details?objId=1da05dd2-f70d-41c3-9d56-a3a7c0ed38e1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.961717 | 644 | 2.78125 | 3 |
The repetitive jumping and side to side movements required in volleyball increase the risk of injuries to the foot and ankle. Volleyball players should be aware of the following:
Inversion ankle sprains are a common injury in this sport. Ankle sprains should be evaluated by a foot and ankle surgeon to determine the extent of injury, including possible peroneal tendon injuries or fractures. The foot and ankle surgeon will develop a treatment plan: failure to fully treat and rehabilitate a sprain may lead to chronic ankle instability and recurrent sprains.
Overuse and excessive training can lead to heel pain (plantar fasciitis), Achilles tendonitis, sesamoiditis, stress fractures, posterior tibial tendonitis (or PTTD), and calcaneal apophysitis in children and adolescents.
|
<urn:uuid:472044fe-d10a-43d5-9cf0-351dd4de6b9a>
|
CC-MAIN-2023-50
|
https://www.keystonepodiatry.com/articles/acfas/category/48094
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.88572 | 165 | 2.640625 | 3 |
Lesson 10: Rewrite your story (report cyber-bullying)1 (20 minutes)
You can’t undo the past, and you can’t change the actions or words of other people, but you can Rewrite Your Story. In this lesson we look at two stories from Alexia and Marko and discuss the consequences of the choices that they have made.
Teacher Notes: Lesson Preparation: Watch the videos prior to the lesson.
10.1: Watch the "Alexias story" video (1.25 minutes) and use the class discussion questions to discuss the themes from the video.
10.2:Watch the "Markos story" video (1.51 minutes) and use the class discussion questions to discuss the themes from the video.
10.3:Allocate Alexia or Marko’s personal stories to student groups as case studies. Students rewrite their chosen characters story to make their situation better (A3 sheets and pens recommended for each group)
10.1: Alexia's story
Watch the video and discuss the questions with the class It was supposed to be fun, after all, it's a party! Alexia's parents limited numbers to try and keep control of the event, but some people felt left out and the hate page took it to a whole new level. It can be a balancing act to keep everyone happy, and not take out your frustrations on the wrong people. How do you handle it when it gets out of control and you become the target?
Watch the video with your class and participate in the class discussion.
Class discussion questions
Alexia had a hate page set up specifically designed to bully and threaten her. What do you think she should do? What are the avenues of help that Alexia could use?
Do you think it was right for Alexia’s Dad to limit the number of friends she could invite to the party, even though Alexia let him know there could be negative consequences?
What do you think her parents should have done?
Do you think it was right for Alexia to take it out on her parents when things went wrong?
What else could she have done?
Discuss the impact of cyberbullying on Alexia and brainstorm how Alexia could rewrite her story.
10.2: . Marko's story
Watch the video and discuss the questions with the class The new kid is a perfect target...no friends, crap at sport and hanging out with the girls. Kids are getting stuck into Marko online and threatening to beat him up. Is it better to stand up to them, or hope it just all goes away? How can you deal with cyberbullying when it impacts your state of mind and gets you down?
|
<urn:uuid:53895c4e-f439-4dd2-aa84-7b2d3d888343>
|
CC-MAIN-2023-50
|
https://www.killarabyod.com.au/lesson-10-rewrite-your-story-report-cyber-bullying-lesson-1.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.957708 | 567 | 3.53125 | 4 |
What Is Overdiagnosis and How Can It Hurt Patients?June 21st, 2017
According to the National Center for Policy Analysis, misdiagnoses are far more common than most people realize. In fact, when it comes to instances of medical malpractice, there are more misdiagnoses than there are surgical mistakes or pharmacy errors.
The dangers of a misdiagnosis are obvious. Not only does it prevent a patient from getting the treatment that he or she actually needs, but it may also lead to a risky treatment that causes adverse side effects.
The dangers of an overdiagnosis, on the other hand, are not as obvious. Whereas a misdiagnosis is a wrong diagnosis, an overdiagnosis is a technically correct one; however, it is the diagnosis of a condition that will never cause any issues and that the patient does not need to address.
Institute for Quality and Efficiency in Health Care reports that overdiagnoses are dangerous because they can lead to undue psychological stress and unnecessary medical treatment. If you sustained injuries or an illness as a result of an overdiagnosis, turn to a medical malpractice lawyer from The Bowling Christiansen Law Firm
David A. Bowling has more than three decades of trial experience, and he will help you pursue compensation for the damages you incurred. Call (504) 586-5200 to schedule a consultation with a medical malpractice attorney in Baton Rouge.
Why Do Overdiagnoses Occur?
Scheduling regular preventative screenings is essential for maintaining your overall health; however, there can be drawbacks to undergoing such precise medical tests. Overdiagnoses occur when a doctor identifies a medical condition that does not require treatment.
According to BioMed Central, the most dangerous consequence of an overdiagnosis is overtreatment. Such cases also divert a practitioner’s attention away from patients who truly need it.
American Grandparents Association reports that there are three main kinds of overdiagnosis. These are:
The detection of a disease or condition that will never cause noticeable symptoms;
The gradual extension of the definition of a disease so more people are diagnosed with it; and
The identification of a normal experience, such as symptoms associated with menopause or aging, as a particular disease.
What Kinds of Conditions Do Doctors Overdiagnose?
For various reasons, there are some conditions that doctors are more likely to overdiagnose than others. These include chronic kidney disease, low testosterone, pre-dementia, and thyroid cancer.
You can protect yourself from both misdiagnoses and overdiagnoses by seeking a second opinion. If your doctor tells you something that does not feel right, do not be afraid to seek a second opinion from another physician.
If you sustained injuries or an illness after receiving treatment for a condition that did not require medical attention, an attorney from The Bowling Christiansen Law Firm can help you pursue compensation for medical bills, lost wages, and other damages. Call (504) 586-5200 to schedule a consultation with a medical malpractice lawyer in Baton Rouge. To learn more about medical negligence claims in Louisiana, visit the USAttorneys website
|
<urn:uuid:c181c842-88ed-4acc-b73f-959cb5a5ed96>
|
CC-MAIN-2023-50
|
https://www.lawbowling.com/2017/06/21/what-is-overdiagnosis-and-how-can-it-hurt-patients/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.937672 | 638 | 2.75 | 3 |
Tackling bread waste – which represents 13% of food waste – is both an environmental and an economic challenge. This is the reason why professionals in the industry, such as craft and industrial bakeries, supermarkets, restaurants and canteens, are now actively seeking solutions to maximise the recovery of their waste. And with a lot in the pipeline already, the timing could not be any better. Supporting the development of a circular economy in the food industry, the European Commission launched on 5 July 2021 the EU Code of Conduct on Responsible Food Business and Marketing Practices, under its Farm to Fork Strategy presented in May 2020. The Code sets out seven targets for 2050 that promote the prevention and minimisation of food waste by optimising the development of circular food supply chains, in an effort to save resources, source more responsibly, create jobs and value, and protect the climate and people’s health at the same time.
Further action to reduce bread waste
Waste prevention is not a new concept in the sector of craft bakeries and restaurants. Professionals in the industry do whatever they can to recover their waste, either by turning stale bread into croutons, breadcrumbs, bruschetta, dumplings, stuffing, French toast or puddings, or by giving leftover bread to charities, nearby farms or animal shelters whenever collections are organised. But that’s not always enough to recover all the waste they end up with, let alone the leftovers thrown away by industrial bakeries and supermarkets.
While the challenge here lies in the amount of bread that goes to waste and the rate at which it becomes stale, the health requirements for this type of product are also very much part of the issue. Indeed, bread has to be stored in the best possible conditions to keep it from moulding. Bacterial spores can also survive the baking process, be reactivated and release toxins.
Bringing bread back to life, and the circle is complete!
In view of the reasons outlined above, bakers are not allowed to soak leftover bread from the previous day and mix it into their fresh dough. They can, however, turn their old bread into flour. French startup Expliceat, a company specialising in food waste, designed a bread grinder known as the Crumbler, used so far by more than 150 bakers in France to transform their surplus bread into flour. In addition, the company drafted in collaboration with two microbiological testing labs and the ADEME (French Agency for Ecological Transition) a set of health control guidelines to ensure the safe recycling of bread. It also created around fifty special recipes for making bread and cakes. While the nutritional quality of bread flour is the same as traditional flour, the taste and texture, on the other hand, are not exactly similar.
Lactic acid fermentation is another way of giving bread a new life. Industrial bakeries and supermarkets have created a new generation of sourdough made with ‘old bread’, in an effort to reuse their production leftovers and unsold products. The objective is to replace some of the flour used in sourdough recipes with bread, which can act as a new substrate for fermentation. In fact, some research has shown that this method of recycling bread can protect it from microbial spoilage, as the acidity in sourdough helps to preserve the new bread for longer.
Beer and plastic: unexpected avenues for bread fermentation
The comeback of fermented beverages that had been forgotten for some time has also opened up new avenues for stale bread. Kvas for instance, a low-alcohol sparkling drink made from fermented bread, has become popular again. Consumed in Egypt as far back as 3,000 years before our time, Russia and the Baltic States have been the only countries to enjoy this beverage in the last centuries.
Beers brewed with surplus fresh bread are also making a huge comeback on the brewery scene, with the launch a few years ago of Toast Ale in London, the Brussels beer project in Brussels and Draw Your Beer in Lille (France). Inspired by ancient recipes, these brewing companies collect leftovers from local restaurants and transform the unwanted bread into beer. This approach to brewing not only allows them to replace some of the cereal grains and cut down on the energy used for their transport, it also helps them to create value in their regions by sourcing (very) local raw materials and focusing on (very) local distribution. This method was also taken up by others, not only in England, the United States and South Africa, but also in France at Lesaffre’s Baking Center™ in Marquette-Lez-Lille. In collaboration with Fermentis and a Belgian brewer, it has developed its own process that involves replacing one third of the malt used in traditional beer recipes with its bread leftovers. The bottles produced, which are brewed at less than 30 yards from the centre and branded ‘Pinte perdue’ (Lost pint), are about to become one of our customers’ favourite goodies.
And stale bread is also a boon to the social and solidarity economy. Work integration social enterprises, such as Ondaine Agro in the Loire region, and associations, like CIPRES in the north of France, have decided to start collecting unsold bread from local bakeries and supermarkets for recycling purposes. The bread is sorted by removing the mouldy parts and cutting the rest into slices, which are then dried and grinded to produce an alternative to cereal grains. Cheaper than wheat, it is just as nutritious for poultry, swine and ruminant species.
Even more surprising, the chemical industry is considering using stale bread as a raw material in its quest for alternatives to fossil fuels. The synthesis of plastic biopolymers (e.g. polylactic acid, or PLA) from stale bread obtained through enzymatic fermentation is one area where significant progress has been made. The concept was successfully tried and tested at the pilot scale by an industry consortium, in coordination with the Spanish Technological Institute of Plastics (AIMPLAS). Meanwhile, the energy sector is looking into the anaerobic digestion (or methanation) of bread as well as its fermentation into bioethanol. Unsold bread could also be used as a substrate in hydrogen production, once again through fermentation.
Consumed for centuries, bread is an ancient food still capable of surprising us.
|
<urn:uuid:8bf3387b-2677-46f4-ac7a-25586a19bc0b>
|
CC-MAIN-2023-50
|
https://www.lesaffre.com/trends-mag/towards-a-greater-circular-economy-of-bread/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.95952 | 1,305 | 2.921875 | 3 |
we all know,For example, Swift 、 Python,,You do not need to declare a special variable type - although they are type-safe languages,But it can help you to dynamically infer the type of a variable in context。
Python do what you do,Write a name is the default declare a variable;And Swift,It is more close to our topic,It also uses where 。
If you have had experience in the use Swift,Again when using C #,Will find the where ,Is no longer the where 。
In C #,You can not casually use var,You can only use it in the process of lining。
Speaking where ,In fact, it touches the same name,They are variable,Meaning all variables。The reason for using the word,Meaning that in most cases so that you do not have to write a complex type declaration,Only you need to focus your content like,And the rest to type inference to complete。
However, in C #,It is more conservative for this support。You can not like, like Swift,Can not be used everywhere like Python type inference --C # only allow you to use the local variable type inference;That is,You can only use a specific method in where ,As for the statement of the type of property? Have old grammar。
public partial class ChatWindow : Form
string selectedUser = "";
Dictionary<string,User> users = new Dictionary<string,User>();
C # type inference is not as clever as you think
In the MSDN,on where ofIntroduction pageVery simple,Only a few simple chestnuts - of course,In these simple cases C # type inference works well。
But if I want to ListView Being in a Item ,So unfortunately,You will not get ListViewItem Example,And most likely a object 。
The reason why talk about this example,Because it has troubled me for a long time,We finally found out that C # type inference to blame。
Type inference makes the code ambiguities?
Other,For this self 2008 Function since,It seems not many people use,But a lot of controversy,such as: C # debate:When should I use var?
I contacted the time is not long C #,But in var stepped pit but a lot。But I used Python and Swift ,I did not think that type inference makes sense ambiguous code,To read nor pain - on the contrary,It makes me more time to write the code to focus on the content - namely "Statement - Use”,Rather than go to think about what type。When I think of the contents of the time,The compiler has been recommended for the type I - the majority of cases are suitable。
The C # it? It is the only conservative type inference used in the local variable - and thanks so right,Otherwise, this should be considered a disaster。 C # type inference can always just right to avoid the type I most wanted。So I think,Use type inference In C #,Not make sense of ambiguous codes,But to let you do not know what type of a variable is declared Why ......
- You do not know when you become a variable type is declared object ,Also used smugly ToString() Technique。
Reproduced Please keep the source and description link:https://www.logcg.com/archives/1722.html
|
<urn:uuid:03085606-14b8-4cc2-a35f-e4b7f704446a>
|
CC-MAIN-2023-50
|
https://www.logcg.com/en/archives/1722.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.796261 | 803 | 2.5625 | 3 |
Geography: Series 1
Introduce children to the wondrous variety of landscape and life on Earth through these beautiful photos from around the world.
To create an equitable and balanced view of life around the world, each continent packet within a series contains one image for 10 clearly defined concepts/themes. This allows children to compare and contrast clothing, food, transportation, etc. from continent to continent. This balance is not always possible for Antarctica because it has no permanent residents and no flora. However, this will lead the children to question why, for example, are there no parades in Antarctica? That is exactly what we want them to ask!
Note: All of our geography cards are fully laminated, ready to use, and meet or exceed CPSIA standards.
Series One includes 10 parallel images for each continent (10 cards/packet; 70 images in the series) that broadly represent life, landscape, and culture on Earth:
- An iconic vista
- A parade
- An iconic animal
- A beach
- A market
- A school scene
- A street scene
- An iconic building
- Food vendors
- People fishing
The back of each card contains an image of the continent (color-coded to match the Montessori continent map), the location where the photo was taken, and additional information when needed. Cards are approx. 8 1/2" x 5 1/2”, fully laminated (with our sturdy, clinically-studied, non-toxic/food-grade laminate), and have rounded corners.
Use our collections (Series 1, Series 2, and Series 3) as a foundation but don't stop there. Encourage the children to use magazines, calendars and the internet to create more scenes from around the world based on their interests (but always be sure to present parallel images from all continents).
Many Activities: These inspiring photos rouse the children's natural curiosity and, thus, effortlessly aid the development of expressive and receptive vocabulary. They also create limitless possibilities for meaningful work. Begin by gathering one or a few children, choosing a folder (beginning with the children's home continent), and talking about what everyone sees in each image.
Later, you can use the photos for sorting games by asking which card is from which continent? (Continent pieces not included; we recommend using the pieces from the continent puzzle map.) Then, when the children are writing (with the movable alphabet, chalkboards, or a pencil), use these to inspire the recording process. For example, you can teach the children how to play detective by having one child write about their favorite image and then, later, have another child read it and find the image described. The possibilities are endless!
Made in the USA.
NOTE: Geographers carry on a lively debate about what it is that defines a continent. Some consider Australia as a part of the larger continent of Oceania (which includes Micronesia, Polynesia, etc.) while others consider Australia the primary continent that includes the oceanic islands. For our purposes, we use the term Australia to include Australia, New Zealand, Tanzania, the entire island of New Guinea, and the thousands of islands in the Central and South Pacific that make up Melanesia, Micronesia, and Polynesia.
- Africa Series 1: GF1AFRICA
- Antarctica Series 1: GF1ANTARC
- Asia Series 1: GF1ASIA
- Australia Series 1: GF1AUSTR
- Europe Series 1: GF1EUROP
- North America Series 1: GF1NAMER
- South America Series 1: GF1SAMER
- Complete Series 1 Set/7: GF1ALL
- Blue Folders Set/7: GFOLDSET/7
- Cloth Pouches Set/7: P1XSET/7
|
<urn:uuid:933003da-615b-4587-b7a4-063cdedd7050>
|
CC-MAIN-2023-50
|
https://www.maitrilearning.com/products/geography-folders?variant=13025520582709
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.92357 | 797 | 3.84375 | 4 |
Can malaria still be detected after a year?
In most cases, malaria infections are relatively short-lived, lasting only days or maybe a couple of weeks at most, particularly if the patient receives appropriate treatment. In these cases, you would not be able to detect any malaria parasites in the patient’s blood after the infection – so certainly not after a year. However, you could possibly still detect antibodies (proteins that the body produces to combat infections) against malaria – some types of antibodies can last for months or even years. In this way, you could probably detect after a year that a person had been infected with malaria at some point in the past, even though they no longer have an active infection.
In addition, there are some types of malaria, notably caused by Plasmodium vivax, which can persist in the body even after the initial infection is over. By hiding out in the liver, this type of malaria can lie dormant for months or even years, before recurring again. In this way, you could potentially say that someone with P. vivax infection might be able to have their infection detected again after a year, despite not having been sick in the meantime since his or her initial infection. Malaria caused by P. vivax needs special treatment, with a drug called primaquine, to kill the parasite stages that can hide in the liver, and thus prevent further infection.
|
<urn:uuid:95824979-1cd9-4f64-82d5-2e81bcadeba9>
|
CC-MAIN-2023-50
|
https://www.malaria.com/questions/malaria-detected-year
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.970949 | 289 | 3.390625 | 3 |
Menopause is a natural biological process that marks the end of a woman’s reproductive years. It typically occurs in the late 40s or early 50s, but the age at which it starts can vary widely from person to person. Menopause is defined as the point when a woman has gone 12 consecutive months without a menstrual period. This transition is accompanied by various physical and emotional changes – the following are ten common signs and symptoms of menopause.
1. Irregular Menstrual Cycles
One of the earliest signs of approaching menopause is irregular menstrual cycles. Periods may become shorter or longer, lighter or heavier, and the time between them may vary. This irregularity is often due to changes in hormone levels, particularly a decline in estrogen production.
2. Hot Flashes
Hot flashes are one of the most common and well-known symptoms of menopause. They are characterized by sudden, intense sensations of heat, often accompanied by sweating and a flushed face. Hot flashes can vary in frequency and intensity and may last several years during the menopausal transition.
3. Night Sweats
Night sweats are episodes of excessive sweating that occur during sleep and are often linked to hot flashes. They can disrupt sleep patterns and lead to fatigue and mood disturbances.
4. Vaginal Dryness
Declining estrogen levels can lead to changes in the vaginal and urinary tract tissues, resulting in vaginal dryness, itching, and discomfort. This can also cause pain or discomfort during sexual intercourse.
5. Sleep Disturbances
Menopausal women may experience sleep disturbances, including difficulty falling or staying asleep. Night sweats and hormonal fluctuations can contribute to these sleep issues.
6. Mood Changes
Hormonal fluctuations during menopause can impact mood and emotional well-being. Some women may experience mood swings, irritability, anxiety, or even depression. These emotional changes can be challenging to navigate – medical treatment can help alleviate these changes and manage mood swings along with other menopause symptoms.
7. Weight Gain
Many women notice changes in their weight and body composition during menopause. A decrease in metabolism and hormonal shifts can lead to weight gain, particularly around the abdomen.
8. Changes in Libido
Some women experience a decrease in sexual desire and arousal during menopause due to hormonal changes and vaginal dryness. However, it’s important to note that changes in libido can vary widely among individuals.
9. Bone Health
The decline in estrogen levels during menopause can also decrease bone density, increasing the risk of osteoporosis. It’s crucial for menopausal women to discuss bone health with their doctor and consider bone density testing and appropriate preventive measures.
10. Skin and Hair Changes
Menopausal women may notice changes in their skin, such as dryness and thinning, as well as changes in hair texture and thickness.
It’s important to remember that not all women experience the same symptoms or severity of symptoms during menopause. Some may have a relatively smooth transition, while others may find it more challenging. Additionally, the duration of menopausal symptoms can vary, with some women experiencing them for several years.
Managing the symptoms of menopause often involves a combination of lifestyle changes, such as maintaining a healthy diet, staying physically active, managing stress, and getting adequate sleep. Hormone therapy is another option for some women to alleviate specific symptoms. If you are experiencing signs or symptoms of menopause and want to explore treatment or management options, contact us at Marietta OB-GYN Affiliates, P.A. Call our office to schedule an appointment with one of our highly experienced gynecologists.
|
<urn:uuid:54149aca-89b3-4f5b-8b8a-259e08dc1caa>
|
CC-MAIN-2023-50
|
https://www.mariettaobgyn.com/blog/10-signs-and-symptoms-of-menopause/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.94208 | 758 | 3.046875 | 3 |
FIRST PRINCIPLES: What America's Founders Learned from the Greeks and Romans And How it Shaped Our Country | Thomas Ricks, Harper, 387p.
The book provides a focused look into the education of America’s “founding” class. It traces the learning of each of the first four Presidents & several other leaders of the nation’s forming. Along the way, you learn only of 9 out of the 98 original framers had a parent who went to college. While religious texts were widely quoted, they were seldom read and set aside in favor of Roman classics.
During the winter of Valley Forge, the Army staged several showings of the drama “Cato, a Tragedy.”
The Founding Fathers thought “virtue” was indispensable to the survival of a Republic. Ricks, the book’s author, states virtue to them “meant putting the common good before one’s interests.” It is evident elsewhere Ricks is suggesting that the Founders believed in some form of communitarianism or socialism. The twists to connect those dots require an author to fail to understand the ancient concepts of virtue (ignorance) or is purposefully misdirecting (an ideological advocate, not a historian).
Take Roman virtue - for Ricks contends that Founders were enamored with Rome, not Greece - they fall into two rough spheres: civic (public) and personal (self). The public sphere includes military “virtues,” or what modern cultists would term “toxic masculinity.” Washington embodied these, amongst others. After all, virtue itself is a Latin word deriving from virility, and it undeniably meant “manliness” in ancient times. Other core virtues included:
* Fides (good faith, loyalty).
* Honestas (honesty, humanity).
* Disciplina (self-control, restraint).
* Salubritas (Dignity, truthful, purity).
* Pietas (Duty, dedication, respectful).
* Constantia (endurance, perseverance, courage).
* Innocentia (selfless, charity).
* Hospitium (hospitality).
* Iustitia (order, justice, responsibility).
Ricks lets his agenda get ahead of his intellectual rigor and, in a manner, his virtue. This aside, the book is an excellent addition to those interested in this period of our history by providing a focused look into the mindset of those who shaped our institutions. It is impeccably researched & full of nods to books long faded, worth discovering.
|
<urn:uuid:f81ff6ed-c413-480d-99de-0f98112dce61>
|
CC-MAIN-2023-50
|
https://www.mcneilly.com/musings/book-review-first-principles
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.942489 | 544 | 3.125 | 3 |
WC Co cemented carbides are easy to oxidize and decompose in high temperature application, which have many problems, such as brittleness, brittle fracture, processing softening and edge breaking, etc. they are still not suitable for high speed cutting of steel, so they have great limitations. WC tic co cemented carbides are known to have wear resistance, oxidation resistance and crater wear resistance.
However, due to the fact that tic and its solid solution are much more brittle than WC, this alloy also has relatively large defects, that is, the toughness and weldability of the alloy are poor. Moreover, when the content of TiC exceeds 18%, the alloy is not only brittle, but also difficult to weld. In addition, tic can not significantly improve the high temperature performance.
TAC can not only improve the oxidation resistance of cemented carbide, but also inhibit the grain growth of WC and tic. It is a practical carbide which can improve the strength of cemented carbide without reducing the wear resistance of cemented carbide. TAC can increase the strength of cemented carbide by adding TAC into WC tic co cemented carbide The addition of TAC helps to reduce the friction coefficient, thus reducing the temperature of the tool. The alloy can bear a large impact load at the cutting temperature. The melting point of TAC is as high as 3880 ℃. The addition of TAC is very beneficial to improve the high temperature performance of the alloy. Even at 1000 ℃, it can still maintain a good hardness and strength.
Tic and TAC are insoluble in WC, while WC is soluble in tic. The solubility of WC in the continuous solid solution formed by TAC is about 70wt%. The solubility of WC in the solid solution decreases with the increase of TAC content. The properties of WC tic tac Co alloys are mainly achieved by adjusting the tic + TAC, the ratio of Ti atom number to ta atom number and the content of cobalt. When the ratio of Ti atom number to ta atom number and the content of cobalt are fixed, adjusting the content of TiC + TAC to achieve the best performance has become the focus of research.
1. The raw materials used in this experiment are: WC powder, compound carbide powder [(W, Ti, TA) C] powder and Co powder. The chemical composition and average particle size are shown in Table 1.
Table 1 Composition and average particle size of raw materials
After the powder is proportioned according to the standard table 2, it is milled and mixed on nd7-2l planetary ball mill for 34h, the mass ratio of the ball material is 5:1, the grinding medium is alcohol, the adding amount is 450ml / kg, the milling speed is 228r / min, and 2wt% paraffin is added four hours before the end of the milling. The slurry shall be screened (325 mesh), vacuum dried, screened (150 mesh) and pressed to shape after drying, the pressing pressure shall be 250Mpa, and the blank size shall be (25 × 8 × 6.5) mm. The pressed samples were sintered in vsf-223 vacuum sintering furnace at 1420 ℃ for 1H.
Table 2 composition ratio of alloy%
The three-point bending method was used to determine the bending strength of the sintered sample on sgy-50000 digital compression strength tester. The final strength data was the average value of three samples. The hardness HRA of the sample was measured on the Rockwell hardness tester. The diamond cone indenter with a load of 600N and a cone angle of 120 ° was used.
The cobalt magnetism is measured by the cobalt magnetic tester, and the coercive force is measured by the coercive force meter. After the surface of the sample is grounded into a mirror surface, the mirror surface is corroded by the equal volume mixture of 20% sodium hydroxide solution and 20% potassium cyanide solution, and then the metallurgical observation is performed on the scanning electron microscope at 4000 times. Magnetic properties magnetic properties include co magnetic com and coercive force HC. Com represents the carbon content in the alloy, HC represents the grain size of WC. According to the national standard gb3848-1983, the cobalt magnetism and coercive force of the alloy are determined, and the results are shown in Table 3. It can be seen from table 3 that the relative magnetic saturation COM / CO and coercive force HC decrease with the increase of the content of compound carbide (W, Ti, TA) C.
Table 3 test results of cobalt magnetism and coercive force of tungsten cobalt titanate
Generally speaking, the control of COM content over 85% of cobalt to ensure that the alloy does not decarburize, the COM / CO ratio in group 1 is far lower than 85%, and its HC is also abnormally high. The non-magnetic η phase (co3w3c) appears in the alloy, which belongs to the serious deodorization structure. Therefore, we will only discuss groups 2, 3 and 4:
In this experiment, the total carbon content of the 2, 3 and 4 groups of alloy is 7.18wt%, 7.61wt%, 8.04wt%, the total carbon content increases in turn, and the HC decreases in turn. The size of coercive force is related to the dispersing degree of cobalt phase and carbon content of the alloy. The higher the dispersing degree of cobalt phase is, the greater the coercive force of the alloy is. The dispersing degree of cobalt phase depends on the cobalt content and WC grain size of the alloy. When the cobalt content is determined, the finer the WC grain is, the higher the coercive force is. Therefore, HC can be used as an index to indirectly measure the WC grain size
The content of carbon affects the solid solution of tungsten in cobalt. With the increase of carbon content, the content of tungsten in cobalt phase decreases. The solid solution of tungsten in cobalt is 4wt% in carbon rich alloy and 16wt% in carbon deficient alloy. As w can inhibit the dissolution and precipitation of WC in γ phase, WC is refined and HC is high, so the total carbon content increases in turn, WC grain coarsens and HC decreases. 2.2 the hardness and bending strength test results of the influence of the micro-structure on the mechanical properties of the alloy are shown in Figure 1. The bending strength increases with the increase of the C content of the compound carbide (W, Ti, TA), while the hardness is the opposite.
Fig. 1 hardness and bending strength test results of tungsten cobalt titanate
With the decrease of C content in the compound carbides (W, Ti, TA), HC increases, that is, WC grain refinement. The hardness increases with the refinement of WC grains when the cobalt content is constant. This is because the alloy is strengthened through the grain boundary and phase boundary, and the refinement of carbide grain will increase its solubility in the bonding phase, and the hardness of γ phase will also be increased, which will lead to the increase of the hardness of the whole alloy.
However, the effect of WC grain size on fracture toughness is more complex. For the alloy with grain size smaller than sub micron, the main indentation cracks are crack (intergranular) deflection and toughness bridging, with a small amount of transgranular fracture.
As the WC particle size becomes finer, the probability of defects in the grains decreases, and the strength of the particles increases, resulting in the decrease of transgranular fracture and the increase of intergranular fracture. For the alloy with large grain size, there are only four independent slip systems in the WC crystal. With the increase of WC grain size, the deflection and bifurcation of the crack increase, resulting in the increase of fracture surface area and toughening. Therefore, it is not accurate to judge the bending strength by grain size alone, and its microstructure should also be analyzed.
The metallurgical structure of cemented carbide with four different compound carbides (W, Ti, TA) C content is shown in Figure 2. With the increase of (W, Ti, TA) C content, the shape of WC tends to be regular. Most of WC in Figure 2a are irregular long bars arranged intensively. The average grain size of WC is relatively fine, but its adjacent degree is high, which is caused by the insufficient crystallization of WC, the cobalt phase does not completely wrap WC and the thickness is uneven. And there are coarse triangular WC grains. When η phase decomposes, CO is precipitated, resulting in local co enrichment. At the same time, W and C precipitate on the surrounding WC grains to form coarse triangular WC grains. From figure 2a-2d, it can be seen that the shape, size and distribution of WC grains have obvious changes. WC grains tend to regular plate shape, the coarsening adjacency of grains decreases, and the average free path λ of bonding phase increases. In Figure 2D, WC grains are well developed, with narrow particle size distribution, low coarse adjacent degree of grains, large average free path λ of bonding phase, most of which are about 1.0 μ m plate WC, and a small amount of triangle WC around 200nm, all of which are dispersion distribution.
Fig. 2 metallographic picture of C content of different compound carbides (W, Ti, TA) in cemented carbide
The dissolution precipitation of WC occurs in the sintering process, which makes the WC with higher energy (small particles, edges and corners of particle surface, bulges and contact points) dissolve preferentially, and makes the WC dissolved in liquid phase deposit on the surface of large WC after precipitation, which makes the small WC disappear and the large WC increase, and makes the particles accumulate more tightly depending on the shape adaptation, makes the particle surface tend to be smooth, and makes the two WCS The distance between them is shortened.
In the sintering process of low cobalt alloy, with the increase of total carbon content, the amount of liquid phase and the retention time of liquid phase increase, WC dissolution precipitation process is more full, WC grains develop completely, the surface is more smooth, and the particle size distribution is more uniform. In addition, with the increase of the total carbon content of the alloy, the solid solution of W in CO decreases, and the decrease of W content in the bonding phase will improve the plasticity of the bonding phase, thus increasing the bending strength of the cemented carbide. Therefore, the bending strength increases with the increase of total carbon content.
(1) When the content of CO is constant, with the increase of compound carbide (W, Ti, TA) C content, the total carbon content of the alloy increases, HC decreases, WC grain coarsens, w solution in CO decreases, and the hardness of the alloy decreases.
(2) The metallographic structure of the alloy is closely related to the total carbon content of the alloy. The compound carbide (W, Ti, TA) C content increases, the total carbon content of the alloy increases, the WC grain adjacency decreases, the particle size distribution narrows, the average free path λ of the bonding phase increases, and the bending strength increases.
(3) The best microstructure and properties of wcta are as follows: when the total carbon content is 8.04wt%, the hardness is 91.9hra, and the bending strength is 1108mpa.
|
<urn:uuid:36574c5f-d087-4445-8e62-00fea5bd789d>
|
CC-MAIN-2023-50
|
https://www.meetyoucarbide.com/the-efficacy-of-carbon-content-on-wc-tic-co-cemented-carbide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.909721 | 2,452 | 2.5625 | 3 |
A recent study released in the Journal of Personality and Social Psychology set out to determine the impact extreme protest actions have on public support for social movements.
According to the findings, publicized earlier this year by a team of researchers at the University of Toronto, extreme protest actions that may apply pressure to institutions and raise awareness, could also undermine public support.
The study involved 3,399 participants from six experiments assessing how the various forms of protest behaviors govern support for popular movements. The social movements included in the experiments tackled abortion laws, animal rights, and racial disparities.
During the experiments, protest actions taken by the participants included vandalizing properties and blocking highways.
“In all studies we found effects were driven by diminished social identification with the movement,” the study’s co-authors stated in the findings.
“Observers viewed extreme protest actions to be immoral, reducing observers’ emotional connection to the movement and, in turn, reducing identification with and support for the movement,” the co-authors also determined.
“Taken together with prior research showing that extreme protest actions can be effective for applying pressure to institutions and raising awareness of movements, these findings suggest an activist’s dilemma, in which the same protest actions that may offer certain benefits are also likely to undermine popular support for social movements.”
The study, titled The activist’s dilemma: Extreme protest actions reduce popular support for social movements, was led by Chloe Kovacheff and Matthew Feinberg of the University of Toronto, in addition to Robb Willer of Stanford University.
|
<urn:uuid:65c5f602-66f1-4528-824a-e4f1d18ac6e1>
|
CC-MAIN-2023-50
|
https://www.mentaldaily.com/article/2020/05/extreme-protest-actions-affect-support-for-social-movements-study
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.941136 | 322 | 2.734375 | 3 |
Montefiore in the News
Why Scientists Have Spent Years Mapping This Creature’s Brain
- October 26, 2021
Molecular geneticist, Dr. Scott Emmons, comments on the importance of the connectome, a comprehensive structural wiring diagram of a system's or creature's neurons and synapses. Dr. Emmons published the first complete connectome of an animal, the roundworm Caenorhabditis elegans, in 2019.
Color-enhanced scanning electron micrograph of Drosophila melanogaster, the common fruit fly. For years, scientists have been mapping the fly’s neurons and synapses in an effort to create a comprehensive wiring diagram, or connectome, of its brain.Credit...David Scharf/Science Source
An enormous new analysis of the wiring of the fruit fly brain is a milestone for the young field of modern connectomics, researchers say.
By Emily AnthesPublished Oct. 26, 2021Updated Oct. 27, 2021
The brain of a fruit fly is the size of a poppy seed and about as easy to overlook.
“Most people, I think, don’t even think of the fly as having a brain,” said Vivek Jayaraman, a neuroscientist at the Janelia Research Campus of the Howard Hughes Medical Institute in Virginia. “But, of course, flies lead quite rich lives.”
Flies are capable of sophisticated behaviors, including navigating diverse landscapes, tussling with rivals and serenading potential mates. And their speck-size brains are tremendously complex, containing some 100,000 neurons and tens of millions of connections, or synapses, between them.
Since 2014, a team of scientists at Janelia, in collaboration with researchers at Google, have been mapping these neurons and synapses in an effort to create a comprehensive wiring diagram, also known as a connectome, of the fruit fly brain.
The work, which is continuing, is time-consuming and expensive, even with the help of state-of-the-art machine-learning algorithms. But the data they have released so far is stunning in its detail, composing an atlas of tens of thousands of gnarled neurons in many crucial areas of the fly brain.
And now, in an enormous new paper, being published on Tuesday in the journal eLife, neuroscientists are beginning to show what they can do with it.
By analyzing the connectome of just a small part of the fly brain — the central complex, which plays an important role in navigation — Dr. Jayaraman and his colleagues identified dozens of new neuron types and pinpointed neural circuits that appear to help flies make their way through the world. The work could ultimately help provide insight into how all kinds of animal brains, including our own, process a flood of sensory information and translate it into appropriate action.
It is also a proof of principle for the young field of modern connectomics, which was built on the promise that constructing detailed diagrams of the brain’s wiring would pay scientific dividends.
“It’s really extraordinary,” Dr. Clay Reid, a senior investigator at the Allen Institute for Brain Science in Seattle, said of the new paper. “I think anyone who looks at it will say connectomics is a tool that we need in neuroscience — full stop.”
Electron microscope imagery of fly neurons. Computer algorithms were used to pinpoint where individual neurons connect, then researchers checked the computer’s work and filled in missing pieces.Credit...Matt Staley, Janelia Research Campus
‘Your fly brain is cooked’
The only complete connectome in the animal kingdom belongs to the humble roundworm, C. elegans. The pioneering biologist Sydney Brenner, who would later go on to win a Nobel Prize, started the project in the 1960s. His small team spent years on it, using colored pens to trace all 302 neurons by hand.
“Brenner realized that to understand the nervous system you had to know its structure,” said Scott Emmons, a neuroscientist and geneticist at Albert Einstein College of Medicine, who later used digital techniques to create new C. elegans connectomes. “And that’s true across biology. Structure is so important.”
Brenner and his colleagues published their landmark paper, which clocked in at 340 pages, in 1986.
But the field of modern connectomics did not take off until the 2000s, when advances in imaging and computing finally made it feasible to map the connections in larger brains. In recent years, research teams around the world have started assembling connectomes of zebrafish, songbirds, mice, humans and more.
When the Janelia Research Campus opened in 2006, Gerald Rubin, its founding director, set his sights on the fruit fly. “I don’t want to offend any of my worm colleagues, but I think flies are the simplest brain that actually does interesting, complex behavior,” Dr. Rubin said.
Several different teams at Janelia have embarked on fly connectome projects in the years since, but the work that led to the new paper began in 2014, with the brain of a single, five-day-old female fruit fly.
Researchers cut the fly brain into slabs and then used a technique known as focused-ion beam scanning electron microscopy to image them, layer by painstaking layer. The microscope essentially functioned like a very tiny, very precise nail file, filing away an exceedingly thin layer of the brain, snapping a picture of the exposed tissue and then repeating the process until nothing remained.
Researchers cut a fly brain into exceptionally thin slabs, imaged each with an electron microscope, then stitched the images together to allow scientists to trace each neuron’s path through the brain.CreditCredit...FlyEM/Janelia Research Campus
“You’re simultaneously imaging and cutting off little slices of the fly brain, so they don’t exist after you’re done,” Dr. Jayaraman said. “So if you screw something up, you’re done. Your goose is cooked — or your fly brain is cooked.”
The team then used computer vision software to stitch the millions of resulting images back together into a single, three-dimensional volume and sent it off to Google. There, researchers used advanced machine-learning algorithms to identify each individual neuron and trace its twisting branches.
Finally, the Janelia team used additional computational tools to pinpoint the synapses, and human researchers proofread the computers’ work, correcting errors and refining the wiring diagrams.
Last year, the researchers published the connectome for what they called the “hemibrain,” a large portion of the central fly brain, which includes regions and structures that are crucial for sleep, learning and navigation.
The connectome, which is accessible free online, includes about 25,000 neurons and 20 million synapses, far more than the C. elegans connectome.
“It’s a dramatic scaling up,” said Cori Bargmann, a neuroscientist at the Rockefeller University in New York. “This is a tremendous step toward the goal of working out the connectivity of the brain.”
Welcome to orientation
A population of neurons that is responsible for updating the fly’s internal compass.Credit...FlyEM/Janelia Research Campus
Once the hemibrain connectome was ready, Dr. Jayaraman, an expert on the neuroscience of fly navigation, was eager to dive into the data on the central complex.
The brain region, which contains nearly 3,000 neurons and is present in all insects, helps flies build an internal model of their spatial relationship to the world and then select and execute behaviors appropriate for their circumstances, such as searching for food when they are hungry.
“You’re telling me you can give me the wiring diagram for something like this?” Dr. Jayaraman said. “This is better industrial espionage than you could get by getting insights into the Apple iPhone.”
He and his colleagues pored over the connectome data, studying how the region’s neural circuits were put together.
For instance, Hannah Haberkern, a postdoctoral associate in Dr. Jayaraman’s lab, analyzed the neurons that send sensory information to the ellipsoid body, a doughnut-shape structure that acts as the fly’s internal compass.
Dr. Haberkern found that neurons that are known to transmit information about the polarization of light — a global environmental cue that many animals use for navigation — made more connections to the compass neurons than did neurons that transmit information about other visual features and landmarks.
The neurons dedicated to polarization of light also connect to — and are capable of strongly inhibiting — brain cells that provide information about other navigational cues.
The researchers hypothesize that fly brains may be wired to prioritize information about the global environment when they are navigating — but also that these circuits are flexible, so that when such information is inadequate, they can pay more attention to local features of the landscape. “They have all these fallback strategies,” Dr. Haberkern said.
Fruit fly phone home
Other members of the research team identified specific neural pathways that seem well suited to helping the fly keep track of its head and body orientation, anticipate its future orientation and traveling direction, calculate its current orientation relative to another desired location and then move in that direction.
Imagine, for instance, that a hungry fly temporarily abandons a rotting banana to see whether it can rustle up something better. But after a (literally) fruitless few minutes of exploration, it wants to return to its previous meal.
The connectome data suggests that certain brain cells, technically known as PFL3 neurons, help the fly pull off this maneuver. These neurons receive two critical inputs: They get signals from neurons that track the direction the fly is facing as well as from neurons that may be keeping tabs on the direction of the banana.
After receiving those signals, the PFL3 neurons then send out their own message to a set of turning neurons that prompt the fly to veer off in the correct direction. Dinner is served, again.
Compass neurons, which help flies stay oriented, are part of a neural pathway that may help modulate the insects’ turning actions.CreditCredit...FlyEM/Janelia Research Campus
“Being able to trace that activity through that circuit — from sensory back to motor through this complex intermediate circuit — is really amazing,” said Brad Hulse, a research scientist in Dr. Jayaraman’s lab who led this part of the analysis. The connectome, he added, “showed us a lot more than we thought it was going to.”
And the group’s paper — a draft of which includes 75 figures and stretches to 360 pages — is just the beginning.
“It just really provides this ground truth for exploring this brain region further,” said Stanley Heinze, an expert on insect neuroscience at Lund University in Sweden. “It’s just enormously impressive.”
And just plain enormous. “I wouldn’t really treat it as a paper but more as a book,” Dr. Heinze said.
In fact, the paper is so large that the preprint server bioRxiv initially declined to publish it, perhaps because the administrators — understandably — thought it actually was a book, Dr. Jayaraman said. (The server ultimately did post the study, after a few extra days of processing, he noted.)
The paper’s publication in the journal eLife “required some special permissions and back-and-forth with editorial staff,” Dr. Jayaraman added.
There are limitations to what a snapshot of a single brain at a single moment in time can reveal, and connectomes do not capture everything of interest in an animal brain. (Janelia’s hemibrain connectome omits glial cells, for instance, which perform all sorts of important tasks in the brain.)
Dr. Jayaraman and his colleagues stressed that they would not have been able to infer so much from the connectome if not for decades of prior research, by many other scientists, into fruit fly behavior and basic neuron physiology and function, as well as theoretical neuroscience work.
But the wiring diagrams can help researchers investigate existing theories and generate better hypotheses, figuring out what questions to ask and which experiments to conduct.
“Most people, I think, don’t even think of the fly as having a brain,” said Vivek Jayaraman, a neuroscientist at the Janelia Research Campus of the Howard Hughes Medical Institute in Virginia. “But, of course, flies lead quite rich lives.”Credit...Peter Yeeles/Alamy
“Now what we’re really excited about is taking those ideas that the connectome inspired and going back to the microscope, going back to our electrodes and actually recording the brain and seeing if those ideas are true,” Dr. Hulse said.
Of course, one could — and some have — asked why a fruit fly’s brain circuitry matters.
“I get asked this at the holidays a lot,” Dr. Hulse said.
Flies are not mice or chimps or humans, but their brains perform some of the same basic tasks. Understanding the basic neural circuitry in an insect could provide important clues to how other animal brains approach similar problems, said David Van Essen, a neuroscientist at Washington University in St. Louis.
Gaining a deep understanding of the fly’s brain “also gives us insights that are very relevant to the understanding of mammalian, and even human, brains and behavior,” he said.
Creating connectomes of larger, more complex brains will be enormously challenging. The mouse brain contains roughly 70 million neurons, the human brain a whopping 86 billion.
But the central complex paper is decidedly not a one-off; detailed studies of regional mouse and human connectomes are currently in the pipeline, Dr. Reid said: “There’s a lot more to come.”
|
<urn:uuid:9f98b8f7-721c-414b-bcff-a00ea585d75f>
|
CC-MAIN-2023-50
|
https://www.montefiore.org/why-scientists-have-spent-years-mapping-this-creature-s-brain
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.937037 | 2,966 | 2.96875 | 3 |
The Zika Virus has come to South Carolina. The case was the first confirmed case of Zika in the state and was transmitted to the patient while they were traveling out of the country in an area where Zika is actively being transmitted.
The person began feeling ill while they were still abroad. By the time the patient returned to South Carolina they were no longer sick or contagious, bringing no risk for spreading Zika home.
The South Carolina Department of Health and Environmental Control SCDHEC is closely monitoring the arrival of any new disease that arrives in the state in an effort to slow or stop the spreading of the illness. SCDHEC monitors the mosquito population and mosquito-borne diseases.
Education & Prevention is Our Best Protection Against Zika
With no cases of Zika being locally transmitted in North or South Carolina, it is important to understand that all precautions taken are to keep it this way. The Zika Virus can spread to mosquitoes from infected humans. This fact allows for the easy spread of the virus if someone does come back with a Zika infection and is bitten by local mosquitoes. The Aedes Aegypti & Aedes Albopictus mosquitoes are both present in the area and are at present the main vectors in the Zika outbreaks in Mexico, the Caribbean and South America.
Zika Virus can also be transmitted through sexual activity. With so many ways for the virus to be easily spread and the danger it brings to pregnant women and their infants, it is important to stay vigilant with prevention efforts.
Remember to follow the 5 T’s of mosquito control and consider our traditional mosquito barrier treatment. Eliminating 85-90% of the mosquitos in your yard and lasting for up to 3 weeks, our mosquito treatment is our most popular service. Sign up for the season and we’ll automatically respray for a season of mosquito-free outdoor living.
|
<urn:uuid:ffe844cf-665d-468b-ae22-5a46babe79f7>
|
CC-MAIN-2023-50
|
https://www.mosquitosquad.com/wilmington-crystal-coast/about-us/blog/disease-health-special-reports/the-first-case-of-zika-virus-confirmed-in-south-/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.958255 | 373 | 2.84375 | 3 |
What to Do if Your Tree is Invested With Ants
If you have a tree that is infested with ants, then you are going to want to take the necessary steps to eradicate that problem. Ants frequently travel up and down the trunk of a tree and disappear into the cavity, where they nest. Due to those nesting opportunities and the relative comfort ants experience when settled inside a tree, if this isn’t handled as soon as possible, the number of ants in the tree is likely to continue to grow.
The big, black ants that predominantly hang out inside of the tree are called carpenter ants. These ants almost always attract attention, whether they are crawling on the floor in your house, entrenched in your flowers, tunneling into the ground, or, of course, going in and out of a tree trunk.
Carpenter ants love logs and stumps, but they also love to nest in trees, especially older ones that have a lot of wood that is dead and/or decayed. When nesting, carpenter ants use trees with wood that is already decayed because of the high amount of moisture found in those trees. The softness and brittle nature of the wood allow the carpenter ants the ability to easily set up and establish their colonies. The decay could have been caused by a variety of factors: environmental conditions, stress, disease, or even other insects doing damage to the limbs and branches, which severely weakened them. Whatever it is that causes the initial damage, it leads to wood decay, and once that sets in, the carpenter ants are able to move in and colonize.
It is important to remember that carpenter ants are not the ones who are destroying the tree initially, they are simply taking advantage of conditions that have been left for them by circumstance. In a sense, they are behaving like vultures, seizing an opportunity that they didn’t actually create. The carpenter ants may make the damage worse and help prevent the tree from gaining any further strength, but they are not the cause of the problem itself when it first occurs. Once the carpenter ants pounce, they nest by chewing tunnels through the wood. However, the carpenter ants cannot eat the wood, so instead, the wood gets cast aside and tossed away from the nest as piles of sawdust, which may contain a combination of discarded wood and dead insects.
So, why exactly is it important to rid the tree of these carpenter ants?
While they aren’t the ones doing the actual damage, they are able to play a role in stopping the tree from getting back to full strength. However, even more importantly, it is incredibly important to make sure these carpenter ants are kept out of other nearby structures where they can be incredibly disruptive, like a house.
It is essential, however, to avoid sealing tree cavities or plugging them to treat wounds because they are not necessary and will not do anything to stop decay or deter carpenter ants from colonizing.
It is also a bad idea to cut down the tree just to avoid problems the ants can cause because the carpenter ants can just go to a different tree on the property or one that is nearby. Unless you want to cut down every tree you have, the best option is to go through the proper process of eliminating the ants, rather than eliminating entire trees. Plus, if you cut down all of the trees just to eliminate the ants, you won’t actually eliminate them, as they will just be emboldened to go elsewhere, like the house you wanted to avoid them spreading to in the first place.
And, if carpenter ants do get into a building of some sort, they can infect virtually anything made of lumber, including window frames, deck boards, and door sills. However, in virtually all cases, the area is already very moist and as such, it has a pre-existing weakness that the carpenter ants, vulture-like opportunists that they are, can exploit.
Ways to Kill off Ants in Your Tree
1. Spraying ant powder all around the base of the tree is far and away the easiest way to deal with a tree infested with ants since it doesn’t take much effort to apply and is effective at killing the ants when they leave the tree to gather food.
The powder not only kills the ants who are touched by it, but also kills many of the other ants because they will eat their own dead and in doing so, absorb the poison themselves. While this is an easy process, it is important to remember to reapply after it rains, as the water will wipe out the powder and stop the ants from being killed.
2. We have found that ants typically live above the entrance hole. We assume this is the case so that any water that infiltrates the entrance hole can’t seep downward and flood the nest. If the entrance hole can be safely reached, activate a can of room defogger into the opening (the type that is meant to bug bomb a house for spiders and other bugs). If they are living above the hole, they will come flooding out by the thousands. Have a few aerosol cans of Raid or Ortho Ant Killer ready and spray the ants as they evacuate their ‘protected’ environment. Between those that are killed instantly and those that will feed off of the dead ant carcasses later, the problem should be able to be brought under control fairly quickly.
If you find that your infestation caused significant tree death and you want to evaluate if your tree is worth saving or needs to be removed before it causes an unsafe environment, contact us at Mr. Tree to make an appointment with one of our certified arborists.
|
<urn:uuid:2276e8ce-0704-49f6-8c0d-898040626c81>
|
CC-MAIN-2023-50
|
https://www.mrtreeservices.com/blog/tree-invested-ants/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.965365 | 1,171 | 2.90625 | 3 |
Get free samples written by our Top-Notch subject experts for taking assignment help UK services.
Child labor harms children's health and general wellbeing, especially in its worst form. Efforts of growth by developing countries are perceived to be a major obstacle. This reduces the likelihood of a well paying job in the future through poor comparative knowledge and skills. In particular in the United Nations Convention on the Rights of the Child and the ILO Conventions the ILO are international legislative instruments that tackle child labor issues and call for an end to their worst types. In some developed countries, pending foreign and domestic child labor initiatives, the situation remains socially acceptable. The problem of too many child workers is still facing Bangladesh. The key cause of increased child labor is now a few days of poverty. Bangladesh has taken a number of measures in recent years to resolve the crisis, including legal action. This paper reviews the situation of child labor in Bangladesh and the current child labor legal system and reveals a lag behind Bangladesh's legal and political structure.
Statistical surveys confirm that in Bangladesh, pay or help for a family farm or business is usual. In 2002/2003, the country in which most comprehensive statistical investigation was conducted was 7.4 million children aged between 5 and 17 years, of which 3.2 million were in employment as children's labour under circumstances. The research also included 1.3 million children in risky work. A more recent study showed the prevalence of child labor in Bangladesh.
Figure 1 Child Labour Participation Rate, Aged 10-14 Years
Source- Quattri and Watkins, 2019
It is estimated that this study offers employment for 3.55 million children between the ages of 7-14 and 2.8 million children between 15 and 17 years, for both wages and benefits and jobs in family businesses and farmers. This report estimates a total of 5.1 million child labor children. Roughly 1,3 million aged 5 - 11 years in all kinds of jobs were hired. More than 1.7 million people aged between 12-14 worked more than 14 hours a week every day and worked more hours than "light jobs." Finally, there were 2 million people aged between 15 and 17 engaged in risky jobs. However, it is important to remember that the study cannot take into account the worst forms of child labor, other than hazardous labor, such as slavery, prostitution work and criminal activities, because of data restrictions (Rahman, et. al., 2019).
The study shows that the likelihood of working children is similar in rural and urban areas in Bangladesh. Since the majority of the population lives in rural areas, it is not shocking that the majority of working children live in rural areas. But the proportion of working children in rural and urban areas is similar. The research has indicated that the workforce share of children is 20% over the age of 14. Working hours often increase with age. In total, the study found a higher number of boys than girls.
Figure 2 Poverty and Hazardous Child Labor in Bangladesh
Source- Islam, et. al., 2019
The argument by Brasilia stresses in reality, the government of Bangladesh has taken a range of measures to deal with child labor. The national policies and laws, the country has signed, ratified and resolved the problems. It highlights that the governments are in charge of measures for preventing and eradicating child labor and particularly the worst kind of child rescue in partnership with employers' and labor organizations as well as NGOs and other civil society actors and the most recent formal international child labor policy paper. However, a thorough analysis reveals a deficiency in the legal system of child labor. The following paragraphs outline Bangladesh's obligations to international child labor as well as national child labor legislation. By means of ratification conventions, the Bangladeshi State is obliged to enforce the relevant provisions in its internal legal system. The State shall enact national laws that apply the requirements and shall act as provided by policies and program for the application and execution of those laws. Any failure to do this will lead to the international responsibility of Bangladesh under international law (Biswas, et. al., 2019).
The above report concluded that Legal reforms in Bangladesh have been taken in recent decades to solve the issue of child labor. The United Nations CRC and the International Labor Organization Convention No182 have been ratified, and the Labor Act 2006, the 2012 Deterrence and Suppression Act and the Children's Act 2013 have been ratified. However, even in the successful implementation of these agreements, decisive gaps remain in the overall legal system for child labor. In addition, the execution of these acts remains an immense task. Other signs of progress include the introduction of the 2010 National Policy on the Elimination of Child Labor and the national action plan (NAP) and the 2010. Bangladesh has also promised to update its child labor data through the implementation of a new child labor census after the most comprehensive official study was undertaken on child labor from 2002-2003. However, further steps should also be taken in the policy area in order to handle child labor effectively. In addition, it also takes long periods. In short, there are too many challenges to be overcome, despite the successes. These shortcomings and gaps are outlined in the following paragraphs and how to correct them.
Biswas, R.K., Khan, J.R. and Kabir, E., 2019. Trend of child marriage in Bangladesh: A reflection on significant socioeconomic factors. Children and Youth Services Review, 104, p.104382.
Elahi, S., Hosen, M.D. and Nizam, M.E.H., 2019. Comparative analysis in RMG industries before and after Rana Plaza incident in Bangladesh. J Textile Eng Fashion Technol, 5(4), pp.202-211.
Islam, M., Alim, M.A., Hawlader, S.C., Mohiuddin, M. and Sarker, A.K., 2019. Assessment and Analysis of the Overall Situation of Women and Children: Bangladesh Scenario. International Journal of Public Administration, 4(1), pp.026-030.
Quattri, M. and Watkins, K., 2019. Child labour and education-A survey of slum settlements in Dhaka (Bangladesh). World Development Perspectives, 13, pp.50-66.
Rahman, M.A., Rahman, M.S., Alam, M.A., Hasan, M. and Rahul, M.I.H., 2019. Child labor in the Era of Sustainable Development: insights from Jhenaidah City of Bangladesh.
Social Psychology Introduction - Social Psychology Get free...Read more
Understanding And Managing Data Get free samples written by our Top-Notch...Read more
Film Review: Queen of South Assignment 1. Introduction Get free samples...Read more
Crime media and Culture Assignment 1. IntroductionGet free samples written by...Read more
How do the leadershipstrategies of middle leaders affect students’...Read more
Financial Statement Assignment Introduction - Financial Statement Get...Read more
Get your doubts & queries resolved anytime, anywhere.
Receive your order within the given deadline.
Get original assignments written from scratch.
Highly-qualified writers with unmatched writing skills.
Ph.D. Writers For Best Assistance
No AI Generated Content
offer valid for limited time only*
|
<urn:uuid:3cfc118c-e3a5-4005-9a30-2202eacac393>
|
CC-MAIN-2023-50
|
https://www.nativeassignmenthelp.co.uk/ba30032e-academic-performance-assessment-assignment-sample
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.939908 | 1,493 | 3.25 | 3 |
Overview Of The Importance Of Data Security In Today’s Digital Landscape
Data security has become increasingly important in today’s digital landscape, where data breaches have become more common and sophisticated. These breaches can lead to sensitive information being compromised, such as personal identification details and financial data. This can result in identity theft, fraud, or even blackmail.
The importance of data security cannot be overstated. It is crucial for companies to prioritize the protection of their customers’ information by implementing robust security measures and protocols. This responsibility falls on the shoulders of data security associates who work tirelessly to secure networks and systems against potential threats.
The role of a Data Security Associate
The role of a Data Security Associate has become increasingly important. These professionals are responsible for ensuring that sensitive data is protected against unauthorized access, theft, or misuse. They work to develop and implement security protocols that keep data safe from cyber attacks and other threats.
Data Security Associate: A Lucrative and Fulfilling Career Choice
The Growing Demand for Data Security Professionals
Cyber Threats And Data Breaches
Rise In Cyber Threats And Data Breaches
This increase in cyber threats has also led to a higher demand for professionals who specialize in data security. A career as a Data Security Associate can be both lucrative and fulfilling, as they play a crucial role in protecting sensitive information from unauthorized access. They are responsible for identifying potential vulnerabilities in systems, implementing effective security measures, and staying up-to-date on the latest advancements in cybersecurity.
Increased Reliance On Technology And Data-Driven Decision Making
Businesses are using data to make informed decisions, identify patterns and trends in consumer behavior, and gain a competitive edge. As a result, there is a growing demand for professionals who can analyze and interpret data effectively. A career as a Data Security Associate can be both lucrative and fulfilling in this digital age.
Key Responsibilities of a Data Security Associate
Protecting Sensitive Data From Unauthorized Access
As a Data Security Associate, it is your responsibility to ensure that confidential information remains secure and protected from any form of malicious attack. There are several ways you can protect sensitive data, including using strong passwords, encrypting files and folders, regularly updating software, and implementing multi-factor authentication.
Conducting Risk Assessments And Vulnerability Testing
As a data security associate, it is necessary to identify potential threats and vulnerabilities that can potentially compromise the confidentiality, integrity or availability of sensitive information. Risk assessments entail identifying possible risks and evaluating their impact on the organization’s information systems. Vulnerability testing involves scanning the network for vulnerabilities and assessing how easily they can be exploited.
A thorough risk assessment helps in identifying areas where controls need to be strengthened or implemented. This process also identifies weaknesses in existing controls that may require additional attention. Regular vulnerability testing ensures that any new vulnerabilities discovered are remediated promptly before they can be exploited by attackers. By conducting these tests regularly, data security associates ensure that all systems within an organization are up-to-date with protection against known vulnerabilities.
Developing And Implementing Security Protocols
As a data security associate, developing and implementing security protocols is an essential part of your job. Your primary responsibility is to ensure that all sensitive information within your organization stays safe from unauthorized access or exposure. This means creating policies, procedures, and guidelines for employees to follow when handling sensitive data.
To develop effective security protocols, you need to have a clear understanding of the types of threats that pose risks to your organization’s data. You will need to conduct regular assessments to identify vulnerabilities in your system and come up with solutions that address these weaknesses. Additionally, it is crucial to keep up-to-date with emerging cybersecurity trends and new technologies as they can significantly impact the effectiveness of your security protocols.
Lucrative Career Opportunities
High Demand Leads To Competitive Salaries
Data security has become a top priority in the modern digital era, and as a result, job opportunities for data security associates have surged.
According to recent surveys conducted by salary tracking websites such as Glassdoor and Payscale, data security associates can earn an average annual salary of $80,000-$100,000 depending on their level of experience and expertise. However, these figures are just the tip of the iceberg when it comes to total compensation; many companies now offer sign-on bonuses or relocation packages to attract top talent.
Job Growth And Advancement Prospects
Data Security Associate is a lucrative and fulfilling career choice with great job growth and advancement prospects. The field of data security offers numerous opportunities for professional development and career advancement. With experience and expertise in the field, data security associates can advance to higher-level positions such as information security analysts or chief information officers. Additionally, many organizations offer training programs to upskill employees in new technologies, enabling them to take on more challenging roles within their organization.
Skillset Required for Data Security Associates
Strong Knowledge Of Information Security Principles
A career as a Data Security Associate requires a strong knowledge of information security principles. This includes the ability to identify and assess potential security risks, develop strategies to mitigate those risks and implement security measures to protect sensitive data. In addition, professionals in this field must stay up-to-date with the latest trends and technologies in cybersecurity.
Proficiency In Security Tools And Technologies
A Data Security Associate must possess an in-depth understanding of the latest security tools and technologies. This includes knowledge of firewalls, antivirus software, intrusion detection/prevention systems (IDS/IPS), encryption methods and techniques, network access control (NAC) solutions, and more. The ability to work with these advanced tools effectively is crucial for success in this field.
Moreover, proficiency in security-related programming languages such as Python or Java can prove beneficial while working on complex projects involving data protection and cybersecurity measures. A Data Security Associate should also be up-to-date with the latest trends in cybersecurity technology by attending seminars, and workshops or completing online courses regularly.
Analytical Thinking And Problem-Solving Abilities
Data security associates must be able to analyze complex information systems and identify potential vulnerabilities that could lead to security breaches. Therefore, having strong analytical skills is crucial.
Problem-solving abilities are also critical for data security associates as they must be able to troubleshoot issues quickly and effectively. This requires the ability to approach problems with a systematic mindset, evaluate different solutions based on their feasibility and effectiveness, and implement the best course of action promptly. Moreover, data security associates must continuously stay up-to-date with new technologies in cybersecurity as hackers often find innovative ways of breaching secure networks.
Educational and Professional Pathways
Relevant Degrees And Certifications
A degree in computer science or information technology can greatly benefit those pursuing a career as a data security associate. These degrees provide students with foundational knowledge of computing systems, programming languages, and network architecture. Additionally, certifications such as Certified Information Systems Security Professional (CISSP) or CompTIA Security+ validate an individual’s expertise in security protocols and practices.
Another relevant certification is the Certified Ethical Hacker (CEH), which demonstrates proficiency in identifying potential vulnerabilities within computer systems through ethical hacking techniques. This certification is particularly useful for those interested in penetration testing roles within the field of data security.
Importance Of Ongoing Professional Development
By participating in ongoing training and education programs, data security associates can stay up-to-date on the latest threats and techniques for preventing them.
Not only does ongoing professional development help data security associates stay current with industry trends, but it also demonstrates their commitment to their careers. Employers value employees who are willing to invest time and effort into improving their skills and knowledge. By staying ahead of the curve, data security associates can position themselves as valuable assets to any organization.
Ongoing professional development can lead to personal fulfillment by providing opportunities for growth and advancement. As data security professionals develop new skills and expand their knowledge base, they may find themselves qualified for leadership roles or specialized positions within their organizations. This not only provides a sense of accomplishment but also opens doors for higher salaries and greater job satisfaction.
Varied Work Environments
Opportunities In Various Industries And Sectors
One industry that is currently offering a wide range of opportunities is the data security industry. This has led to an increased demand for skilled professionals who can help safeguard sensitive data against unauthorized access or theft.
In addition to the tech industry, other sectors such as healthcare, finance, and government also require advanced data security measures due to the nature of their work. As a result, there are numerous job openings for data security associates across various industries. These roles typically involve analyzing existing systems and identifying potential vulnerabilities while recommending solutions to mitigate risk.
For individuals interested in pursuing a career in the field of data security, there are several paths one can take including obtaining relevant certifications or degrees such as Certified Information Systems Security Professional (CISSP) or Bachelor’s degree in Cybersecurity.
In-House Roles Vs. Consulting Positions
In an in-house role, you work for a specific company and become familiar with their culture, operations, and expectations. You may also have more stability in your job as you are not reliant on finding new clients to sustain your income. However, there may be less variety in the types of projects you work on.
On the other hand, consulting positions offer more diversity in terms of clients and projects. This can provide a higher level of excitement as well as experience working with different industries. Consulting also allows for greater flexibility in terms of schedule and location as many assignments can be completed remotely. However, there is a certain level of uncertainty associated with consulting work since it relies on securing new clients to maintain a consistent income.
Advantages of a Career in Data Security
Variety Of Roles Available:
From entry-level positions to management roles, there are various job titles that cater to different levels of experience and expertise. Moreover, companies across industries require skilled professionals capable of identifying vulnerabilities in their systems and implementing measures to prevent or mitigate potential breaches.
Job Stability And Security
As the world becomes increasingly digital, companies are more focused on data security than ever before. This means that jobs in the field of data security have become much more stable and secure. In fact, a career as a Data Security Associate can be both lucrative and fulfilling.
Diversity of Projects and Challenges
As a data security associate, you can expect to work on an array of projects that will challenge your skills and knowledge. These projects may vary in complexity and scope, from developing security protocols for small businesses to designing comprehensive cybersecurity strategies for large corporations. This diversity in project type means that your role will never be monotonous or routine.
In addition to working on different types of projects, you’ll also face unique challenges as a data security associate. One day, you might be troubleshooting network vulnerabilities or identifying potential threats within an organization while the next day, you could be implementing new software solutions or training employees on best practices for cybersecurity. The dynamic nature of the field ensures that each new challenge presents an opportunity to learn and grow professionally.
Collaboration and Interdisciplinary Work
An interdisciplinary approach is also needed in order to effectively address the complex issues associated with data protection. Given that cybersecurity touches on so many different areas of an organization—from financial reporting to customer privacy—it is critical for data security associates to be able to collaborate with colleagues from other fields in order to develop holistic solutions.
Working With It Teams, Management, And Stakeholders
Working as a data security associate requires close collaboration with various departments including IT teams, management, and stakeholders. It is important for data security associates to establish clear communication channels with these groups in order to effectively identify potential risks and implement appropriate measures to mitigate them. In working with IT teams, it is crucial for data security associates to have an understanding of the technical aspects of the organization’s infrastructure and be able to communicate any vulnerabilities or potential threats that may need attention.
In addition to IT teams, effective collaboration with management is also essential. Data security associates should work closely with management in order to ensure that policies and procedures are followed by all employees within the organization. This includes regularly conducting training sessions on best practices for information security, monitoring compliance with established protocols, and providing feedback on areas where improvements can be made.
Importance of Communication Skills
As a data security associate, having strong communication skills is vital for success in the field. This is because data security involves working with various stakeholders such as clients, colleagues, and management. Effective communication helps to ensure that everyone involved understands the risks and benefits of different approaches to data protection.
Communication also plays a crucial role in crisis management situations where swift and clear messaging can help prevent or mitigate potential breaches. In addition to verbal communication, written communication skills are also necessary for creating reports, policies, and procedures that clearly outline data security protocols.
Beyond technical expertise, employers seek candidates who possess strong interpersonal skills like active listening, empathy, and collaboration. These qualities help to build trust with clients and colleagues alike while fostering a culture of transparency around sensitive information handling practices.
Work-Life Balance and Flexibility
The field of data security often allows for flexibility in terms of work hours and even location. This flexibility can be incredibly beneficial for those who need to balance personal responsibilities with their career.
One way to achieve work-life balance as a data security associate is by taking advantage of remote work opportunities. With the right technology and communication tools, many tasks can be accomplished from home or another remote location. This option provides more time and freedom to manage personal commitments while still maintaining high levels of performance at work.
Another important aspect of achieving work-life balance is setting boundaries between professional and personal life. It’s easy for someone in the field of data security to get absorbed in their work, but it’s crucial to disconnect at certain times throughout the day. Setting specific times when you are available or unavailable for calls or emails outside your working hours will help maintain a healthy division between your professional and personal life.
Overcoming Challenges in the Field
One common challenge is keeping up with the constantly evolving technology and security threats. Cybercriminals are always finding new ways to breach systems, which means that data security professionals must stay updated on the latest threats and preventative measures.
Another challenge that data security associates face is balancing the need for strong security measures with maintaining user accessibility. Implementing stringent security protocols may protect sensitive data, but it can also make it difficult for authorized users to access information quickly and efficiently. This delicate balance requires careful planning and collaboration between IT teams and business units.
Dealing With Sophisticated Cyber Threats
The increasing sophistication of cyber threats has led to a rise in demand for professionals who can deal with them. As a data security associate, you will be responsible for protecting information systems from unauthorized access and maintaining the confidentiality, integrity, and availability of data. You will also assist in developing and implementing security policies and procedures.
To effectively handle sophisticated cyber threats, you must have a deep understanding of the latest security technologies and protocols. You should be able to identify potential vulnerabilities in an organization’s system and take proactive measures to prevent any attacks. Additionally, you need excellent analytical skills to quickly analyze complex data sets and identify patterns that may indicate an ongoing or impending attack.
Being a data security associate is not only lucrative but also fulfilling as you play a crucial role in protecting sensitive information from malicious attackers. With the ever-increasing need for cybersecurity professionals due to increasingly sophisticated cyberattacks, it’s no surprise that this career choice is becoming an attractive option for many people looking for job stability.
Iit is important to be well-versed in the regulations and laws governing data protection to ensure that organizations comply with them. Failure to comply can lead to serious consequences such as hefty fines, loss of reputation, and even legal action.
To excel in this career field, one should have an understanding of various regulatory frameworks such as GDPR, HIPAA, and CCPA. It is also essential to keep up-to-date with new developments and changes in the law that may impact how businesses handle sensitive information. As a data security associate, you will work closely with different departments within an organization to ensure that they are following all necessary rules and regulations.
Building a Successful Career
To build a successful career in data security, it is essential to keep up with the latest industry trends and advancements. This means staying informed about new technologies, techniques, and best practices related to information security. Additionally, networking with other professionals in the field can help you learn about job opportunities, stay up-to-date on emerging trends, and establish yourself as an expert.
Developing your soft skills can also play a crucial role in building a successful career as a data security associate. Effective communication skills are vital when working with clients or team members who may not have technical expertise. Being able to explain complex concepts in simple terms can help you provide value and build trust with your colleagues or clients alike.
Becoming a data security associate is an excellent career choice for those who are interested in technology and cybersecurity. With the increasing amount of sensitive information being stored online, there is a growing demand for professionals who can ensure that this data remains secure from cyber threats. As a data security associate, you will have the opportunity to work with cutting-edge technology and play an important role in protecting valuable information.
Furthermore, this career path offers excellent earning potential and opportunities for growth within the field. Many companies offer competitive salaries and benefits packages to attract top talent in the field of cybersecurity. Additionally, as you gain experience and expertise in your role as a data security associate, there may be opportunities to advance into more senior positions or specialize in specific areas of cybersecurity.
What Qualifications Do I Need To Become A Data Security Associate?
Becoming a Data Security Associate requires a certain level of education and specific qualifications. Most employers require at least a Bachelor’s degree in Computer Science, Information Technology, or any related field. In addition, aspiring candidates may need to have certification in cybersecurity to be considered for the position. The most common certifications required by employers include CompTIA Security+, Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker (CEH).
Apart from formal education and certification, applicants for the role of Data Security Associate should have practical experience in data security operations. Employers look out for candidates with experience working with security software such as firewalls, intrusion detection systems, vulnerability scanners, and antivirus software. Additionally, being knowledgeable about network protocols like TCP/IP is essential.
Is There A Demand For Data Security Professionals Globally?
The demand for data security professionals is growing at an unprecedented rate, making it one of the most sought-after career choices globally. With the increasing number of cyber threats and data breaches, there’s a dire need for individuals with expertise in data security to protect sensitive information.
Data security professionals are required in every industry, including healthcare, finance, government agencies, and retail companies. They are responsible for designing and implementing security protocols to safeguard organizational systems from malicious attacks. The average salary for a Data Security Associate is $75,000 per year in the United States alone.
How Does The Role Of A Data Security Associate Differ From Other Cybersecurity Roles?
A data security associate works closely with IT teams to identify potential threats, monitor networks for suspicious activity, and implement security protocols that prevent unauthorized access. Unlike other cybersecurity roles, data security associates are more focused on preventing data breaches than responding to them.
Moreover, a data security associate typically has a broader skill set than other cybersecurity professionals. They need to possess knowledge of computer systems, network architecture, cryptography, and risk management. Data security associates must also be familiar with regulatory compliance requirements such as HIPAA or GDPR standards.
|
<urn:uuid:4f7a9a3e-f3f5-4a8c-b3f5-c0ad2a262da1>
|
CC-MAIN-2023-50
|
https://www.newsoftwares.net/blog/a-lucrative-and-fulfilling-career-choice/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.934501 | 4,072 | 2.84375 | 3 |
What is acne?
Many of us have suffered from acne and its harmful effects on our mental health at some point in our lives. Now, there are several reasons why one suffers from acne; it may be hormonal or environmental. Acne Vulgaris, most commonly known as acne, is the formation of cysts, pimples, blackheads, whiteheads, etc., on the face. Consequently, these pimples leave behind deep scars on the skin.
The psychological effect:
Imagine a 14-year old suffering from acne and the effect it has on her self-esteem. The world has convinced everyone that crystal clear skin is the definition of beauty, and anything other than it is not acceptable. The pressure such beauty standards place on a teenager results in low self-esteem, body-image issues, depression, and even anxiety. The struggle is not easy, but it is possible to reach a happy ending.
How to battle acne vulgaris?
- Consult a dermatologist:
Instead of trying various remedies and self-medication at home based on other people's opinions, it is better to consult a dermatologist as each skin is unique and requires different treatment. The primary cause of acne vulgaris is the overproduction of sebum or bacterial invasion. For such cases, the dermatologist will either prescribe a course of antibiotics or isotretinoin. The course is usually a few months long. Therefore, to save money and avoid unlimited trips to a pharmacy every month, it is better to register in a 90-Day Meds program at a reliable online pharmacy.
Dealing with acne is difficult as it often invites much-unsolicited advice and bullying from the surroundings. Several research studies have proven that acne is directly linked to the development and progression of depression. Thus, it is the people's responsibility to constantly remind individuals suffering from acne that they are beautiful and worthy. It may help in elevating self-esteem and making the individual feel less insecure.
- Focus on diet:
A balanced diet can aid in the treatment of acne. Foods having a high-glycemic-index and rich in Trans fatty acids can worsen acne. Hence, diet and acne are interlinked with each other. It is advised to have a diet full of vitamins, omega-3-fatty acids, and anti-oxidants to help manage acne.
- Take care of your skin:
You cannot expect your skin to heal magically without any efforts. Special care is required for skin suffering from acne. On that account, it is important to wash the face properly to make sure all dirt and sebum are removed, moisturize properly, and use sunscreen before going out. Specific lifestyle changes can help in turning things around positively.
The journey of suffering from acne is not an easy one and requires a lot of mental energy and strength. Often, everything spirals down into a bottomless, dark pit of depression, but recovery is easy if help is offered from surroundings. It is our responsibility to make individuals with acne feel beautiful and worthy no matter what. The world is already harsh enough; a little kindness goes a really long way.
|
<urn:uuid:d34cc5f2-a06a-4a72-a3fa-228e9ed57d1d>
|
CC-MAIN-2023-50
|
https://www.newspronto.com/health/80763-battling-with-acne-vulgaris
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.943096 | 636 | 3.078125 | 3 |
Some may mistakenly assume Allah and God are one in the same, yet similarity alone cannot determine their identity.
Muslims worship a single God who lives within themselves, is merciful, and all-powerful; Christians do likewise. Since both groups revere one and the same deity, it should come as no surprise that Muslims and Christians revere one and the same Lord.
Table of Contents
The Origin of the Names
Americans’ perception of Allah often conjures images of terrorists, suicide bombers and killers who shout “Allahu akbar!” before carrying out destructive acts resonates fear and outrage. Yet what exactly is its origin in Arabic?
Allah, an Arabic name for God, originated as an acronym from two words in Arabic: al- (the) and ilah (deity, masculine form). This Arabic term for Him predated even Muhammad’s introduction of Islam into world culture; furthermore it shares similarities with Hebrew names like Elohim or El.
Arabic terms were already being used to refer to God in some ancient Hebrew texts dating back as far as 9th century BCE! Additionally, Christians who read Tanakh and Gospels in their original languages (Aramaic or Hebrew) would recognize it.
Arab Christians and Middle Eastern Jews may refer to God as Allah in their prayer services or worship practices in their home countries; while this may seem strange to American Christians, this is just how people worship and pray to God there.
People who pray in Arabic or other Middle Eastern languages understand that Allah is the name of the one true God, whom they regard as the Creator of all that exists within this universe and beyond. Furthermore, they believe He answers prayers and forgives sins – though both Christians and Muslims refer to Allah. However, each religion views their version of this Deity differently.
Muslims believe that Allah, or The One True God, created both life and man on Earth. Muslims also hold that He alone can save people from sin; Christianity on the other hand believes Jesus paid for all humanity’s sins on His Cross so as to provide salvation.
While some Muslims believe Allah to be the sole valid term for God, others use God instead as their term of reference when translating Korans into English. Furthermore, Muslim scholars usually opt for God instead of Allah when translating into English versions of their literature.
The Meaning of the Names
Many people do not comprehend why Muslims refer to God by the Arabic term Allah instead, believing this to be a different god than those mentioned in the Bible or Jewish traditions. But this is simply not so; Allah simply refers to one god within Islam – there can only ever be one Allah!
Allah may derive its meaning from Aramaic al-ilah, which translates as “the god.” This word was widely used across Arabia for centuries prior to Muhammad’s birth and often refers to 360 deities venerated at Mecca’s Ka’aba Mosque.
Though God of the Bible and Allah of Islam share some similarities, they cannot be one in the same. Both religions believe in a monotheistic god who created all things, is all-powerful and merciful – as well as having sent prophets to reveal his will and provide guidance via scriptures.
There are important distinctions between the two gods, however. Most importantly, Allah is impersonal while God of the Bible is personal – this makes a significant impactful difference on how believers interact with their respective religion.
Another significant distinction is that the God of the Bible sacrificed His son in order to save humanity from sin; while Allah does not share these characteristics. Furthermore, while Allah demands all sinners pay for their crimes directly themselves while in contrast with this God from Scripture there exists a means for forgiving sinners while He provides forgiveness through redemption through sacrifice in Christianity.
Muslims believe there are 99 Names (al-asma al-husna) of Allah which describe his many wonderful attributes. Some of these include “One and Only (al-Hayy al-Qayyum), Living One (al-Hayy al-Daim), Ever-Present (al-Sawadi), Hearer (al-Sami’), Seer (al-Basir), Wise (al-Hakim), All-Knowing (al-‘Aziz), All-Powerful (alJawhar), and Compassionate (alRahman). Nearly all Muslims believe reciting these names will lead them towards paradise; providing charity is considered good deed.
The Differences Between the Names
Though Allah and God may seem interchangeable in terms of language use, there are distinct religious distinctions regarding who Allah actually is. Most Muslims consider Allah the sole deity in existence whereas Christianity holds that God comprises three divine figures in three persons – Father, Son and Holy Spirit.
Muslim religion professes that Allah, the all-powerful creator and ruler of the universe. This differs significantly from Christian belief which sees God as loving and compassionate rather than all-powerful.
Muslim belief about Allah can be found in their holy book, the Quran. According to this text, Allah is described as being one single transcendent being who exists entirely outside of all other things – an approach different than Trinitarian Christian beliefs that view God as triune being who exists both outside and inside all things.
God and Allah differ significantly when it comes to their characteristics and attributes, including different pronunciations: Arabic refers to Him as Al-eem-ah-im while English uses LORD instead; this distinction arises because Arabic doesn’t use an alif for spelling letters like A in its spelling of Alif, while Lord does use one.
While both terms refer to powerful beings who can be called upon for assistance, their meanings vary significantly. For instance, the Bible portrays God as being both loving and all-powerful while Allah refers to an infinite being with no differentiated characteristics.
Furthermore, the Bible asserts that salvation comes only through God while Islam states that doing good deeds will bring salvation from Allah. These differences lead to substantial disagreement between them when it comes to their respective views on who Allah is.
Many people believe that Allah and God refer to the same entity because of similarities they share, such as being monotheistic, creators of the universe, sending prophets with divine messages to reveal will and producing scriptures as guidance. Yet similarities alone don’t make one entity identical to another – when purchasing bibles in bookstores we look not for similarities: both covers have Genesis written on them with ribbons – rather we try to find differences like bigger print size, thumb indexing capability or having concordance backs etc – this approach must also be applied when considering if Allah and God are equivalent.
God (Yahweh in the Holy Bible) loves all people unconditionally and this love can be seen in how He interacts with humanity; providing for their needs, freeing them from danger or death and saving them through Christ Jesus His Son.
However, Allah does not love all people equally – his love varies with individual performance, which can be seen through how He treats us creatures in the Koran and Hadith. Furthermore, while God provided our salvation by sacrificing his Son Jesus Christ on Calvary for our redemption, Allah simply sacrifices things while promising that people who perform enough good deeds will eventually find salvation through him.
This distinction highlights that Allah of the Quran does not correspond with Yahweh in the Bible. If this were indeed the case, Muslims must either reject Christianity altogether or believe in it incorrectly; either one must be wrong at a given moment in time.
Therefore, it is critical that one compares the biblical depiction of God with that of Allah in the Koran, due to their vast differences. Islam cannot claim both as being true simultaneously – either Yahweh is God or Allah is; both cannot co-exist simultaneously.
|
<urn:uuid:7b31ff2e-dc17-414c-8da9-f2ffe411470a>
|
CC-MAIN-2023-50
|
https://www.orthodoxchurchquotes.com/is-allah-and-god-the-same/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.953127 | 1,595 | 3.21875 | 3 |
Plastics contain various additives, like fillers, flame retardants or pigments. Hence few plastics can be recycled without loss in performance or aesthetics. A team of researchers at the U.S. Department of Energy’s (DOE) Lawrence Berkeley National Laboratory (Berkeley Lab) has designed a recyclable plastic that, like a Lego playset, can be disassembled into its constituent parts at the molecular level, and then reassembled into a different shape, texture, and color again and again without loss of performance or quality. The new material, called poly(diketoenamine), or PDK, was reported in the journal Nature Chemistry
Lead author Peter Christensen, a postdoctoral researcher at Berkeley Lab’s Molecular Foundry says “We have discovered a new way to assemble plastics that takes recycling into consideration from a molecular perspective.”
Christensen was part of a multidisciplinary team led by Brett Helms, a staff scientist in Berkeley Lab’s Molecular Foundry.
All plastics, from water bottles to automobile parts, are made up of large molecules called polymers, which are composed of repeating units of shorter carbon-containing compounds called monomers.
According to the researchers, the problem with many plastics is that the chemicals added to make them useful – such as fillers that make a plastic tough, or plasticizers that make a plastic flexible – are tightly bound to the monomers and stay in the plastic even after it’s been processed at a recycling plant.
During recycling mixed plastics with different chemical compositions, it’s hard to predict which properties it will inherit from the original plastics.
Unlike conventional plastics, the monomers of PDK plastic could be recovered and freed from any compounded additives simply by dunking the material in a highly acidic solution. (Credit: Peter Christensen et al./Berkeley Lab)
This inheritance of unknown and therefore unpredictable properties is a challenge in recycling mixed plastic consumer waste. It is difficult to upcycle, to make a new, higher quality product.
Recycling plastic one monomer at a time
This time-lapse video shows a piece of PDK plastic in acid as it degrades to its molecular building blocks – monomers. The acid helps to break the bonds between the monomers and separate them from the chemical additives that give plastic its look and feel. (Credit: Peter Christensen/ Berkeley Lab)
The researchers want to divert plastics from landfills and the oceans by incentivizing the recovery and reuse of plastics, which could be possible with polymers formed from PDKs. “With PDKs, the immutable bonds of conventional plastics are replaced with reversible bonds that allow the plastic to be recycled more effectively,” Helms said.
Unlike conventional plastics, the monomers of PDK plastic could be recovered and freed from any compounded additives simply by dunking the material in a highly acidic solution. The acid helps to break the bonds between the monomers and separate them from the chemical additives that give plastic its look and feel.
“We’re interested in the chemistry that redirects plastic lifecycles from linear to circular,” said Helms. “We see an opportunity to make a difference for where there are no recycling options.” That includes adhesives, phone cases, watch bands, shoes, computer cables, and hard thermosets that are created by molding hot plastic material.
The researchers first discovered the exciting circular property of PDK-based plastics when Christensen was applying various acids to glassware used to make PDK adhesives, and noticed that the adhesive’s composition had changed. Curious as to how the adhesive might have been transformed, Christensen analyzed the sample’s molecular structure with an NMR (nuclear magnetic resonance) spectroscopy instrument. “To our surprise, they were the original monomers,” Helms said.
After testing various formulations at the Molecular Foundry, they demonstrated that not only does acid break down PDK polymers into monomers, but the process also allows the monomers to be separated from entwined additives.
Next, they proved that the recovered PDK monomers can be remade into polymers, and those recycled polymers can form new plastic materials without inheriting the color or other features of the original material – so that broken black watchband you tossed in the trash could find new life as a computer keyboard if it’s made with PDK plastic. They could also upcycle the plastic by adding additional features, such as flexibility.
Moving toward a circular plastic future
PDK plastics are a “circular” material whose original monomers can be recovered for reuse for as long as possible, or “upcycled” to make a new, higher quality product. (Credit: Peter Christensen et al./Berkeley Lab)
The researchers believe that their new recyclable plastic could be a good alternative to many nonrecyclable plastics in use today.
“We’re at a critical point where we need to think about the infrastructure needed to modernize recycling facilities for future waste sorting and processing,” said Helms. “If these facilities were designed to recycle or upcycle PDK and related plastics, then we would be able to more effectively divert plastic from landfills and the oceans. This is an exciting time to start thinking about how to design both materials and recycling facilities to enable circular plastics,” said Helms.
The researchers next plan to develop PDK plastics with a wide range of thermal and mechanical properties for applications as diverse as textiles, 3D printing, and foams. In addition, they are looking to expand the formulations by incorporating plant-based materials and other sustainable sources.
Source: Lawrence Berkeley Laboratory
|
<urn:uuid:e309ecb4-12f5-4e76-8b04-e2d0c0b4bdf7>
|
CC-MAIN-2023-50
|
https://www.plastemart.com/plastic-technical-articles/Polymer-composites-have-great-potential-in-hybrid-vehicles-a-slow-growing-market/2399
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.940365 | 1,190 | 3.8125 | 4 |
Plant Entrainment Toolkit
The increase in urban farming and growing indoors has resulted in a dissonance in what plants perceive of their natural surrounding environment. This installation is an attempt to show how we can design with nature’s long-term evolution in mind
This project started when I was growing small herbs inside my home using hyrdoponics and grow lights, when I noticed my chili plant going to sleep in the evening around 4pm and waking up again at around 12 am at night (seen via it’s leaf position) . Even after a month, the plant did not adjust to the grow light timings.
Plants, like all other living creatures have a circadian clock that controls its activities based on internal cues(genetic clock) and other environmental stimuli (light and temperature being the most important). These inputs were however not synchronized, when growing indoors. I then decided to timelapse my chili plant to see it’s sleep-wake pattern. I recorded over a period of two months (still currently on) during January, February (in Shanghai) to visualie its genetic expressions(in the form of movement) during warm and cold weather.
The sleep-wake patterns from the time-lapse are then used to control the lighting conditions for vegetative/flowering stages according to the luminosity and soil/water temperature conditions.
Concept Plant Circadian Time
More than the concept of plant circadian time, this installation is an attempt to capture the disconnection we have with nature and time in the context of urban farming. Urban/Vertical farming is already on the verge of greenwashing since it is not built on the foundations of ecology and nature, but rather on economy and profits which would eventually lead to self-terminating systems in the distant future.
In the above clip, I’ve set the timer of the light to go on at 3 am (when the change in leaf expressions are seen) and to turn off when the sun rises. The plant has grown considerably over this period and is almost ready for the flowering stage. Don’t really know if the light made a difference :p. *This project is still undergoing and I will post more about it soon.
|
<urn:uuid:35702383-190d-427b-89cd-47e16c04c7bc>
|
CC-MAIN-2023-50
|
https://www.pranavbe.net/posts/post1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.954202 | 455 | 2.6875 | 3 |
REVIEW | doi:10.20944/preprints202005.0518.v1
Subject: Biology And Life Sciences, Biophysics Keywords: virus; extracellular vesicles; COVID-19; SARS-CoV-2; membrane vesicluation
Online: 31 May 2020 (21:35:23 CEST)
Within the micro and nano world, tiny membrane-enclosed bits of material are more or less free to move and act as communication tools within cells, between cells, between different tissues and between organisms in global environment. Based on the mechanism of membrane budding and vesiculation that includes all types of cells, in this review, we attempted to present a review on SARS-CoV-2 virus actions in compartments of different scales (cells and their surroundings, tissues, organisms and society). Interactions of the virus with cells on a molecular level, with neural system, endothelium, hematopoietic system, gastrointestinal system and genitourinary system. Transmission route between organisms and between mother and fetus are considered. Also, transmission of virus through contact with materials and with environment, the suggested measures to prevent contamination with the virus and to support the organism against the disease are given.
|
<urn:uuid:6962480c-a79a-403a-82fa-2401b17e9052>
|
CC-MAIN-2023-50
|
https://www.preprints.org/search?search1=Klemen%20Bohinc&field1=authors
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.912574 | 260 | 2.625 | 3 |
From pv magazine USA
The question about what to do with solar panels at the end of their useful life is about to become moot as Rystad Energy analysis shows the incredible value of materials that can be extracted in the recycling process. Rystad estimates that recyclable materials from PV panels at the end of their lifespan will be worth more than $2.7 billion in 2030, up from only $170 million this year, and the value will approach $80 billion by 2050.
PV recycling is still in early stages, but it has been successfully implemented in Europe where the Waste Electrical and Electroni Equipment (WEEE) directive requires 85% collection and 80% recycling of the materials used in solar panels. In the US, California-based Solarcycle recently raised $6.6 million in growth funding to advance its solar recycling platform. Investors include some solar veterans such as SolarCity founders Peter and Lyndon Rive, and former CEO/CTO of Sunpower, Tom Dinwoodie.
Rystad projects that solar PV waste will grow to 27 million tonnes per annum by 2040, and they estimate that recovered materials from retired panels could make up 6% of solar investments by 2040, compared to only 0.08% today.
Not only is material recovery expected to be big business, but reclaiming the minerals will become increasingly necessary as the growing demand creates a short supply.
“Rising energy costs, improved recycling technology, and government regulations may pave the way for a market where more defunct solar panels are sent to recycling rather than the nearest landfill. Recycling PV panels can help operators save costs, overcome supply chain woes and increase the likelihood of countries meeting their solar capacity goals,” says Rystad Energy analyst Kristin
Based on the rate of installations in 2022 and assuming a 15-year lifespan for solar panels, Rystad looked at which regions and countries will benefit most from solar recycling in 2037. The findings showed that China will account for 40% of global installations this year, and when these panels mature in 15 years, the estimated recycling value will be $3.8 billion, out of a $9.6 billion global total. India will trail in second place with an estimated $800 million in value, followed by Japan with $200 million in estimated value. North America in 2037 is projected to be worth $1.5 billion, with Europe set to hold $1.4 billion.
The components in a solar panel with the highest value are aluminum, silver, copper and polysilicon. Silver accounts for about 0.05% of the total weight but makes up 14% of the material value, Rystad estimates. To recycle polysilicon requires an energy intensive process, which is why recycled polysilicon has a high price. Glass is not on the list of high value components because, while there’s a lot of it on solar panels, it has a low resale value.
Rystad estimates peak solar energy implementation in 2035 of 1.4 TW, by which time the recycling industry should be able to supply 8% of the polysilicon, 11% of the aluminum, 2% of the copper, and 21% of the silver needed by recycling solar panels installed in 2020 to meet the material demand. The result will be increased ROI for the solar industry, an enhanced supply chain for materials, as well as a reduction in the need for carbon intensive mining and refinery processes.
In September 2021, NREL scientists published research that describes how to motivate the market first to reuse solar panels, and then recycle them by guiding national industrial policy to create a financially viable end-of-life solar panel industry. The researchers’ projections showed that 40% of all solar panels could be reused and recycled using subsidies equal to $18 per panel for 12 years. The Rystad analysts point to the EU’s regulatory mechanisms for jumpstarting the recycling industry in Europe. And while policy can promote an industry, the economic potential of the solar recycling industry may be the greatest motivator.
This content is protected by copyright and may not be reused. If you want to cooperate with us and would like to reuse some of our content, please contact: [email protected].
|
<urn:uuid:3b032800-a488-4eea-b72f-4c4cbc198468>
|
CC-MAIN-2023-50
|
https://www.pv-magazine.com/2022/07/18/theres-big-money-in-recycling-materials-from-solar-panels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.928 | 866 | 2.625 | 3 |
The calculation of close traverse may be made in the following steps and entered in a tabular form which is known as gales traverse table.
- Sum up all the included angle. There sum should be equal to $(2N±4)$ right angle according to as the interior and exterior angle are measured, Where N is the number of the side of the traverse.
- It not necessary to correction to the angle so that the sum of corrected angle will exactly equal to $(2N±4)90^0.$
- Calculate the W.C.B of other line for observed bearing of the first line and then corrected included angles.
- From the whole circle of the line deduce the reduce bearing of the line, and determine the quadrant in which the line lie.
- From the given length and calculated reduced bearing of the line compute their latitude and departure.
- Add all northing and southing find the difference between the two sum. Similarly obtain the difference between the sum of all easting and sum of westing.
Apply necessary correction by using Bowditch’s rule or transit rule so the sum of northing = sum of southing and sum of easting = sum of westing.
|
<urn:uuid:0db9418e-8568-48f3-8ea8-6aedf5f6b9ae>
|
CC-MAIN-2023-50
|
https://www.ques10.com/p/31363/explain-gales-table-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.941056 | 252 | 3.140625 | 3 |
Uncover security gaps before attackers doMetasploit Tool
It seems like every day dawns with a new headline regarding the latest cybersecurity attack. Hackers continue to steal millions of records and billions of dollars at an alarming frequency. The key to combating their efforts is to conduct thorough penetration tests throughout the year.
Penetration testing is designed to assess your security before an attacker does. Penetration testing tools simulate real-world attack scenarios to discover and exploit security gaps that could lead to stolen records, compromised credentials, intellectual property, personally identifiable information (PII), cardholder data, personal, protected health information, data ransom, or other harmful business outcomes. By exploiting security vulnerabilities, penetration testing helps you determine how to best mitigate and protect your vital business data from future cybersecurity attacks.
With any typical pen test, there are five key stages that must be completed:
Before any action can be taken by a penetration testing team, suitable information gathering must be completed on the prospective target. This period is vital to establishing an attack plan and serves as the staging ground for the entirety of the engagement.
Following the reconnaissance stage, a collection of scans are performed on the target to decipher how their security systems will counter multiple breach attempts. The discovery of vulnerabilities, open ports, and other areas of weakness within a network’s infrastructure can dictate how pen testers will continue with the planned attack.
Once data has been collected, penetration testers leverage common web application attacks such as SQL Injection and Cross-Site Scripting to exploit any present vulnerabilities. Now that access has been obtained, testers attempt to imitate the scope of the potential damage that could be generated from a malicious attack.
The main goal of this stage is to achieve a state of constant presence within the target environment. As time progresses, more data is collected throughout the exploited system which allows the testers to mimic advanced persistent threats.
Finally, once the engagement is complete, any trace of the attack must be eliminated to ensure anonymity. Log events, scripts, and other executables that could be discovered by the target should be completely untraceable. A comprehensive report with an in-depth analysis of the entire engagement will be shared with the target to highlight key vulnerabilities, gaps, the potential impact of a breach, and a variety of other essential security program components.
Penetration testing can either be done in-house by your own experts using pen testing tools, or you can outsource to a penetration testing services provider. A penetration test starts with the security professional enumerating the target network to find vulnerable systems and/or accounts. This means scanning each system on the network for open ports that have services running on them. It is extremely rare that an entire network has every service configured correctly, properly password-protected, and fully patched. Once the penetration tester has a good understanding of the network and the vulnerabilities that are present, he/she will use a penetration testing tool to exploit a vulnerability in order to gain unwelcome access.
Security professionals do not just target systems, however. Often, a pen tester targets users on a network through phishing emails, pre-text calling, or onsite social engineering.
Your users present an additional risk factor as well. Attacking a network via human error or compromised credentials is nothing new. If the continuous cybersecurity attacks and data breaches have taught us anything, it’s that the easiest way for a hacker to enter a network and steal data or funds is still through network users.
Compromised credentials are the top attack vector across reported data breaches year after year, a trend proven by the Verizon Data Breach Report. Part of a penetration test’s job is to resolve the aforementioned security threat caused by user error. A pen tester will attempt brute-force password guessing of discovered accounts to gain access to systems and applications. While compromising one machine can lead to a breach, in a real-life scenario an attacker will typically use lateral movement to eventually land on a critical asset.
Another common way to test the security of your network users is through a simulated phishing attack. Phishing attacks use personalized communication methods to convince the target to do something that’s not in their best interest. For example, a phishing attack might convince a user that it’s time for a "mandatory password reset" and to click on an embedded email link. Whether clicking on the malicious link drops malware or it simply gives the attacker the door they need to steal credentials for future use, a phishing attack is one of the easiest ways to exploit network users. If you are looking to test your users’ awareness around phishing attacks, make sure that the penetration testing tool you use has these capabilities.
A penetration test is a crucial component to network security. Through these tests a business can identify:
|
<urn:uuid:87d91eea-97a8-4f3e-909e-2c04cc588566>
|
CC-MAIN-2023-50
|
https://www.rapid7.com/fundamentals/penetration-testing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.921502 | 973 | 2.640625 | 3 |
The fact is, hair loss is a part of every day life and there’s no way to avoid it. On average we lose around 80 strands a day and around 250 strands on hair washing days, however if you begin to shed significantly more than that or you notice that they aren’t growing back, then that’s when you should seek some advice from a Trichologist. The thing is, when it comes to hair loss there are so many potential triggers, which means it can be difficult to pinpoint the exact reason why your strands are falling out and, how to remedy the situation.
Our hair grows in three different cycles: anagen, catagen, and telogen. About 90% of the hair on the head is in the anagen, or growth phase, which lasts anywhere from two to eight years. The catagen, or transition phase, typically lasts 2-3 weeks, during which the hair follicle shrinks. During the telogen cycle, which lasts around two to four months, the hair rests.
For those who don’t plan on counting their hair every day, there are ways to know when hair is thinning or being lost at a higher rate. When waking up in the morning, there may be an usually large amount on your pillow or when you brush your hair more than normal may be left in the comb.
Medical Reasons and Female Pattern Baldness
There are a wide range of conditions that can bring on hair loss in women, with some of the most common being pregnancy, thyroid disorders, menopause and anaemia. Others include autoimmune diseases, polycystic ovary syndrome (PCOS), and skin conditions such as psoriasis and seborrheic dermatitis.
Extreme stress, trauma and surgery can also bring on hair loss.
Hereditary Female Pattern Baldness
Female pattern baldness is usually hereditary, caused by a genetically shorter hair-growing period and a longer period between the shedding and growth phases.
Genes from parents may also affect the hair, causing smaller follicles and thinner strands.
However, age and hormones may play a part, too, as it’s more common after menopause when estrogen levels reduce.
Self Inflicted Female Pattern Baldness
Another way to thin hair is self-inflicted hairstyles like cornrows or too-tight braids or pony tails can cause hair loss called traction alopecia.
All of the things women do to manipulate their hair — dyes, chemical treatments, bad brushes, blow dryers, and flat irons — can result in damage and breakage, This includes brushing too much and towel drying aggressively when the hair is wet.
Luckily, for most of these issues, the hair grows back or the loss can be reversed with medical treatments. But it is important to see a dermatologist if there seems to be something wrong, because the sooner treatment is started, the better the chances are for improving your growing season.
Hair Care Tips
- Eat a balanced diet and get enough Iron from foods.
- Limit treatments that can break or damage your hair, such as straightening irons, bleach, and perms. If you do use them, add a heat protective spray or hair-strengthening product to your routine.
- Ask a healthcare professional if any of the medications you take promote hair loss. If so, see if you can switch.
- Limit or quit smoking . It damages hair follicles and can speed up hair loss.
- Avoid direct sunlight onto the scalp, too much sun exposure can damage hair.
|
<urn:uuid:914b4ea8-6b2e-417f-89a4-2703fd0e140d>
|
CC-MAIN-2023-50
|
https://www.restorationu.co.uk/female-pattern-baldness-triggers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00000.warc.gz
|
en
| 0.942377 | 736 | 2.6875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.