id
stringlengths 47
47
| text
stringlengths 176
666k
| safety_metadata
dict | metadata
dict |
---|---|---|---|
<urn:uuid:9b5fe4d9-cf45-4aca-9b79-73fad7853a0c>
|
The ColorHoney and ColorTokki alphabets were invented by Kim Godgul in 2009 as alternative ways of writing English. They use six colours (Red, Green, Blue, Cyan, Magenta, Yellow) and different shapes to represent different letters, with each letter being represented by two colours. The scripts are similar, but use different shapes and are structured slightly differently. Tokki means rabbit in Korean.
More information about Kim Godgul's alphabets (in Korean)
Hosted by Kualo
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provides information about alternative writing systems and does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "845-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.omniglot.com/conscripts/colorhoney.php",
"date": "2013-12-12T23:03:51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164746201/warc/CC-MAIN-20131204134546-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9500827789,
"token_count": 109,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:5e203556-5c25-448a-8d3f-e6189aaa7bfb>
|
Successful gamification hinges on a game’s ability to motivate its players to act. But how do you get somebody to do something they haven’t already decided to do themselves? The answer lays in both intrinsic and extrinsic motivation.
Intrinsic Motivation: The kind of motivation that’s built into an activity you want to do. You do it just for its own sake.
Example: You go to the gym to work out because you genuinely like working out.
Extrinsic Motivation: You know that you should do something, but you really don’t want to do it. An external source is used to motivate you.
Example: You know that you should go to the gym, but you don’t particularly enjoy working out. Then, you remember that your medical insurance company gives you a cash rebate for going to the gym a certain amount of times per month – an extrinsic motivator. Because you want to receive the rebate, you go to the gym.
The outcome of each example is the player ending up at the gym, despite getting there differently.
In general, gamification experts agree that both kinds of motivation are essential to gamification, but it’s smart to rely on intrinsic motivation whenever possible. If extrinsic motivation is added to an activity that already has intrinsic motivation, it can actually be demotivating. For example, rewarding somebody who likes going to the gym with the same cash rebate may actually de-motivate them from going to the gym.
Above all, the key is to know your players. Designing a successful gamified system is considerably easier once you understand what makes your players tick.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses gamification and motivation theories in a neutral and educational manner, providing examples that are appropriate for all audiences. There is no inappropriate language, harmful content, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "846-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://sundog.areavoices.com/2012/12/03/intrinsic-vs-extrinsic-motivation-in-gamification/",
"date": "2013-12-20T01:52:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345768787/warc/CC-MAIN-20131218054928-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9574993849,
"token_count": 350,
"score": 2.609375,
"int_score": 3
}
|
<urn:uuid:f8e1a21d-67d3-46eb-a7fe-6e9714e4dc8e>
|
- Skink Motorcycle Over-Gloves
Wind-chill armour for motorcyclists
- When riding in cold weather conditions, motorcycle riders can suffer severe numbing and loss of flexibility in their hands. This is caused by wind chill, as with every 5km/h of wind speed the surface temperature drops 5°. So with motorcyclists traveling on average at 50km/h the effect of wind chill on their extremities can be severe. Not only does it reduce flexibility but, in extreme cases, can cause frostbite. This is a major safety issue for an already vulnerable road user as, due to the small frontal area of the motorcycle, the rider is often not seen by other road users.
Skink Motorcycle Over-Gloves are designed to be worn over motorcycle gloves as a protective layer to prevent wind chill penetrating to the rider’s hand and affecting their mobility. They are designed to move and function like a reptile’s scales, protecting the hand from wind and rain by directing the flow over the hand. Skink Over-Gloves also feature 3 LEDs on each glove, these help to increase the visibility of the rider to other road users.
- Design Process
- Aims · To protect the rider’s hands from cold weather elements
· To maintain hand warmth and dexterity
· To add an extra dimension of road safety via lighting
Objectives · Define the user’s needs and wants
· Understand the user profile
· Understand the affect cold has on the user
· Understand the elevated safety risk associated with cold weather affects
· Examine how existing products function
· Research potential technologies
· Examine how the rider’s hands move to control the levers
· Develop innovative concepts based on the knowledge gained from research
· Choose a final concept that has the maximum potential to answer the aims and objectives while providing for the user’s needs
· Develop the concept through thorough iterations to a finished product that meets the aims and needs as outlined to be a successful product
- Research Results and Conclusions
Defined Problem· Loss of mobility in hands due to riding in cold weather
-Cold weather restricts blood flow to the extremities
· Wind chill factor increases this. 5°C drop in surface temperature for every 5km/h of wind speed
· Stress and discomfort also affect concentration
· In extreme cases can cause frostbite
· Safety Issue – Without proper hand mobility, a motorcyclist cannot control the bike effectively. Very dangerous for an already vulnerable road user.
Research Results · Riders find hand numbness the most problematic
o Being wet is more stressful but being cold is a dangerous safety issue
· Majority of riders use thick winter gloves
o Most effective are handguards and heated grips used together
o All riders want to wear as thin a glove as possible
· Riders have to improvise ways to keep warm
o Warming hands on exhaust pipes
o Using hand dryers
o Stopping for coffee
· Majority of riders want a wearable product
o Majority don’t want any heating element, just insulation
o Riders do not want wires, too much clutter
Ideation began with brainstorming as well as developing ideas from technology found during research, Such as developing heating systems from body heat, harnessing energy by utilising the wind passing over the rider as well as vibrational energy created from the motorcycle's motor and road surface. Piezoelectric materials were also researched and could be used in further development of this concept.
Ideation developed through hand sketches of ideas and concepts based off the requirements of the user developed from the research phase.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is entirely focused on describing a product (Skink Motorcycle Over-Gloves) and its design process. It discusses the problem of wind chill affecting motorcyclists' hands and the design aims to address this issue. There is no inappropriate language, adult themes, illegal activities, or any other unsafe content. Therefore, the text is safe for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "848-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://studentshow.com/gallery/Skink-Motorcycle-Over-Gloves/4285903",
"date": "2013-12-05T05:54:45",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163040130/warc/CC-MAIN-20131204131720-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9339619875,
"token_count": 747,
"score": 2.640625,
"int_score": 3
}
|
<urn:uuid:193acb21-36f5-4f63-9a2f-26660ac5db92>
|
Lower Shore Agronomy Day Looks at Factors Affecting Declining Population
SALISBURY, Md. — Anyone who has been listening to the news lately should know that bees are declining in numbers and that their decline is a threat to the food supply.
Nut-bearing trees, fruit trees, berry bushes and vines, even corn and wheat, depend on bees to transfer pollen between the male and female part of the plants enabling them to bear “fruit.”
In the course of picking up pollen, however, the bees pick up other things that are not good for bees.
Agriculture experts, such as Mike Embrey, a University of Maryland Extension apiculturist, are increasingly grim when they talk about colony collapse disorder, or CCD.
“CCD is not a disease but a symptom of another problem,” Embrey told attendees at the annual Lower Shore Agronomy Day, held Jan. 29 at Christ United Methodist Church, Salisbury.
Figuring out which problem is not always easy, because it could be a number of different environmental factors. Embrey, who has participated in research trials designed to determine which factors are contributing to the problem, said three types of bees play a role in pollinating the grains and vegetables that fill our plates as well as help to feed the animals whose meat we enjoy. These are bumble bees, alfalfa leaf cutter bees and mason bees.
There are 2.5 million managed bee colonies, half of which are in California. California almond trees require vast numbers of bees to do the job when they are in flower, so many that hives have to be imported. There just aren’t enough bees in California to do the job.
Hives are transported from all over the country to do the pollination of numerous crops. Transporting the bees causes stress to the hive. Depending on the time of their arrival, and the flowering of the crop, the bees may be held with only sugar as a food source and bees like (and need) variety.
Big agriculture means large-scale monoculture farming operations that not only reduce the variety of nutrients available to bees, making it difficult for bees to get what they need to survive, but also cause habitat destruction. In recent years, farms have become almost devoid of hedgerows. Hedgerows are natural bee habitat with some species nesting and feeding in hedgerows.
Parasitic mites introduced from Asia in the late 1980s added another stressor that has reduced bee populations, Embrey said. Transport and environmental conditions reduced the bee population 10 to 15 percent before the mites were introduced. The loss escalated to 20 to 25 percent since before leveling somewhat.
The incidence of CCD jumped to 32 percent in California. Last year was the first year in which there was a drop in the number of hives lost.
CCD resulting from mite infestations is not the major problem in Maryland, which tends to suffer bee loss due to adverse weather conditions. Maryland is losing 30 percent of its bee population, as indicated by a rapid loss of worker bees and the presence of small clusters of bees with a queen present, Embrey said. Few or no dead bees at the entrance of the hive, excess brood and food stores and higher pathogen (bacteria, virus, fungi) counts have also been noted.
Pesticides are among the easiest problem substances to trace. They can be detected in the wax produced by the bees. But as with many other concerns that threaten human habitation, it is partly our destruction of wildlife habitat that threatens our own subsistence. We have removed much of the bee’s natural habitats and there probably are not too many urban dwellers eager to share their immediate surroundings with bees, he said.
Although pesticides present a certain risk to bees, University of Maryland Extension Service scientists have found no pattern of exposure to pesticide levels that raises alarms.
Many Americans worry about toxic chemicals contained in pesticides and herbicides, but Embrey said that that science and perception are not the same.
“Toxicity does not equal risk,” he said. “Risk equals hazard (toxicity) multiplied by exposure. Toxicity is a constant regardless of use. Exposure depends on the conditions of use.”
Reducing exposure has proved to be beneficial, he said.
“Bees are flying dust mops,” Embrey said. “Their forage range is 8,000 acres or a two-mile radius of the hive or nest.”
Because most farms in Maryland are nowhere near 8,000 acres, bees will be affected by the practices of neighboring farmers as well as that of their home farm. Applications of pesticide and herbicide can drift onto nonflowering vegetables and grain and increase potential bee exposure after a heavy dew by leaving a residue in the nectar, pollen or extra-floral nectaries. Some pesticides remain active up to two years after application, he said.
Secondary routes that expose bees to harmful chemicals include spills or contaminated (often standing) water. The residue that remains in the nectar and pollen of rotational crops that are planted more than once during the growing season is also a problem, Embrey said.
And treated seed dust may be deposited on- or off-site onto flowering vegetables that attract bees, such as cucumbers, melons, pumpkins, squash and watermelon, which cause a higher incidence of bee exposure because of increased applications of pesticide. Embrey cited as potential culprits neonicotoid insecticides that are widely used as seed dressings and for home gardening.
The risk to bees can be greatly reduced by reducing the incidence of exposure. In layman’s terms that means it’s all in the timing. Because die-outs of worker bees represent a serious threat to the health of the hive, etymologists in Maryland are looking at whether current practices also affect worker bees still in the larval stage. They know that chronic exposure, over time, does the most damage.
At the USDA-Beltsville Agricultural Research Center, Embrey participated in experiments with various treatment regimens and helped to conduct residue sampling five weeks after planting by collecting flowers in the field so that nectar and pollen could be analyzed.
They used mass spec analysis to prove that the residue was higher if the pesticide was applied close to or during pollination. The best results occurred when they treated planting or bedding trays.
Embrey said that while many farmers are independent-minded and not eager to get “outsiders” involved in their farming operation, the bee problem will not be solved without cooperation.
“The EPA needs kill reports so they can investigate to pinpoint cause and effect,” he said. Researchers identify “suspects” by analyzing beeswax. It’s an expensive chemical test. Embrey urged farmers to let the EPA do it on their nickel.
Not all chemical contaminants come from external forces. Beekeepers use chemicals such as fulminate and coumaphos that are toxic in high concentrations. When these substances are detected in the beeswax, it can usually be traced to the beekeeping operation.
Some chemical substances, including pesticides, are more lethal when combined than when used alone, he said.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the decline of bee populations and the factors affecting them, such as colony collapse disorder, pesticides, and habitat destruction. It is informative and suitable for educational environments. There is no unsafe or inappropriate content, profanity, or references to illegal activities.",
"{\"reason\": \"technical and scientific content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses technical and scientific aspects related to pesticide residues and their impact on bee health. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are focused on environmental and agricultural issues, making it fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "849-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "849-1",
"llm_safety_score": 0,
"reason": "technical and scientific content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.lancasterfarming.com/Bringing-Back-the-Bees-",
"date": "2013-12-06T19:38:09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052462/warc/CC-MAIN-20131204131732-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9582870603,
"token_count": 1508,
"score": 2.984375,
"int_score": 3
}
|
<urn:uuid:85765d7c-3e86-4e9e-8cc0-960ade2652cb>
|
Posts Tagged: pollen basket
Pistol packin’ mamas have nothing on honey bees.
Have you ever seen the pollen load that a honey bee carries?
What's pollen? It's the fine, powder-like material produced by the anthers of flowering plants, or the grains that contain the male reproductive cells of a seed plant.
The worker bees carry pollen in special pollen baskets on their legs. The baskets are concave surfaces fringed with bristles or curved hairs to hold the pollen in place.
Only the worker bees have pollen baskets. The queen bee and the drones (males) have none.
"Honey bees derive their protein, vitamins, minerals and some carbohydrates from pollens," UC Davis Extension Apiculturist Eric Mussen writes in Bee Briefs. "Since no single pollen source provides all their nutritional needs, honey bees must have a number of pollens available to them to remain healthy and to produce the royal jelly required to feed the queen and rear brood."
Worker bees feed the brood "beebread," a mixture of nectar and pollen.
Yesterday the honey bees on the grounds of the Harry H. Laidlaw Jr. Honey Bee Research Facility at UC Davis buzzed around the almond blossoms, gathering nectar and pollen.
It's amazing--truly amazing-how much pollen honey bees can pack in those pollen baskets.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"informative content about pollens and honey bees\", \"score\": 0}\n```\n\nThe text is purely informative and educational, discussing the pollen baskets of honey bees and their importance in bee nutrition. There are no unsafe elements, inappropriate language, or harmful themes present."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "850-0",
"llm_safety_score": 0,
"reason": "informative content about pollens and honey bees"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://homeorchard.ucdavis.edu/?blogtag=pollen%20basket&blogasset=45538&email=yes",
"date": "2013-12-08T18:34:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163785316/warc/CC-MAIN-20131204132945-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8750705719,
"token_count": 288,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:d66e19d6-5a83-4bee-b67b-83b03d6cb67a>
|
India during the lifetime of the Buddha was in a state of religious and cultural ferment. Sects, teachers, and wandering ascetics abounded, espousing widely varying philosophical views and religious practices. Some of these sects derived from the Brahmanical tradition (see Hinduism), while others opposed the Vedic and Upanishadic ideas of that tradition. Buddhism, which denied both the efficacy of Vedic ritual and the validity of the caste system, and which spread its teachings using vernacular languages rather than Brahmanical Sanskrit, was by far the most successful of the heterodox or non-Vedic systems. Buddhist tradition tells how Siddhartha Gautama, born a prince and raised in luxury, renounced the world at the age of 29 to search for an ultimate solution to the problem of the suffering innate in the human condition. After six years of spiritual discipline he achieved the supreme enlightment and spent the remaining 45 years of his life teaching and establishing a community of monks and nuns, the sangha, to continue his work.
After the Buddha's death his teachings were orally transmitted until the 1st cent. B.C., when they were first committed to writing (see Buddhist literature; Pali). Conflicting opinions about monastic practice as well as religious and philosophical issues, especially concerning the analyses of experience elaborated as the systems of Abhidharma, probably caused differing sects to flourish rapidly. Knowledge of early differences is limited, however, because the earliest extant written version of the scriptures (1st cent. A.D.) is the Pali canon of the Theravada school of Sri Lanka. Although the Theravada [doctrine of the elders] is known to be only one of many early Buddhist schools (traditionally numbered at 18), its beliefs as described above are generally accepted as representative of the early Buddhist doctrine. The ideal of early Buddhism was the perfected saintly sage, arahant or arhat, who attained liberation by purifying self of all defilements and desires.
Sections in this article:
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and cultural context\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a historical and cultural description of early Buddhism and its development. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and informative, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "851-0",
"llm_safety_score": 0,
"reason": "historical and cultural context"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.factmonster.com/encyclopedia/society/buddhism-early-buddhism.html",
"date": "2013-12-08T18:31:29",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163785316/warc/CC-MAIN-20131204132945-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9681292772,
"token_count": 440,
"score": 3.515625,
"int_score": 4
}
|
<urn:uuid:515aa0db-d753-4cf1-ab32-b238c1744476>
|
Maître à penser
|This article needs additional citations for verification. (April 2007)|
Maître à penser is a French language phrase, denoting a teacher whom one chooses, in order to learn not just a set of facts or point of view, but a way of thinking. It translates literally as "master for thinking".
To take a maître à penser is therefore close to becoming a disciple. The phrase itself can be used to refer to a type of person — an inspirational genius, for example — who naturally would attract followers interested enough to absorb a whole intellectual approach.
A maître à penser is therefore possibly something like a mentor or guru, with a possibly beneficent approach. A negative effect of such a master might be to close down all other intellectual avenues in a student, imposing some schematic or monolithic approach. Such a master receives the French pejorative maître-penseur.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is an academic and neutral explanation of a French phrase. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "852-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://en.wikipedia.org/wiki/Ma%C3%AEtre_%C3%A0_penser",
"date": "2013-12-10T03:40:52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164006951/warc/CC-MAIN-20131204133326-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8768603206,
"token_count": 194,
"score": 2.796875,
"int_score": 3
}
|
<urn:uuid:8cd4f307-f584-47e7-9630-a888d401a56a>
|
a. A rounded rock fragment of any size larger than a sand grain; a group
name for pebbles, cobbles, or boulders -- any or all of these.
b. A diamond crystal with an arched facet. Hess
c. A term proposed by Fernald (1929) for any naturally rounded rock
fragment of any size larger than a sand grain (diameter greater than 2
mm), such as a boulder, cobble, pebble, or granule.
See also: cobblestone
Dictionary of Mining, Mineral, and Related Terms
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "853-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.webref.org/geology/r/roundstone.htm",
"date": "2013-12-10T03:44:50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164006951/warc/CC-MAIN-20131204133326-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8199505806,
"token_count": 123,
"score": 2.859375,
"int_score": 3
}
|
<urn:uuid:94a71687-81aa-4916-8ff8-90dd7e2506e1>
|
I cannot find a single example in nature of an Oracle Stored Procedure that returns a set of results (i.e. select * from user) along with the java code that would read that set of results through a jdbc connection pool
Why is this such an obscure thing?? In the SQL Server world this is the normal way to do things and there are examples galore (simple ones!!)
What gives here? Or are stored procs simply not done in Oracle?
Oracle and SQL Servers stored procedures work differently. In most cases SQL Server stored procedures are really just stored queries. Whereas in Oracle a stored procedure is actually a procedure of code. Meaning you can do many things, not necessarily getting data. Although in that case why make it a stored procedure on the back-end when you can move that type of code closer to where it is needed.
In Oracle to get a Result set back, you have to actually pass an empty result set to the procedure as an IN/OUT parameter. That is waht is called a ref cursor, or reference cursor.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"obscure technical question\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is a technical question about Oracle stored procedures and their differences from SQL Server stored procedures. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to database management, which is appropriate for an educational or professional environment."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "854-0",
"llm_safety_score": 0,
"reason": "obscure technical question"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.coderanch.com/t/80436/Oracle-OAS/JRUN-Oracle-Stored-Procedures",
"date": "2013-12-11T17:45:29",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164040899/warc/CC-MAIN-20131204133400-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9332776666,
"token_count": 221,
"score": 2.59375,
"int_score": 3
}
|
<urn:uuid:763b9637-0e0e-46c3-a113-e11df1257c42>
|
|Alt names||Upehude||source: Domesday Book (1985) p 141|
|Located in||Huntingdonshire, England|
- source: Getty Thesaurus of Geographic Names
- source: Family History Library Catalog
- the text in this section is copied from an article in Wikipedia
Upwood, in Huntingdonshire (now part of Cambridgeshire), England, is a village near Bury south-west of Ramsey.
The village lies along the High Street which runs parallel to the main road from Great Raveley to Ramsey about 300 yards to the west. The church stands about the middle of the village and there are several 17th-century cottages to the north and south of it.
In September 1917, the Royal Air Force started work on RAF Upwood, a massive air force base near the village used by both the RAF and latterly by the United States Air Force.
Two nature reserves, Lady's Wood and Upwood Meadows, lie near to the village; the latter is a National Nature Reserve.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and geographical information\", \"score\": 0}\n```\n\nThe text provided is purely historical and geographical in nature, containing no unsafe, inappropriate, or harmful content. It does not include any offensive language, adult themes, illegal activities, or any other elements that would be considered unsafe for public use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "855-0",
"llm_safety_score": 0,
"reason": "historical and geographical information"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.werelate.org/wiki/Place:Upwood,_Huntingdonshire,_England",
"date": "2013-12-11T17:55:34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164040899/warc/CC-MAIN-20131204133400-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9382439256,
"token_count": 222,
"score": 2.5625,
"int_score": 3
}
|
<urn:uuid:6008fd00-8ad4-4e26-9914-67be2d2354bd>
|
Where imagination meets farming
Local-food pioneer Pete Johnson's movable greenhouses have yielded a lettuce harvest in the dead of a Vermont winter.
When Pete Johnson, a leader among New England’s organic farmers, set out one day last fall to pull an 18,000-pound greenhouse, in fits and starts, over a field-grown plot of lettuce, he inched forward an idea that could help make fresh local produce available year-round, even in Vermont.It was late October. For most of his fellow farmers, harvest time was over until spring. But Mr. Johnson was just revving up his tractor – and his dream.Skip to next paragraph
Subscribe Today to the Monitor
He wants to extend the growing season into winter, and to start spring crops in late winter, in ground protected temporarily by movable greenhouses. Johnson had seen this done experimentally elsewhere. But he was trying it on a commercial scale, with greenhouses 200 feet long – twice the length of a basketball court and two-thirds as wide.
He had been warned the project could be risky with such big structures. But Johnson – a young, well-educated trendsetter – was willing to take that risk.
“It could blow over – or not move at all,” he said with a laugh as he climbed aboard his tractor. “But I’ve engineered it, and I think it will work.”
Johnson’s tractor was connected by steel cables to one of the front corners of one of his greenhouses. His facilities manager, Steve Perkins, sat at the wheel of a second tractor connected to the other front corner of the greenhouse. A chilly autumn wind rippled the lightweight fabric covering rows of salad greens. But even unheated, the greenhouse might protect plants enough to keep them producing through the winter: That was the idea.
The two men looked more like boys at play than men at work as they revved their engines. The buckets of the 3,500-pound tractors were tilted into the ground, braced against 9 tons of greenhouse steel plus friction.
“Really slow,” Mr. Perkins shouted above the rumble of the engines. The greenhouse frame groaned as the cable tightened. One side inched forward, the other side caught on a slight incline. Johnson jumped down, pried the frame up with a crowbar, and slid a two-by-four underneath. Each man stepped on the gas again, and both skids crept forward.
They coaxed the giant structure down the field for an hour – Johnson romping back and forth, checking the greenhouse alignment and propping more blocks under it. A drizzle turned to pelting rain. Neither man seemed to notice.
“I think if we just put something like ski tips on the front edges of the skids, that would do it,” Johnson said.
It was hands-on innovation in progress.
As fall gave way to winter, Johnson saw his vision vindicated. Through weeks of snow and some single-digit temperatures, Johnson supplied his community-supported agriculture (CSA) customers with fresh lettuce and other greens grown inside the unheated greenhouse. (In CSA consumers buy food directly from local farmers.)
Those plants stopped growing during Vermont’s deep January freeze (minus 30 degrees one week), but Johnson expects to start harvesting new growth in mid-February. “And that’s pretty cool to get fresh greens from unheated greenhouses all but one month of the winter,” he says.
• • •
Johnson built his first greenhouse 10 years ago, for a senior project at Middlebury College. Soon after, he put up a greenhouse on his parents’ property in Greensboro, Vt. He supplied salad greens to restaurants in Boston and New York, and he planned even then to move the greenhouse to extend his growing season.
But the pipe-and-plastic structure proved too flimsy. One morning Johnson looked out to see it flattened under a heavy snow. “It was a huge drag,” he says. “But then, in a couple days, I started seeing the possibilities.”
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses Pete Johnson's innovative approach to extending the growing season using movable greenhouses. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "856-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.csmonitor.com/The-Culture/2009/0204/where-imagination-meets-farming",
"date": "2013-12-13T03:34:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164836485/warc/CC-MAIN-20131204134716-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9640435576,
"token_count": 869,
"score": 2.515625,
"int_score": 3
}
|
<urn:uuid:e712380a-9333-4e77-96f0-8ed7151d87ba>
|
Learn something new every day More Info... by email
Post-traumatic epilepsy is a condition characterized by regularly occurring seizures after head impact caused by a fall, crash, or knock to the cranium. Penetration of the skull by bullets and other objects can also induce this form of epilepsy. The risk for post-traumatic epilepsy is especially high if the skull is fractured, a severe concussion results or there is intracranial hematoma, which is the pooling of blood within the cranium after a vein or artery ruptures. Victims who experience more than a day of amnesia or unconsciousness due to head injury are also at risk for having post-injury epilepsy.
Doctors continue to research the cause of post-traumatic epilepsy; some studies suggest it is linked to the free radical damage caused by brain injuries. Other studies suggest genetics play a role in who develops recurring seizures after trauma. Since seizures are convulsions caused by damage to brain tissue, any impact that causes depressions in the soft tissues of the brain can create a risk for post-traumatic epilepsy. So, too, can the surgical removal of damaged brain tissue following injury.
Computed tomographic (CT) scans help doctors determine the severity of a brain injury and exactly what physical, biochemical or mechanical alterations have occurred. Often blood flow to the brain is hampered or there are changes in the brain’s metabolism. Equilibrium in the brain can also be damaged by injury, creating stress for the sympathetic or parasympathetic nervous system and putting the victim at risk for post-traumatic epilepsy by skewing brain signals. Doctors can study the brain imaging to determine if post-traumatic seizures are likely and what surgery or treatment should be done.
Seizures resulting from post-traumatic epilepsy may be temporary or permanent. Some victims of brain injury experience immediate seizures, arising within hours and recurring for a few days or weeks. Others, however, may suffer seizures for five years or longer.
Even if seizures do not start immediately, that does not mean the victim has escaped post-traumatic epilepsy. Doctors warn that some individuals with latent post-traumatic epilepsy can go for two to 15 years without symptoms before having their first episode of injury-related seizures. Seizures themselves are unlikely to cause additional brain injury, researchers say.
Halting seizures is possible with medical intervention. In some cases, seizures from post-traumatic epilepsy spontaneously cease on their own. While this form of epilepsy can affect anyone, some demographics have been especially prone, such as construction workers and war veterans who have endured combat brain injuries.
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text provided is purely educational and informative, discussing medical conditions and does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "857-0",
"llm_safety_score": 0,
"reason": "educational content with no unsafe elements"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.wisegeek.com/what-is-post-traumatic-epilepsy.htm",
"date": "2013-12-13T03:15:02",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164836485/warc/CC-MAIN-20131204134716-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9415152669,
"token_count": 570,
"score": 3.515625,
"int_score": 4
}
|
<urn:uuid:42a7ea30-6aa2-454e-a82c-b97d32181ad3>
|
Hemlock woolly adelgid (HWA) is native to Japan and possibly China.
It was first observed in western North America in the early 1920's and
had moved east to Virginia by the 1950's. In the eastern United
States, HWA is now found from northern Georgia, north along the
Appalachian Mountains to southern New England. Movement of
live infested hemlocks, wind, birds, and mammals disperse it on a
local scale. Hosts include forest and ornamental hemlock trees (Tsuga
spp.). HWA is a serious pest of eastern hemlock and Carolina hemlock.
Size varies from 1/16 to 1/8 of an inch in length with piercing/
sucking mouthparts. All adults are female with each female producing
50-300 eggs in a lifetime. It produces increasing amounts of white,
woolly wax used to protect itself and its eggs. A sign of infestation is
the presence of what appears to be the tips of cotton swabs on the
bases of needles. Needle loss and twig desiccation, caused by the
insects feeding, hinders shoot growth. Needle loss is followed by
twig die-back, defoliation, and death, usually within four to six years
of infestation. Severe infestations can eliminate the hemlock
component from forest stands.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is a scientific description of the Hemlock woolly adelgid (HWA), which is a type of insect pest. It contains no unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and non-controversial. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "858-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.invasive.org/south/subject.html?sub=289",
"date": "2013-12-20T21:07:51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345773230/warc/CC-MAIN-20131218054933-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9379897118,
"token_count": 296,
"score": 3.65625,
"int_score": 4
}
|
<urn:uuid:86fe8370-60aa-4abd-b9a8-6b7d7f51c84a>
|
John Heinz National Wildlife Refuge at Tinicum (NWR, refuge) currently includes 993 acres of the 1,200 acres within its approved acquisition boundary. The refuge protects over 200 acres of the last remaining freshwater tidal marsh in Pennsylvania. It is an important migratory stopover along the Atlantic Flyway, and provides protected breeding habitat for State-listed threatened and endangered species, as well as many neotropical migratory birds (Cohen 2004). The refuge is located in Philadelphia and Delaware Counties in the Commonwealth of Pennsylvania.
John Heinz NWR includes a variety of important resources and also provides a unique opportunity for education and outreach near the urban center of the city of Philadelphia, the nation’s fifth largest metropolitan area (U.S. Census Bureau 2011). Sustaining and protecting these resources requires planning, active on-the-ground management, and partnerships with the surrounding communities of the Delaware Valley.
John Heinz NWR is managed by the United States Fish and Wildlife Service (USFWS, the Service, our, we) as part of the National Wildlife Refuge System (Refuge System). The Refuge System maintains the biological integrity, diversity, and environmental health of natural resources on lands within it for the benefit of present and future generations.
In 2012, John Heinz NWR developed a comprehensive conservation plan. The purpose of a comprehensive conservation plan (CCP) is to specify a management direction for the refuge for the next 15 years. The goals, objectives, and strategies for improving refuge conditions—including the types of habitat we will provide, partnership opportunities, and management actions needed to achieve desired conditions – are described in the CCP. Visit our comprehensive conservation planning page.
Follow Us Online
The refuge protects a variety of habitats for birds in the highly urbanized landscape of greater Philadelphia. It has been designated as an Important Bird Area by the National Audubon Society. While most of the 300 plus avian species identified at the refuge utilize it as a migratory stopover, more than 80 species have been recorded nesting on the refuge over the years. Several species are also state listed as either threatened or endangered species or species of state or national management concern.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the John Heinz National Wildlife Refuge at Tinicum. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "860-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.fws.gov/refuge/John_Heinz/what_we_do/resource_management.html",
"date": "2013-12-05T10:04:50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163043499/warc/CC-MAIN-20131204131723-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9140998721,
"token_count": 442,
"score": 3.015625,
"int_score": 3
}
|
<urn:uuid:a2b2f5b3-20dd-4462-8c91-8239c0120ba9>
|
by Blake Deppe / People’s World
According to the International Union for Conservation of Nature, Africa’s western black rhino is now officially extinct. After being a victim of increasingly devastating poaching and seeing little to no conservation efforts, the species is now gone, and others – including the northern white rhino and Asia’s Javan rhino – are expected to swiftly follow unless efforts to stop the senseless killing of them prevail.
The black rhino had not been seen in West Africa since 2006, and had been on the IUCN’s Red List of Threatened Species since then.
“The situation could have had very different results if the suggested conservation measures had been implemented,” said Simon Stuart, chair of the IUCN species survival commission. “These measures must be strengthened now, specifically managing habitats in order to improve performance, preventing other rhinos from fading into extinction.”
Jane Smart, director of the IUCN’s global species program, added, “We have the knowledge that conservation works if executed in a timely manner; yet, without strong political will in combination with targeted efforts and resources, the wonders of nature and the services it provides can be lost forever.”
In addition to lack of protection, poaching plays a major factor in the dwindling rhinoceros population. The World Wildlife Fund said that what is believed to be the last remaining Javan rhino in Vietnam was killed by poachers in 2010; it had been found dead with a bullet in its leg and its horn removed. Though other Javan rhinos probably live elsewhere, that species is expected to face extinction next, if the situation does not change.
There are only an estimated 29,000 rhinos remaining worldwide. The animals are coveted in certain countries due to the false belief that their horns can cure or fend off cancer. Poachers have capitalized on this superstition and dehorned thousands of the animals in multiple countries – even in national parks.
There are reports, however, of a recent crackdown on poaching in Vietnam, including the sales and trading of the ill-begotten horns, of which both Vietnam and China are large consumers. Two rhino horns were recently seized by customs officials; the substance had most likely come from South Africa, and was worth an estimated $365,000. Vietnam has now announced it will cooperate with South Africa in order to strengthen the crackdown. Initial steps will include setting up a gene bank and DNA analysis training to better track horns that are taken by poachers.
The two governments will also focus on stopping poachers who obtain hunting permits under false pretenses by masquerading as trophy hunters.
South African government spokesperson Peter Mbelengwa remarked, “As part of the cooperation between the two countries, Vietnam is going to provide us with a list of accredited trophy hunters. We will be able to verify their legitimacy.”
But experts say that even the most admirable efforts to combat the problem cannot be perfect, comparing such campaigns to games of “whack-a-mole,” where when one poaching tactic is defeated, another emerges somewhere else, or in another form.
“The issue seems to be that every time there’s a clampdown in one area, another situation emerges,” said Dr. Jo Shaw, a rhino expert for the World Wildlife Fund. And the situation is just as dire for rhinos in South Africa as they are elsewhere: in 2012 alone, 668 rhinos were killed by poachers. 232 have been killed so far this year. Unfortunately, Shaw concluded, “the patterns indicate that, this year, it will be over 800.”
Photo: LaertesCTB/Flickr (CC)
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the extinction and conservation efforts for rhinos, focusing on poaching and conservation measures. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "861-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://earthfirstjournal.org/newswire/2013/05/07/western-black-rhino-declared-extinct/",
"date": "2013-12-07T00:45:50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052912/warc/CC-MAIN-20131204131732-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9639633298,
"token_count": 772,
"score": 3.359375,
"int_score": 3
}
|
<urn:uuid:a275dc74-6596-4a0c-a85a-9e82fedb19f8>
|
Securing water for all - a 2050 plan
23 September 2010 | News story
Having the right institutions and processes in place to cope with increasing demands on water resources, under threat from climate change, is key to ensuring a clean and plentiful supply of water for the world’s growing population.
During the International Water Association's World Water Congress in Montreal, Canada, IUCN says that good governance and capacity to cope with the challenges facing water resources in a changing climate is needed. Some 3,000 water experts from around the world are gathering for the Congress, which takes place 19 to 24 September.
“Global change will create many challenges in the next 40 years,” says Mark Smith, Head of IUCN’s Water Programme. “Expanding population, economic growth and accelerating urbanisation will place new demands on water systems. Climate change is projected to intensify water stress and hazards, putting pressure on food, water and energy security. River basins will change, and water systems and water resources management will have to provide solutions.”
During the Congress, IUCN will be looking at the problems facing river basins of the future, which will not only have to meet an increased demand for water but will also have to provide for the natural environment. If managed properly, that demand will be met, but with bad management, the water crisis can quickly degenerate. IUCN says that strategies have to be put in place to form a vision for water in 2050, around which workable plans can be made for transformation of water systems. Water professionals, local government, policy makers and investors are all critical in making such plans work. Short-term, targeted actions can help the world get back on track but long term commitments to action are needed for today’s water problems to turn into water solutions.
“Both man-made and natural infrastructures are needed to meet the multiple and complex goals of water resource management. Investment needs to be made to secure the resources we currently have and, as part of this, decision makers need to recognize the vital services that a healthy natural environment provides, particularly as communities adapt to the effects of climate change,” adds Mark Smith. “Well-managed floodplains reduce the vulnerability of cities downstream, intact mangroves buffer coasts against storms, and healthy forests and wetlands reduce disaster risks.”
For more information or to set up interviews, please contact:
• Nicki Chadwick, IUCN Media Relations Officer, t +4122 999 0229, m +41 79 528 3486, e [email protected]
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is a news story about water resource management and does not contain any unsafe or inappropriate content. It is suitable for all audiences and does not include any harmful language, themes, or references."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "863-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://cms.iucn.org/news_homepage/?6086/Securing-water-for-all----a-2050-plan",
"date": "2013-12-08T22:47:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163826391/warc/CC-MAIN-20131204133026-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9298969507,
"token_count": 541,
"score": 2.78125,
"int_score": 3
}
|
<urn:uuid:f26fae16-79fd-49fc-9c7a-1629de7519cf>
|
SPANS 2010 - NSW Schools Physical Activity and Nutrition Survey - Executive Summary
The NSW Schools Physical Activity and Nutrition Survey (SPANS) is a key initiative monitoring progress across the initiatives outlined in the NSW Government Plan for Preventing Overweight and Obesity in Children, Young People and their Families 2009-2011.
More than 8,000 school-aged students in NSW participated in the survey in term 1 2010. The key objective of the survey was to determine the prevalence of overweight and obesity in children and young people as well as fitness, physical activity, sedentary behaviours, food habits, and risk factors for chronic disease. These data provide essential information in the monitoring of progress towards the State Plan targets and informs health promotion policy and program development. The survey was conducted by the Physical Activity, Nutrition and Obesity Research Group (PANORG) at the University of Sydney.
While the full report will be available in mid 2011, the detailed Executive Summary Report is available on site.
File link: SPANS 2010 - NSW Schools Physical Activity and Nutrition Survey - Executive Summary
- NSW Schools Physical Activity and Nutrition Survey (SPANS) 2004
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is a summary of a survey conducted by the Physical Activity, Nutrition and Obesity Research Group at the University of Sydney. It discusses the objectives and methodology of the survey without any inappropriate, offensive, or harmful content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "865-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www0.health.nsw.gov.au/pubs/2011/spans_2010_summary.html",
"date": "2013-12-08T22:43:38",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163826391/warc/CC-MAIN-20131204133026-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9127039909,
"token_count": 228,
"score": 3.015625,
"int_score": 3
}
|
<urn:uuid:2df9bb99-b667-49fd-8bf4-f50bd774c420>
|
Shaping Tech for the Classroom
21st-century schools need 21st-century technology.
Credit: Bill Duke
The biggest question about technology and schools in the 21st century is not so much "What can it do?" but, rather, "When will it get to do it?" We all know life will be much different by 2100. Will school? How close will we be to Edutopia?
First, it helps to look at the typical process of technology adoption (keeping in mind, of course, that schools are not typical of anything.) It's typically a four-step process:
- Doing old things in old ways.
- Doing old things in new ways.
- Doing new things in new ways.
Until recently, we have mostly been dabbling with technology in our schools: A few Apples here. A PC there. Random creation of software by teachers and other individuals -- some very good, much bad. A few edutainment disks. Dabbling.
Old Things in Old Ways
When a new technology appears, our first instinct is always to continue doing things within the technology the way we've always done it. People still illuminated the first printed Gutenberg Bibles by hand. Television pioneers set up single cameras in "great" theater seats. The result was pretty much like what came before; some elements may have been lost, but the results were certainly cheaper, and far more efficient.
That is almost exclusively what we now do with educational technology. We use it mostly to pass documents around, but now in electronic form, and the result is not very different from what we have always known.
People certainly are putting courses, curricula, and lesson plans online. This trend is important, but it's hardly new -- it will be new only when those courses, curricula, and lesson plans are very different and technology influenced, when they are set up so they can be found and mixed and matched easily, when they are continually iterated and updated, and when the kids have a big say in their creation. Certainly, systems for maintaining records and assessment online, such as PowerSchool, a Web-based student-information system from Apple (and similar products from Pearson School Systems and Chancery Software), have emerged, but the records and assessments we ask for and keep, for the most part, haven't changed.
I would even include writing, creating, submitting, and sharing work digitally on the computer via email or instant messaging in the category of doing old things (communicating and exchanging) in old ways (passing stuff around). Is there educational progress, though? It appears that students who write on a computer turn in longer and higher-quality assignments than those who compose by hand, even though it's still writing. A middle school principal in Maine (where all middle school students are supplied with computers) proclaims that the debate over handwriting is finally over -- all assignments must be keyboarded. You can mourn the passing of handwriting if you must; the kids certainly won't. If they are writing better and more detailed papers, yes, there has been progress.
But new technology still faces a great deal of resistance. Today, even in many schools with computers, Luddite administrators (and even Luddite technology administrators) lock down the machines, refusing to allow students to access email. Many also block instant messaging, cell phones, cell phone cameras, unfiltered Internet access, Wikipedia, and other potentially highly effective educational tools and technologies, to our kids' tremendous frustration. Even where technology has not been blocked, much of the digitized educational materials and records are just examples of using computers to collect old stuff (such as data or lesson plans) in old ways (by filing). There are some educational benefits, though, including allowing teachers to access data more easily and parents to do so more extensively.
Old Things in New Ways
Recently, a number of our schools (a very small number) have entered the stage of doing other old things in new ways. Now, it begins to get a little more interesting.
"I used to have to tell my students about phenomena, or have them read; now I can show them," says Jim Doane, a science teacher at Scarborough Middle School, in Scarborough, Maine. When we begin adding digital demonstrations through video and Flash animation, we are giving students new, better ways to get information.
In a growing number of simulations, ranging from the off-the-shelf SimCity and
In Education Simulations's Real Lives, children take on the persona of a peasant farmer in Bangladesh, a Brazilian factory worker, a police officer in Nigeria, a Polish computer operator, or a lawyer in the United States, among others, experiencing those lives based on real-world statistical data. Riverdeep's School Tycoon enables kids to build a school to their liking. With these tools, students act like scientists and innovators, rather than serve as empty vessels. They arrive at their own conclusions through controlled experimentation and what scientists call enlightened trial and error.
Still, our best teachers have always used interactive models for demonstrations, and students, like scientists and military planners, have been conducting simulations in sand, on paper, and in their heads for thousands of years. So, though some observers trumpet these uses of technology as great innovations, they are really still examples of doing old things in new ways.
But there are many more old things children are doing in new ways -- innovations they have invented or adopted as their preferred method of behavior -- that have not yet made their way into our schools. These include buying school materials (clothes, supplies, and even homework) on eBay and the Internet; exchanging music on P2P sites; building games with modding (modifying) tools; setting up meetings and dates online; posting personal information and creations for others to check out; meeting people through cell phones; building libraries of music and movies; working together in self-formed teams in multiplayer online role-playing games; creating and using online reputation systems; peer rating of comments; online gaming; screen saver analysis; photoblogging; programming; exploring; and even transgressing and testing social norms.
An important question is, How many of these new ways will ever be integrated into our instruction -- or even understood by educators? If we want to move the useful adoption of technology forward, it is crucial for educators to learn to listen, to observe, to ask, and to try all the new methods their students have already figured out, and do so regularly.
Two big factors stand in the way of our making more and faster progress in technology adoption in our schools. One of these is technological, the other social.
The Big Tech Barrier: One-to-One
The missing technological element is true one-to-one computing, in which each student has a device he or she can work on, keep, customize, and take home. For true technological advance to occur, the computers must be personal to each learner. When used properly and well for education, these computers become extensions of the students' personal self and brain. They must have each student's stuff and each student's style all over them (in case you haven't noticed, kids love to customize and make technology personal), and that is something sharing just doesn't allow. Any ratio that involves sharing computers -- even two kids to a computer -- will delay the technology revolution from happening. (Go to Project Inkwell's Web site for more information about one-to-one computing.)
Many groups are working on solutions to the one-to-one problem, and this approach is being implemented in several places, including Maine; Vail, Arizona; Florida's Broward County Schools; and the Lemon Grove School District, in Lemon Grove, California. Those who cite cost as a barrier to implementing one-to-one computing should know that the prices of these devices, as with all technology, are falling dramatically. Although the expense is often estimated at $500 to $1,000 per unit, this year, according to longtime computer visionary Nicholas Negroponte, we will see a basic laptop computer for roughly $100.
The Social Barrier: Digital Immigrants
A second key barrier to technological adoption is more challenging. Schools (which really means the teachers and administrators) famously resist change. Though some observers, including multiple-intelligences guru Howard Gardner, point to schools as the "conservators" of our culture, and therefore instinctively conservative in what they do, the resistance comes more from the fact that our public school system has evolved an extremely delicate balance between many sets of pressures -- political, parental, social, organizational, supervisory, and financial -- that any technological change is bound to disrupt. For example, such shifting certainly initially means more work and pressure on educators, who already feel overburdened.
In the past, the pressure against disruption has always been stronger than the pressure for change. So, as new technologies -- from radio to television, from telephones to cell phones, from cameras to video cams, or even Wikipedia -- have come down the pike, American public schools have fearfully stood ready to exclude them. Change hasn't happened.
But resisting today's digital technology will be truly lethal to our children's education. They live in an incredibly fast-moving world significantly different than the one we grew up in. The number-one technology request of today's students is to have email and instant messaging always available and part of school. They not only need things faster than their teachers are used to providing them, they also have many other new learning needs as well, such as random access to information and multiple data streams.
These "digital natives" are born into digital technology. Conversely, their teachers (and all older adults) are "digital immigrants." Having learned about digital technology later in life, digital immigrants retain their predigital "accents" -- such as, thinking that virtual relationships (those that exist only online) are somehow less real or important than face-to-face ones. Such outmoded perspectives are serious barriers to our students' 21st-century progress.
Many schools still ban new digital technologies, such as cell phones and Wikipedia. Even when schools do try to move forward, they often face antitechnology pressure from parents demanding that schools go back to basics. Many teachers, under pressure from all sides, are often so afraid to experiment and to trust their kids with technology that they demand extensive training before they will try anything new. All these factors impede even the many schools trying to change.
New Problems, New Solutions
With very few exceptions, our schools have not been physically designed for computers. Much time in our schools' 45-minute instructional periods is often wasted in computer setup and shutdown. Teachers are often unsure about how to integrate technology in their lesson plans and, often, administrators have little, if any, guidance to give them. In many places where technology could liberate teachers most, such as automatic grading of homework and tests, automation has been neglected. Adding digital technology is generally disruptive to what schools and teachers do, and the pressure of high-stakes testing only exacerbates this problem.
How, then, do we move forward?
First, consult the students. They are far ahead of their educators in terms of taking advantage of digital technology and using it to their advantage. We cannot, no matter how hard we try or how smart we are (or think we are), invent the future education of our children for them. The only way to move forward effectively is to combine what they know about technology with what we know and require about education. Sadly, in most cases, no one asks for their opinion. I go to conference after conference on school technology, and nary a student is in sight. I do hope that, after having pointed this situation out a hundred times or so, I will find that it is starting to change. Students will have to help, and we will have to think harder about how to make this happen.
New Things in New Ways
For the digital age, we need new curricula, new organization, new architecture, new teaching, new student assessments, new parental connections, new administration procedures, and many other elements. Some people suggest using emerging models from business -- but these, for the most part, don't apply. Others suggest trying to change school size -- but this will not help much if we are still doing the wrong things, only in smaller spaces.
What we're talking about is invention -- new things in new ways. Change is the order of the day in our kids' 21st-century lives. It ought to be the order of the day in their schools as well. Not only would students welcome it, they will soon demand it. Angus King, the former governor of Maine who pushed for one-to-one computing in that state's schools, recently suggested our kids "should sue us" for better education. I suggest that every lesson plan, every class, every school, every school district, and every state ought to try something new and then report to all of us what works and what doesn't; after all, we do have the Internet.
Some people will no doubt worry that, with all this experimentation, our children's education will be hurt. "When will we have time for the curriculum," they will ask, "and for all the standardized testing being mandated?" If we really offered our children some great future-oriented content (such as, for example, that they could learn about nanotechnology, bioethics, genetic medicine, and neuroscience in neat interactive ways from real experts), and they could develop their skills in programming, knowledge filtering, using their connectivity, and maximizing their hardware, and that they could do so with cutting-edge, powerful, miniaturized, customizable, and one-to-one technology, I bet they would complete the "standard" curriculum in half the time it now takes, with high test scores all around. To get everyone to the good stuff, the faster kids would work with and pull up the ones who were behind.
In other words, if we truly offer our kids an Edutopia worth having, I believe our students will work as hard as they can to get there.
So, let's not just adopt technology into our schools. Let's adapt it, push it, pull it, iterate with it, experiment with it, test it, and redo it, until we reach the point where we and our kids truly feel we've done our very best. Then, let's push it and pull it some more. And let's do it quickly, so the 22nd century doesn't catch us by surprise with too much of our work undone.
A big effort? Absolutely. But our kids deserve no less.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the adoption of technology in schools and does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text provided is focused on educational technology and does not contain any unsafe or inappropriate content. It discusses the use of technology in education and the challenges faced by educators in integrating new technologies. Therefore, it is fully appropriate for all audiences and educational environments.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the challenges and potential solutions for integrating digital technologies into schools. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "866-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "866-1",
"llm_safety_score": 0,
"reason": "educational content"
},
{
"custom_id": "866-2",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.edutopia.org/adopt-and-adapt-shaping-tech-for-classroom?page=11",
"date": "2013-12-10T07:59:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164013027/warc/CC-MAIN-20131204133333-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9641268849,
"token_count": 3012,
"score": 3.046875,
"int_score": 3
}
|
<urn:uuid:1f5e2d57-69e9-40bf-82bf-5aab45181417>
|
Some diesel engines need their veggies, too!
by Robert W. Varney
We’ve known for years that
eating vegetables can help us stay healthy, but who would guess
that vegetables could also be good for diesel engines? Manufactured
from vegetable oils, primarily soy beans, biodiesel is a safe,
biodegradable, renewable fuel that offers a reduction in many
air pollutants when used in ordinary diesel engines and furnaces.
Biodiesel has widespread benefits.
It helps farmers, creating a new market for agricultural products;
reduces U.S. dependence on foreign oil; burns more cleanly than
regular diesel fuel; and creates jobs in sectors that support
the growing and developing infrastructure of the biodiesel market.
Biodiesel is becoming more widely available with its latest propulsion
coming from new tax incentives aimed at closing the gap between
petroleum diesel fuel and biodiesel.
Biodiesel is usually blended
with regular diesel fuel. Blends of 20 percent biodiesel with
80 percent petroleum diesel (B20) can be used in unmodified diesel
engines or furnaces. Biodiesel can be used in its pure form (B100),
but may require engine modifications to avoid maintenance and
performance problems. Because pure biodiesel can gel in cold weather,
B100 may not be suitable for use in cold climates. The National
Biodiesel Board reports that more than 400 major fleets nationwide
are using biodiesel in their vehicles. Many institutions are also
beginning to heat their buildings with biodiesel blended with
Advantages & Considerations
Biodiesel has some unique environmental
attributes. Perhaps the most interesting is that biodiesel, as
compared to petroleum diesel, produces significantly less carbon
dioxide, a climate change gas. According to the U.S. Department
of Energy, biodiesel production and use, in comparison to petroleum
diesel, produces 78 percent less carbon dioxide emissions. Carbon
dioxide is released when biodiesel made from soybeans is combusted,
but the annual production of soybean crops helps remove carbon
dioxide from the atmosphere.
In addition to helping reduce
emissions of carbon dioxide, biodiesel also has other significant
environmental benefits. EPA estimates that B20 reduces emissions
of particulate matter and carbon monoxide by about 10 percent
and hydrocarbons by more than 20 percent. Unfortunately, using
B20 in a diesel engine can increase emissions of smog-causing
nitrogen oxides by about 2 percent. Using higher blends of biodiesel
can help further reduce most emissions, but will result in a greater
increase in emissions of nitrogen oxides. EPA estimates that B100
increases nitrogen oxides emissions by 10 percent. Some biodiesel
produces more nitrogen oxides than others, but some additives
have shown promise in counteracting the increase.
Biodiesel can also be blended
with oil used for heating, generating similar reductions in emissions
of particulate matter, carbon monoxide, and hydrocarbons. Interestingly,
due to different combustion temperatures between stationary oil
burners and diesel vehicles, emissions of nitrogen oxides do not
increase when biodiesel is used in furnaces.
While biodiesel has some impressive environmental benefits,
currently it has two key drawbacks - cost and convenience. B20
costs about $.20 more per gallon than regular diesel fuel and
B100 costs about $1 more per gallon. A large percentage of this
cost difference comes from transportation and distribution costs.
As new tax incentives take effect and the number of biodiesel
refueling stations increases, the cost differential between biodiesel
and regular diesel may decrease over time.
Under the new law, federal excise
tax credit is offered to biodiesel blenders - entities that mix
pure biodiesel with regular petroleum diesel fuel. The credit
amounts to one cent per percentage point of biodiesel made from
first-use oils (such as soybean oil) and a half-cent per percentage
of biodiesel made from other sources (such as recycled cooking
oil). In other words, an excise tax credit of $1.00 per gallon
is offered to certified biodiesel blenders of refined B100 biodiesel.
The intent of the tax incentives is that blenders will pass along
the cost savings to consumers through competitive pricing practices.
Fortunately, the infrastructure needed to get biodiesel
to consumers is emerging at a rapid pace. Currently, there are
several suppliers of biodiesel, approximately twenty blenders
and distributors of biodiesel, and a similar number of biodiesel
retail fueling sites in New England. The National Biodiesel Board
tracks suppliers, distributors, and retail providers of biodiesel.
For the current list visit www.biodiesel.org.
Some organizations with capital
and commitment to the environment are building their own infrastructure
to support biodiesel use. For example, Harvard University spent
$60,000 to build a campus fueling station in Boston. Harvard is
currently fueling its fleet of 48 diesel vehicles, including 8
shuttle buses, with B20. Despite record low temperatures in 2004,
Harvard reports no problems with the fuel or the vehicles. Because
of the success of this project, Harvard is exploring other applications
of B20 use at its facilities.
Using biodiesel may be more challenging
for consumers who are not in close proximity to biodiesel refineries
or fueling stations. For example, Vermont Law School in South
Royalton, committed to using B20 to heat their library because
of the environmental benefits attributable to biodiesel use. A
spokesperson from the school reports that they are paying a $1.00
per gallon premium for heating the building with biodiesel and
that it has been difficult to coordinate delivery of the fuel
with a local distributor. In spite of that, the school plans to
continue to use biodiesel and is hopeful that the new tax incentives
enjoyed by biodiesel blenders will be passed on to consumers in
Where in New England?
Biodiesel is being used throughout New England in a
number of locations including: Connecticut Department of Transportation;
L.L. Bean, Inc.; Maine Department of Transportation; City of Bangor,
Maine; Harvard University; UMASS Amherst; NSTA;, Cities of Medford,
Cambridge, and Brookline; Mount Cranmore Ski Resort; New Hamshire
Department of Transportation; Keene State College and the City
of Keene; Pease Air Force Base; Warwick Rhode Island; University
of Vermont; Vermont Law School; Sugarbush Ski Resort; and Vermont
For information, see: www.epa.gov/ne/eco/diesel/retrofits.html
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative about biodiesel, without any unsafe or inappropriate content. It discusses the benefits and considerations of using biodiesel in a way that is suitable for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided discusses the use of biodiesel in various institutions and organizations in New England. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to environmental benefits and energy use, which are appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "868-0",
"llm_safety_score": 0,
"reason": "educational content with no unsafe elements"
},
{
"custom_id": "868-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.americanrecycler.com/0405some.shtml",
"date": "2013-12-11T21:59:45",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164050279/warc/CC-MAIN-20131204133410-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8963801861,
"token_count": 1414,
"score": 3.34375,
"int_score": 3
}
|
<urn:uuid:b41e3b95-8880-491b-b7c1-bd25c8ceab63>
|
Optimistic Parenting: Hope and Help for You and Your Challenging Child is written by V. Mark Durand.
Dr. Durand is a world renowned expect in autism and challenging behaviours. He has been a leading researcher in many of the important interventions we value for children with autism such as the concept of teaching functional communication. He is the author of several books that been helpful for families with children with autism including his book, Sleep Better, which provides intervention strategies for sleep issues.
Dr. Durand’s most recent book recounts what he has learned from working with parents for many years. Optimistic Parenting details a philosophy and practical techniques for parents to use to assist them in becoming more confident, skillful and positive in their parenting of children with challenging behaviour. His insight into this topic is based on his observation of his own parenting experiences, other persons parenting styles as well as a long term research project working with parents to examine and in some cases reframe their thinking regarding their ability to change their child’s behaviour.
Over the years, Dr. Durand has worked with children with challenging behaviours and their families he found that the best predictor of child outcome was parent’s attitude toward their ability to effect change in their child’s behaviour. Parents who had an optimistic belief that they could handle their child’s behaviour, change the way they think in stressful situations and that their child could change their behaviour created the larger degree of behaviour change in their child. On the other hand, pessimistic parents lack confidence that they can deal with difficult situations so are more likely to not persist in making changes. During his research project, strategies were discussed to assist parents in increasing their understanding of challenging behaviour and make plans to prevent or deal with them. In addition, during this series of sessions parents were provided with strategies to assist them in gaining insight into their own thoughts while their child was engaging in challenging behaviour.
Dr. Durand offers ten tips for optimistic parents:
1. Explore your thoughts and feelings before, during and after meltdowns.
2. If your spouse or partner doesn’t help , ask why.
3. Believe you are a good parent.
4. Believe your child can change.
5. Take care of yourself.
6. Leverage- don’t multitask.
7. Parent in the moment.
8. Recognize and appreciate the good things in life.
9. Express gratitude to those who help you.
10. Sometimes bad is okay.
For parents who had a pessimistic view about their ability to effect change in their child’s behavior, strategies such as distraction and substitution were introduced for them to use to try to change the way they thought about their ability to parent and gain some control of their thoughts. Dr. Durand describes strategies such as keeping a journal and the use of self talk to gain insight into thought patterns as a means toward changing one’s thinking. Distraction strategies such as interrupting unproductive or distressing thoughts were suggested and practiced by parents. Substitution strategies included replacing unproductive and distressing thoughts with more positive thoughts. Personal stories from several families are shared to illustrate Dr. Durand’s approach.
Optimistic Parenting also provides a step by step guide to analyzing challenging behaviour, responding to it with confidence and teaching replacement behaviours for lasting behaviour improvement. Dr. Durand describes how to deal with emergency situations by either avoiding or improving them, offering choices and creating predictable routines. Separate chapters are included to specifically address interventions for transitions and sleep.
As a parent and professional, I found this book to be very informative both from the perspective of better understanding challenging behaviour and how my own thoughts and behaviour impact can impact a child’s behaviour. If you’ve read it, please share your thoughts with us.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content about parenting strategies\", \"score\": 0}\n```\n\nThe text is entirely focused on providing educational and informative content about parenting strategies, particularly for parents dealing with challenging behaviors in their children. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "870-0",
"llm_safety_score": 0,
"reason": "educational and informative content about parenting strategies"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.autismoutreach.ca/forum/optimistic-parenting-hope-and-help-you-and-your-challenging-child",
"date": "2013-12-13T07:38:06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164911644/warc/CC-MAIN-20131204134831-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9719786644,
"token_count": 786,
"score": 2.703125,
"int_score": 3
}
|
<urn:uuid:1530b527-e156-40cc-bf3f-f564d5e8e5cf>
|
The Piaggio Company originated from a company which had its roots in the building of ships and trains and was established in 1884. Early in the 20the century , in 1915 , the first aeroplanes were built under license.
Giovanni Casiraghi, a successful engineer, was already employed in the late 1930s by Piaggio Aero and created many successful aircraft types.
The Piaggio Focke Wulf 149 D has its origins in early post-war Italy. The Piaggio Companyn in Genova survived post-war years by diversifying its production; a method which led to the success of the "VESPA" , and in the aircraft field to the production of several successful aircraft designs The first post-war production aircraft was the P-136, a modern amphibious plane, followed by the P-166 landplane.
In 1950 Giovanni Casiraghi designed the P-148, an all-metal 2 seater tailwheel trainer, from which the P-149 was developed.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a historical and factual description of the Piaggio Company and its aircraft designs. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "872-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.seagull-formation.nl/index.php?option=com_content&view=article&id=33&Itemid=45&lang=en",
"date": "2013-12-21T18:33:12",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776439/warc/CC-MAIN-20131218054936-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9832493067,
"token_count": 212,
"score": 2.578125,
"int_score": 3
}
|
<urn:uuid:a9175513-f75e-442c-b711-4261d517786f>
|
Time in History: Views of Time from Prehistory to the Present Day
by G J Whitrow
Never before has time obsessed humanity as much as now. The more accurately we measure it, the more it worries us. Although we complain that it ... Show synopsis Never before has time obsessed humanity as much as now. The more accurately we measure it, the more it worries us. Although we complain that it passes too quickly, we seldom question its fundamental characteristics or the methods we use to measure it. Having grown so accustomed to the ideas of time, history, and evolution, we find it hard to imagine that these concepts were not always considered important. If, however, we wish to understand why time dominates our way of life and thought, we must examine the role it has played throughout history. G.J. Whitrow provides just the study we need. His compelling, groundbreaking volume traces the evolution of our general awareness of time and its significance from the dawn of history to the present day. He examines not only the development of our methods of measuring time, but also discusses how changing concepts of time have influenced history itself. From prehistoric times to the twentieth century, and ranging from Ancient Egypt, Greece, Israel, the Islamic World, India, and China, to Europe and America, Whitrow presents an absorbing account of the different ways that various civilizations throughout history have perceived time.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is a book synopsis and does not contain any unsafe, inappropriate, or harmful content. It discusses historical and philosophical views on time without any offensive language, illegal activities, or other concerning elements."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "873-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.alibris.com/booksearch?qwork=6703157",
"date": "2013-12-05T15:32:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046759/warc/CC-MAIN-20131204131726-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9683880806,
"token_count": 277,
"score": 3.140625,
"int_score": 3
}
|
<urn:uuid:ce1ab086-2242-44ef-aa5b-3544656a1fba>
|
The Shrewbot is the latest in a series of robots which use ‘active touch’ rather than vision to navigate their environment. It was developed at Bristol Robotics Laboratory (BRL) in collaboration with the Univ. of Sheffield Active Touch Laboratory as part of the BIOTACT project, Professor Tony Pipe (UWE Bristol) and Professor Tony Prescott (Univ. of Sheffield) are working on the Shrewbot project with a number of partners. BRL is a collaboration between UWE Bristol and the Univ. of Bristol.
The shrew sweeps its whiskers back and forth at high speeds and through picking up vibrations it gathers information from the environment such as the location, shape and texture of objects. It then stores this information in its memory.
Posted by Michael Kaudze on 01/31 at 02:59 PM
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is a description of a scientific research project and does not contain any unsafe, inappropriate, or harmful content. It is suitable for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "874-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.servomagazine.com/index.php/blog/post/the_shrewbot",
"date": "2013-12-05T15:30:55",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046759/warc/CC-MAIN-20131204131726-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9489612579,
"token_count": 168,
"score": 2.734375,
"int_score": 3
}
|
<urn:uuid:ebbe8b13-fcb5-4a75-a06d-466ac37555cb>
|
The General Packet Radio Service (GPRS) is a new non-voice value added service that allows information to be sent and received across a mobile telephone network. It supplements today’s Circuit Switched Data and Short Message Service. GPRS is NOT related to GPS (the Global Positioning System), a similar acronym that is often used in mobile contexts.
Enabling GPRS on a GSM network requires the addition of two core modules, the Gateway GPRS Service Node (GGSN) and the Serving GPRS Service Node (SGSN). As the word Gateway in its name suggests, the GGSN acts as a gateway between the GPRS network and Public Data Networks such as IP and X.25. GGSNs also connect to other GPRS networks to facilitate GPRS roaming. The Serving GPRS Support Node (SGSN) provides packet routing to and from the SGSN service area for all users in that service area.
In addition to adding multiple GPRS nodes and a GPRS backbone, some other technical changes that need to be added to a GSM network to implement a GPRS service. These include the addition of Packet Control Units; often hosted in the Base Station Subsystems, mobility management to locate the GPRS Mobile Station, a new air interface for packet traffic, new security features such as ciphering and new GPRS specific signalling.
A wide range of corporate and consumer applications are enabled by non voice mobile services such as SMS and GPRS. This section will introduce those that are particularly suited to GPRS.
Chat: Chat can be distinguished from general information services because the source of the information is a person with chat whereas it tends to be from an Internet site for information services. The "information intensity" - the amount of information transferred per message tends to be lower with chat, where people are more likely to state opinions than factual data. In the same way as Internet chat groups have proven a very popular application of the Internet, groups of like-minded people - so called communities of interest - have begun to use nonvoice mobile services as a means to chat and communicate and discuss.
Because of its synergy with the Internet, GPRS would allow mobile users to participate fully in existing Internet chat groups rather than needing to set up their own groups that are dedicated to mobile users. Since the number of participants is an important factor determining the value of participation in the newsgroup, the use of GPRS here would be advantageous. GPRS will not however support point to multipoint services in its first phase, hindering the distribution of a single message to a group of people. As such, given the installed base of SMS capable devices, we would expect SMS to remain the primary bearer for chat applications in the foreseeable future, although experimentation with using GPRS is likely to commence sooner rather than later.
Textural and Visual Information:
A wide range of content can be delivered to mobile phone users ranging from share prices, sports scores, weather, flight information, news headlines, prayer reminders, lottery results, jokes, horoscopes, traffic, location sensitive services and so on. This information need not necessarily be textual- it may be maps or graphs or other types of visual information.
The length of a short message of 160 characters suffices for delivering information when it is quantitative - such as a share price or a sports score or temperature. When the information is of a qualitative nature however, such as a horoscope or news story, 160 characters is too short other than to tantalize or annoy the information recipient since they receive the headline or forecast but little else of substance. As such, GPRS will likely be used for qualitative information services when end users have GPRS capable devices, but SMS will continue to be used for delivering most quantitative information services. Interestingly, chat applications are a form of qualitative information that may remain delivered using SMS, in order to limit people to brevity and reduce the incidence of spurious and irrelevant posts to the mailing list that are a common occurrence on Internet chat groups.
Still images such as photographs, pictures, postcards, greeting cards and presentations, static web pages can be sent and received over the mobile network as they are across fixed telephone networks. It will be possible with GPRS to post images from a digital camera connected to a GPRS radio device directly to an Internet site, allowing near real-time desktop publishing.
Over time, the nature and form of mobile communication is getting less textual and more visual. The wireless industry is moving from text messages to icons and picture messages to photographs and blueprints to video messages and movie previews being downloaded and on to full blown movie watching via data streaming on a mobile device.
Sending moving images in a mobile environment has several vertical market applications including monitoring parking lots or building sites for intruders or thieves, and sending images of patients from an ambulance to a hospital. Videoconferencing applications, in which teams of distributed sales people can have a regular sales meeting without having to go to a particular physical location, is another application for moving images.
Using Circuit Switched Data for web browsing has never been an enduring application for mobile users. Because of the slow speed of Circuit Switched Data, it takes a long time for data to arrive from the Internet server to the browser. Alternatively, users switch off the images and just access the text on the web, and end up with difficult to read text layouts on screens that are difficult to read from. As such, mobile Internet browsing is better suited to GPRS.
Document Sharing/Collaborative Working:
Mobile data facilitates document sharing and remote collaborative working. This lets different people in different places work on the same document at the same time. Multimedia applications combining voice, text, pictures and images can even be envisaged. These kinds of applications could be useful in any problem solving exercise such as fire fighting, combat to plan the route of attack, medical treatment, advertising copy setting, architecture, journalism and so on. Even comments on which resort to book a holiday at could benefit from document sharing to save everyone having to visit the travel agent to make a decision. Anywhere somebody can benefit from having and being able to comment on a visual depiction of a situation or matter, such collaborative working can be useful. By providing sufficient bandwidth, GPRS facilitates multimedia applications such as document sharing.
Despite many improvements in the quality of voice calls on mobile networks such as Enhanced Full Rate (EFR), they are still not broadcast quality. There are scenarios where journalists or undercover police officers with portable professional broadcast quality microphones and amplifiers capture interviews with people or radio reports dictated by themselves and need to send this information back to their radio or police station. Leaving a mobile phone on, or dictating to a mobile phone, would simply not give sufficient voice quality to allow that transmission to be broadcast or analyzed for the purposes of background noise analysis or voice printing, where the speech autograph is taken and matched against those in police storage. Since even short voice clips occupy large file sizes, GPRS or other high speed mobile data services are needed.
Nonvoice mobile services can be used to assign and communicate new jobs from office-based staff to mobile field staff. Customers typically telephone a call center whose staff take the call and categorize it. Those calls requiring a visit by field sales or service representative can then be escalated to those mobile workers. Job dispatch applications can optionally be combined with vehicle positioning applications - such that the nearest available suitable personnel can be deployed to serve a customer. GSM nonvoice services can be used not only to send the job out, but also as a means for the service engineer or sales person can keep the office informed of progress towards meeting the customer's requirement. The remote worker can send in a status message such as "Job 1234 complete, on my way to 1235".
With up to half of employees typically away from their desks at any one time, it is important for them to keep in touch with the office by extending the use of corporate email systems beyond an employee's office PC. Corporate email systems run on Local Area computer Networks (LAN) and include Microsoft Mail, Outlook, Outlook Express, Microsoft Exchange, Lotus Notes and Lotus cc:Mail.
Since GPRS capable devices will be more widespread in corporations than amongst the general mobile phone user community, there are likely to be more corporate email applications using GPRS than Internet email ones whose target market is more general.
Internet email services come in the form of a gateway service where the messages are not stored, or mailbox services in which messages are stored. In the case of gateway services, the wireless email platform simply translates the message from SMTP, the Internet email protocol, into SMS and sends to the SMS Center. In the case of mailbox email services, the emails are actually stored and the user gets a notification on their mobile phone and can then retrieve the full email by dialing in to collect it, forward it and so on.
Upon receiving a new email, most Internet email users do not currently get notified of this fact on their mobile phone. When they are out of the office, they have to dial in speculatively and periodically to check their mailbox contents. However, by linking Internet email with an alert mechanism such as SMS or GPRS, users can be notified when a new email is received.
This application integrates satellite positioning systems that tell people where they are with nonvoice mobile services that let people tell others where they are. The Global Positioning System (GPS) is a free-to-use global network of 24 satellites run by the US Department of Defense. Anyone with a GPS receiver can receive their satellite position and thereby find out where they are. Vehicle positioning applications can be used to deliver several services including remote vehicle diagnostics, ad-hoc stolen vehicle tracking and new rental car fleet tariffs.
The Short Message Service is ideal for sending Global Positioning System (GPS) position information such as longitude, latitude, bearing and altitude. GPS coordinates are typically about 60 characters in length. GPRS could alternatively be used.
Remote LAN Access:
When mobile workers are away from their desks, they clearly need to connect to the Local Area Network in their office. Remote LAN applications encompasses access to any applications that an employee would use when sitting at their desk, such as access to the intranet, their corporate email services such as Microsoft Exchange or Lotus Notes and to database applications running on Oracle or Sybase or whatever. The mobile terminal such as handheld or laptop computer has the same software programs as the desktop on it, or cut down client versions of the applications accessible through the corporate LAN. This application area is therefore likely to be a conglomeration of remote access to several different information types - email, intranet, databases. This information may all be accessible through web browsing tools, or require proprietary software applications on the mobile device. The ideal bearer for Remote LAN Access depends on the amount of data being transmitted, but the speed and latency of GPRS make it ideal.
As this generic term suggests, file transfer applications encompass any form of downloading sizeable data across the mobile network. This data could be a presentation document for a traveling salesperson, an appliance manual for a service engineer or a software application such as Adobe Acrobat Reader to read documents. The source of this information could be one of the Internet communication methods such as FTP (File Transfer Protocol), telnet, http or Java - or from a proprietary database or legacy platform. Irrespective of source and type of file being transferred, this kind of application tends to be bandwidth intensive. It therefore requires a high speed mobile data service such as GPRS, EDGE or UMTS to run satisfactorily across a mobile network.
Home automation applications combine remote security with remote control. Basically, you can monitor your home from wherever you are - on the road, on holiday, or at the office. If your burglar alarm goes off, not only do you get alerted, but you get to go live and see who are perpetrators are and perhaps even lock them in. Not only can you see things at home, but you can do things too. You can program your video, switch your oven on so that the preheating is complete by the time you arrive home (traffic jams permitting) and so on. Your GPRS capable mobile phone really does become like the remote control devices we use today for our television, video, hi-fi and so on. As the Internet Protocol (IP) will soon be everywhere - not just in mobile phones because of GPRS but all manner of household appliances and in every machine - these devices can be addressed and instructed. A key enabler for home automation applications will be Bluetooth, which allows disparate devices to interwork.
GPRS has several unique features which can be summarized as:
Immediacy: GPRS facilitates instant connections whereby information can be sent or received immediately as the need arises. No dial-up modem connection is necessary. This is why GPRS users are sometimes referred to be as being "always connected". Immediacy is one of the advantages of GPRS (and SMS) when compared to Circuit Switched Data. High immediacy is a very important feature for time critical applications such as remote credit card authorization where it would be unacceptable to keep the customer waiting for even thirty extra seconds.
Speed: Theoretical maximum speeds of up to 171.2 kilobits per second (kbps) are achievable with GPRS using all eight timeslots at the same time. This is about three times as fast as the data transmission speeds possible over today’s fixed telecommunications networks and ten times as fast as current Circuit Switched Data services on GSM networks.
Service Access: To use GPRS, users specifically need:
- mobile phone or terminal that supports GPRS (existing GSM phones do NOT support GPRS)
- subscription to a mobile telephone network that supports GPRS
- use of GPRS must be enabled for that user. Automatic access to the GPRS may be allowed by some mobile network operators, others will require a specific opt-in
- knowledge of how to send and/ or receive GPRS information using their specific model of mobile phone, including software and hardware configuration (this creates a customer service requirement)
- destination to send or receive information through GPRS. Whereas with SMS this was often another mobile phone, in the case of GPRS, it is likely to be an Internet address, since GPRS is designed to make the Internet fully available to mobile users for the first time. From day one, GPRS users can access any web page or other Internet applications- providing an immediate critical mass of uses.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is purely informational and educational, discussing technical aspects of GPRS and its applications. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses various aspects of mobile data and its applications without any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences.",
"{\"reason\": \"technical information\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses technical aspects of remote LAN access, home automation, and GPRS technology. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "875-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "875-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "875-2",
"llm_safety_score": 0,
"reason": "technical information"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.foosms.com/gprs.htm",
"date": "2013-12-07T05:49:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053608/warc/CC-MAIN-20131204131733-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9254336357,
"token_count": 3031,
"score": 3.203125,
"int_score": 3
}
|
<urn:uuid:d59c6ae5-94d1-4121-81fb-c112e3a171a2>
|
Q: How many glass panels are in the Pavilion?
A: 376 panels. Each segment is made of two 3/8-inch panels laminated together for a total thickness of ¾ inch.
Q: Do the glass blowing furnaces run continuously?
A: The furnaces that actually melt glass into its molten form run continuously. They are turned off only for maintenance purposes.
Q: How hot do the glass furnaces get?
Q: How do you keep the glass blowing facilities cool while keeping the galleries and other spaces warm?
A: There are several methods in place to ensure that the furnace heat does not affect the rest of the building. First, a hood is located around the furnaces to direct most of the heat out through the roof. Airflow through the hood captures and exhausts the heat. The glass blowing studios are also equipped with heat recovery coils embedded in the floors that absorb heat from the furnaces and return it to the radiant heating system within the building cavities. Finally, conditioned air from the galleries is directed into the hot shops to help control temperatures. The space between the panels of glass acts as an effective insulator.
Q: With an all-glass building, how do you keep the windows clean?
A: Other buildings with primarily glass facades generally need to be cleaned twice a year. At the Glass Pavilion, this can be accomplished by simply using a squeegee and cleaning solution; a relatively uncomplicated process because the building is only 15 feet tall. Interior glass surfaces are also cleaned whenever necessary; the process is no more difficult than washing glass doors or windows in a standard house.
Q: Aren’t some of the items in the Museum’s glass collection sensitive to light? What is being done about preservation of these items?
A: A shading system is installed in the building that uses light-screening curtains that result in the reduction of light in needed areas. Due to the patterns followed by sunlight throughout the year, these curtains need to be adjusted only seasonally.
Q: Is there a special UV coating applied to the glass?
A: No. The laminate layer between the two glass panels serves as a UV filter, so an additional UV coating of the structural glass is not necessary.
Q: In most buildings, electrical wiring and HVAC ducts run through the walls, but none of those are visible in the Glass Pavilion. Where are they?
A: The Glass Pavilion wiring and HVAC ducts are routed through the floors and ceiling of the building, as well as within the opaque dry-walled sections of the first floor. The basement-level systems are installed using standard construction methods. The physical plant is housed in the Pavilion basement and in a building nearby.
Q: The building has a flat roof—what happens if this area gets a heavy snowfall?
A: The roof of the building was specifically designed to accommodate heavy rain and snowfall. Although the roof appears flat, it is actually a series of inverted pyramids. Each directs water to a drainpipe, which in turn directs the water into the building’s main drainage system.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is purely informational and does not contain any unsafe, inappropriate, or harmful content. It discusses the construction and maintenance of a glass pavilion, providing factual information without any offensive, illegal, or harmful elements."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "876-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.toledomuseum.org/glass-pavilion/architecture/faq-about-the-pavilion/",
"date": "2013-12-07T06:01:43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053608/warc/CC-MAIN-20131204131733-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9613380432,
"token_count": 646,
"score": 2.734375,
"int_score": 3
}
|
<urn:uuid:814b9dd7-338f-4500-8920-801d74265ccd>
|
The principle of the UGF is very simple: You want to suspend the filter material (sand/gravel) above the bottom of the tank and draw water down through it. This feeds the nitrifying bacteria which grows in the substrate, which is the biological filter for the aquarium. The substrate also acts as a mechanical filter As the tank water is drawn down through the substrate, it traps the suspended particles, taking them out of the water.
UGF's work well when you want a reasonably good filter in a tank that you don't want a lot of water movement. We have found that UGF filters work very well for raising Clownfish or Seahorse fry. You can use an air stone in the uptake tube to create the water flow down through the filter, or you can use a small powerhead to create a stronger flow through the filter and water movement in the tank.
The UGF illustrated in this DIY project was created for raising newly born Seahorses and uses a small Hagen Aquaclear powerhead both to drive the UGF in the 10 gallon tank and to create a bit of water movement. The parts list is for a 55g tank UGF. You can adjust the amount of PVC and screen to fit the needs of your tank.
Ok, here is what you will need to construct your own UGF filter(s) as we did.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"safe\", \"score\": 0}\n```\n\nThe text provided is entirely focused on explaining the principles and setup of an Under-Gravel Filter (UGF) for aquariums. It contains no unsafe content, inappropriate language, or references to illegal activities. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "877-0",
"llm_safety_score": 0,
"reason": "safe"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://saltaquarium.about.com/od/diyundergravelfilters/ss/sbsdiyugffilter.htm",
"date": "2013-12-09T03:13:40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163857566/warc/CC-MAIN-20131204133057-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9616354108,
"token_count": 279,
"score": 2.640625,
"int_score": 3
}
|
<urn:uuid:67ab6621-2862-4df9-a870-bec7e219f5e7>
|
Eye Protection is Essential for Texas Athletes
State’s largest group of eye physicians recommends
sport-specific eyewear to prevent devastating injuries
“After the knock to my eye, all I could see was a black haze,” Stephen recalls. “I was rushed to the emergency room in the middle of the game, where I was told that I might have permanent damage to my left eye.” Fortunately Stephen regained his vision three weeks later, but had to miss his last senior game because of the eye injury. He went on to play college basketball and has vowed to always wear protective eyewear while playing.
April is Sports Eye Safety Awareness Month, and Texas Ophthalmological Association (TOA) reminds the public that 40,000 people suffer from eye injuries related to sports every year. The Academy advocates the need for athletes to wear appropriate, sport-specific protective eyewear properly fitted by an eye care professional. Lenses made from polycarbonate materials provide the highest level of impact protection; they can withstand a ball or other projectile traveling at 90 miles per hour.
“Eye injuries from sports can be devastating, and the only way to prevent them is by wearing protective eyewear” said
In addition to abrasions of the cornea and bruises of the lids, sports injuries can include retinal detachments and internal bleeding. The most serious risks involve permanent vision loss along with infection. In addition, patients who have sustained eye injuries are at greater risk for developing glaucoma.
Student athletes are not the only ones that can suffer from eye injuries, as seen with Phoenix Suns player
Many sports create risk for eye injuries; however, protection is available for most sports, including basketball, baseball, hockey, football, lacrosse, fencing, paintball, water polo, golf and others. “Wearing properly fitted protective eyewear will not harm your performance, and it may well save your sight,” says Dr. Berger. Most sporting leagues don’t require children to wear eye protection, so parents should take special care to ensure their children wear eye protection.
Learn about eye injuries, names of Eye M.D.s in your area or ask an Eye M.D. a question by visiting www.GetEyeSmart.org. Consumers can submit questions about eye health to an ophthalmologist at http://www.geteyesmart.org/eyesmart/ask/index.cfm.
The TOA is a member organization of over 800 Texas ophthalmologists which was founded in 1956 to promote the science and art of medical eye care. Eye healthcare is provided by three sources — opticians, optometrists and ophthalmologists. It is the ophthalmologist, or Eye M.D., who can treat all eye diseases and injuries, and perform eye surgery. To find an Eye M.D. in your area, visit the TOA’s Web site at www.TexasEyes.org.
SOURCE Texas Ophthalmological Association
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is entirely focused on the importance of eye protection for athletes and does not contain any unsafe, inappropriate, or harmful content. It provides educational information about sports eye safety without any offensive language, illegal activities, or other concerning elements."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "878-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.redorbit.com/news/entertainment/1668935/eye_protection_is_essential_for_texas_athletes/",
"date": "2013-12-09T03:26:38",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163857566/warc/CC-MAIN-20131204133057-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9527177215,
"token_count": 627,
"score": 2.984375,
"int_score": 3
}
|
<urn:uuid:c1afe4b2-7c87-42e8-8bf2-2ad626818875>
|
The Nation's Report Card
NAEP: Reading Scores Flat at Grade 4, Up Slightly at Grade 8
Despite nearly two decades of policy and investment focused on closing academic achievement gaps and improving overall student achievement, reading scores on the NAEP 2009 assessment among fourth- and eighth-grade students have barely budged since 1992. And between the two most recent assessments (2007 and 2009), fourth-grade scores were flat, while eighth-grade scores increased just one point, returning to 2002's level.
Student reading scores barely moved in the 2009 National Assessment of Educational Progress (NAEP), otherwise known as "The Nation's Report Card." Scores for fourth graders on the test remained flat in the last two years, while scores for eighth graders increased by a small but statistically significant one point (on a 500-point scale).
NAEP is an ongoing program whose aim is to measure academic achievement trends across a wide variety of disciplines. To date, it has looked to accomplish this by delivering tests to students across the country focusing on reading, writing, math, science, and other subjects. The NAEP Reading 2009 exam itself comprised short essay questions, in which students were asked to write brief responses based on questions focused on sample passages, and multiple choice, fill-in-the-bubble questions. It was delivered nationally in 2009 to 178,800 fourth graders and 160,900 eighth graders from a total of 16,560 schools. (Sample questions for both grade levels can be found here.)
Overall Results: 4th and 8th Grade
Since administration of the test began in 1992, eighth-grade scores have increased only four points, or a mere 1.54 percent. While there was a statistically significant improvement in the last two years--when average scores on the 500-point scale increased from 263 in 2007 to 264 in 2009--the increase (which followed a one-point increase in 2007) only compensated for one-point drops experienced in 2003 and 2005, bringing reading scores back to the level seen in 2002.
Fourth-grade scores, meanwhile, have not fared as well. Between 2007 and 2009, there was no increase at all in the average scale reading score. It remained at 221 (again, out of 500). That's up from a low of 213 in the year 2000 but up only four points from the starting score in 1992.
Policy Implications and Test Validity
But how accurate a reflection of the state of student achievement can a standardized test provide?
In an online Q&A, we asked Peggy Carr, associate commissioner of the National Center for Education Statistics (NCES), to what degree do NAEP results reflect actual student reading achievement in a meaningful way?
She responded by saying that "great effort is devoted to ensuring that NAEP results do reflect actual student achievement, measured in a way that is substantively meaningful." She also responded:
NAEP uses several approaches to ensure that the NAEP reading assessment results are both valid and meaningful. First, the National Assessment Governing Board consults widely with reading experts and state department of education around the country to ensure that the most current reading research is reflected in the content of the reading assessment. Thus the NAEP reading assessment reflects content validity according to experts as well as scientific research on the skills that are required to read well. Second, the NAEP reading assessment includes some multiple-choice questions, but at least half or more of the testing time is devoted to questions that require students to do more than simply choose an answer from a list. Instead, they must construct their own answers that show their ability to develop and interpret the meaning of the written texts in the assessment booklets. Third, NAEP has for many years supported studies of the validity of NAEP's measurement of reading and mathematics. The papers and publications derived from this program of research are available [here].
(For those interested in more etails, the complete NAEP Reading 2009 framework can be found here.)
And policy makers certainly do take the results seriously.
United States Secretary of Education Arne Duncan responded to the results saying that they were not good enough and that progress wasn't happening fast enough: "Like the NAEP 2009 math scores released last fall, the reading scores demonstrate that students aren't making the progress necessary to compete in the global economy," he said in a statement released Wednesday.
"We shouldn't be satisfied with these results," he said. "By this and many other measures, our students aren't on a path to graduate high school ready to succeed in college and the workplace."
In a phone meeting with journalists, held Wednesday, Steven Paine, West Virginia state superintendent of schools and member of the National Assessment Governing Board, which sets policy for NAEP, said the results further hold implications for the proposed reauthorization of the Elementary and Secondary Education Act (ESEA) and for redesigning the curriculum.
"First of all, I think there are tremendous implications for the establishment of a state-led effort to create a very rigorous curriculum, one that reflects more of the types of skills that are embedded in the NAEP assessment, which I think really reflect those higher-level cognitive skills that kids will need as they enter this global [economy]," Paine said. "I also think there are some implications for what we do in our classrooms, in our schools. I think that once that rigorous, common-core curriculum is established, it will be essential for us to invest in the quality of teaching in this country ... so that we have teachers and principals who can rise to the level of the rigor that will be contained in this common core that will be more 'NAEP-like.'"
Some Good News?
Despite mostly gloomy accounts of the release, the 2009 NAEP reading report did show some signs of more significant progress in specific achievement categories. In 2009, a full 75 percent of eighth-grade students performed at or above the level defined as "basic," an increase from 69 percent in 1992 and a statistically significant one-point increase from 2007. Thirty-two percent were at or above the "proficient" level in 2009, up from 29 percent in 1992 and again up a statistically significant single percentage point from 2007. Another 3 percent ranked as "advanced," a figure that has been consistent in every test year from 1992 on.
At the eighth-grade level, nine states saw increases in scores in 2009 compared with 2007, while no states saw declines. However, at the fourth-grade level, while three states showed improvement, four actually experienced declines in test scores.
Gender, Ethnic, and Economic Group Breakdowns
At the fourth-grade level, girls continued to outperform boys in reading, both groups attaining scores identical to those achieved in 2007--224 for girls, 218 for boys. At the eighth-grade level, the situation was similar, but both groups increased their average scale scores by one point in 2009, resulting in a continued 10-point gap (269 for girls, 259 for boys).
Achievement gaps along ethnic lines remained fairly consistent, although there was some reordering of the rankings. For the first time in the test's history, white students at the eighth-grade level were outperformed by another group--Asian/Pacific Islanders. White students actually achieved an all-time high in 2009, coming in at 273. But Asian/Pacific Islanders increased two points over 2007 to come in at 274. The American Indian group saw the largest increase from 2007 to 2009 (four points), coming in at 251. In the same period, Hispanic students increased two points to 249, and black students increased one point to 246.
Students classed as English language learners fell a full four points, to 219, versus 266 for non-ELL students.
Poorer students--those defined as eligible for the National School Lunch Program--increased their scores by two points to 249, coming in 14 points below those who did not qualify for the program--exactly the same gap seen in 2007 between the two groups.
Asians and Pacific Islanders continued their domination of the reading results at the fourth-grade level, gaining three points over 2007 and coming in at 235. White students, in second place, declined by one point from 2007's average score to 231. Hispanic students held firm at 205. The scores of black students rose two points to 205. And American Indian students increased one point to 204.
ELL and non-ELL students remained flat from 2007 to 2009, coming in at 188 and 224, respectively. Based on family income level, students who qualified for the National School Lunch Program averaged 206 points, up a statistically insignificant one point from 2007. Students who did not qualify came in at 232, same as in 2007.
Type of School
Finally, the type of school a student attended did matter. At the fourth-grade level, Catholic schools came out on top, at 236. The category "other private" school followed closely behind at 234. Department of Defense schools came in third at 228. Public schools came in fourth at 220. And schools administered by the Bureau of Indian Education came in at 181.
At the eighth-grade level, "other private" schools topped the list at 282, with Catholic schools coming in a close second at 281. They were followed by Department of Defense schools (272), public schools (262), and Bureau of Indian Education schools (229).
Further information about the NAEP 2009 Reading test, along with complete results, can be found here.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a factual report about reading scores from the National Assessment of Educational Progress (NAEP). It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to educational achievement, which is suitable for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a detailed report on the results of the National Assessment of Educational Progress (NAEP) reading test. It discusses various aspects such as overall performance trends, gender and ethnic breakdowns, and performance differences based on socioeconomic status and type of school. There is no unsafe, inappropriate, or harmful content in the text.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a straightforward statistical report about the ranking of different types of schools based on some unspecified metric (likely reading test scores). It does not contain any unsafe, inappropriate, or harmful content. The language is neutral and the themes are educational and factual."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "879-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "879-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "879-2",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://thejournal.com/articles/2010/03/24/naep-reading-scores-flat-at-grade-4-up-slightly-at-grade-8.aspx",
"date": "2013-12-10T11:46:03",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164018116/warc/CC-MAIN-20131204133338-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9649634957,
"token_count": 1928,
"score": 3.046875,
"int_score": 3
}
|
<urn:uuid:4a3e9822-0b29-4a87-81d5-ebc9e4709980>
|
FOR IMMEDIATE RELEASE
Contact: Connie Barclay
News Releases 2003
NOAA Home Page
NOAA Public Affairs
The National Marine Fisheries Service (NOAA Fisheries) announced today support of the Convention on International Trade in Endangered Species of Wild Fauna and Flora’s (CITES) embargo on queen conch imports from three Caribbean countries; Honduras, Haiti and the Dominican Republic. The National Oceanic and Atmospheric Administration (NOAA) is an agency of the U.S. Department of Commerce.
In an effort to support sustainable trade in queen conch, CITES has recommended that importation of queen conch (Strombus gigas) be suspended from these countries. CITES will send notifications to all CITES countries recommending that they not accept shipments of queen conch as of Sept. 29, 2003.
“This is a very important decision by CITES. NOAA Fisheries is pleased to join CITES and our other partners, such as the Caribbean Fishery Management Council in San Juan, Puerto Rico, in helping to sustain queen conch populations for years to come,” said Bill Hogarth, assistant administrator for NOAA Fisheries. “This action allows imports of queen conch from countries who are managing the species well, while prohibiting imports that are not sustainable.”
Queen conch is found throughout the wider Caribbean Region, including Florida, Puerto Rico and the U.S. Virgin Islands, as well as in the Atlantic Ocean near Bermuda. Products from conch include meat, pearls and shells.
Queen conch populations in Honduras, Haiti and the Dominican Republic are currently being exploited at rates that may be unsustainable. In addition, CITES has expressed concerns about the amount of illegal, under-reported and unregulated fishing of this species. The United States imports approximately 80 percent of the world’s trade, usually resulting in imports of more than 1,000 metric tons of meat a year.
In 1986, the U.S. banned all harvest of its own queen conch populations in the continental United States, and in 1992, CITES included queen conch in CITES Appendix II. An Appendix II listing includes species that, although currently not threatened with extinction, may become threatened without trade controls. Permits indicating that trade is sustainable are required for queen conch international trade.
Although the restrictions announced mainly affect commercial importers of queen conch products, officials are warning American tourists who visit the Caribbean that they seriously consider not purchasing queen conch meat or souvenirs to bring back to the United States. Law enforcement officers may inspect and confiscate queen conch meat and shells upon return to the United States.
According to Hogarth, this action by CITES supports current efforts by the Caribbean Fishery Management Council and others in the region to promote Caribbean-wide management for all coral reef ecosystem species.
NOAA’s National Marine Fisheries Service (NOAA Fisheries) is dedicated to protecting and preserving our nation’s living marine resources, and the habitat on which they depend, through scientific research, management and enforcement. Our stewardship of these resources benefits the nation by supporting coastal communities that depend upon them, while helping to provide safe and healthy seafood to consumers and recreational opportunities for the American public.
NOAA is dedicated to enhancing economic security and national safety through the prediction and research of weather and climate-related events and providing environmental stewardship of our nation’s coastal and marine resources.
On the Web:
NOAA Fisheries: http://www.nmfs.noaa.gov
U.S. Fish and Wildlife Service: http://international.fws.gov
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a news release from NOAA (National Oceanic and Atmospheric Administration) regarding the support of a CITES embargo on queen conch imports from certain Caribbean countries. The content is entirely focused on environmental and regulatory matters and does not contain any unsafe, inappropriate, or harmful elements. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "880-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.publicaffairs.noaa.gov/releases2003/sep03/noaa03116.html",
"date": "2013-12-10T11:45:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164018116/warc/CC-MAIN-20131204133338-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9198125005,
"token_count": 752,
"score": 2.796875,
"int_score": 3
}
|
<urn:uuid:76897be3-8b97-4c2c-a7d5-8dedfe266d7e>
|
Introduce your students to lots of different kinds of mammals!
Interested in all the types of vertebrates? Check out our Types of Vertebrates Card Set for a 10% savings.
This PDF file includes:
- Picture cards for 16 different types of mammals
- Labels for each type of mammal
- Control cards (picture/label) for each type of mammal
- Definitions for each type of mammal
- Control chart showing each mammal and name matched correctly
Mammals are: bear, deer, human, dolphin, kangaroo, platypus, gorilla, dog, rabbit, rhinoceros, cow, mole, mouse, giraffe, lemur, and cheetah
This item is a PDF file which is emailed to you.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, containing no unsafe or inappropriate content. It introduces students to different types of mammals and provides details about a PDF file that includes picture cards, labels, and control cards for educational purposes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "882-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.montessoriforeveryone.com/Types-of-Mammals-Nomenclature-Cards_p_178.html",
"date": "2013-12-12T02:01:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164346985/warc/CC-MAIN-20131204133906-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8509093523,
"token_count": 158,
"score": 2.578125,
"int_score": 3
}
|
<urn:uuid:52cccf04-fe19-4d35-9026-644ee2d4cb02>
|
"Atonal composers are attempting to replace with an apparent rationality what is lacking morally, develop an over-sublimated technique which produces images of emotions that are far removed from any emotional experiences a relatively normal human being ever has. In doing so they advocate an esoteric art pour l'art, the followers of which can only be emotional imps, monsters, or snobs."
Paul Hindemith on atonal music
Paul Hindemith is known as one of the most important criticizers of atonal music and one of the first composers who attacked Arnold Schoenberg's new 12 tone system. Ironically he was the champion of what is called 'Gebrauchsmusik', a style of classical music, mixed with modern music, to be played preferably by non-professionals.
Hindemith was born in 1895, and started to be famous when playing in small bars and galleries. Mostly he showed his affection for Reger, post-romantic music. Beside playing violin he was a multifaced musician, playing recorder, cello and piano. When he was 20 he became lead violist at the Frankfurt Opera Orchestra. Also he became involved into the Jazz scene (he prefered the phrase 'Dance Band music'), playing with his Amar-Hindemith quartet at different festivals. His compositions 'Suite 1922', 'Das Marienleben' and 'KammerMusik' show his affection for the new styles of music.
As a prominent sponsor of the Baden-Baden festival he also invited young composers to show their compositions to the public. Kurt Weill, Darius Milhaud and Hanns Eisler are some of the most common invited guest-composers. Later editions of the festival show that Hindemith was turning his back to new musical forms: famous are his adoption of 11 and 13 notes tone ladders, used to ridicule Schoenberg.
A joint collaboration of Hindemith, Kurt Weill and Bertolt Brecht for ' Der Lindberghflug' shows a lot of differences and difficulties between Weill and Hindemith. Weill's contribution is joyful, Hindemith's part is dark and pessimistic.
During the rise of Nazi-Germany, Hindemith didn't get in much trouble, although some of his works are put on the 'blacklist of forbidden music'. He's even nominated by Richard Strauss for the (Nazi supported) ReichsKammer of Performing Arts. The turning point was the performance of his 'Mathias der Maler' opera in 1933. Secretary of Information Joseph Goebbels attacked Hindemith's composition because of its many 'modern influences'. An article in defence of Hindemith, written by Wilhelm Furtwangler, did more damage than intended and finally Hindemith (also aware that his marriage with a Jewish woman would not be tolerated by the Nazis) fled to Turkey. Later he arrived in America, where he was offered a position at Yale's Conservatory. there he continued to propagate tonal music, writing numerous articles and lectures on the subject.
At the end of the fifties he emigrated to Switzerland to complete his last works. Hindemith finally died in 1963, in Germany.
This wu is part of the series 'Contemporary composers', printed in my
former company's (monthly) magazine in 1998.
Donated to the E2 database
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a historical and critical analysis of Paul Hindemith and his contributions to music. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are related to music and cultural criticism, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "883-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://everything2.com/title/Paul+Hindemith?showwidget=showCs1015018",
"date": "2013-12-13T11:22:55",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164936474/warc/CC-MAIN-20131204134856-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9708074331,
"token_count": 708,
"score": 2.5625,
"int_score": 3
}
|
<urn:uuid:9ddbf9cb-1726-4bca-a3c0-98a80a36eac4>
|
Peggy Halliday discusses a variety of topics related to autism spectrum disorders, such as what is asperger's syndrome
Read the full transcript »
Host: What is Asperger's Syndrome? Peggy Phalliday: Asperger's Syndrome is one of the autism spectrum disorders. A child has deficits in the areas of behavior, and social skills but develops normally in terms of communication, at least in terms of how their speech develops. There may be differences in terms of communication in a way a child's speech patterns are or their understanding of some of the social nuances of language but their language develops when they expect it, when parents would expect it to develop. In terms of social skills, they may have deficits in ways like difficulty making friends, difficulty understanding social gestures and understanding body language. They may have a lot of difficulty reading body language. In terms of behaviors, they may have restricted patterns of interests where they are excessively preoccupied with a certain topic or a certain object or parts of objects.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"accurate and educational content\", \"score\": 0}\n```\n\nThe text provided is an educational discussion about Asperger's Syndrome, which is a topic related to autism spectrum disorders. The language used is respectful and appropriate, and there are no unsafe or inappropriate elements present. Therefore, it is fully suitable for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "884-0",
"llm_safety_score": 0,
"reason": "accurate and educational content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.healthline.com/hlvideo-5min/understanding-aspergers-syndrome-155792346",
"date": "2013-12-13T11:22:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164936474/warc/CC-MAIN-20131204134856-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9521607161,
"token_count": 203,
"score": 3.640625,
"int_score": 4
}
|
<urn:uuid:7478b4ff-3ac0-473b-bc8e-b41364681d56>
|
The Department of Sociology fosters the development of intellectual skills to enable our students to examine and understand the patterns of relationships that form the foundation of society. At its basis sociology is concerned with the causes and consequences of individual participation in groups. Families, neighborhoods, athletic teams, political parties, ethnic groups and an uncounted number of other associations are sites for developing networks of interaction, meaning and identity. These organizational and institutional frameworks in turn provide a collective basis for stability, conflict and change within society. In an increasingly complex world it is essential each person understand the way in which these patterns both limit and make possible human choice and opportunity.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is entirely academic and educational, discussing the foundational concepts of sociology without any inappropriate language, harmful themes, or unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "885-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://bellarmine.lmu.edu/sociology/",
"date": "2013-12-05T19:40:05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163047523/warc/CC-MAIN-20131204131727-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9438692331,
"token_count": 128,
"score": 2.703125,
"int_score": 3
}
|
<urn:uuid:aa9fa0d2-abfa-4940-a252-e4046d03b3b9>
|
Effluent Management Guidelines for Intensive Piggeries
Agriculture and Resource Management Council of Australia and New Zealand and the
Australian and New Zealand Environment and Conservation Council, 1999
This document is one of a suite of documents forming the National Water Quality Management Strategy. This Strategy aims to achieve the sustainable use of the nation's water resources by protecting and enhancing their quality, while maintaining economic and social development.
The Effluent Management Guidelines series covers guidelines for specific industries. Six separate documents deal with specific industries as set out in Figure 1. This document provides national Effluent Management Guidelines for Intensive Piggeries. It sets out principles that can form the basis for a common and national approach to effluent management for the intensive pig industry throughout Australia.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text is a technical document discussing effluent management guidelines for intensive piggeries. It does not contain any unsafe, inappropriate, or offensive content. The language is professional and the themes are related to environmental and agricultural management, which are suitable for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "886-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.environment.gov.au/resource/effluent-management-guidelines-intensive-piggeries",
"date": "2013-12-05T19:40:23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163047523/warc/CC-MAIN-20131204131727-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8448227644,
"token_count": 152,
"score": 2.765625,
"int_score": 3
}
|
<urn:uuid:fa068635-4afc-43ca-8253-3f4179febc6e>
|
This word — meaning to speak pompously — is almost entirely restricted to the United States; it doesn’t appear in any of my British English dictionaries, not even the big Oxford English Dictionary or the very recent New Oxford Dictionary of English. Yet it has a long history.
It’s most closely associated with U S President Warren Gamaliel Harding, who used it a lot and who was by all accounts the classic example of somebody who orates verbosely and windily. It’s a compound of blow, in its sense of “to boast” (also in another typical Americanism, blowhard), with a mock-Latin ending to give it the self-important stature that’s implicit in its meaning.
The word is actually much older than Harding; Fred Shapiro of the Yale Law School has recently turned up several examples from the middle of the last century, such as this one from the Debates and Proceedings of the Convention for the Revision of the Constitution of the State of Ohio in 1851: “The bloviators attempt to disturb the proceedings of this Convention”. This and other examples suggest it was at first a local word in Ohio, Harding’s home state. Bloviate may be a back-formation from the noun bloviation. This would fit with the US fashion in the early nineteenth century for expansive mock-Latinate words like sockdolager, hornswoggle and absquatulate.
There’s a gap in the citation record in the middle years of this century. The word only began to be used again in the 1960s, even then at first always in reference to Harding. This may be linked with a number of biographies of him that appeared about that time. The word only returned to any sort of regular use in the nineties.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is a historical and etymological explanation of the word \"bloviate.\" It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "888-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.worldwidewords.org/weirdwords/ww-blo1.htm",
"date": "2013-12-07T10:44:01",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054000/warc/CC-MAIN-20131204131734-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9528968334,
"token_count": 377,
"score": 2.734375,
"int_score": 3
}
|
<urn:uuid:a4f576d1-1ac1-4fd1-8454-3a87f58cd64c>
|
Lam and an international team of colleagues revisited the sediment core data to directly test this hypothesis. They sampled GGC-37, a core taken from a site near Russia's Kamchatka Peninsula, about every 5 centimeters, moving back through time to before the biological bloom began. Then they analyzed the chemical composition of their samples, measuring the relative abundance of the isotopes of the elements neodymium and strontium in the sample, which indicates which variant of iron was present. The isotope abundance ratios were a particularly important clue, because they could reveal where the iron came fromone variant pointed to iron from the ancient Loess Plateau of northern China, a frequent source of iron-rich dust in the northwest Pacific, while another suggested the younger, more volcanic continental shelf was the iron source.
What the researchers found surprised them.
"We saw the flux of iron was really high during glacial times, and that it dropped during deglaciation," Lam says. "We didn't see any evidence of a pulse of iron right before this productivity peak."
The iron the researchers did find during glacial times appeared to be supplemented by a third source, possibly in the Bering Sea area, but it didn't have a significant effect on the productivity peak. Instead, the data suggest that iron levels were declining when the peak began.
Based on the sediment record, the researchers propose a different cause for the peak: a chain of events that created ideal conditions for sea life to briefly flourish. The changing climate triggered deep mixin
|Contact: Media Relations Office|
Woods Hole Oceanographic Institution
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a scientific research summary discussing sediment core data and iron sources in the context of oceanographic research. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are entirely related to scientific research and environmental studies."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "889-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.bio-medicine.org/biology-news-1/Scientists-solve-a-14-000-year-old-ocean-mystery-31000-2/",
"date": "2013-12-09T07:13:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163932627/warc/CC-MAIN-20131204133212-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9556087255,
"token_count": 328,
"score": 3.296875,
"int_score": 3
}
|
<urn:uuid:7700a754-639b-4e2e-9653-e041c7461227>
|
August 20 through November 6, 2011
In the weeks, months, and years following the events of September 11, 2001, archaeologists and physical anthropologists excavated the site of the World Trade Center buildings in New York City. Recall where you were that morning while viewing excavated and recovered artifacts from Ground Zero in this small display organized in conjunction with The National September 11 Memorial Museum. For details about a pay-what-you-like day of related programming September 11, and an evening program October 12, read the press release.
3rd Floor Galleries
Making a Monument: The Fall and Rise of the World Trade Center
Lecture by Dr. David Brownlee
Minoru Yamasaki's design for the World Trade Center, unveiled in 1964, was harshly criticized, only gradually gaining a place in the hearts of New Yorkers and tourists alike in the years that followed the towers opening in 1972-73. After they were destroyed on September 11, 2001, the twin towers were lionized. Like monuments in all ages, the World Trade Center has had its meaning defined and changed several times in response to the needs, expectations, and memories of the people. Dr. David Brownlee, Shapiro-Weitzenhoffer Professor of the History of Art at Penn, recounts the story of the World Trade Center as he explores the making of monuments in the modern world.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe text provided is purely historical and educational, discussing the excavation and recovery of artifacts from the World Trade Center site after the September 11, 2001, attacks. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "891-0",
"llm_safety_score": 0,
"reason": "historical and educational content with no unsafe elements"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.penn.museum/past-exhibits/238-excavating-ground-zero-fragments-of-911.html",
"date": "2013-12-10T16:23:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164022163/warc/CC-MAIN-20131204133342-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.963419199,
"token_count": 275,
"score": 3.21875,
"int_score": 3
}
|
<urn:uuid:2da8c539-0fe9-4ca2-860f-dab62668307d>
|
Social media could decide 2012 US presidential election
Social media is more effective at getting people out to vote than traditional automated calls or television advertising, new research has revealed.
The research, originally reported by Nature and republished by Science Mag, was conducted during the 2012 Congressional elections during a nonpartisan Get Out To Vote campaign, and encouraged some to nominate to notify friends via social media, while others were requested not to.
The results reveal that people receiving social media messages when their friends voted were 0.39% more likely to vote than respondents who received no social notification.
With a tight presidential election expected between President Barack Obama and Republican candidate Mitt Romney, social media is expected to play an increasingly important role in the result.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the effectiveness of social media in influencing voter turnout during elections. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "894-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.smartcompany.com.au/technology/information-technology/27960-social-media-could-decide-2012-us-presidential-election.html",
"date": "2013-12-12T06:31:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164561235/warc/CC-MAIN-20131204134241-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9784990549,
"token_count": 145,
"score": 2.609375,
"int_score": 3
}
|
<urn:uuid:3c4e5f6e-7636-42cc-af85-34da5c22be9c>
|
Bridgeville area felt tremendous impact of Civil War
By John Oyler
Published: Wednesday, May 1, 2013, 9:00 p.m.
The seventh presentation in our series “Bridgeville Remembered” was subtitled “The Civil War Years, 1850 to 1875.” Jointly sponsored by the Bridgeville Area Historical Society and the Bridgeville Public Library, the series examines the history and heritage of this area.
As far as the Bridgeville area is concerned, the three most significant events in this particular time period were the Civil War, the arrival of the Chartiers Valley Railroad and the disposition of the Jonathan Middleswarth estate.
The impact of the Civil War overshadowed everything else. Patriotic fervor was rampant after the secession of the southern states. Volunteer companies were raised throughout the region, including Company K of the First Pennsylvania Cavalry.
There was an outpouring of public support when these brave young men marched off to war. The ladies of Bethany Church sewed a flag for Company K and presented it to them on the front porch of the Middleswarth mansion. Unfortunately, many of the brave young men never returned. Their stories are eloquently told in the book “Almost Forgotten,” written by my brother, Joseph Oyler. He graciously agreed to relate them as part of this month's presentation. Eleven young men from this area died during the war, including representatives of the three pioneer families — Richard Lesnett, Thomas Boyce and John Park Hickman.
The story of the Chartiers Valley Railroad begins in 1830, when a group of visionary entrepreneurs planned to build a railroad connecting Washington and Pittsburgh, with a route down the Chartiers Valley. After four failures, the company's assets eventually were purchased by the Pennsylvania Railroad system in 1866, primarily to incorporate the portion of the right-of-way from the Ohio River to Mansfield (Carnegie) into its new main line west through Steubenville.
Investors in this area persuaded the Pennsylvania Railroad to build an extension from Mansfield through Bridgeville and Canonsburg to Washington. Called the Chartiers Branch, this line was completed in 1871. Initial service was two round trips a day from Washington, Pa., to Pittsburgh, providing residents in the Chartiers Valley with easy access to “the city,” as well as to the rest of our nation. It was quite a contrast with the horse-drawn stagecoach service.
Prior to the disposition of Jonathan Middleswarth's estate after his death in 1868, most of the buildings in Bridgeville were on the east side of the Washington Pike. His mansion and the farm of his tenant, James Blackamore, occupied most of the west side. His demise precipitated a legal dispute.
Everyone knew that Blackamore leased the farm from Middleswarth, and everyone was surprised when Blackamore said that his payments for the land were against a mortgage and that he now was the owner of the farm. The dispute was in the courts for a number of years before its final resolution in the Pennsylvania Supreme Court.
The court ruled against Blackamore and in favor of a number of heirs — distant relatives of the Middleswarths. John Hickman was appointed administrator of the estate. As a result, the land west of the pike was subdivided into seven or eight plots, each of which generated opportunities for building homes and businesses. The Washington Pike suddenly turned into the Main Street of a growing community.
There were a number of changes to the community. In 1870, Bethany Church acquired the property on which it currently is located and built a frame building called “the Lord's Barn” to house a mission Sunday School. Dr. David Donaldson purchased Dr. Hayes' medical practice, office and residence at 745 Washington Ave.
In 1867, the James Gailey Murray family came to Bridgeville from Sodom (Clifton), where he had operated a general store. They purchased 423 Washington Ave. for $3,500 and continued the mercantile trade there. The Henry Poellot family also came here from Sodom. They built a house at 353 Washington Ave. and established their wagon building/repair business on that site.
Walter and Marie Foster bought Judge Baldwin's home, “Recreation,” in 1842. Their son, Samuel, built and operated a store at the corner of Foster's Lane — now Station Street — and Railroad Street, close to the new Chartiers Valley Railroad passenger station.
By 1875, Bridgeville still was a sleepy rural village but was showing signs of the rapid expansion that was ahead for it in the next few years. We will discuss that era in our next presentation, scheduled for 7 p.m. on May 16, in the Community Room at the Bridgeville Public Library.
John Oyler, a columnist for Trib Total Media, can be reached at 412-343-1652 or [email protected].
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Library board extends three votes to Carnegie council members
- Carnegie officials focus on deficit, consider tax hike
- Olyer: Modern Thanksgiving trip has a familiarly comfortable feeling
- Carlynton school board sets appointments, duties
- Four school directors sworn in on Chartiers Valley board
- New personnel, stores, services taking care of Bridgeville area
- Wilmus family of Bridgeville celebrates birth of daughter
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text discusses historical events and figures from the Civil War era in Bridgeville, Pennsylvania. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are historical and educational in nature, making it fully appropriate for all audiences.",
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a list of news headlines and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would warrant a higher safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "895-0",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "895-1",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://triblive.com/neighborhoods/yourcarlynton/yourcarlyntonmore/3906779-74/bridgeville-washington-railroad",
"date": "2013-12-13T15:29:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164954485/warc/CC-MAIN-20131204134914-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.962724328,
"token_count": 1490,
"score": 2.890625,
"int_score": 3
}
|
<urn:uuid:dbbe6df1-4023-4d24-b308-55dd97f30b49>
|
"If there is an arctic cold outbreak with below-zero temperatures, that could cause big problems for winter wheat, which is planted in the fall and goes dormant in the winter. Subzero cold could cause stunted growth and reduce the production for this year's wheat crop," according to Expert Senior Agricultural Meteorologist Dale Mohler.
AccuWeather.com meteorologists believe that a change in the winter pattern is on the horizon, and more cold waves might penetrate the U.S.
Snowcover actually acts to insulate winter wheat from arctic cold snaps, keeping the soil temperature closer to freezing rather than subzero.
Mohler said the lack of storms and mild weather are the factors that have left winter wheat vulnerable.
Most of the other crops of the Midwest should not be damaged by the lack of snowcover. However, many crops in this region rely on moisture from melting snow during the spring. If there is a snow deficit in the winter followed by a dry spring, that would be bad news for other crops as well.
From AccuWeather.com (find the original story here); reprinted with permission.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a straightforward agricultural meteorological report discussing the potential impact of cold weather on winter wheat. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful, and the themes are related to agricultural and meteorological topics, which are suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "896-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.scientificamerican.com/article.cfm?id=us-snow-drought-serious-implications&page=2",
"date": "2013-12-13T15:42:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164954485/warc/CC-MAIN-20131204134914-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9515004754,
"token_count": 229,
"score": 2.953125,
"int_score": 3
}
|
<urn:uuid:e60ecfa6-5f1e-496b-81a5-cbe0a18e6619>
|
Moretown Landfill: Gas to Energy
In 2008 Pennsylvania Power and Light (PPL) began operating a landfill gas to energy plant located at the
Moretown landfill. The plant has been running at nearly full
capacity, using the gas generated by decomposing trash to produce
electricity. Prior to 2008,the gas generated from the landfill was combusted using two flares.
The plant generates
approximately 3.2 MW of electricity at full capacity, which is
sufficient to power approximately 2500 homes. It currently
operates two Caterpillar engines (G3520) designed for landfill
gas at a flow rate of 550 scfm to each of the 2233 hp engine (picture
right). These are the same engines used at the NEWSVT/Waste USA landfill
in Coventry, Vermont.
Any excess gas not able
to be burned in the engines is combusted in a flare. PPL plans to add a third engine in 2011 or 2012.
of the Caterpillar G3520 engines
|Landfill gas is extracted from the landfill and directed to either the engines or the flare.
||Large blowers extract gas from the landfill. Balancing the flow at each extraction well ensures sufficient vacuum is maintained.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is a factual description of a landfill gas to energy plant and does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "897-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.anr.state.vt.us/dec/wastediv/solid/WTE_Moretown_Landfill.htm",
"date": "2013-12-06T01:50:08",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163048970/warc/CC-MAIN-20131204131728-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9090837836,
"token_count": 252,
"score": 2.703125,
"int_score": 3
}
|
<urn:uuid:d2b7fd51-56f3-4a2e-8ed0-b6e49e01acb5>
|
Dr. James O'Keefe of the Mid America Heart Institute in, Kansas City, Mo,. says several trials demonstrate the positive benefits of ingesting omega-3 fatty acids. However, the most compelling evidence for the cardiovascular benefit provided by omega-3 fatty acids comes from three large controlled trials of 32,000 participants randomized to receive omega-3 fatty acid supplements containing DHA and EPA or to act as controls.
"These trials showed reductions in cardiovascular events of 19 percent to 45 percent. Overall, these findings suggest that intake of omega-3 fatty acids, whether from dietary sources such as fish or fish oil supplements, should be increased, especially in those with or at risk for coronary artery disease," O'Keefe says in statement.
The researchers find little evidence of serious adverse effects associated with fish oil consumption. The most common complaints -- nausea, upset stomach and fishy burp -- can be helped by taking the supplement with meals, keeping fish oil capsules in the freezer or using enteric-coated supplements.
O'Keefe is among several contributors summarizing data on omega-3 fatty acids in the March issue of Mayo Clinic Proceedings.
Martin Bashir resigns from MSNBC over Sarah Palin comments
Texas principal bans speaking Spanish, stirs controversy
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a factual and educational statement about the benefits of omega-3 fatty acids and does not contain any unsafe, inappropriate, or harmful content. It is suitable for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "898-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.upi.com/Health_News/2008/03/12/Omega-3-fatty-acids-always-benefit-heart/UPI-10051205351691/",
"date": "2013-12-06T01:39:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163048970/warc/CC-MAIN-20131204131728-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9396631718,
"token_count": 253,
"score": 2.546875,
"int_score": 3
}
|
<urn:uuid:b9168bca-c2db-432f-96ce-041dee6ab58a>
|
Narrator: This is Science Today. Women die of heart disease five times more than they do of breast cancer. Yet Barbara Drew, an associate professor at the University of California, San Francisco's School of Nursing, says there's still a perception that heart disease is a man's disease.
Drew: However it is the number one killer in women and women of all ethnic groups. 241 And women have poorer outcomes from heart disease than men do. They have poorer outcomes after cardiac surgery and after most procedures.
Narrator: Drew says there are many theories why that is.
Drew: Women tend to be older by the time they develop heart disease and that may have something to do with it. They may have smaller coronary arteries which are harder to work with and women have been noted to have atypical chest pain symptoms sometimes, which cloud what is wrong with the person and make diagnosis more difficult.
Narrator: It's estimated one out of nine women aged 45-64 will develop heart disease and after 65, one out of three. For Science Today, I'm Larissa Branin.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is a scientific and educational segment discussing heart disease in women. It does not contain any unsafe, inappropriate, or offensive content. The language is respectful, and the themes are related to public health and medical research, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "900-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.ucop.edu/sciencetoday/article/544",
"date": "2013-12-07T15:04:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054867/warc/CC-MAIN-20131204131734-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9739212394,
"token_count": 224,
"score": 2.640625,
"int_score": 3
}
|
<urn:uuid:a56af4c3-2fbf-484b-a556-154626beab3a>
|
Active Standard ASTM C1752 | Developed by Subcommittee: C26.13
Book of Standards Volume: 12.01
Significance and Use
Measurements performed in this guide are limited to radioactive solutions, slurries, and sludges as well as simulants designed to model the properties of these radioactive materials.
Data obtained from the measurement and calculation of physical and rheological properties of radioactive solutions, slurries, and sludges are essential in developing appropriate simulants for design and testing of retrieval, transport, mixing, and storage systems for treatment of radioactive materials. These data also provide input parameters for modeling the flow behavior, processing, transport, safety, and storage of these radioactive materials.
Consistency in the handling of samples, measurement methods, and calculations is essential in obtaining reproducible results of rheological and physical property measurements.
This guide will be used to measure or calculate the physical properties listed below.
Bulk slurry density
Settled solids density
Centrifuged solids density
Volume percent centrifuged solids
Volume percent settled solids after settling
Undissolved solids content
Dissolved solids content
Weight percent centrifuged solids
Weight percent total oxides
Solids content of the centrifuged solids
Total solids content
This guide describes the process of performing measurement of the rheological properties. The rheological measurements and calculations described in this guide are limited to shear strength, shear stress versus shear rate, apparent viscosity, consistency, and yield stress.
Due to the nature of some solutions, slurries, and sludges, not all of the measurements described in this standard may be applicable to all samples. For example, some sludges do not settle; therefore, settling rate measurements are not applicable for these samples.
1.1.1 The intent of this guide is to provide guidance for the measurement and calculation of physical and rheological properties of radioactive solutions, slurries, and sludges as well as simulants designed to model the properties of these radioactive materials.
1.2.1 This guide is intended for measurement of mass and volume of the solution, slurries, and sludges as well as dissolved solids content in the liquid fraction and solids content associated with the slurries and sludges. Particle size distribution is also measured.
1.2.2 This guide identifies the data required and the equations recommended for calculation of density (bulk, settled solids, supernatant, and centrifuged solids), settling rate, volume and weight percent of the centrifuged solids and settled solids, and the weight percent undissolved solids, dissolved solids, and total oxides.
1.2.3 This guide is intended for measurement of shear strength and shear stress as a function of shear rate.
1.2.4 Rheological property measurement guidelines in this guide are limited to rotational rheometers.
1.2.5 This guide is limited to measurements of viscous and incipient flow and does not include oscillatory rheometry.
1.3 The values stated in SI units are to be regarded as standard. No other units of measurement are included in this standard.
1.4 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
C859 Terminology Relating to Nuclear Materials
C1751 Guide for Sampling Radioactive Tank Waste
D1193 Specification for Reagent Water
Other StandardsISO13320-1 Particle Size Analysis--Laser Diffraction Methods. Part 1: General Principles, International Organization for Standardization, Geneva, Switzerland (1999)
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "901-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.astm.org/Standards/C1752.htm",
"date": "2013-12-09T11:14:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163964642/warc/CC-MAIN-20131204133244-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8871315122,
"token_count": 839,
"score": 3.03125,
"int_score": 3
}
|
<urn:uuid:562eea1b-ef4b-4679-8803-3601017b215e>
|
Print version ISSN 1020-4989
Rev Panam Salud Publica vol.14 n.5 Washington Nov. 2003
Rubella and the Americas
Alan R. Hinman
Task Force for Child Survival and Development, Decatur, Georgia, United States of America
The article by Robertson et al. (1) in this issue of the Revista Panamericana de Salud Pública/Pan American Journal of Public Health provides a welcome update on the global situation with rubella, congenital rubella syndrome (CRS), and rubella immunization. There has been significant progress both in use of rubella vaccine and in surveillance for rubella and CRS in recent years. In 1996, 78 of 214 reporting countries/territories (36%) were using rubella vaccine routinely (2). This new Revista/Journal article indicates that 124 of them (58%) are now using the vaccine, an increase of more than 50% in their number in just 6 years.
A total of 123 countries/territories are currently reporting rubella to the World Health Organization (WHO), and 89 are reporting CRS. However, the total number of cases of rubella and CRS reported from these countries is significantly lower than the number estimated to actually occur in these countries. This situation reflects a variety of factors. In the case of acute rubella, underreporting relates to the fact that many cases of rubella are subclinical or very mild, few patients with rubella seek medical attention, and there are other causes of rash illness. In the case of CRS, underreporting relates to underdiagnosis, the difficulty of establishing causality in older children who are blind or deaf, and the underdevelopment of surveillance programs in settings likely to see cases of CRS, such as neonatal intensive care units and rehabilitation services for the blind and deaf.
Because of the significant clinical resemblance between measles and rubella, achieving effective control over measles will require being able to differentiate between it and rubella. Global efforts to accelerate reductions in measles mortality and complications rely on adequate surveillance of measles, including laboratory confirmation of the disease. Laboratory-based surveillance of rash illness in the Americas has demonstrated that a significant proportion of rash illnesses initially thought to represent measles were in fact rubella.
As pointed out in the article by Robertson et al. (1), the global measles/ rubella laboratory network has matured to the point that 155 countries have now established national measles/rubella laboratories. Reference laboratories are in existence or being established in all six of the WHO regions.
More countries and more regional alliances are addressing reductions in rubella and CRS. Surveillance is increasingly making it possible to differentiate between measles and rubella. These facts highlight the unfortunate situation that the Global Alliance for Vaccines and Immunization (GAVI) has not yet included rubella vaccine in its classification of underused vaccines. This is in spite of the fact that evidence indicates that cost is a factor in policies about rubella vaccine use (as it is for hepatitis B and Haemophilus influenzae type b vaccines, which are covered by GAVI) and that rubella immunization in developing countries is economically justified (3). Data presented in the article by Robertson et al. (1) indicate clearly that inclusion of rubella vaccine in immunization programs is related to the country's development status: 100% of industrialized countries use rubella vaccine, compared to 71% of countries with economies in transition and 48% of developing countries.
It may be useful here to recall the differences in strategy required by differing objectives in rubella. Preventing CRS can be achieved by vaccinating just adolescent girls and/or women of childbearing age. Eliminating both rubella and CRS entails universal vaccination of infants, surveillance, and assuring immunity in women of childbearing age. Countries undertaking rubella elimination should ensure that women of childbearing age are immune and that routine coverage in children is sustained at greater than 80% (4).
Two WHO regions, the European Region and the Region of the Americas, have taken the lead in establishing targets for rubella/CRS control or elimination. In 1984 the European Region adopted a target of eliminating indigenous rubella and CRS, and more than 80% of the countries in the European Region are now using rubella vaccine in their immunization programs.
In the Americas a Hemispheric goal of measles elimination by 2000 was established and implemented (5). As progress was made in measles elimination, interest in use of rubella vaccine began to increase (6). The lead in use of rubella vaccine was taken by the countries of the English-speaking Caribbean, where many countries included rubella vaccine in their efforts to eliminate measles. The strategy in the Caribbean included two major components: (1) mass vaccination of males and females up to age 40 with combined measles-rubella (MR) or measles-mumps-rubella (MMR) vaccine, to provide protection to those imminently at risk of a rubella-infected pregnancy, and (2) introduction of rubella vaccine into the regular schedule of infant/young child immunization (7).
The strategy in the Caribbean was effective both in planning and in reality. Transmission models and economic models indicated that the combined measles/rubella elimination strategy would be effective and cost-effective. Reality has borne this out: Measles and rubella are no longer indigenous diseases in the English-speaking Caribbean.
Reflecting continuing progress in Western Hemisphere measles elimination and growing interest in use of rubella vaccine, in September 2003 the Directing Council of the Pan American Health Organization approved a resolution calling for Member States to eliminate rubella and CRS by the year 2010 (8, 9). Achieving that target in the Americas will require modification of rubella elimination strategies in several countries that currently use rubella vaccine only in selected groups or only in routine childhood immunizations, so as to ensure that women of childbearing age are protected and that transmission is interrupted (10).
The Region of the Americas has been at the forefront in reaching many important immunization goals, including polio eradication and measles elimination. Eliminating rubella and CRS from the Western Hemisphere will be another instance of the exemplary achievements of the Region.
1 Robertson SE, Featherstone DA, Gacic-Dobo M, Hersh BS. Rubella and congenital rubella syndrome: global update. Rev Panam Salud Publica 2003;14(5):306315.
2 Robertson SE, Cutts FT, Samuel R, Diaz-Ortega JL. Control of rubella and congenital rubella syndrome (CRS) in developing countries, part 2: vaccination against rubella. Bull WHO 1997;75:6980.
3 Hinman AR, Irons B, Lewis M, Kandola K. Economic analyses of rubella and rubella vaccines: a global review. Bull WHO 2002;80:264270.
4 World Health Organization. Rubella vaccines: WHO position paper. Weekly Epidemiol Rec 2000;75:161169.
5 de Quadros CA, Olive JM, Hersh BS, Strassburg MA, Henderson DA, Brandling-Bennett D, et al. Measles elimination in the Americas: evolving strategies. JAMA 1996;275:224229.
6 Hinman AR, Hersh BS, de Quadros CA. Rational use of rubella vaccine for prevention of congenital rubella syndrome in the Americas. Rev Panam Salud Publica 1998;4:156160.
7 Irons B, Lewis MJ, Dahl-Regis M, Castillo-Solorzano C, Carrasco PA, de Quadros CA. Strategies to eradicate rubella in the English-speaking Caribbean. Amer J Public Health 2000;90:15451549.
8 Pan American Health Organization. Annual health summit of ministers ends with focus on joint health actions [press release]. Available from: www.paho.org/English/DD/PIN/pr030926.htm [Internet site]. Accessed 1 October 2003.
9 Nueva meta de los programas de vacunación en la Región de las Américas: eliminar la rubéola y el síndrome de rubéola congénita. Rev Panam Salud Publica 2003;14(5):359363.
10 World Health Organization. Accelerated control of rubella and prevention of congenital rubella syndrome, WHO Region of the Americas. Weekly Epidemiol Rec 2003;78:5054.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe text is a scientific article discussing the global situation with rubella, congenital rubella syndrome, and rubella immunization. It does not contain any unsafe or inappropriate content, profanity, derogatory terms, or references to illegal activities. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "902-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
},
{
"custom_id": "902-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.scielosp.org/scielo.php?script=sci_arttext&pid=S1020-49892003001000002&lng=en&nrm=iso",
"date": "2013-12-09T11:22:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163964642/warc/CC-MAIN-20131204133244-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8872629404,
"token_count": 1763,
"score": 3.015625,
"int_score": 3
}
|
<urn:uuid:f7f472b4-db98-42c5-af5f-c9d85c168a07>
|
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
Tukey obtained a A.B. in 1936 and Sc.M. in 1937, both in Chemistry, from Brown University, before moving to Princeton University where he received his Ph.D. in mathematics. During World War II, Tukey worked at the Fire Control Research Office and collaborated with other statisticians such as Samuel Wilks and William Cochran. After the war, he returned to Princeton, dividing his time between the university and AT&T Bell Laboratories.
His statistical interests were many and varied. He is particularly remembered for his development with James Cooley of the Cooley-Tukey Fast Fourier transform algorithm. In 1970, he contributed significantly to what is today known as the jackknife estimation - also termed Quenouille-Tukey jackknife. He introduced the box plot in his 1977 book, Exploratory Data Analysis.
He also contributed to statistical practice and articulated the important distinction between exploratory data analysis and confirmatory data analysis, believing that much statistical methodology placed too great an emphasis on the latter. Though he believed in the utility of separating the two types of analysis, he pointed out that sometimes, especially in natural science, this was problematic and termed such situations uncomfortable science.
He wrote four papers with his fifth cousin Paul Tukey, who was an undergraduate at Princeton when they met.
Among many contributions to civil society, Tukey served on a committee of the American Statistical Association that produced a report challenging the conclusions of the Kinsey Report, Statistical Problems of the Kinsey Report on Sexual Behavior in the Human Male.
Tukey coined many statistical terms that have become part of common usage, but the two most famous coinages attributed to him were related to computer science. While working with John von Neumann on early computer designs, Tukey introduced the word "bit" as a contraction of binary digit. Tukey used the term "software" in a computing context in a 1958 article and this may have been the first published use.
A D Gordon offered the following summary of Tukey's principles for statistical practice:
... the usefulness and limitation of mathematical statistics; the importance of having methods of statistical analysis that are robust to violations of the assumptions underlying their use; the need to amass experience of the behaviour of specific methods of analysis in order to provide guidance on their use; the importance of allowing the possibility of data's influencing the choice of method by which they are analysed; the need for statisticians to reject the role of 'guardian of proven truth', and to resist attempts to provide once-for-all solutions and tidy over-unifications of the subject; the iterative nature of data analysis; implications of the increasing power, availability and cheapness of computing facilities; the training of statisticians.
- "bit stands for binary-unit"[How to reference and link to summary or text]
- "Far better an approximate answer to the right question, which is often vague, than the exact answer to the wrong question, which can always be made precise." J. W. Tukey (1967), "The future of data analysis". Annals of Mathematical Statistics 33, 1-67.
- "The combination of some data and an aching desire for an answer does not ensure that a reasonable answer can be extracted from a given body of data." J. W. Tukey (1986), "Sunset salvo". The American Statistician 40(1). Online at http://www.jstor.org/view/00031305/di020589/02p0102y/0
- Hoaglin, D C; Mosteller, F & Tukey, John Wilder (Eds) (1985). Exploring Data Tables, Trends and Shapes. ISBN 0-471-09776-4.
- Hoaglin, D C; Mosteller, F & Tukey, John Wilder (Eds) (1983). Understanding Robust and Exploratory Data Analysis. ISBN 0-471-09777-2.
- Tukey, John Wilder (1977). Exploratory Data Analysis. ISBN 0-201-07616-0.
- (published in the Annals of Statistics) John W. Tukey: His Life and Professional Contributions
- Memories of John Tukey
- Short biography by Mary Bittrich
- "Remembering John W. Tukey", special issue of Statistical Science
- REDIRECT Template:MacTutor
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a biographical excerpt about John Tukey, a renowned statistician. It discusses his educational background, professional contributions, and some of his famous quotes and publications. There is no unsafe, inappropriate, or harmful content in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "903-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://psychology.wikia.com/wiki/John_Tukey",
"date": "2013-12-10T21:43:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164026161/warc/CC-MAIN-20131204133346-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9151554704,
"token_count": 941,
"score": 2.90625,
"int_score": 3
}
|
<urn:uuid:fdfba726-d556-41da-841a-95b868bd9827>
|
The rock-cut Buddhist temples of Thanale Caves in Maharashtra
, contain 28 rock-cut caves of the ancient period that approximately dates back to 1st - 3rd Century AD. The paintings in Thanale Caves are an extraordinary accomplishment of art. Thanale Caves are situated in the trade centre, near Chaul
, an ancient port. There are remains of Indian cave paintings in Cave 13 that can be traced back to 5th century AD.
History of Thanale Caves
The Thanale Caves are amongst the most significant rock-cut temples in India and is placed near the mountain pass, where the trade route lies. Coins from the period of Emperor Ashoka
have been obtained in this site. Thus it is estimated that the caves were created during the 3rd century BC. The caves were considered quite important during the ancient period. The caves were discarded around 5th century AD, after the decline of Chaul port.
The caves were noticed by J. A. Abnot, a missionary, in 1890. Vasudeo Balwant Phadke
, the renowned revolutionary, utilised the caves for shelter and refuge. The appearances of visitors, who are attracted by the natural beauty of the location, have contributed to the defilement and damage of the valuable artworks and sculptures of ancient India.
Details of Thanale Caves
Amidst the stunning natural beauty and the stunning landscape of the region, lies the ancient rock cut temples of Thanale. The caves are situated in the base of the gigantic cliff and are set in a row. The caves have suffered damages due to natural factors, like the damage the front wall and the collapse of the ceilings of few caves.
There are a total of 28 caves in the region embellished by stone carved sculptures above the gateways and up on the ceilings, including a statuette of Naga, lord of the serpents. There are around 13 stupas in Cave 3. Cave 13 consists of remains of plastered on the side walls of the caves that include traces of painting. It is estimated that the paintings were made around 5 century AD. Shades of red, white, blue and yellow were mainly used by the artists. There are also numerous cells cut in rock that are present in the caves.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and cultural significance\", \"score\": 0}\n```\n\n**Explanation:**\nThe text describes historical and cultural sites without any unsafe or inappropriate content. It provides information about the Thanale Caves, their historical significance, and the art found within them. The text is suitable for educational and public use."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "904-0",
"llm_safety_score": 0,
"reason": "historical and cultural significance"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.indianetzone.com/55/thanale_caves.htm",
"date": "2013-12-10T21:42:02",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164026161/warc/CC-MAIN-20131204133346-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9751750827,
"token_count": 465,
"score": 3.25,
"int_score": 3
}
|
<urn:uuid:e57e835a-5644-4817-857c-d1e8a738cb5f>
|
While many federal agencies are undertaking environmental justice-related activities to respond to Executive Order 12898 issued by President Clinton in 1994: “Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations,” there is a lack of guidance on how to assess disproportionate human health or environmental effects of agency programs, policies, and actions on minority and low-income populations. Meanwhile, many state governments are now developing their own strategies for identifying disproportionate environmental health impacts and addressing environmental justice concerns.
The purpose of this study is to review the diversity of state-level approaches and methodologies for conducting disproportionate environmental health impact evaluations as part of their environmental justice programs and initiatives. We found state approaches to these assessments, often called “environmental justice analyses” range from simple qualitative evaluations of demographic indicators, such as race and income, to complex quantitative analyses of environmental health hazards such as statistical modeling across populations and geographic regions.
In spite of the progress many states have made to develop methods for disproportionate environmental health impact assessment, several challenges remain such as linking these evaluation approaches to health risks so as to be useful in regulatory decision making, greater quantity and variety of robust data sets at the proper spatial resolution, increased funding to implement programs over the long-term, and collaboration among relevant governmental agencies at all levels. (Mary Ann Liebert)
Devon Payne-Sturges, Amalia Turner, Jessica Wignall, Arlene Rosenbaum, Elizabeth Dederick, and Heather Dantzker
Dr. Payne-Sturges is Assistant Center Director for Human Health at ORD/National Center for Environmental Research in Washington, DC. Ms. Turner is a senior associate at ICF International in Durham, North Carolina. Ms. Wignall is an Environmental Sciences and Engineering MSPH candidate at the UNC Gillings School of Global Public Health in Chapel Hill, North Carolina. Ms. Rosenbaum is a technical director at ICF International in Rohnert Park, California. Dr. Dederick is a manager at ICF International in Bala Cynwyd, Pennsylvania. Dr. Dantzker is a manager at ICF International in Fairfax, Virginia.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a scholarly article discussing environmental justice and the methodologies used by state governments to assess disproportionate environmental health impacts. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "905-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://environmentaljusticeblog.blogspot.com/2012/11/a-review-of-state-level-analytical.html",
"date": "2013-12-12T10:32:52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164580231/warc/CC-MAIN-20131204134300-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9175721407,
"token_count": 441,
"score": 2.59375,
"int_score": 3
}
|
<urn:uuid:a1ec7abb-4c9a-46a5-b8bb-62b815511fc6>
|
Science and technology underpin the modern American economy, but as a steady drumbeat of recent reports have suggested, experts fear that the current trajectory for the U.S. scientific enterprise could eventually undermine the country's competitive stance. Attempting to find solutions, the Brookings Institution brought together a handful of scholars Tuesday to suggest and discuss federal strategies to head off the problem.
Lawrence H. Summers, the Charles W. Eliot University Professor and the former president of Harvard University, concisely summed up the day’s concerns. The last century was the century of physics, and it was a century directed by America, he said. The 21st century will likely be defined by advances in the biomedical sciences.
“The question is,” he asked, “‘Will the United States be the leader?’ ”
Thomas Kalil, special assistant to the chancellor for science and technology at the University of California at Berkeley, proposed that the federal government provide prizes as an incentive to spur research. Kalil’s idea originates from a contest in 1919, when a New York hotel owner, Raymond Orteig, offered a $25,000 purse to the first person to fly nonstop from New York to Paris. While Charles Lindbergh ultimately succeeded in 1927, nine different teams spent more than $400,000 going after the money, helping to spawn the multibillion-dollar aviation industry.
Dangling prizes in front of innovators has benefits not found in the typical funding process. By offering a prize, government pays for success instead of rewarding a research proposal, as occurs with grants. Second, prizes can stimulate private investment by attracting entrepreneurs and corporate enthusiasts interested in capturing a trophy. Finally, there is nothing like a cash jackpot to stir public interest.
“I’m not saying that we don’t have to fund research, but we should look to prizes as a complement,” said Kalil. Drawbacks exist, however. Kalil noted that small companies and individual inventors face difficulty raising funds to pursue cash awards, and prizes can work only for narrowly tailored projects. A contest simply would not work, he said, for a highly complex project like discovering a Higgs boson particle.
But prizes can spur research in areas like space exploration. The National Aeronautics and Space Administration recently announced that it will sponsor competitions to invent technologies such as flexible astronaut gloves, and Kalil recommended that NASA create prizes for more ambitious contests such as building a lunar lander-rover. Kalil also suggested that prizes may be the way to spur innovations in African agriculture, vaccines for diseases that afflict the poor, energy policy and even learning technologies.
Researchers need to design learning software that is as interesting to students as video games, he argued. Kalil said that this policy shift would not require huge amounts of money. For instance, he recommended that NASA initially devote around $100 million of its $16.8 billion budget to contests.
Richard Freeman, professor of economics at Harvard, made a similar plea for targeted spending, focused instead on graduate research fellowships sponsored by the National Science Foundation. In the early 1960s, NSF funded about 1,000 graduate students in the Graduate Research Fellowship Program and three decades later, it sponsors the same number. Freeman said that the government needs to triple that number and increase the value of each fellowship from $30,000 to $40,000 annually.
Funding more graduate students would not solve all the problems in science, but Freeman said that the minimal cost ($375 million a year) would galvanize the younger generation to set the future agenda for science. “The point is that we would get a substantial response to this and all the good things would follow,” he said.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the importance of science and technology in the modern economy and suggests various strategies to enhance the U.S. scientific enterprise. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "906-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.insidehighered.com/news/2006/12/06/innovate",
"date": "2013-12-12T10:20:25",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164580231/warc/CC-MAIN-20131204134300-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9502331614,
"token_count": 772,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:11d99711-693e-48d9-b5ca-b16a8ee344e5>
|
UNEP PLEDGES 1,297,343 TREES PLANTED TO A BILLION ACTS OF GREEN® IN HONOR OF EARTH DAY 2011
For Immediate Release Contact: Irene Farrow
April 29, 2011 [email protected]
+1-202-518-0044 x 25
UNEP Pledges 1,297,343 Trees Planted to A Billion Acts of Green® in honor of Earth Day 2011
The United Nations Environment Programme (UNEP) pledged the 1,297,343 trees planted on the week of Earth Day 2011 through its Billion Tree Campaign in support of A Billion Acts of Green®. A Billion Acts of Green® is a campaign initiated by Earth Day Network which mobilizes individuals, communities, and organizations around the world to undertake acts of environmental service and advocacy. Ever since the first Earth Day on April 22, 1970, Earth Day has become the most widely celebrated non-religious holiday in the world, encouraging action and awareness about our planet’s limited resources. Tree plantings and other conservation activities have been a popular way for people of all ages, backgrounds, and situations to improve their local and global environment.
Trees play a crucial role and are fundamental components of the biodiversity that forms the foundation of all life. UNEP’s Billion Tree Campaign was created with the goal to catalyze the pledging and planting of one billion trees as a way of giving public expression to the challenges of climate change and ecosystem degradation. Since its start, the Billion Tree Campaign has surpassed its original goal, with more than 11 billion trees planted around the world. Just as notably, on April 22, 2011, Earth Day, A Billion Acts of Green® surpassed 100 million Acts of Green, and is well on its way to reach one billion in time for the 2012 United Nations Conference on Sustainable Development, or Rio+20.
A Billion Acts of Green® shares a similar vision as the Billion Tree Campaign – that every small and practical step is transforming our world towards a brighter and greener future. Be it through tree plantings, energy efficient light bulb swap-outs, or major business initiatives for sustainability, we all have a role to play. Kathleen Rogers, President of Earth Day Network, said, “We all have a responsibility to protect the world’s natural resources from man’s exploitation. Reforestation is intrinsically tied to local sustainable development and environmental awareness.”
Mr. Satinder Bindra of UNEP said, “We are very pleased to be working with Earth Day Network in the effort to aggregate and promote impactful environmental actions for a healthier planet. By planting the seeds of hope, we are creating a green economy for the present and next generation.”
For more information about A Billion Acts of Green®, a campaign of Earth Day Network, please visit http://act.earthday.org.
For more information about the United Nations Environment Programme’s Plant for the Planet: Billion Tree Campaign, please visit www.unep.org/billiontreecampaign.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is a press release about environmental initiatives and does not contain any unsafe, inappropriate, or harmful content. It is fully appropriate for all audiences and promotes positive environmental actions."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "907-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.earthday.org/press-release/unep-pledges-1297343-trees-planted-billion-acts-green%c2%ae-honor-earth-day-2011",
"date": "2013-12-13T19:33:34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164987957/warc/CC-MAIN-20131204134947-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9170553684,
"token_count": 623,
"score": 2.6875,
"int_score": 3
}
|
<urn:uuid:c33babbc-07e6-4b8c-a069-426fc210f04b>
|
You have learned that electrons travel around the nucleus of an atom and are held in orbits by the attraction of the positive charge in the nucleus. When you force electron out of its orbit, then the electron’s action becomes what is known as electricity.
Electrons that are forced out of their orbits in some way will cause a lack of electrons in the material, which they leave and will cause an excess of electrons at the point where they come to rest. Materials having excess of electrons are called negative charge, while the materials lacking of electrons are called positive charge. When these charges exist and are not in motion, this is called as static electricity.
Two protons together or two electrons together signify like charges. Like charges resist when held closer together, and move away from each other. This movement is called repelling. The first law of electrostatic states that like charges repel each other. And the second law states that unlike charges attract each other. The amount of attracting or repelling force that acts between two electrically charged bodies depend on two factors: their charge and the distance between them.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"Content is educational and appropriate for all audiences.\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "908-0",
"llm_safety_score": 0,
"reason": "Content is educational and appropriate for all audiences."
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://basic-electronics.blogspot.com/2008/09/electrical-charge.html",
"date": "2013-12-06T07:07:58",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049948/warc/CC-MAIN-20131204131729-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9712736011,
"token_count": 222,
"score": 4.46875,
"int_score": 4
}
|
<urn:uuid:f57cdf44-e1ad-4b98-b973-40e35a0c45b2>
|
The Campaign for the Civic Mission of Schools recommends six “proven practices” that, together, constitute well-rounded civic learning. We urge all schools K-16 to adopt these practices, which have been shown by research to provide the most effective and comprehensive approach to ensuring all students receive the civic knowledge and skills necessary for informed and engaged citizenship. These six proven practices are:
1. Classroom Instruction: Schools should provide instruction in civics & government, history, economics, geography, law, and democracy. Formal instruction in these subjects increases civic knowledge and increases young people’s tendency to engage in civic and political activities over the long term. However, schools should avoid teaching only rote facts about dry procedures, which is unlikely to benefit students and may actually alienate them from civic engagement.
2. Discussion of Current Events and Controversial Issues: Schools should incorporate discussion of current local, national, and international issues and events in to the classroom, particularly those that young people view as important to their lives. When students have an opportunity to discuss current issues in a classroom setting, they tend to have a greater interest in civic life and politics as well as improved critical thinking and communication skills.
3. Service-Learning: Schools should design and implement programs that provide students with the opportunity to apply what they learn through performing community service that is linked to the formal curriculum and classroom instruction.
4. Extracurricular Activities: Schools should offer opportunities for young people to get involved in their schools or communities outside of the classroom. Studies show that students who participate in extracurricular activities in school remain more civically engaged then those who did not, even decades later.
5. School Governance: Schools should encourage meaningful student participation in school governance. Giving students more opportunities to participate in the management of their classrooms and schools builds their civic skills and attitudes.
6. Simulations of Democratic Processes: Schools should encourage students to participate in simulations of democratic processes and procedures. Evidence shows that simulations of voting, trials, legislative deliberation and democracy, leads to heightened civic/political knowledge and interest.
Download the Six Proven Practices.
More information on each of these practices and the research that shows their effectiveness may be found in “Guardian of Democracy: The Civic Mission of Schools” Report.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text is a recommendation for civic education practices and does not contain any unsafe, inappropriate, or harmful content. It promotes educational and constructive practices that are suitable for all audiences, including children and sensitive environments. The language is respectful, and the themes are focused on civic engagement and education, which are appropriate for educational settings."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "909-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.civicmissionofschools.org/educators/six-proven-practices",
"date": "2013-12-06T06:56:51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049948/warc/CC-MAIN-20131204131729-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9539829493,
"token_count": 470,
"score": 3.859375,
"int_score": 4
}
|
<urn:uuid:1544c349-944e-4ed8-bb59-37364f696efc>
|
An Australian researcher has discovered that all snakes have poisonous venom, including pet snakes that are considered harmless. Bryan Fry says, "We even isolated from a rat snake, a snake common in pet stores, a typical cobra-style neurotoxin, one that is as potent as comparative toxins found in close relatives of the cobra."
Fry discovered this by studying the evolutionary history of venomous snakes. He wanted to find out when snakes developed this means of protection and found that it only developed once, about 60 million years ago, which is millions of years earlier than scientists previously thought. This was before the snakes we think of as non-venomous arrived on the scene, meaning that all snakes actually contain dangerous venom.
"Contrary to popular belief, venom appears to have evolved at about the same time as advanced snakes started to appear," Fry says. "This means the first venomous snakes evolved from the heavy-bodied swamp monsters similar to the anacondas of today. These snakes traded in their heavy muscle for speed and agility. Venom rather than muscle became the tool necessary for these snakes to capture their prey."
This means that having venom is part of being a snake, so Fry began to analyze all kinds of snakes, including the "harmless" kinds people keep as pets. He found that pet snakes have venoms that are just as complex as the world's deadliest snakes, such as cobras and puff adders. "Some non-venomous snakes have been previously thought to have only mild 'toxic saliva,' but these results suggest that they actually possess true venoms," says Fry.
"These snakes typically have smaller quantities of venom and lack fangs, but they can still deliver their venom via their numerous sharp teeth," Fry says. "But not all of these snakes are dangerous. It does mean, however, that we need to re-evaluate the relative danger of non-venomous snakes."
Snakes have bothered folks in the past, too.
NOTE: This news story, previously published on our old site, will have any links removed.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text is a scientific news article about the discovery of venom in pet snakes. It contains no unsafe, inappropriate, or harmful content. The language is respectful, and the themes are educational and scientific. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "910-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.unknowncountry.com/news/all-snakes-are-poisonous",
"date": "2013-12-06T06:59:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049948/warc/CC-MAIN-20131204131729-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9825110435,
"token_count": 425,
"score": 3.609375,
"int_score": 4
}
|
<urn:uuid:67c4ecbf-8f05-4924-9f63-432975208460>
|
|At least 34 meteors are included in this composite image as they rain through Australian skies during the annual Geminid Meteor shower. Dust particles strung out along the orbit of extinct comet Phaethon vaporize when they plow through planet Earth's atmosphere causing the impressive display. Although the particles are traveling parallel to each other, the resulting streaks clearly seem to radiate from a single point on the sky near Gemini's twin stars Castor and Pollux at the lower right. The radiant effect is due to perspective, as the parallel tracks appear to converge at a distance. Taken over a period of 2 hours on the morning of December 14, short exposures recording individual meteor streaks were combined with a single long exposure to show the background stars, with Sirius at the top, and the constellation Orion at left. Faint stars and nebulae of the Milky Way track through the center of the frame. Near the radiant point, an extra star in Gemini is actually the flash of a meteor seen almost head-on.
Credit & Copyright: Phil Hart
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a description of a meteor shower and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would warrant a higher safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "911-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.astrobio.net/index.php?option=com_galleryimg&task=imageofday&imageId=213&pageNo=126",
"date": "2013-12-07T20:48:01",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055810/warc/CC-MAIN-20131204131735-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9368610978,
"token_count": 212,
"score": 3.171875,
"int_score": 3
}
|
<urn:uuid:29830d5f-c04b-4e94-84d2-1425c119b7c3>
|
Shar-Pei Dogs Shed Light on Human Fever Syndromes2011-Mar-17
By -- Robert Preidt
THURSDAY, March 17 (HealthDay News) -- The gene mutation responsible for the wrinkled skin of Shar-Pei dogs is also linked to a periodic fever disorder, a finding that could have important implications for human health, researchers report.
Shar-Pei dogs have a high prevalence of a periodic fever disorder that is similar to inherited autoinflammatory periodic fever syndromes in humans.
The thick, wrinkled skin of Shar-Pei dogs contains an excess of hyaluronan, most likely because of an over-activation of the hyaluronan synthase 2 (HAS2) gene. The fever disorder in the dogs occurs when overproduction of hyaluronan activates the immune system, according to scientists at the Broad Institute in Cambridge, Mass., and Uppsala University in Sweden.
The finding, published in the March 17 online edition of the journal PLoS Genetics, could help improve understanding of human inflammatory diseases, the researchers said. They noted that the genetic cause of periodic fever syndromes in humans is unknown in about 60 percent of cases.
"The finding that hyaluronan is a major trigger of fever opens a new research field in canine and human inflammatory disease," senior author Kerstin Lindblad-Toh said in a journal news release.
The U.S. National Institute of Arthritis and Musculoskeletal and Skin Diseases has more about autoinflammatory diseases.
Copyright © 2011
All rights reserved.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text discusses a scientific study about Shar-Pei dogs and their genetic link to human fever syndromes. There is no inappropriate language, harmful content, or references to illegal activities. The content is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "913-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.aurorahealthcare.org/yourhealth/getcontent.asp?URL=healthlibrary.epnet.com/GetContent.aspx?token=5344349d-8fbc-446e-8ae5-03a924025f8c-chunkiid=641076",
"date": "2013-12-09T15:14:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163985723/warc/CC-MAIN-20131204133305-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8848827481,
"token_count": 327,
"score": 3.0625,
"int_score": 3
}
|
<urn:uuid:433049af-480b-4e4e-b3fd-5816870d39b0>
|
A 9 November article on Mongabay.com reviews a study that challenges whether marine reserves promote coral recovery. A study published in the 14 August 2011 issue of Coral Reefs concludes that a decade of marine reserve protection has failed to help damaged Caribbean corals recover.
Healthy reefs depend on herbivorous parrotfishes to eat algal blooms. When fishing pressures overwhelm these seaweed-grazing species, algae choke new coral growth. Research has shown that marine reserves with strong ‘no-take’ enforcement can protect herbivorous fish populations. However, it’s less clear whether these safeguards also help corals bounce back.
In 2008-2009, researchers working at Glover’s Reef showed that the reserves made no difference in fish populations or coral health. But the findings at Glover’s Reef shouldn’t count as a failure, contends Peter Mumby, a marine ecologist at the University of Queensland in Australia. Mumby published a 2010 paper in PLoS ONE concluding that marine reserves do help Caribbean corals recover.
“If you’re going to study marine reserve impacts on coral, then you need a marine reserve that is actually doing something,” Mumby said. Because the reserve at Glover’s didn’t affect fish numbers, he’s not surprised that corals didn’t recover. He thinks parrotfish poachers may still be plundering reserves, despite beefed-up enforcement by the Belizean government.
Read the article on the Mongabay website.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n*Explanation:*\nThe provided text is a scientific article discussing the effectiveness of marine reserves in promoting coral recovery. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and relevant to marine conservation. Therefore, it is fully appropriate for all audiences, including children and sensitive environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "915-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.pewenvironment.org/news-room/media-coverage/researchers-investigate-whether-marine-reserves-promote-coral-recovery-peter-mumby-pew-marine-fellow-2010-85899367175",
"date": "2013-12-11T05:38:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164031957/warc/CC-MAIN-20131204133351-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9160428643,
"token_count": 321,
"score": 3.46875,
"int_score": 3
}
|
<urn:uuid:541c3067-9815-4511-a535-9075cda5f8d2>
|
Impeach? (Impedance) in Electricity
Name: Michael S.
When talking about electrical conductors and the
current which they carry- what does the word "impeach" refer to and
what is the significance of this term? Would you please include some
references for future reading?
I do not know that word in that context, but it would be very easy to
hear "impeach" when someone says "impedance".
Sorry, Michael, I have never heard the word "impeach" used in an
However, when talking about current-carrying _ratings_ of wires, the
general meaning of "impeach" might be relevant.
The general meaning of impeach is to discredit, establish suspicion, or
show probably cause for a judgement.
A "'current rating" is an assertion by some person that the wires will be
safe from overheating,
to a certain high degree, when carrying the mentioned or expected amount
A skeptical reviewer, such as an electrical inspector, might find a
that these assertions are not quite valid or that the degree of safety is
not as high as claimed or required.
One might say that these reasons impeach the claimed current rating, or
impeach the electrical design as a whole.
In other words, someone thinks the current-carrying capacity is not high
and "impeach" is the word they used to say so.
Perhaps is you Google search for ["'current rating" impeach] you would
find illuminating examples.
Could you possibly have mistaken the word "impeach" for "impedance"? If you
meant to ask about electrical impedance, here is a web site that gives a
Todd Clark, Office of Science
U.S. Department of Energy
I am not familiar with the term "impeach" used in the context of electrical
circuits. Is it possible that "impedance" is term being referred to?
Click here to return to the Physics Archives
Update: June 2012
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"misspelling and confusion\", \"score\": 0}\n```\n\nThe text sample discusses a simple confusion between the words \"impeach\" and \"impedance\" in the context of electrical engineering. There is no unsafe content, inappropriate language, or themes that would warrant a score higher than 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "916-0",
"llm_safety_score": 0,
"reason": "misspelling and confusion"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://newton.dep.anl.gov/askasci/phy00/phy00883.htm",
"date": "2013-12-12T14:39:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164611566/warc/CC-MAIN-20131204134331-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9218159318,
"token_count": 432,
"score": 2.59375,
"int_score": 3
}
|
<urn:uuid:bb548e14-0aa5-49ec-a0a9-79f0aa3af4dc>
|
Mother's Milk is the Best Milk
According to a study done by the National Health Service (NHS) in the United Kingdom, about eight in ten women are breastfeeding their infants compared to six in ten in 1990. In addition, the ratio of breastfeeding increases causally with economic status; middle-class women with high-paying jobs and maternity leave are more likely to breastfeed than women of a lower socioeconomic status.
As you may know, there are many health benefits to breastfeeding. These include easy digestion for the infant, availability of rich and vital nutrients within breast milk, bio-availability (that is, how well the infant can use the nutrients for growth), and suitability. Infants who are fed breast milk have a lower risk of allergies, asthma, and are less likely to develop ear infections or other illnesses.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text discusses the benefits of breastfeeding and includes statistics from a reputable source (NHS). There is no unsafe, inappropriate, or harmful content in the text. It is suitable for all audiences and does not contain any offensive language or themes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "917-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.naturalsolutionsmag.com/baby/mothers-milk-best-milk",
"date": "2013-12-12T14:42:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164611566/warc/CC-MAIN-20131204134331-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9543865323,
"token_count": 166,
"score": 3.15625,
"int_score": 3
}
|
<urn:uuid:e6450156-7fe7-4669-9bcf-2825510f79c8>
|
MicroE Systems Natick, Mass.
Typical Scara arm configuration
The semiconductor industry is beginning to realize it has a good opportunity to drive down its equipment costs. The opportunity concerns the hundreds of Selective Compliant Assembly Robot Arms (Scaras) found in scores of atmospheric and vacuum wafer-processing applications. Cost savings come from new direct-drive motor designs which make it possible to replace motorgearboxencoder loops. The benefits are improved robot performance accompanied by lower cost and a robot actuator that is smaller and lighter than its predecessors.
However, direct-drive designs need positionfeedback devices that have special qualities. Most encoders used in ordinary motion feedback loops have drawbacks that become apparent in semicon fabs. But a new generation of absolute encoders have been built specifically for wafer-handling robot applications. These devices overcome many of the difficulties inherent in conventional position encoders.
It is useful to briefly review how older Scara robots were configured. Nearly all of them had gearboxes which multiplied motor torque.
But the gearbox is expensive, bulky, and introduces its own mechanical errors that affect position accuracy. Backlash and dynamic stiffness, for example, can both be problematic. In addition there are maintenance and reliability issues. All in all, there are a number of incentives to eliminate this component from next-generation Scara robot designs.
Elimination of the gearbox will improve robot performance by reducing the size and weight of the drive mechanism for each joint. This more-compact configuration has several benefits: Shorter driveshafts make motion assemblies potentially stiffer and lighter weight. Better position accuracy and higher acceleration is the result.
The downside, however, is that encoders for position feedback in direct drive need substantially higher resolution.
Many older Scara robots also used incremental encoders to provide position feedback. They gauge distance in terms of increments from a single reference point or index mark on the encoder wheel. But there is a problem with this scheme in the event of a power failure. In the absence of battery or power backup, the system loses count of the joint position. It has to go to a home position on powerup to get its bearings.
Such a procedure is impractical if the robot happens to be holding a wafer. In the worst case, a fully processed wafer could be part way in a cassette when the lights go out. The robot risks dropping the wafer on the floor of a load dock if it makes any sudden moves to find itself once power returns. With some wafers representing hundreds of thousands of dollars worth of in-process ICs, the perils are simply unacceptable.
The way around such a dilemma is through an absolute encoder. Absolute encoders, of course, let the robot know exactly where it is upon recovery from a power failure. Each point on the encoder scale has its own unique signature, so the system instantly can read encoder position at start-up.
There are a variety of ways to realize absolute encoding. One alternative is to use a battery-backed incremental encoder-with supplemental memory. With this strategy,-the encoder never forgets its position and never loses power.
The problem with this approach for Scara applications is that each individual joint needs its own battery and memory. This can be a maintenance nightmare for the typical fab which would entail monitoring and regularly replacing hundreds of batteries. For these reasons, SEMI has called for elimination of batteries from next-generation fabs.
Pseudo-absolute encoders are another way of solving the problem. They use multiple distancecoded reference marks that let the system resolve position when the robot reenergizes. The procedure is to jog each joint slightly to find the nearest reference mark. But this "bumping" approach is no longer acceptable because it can damage wafers if the robot happens to be handling one at the time.
The best way to address this issue is with absolute encoders capable of retaining joint position without having to find an index or reference point.
Such devices are indeed available, but until recently they have lacked the resolution needed for wafer-handling robots. They have also been bulky and relatively expensive.
These were among the reasons for the development of absolute encoders specifically targeting Scara wafer-handling-robots. Like other true absolute encoders, they have enough positioning information on any point on the code wheel to know exactly where they are on start-up. Single-turn resolution is 24 bits, yielding a rotational positioning accuracy of one part in 16 million. Thus they can resolve shaft position to better than ±2.1 arc-sec, more than sufficient to track joint movement in wafer-handling robots.
Equally important, these encoders are dramatically smaller than other devices providing similar specs thanks to a proprietary data-track design. The high density of information on the code wheel makes it possible to be physically small. The encoders are just 3 to 5.5-in. diameter, and contain a large throughhole as needed for Scara robot designs.
Installed height is also important because it affects the overall length of the joint. A thin encoder body helps minimize the length of the driveshaft and thus promotes a lighter, stiffer, and more accurate joint. New designs keep physical dimensions down through use of a kit approach. The code wheel and electronics mount individually. Moreover, electronic components are distributed around the circumference of the motor shaft in the space just above the code wheel. Such a layout takes advantage of free space that would otherwise be wasted inside the joint.
In contrast, the electronics in most ordinary absolute encoders stack vertically. The height of the device is often set by the space requirements of the circuitry. This is why conventional absolute encoders take up about 30 mm of space compared to under 15 mm for the new version.
The economics of the new generation of encoders is worth mentioning. They are more expensive than low-resolution, incremental encoders found in current Scara designs, but the total system cost of the robot is considerably less. Cost savings come from eliminating the gearbox as well as the physically smaller size of the overall mechanics. Estimates are that the overall system cost typically drops by one-third thanks to the direct-drive approach made possible by the new encoding technology.
MicroE Systems Div., GSI Lumonics,
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"technical content with no unsafe elements\", \"score\": 0}\n```\n\nThe provided text is purely technical and does not contain any unsafe or inappropriate content. It discusses the semiconductor industry and the benefits of using direct-drive motor designs in Scara robots, along with the advantages and challenges of different types of encoders. Therefore, it is fully appropriate for all audiences.",
"{\"reason\": \"No unsafe content detected\", \"score\": 0}\n```\n\nThe provided text discusses technical aspects of encoder design and does not contain any unsafe, inappropriate, or harmful content. It is suitable for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "918-0",
"llm_safety_score": 0,
"reason": "technical content with no unsafe elements"
},
{
"custom_id": "918-1",
"llm_safety_score": 0,
"reason": "No unsafe content detected"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://machinedesign.com/print/archive/absolutely-accurate",
"date": "2013-12-18T10:47:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345758389/warc/CC-MAIN-20131218054918-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.924453795,
"token_count": 1317,
"score": 2.703125,
"int_score": 3
}
|
<urn:uuid:c285cafa-7b89-419a-8b5b-755cdd44fda9>
|
The American marten (Martes americana) is a North American member of the family Mustelidae, sometimes referred to as the pine marten. The name “pine marten” is derived from the common but distinct Eurasian species of Martes. It differs from the fisher (Martes pennanti) in that it is smaller in size.
The American marten is broadly distributed in northern North America. From north to south its range extends from the northern limit of treeline in arctic Alaska and Canada to northern New Mexico. From east to west its distribution extends from Newfoundland to California. In Canada and Alaska, American marten distribution is vast and continuous. In the western United States, American marten distribution is limited to mountain ranges that provide preferred habitat. Over time, the distribution of American marten has contracted and expanded regionally, with local extirpations and successful recolonizations occurring in the Great Lakes region and some parts of the Northeast The American marten has been reintroduced in several areas where extinction occurred
Taken in Algonquin Park Ontario, Canada
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text is a factual description of the American marten, which is a scientific and educational topic. It contains no unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "919-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2013-48",
"url": "http://www.redbubble.com/people/jaydee1400/works/10979208-pine-marten?p=matted-print&ref=work_carousel_work_portfolio_2",
"date": "2013-12-18T10:17:19",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345758389/warc/CC-MAIN-20131218054918-00010-ip-10-33-133-15.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9372685552,
"token_count": 221,
"score": 3.625,
"int_score": 4
}
|
<urn:uuid:f42f0a0f-4e68-4587-a45d-8dcd4597c946>
|
October 10, 2006This is one rebel that's been tied to a
very serious cause.
The fist-size bird with punk-rock plumage is a new—and possibly threatened—avian species that makes its home in the last remnants of a remote Colombian cloud forest.
Dubbed the Yariguíes brush finch, the small bird was first found in 2004 in an isolated region of the eastern Andes mountain range known as the Serranía de los Yariguíes. The region and the finch are both named for the Yariguíes, an indigenous tribe that once inhabited the mountain forests and reportedly committed mass suicide rather than submit to Spanish colonial rule in the 1500s.
Over the past three years researchers Thomas Donegan and Blanca Huertas have regularly hiked into the remote Andes forests to help document avian species diversity. In a paper submitted in February to the Bulletin of the British Ornithologists' Club, Donegan and Huertas describe finding a bird that differs from other known brush finches because it has a solid black back and no white markings on its wings.
During further fieldwork in 2005 the scientists were able to capture one of the birds and take photographs and a blood sample before releasing it back to the wild. The images and DNA analysis cemented the finch's status as a new species.
"There are about two to three new birds found in the world every year," Donegan told the Associated Press. "It's a very rare event."
And the discovery of what researchers believe to be a rare bird got a conservation boost in the nick of time. Only a few months before the new brush finch was confirmed, the Colombian government had designated much of the bird's habitat as the Serranía de los Yariguíes National Park, a 193,698-acre (78,387-hectare) expanse of protected grasslands and mountain forests.
"The new protected area," Donegan and Huertas wrote in their Bulletin paper, "should assist in conserving [the Yariguíes brush finch] and other threatened species."
More Photos in the News
Today's 15 Most Read Stories
Free Email Newsletter: Focus on Photography
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is a news article about a newly discovered bird species and its conservation status. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "920-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://news.nationalgeographic.com/news/2006/10/061010-new-bird.html",
"date": "2014-03-07T03:38:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999635677/warc/CC-MAIN-20140305060715-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9480748773,
"token_count": 461,
"score": 2.921875,
"int_score": 3
}
|
<urn:uuid:bf7c39dc-21e8-462b-9b36-c6a405900f92>
|
Otto Stolz wrote:
> - ch for "ch" as in [en_scots] "loch",
> - sch for "sh" as in [en] "fish",
> - tsch for "ch" as in [en] "chunk".
I think that "ch" should is pronounced similar to English "ch" in Rumantsch
Ladin, unlike in German and Scottish. Consequently "s-ch" is probably like
English "s" (or "sh") followed by English "ch".
I don't know how "ch" and "tsch" differ from each other. If it is the same
as the difference between the two sounds spelled "c(i)" and "cj" in Friulian
Ladin, then they are nearly identical to non-mother tongue speakers.
My paternal grandparents are (well, the less lucky of them was) from
Friuli-Venezia Giulia (Italy), and they tried several times to teach me the
difference between the two sounds, but in vane: they both sounded pretty
like Italian "c(i)" to my ears.
I think that the tongue touches different places in the roof of the mouth;
"c(i)" is the one more similar to Italian "c(i)" (or English "ch"), and
that's why Friulians used the familiar Italian orthography for it.
In Dolomitic Ladin, the same two sounds are "c" and "c" (c+hacek and
c+acute) in the spelling used local administrations of Trentino-Südtirol,
Italy (Ladin has an official status in some parts of that region). This
seems to suggest that the sounds should be similar to the corresponding
Serbo-Croatian and Slovenian letters.
This archive was generated by hypermail 2.1.2 : Tue Jul 10 2001 - 17:21:20 EDT
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a discussion about phonetic differences in various languages and dialects. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "922-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.unicode.org/mail-arch/unicode-ml/Archives-Old/UML025/1436.html",
"date": "2014-03-07T03:35:49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999635677/warc/CC-MAIN-20140305060715-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9553772807,
"token_count": 419,
"score": 2.5625,
"int_score": 3
}
|
<urn:uuid:67f454e1-4cdc-40e7-8292-de741b761750>
|
If animals have prolonged exposure to cold conditions, despite having fur, they are still susceptible to hypothermia.
Hypothermia is most likely to occur when an animal is wet. The signs of hypothermia are violent shivering followed by listlessness, apathy, a temperature below 97 degrees and, finally, collapse and coma. If you believe your pet is suffering from hypothermia, consult your veterinarian. Prevention is the best choice.
A few simple steps can help protect your animals during cold temperatures:
• Keep pets inside. If animals can’t be inside, provide a warm, comfortable place. Face shelter away from wind and provide a flap or door to help keep the animal’s body heat inside.
• Bedding is essential. It insulates the animal from the snow and ice underneath the body and allows the animal to retain heat within the bedding.
• Cats may sleep under the hoods of cars to stay warm. If you have outdoor felines in your neighborhood, check under the hood before starting your car.
• When walking your pet, keep them on leashes; they can’t rely on their sense of smell in the snow and may become lost.
• Wipe off your dog’s legs and stomach to remove any ice, salt or chemicals.
Outdoor pets need more calories to produce body heat so extra food and water must be provided. Devices are now available to keep water dishes from freezing; if one is not available, fill and replace water frequently.
Check out our Web page at www.archuleta.colostate.edu for calendar events and information.
Dec. 31 — Office closed at noon.
Jan. 1 — Office closed.
Jan. 5 — 6:30 p.m., Colorado Kids Club.
Jan. 7 — 6:30 p.m., 4-H Dog Project.
Jan. 7 — 6:30 p.m., Shady Pine Club.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the effects of cold on animals and providing safety tips for pet owners. There is no inappropriate language, harmful content, or references to illegal activities. Therefore, it is fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "923-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://pagosasun.com/archives/2009/12december/123109/extensionviewpoints.html",
"date": "2014-03-08T07:29:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653836/warc/CC-MAIN-20140305060733-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8792586923,
"token_count": 406,
"score": 3.125,
"int_score": 3
}
|
<urn:uuid:71af416c-38da-41b0-ab14-8e311ddd9014>
|
Grade Level: 3, 8, 9, 12
Subject area: Science
Time Required: Preparation: 3-4 hours Activity: 2 class periods if reviewing, more if learning more than one motion principle for the first time
Ohio Standards Correlation: Force and Motion: Grade Three:
Summary: Discuss the forces of motion pertinent to the grade level and use the Wright Brothers development of the airplane as an example. Build paper airplanes, fly the planes, chart the flights, and if pertinent to the grade level, write a report on the data.
Objective: Students will: 1. Learn about the Wright Brothers and their achievements 2. Learn the basic principles of motion that are behind flight 3. Chart the data of the flights into simple or complex graphs, dependent upon the grade level. 4. Learn to interpret scientific data.
Materials: Typing paper (any color), pencils and paper for charts if necessary.
Activity: In the first class period, discuss the principles of flight pertinent to the grade level. Have the students construct paper airplanes. In the next class period, have the students fly the planes. If flown outside, students who have reached a higher level of mathematics may wish to calculate the correlation between the wind and the performance of their plane's flight by charting the data. Younger students can simply chart the data or find the mean and median of the flights and present their findings to the class or submit their charts to the teacher. Older students can chart the flights and write reports interpreting their data (ex. duration of flight, wind speed, length traveled, etc.).
Assessment/Evaluation Students should be evaluated based upon the charts that they create and their written reports, if applicable.
References: Special Collections and Archives, Wright State University, Wright Brothers Collection.
3640 Colonel Glenn Highway, Dayton, Ohio 45435. Phone: (937) 775-2525
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe provided text is entirely appropriate for educational environments and general audiences. It discusses educational activities related to science, specifically focusing on the principles of motion and the Wright Brothers' contributions to aviation. There are no inappropriate language, themes, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "924-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.libraries.wright.edu/special/wright_brothers/info_packet/lesson_science.php",
"date": "2014-03-08T07:28:51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653836/warc/CC-MAIN-20140305060733-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8758794069,
"token_count": 389,
"score": 3.6875,
"int_score": 4
}
|
<urn:uuid:721c05c1-45f6-4d50-accf-d345276938a0>
|
A selection of articles related to biochemistry proteins.
Original articles from our library related to the Biochemistry Proteins. See Table of Contents for further available material (downloadable resources) on Biochemistry Proteins.
- The Walnut tree – a vegetative guardian angel
- Nature gave us a wonderful tree providing strength, stability and protection in a number of ways. The Black Walnut brings healing on the psychological and emotional plane, cures the body and nurtures the nervous system. The Walnut tree speaks to me mostly in...
Herbalism >> Herbs dictionary W
Biochemistry Proteins is described in multiple online sources, as addition to our editors' articles, see section below for printable documents, Biochemistry Proteins books and related discussion.
Suggested Pdf Resources
- Structural Biochemistry/Proteins/Synthesis
- Structural Biochemistry/Proteins/Synthesis. Introduction.
- The "Bio" in Biochemistry: Protein Folding Inside and Outside the Cell
- The "Bio" in Biochemistry: Protein. Folding Inside and Outside the Cell. R.
- Lecture #31, Biochemistry: Protein Structure
- Lecture 31. November 30, 2009. Biochemistry: Protein Structure protein exhibiting various secondary structures.
- Biochemistry Lab II Recombinant Protein Expression Protocol
- INTRODUCTION - Protein Expression / Induction. Many different biochemistry projects require recombinant protein.
- Tutorial 4 Protein Biochemistry 2 Genes to proteins:
- Tutorial 4. Protein Biochemistry 2. Genes to proteins: Protein synthesis, transport, targeting, and degradation.
Suggested News Resources
- Biol., Biochemistry, Proteins, J. Bacteriol.
Suggested Web Resources
- Biochemistry - Wikipedia, the free encyclopedia
- Like carbohydrates, some proteins perform largely structural roles.
- Biochemistry/Proteins - Wikibooks, open books for an open world
- Nov 22, 2010 Proteins are a primary constituent of living things and one of the chief classes of molecules studied in biochemistry.
- Chem4Kids.com: Biochemistry: Proteins
- Chem4Kids.com! The web site that teaches the basics of chemistry to everyone!
- Biochemistry 22.102 Tutorials
- Biochemistry Tutorials Home Page, SHAPES. Far from being basic, the specific three-dimensional shape of a protein is complex.
Great care has been taken to prepare the information on this page. Elements of the content come from factual and lexical knowledge databases, realmagick.com library and third-party sources. We appreciate your suggestions and comments on further improvements of the site.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe provided text sample is a collection of descriptions and titles related to biochemistry and proteins. It does not contain any unsafe, inappropriate, or harmful content. The text is educational and suitable for a general audience, including students and researchers. Therefore, it is assigned a score of 0, indicating that it is safe for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "926-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.realmagick.com/biochemistry-proteins/",
"date": "2014-03-09T07:43:16",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999675557/warc/CC-MAIN-20140305060755-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.7947996855,
"token_count": 564,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:3df40e9a-924e-4e9d-af75-1cb671848719>
|
Molar Entropy Units: Unit of EntropyHome | Directory | Career | News | Industrial
Glossary » Units » Molar Entropy » Unit of Entropy
Unit of Entropy (ue, eu) is the only unit in the category of Molar entropy in our database. Unit of Entropy (ue, eu) has a dimension of ML2T-2Q-1N-1 where M is mass, L is length, T is time, Q is temperatur, and N is amount of substance. It can be converted to the corresponding standard SI unit J/K-mol by multiplying its value by a factor of 4.184.
Note that the seven base dimensions are M (Mass), L (Length), T (Time), Q (Temperature), N (Aamount of Substance), I (Electric Current), and J (Luminous Intensity).
Related Glossary Pages
Glossary: Units: Length: Mil (thou)
Glossary: Units: Density: Pound Mass Per Cubic Yard
Glossary: Units: Volume: Bushel (UK)
Glossary: Units: Electric Capacitance: Abfarad
Glossary: Units: Energy: Hartree
Glossary: Units: Luminous Intensity: Candle (int.)
Glossary: Units: Data (Binary): Kilobinarybyte (kibibyte)
Glossary: Units: Power (Heat Flow): Horsepower (electric)
Glossary: Units: Power (Heat Flow): Erg Per Second
Glossary: Units: Volume: Quart (US, Dry)
eFunda: Glossary: Units: Mass: Atomic Unit of Mass (12C)
eFunda Glossary for Units, Category:Mass, Unit name: Atomic Unit of Mass (12C), Unit Symbol: u, uma, Da(^12C), AMU.eFunda: Electric Unit Category
eFunda: Electric Unit Category. ... Download a Palm version of this unit conversion calculator! ... Electric charge. Unit Name, Symbol, SI Equivalent ...eFunda: Engineering Mathematics
Mathematics Home Page. Links to major mathematical topics.eFunda: Thermal Unit Category
British thermal unit (IT) per foot per hour per Fahrenheit degree ... British thermal unit (IT)-inch per square foot per second per Fahrenheit degree ...eFunda: Glossary: Units: Entropy: British Thermal Unit (IT) Per ...
eFunda Glossary for Units, Category:Entropy, Unit name: British Thermal Unit (ITUnit Step and Delta Functions
Introduction to Heaviside unit step function and Dirac delta function.efunda Cool Calculators
List of calculators by categories of finance, design, mechanics, and mathematicseFunda: mass Unit Category
Units » Luminous Luminance » Stilb · Units » Molar Entropy » Unit of Entropy · Units » Density » Kilogram Per Cubic Meter ...eFunda: Surface energy density Unit Category
Units » Volume Flow Rate » Lusec · Units » Area » Square Mile (geographical) · Units » Mass » Ton (metric) · Units » Molar Entropy » Unit of Entropy ...eFunda: Molar entropy Unit Category
eFunda: Molar entropy Unit Category. ... Download a Palm version of this unit conversion calculator! ... Molar entropy. Unit Name, Symbol, SI Equivalent ...
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "927-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.efunda.com/glossary/units/units--molar_entropy--unit_of_entropy.cfm",
"date": "2014-03-10T06:26:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010672371/warc/CC-MAIN-20140305091112-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.709184587,
"token_count": 729,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:e2ebf006-9716-4920-8bf3-44df2c16e938>
|
Americans are honoring the memory of civil rights icon Martin Luther King Jr. on Monday with a federal holiday marking his birthday.
King was a Baptist preacher who fought discrimination and racism in the 1950s and 1960s, mainly in the southern United States, where blacks were subjected to unequal treatment in society and at times the target of violence.
King, an advocate for non-violent protests, was assassinated in 1968 at the age of 39. There is now a monument in his honor in Washington.
An undated file photo of Martin Luther King Jr.
Martin Luther King Jr. attends a news conference in Birmingham, Alabama, May 9, 1963.
Martin Luther King Jr., head of the Southern Christian Leadership Conference, speaks to thousands during his "I Have a Dream" speech in front of the Lincoln Memorial, in Washington, August 28, 1963.
Martin Luther King Jr. addresses marchers during his "I Have a Dream" speech at the Lincoln Memorial in Washington, August 28, 1963.
Martin Luther King, Jr. is welcomed by Baptist youths on arrival in Oslo, Norway, to accept the Nobel Peace Prize, December 8, 1964.
Martin Luther King Jr., second from right, speaks at a news conference next to John Lewis, chairman of the Student Nonviolent Coordinating Committee, in Baltimore, Maryland, April 2, 1965.
Martin Luther King, Jr. chats with his wife, Coretta, left, and civil rights champion Constance Baker Motley before the start of an S.C.L.C. banquet, Birmingham, Alabama, August 9, 1965.
This April 1968 photo released by the MLK Jr. National Historic Site shows the body of Martin Luther King Jr. being carried to Morehouse College in Atlanta, Georgia. (AP Photo/MLK Jr. National Historic Site,Courtesy of Bob Adelman)
The grave of Martin Luther King, Jr., is shown at South View Cemetery, Atlanta, Georgia, April 9, 1968.
The Martin Luther King Jr. Memorial in Washington, August 22, 2011.
King gained prominence after leading a successful protest against segregation on the buses in Montgomery, Alabama. Under that system, blacks were required to sit in the back of the bus and, if the vehicle was full, they had to give up their seats to white people.
The landmark Civil Rights Act of 1964 made segregation illegal. That same year King won the Nobel Peace Prize.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe text provides a factual and respectful account of Martin Luther King Jr. and his contributions to civil rights. It does not contain any unsafe or inappropriate content, making it fully suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "928-0",
"llm_safety_score": 0,
"reason": "historical context"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.voanews.com/content/americans-honor-martin-luther-king/1587728.html",
"date": "2014-03-10T06:33:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010672371/warc/CC-MAIN-20140305091112-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9570370913,
"token_count": 493,
"score": 3.328125,
"int_score": 3
}
|
<urn:uuid:15ab52a7-bb9b-4e00-8403-7792a91ae43f>
|
COMMON CORE & SOCIAL STUDIES
Common Core being the new standard, there is the need to integrate Common Core into the curriculum to insure learning objectives are met. Since Common Core is a universal standard, this course will focus to the specific curricular area of Social Studies. Participants will be provided resources on Common Core integration for Social Studies from primary to high level to insure that content and Common Core needs are met.
More information available at website.....www.mysmartleaner.com. For more information please contact Michael McCann at [email protected].
“To register for the class but not paying online, please email your: name, phone, email address and class number to the instructor listed for the class so they can adequately prepare and communicate with you if any changes need to be made.”
- Day and Time of Meeting:Friday, January 24, 2014 - 4:00pm to 9:30pmLocation of Meeting:Ashland University Columbus Center
- Day and Time of Meeting:Saturday, January 25, 2014 - 8:00am to 5:00pmLocation of Meeting:Ashland University Columbus Center
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe provided text sample is entirely focused on educational content related to integrating Common Core standards into a Social Studies curriculum. It does not contain any unsafe, inappropriate, or harmful elements. Therefore, it is fully appropriate for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "930-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.ashland.edu/founders/content/common-core-social-studies",
"date": "2014-03-12T04:04:39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021292989/warc/CC-MAIN-20140305120812-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8839838505,
"token_count": 233,
"score": 2.703125,
"int_score": 3
}
|
<urn:uuid:521f9fe8-53ec-4f53-8cc1-51fc0b55d2ef>
|
The period before the midpoint of the second century is, of course, of critical interest for our study. It is the period of silence for the Fourth Gospel in the Great Church. 'One of the remarkable items in the history of the traditions about John', writes Culpepper, is 'the nearly complete silence of the record during the crucial decades of the early second century'. 1 According to the dominant paradigm of scholarship, in the period before c.150 the Fourth Gospel was predominantly known and used by 'gnostic' or heterodox groups. To the extent it was known among the orthodox it was used with caution or suspicion, or else rejected altogether.
There are several documents from this period which might seem to support the paradigm. Convincing signs of the use of the Fourth Gospel have been held to be absent from 1 Clement, the Didache, the Ps. Barnabas, and 2 Clement. They are often denied as well for Ignatius' epistles, Polycarp's Epistle to the Philippians, and the Shepherd of Hermas, not to mention Papias of Hierapolis. For some of these works the silence, or near silence in any case, is puzzling and perhaps telling, in some way. But for others one will have to admit at the outset that the significance is minimal at best. Most scholars regard 1 Clement as closely contemporary with or as predating the Fourth Gospel. It does contain some parallels to the Fourth Gospel but these are not very close or numerous. The Fourth Gospel appears to be unknown to the author of the Didache, but this work too may well be as early as or earlier than the Fourth Gospel. Some would place the Shepherd of Hermas in this category of early works, though I am not convinced of this and will examine the matter below. Nor, in my view, is Ps. Barnabas quite this early, though it may well be from about the time of Ignatius' letters and may still be unfamiliar with the recently published Gospel according to John. There is a possible trace of the Fourth Gospel's influence in this work, in its use of an Old Testament symbol which is used also by the Fourth Gospel. 2 But this is admittedly tenuous. Perhaps more significant is the epistle known as 2 Clement, which is surely later than the Fourth Gospel and which contains no very probable influence from the Fourth Gospel, while it does contain many citations or paraphrases of Jesus' word from Synoptic sources, and from some apocryphal source(s). It remains to be seen, then, whether 2
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and academic content with no unsafe elements\", \"score\": 0}\n```\n\nThe text provided is purely historical and academic in nature, discussing the use and influence of the Fourth Gospel in early Christian literature. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "931-0",
"llm_safety_score": 0,
"reason": "historical and academic content with no unsafe elements"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.questia.com/read/109864638/the-johannine-corpus-in-the-early-church",
"date": "2014-03-12T04:03:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021292989/warc/CC-MAIN-20140305120812-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9700528383,
"token_count": 522,
"score": 2.578125,
"int_score": 3
}
|
<urn:uuid:72b0cdb6-cb23-433e-8179-de1e0d879fd4>
|
The KIM-1, short for Keyboard Input Monitor, was a small 6502-based single-board computer developed and produced by MOS Technology, Inc. and launched in 1976. It was very successful in that period, due to its low price (following from the inexpensive 6502) and easy-access expandability.
MOS Technology's first processor, the 6501, could be plugged into existing motherboards that used the Motorola 6800, allowing potential users (i.e. engineers and hobbyists) to get a development system up and running very easily using existing hardware. Motorola immediately sued, forcing MOS to pull the 6501 from the market. Changing the pin layout produced the "lawsuit-friendly" 6502. Otherwise identical to the 6501, it nevertheless had the disadvantage of having no machine in which new users could quickly start playing with the CPU.
Chuck Peddle, leader of the 650x group at MOS (and former member of Motorola's 6800 team), designed the KIM-1 in order to fill this need. The KIM-1 came to market in 1976. While the machine was originally intended to be used by engineers, it quickly found a large audience with hobbyists. A complete system could be constructed for under 500 US$ with the purchase of the kit for only 245 US$, and then adding a used terminal and a cassette tape drive.
Many books were available demonstrating small assembly language programs for the KIM, including "The First Book of KIM" by Jim Butterfield et al. One demo program converted the KIM into a music box by toggling a software-controllable output bit connected to a small loudspeaker.
As the system became more popular one of the common additions was the Tiny BASIC programming language. This required an easy memory expansion; "all of the decoding for the first 4 K is provided right on the KIM board. All you need to provide is 4 K more of RAM chips and some buffers." The hard part was loading the BASIC from cassette tape—a 15-minute ordeal.
Rockwell International—who second-sourced the 6502, along with Synertek—released their own evaluation board in 1976, the AIM 65. The AIM included a full ASCII keyboard, a 20-character 14-segment alphanumeric LED display, and a small cash register-like printer. A debug monitor was provided as standard firmware for the AIM, and users could also purchase optional ROM chips with an assembler and a Microsoft BASIC interpreter to choose from.
Finally, there was the Synertek SYM-1 variant, which could be said to be a machine halfway between the KIM and the AIM; it had the KIM's small display, and a simple membrane keyboard of 29 keys (hex digits and control keys only), but provided AIM-standard expansion interfaces and true RS-232 (voltage level as well as current loop mode supported).
Not long after the KIM's introduction, MOS Technology, Inc. was purchased by Commodore International and production of the original KIM lasted for a while under the CBM label, before it was ended. Chuck Peddle started work on an expanded version, with a full built-in QWERTY-keyboard, cassette tape drive, and monochrome monitor display.
The monitor was driven by a new built-in display driver chip, meaning no external terminal was required. The ROM firmware was expanded to include the BASIC as well, so the machine was up and running as soon as the power was turned on. The result was the Commodore PET (4 kB RAM, discrete logic graphics), launched in 1977 – one of three historic home/personal computers to appear that year, the two others being the Apple II (also 6502-based) and the TRS-80 (with a Zilog Z80).
The KIM-1 consisted of a single printed circuit board with all the components on one side. It included three main ICs; the MCS6502 CPU, and two MCS6530 Peripheral Interface/Memory Devices. The MCS6530 "is comprised of a mask programmable 1024 x 8 ROM, a 64 x 8 RAM, two 8 bit bi-directional ports …and a programmable interval timer…". The KIM-1 brochure said "1 K BYTE RAM" but it actually had 1152 bytes. The memory was composed of eight 6102 static RAMs(1024 x 1 bits) and the two 64 byte RAMs of the MCS6530s. In the 1970s memory sizes were expressed in several ways. Semiconductor manufacturers would use a precise memory size such as 2048 by 8 and sometimes state the number of bits (16384). Mini and mainframe computers had various memory widths (8 bits to over 36 bits) so manufacturers would use the term "words", such as 4K words. The early hobbyist computer advertisements would use both "words" and "bytes". It was common to see "4096 words", "4K (4096) words" and "4 K bytes". The term KB was unused or very uncommon. The KIM-1 was introduced in the April 1976 issue of Byte magazine and the advertisement stated "1 K BYTE RAM" and "2048 ROM BYTES".
Also included were six 7-segment LEDs (similar to those on a pocket calculator) and a 24-key calculator-type keypad. Many of the pins of the I/O portions of the 6530s were connected to two connectors on the edge of the board, where they could be used as a serial system for driving a Teletype Model 33 ASR and paper tape reader/punch).
One of these connectors also doubled as the power supply connector, and included analog lines that could be attached to a cassette tape recorder.
Earlier microcomputer systems such as the MITS Altair used a series of switches on the front of the machine to enter data. In order to do anything useful, the user had to enter a small program known as the "bootstrap loader" into the machine using these switches, a process known as booting. Once loaded, the loader would be used to load a larger program off a storage device like a paper tape reader. It would often take upwards of five minutes to load the tiny program into memory, and a single error while flipping the switches meant that the bootstrap loader would crash the machine. This could render some of the bootstrap code garbled, in which case the programmer had to reenter the whole thing and start all over again.
The KIM-1 included a somewhat more complex built-in Terminal Interface Monitor software called TIM that was "contained in 2048 bytes of ROM in two 6530 ROM/RAM/IO arrays". This monitor software included the ability to run a cassette tape for storage, drive the LED display, and run the keypad. As soon as the power was turned on, the monitor would run and the user could immediately start interacting with the machine via the keypad. The KIM-1 was one of the first single-board computers, needing only an external power supply to enable its use as a stand-alone experimental computer. This fact, plus the relatively low cost of getting started, made it quite popular with hobbyists through the late 1970s.
The designer of the TV Typewriter, Don Lancaster, developed a low cost video display for the KIM-1. The add-on board would display up to 4000 characters on a TV or monitor. A typical configuration would be 16 lines of 32 upper case only characters. The board had only 10 low cost ICs and used the KIM's memory for the screen storage.
Don expanded this design to do color and simple graphics in The Cheap Video Cookbook.
- CPU: MCS6502
- 2x PIO MCS6530 1024 x 8 ROM, a 64 x 8 RAM, 2x 8-bit bi-directional ports, programmable interval timer
- 8x 6102 static RAM 1024 x 1 (1152 bytes)
- 6x 7-segment LEDs
- 24-key calculator type keypad
- 2x serial ports
- Terminal Interface Monitor (TIM), that handled booting, keypad, seven-segment LEDs, and cassette tape
Each bit is represented by three 2.484 ms long tones. The first is always 3700 Hz, the middle is 3700 Hz for "0" or 2400 Hz for "1", and the last one is always 2400 Hz. This gives an effective bit rate of 134.2 bit/s. Detection is done through a PLL using LM565.
The format of data on the tape is: 100 bytes with the value 0x16 (SYN, Synchronous Idle), one byte with the value 0x2A (*), the record identification number, the start address (two characters for the low byte of address, two characters for the high byte), the end address (in the same format), the actual data, one byte with the value 0x2F ("/" character ), a two-byte checksum, and two bytes with the value 0x04 (EOT, End Of Transmission).
Each byte of memory is stored as two sequential ASCII characters on tape, for example, hexadecimal B5 in memory (181 decimal) would be stored as two sequential ASCII characters "B" and "5" (42 and 35 hexadecimal).
- Butterfield, Jim; Ockers, Stan; Rehnke, Eric (1977). The First Book of KIM. Hayden Book. ISBN 0-8104-5119-0.
- Simpson, Richard (May 1976). "A Date with KIM". BYTE (Byte Publications Inc) 1 (9): 14.
- MCS6500 Microcomputer Family Hardware Manual. MOS Technology Inc. January 1976. p. 71.
- "MOS KIM-1". BYTE (Byte Publications Inc) 1 (8): 15. April 1976.
- "What's New, KIM-o-sabee?". BYTE (Byte Publications Inc) 1 (8): 14. April 1976.
- Lancaster, Don (July 1977). "Build the TVT-6: A Low-Cost Direct Video Display". Popular Electronics (Ziff-Davis Publishing) 12 (1): 47–52.
- Lancaster, Don (1978). The Cheap Video Cookbook. Howard W Sams. ISBN 0-672-21524-1.
- "Users Manual V1.0". 091208 users.telenet.be
|Wikimedia Commons has media related to KIM-1.|
- The KIM-1 exhibit at the virtual computer museum OLD-COMPUTERS.COM
- KIM-1 and collection of old digital and analog computers at oldcomputermuseum.com
- KIM-1 6502 website – erik.vdbroeck's resource site for the KIM-1, with several HTML'ized manuals and books
- Instructions on building your own KIM-1
- KIM-1 Hints/FAQ
- Floodgap Retrobits KIM-1 with archival links and an emulator that runs on the Commodore 64
- Modern KIM-1 clone website
- KIM-1 hobbyist's development: pictures of KIM-1, and of its clone.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a historical description of the KIM-1 computer, which is a factual and educational piece. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0.",
"{\"reason\": \"historical context\", \"score\": 0}\n```\n\nThe provided text discusses the technical specifications and historical context of the KIM-1 computer, which is a historical and educational topic. It does not contain any unsafe or inappropriate content.",
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text provided is purely educational and technical, discussing the storage of memory and providing references to manuals and resources related to the KIM-1 microcomputer. There is no unsafe content, inappropriate language, or themes that would warrant a higher safety score."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "933-0",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "933-1",
"llm_safety_score": 0,
"reason": "historical context"
},
{
"custom_id": "933-2",
"llm_safety_score": 0,
"reason": "educational content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://en.wikipedia.org/wiki/KIM-1",
"date": "2014-03-07T09:04:32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999639602/warc/CC-MAIN-20140305060719-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9264968634,
"token_count": 2372,
"score": 2.703125,
"int_score": 3
}
|
<urn:uuid:0bfadc78-e602-4ae4-a958-60c2a86f89cd>
|
This lesson introduces students to many of the basic properties of matter
including atoms, ions, elements, molecules, and density. The class explores an interactive flash-animated Web site to answer questions and clarify some misconceptions they might have had about matter. In groups, students concentrate on different aspects of the inquiry. Each group also participates in an online experiment in a section called "Do-It-Yourself."
Chemistry, Physical Science
Students will be able to:
Learn that atoms are all around us.
Learn what an atom is.
Learn the differences between atoms, ions, elements, and molecules.
Learn the four states of matter.
Learn what density is and why some things float and others do not
Use of Internet: Students will use the Internet to conduct Web research and to publish
their original work.
This lesson was developed by wNetSchool Master Teacher Betty Paulsell.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a description of a lesson plan for teaching basic properties of matter in a chemistry or physical science class. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for educational environments and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "934-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.thirteen.org/edonline/lessons/matter/index.html",
"date": "2014-03-07T09:00:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999639602/warc/CC-MAIN-20140305060719-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8953181505,
"token_count": 184,
"score": 4.21875,
"int_score": 4
}
|
<urn:uuid:fc657c24-e740-4634-a6e6-d477579b3e1c>
|
Tags: Education, In This Issue, Kids, Parenting
Your Questions of Teachers — Answered
October 01, 2011Parents should send questions and comments to [email protected] or ask them on the columnists' Web site at www.dearteacher.com.
Evaluating a Young Child's Writing Skills
Question: My fourth-grader's writing is very sloppy, and she misspells a lot of words. On top of this, her sentences are only three or four words long. If I ask her to write a sentence, she finds it very difficult to put words together. Is she displaying age-level behavior with her writing skills? —Anxious
Answer: Your daughter's writing skills should be judged on the basis of what is expected of students at the end of third grade. Her handwriting at that time would be considered legible if she has correct spacing between letters in a word and words in a sentence.
As far as spelling goes, by the end of third grade, most schools would expect students to at least spell one-syllable words correctly. She also should be able to correctly spell the words that were on last year's spelling tests.
Your daughter also should be able to capitalize the first word in a sentence and use appropriate end punctuation of simple sentences. She should be able to vary the length of her sentences.
Parents often evaluate the skill level of their children by using adult standards. Talk to your child's teacher to find out if your child's writing meets the school's expectations for her grade level. You also will find it helpful to look at the writing of other students in the class. If your daughter's work is not up to grade level, this is the time to discuss how it can be improved.
Parents who are concerned about their young children's writing skills in preschool through grade 3 can get a good idea of how they are doing by going online to www.readingrockets.org/looking_at_writing and seeing samples of real children's writing at these levels. There are also comments about what each child needs to learn to do next.
Handling Behavior Problems of a Second Grader
Question: Our second-grader has been in school for almost a month now, and he has behavior problems. He is unable to stay in his seat. If he happens to be in his seat, he is always talking. The teacher says he never stops. I am running out of ideas on how to discipline him when he gets home at night. —Tired
Answer: You can discipline him when he gets home, but it is too late to do much good. Do go to his school and observe his behavior, and see if you have any suggestions for the teacher.
This teacher needs to become pro-active. The school's behavior specialist or a mentor should come and observe your son in class. Then a behavior intervention plan can be developed to improve his behavior. If this doesn't work after a few weeks, he may need to be tested to see if there is some underlying reason for his behavior.
Peggy Gisler and Marge Eberts have master's degrees in education and specialist degrees (Ed.S.) in reading. Peggy recently completed her doctorate in special education and educational leadership. Together, they have co-authored more than 70 books and in 2003, Peggy formed the not-for-profit foundation, Literacy Plus, to make literacy accessible to the homeless.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content appropriate for the target audience\", \"score\": 0}\n```\n\nThe text sample provided is entirely focused on educational content related to parenting and children's writing skills. It does not contain any unsafe or inappropriate language, themes, or references. Therefore, it is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "935-0",
"llm_safety_score": 0,
"reason": "educational content appropriate for the target audience"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.indyschild.com/Articles-Columns-i-2011-10-01-255533.112112-Dear-Teacher.html",
"date": "2014-03-08T10:54:59",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654330/warc/CC-MAIN-20140305060734-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9769362807,
"token_count": 710,
"score": 3.046875,
"int_score": 3
}
|
<urn:uuid:76cdbd06-29cc-4376-852d-a0749591bd85>
|
Have you ever looked at an abstract art piece or oil
painting genre scene or pastel seascape and wonder, how'd they do that?! Chances
are the answer lies somewhere in mixed media. Art that tends to defy our eyes
does so for a reason--it isn't conforming to a set of rules based on its
materiality. Instead, artists blend media and materials to produce effects that
aren't by-the-book traditional.
|Phoenix by Chie Fueki, 2003, mixed media on mulberry paper, 60 x 84.
First of all, in mixed media art, colors are often very
bold. You can combine the intense hues of watercolors with pastels, which have
a rich look and feel to them. Or you can create an ink drawing and layer marks
made with oil sticks over top of it. The contrast of the rich black pen strokes
and the slick passages of oil are quite strong.
The surface of a mixed media painting can also be a lot more
interesting because there are a variety of materials and techniques used atop
it. A paintbrush loaded with pigment makes quite a different mark than a drawing made with a fine
graphite pencil or piece of charcoal. Laying down mixed media collage materials
immediately adds interest to a surface, and these inclusions can be as subtle
or as in-your-face as you want to make them.
There are a few guidelines for mixed media art. Oil paints
tend not to play well with others, so they should often be the last medium
applied to a surface. And if you are exploring mixed media artwork, bear in
mind that a plan of action is a good idea so you can
maintain the integrity of the surface. For example, you don't want to pile on
the paint, collage materials, and more on a single flimsy piece of paper. Make
sure you start with a surface that will hold up to all that you want to do to
||Double Pyramid by David Huffman, 2009,
mixed media on canvas, 72 x 60.
In the spirit of mixing media, the editors of American Artist
have created several new
eBooks that have just come available. To be sure the first one that caught my
eye was Create Dynamic Paintings with
. It is just up my alley in terms of scope and the freedom to
play with different media in one work. Enjoy!
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is entirely focused on explaining mixed media art techniques and does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "936-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.artistdaily.com/blogs/artistdaily/archive/2012/06/17/how-did-they-get-it-to-look-like-that.aspx",
"date": "2014-03-09T10:37:00",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999677213/warc/CC-MAIN-20140305060757-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.939689219,
"token_count": 511,
"score": 2.609375,
"int_score": 3
}
|
<urn:uuid:e10ab63e-563f-4bac-977a-da7718192ba0>
|
organized way of using evidence to learn about the natural world; also, the body of knowledge that scientists have built up after years of using this process
scientific law (law of nature)
patterns in data
well-tested and widely accepted hypothesis
general conclusion based on specific observations and measurements
using logic to arrive to a specific conclusion based on a generalization or premise
when the usual and accepted way of doing or thinking about something is changed
Sometimes, preliminary results that capture news headlines are controversial because they have not been widely tested and accepted by peer review. They are not yet considered reliable, and can be thought of as tentative science or frontier science.
consists of data, hypotheses, theories, and laws that are widely accepted by scientists who are considered experts in the field under study.
scientific hypotheses and results that are presented as reliable without having undergone the rigors of peer review, or that have been discarded as a result of peer review, are considered to be unreliable science.
that which has mass and occupies space
compounds that contain at least two carbon atoms combined with atoms of one or more elements
all other compounds besides organic compounds with exception of methan (CHv4)
high quality matter
highly concentrated, typically found near earths surface, and is useful to humans as an important resource (coal, gasoline, aluminum can)
low quality matter
not highly concentration, often found in deep ocean or atmosphere or underground and has little potential for important resource
law of conservation of matter
states that matter is neither created nor destroyed, only changed in form
the capacity to do work or transfer heat
moving energy; contains mass and velocity
ex: wind, flowing water electricity
--> another form is heat
total kinetic energy of all moving atoms, ions, or molecules within a given substance
radiation, conduction, convection
radiation consisting of waves of energy associated with electric and magnetic fields resulting from the acceleration of an electric charge
stored and potentially available for use; ex: rock, battery, unlit match
high quality energy
has capacity to do useful work; high-temp heat
low quality energy
dispersed and can do little work; ocean
law of conservation of energy/first law of thermodynamics
when energy is converted from one form to another in a physical or chemical change, no energy is created or destroyed
second law of thermodynamics
when energy is changed from one form to another, some useful energy is always degraded into lower quality energy (usually heat)
positive feedback loop
Situation in which a change in a certain direction provides information that causes a system to change further in the same direction. ex: vegetation continues to decrease and decrease, polar ice continues to melt
negative feedback loop
an opposite action to what is occurring in the body to regain homeostasis, ex. if body temperature rises too high, body tries to lower it
Complex systems often show time delays between the input of a feedback stimulus and the response to it.
the time at which a change or an effect cannot be stopped, time delays can also allow an environmental problem to build slowly until it reaches a threshold level, or tipping point, causing a fundamental shift in the behavior of a system.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content, no unsafe elements\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "938-0",
"llm_safety_score": 0,
"reason": "educational content, no unsafe elements"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://quizlet.com/6877439/apes-ch-2-flash-cards/",
"date": "2014-03-10T09:22:26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010722348/warc/CC-MAIN-20140305091202-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9292870164,
"token_count": 660,
"score": 3.296875,
"int_score": 3
}
|
<urn:uuid:44ce9c38-9e5b-42f4-a3f1-f8d4075242e0>
|
Goathland as a Contrasting Locality
Route of the old railway
The route of the old railway cuts right through the village. It can be seen (as a muddy track only) coming out opposite Scripps Garage, where it crossed over and continued past the garage building. The house on the other side of the old track (just past the garage) is thought to be either the crossing keeper's house or the waiting room.
The course of the old railway is next to be seen a bit further round, past the car park and toilets. There is a wooden sign saying 'Footpath Grosmont Rail Trail' and the path sets off down the slope. A bit further on the slope becomes much steeper. This was where the incline once was. The coaches were originally hauled up by attaching them to ropes with huge containers of water on, which weighed more than the carriages. The water containers sank down the slope with their weight, thus pulling the carriages up. Eventually this method was replaced by a steam hauled system using wire instead of rope.
In February 1864, the last passenger coach of the day careered down the incline out of control all the way to Beck Hole! Two passengers were killed and thirteen were injured. A year later the new deviation line and Goathland Mill Station was opened.
Some of the houses at the top of the incline were once railway buildings.
Below is the set of three worksheets which cover the entire walk round Goathland Village. Also included are the I-Spy activity sheet and a simple map for children to add to as they locate relevant features.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text describes historical and geographical information about Goathland village and its old railway. There are no unsafe elements, inappropriate language, or harmful themes present."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "939-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.mylearning.org/goathland-as-a-contrasting-locality/p-1661/",
"date": "2014-03-10T09:15:57",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010722348/warc/CC-MAIN-20140305091202-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9778322577,
"token_count": 334,
"score": 2.65625,
"int_score": 3
}
|
<urn:uuid:a9f2e1f2-3efb-4c23-af3d-3d766c01f9f0>
|
There are 3 stages to getting started with Ruby:
I've pulled together some great resources here, but that's all they are: resources. They exist to let you know what you need to practice. No amount of reading or video-watching will get the knowledge into your fingers where it needs to be for you to create stuff using Ruby.
Several of the resources force you to do the stuff they're trying to teach you before they let you go on, and this is the greatest invention in the history of teaching.
So I'll warn you right now: if all you do is read, you haven't learned a thing. Until you can do it, without referring back to the book or your notes or whatever, you haven't learned a thing.
Learning to program is like giving yourself superpowers. So when you learn to fly, go fly for crying out loud!
This used to be a trauma, but the good folks at Engine Yard have a terrific solution called Rails Installer, that installs a variety of tools any Ruby developer needs, on Mac OS X and Windows. Not sure the status for Linux environments, but they’re similar enough to OS X that that installer may work for you.
I advise learning the basics of Ruby (the language) before you dive into Rails (the dominant web application framework), so you don’t get trapped in “cut and paste” development, basing all your projects on bits you’ve found on the Net.
Try Ruby walks you through a 15-minute tutorial that gives you a good taste of what Ruby is like. It’s a small bite for the curious and people who want to “try before I buy” (and run through the Rails Installer process).
Chris Pine has an excellent book called Learn to Program that uses Ruby as the platform to teach basic programming skills. The book itself is published by the Pragmatic Programmers, but his original tutorial is available for free on the site, though he emphasizes that the site is “unchanged since 2004” so I highly-recommend purchasing the actual book.
Learning a second (or tenth) programming language is like learning a second human language: you want to know “how do you say that in Ruby?” so you can do the things you’re used to doing in your old language. Ruby has a number of “ruby idioms” that will take your programming to a new level (read up on Enumerable for a sample), so make sure you don’t just learn some basic syntax and assume you’ve learned Ruby.
A good way to dig into the guts of Ruby and gain some testing skills (very big in the Ruby community) at the same time is the Ruby Koans Project. You make the tests pass by fixing the intentionally-incorrect ruby code embedded in the project. Very enlightening and fun to follow.
Many people come to Ruby via Rails, so they get the mistaken impression that Ruby is just “the language that lives under Rails”, which is missing much of the power and potential of the language. Ruby != Rails
Having said that, once you’ve got your feet under you with the language, you’ll probably want to find out about Rails, which is indisputably the “big dog” in the web application space.
Another popular web app solution for Ruby is Sinatra, which takes a much more stripped-down approach. Definitely worth investigating.
Testing (especially “Test-Driven Development”) is a requirement in the Ruby community, and the place to start is RSpec. Even though RubyKoans (mentioned above) is based on Test::Unit (aka, MiniTest), RSpec is definitely the most-popular test suite for Ruby and Rails.
GitHub, which you will have run into during the Rails Installer process is the place to go for ruby code. All the source for essentially every gem (ruby library) in existence is on here somewhere, so when you start wondering how to use that great new gem or why it does something a certain way, look it up on GitHub. No self-respecting rubyist would be caught without a GitHub account. Mine is here. Reading other people’s code without having them there to explain it to you is a great way to learn new tricks and ways to think about programming. Pretend you’re a detective and the code hides your clues: follow your leads until you figure out “whodunit”. :-)
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThe text is purely educational and provides guidance on learning Ruby programming. It does not contain any unsafe or inappropriate content, profanity, or references to illegal activities."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "940-0",
"llm_safety_score": 0,
"reason": "educational content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://billgathen.com/get_started_with_ruby.html",
"date": "2014-03-11T08:02:19",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011155657/warc/CC-MAIN-20140305091915-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9470630884,
"token_count": 941,
"score": 2.5625,
"int_score": 3
}
|
<urn:uuid:59987d18-9c4f-41f9-a196-e2154c1a1a24>
|
Methane is a greenhouse gas present in the atmospheres of both Earth and Mars. If a class of ancient microbes called Archaea are the source of Mars' methane, as some scientists have proposed, then unmanned probes to the Martian surface should look for them at depths where the temperature is about 10 degrees Celsius (18 degrees Fahrenheit) warmer than that found at the base of the Greenland ice sheet, according to UC Berkeley lead researcher P. Buford Price, a professor of physics.
This would be several hundred meters - some 1,000 feet - underground, where the temperature is slightly warmer than freezing and such microbes should average about one every cubic centimeter, or about 16 per cubic inch.
While Price is not expecting any time soon a mission to Mars to drill several hundred meters beneath the surface, methanogens (methane-generating Archaea) could just as easily be detected around meteor craters where rock has been thrown up from deep underground.
"Detecting this concentration of microbes is within the ability of state-of-the-art instruments, if they could be flown to Mars and if the lander could drop down at a place where Mars orbiters have found the methane concentration highest," Price said. "There are oodles of craters on Mars from meteorites and small asteroids colliding with Mars and churning up material from a suitable depth, so if you looked around the rim of a crater and scooped up some dirt, you might find them if you land where the methane oozing out of the interior is highest."
Price and his colleagues published their findings last week in the Early Online edition of the journal Proceedings of the National Academy of Sciences, and presented their results at last week's meeting of the American Geophysica
Source:University of California - Berkeley
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses scientific research and does not contain any unsafe, inappropriate, or harmful content. It is suitable for educational and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "941-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.bio-medicine.org/biology-news/Microbes-under-Greenland-Ice-may-be-preview-of-what-scientists-find-under-Mars-surface-2050-1/",
"date": "2014-03-11T08:09:37",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011155657/warc/CC-MAIN-20140305091915-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9458854795,
"token_count": 366,
"score": 4.03125,
"int_score": 4
}
|
<urn:uuid:e0b1fe99-c03f-49ee-b236-f7aaf6dae61e>
|
Floating Ping Pong Ball
You've seen Steve Spangler use blow dryers or industrial-sized blowers to levitate ping pong balls, beach balls, and send toilet paper flying through the air. You can replicate this levitating object phenomenon on a smaller scale using objects that are right in your home! The Floating Ping Pong Ball trick uses amazing principles of air that are sure to amaze anyone, from your science teacher to your parents to your neighbors!
- 1-liter bottle with cap
- Bendy straw
- Ping pong ball
- Large nail
- Scotch tape
- Box cutter or similar tool
- Near the top of a 1-liter bottle, approximately where the bottle stops curving and begins to straighten out, wrap a piece of tape. Try to wrap the tape as straight as possible.
- Using the tape as a guide, cut the top of the bottle off with the box cutters. Again, try to make your cut as straight as possible.
- *When performing this next step, make sure to find a work bench or similar surface.*
- Place the bottle cap, open side down, onto the work bench.
- Center a large nail on the top of the bottle cap and use a hammer to punch a hole in the cap.
- Pull the nail out of the bottle cap and you should have a nice, round hole.
- Test the bottle cap to see if a bendy straw will fit in the hole you've created. If it does, you're good to go. If the hole is too small, find a larger nail and widen the hole. If the hole is too large, you'll need to find another cap and use a smaller nail.
- Once you have the perfect bottle cap and hole, screw the cap onto the top of the bottle and place the short end of the bendy straw through the hole.
- You're ready to give the Floating Ping Pong Ball a try! Start blowing into the the straw (the end opposite the bottle) and place the ping pong ball over the stream of air.
- Much to the surprise of anyone watching (and probably you), the ping pong ball hovers in midair over the bottle. Wow!
Take It Further!
Are there any other objects that you can make float using the apparatus that you've created?
How Does It Work?
The Floating Ping Pong Ball is a wonderful example of Bernoulli's Principle, the same principle that allows heavier-than-air objects, like airplanes, to fly.
Bernoulli, an 18th century Swiss mathematician, discovered something quite unusual about moving air. He found that the faster air flows over the surface of something, the less the air pushes on that surface. That means that the air pressure on the object is lower than average.
The air from the straw, as you blow through it, produces the levitating ball phenomenon using Bernoulli's Principle. The fast air moving around the sides of the ball is at a lower pressure than the surrounding, stationary air. If you look closely, you'll see that the ball wobbles while it is levitating in midair. The ball is attempting to leave the area of low pressure, but the higher air pressure surrounding it forces it back into the low pressure area.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content with no unsafe elements\", \"score\": 0}\n```\n\nThe provided text is an educational science demonstration that involves simple household items and explains the scientific principle behind the experiment. There are no unsafe elements, inappropriate language, or harmful themes."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "942-0",
"llm_safety_score": 0,
"reason": "educational content with no unsafe elements"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.stevespanglerscience.com/lab/experiments/floating-ping-pong-ball",
"date": "2014-03-11T08:02:26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011155657/warc/CC-MAIN-20140305091915-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9185365438,
"token_count": 681,
"score": 2.59375,
"int_score": 3
}
|
<urn:uuid:102bd9f2-3544-4b44-9d73-6d6eeb44eca8>
|
- example is part of the Basic English 850.
- If I give an example of something, I name one of that type of thing.
- A baseball, a softball, a football, and a soccer ball are examples of balls.
- An example is a model of what something else of the same type should be like.
- Look at the example of a model airplane to see how your model airplane should be built.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational content\", \"score\": 0}\n```\n\nThis text is part of educational content that explains the concept of examples in a clear and respectful manner, suitable for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "943-0",
"llm_safety_score": 0,
"reason": "educational content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://simple.wiktionary.org/wiki/example",
"date": "2014-03-12T06:46:07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021429299/warc/CC-MAIN-20140305121029-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8801559806,
"token_count": 89,
"score": 3.546875,
"int_score": 4
}
|
<urn:uuid:e40dcd17-cd91-4d0d-a6f6-bc7132f36b68>
|
NPS A. Buccanero
Capulin Volcano blanketed 15.7 square miles with its lava flows, but it was not the only volcano to transform the New Mexico landscape. Capulin lies within the 8,000 square mile Raton-Clayton Volcanic Field (RCVF). Along with Capulin, there are many volcanic features including multiple cinder cones, domes, tuff rings, and the immense andesite-shield volcano, Sierra Grande.
Volcanic fields are regions of volcanic activity that tap one magma source. Eruptions in the RCVF began approximately 9 million years ago, with Capulin's eruption taking place between 56,000 and 62,000 years ago. Potential still exists for future eruptions from dormant volcanoes in the field today. Capulin Volcano, like many cinder cones, had only one eruptive period and is now considered extinct.
Volcanic fields stretch across New Mexico, yet their cause is not completely understood. Most volcanic activity in the world occurs at plate boundaries below the earth's surface, along the Pacific Ring of Fire for example, or over hot spots like the Hawaiian Islands. Located on the interior of the North American plate, far from any plate boundaries, the explanation for volcanic activity in New Mexico becomes more complex.
One possible reason for the volcanic fields of New Mexico is continental rift, the pulling apart of a single plate below the earth's crust. The Rio Grande Rift is an elongated valley of rifting that extends in a north-south direction from Colorado to central Mexico. Crossing the Rio Grande Rift is the Jemez Lineament, a northeast-running line of volcanic features, which could act as an outlet for rising magma as the Rio Grande Rift stretches the plate below apart.
Did You Know?
Capulin Volcano is approximately 4 miles in circumference at the base with a crater diameter of 1450 feet and an elevation of 8182 feet at the highest point.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely educational and informative, discussing the geological history and features of Capulin Volcano and the Raton-Clayton Volcanic Field. It contains no unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "944-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.nps.gov/cavo/naturescience/volcanic-fields.htm",
"date": "2014-03-12T06:53:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021429299/warc/CC-MAIN-20140305121029-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9291253686,
"token_count": 400,
"score": 4.25,
"int_score": 4
}
|
<urn:uuid:72fe401d-2d38-4fc7-8230-096037365abd>
|
How waving morphed into talking
A study of how baboons gesture with their hands suggests gesturing may have been a precursor to human language, scientists say.
The findings could help to explain why humans often gesture with their hands, and particularly the right hand, when they speak.
The right hand is controlled by the brain's left hemisphere, which is the source of most linguistic functions.
Scientists believe communication by hand probably existed in apes 30 million years ago and was a forerunner to spoken and written language.
French researchers Adrien Meguerditchian and Professor Jacques Vauclair studied a particular hand gesture in 60 captive baboons.
The gesture consists of quick and repetitive rubbing or slapping of the hand on the ground, and is used to threaten or intimidate others.
The researchers, from the University of Provence, say this motion "might be comparable in humans to the slap of ... one hand toward the palm of the other hand".
For the study, which is published in the journal Behavioural Brain Research, the researchers observed this gesture as it occurred naturally.
They also triggered it by having a human abruptly shake his head and then glance at a baboon. Head shaking is another threatening move in the ape and monkey world, which includes all sorts of communicative gestures.
"A nonhuman primate can effectively raise an arm to ask a social partner to groom it ... give another a little slap as an invitation to play, touch furtively the hand or genitals of another to greet it, slap the ground to threaten," the researchers say.
Right hand, left hand
Among the baboons in the test group that favoured a certain hand, 78% were right-handed and tended to gesture with this hand. Other studies have shown that most human babies and deaf individuals also communicate with their right hands.
"There is little chance that our [primate] cousins will evolve language skills in the near future," the researchers say.
"Monkeys and apes and their specific communication systems result from other evolutionary roads than those of humans ... It is very unlikely that the natural selection for primate species will reproduce exactly the same phylogenetic path that gave linguistic skills to humans."
William Hopkins, a US psychology professor at Berry College and an expert on the evolution of brain development in primates, says:
"I agree with the findings and think this is a very good and interesting paper. In many ways the results are nearly identical to those we have previously found in chimpanzees."
He explains that both chimps and baboons seem to use right-hand gestures for communication. This suggests the brain is asymmetrical when it comes to language, meaning that the left hemisphere tends to dominate.
"It will be interesting to see whether the asymmetries in hand use seen in the baboon link at all to brain asymmetries as we have found in the chimpanzees," Hopkins adds.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample discusses scientific research on baboon gestures and their potential connection to the evolution of human language. It does not contain any unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "945-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.abc.net.au/science/articles/2006/07/13/1685703.htm?site=science&topic=latest",
"date": "2014-03-14T13:58:10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678693350/warc/CC-MAIN-20140313024453-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9516091943,
"token_count": 588,
"score": 3.375,
"int_score": 3
}
|
<urn:uuid:e8f404c2-d265-4037-b299-addef5cbb5a2>
|
A.S. Byatt’s latest novel has a lot in common with her previous ones; it’s an intricately detailed work of historical fiction that follows a group of families through several generations. This one centers on a group of artists and writers, following them from the Victorian era through to World War One. The characters, I thought, were the best part of the book. They’re realistic and vivid, and even though there are a lot of them, it’s not that hard to keep track of them. Wanting to know what they would do kept me going through occasionally tedious descriptions of artwork, buildings, and landscapes. The characters also play out some really interesting ideas of the time, like the ways progressiveness and “free thinking” sometimes lead to real change, and sometimes just to a circle of people in a room, talking in circles. It’s a good book to read in long stretches, which makes it ideal for summer.
-review by Liz Galoozis, Reference Librarian/Coordinator of User Education
Check It Out
Check our catalog to see if this book is available.
To learn more about the Arts & Crafts movement of the late 19th century depicted in the book, check out this exhibit catalog from the library’s collection, or an interactive guide from the Victoria & Albert Museum, which is also featured prominently as a location in The Children’s Book.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text is a book review that discusses a historical fiction novel. It contains no unsafe, inappropriate, or offensive content. The language is respectful, and the themes are appropriate for all audiences. Therefore, it is fully safe for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "946-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://blogs.bentley.edu/bookbuzz/2010/07/19/the-childrens-book-by-a-s-byatt/",
"date": "2014-03-07T12:08:33",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642307/warc/CC-MAIN-20140305060722-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9681491852,
"token_count": 299,
"score": 2.6875,
"int_score": 3
}
|
<urn:uuid:2bfd4008-11e4-4025-8de9-d8262e36782b>
|
Bering Strait, Russian Proliv Beringa, Dave Cohoestrait linking the Arctic Ocean with the Bering Sea and separating the continents of Asia and North America at their closest point. The strait averages 98 to 164 feet (30 to 50 metres) in depth and at its narrowest is about 53 miles (85 km) wide. There are numerous islands in the strait, including the two Diomede Islands (about 6 square miles [16 square km]), and to the south of the strait lies St. Lawrence Island (about 1,000 square miles [2,600 square km]). The U.S.–Russian boundary extends through the strait.
Some of the Bering Sea water passes through the strait into the Arctic Ocean, but most of it returns to the Pacific. In winter the region is subject to severe storms and the sea is covered by ice fields averaging 4 to 5 feet (1.2 to 1.5 metres) thick. In midsummer drift ice remains in the Bering Strait. The strait is named after Vitus Bering, a Danish captain, who sailed into the strait in 1728. During the Ice Age the sea level fell by several hundred feet, making the strait into a land bridge between Asia and North America, over which a considerable migration of plants and animals, as well as humans (about 20,000 to 35,000 years ago), occurred.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a factual description of the Bering Strait and its geographical features. It contains no unsafe, inappropriate, or harmful content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "947-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.britannica.com/print/topic/61952",
"date": "2014-03-07T12:13:37",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642307/warc/CC-MAIN-20140305060722-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9319414496,
"token_count": 289,
"score": 3.6875,
"int_score": 4
}
|
<urn:uuid:7f5e3697-9aa5-4988-83c8-0ea58cd37273>
|
Resistances of a Packaged Die
device is vulnerable to thermally-accelerated failure mechanisms in both
the electrical and mechanical realms. As such,
is an important
aspect of all facets of semiconductor engineering. For instance, circuit
designers try to minimize the power consumption of the device and
distribute the heat more evenly over the die, while assembly engineers try
to design their packages to be more efficient in dissipating the heat
generated by the device.
thermal modeling of complex products is usually performed through
finite element analysis.
However, there is a simple heat-transfer model for semiconductor devices
that is still widely used today. In this model, heat is transferred from
the die to the surface of the package through thermal conduction, and from
the package to its surroundings by convection and radiation.
The rate of
heat transfer between two bodies may quantified in terms of the
between them. In the simple model mentioned above, the over-all
thermal resistance between the die and the surroundings of the device,
('ja' stands for 'junction-to-ambient')
is the sum of two thermal resistances: 1) the thermal resistance between
the die and the package,
('jc' stands for 'junction-to-case'); and 2) the thermal resistance
between the package and the surroundings,
('ca' stands for 'case-to-ambient').
Below are the
equations relating these thermal resistances.
junction-to-ambient (or die-to-ambient) thermal resistance;
junction-to-case (or die-to-package) thermal resistance;
case-to-ambient (or package-to-ambient) thermal resistance;
average junction or die temperature;
the average case or package temperature;
ambient temperature; and
power dissipated by the device (in watts).
Copyright © 2005
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text is a technical discussion about thermal resistance in semiconductor devices. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "948-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.siliconfareast.com/theta.htm",
"date": "2014-03-07T12:08:43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642307/warc/CC-MAIN-20140305060722-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8334811926,
"token_count": 408,
"score": 3.578125,
"int_score": 4
}
|
<urn:uuid:313681b6-8309-4cd0-a288-889fcc615e12>
|
Demonstrating an Interactive Lecture Using Notes with Gaps
Keeping the students in a computer science class, or any class, involved throughout the course of a lecture is a difficult challenge. I have found a method particularly useful in which I hand out notes to my students before the beginning of class. The notes have gaps in them that are filled in during the lecture with material that I provide or that I elicit from my students. I am currently testing this method in the classroom to see whether students do indeed learn more when taught using this method than when taught using other methods of lecturing, and whether they maintain their interest more when taught using this method than when taught using other methods of lecturing.
I use the gaps to elicit answers from students about information covered previously in the course so as to serve as an instant review, or to encourage students to get a quick understanding of some new points, to carry out a quick calculation, or to think about solutions of more difficult problems.
I will demonstrate my method during this presentation, pointing out how differences in subject matter and audience call for differences in approach.
Keywords: Interactive Lecture, Notes With Gaps, Guided Notes
Dr. Tom M. Warms
Assistant Professor, Computer Science and Engineering
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text sample discusses an educational method for teaching computer science and does not contain any unsafe, inappropriate, or harmful content. It is suitable for all audiences and does not include any language, themes, or references that would be considered unsafe or offensive."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "949-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://l09.cgpublisher.com/proposals/757/index_html",
"date": "2014-03-08T13:44:24",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654667/warc/CC-MAIN-20140305060734-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9450452924,
"token_count": 254,
"score": 2.96875,
"int_score": 3
}
|
<urn:uuid:f0f58382-2354-46de-a20a-cc3a8d33fe58>
|
Born in Utrecht in 1888, the Dutch designer, architect and painter Gerrit Rietveld spent his entire life in the city of his birth. The son of a carpenter, Gerrit Rietveld was employed in his father's workshop until he was fifteen. Until 1913 Gerrit Rietveld was employed as a draftsman in the workshop of the goldsmith C.J.A. Begeer. From 1906, Gerrit Rietveld also attended evening courses, where he learned technical draftsmanship from the architect P.J.C. Klaarhamer.
In 1911-12 Gerrit Rietveld was a member of the group of artists known as Kunstliefde, with whom he also showed work. In 1917 Gerrit Rietveld established a furniture workshop in Utrecht. By 1919, however, Gerrit Rietveld had joined Theo van Doesburg, Piet Mondrian, and other artists to found "De Stijl"; Rietveld would become one of the most important and influential artists in that celebrated group. The "De Stijl" artists formulated a language of forms that was intended to attain the greatest objectivity and autonomy in a work of art; their works are stringently non-representational, radically reduced to a geometric arrangement of horizontals and verticals and a palette consisting of the primary colors red, yellow, and blue with the addition of black and white. De Stijl applied these principles to both two-dimensional and three-dimensional work, such as furnishings and architecture.
In 1919 Gerrit Rietveld designed the prototype of his famous "Red and Blue" chair, which, however, was not given the striking lacquering that is so typical of De Stijl until 1923. The "Red and Blue" chair consists of straight boards and battens; the seat is lacquered blue and the back red. The cut surfaces of the frame battens are yellow; the battens themselves black. Gerrit Rietveld himself seems to have viewed his chair as a work of art since he called it a "spatial creation", designating a sculpture in space, rather than a piece of furniture. The "Red and Blue" chair was shown in the journal "De Stijl" and was also exhibited in a show mounted by the Bauhaus, where it made quite an impact.
In 1924-25 Gerrit Rietveld designed the "Schröder House" for Truus Schröder in Utrecht, a building that would become the architectural manifesto of the De Stijl movement. The colors, the division and arrangement of surfaces on the two floors of this private house faithfully follow the De Stijl principles.
Between 1932 and 1934, Gerrit Rietveld designed the "Zig-Zag" chair, which consists in four simple boards fitted together at oblique angles. In 1922, in connection with the practice he was designing for Dr. Hartog in Maarssen, Gerrit Rietveld designed a tubular ceiling lamp of white soffits arranged at right angles with black cubes at the ends for fastening the straight wires on which it was suspended from the ceiling.
In 1928 Gerret Rietveld became a member of the Congrès International d'Architecture Moderne (CIAM). As an architect plant, Gerrit Rietveld designed many buildings and interiors. His biggest project, however, the Van Gogh Museum in Amsterdam, was not completed until nine years after he died in 1964.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"historical and artistic content\", \"score\": 0}\n```\n\nThe text provided is a detailed historical and artistic biography of Gerrit Rietveld, a Dutch designer, architect, and painter. It contains no unsafe, inappropriate, or offensive content. The language is respectful and the themes are entirely suitable for all audiences, including educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "950-0",
"llm_safety_score": 0,
"reason": "historical and artistic content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.gerrit-thomas-rietveld.com/",
"date": "2014-03-08T13:44:26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654667/warc/CC-MAIN-20140305060734-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9728181362,
"token_count": 743,
"score": 2.625,
"int_score": 3
}
|
<urn:uuid:60098ae1-3d89-48cd-b889-0b6edc4714bc>
|
In nature, it is quite rare to encounter octopi with extra tentacles (or “arms,” for the purists), but a pair of aquariums in Japan’s Mie prefecture have some extraordinary specimens on hand.
The permanent display at the Shima Marineland Aquarium in the town of Shima includes a 96-tentacled Common Octopus (Octopus vulgaris) that weighed 3.3 kilograms (about 7 lbs) and measured 90 centimeters (3 ft) long when it was captured in nearby Matoya Bay in December 1998. Before dying 5 months later, the creature laid eggs, making it the first known extra-tentacled octopus to do so in captivity. All the baby octopi hatched with the normal number of tentacles, but unfortunately they only survived a month.
The preserved octopus actually has the normal number of 8 appendages attached to its body, but each one branches out to form the multitude of extra tentacles. Apparently there is no theory that fully explains the surplus tentacles, but they are believed to be the result of abnormal regeneration that occurred after the octopus suffered some sort of injury. ... - see the full article pinktentacle for another pic and more.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text discusses a rare occurrence in nature regarding an octopus with extra tentacles. It is educational and does not contain any inappropriate language, harmful themes, or unsafe content."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "951-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://xeno-lovegood.blogspot.com/2008/07/monster-octopi-with-scores-of-extra.html",
"date": "2014-03-08T13:44:13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654667/warc/CC-MAIN-20140305060734-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9315704107,
"token_count": 253,
"score": 3.09375,
"int_score": 3
}
|
<urn:uuid:115ec5ed-e517-4c15-8ce5-171b4fcf074e>
|
tags: Care for Some Crude With Your Sushi?, toro sushi, maguro sushi, Atlantic Bluefin Tuna, Thunnus thynnus, Gulf of Mexico, pollution, oil spill, Deepwater Horizon, BP, British Petroleum, overfishing, endangered species, conservation, marine biology, streaming video
The Gulf of Mexico oil spill is the worst environmental disaster the US has faced. Toxic oil from the Deepwater Horizon well threatens the region’s sensitive shorelines and the nesting birds along the Louisiana coast. But there’s another species at serious risk: the Atlantic bluefin tuna, Thunnus thynnus. This disturbing video tells you more about their plight, and how this oil spill could be the last straw that pushes them over the edge …
This special marine podcast takes the form of an urgent warning about the future of the species. The spawning habitat of the bluefin tuna overlaps with the oil-spill zone and the disaster comes right at the peak of spawning season. The larvae might not withstand the toxic effects of the spilled oil.
The bluefin tuna is already living dangerously close to the edge thanks to overfishing and climate change. The Deepwater Horizon catastrophe could wipe out the region’s bluefin populations forever.
You can help save the bluefin tuna by joining the campaign to create more Marine Protected Areas.
HT: Deep Sea News.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content about environmental issues\", \"score\": 0}\n```\n\nThe text is educational and informative, focusing on environmental issues such as the Gulf of Mexico oil spill and its impact on the Atlantic bluefin tuna. It does not contain any unsafe or inappropriate content, and the language is respectful and appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "952-0",
"llm_safety_score": 0,
"reason": "educational and informative content about environmental issues"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://scienceblogs.com/grrlscientist/2010/06/08/care-for-some-crude-with-your/",
"date": "2014-03-09T13:21:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999678747/warc/CC-MAIN-20140305060758-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8798719645,
"token_count": 290,
"score": 3.078125,
"int_score": 3
}
|
<urn:uuid:b2be0d1f-da3c-4a87-897e-7857f132f1e0>
|
Visit Recycle Indiana to learn why and where to recycle in our state.
Reusing + Recycling = Less Waste. And that's a good thing. The amount of solid waste produced by Americans is staggering. According to the U.S. Environmental Protection Agency, residents, businesses and institutions produced more than 245 million tons of trash in 2005. That is approximately 4.5 pounds of waste per person per day.
Recycling and reusing products are two simple, yet highly effective ways, to reduce the waste filling our landfills. And saving space in our landfills is just a small benefit of waste reduction activities. Recycling and reusing materials helps the economy, the community and the environment as well.
Indiana and Recycling
According to Indiana's 2001 Recycling Economic Information report, our state is reducing waste while adding significantly to our economy. According to its findings on Indiana's recycling/reusing industry:
- There are over 1,700 recycling & reuse establishments across Indiana.
- Employees in the recycling industry earned about $3 billion total.
- Almost $19 billion in revenues are made each year due to recycling.
- Recycling and reuse centers employ more than 75,000 workers.
- The recycling industry contributes $285 million in annual government tax revenues.
Recycling not only boosts the economy but also benefits the environment. Recycling prevents the emission of many greenhouse gases and water pollutants, saves energy and supplies valuable raw materials to industry. That is why Indiana is encouraging its citizens to recycle and reuse items as much as they can.
What is Recycling? How does it Work?
The EPA describes recycling as a closed-loop cycle with a three part process:
Collection and Processing - Communities collect recyclables in a number of ways. Regardless of the collection method, the recyclables are sorted and prepared into raw materials for manufacturing at a materials recovery facility. Here they are bought and sold with prices fluctuating with the market.
Manufacturing - Once purchased, the recycled materials are manufactured into new products with total or partial recycled content. Almost every household may find an item that contains recycled materials such as paper towels, drink containers and steel cans. Recovered materials are also responsible for some of the more innovative products made today. For example, recycled glass is made into roadway asphalt and sand.
Purchasing Recycled Products - Purchasing recycled products closes the recycling loop. By buying recycled materials, we play a major role in keeping recycling an important industry in our society. When consumers purchase products made from recycled materials, it creates a demand that manufacturers will want to continue to meet.
Close the Loop: Buy Recycled
The best way to support recycling programs is not just by recycling but buying products made with recycled materials. Look for these labels when looking for recycled products.
"Pre-consumer materials" - Scrap, trimmings and other by-products from manufacturing plants that were never used by consumers.
"Post-consumer materials" - Comes from products that were bought by consumers, used and then recycled.
"Recycled content" - Materials that have been recovered from going into the trash; a percentage of how much recycled content is used should be found on the label or container.
"Recyclable" - Products that can be recycled after use; doesn't necessarily contain recycled materials.
The EPA's Comprehensive Procurement Guidelines program promotes the use of recycled materials. While these particular guidelines are for federal, state and local agencies funded by the federal government, the information helps all individuals interested in knowing which suppliers offer recovered material-made products.
Reuse, Reuse, Reuse
Recycling is great but reusing is even better! It's not that hard to believe considering reusing products takes no energy, skill or resources to process an old product and create a new one. Besides, there are products and materials that may not be recyclable, so finding another way to use the product is your best option.
Visit Reduce Reuse Recycle for more ideas on how to reuse everyday items that are typically pitched or recycled. Or check out sites such as FreeCycle, ReUseIt and Craigslist to connect with those interested in giving their unwanted items to those who can actually use it.
Did You Know?
- Recycling a single aluminum pop-can can save enough energy to power a television for three hours.
- Recycling a three foot high stack of newspaper saves one tree.
- Water pollution related to glass production can be cut by half when using recycled materials.
- Five plastic soda bottles will yield enough fiber to make an extra-large t-shirt.
- In 2006, Americans drank about 167 bottles of water each, but only recycled an average of 38 bottles per person, which equals about 50 billion plastic bottles consumed, with only 23% being recycled. That leaves 38 billion water bottles in landfills - which take 700 years before they start to decompose!
- In 2006, the amount of paper recovered for recycling averaged 357 pounds for each man, woman, and child in the United States.
- More than 37 percent of the fiber used to make new paper products in the United States comes from recycled sources.
- A used aluminum can is recycled and back on the grocery shelf as a new can, in about 60 days.
- Last year 54 billion cans were recycled saving energy equivalent to 15 million barrels of crude oil - America’s entire gas consumption for one day.
- Glass containers go from recycling bin to store shelf in as little as 30 days.
- An estimated 80% of recovered glass containers are made into new glass bottles.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content with no unsafe elements\", \"score\": 0}\n```",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe provided text contains factual information about recycling and the environmental benefits of recycling paper and aluminum cans. There is no unsafe, inappropriate, or harmful content in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "953-0",
"llm_safety_score": 0,
"reason": "educational and informative content with no unsafe elements"
},
{
"custom_id": "953-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.nature.org/ourinitiatives/regions/northamerica/unitedstates/indiana/journeywithnature/recycle-reuse-and-repeat.xml",
"date": "2014-03-09T13:21:27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999678747/warc/CC-MAIN-20140305060758-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9444752932,
"token_count": 1169,
"score": 3.546875,
"int_score": 4
}
|
<urn:uuid:b0f1e7e7-24be-4fe8-afa9-96002303eba2>
|
Play, Creativity, and Problem Solving
Because children's play is spontaneous and freely chosen, it is often quite imaginative. Indeed, it is sometimes described as creative. But what do we mean when we speak of creativity, and how might children demonstrate creativity in their play? Is all play creative? Are some ways of playing more creative than others, and if a child is encouraged to play creatively, will he or she demonstrate heightened creativity in other areas of life as well?
Creativity is actually not a simple concept, but is somewhat complex in that it contains three related elements. First, it is a personality characteristic, an attitude toward oneself and the world that is characterized by mental flexibility, spontaneity, curiosity, and persistence. Children judged to be very creative display evidence of persistence, high energy levels, self-confidence, independence of judgment, flexibility, openness to new experiences, tolerance of ambiguity, and a good sense of humor. In addition, they seem to be aware of and accepting of their own feelings, and playfully curious about the world (Barron & Harrington, 1981; Janos & Robinson, 1985).
Creativity is also an intellectual process, a way of thinking, an approach to solving problems. Psychologists have always had trouble determining which intellectual skills are necessary for creativity, although most would agree that these include a tendency to form unusual associations, to relax conscious thought to gain access to more "primitive" modes of cognition, to use analogies and metaphors in reasoning, to form rich visual images, and to ask original questions (Barron & Harrington, 1981). An aspect of the creative process that has been studied frequently in research on the play of preschool children is the ability to engage in what are called convergent and divergent problem solving. We shall explore these concepts in the following section of this chapter.
Finally, creativity results in a creative product, which is an original contribution to the appreciation, understanding, or improvement of the human condition (Weisberg, 1993). This is a lot to expect for a preschool child playing with paints or clay, and so it may be more correct to say that children have the potential for turning out creative products than to say that they actually do. In other words, the creativity of young children is more likely to be reflected in the processes of their thinking, and particularly in their approaches to problem solving, than in products they bring home from nursery school.
Within the past 20 years, there has been a considerable amount of research, conducted mostly on preschool children, on the relationship between play and problem solving. More specifically, researchers have looked at the impact of either object play or fantasy play on children's ability to solve either single-solution or multiple-solution problems. The typical research design has been to (1) allow children to engage in free play with materials that they would later use to solve single-solution problems or (2) examine the relationship between make-believe play and children's ability to deal with multiple-solution problems (Rubin, Fein, & Vandenberg, 1983).
© ______ 1999, Merrill, an imprint of Pearson Education Inc. Used by permission. All rights reserved. The reproduction, duplication, or distribution of this material by any means including but not limited to email and blogs is strictly prohibited without the explicit permission of the publisher.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content identified\", \"score\": 0}\n```\n\nThe text provided is entirely focused on the benefits and aspects of creativity and problem-solving in children's play. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "954-0",
"llm_safety_score": 0,
"reason": "No unsafe content identified"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.education.com/reference/article/play-creativity-problem-solving/",
"date": "2014-03-10T12:15:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010776308/warc/CC-MAIN-20140305091256-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9654354453,
"token_count": 676,
"score": 3.921875,
"int_score": 4
}
|
<urn:uuid:446616f6-77ca-494f-8ad6-23e5899deef2>
|
The Large Hadron Collider (LHC), the world's largest and highest-energy particle accelerator, could generate astonishing new insights into the Big Bang, the building blocks of the universe, the mysterious properties of dark matter and perhaps even extra dimensions in the universe.
Located at the CERN laboratory outside Geneva, the immense collider, which measures more than 16 miles in circumference, is expected to usher in a new era of particle physics research, enabling scientists to replicate conditions immediately after the Big Bang.
To that end, on March 19, the collider fired beams of protons in both directions, clockwise and counter-clockwise, at a new world-record energy: 3.5 trillion (or tera) electron volts. The LHC will soon collide these proton beams against each other, allowing physicists to analyze the particles produced in the collisions. CERN eventually plans to collide proton beams at a blistering 7 tera-electron-volts in both directions.
Robert Cousins, a UCLA professor of physics who has served as a leader of the Compact Muon Solenoid (CMS) experiment at CERN — one of the LHC's four main experiments — is hopeful the collider will lead to extraordinary discoveries about the nature of the universe.
"We're going to study the Big Bang as far back as we can take it," said Cousins, whose research group is supported by the U.S. Department of Energy and who is principal investigator on a CMS grant funded by the National Science Foundation.
"The fundamental questions," he said, "were asked by the ancient Greeks: Where did we come from, what are we made of? How did the universe evolve and what are the forces of the universe?
"We think there are undiscovered forces. The history of physics is one of unification of ideas. Isaac Newton discovered that the same force that makes apples fall also holds the Earth to the sun and holds the moon to the Earth. When I teach Newton's universal law of gravity, the key word is 'universal.' One law of gravity accounts for apples falling and the relationship between the moon and the Earth. Historically, optics, electricity and magnetism were three different fields; now there is one theory of electromagnetism.
"Nature likely contains extra forces that we have not found yet," Cousins said. "Any successful attempt to unify the known forces of nature will almost certainly unify some unknown forces of nature at the same time. The job of experimental physicists is to go find those forces. I am most excited about finding new forces that shed light on unification. If you're going to paint the complete picture, you need to know what the other forces are."
The LHC is one of the most complex scientific instruments ever built. Funding for it comes from many sources, including the U.S. Department of Energy's Office of Science and the NSF. Ten thousand people from 60 countries helped design and build the collider and its experiments, including more than 1,700 scientists, engineers, technicians and students from more than 90 U.S. universities and laboratories supported by the DOE's Office of Science and the NSF. Participating U.S. universities include strong research groups from UCLA and seven other UC campuses.
Physicists may make dark matter at the LHC by colliding protons at high energy, which will make new types of unknown particles that decay down to the particles that make up dark matter, Cousins said.
The LHC will recreate conditions that existed less than one-billionth of a second after the Big Bang, and will do so repeatedly in a controlled way. Collisions of protons at energies as high as existed just after the Big Bang will be recorded by giant digital cameras. Eventually, there will be nearly 1 billion collisions per second.
Historically, high-energy particle physics has addressed the smallest pieces of matter and the forces between those objects.
"In the last few decades, an enormous amount of progress has been made in cosmology, which addresses very large questions, such as how the universe evolved from the Big Bang," Cousins said. "If you run the equations of general relativity for cosmology back to the Big Bang, you also need to know what the smallest objects in nature are and what the forces are between them in order to get close to the Big Bang.
"[UCLA professor of physics and astronomy] Edward Wright's cosmology measurements highly constrain the speculation of what the forces are between particles, what the smallest particles are and what dark matter can be. There is much speculation about what dark matter might be if it is not ordinary matter."
With a few exceptions, the particles that the scientists make will decay into lighter particles — some are common matter, like electrons; others are particles that are well understood, such as muons, a heavy version of an electron that decays after one-millionth of a second; and still others will be completely unknown, according to Cousins.
CMS is designed to measure the momentum, direction and energy of the particles that remain when the new particles decay. A second experiment at CERN called ATLAS will use different techniques to answer the same key questions.
CMS weighs more than 13,000 tons and contains 75 million silicon sensors. It has a detector, "a fantastic device," Cousins says, that is like a digital camera with 65 million pixels and the ability to take 40 million photographs per second.
"My thesis experiment 30 years ago had seven channels to detect photons and electrons," Cousins said. "The experiment I did after my thesis had a couple hundred. CMS has more than 75,000. The technology is incredible.
"We're going to find out what nature has in store for us," he said. "We'll see and measure the particles that come out of the region where the clouds of protons collide."
The research is scheduled to continue for more than a decade. Thousands of researchers from dozens of countries are participating in the LHC project, and more than 2,500 scientists and engineers from 38 countries work on the CMS experiment.
"I'm among many people who see this as absolutely the highlight of their career," Cousins said. "I cannot imagine doing anything else."
Seven UCLA physics professors and their research groups have contributed to CMS, beginning with David Cline, who was one of the founders of CMS some two decades ago and who is still an active collaborator. Jay Hauser has devoted all his research time to CMS for many years and is currently a member of the CMS management board. Many other UCLA physicists and engineers, including professors, researchers, postdoctoral scholars and graduate students, have contributed significantly to the research over many years.
Cousins, a member of UCLA's faculty since 1982, began working on CMS in 2000. He has been teaching when not in Geneva. His UCLA courses in the academic quarter just completed included a graduate course and Physics 10, or Conceptual Physics, often referred to as "physics for poets," which he first taught in 1988.
CERN's member states include Austria, Belgium, Bulgaria, the Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Italy, the Netherlands, Norway, Poland, Portugal, Slovakia, Spain, Sweden, Switzerland and the United Kingdom. The United States, India, Israel, Japan, Russia, Turkey, the European Commission and UNESCO have observer status.
Explore further: How theoretical condensed matter physics developed in Rome
Cousins to deliver free public lecture March 31
Cousins will present a free public lecture on the Large Hadron Collider and its physics at UCLA on Wednesday, March 31, at 7 p.m. The lecture, intended for a general audience, will be held in the Grand Horizon Room at Covel Commons. Seating is limited, and registration is required at events.pna.ucla.edu/lhc .
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses the Large Hadron Collider (LHC) and its potential to advance our understanding of the universe. It does not contain any unsafe, inappropriate, or harmful content.",
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is entirely focused on describing the ATLAS and CMS experiments at CERN, detailing the technology and the involvement of researchers. There is no unsafe, inappropriate, or harmful content present in the text."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "956-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
},
{
"custom_id": "956-1",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://phys.org/news188645541.html",
"date": "2014-03-11T10:58:21",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011176878/warc/CC-MAIN-20140305091936-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9633315802,
"token_count": 1611,
"score": 3.59375,
"int_score": 4
}
|
<urn:uuid:f610e9fd-3d77-4dce-860c-a727bf20047f>
|
POSTED: Thursday, April 25, 2013 - 6:00pm
UPDATED: Friday, April 26, 2013 - 8:46am
MCALLEN, TX (KVEO NEWSCENTER 23) — It's a disease that is closely linked to heart disease, strokes, amputations, and even blindness. Here in the Rio Grande Valley diabetes is becoming a more common disease, which is growing in epic proportions.
Dr. Marcel B. Twahirwa is a Diabetes Specialist for Doctors Hospital in Edinburg. Twahirwa says, "If you live in a population like we live in, with 30% of the population which atleast has diabetes, so all those symptoms and high risks they become almost not as important."
At 12-years-old Dante Almaguer of McAllen was diagnosed with Juvenile diabetes, since then it's been and up down battle with his health.
Almaguer says, "I had reno failure and I lost vision to my left eye, and my brother donated a kidney, i waited for six months, i was on dialysis for five in a half months."
For Almaguer it Is crucial he take care of his condition, Almaguer isn't alone, unfortunately type one diabetes is on the rise. Sadly, the longterm affects can be deadly , that is why diet and exercise play such an important role.
Meanwhile, recent health reports show that diabetes is hitting hard among Hispanic and African- American groups and here in the Rio Grande Valley it is becoming a rising concern among Hispanics.
Despite the prevalent spike in diabetes, advanced medications and treatments are promising to help preserve the body's ability to produce insulin helping those struggling with the condition.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses diabetes and its effects, including personal stories and health concerns, but it does not contain any unsafe, inappropriate, or harmful content. It is suitable for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "957-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.kveo.com/print/node/31426",
"date": "2014-03-11T10:55:53",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011176878/warc/CC-MAIN-20140305091936-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9633895159,
"token_count": 355,
"score": 2.6875,
"int_score": 3
}
|
<urn:uuid:a754920b-1a2b-4310-a21b-27c200a58e3e>
|
||This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (September 2011)|
Men's health refers to health issues specific to human male anatomy. These often relate to structures such as male genitalia or to conditions caused by hormones specific to, or most notable in, males.
In the UK, the Men's Health Forum was founded in 1994. It was established originally by the Royal College of Nursing but became completely independent of the RCN when it was established as a charity in 2001. The first National Men’s Health Week was held in the USA in 1994. The first UK week took place in 2002, and the event went international the following year. In 2005, the world’s first professor of men’s health, Alan White, was appointed at Leeds Metropolitan University in north-east England.
In Australia, the Men's Health Information and Resource Centre advocates a salutogenic approach to male health which focuses on the causal factors behind health. The Centre is led by Professor John Macdonald and was established in 1999. The Centre leads and executes Men's Health Week in Australia with core funding from the NSW Ministry of Health.
In 2000, the Toronto Men's Health Network was founded by Joe Jacobs, who helped bring attention to the importance of Men's Health in Canada's largest city. The organization has held Men's Health Forums annually, including 2005 where the guest speaker, Canadian Senator Dr. Wilbert Keon, spoke of the importance of men's cardiovascular health. The organization has since been chaired by Ted Kaiser, Elaine Sequeira, Dr. Don McCreary and Donald Blair. Presently, the organization is being led by James Hodgins. It remains the oldest and most recognized Men's Health advocacy organization in Canada, with other organizations starting to appear in British Columbia and the Maritime provinces.
In the United States, men's health issues are raised by, among others, Men's Health Network (MHN). MHN is a non-profit educational organization comprising physicians, researchers, public health workers, other health professionals, and individuals. MHN is committed to improving the health and wellness of men, boys, and their families through education campaigns, data collection, surveys, toll-free hotlines, and work with health care providers. MHN conducts screenings in the workplace and at public venues, sponsors conferences and symposia, and promotes awareness periods such as Men's Health Month and Men’s Health Week.
- International Journal of Men's Health
- International Society For Men's Health & Gender
- International Men's Day November 19
- Men's Health Week
- Healthcare inequality
- Social determinants of health
- Health disparities
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is a factual and informative article about men's health, discussing various organizations and initiatives related to men's health. It does not contain any unsafe, inappropriate, or harmful content. Therefore, it is fully appropriate for all audiences and receives a score of 0."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "958-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://en.wikipedia.org/wiki/Men's_health",
"date": "2014-03-12T09:47:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021587780/warc/CC-MAIN-20140305121307-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9766561985,
"token_count": 556,
"score": 2.78125,
"int_score": 3
}
|
<urn:uuid:22b99dbb-b8d4-4d0c-b1a2-997747669dba>
|
Mobility and poverty make completing school so difficult for migrant students that the U.S. Congress made special provisions for their education in a 1966 amendment to the Elementary and Secondary Education Act.
The current reauthorization of the ESEA is intended to help migrant students and schools meet the high standards needed to achieve the goals established in the No Child Left Behind Act of 2001.
To ensure the students who live and travel in migrant families are able to receive the attention and instruction they need, the Deming Public Schools Migrant Program exists to provide students with opportunities to grow academically, socially and culturally. The Migrant Program promotes high school completion and higher education as well as facilitating student leadership skills necessary to succeed academically and to become productive citizens and skilled workforce members.
"We are very proud of our students and staff in the Migrant Program," Hector Madrid, Director of Service for Migrant or Homeless Students, said. "Our students are often first generation graduates moving on to the university setting. The dedication of migrant parents to the education of their children is an important part of the success of our program."
The term 'migratory child' refers to a child whose parent or guardian is a migratory agricultural worker or a worker involved in an agricultural activity who came to the United States in order to obtain such work. Migrant families travel continuously to obtain employment and generate income. Migrant students must travel with a parent or guardian in order to qualify for the program unless they are independent or older than 17 years of age.
Dropout rates of nearly 89% in 1974 demonstrated the exigent need of migrant students for targeted support on a national level. The dropout rate has improved through Migrant Education services support. The current dropout rate is 40% among migrant students. The goal of DPS' Migrant Program is to further reduce that rate and help students achieve academic success.
The DPS Migrant Program provides students with a variety of services designed to foster success. The Director and Educational Assistants are monitoring students' needs to "Make the Grade" by improving achievement.
The Migrant Program also operates a clothing bank that is open from 1 p.m. to 4 p.m., Monday through Friday. Additionally, the program provides medical and dental assistance, eyeglasses and a Community Food Program - offered under the auspices of the Federal Emergency Management Agency.
At the beginning of the school year, the Migrant Program provides the students with backpacks, school supplies, shoes and coats or jackets.
During the year, migrant seniors are taken to the College Assistance Migrant Program in Las Cruces and Albuquerque. This activity enables students to learn about the importance of higher education and what actions and requirements are necessary for them to participate. Migrant paraprofessionals assist struggling students with needed interventions, college or career opportunities and applications and to coordinate with other programs to address student needs, such as attendance, life and career-setting goals and daily student interactions.
Historically, Luna County has had the largest migrant population in the state of New Mexico and the trend continues. Currently the DPS Migrant Department has nearly 150 migrant Students, six migrant pre-schoolers and 6 "Out-of-School Youth." The migrant staff is focusing on data so that they can target students having difficulty academically to address their needs with appropriate interventions. Student needs are identified through an assortment of assessments. The data is collected, monitored and maintained throughout the school year to help students with appropriate interventions in Core subjects, such as Language Arts, Math and Science. This focus and emphasis will make a difference with a majority of our migrant students.
Migrant Instructional Assistants are placed in each school to aid students that require further assistance. Tutoring is offered to students through the Migrant Literacy Net Program (https://migrantliteracynet.com/index.php ).Collaboration between students, teachers and migrant paraprofessionals dictates the placement of tutorials through grading, classroom participation and student test scores in WIDA, Standards Based Assessments and Short Cycle Assessments. Staff continually stress the importance of parental participation in their child's education. Establishing stability is a major barrier for migrant students. The Migrant Program staff work to help students achieve stability and overcome barriers.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text provided is entirely focused on educational and social support for migrant students. It discusses the challenges faced by these students and the programs designed to help them succeed academically and socially. There is no inappropriate language, harmful content, or references to illegal activities. Therefore, it is safe for public use and educational environments."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "959-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.demingheadlight.com/deming-news/ci_24927375/migrant-program-puts-deming-schools-unique-situation",
"date": "2014-03-12T09:38:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021587780/warc/CC-MAIN-20140305121307-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9532400966,
"token_count": 868,
"score": 2.75,
"int_score": 3
}
|
<urn:uuid:61ec39cb-208d-438d-ad96-8c701b1c3153>
|
I’ve been using C++ for a long time now. It’s been my programming language of choice since about 1998. Before that I used C and Assembly, and before that I used Pascal and BASIC. Even though I’ve been programming a long time and I’m reasonably familiar with the features of C++, sometimes it still causes me headaches. Here’s an example.
Maps in the game are randomly generated – but the generation is deterministic. This means that given the same starting conditions, such as a seed value, map size, and terrain type, the same terrain can be generated over and over. I use this functionality for the tutorial map. There’s no reason to store the terrain when it can be generated and the outcome is known.
However the other day I found that in only the 32-bit release build of the game, the terrain was coming out differently compared to the other compilations. The tutorial then wanted the player to place a building in the middle of a lake…
This is a hard thing to debug, as when switching back to any debug mode, or release 64-bit, the game worked correctly. I spent a few hours working on the worst kinda of debugging. This consists of logging the state of variables as they undergo thousands of state changes and looking for differences between the correct and incorrect versions. I ensured that the random number generator was always generating the same values, and then after several hours I found this line of code. It looks fairly innocent, but it contains is a non-obvious but critical mistake.
position = Vector3(rng.RandFloat(), rng.RandFloat(), 0.0f);
rng.RandFloat() just generates a random number between 0.0 and 1.0. So what’s wrong here? When the code was first executed, the majority of compilations resulted in Vector3(0.241534, 0.645345, 0.0), but in this case of 32-bit release mode, it was generating Vector3(0.645345, 0.241534, 0.0).
There is no sequence point here. In C++ the order of evaluating parameters to a function call is up to the compiler. So while the random number generator picks the same two random numbers as it’s called, the order that the parameters are evaluated in can be different, and this changes the outcome.
Changing it to the following code fixes the problem because the order of operations is explicit.
float randomY = rng.RandFloat(); float randomX = rng.RandFloat(); position = Vector3(randomX, randomY, 0.0f);
This made me feel like a newb. While I was vaguely aware of this type of issue, I expected the compiler to choose left to right or right to left evaluation and stick with it, and not change order due to optimizations. At least now if I ever implement support for more platforms, I can be sure the terrain generation will come out the same on all systems…
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\n**Explanation:**\nThe text provided is a discussion about programming and debugging issues encountered while working with C++. It does not contain any unsafe, inappropriate, or harmful content. The language used is respectful and the themes discussed are related to programming and software development, which are appropriate for a general audience."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "960-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.shiningrocksoftware.com/2013-11-17-the-trials-of-using-c/",
"date": "2014-03-12T09:36:38",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021587780/warc/CC-MAIN-20140305121307-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9254865646,
"token_count": 637,
"score": 2.671875,
"int_score": 3
}
|
<urn:uuid:1f72407d-82eb-4f78-86a7-a4b1ea75fdbd>
|
Federal officials suggest capping them at 50, but now, "SPF creep" has hit triple digits, with Neutrogena's SPF 100+ sun block, leading some dermatologists to complain that this is merely a numbers game that confuses consumers.
On The Early Show Friday, CBS News correspondent Medical Correspondent Dr. Jennifer Ashton explained how much SPF is enough and how to properly use sunscreen to truly protect yourself.
A sunscreen's SPF, or sun protection factor, measures how much the product shields the sun's shorter-wave ultraviolet B rays, known as UVB radiation, which can cause sunburn
Twenty years ago, 15 was the highest one. Then, 30 became the standard. Now, the most popular is 30. But we also have 50, 75 and that 100 SPF that was just launched.
Using 100 instead of 50 mean doesn't mean you're getting double the protection, Ashton pointed out. And a rating of 100 doesn't mean it blocks out 100 percent of the sun's rays. "All it does," she explained, "is tell you how long you can be outside without burning. So 100 would be 100 times longer than if you didn't have protection on."
There isn't such a thing as 100 percent protection. SPF 100 means 99 percent blocking of UVB rays. The only way to do that, she said, is "stayng inside!"
The difference in UVB protection between an SPF 100 and SPF 50 is marginal. Far from offering double the blockage, SPF 100 blocks 99 percent of UVB rays, while SPF 50 blocks 98 percent. SPF 30, that old-timer, holds its own, deflecting 96.7 percent.
So, what a higher SPF really does is enable you to take more time before reapplying the sunscreen. The higher the SPF, the more time before you must reapply. A person who turns red after 20 minutes of unprotected sun exposure is theoretically protected 15 times longer if he or she adequately applies SPF 15. Because a lot of sunscreens rub off or don't stay put, dermatologists advise reapplication every two hours or after swimming or sweating. The key here is not the SPF, but how you're using sunscreen. Are you applying it right?
The amount is very important. To get the SPF on a bottle, you must apply the amount of a shot glass. If you use half as much, you're getting half the SPF.
When you put it on is also important: Twenty minutes before sun exposure is ideal.
And how often you reapply is really crucial for avoiding sun damage and staying protected.
For more on sunscreen, visit the Web site of the American Academy of Dermatology.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```\n\nThe text discusses sunscreen SPF ratings and their effectiveness in protecting against UVB rays. It does not contain any unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and relevant to public health."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "961-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.cbsnews.com/news/shining-light-on-great-sunscreen-debate/",
"date": "2014-03-15T02:18:31",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678695535/warc/CC-MAIN-20140313024455-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9559099674,
"token_count": 566,
"score": 2.625,
"int_score": 3
}
|
<urn:uuid:28ca8a7a-d236-4a0b-a5b1-e22bb3c91654>
|
Examples and Observations:
- "One aspect of modality highly relevant for ideological analysis . . . is lexical modality. [C.J.] Fillmore (["Verbs of Judging" in Studies in Linguistic Semantics] 1971) was the first to point out the 'evaluative' implications of lexical items such as accuse, criticise, praise. Thus, for example, the sentence:
The teacher accused Linda of copying.implies that the teacher thinks that copying is bad."
(Jean Jacques Weber, "Dickens's Social Semiotic: The Modal Analysis of Ideological Structure." Language, Discourse and Literature: An Introductory Reader in Discourse Stylistics, ed. by Ronald Carter and Paul Simpson. Routledge, 1995)
- "[Hugh] Hefner's insistence that the 'deciding factor' should be what is in 'the best interests of the girls themselves' may have been a bit disingenuous."
(Elaine Tyler May, America and the Pill: A History of Promise, Peril, and Liberation. Basic Books, 2010)
- "It is therefore important to avoid medical jargon, make language simple, check for understanding or hire a trained interpreter."
(Palliative Care Nursing, 3rd ed., ed. by Marianne LaPorte Matzo and Deborah Witt Sherman. Springer, 2010)
- We propose that there should be three separate debates.
- This new policy is going to come back to haunt us.
- Implementing electronic health records is probably the best thing that can happen to health care.
- In English, modality may be expressed lexically in a number of different ways. This can be illustrated by examples like the following:
(1) Hopefully this is enough. (deontic adverb)(Carl Bache, Essentials of Mastering English: A Concise Grammar. Walter de Gruyter, 2000)
(2) She is likely to lose. (epistemic adjective)
(3) I permit you to smoke. (deontic verb)
- Types and Examples of Lexical Modals
"Examples of modal nouns include condition, decree, demand, necessity, order, requirement, request, resolution, and wish. In the example below the modal noun intention creates a modal context which contains the modal verb should.
(176) So I drew the inference that the intention was that the media should reproduce the programme.Notice that should in this example is mandative should . . ..
"Examples of modal adjectives include able, advisable, anxious, bound, concerned, crucial, desirable, essential, fitting, imperative, important, likely, necessary, possible, supposed, sure, vital, and willing. These create modal contexts to varying degrees, often depending on how the speaker or writer views the situation expressed by the complement. . . .
"[E]xamples of modal lexical verbs . . . include advise, intend, propose, recommend, require, suggest, and wish. These verbs can license mandative should clauses or mandative subjunctive clauses. . . .
"Among the modal adverbs in English we find arguably, probably, maybe, possibly, perhaps, and surely."
(Bas Aarts, Oxford Modern English Grammar. Oxford University Press, 2011)
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"no unsafe content\", \"score\": 0}\n```"
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "962-0",
"llm_safety_score": 0,
"reason": "no unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://grammar.about.com/od/il/g/Lexical-Modality.htm",
"date": "2014-03-07T15:15:35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999645330/warc/CC-MAIN-20140305060725-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.887177825,
"token_count": 692,
"score": 2.578125,
"int_score": 3
}
|
<urn:uuid:e293775c-1ef6-4df7-9793-df942c1dcb7e>
|
Raptors are powerful and sensitive creatures. You should always contact a rehabilitator before attempting to help injured wildlife to prevent from injuring yourself or the animal. Wild animals need specific diets, and if they are dehydrated they will need to be rehydrated by a rehabilitator before eating solid foods. It is illegal to possess, own, or keep a raptor without the proper permits from the U.S. Fish and Wildlife Service as well as your state's Division of Wildlife. Follow the below steps if you find an injured raptor in the wild.
- Is the raptor injured? Determine that in fact the raptor is injured: if the raptor does not fly away when it is approached by humans and it does not have food (raptors may not fly away from people if they are protecting their food or babies), look for any obvious broken bones, bleeding, or external parasites such as maggots or flies. You should NOT touch the raptor unless absolutely necessary. Ensure that it is safe from cars, cats, dogs, and other people. If it is in the road, you may have to move it to the side before it can be rescued (see below for how to handle a raptor).
- Who do I contact? You should contact the U.S. Department of Fish and Wildlife, your states's Division of Wildlife or Department of Natural Resources, or a wildlife rehabilitator in your area for assistance. Visit the Wildlife International website for a full list of rehabilitators in your area.
- Should I care for the raptor? You want to contact the appropirate authorities as quickly as possible and protect the raptor from cats, dogs, and other animals until assistance has arrived (see below for how to handle a raptor if you have to transport it to a rehabilitator). You should NOT try to rehabilitate any animal on your own, as you may cause further damage or imprint upon the raptor.
How to Handle a Raptor to Transport to a Rehabilitator
Before you attempt to move a raptor be sure to have the following things ready: an old towel, thick work gloves, safety glasses, something to transport the bird in (cat or dog kennels work best, but a sturdy box will do). Visit the Wildlife International website for a full list of rehabilitators in your area.
- Put the towel over the bird, the darkness will calm the bird more.
- Wearing your gloves and safety glasses to protect you from their sharp beak and talons, gently take hold of the raptor by keeping the birds wings close to its body (unless the raptor has clearly suffered an injury to the wing), and keeping your hands out of reach of the raptors talons.
- Place the raptor inside the kennel or box. Ensure that the box has plenty of air holes for ventilation. It is best to have a box that is slightly bigger than the raptor, if it is too small the raptor can do serious damage to its feathers and wings and if it is too large it is possible for the raptor to hurt itself by thrashing around
- Keep the box in a dark safe place away from animals and children until it is time for it to be transported.
Click here to see what to do if you find a baby bird (diagram courtesy of Healers of the Wild: People Who Care for Injured and Orphaned Wildlife by Shannon K. Jacobs).
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"educational and informative content\", \"score\": 0}\n```\n\nThe text provides educational and informative content about handling and rehabilitating injured raptors. It does not contain any unsafe or inappropriate content, and it is suitable for public use, educational environments, or general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "963-0",
"llm_safety_score": 0,
"reason": "educational and informative content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.hawkwatch.org/about-raptors/if-you-find-an-injured-bird",
"date": "2014-03-07T15:15:42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999645330/warc/CC-MAIN-20140305060725-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.940995872,
"token_count": 706,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:07d66c38-e82f-49bb-89ff-ad795dbfe48b>
|
DOUBLE SPRINGS, Ala. (AP) -- A group of endangered whooping cranes migrating to Florida has made it to Alabama, but not without some help.
An organization called Operation Migration is using two ultralight airplanes to guide the eight young birds south from Wisconsin, where their journey began on Oct. 2.
The birds are raised in captivity. They're introduced early in life to ultralights and pilots disguised as cranes in hopes they follow when the time comes.
The cranes were in Tennessee before making it to north Alabama. Two of the birds followed the ultralights to Winston County, but six others had to be brought to a landing site in trucks.
The birds had been grounded for two weeks because of weather. They're headed to the St. Marks National Wildlife Refuge on Florida's Gulf Coast.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content\", \"score\": 0}\n```\n\nThe text provided is a news article about the migration of endangered whooping cranes and the assistance provided by Operation Migration. It contains no unsafe, inappropriate, or harmful content. The language is respectful and the themes are educational and informative, making it fully appropriate for all audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "964-0",
"llm_safety_score": 0,
"reason": "No unsafe content"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://www.wtvy.com/home/headlines/Operation-Migration-Lands-in-Alabama-235790821.html",
"date": "2014-03-07T15:20:14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999645330/warc/CC-MAIN-20140305060725-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9693029523,
"token_count": 171,
"score": 2.71875,
"int_score": 3
}
|
<urn:uuid:3563144c-a62e-4b72-93ff-c397a1d36f4f>
|
The First Peopling of the Americas and the World Heritage Convention
Within the framework of the World Heritage Centre Thematic Programme, Human Evolution: Adaptations, Dispersals and Social Developments (HEADS), the State Government of Puebla, the World Heritage Centre and the UNESCO Office in Mexico have organized the International meeting of Experts "The First Peopling of the Americas and the World Heritage Convention" to be held at the Historic Centre of Puebla, a UNESCO World Heritage site, Mexico from 2-6 September 2013. This meeting is largely financed by the State Government of Puebla and the Extra-budgetary Spanish Funds-in-Trust for World Heritage.
The State Government of Puebla, the World Heritage Centre and the UNESCO Office in Mexico has invited a group of 35 National and International Experts, Sites Managers, members of the Scientific Committee of the HEADS Programme, ICOMOS International Committee and national representatives from a dozen of countries to participate in discussions in favor of the recognition, conservation and research of human dispersal and adaptation related sites in the Americas.
This meeting will provide an important step in strengthening national and regional cooperation and capacities in support of the future protection and sustainability of human evolution and migration related sites in the Americas. In line with activities of the UNESCO HEADS Action Plan, the meeting will offer a regional platform to evaluate current methodologies for establishing the Outstanding Universal Value (OUV) of related sites for potential future inscription to World Heritage List.
|
{
"final_harm_score": 0,
"embedding_harm_score": 0,
"llm_harm_score": 0,
"llm_score_assessment_by_chunk": [
"{\"reason\": \"No unsafe content found\", \"score\": 0}\n```\n\nThe text provided is a detailed description of an academic meeting and does not contain any unsafe, inappropriate, or harmful content. It is fully appropriate for public use, educational environments, and general audiences."
],
"llm_harm_scores_by_chunk": [
{
"custom_id": "965-0",
"llm_safety_score": 0,
"reason": "No unsafe content found"
}
]
}
|
{
"dump": "CC-MAIN-2014-10",
"url": "http://whc.unesco.org/pg_friendly_print.cfm?id=1077&cid=83",
"date": "2014-03-08T17:01:15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999655215/warc/CC-MAIN-20140305060735-00014-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8651995063,
"token_count": 303,
"score": 2.859375,
"int_score": 3
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.