text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
This is part one of a two part article concerning the Ice Age caused by the Genesis Flood: August issue, "The Build-up"; September issue, "The Melt-down".
As I recall, the conversation went something like this. "That glacier up there is 30,000 years old," said our boat captain and guide as I, along with some other tourists, observed the sites in our chartered boat in Prince William Sound close to Valdez, Alaska, in early September 1998. Enthralling us more, our guide told us, "Interestingly, scientific observers have noted that the glacier has experienced unusual melt-down that has caused it to recede seven miles in the last 10 years." I did some quick math: 30,000 years/10 years=3,000 and 3000 x 7miles=21,000 miles that the glacier would have moved at that rate in 30,000 years and said to our captain and guide, "At the rate you have stated that the glacier moved, it could have just about traveled around the world (25,000 miles) in 30,000 years. I am a creation scientist and I believe that the glacier is more like 4,000 to 5,000 years old and is subject to fast, catastrophic events rather than uniformitarian assumptions made by naturalistic evolutionary scientists by whom you possibly inform us." It was not long that another man along with us piped up and stated to our guide, "You know, I support what this man has stated. It's just as plausible and scientific as what you have stated." Thus, there followed a conversation amongst some of us tourists about the different so-called "facts" of science based on naturalistic evolutionary thinking that the public is provided typically by guides in our national parks compared to other valid scientific observations based on a creation science view.
With some of my live experience and narrative from the above as a stimulus, let us examine some of the scientific observations that support the Ice Age as caused by the Genesis Flood. I will reference much of the scientific data used in this article from a book by Michael J. Oard titled, An Ice Age Caused by the Genesis Flood.1 For more in depth scientific data and study than can be provided in this short article, you may wish to acquire a copy of this book by calling the Institute for Creation Research (ICR) at 800-628-7640 or come out and purchase a copy at our monthly meeting of TASC.
In his forward to the above book, R. H. Brown, a creation scientist, points out that up to the 1990s, the creationist literature has been critically deficient with respect to interpretation of the evidence for continental glaciation. Michael J. Oard has made a major contribution, in opening up vistas for a sound understanding of the evidence of continental glaciation from the perspective of Biblical testimony. Oard has been equipped for this contribution by his competence as a professional meteorologist, exhaustive study of the scientific evidence related to glaciation, and confidence that Moses recorded only accurate historical data. Brown states that, "On the basis of the principle that the Creator is a model of truthfulness and consistency, it should be possible to find sound interpretations of His works that are fully consistent with the testimony given in His Word...the seventh and eighth chapters of the book of Genesis specify a catastrophe (the Genesis or Noahic Flood) that completely transformed the surface of planet Earth. Data in the eleventh chapter of Genesis, together with data in I Kings 6:1; Exodus 12:40,41; Genesis 47:9, 25:26, 21:5, and 12:4, place this catastrophe somewhere between about 4,300 years ago (2300 B.C.) and 5,400 years ago (3400 B.C.)..."2
In his book, Michael Oard contrasts the scientific data supporting the causes of the Ice Age by comparing the catastrophic events (rapid changes over a few hundred to thousands of years) of the worldwide Genesis Flood to the uniformitarian events (slow, gradual changes over tens to hundreds of thousands to millions of years) theorized by naturalistic evolutionists. Brown concludes his forward to Oard's book by pointing out that Biblical creationists will be gratified by the detailed extent to which data in the Bible produce a (weather) climate model with which Oard gives a scientifically sound explanation for continental glaciation as a result of events from the worldwide flood. As background to this article and to vividly implant on our minds the magnitude of the beginning of the events of the great catastrophe of the worldwide flood, let's refer to those events as recorded in Genesis 7:11-12. "In the six hundredth year of Noah's life, in the second month, the seventeenth day of the month, the same day were all the fountains of the great deep broken up, and the windows of heaven were opened. And the rain was upon the earth forty days and forty nights."
Another book that I reference in this article is Life in the Great Ice Age3 by Michael Oard and his wife, Beverly Oard. This book is much less technical than the former and weaves an ice age story for children and adults with only moderate science background while examining which scientific data and observations are more valid, the naturalistic evolutionary view or the creation science view that supports the Genesis Flood account and our Creator, God.
Let us take a look briefly at some of the conclusions that Michael Oard reports4 based upon his scientific data and meteorological observations with his subsequent understanding that the Ice Age could be caused by the Genesis Flood. According to Oard, the requirements for glaciation for an ice age are a combination of much colder summers and higher snowfall in winters. Over 60 theories of the Ice Age have been offered in the past, and all have serious deficiencies, including the currently popular astronomical theory. Oard proposes that the mechanism for the Ice Age is catastrophic and is not based on the uniformitarian principle. Specifically, the Ice Age is treated as a consequence of the Genesis Flood, which disrupted the climate to such a degree that an ice age developed immediately afterwards for a build-up of glaciation for about 500 years and a melt-down of about 200 years for a total post-Flood ice age of about 700 years.5 The Genesis Flood has never been proved to be a fable. It has only been assumed so by some men of science over the past 200 years or more. There is ample evidence that a gigantic flood once inundated the earth. For example, many sedimentary layers were laid down quickly by huge, powerful currents, with little or no sign of erosion between layers. Well over 100 flood traditions, in cultures from all over the world add support. The Bible clearly specifies that the Flood was global, not regional or local. 6
As stated above there have been many ideas and theories on the cause and number of ice ages. A good theory is one that best fits the physical evidence. Noah's Flood and the changes in the climate due to volcanic ash and warmer oceans best explain the cause and development of the Ice Age.7
The Ice Age affected all the world, especially the middle and high latitudes. In Europe, glaciers developed on the mountains of Norway and Sweden. Because the nearby ocean water was warm, it took many years before these mountain glaciers spread downward into the lowlands of those countries. Eventually, as the oceans gradually cooled, the snow and ice covered all of what is now northern and central England, Denmark, northern Germany, northern Poland, and northwest Russia. Ice covered nearly all of Canada and much of the northern United States, as well. The snow and ice extended all the way into northern Missouri. A gigantic ice sheet eventually covered Greenland and the continent of Antarctica. Smaller ice caps covered the Swiss Alps and other mid- and high-latitude mountain ranges of the world. Volcanic dust in the stratosphere due to multitudes of volcanic eruptions during the catastrophe of the Biblical Flood—after all, the events of this Flood were intended to destroy the earth—also cooled the tropics. Thus, many tropical mountains had ice caps at the summits. Some may think that an ice age needs colder winters. However, winters now are cold enough. In present-day Siberia, winters are bitter cold, but there is no ice sheet there. What is really required is much cooler summers so the snow would not melt. Also, winters would need to be much wetter—so wet that snow would pile high. Because of much cooler summers and more snow, the winter snow would grow deeper each year. After several years, the weight of the snow would cause it to compress and turn into ice.8
Considering the above, the Genesis Flood provides the initial conditions for the Ice Age. Since the Flood was associated with extensive volcanic eruptions, a vast shroud of volcanic dust and aerosols would have remained in the atmosphere for several years afterwards. Water for the Flood erupted from below the ground, in the "fountains of the great deep." The hot water from the deep would mix with the pre-Flood ocean, which itself probably was relatively warm compared to today. The tremendous earth upheavals associated with the fountains of the deep and the draining of the Flood waters would have mixed the ocean water. Consequently, the ocean would likely have been universally warm from pole to pole, and from top to bottom, at the end of the Flood.9
Cooling mechanisms caused by the Flood, in combination with a universally warm ocean, would result in a snowblitz, or a rapid ice age. Volcanic dust and aerosols would provide the main summer cooling over the mid- and high-latitude continents, by reflecting a relatively large percentage of the summer sunshine back to space. Once a permanent snow cover becomes established, even more solar radiation is reflected back, reinforcing summer cooling caused by volcanism. Snow-cover cooling is especially effective over barren ground, which would have been characteristic immediately after the Flood. More cloudiness, caused by higher mid- and high-latitude moisture, would most likely reinforce the cooler summers. Carbon dioxide, due to volcanism and the decay of vegetation, would have been very high right after the Flood, countering the cooling mechanisms somewhat, but it would have decreased rapidly as the Ice Age progressed, providing a supplementary cooling mechanism later on as the other cooling mechanisms waned.
For the ice age to progress, sustained cooling of the mid- and high-latitude continents is required. The volcanic dust and aerosols from the Flood would have settled out in a few years, but abundant volcanism, at a much higher rate than we have observed in the recent 200 years, would continue the volcanic cooling. A large array of geological evidence attests to these large ice-age eruptions. The other cooling mechanisms would have continued in operation.
The ocean adjacent to the developing ice sheets, and in the path of storms, would continue to be warm, due to a vigorous horizontal and vertical ocean circulation. As the water was cooled by evaporation and by contact with cold continental air, it would become more dense and sink, being replaced by warmer water from deeper in the ocean. Ocean currents set up along the east coasts of Asia and North America would continually transport warmer water northward. As the deeper ocean cooled, the ocean surface and atmosphere at mid and high latitude would slowly cool, as the Ice Age progressed and the ice sheets expanded. Mountain icecaps in many areas would coalesce and spread to lower elevations.
One uniformitarian ice-age puzzle that has lasted for 200 years is the observation that cold tolerant animals, like the reindeer, lived with warm tolerant animals, like the hippopotamus. The latter even migrated into northern England, France, and Germany during the Ice Age. A post-Flood ice age can account for this unique distribution of animals, since winters would be mild and summers cool. And, also, northwest Europe would have been relatively warm at first because of the surrounding warm ocean and the generally westerly onshore flow of air. Land bridges, for instance, across the Bering strait and the English Channel, would have aided rapid animal dispersion after the Flood10 with human dispersion to follow.
The climate of Siberia and Alaska would have been mild during the Ice Age. The Arctic Ocean not only was not covered by sea ice, but it also was relatively warm during the ice age. Temperatures over the surrounding continents would have been significantly warmer than at present as a result.11 The warm North Atlantic and North Pacific also would have contributed to the warmth in these regions, and precipitation would have been higher. Consequently, the woolly mammoth and many other types of animals would have found a suitable home, with adequate food, in Siberia and Alaska.12 We propose this happened by the remains of millions of their bones and even preserved carcasses in the ice as a result of rapidly colder temperatures at the end of the Ice Age.13
Due to the unique post-Flood climate, glacial maximum is reached very rapidly—in about 500 years. This figure is based on the length of time the controlling conditions likely operated. The main variable determining this time span is the ocean warmth, which made very abundant moisture available. Once the ocean cooled to some threshold temperatures, the supply of moisture would critically decline, and deglaciation would begin. According to Michael Oard, the time needed to cool the ocean can be determined from the oceanic and atmospheric heat-balance equations applied to the post-Flood climate. Speculation is inherent in such an estimate. As a result, maximum and minimum estimates of the most important variables were used. The initial average ocean temperature following the Flood was assumed to be 30° C, and the threshold temperature, at maximum glaciation, was estimated to be 10° C. The time to reach maximum glaciation ranged from 174 to 1,765 years—a very short time, compared to uniformitarian estimates. Both these figures are extremes. The best estimate is probably about 500 years.14
In summary, Michael Oard points out that the Genesis Flood is the basis for the post-Flood ice-age model. Since this model can explain the development of ice sheets and offer viable solutions to many outstanding ice age mysteries, the Flood should offer a firmer foundation for pre-glacial, earth history. If the principle of uniformitarianism of naturalistic evolution cannot explain the most recent geological period, it should not be the basis for all other geological periods.
Since uniformitarianism is unable to solve many mysteries of the past, it should be discarded, along with its accompanying theories—the theory of evolution and an old earth. A revolution or paradigm change in historical science would result. Many research conclusions would be rethought. The contribution to science and to life would be overwhelmingly positive. The situation remains, however, that new scientific data relating to earth history is published each year. Most of these data are incorporated within the uniformitarian paradigm, whether the data fit or not. Care must be exercised in using these data, since data collection and/or presentation is often biased by theory. Much new, as well as old scientific data, need reinterpreting within a Creation-Flood paradigm. This cannot be accomplished quickly. Thousands of uniformitarian scientists have spent over 150 years and billions of dollars on the uniformitarian model of earth history. Patience is needed to decipher the information on a particular subject. Creationists, as well as others, must be careful not to jump to conclusions too quickly. Not every mystery of the past will be solved. But with time and effort, many aspects of the Creation-Flood paradigm can be filled in and will result in a far superior model of the prehistoric past.15
Michael Oard concludes by declaring, "A post-Flood, rapid ice age supports the Genesis Flood, which further supports the historicity of the Bible. It also adds credence to the God of the Bible and to the spiritual message in the Bible. A God who has control of the earth, can cause a global Flood, and [can] allow an ice age is very powerful. He is even more powerful and intelligent for having created the entire universe. He is a master mathematician, engineer, and artist. Only the God of power and love described in the Bible is up to the task."16 Ô
1 Oard, Michael J. (1990) An Ice Age Caused B.y the Genesis Flood, Institute for Creation Research, El Cajon, CA
2 B.rown, R. H. (1990) in Foreword to: Oard, Michael J., An Ice Age Caused B.y the Genesis Flood, Institute for Creation Research. El Cajon, CA, xi-xii
3 Oard, M. and Oard, B. (1993) Life in the Great Ice Age, Master Books, Green Forest, AK, p. 72
4 Oard, M. J. (1990) pp. 187-197
5 Oard, M. J. (1990) pp. 190-191
6 Oard, M. J. (1990) pp. 187-188
7 Oard, M. and Oard, B. (1993) p. 62
8 Oard, M. and Oard, B. (1993) pp. 62-63
9 Oard, M. J. (1990) p. 188
10 Oard, M. J. (1990) pp. 188-189
11 Newson, R. L. (1973) Response of a General Circulation Model of the Atmosphere to Removal of the Arctic Ice-Cap, Nature 241: 39-40
12 Oard, M. J. (1990) p. 190
13 Oard, M. and Oard, B. (1993) p. 67
14 Oard, M. J. (1990) p. 190
15 Oard, M. J. (1990) pp. 196-197
16 Oard, M. J. (1990) p. 197
|
<urn:uuid:60ad6d38-f5b1-404e-8014-f4d99804cc43>
|
CC-MAIN-2017-34
|
http://tasc-creationscience.org/content/could-ice-age-have-been-caused-genesis-flood-part-1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106465.71/warc/CC-MAIN-20170820112115-20170820132115-00380.warc.gz
|
en
| 0.959198 | 3,706 | 3.171875 | 3 |
Why do Mexicans migrate to the United States? Is there a typical Mexican migrant? Beginning in the 1970s, survey data indicated that the average migrant was a young, unmarried man who was poor, undereducated, and in search of better employment opportunities. This is the general view that most Americans still hold of immigrants from Mexico. On the Move argues that not only does this view of Mexican migrants reinforce the stereotype of their undesirability, but it also fails to capture the true diversity of migrants from Mexico and their evolving migration patterns over time.
Using survey data from over 145,000 Mexicans and in-depth interviews with nearly 140 Mexicans, Filiz Garip reveals a more accurate picture of Mexico-U.S migration. In the last fifty years there have been four primary waves: a male-dominated migration from rural areas in the 1960s and ’70s, a second migration of young men from socioeconomically more well-off families during the 1980s, a migration of women joining spouses already in the United States in the late 1980s and ’90s, and a generation of more educated, urban migrants in the late 1990s and early 2000s. For each of these four stages, Garip examines the changing variety of reasons for why people migrate and migrants’ perceptions of their opportunities in Mexico and the United States.
Looking at Mexico-U.S. migration during the last half century, On the Move uncovers the vast mechanisms underlying the flow of people moving between nations.
Awards and Recognition
- Winner of the 2018 Mirra Komarovsky Book Award, Eastern Sociological Society
- Co-Winner of the 2017 Best Book Award, Migration and Citizenship Section of the American Political Science Association
- Winner of the 2017 Otis Dudley Duncan Award, Section on Population of the American Sociological Association
- Honorable Mention for the 2019 ENMISA Distinguished Book Award, Ethnicity, Nationalism, and Migration Section the International Studies Association
"Garip’s analysis is focused and fresh, representing an innovative approach to understand which theories of migration work for whom, when, and why. . . . [On the Move] provides an intricate and thorough analysis of the conditions, contexts, and composition of Mexican cohorts of migration since 1965, providing readers with a comprehensive understanding of the complex social, economic, and political processes that have led to this particular point in the trajectory of Mexican migration. This is a must read for anyone seeking to understand the history of Mexican migration to the United States over the past 50 years."—Elizabeth Aranda, American Journal of Sociology
"This analytically acute and beautifully written book expands our understanding of Mexican migration flows to the United States. Filiz Garip explores stimulating theoretical questions while bringing her analysis alive through portraits of individuals and families. Her masterful study will reshape how scholars investigate the causes and dynamics of migration movements."—Nancy Foner, coauthor of Strangers No More: Immigration and the Challenges of Integration in North America and Western Europe
"On the Move offers a creative and entirely original analysis to demonstrate convincingly why individuals have migrated from Mexico to the United States at different times for different reasons. Filiz Garip teaches us how seemingly contradictory propositions are often, in fact, quite complementary. Few people in the field today can match the methodological sophistication and substantive knowledge on display in this book."—Douglass Massey, Princeton University
"Mexicans and their descendants make up the largest immigrant group in the United States. Yet our theories for explaining this massive, intergenerational population transfer are incomplete. On the Move offers a comprehensive theory for the changing and diverse nature of Mexican migration: its composition, origins, destinations, and settlement. Groundbreaking in its methodological innovations, rich empirical materials, and policy implications, this book charts a new path for future migration scholarship."—Peggy Levitt, Wellesley College and Harvard University
"On the Move is the definitive book on the last half century of Mexican migration to the United States. Rich in new empirical research and sweeping in its scope, this brilliant book revolutionizes our understanding of this important migration flow and allows the personal stories of the migrants to emerge and touch readers. Lucidly written, sophisticated in its argument, and thoroughly original in its conclusions, this work is an instant classic."—Mary Waters, Harvard University
"This clearly argued, deeply grounded, and original book looks back over the past half century and seeks to understand the mechanisms that have led more than ten million Mexican immigrants to relocate to the United States. A pleasure to read and filling an important gap in the literature, On the Move provides a uniquely comprehensive study of the largest migration stream to America."—Roger Waldinger, University of California, Los Angeles
"On the Move is a treasure trove of information about Mexican migration to the United States. Garip draws together a vast amount of research and economic and demographic trends to investigate the degree to which different kinds of migrants predominated during different periods of migration in the last half century. This is a major scholarly book."—Frank D. Bean, University of California, Irvine
"Identifying various groups of migrants from Mexico, On the Move reveals a more nuanced and substantially richer story than has been previously explored about Mexico-U.S. migration and its development since 1965."—Katherine Donato, Vanderbilt University
|
<urn:uuid:55759956-ec82-4003-b9a7-95c54a3ddecd>
|
CC-MAIN-2023-23
|
https://press.princeton.edu/books/hardcover/9780691161068/on-the-move
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00170.warc.gz
|
en
| 0.927027 | 1,089 | 3.359375 | 3 |
The Gold Rush was the most lavish comedy produced in the silent film era. And it was arguably the most ambitious. Restaging iconic stereoscope pictures of prospectors ascending Yukon’s steep Chilkoot Pass, its director, writer, and star Charlie Chaplin had 600 men sent by train to the Sierra Nevada to climb a snowy mountain peak. A miniature mountain range was constructed in Hollywood.
But the film’s verisimilitude only went so far: The real gold seekers who embarked on the Klondike odyssey between 1897 and 1898 suffered hardships, from brutal cold and famine to grueling footslogs. Nonetheless, when rumors of riches in Nome surfaced, many undertook the 774-mile journey.
Chaplin plays The Lone Prospector. Wandering through the wilderness of Alaska, he shacks up with a greedy criminal and a lucky prospector to escape an Arctic blizzard. Bears, avalanches, and starvation are never far away. But true to Hollywood happy endings, Chaplin’s tramp gets the gold and the golden girl. The film premiered in 1925 at the Egyptian Theatre, owned by Sidney Grauman, who had himself trekked north in search of gold, only to come up empty.
|
<urn:uuid:3edb8a65-2eb5-4779-84cd-c8a1d6adf432>
|
CC-MAIN-2017-30
|
http://www.smithsonianmag.com/travel/charlie-chaplin-klondike-gold-rush-silent-film-comedy-alaska-smithsonian-journeys-travel-quarterly-180959456/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423901.32/warc/CC-MAIN-20170722042522-20170722062522-00054.warc.gz
|
en
| 0.936484 | 254 | 2.8125 | 3 |
What's Math Got To Do With It?
This engaging book shows —rather than tells — the reader what terrific math instruction looks like. It's for teachers and parents who want to improve children’s mathematics learning. The author presents advice and research findings through practical ideas that can be used in classrooms and homes.
Review posted November 6, 2022
This book was an easy read. It gave me so much insight.
Review posted May 18, 2022
Different perspective on math, helpful to understand
Review posted May 6, 2022
Boaler provides useful adaptations to her original work, adding much needed commentary on the strengths and areas for reform in curricular standards like Common Core, though this did feel brief given the heavy controversy that currently engulfs the topic in our modern education discourse. As a current first year educator navigating provided curriculum that often misses the mark in helping us meet these standards, I especially appreciated Boaler's inclusion of logic games, puzzles, and other fun activities toward the end of the book that provide exciting examples for making math fun for my students.
Review posted April 25, 2022
I was thinking it would be practical examples on how to work math into the daily life of my children. I seemed more for educators and very good in that way.
Review posted October 10, 2021
Discusses what is wrong with the way math is being taught in most classrooms and why students are battling math anxiety. Gives you strategies so children can have a better experience with learning math. It helps you bring the fun and excitement back to math class.
Review posted August 29, 2021
This book was helpful.
Review posted July 29, 2021
It provides a broad overview of the state of math education, and possible directions for the future. It gives ways to get out of repetitive worksheet and teaching to the test monotony. It gives some inspiration and hope if you are caught up in the current system of teaching math. It is primarily for math teachers, and the parents of students taking a math class. It provides many ideas and useful resources. / A sampling of the themes covered including: import of mental math, getting beyond counting, tapping into our natural ability to recognize patterns, celebrating mistakes, providing challenging problems, and getting away from step-by-step instructions. / The chapter on girls and STEM was too limited. The issue goes well beyond just the math class. To address reasonably would require at least a book and deal with more disciplines that just math.
Review posted June 12, 2021
This one is a keeper, yet a hard one to get through. It took awhile to completely read and finish but once I did I appreciated it and decided to put it in my “reference” pile. Would recommend to others.
Review posted April 13, 2021
Really interesting read. I enjoyed fresh ideas and approaches to math.
Review posted March 17, 2021
This was a great read. It would have been a great book to do as part of a PLC or book study. There are thoughtful points and great strategies that help bring out the importance of teaching math.
Review posted February 21, 2021
Jo Boaler has done some remarkable research in math education. Her books should be read by all teachers and parents. Student’s perceptions about math are so important and the way we teach math has a profound impact on student outcomes. This book will make you a better teacher.
Review posted January 22, 2021
As a teacher I continue to search for ways to incorporate math learning into activities, and incorporate common core math skills so that students can use their problem solving skills in every day situationd
Review posted January 9, 2021
Very good. Simple yet concise.
Review posted January 6, 2021
The content is great. I only wish this book was more visual. It's useful, but the text could be streamlined and the illustrative examples could be more aesthetically engaging than small black and white photographs. I'd still recommend it.
Review posted January 6, 2021
This book changed my view on how to teach math. Although, there were a few ideas I didn't agree with, I will be implementing some strategies in my classroom.
Review posted December 22, 2020
Super helpful book! Math is so important and this book will benefit me teaching my daughter.
Review posted November 25, 2020
Some good points, but very black and white.
Review posted November 2, 2020
I appreciate the real world examples that this book provides and the in depth nature it gives to how students learn. The variety of topics covered kept me interested in hearing more.
Review posted September 24, 2020
Great book with a lot of great information for teachers!
Review posted September 15, 2020
This is a powerful book about how the future of math instruction should look. It explains what schools are doing wrong and begins the discussion about what needs to be different. I highly recommend this book.
Review posted September 11, 2020
This was a FANTASTIC book for educators and parents! So many people have developed the idea that they aren't good at or don't like math. This book helped me give math another chance, and it can for that for you!
Review posted September 10, 2020
This book will support parents and teachers to build genuine love of the multiplicity, flexibility, and creativity for learning math. We need students to love math and be able to see its beauty. I have an increasing appreciation and understanding for best practices to support all students. This book will explore ways to inspire students, parents, and myself to enjoy math and help students achieve at high levels. The "Math Wars" are explored. Some argue that rote memorization and wide variety of skills outweighs the multiplicity, flexibility, and depth that is advocated by the author and supported with decades of her and others' research. https://www.youcubed.org/tasks/ is a free resource by the author and her Stanford University cohort to support math learning for parents and teachers. Jo Baoler fills my heart with greatness with her work to bridge the inequality in mathematics. This book did not stay on my shelf when I completed it; a colleague asked me for open ended math tasks. I sent her to youcubed.org and handed her this book.
Janice I Woody
Review posted August 22, 2020
Review posted July 27, 2020
Good book for developing a better understanding of why the “how” of math matters. The process is more beneficial than the answer.
Review posted June 4, 2020
Informative. Promotes a growth mindset in math
Review posted February 5, 2020
Awesome book! People kept picking it up off my side table wanting to read it. I was able to hang on to it and what an awesome book!! I have passed it off and I expect It may be a while before I see this book again!!
Review posted January 12, 2020
I'm a teacher and responsible for teaching both math and literacy to elementary school aged students. While I have read plenty of books on effective literacy instruction, there is somewhat less available on the topic of great math instruction. I enjoyed learning practical strategies that I can immediately apply in my math groups, and the research behind effective math teaching practices. I feel more equipped now to deliver quality math instruction to my students.
Review posted December 8, 2019
So... I was thinking about getting back into math. This is a great shortcut to just that. Gotta get back in the mix to help my youngins as they advance with their classes these days.
Review posted September 17, 2019
Incredibly practical and an easy read. Inspiring!
Review posted September 1, 2019
This book is filled with lots of great strategies for teachers that work with students that may struggle with mathematics. I look forward to utilizing the differentiation strategies provided throughout this book. It’s easy to read and apply.
Review posted July 26, 2019
This book was a big help in assisting my on teaching my children a way to understand math.
Review posted June 27, 2019
This book is easy to read, and very applicable in my role as an elementary teacher. I love the way Jo Boaler writes!
Review posted May 30, 2019
This book shares the traditional ways math is taught and outlines concrete solutions with classroom approaches using nature and real-world examples of how and when we can and need to apply math concepts to manage our day and to better understand our world. The book details project-based and communication as structures that work. The focus is on what is best and how proven evidence-based research, for example, applying student-driven instruction with formative and group discussion. There is a chapter for parents and ways to support children at home so their approach and abilities are kindled.
Review posted May 3, 2019
A great book about how to teach math to kids in a way that makes it feel relevant to the real world. Math shouldn't be taught by memorizing methods but by thinking mathematically and using it as a tool for problem solving. This is the practical way that adults use math, especially in fields like engineering.
Review posted April 19, 2019
Great for every level!!
Review posted April 7, 2019
Wow! What a great book. I will be using this information when I have my own class, next year. I like how the author discusses that we need to know the why of how to solve math problems not just how to do them.
Review posted March 19, 2019
It was interesting to learn about better methods of teaching Math to children. But it was upsetting to read about how some people are so closed minded and worked so hard to prevent these improved methods from being taught in our schools, especially after seeing so many improved scores and positive attitudes towards Math. I'm hoping that these methods will become accepted and even the norm in our schools in the future.
Review posted December 29, 2018
We take the language of Math for granted. I am glad to have this.
Review posted November 16, 2018
I hated math as a student in grade school, and I wasn't much more fond of it in high school. This being said I chose to read this book with the mindful intention to help my kiddos to not only understand math, but to love it. In reading it, I found statements that challenged how I view math, and ideas of how I might better teach it. Math is not, nor should it simply be a memorization of facts, but it should and must be a quest we start on, think about, ponder. Thank you for opening my eyes to such a great book.
Review posted November 13, 2018
I can’t say enough good things about this book! I am a high school math teacher and reading this book has fueled my flame. From the stories about the classrooms she visited and taught to all the useful inspiring examples of ways to transform math education she has inspired me page by page. I was especially enthralled with the enlightening research on male and female learning differences in mathematics. This book will no doubt transform the way I teach from now on.
Review posted September 28, 2018
Quick and easy read with helpful information. Thank you.
Review posted September 1, 2018
I just sent a note to my A list saying that I kept wanting to send this book to every single parent and also to everyone who has ANYTHING to do with education. This is SUCH a crucial title, she does a great job hammering home that good math instruction is teaching about ways of thinking about problems we don’t know the answers to, not about ways of computing when you’re given the problem and an answer in the back of the book, which is what we reduce it to. I’m so glad I read this — I’d be even gladder if everyone in Oregon government and schools read it.
Review posted August 10, 2018
such a good book I really hope many people can read it
Review posted July 30, 2018
What Has Math Got To Do With It? has given me a tool I need as a mother and an educator. In high school I struggled with math and gave up. This book helped me understand why that happened. I have a child who struggles with math now and the book will help me not repeat the past. I went online to author Jo Boaler's website and found so many useful tools to help students with math. I hope to share with my colleagues that "Math is not a performance subject. Math is a learning subject. " The brain grows by making mistakes. Kids are motivated by their own questions.
Review posted June 21, 2018
Great book! Very insightful and applicable info for teachers, tutors and parents.
Review posted May 24, 2018
This book has been helpful working with my own 7th grade child to raise awareness and motivation by recognizing how math integrates into different applications -- gives practical ideas to frame the ways math ties into everyday life and strategies for working with students in the classroom/after school homework club settings to incorporate math concepts in a variety of different ways.
Review posted April 30, 2018
The question that math teachers hear almost everyday in their classrooms is, "When am I going to use this in the real world?" Well, this book has the answers! I highly recommend this book for current and future educators, and not just mathematics teachers. All to often educators are forced to teach students how to pass standardized tests, not learn and master the information. This books identifies the lack of educators ability to teach and helps equip educators with useful tools and skills!
Review posted March 15, 2018
pretty good read
Review posted February 6, 2018
This book inspired me to work harder on my math I had never liked it very much and after reading this book it gave me a whole different look at math and I am enjoying it now.
Review posted February 3, 2018
Good read. Math does have a lot to do with it
|
<urn:uuid:87aeed85-e7c9-4abd-a6a0-3ff50320db78>
|
CC-MAIN-2023-14
|
https://www.tfff.org/select-books/book/whats-math-got-do-it
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00405.warc.gz
|
en
| 0.961326 | 3,117 | 3.53125 | 4 |
In laboratory tests, a chemical derived from bananas proved as effective against HIV as two currently used pharmaceuticals, according to new research published in the March 19 issue of the Journal of Biological Chemistry. Dr. David Markovitz* and colleagues at the University of Michigan found that a lectin, or protein, in bananas may be able to interrupt the chain reaction that leads to HIV transmission. The chemical, called BanLec, limits the spread of HIV by binding to a protein in the virus and blocking its ability to spread infection to the body.
The naturally-derived chemical may be particularly promising because it is less likely to be overcome by virus mutation, the researchers point out. That is, with current anti-HIV drugs, the virus can mutate and become resistant; with lectins, the virus would likely need to mutate several times, making it far more difficult to overcome, the researchers say.
Though these preliminary findings are exciting, researchers concede that real-world application, possibly as a chemical component of vaginal microbicides or in conjunction with anti-retroviral medications, is still many years away. According to World Health Organization figures, as of December 2008 33.4 million people around the globe were living with HIV. There is a critical need for new strategies to staunch the spread of HIV, the study authors argue, pointing out that HIV infection far outpaces access to anti-retroviral medications, 2.5 to 1. Around the world, each year 2.7 million new people are infected with HIV, and 2 million die from the disease.
*Correction: Dr. Markovitz’s name was previously misspelled as Marvovitz.
|
<urn:uuid:377a8083-1d97-479d-8de7-49c89c865f88>
|
CC-MAIN-2013-20
|
http://healthland.time.com/2010/03/16/how-bananas-could-help-prevent-the-spread-of-hiv/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699812416/warc/CC-MAIN-20130516102332-00060-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.965705 | 341 | 3.40625 | 3 |
To help pupils understand that prayer is part of a relationship with God.
Luke 18:9-14 – the parable of the Pharisee and the tax collector.
You will need:
A mobile phone
- Arrange, in advance, for someone to be waiting for a phone call from you during the assembly. It could be your mother or father or someone posing as them. Alternatively, you could arrange for the person to phone you during the assembly (when you are ready, dial the number you want and let it ring a couple of times as a signal to the person to ring you back).
- Rehearse the phone conversation in advance, along the lines indicated in the Content section below.
- Rehearse your reading or telling of the story of the Pharisee and the tax collector (Luke 18:9-14)
1. Begin by saying that you have got your mobile phone with you this morning (show it to the pupils). Comment how amazing it is that you can speak to anyone you like, as long as they are near a phone, within a few seconds. How is that possible? There are not so many messages rushing around the earth. This phone is not even connected by wires or cables! The technology is incredible!
2. Mention that you were told that ‘orange’ ones were good, but the shop only had black ones in stock!
3. Suggest that you could make a call, here and now, from the assembly! Explain that you know someone who is in, because you always have a chat on the phone at this time of day. Tell everyone that it’s your mother or father (don’t say the number!). Say that everyone will have a chance to talk to him or her. Ask the audience to keep very quiet until you give a signal and then they must shout, ‘Hiya Mum (Dad).’ Give the audience a practice at doing this before you phone.
4. Make the call and during the (pre-arranged) conversation, make sure you include the following:
- Say thank you for something;
- Say sorry about something;
- Ask for a favour;
- Make it appear that you are listening to some advice (eg by saying something like, ‘OK I will’);
- End by saying, ‘I love you’ so softly that you have to repeat it, to your ‘embarrassment’! Let everyone say ‘Hiya Mum (Dad)!’ and end the call.
5. Comment that your mobile phone is a good one but it’s got its limitations. For example, you have to keep it turned on and the batteries fade; it has to be within range and, as with any phone, the person you are trying to call has to be in and has to want to talk to you! Say that you doubt whether you could talk to the Queen, although there was a Canadian journalist who once managed it!
Talk with God
1. Explain that you have another mobile phone that’s usuable any time and at any range. It has free rental and there are no charges for calls. It’s called ‘prayer’. Christians think of prayer as being like a two-way conversation, a bit like using the phone. Then add that they may have noticed, though, how some people treat phones as though they are made for one-way conversations! They forget that there are two parts to a phone. Ask if they have ever had that sort of experience? (Hold the phone, outstretched, away from your ear!)
2. Comment that some people treat prayer like that, too. They keep on talking at God, instead of having a conversation with him.
3. Read or tell the story of the Pharisee and the tax collector (Luke 18:9-14) from a contemporary version of the Bible.
- Make the point that although we may not feel good enough to pray, that is the very attitude God is looking for in prayers! Instead of long, formal prayers, the Bible shows people talking to God as a person – which is what he is!
- Remind everyone that during your telephone call earlier, there were three very important things you said: there was a ‘thank you’, a ‘sorry’ and ‘a please’. And those are exactly the sort of things that many Christians try to include in their prayers with God: telling him about all the things that have happened to them and are going to happen; all the different ways in which they have felt, happy, angry, disappointed. Conversation with God – prayer – is about being real with someone who is always at the end of the line, never out, never switched off, and who never has flat batteries!
- The conversation you had on the phone earlier also included your listening to some advice and being reminded of some things you had forgotten. And there was also a chance to say how you felt about your mum (dad). For the Christian, these things are part of prayer too.
- Conclude by reminding everyone that conversation is part of a relationship; and prayer is part of our relationship with God. Like all relationships, it needs working at! Encourage pupils to talk with God. It’s good to talk.
|
<urn:uuid:adec99be-4c88-43f4-bcea-bc54a5484a1f>
|
CC-MAIN-2014-35
|
http://www.biblebasedassemblies.com/prayer-parable-of-pharisee-and-tax-collector/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832662.33/warc/CC-MAIN-20140820021352-00435-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.982651 | 1,105 | 2.84375 | 3 |
Mohamed contacted me through the website and asked “what is the clinical benefit of cidal versus static antibiotics?” It’s a great question, and one which often causes confusion.
In order to know when you shouldn’t use a static antibiotic and why a static antibiotic might fail you need to know which antibiotics are static and which are cidal. This information is available deep within 1000s of pages of reference texts like Mandell or Kucers! Alternatively it is easily accessible in Microbiology Nuts and Bolts clearly under each antibiotic and there are only 310 pages in our little book :-) P.S. you can buy it here
A bactericidal (“cidal”) antibiotic is one that kills bacteria without reliance on the patient’s immune system to help. A bacteriostatic (“static”) antibiotic is one that prevents the organism multiplying but it is the patient’s own immune system which kills off the bacteria and leads to recovery from the infection. So why does this matter?
In these specific scenarios either there is insufficient time for a static antibiotic to work before permanent damage occurs or the patient dies, or the patient does not have a properly functioning immune system to work with a static antibiotic. These scenarios include:
- Sepsis – the infection has become severe despite a functioning immune system and is so aggressive that the patient will die before a static antibiotic is able to help
- Meningitis and encephalitis – the infection will cause death or irreversible brain damage before a static antibiotic will help
- Endocarditis – the infection is in a site where the patient’s own immune system is unable to deal with the bacteria and therefore a static antibiotic won’t eliminate the bacteria as it is working alone
- Primary and secondary immunodeficiency – the patient doesn’t have a properly functioning immune system to work with a static antibiotic e.g. febrile neutropaenia
You should never use a static antibiotic in these clinical scenarios, you should always use cidal antibiotics.
Cidal antibiotics are:
- Beta-lactams e.g. penicillins, cephalosporins and carbapenems
- Macrolides e.g. Erythromycin, Clarithromycin
- Lincosamides e.g. Clindamycin
- Aminoglycosides e.g. Gentamicin
- Quinolones e.g. Ciprofloxacin
- Glycopeptides e.g. Teicoplanin, Vancomycin
These antibiotics are the mainstay of treatment for most infections in hospital. They work in severe infections and immunodeficiency. Hospital patients with infections are usually there because their infection is severe or their own immune system is unable to deal with the infection without help, so cidal antibiotics are the most appropriate.
Why have static then?
Static antibiotics still have a value, they still treat infections and sometimes there is not always something better; they can be the best treatment available. Why is this? Because they can target a specific bacterium or at least provide some cover when no other antibiotic will work.
If a patient in the community has MRSA they may be prescribed Doxycycline even though this is static. As the patient is not too sick their immune system can help eradicate the bacteria. Added to this is that it is an oral preparation; if a cidal antibiotic was used, e.g. Teicoplanin, the patient would have to be admitted to hospital for IVs. This exposes the patient to additional risk of hospital acquired infection and worse side effects let alone an increased cost. Is there no other cidal antibiotic which is oral in this situation? Well...not exactly...you may come across the odd MRSA which tests sensitive to erythromycin or ciprofloxacin but the majority are resistant to these cidal antibiotics and it would be unwise to choose them empirically.
Whilst static antibiotics do not kill bacteria they still have their uses. Doxycycline is really useful for treating skin and soft tissue infections and pneumonia, especially in primary care, and Tigecycline is a good antibiotic for resistant Gram-positive bacteria such as Glycopeptide resistant enterococci (GRE). The main clinical drawback to using static antibiotics in hospitals is they are not as effective in very unwell patients, they may however be used in combination with cidal antibiotics when there is no other choice.
Static antibiotics are:
- Tetracyclines e.g. Doxycycline
- Glycylcyclines e.g. Tigecycline
- Sulphonamides e.g. Sulphamethoxazole
- Fusidic acid
So let’s muddle it up...and see how confusion occurs:
- What we commonly consider to be cidal antibiotics are actually static at lower concentrations
- A small number of antibiotics are cidal against some bacteria but static against others!
Cidal antibiotics are only cidal if enough of the antibiotic is given; at low levels or doses they are actually static. For example low levels might inadvertently occur if inadequate doses are used to treat patients (e.g. an incorrect low dose or missing doses etc). I am also becoming increasingly concerned about the impact of obesity on our ability to achieve cidal antibiotic levels in these patients and I wonder if normal dosing in these large body masses is actually producing low levels and therefore only providing bacteriostatic therapy.
For the cidal antibiotics we sometimes measure their effectiveness in the laboratory using minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC). If the MIC or MBC was always the same for any given combination and bacteria we wouldn’t need to measure it. However “Joe Blogg’s” and “Paul Smith’s” S. aureus will have different MICs and MBCs with Flucloxacillin. The MIC and MBC are specific to each antibiotic and the bacterium it is tested against. For more about the difference between MIC and MBC see the website Microbiology Nuts & Bolts Testing Antibiotic Resistance. Traditionally we haven’t worried too much about MIC and MBC as the original work in the 1940s-1960s on these antibiotics showed we could easily reach cidal levels with normal dosing regimens. However, obesity may change this.
So we have established that some antibiotics can be static or cidal depending on the concentration of antibiotic but added to this is that some antibiotics can be either cidal or static depending upon which bacteria you are treating. Confused? Let me elaborate…
These mixed cidal and static antibiotics are unusual in that they are cidal against certain bacterial species but static against other bacterial species. It is the combination of antibiotic and bacteria that is important (e.g. antibiotic + bacteria A = antibiotic is cidal, antibiotic + bacteria B = antibiotic is static, antibiotic + bacteria C = antibiotic is cidal etc).
The group of antibiotics that are cidal against some bacteria but static against others include:
Let’s look at two situations:
- Chloramphenicol is second line therapy for meningitis in patients with a history of severe allergy to beta-lactams. It is cidal against the common causes of meningitis, Streptococcus pneumoniae, Neisseria meningitidis and Haemophilus influenzae; however it is static against all other bacterial species. It is a good choice for the severe infection meningitis as we want to kill off the bacteria quickly and without the need for the patient’s immune response to act. It may be used as a static agent in non-severe pneumonia where the patient has time to launch their own response.
- Linezolid is usually used as static antibiotic against infections caused by Gram-positive bacteria such as MRSA and GRE. However it is actually cidal against streptococci e.g. Streptococcus pneumoniae. NB It has no activity against Gram-negative bacteria.
So back to Mohamed’s original question; what is the clinical benefit of cidal versus static antibiotics? The simple answer is cidal antibiotics are of benefit when treating severe infections or infections in patients with immunodeficiency, but as I’ve explained it’s not always as simple as we would like.
Great question! Thanks Mohamed. If you have a question about something to do with microbiology that you think would make a good blog let me know, I’m always on the lookout for new topics.
|
<urn:uuid:d31adb0c-5ca8-4ad9-b8c9-631a62c7925a>
|
CC-MAIN-2017-26
|
http://www.microbiologynutsandbolts.co.uk/the-bug-blog/static-or-cidal-which-is-best
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00359.warc.gz
|
en
| 0.922034 | 1,807 | 2.609375 | 3 |
5 Platonic Solids, printed on a Black smooth Tee.
"If a particle of earth happened to be broken up into it’s constituent triangles, they will ‘drift about’ whether the breaking up within the fire itself, or within a mass of air or water - until its parts meet again somewhere, refit themselves together and become earth again" ~Plato
The Platonic Solids were first studied by the Greeks and known as the 5 perfect solid shapes besides the sphere to make up our physical universe. Plato, mathematicians and Alchemists came to associate these Solids with: Air, Water, Fire, Earth, and Aether. More recent advancements in science and technology are now revealing these patterns in molecular development. It has also been found that every element on our periodic table has a relation to the Platonic Solids based on their geometric structure. The ancients knew the beauty of the universe that we are rediscovering, to remember brings back our history with the earth through consciousness.<3
Thank you for your interest in Sacred Geometry and Esoteric Clothing.
Much love and light!
|
<urn:uuid:247bf992-ddbf-40a0-a696-809c835eba11>
|
CC-MAIN-2014-23
|
http://esotericlothing.tumblr.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267330.29/warc/CC-MAIN-20140728011747-00244-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.942544 | 229 | 2.671875 | 3 |
Some studies support the hypothesis that the bears are their closest relatives, while others support a closer relationship to the mustelids. Pinnipeds split from other caniforms 50 million years ago (Mya) during the Eocene.
When did bears and dogs diverge?
Divergence from miacids into carnivores is estimated to have occurred in the middle-Eocene around 42 million years ago.
Did dogs descend from bears?
Sorry to disappoint you, but bears and dogs are not directly related. They’re entirely different species that evolved from distinct biological families. Dogs are part of the Canidae family, which includes species like foxes, dingoes, and coyotes. Meanwhile, bears are part of the Ursidae family.
Do bears and dogs share a common ancestor?
Their ancestors evolved into a family of small mammals known as the Miacids (Miacidae). The bears, small bears and also the canines developed from the Miacids. Some of the canine species resembled bears, and we refer to them as bear dogs or Amphicyonidae.
When did the bear dog go extinct?
Though the temperatures cooled in the Oligocene, it was still quite warm and vegetation flourished in most locations around the world, including North America and Africa. Bear dogs became extinct 5 million to 10 million years ago.
Who would win Bear vs Tiger?
Winning facts for both Grizzly Bear and Siberian Tiger: Siberian Tiger is far better hunter than North American grizzly bear. Both grizzly bear and Siberian tiger paw swipes are equally powerful but tiger is more technical than grizzly. Siberian tiger canine teeth are longer and thicker than grizzly bear.
Are cats related to dogs?
Cats and dogs belong together, related to one another by a common ancestor. They share this ancestry with a whole suite of other animals, large and small. … Carnivorans (animals belonging to the order Carnivora) share various features, but the key one is in their teeth.
Are bears stronger than gorillas?
A grizzly beats a silverback 10 times out of 10. The average silverback weighs around 350 pounds and stands at 5-and-a-half feet tall. … So the gorilla tries to get around the grizzly, which proves pretty tough. While gorillas are quick — making speeds of up to 20 mph — the bears have them beat.
Are cats related to bears?
Cats are in the sub-order Feliformia, Family of Felidae, Genus of Felis, Species Felis Silvestris, and subspecies of Felis Silvestris Catus. Bears are in the sub-order of Caniforma, same as dogs, but in the. Bears are a family, called Ursidae with various species residing within that family.
What breed of dog has a beard?
German Wirehaired Pointer: Here’s a language lesson—the German word for beard is bart. Brussels Griffon: This Brussels’ got bristles. Bearded Collie: The name says it all! Scottish Terrier: All hail the Scottish scruff.
Why are bears scared of dogs?
Bears usually run from a dog because most bears have learned to associate dogs with people. However, a dog off leash may chase and harass the bear causing the bear to get angry and chase the dog. When dogs get scared they may run to their owner.
Are bears friendly to humans?
Bears are NOT ferocious.
They are NOT mean or malicious. Bears are normally shy, retiring animals that have very little desire to interact with humans. Unless they are forced to be around humans to be near a food source, they usually choose to avoid us.
Did seals evolve from dogs?
“Dogs and seals are not in the same family, however, and are not closely related. The family that compromises seals, Pinnipedia, split from other caniforms around 50 million years ago.” … For one thing, dogs use their four legs to move around.
What dog can kill a lion?
What are the 10 dogs that fight lions? Ten dog breeds are noted for their ability to catch and kill wild ones: Rottweiler, Wolf dogs, Neopolitan and Tibetan mastiff, Boerboel dogs, Rhodesian Ridgeback, and Bloodhounds, Fila Brasileiro, Dogo Argentino, and Kangals.
What dog can kill a bear?
Karelian Bear Dogs will hunt a variety of animals. Its quick reflexes and fearless nature have made it very popular for hunting large game including small black bears, moose, and wild boar. It was the breed’s ability to hunt bears that earned the breed its name.
Which dog is dangerous in world?
International Dog Day 2020: 6 most dangerous dog breeds in the…
- American Pit Bull Terrier. 1/6. American Pit Bulls are one of the most dangerous dogs and have been banned by many countries in the world. …
- Rottweiler. 2/6. …
- German Shepherd. 3/6. …
- American Bulldog. 4/6. …
- Bullmastiff. 5/6. …
- Siberian Husky.
|
<urn:uuid:71ef082c-545d-4df3-b85f-36694cdcc7e2>
|
CC-MAIN-2023-14
|
https://hhhunts.net/fowling/when-did-dogs-split-from-bears.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00122.warc.gz
|
en
| 0.943976 | 1,097 | 3.140625 | 3 |
Is Our Fear of Catching COVID-19 a Public Health Problem?
If irrational fear of the virus makes us ill, hope might make us well.
Posted April 30, 2021 | Reviewed by Lybi Ma
- The time between expecting something bad and experiencing something bad can be used to foster hope instead of fear.
- Positive anticipation can't change outcomes, but it can change how our sympathetic nervous system affects us while we anticipate outcomes.
- If worrying too much mysteriously makes us worse, hoping might mysteriously make us feel better than usual.
It’s just a word. Yet this word has brought the world to a standstill. Even if the virus can’t stop the world, the fear of catching it can. In fact, the odds of catching the fear of the virus are probably greater than the odds of catching the virus.
This probably has to do with why we’ve survived so far. We learn from our past, and that helps us avoid disastrous futures. That’s been terrific so far. But it’s not so terrific right now. This constant worry about tomorrow is making us sick today. Many are calling it coronaphobia. The very thought of getting this illness is enough to make us sick.
The Cure for Worry Is Hope
It’s just a word. Yet this word can make us feel better. Just say it out loud, and hope is here. It seems logical that—if irrational fear is making us sick—then hope might make us better. You see, worrying about getting sick shouldn’t make us sick (but it does).
If negative thinking can magically make us sick, why can’t positive thinking (magically) make us better? Doesn’t that make sense? The same things that make us ill for no apparent reason (neurotransmitters), will probably make us feel great for no apparent reason, too. Think of this as a psychological vaccine for the mind.
An Optimism Bias Can Offset a Pessimistic World
Do we have proof? Yes, we do. Pessimism bias? Meet optimism bias. The optimism bias is the belief that things will turn out okay, in the end, no matter what. Even if we can’t change the future per se, we won’t feel as depressed between now and then. The neuroscientist Tali Sharot puts it this way: “We can't all be better than everyone else. But if we believe we're better... we're more likely to get that promotion... because we're more social, more interesting” (Sharot, 2012, para. 8).
She’s not the only one who thinks so. Other scientists have found that simply creating positive expectations about the future can alleviate the symptoms of major depressive disorder. The time between now and the future is a very long opportunity to fiddle with our expectations. If we expect the worst, our sympathetic nervous system takes a big toll on us. But if we expect the best, the time between now and then becomes a chance to foster neurotransmitters that make us feel pretty good. It’s called future-directed therapy.
The Doctor Is In: Here Is Prognosis and Prescription
Our illness is simply that we worry too much.
The doctor’s advice? Hope.
Make hope the new pandemic.
Arora, A., Jha, A. K., Alat, P., & Das, S. S. (2020). Understanding coronaphobia. Asian Journal of Psychiatry, 54, 102384. https://doi.org/10.1016/j.ajp.2020.102384
Meinecke, L. (2013). Fostering anticipation: Looking forward to looking glass therapy. Retrieved from https://www.academia.edu/4160782/Fostering_Anticipation_Looking_Forward_to_Looking_Glass_Therapy
Saniotis, A. (2020). Editor’s prelude to special issue: Coronaphobia and fearscapes. Journal of Futures Studies, 25(2), 1-2. doi:10.6531/JFS.202012_25(2).0001
Sharot, T., Korn, C. W., & Dolan, R. J. (2011). How unrealistic optimism is maintained in the face of reality. Nature Neuroscience, 14(11), 1475-1479. doi:10.1038/nn.2949
Sharot, T. (2012). Tali Sharot: The optimism bias [Video file]. Retrieved from https://www.ted.com/talks/tali_sharot_the_optimism_bias
Vilhauer, J. S., Young, S., Kealoha, C., Borrmann, J., IsHak, W. W., Rapaport, M. H., & ... Mirocha, J. (2012). Treating major depression by creating positive expectations for the future: A pilot study for the effectiveness of future‐directed therapy (FDT) on symptom severity and quality of life. CNS Neuroscience & Therapeutics, 18(2), 102-109. doi:10.1111/j.1755-5949.2011.00235.x
|
<urn:uuid:9a11a9f5-270c-4625-b484-2d56c23c90cf>
|
CC-MAIN-2023-14
|
https://cdn3.psychologytoday.com/intl/blog/theory-and-praxis/202104/is-our-fear-catching-covid-19-public-health-problem
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00121.warc.gz
|
en
| 0.844502 | 1,138 | 3.015625 | 3 |
When was the last time you had some Brazil nuts? They are the big dark nuts that are shaped like a section of an orange and are difficult to crack. Yet oftentimes, the hardest nuts to crack reap the greatest rewards—and Brazil nuts are no exception!
In addition to offering enjoyment and nutrition, Brazil nuts are wild harvested in a unique manner that helps save Amazon rainforest. Tropical deforestation accounts for roughly 17 percent of global carbon emissions, factoring heavily into global warming. Despite the very best efforts of conservation groups and environmental policy makers, the world still loses more than 80,000 acre of tropical rainforests each day, according to figures from mongabay.com. As we become more aware of how our consumer choices affect the world, incorporating some rainforest-saving choices into our daily round is s simple way to help a very serious problem—and in this case a delicious and nutritious way too! Enjoy Brazil nuts on cereals, salads and pastas, in baked goods or as a snack knowing you are helping the Amazon rainforest with every bite.
So here's the scoop. Brazil nut trees have a unique distinction that makes them important to the preservation of the Amazon rainforest: they flourish only in the Amazon’s untouched rainforest. Thanks to a particular bee combined with soil content issues, attempts to cultivate Brazil nut trees on plantations have largely failed with only a few exceptions. Brazil nut trees just happen to be dependent on large-bodied orchid bees for pollination. While the orchid bees pollinate Brazil nut trees, the insects are mostly reliant on the pollen of orchids that grow almost exclusively in the rainforest. Hence, disturbed forests that lack orchids also lack orchid bees. Additionally, orchid bees do not “behave” (excuse the pun)—they are nonsocial or semi-social—in other words, humans cannot manipulate them to pollinate certain crops by transporting beehives from one plantation to the next. Basically, if you want to harvest Brazil nuts, you can only do it in healthy tropical Amazon rainforest. That’s the great news. A thriving Brazil nut trade keeps significant areas of the Amazon rainforest intact!
Currently, the Brazil nut is a highly valuable food source with profitable European and North American markets. Roughly 100,000 workers depend on revenue related to Brazil nut extraction, either directly or indirectly. Thus, they have a vested interest in preserving the forest where Brazil nut trees flourish. Harvesters have been called “guardians of the forest” and indeed they are. As Brazil nut trees lives for 500 to 1,000 years, several generations can reap the benefits of sustainably harvested Brazil nuts with no harm to the rainforest. Harvesters are hard-working people who gather the Brazil nut tree pods from the forest floor and open them with a machete, filling sacks with up to 175 pounds of nuts, which they carry on their backs!
Brazil nuts are considered the most viable non-timber forest product in the Amazon, and they are the only wild-harvested tree nut in the world. Bolivia is the top exporter ahead of Brazil, followed by Peru. These nuts are also harvested and exported on a much smaller scale from Venezuela, eastern Colombia, Guyana and French Guiana. Buying Brazil nuts helps to preserve the Amazon rainforest spanning all of these countries.
The Peruvian government lends areas of forest that are dense with Brazil nut trees as concessions to local harvesters who manage them under contracts with the Peruvian forest service. Many harvesters receive help from a nonprofit organization called the Amazon Conservation Association through the Brazil Nut Program, which provides harvesters in the Madre de Dios river area with the latest innovations for sustainable extraction. The Peruvian harvesters sell the nuts to local shelling factories, which export the product overseas. This activity accounts for more than half the yearly income for thousands of families in the Amazon and protects several million acres of forest from destruction. In fact, Peru’s sustainable standard for Brazil nut extraction was recognized by the Forest Stewardship Council (FSC)—the first FSC accolade for an NTFP.
As long as Brazil nut exports remain a viable market and provide income to harvesters, the rainforest will escape pillaging by damaging avenues of economic survival, like panning for gold, logging, slash-and-burn agriculture or cattle ranching.
Here's how you can help. Go to the market, buy some Brazil nuts and eat ‘em up. Keep a regular supply in your home. Simply buying and consuming Brazil nuts (or Brazil nut oil) on a consistent basis will help preserve the Amazon rainforest by contributing to demand. Consumer power at its best!
You can find Brazil nuts and Brazil nut oil products at most supermarkets and larger health retailers and online. Buy organic whenever possible, as this is more likely to ensure the nuts are sustainably harvested.
Rich in selenium, copper, magnesium, fiber, vitamin E, amino acids and essential fatty acids, Brazil nuts are one of the few nuts to have enough amino acids to make a complete protein. One nut contains 780 percent of the U.S. recommended daily allowance of selenium—a powerful antioxidant that is believed to help protect against breast and prostate cancers.
Enjoying these nutritious, rainforest-saving nuts is easy. Try roasting them. Enjoy them whole or chop and sprinkle them on salad, pasta, plain yogurt with honey or oatmeal. Buy them in a nut mix to enjoy at holiday time. Add them in place of walnuts in any of your favorite baking recipes—cookies, breads and holiday fudge. Brazil nut oil is excellent for salad dressings, adding a delicious nutty flavor. You can cook with it too!
Known for its restorative properties, Brazil nut oil is also great rubbed into your skin or hair. Bath and body products from the Body Shop and Burt’s Bees both carry products with Brazil nut oil (from sustainable sources too!).
For the Amazon's sake, we could all go a little nuts for Brazil nuts. Go nuts and save the rainforest at the same time!
|
<urn:uuid:e3f34e85-3a66-45df-9444-ee27ee4c4ed0>
|
CC-MAIN-2013-20
|
http://www.christinacooks.com/living-the-well-life/the-amazon-saving-wonders-of-brazil-nuts
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00076-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.941538 | 1,270 | 3.1875 | 3 |
Square Cross Sections Perpendicular to x-Axis
- Steve Phelps
I want to build square cross sections between the parabola and the x-axis. 1. Enter the function. I entered f(x) = -(x-1)(x-6). I did not use a doman restriction. 2. This only works if the EDGES of the solid are formed using parametric equations. This is the CURVE() command in GeoGebra. 3. Enter a = curve(t,f(t),0,t,1,6). This is the functions expressed parametrically. Parametrically, this is x(t) = t, y(t) = f(t), z(t) = 0, as t varies from 1 to 6 4. By habit, I name the edge ABOVE a as aa. Enter aa=curve(t,f(t),f(t),t,1,6) 5. Then, enter b=curve(t,0,0,t,1,6) for the edge along the x-axis 6. Enter bb=curve(t,0,f(t),t,1,6) for the edge above b.
To graph the top surface, enter Surface( u aa(t) + (1-u) bb(t), u,0,1,t,1,6) Think of this as the parameter u being used to stretch one curve to another.
To graph the rear surface, enter Surface( u a(t) + (1-u) aa(t), u,0,1,t,1,6)
To graph the bottom surface, enter Surface( u a(t) + (1-u) b(t), u,0,1,t,1,6)
To graph the front surface, enter Surface( u b(t) + (1-u) bb(t), u,0,1,t,1,6)
|
<urn:uuid:0252d13d-493c-4313-b949-4b3be76eda4b>
|
CC-MAIN-2023-23
|
https://stage.geogebra.org/m/pjwnf2wk
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00714.warc.gz
|
en
| 0.800861 | 442 | 3.734375 | 4 |
In the course of his eighty-eight years he would survive the Battle of Gettysburg and Union prison camps, have a city named after him, and become the patriarch of a family of thirteen children and one hundred grandchildren.
But surely January 4, 1912 was among the happiest of all days in the long life of William Letchworth Hurst (1834-1922).
In 1860 Hurst, wife Mary, and children (including two-year-old Nathan) were living in Claiborne County, Tennessee.
After the war, by 1870 Hurst and his family had moved to Tarrant County from Tennessee by covered wagon, a trip of six weeks.
In 1881, when Hurst’s son Nathan was twenty-three, two strangers had paid Nathan $10 to help them drive some horses north to Gainesville and sell them. Unbeknownst to Nathan, the two men had stolen the horses. Soon the law was on the trail of the trio. When confronted, the two men fled, but Nathan, not knowing that the horses were stolen, stood his ground. He was arrested, convicted, and sentenced to twelve years in prison at Huntsville.
After three months in prison Nathan Hurst escaped—on a mule—and disappeared.
Soon after, a young man calling himself “William Hammond” arrived in St. Joseph, Missouri and began to make a name for himself as a prosperous, honest businessman, family man, and civic leader. He served as deputy sheriff and constable. But members of his household did not know about his past.
Meanwhile, ever since Nathan Hurst had escaped from prison, father William Hurst had worked to secure a pardon for his son. He collected the signatures of the jurors who had convicted Nathan. He applied for a pardon to three successive Texas governors. All refused. “Let the wrongdoer return to prison before he is pardoned” was their stance. (Photo from Tarrant County College NE.)
Finally, in late 1911 William Hurst appealed to newly elected Governor Colquitt, stressing the exemplary life of the man known as “William Hammond” of Missouri. Colquitt was moved. He granted the pardon on Christmas Day 1911.
William Hurst, by then seventy-eight years old, personally delivered the pardon to his son in Missouri on New Year’s Day 1912. And on January 4 father brought son home—home to the family farm south of the town of Hurst, home to resume a life interrupted. (The “Hurst lake” in the clip is Hust Lake, named not for the Hurst family but rather for John A. Hust, the county’s first tax assessor, who lived nearby.)
The Hurst homestead is labeled on this 1895 map near “Hurst” Lake and the water mill of R. A. Randol.
“William Hammond” soon legally reclaimed his birth name. Nathan Hurst also revealed his past to his wife and children. Wife and children left Missouri and joined Nathan and his father at the Hurst family farm.
The reunion of father and son lasted only nine years. Nathan Hurst died in 1921. Clip, from the May 18 Star-Telegram, does not mention his interesting past or list his father as a survivor.
William Letchworth “Uncle Billy” Hurst died in 1922. Clip is from the June 27 Star-Telegram.
William Hurst is buried in Bedford Cemetery. His son is buried in Mount Olivet.
Postscript: Why is that city called “Hurst”? In 1903, as the Rock Island railroad was laying track to connect Fort Worth to Dallas, the railroad wanted to lay its track across land that William Letchworth Hurst owned near present-day Highway 10 (including land where Bell Helicopter is). Hurst granted a right-of-way. In return, when the railroad built a depot, the Rock Island named it “Hurst Station.” A town grew up around the depot.
The town, still known as “Hurst Station” into the 1930s, incorporated as “Hurst” in 1950. (The Arwines were early settlers in the Hurst area.)
|
<urn:uuid:e66bd9d0-45c9-49a1-bfc2-04f1cdbac374>
|
CC-MAIN-2020-24
|
https://hometownbyhandlebar.com/?p=2713
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432237.67/warc/CC-MAIN-20200603050448-20200603080448-00074.warc.gz
|
en
| 0.981949 | 886 | 2.875 | 3 |
This image can be used commercially
Rope making, Peak Cavern, Castleton, 1818
About this image
This engraving was taken from E Rhodes' 'Peak Scenery'of 1818.
This cave was formally known as the 'Devils Arse' before being called Peak Cavern. It is in the centre of the village, right underneath Peveril Castle. It has the largest natural cave entrance in Britain and the second largest in the world! It even claims to have had a pub in it at one time. The stream that drains from Peak Cavern through the village is claimed by local legend to result from Satan urinating inside the cavern! The underground river (called the River Styx) formed the cave, and as the cave grew, the first part of the cave ceiling collapsed. A small gorge was formed which leads to today's cave entrance, 20m wide and 30m high below a high limestone cliff. The room behind the entrance is more than 100m long and was used by the inhabitants of Castleton for several hundred years. The cave is a shelter against rain and was the largest 'dry' place on the isles for a very long time. The damp atmosphere made it ideal for rope making, the remains of which can still be seen today. Extracted from www.showcaves.com
|
<urn:uuid:e7a7e92c-8e49-4097-900a-05064669b4c2>
|
CC-MAIN-2020-34
|
https://picturethepast.org.uk/image-library/image-details/poster/dchq006508/posterid/dchq006508.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737238.53/warc/CC-MAIN-20200808021257-20200808051257-00068.warc.gz
|
en
| 0.970959 | 271 | 2.53125 | 3 |
Colorado’s decade-long efforts to boost renewable energy and cut greenhouse gases could give the state a head start in meeting proposed new pollution standards from the EPA.
The rules announced Monday by the Environmental Protection Agency call for reducing carbon dioxide emissions from coal-burning power plants by 2030.
Former Colorado Governor Bill Ritter now heads the Center for the New Energy Economy in Fort Collins. Ritter says Colorado should meet the EPA’s goal ahead of time.
“Colorado is a long way down the road to achieving all of what’s going to be required of other states by 2030,” Ritter says. “We’re way down the road and should get most of it done by 2020.”
Xcel Energy has been increasing renewables and phasing out coal-burning power plants for years in Colorado. The company says it has already reduced carbon emissions by 19 percent since 2005.
Colorado became the first state with a voter-approved solar standard 10 years ago with Amendment 37 (PDF). In 2010, the Colorado Renewable Energy Standard (PDF) required investor-owned electric utilities to provide 30 percent of their energy from renewable sources by 2020, with 3 percent coming from distributed generation.
The law has forced energy producers to switch from coal to natural gas and the transition has been relatively smooth.
In 2013, 66 percent of the electricity generated in Colorado came from coal, 17 percent from natural gas and 17 percent from renewable energy resources, according to data from the U.S. Energy Information Administration.
Companies that generate electric power with anything other than coal, or that produce power-saving technology, are likely to benefit from the Obama Administration's new proposed limits on carbon dioxide emissions from power plants.
Natural gas producers, nuclear generators, wind farm operators, solar panel makers and efficiency technology companies may all come out as winners under the plan. Coal stands to be a big loser.
Electric customers in other states could pay higher prices for power but Public Utilities Commission Chair Joshua Epel says that’s unlikely for customers in Colorado.
Critics say the new EPA rules could hurt the U.S. economy but Epel says that since Colorado is already on the same path, the state hasn’t seen a negative economic impact.
“I’d say the different strategies – the fuel switching and energy efficiency – have really helped Colorado because we have a greater fuel mix, or diversification of fuel, than most other states do,” Epel says.
As more states turn to natural gas, other critics say the competition could drive the prices up. Epel says that is a primary concern and that the PUC has taken steps to help counter that as a possibility.
“The PUC approved this year 450 MW additional wind and 170 MW of commercial solar,” Epel says. “That’s really a hedge against increases in natural gas prices. As long as we deep finding that balance, that right type of mixture, that’s the best protection against increases in any of commodity prices.”
The plan is a centerpiece of President Barack Obama's efforts to deal with climate change. Each of the 50 states will now determine how to meet individual targets set by the EPA, and then submit the plans for approval.
The push against the new federal standards has been strongest in some states that have big coal mines or rely heavily on coal-fired power plants. Lawmakers cite concerns that new federal regulations could drive up the cost of electricity for residents and businesses.
The Associated Press contributed to this report.
|
<urn:uuid:db67098d-d7f3-410a-b655-e5d76be85c84>
|
CC-MAIN-2020-05
|
https://www.cpr.org/2014/06/02/colorado-well-positioned-for-pollution-standards/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250605075.24/warc/CC-MAIN-20200121192553-20200121221553-00403.warc.gz
|
en
| 0.943364 | 731 | 3 | 3 |
A fracture of the calcaneus, or heel bone, is a serious and disabling injury that can lead to longstanding problems in the foot and ankle. Calcaneus fractures can cause intense pain and make walking more difficult. Without treatment, they may worsen and further damage the broken bone. Because these types of fractures can be hard to treat, it’s imperative to get the best help from the most experienced foot and ankle specialists, like those you’ll find at Advanced Orthopedic & Sports Medicine Specialists in Denver, Parker, and Aurora, Colorado. No one needs to suffer from the pain or possible complications from this fracture.
A calcaneus fracture is one or more small breaks in the heel bone (calcaneus). They are relatively uncommon, accounting for approximately 2% of the total number of foot fractures. Most are closed injuries, meaning the skin is intact. When the skin around the fracture is broken, this may represent an open fracture, also called a compound fracture. An open fracture is an emergency that requires urgent surgery.
WHAT IS A CALCANEUS FRACTURE?
Fractures of the calcaneus may or may not involve the subtalar and surrounding joints. Fractures involving the joints (intra-articular fractures) are the most severe calcaneus fractures and include damage to the cartilage (the connective tissue between two bones). If the fracture does involve the joints, there is the potential for long-term consequences, such as arthritis and chronic pain. Fractures that do not involve the joint (extra-articular fractures) include:
- Those caused by trauma, such as avulsion fractures (in which a piece of the bone is pulled off of the calcaneus by the Achilles tendon or a ligament) or crush injuries resulting in multiple fracture fragments
- Stress fractures caused by overuse or mild injury
Males ages 30 to 50 fracture their calcaneal most often of any age group or sex. Calcaneus fractures are commonly suffered by roofers and climbers after a fall, although automobile accidents can also cause such fractures to the heel bone. One’s more likely to get a calcaneus stress fracture if they participate in activities or sports that involve repetitive movement, including:
- Long-distance running
- Track and field sports
Other factors that increase the risk of calcaneus fractures include:
- Having an eating disorder
- Using tobacco or overusing alcohol
- Working a job that involves heavy physical labor
|
<urn:uuid:02eba1d1-2eb4-4625-8cd4-c0a55752bbfb>
|
CC-MAIN-2023-40
|
https://advancedortho.org/calcaneus-fracture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00530.warc.gz
|
en
| 0.914093 | 528 | 2.953125 | 3 |
Open-File Report 2014-1220
Shallow Geology, Sea-Floor Texture, and Physiographic Zones of Buzzards Bay, Massachusetts
The geologic framework and seabed character of the Massachusetts coastal ocean is complex and difficult to map. Previous studies have defined the geology and texture of the sea floor in the Buzzards Bay area on the basis of widely spaced geophysical tracklines and vibracores (Robb and Oldale, 1977; O’Hara and Oldale, 1980) or sediment samples (Hough, 1940; Moore, 1963; Ford and Voss, 2010). Mapping methods for homogenous, nonglaciated regions rely on the contouring changes in grain size (Hollister, 1973), but the substrate variations over short distances in the Buzzards Bay area, common in previously glaciated regions, occur over spatial scales that are typically smaller than a sampling grid can resolve. A study by the U.S. Geological Survey (USGS), in cooperation with the Massachusetts Office of Coastal Zone Management (CZM), provided high-resolution geophysical datasets with full sea-floor coverage, supplemented with sediment samples and bottom photographs. These datasets provide the source for surficial to shallow subsurface geologic maps, high-resolution sediment texture maps, and physiographic zone delineations that were previously unfeasible because of a lack of high-quality, high-density sea-floor mapping data.Purpose and Scope
The purpose of this report describes the geologic framework and sea-floor character of Buzzards Bay (fig. 1). Interpretive maps of the shallow stratigraphy, surficial geology, surficial sediment texture, and physiographic zones are presented. The geologic interpretations in this report are based on several geophysical surveys (table 1), on bottom photographs (Ackerman and others, 2014), and on sediment sample databases (Ford and Voss, 2010; McMullen and others, 2011) edited by the Massachusetts Office of Coastal Zone Management (written comunn., 2012). Interpretations and associated data are provided as geospatial data layers in Esri ArcGIS formats (Appendix —Geospatial Data). This research was conducted as part of a cooperative program of the USGS and CZM. This cooperative mapping program provides interpretive geologic datasets that can be used by managers and scientists to delineate marine resources, assess environmental change, inventory marine habitats, and support research concerning sea-level change, sediment supply, and coastal evolution. Detailed information and mapping products related to this cooperative program can be accessed at http://woodshole.er.usgs.gov/project-pages/coastal_mass/.Geographic Setting
Buzzards Bay is an embayment in southeastern Massachusetts (fig. 1). Buzzards Bay has mean water depths of 5 to 10 meters (m) near the bay head and 20 m near the bay mouth (Signell, 1987). The south coast of mainland Massachusetts (the irregular coast extending from Westport to Wareham), the west coast of Cape Cod, and the Elizabeth Islands partially enclose the bay. The mouth of the bay opens to Rhode Island Sound and connects with Vineyard Sound through narrow straits between the Elizabeth Islands. The Cape Cod Canal, excavated in 1914 along the Manomet River valley, connects the head of Buzzards Bay with Cape Cod Bay. Several rivers enter elongated coastal embayments (drowned valleys) along the western margin of Buzzards Bay between the Cape Cod Canal and the Rhode Island border. In contrast, the Buzzards Bay moraine makes topography in western Cape Cod relatively steep, resulting in a coastal landscape with limited drainage area along the eastern border of Buzzards Bay. Consequently, the coast does not have drowned river estuaries and coastal embayments are relatively small.Geologic Framework
Proterozoic bedrock surrounds and is inferred to underlie the entire Buzzards Bay basin (Zen and others, 1983). Cretaceous and early Tertiary strata (coastal plain deposits) are known to be present southeast of the Elizabeth Islands beneath Vineyard Sound but not beneath Buzzards Bay, where they are suspected to have been eroded during the late Tertiary by fluvial processes and Pleistocene glaciation (O’Hara and Oldale, 1980). Subaerial erosion of the bedrock surface established a southward- to southeastward-flowing drainage surface, which is expressed in the present ridge and valley topography of the south coast of mainland Massachusetts (FitzGerald and others, 1987). The depth to the bedrock surface varies from 0 to 25 meters below sea level (mbsl) along the northwest shore to the head of the bay and increases to the east: about 65 mbsl near the center of the bay (Brocher and Ewing, 1986), between 45 and 85 mbsl near the east shore of the Bay along Cape Cod (Fairchild and others, 2013), and about 100 mbsl along the southeast shore of the bay along the Elizabeth Islands (Oldale, 1969).
Several geologists have mapped the onshore surficial geology surrounding Buzzards Bay in detail, and their findings have been compiled on maps by Stone and DiGiacomo-Cohen (2009) and Stone and others (2011). Geologic units define surficial boundaries between bedrock, glacial till, glacial moraine, coarse- and fine-grained glacial stratified deposits, and postglacial deposits. Glacial stratified deposits are further divided into glaciofluvial, glaciodeltaic, and glaciolacustrine deposits. These glacial meltwater sediments were deposited within glacial lakes and outwash systems that grade from ice-proximal to ice-distal facies. Along the northwest shore of Buzzards Bay, till and underlying bedrock form a series of ridges and headlands. Stratified drift of glaciofluvial and glaciolacustrine origin partially fills the valleys between them (FitzGerald and others, 1987; Bent, 1995; Stone and others, 2011).
Beneath Buzzards Bay, Robb and Oldale (1977) mapped bedrock, glacial drift (including till, moraine, ice-contact, and outwash deposits), transitional deposits (including glaciofluvial, estuarine and nearshore deposits related to the Holocene transgression), and recent marine deposits. Stratigraphic units mapped in eastern Rhode Island Sound by O’Hara and Oldale (1980) include Paleozoic bedrock, coastal plain deposits, Buzzards Bay moraine deposits, and glacial drift (including ice-contact stratified drift, outwash plain, and glaciolacustrine deposits). A regressive unconformity was identified at the base of postglacial fluvial and estuarine deposits, and a marine transgressive unconformity was identified at the base of marine beach and bar deposits and recent quiet-water marine deposits.Depositional History
The geology of Buzzards Bay basin is broadly defined by the underlying bedrock structure and glacial processes related to late Pleistocene glacial advance (marine isotope stage 2). Glacial moraines (fig. 2) and drift were deposited by the Buzzards Bay lobe of the Wisconsinan Laurentide ice sheet, which reached its maximum extent at Martha’s Vineyard, forming a terminal moraine between 25.5 and 28 thousand years (ka) before present (BP) (Uchupi and others, 1996; Oldale, 2001; Balco and others, 2002; Boothroyd and Sirkin, 2002; Balco, 2011). The Buzzards Bay lobe retreated and readvanced, forming the Buzzards Bay moraine between 20.5 and 22.5 ka BP (Balco, 2011); the moraine shapes the Elizabeth Islands and much of the west coast of Cape Cod (Mather and others, 1942; Oldale and O’Hara, 1984). With the retreat of the Buzzards Bay lobe, outwash, derived from a readvance of the Cape Cod Bay lobe, was deposited between the Buzzards Bay lobe and the Buzzards Bay moraine along the west coast of Cape Cod (Oldale, 1976; Larson, 1982). With continued retreat of the ice front, glacial till and stratified drift were deposited in what is now Buzzards Bay (Robb and Oldale, 1977). When the Buzzards Bay lobe retreated northward, the Wareham pitted plain was deposited along the northeast shore at the head of Buzzards Bay (Larson, 1982). These outwash valleys and drainage of Glacial Lake Cape Cod (which formed in the present location of Cape Cod Bay, north of the Sandwich moraine, as the Cape Cod Bay lobe retreated) through the Monument (Manomet) Valley outlet (Woodworth and Wigglesworth, 1934) contributed to the establishing of drainage patterns within the Buzzards Bay basin.
The character of the sea floor and shallow subsurface was strongly influenced by glaciofluvial and fluvial erosion during the last sea-level lowstand and by processes associated with subsequent Holocene sea-level rise and inundation. Postglacial fluvial systems also incised a drainage network into the subaerially exposed glacial drift of the Buzzards Bay basin, and fluvial modification of the drainage basin continued until approximately 8000 years BP, when sea level began to transgress the glacial, glaciofluvial, and estuarine deposits (Robb and Oldale, 1977; O’Hara and Oldale, 1980). Subsequently, marine sediments filled or partially filled fluvial and estuarine tidal channels primarily in the deeper areas of the basin. The postglacial paleodrainage is partially expressed in the bathymetry of the bay, particularly in the southwest segment of the study area (Hough, 1940; Moore, 1963; Robb and Oldale, 1977).Previous Geologic and Sediment Mapping
Robb and Oldale (1977) completed the only geologic mapping study of Buzzards Bay, and O’Hara and Oldale’s (1980) maps of Eastern Rhode Island Sound extend to the mouth of Buzzards Bay. These studies collected widely spaced (approximately 2000 m apart) boomer seismic-reflection profiles and provided a broad stratigraphic framework and general surficial geologic mapping of Buzzards Bay. Both studies incorporated limited vibracore collection and analysis. These previous studies produced a series of structure and isopach maps along with surficial geologic maps.
Previously published sea-floor sediment texture maps of Buzzards Bay are based on sediment sample data only (Hough, 1940; Moore, 1963). Although these studies provide a general picture of sediment distribution in the bay, the spacing of the sampling grid limits their use in resolving spatial changes. Poppe and others (2007, 2008) mapped sea-floor character in detail in the vicinity of Quicks Hole and Woods Hole on the basis of interpretation from acoustic backscatter, multibeam bathymetry, seismic-reflection profiles, surficial sediment samples, and bottom photographs. Ford and Voss (2010) recently compiled a database consisting of grab sample, video, and photographic data for Massachusetts state waters, which includes Buzzards Bay. Ford and Voss (2010) evaluated their compiled datasets for data quality and generated sea-floor sediment texture maps by using gridding and Thiessen polygon analysis.
|
<urn:uuid:a58bb24a-c0ea-46a3-af37-ca2bedcd2e75>
|
CC-MAIN-2023-40
|
https://pubs.usgs.gov/of/2014/1220/ofr2014-1220-introduction.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00439.warc.gz
|
en
| 0.907019 | 2,370 | 2.640625 | 3 |
Murals and Sculptures of Basgo Monastery
Located among the ruins of a citadel in Ladakh in northern India, Basgo Monastery is known for its historical ruins and temples, which are among the oldest surviving structures of their kind.
Constructed on a steep hilltop overlooking a valley, Basgo was a place of commercial and strategic importance, and was maintained as a royal citadel by successive generations of the Namgyal Dynasty. The citadel, which dates to the fifteenth century, comprised a fortress, a palace, the three temples, residences of nobility, and chorten (votive stupas). It was abandoned in the nineteenth century following a military attack, but the temples remain functional and are used by the people of the Basgo village even today.
The three temples of Basgo are dedicated to the Maitreya Buddha. The murals found in these temples are considered significant as they show a marked shift towards a Central Tibetan style of painting, which scholars attribute to the rising influence of Central Tibetan monastic orders in Ladakh in the fifteenth century.
The largest temple in the complex is the Chamba Lhakhang, commissioned by the Ladakhi king Tashi Namgyal and built during the reign of his successor Tsewang Namgyal in the sixteenth century. In addition to the stucco statue of the seated Maitreya, the temple also includes several brightly coloured murals. The gilded statue, 14 metres in height, is placed in an offset of the temple and is flanked by painted stucco sculptures of Padmapani and Vajrapani. The murals depict scenes from the life of Shakyamuni Buddha, the Five Buddhas (also known as the Tathagata Buddhas), Tara and other deities of the Vajrayana Buddhism pantheon. Both gold leaf and gold paint have been used in these paintings. There is also a miniature mural depicting king Tsewang Namgyal and his court, dressed in the Kashmiri-Mughal attire prevalent at the time.
The Serzang Lhakhang, also known as the Chamba Serzang, dates to the early decades of the seventeenth century. Inside is a 6-metre stucco sculpture of Maitreya that is clad in thin copper sheets and studded with semi-precious stones. The murals here depict divinities associated with good health and prosperity, such as the medicine Buddha, the Five Buddhas and their related deities and protector gods, and gurus of the Drukpa Kagyu lineage. The temple also houses copies of the Kanjur and Tenjur, which were commissioned by the king Senge Namgyal and were written in gold, silver and copper letters.
At both the Chamba Lhakhang and the Serzang Lhakhang, the murals feature predominantly benign deities. In contrast, the murals of the Cham Chung Temple, dated to the seventeenth century, depict solely wrathful deities such as Yama, Mahakala and Yamantaka. It also contains a stucco statue of Maitreya, seated on a platform, which is smaller than those found in the other two temples.
The temples at Basgo fall under the aegis of the Hemis Monastery and are maintained by monks of the Drukpa Kagyu monastic order. Around the 1970s, the temples came under threat as the hill on which their foundations rested began to erode. The situation spurred a large-scale conservation effort led by the local Basgo Welfare Committee and supported by several national and international agencies. The restoration project received the UNESCO Asia-Pacific Heritage Award of Excellence in 2007.
Dhar, Sanjay. “Basgo: Chamba Lhakhang (Temple).” Sahapedia, December 6, 2018. https://www.sahapedia.org/basgo-chamba-lhakhang-temple.
Dhar, Sanjay. “Basgo: Cham Chung.” Sahapedia, December 6, 2018. https://www.sahapedia.org/basgo-cham-chung.
Dhar, Sanjay. “Basgo: The Remains of a Royal Precinct.” Sahapedia, December 6, 2018. https://www.sahapedia.org/basgo-the-remains-of-royal-precinct.
Sharma, Tara, and Mark Weber. “Temple Guardians: A community’s initiative in conserving its sacred heritage.” Context: Built, Living and Natural 8, no. 1 (Spring–Summer 2011): 77-84. https://www.wmf.org/sites/default/files/article/pdfs/Basgo%20Context%20article%202011.pdf
Snellgrove, David L, and Tadeusz Skorupski. The Cultural Heritage of Ladakh, Volume 1: Central Ladakh. Warminster: Aris & Phillips, 1977.
World Monuments Fund. “Basgo Gompa (Maitreya Temples).” Accessed December 6, 2021. https://www.wmf.org/project/basgo-gompa-maitreya-temples.
|
<urn:uuid:255db631-c14c-44ec-93df-b60e938a6109>
|
CC-MAIN-2023-14
|
https://mapacademy.io/article/murals-and-sculptures-of-basgo-monastery/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00698.warc.gz
|
en
| 0.936026 | 1,118 | 3.546875 | 4 |
FRACTURES OF THE HUMERUS
DAVID M NUNAMAKER
Fractures of the Proximal Humerus
Fractures of the Shaft of the Humerus
BONY ANATOMY IN THE MATURE DOG OR CAT
The humerus is enlarged proximally and forms a smooth articular surface that articulates with the scapular glenoid; this surface is termed the humeral head. Immediately adjacent laterally and anteriorly is the largest protuberance, the greater tubercle. Medially a much smaller lesser tubercle exists.
The proximal humerus tapers through the metaphysis and forms the diaphysis. The humeral diaphysis tapers to an isthmus, which is located approximately midshaft. The distal humerus enlarges through the metaphysis and forms the medial and lateral humeral condyles. The medial condyle is larger than the lateral one and occupies a position more in axial alignment with the diaphysis than the lateral condyle. The articulating surfaces of the humeral condyles are called the trochlea, which apposes the ulna, and the capitulum, which apposes the radial head. The humeral shaft is straight when viewed cranially; however, when viewed laterally it is S-shaped. Beginning proximally the diaphysis curves first caudally to midshaft then curves cranially as the diaphysis approaches the distal condyles (Figs. 22-1 and 22-2).
The normal humeral anatomy in the cat mimics that of the dog. The variations that exist are minor: the diaphysis is of a more uniform diameter than in the dog, diaphyseal curvature is less, the supratrochlear fossa is not completely penetrated, and finally the medial epicondyle possesses an epicondyloid fossa through which the ulnar nerve passes (Fig. 22-1, C).
BONY ANATOMY IN THE IMMATURE DOG OR CAT
The immature animal has three epiphyses of significance. The epiphysis of the humeral head may be separate from or confluent with the greater tuberosity epiphysis. The contact surface between the epiphysis and metaphysis forms an angle of approximately 102¡, which allows the epiphysis to sit upon the metaphyses. Premature closure of any portion of this growth plate can result in accentuated caudal curvature of the proximal humeral diaphysis.
The greater tubercle epiphysis sits upon the growth plate. Most separations of this epiphysis occur simultaneously with separation of the humeral head epiphysis. Premature closure of this growth plate may result in a shortened humeral diaphysis or a straighter diaphysis.
The distal epiphysis is composed of the articulating portions of both the medial and lateral humeral condyles. The proximal surface of the epiphysis is concave and apposes the slightly convex metaphysis. Premature closure or cessation of growth may result in humeral shortening or bowing if the closure is asymmetric.
BLOOD SUPPLY TO THE HUMERAL SHAFT
In the mature dog or cat the major diaphyseal artery enters the bone in midshaft on the caudal surface. It is a branch of the collateral radial artery that branches from the caudal circumflex humeral artery. The immature dog or cat may have diaphyseal blood supply from vessels in muscles originating or inserting at either end of the diaphysis.(4)
FRACTURES OF THE PROXIMAL HUMERUS
Fractures of the humerus in the dog occur throughout its length and some fractures may pose special problems of reduction and stabilization.(1-3,5) Fractures of the head of the humerus are usually seen in young dogs with open, growing physes. A complete Salter type I fracture of the proximal physis of the humerus is an uncommon injury but one that can usually be handled through closed reduction and stabilized by means of a soft padded dressing that coapts the humerus to the chest wall. A Velpeau sling may be useful for this type of fixation. Usually the splint must be in place only about 2 weeks to ensure a satisfactory end result. Occasionally the proximal epiphysis of the head of the humerus or of the greater tubercle may be split, requiring open reduction and internal fixation, usually with small Kirschner wires. The approach can be made in front of, through the middle of, or behind the deltoid muscle depending on the location of the fracture. Little dissection is necessary, since the tissue planes are usually adequately separated at the time of injury. Small Steinmann pins or Kirschner wires can be inserted through the proximal metaphyseal aspect of the anterior portion of the humerus and slid perpendicularly into the humeral head to maintain its position on the shaft of the humerus. If the greater tubercle of the humerus is involved, the pins may be directed from the tip of the greater tubercle down through the physeal line and into the metaphysis of the humerus. When using these internal fixation methods, no external immobilization is used postoperatively. It is, however, important to immobilize the animal by restricting its activity for 4 to 6 weeks.
FIG. 22-1 Line drawings representing two views of a mature normal humerus in a German shepherd (A), a dachshund , and a domestic short-haired cat (C) Figures illustrate comparative anatomy and are not drawn to the same scale.
FIG. 22-2 Cranial-caudal (A) and medial-lateral (a) radiographic views of a normal humerus from a Great Dane.
FRACTURES OF THE SHAFT OF THE HUMERUS
INTERNAL FIXATION TECHNIQUES
Shaft fractures of the humerus occur commonly and may be transverse, oblique, spiral, or comminuted. Transverse fractures are adequately stabilized after open reduction with intramedullary fixation techniques. In some simple transverse midshaft fractures, closed reduction with intramedullary pinning can be accomplished. Most fractures, however, do require open reduction, since overriding is a common sequela of the fracture (Fig. 22-3). For simple midshaft fractures any form of intramedullary fixation may suffice (Fig. 22-4). Kuntscher nailing, single or multiple Steinmann pinning, as well as Rush pinning, have been used (Fig. 22-5). Plating techniques are usually reserved for comminuted fractures and those fractures that cannot be handled adequately with intramedullary fixation techniques (Fig. 22-6). Although plates have been applied successfully to all surfaces of the humerus, we have found the best results with plate placement on the cranial aspect of the shaft of the humerus (Fig. 22-7). The plate can be placed distally close to the medial condyle of the humerus and proximal to the greater tubercle if necessary. When making a surgical approach to the midshaft of the humerus, great care should be taken to adequately visualize and protect the radial nerve.
FIG. 22-3 A transverse midshaft fracture of the humerus (A,B) was stabilized with an intramedullary pin (C,D).
FIG. 22-4 An oblique fracture of a canine humeral diaphysis (A) stabilized with stacked pins and full cerclage wires (B). Radiographs taken 10 weeks following surgery
In general the incision is made so that the brachialis muscle can be mobilized fully, and protection of the nerve is accomplished by maintaining its contact with this muscle belly. A large-diameter Penrose drain is a useful protection and retraction instrument when looped around the belly of the muscle to help elevate the muscle and nerve during the manipulative processes. The deltoid tuberosity can be removed if necessary for exposure, or the deltoid muscle can be elevated from the tuberosity to allow exposure of the proximal aspect of the humerus (Fig. 22-8). Simple suturing techniques will allow the deltoid to reattach itself to the tuberosity. Elevation of the deltoid tuberosity or the muscle from the tuberosity does not seem to result in any untoward problems. Our experience with plates on the humerus indicates that most commonly plates fail by pulling out of the proximal fragment and not the distal one. Therefore, surprisingly few screws seem to be necessary to provide adequate fixation in a distal fragment. Six to eight vortices is the minimal number to be used in the proximal fragment. Additional bone stock can be obtained for screw purchase by aiming the screw toward the head of the humerus through the plate. In this way longer screws can be used and the purchase can be maximized. Also, triangulation of screws in the proximal portion of the humerus will help eliminate the problem of the plate pulling away from the proximal fragment (Fig. 22-8, C) Mobilization of the brachialis muscle is important, since when plating the cranial surface of the humerus the surgeon may be working on both sides of the muscle, depending on at what level of the plate he is inserting screws. The use of bone grafts, as with any comminuted fracture, will help speed union and give added insurance against loss of fixation. The cranial plate may also be used with long oblique comminuted fractures of the distal humerus (Fig. 22-9). Distal fractures involving the joint are plated on the caudal surface. (See Chapter 23.)
FIG. 22-5 A midshaft humeral fracture (A) was stabilized with a Kuntscher nail (B). The 6-month follow-up film was taken at the time of nail removal (c) Because the animal was thin, the reduction was done in a closed manner. Kuntscher nails produce good stability but little callus.
FIG. 22-6 The two preoperative views of this young Labrador show a comminuted fracture of the distal one-half of the humerus (A,B). Cranial placement of a seven-hole dynamic compression plate together with interfragmentary compression screws provide stability of the reduced fracture (C). A radiograph taken at 11-month follow-up shows healing (D).
FIG. 22-7 A skeletal representation of a free body diagram of the front limb of the dog is used to depict the forces acting on the midshaft of the humerus as a result of the muscular (triceps) fixation of the elbow joint counteracting the weight-bearing load. Note that the triceps is the major muscle used during stance phase to extend and fix the elbow. The forces on the humeral cortex are tension on the cranial surface to maintain static equilibrium. This suggests that the tension band surface of the humerus is anterior, hence placement of the plate on the anterior side of the bone.
FIG. 22-8 The two preoperative views show a proximal one-third comminuted humeral fracture (A,B) that was approached using an osteotomy of the deltoid tuberosity for exposure of the proximal humerus The postoperative views show the application of a ninehole dynamic compression plate with one interfragmentary screw and a small wire to reattach the deltoid tuberosity (C,D). Note the moderate use of triangulation of the proximal screws to obtain purchase of the proximal fragment.
Most complications associated with internal fixation are those of improper technique. Many can be predicted at the time of surgery or by looking at postoperative radiographs (Fig. 22-10). If internal fixation is not adequate for whatever reason, additional support should be added in the form of external fixation. Although it is not usually needed, external fixation should be relied upon whenever the stability of the internal fixation is in doubt. It is far easier to further immobilize an injured leg to protect an inadequate fixation than to allow this internal fixation to fail and be faced with a reconstruction based on this failure. Reduction of elbow motion is a common sequela of all humeral fractures except those of the proximal end. Even midshaft fractures of the humerus often have decreased range of motion in the elbow several months or years following surgery. It is important to try to maintain elbow motion during the postoperative course and to enable the animal to make pain-free excursions of the elbow joint. Loss of approximately one half of the motion of the elbow joint may go unnoticed in normal activities of most animals. Therefore, the good results often related by the owner must be tempered by the knowledge of restriction of motion of the elbow joint.
FIG. 22-9 This long oblique comminuted fracture in a Great Dane (A,B) was handled with interfragmentary compression with screws and a cranial plate (C). Some distal comminution was included into the fracture fixation with small Kirschner wires. the distal Kirschner wires were introduced from distal to proximal and do not enter the joint.
FIG. 22-10 This multiple fracture of the humerus (A) was treated with axial compression I of the distal fracture, but a gap remained at the proximal fracture site (a). This signaled the resulting complication of deformity (C) and eventual healing of the fracture with fatigue failure of the implant at 8 weeks postoperatively (D) A small gap represents severe problems when dealing with a weightbearing extremity.
EXTERNAL FIXATION TECHNIQUES
Closed reduction and external fixation of fractures through the physis of the proximal end of the humerus represent the optimal form of treatment. Bandaging techniques such as the Velpeau sling or coaptation to the body wall for a period of 10 days to 2 weeks is sufficient. Often these fractures appear to be extremely stable upon reduction. Fractures of the shaft of the humerus can be immobilized through external fixation using coaptation techniques. A Schroeder-Thomas splint may be useful in cases where musculature will allow the ring of the splint to be close to the proximal joint surface. A Schroeder-Thomas splint should not be used whenever the ring of the splint would act as a fulcrum at the Fracture site. In general such splints can be used for fractures of the distal half of the humerus. The more distal the fracture, the more the shape of the splint changes to counteract the forces of muscle pull. (See Chapter 15.) Body coaptation and spica casts that incorporate the entire chest wall can be used to immobilize comminuted fractures of the humerus. Most external fixation methods will not allow adequate traction for reduction of the fracture fragments but will permit them to coalesce and heal with slight shortening and overriding. The Schroeder-Thomas splint allows the greatest degree of traction and maintenance of length during healing. Fractures of the distal aspect of the humerus involving the humeral condyle can be immobilized in a right-angle Schroeder-Thomas splint. Reduction of the Fracture fragments should be 1 checked radiographically to ensure adequate position, but immobilization of the joint with a Schroeder-Thomas splint is certainly not an optimal form of treatment. When using this method it is important to try to minimize the length of time the animal spends with his joint immobilized. In general, internal fixation following open reduction gives a more satisfactory result with fractures of the humerus, but surprisingly good functional results can be expected with external splints and casts. External skeletal fixation with a frame and half pins may be a good way to handle unstable fractures of the humerus. l would limit the use of such devices to Fractures in which intramuscular rods or compression plates would not be indicated. Open Fractures or septic conditions would be primary indications for the use of external skeletal fixation (Fig. 22-11)
FIG. 22-11 A dog with a long oblique humeral Fracture (A) was referred to our clinic after open reduction and internal fixation with a pin and wire had failed There was, in addition, the possibility of infection. At the time of open reduction a large avascular loose fragment was removed and an external skeletal fixation frame was made using cortical screws as half pins and a wire-reinforced acrylic budge (a) Minimal internal fixation in the form of an interfragmentary screw was used to connect the proximal and distal fragments A cancerous bone graft was used in the face of infection The animal, an unfriendly type (C), was allowed restricted use of the leg The device was removed after follow-up radiographs at 5 months showed healing (D).
REFERENCES1. Braden TD: Surgical correction of humeral factures. In Current Techniques in Small Animal Surgery, pp 509-523. Philadelphia, Lea & Febiger, 1975
2. Brinker WO, Piermattei DL, Flo GL: Fractures of the humerus. In Handbook of Small Animal Orthopedics and Fracture Treatment, pp 138-149. Philadelphia, WB Saunders, 1983
3. Denny HR: Fractures of the humerus. In Guide to Canine Orthopaedic Surgery, pp 92-97. Oxford, Blackwell Scientific Publications, 1980
4. Miller ME, Christensen GC, Evans HE: Anatomy of the Dog, p 325. Philadelphia, WB Saunders, 1964
5. Whittick WG: Fractures of the humerus. In Canine Orthopedics, pp 192-199. Philadelphia, Lea & Febiger, 1974
|
<urn:uuid:2d2af686-4e8a-4b32-beb9-5da9743e1763>
|
CC-MAIN-2013-20
|
http://cal.vet.upenn.edu/projects/saortho/chapter_22/22mast.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705958528/warc/CC-MAIN-20130516120558-00030-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.89302 | 3,754 | 3.078125 | 3 |
Eastern Grey Kangaroo: Controlled Native Species Management Plan
The Conservator for Flora and Fauna has prepared a controlled native species management plan for the Eastern Grey Kangaroo. The plan looks at kangaroo welfare, managing interactions between humans and kangaroos, managing kangaroo densities and managing captive populations. Community consultation on the draft closed on 24 March 2017. The plan was released in May 2017.
Our lowland grasslands and woodlands no longer contain the large predators that were present historically. In the absence of these predators, kangaroo populations can get out of balance with their environment. Heavy grazing by kangaroos endangers other animal and plant species in these areas, including some endangered species and can lead to starvation among the kangaroo populations in times of drought. Heavy grazing can also impact on rural land.
Because of these impacts, the ACT Government has declared the kangaroo a ‘controlled native species’ under the Nature Conservation Act 2014. This declaration paved the way for the Conservator for Flora and Fauna to prepare a ‘Controlled Native Species Management Plan’.
About the plan
The management plan updates the 2010 Kangaroo Management Plan with recent research, legislation and the latest codes of practice.
It describes the Eastern Grey Kangaroo, its habitat, its role in the ACT and its environmental, economic and social impacts. It outlines how the environmental, economic and social impacts of kangaroos in grassy ecosystems in nature reserves and will be managed on different types of land.
The plan considers the conditions under which various plants and animals in the grasslands evolved, but which are no longer present; in particular, dingo/wild dog and Aboriginal predation of native herbivores, the fire regime and small-scale soil disturbance by animals such as bandicoots and bettongs. Ongoing management is required to substitute for these elements and processes.
The management plan aims to:
- maintain populations of kangaroos as a significant part of the fauna of the ‘bush capital’ and a component of the grassy ecosystems of the Territory
- manage and minimise the environmental, economic and social impacts of those kangaroo populations on other plants and animals, grassy ecosystems and primary production.
The plan is based on the following principles and on evidence-based management:
- Kangaroos are valued as an integral component of grassy ecosystems.
- Kangaroo management is based on the best available knowledge of kangaroo biology and ecology.
- The conservation of native grassy ecosystems and their constituent flora and fauna species is a legislative requirement and a high priority for the government.
- The economic and social impacts of kangaroo populations are taken into consideration in authorising management actions, particularly in relation to free-ranging kangaroo populations on rural lands and along roadsides.
- Kangaroo welfare is a primary consideration in all kangaroo management and all kangaroos are to be treated humanely.
- Human welfare and the conservation of other grassy ecosystem species are key considerations in all kangaroo management.
- Intervention to manage kangaroo impacts is necessary in some instances and may involve culling.
- Population control policies and actions are based on scientific knowledge supported by ongoing research, appropriate regulation and monitoring, and codes of practice.
The plan’s policies are grouped around:
- kangaroo welfare
- managing interactions between humans and kangaroos
- managing kangaroo densities, including culling, fertility control and environmental modification
- managing captive populations
Page 8 of the plan refers to two notifiable instruments that detail how the number of kangaroos to be culled is calculated. These instruments are published on the ACT Legislation Register:
- Nature Conservation (Eastern Grey Kangaroo) Conservation Culling Calculator 2018
- Nature Conservation (Eastern Grey Kangaroo) Rural Culling Calculator
Page 44 of the plan summarises the numbers of kangaroos culled for conservation purposes in Canberra Nature Park 2009-2016.
The main changes to the final plan based on the submissions received during the consultation period include:
- Text and a policy about the selected use of fencing to protect environmental values or stop the movement of kangaroos into particular land have been added.
- Information from a study on the welfare aspects of kangaroo shooting undertaken in ACT nature reserves (Hampton & Forsyth 2016) has been included to address concerns about the welfare of culling and compliance with the code of practice.
- Text stating that rural and conservation culling is audited has been added.
- The wording in the purpose of the plan has been revised to acknowledge that factors other than kangaroos also influence grassy ecosystems.
|
<urn:uuid:20b8d1e2-dd0c-47a9-8d3e-4730d0853261>
|
CC-MAIN-2020-16
|
https://www.environment.act.gov.au/cpr/conservator_of_flora_and_fauna/eastern-grey-kangaroo-controlled-native-species-management-plan
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810617.95/warc/CC-MAIN-20200408041431-20200408071931-00002.warc.gz
|
en
| 0.918685 | 979 | 3.09375 | 3 |
Scientists in Japan have developed a paper-based sensor equipped with an array of extremely tiny microneedles, which they say can painlessly penetrate human skin for a quick and easy method of conducting diagnostic tests for conditions like pre-diabetes.
Microneedles are super tiny-spikes so small they're measured in micrometres (one thousandth of a millimetre), designed to puncture only the outermost layer of the skin, not reaching sensory nerves that lie deeper in the dermis.
Because of this shallow penetration and their easy application via patches, microneedles show revolutionary promise for certain aspects of drug delivery, including things like flu shots and insulin, and they've even played a small role in vaccine development for coronavirus.
The unique dimensions of microneedles go far beyond conventional drugs, though.
These tiny spikes are so small, they could help us to inject things in cases where conventional needles would be impractical or impossible: like delivering drugs to plants or straight into the eye. We might even be able to use them to dissolve excess body fat, which could amount to the most painless artificial way of losing weight yet.
While the possibilities for injections are exciting, another field of research is exploring the diagnostic potential of microneedles to detect diseases that may already be present, which is the focus of the new Japanese research.
In a recent study led by senior researcher and microneedles engineer Beomjoon Kim from the University of Tokyo, the team investigated how to make a microneedles array that could quickly and easily analyse interstitial fluid (ISF) in the epidermis, with a view to lessening our reliance on conventional hypodermic needles, which are much more invasive and painful, and require training to use.
"We have overcome this problem by developing a way to combine porous microneedles with paper-based sensors," says Kim.
"The result is low-cost, disposable, and does not require any additional instruments."
To make their microneedle sensor, the team poured a melted mixture of a biodegradable polymer and salt into cone-shaped cavities, much like pouring batter into a cupcake tray.
Once solidified, the microneedles were treated with a solution that left them porous, by removing their salt content, and then affixed to a small patch of paper attached to a glucose sensor – something the team claims has never been done before, expediting the otherwise manual process of extracting ISF samples from the needles.
The idea is that when the tiny, porous spikes are injected into the epidermis, their open pores soak up liquid in interstitial fluid, which contains lots of biomarkers. In the team's experimental setup, the envisaged biomarker is glucose, which would theoretically flow from the porous microneedles onto the paper and then the glucose sensor.
So far, the device has only been tested in the lab on gel made from agarose, but in testing the microneedles worked as expected, with the sensor detecting glucose levels in the gel sample.
"The results show a clear colour change due to the difference in glucose concentration," the authors explain in their paper.
"The fabricated device can identify diabetics, making it suitable for POC diagnosis… we expect it could offer [a] useful platform for [a] minimally invasive diagnostic device."
The scientists now intend to test their proof-of-concept further, conducting experiments with human participants, to confirm it works as they expect in real-world diagnostic conditions.
If it does, we could be looking at much more than just glucose monitoring in the future, they suggest – and all without spilling a single drop of blood.
"Of course, prediabetes testing is just one application of the technology," says first author and PhD candidate Hakjae Lee.
"The paper-based sensor can vary depending on the biomarker you wish to monitor."
The findings have been reported in Medical Devices & Sensors.
|
<urn:uuid:2a3fe8ec-1061-465a-ae28-593c9f9813fc>
|
CC-MAIN-2023-40
|
https://www.sciencealert.com/experimental-microneedles-patch-can-painlessly-check-glucose-levels-scientists-say
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00733.warc.gz
|
en
| 0.950681 | 830 | 3.34375 | 3 |
| || Numerous brickyards have set up shop in the vicinity of Agra, a metropolis in northern India. The unskilled work practised in this type of factory is often assigned to children, who are skilful and docile workers. In Asia, 19% of the children between 5 and 14 years of age are in child labour, and work for the most part in unsafe conditions (in mines, with machinery or on contact with toxic substances). Girls are either in charge of house chores, or work in farming or in small shops. The money these children earn is essential to the survival of destitute families. No drastic measures could solve such a sensitive issue: children excluded from workshops are compelled into even harder jobs, or into the sex industry.
Nevertheless, certain governments and international institutions have transitional solutions for enabling children to combine work and school, or financially assisting families who cannot afford to keep their child at school. Today, there are approximately 248 million children aged 5-17 in child labour worldwide, 58% of whom work in highly hazardous conditions that prove harmful for their physical and mental health.
Visit the YAB Gallery for books and signed prints
|
<urn:uuid:f5597da3-b8d1-496d-ac26-34db4b6addda>
|
CC-MAIN-2013-20
|
http://www.yannarthusbertrand2.org/index.php?option=com_datsogallery&Itemid=27&func=detail&catid=46&id=1305&p=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697843948/warc/CC-MAIN-20130516095043-00057-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.962305 | 233 | 3.078125 | 3 |
More In This Article
In the watery limbo between sea and river, where salt and fresh water mingle in the roots of mangrove trees, a handful of uniquely adapted species—terrestrial and aquatic—have evolved to fill the novel niche.
But more than 40 percent of the land-dwelling animals that live in mangrove forests are now under pressure from habitat loss, concludes an analysis published this week in BioScience.
"Mangroves are threatened by development, pollution, mariculture and changes in sea level and salinity," wrote David Luther, an ecology researcher at the University of Maryland, College Park, and Russell Greenberg, head of the Smithsonian National Zoo's Migratory Bird Center. The impact on creatures that depend on mangroves remains poorly documented.
Tangled woody mangrove forests cover about 65,637 square miles (170,000 square kilometers) around the world, but they're quickly disappearing. A 2007 United Nations report noted that 20 percent of the globe's mangrove forests had vanished in the 25 years between 1980 and 2005, a rate that the U.N. Food and Agriculture Organization's director called "alarming."
Here's a look at the forests and some of the animals that are now threatened by their rapid disappearance.
Slide Show: Vanishing Animals of the Mangroves
|
<urn:uuid:e88da827-5046-4616-aa27-07e8ad1f8d97>
|
CC-MAIN-2013-20
|
http://www.scientificamerican.com/article.cfm?id=animals-of-the-mangroves
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708808767/warc/CC-MAIN-20130516125328-00032-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.943338 | 277 | 3.578125 | 4 |
Attributes of a Golden Retriever
Learn the history and overview of Golden Retrievers. The Golden Retriever is a thick muscular dog of medium-large size weighing 50-75 lbs. They should have a dense, lustrous coat of any shade of gold. Their head is broad, eyes are friendly, short dropped ears, thick muzzle and Goldens have a kind expression. At a trot, Goldens move with a smooth, powerful gait, and the feathery tail is carried with a “merry action.”
Goldens are outgoing, trustworthy, and eager-to-please family dogs. Most are incredibly easy to train with their “What can I do to please you” attitude. Goldens take a joyous and playful approach to life and maintain this puppyish behavior into adulthood. These energetic, powerful gundogs enjoy outdoor play. For a breed built to retrieve waterfowl for hours on end, swimming and fetching are natural pastimes.
Golden Retrievers History
Golden Retrievers originated in the 1860s in Great Britain from foundation stock developed at the Scottish country estate of Lord Tweedmouth. The most complete records of the development of the Golden Retriever are included in the record books that were kept from 1835 until about 1890 by the gamekeepers at the Guisachan (pronounced Gooeesicun) estate of Lord Tweedmouth at Inverness-Shire, Scotland. These records were released to public notice in Country Life in 1952, when Lord Tweedmouth’s great-nephew, the sixth Earl of Ilchester, historian and sportsman, published material that had been left by his ancestor. They provided factual confirmation to the stories that had been handed down through generations.
To develop this new breed, Lord Tweedmouth bred a yellow wavy-coated retriever–the only yellow in a litter of blacks–to a Tweed Water Spaniel (this breed is now extinct). This produced a litter four females that he bred to start his new breed. These 4 mother dogs produced the foundation line of dogs that all Golden Retrievers descend from. Goldens were first brought to North America in the late 1890s and were later recognised the American Kennel Club (AKC) in 1925.
Why were Golden Retrievers invented?
Golden Retrievers were originally bred to hunt by retrieving both upland game and waterfowl. Their basic hunting instincts are still strong in many lines. The Golden is equally favored as a companion for children, a hunting dog, a guide dog for the blind, an assistant for the handicapped, an obedience competitor or a show dog. Golden Retrievers are noted for their gentle, loving dispositions and are an excellent breed for families with children. The Golden’s desire to please humans is legendary—making him a top obedience competitor and a top rate companion dog.
Life expectancy and care
While Goldens can adapt to virtually any living situation, they need considerable daily exercise. We suggest 15-60 minutes of running 3-6 times a day for young Goldens. Goldens are obsessed with being with their pack of people or dogs. They are incredibly social and hate to be alone. Without the companionship of people and adequate exercise, your Golden may display naughty and destructive behavior.
With proper nutrition, routine veterinary care, and regular exercise and grooming, your Golden Retriever should live from ten to thirteen years.
Should I get a Golden Retriever?
Golden Retrievers are known for their zest for life! Every day is a party in the life of a Golden. They view every person as a friend. They believe every interaction with the world is cause for excitement. This outlook is contagious and many owners of Goldens are much happier with their daily reminder to love life.
Training your Golden Retriever
We believe that the best Goldens are those with owners who properly exercise and obedience train their dogs. Basic obedience training is an essential part of responsible dog ownership. It will make your dog a better companion and will help establish a stronger bond between the two of you. Your Golden wants nothing more from life than to please you. Therefore, it is your responsibility to train this faithful companion to do as you say.
Dog training classes—ranging from “puppy kindergarten” to advanced obedience training and competition—are available in most areas, often as a service of a local kennel club. We suggest you obedience train your Golden to be able to walk on a leash without pulling, not jump up on people, come when called and respect the word “No!”. To accomplish this, 6-12 weeks of obedience group classes are necessary. Finding a dog trainer to do private lessons with you is also a great way to get your dog trained. We highly suggest you do the majority of the obedience training yourself. If you find you are limited on time, then using a professional dog trainer for a Boot Camp school is an option. Your dog will spend weeks in the home/kennel of the trainer to learn his commands.
Golden Retrievers have the most luxurious and soft fur. Their hair grows year round and sheds. The worst shedding is in late spring when the weather warms up. For 1-2 months Goldens “blow” their coat each Spring. This means a lot of hair is shedding out so the dog has a thinner coat for the warm weather ahead. The remainder of the year Goldens are considered “constant shedders”. With regular brushing and baths this shedding can be kept to a minimum. If you have allergies to dogs, Goldens are not a good choice for your home. Goldens must be indoor pets and not made to stay outside. If you have allergies to dogs we suggest you consider a dog who does not shed.
|
<urn:uuid:9389f92c-7d70-4b64-9b2e-c17c453da00c>
|
CC-MAIN-2023-23
|
https://reddawngoldens.com/about-golden-retrievers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643388.45/warc/CC-MAIN-20230527223515-20230528013515-00373.warc.gz
|
en
| 0.958025 | 1,207 | 3.28125 | 3 |
• glitterati •
Part of Speech: Noun, plural
Meaning: The smart set, the beautiful people, the jet set, highly fashionable and highly visible celebrities and wealthy folk.
Notes: Today's Good Word, like such words as pliers, binoculars, and pants, has no singular. If you are a member of this illustrious group, you may only call yourself "one of the glitterati".
In Play: The glitterati are probably less 'lettered' (see Word History) than the literati, but they wear more bling, to put it in current youthspeak: "I find the Academy Award TV show enjoyable because I love watching the illiterati interviewing the glitterati." This word is obviously a facetious derivation, which can only be applied toward humorous ends: "There isn't that much wealth here in Podunkton so that our glitterati are more like 'glimmerati'."
Word History: Today's Good word is a blend of glitter and literati. Literati is simply Latin literati, the plural of literatus "literate, 'lettered'", obviously also the source of literature. Have you ever noticed that words referring to light often begin with GL: glow, gleam, glisten, glimmer? That is because the original Proto-Indo-European word for "shine" was something like ghol-/ghel/ghl- "shine", with the familiar O/E/nothing variants we can't explain. This same stem, with its vowels, became both gold and yellow in English, which means that 5000 years ago, all that glittered may have been gold. (Today we thank Chris Berry for suggesting this glittering lexical morsel for our edification.)
Come visit our website at <http://www.alphadictionary.com> for more Good Words and other language resources!
|
<urn:uuid:40ca536f-0322-4b74-b944-94d4aa52273f>
|
CC-MAIN-2014-10
|
http://www.alphadictionary.com/goodword/word/glitterati
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011263617/warc/CC-MAIN-20140305092103-00022-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.930438 | 389 | 2.796875 | 3 |
Oral hygiene is important because dental tartar is not fun! Luckily, good health is! Why is a healthy mouth good for the body? Quite simply, oral hygiene prevents tooth decay, gum diseases and helps prevent bad breath. If our oral health is not taken care of we could lose our teeth, especially as we grow older.
What is dental tartar and how is tartar formed?
Tartar is rough and porous and has a yellow or brown color. Teeth tartar is also known as dental calculus, which forms below and above the gum line. Tartar is a deposit on the teeth that trap stains which then, in turn, cause the discoloration. Certain foods can cause stains, such as blueberries, coffee and other deep rich in color foods.
Here’s the deal:
Plaque and bacteria — which can damage tooth enamel and form cavities — can become problematic to remove if tartar formation is present. As we age, many of these deposits build up faster. Plaque also carries bacteria, damaging the enamel on the tooth. If this stays on the teeth it hardens into tartar, which needs to be removed.
The removing of tartar process is called scaling. Specialized instruments are used to remove the tartar, which the dentist is well-trained in using.
Unfortunately, tooth-brushing twice a day will not remove plaque or prevent tartar, but using oral hygiene with dental floss will help remove plaque between teeth and keep the tartar away. Once tartar forms, the dentist or hygienist is the only real option to clean it all out. But how often should a patient go in for a tartar cleaning? Depending on the patient, it could be wise to schedule a visit at least twice a year, or more often upon the dentist’s evaluation.
Here are a few great tips to both understand and fight tartar better:
- Gently brushing your teeth and gums twice a day lines will keep bacteria away
- Using dental floss once a day will help fight tartar build-up
- Regular dental checkups and teeth cleaning
- A balanced diet by eating healthy
- Being a non-smoker or commit to stopping smoking
- Stay away from staining foods
- Use a tartar control mouthwash daily
As mentioned above plaque is a big factor in tartar
Removing the sticky film on a regular basis helps permanent gum disease. Gum disease could get into a person’s bloodstream, turning into an infection of the gum tissue itself and even the bones surrounding the teeth. Periodontal disease is on the rise and is an increasing health risk. A professional treatment is, of course, recommended to treat the disease.
Once tartar builds up on the teeth, it makes a yellow discoloration and causes bad breath. Once this happens, it can be difficult to easily remove the tartar.
Tartar doesn’t have to be a permanent condition
There is so much to smile about, so keep smiling! Improve your overall dental health, your sense of confidence, and the way you look in the mirror by keeping tartar away.
For more information or to schedule an appointment with Active Dental Plano, request an appointment in our Plano office here: https://activedentalplano.com. Or call us at (972) 473-8880.
|
<urn:uuid:045cda78-ee80-4d4c-9a2b-8b9fc97390da>
|
CC-MAIN-2023-14
|
https://activedentalplano.com/oral-hygiene-faq-what-is-dental-tartar/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00426.warc.gz
|
en
| 0.931856 | 708 | 3.5 | 4 |
Elbow pressure balanced expansion joints or corner relief expansion joints are the types of pressure balanced expansion joints, which are used where pressure thrust forces on equipment or piping is unacceptable and the direction of the pipe system also changes. In order to understand the primary advantage of an elbow pressure balanced expansion joints, it is important to understand how ordinary expansion joints influence the pipe system, in which it is installed.
When a pipe system with an ordinary axial expansion joint installed is pressurised, the pressure reaction force as well as the force needed to move the pipe expansion joint is transmitted to the pipe system. The pressure thrust force can be considerable, generating high demands and stresses on the guides and fix points used for supporting/fixing the pipe system.
By installing elbow pressure balanced expansion joints, the pressure thrust force is balanced internally within the expansion joint and only the spring rate force, which is needed to move the pipe expansion joint is transmitted to the pipe system.
This reduces the load acting on the guides/fix points, which further reduces the need for supporting structures. This enables the use of lighter guides that can deliver significant savings, especially where structural and foundation work is impractical. This feature makes elbow pressure balanced expansion joints the preferred choice for pipe systems, where pressure thrust loads acting on flanges and/or connected equipment such as turbines is avoided.
|
<urn:uuid:86e88086-f1e2-4b38-a238-7628f7fb02af>
|
CC-MAIN-2020-29
|
https://www.belman.com/elbow-pressure-balanced-expansion-joints/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657181335.85/warc/CC-MAIN-20200716021527-20200716051527-00469.warc.gz
|
en
| 0.927051 | 279 | 2.546875 | 3 |
A study reporting the discovery of two genes linked with thoughts of suicide in patients on antidepressants was released yesterday in The American Journal of Psychiatry. The same day, a private company began selling fast, accurate cheek swab tests to identify the genes.
This might sound like great news—seemingly abstruse scientific breakthroughs helping sick people almost instantly. But this first step toward truly personalized medicine isn't going down easy in some quarters: "In my opinion, the results of the study would not be a sound basis for a medical test to decide what medication to give patients," said Dr. Douglas Levinson of Stanford's Program on the Genetics of Brain Function.
The test, called Mark-C, identifies the two risky genes (and two others to be discussed in an upcoming study). It allows patients and potential patients to find out if they are at higher risk for thoughts about suicide when they begin a regimen of Celexa, an antidepressant taken by 8 million Americans, and 30 million people worldwide.
The study, which was part of a large-scale project on depression, isolated a group of adults taking Celexa who reported thoughts of suicide in the course of their treatment. When scientists looked for shared genetic quirks in that group they found notable variants of two genes, GRIK2 and GRIA3, which control how the brain processes glutamate, an amino acid that facilitates communication between neurons in the brain.
Patients with those variations had more than 10-fold risk of suicidal thoughts compared with people without the targeted genes. Fully 36 percent of the patients who had both gene variations reported suicidal thoughts. 59 percent of the patients who had suicidal thoughts had at least one of the gene variants.
What all these numbers mean is that the test is good, but not perfect. Many people who have the genes don't have thoughts of suicide when on Celexa, and many people who have thoughts of suicide don't have the genes.
Some people, like the doctor quoted above, are worried that the public can't be trusted to understand the limitations of such tests, or comprehend of the state of the academic research.
Dr. Thomas Insel, director of the National Institute of Mental Health (NIMH), which helped finance the study, said the test "is not yet ready for prime time" for those reasons. NeuroMark paid the NIMH an undisclosed amount in August for the right to license a test for the genes.
But making the test widely available is very unlikely to do any harm, and may do a great deal of good. There are so many antidepression drugs on the market that the test is unlikely to dissuade anyone from getting treatment. Instead, it will encourage those with the genes to try drugs from a different family, increasing the chance that they'll get a drug that works for them sooner.
The test was rushed into general release, according to NeuroMark, partly in response to troubling statistics released last month by the Centers for Disease Control (CDC) showing a 8 percent rise in teen suicides in 2004. That was the year the FDA issued warnings about a possible link between teen antidepressant use and suicidal thoughts. The result was a massive nationwide scare, and it is thought that many parents took their teenagers off antidepressants, or decided not to begin treatment, perhaps causing an uptick in suicides.
The CDC breakdown of the data shows that the situation is even more serious for certain demographic groups: "The largest percentage increase in rates from 2003 to 2004 was among females aged 10-14 (75.9 percent), followed by females aged 15-19 years (32.3 percent) and males aged 15-19 years (9 percent)," according to the CDC.
While the link between thoughts of suicide and actual suicide attempts is tenuous, Kim Bechthold, CEO of NeuroMark, has said "We hope to save lives."
Even if those suicides couldn't have been prevented, many parents would be grateful to know if they are putting their kid at an increased risk while trying to help them with severe depression. This test won't answer that question completely, but it's a step in the right direction.
Announcing the release of the test, NeuroMark said, "We feel a sense of responsibility, given the current climate, to provide the test to physicians immediately so that they may identify patients who would benefit from closer monitoring or even a change in therapy. It is our hope that this early test will encourage more people to consider antidepressant drug treatment who would benefit from it."
The test costs a little under $500, and is not covered by insurance. This type of test does not require FDA approval, though it has been released in a manner that conforms to the Clinical Laboratory Improvement Amendments of 1988, and the company is seeking voluntary FDA approval for a version to be released next year.
So, is this the first step down a bold path to personalized medicine, or just a rush to exploit the national fear and uncertainty about side effects of antidepressants?
It's a little bit of both, and that's a good thing.
NeuroMark is aware the such a fast release is unusual—the study has yet to be replicated—and it is inviting doctors and patients to contribute to a database of self-described outcomes to extend the testing period for efficacy even though it is making the test available right away. Participants' identities will be protected, and participating doctors and patients will have access to new data as it becomes available. This is the first nationwide post-release data gathering operation of its kind.
At the same time, the identification of these genetic markers, and the quick transition into available medical technology is encouraging. Earlier this summer, The New York Times ran an article heralding the arrival of personalized medication for depression, which seems to be coming to pass even sooner than anticipated, in this small area, at least.
"We think this test represents the leading edge of personalized medicine," CEO Kim Bechthold. And she's right. Prescriptions based on the results of a cheek swab for suspect genes does sound awfully futuristic. Companies rushing to market with tests for the kinds of conditions and circumstande that make headlines will be a regular feature of the landscape.
People are bound to make medical decisions based on what they read in the paper more and more often in the future. And sometimes they'll make the wrong decisions, as the data suggest many parents did in the wake of the scare about teens and antidepressants in 2004. "Ripped from the headlines" marketing for medical tests may make some doctors uncomfortable, but for patients trying to make right decision with limited information, a speedy turnaround from lab to pharmacy good news.
Katherine Mangu-Ward is an associate editor of reason.
|
<urn:uuid:26428141-fb2e-40c8-8b3d-83a6de29b259>
|
CC-MAIN-2014-15
|
http://reason.com/archives/2007/10/02/i-scream-you-scream-we-all-scr/print
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538787.31/warc/CC-MAIN-20140416005218-00227-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.963772 | 1,365 | 2.703125 | 3 |
At school De Morgan did not excel and, because of his physical disability
... he did not join in the sports of other boys, and he was even made the victim of cruel practical jokes by some schoolfellows.De Morgan entered Trinity College Cambridge in 1823 at the age of 16 where he was taught by Peacock and Whewell - the three became lifelong friends. He received his BA but, because a theological test was required for the MA, something to which De Morgan strongly objected despite being a member of the Church of England, he could go no further at Cambridge being not eligible for a Fellowship without his MA.
In 1826 he returned to his home in London and entered Lincoln's Inn to study for the Bar. In 1827 (at the age of 21) he applied for the chair of mathematics in the newly founded University College London and, despite having no mathematical publications, he was appointed.
In 1828 De Morgan became the first professor of mathematics at University College. He gave his inaugural lecture On the study of mathematics . De Morgan was to resign his chair, on a matter of principle, is 1831. He was appointed to the chair again in 1836 and held it until 1866 when he was to resign for a second time, again on a matter of principle.
His book Elements of arithmetic (1830) was his second publication and was to see many editions.
In 1838 he defined and introduced the term 'mathematical induction' putting a process that had been used without clarity on a rigorous basis. The term first appears in De Morgan's article Induction (Mathematics) in the Penny Cyclopedia. (Over the years he was to write 712 articles for the Penny Cyclopedia.) The Penny Cyclopedia was published by the Society for the Diffusion of Useful Knowledge, set up by the same reformers who founded London University, and that Society also published a famous work by De Morgan The Differential and Integral Calculus.
In 1849 he published Trigonometry and double algebra in which he gave a geometric interpretation of complex numbers.
He recognised the purely symbolic nature of algebra and he was aware of the existence of algebras other than ordinary algebra. He introduced De Morgan's laws and his greatest contribution is as a reformer of mathematical logic.
De Morgan corresponded with Charles Babbage and gave private tuition to Lady Lovelace who, it is claimed, wrote the first computer program for Babbage.
De Morgan also corresponded with Hamilton and, like Hamilton attempted to extend double algebra to three dimension. In a letter to Hamilton, De Morgan writes of his correspondence with Hamilton and William Hamilton. He writes
Be it known unto you that I have discovered that you and the other Sir W. H. are reciprocal polars with respect to me (intellectually and morally, for the Scottish baronet is a polar bear, and you, I was going to say, are a polar gentleman). When I send a bit of investigation to Edinburgh, the W. H. of that ilk says I took it from him. When I send you one, you take it from me, generalise it at a glance, bestow it thus generalised upon society at large, and make me the second discoverer of a known theorem.In 1866 he was a co-founder of the London Mathematical Society and became its first president. De Morgan's son George, a very able mathematician, became its first secretary. In the same year De Morgan was elected a Fellow of the Royal Astronomical Society.
De Morgan was never a Fellow of the Royal Society as he refused to let his name be put forward. He also refused an honorary degree from the University of Edinburgh. He was described by Thomas Hirst thus:-
A dry dogmatic pedant I fear is Mr De Morgan, notwithstanding his unquestioned ability.Macfarlane remarks that
... De Morgan considered himself a Briton unattached neither English, Scottish, Welsh or Irish.He also says
He disliked the country and while his family enjoyed the seaside, and men of science were having a good time at a meeting of the British Association in the country he remained in the hot and dusty libraries of the metropolis. ... he had no ideas or sympathies in common with the physical philosopher. His attitude was doubtless due to his physical infirmity, which prevented him from being either an observer or an experimenter. He never voted in an election, and he never visited the House of Commons, or the Tower, or Westminster Abbey.De Morgan was always interested in odd numerical facts and writing in 1864 he noted that he had the distinction of being x years old in the year x2 (He was 43 in 1849). Anyone born in 1980 can claim the same distinction.
Article by: J J O'Connor and E F Robertson
|
<urn:uuid:e05212ab-a8a2-44fc-a215-9a7b5a1cfee8>
|
CC-MAIN-2017-43
|
http://www-groups.dcs.st-andrews.ac.uk/~history/Printonly/De_Morgan.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824537.24/warc/CC-MAIN-20171021005202-20171021025202-00430.warc.gz
|
en
| 0.982037 | 992 | 2.75 | 3 |
Birds—from ducks and herons to terns and the brown pelican (Louisiana’s state bird)—are becoming the latest victims of the British Petroleum oil spill in the Gulf Coast.
“It’s a full moon, a high tide, and it’s bringing the oil on a free ride right into the coastal salt marshes on a southerly wind,” says Dr. Ken Rosenberg, director of conservation science at the Cornell Lab of Ornithology. “It is also peak migration season for birds crossing the gulf; tens of thousands of exhausted shorebirds are going to be arriving in the next two weeks. They’re flying over water and stopping to refuel on the beaches and in the estuaries along the Gulf Coast, directly in the path of this massive spill.”
As with other environmentalists, Dr. Rosenberg blames “our thirst for fossil fuel” for this unprecedented manmade disaster.
“We’ve been playing Russian roulette with our environment, and the gun just went off,” he says.
Precursor to Human Harm
“Birds are an important first indicator of environmental health, and the old analogy of the canary in the coal mine is really relevant here,” Dr. Rosenberg says. “A lot of these birds are going to die, but that’s just the beginning of the story of what might happen to the coastal environment for both wildlife and people if the oil doesn’t stop flowing.”
At first, breeding bird colonies along the coast will be devastated. Next, thousands of brown pelicans—removed from the endangered species list only last year—will be affected, along with other water-bird colonies. Dependent on fish and other marine life for food and survival, bird populations will die as oil comes ashore. Gulf Coast ecosystems are already extremely fragile because of Hurricane Katrina and other storms.
The International Fund for Animal Welfare estimates millions of birds are at risk.
“When a bird’s feathers become clogged with oil, they no longer act as a waterproof coat,” says Dr. Ian Robinson, IFAW’s emergency relief director. “Cold water penetrates to the bird’s skin and rapidly leads to hypothermia.
“At the same time, as the bird preens to try and clean the oil from the feathers, it inadvertently ingests toxic oil, which leads to symptoms of poisoning, including diarrhea and dehydration.”
“There will be a lot of people mobilized to try to save individual birds by bringing them into rehab and de-oiling them,” Dr. Rosenberg adds, “and there will be some success in saving individual birds. But whether that can save the breeding populations in these areas—we don’t know. If the oil then comes into the coastal marshes and the inshore ecosystems and kills the oyster beds and the shrimp and the fish nurseries, then there are much longer-lasting effects not only on birds, but on an entire way of life for people of this region.”
For Your Organic Bookshelf: Shattered Lives: Anatomy of an Oil Spill
|
<urn:uuid:0cf51fda-009e-4a68-84a2-3ce0904c81b1>
|
CC-MAIN-2017-34
|
http://www.organicauthority.com/blog/the-environment/playing-russian-roulette-with-our-environment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109803.8/warc/CC-MAIN-20170822011838-20170822031838-00445.warc.gz
|
en
| 0.928465 | 668 | 3.359375 | 3 |
Review of 'Wright and New York: The Making of America's Architect'
By Anthony Alofsin
Anthony Alofsin’s new book on Wright’s tumultuous relationship to New York City is the third one centering on a connection that Wright himself might have thought unworthy. “A great monument to the power of money and greed” Wright called the city, but several Wright scholars have questioned his dismissals. Herbert Muschamp’s Man About Town: Frank Lloyd Wright in New York City (1983) treated Wright’s energetic antipathy toward Gotham from 1926 to 1933 as an inspirational force shaping Wright’s theories of urban planning. Jane King Hession and Debra Pickrel’s Frank Lloyd Wright in New York: The Plaza Years, 1954–1959 (2007) offered a detailed chronicle of Wright’s life in New York and his one-week-a-month residence at the posh Plaza Hotel during the Guggenheim Museum’s construction. Alofsin’s book differs from these earlier studies by asserting that Wright’s time in New York between 1925 and 1933 was “the turning point of his career and established the persona that the world would come to know.” This is quite a claim about a city for which the architect had expressed lifelong contempt. That assertion also lessens attention to other cities where Wright found inspiration: Chicago, Berlin, Tokyo, and Los Angeles. So how does Alofsin develop his case?
Since the Guggenheim was Wright’s only fully realized Manhattan project, Alofsin considers two unbuilt Wright projects for the city as having paramount career-defining importance. These were commissioned by Reverend William Norman Guthrie of St. Mark’s Church in-the-Bowery: one, named for the church, evolved into an 18-story glass skyscraper in 1929 with a pinwheel plan (RECORD, January 1930). The other was a modern cathedral that drew Wright into designing a colossal steel house of worship reflecting the common ideals of world religions (1926). Both grandiose schemes spawned key architectural forms, Alofsin argues, which Wright integrated decades later into the Price Tower in Bartlesville, Oklahoma (1956), and Beth Shalom synagogue in Elkins Park, Pennsylvania (1959). To deepen an appreciation of Wright’s indebtedness to New York’s notable personalities, the author offers a touching portrait of the iconoclastic Guthrie, who showed Wright “that the city was a place for dreams and ambition, a platform and battleground for artistic vision.”
If the theme of New York as the penultimate dream incubator for Wright seems engaging, you may find Alofsin’s book revelatory. If you view Wright’s architectural designs as a consequence of his interplaying myriad imagined and actual urban and rural environments, then Alofsin’s perspective may seem stultifyingly narrow. No actual city anywhere thrilled Wright as deeply as his own utopian “Broadacre City.” New York particularly triggered Wright’s wrath since its high-density skyscraper profile was so contrary to Broadacre’s uncrowded pastoral skyline.
That Wright enjoyed conversing with city power brokers like agency macher Robert Moses, gloried in meeting entertainment stars (and possible clients) Arthur Miller and Marilyn Monroe, appreciated contact with longtime artistic colleague Isamu Noguchi, and luxuriated in swank amenities the city offered like the 21 Club seems uncontestable. But to transform Wright’s appreciation for the city’s material, social, and cultural riches into a tale of the city’s “making” of his true character and mission neglects Wright’s unwavering visionary dedication to a city yet to be forged.
|
<urn:uuid:170d8890-f653-4a21-beb8-ca8c28a578f8>
|
CC-MAIN-2020-05
|
https://www.architecturalrecord.com/articles/14146-review-of-wright-and-new-york-the-making-of-americas-architect
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593994.14/warc/CC-MAIN-20200118221909-20200119005909-00539.warc.gz
|
en
| 0.940454 | 791 | 2.515625 | 3 |
We will notify you once we have something for you
Blockchain is a database technology that acts as a public ledger for Bitcoin and contains every Bitcoin transaction. Bitcoin is a digital currency that allows users to transfer money over the Internet without the need for banks or credit cards. Blockchain has emerged as technology of future for secured record keeping and transactions.
This Course is intended for software developers, progra...
- Learn as per your schedule and pace
- Course developed by leading experts
- Online access to course content
- Explore a variety of fresh topics
- Any where any time course access
- Industry relevant and accepted courses
- Blockchain Basics
- The Complete Blockchain Professional Course
- Blockchain Programming with Hyperledger Composer
- Build DApps in Ethereum Blockchain
|
<urn:uuid:7d252b9c-0c9e-4314-9329-374f80e72a54>
|
CC-MAIN-2023-50
|
https://learning.shine.com/course/it-information-technology/master-of-blockchain-training-certification/pd-4603
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00585.warc.gz
|
en
| 0.887873 | 155 | 2.90625 | 3 |
Bad news for bullies in Baltimore County public schools—suspensions are increasing among students who intimidate and harass their classmates.
A report released during Tuesday night's Baltimore County Public Schools Board of Education meeting detailed the county's efforts to combat bullying, action mandated by the state's Safe Schools Reporting Act of 2005.
The county's anti-bullying efforts include preventative measures and swift disciplinary actions—including suspension—according to Glenda Myrick, the county schools coordinator of Safe and Drug-Free Schools, who presented the report to the board.
Reported incidents of bullying have increased more than 350 percent between 2007 and 2011, going from 142 to 510. During that same time, suspensions related to bullying have nearly doubled, rising from 248 to 474, according to the report.
School officials attribute much of the rapid growth in reporting to a rule change in 2009 that allowed the system to count incidents reported by faculty members. Previously, only reports made by students and family members were counted, Myrick said.
As more students have access to the Internet and cell phones, cyberbullying has also emerged as a concern. Facebook, YouTube and Twitter have increasingly become avenues of intimidation and harassment, according to the report.
"It starts in elementary school, but the greatest trend is in middle school," Myrick said.
Bullying is most commonly reported among seventh-graders, she added.
"Character education" programs, especially in the county's elementary schools, are intended to help curb the problem among rising middle school students, Myrick said.
"The key is intervention and to get out in front of the issue—we really have to be proactive," board President said during the presentation.
Board member asked if bullying incidents have led to lawsuits against the county. The board's legal counsel confirmed that there are multiple pending lawsuits.
"It's part of a national trend and has gained a great deal of attention," said Superintendent following the meeting. "I think those lawsuits tend to be designed to help people seek some kind of help and support."
Hairston said he was unable to comment on the number of pending lawsuits against the county because it is a legal issue.
He emphasized the county's ongoing efforts toward combating bullying.
"You can have good instruction when there's a healthy climate, when kids get along well with each other. Addressing those social issues is just as important as the academic," he said.
Have you noticed an increase in bullying at your child's school? Share your advice for dealing with bullying in the comments.
|
<urn:uuid:9278277a-98ad-451a-bdbd-611037de10d6>
|
CC-MAIN-2013-20
|
http://perryhall.patch.com/groups/schools/p/baltimore-county-cracks-down-on-bullying-ups-suspensions
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710196013/warc/CC-MAIN-20130516131636-00014-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.982798 | 518 | 2.609375 | 3 |
Mathematics, often regarded as the universal language, can also be a source of confusion and frustration for many students. But, don’t fret, because there’s no problem that can’t be solved — especially with the right resources at hand. The digital world is filled with a myriad of platforms geared towards making math more understandable, and we’ve done the hard work of sorting through them to bring you the very best.
In this blog post, we highlight top-tier websites that offer exceptional math homework help. These online resources have been handpicked for their quality, ease of use, and effectiveness in breaking down complex math problems into understandable steps. They offer a diverse range of tools, from interactive problem-solving exercises to step-by-step explanations, serving all levels of mathematical proficiency.
Whether you’re a student striving to navigate through the intricacies of calculus, a parent seeking to assist your child with their algebra homework, or a teacher searching for innovative teaching resources, this list is for you. Dive in, and let’s turn those mathematical challenges into opportunities for learning and growth.
For iPad math helper apps, check out this list instead.
Symbolab offers access to a set of powerful calculators. Students can use the site to search for and access solutions to thousands of math problems related to algebra, trigonometry, calculus, and many more.
As students browse the answers to their math problems they get to discover step by step approaches used to reach solutions and learn along the way how to solve future math problems alone. To learn more, check out Symbolab full tutorial.
DeltaMath is another good math homework help website for students. It offers randomized math problems for students grades 6 to 12 with the ability to get instant feedback on their performance. There are over 1800 ready-made math problems all of which are aligned to Common Core. The premium version of DeltaMath offers instructional videos for each problem, auto-grading, and many more. To learn more, check out DeltaMath full tutorial.
Mathway is a free online math calculator that assists students with their arithmetic homework. Students can find answers to difficult math problems and access step-by-step explanations with a single click.
This is an excellent approach for students to understand not just the answer but also the process that lead to that solution. Mathway covers a number of math topics including basic math, pre-algebra, algebra, trigonometry, calculus, statistics, and more. To learn more check out Mathway full tutorial.
Xtramath offers students opportunities to improve their math fact fluency particularly in areas related to fractions and decimals. Xtramath provides standards-aligned printable materials, activities, videos, and several other interesting resources to help students find solutions to their math problems. Xtramath’s free plan offers limited features and resources, for more features you need to get a premium subscription. To learn more, check out Xtramath full tutorial.
Photomath is another great math solver students can use to get help with their math homework. Photomath is only available as a mobile app for Android and iOS devices. The way it works is simple: After installing photomath, open the app and use it to scan a math problem or you can manually input the problem using the app’s smart calculator.
Photomath takes care of the rest and provides detailed step by step explanations to the problem. Photomath covers various math topics including elementary math, geometry, trigonometry, word problems, algebra, calculus, statistics, and more.
Cymath is a popular math solver tool students can use to get assistance with their math homework. Students can either type in their math problem in Cymath’s search bar or use the camera of their device to snap a photo of their problem. Cymath recognizes the problem and provides step by step explanations.
Cymath supports ‘equation solving, factoring, logarithms, exponents, complex numbers, quadratic equations, trigonometry, partial fraction decomposition, polynomial division, etc.’
MathPapa offers step by step algebra help. MathPapa’s calculator allows you to solve any algebra problem in a guided approach with lessons and other helpful resources. Simply type in your math problem and click to get step by step explanations. Students can also practice and improve their algebra using the site’s exercises.
Other features provided by MathPapa include: solves linear and quadratic equations, graph equations, order of operations, evaluates expressions, and many more. MathPapa works online and is also available as a mobile app for both Android and iOS devices.
QuickMath helps high school and college students find answers to most common problems in areas related to algebra, equations, and calculus. Students can access step by step solutions to any algebra problem. They can also modify the details of the solution and learn more about how each solution was reached.
QuickMath’s calculator can solve different math equations and inequalities, simplify any algebraic expression and factor polynomials, find the Greatest Common Factor (GCF) and the Least Common Measure (LCM) of multiple expressions. QuickMath is also available as a mobile app for both iOS and Android devices.
9- Cool Math
This is another great website that features tons of learning materials to help students of all ages with their math learning. It covers topics that include pre-calculus, algebra, pre-algebra and many more.
For instance, click on Algebra tab to access algebra help related to topics that include lines, solving equations, polynomials, radicals, exponents, solving quadratics, complex numbers, functions, inverse functions, sequences and series, advanced graphing, graphing rational functions, determinants and Cramer’s rule, and many more.
Webmath is a math help website that creates solutions to specific math questions and problems provided by a user at any given time. When a user enters their math issue and clicks “solve,” math solutions are created and shown in real time. Webmath not only provides the answers, but it also shows these answers are reached.
Gauthmath is a math homework helper app that provides step-by-step solutions to all types of math problems including word problems and geometry. The app also offers access to online math tutors to help learners with their math problems in algebra, graphing, calculus, and many more. Tutors are from over 30 countries and are available around the clock.
|
<urn:uuid:7e3690c2-a64e-444a-953f-2f21d16e7657>
|
CC-MAIN-2023-40
|
https://www.educatorstechnology.com/2023/01/6-of-best-websites-to-help-students.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00573.warc.gz
|
en
| 0.932787 | 1,420 | 2.734375 | 3 |
The Bell Game challenges students to pronounce target lesson words correctly in a competitive game. You'll need a deck of cards that contains each target word for the lesson(s), and two small bells. The goal of the activity is given a written regular word, the student can say the word with automaticity.
Aim: Word form recognition together with pronunciation
Activity: Competitive bell game in small groups
- Divide students into two teams.
- Have the first player from each team come up to a desk at the front of the room. Place two bells on the desk, one for each player.
- Use the following introduction: Today we are going to play The Bell Game. When I show you a word card, the first person to ring her bell and read the word correctly gets one point for her team.
- Make sure that you read the word before you ring your bell. If you ring your bell, but cannot read the word immediately, within one second, your team will lose a point. Therefore, it is important that you read the word silently before you hit your bell.
- If you read the word incorrectly, the player on the opposite team gets a chance to read the word, but this time for two points instead of one.
- If both players miss the word, call on someone else in the class to give the players a hand. In this scenario, no points are awarded.
- Have a new set of players come to the board every round or every other round.
This activity has been adapted for ESL classes from a lesson at Free Reading Net under the Creative Commons license Attribution-Share Alike 3.0 license.
|
<urn:uuid:04a31006-3c54-4111-9539-58d2890300b1>
|
CC-MAIN-2013-20
|
http://esl.about.com/od/childrenslessonplans/a/bellgame.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704007597/warc/CC-MAIN-20130516113327-00061-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.934756 | 335 | 3.96875 | 4 |
Succulents grow well both indoors and out, require little water, and add unique beauty to your home and landscape. Here?s how to grow them.
Bamboo adds a wonderfully exotic look to your yard or garden. Learn how to grow bamboo that will look beautiful without taking over.
Love hydrangeas? Take the guesswork out of tending this pretty bloomer with these expert growing tips, including planting, feeding, and pruning info.
Blueberry bushes not only provide loads of delicious, nutritious fruit, but they look terrific in the landscape. Find out how to grow them here.
Enjoy your landscape in more ways than you thought possible
Choose the right trees, shrubs and ornamentals for your location and conditions
A little planning can save many headaches later
You can make almost any space more interesting with a tree or shrub planted in a container.
You have lots of choices for bringing spectacular color to your yard
For color, privacy, and your next meal, an edible hedgerow is ideal
Learn more about the proper times to prune trees and shrubs in your yard
Plant perennials for blooms that come back year after year with little maintenance.
Just because it looks pretty doesn't mean you can't eat it.
Put big flowers in big containers for an immediate statement.
Get step by step directions for adding a fruit tree to your landscape.
These eye-catching plants are ideal in dry-area gardens
Find out how to make the best use of water in your garden, especially in dry areas
Different types of trees need different types of food
A few simple changes in your yard can help preserve the health of the Chesapeake Bay
Take a few steps in late fall, and spring gardening will be easier
After their long trip across the Gulf, hummingbirds appreciate these natural fueling stations.
The trees are hardy, the fruit is delicious, but you won't find it in the grocery store
In groups or on their own, these shrubs look great and attract birds
Giving your tree a good start can help it grow well
Using the right strategies in your landscape will help to keep deer munching elsewhere
How to select, plant, and maintain the right trees or shrubs for your yard and your climate
Now you can make your yard interesting in deep winter
With plants and nectar feeders, you can make your garden a hummingbird oasis
Let these aerial acrobats delight you while they control bug pests
Going Vertical Gives You More Gardening Fun
Plant the right flowers for beautiful colors in dry conditions
Enjoy big blooms year after year
Enjoy decorating, then keep the tree
When water is scarce, taking simple steps can help your plants
Trees, shrubs, brush piles and boxes provide year-round shelter for birds.
This distinctive desert native thrives in hot, dry conditions
This hardy shrub gives you months of flowers in your desert garden
This flowering herb is one of the easiest plants to grow.
With so many shapes and colors, these plants are a must for your desert garden
While hungry deer will eat almost anything, these shrubs rank low on their list of favorites
Here are some tips to help you keep your tree fresher, longer
Watch our landscape designer show you how to improve outdoor living space.
|
<urn:uuid:6747f3f2-2a5d-474c-8023-b38264bb461d>
|
CC-MAIN-2017-26
|
https://www.miraclegro.com/smg/library/shelf/How-To/Trees%2C-Shrubs%2C-%26-Landscaping/7400009/27000004/12900004
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320570.72/warc/CC-MAIN-20170625184914-20170625204914-00274.warc.gz
|
en
| 0.92129 | 688 | 2.578125 | 3 |
Moodiness and rebellion are part of the adolescent experience. Yet parents of teenagers often wonder if their teen’s behavior is “normal” or if they should address psychiatric therapy for their child.
Mental illness is more common than parents may realize: one in five teens between ages 13 and 18 experience a severe mental illness, and half of all chronic mental disorders start by age 14.
So how can parents tell if their child is struggling with a mental illness? Read about these four common types of mental health issues and how to recognize them.
Everyone experiences emotional ups and downs, but chronic feelings of sadness, anger, hopelessness or irritability lasting weeks or months is a red flag. Also, look for these common signs of depression:
- Loss of interest in usual activities
- Feelings of worthlessness and guilt (statements like, “I’m always messing everything up” or “Everyone hates me”)
- Withdrawal from family and friends
- Lashing out
- Rebellious behavior
- Trouble concentrating or making decisions
- Memory loss or forgetfulness
- Sleep changes (insomnia or excessive sleeping)
- Weight gain or loss
- Fatigue or unexplained aches and pains, including headaches and stomachaches
- Drug or alcohol use
- Thoughts and comments about death and dying
Teens have plenty to worry about in their daily life: the demands of school, sports, classes, friends. But when worry becomes chronic or debilitating, your child may be suffering from an anxiety disorder, such as:
- Generalized Anxiety Disorder (GAD): excessive, unrealistic worry, even when there’s seemingly nothing triggering the anxiety
- Panic Disorder: repeated sudden feelings of terror out of the blue, physical symptoms like heart palpitations
- Social Anxiety Disorder or Social Phobia: feelings of worry and self-consciousness in everyday social situations like gym, lunch or school activities; fear of being teased or judged by peers
Signs and symptoms can vary depending on the anxiety disorder. Here are some general symptoms teens may experience:
- Cold or sweaty hands and feet, dry mouth, dizziness, tight muscles
- Fidgety behavior; inability to stay calm
- Overall feeling of uneasiness, panic or fear
Post-Traumatic Stress Disorder
While most people associate post-traumatic stress disorder (PTSD) with war veterans, it can happen to anyone, including teens. PTSD is brought on by an extremely traumatizing experience, like life-threatening situations or a person witnesses something horrific. Triggering events include:
- Rape or other violent assaults
- Sudden death of a loved one
- School shootings
- Diagnosis of a life-threatening illness
- Auto accidents, fires, or natural disasters
- Ongoing traumatizing events, such as physical or sexual abuse
Teens suffering from PTSD may experience:
- Difficulty sleeping
- Irritable or tense behaviors
- Trouble concentrating
- Detachment or emotional numbness
- Nightmares or flashbacks of the event
- Avoiding things, such as people or places, that remind them of the event
Eating disorders are prevalent among teens. More than half of teenage girls and almost one-third of teen boys take unhealthy measures to lose weight, such as vomiting, skipping meals, smoking cigarettes, and using laxatives. Up to 57 percent of teen girls use diet pills or laxatives to make themselves throw up or go on crash diets to lose weight.
The three main types of eating disorders are:
- Anorexia: irrational fear of weight gain, taking extreme measures to stay dangerously skinny
- Bulimia: cycles of eating and purging (by using laxatives or diuretics, vomiting, excessive exercise)
- Binge eating: eating large amounts of food very quickly but not purging; only about 35% of binge eaters are male
Signs of Eating Disorders:
- Physical signs include constipation, cavities or tooth enamel erosion, hair loss, dry skin, or rashes, and extreme changes in weight.
- Behavioral signs include excessive interest in exercise, obsessively counting calories, binging at meals, skipping meals, and distorted body image.
- Teens with eating disorders may be depressed, anxious, withdraw from friends, and react overly sensitively to criticism.
If you suspect signs of mental illness in your teen, schedule a doctor’s appointment or visit a counselor for a screening. With family support, counseling and other treatments, your child can get back on the path to feeling happy and healthy.
|
<urn:uuid:9eef4411-5378-4cb1-8fd5-b4b4ca686aeb>
|
CC-MAIN-2017-30
|
https://thelightprogram.pyramidhealthcarepa.com/how-parents-can-tell-if-their-teen-is-struggling-with-a-mental-disorder/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436316.91/warc/CC-MAIN-20170728002503-20170728022503-00493.warc.gz
|
en
| 0.922595 | 944 | 3.6875 | 4 |
A marriage certificate is considered to be a legal document that authenticates the marital status of a couple under the court of law. While the Hindu Marriage Act is applicable only to the Hindus, the Special Marriage Act will accompany all citizens of India irrespective of religion, caste and language except the state of Jammu and Kashmir. All marriage formalities of Parsis and Zoroastrians fall under the Parsi Marriage and Divorce Act, 1936.
Laws Governing Marriage Registration In India
In simple, a marriage certificate is a legal document meant to safeguard women from being divorced. Currently, most marriages in India require registration.
The Hindu Marriage Act, 1955 on the other hand provides for the registration of marriages, but the discretion of the families of the bride and bridegroom to solemnize the wedding before a registrar or register after the wedding ceremony in a traditional manner. However, this does not mean that the non- registration of a Hindu marriage invalidates it under the Hindu Marriage Act.
The Indian Christian Marriage Act, 1872 considers the procedure of registration compulsory as it enters the details regarding the married couple in Church after the wedding along with the signature of the bride and bridegroom.
Importance Of Special Marriage Act, 1954
The Special Marriage Act deals with solemnizing and registering marriages. Under this act no religious ceremonies are needed for a marriage to be done. According to the act, the following conditions are regarded to be lawful mentioned under Section 4:
- Neither party should have a spouse living at the time of marriage
- Where neither party:
– Is not capable of giving a valid consent or has been suffering from mental illness.
– That makes either unfit for marriage including the procreation of children.
– Has any health attacks of insanity or epilepsy.
- The male has completed the age of 21 and female 18 years.
- The parties are not within the degrees of prohibited relationship:
– Provided there is a custom governing at least one party permits the marriage between them, such marriage will be will be conducted and not be stopped on the basis of prohibited relationship.
- Where the marriage is solemnized in the State of Jammu and Kashmir, both parties are Indian citizens.
Marriage Registration Made Compulsory
The Supreme Court of India urged the States and Union Territories to frame laws regarding the registration of marriages and consider it compulsory, as the majority of them have failed to comply with its order in February 2006. The reason being, that the States were intrinsic to know the social structures and local conditions prevailing in their respective states, concerning marriage.
Same Day Marriage (Tatkal Marriage)
On the basis of mutual consent and support, a marriage takes place. Sometimes individual views change between partners before wedding and in such circumstances a tatkal marriage works fine. In many cases, people may oppose the union in a couples relationship. In such scenarios, most couples may seek for a same day marriage or tatkal marriage. This type of marriage is helpful in obtaining legal help through documents that act as proof the solemnization of the wedding between both partners.
However, there are many factors that affect the decision of going in for a tatkal court marriage:
- In a love relationship, the couple may seek instant assistant to get certificate under tatkal procedure.
- In case where the couple is moving abroad or if any spouse wants to claim for bank deposits, then a court marriage procedure for the wedding is required.
- After the couple gets married their social security becomes a priority and an official registration certificate is required in order to avoid any false allegations.
What Is Civil Marriage Ceremonies In India?
Any couple that does not wish to get married under the influence of any religious ceremony can rather opt for a civil ceremony via the Indian Special Marriage Act, 1954. Take for instance, if there is a marriage between an Indian and a foreign national within the geography of India, it is legally recommended to file a notice of intended marriage with a “Marriage Registrar” in India. The notice is required to be published within 30 days. After 30 days, the Marriage Registrar is free to perform the marriage.
This notice will be considered legal and can only be given in India, wherein at least one partner is a permanent resident of Indian and the other be a temporary resident. In case a partner is residing in another country, then the partner residing in India will have to fill the ‘Marriage Notice’ collected from the Marriage Registration Office of his/her choice and send it to his/her partner residing in a foreign country to fill it out. The notice must be sent back to the partner in India and submit it back to the Marriage Registration Office.
After a period of 30 days, the marriage can take place in India Under the Special Marriage Act, 1954 wherein it consists of the signature of both partners married. This Certificate will act as proof of marriage when applying for a visa to a foreign country.
Importance Of Having A Marriage Certificate
No matter which religion you belong to, having a marriage certificate is legally important. It acts as a proof to certify that a couple is legally married under the court of law. Take for instance, if a couple wants to a apply for a visa, a marriage certificate is required. It is recommended to register within 60 days of wedding.
Having a certificate after marriage is beneficial for:
- Getting insurance policies.
- health insurance claims.
- Ration card.
It is also helpful for immigration and can be used to get a social security card, can change name in passport, aadhaar card, and voter ID card. This would mean that obtaining a marriage certificate post wedding is a necessity in India for all newly wedded couples.
Get Your Marriage Affidavit
If your a newly married couple and looking out to get your marriage registered, then you should get your marriage affidavit online. Your need of having an affidavit for marriage will help you avail registration, self declaration and your applicability to rules of the Marriage Act. Click the button below and get your affidavit for marriage online. Try our service!
|
<urn:uuid:728f8d6e-6813-42f8-9ee5-cb3053b74723>
|
CC-MAIN-2020-29
|
https://legaldesk.com/marriage/file-marriage-certificate-in-india
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657176116.96/warc/CC-MAIN-20200715230447-20200716020447-00418.warc.gz
|
en
| 0.937002 | 1,246 | 3.203125 | 3 |
Author: Kibler, Amanda; Philipose, Sandy
Hosted by: www.actfl.org
Submitted by: yorkfsl
Date Submitted: April 12, 2021
This content within this resource may be sensitive to some viewers.
Studies on the benefits of language learning are numerous. Two graduate students from Stanford University highlight three areas of research most relevant to school administrators, policy makers and parents in order to provide answers to frequently asked questions about the positive impact of second language learning.
In this age of accountability in education, policymakers and administrators, as well as parents, are increasingly demanding to know what research studies show regarding the benefits of language learning. This paper identifies some of the major correlation studies that highlight how language learners benefit from their experiences. Three areas of research are examined: How language learning supports academic achievement, provides cognitive benefits to students, and how it affects attitudes and beliefs about language learning and about other cultures.
|
<urn:uuid:0a340557-2703-44ae-9860-e3a3f3c11186>
|
CC-MAIN-2023-40
|
https://camerisefsl.ca/resources/what-does-research-show-about-the-benefits-of-language-learning/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506429.78/warc/CC-MAIN-20230922234442-20230923024442-00827.warc.gz
|
en
| 0.932517 | 194 | 3.453125 | 3 |
White House Cries Global Warming During Lull In Western Wildfires
Summer is here and that means Western states are busy battling the wildfires that inevitably rage during the dry season. But a lull in wildfires this year has given some areas a needed reprieve this fire season.
The White House, however, has already seized upon news of massive fires in states like California to make the link between increasing wildfires and global warming. President Obama has once again sent out his science czar Dr. John Holdren to highlight the alleged link between the two.
“Climate change has been making the fire season in the United States and, on average, more intense,” Holdren says in a White House video claiming that global warming will increase wildfires.
“Nationwide, the eight worst years on record, in terms of area burned, have all occurred since the year 2000,” Holdren added. “Wildfires, of course, are dangerous to human health, costly in terms of property loss and generally harmful to ecosystems.”
The Obama administration’s National Climate Assessment also predicted that longer and drier summers will become more common as the Earth warms.
“In short, wildfires accentuated by climate change are putting communities, lives, health, jobs and valuable natural resources at risk.”
Fortunately for the country — unfortunately for the White House climate agenda — the Western U.S. is in the quietest wildfire in four years, according to federal fire data. The country’s current fire experience is also well below the ten-year average.
National Interagency Fire Center (NIFC) data shows that more than 2.5 million acres have burned this year through August 14th — far less than the 2004 to 2013 average of 4.9 million acres. The only year so far to have fewer acres burned by wildfires was 2010, which saw more than 2.2 million acres burned.
FEMA statistics, however, show that wildfires have increased since 2003, but stayed relatively stable (and even fell a little) between 2006 and 2012. Though U.S. wildfires are still dramatically lower than they were in the 1930s and 1940s.
In 1930, wildfires consumed more than 50 million acres of land, but in 2012 wildfires only burnt up 9.2 million acres. During this time, carbon dioxide emissions were much lower than they are today.
“These data suggest that extremely large megafires were 4-times more common before 1940,” Dr. David South of Auburn University told Senators during a June hearing, “we cannot reasonably say that anthropogenic global warming causes extremely large wildfires.”
“However, in today’s world of climate alarmism, where accuracy doesn’t matter, I am not at all surprised to see many journalists spreading the idea that carbon emissions cause large wildfires,” South said.
South argued that claims of global warming-induced wildfires doesn’t match up with the empirical evidence. Wildfire levels are more of a result of forest management, not a warming climate, according to South.
“Policy makers who halt active forest management and kill ‘green’ harvesting jobs in favor of a ‘hands-off’ approach contribute to the buildup of fuels in the forest,” South told the Senate Environment and Public Works Committee in June.
“This eventually increases the risk of catastrophic wildfires,” South said. “To attribute this human-caused increase in fire risk to carbon dioxide emissions is simply unscientific.”
Even though the evidence linking global warming to wildfires may not be clear, NIFC warns of “significant wildland fire potential” through November. This means that more fires could consume more acres in the Western U.S. and elsewhere.
Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact [email protected].
Top 6 on BarbWire.com
We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.
|
<urn:uuid:2b8beb3b-f458-440f-b248-e446d093f027>
|
CC-MAIN-2017-43
|
http://barbwire.com/2014/08/12/white-house-cries-global-warming-during-lull-in-western-wildfires/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824104.30/warc/CC-MAIN-20171020120608-20171020140608-00069.warc.gz
|
en
| 0.948099 | 886 | 2.890625 | 3 |
Flash in embedded devices is a really hot topic – there are quite some questions which should be asked before choosing the “right” flash memory type. Often the wrong decision turns out to backfire – I experienced this in several projects and companies. Questions which should get asked for evaluating possible flash chips and types are:
- How many read/write cycles and for which amount of size the flash needs to last without failure?
- NOR or NAND flash?
- SLC (single cell) or MLC (multi cell) flash?
- What about bad blocks and how to deal with them?
- How much flash space in spare do I need for my project?
- If a filesystem is needed: what kind of filesystem?
Those questions should be dealt with quite carefully when evaluating the right type of flash for a project. Since to most of the above questions there aren’t really simple answers but implications to each other and of course each solution its very own advantages and disadvantages, I’ll try to illustrate some scenarios instead.
Flash storage consists of so-called “erase blocks” (just called blocks from now on). Its size highly depend on the kind of flash (NOR/NAND) and the flash total size.
Usually NOR flash has much greater blocks than NAND flash – typical block sizes are e.g. 64KB for a 4MB NOR flash, 64KB for a 256MB NAND flash, 128KB for a 512MB NAND flash. When flash (especially NAND flash) got bigger and bigger in storage size, pages and later sub-pages got introduced.
NAND flash consists of erase blocks which might consist of pages which might consist of sub-pages. Though technically erase blocks, pages and sub-pages are not the same, they represent – if existing – the smallest flash I/O unit. Whenever I write about (erase-)blocks on flash and your NAND flash has support for pages (most modern NAND flashes do), just consider mentioned blocks here as pages.
NAND flash also may contain an ‘out of band (OOB) area’ which usually is a fraction of the block size. This is dedicated for meta information (like information about bad blocks, ECC data, erase counters, etc.) and not supposed to be used for your actual data payload. Flash storage needs to be addressed ‘by block’ for writing. Blocks can only be ‘erased’ for certain times, till they get corrupted and unusable (10.000 – 100.000 times are typical values).
Usual conclusion of above is, flash storage can be read but not written byte wise – to write to flash, you need to erase the whole block before. This is not totally wrong, but misleading since simplified. Flash storage cells by default have the state “erased” (which matches the logical bit ’1′). Once a bit got flipped to ’0′ you can only get it back to ’1′ by erasing the entire block.
Even though you can indeed only address the flash “per erase block” for writing – and you have to erase (and therewith write the whole erase block) when intended to flip a bit from ’0′ to ’1′ – that doesn’t mean every write operation needs a prior block erase. Bits can be flipped from ’1′ to ’0′ but only an entire block can be switched (erased) in order to get bits within back to ’1′.
Considering an (in this example unrealistic small) erase block contains ’1111 1110′ and you want to change it to, let’s say, ’1110 1111′, you have to:
- erase the whole block, so it will be ’1111 1111′
- flip the 4th byte down to ’0′
But if we e.g. want to turn ’1111 1110′ into ’1010 0110′ we just flip the 2nd, 4th and and 5th bit of the block. That way we don’t need to erase the whole block before, because no bit within the block needs to be changed from ’0′ to ’1′. That way, due to clever write handling of the flash, not every write operation within erase blocks imply erasing the block before.
Taking this into account might significantly enhance the lifetime of your flash (especially SLC NAND, MLC requires some even more sophisticated methods), as blocks can only be erased a certain number of times. It might also allow you to take cheaper flash (with less guaranteed erase cycles).
Also you should make sure, that you don’t keep a majority of erase blocks untouched, while others get erased thousands of times. To avoid this, you usually some kind of ‘wear leveling’. That means, you keep track of how many times blocks got erased, and – if possible – relocate data on blocks, which gets changed often, to blocks which didn’t get erased that often. To get wear leveling done properly, you need to have certain amount of blocks in spare to be able to rotate the blocks and relocate the actual data properly.
Both techniques can significantly improve the lifetime of your flash, however require quite some sophisticated algorithms to get a reasonable advantage over not using them. Bare flash doesn’t deal with those issues. There is controller hardware taking care of that (e.g. in higher-class memory cards / USB sticks), but it usually sucks. If possible, do it in software. Using e.g. Linux to drive your flash, offers quite some possibilities here (looking at file-systems).
NOR blocks compared to those of NAND, in relation to the total storage size of the flash, are quite big – which means:
- bad write performance (several times slower than on NAND flash)
- the very same erase block gets erased far more often and therewith exceed the ‘max. erase cycles’ far easier (in addition: erase cycles are usually about 1000 times less on NOR than on NAND flash)
Bad blocks and how they’re dealt with decides whether you can use your flash in the end as normal storage or end up in debugging nightmares, caused by weird device failures which might result of improper bad block handling of your flash. A bad block is considered an erase block, which shouldn’t be used anymore because it doesn’t always store data as intended due to bit flips. This means, parts of the block can’t be erased (flipped back to ’1′ anymore, parts “float” and can’t be get into a well-defined state anymore, etc.). Blocks only can be erased certain amount of times, until they get corrupted and therewith ‘bad’. Once you encounter a probably bad block, it should be marked as bad immediately and never ever be used again. Marking a bad block means: Adding this bad block to a table of bad blocks (which is mostly settled at the end of the flash). Since this table sit within blocks on the flash, which might get bad as well, this table is usually redundant. Bad blocks happen, especially on NAND flash. Even never used NAND flash, right from the factory, might contain bad blocks. Because of that, NAND flash manufacturers ship their flash with “pre-installed” information about which blocks are bad from the beginning. Unfortunately, how this information is stored on the flash, is vendor / product specific. Another common area to store this kind of information the OOB area (if existing) of the flash. This also means, flash of the very some vendor and product, will have a different amount of usable blocks. This is a fact you have to deal with – don’t be too tight in your calculation, you’re going to need space in spare as replacement for bad blocks!
There are actually NAND chips available doing bad block management by their own. Although I never used them myself, what I read it sounds quite nice. Most bare flash however doesn’t deal with bad blocks. There might be pre-installed information about bad blocks from the beginning, there might be not. And if there is, the format is what the vendor chose to be the format. That means, if using a flash controller dealing with bad blocks for you, it needs to be able to read and write the type of format those information are stored in. It needs to be aware about whether the flash has an OOB-areas or not and how they’re organized.
There is quite some sophisticated and flexible flash controller hardware out there, but again: if possible, do it in software. There is quite good and proven code for that available.
NOR flash is way more predictable than NAND flash. NAND flash blocks might get bad whenever they want (humidity, temperature, whatever..). Reading NAND flash stresses it as well – yes, reading NAND flash causes bad blocks! Although this doesn’t happen as often as due to write operations (and far less on SLC than on MLC flash), it happens and you better deal with it!
The number of expected erase cycles is mentioned in the data-sheets of NAND flashes. The number of read cycles isn’t. However it’s usually something around 10 to 100 times the erase cycles. Imagine you want to boot from your NAND flash, and the boot-loader – which doesn’t deal yet with bad blocks – sits within blocks which react unpredictable / become bad.. a nightmare! That’s why it’s common now, that the first few blocks of NAND flash are guaranteed to be safe for the first N erase cycles. Make sure your boot-loader fits into those safe blocks!
doc/techref/flash.txt · Last modified: 2012/08/07 13:47 by mirko
|
<urn:uuid:7b1a2066-ac2e-4966-82d1-2fd21fa56af8>
|
CC-MAIN-2014-10
|
http://wiki.openwrt.org/doc/techref/flash
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999673608/warc/CC-MAIN-20140305060753-00040-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.928278 | 2,075 | 3.140625 | 3 |
The Black Hills region in western South Dakota is known for its rich stores of gold and silver. In fact, 41 million ounces of gold and 9 million ounces of silver were pulled from Homestake Mine in Lead, SD between the 1870s and early 2000s. During that time, 370 miles of mine tunnels were created, reaching depths of 8,000 feet. But in 2006 science took over: Sanford Underground Research Facility (Sanford Lab) is an underground particle physics research complex housed in the former mine, using the earth and rock to shield experiments from cosmic rays. The better the shielding, the more likely the scientists will detect neutrinos and suspected dark matter particles called WIMPs. Earlier this summer, Lead celebrated the ribbon-cutting of a new visitor center that highlights the history of the old mine and the current and future science at Sanford Lab.
The U.S. Department of Energy’s Lawrence Berkeley National Lab (Berkeley Lab) is a key player in the creation of Sanford Lab and in the operation of some of its current and future experiments, including the dark matter experiment called LUX and a neutrino experiment called the MAJORANA DEMONSTRATOR. Berkeley Lab is also managing the Berkeley Low Background Facility and the forthcoming LUX-ZEPLIN (LZ) dark matter project, which builds on the accomplishments of LUX.
As a science writer for Berkeley Lab, I was able to catch a ride on one of the mine’s elevators, called a cage, and descend 4,850 feet down to learn more about the science and the scientists who work on these projects.
The above slideshow illustrates what it’s like to go underground. The short video below shows the last few seconds of the cage ride and our exit into the space called the Davis Campus, completed in 2012 and home to the MAJORANA DEMONSTRATOR, the LUX experiment, and other facilities.
In addition to checking out the MAJORANA DEMONSTRATOR and LUX projects, I joined a tour given to a group of esteemed scientists (including Berkeley Lab’s Eric Linder) who were in the nearby town of Deadwood, SD for a conference on particle physics and cosmology. As part of the tour, we traveled through unlit tunnels, visited construction sites of a future experiment, and walked through the refuge chamber, a shelter equipped with water, meal bars, and canisters of breathable air in case a fire or other disaster strikes.
I went underground at 7:30 a.m. and came back up at noon. My four and a half hours of being shielded from daylight and cosmic rays was pleasant enough, but when I stepped outside, above ground, I was glad to see a bright sun and feel the breeze on my skin.
Below is a slideshow that details the underground experiments. The short video that follows gives a sense of what it’s like to travel through the tunnels.
All photo and video credits: Kate Greene.
Lawrence Berkeley National Laboratory addresses the world’s most urgent scientific challenges by advancing sustainable energy, protecting human health, creating new materials, and revealing the origin and fate of the universe. Founded in 1931, Berkeley Lab’s scientific expertise has been recognized with 13 Nobel prizes. The University of California manages Berkeley Lab for the U.S. Department of Energy’s Office of Science. For more, visit www.lbl.gov.
DOE’s Office of Science is the single largest supporter of basic research in the physical sciences in the United States, and is working to address some of the most pressing challenges of our time. For more information, please visit science.energy.gov.
|
<urn:uuid:f35b2d59-9650-458d-ae5c-70b1b907d9a5>
|
CC-MAIN-2020-10
|
https://newscenter.lbl.gov/2015/08/03/notes-from-the-particle-physics-underground/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144708.87/warc/CC-MAIN-20200220070221-20200220100221-00253.warc.gz
|
en
| 0.942255 | 760 | 3.296875 | 3 |
Date of Degree
Earth & Environmental Sciences
Peter M. Groffman
Chester B. Zarnoch
Biogeochemistry | Climate | Soil Science
Climate Change, Wetland, Soil, Carbon, Nitrogen, Halophyte
Wetlands are complex environments that play a critical role in regulating the global biogeochemical cycle of carbon (C) and nitrogen (N). Wetlands are critical contributors to global climate change and atmospheric chemistry since they store as much as 33% of the world’s soil organic carbon (SOC), release more than 20% of the atmospheric methane (CH4), and produce nitrous oxide (N2O), an extremely potent greenhouse gas (GHG). Despite the enormous radiative forcing potential of carbon dioxide (CO2), CH4 and N2O derived from wetlands, uncertainties over the rates of C sequestration and GHG production persist. Here we present data on the carbon accretion rates (CAR), carbon stocks, GHG production and N cycling for a lagoon salt marsh system in California. I quantified C and N stocks, CAR, and CO2, CH4, and N2O efflux during a 32-day incubation experiment, in Scott’s Creek Marsh, a lagoon salt marsh system in California, with a focus on variation with the halophytic plant community within the marsh.
Scott’s Creek Marsh’s C pool of 305.77 Mg C ha-1 is high relative to other studied salt marshes, with significant variation in halophytic zones. Zones dominated by Typha latifolia, an exotic, invasive plant had the highest %C (4.68%), C density (0.069 g cm-3), total C (347.3 Mg C hectare-1) and CAR (195.8 g C m-2 yr-1). The average CAR for SCM, 157.81 ± 9.23 g C m-2 yr -1 was low compared to other studied salt marshes along the Pacific coast of the United States (173.6 g C m-2 yr -1) and globally (244.7). However, it is important to note that our study did not include the O horizon of the soils and the soils are not saturated year-round. There is a clear need for further study of the dynamics of Typha invasion and its effects on salt marsh C and N dynamics.
Hydrology, which controls oxidized versus reduced soil conditions is a clear driver of C and N dynamics in these salt marshes. The 32-day incubation revealed a significant difference in the amount of CO2 respired under oxidized and reduced soil conditions; however, the type of halophytic zones did not significantly influence CO2 production. Flooding the soils reduced the rate of respired C-CO2 by 30.51% (Distichlis), 53.76% (Juncus), and 50.47% (Typha), respectively. Our data revealed no significant differences (P > 0.05) in methane efflux between treatments (oxidized vs. reduced) and all three halophytic zones. Based on our annual methane efflux data, it appears that C-CH4 does not constitute a large portion of the soil carbon. The C-CH4 efflux comprised less than 0.01% of the initial carbon.
The N2O concentrations did not significantly differed between zones but did so based on treatment, with oxidized samples producing significantly more N2O than reduced. The nitrification variation between reduced and oxidized samples was significant based on our statistical analyses (P < 0.001). Nitrification among the oxidized samples based on our calculations would constitute a total per annual basis of 5.71% of the N stock. Regression analyses indicated there was a direct relationship between mineralization and nitrification for the oxidized samples during the incubation (R2 = 0.99, P < 0.001).
This study provided novel and important information on an important ecosystem type that is affected by multiple components of global environmental change that influences plant community composition and hydrologic conditions. The information will increase our ability to understand and manage these ecosystems to achieve environmental goals related to climate change, water and air quality, and biodiversity.
Gormley, Mark D., "Carbon and Nitrogen Dynamics of a Lagoon Salt Marsh in Davenport, California" (2021). CUNY Academic Works.
|
<urn:uuid:00d3693d-a480-49ba-8c69-d99a779c93ee>
|
CC-MAIN-2023-40
|
https://academicworks.cuny.edu/gc_etds/4495/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00094.warc.gz
|
en
| 0.919836 | 991 | 2.546875 | 3 |
Want to learn a new language? The easiest languages for English speakers to learn are generally those languages that use the same Roman alphabet and have a similar grammar structure.
On the other hand, the most difficult languages to learn for English speakers are those with foreign writing systems, tonality, and alien grammar. If you’re an English speaker and you’ve managed to become fluent in any of the 10 languages below, give yourself a pat on the back.
1. BasqueA study by the British Foreign Office found that Basque was the hardest language to learn for English speakers. A dialect of the Basque people in Spain, the Basque language carries no syntactic parallels to English – despite having evolved in a region surrounded by Romance languages like Spanish and French.
As with many of the languages on this list, the Basque language is agglutinative. This means that words are formed, then altered with prefixes and suffixes. For example, the word “lege” means law in Basque, but the sentence “according to the law” wouldn’t be 4 distinct words, but instead would be “legearen arabera.”
Basque also uses case endings in order to indicate relationships between words. For example, the Basque word for “mountain” is “mendi”, but the phrase “to the mountain” is simply “mendira”. Although Basque is extremely challenging for English learners syntactically, it shares the Roman alphabet, and the pronunciation is relatively easy for English speakers.
2. ArabicArabic is another one of the hardest languages to learn – some would even argue its the hardest. The first challenge for English readers learning Arabic is the script, which looks extremely foreign to anyone raised on the roman Alphabet. Many of the letters in Arabic have 4 different forms, and vowels are not included in writing.
Unlike with European languages, English speakers won’t find any similar sounding words in Arabic. To make things more complicated, in Arabic the verb generally comes before the subject and object, and they can be singular, dual, and plural. Just your average present tense verb will have 13 different forms. There are also 2 genders, as well as 3 noun cases.
There are also different dialects of Arabic. While most English leaders will study modern standard Arabic, there are also variations that are as different from modern standard Arabic, as French and Spanish are different from English.
3. CantoneseCantonese is a Chinese dialect spoken in the Canton region of China (including Hong Kong). It shares its written form with Mandarin Chinese – or perhaps more accurately – it actually has no written form of its own and borrows the Mandarin writing system. However, the way Cantonese is spoken will differ than the way it is written using Hanzi characters.
Speaking of Hanzi characters, written Chinese is not phonetic. If you’re learning a new European language, or even an exotic phonetic language like Korean, you can at least sound out words you’re not familiar with. In Chinese, the writing system is pictoral, meaning that each character represents a different word. The only way to know the meaning of a character is to have it memorized, all 20,000+ characters.
To make things even more complicated, the exact same character will almost always have multiple meanings, depending on the context. The same sounding word can also have more than one written form, with each written form having a different meaning.
As difficult as the writing system is to grasp, the spoken dialect is perhaps even more complex. Compared to Cantonese, spoken Mandarin Chinese is a breeze to learn. Like Mandarin Chinese, Cantonese is a tonal language, which can be extremely confusing for English speakers. The same sound spoken in a different tone can hold a completely different meaning. And unlike Mandarin Chinese which has 4 tones, Cantonese has 8 tones, with each change in pitch and inflection re-shaping a word’s meaning.
4. FinnishFinnish has no Germanic or Latin influence, making its vocabulary completely alien to English speakers. Finnish grammar is also infamous for its difficulty. With 15 noun cases, sometimes just small differences can result in a huge difference in meaning. For example, “talotta” means “without a house” in Finnish, while “talolta” means “from a house.”
Fortunately, Finnish is a phonetic language and written in the Roman Alphabet, so despite the lack of common vocabulary and alien grammar, at least you’ll be able to sound out the words.
5. HungarianHungarian is in the same Finno-Ugric language family as Finnish. Although Hungarian does use the Roman alphabet, the pronunciation is significantly different from English. For one, it has vowel sounds that are completely alien to English speakers (á,é,ó,ö,ő,ú,ü,ű,í), as well as consonant clusters that will get your tongue tied up into knots (ty, gy, ny, sz, zs, dzs, dz, ly, cs).
In Hungarian grammar, possession, tense, and number are not dictated by word order, but by suffixes. This makes the sentence structure seemingly flexible, but in reality, extremely similar sentences can take on completely different meanings with slight alterations in the suffixes.
6. NavajoNot that you’re going to try learning Navajo anytime soon, but if you did, you’d be in for quite a challenge. Navajo is so unique that it was used during World War II as the basis for an unbreakable code used by the Americans in the Pacific War against the Japanese. By creating a code based on the Navajo language and using trained bilingual Navajo “code-talkers”, the Americans were able to create a code that was never broken by the Japanese.
Virtually everything in Navajo is done exactly the opposite as its done in English. It is a verb-centered language. Even descriptions are given through verbs, and English adjectives have no direct translation in Navajo. Another interesting feature of the language is that it has animacy – a hierarchy of animation determines what verbs a noun will take on. For example, nouns like human and lightning are at the top of the hierarchy, while children and large animals come after, and abstractions are at the very bottom.
7. Mandarin ChineseIn discussing Cantonese, we already discussed the complexity of written Chinese. The lack of phonetics make it a hostile language to the learner.
Like Cantonese, Mandarin is a tonal language. This means that a simple change in pitch and/or inflection can completely modify the meaning of the same sound. To make spoken Mandarin easier for English speakers, Mandarin can be sounded out using “Pinyin”, a transliteration system that uses the Roman Alphabet to present the language phonetically. It was created by the Chinese government in the 1950s to help standardize the language.
Of course, Pinyin doesn’t make the tonal aspect of the language any easier. The sound Ma” for example can represent 5 distinct words, depending on the tone, or lack thereof. For example:
- “Mā”, said with a high and level tone, means mother.
- “Má”, said in a rising tone, means hemp.
- “mǎ”, said in a tone that dips low and then rises back up, means horse.
- “Mà”, said in a dropping tone, means to scold.
- “Ma”, said in a flat, neutral tone, is used at the end of a sentence to indicate that a question is being asked.
As far as grammar goes, Mandarin Chinese is actually much easier than most other languages, since there’s no conjugation and words generally only have one grammatical form. However, it also posses unique challenges of its own. For example, Mandarin uses about a dozen adverbs that have no English equivalent.
8. JapaneseUnlike Mandarin Chinese, Japanese is actually extremely easy to pronounce for English speakers. The simple combinations of vowels and consonants used to make-up Japanese pronunciation is very easy for a native English speaker to grasp.
Unfortunately, written Japanese is even more difficult than written Chinese. It incorporates the Kanji pictoral characters from Chinese, and also incorporates additional characters that are exclusive to Japanese.
9. EstonianEstonian has a rigid case system. In case you forgot, a case system is where words inflect depending on their grammatical function in a sentence. And with 14 cases, that’s a lot to keep in mind.
The many seemingly arbitrary exceptions to Estonian grammar rules also serve to make this language a challenge for English learners.
10. PolishLike Estonian, the Polish grammatical system makes use of cases. Its also seems sometimes that Polish grammar actually has more exceptions than it has rules. While for example, a language like Germanhas 4 cases where proper usage can be deducted based on logical rules, the 7 cases in Polish often seemed to be used arbitrarily, rather than being based on a higher level rule. You simply have to be aware of each new usage through practice and study.
|
<urn:uuid:c24cc0b9-152e-4386-9b1c-9c544c1906c0>
|
CC-MAIN-2014-23
|
http://opishposh.com/10-hardest-languages-to-learn-for-english-speakers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267745.6/warc/CC-MAIN-20140728011747-00432-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.957213 | 1,953 | 3.109375 | 3 |
It is important to make risk assessments when working with biological agents, as it is with all type of work in laboratories. Such risk assessments can be used to develop routines and safety measures that can prevent incidents and accidents from occurring. Facilities, fittings and equipment shall be adapted to the type of work being done. Handling and safety instructions can be based on what normally is referred to as "Good Laboratory Practise" (GLP) and supplemented by further instructions dependent on the nature of the biological agents used.
Risk group 1
Includes biological agents that normally do not cause infections in humans, e.g. Escherichia coli K-12, Saccharomyces cerevisiae (baker's yeast).
Risk group 2
Infectious agent that can cause illness in humans and can pose a danger to employees. For most people there is effective treatment, or preventive measures, such as vaccination. The infectiousness is usually limited. Examples of such infectious agents are Salmonella spp. (most), streptococci, staphylococci and adenoviruses.
Risk group 3
Infectious agent that can cause serious illness in humans and can pose a serious danger to employees. Often there is effective treatment, or preventive measures, such as vaccination. There may be a risk of dissemination into the society. Examples of such infectious agents are Bacillus anthracis (anthrax), E. coli O157: H7 (bloody diarrhoea sometimes with life-threatening conditions), Yersinia pestis (plague), Yellow fever virus, HIV virus, Rabies lyssavirus and SARS-CoV-2 (COVID-19).
Risk group 4
Infectious agent that can cause very serious illnesses in humans and can pose a serious danger to employees. There is rarely the possibility of effective treatment, or preventive measures, such as vaccination. It can have major consequences if such an infectious agent is disseminated into the society. Examples of such agents are Lassa fever virus, Ebola virus and Marburg virus which all give rise to diseases (with bleeding in internal organs) for which the mortality is up to 50-90%.
What are the rules for work with biological agents?
Below is an excerpt from the regulations for work with biological infectious agents. The complete regulations are found in AFS 2018:4 on "Smittrisker" (Infection risks), only in Swedish, and AFS 2001:1 on Systematic Work Environment Management.
- To minimize the risks associated with working with infectious biological agents, premises, furnishings and equipment must be adapted to the ongoing activities.
- Inspection and maintenance must be carried out to avoid ill-health or accidents.
- Risk assessments must be made and documented in writing, with special attention being paid to identifying: i) what work steps can entail risk of infection, ii) how infectious agents could cause infection, iii) what and how serious consequences it can have for the individual employee to be exposed to infectious agents and iv) the length of time that employees are at risk of being exposed to infectious agents at work.
- The employer must take protective measures considering the nature of the work to avoid spreading of infectious agents, and to keep the number of employees at risk of being exposed to infectious agents as low as possible.
- In order to prevent employees from being exposed to infectious agents, the employer must ensure that employees receive the practical and theoretical training and information necessary before work on infectious agents begins. The training and information shall include at least i) the outcome of the risk assessment, including an account of what health risks the agents may cause, ii) the requirements for hygiene measures, iii) how and what safety measures to apply, and iv) how to report internally on adverse events.
- The employer must ensure that employees, who may be at risk of contact with body fluids from humans and animals, receive special training on the infection risks that may occur within the activity.
- The employer shall, if necessary, offer vaccination, other medical preventive measures, controls and follow-up checks, if employees may have been exposed to, or risk being exposed to, infectious agents at work. It follows from the Work Environment Act that the costs of such measures must be taken by the employer and not by the employees. The employer must ensure that employees are informed about the advantages and disadvantages of vaccination, that vaccines do not always provide complete protection against infection and that other protective measures must therefore also be taken.
- Good personal hygiene should be observed when working with infectious agents i.e. good microbiological practices must be followed and the employer must ensure that workers can wash or disinfect their hands, in work with infection risks.
- Protective clothing should be used for work that may involve exposure to infectious agents. The employer must ensure that employees take off protective clothing and any personal protective equipment before leaving the work area. The employer must also ensure that protective clothing and personal protective equipment are decontaminated, washed in at least 60 °C and destroyed if necessary.
- The employer must ensure that there are routines for decontaminating in a safe way contaminated material, equipment and waste. This decontamination should be done as soon as possible.
- Warning signs that display a biohazard symbol with the text "Smittrisk" and particulars of risk group or biosafety level shall be posted at the entrances to facilities or working areas where infectious agents are used.
- The employer must keep records of the employees who may have been exposed to infectious agents of risk group 3 or 4.
- Work with infectious agents of risk group 2, 3 or 4 must be reported to the Swedish Work Environment Authority no later than 30 days before work commences.
What are the rules for working with biological agents that have been genetically modified?
Read more about the rules for work with genetically modified microorganisms.
|
<urn:uuid:ca1b86c4-8c27-4573-8d71-370aade2aa41>
|
CC-MAIN-2023-40
|
https://www.aurora.umu.se/en/service-and-support/advice-and-guidelines/safety/laboratorysafety/biosafety/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00170.warc.gz
|
en
| 0.939769 | 1,206 | 3.09375 | 3 |
Lebanese culture is the by-product of the ethnic and religious diversity of its population influenced by the conquerors. Some of these would be the Romans, Persians, Greeks, Arabs, Turks and most recently, the French. Due to the latter, Beirut earned the nickname “the Paris of the Middle East” before returning back to the Arabs. All of this cultural history has had an influence on, among other things, the traditional costumes of Lebanon. However, in modern Beirut, most of Lebanese wear stylish Western clothing. On the other hand, their rural counterparts wear the more traditional Lebanese costumes. This brings us to the subject of today’s article.
Traditional clothing is rather different between the urban and rural areas of Lebanon and especially among women’s clothing. However, there is one common feature of the traditional Lebanese female’s clothing. Whether they are city and village dwellers, most Lebanese women try to cover most of their bodies, including the head. Women wear long, black cloaks and cover their faces with veils when they leave their houses. This is not just an Islamic thing. Muslim women, who usually also wear hijab, Christian women alike wear cloaks, scarves, and veils to cover their bodies. It is also common for Lebanese females to take their headscarves off when there are no men nearby which can be quickly brought up over the head and put back into place should any strange man happen upon them.
Regardless of where they come from or their social status, the traditional costume common forall Lebanese women is a long dress with long sleeves, a short, satin, silk or cotton jacket, with minimal embroidery and appliqué, a cloak or scarf to cover the head and body, and occasionally, baggy trousers. The difference between the rural and urban style is usually the amount of decoration. Women from rural areas usually prefer simpler costumes with few decorations. Most Lebanese women prefer these costumes to have long, richly embroidered and embellished that could detach and be reattached as needed. As a result, these sleeves can be bought separately from dresses. Sometimes, the sleeves are even tied back so as not to soil them during eating at a wedding or other special occasion; however, when Lebanese women dance at these events, they let the sleeves fly and flutter about.
The gambaz is another traditional ornamental dress. It is from expensive materials such as velvet, brocade and shiny silk. The gambaz often has a low neckline and most often married women wear it because the bosom symbolizes motherhood. Before it had long, loose sleeves as well, but today the sleeves are fitted to the lady’s arms. Additionally, the skirt may be loose panels or it may also have side slits that reveal a dress underneath.
On top of all of this is the tantur. It is the classic Lebanese headdress newlywed women wear. It’s a very high cone shape and long piece of silk or silk brocade cloth attached to the top of it that flows about midway down the back.
Moving from the head to the toes, Lebanese women have traditionally worn the wooden and usually shaped shoes known as kabkabs since the 14th century. The more ornate belonged to wealthy females. They decorated them with intricate patterns and carvings and mother of pearl. The upper parts of the shoes are of leather, velvet or silk.
Other accessories include these huge belts with even huger belt buckles that women wore in and around the cities of Lebanon. These belts and buckles were also lavishly embellished with colorful glass, gems, pearls, and other precious and semi-precious jewels. Often you could find that the hugest, most beautiful belts at weddings as part of the bride’s wedding outfit. Also, Lebanese women love jewelry and wear a lot of it. Gold and silver necklaces, rings, earrings, bracelets, tiaras, you name it. The amount of jewelry women wear at once was often an indicator of how wealthy or how much their husbands love them.
The national costume of Lebanese males usually is of multi-layered baggy trousers (sherwal), a shirt, a vest, jacket or cloak, a belt, a headdress, and shoes. These clothes display dark colors and stripes. However, the festive costumes are usually more bright in colors
Everyday clothing traditionally consists of black or blue sherwals, a white shirt, a dark vest, a black or red belt, shoes, and a headgear all of which can still be seen in rural areas. As they are very cool and comfortable Lebanese men are in no hurry to get rid of these traditional clothes.
Festive male costumes in Lebanon are bright and ornate. Jackets and vests are decorated with embroidery, atlas ribbons, and metal embellishments. Additionally, it’s usually made from different fabrics than their everyday clothes, but the cut of a costume remains the same.
As mentioned before, the Lebanese are very multicultural and so are their costumes. For instance, the Druze men of Lebanon used to wear short-sleeved shirt and long coats that fell to their knees. Likewise, the jubbe – a hip length jacket with no fastenings – was most common among the Bedouin community of Lebanon.
There are several traditional headdresses men wear. The most popular of which is the keffiya, a headscarf used in many countries of the Arab world. Some Lebanese men also wear the labbade, an old cap from the Phoenician period. However, the tarboush, the traditional short, cone-shaped, brown felt hat (also a fez elsewhere in the world), replaced the labbade. Today, mostly the oldest men use it while younger Lebanese wear keffiya instead.
As you can see, the traditional values and culture of this country are amazing. Even if many people of Lebanon have forsaken their traditional costumes for those of more modern designs and styles, you can still find people wearing the traditional clothing of Lebanon at festivals, ceremonies, and folk performances.
If you want to learn more about Lebanese culture (or Arab culture, in general), or if you want to learn Arabic language skills in Levantine Arabic or other Arabic dialects, why not also check out the Kaleela Arabic learning app? As you may already know, researchers have proven that the best way to learn Arabic is through Arabic learning apps. So, start learning Levantine Arabic now by downloading the Kaleela Arabic learning app to your IOS or Android device today.
|
<urn:uuid:b02e0ac1-a814-4cf0-8c51-b9b0029334c0>
|
CC-MAIN-2023-50
|
https://kaleela.com/ko/lebanese-clothing-why-its-a-reflection-of-lebanese-traditions
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00214.warc.gz
|
en
| 0.966726 | 1,363 | 2.734375 | 3 |
The variety of bones found at Dmanisi -- skulls, ribs, vertebrae, femurs, arm bones, a shoulder blade -- gave Lordkipanidze's team a wealth of information rarely produced at early-hominid digs.
The skull's size fits between Homo habilis and Homo erectus, suggesting it could be a link between the two species, Lordkipanidze says. Its primitive arms and hands were built to climb trees, but the length of its legs suggested the ability to walk long distances. They were carnivores, a characteristic that would require the ability to be on the move to find new sources of food.
Dmanisi's yield of fossils from 1999 to 2006 has startled Lordkipanidze's peers, who work in a field that often requires decades of digging to produce a few fragments.
"It's not one of these sites where you get one or two skulls or fragments," said Jeffrey Schwartz, an anthropology professor at the University of Pittsburgh. "In the time that David has been working there, he's found numerous fossils. It's incredible."
A consensus among paleoanthropologists has not been reached on whether the Dmanisi hominid fossils represent a new species of early human. Lordkipanidze isn't even sure himself. Much of the evidence points to Dmanisi man being a new species, but it also could be a subspecies of Homo erectus.
If science eventually dubs Dmanisi man a new species, Lordkipanidze has a tentative name: Homo georgicus. "I think Homo georgicus will appear one day, maybe five years or in 10 years.
"Understanding what you have can take years," Lordkipanidze explained on a sunny afternoon as he walked the rim of a wide, square pit where most of the fossils were found. "What's our job? It's the reconstruction of crime stories. And you have no [witnesses], no one can tell you what happened. So you have to guess, analyze and compare. But human fossils from this time period are very rare, so it's very difficult to compare with other bones. That's why it takes a long time."
Lordkipanidze appears braced to put in the time. A permanent steel roof is being built over the dig site, an improvement over the makeshift tarp roofs the team relied on in previous years. With the new roof, digs will go on for three months instead of eight weeks.
The site is being transformed into a kind of living museum, with steps and boardwalks that will take visitors from the medieval ruins, through a section of the site where Bronze Age pottery, tools and artifacts were found, and then to the large pit where the hominid digs take place.
|
<urn:uuid:fa78b424-fc9f-4960-9591-5cb9a01fc99f>
|
CC-MAIN-2014-35
|
http://articles.chicagotribune.com/2007-11-18/news/0711170773_1_habilis-human-evolution-david-lordkipanidze/2
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00340-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.958762 | 582 | 3.359375 | 3 |
heap sortA sorting algorithm that works by first organizing the data to be sorted into a special type of binary tree called a heap. The heap itself has, by definition, the largest value at the top of the tree, so the heap sort algorithm must also reverse the order. It does this with the following steps:
1. Remove the topmost item (the largest) and replace it with the rightmost leaf. The topmost item is stored in an array.
2. Re-establish the heap.
3. Repeat steps 1 and 2 until there are no more items left in the heap.
The sorted elements are now stored in an array.
A heap sort is especially efficient for data that is already stored in a binary tree. In most cases, however, the quick sort algorithm is more efficient.
Technology for small business has changed a lot in the last decade. But as technology evolves, so do the challenges. Read More »Windows XP: Move Along, There's Nothing to See Here
After more than 12 years of holding the title of most popular operating system in the world, Windows XP is taking center stage for its final... Read More »Report: The Role of Big Data in the Marketing Industry
According to a new study from Infogroup Targeting Solutions, we can expect to see companies spend heavily on big data marketing initiatives in... Read More »
Although it is almost impossible to keep up with the pace of ongoing product releases, here are three recent highlights in the flash data storage... Read More »15 Important Big Data Facts for IT Professionals
Keeping track of big data trends, research and statistics gives IT professionals a solid foundation to plan big data projects. Here are 15... Read More »Enterprise Storage Vendors
There's a number of vendors that sell enterprise storage hardware or offer cloud-based enterprise storage. View Webopedia's Enterprise storage... Read More »
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
- Check out eWeek's new Research Center, a central and comprehensive library of whitepapers, eBooks, eseminars, webcasts, and more from top industry brands and independent tech journalists »
- Watch Datamation's editor James Maguire moderate roundtable discussions with tech experts from companies such as Accenture, Dell, Blue Jeans Network, Microsoft and more »
|
<urn:uuid:96a3c056-6c2b-4138-91f0-fa01cbd5984b>
|
CC-MAIN-2014-15
|
http://www.webopedia.com/TERM/H/heap_sort.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00034-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.885198 | 491 | 3.140625 | 3 |
What is liver cancer?
Liver cancer refers to the growth of malignant tumors in liver tissue. Cancer that starts in the liver is called primary liver cancer. Cancer that spreads to the liver from another organ is called metastatic liver cancer.
What are the symptoms of liver cancer?
Often there are no symptoms of liver cancer until the later stages. This is why early detection is difficult. When symptoms do occur, they may include fatigue, pain on the right side of the upper abdomen or around the right shoulder blade, nausea, loss of appetite, feeling full after a small meal, unexplained weight loss and jaundice (yellowing of the eyes and the skin). If you have one or more risk factors for liver cancer and any of these symptoms, you should see your doctor immediately.
What causes liver cancer?
There are several risk factors that increase the likelihood someone will get liver cancer.
- Cirrhosis, or scarring, can lead to liver cancer. Over 80 percent of liver cancer cases are linked to cirrhosis. In the United States, hepatitis C and alcohol abuse are the leading causes of cirrhosis.
- Long-term infection with hepatitis B and C are linked to liver cancer because they often lead to cirrhosis. Hepatitis B can lead to liver cancer without cirrhosis.
- Smoking is another probable risk factor, especially among people who abuse alcohol and have cirrhosis.
- Obesity also appears to be linked to primary liver cancer. Less common risk factors include abuse of anabolic steroids, or male hormones, for strength conditioning; exposure to arsenic in drinking water; and exposure to certain chemicals in the plastics industry.
How is liver cancer diagnosed?
Liver cancer may be discovered in a routine checkup if the doctor feels hard lumps in the abdomen, or incidentally by imaging studies. To confirm a diagnosis of liver cancer, doctors would use blood tests; ultrasound; computer tomography (CT) scans; and magnetic resonance imaging, or MRI. Doctors may find it necessary to do a biopsy, where a small sample of liver tissue is removed with a needle and then examined for cancer cells.
How is liver cancer treated?
Transplant: For some patients a liver transplant may be an option, but only if the cancer has not spread to other organs and a suitable liver can be found.
Surgery: In cases where the cancer has been found early and the liver is otherwise healthy, or has only early-stage cirrhosis, doctors will remove the portion of the liver where the tumor is located, a process called surgical resection.
Cryosurgery (also called cryotherapy): This is the use of extreme cold produced by liquid nitrogen (or argon gas) to destroy abnormal tissue.
Ablation: Some liver tumors can be destroyed by processes called ablation. Radio frequency ablation kills liver tumors by heating them to high temperatures with microwave probes. Another ablation technique destroys tumors by injecting them with ethanol, a form of alcohol.
Chemotherapy: Although chemotherapy cannot cure liver cancer, a new technique called transarterial chemoembolization may help prolong life for liver cancer patients. In this procedure, chemotherapy drugs are injected into the blood vessels that feed the tumors. This delivers a high dose of chemotherapy to the tumor while decreasing the flow of blood that feeds the tumor.
Radiation therapy: In some cases, doctors may try to reduce the size or slow the growth of liver cancer with radiation, or high-energy x-rays. Traditional radiation therapy also destroys healthy liver tissue, so doctors are experimenting with new techniques that deliver the radiation with higher precision.
What is the outlook for patients with liver cancer?
A successful liver transplant will effectively cure liver cancer, but it is an option for a small percentage of patients. Surgical resections are successful in only about one out of three cases. However, scientists are experimenting with several promising new drugs and therapies that could help prolong the lives of people with liver cancer.
What is the best way to prevent liver cancer?
There are steps that you can take to reduce the risk of getting liver cancer or to discover it at an early stage, through screening. These steps are especially important if you already have liver disease.
If you have been diagnosed with cirrhosis or chronic liver disease, you should be under the care of a doctor who specializes in liver disease. See your doctor regularly and follow all recommendations for treatment, vaccinations and cancer screenings.
If someone close to you has hepatitis, talk to your doctor about prevention, including vaccination options. Take steps to prevent exposure to hepatitis B and C.
Talk to your doctor about liver health, hepatitis vaccinations and liver cancer screening. This is especially important if you are also a former or current drinker or smoker, or if you are significantly overweight.
What should you do if you have liver cancer?
Scientists are conducting clinical trials, or treatment studies, to determine the effectiveness of new therapies for liver cancer. Ask your doctor if participating in a clinical trial is an option for you.
Support organizations, both in your community and online, can be a valuable resource for patients and their families:
The American Liver Foundation’s local chapters may be able to direct you to a support group in your area. Find the ALF chapter in your area.
CancerCare is a national nonprofit organization that provides free professional support services to anyone affected by cancer. More information can be found at www.cancercare.org. An online liver cancer support group can be found athttp://listserv.acor.org/archives/liver-onc.html.
|
<urn:uuid:79fa21ff-7736-400c-9500-ca86f9fc68a5>
|
CC-MAIN-2020-05
|
https://yourgicenter.com/liver-cancer/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251669967.70/warc/CC-MAIN-20200125041318-20200125070318-00294.warc.gz
|
en
| 0.935909 | 1,152 | 3.078125 | 3 |
Last modified: 2016-02-27 by ian macdonald
Keywords: aboriginal | torres strait islanders |
Links: FOTW homepage | search | disclaimer and copyright | write us | mirrors
The Australian Government has announced it will give formal, legal recognition to the Aboriginal and Torres Strait Islander flags as a "Flag of Australia" from 14 July 1995. This recognition will be proclaimed by Governor-General Bill Hayden under S.5 of the Flags Act 1953. This means that Australia will now have five flags given legal authority under the Flags Act:
Somewhat predictably, this move has caused outrage amongst some conservative (anglophile, monarchist) politicians in the opposition who view it as a move to "reduce the status of the national flag". What they don't realise is that the national flag or blue ensign already has competition from the red and white ensigns. It has already been devalued in status by having competing national flags used for different purposes. And both times it were conservative governments which gave these particular flags legal status!
Personally, I think this is a wonderful move. Both the Aboriginal and Torres Strait Islander flags have earned a national respect and recognition through widespread use. They deserve legal recognition.
Brendan Jones, 5 Jul 1995
The Australian Aboriginal flag and the Torres Strait Islander flag were proclaimed as flags of Australia under section 5 of the Flags Act on 14 July 1995. Section 5 provides authority to proclaim "other" flags and ensigns and it had previously been used to give official status to the ensigns of the Royal Australian Navy and Royal Australian Air Force. The Australian red ensign's use as a civilian shipping flag dates from the early origins of the Australian National Flag.
The Aboriginal and Torres Strait Islander flags are regarded as "indigenous peoples" flags and their use pre-dates their proclamation. Whilst proclamation confirmed their official usage on government buildings as appropriate, the main purpose was to provide the then Labor Government with a political gesture towards indigenous people. It also by-passed a copyright claim by Harold Thomas (the generally recognised designer of the Aboriginal flag) which had been causing some limitations on its use in connection with government and private aboriginal programs, publications and events.
The flags are not equivalent to state or territory flags as they do not correspond to any specific geographic area or sub-government. They are officially used by the federal government's "Aboriginal and Torres Strait Islander Commission" which replaced the previous Department of Aboriginal Affairs as the principal administration entity for government spending and policy. Australian official protocol suggests a precedent below the Australian flag and senior to the state and territory flags. It would be rare for the issue of precedence to arise relative to the military and red ensigns, though these ensigns would probably rank ahead of the Aboriginal and Torres Strait Islander flags, except where the event or location had a specific Aboriginal or Torres Strait Islander connection.
The flags are widely used by individuals, schools and non-government entities to show support for Aboriginal people as well as use by Aboriginals and Torres Strait Islander individuals and organisations. The closest international comparison would be to "ethnic minority" flags, however the Aboriginal people do not regard themselves as an ethnic minority or part of "multicultural Australia". They regard themselves as the original inhabitants and prior owners of the land.
Ralph Kelly, 19 Jan 1998
It is interesting to note that the Liberal party also opposed the proclamation of the Aboriginal and Torres Strait Islander flags in 1995. The following is from a statement made on 4 July 1995 by then Opposition Leader John Howard following an inquiry into the Aboriginal flag:
Raymond Morris, 20 Feb 2005
However, any attempt to give the flags official status under the Flags Act would rightly be seen by many in the community not as an act of reconciliation but as a divisive gesture.
Many Australians would interpret it as yet another move by the Prime Minister to diminish the status of the Australian flag.
Spokesmen for the Government have said that the Aboriginal and Torres Strait Islander flags will be proclaimed under section 5 of the Act, thus giving them the same status as the Australian White Ensign and the flag of the Royal Australian Air Force.
Such a move would be quite inappropriate.
No matter how these flags bulk large in the affections of our indigenous people, they can only ever be symbols for one section of the Australian community. By contrast, the Services belong to, represent and defend the entire nation.
That some Aboriginal people and groups were also
opposed to the proclamation of their flags should definitely also be
noted. Some sections of the Aboriginal community, including the designer
of the Aboriginal flag, felt (and feel) that it is inappropriate for the
Commonwealth government to appropriate the symbols of the Aboriginal and
Jonathan Dixon, 9 Mar 2005
On 14 April 2000, the Defence Force Ensign was gazetted as the sixth Australian official flag
David Cohen, 17 Apr 2000
Both flags were again proclaimed under Section 5 on 25 January 2008, with effect from 1 January 2008. The Legislative
Instruments Act 2003 required the originals to be lodged in a Federal
Register, and due to an administrative oversight they were not, and the
proclamations were automatically repealed. The new proclamations simply
correct that oversight.
The other 3 flags previously afforded the same status were re-proclaimed at the same time (the Defence Force Ensign proclamation needed to be back-dated further to 1 October 2006). One consequence of the Legislative Instruments Act, apart from the unintended repeal of the original proclamations, is to make all current legislative instruments enabled by the Flags Act available through the register at the Attorney-General's Department ComLaw site.
Jonathan Dixon, 23 June and 1 October 2008
|
<urn:uuid:b177d771-86a8-4d9e-8d0b-74957799d595>
|
CC-MAIN-2017-43
|
http://www.crwflags.com/fotw/flags/au-ab_st.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825147.83/warc/CC-MAIN-20171022060353-20171022080353-00097.warc.gz
|
en
| 0.954423 | 1,184 | 2.890625 | 3 |
Find a School
Most of the people who learn Italian worldwide do so out of a fascination with Italian culture, a phenomenon which is so widespread that there’s a word for it: Italophilia. As the home of the Roman Empire, Italy is the cradle of Western civilisation. To understand Italian, therefore, is to understand history, the arts, and the fundamental principles of philosophy, science, and mathematics. It’s no wonder we’re obsessed! Modern Italian developed from the Tuscan dialect - specifically the form spoken in the 14th century, which was used by literary figures of the time including Dante Alighieri and Francesco Petrarca. In fact, it was Dante’s Divine Comedy which ignited a conversation about standardising the country’s many regional dialects, thus encouraging the development of modern Italian. Though this modern standard is spoken across the country today, Italy is still home to a wide variety of different dialects. On our Italian courses, you’ll learn Standard Italian but you’ll also cover local dialectal forms, giving you a well-rounded view of the language and of the culture in your place of study.
We have schools in a variety of locations, including culturally significant cities like Rome, Florence, and Venice. If you prefer to stay at the beach, why not study in a beautiful town like Tropea or Salerno? Whatever you’re looking for, we can help you arrange an immersive experience and create memories to last a lifetime.
Italian is spoken by a total of 85 million people worldwide, primarily in the Italian peninsula but also in regions of Switzerland, Australia, and the Americas. It is still used as a lingua franca in ex-colonial countries like Libya, Eritrea, and Somalia, and over half the population in both Albania and Malta use it regularly. What’s more, as a daughter of Vulgar Latin - i.e. the ‘common tongue’, from which all other Romance languages derive - Italian is closely related to other European languages including French, Spanish, and Portuguese. If you learn Italian, you’ll find that you can easier understand other Latin languages, which could come in handy!
By attending an Italian course at one of our schools, you can unlock the myriad charms of Italy, which are almost too many to numerate. It’s home to more UNESCO World Heritage Sites than anywhere else in the world, many of which date back to the dawn of Western civilisation. It’s the mother of great minds like Galileo, Fibonacci, and Cassini, and of artists like da Vinci and Michelangelo, whose works still draw millions of admirers each year. It’s also the home of luxury fashion houses and fast cars, of world-renowned cuisine and of classical music. With your new-found language skills, you can gain a deeper understanding of these iconic features of Italian life and communicate with the locals like a native.
Don’t hesitate to contact us for further details of our language schools and the packages available.
|
<urn:uuid:318b9664-05ca-4a39-98b4-ccde0892194e>
|
CC-MAIN-2020-16
|
https://www.applelanguages.com/en/learn/italian.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506121.24/warc/CC-MAIN-20200401192839-20200401222839-00365.warc.gz
|
en
| 0.943263 | 633 | 2.71875 | 3 |
Are you a fan of the Internet?
What about the World Wide Web?
Did you know that these two terms are not synonymous?
These are just a few of the many questions I hope to help answer in the next installment of Ultimate Guides. I hope you find the following information helpful and not as terrifying as I do. Know of some more great tidbits about the Internet or WWW? Let me know and I’ll add them to this Ultimate Guide and credit you! Just e-mail edudemic [at] gmail.com or tweet me @edudemic or write on the Edudemic Facebook Wall. What could be easier? Now, on with the insanity:
What Is The Internet?
It’s not something you put on a truck. It’s a series of tubes!
Seriously, What Is It?!
The Internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard. Through telephone wires and satellite links, Internet users can share information in a variety of forms. The size, scope and design of the Internet allows users to:
- connect easily through ordinary personal computers and local phone numbers;
- exchange electronic mail (E-mail) with friends and colleagues with accounts on the Internet;
- post information for others to access, and update it frequently;
- access multimedia information that includes sound, photographic images and even video; and
- access diverse perspectives from around the world.
An additional attribute of the Internet is that it lacks a central authority—in other words, there is no “Internet, Inc.” that controls the Internet. Beyond the various governing boards that work to establish policies and standards, the Internet is bound by few rules and answers to no single organization.
In February 1996, President Clinton signed into law the Communications Decency Act, which provides criminal penalties for those who post or transmit “indecent” material via the Internet. This law, however, has been challenged in U.S. courts by those who feel it would unfairly prohibit many legitimate uses of the Internet, and was ruled unconstitutional in July 1996. The federal government, however, is preparing an appeal. For the latest status of the CDA, go to http://www.eff.org/ or http://www.fcc.gov/telecom.html. Here’s a helpful video courtesy of CBC that describes the reason for why the Internet held such appeal when it was first getting going:
The Internet Described In 60 Seconds
The conceptual foundation for creation of the Internet was largely created by three individuals and a research conference, each of which changed the way we thought about technology by accurately predicting its future: (source: LivingInternet)
- Vannevar Bush wrote the first visionary description of the potential uses for information technology with his description of the “memex” automated library system.
- Norbert Wiener invented the field of Cybernetics, inspiring future researchers to focus on the use of technology to extend human capabilities.
- The 1956 Dartmouth Artificial Intelligence conference crystallized the concept that technology was improving at an exponential rate, and provided the first serious consideration of the consequences.
- Marshall McLuhan made the idea of a global village interconnected by an electronic nervous system part of our popular culture.
In 1957, the Soviet Union launched the first satellite, Sputnik I, triggering US President Dwight Eisenhower to create the ARPA agency to regain the technological lead in the arms race. ARPA appointed J.C.R. Licklider to head the new IPTO organization with a mandate to further the research of the SAGE program and help protect the US against a space-based nuclear attack. Licklider evangelized within the IPTO about the potential benefits of a country-wide communications network, influencing his successors to hire Lawrence Roberts to implement his vision.
Roberts led development of the network, based on the new idea of packet switching invented by Paul Baran at RAND, and a few years later by Donald Davies at the UK National Physical Laboratory. A special computer called an Interface Message Processor was developed to realize the design, and the ARPANET went live in early October, 1969. The first communications were between Leonard Kleinrock‘s research center at the University of California at Los Angeles, and Douglas Engelbart‘s center at the Stanford Research Institute.
The first networking protocol used on the ARPANET was the Network Control Program. In 1983, it was replaced with the TCP/IP protocol invented Wby Robert Kahn, Vinton Cerf, and others, which quickly became the most widely used network protocol in the world.
In 1990, the ARPANET was retired and transferred to the NSFNET. The NSFNET was soon connected to the CSNET, which linked Universities around North America, and then to the EUnet, which connected research facilities in Europe. Thanks in part to the NSF’s enlightened management, and fueled by the popularity of the web, the use of the Internet exploded after 1990, causing the US Government to transfer management to independent organizations starting in 1995.
Did Al Gore invent the Internet?
According to a CNN transcript of an interview with Wolf Blitzer, Al Gore said,”During my service in the United States Congress, I took the initiative in creating the Internet.” Al Gore was not yet in Congress in 1969 when ARPANET started or in 1974 when the term Internet first came into use. Gore was elected to Congress in 1976. In fairness, Bob Kahn and Vint Cerf acknowledge in a paper titled Al Gore and the Internet that Gore has probably done more than any other elected official to support the growth and development of the Internet from the 1970′s to the present. (Source: walthowe.com)
The History of the Internet
The Internet was the result of some visionary thinking by people in the early 1960s who saw great potential value in allowing computers to share information on research and development in scientific and military fields. J.C.R. Licklider of MIT, first proposed a global network of computers in 1962, and moved over to the Defense Advanced Research Projects Agency (DARPA) in late 1962 to head the work to develop it. Leonard Kleinrock of MIT and later UCLA developed the theory of packet switching, which was to form the basis of Internet connections. Lawrence Roberts of MIT connected a Massachusetts computer with a California computer in 1965 over dial-up telephone lines. It showed the feasibility of wide area networking, but also showed that the telephone line’s circuit switching was inadequate. Kleinrock’s packet switching theory was confirmed. Roberts moved over to DARPA in 1966 and developed his plan for ARPANET. These visionaries and many more left unnamed here are the real founders of the Internet.
The Internet, then known as ARPANET, was brought online in 1969 under a contract let by the renamed Advanced Research Projects Agency (ARPA) which initially connected four major computers at universities in the southwestern US (UCLA, Stanford Research Institute, UCSB, and the University of Utah). The contract was carried out by BBN of Cambridge, MA under Bob Kahn and went online in December 1969. By June 1970, MIT, Harvard, BBN, and Systems Development Corp (SDC) in Santa Monica, Cal. were added. By January 1971, Stanford, MIT’s Lincoln Labs, Carnegie-Mellon, and Case-Western Reserve U were added. In months to come, NASA/Ames, Mitre, Burroughs, RAND, and the U of Illinois plugged in. After that, there were far too many to keep listing here.
The Internet was designed in part to provide a communications network that would work even if some of the sites were destroyed by nuclear attack. If the most direct route was not available, routers would direct traffic around the network via alternate routes.
The early Internet was used by computer experts, engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system.
E-mail was adapted for ARPANET by Ray Tomlinson of BBN in 1972. He picked the @ symbol from the available symbols on his teletype to link the username and address. The telnet protocol, enabling logging on to a remote computer, was published as a Request for Comments (RFC) in 1972. RFC’s are a means of sharing developmental work throughout community. The ftp protocol, enabling file transfers between Internet sites, was published as an RFC in 1973, and from then on RFC’s were available electronically to anyone who had use of the ftp protocol.
Libraries began automating and networking their catalogs in the late 1960s independent from ARPA. The visionary Frederick G. Kilgour of the Ohio College Library Center (now OCLC, Inc.) led networking of Ohio libraries during the ’60s and ’70s. In the mid 1970s more regional consortia from New England, the Southwest states, and the Middle Atlantic states, etc., joined with Ohio to form a national, later international, network. Automated catalogs, not very user-friendly at first, became available to the world, first through telnet or the awkward IBM variant TN3270 and only many years later, through the web.
The Internet matured in the 70′s as a result of the TCP/IP architecture first proposed by Bob Kahn at BBN and further developed by Kahn and Vint Cerf at Stanford and others throughout the 70′s. It was adopted by the Defense Department in 1980 replacing the earlier Network Control Protocol (NCP) and universally adopted by 1983.
The Unix to Unix Copy Protocol (UUCP) was invented in 1978 at Bell Labs. Usenet was started in 1979 based on UUCP. Newsgroups, which are discussion groups focusing on a topic, followed, providing a means of exchanging information throughout the world . While Usenet is not considered as part of the Internet, since it does not share the use of TCP/IP, it linked unix systems around the world, and many Internet sites took advantage of the availability of newsgroups. It was a significant part of the community building that took place on the networks.
Similarly, BITNET (Because It’s Time Network) connected IBM mainframes around the educational community and the world to provide mail services beginning in 1981. Listserv software was developed for this network and later others. Gateways were developed to connect BITNET with the Internet and allowed exchange of e-mail, particularly for e-mail discussion lists. These listservs and other forms of e-mail discussion lists formed another major element in the community building that was taking place.
In 1986, the National Science Foundation funded NSFNet as a cross country 56 Kbps backbone for the Internet. They maintained their sponsorship for nearly a decade, setting rules for its non-commercial government and research uses.
As the commands for e-mail, FTP, and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today’s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets–to communicate with colleagues around the world and to share files and resources.
While the number of sites on the Internet was small, it was fairly easy to keep track of the resources of interest that were available. But as more and more universities and organizations–and their libraries– connected, the Internet became harder and harder to track. There was more and more need for tools to index the resources that were available.
The first effort, other than library catalogs, to index the Internet was created in 1989, as Peter Deutsch and his crew at McGill University in Montreal, created an archiver for ftp sites, which they named Archie. This software would periodically reach out to all known openly available ftp sites, list their files, and build a searchable index of the software. The commands to search Archie were unix commands, and it took some knowledge of unix to use it to its full capability. Read the full and unabridged version over at walthowe.com, it’s worth it!
The Internet (and fashion sense) Was Confusing In The 90s
This clip from the Today Show has caused a bit of a firestorm lately and was actually the impetus for creating this Ultimate Guide.
The Difference Between ‘Internet’ and ‘World Wide Web’
The Internet is the large container, and the Web is a part within the container. It is common in daily conversation to abbreviate them as the “Net” and the “Web”, and then swap the words interchangeably. But to be technically precise, the Net is the restaurant, and the Web is the most popular dish on the menu.
Here is the detailed explanation:
The Internet is a Big Collection of Computers and Cables.
The Internet is named for “interconnection of computer networks”. It is a massive hardware combination of millions of personal, business, and governmental computers, all connected like roads and highways. The Internet started in the 1960′s under the original name “ARPAnet”. ARPAnet was originally an experiment in how the US military could maintain communications in case of a possible nuclear strike. With time, ARPAnet became a civilian experiment, connecting university mainframe computers for academic purposes. As personal computers became more mainstream in the 1980′s and 1990′s, the Internet grew exponentially as more users plugged their computers into the massive network. Today, the Internet has grown into a public spiderweb of millions of personal, government, and commercial computers, all connected by cables and by wireless signals.
No single person owns the Internet. No single government has authority over its operations. Some technical rules and hardware/software standards enforce how people plug into the Internet, but for the most part, the Internet is a free and open broadcast medium of hardware networking.
The Web Is a Big Collection of HTML Pages on the Internet.
The World Wide Web, or “Web” for short, is that large software subset of the Internet dedicated to broadcasting HTML pages. The Web is viewed by using free software called web browsers. Born in 1989, the Web is based on hypertext transfer protocol, the language which allows you and me to “jump” (hyperlink) to any other public web page. There are over 40 billion public web pages on the Web today.
Important Terms Everyone on the Internet Should Know
The Web vs. the Internet
The Internet is a vast ‘interconnection of computer networks’ that spans the globe. It is comprised of millions of computing devices that trade volumes of information. Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, and even soda pop machines are connected to the Net.
The Internet started in the late 1960′s as an American military project, and has since evolved into a massive public spiderweb. No single organization owns or controls the Internet. The Net has grown into a spectacular mishmash of non-profit, private sector, government, and entrepreneurial broadcasters.
The Internet houses many layers of information, with each layer dedicated to a different kind of documentation. These different layers are called ‘protocols‘. The most popular protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and email.
The World Wide Web, or ‘Web’ for short, is the most popular portion of the Internet. The Web is viewed through web browser software.
http and https
http is a technical acronym that means ‘hypertext transfer protocol‘, the language of web pages. When a web page has this prefix, then your links, text, and pictures should work in your web browser.
https is ‘hypertext transfer protocol SECURED’. This means that the web page has a special layer of encryption added to hide your personal information and passwords. Whenever you log into your online bank or your web email account, you should see https at the front of the page address.
:// is the strange expression for ‘this is a computer protocol‘. We add these 3 characters in a Web address to denote which set of computer lanaguage rules affect the document you are viewing.
A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents.
The most popular web browsers in 2010 are: Firefox, Google Chrome, Internet Explorer, and Safari.
HTML and XML
Hypertext Markup Language is the programmatic language that web pages are based on. HTML commands your web browser to display text and graphics in orderly fashion. HTML uses commands called ‘HTML tags’ that look like the following:
- <a href=”www.edudemic.com”></a>
XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following:
XHTML is a combination of HTML and XML.
URL’s, or ‘uniform resource locators’, are the web browser addresses of Internet pages and files. A URL works together with IP addresses to help us name, locate, and bookmark specific pages and files for our web browsers.
URL’s commonly use three parts to address a page or file: the protocol (which is the portion ending in ‘//:’); the host computer (which sometimes ends in .com); and the filename/pagename itself. For example:
Your computer’s ‘internet protocol’ address is a four-part electronic serial number. An IP address looks something like ’126.96.36.199′, complete with dot separators. Every computer, cell phone, and device that accesses the Internet is assigned at least one IP address for tracking purposes. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address acts like a type of automobile licence plate to enforce accountability and traceability.
Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g. Microsoft Outlook).
Email has many cousins: text messaging, instant messaging, live chat, videomail (v-mail), Google Waving.
Blogs and Blogging
A blog (‘web log’) is a modern online writer’s column. Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages.
Web logs are usually arranged chronologically, and with less formality than a full website. Blogs vary in quality from very amateurish to very professional. It costs nothing to start your own personal blog.
Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web. Commonly, downloading is associated with songs, music, and software files (e.g. “I want to download a new musical ringtone for my cell phone”, “I want to download a trial copy of Microsoft Office 2010″). The larger the file you are copying, the longer the download will take to transfer to your computer. Some downloads will take 12 to 15 hours, depending on your Internet speed.
Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music.
Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things:
- vandalize your computer in some way
- steal your private information
- take remote control of your computer (‘zombie’ your computer) for other ends
- manipulate you into purchasing something
Malware programs are the time bombs and wicked minions of dishonest programmers.
Router (aka ‘Network Router’)
A router, or in many cases, a router-modem combination, is the hardware device that acts as the traffic cop for network signals into your home. A router can be wired or wireless or both. Your router provides both a defense against hackers, and the redirection service of deciding which specific computer or printer should get which signals in your home. If your router or router-modem is configured correctly, your Internet speed will be fast, and hackers will be locked out. If your router is poorly configured, you will experience network sluggishness and possible hacker intrusions.
Keywords and Tags/Labels
Keywords are search terms used to locate documents. Keywords are anywhere from one to five words long, separated by spaces or commas: e.g. “horseback riding calgary” e.g. “ipad purchasing advice” e.g. “ebay tips selling”. Keywords are the foundation for cataloging the Web, and the primary means by which you and I will find anything on the Web.
Tags (sometimes called ‘labels’) are recommendation keywords. Tags and labels focus on crosslinking you to related content… they are the modern evolution of ‘suggestions for further reading’.
Texting is the short way to say ‘text messaging’, the sending of short electronic notes usually from a cell phone or handheld electronic device. Texting is popular with people who are mobile and away from their desk computers. Texting is something like the pagers of old, but has the file attachment ability of email.
To send a text message, you will usually need a keyboard-enabled cellphone and a text message service through your cellphone provider. You address your text messages using the recipient’s phone number.
In 2010, texting has spawned a controversial habit called ‘sexting’, which is when young people send sexual photos of themselves to other cell phone users.
I.M. (usually spelled ‘IM’ without the periods) is instant messaging, a form of modern online chatting. IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer. That IM software in turn connects you to potentially thousands of other IM users through the Internet. You locate existing friends and make new friends by searching for their IM nicknames.
Once the software and your friends list is in place, you can send instantaneous short messages to each other, with the option of including file attachments and links. While the recipient sees your message instantly, they can choose to reply at their leisure.
P2P file sharing (‘peer-to-peer’) is the most voluminous Internet activity today. P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other.
Through ‘uploading’ and ‘downloading’, users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P.
E-commerce is ‘electronic commerce’: the transacting of business selling and buying online. Every day, billions of dollars exchange hands through the Internet and World Wide Web. Sometimes, the e-commerce is your company buying office products from another company (business-to-business ‘B2B’ e-commerce). Sometimes, the e-ecommerce is when you make a private purchase as a retail customer from an online vendor (business-to-consumer ‘B2C’ e-commerce).
E-commerce works because reasonable privacy can be assured through technical means (e.g. https secure web pages), and because modern business values the Internet as a transaction medium.
A bookmark (aka “favorite”) is a marker that you can place on web pages and files. You would bookmark something because:
- You want to return to the page or file later
- You want to recommend the page or file to someone else
Bookmarks/Favorites can be made using your right mouse click menu, or the menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on your Mac or Windows computer files.
Social engineering is the conman art of talking directly to people to trick them into divulging passwords and their private information. All social engineering attacks are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards, bogus lottery winnings, stock investment scams, warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you.
Social Media and Social Bookmarking
Social media is the broad term for any online tool that enables users to interact with thousands of other users. Instant messaging and chatting are common forms of social media, as are blogs with comments, discussion forums, video-sharing and photo-sharing websites. Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and Digg.com.
Social bookmarking is a the specific form of social media. Social bookmarking is where users interact by recommending websites to each other (‘tagging sites’).
ISP is Internet Service Provider. That is the private company or government organization that plugs you into the vast Internet around the world. Your ISP will offer varying services for varying prices: web page access, email, hosting your own web page, hosting your own blog, and so on. ISP’s will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).
Today, you will also hear about WISP’s, which are Wireless Internet Service Providers. They cater to laptop users who travel regularly.
Be sure to check out the rest of the helpful jargon over at about.com!
The Eastern Telegraph in 1901 (Closest Thing to the Internet)
The Internet as of 2003
Social Networks and other Maps
This world map shows the popularity of social networking websites in different countries. Orkut sweeps Brazil and India, LiveJournal is in Russia while MySpace is all over Australia. Credit: ValleyWag
The Internet Black Hole world map depict countries where Internet Filtering is common and freedom of online expression is a rare commodity. China, Iran, Turkey, Saudi Arabia, Cuba and other countries where Internet access is restricted are included in the Black Hole world map. Credit: RSF
This poster of online communities shows the various social networking sites like MySpace, Facebook, Orkut, etc represented as islands and continents in the style of a “treasure map.” The relative size of the land roughly represents the size of that community on the web. Credit: xkcd
Online, No One Knows You’re A Dog
The above cartoon by Peter Steiner has been reproduced from page 61 of July 5, 1993 issue of The New Yorker, (Vol.69 (LXIX) no. 20)only for academic discussion, evaluation, research and complies with the copyright law of the United States as defined and stipulated under Title 17 U. S. Code. Click here to view what this cartoon would actually look like today.
A Snapshot of the 2010 Internet
The Periodic Table of the Internet
What Does The Internet Look Like?
Information moving through cyberspace travels in tiny packets that hopscotch around the world. Using data from a two-week stretch in April 2005, the Cooperative Association for Internet Data Analysis (CAIDA) traced these packets’ paths from hub to hub and country to country to capture a snapshot of the worldwide network topology.
The Future of the Internet…And How To Stop It
Since you’ve made it this far, it’s time to go just a bit further! There’s a terrific book out by Professor Jonathan Zittrain titled “The Future of the Internet and How To Stop It” that you should check out. You can even download it for free here. This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.
IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.
The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.” (source: FutureoftheInternet.org)
The World’s First and Second Books Published on the Internet (Year 2000)
Did you know that the first “e-book” was publshed in 2000? That’s way before iPads, Kindles, and even most companies that exist today. It’s called The Internet and is available for viewing over at livinginternet.com A bit about the book from the site: After MH & nmh, this is the second book published on the Internet, and the first book to be published for the Internet. This site was written from 1996 through 1999, posted on the web on January 7, 2000, and updated regularly. It has more than 700 pages, 2,000 intra-site links, and 2,000 external links to some of the world’s best online content about the Internet.
The site was authored by Bill Stewart, who also maintains the FreeOpenSourceSoftware wiki and the best practices document The Fun Standard. Bill has used the Internet since 1988, and first appreciated the power of the medium during the Tiananmen Square rebellion in China in 1989, when he saw how the net kept Chinese communities around the world in touch with the events through email and newsgroups, bypassing all government censorship. Here’s a helpful table of contents that will surely answer any question you may have that was not answered on this Ultimate Guide.
- Internet History
- Internet History — One-Page Summary
- Vannevar Bush and Memex
- Norbert Wiener Invents Cybernetics
- Semi-Automatic Ground Environment (SAGE)
- Dartmouth Artificial Intelligence (AI) Conference
- DARPA/ARPA — Defense / Advanced Research Project Agency
- J.C.R. Licklider And The Universal Network
- Marshall McLuhan Foresees The Global Village
- Paul Baran Invents Packet Switching
- UK National Physical Laboratory (NPL) & Donald Davies
- IPTO — Information Processing Techniques Office
- Leonard Kleinrock Helps Build The ARPANET
- Lawrence Roberts Manages The ARPANET Program
- IMP — Interface Message Processor
- ARPANET — The First Internet
- NCP — Network Control Program
- Robert Kahn — TCP/IP Co-Designer
- Vinton Cerf — TCP/IP Co-Designer
- TCP/IP Internet Protocol
- CSNET — Computer Science Network
- NSFNET — National Science Foundation Network
- EUnet — European Network
- How The Internet Works
- Internet Management
- ISOC — Internet Society
- IAB — Internet Architecture Board
- IETF — Internet Engineering Task Force
- IRTF — Internet Research Task Force
- ICANN — Internet Corporation For Assigned Names And Numbers
- IANA — Internet Assigned Numbers Authority
- NSI — Network Solutions
- Accredited Domain Name Registrars
- NSF — National Science Foundation
- Internet Architecture
- Internet Protocol (IP) Addresses
- Domain Name System (DNS)
- DNS History
- Domain Names
- Domain Name Servers
- Domain Name Aliases
- More DNS Information
- Packet Switching
- Packet Switching History
- How Packets Work
- How Switching Works
- Internet Routing
- Internet Routers
- Interior Gateway Protocols (IGP)
- Routing Information Protocol (RIP)
- Open Shortest Path First (OSPF)
- Interior Gateway Routing Protocol (IGRP)
- Exterior Gateway Protocols (EGP)
- Border Gateway Protocol (BGP)
- Exterior Gateway Protocol (EGP)
- Unix Operating System
- Unix History
- C Programming Language History
- Unix Wars
- Linux History
- More Unix Information
- Ethernet Networking
- Internet Use
- Internet Use
- World Wide Web Use
- Usenet Newsgroups Use
- Email Use
- Mailing List Use
- Internet Relay Chat (IRC) Use
- Multi-User Dungeon (MUD) Use
- Advanced Internet Use
- RFC History
- How To Use RFC’s
- Internet Protocol RFC’s
- Internet Official Protocol Standards RFC’s
- Entertaining RFC’s
- Interesting RFC’s
- RFC’s By Email
- Related RFC References
- Netiquette (Internet Etiquette)
- Netiquette Basics
- Netiquette Of Sending
- Netiquette Of Replying
- Netiquette Of Confidentiality
- More Netiquette Information
- Internet Request For Comments (RFC’s)
- Internet Tools & Resources
- Internet Network Topology
- WHOIS Database
- Ping Command
- Traceroute Command
- NSLOOKUP Command
- Internet Traffic Statistics
- Text On The Internet
- Adding Emphasis To Text
- Emoticons & Smileys
- Text Abbreviations
- Text Actions
- ASCII Art
- Internet Legends & Myths
- Internet Coke Machine
- The Modem Tax
- Internet Toaster
- Neiman-Marcus Cookie Recipe
- Craig Shergold’s Postcards
- Jessica Chain Email Hoax
- Cruise Control In The Rain
- Internet Hackers, Crackers, Hacking
- Richard Stallman
- John Draper
- Mark Abene
- Kevin Mitnick
- Kevin Poulsen
- Vladimir Levin
- Hacker Sites
- How To Get An Internet Domain
- The Future Of The Internet
- Key Internet Features
- Geographic Distribution
- Robust Internet Architecture
- Internet At Near Light Speed
- Universal Internet Access
- Internet Growth Rates
- The Internet’s Digital Advantage
- Internet Freedom Of Speech
- Internet Security
- Internet Confidentiality & Privacy
- Internet Anonymizers
- How Anonymizers Work
- Anonymizer Use
- Anonymizer Limitations
- Anonymizer Sites & Services
- Internet Remailers
- Internet Encryption
- Public Key Cryptography PKC)
- PKC History
- How PKC Works
- More PKC Information
- Pretty Good Privacy (PGP)
- Digital Signatures
- Key Recovery Systems
- Internet Viruses
- Boot & Program Viruses
- Script & Macro Viruses
- Internet Worms
- Virus Protection
- Virus Hoaxes
- More Virus Information
- Password Selection
- Internet Security Resources
- Internet Help
- Frequently Asked Questions (FAQ’s)
- FAQ History
- FAQ Archives
- Create Your Own FAQ
- Internet Terminology
- Starting Over
- Internet Connection & Disconnection
- Cancel An Operation
- More Internet Information
- Internet Organizations
- Internet Web Sites
- Internet History Sites
- Internet Newsgroups
- Internet Mailing Lists
- The Jargon File
- Internet Statistics
- Other Internet References
Other Reference List:
Leaver, T. (2010) What is the Internet? [Lecture]. Retrieved from http://dbs.ilectures.curtin.edu.au/lectopia/lectopia.lasso?ut=2417
(2010). Map of Internet Service Providers. Retrieved June 10th, 2010, from http://steeez.com/wp-content/uploads/2008/11/internet.jpg.
And finally, this is the farthest we’ve come in terms of advancement on the Internet: LOLCats.
Know of some more great tidbits about the Internet or WWW? Let me know and I’ll add them to this Ultimate Guide and credit you! Just e-mail edudemic [at] gmail.com or tweet me @edudemic or write on the Edudemic Facebook Wall. What could be easier?
Without further ado, here’s the END OF THE INTERNET.
|
<urn:uuid:844ae526-ef35-409b-b367-b47e9cb33416>
|
CC-MAIN-2013-20
|
http://www.edudemic.com/2011/02/the-ultimate-guide-to-the-internet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00049-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.915885 | 8,101 | 3.171875 | 3 |
At a press conference held today at NASA headquarters in Washington, D.C. scientists with the Curiosity Mars rover mission announced findings from the analysis of rock powder obtained when the rover first used its drill on bedrock near its landing site. The findings indicate that ancient Mars could have once been habitable for microbial life.
Scientists identified sulfur, nitrogen, hydrogen, oxygen, phosphorus and carbon -- some of the key chemical ingredients for life -- in the powder Curiosity drilled out of a sedimentary rock near an ancient stream bed in Gale Crater on the Red Planet last month.
"A fundamental question for this mission is whether Mars could have supported a habitable environment," said Michael Meyer, lead scientist for NASA's Mars Exploration Program at the agency's headquarters in Washington. "From what we know now, the answer is yes."
Clues to this habitable environment come from data returned by the rover's Sample Analysis at Mars (SAM) and Chemistry and Mineralogy (CheMin) instruments. The data indicate the Yellowknife Bay area the rover is exploring was the end of an ancient river system or an intermittently wet lake bed that could have provided chemical energy and other favorable conditions for microbes. The rock is made up of a fine grain mudstone containing clay minerals, sulfate minerals and other chemicals. This ancient wet environment, unlike some others on Mars, was not harshly oxidizing, acidic, or extremely salty.
The patch of bedrock where Curiosity drilled for its first sample lies in an ancient network of stream channels descending from the rim of Gale Crater. The bedrock also is fine-grained mudstone and shows evidence of multiple periods of wet conditions, including nodules and veins.
Curiosity's drill collected the sample at a site just a few hundred yards away from where the rover earlier found an ancient streambed in September 2012.
"Clay minerals make up at least 20 percent of the composition of this sample," said David Blake, principal investigator for the CheMin instrument at NASA's Ames Research Center, Moffett Field, Calif.
These clay minerals are a product of the reaction of relatively fresh water with igneous minerals, such as olivine, also present in the sediment. The reaction could have taken place within the sedimentary deposit, during transport of the sediment, or in the source region of the sediment. The presence of calcium sulfate along with the clay suggests the soil is neutral or mildly alkaline.
"We have found a habitable environment that is so benign and supportive of life that probably — if this water was around and you had been on the planet, you would have been able to drink it," said Curiosity chief scientist John Grotzinger, of Caltech in Pasadena.
Scientists were surprised to find a mixture of oxidized, less-oxidized, and even non-oxidized chemicals providing an energy gradient of the sort many microbes on Earth exploit to live. This partial oxidation was first hinted at when the drill cuttings were revealed to be gray rather than red.
"The range of chemical ingredients we have identified in the sample is impressive, and it suggests pairings such as sulfates and sulfides that indicate a possible chemical energy source for micro-organisms," said Paul Mahaffy, principal investigator of the SAM suite of instruments at NASA's Goddard Space Flight Center, Greenbelt, Md.
An additional drilled sample will be used to help confirm these results for several of the trace gases analyzed by the SAM instrument. Scientists plan to keep Curiosity in Yellowknife Bay Area for several weeks before starting the long trip to Mount Sharp, the central mound of Gale crater.
|
<urn:uuid:00f9414e-58be-4301-92eb-d2fc992e71fa>
|
CC-MAIN-2013-20
|
http://www.examiner.com/article/nasa-rover-finds-evidence-that-ancient-mars-could-have-supported-life?cid=rss
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00015-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.948026 | 726 | 3.96875 | 4 |
Henchmen of Ares: Warriors and Warfare in Early Greece
by Josho Brouwers
Rotterdam, The Netherlands
The shadow of Homer looms large over the history of ancient Greece, and in no area does it overhang more than in the realm of warfare. Homer composed in poetry what he had inherited from the distant past, and in doing so provided undying inspiration to generations of later Greeks. Homer’s influence also runs throughout Henchmen of Ares, a deeply researched and lavishly illustrated new study of Greek warriors and their world from Mycenaean times to the Persian Wars by Mediterranean archaeologist and Ancient Warfare magazine editor Josho Brouwers.
Homer was in many ways like a medieval poet looking back on the past across of a gulf of years to ancient Rome. Homer, like that poet knew some details well, but others were forgotten, or misunderstood, and he inserted elements from his own era into his work to plug the gaps. Homer’s world, as painted in the Iliad and the Odyssey, is a composite one, not bereft of all value in understanding the past, but not completely accurate either. The contribution of archaeology, Brouwers’ specialty, is necessary to fill in the gaps as they exist and distinguish between authentic survivals from the Mycenaean period, roughly 1600-1200 B.C, and Homer’s interpolations from the so-called Greek “Dark Age,” 1200-800 B.C.
Homer (I will refer to him in the singular for the sake of simplicity, though there is some question as to whether he was in truth a single person) lived around the eighth, or perhaps the seventh, century B.C. His masterpieces, made all the more astonishing because they are the oldest works of Western literature, were derived originally from orally-composed poems that had been handed down from bard to bard over several centuries. From an analysis of the material that comprises the Iliad, it is more than likely that the work dates to soon after the event that it describes, a war with the city of Troy in the 13th century. Though it is probably the case that the Trojan War as it is known was more of an outsize Greek plundering expedition rather than a siege that spent ten full years before the hill of Ilion, the world described in the poem bears a strong relation to that of the Mycenaean Age.
In the centuries of that civilization’s greatness, when powerful kings ruled from citadel-palaces in Mycenae, Tiryns, Pylos, and Orchomenos, Greece produced large armies supplied by the palace-kings with arms. The organization and equipping of such soldiers was overseen by a scribal bureaucracy that wrote on clay tablets in a script known as Linear B. The Mycenaean elites were chariot warriors, just like their social peers in the Near Eastern societies of the Late Bronze Age. They were, following Homer, obsessed (not too strong a word) with their personal honour. The Iliad itself was apparently originally known as the Wrath (as in of Achilles) on account of the bottomless anger that the half-divine son of Peleus felt when Agamemnon, supreme commander of the Greek expeditionary force at Troy, stole away his captive woman, Briseis. Achilles’ bruised feelings caused him to withdraw from the fighting entirely, such was the offense that he took.
Homer gets many things right about the Mycenaean era, despite the elapse of time. The use of boar’s tusk helmets, which Homer describes, has been confirmed via modern-day archaeological finds. Brouwers surmises that Homer may have seen one such example that had been maintained as someone’s family heirloom throughout the Dark Age. History may be done with either words, i.e., written sources, or with a shovel, archaeology. In this instance, as well as in a number of others, Homer has been backed up by the discoveries at dig sites around Greece. There were also common soldiers in Mycenaean armies, and artists did not disdain to portray them on wall frescoes, several of which have been uncovered. Many of these men seem to have worn boar’s tusk helms, and the prevalence of such headgear supports Brouwers belief that they standard-issue equipment provided by the palace-kings to warriors in their service.
The civilization of Mycenae fell at the end of the thirteenth century B.C., for reasons that are still subject to debate. It is likely that invasions and/or the migrations of peoples overturned the hard but brittle power structures that had controlled the Greek world. The palaces were abandoned, and Greece in this post-palatial phase was much like Arthurian Britain, where remnants of an earlier, more sophisticated world, vied with and then lost out to a newer, rawer, and more primitive one. Even before the collapse, a new type of Greek warrior was in evidence. He wore body armour and carried a shield, spear, and a longer sword, the Naue Type II. What relation this type of soldier had in the end of Mycenae is difficult to say. But in the period that next ensued, Greece’s Dark Age, such men enthusiastically conducted raids for cattle, women, and other riches. There was no dishonour incurred in this kind of behaviour, and pirates were so common that strange men met abroad in foreign countries, such as Odysseus, were readily assumed to be pirates.
This was Homer’s world, one in which the written Greek language of Mycenae was lost entirely. Though there had been some material advances, such as the introduction and adoption of iron as the basic substance of metalworking, overall the period was one of retrenchment and regression. The population of Greece declined precipitously. The royal palaces were gone, replaced by the lesser residences of local lords. One item that would characterize Greek warriors for centuries hence made its appearance. This was the bronze, bell-shaped cuirass, though at this time it lacked the essential flare at the waist of later armours. One such example was recovered from a tomb at Argos. On the basis of Homer’s testimony and surviving pictorial evidence, the armies of the Greek Dark Age were warbands organized to take part in small-scale skirmishes or undertake seaborne raids against coastal towns. The similarity of the era to that of the Viking Age, and the concomitant devastation wreaked upon England and France, is unmistakable.
The Greek world was reborn in the period that came after the Dark Age. Writing returned, in form of the Phoenician-derived alphabet that we would today recognize, perhaps because of the desire to record the words of Homer for posterity. There was also an expansion of the Greek world in this “Archaic” age. Beginning in the eighth century, Greek communities sent abroad portions of their own populace to replicate in Asia Minor, Sicily, and Italy their mother cities. The marvelous two-page map found on pages 84-85 of Henchmen of Ares showing the multitude of Greek colonies established in the period highlights the extraordinary scale of this migration. These colonies not only enlarged “Greece” in the ethnocultural sense, they also acted in later centuries to bring Greek culture to the wider Mediterranean world, perhaps nowhere with more impact and historical significance than Italy, where Rome would be one day be transformed by its contact these Italian Greek cities with the philosophy, art, and science of classical Greece. From Rome the rest of Europe would receive its own Greek education.
Yet that mighty contribution still lay far in the future. More immediately, the Greeks widely adopted the bell-shaped cuirass, metal helmet, and the round, Argive shield that would come to typify the classical hoplite infantryman. Brouwers argues strongly that the phalanx tactical formation was not yet in use. The depiction of battling proto-hoplites on the famed Chigi Vase, taken by some to be indicative of a combat between phalanxes, is instead just two waves of infantrymen attacking each other just as had been done in the Iliad.
Greeks soldiers were highly sought after, with Hellenic mercenaries present in Egypt and Babylonia. Their aforementioned panoply, which made them top quality heavy infantry, was not an exclusively Greek invention. Herodotus claimed that it was the Carians of Asia Minor who attached handles to their shields, an innovation that the Greeks adopted. The stoic mental outlook of hoplite fighters gestated in this era, and this may be seen in the lyric poetry of Callinus of Ephesus, and perhaps most notably, Tyrtaeus of Sparta, who celebrated the bravery and sacrifice of such men. The warrior virtues and ideals praised by the poets were nothing less than those found throughout the Iliad.
The rise of a tactically proficient heavy infantryman was not to be of just historical curiosity. The states of Greece now adopted a battle formation in which citizens, organized by their home cities, fought on foot in close-order. The hoplite civic militia, with its warriors standing shield to shield, proved to be an unbeatable combination when the Greeks had to contend with much bigger but more lightly-equipped Persian armies at the start of the fifth century B.C. The battles at Marathon and Plataea amply demonstrated that hoplites were superior in a stand-up fight with the Persians. This military superiority, to my mind, allowed Greece to retain its liberty free from Persian overlordship. Classical Hellenic culture thereafter flowered, most conspicuously at Athens, with enduring consequences for the Western world.
Henchmen of Ares will be invaluable to anyone with an interest in the origin and historical development of the ancient Greek warrior. Apart from the topics covered in this review, Brouwers has filled this book with numerous and useful sidebars dealing with related matters, such as explanations for the periodization of the era under study, the masonry-style employed in the building of Greek fortifications, and the typology of Greek helmets. Nearly every page contains either an illustration of the warriors being described, or a map, or a colour photograph of objects of archaeological or pictorial importance. Brouwers has done a splendid job marshaling the disparate strands of written, pictorial, and archaeological evidence to produce a coherent portrait of the Greek warrior and his world. Sifting through such voluminous material requires a Hercule Poirot-like attention to detail, which is amply demonstrated by Brouwers in this book.
|
<urn:uuid:ad533670-301c-4d0f-940f-26256968b0c4>
|
CC-MAIN-2017-43
|
https://consolidatedpop.com/2014/10/14/henchmen-of-ares-book-review/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823067.51/warc/CC-MAIN-20171018180631-20171018200631-00340.warc.gz
|
en
| 0.971455 | 2,238 | 2.6875 | 3 |
A trial to see if vitamins can help prevent Alzheimer's is vital, say experts.
The incurable brain disease affects six million elderly people in the EU and the number is expected to double over the next 20 to 30 years.
Vitamins may help Alzheimer's patients
Vitamin supplements may be a cheap and effective method of preventing the disease and researchers are raising funds for a UK-wide trial to see if they are safe and effective.
Alzheimer's researcher Professor David Smith, at the University of Oxford, who is heading the trial effort, said: "It is absolutely vital to do this research.
"The UK has a head start in Alzheimer's research and the US can't do this trial because it already adds folic acid to all its flour."
This means all Americans already receive a vitamin supplement through the food they eat, so there is no way to compare with a supplement-free diet.
Recent research in the UK and US has hinted that low levels of folic acid and vitamin B12 in the body may contribute to Alzheimer's.
The reason for this is the discovery that a substance called homocysteine is found in high quantities in the blood of sufferers.
These higher levels are also found in normal people with slight cognitive impairments, such as problems drawing simple shapes.
These people are much more likely to go on to develop full-blown Alzheimer's.
Homocysteine is a by-product of an important chain of chemical reactions that activates enzymes in the body work.
Folic acid and vitamin B12 convert it back to a useful form.
If the body lacks these vitamins, homocysteine builds up.
Exactly how this damages the body is not yet known, but it has already been linked to a higher risk of heart disease.
Dr Andrew McCaddon, a GP in North Wales has been successfully improving the symptoms of patients with Alzheimer's by lowering their homocysteine levels with vitamin supplements and anti-oxidants.
The amount spent on Alzheimer's is woefully inadequate
Professor David Smith, University of Oxford
However he believes that prevention of Alzheimer's is the best way forward: "We must look at people before they get dementia," he said, "that's why the new trial is so important."
The proposed trial will involve 3,600 elderly people with "mild cognitive impairment".
Some will be given folic acid and vitamin B12 supplements, others dummy pills, and their progress tracked over five years.
One of the most important aspects of the trial will be to assess the safety of using these supplements.
"The great thing about homocysteine is we think the vitamin treatment is probably safe," said Professor Smith.
"However I definitely wouldn't advise the elderly to start taking folic acid until we have the results of this trial - there may be unknown risks such as cancer."
The trial is being considered for funding by the Alzheimer's Research Trust, but more money will be needed to run it.
"Homocysteine is certainly an important and interesting area for Alzheimer's," said a spokesperson for the charity.
She said the amount spent on researching Alzheimer's was pitifully low compared to other diseases such as cancer, which affects an equal number of people.
"The amount spent on Alzheimer's is woefully inadequate," agreed Professor Smith.
"It is a terrible disease that has devastating affects on the family and the economy."
|
<urn:uuid:5d37171a-a046-4a2b-9ec4-da99be7542c2>
|
CC-MAIN-2014-15
|
http://news.bbc.co.uk/2/hi/health/2996807.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537864.21/warc/CC-MAIN-20140416005217-00075-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.957581 | 704 | 2.78125 | 3 |
How it works ?
Note the function whose equation is shown in the upper right hand corner.
The graph of this function is shown to the left.
For each problem this applet generates, determine the average rate of change (AROC) of this function from the given starting input value to the given ending input value. Enter this AROC as a decimal value rounded to the nearest hundredth (0.01).
If you enter in a correct value, the applet will indicate this to you. Generate as many problems as you need in order to master this concept!
|
<urn:uuid:41ab4ba5-3d47-4cf1-910c-0367ec3c792a>
|
CC-MAIN-2020-24
|
https://www.tutorified.com/quiz-average-rate-of-change-of-a-function-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388427.15/warc/CC-MAIN-20200525095005-20200525125005-00341.warc.gz
|
en
| 0.86609 | 118 | 2.578125 | 3 |
The research will aim to understand why some eardrums heal by themselves (and why some do not heal at all) by identifying which genes are responsible for the wound-healing process of an infected human ear drum.
According to the World Health Organisation, almost half of the world's population suffers from 'chronic otitis media' – more commonly known as an ear infection – which causes hearing loss and can lead to more serious disorders such as meningitis.
Ear infections can occur when ear drums burst as a result of a loud explosion, trauma or most commonly by infection spread by a common cold or sore throat.
LEHI's Senior Research Scientist Dr Reza Ghassemifar, said he was looking forward to starting the three-year research project after securing a $238,600 grant from the Garnett Passe and Rodney William Memorial Foundation.
"With this funding we can start our studies to understand how wounds in ear drums heal themselves by examining the cells and molecules in the replacement tissue," Dr Ghassemifar said.
"Through DNA or gene profiling of animal models we hope to learn which molecules are active as the ear drum heals and we will then target those to speed up the healing process."
Dr Ghassemifar said the clinical research into the wound healing process was a major milestone towards LEHI's major tissue engineering project of growing a replacement human ear drum.
"If we can understand how an ear drum heals itself we can help clinicians identify new techniques to speed up the healing process for sufferers of ear infections.
"Ear infections are a major worldwide health problem and it is common for an average person to take up to 10 years before they receive medical treatment.
"We tend to ignore ear infections thinking they will go away or we might have a reluctance to visit the doctor – but in third-world countries the problem is common due to the lack of available treatment," he said.
Dr Ghassemifar said the results of other gene targeting research have indicated that gene therapy (to target wound healing genes) could prevent wound scarring and be potentially applied to clinical scar treatments.
Professor Marcus Atlas, Director of LEHI, said that Dr Ghassemifar's work in LEHI's Tissue Engineering Laboratory is potentially ground breaking.
"Chronic otitis media is a major problem throughout the world and particularly affects the indigenous Australian population. These studies have the potential to help greatly", Professor Atlas said.
ALL MEDIA INQUIRIES:
John Williams +61 892 281 999 or +61 402 275 539
Photo, interview and film opportunities
There are opportunities to interview, film and photograph LEHI's Senior Research Scientist Dr Reza Ghassemifar and his PHD students and high-tech ear and hearing equipment at LEHI's laboratories in Nedlands.
About Lions Ear and Hearing Institute
The Lions Ear and Hearing Institute (LEHI) is a not for profit organisation that was established in 2001 and is a leader in research, ear surgery, audiology and hearing restoration in Western Australia.
The vision and focus provided by the specialised team at the Lions Ear and Hearing Institute has resulted in groundbreaking medical advancements in surgical techniques and the diagnosis and management of ear and hearing disorders.
For more information visit www.lehi.com.au
AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.
|
<urn:uuid:43e081b0-158b-4dbc-a18c-8452db935318>
|
CC-MAIN-2014-35
|
http://www.eurekalert.org/pub_releases/2006-04/ra-wfr041806.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924131.19/warc/CC-MAIN-20140901014524-00212-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.951299 | 722 | 3.34375 | 3 |
Every year, upwards of 400,000 children are born with Sickle Cell Disease (SCD), a genetic disease that stiffens red blood cells and distorts their normal round shape, causing many complications including, frequent episodes of pain, acute lung injury, stroke, overwhelming infection, and chronic organ damage. Three-quarters of these children live in sub-Saharan Africa. Further, the World Health Organization (WHO) estimates that 70% of deaths associated with SCD are preventable with simple, cost-effective interventions, such as early detection through newborn screening and the subsequent provision of comprehensive care.
Since 2017, Dimagi has partnered with the Sickle Cell Foundation of Ghana (SCFG) to support the National Newborn Screening Program (NNSP) by digitizing its paper forms and serving as a job aid to its users. To date, more than 12,500 newborns have been registered through the mobile application at six sites across two districts in Ghana.
|
<urn:uuid:d00e88b5-4156-4478-bc09-e86a9aa956be>
|
CC-MAIN-2023-40
|
https://dimagi.com/case-studies/sickle-cell/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00847.warc.gz
|
en
| 0.956886 | 194 | 2.515625 | 3 |
ENP Newswire -
Release date- 03072014 - The understanding of the brain's circuitry is one of the few uncharted territories of the human body.
The sheer complexity of the brain has led to the development of innovative new tools to enhance understanding of the brain's function. It is hoped that the work on implantable devices to measure, record and interpret brain activity can lead to new discoveries about brain-related illnesses such as autism, Alzheimer's and traumatic brain injury (TBI).
You have recently entered into a collaboration with
Yes, we've recently started a collaboration with
We want to work with key leaders in the field, such as
Could you briefly explain the implants you are developing and how they support studies of brain circuitry? How might they be applied to future treatments for TBI?
Our collaborators at
Regarding TBI, we're not actively working with neural recording at this point. Certainly there are similarities with our learnings, tools and developments that should apply across the broad range of brain disorders. Our sensors are tiny and are able to record the electrical signals coming from individual neurons. Being able to record and separate the signals from the individual neurons, we will be able to interpret the functions the neurons are producing or the functions the neurons should be producing. From a recording perspective, being able to see large collections of these individual signals, it's going to help a whole host of people understand the nature of diseases and injuries, such as TBI, and eventually come up with a way to speak to the brain to correct lost function.
Do you think these implants could have medical uses for other brain disorders?
There is definitely interest in how these implants could benefit those with neuropsychiatric diseases such as depression and neurological diseases such as Alzheimer's or Parkinson's disease. Once we can understand the brain's language, we'll be able to understand the nature of how a particular disease has affected a certain function.
Can you place a level as to how advanced our understanding of brain circuitry is?
The understanding within the research community is growing every day. Tools such as MRI have long been applied in this field with ever increasing resolution for seeing anatomy and function. Combining these tools together with what's happening at the micro-scale, I think we're on the cusp of building new understanding of this organ. If we use the analogy of bricks in a building, knowing a lot about only a brick doesn't mean you could build a house or understand its functional structure. Today we know a lot about individual neurons, how they function and how they carry out electrical and chemical signaling but we don't know how they're all interconnected.
Can you see any innovations at the moment, which may be in its early stages that may become something quite special in the future, regarding the treatment of TBI?
The military has certainly been at the forefront of much neurological research especially with prosthetics controlled by muscle or neural signals. This is not just happening with prosthetics but also in surgery with limb transplants, where they can actually connect the nerves to restore function and even restore feeling. As we continue to collectively build our tools and understanding, future scientists and engineers will be able to address many different types of disease and injury.
Most Popular Stories
- Criminal Investigation Opened Into James Foley's Death
- The Hip New Career? Farming
- McDonald's Names Another U.S. President
- Student Startup Develops Date-rape Detector
- Sahara Casino Rises Anew as SLS Las Vegas
- Chinese Coal Gas Boom Poses Climate Risks
- U.S. Supporters of Islamic State Get Close Scrutiny
- Job Market Shifts Complicate Yellen's Rate Decision
- Dems Losing Fear of Obamacare
- Is Diversity in the Eye of the Beholder?
|
<urn:uuid:1474c703-3497-44e3-b963-628b96d7a46c>
|
CC-MAIN-2014-35
|
http://www.hispanicbusiness.com/2014/7/4/ge_healthcare_-_researchers_plug_into.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824970.20/warc/CC-MAIN-20140820021344-00451-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.952798 | 772 | 2.859375 | 3 |
Digital content curation tools allow us to easily create, collaborate, share, and evaluate educational resources and collections. With “[…] advances in technology, enhanced tools allow researchers to preserve their work in new venues and formats to reach new audiences. (Deschaine & Sharma, 2015, p. 20). In Curating an Instructional Content Collection for Teaching and Learning, I shared how to use content curation in course design to provide accurate, relevant learning resources and model 21st century information literacy skills. In this post, I’ll discuss digital tools for curating educational content.
What makes a good content curation tool for education?
An educational tool should support student learning and help them reach the learning outcomes and objectives—without becoming a burden or barrier to learning. We should ensure the value of learning over a specific tool. Adding a tool can complicate an assignment, and we must ask ourselves if it outweighs any potential for confusion.
Educational tools often have social and personal uses, so the student might already be familiar with it. Yet just because a tool is ubiquitous doesn’t mean the learner encountered or mastered it before. In this case, they need to learn the tool quickly to complete an assignment.
Just like choosing the best resource for the content collection, we need to ask questions about the learning objectives, context, and learners.
Choosing a tool for educational content curation
When you choose a tool, you need something that’s flexible. You’ll potentially need to share different types of content such as articles, websites, eBooks, videos, podcasts, images, infographics, etc. You might want students to evaluate, collaborate, create, or share the resources or collections.
Understanding the context helps us chose the best tool for the assignment. When you review the tools, consider if the assignment requires any of the following features:
- social media, tagging, and bookmarking
- annotation, notes, and feedback
- evaluation, interpretation, and assessment;
- or creating text and media.
From there, you can determine which features cover the needs of the assignment. Are you asking students to research, evaluate, and write an article? Perhaps a wiki would work. Do you want them to collaborate on active reading? Tools like Hypothesis allow students to annotate a text together.
When you choose a tool, make sure it can be used across devices (desktop, mobile, tablet) and operating systems (Microsoft, MacOS, Linux, Android, iOS, iPadOS, etc.). A multiplatform tool offers access through a browser as well as an app or program offers options for learners using different devices.
Finally, when you choose a tool, consider copyright, privacy, and ownership. Some creators allow the use of their content in educational tools and contexts. If their content disappears, you might no longer have access to it. However, you can use your own content or share open educational resources (OER) published with a Creative Commons license or resources in the public domain. Can students share their content collection anonymously? Publish it as OER? What happens to the content they create? Can they download or delete it? What about their data? Asking yourself these questions can help you choose the best tool.
Tools for content curation
Many curation tools and resources are free—either for all users or just educators—or they might offer a free tier of service. (Cherrstron & Boden, 2020, p. 120). Some tools do not include a cost, but they might draw revenue from ads. If you’re teaching younger learners, the ads might be inappropriate for their age.
A paid tool might be a barrier if the students need to pay for it themselves. Before choosing a tool, you should check with your school or organization to see what tools might already be available. For example, you can find a Google App for just about anything—which works well if your school uses Google Workspace for Education.
Consider some of the tools and uses in the lists below.
Build a list or collection:
Take notes together:
Brainstorm, collaborate, and evaluate
- Google Jamboard
Create multimedia (audio, video, graphics):
Publish a resource:
- Google Docs
- Google Slides
- Google Drive
Edit the web
Websites and blogs
- Google Sites
This list isn’t exhaustive, and some tools include multiple uses. Remember, a good tool will support a learner. What tools do you use for content curation? I’d love to hear how you implement them into your classroom.
Cherrstrom, C., & Boden, C. (2020). Expanding role and potential of curation in education: A systematic review of the literature. The Reference Librarian. 61(2), 113–132. https://doi.org/10.1080/02763877.2020.1776191
Deschaine, M. E., & Sharma, S. A. (2015). The five Cs of digital curation: Supporting twenty-first-century teaching and learning. InSight: A journal of scholarly teaching, 10, 19-24. https://doi.org/10.46504/10201501de
4 thoughts on “Digital Content Curation Tools for Education”
Thanks for the good info! Glad you reminded us that a tool is only effective if it helps the learner. We can get excited about a tool and forget the reason for using the tool! (Students can fall into this trap as well). I can’t say enough good about Canva! In my communication and digital media courses, it always helps students develop quality content (free). The library of templates and elements is impressive–students can be creative.
Thank you for sharing your student’s experience with Canva! I’ve always been impressed with how it allows non-technical users to create within minutes.
It’s easy for us to say try this or that tool. But it’s much more complex as you need to know the context and learners. And if the tool gets in the way of learning, it becomes just another barrier to mastering the material.
|
<urn:uuid:57c5a75d-a367-4f39-9520-75450f17503b>
|
CC-MAIN-2023-23
|
https://modelelearning.com/2022/09/06/digital-content-curation-tools-for-education/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00266.warc.gz
|
en
| 0.891806 | 1,381 | 3.5625 | 4 |
Solve a word problem by dividing a whole number by a fraction. The example used in this video is 4 ������������ 1/5.
Dividing whole numbers by unit fractions is a free educational video by Khan Academy.It helps students in grades 5 practice the following standards 5.NF.B.7.
1. 5.NF.B.7 : Apply and extend previous understandings of division to divide unit fractions by whole numbers and whole numbers by unit fractions. (Students able to multiply fractions in general can develop strategies to divide fractions in general, by reasoning about the relationship between multiplication and division. But division of a fraction by a fraction is not a requirement at this grade.).
Ratings & Comments
0 Ratings & 0 Reviews
|
<urn:uuid:3f420043-0285-4d96-a7a0-b81298cdeb20>
|
CC-MAIN-2020-34
|
https://www.lumoslearning.com/llwp/resources/educational-videos-k-12-elementary-middle-school.html?id=318877
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738674.42/warc/CC-MAIN-20200810102345-20200810132345-00597.warc.gz
|
en
| 0.931152 | 198 | 4.53125 | 5 |
To Have and To Hold: Courting Property in Law and Literature, 1837-1917
Beginning in the early nineteenth century, American jurisprudence grappled with the issue of marital property. States under the Anglo-American legal tradition of common law revised marital property allocations to allow wives to hold certain categories of property separate from their husbands. These changes were enacted, in part, to insulate a wife's property from the vagaries of the market but the judicial response reveals a larger narrative of ambivalence and anxiety about women, property, and the suggested mobility of separately held possessions. Marital property reform begins in an historical moment when the question of what a woman could own in marriage morphed into larger cultural anxieties such as the very meaning of ownership and things themselves in the face of new intangible properties. Writers of fiction also captured these anxieties, and created imagined scenarios of marriage and property to expose constructions of ownership, property, womanhood, and marriage. Edna Pontellier in Kate Chopin's The Awakening attempts her withdrawal from her marriage by dismantling the Pontellier home and removing what she believes she owns to a separate physical space. The tragedy of her story can be understood for its legal impossibility under common law, as well as the restricted meanings of marriage and separate property under Louisiana's civil law jurisdiction. At the end of Edith Wharton's Summer, Charity Royall chooses to secretly reclaim a brooch that was a gift from her lover. Her action suggests a desire for privacy and could be viewed as fraudulent to her marriage vows. Pauline Hopkins's character Hagar in Hagar's Daughter repossesses material spaces in which she was forbidden to own and control because of her race and gender, and uses the American justice system to support her claims to ownership and contractual rights. In contrast to Hopkins's tenuous but nonetheless optimistic portrayal of contract, Marìa Amparo Ruiz de Burton's novel Who Would Have Thought It? describes contract and the American legal system overall as empty promises. Marriage and property in Ruiz de Burton's novel work as tropes through which to critique nineteenth-century American society and the destructive force of capitalism within its most intimate spaces.
|
<urn:uuid:bffb02a6-b71e-4fdf-9403-358a117c87e8>
|
CC-MAIN-2023-14
|
https://scholarworks.umass.edu/open_access_dissertations/444/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00560.warc.gz
|
en
| 0.954053 | 445 | 2.921875 | 3 |
With temperatures rising globally, cold weather extremes and freezes in Florida are diminishing—an indicator that Florida’s climate is shifting from subtropical to tropical. Tropicalization has had a cascading effect on Florida ecosystems. In Tampa Bay and along the Gulf Coast, University of South Florida researchers found evidence of homogenization of estuarine ecosystems.
While conducting fieldwork in Tampa Bay, lead author Stephen Hesterberg, a recent graduate of USF’s integrative biology doctoral program, noticed mangroves were overtaking most oyster reefs—a change that threatens species dependent on oyster reef habitats. That includes the American oystercatcher, a bird that the Florida Fish and Wildlife Conservation Commission has already classified as “threatened.”
Working alongside doctoral student Kendal Jackson and Susan Bell, distinguished university professor of integrative biology, Hesterberg explored how many mangrove islands were previously oyster reefs and the cause of the habitat conversion.
The interdisciplinary USF team found the decrease in freezes allowed mangrove islands to replace the previously dominant salt marsh vegetation. For centuries in Tampa Bay, remnant shorelines and shallow coastal waters supported typical subtropical marine habitats, such as salt marshes, seagrass beds, oyster reefs and mud flats. When mangroves along the shoreline replaced the salt marsh vegetation, they abruptly took over oyster reef habitats that existed for centuries.
“Rapid global change is now a constant, but the extent to which ecosystems will change and what exactly the future will look like in a warmer world is still unclear,” Hesterberg said. “Our research gives a glimpse of what our subtropical estuaries might look like as they become increasingly ‘tropical’ with climate change.”
The study, published in the Proceedings of the National Academy of Sciences, shows how climate-driven changes in one ecosystem can lead to shifts in another.Using aerial images from 1938 to 2020, the team found 83% of tracked oyster reefs in Tampa Bay fully converted to mangrove islands and the rate of conversion accelerated throughout the 20th century. After 1986, Tampa Bay experienced a noticeable decrease in freezes—a factor that previously would kill mangroves naturally.
“As we change our climate, we see evidence of tropicalization—areas that once had temperate types of organisms and environments are becoming more tropical in nature,” Bell said. She said this study provides a unique opportunity to examine changes in adjacent coastal ecosystems and generate predictions of future oyster reef conversions.
While the transition to mangrove islands is well-advanced in the Tampa Bay estuary and estuaries to the south, Bell said Florida ecosystem managers in northern coastal settings will face tropicalization within decades.
“The outcome from this study poses an interesting predicament for coastal managers, as both oyster reefs and mangrove habitats are considered important foundation species in estuaries,” Bell said.
Oyster reefs improve water quality and simultaneously provide coastal protection by reducing the impact of waves. Although mangroves also provide benefits, such as habitat for birds and carbon sequestration, other ecosystem functions unique to oyster reefs will diminish or be lost altogether as reefs transition to mangrove islands. Loss of oyster reef habitats will directly threaten wild oyster fisheries and reef-dependent species.
Although tropicalization will make it increasingly difficult to maintain oyster reefs, human intervention through reef restoration or active removal of mangrove seedlings could slow or prevent homogenization of subtropical landscapes—allowing both oyster reefs and mangrove tidal wetlands to co-exist.
Hesterberg plans to continue examining the implications of such habitat transition on shellfisheries in his new role as executive director of the Gulf Shellfish Institute, a non-profit scientific research organization. He is expanding his research to investigate how to design oyster reef restoration that will prolong ecosystem lifespan or avoid mangrove conversion altogether.
FOR MORE INFORMATION: https://phys.org/news/2022-08-florida-climate-threaten-oyster-reefs.html
|
<urn:uuid:2a8be40e-603d-4aa4-afa0-225d6c4406c2>
|
CC-MAIN-2023-14
|
https://getwetprojectblog.com/2022/09/30/changes-to-floridas-climate-threaten-oyster-reefs-researchers-warn/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00443.warc.gz
|
en
| 0.913451 | 854 | 3.53125 | 4 |
What is Legionella?
Legionella is a bacteria found in both potable and nonpotable water systems that is the cause of Legionnaires’ disease and proliferates rapidly in warm water environments.
70% of all Water Systems are Contaminated with Legionella
Legionella can only infect individuals when it is has been inhaled in mist, steam, or vapor that has been contaminated with the bacteria, but the disease is not contagious once it has been contracted.
1 in 4 Legionella Cases Result in Death
Legionnaires' disease, the resulting condition of being affected by Legionella, is a severe, often lethal, form of pneumonia that affects up to an estimated 18,000 people in the United States each year.
Drinking/Potable Water Systems are Accountable for 99% of Legionella Risk
In order to cause harm to an individual infected water must be aspirated or inhaled, so look to sources such as cooling towers, showers, sinks, humidifiers, misters, fountains, ice machines, whirlpools, etc.
There has been a 550% increase in reported Legionella cases since 2000 as reported by the CDC.
Do you know the facts?
Scientists named Legionella after an outbreak occurred at the American Legion Convention in Philadelphia in 1976
|
<urn:uuid:2e99f8ca-2a52-4ceb-b9d1-a355a3428d2f>
|
CC-MAIN-2020-16
|
https://www.liquitech.com/waterborne-pathogens/legionella/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500426.22/warc/CC-MAIN-20200331084941-20200331114941-00052.warc.gz
|
en
| 0.947939 | 268 | 3.578125 | 4 |
Need to Know – The Most Dangerous Birds in the World6 min read
Most Dangerous Birds – When we talk about birds, frequently visualize the certain beautiful images. In which some are small and beautiful that gives the message of peace and freedom. Whereas, few are just like the evil that kills you. Thus, you have to know about the most dangerous birds in the world, read this article with full concentration.
Related: Endangered Animals in the World.
There are lots of incredible creatures in this world that can fill your heart with love. On the other hand, few looks really scary and terrible that pause your breath for a second. Even, they are also a reason of death. That’s the world of birds – distinct variants or can say that culturally diverse population in such species.
Here we are sharing you a list of most dangerous birds in the world
1. Southern Cassowary (Most Dangerous Bird in the World)
This species of bird is the deadliest bird in the world. It populates the rainforests in New Guinea and North-west side of Australia. The legs of such cassowaries are the most powerful weapon which makes its name to the top in the list of most dangerous birds.
The Ostrich is the largest bird on the earth in Africa. They are the sole species of Ostriches that are surviving after the ex-Arabian ostrich. The appearance is really dangerous due to its 7 feet height and long legs. However, Ostrich is also known as the dumbest animal in the world.
3. European Herring Gull
These gulls are 26-inch-long and the longest bird in the western Europe. The European Herring Gulls are infamous for stealing food and attacking humans. Mostly, they build their nests in the urban area and they have the third place in the list of most dangerous birds.
4. Australian Magpie
It is the 2nd and one of the most dangerous birds in the world after Southern Cassowary. These magpies are usually found in the grasslands, parks, fields around the Australia.
5. Mute Swan
These swans are just looking marvelous and peaceful creature of the world. But, it is the actually a regional bird. Usually, this species of bird is found in various parts of the earth such as Eurasia and North America. It attacks people that can cause eye injuries and even break bones by its muscular wings. So, stay away from this one of the cutest animals in the world.
6. Snowy Owl
These are the world’s huge and amazing species in the world of Owls. Usually, their native place is Arctic Tundra. Their appearance is really attractive with white color along with dark gray spots. The Snowy Owl is really large that contains – 3.5- 6.5 lbs weight and 60 inches long wingspan.
Related: World’s Smartest Animals.
The Lammergeier comes under the oldest bloodsuckers/ vultures of the earth. These are popular by the name – Bearded Vultures. This senior vulture has the weight of 7 kg and the wingspan of 2-2.8 meter. Generally, they live on the South side of Europe, Africa, and Asia. Plus, this bird should also listed in weirdest animals.
8. Barred Owl
These owls are large in size who has a round head. Mostly Barred Owls inhabits in the area of North America. People can see them in Forests and Woodlands due to their preference. The length of such owls is 21 inches and 43 inches long wingspan.
9. Great Northern Loon
This loon is the largest bird in the category of diving. It is famous by the name – “ Common Loon” in the world. Generally, they have 60 inches long wingspan and 24-30 inches long. Such kinds of Loons enjoy their Summer in ponds and lakes of Canada, Greenland and North side of United States.
10. Red Tailed Hawk
These are the common species of the hawk which is generally found in the North America. They are about 2-4 pounds weight and their wingspan is 38-43 inches long. The tail of such hawks are short, but the wings are extremely long.
The World’s Deadliest Bird – Is it really terrible?
We know various people that are interested to know about the birds are eagerly waiting for – what is the deadliest bird in the world? A popular statement states – “Sometimes the birds to be cruel is to be kind”.
The world’s deadliest bird lives in Australia and staying in this country is just a warning for all residents. For instance, individuals in Australia feel continuously threat of plundered by the deadly birds.
The most frightening ratite of the world – The Cassowary, has capable of breaking and entering the houses of Queensland people, Australia. These species of most dangerous birds is coming under this list. Hence, the wildlife professionals need to relocate them for preventing the people.
The Cassowary species is the weirdest and unbelievable birds on the earth. When you see these birds, so it doesn’t give you feel of a bird by its appearance. The reason behind that, its height is above 5ft, long features like a wool, 5-inch skewer as a nail on its each foot, a horn that looks like a helmet/ casque on the top of its head and a throat of blue-red color.
Due to the appearance of Cassowary birds, it really looks like a primitive. These species are barely known from the outside of Australia. Generally, three species are present of Cassowary in the world. The two species reside in the New Guinea and another – the largest one in Australia.
In recent years, this bird gain lots of reputation in the stream of aggression via its appearance. Usually, people search about this spectacular bird on the internet and see its attacks that killed humans. Due to its reputation of being the most dangerous bird in the world, living in Queensland, Australia is really difficult and horrible. You can search on the web by Australian dangerous bird, the Cassowary is the snippet of Google results.
Must Read: Why Should You Love Animals?
Are the deadly birds carrying harmful diseases?
Yes, it is absolutely correct that birds can convey the various diseases that are really dangerous for humans. More than 60 disorders across the world spread via many bird species. For instance, Avian Flu – a kind of tuberculosis usually related to the bird, Histoplasmosis – is a respiratory disorder that is happened by fungus. Such kind of fungus grows when bird heaps droppings gathered.
When we discuss the diseases via birds so it is really uncountable. Another one – Cryptococcosis that is caused by the fungal spores that increases on bird droppings. Most of the ailments lay out to people by such species of birds are infrequent and treated. Specifically, the Avian flu is an exception case.
Remember always that the diseases transferred by about 9,000 bird species on the earth are harmful. But, less than humans that are generally spread germs. Generally, we call the common disease – the cold that is a combination of 100 viruses approx.
There are plenty number of humans in this world are not aware from the Cassowary. The flightless bird that weighs- 135 pounds and looks like a breathing dinosaur. No need to go close to them when you see in your area, popular by the deadliest bird in the world. They can kill you without wasting a single second.
The bird is evaluated as the world’s most dangerous bird in the world. Due to its criminal record that completely deserves the punishment as per the capital’s law. In New Guinea, the attack of dead birds is very common for their residents. We hope this information is useful for those people who want to know about the most dangerous bird in the world.
Also Read: Smallest Animals of the Planet.
|
<urn:uuid:a6ad177b-fc47-4520-9b46-3cbeaab35772>
|
CC-MAIN-2017-43
|
http://www.stunstupefy.com/most-dangerous-birds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824471.6/warc/CC-MAIN-20171020230225-20171021010225-00788.warc.gz
|
en
| 0.949526 | 1,663 | 2.78125 | 3 |
Global warming is the wolf at our door, huffing and puffing and threatening to bring our houses down. According to research by scientists at NASA’s Goddard Institute for Space Studies (GISS), the average global temperature on Earth has increased by about 0.8° Celsius (1.4° Fahrenheit) since 1880, with two-thirds of the warming occurring since 1975.
Why bother over a mere one-degree rise in temperature, you may ask. Well, a one-degree global rise is substantial, because to warm all the continents, oceans and atmosphere by one degree takes a huge amount of heat. One degree is significant when you remember that a drop of just 1-2 degrees in temperature had plunged the Earth into the Little Ice Age, while a five-degree drop had buried a huge mass of North America under a massive ice mound 20,000 years ago.
The rate of increase in temperature can be judged by the fact that 2016 has been officially declared as the hottest year on record, with 16 of the 17 warmest years on record occurring since 2001.
Additionally, levels of carbon dioxide (CO2) in the atmosphere are higher than they have been at any time in the past 400,000 years. During ice ages, CO2 levels were around 200 parts per million (ppm), and during the warmer periods, they hovered around 280 ppm. In 2013, CO2 levels surpassed 400 ppm for the first time in recorded history.
The rate at which the earth is heating up is directly proportional to the amount of carbon dioxide in the atmosphere. Climate scientists have agreed that the amount of carbon dioxide being pumped into the atmosphere by humanity, chiefly from the burning of fossil fuels, is causing the planet to warm at a rapid pace.
Polar ice caps and glaciers are melting at an alarming rate and the earth is increasingly being beset by climate disasters such as heat waves, wild-fires, strong tropical storms and the like. Increasing temperatures will shrink the polar ice caps further, make large areas of the Middle East and North Africa unbearable to live in and accelerate what’s known as Earth’s “sixth mass extinction” of animal species.
Scientists agree that global warming and increased carbon dioxide emissions are the direct result of increased burning of fossil fuels- in industries, for transport and for electricity needs. Yet, these are essentials of the modern world, use of which is only going to go up.
So, is there a way out of this conundrum?
The answer lies in using renewable, green, carbon-emissions-free sources of energy for all our energy needs. Hydroelectricity, solar energy, wind energy, geothermal energy and biofuels- these are the sources of energy that are the way to a safe future for our planet. These green energy sources might save earth from its downward spiral into extinction.
Scientists agree that it is possible to meet all the energy needs of a country by these renewable sources of energy alone, given a strong political and social push. Technologically, countries like Denmark, Spain, Scotland, Costa Rica, Albania, Paraguay and so many more, have shown the rest of the world that it is quite possible to meet most of a country’s energy needs by renewable energy sources alone, the will being there.
In 2015, Costa Rica powered itself purely with renewable energy for 299 days total.
Time and again, Denmark and Scotland have been able to hit a high with wind energy production, powering the entire country with wind energy for entire days and with enough to spare.
In 2015, wind power produced the equivalent of 97% of the Scotland’s household electricity needs.
Uruguay is now 95-percent powered by renewables after less than 10 years of concerted effort. The country invested heavily in wind and solar with no subsidies or increases in consumer costs.
Albania and Paraguay fulfil 100% of their electricity needs from hydroelectricity.
Iceland also obtains all its energy from a mix of renewable energy sources- 72% hydro and 28% geothermal.
Norway obtains nearly 97% of its electricity from hydropower.
Germany, Kenya, Morocco, Spain and Sweden are some of the other countries with dedicated programmes to make their countries fossil-fuel free in the coming years.
If tiny nations such as Costa Rica and Albania can invest money, effort and time into making the shift from fossil fuels to renewable sources of energy, why can’t an economic giant like India? With its huge land mass, vast coast-line and ample sunlight, India is naturally gifted with the raw materials required. It’s all about the will- of its people and the government.
With the ecological time-bomb ticking away, the time to act is now.
|
<urn:uuid:8b47fe8f-a011-4b6c-b030-dfc56a38b79f>
|
CC-MAIN-2020-05
|
http://www.justscience.in/articles/renewable-energy-the-way-to-the-future/2017/05/29
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250624328.55/warc/CC-MAIN-20200124161014-20200124190014-00471.warc.gz
|
en
| 0.954727 | 978 | 3.640625 | 4 |
Universal treatment standards will be the basis of future medical care. In oncology, a leading organization for the development of such guidelines is the National Comprehensive Cancer Network (NCCN). This national consortium of 21 National Cancer Institute designated cancer centers publishes state of the art recommendations. Modified continuously, these are internationally respected guidelines and cover more then 97% of cancers.
The 17th Annual NCCN Conference was held in Hollywood, Florida last month. Cancer guidelines were updated in several significant ways.
The general movement of the last 20 years has been to reduce the amount of surgery for breast cancer. The NCCN recommends that during breast saving surgery (lumpectomy) the surgeon test the first lymph node (“sentinel”). If there is no cancer in the first one or two nodes, then no more nodes need to be removed. The NCCN also stated, that if breast cancer patients have small cancers and normal blood tests, they do not need a bone scan, or CT scan.
In lung cancer patients, several procedures received new support. It is recommended that doctors use ultrasound-guided biopsy to sample lymph nodes in the middle of the chest (mediastinum) instead of surgery. The new guidelines also support the use of non-invasive surgery (Video Assisted Thorascopic Surgery, VATS) instead of open surgery to treat lung cancer. The use of VATS for lung cancer has increased more than 300% in recent years. The pathologic name for an increasingly common form of lung cancer was changed. Formally, called “bronchioalveolar”, it will now be called “adenocarcinoma in situ.” Finally, the NCCN emphasized the need for accurate genetic testing for “ALK”, before using the drug that targets this mutation, crizotinib.
Unfortunately, melanoma rates are rising rapidly in this Country and around the world. As in breast cancer, researchers are trying cure melanoma with less surgery and testing. For early stage melanoma the NCCN now says scans and chest X-rays are optional. In addition, if the original cancer is very thin and seems localized, lymph node surgery is not advised. In patients where the cancer has metastasized, there is excitement about the two new drugs approved for melanoma vemurafenib (Zelboraf) and ipilimumab (Yervoy). In his opening remarks Daniel Coit, MD noted these were “very exciting new agents.” At the meeting discussion focused on which patients would benefit from these drugs, understanding side affects and testing for tumor sensitivity to these medicines.
Doctors continue to be confused about when to use the ovarian cancer blood test, CA125. It is not clear whether following the tumor marker closely saves lives. For now, the NCCN recommends that ovarian cancer survivors have CA125 tested several times a year, but less often over time. The use of aggressive chemotherapy before ovarian cancer surgery was discussed. It is now clear that in patients who have a large amount of ovarian cancer when they are first diagnosed that chemotherapy before surgery helps. Such “neoadjuvant” therapy increases the success of surgery and reduces complications.
After all the confusion with PSA in the last couple of years, it was reassuring not to see much change regarding prostate cancer treatment from the NCCN. Several new drugs (radium 223 and MDV3100) are likely to be approved this year. The immunotherapy sipuleucil-T (Provenge) has been extended to prostate cancer patients with pain or other symptoms. Previously, it was recommended only for men who felt completely well despite cancer relapse.
There was an extended discussion about cancer treatment in young adults. While survival in children and older adults has increased in recent years, it has not changed significantly for men and women in their 20s. There are multiple problems including insurance coverage, a lack of interest by young people in experimental trials, inadequate social support and poor compliance with treatment recommendations. Unlike other nations such as Australia or Britain, the United States does not have large cancer programs specifically for teens and young adults.
Attendants at the meeting were reminded that in 2011 the NCCN published the first guidelines recommending the yearly use of low dose helical CT lung scans for smokers. The data is felt to be extremely strong. High risk smokers were defined as 55 to 74 years old with a history of 30 or more pack – years (years smoking x packs per day), even if they stopped smoking up to 15 years ago.
The NCCN and similar study groups continue to lead the way in cancer and other illness. By publishing uniform guidelines, they give every doctor and patient a place to start when choosing tests and therapy.
James C. Salwitz, MD is a Medical Oncologist in private practice for 25 years, and a Clinical Professor at Robert Wood Johnson Medical School. He frequently lectures at the Medical School and in the community on topics related to cancer care, Hospice and Palliative Medicine. Dr. Salwitz blogs at Sunrise Rounds in order to help provide an understanding of cancer.
|
<urn:uuid:e3c4bfa0-f761-4d28-b76f-1fffa089a719>
|
CC-MAIN-2020-10
|
https://thehealthcareblog.com/blog/2012/04/27/rethinking-cancer-guidelines/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146414.42/warc/CC-MAIN-20200226150200-20200226180200-00123.warc.gz
|
en
| 0.956295 | 1,052 | 2.59375 | 3 |
Grapes are not too picky when it comes to the form of support you use for them. You might use dedicated trellises for the grapes or modified fences. When using fences to support the vines, the spacing of the posts is important. With adequate spacing, your grapes will get enough air between the plants and enough light to the leaves, and you will have enough room to prune the plants as needed.
Measure the length of your intended grape fence with a measuring tape.
Use flour to make large X-marks on the ground at the two ends of the fence.
Dust flour on the ground along the measuring tape to show the line of the fence.
Mark smaller X-marks at 6-foot intervals along the line, if you are planting European grape varieties, or 8-foot intervals if you will grow American grapes.
Place fence posts at each X along the flour line on the ground.
Mark a second line parallel to your first line for a second fence row for growing grapes. Make this row 9 to 10 feet away from the first row.
Plant the grapes halfway between the posts after installation and train the vines up to the top of the fence.
Things You Will Need
- Measuring tape
- Use a 5-foot-tall fence to support grapes and make it easier to harvest and care for the plants.
- Use 10-gauge wire to turn your fence into a grapevine trellis. Add reinforcement to the posts to prevent the wire from losing tension.
- Goodshoot/Goodshoot/Getty Images
|
<urn:uuid:fbf0fa28-bd8c-455f-92e4-d197b3ff74bd>
|
CC-MAIN-2017-43
|
http://homeguides.sfgate.com/space-grape-fences-during-installation-53102.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824894.98/warc/CC-MAIN-20171021190701-20171021210701-00614.warc.gz
|
en
| 0.922632 | 321 | 2.625 | 3 |
Nature and humans destroying aquatic food websOctober 16th, 2010 - 6:05 pm ICT by ANI
Washington, Oct 16 (ANI): A new research has suggested that humans and nature itself are making it tough for rivers to continue in their central role to support fish species.
Globally, rivers and streams are being drained due to human use and climate change. These and other human impacts alter the natural variability of river flows.
“Floods and droughts shorten the food chain, but they do it in different ways,” said John Sabo, a biologist at Arizona State University.
Alan Tessier of the National Science Foundation (NSF) said: “The length of food chains is a crucial determinate of the functioning of ecosystems,” said
“Ecologists have long sought to explain why food chain length varies among different ecosystems. This study provides a quantitative answer to that question for stream ecosystems, and provides critical evidence for the importance of flow variation.”
Sabo and co-authors suggested that the fate of large-bodied fishes should be more carefully factored into the management of water use, especially as growing human populations and climate change affect water availability.
The researchers studied rivers and streams in the U.S. ranging in size from the Mississippi and Colorado Rivers, down to small tributaries.
The study employed naturally occurring stable isotopes of the element nitrogen to measure how top-predators were faring in the food chain.
“Floods simplify the food web by taking out some of the intermediate players so the big fish begin to eat lower on the chain.
“With droughts, it’s completely different: droughts eliminate the top predator altogether because many fish can’t tolerate the low oxygen and high temperatures that result when a stream starts drying out,” said Sabo.
Sabo outlined a classic scenario that humans face during drought years.
As drought takes hold, the need for water for irrigation and agriculture increases and leads to a draw-down of natural river flows.
The effects downstream can be devastating.
“We would not have guessed that the infrequent drought that results would have a big effect on a stream, but our results show that it does.
“Some streams affected by drying five to ten years ago are still missing large-bodied fishes, compared with same-sized streams that never dried.
“Food webs can recover sooner after a flood, in roughly a year, but it takes far longer to recover in the case of drying or drought,” said Sabo.
The study has hinted that competing users of a river’s water-for agricultural production and recreational uses like fishing-need to work out amenable uses of rivers and streams that not only look to the immediate future, but also project long-term effects.
“The question becomes: can you have fish and tomatoes on the same table?” asked Sabo.
“They compete for the same resources, and society depends on both: agriculture for grain, fruits, vegetables, and fish for protein, particularly in the developing world.
“Humans may need to make hard decisions about how to allocate water so that we grow the right food, but still leave enough in rivers to sustain fish populations,” he added.
The findings appeared in the journal Science. (ANI)
- Loss of large predators hits ecosystem - Jul 17, 2011
- Rising temperature to hit wheat production in India, says report - May 09, 2012
- Anti-depressants in sea water could upset food chain - Jul 12, 2010
- Extreme weather threatens rich ecosystems - Apr 01, 2012
- Increasing pollution levels choking India's lakes - Sep 29, 2011
- Huge Chinese dam experiences big flood - Jul 24, 2012
- Time to focus on freshwater fish, is India listening? - Oct 25, 2010
- Himalayan ecosystem vital to Indian landmass: Deshmukh - Oct 01, 2011
- Floods affect over 30,000 in Assam - Jun 12, 2012
- British drought brings harsh time for wildlife - Mar 19, 2012
- China's longest river faces worst drought since 1961 - May 23, 2011
- China infuses Yangtze river with one bn fish - Jul 12, 2011
- Acid oceans make fish "fatally attracted" to their predators - Nov 22, 2009
- Uranium not responsible for dying fish, says Meghalaya - Apr 20, 2012
- Inadequate rains, scarcity, worry Maharashtra legislators - Jul 11, 2012
Tags: aquatic food webs, arizona state university, classic scenario, colorado rivers, critical evidence, element nitrogen, fish species, floods and droughts, food chain length, food chains, high temperatures, human populations, intermediate players, john sabo, national science foundation, natural variability, rivers and streams, stable isotopes, stream ecosystems, water availability
|
<urn:uuid:b0b57e4c-b95a-4925-9b08-449696e66fe4>
|
CC-MAIN-2014-15
|
http://www.thaindian.com/newsportal/health/nature-and-humans-destroying-aquatic-food-webs_100445276.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207046.13/warc/CC-MAIN-20140423032007-00399-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.92744 | 1,026 | 2.90625 | 3 |
The United States Patent and Trademark Office (USPTO) allows people to conduct basic, patent number and advanced searches of patents for those who are interested in learning the origins of an invention. Searches can be conducted online, or at a Patent and Trademark Depository Library (PTDL). European patents can be searched at online databases or at Patent Information libraries (PATLIB). The Industrial Property Digital Library allows access to patents created in Japan and other countries. Discover some basic and advanced methods used to check a patent.
Method 1 of 3: Conduct an Online Search for Patents
1Visit USPTO online.
- From the main page of the USPTO website, open the Patents tab on the left side of the page.
- Click How to Search for Patents & More on the next page.
- At the patent and trademark menu page, select Search Patents Now on the left side of the page to conduct a quick search, an advanced search or a patent number search.
2Start with a Quick Search.
- At the Quick Search menu, pick a year range from the Select Years drop-down box. Choose 1790 to present if you want to search the entire database. For text-only searches, select 1976 to present.
- Enter a keyword term in the Term 1 box at the Quick Search page. Choose a search operator such as AND, ANDNOT or OR from the operator field.
- Type a second keyword term in the Term 2 box at the Quick Search page. Again, pick AND, ANDNOT or OR as the search operator. Press Search to start your quick patent search.
3Try an Advanced Patent Search.
- From the Advanced Search page, pick a year or year range in the Select Years drop-down menu. Repeat the step above to choose 1790 to present, or 1976 to present.
- Add search text into the Query box. Follow the examples on the Advanced Search page for properly entering text in the Query box. Field codes and field names must be separated by forward slashes. Examples include searches by title, issue date and inventor’s name. Refer to the field names and codes chart at the bottom of the Advanced Search page.
- Hit Search after your type your entries.
4Find a Patent According to Patent Number.
- At the Patent Number search page one patent number or more into the Query box. Separate multiple patent numbers by spaces.
- Choose Search to find the patent number and information.
Method 2 of 3: Access Patent Information through the Patent and Trademark Depository Library (PTDL)
1Follow the PTDL Search Strategy.
- If visiting a Patent and Trademark Depository Library, apply the 7-step method for patent searching. Research tools offered include websites, databases and DVD-ROMs.
2Look for information based on classification. Brainstorm some keywords related to the composition and primary use of an invention.
3Use the database offered by PTDL, the Index to the U.S. Patent Classification database, to look for related classes or subclasses.
4Select the Classification Schedule and the Manual of Classification systems to review the relevancy of a patent. To review classes and subclasses, read the Classification Definitions.
5Verify full-text patents.
- Access the Published Applications and Issued Patents databases from the PTDL to read about applications and full-text patents.
Method 3 of 3: Search for International Patents
1Research European and Asian patents.
- From the European Patent Office (EPO), visit the Patent Information link, then check the European publication server link. Enter the publication number, patent number and International Patent Classification Symbol (IPC) into the assigned fields.
- Pick a publication date. Dates range from 1978 to the present. Select the week number of a publication that ranges from 1 to 53. Select a document code such as A1, B2 or B3.
- Go to a PATLIB library. From the Patent Information Centres page, choose the EPO Member States link to go to a list of countries that offer PATLIB access.
2Check international patents at the Japan Patent Office (JPO).
- The JPO offers the Industrial Property Digital Library (IPDL) for checking on patents. From the JPO home page, click the link for the IPDL link.
- Find the Patent & Utility Model Gazette database. In the search fields, enter terms such as patent type, and patent and publication number. Hit the Search button.
|
<urn:uuid:3d94cadc-e632-48a1-89d3-c89e36d8e806>
|
CC-MAIN-2014-35
|
http://www.wikihow.com/Check-a-Patent
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920849.16/warc/CC-MAIN-20140909050243-00241-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.791021 | 934 | 2.53125 | 3 |
Is there an ET connection to the mystery of Jesus? Was the famed carpenter from Galilee actually the Son of God, or a mere itinerant Rabbi preaching Temple reform, or a cunning anti-Roman revolutionary–or was he in fact a ‘Gnostic’, whose wisdom and teachings were so radical that a vast authoritarian religious structure was erected to contain and suppress it?
“In 1209 an army of thirty thousand knights and foot soldiers from northern Europe descended like a whirlwind on the Languedoc [Pronounced, Lang-doc’]—the mountainous northeastern foothills of the Pyrenees in what is now southern France. In the ensuing war the whole territory was ravaged, crops were destroyed, towns and cities were razed; a whole population was put to the sword. The extermination occurred on so vast so terrible a scale that it may well constitute the first case of “genocide” in modern European history.”
“The Inquisition arose out of an effort by Pope Innocent III to stamp out a large heretical sect in the south of France known as the “Albigensians.” Innocent III had called for a special Crusade in 1209 to enter France and wipe out the sect. The five-year war, which ensued, devastated the region. Ten years later, a new Pope, Gregory IX, continued the action. He placed the Dominicans in charge of investigating the Albigensians. Gregory gave the Dominican Order full legal power to name and condemn all surviving heretics.”
“The inquisition helped breed a social reaction of violence to non-conforming ideas that the world has not yet fully escaped.”
“Albigensian” and “Cathar” were essentially generic names. In other words they did not refer to a single coherent church, like that of Rome, with a fixed codified, and definitive body of doctrine and theology…in general the Cathars subscribed to a doctrine of reincarnation and to a recognition of the feminine principle in religion. Indeed, the preachers and teachers of Cathar congregations were of both sexes. At the same time the Cathars rejected the orthodox Catholic Church and denied the validity of all clerical hierarchies, all official and ordained intercessors between man and God. At the core of this position lay an important Cathar tenet—the repudiation of ‘faith’ at least as the Church insisted on it…the Cathars insisted on direct and personal knowledge, a religious or mystical experience apprehended at first hand. This experience has been called ‘gnosis’ , from the Greek word for “knowledge” and for the Cathars it took precedence over all creeds and dogmas. Given such an emphasis on direct personal contact with God, priests, bishops, and other clerical authorities became superfluous.”
“For the Cathars men were the swords that spirits fought with, and no one saw the hands. For the Cathars a perpetual war was being waged throughout the whole of creation between two irreconcilable principles—light and darkness, spirit and matter, good and evil. Catholicism posits one supreme God, whose adversary, the Devil, is ultimately inferior to Him. The Cathars, however, proclaimed the existence of not one god, but two with more or less comparable status. One of these gods—the ‘good’ one was entirely disincarnate, a being or principle of pure spirit, unsullied by the taint of matter. He was the god of love.”
“The majority of Cathars seem to have regarded [Jesus] as a prophet no different from any other—a mortal being who, on behalf of the principle of love, died on the cross. And the cross—at least in association with Calvary and the Crucifixion—was regarded as an emblem of Rex Mundi, [Archon] lord of the material world, the very antithesis of the true redemptive principle. Jesus, if mortal at all, had been a prophet of AMOR, the principle of love. And AMOR, when inverted or perverted or twisted into power, became ROMA—ROME, whose opulent, luxurious Church seemed to the Cathars a palpable embodiment and manifestation on earth of Rex Mundi’s sovereignty.”
(Combined excerpts from the books,“Holy Blood, Holy Grail”, by Michael Baigent, Richard Leigh and Henry Lincoln, Dell Publishing, 1982, and “The Gods of Eden”, by William Bramley, Avon Books, 1982 and the website, http://www.Metahistory.org, by John Lash.)
Dan Brown’s blockbuster novel combined with the subsequent hit movie “Da Vinci Code” both dramatically resurrected public fascination with the Holy Grail mysteries and the secrets of Mary Magdalene as well as ancient Goddess theologies.
What exactly was the ‘Grail’? Was it, perhaps as tradition would have it, the chalice from which Jesus served the wine at the ‘Last Supper’, and which also caught his blood at the Crucifixion?
Or, was the Grail Chalice a metaphor hiding the shocking secret that Jesus was by no means celibate and, in fact his ‘Holy Blood’ was secretly preserved through future generations beginning with the child he may have sired with his wife–Mary Magdalene?
Or, in an even broader context, could the Grail mysteries be metaphors for the ‘Divine Sophia’--ancient lost ‘Goddess’ theologies that revered the ‘feminine’ aspect of Deity?
The book entitled, “Not In His Image”, by John Lash (Chelsea Green Publishing Co. 2006) offers a brilliant, ‘in-depth’ study of the lost “Goddess” ideologies–Gnostic texts and cosmologies examining their relationship to contemporary Western Civilization and global ecology. Within this body of formidable research Lash reveals an alternative account of Old Testament history that suggests the Holy Bible may in fact be a chronicle of ancient extraterrestrial intrusion and intervention in human development. Was the human race actually subdued by extraterrestrial invaders, falsely masquerading as deity, during the days of Abraham in the book of Genesis…?
What could lost pagan, ‘Goddess’ religions and theologies of remote antiquity possibly have to do with the modern mystery of UFOs? Perhaps more than we might ever dare to imagine…!
In the year 1947 the possible reality of extraterrestrial intrusion into our world burst upon public awareness with two dramatic events. First was the Kenneth Arnold sighting near Mt. Rainier, when his eyewitness account of strange flying craft coined the phrase ‘flying saucers’ in the national press; and second was the famed saucer ‘crash’ reported by U.S. Army personnel at Roswell, New Mexico. Since that point in time, the enigma of ‘flying saucers’, or Unidentified Flying Objects, has become intrinsically interwoven into our modern culture. Yet, that very same year, halfway around the world in Cairo, Egypt, ancient documents revealing a “full and coherent account of alien intrusion” that could be traced back to early Bible times, was being translated by scholars of Gnostic theology.
Two years earlier, in 1945, an earthenware jar was dug up in a cave west of the Nile near the village of Nag Hammadi. Contained in this jar were papyrus scrolls or codices wrapped in leather of Biblical texts dating back to around 400 AD. They appeared to be the only surviving fragments of a much larger body of work; the equivalent perhaps of finding a mere handful of pages left from a lost ‘Encyclopedia Britannica’. Yet it appears these texts were secretly hidden in a last ditch effort to keep them safe and preserved from a deliberate and systematic campaign to destroy the vital information they contained.
Translation of the ‘Nag Hammadi’ Scrolls reveals a body of early Christian teachings that are considered ‘Gnostic’ in character. In other words, these texts contained ‘Gospels’ that had escaped censorship or revision by the Church of Rome, and that repudiated the authority of orthodox Christian doctrine—posing a theological threat, which clearly provided a motive to keep them hidden.
Gnostic (from the Greek gnosis, meaning ‘knowledge’) thought insisted upon direct and personal, first-hand religious or mystical experience with Deity, and vehemently rejected dogmas, creeds and clerics or any superfluous intercessors between man and God—an unwelcome posture for Vatican authority.
Yet contained within these lost texts is an exotic description of the origins of Earth and the human species that serious religious and Gnostic scholars dismiss as mythological ‘science –fiction’—a fantastic and disturbing description of cosmology that reveals an intrusion upon Earth humanity by malevolent, parasitic extraterrestrial invaders, who use Earth humans as puppets in a vast, unseen game of deception and domination.
“As above, so below.” The Gnostic perception of the universe would tell us that just as a biologist sees minute living creatures swarming in a drop of water through a microscope, the swirling galaxies seen through an astronomer’s telescope are also living beings! The entire universe is a vast living consciousness with individualized nodes of living consciousness existing within it.
In the most simplistic terms, the Gnostic cosmology describes the central sun of our particular galaxy as a living entity—intelligent light plasma. The ‘arms’ that extend and swirl out from that central sun are like ‘children’ of that core awareness. These plasma extensions reach out to the periphery of the galaxy where solid matter is formed, and this is where the ‘play’ of material creation is acted out. These conscious extensions stretch out and form solid worlds and living beings in infinite variety to express their own individual ‘dream’ of creativity.
Planet Earth first originated as a ‘metamorphosis’ of an intelligent stream of light plasma extending from the central sun. That stream of light was “SOPHIA“—a feminine emanation. Impulsive Sophia was so enraptured by her dream of creation that she plunged into the realm of physical matter alone, without her balancing male consort. In doing so, an accidental aberration occurred. Within Sophia’s dream of creation was an ideal ‘intention’ for living, intelligent creatures that would become humans. For that intention to properly manifest, it needed to blend with organic matter. However, in her brash impulsive plunge, the sheer force of plasma outpouring impacted with inorganic matter, creating an aberrant species that could never properly manifest Sophia’s vision for the human species!
The original intention of Sophia’s dream did successfully blend with organic matter and proper humans came into being, yet they were now challenged to confrontation by their aberrant cousins who use subterfuge to divert humans from their true potential on planet Earth. And Sophia, not only formed Earth from her dream—she actually became Earth! Gnostic texts tell us that goddess Sophia literally morphed into the living planet herself. Earth is Sophia. In other words, Earth is the living mother of all humanity.
The subsequent unfolding of human history is the conflict drama between Sophia’s intention for human expression and its accidental, mirror competitors. Only when humans ultimately discover this vital truth and overcome their adversary will they achieve Sophia’s divine dream for their destiny.
And how do the Gnostic texts describe this ‘adversary’? Referred to as “Archons”, (pronounced; Ar-kon, Greek, meaning magistrate, or–the Authorities.) they come in two distinct types—an aggressive reptilian humanoid and smaller, passive creatures resembling a ‘prematurely formed fetus’! “Bizarre as it may seem, a solution to the most baffling enigma of our time was fully elucidated in sacred writings almost two thousand years ago. In the matter of the ET/UFO enigma, the Gnostics were ahead of everyone today. Way ahead.”
“At first the Archons have no habitat. They swarm around like an insect colony blown savagely across interstellar space…This anomalous species comes into existence prior to the time when the earth emerges by direct transformation of Sophia’s own divine substance. Archons are Sophia’s offspring in a sense, but in an entirely different way than humanity and other organic species are. They do not emerge from her divine substance, Organic Light, but from [relatively inert, not inherently alive matter]. They are a freak species of inorganic composition, but they are alive and conscious in their own way.”
From among the Archons a reptilian leader ultimately emerges, who “is androgynous [and] rapidly assumes a markedly male, macho posture. He now takes charge of the extraordinary situation produced by Sophia’s plunge…Arrogant by nature [this] Demiurge deems himself to be at the center of creation, lord of all he beholds. Gnostic texts state plainly that [Demiurge]is insane, a demented god, or imposter deity. The Demiurge is indeed a sort of god, a cosmic entity in his own right…but he is a self-deified inorganic phantom deluded about his own identity. This is not meant as a figure of speech… the Gnostic materials clearly show…the Archons as real, physically existent inhabitants of our planetary system, who wrongly attempt to penetrate our biosphere. God exists, but he is insane. And he works against humanity…”
“Gnostics warned that we coexist in a planetary system with a demented entity who can access our world through our minds.”
And, Gnostics tell us, that through the human mind, the Archons were able to impose their most cunning deception–religion. By manipulation of religious ideology, the Archons are able to covertly substitute their mind-set into human culture.
“Gnostics detected the humanized face of the Archons in all authoritarian structures and systems that deny authenticity and self-determination to the individual.”
Surely it is becoming more obvious that something undefined–just beyond our perceptual grasp–is working ‘against’ humanity and even the planet itself. Primitive, petty, Bronze-age disputes in remote antiquity fought with swords and spears over religious rivalries and territorial claims seem quaint and provincial, from our New Millennium point of view. But for these same conflicts to rage on mindlessly for four-thousand years, now fought with today’s high-tech, mass-destruction weapons, suggests a profound pathological disorder in the human psyche that must be identified and treated before this malignancy engulfs our species altogether.
Gnostics would argue that, over the centuries, the proliferation of rival religions, political structures as well as modern corporate structures are each nothing more than microcosms of the Archon’s original social control construct for human domination. These structures mimic the Archon mind.
According to Gnostic theory, the Archon’s major initiating intrusion into the human realm is documented in the Old Testament book of Genesis, with the appearance of Jehovah to the patriarch, Abraham.
“In the Gnostic perspective the Archons are not only mind parasites—delusional nodes in the human mind, considered quasi-autonomous psychic entities, if you will—they are cosmic imposters, parasites who pose as gods. But they lack the primary divine factor of…‘intentionality,’ ‘creative will.’ They cannot originate anything, they can only imitate, and they must effectuate their copycat activity with subterfuge and stealth, lest their true nature be detected.”
“Hence [posing as Jehovah, the Archons] offer Abraham something that already belongs to him as a member of the human race. The earth has already been given to humanity: it is the precious habitat [dreamed] by the Goddess Sophia…The Archons approach Abraham with a fake deal, promising him possession and domination of the terrestrial realm, but this is not compatible with Sophia’s…divine intention. The earth is not a territorial prize but a precious setting where the human species can realize its innate genius, its capacity for novelty, acting within the natural boundaries set by the Goddess.”
“The Demiurge of the Old Testament is an arrogant, demented pretender who claims that humans are “made in His image.” These four words are the corporate motto of patriarchy. Branded on the human soul, “Made in His Image” signifies the total enslavement of humanity to an alien, off-planet agenda.”
The seeds of this enslavement spread over the ensuing centuries like a virus through patriarchal Judeo/Christian ideologies and Islam, which essentially serve as the models for modern Western Civilization’s political structures—brutish, authoritarian hierarchies designed to dominate, rather than serve their respective populations. And rather than responsible stewardship of our planet’s well being and natural resources, in keeping with humanity’s opportunity to co-evolve with Sophia, modern political and corporate hierarchies see the planet as a lifeless rock to be plundered, tortured and exploited for greed and profit.
MONOTHEISM: THE GREAT UNMENTIONABLE EVIL
“The great unmentionable evil at the center of our culture is MONOTHEISM. From a barbaric bronze age text known as the Old Testament, three anti-human religions have evolved–Judaism, Christianity, Islam. These are “Sky-God” religions. They are, literally, Patriarchal–God is the Omnipotent Father–Hence the loathing of women for 2000 years in those countries afflicted by the ‘Sky-God’ and his Earthly male delegates. The Sky-God is a jealous god, of course. He requires total obedience from everyone on Earth, as he is in place not for just one tribe, but for all of creation. Those who would reject him must be converted or killed for their own good. Ultimately TOTALITARIANISM is the only sort of politics that can truly serve the Sky-God’s purpose.” Gore Vidal
Knowledge of a sentient, living earth has been maintained and revered by indigenous peoples around the planet: from Australia’s Aboriginals, to the native peoples of both North and South America, as well as the tribes of Africa. Yet over the centuries, the expansion and conquest of Christian European nations have systematically exterminated and marginalized these cultures, deliberately and effectively silencing their awareness of the Goddess reality, and the unseen menace of the Archon dominion.
“… And, considering what the world is now, with all the misery, conflict, destructive brutality, aggression, and so on. Man is still as he was. Is still brutal, violent, aggressive, acquisitive, competitive. And, he’s built a society along these lines.” Krishnamurti
And yet the Gnostics would argue the world we see today does not show the face of true human, but rather the insane, homicidal face of the manipulating Archon madness that distorts it. Perhaps humanity now confronts its ultimate challenge to actualize its divine and greatest potential--the power of its intentionality.
“This power was expressly given to humankind to allow us to detect and resist Archontic subversion. In a sense, the Archons are present in the cosmos to test us so that we are certain to make optimal use of our divine endowment. The supreme attainment of our humanity requires facing our inhumanity (our Archontic side) and dis-empowering it, but not disowning it.”
In the Gnostic texts even Sophia herself warns the evil Archon Demiurge, he will ultimately be defeated by the humanity she created. It is our destiny…!
THE ARCHONS: ALIEN INVADERS FROM SPACE
|
<urn:uuid:ca18e99d-2eca-4313-91a1-d750cba25dbd>
|
CC-MAIN-2017-30
|
http://theunknownmoment.blogspot.com/2013/10/goddess-extraterrestrials-and-gnostics.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424296.90/warc/CC-MAIN-20170723082652-20170723102652-00509.warc.gz
|
en
| 0.944479 | 4,215 | 2.53125 | 3 |
As we all know, our desert cities are magnets for winter visitors, who are seduced by our balmy weather, manicured fairways, and bountiful recreational opportunities. Not surprisingly, they also expect their winter paradise to be landscaped with loads of COLOR!
This is always a challenge for landscape professionals because although our cold temperatures are mild compared to those across most of the country, they are low enough to prevent most ornamentals from blooming and looking their best. While many plants bloom profusely in the early fall and spring, the color options drop off drastically in the dead of winter. However, don’t despair! Although the list of winter-blooming plants is short (especially for our friends in high desert regions), you can enhance your garden by including plants with colorful foliage, and interesting shapes and textures. Combine some of the plants show below, and your garden will be winter wonderful! (Note: the bloom periods given are for mild winters in low deserts.)
Winter Color with Flowers
Aloes, Aloe species
These succulents from South Africa provide some of our best winter and early spring color. Ranging from small clumping groundcovers to tree-like accents, there are several species from which to choose. Hummingbirds are attracted to their yellow, orange or red tubular flowers. Aloes prefer light filtered shade, thriving under the canopy of desert trees such as mesquite and palo verde. Most aloes begin to suffer frost damage below 25º F.
Bulbine, Bulbine frutescens
Also a native of South Africa, this charming little succulent is a must for desert gardens. It forms a small clump to 18 inches tall by 2-3 feet across, with fleshy, bright green leaves that look good all year. Tall, delicate spikes of yellow flowers rise above the foliage in the winter and early spring. An orange-flowering selection is also available. Bulbine can be grown in full sun or filtered shade and is cold hardy to at least 15º F.
Indigo Bush, Dalea pulchra
Indigo bush is an Arizona native, so it’s no surprise that it thrives in full sun and reflected heat exposures. It also tolerates temperatures as low as 5º F.This evergreen shrub has an open, rounded growth form to 5 feet tall and wide. Its delicate silver foliage provides a striking contrast to the masses of violet flowers produced in the winter and early spring. Indigo bush is quite susceptible to over-watering, so plant it in well-drained soil and be careful not to kill it with kindness. The nectar-rich blossoms attract bees and butterflies.
Black Dalea, Dalea frutescens Sierra Negra™
Black dalea blooms in the late fall with masses of bright purple flowers. Evergreen in the Phoenix area, this shrub forms a rounded mound of grey-green foliage to 4 feet tall by 5 feet wide. Like Dalea pulchra, it needs full sun and is very tolerant of reflected heat. The bees cover this shrub during the bloom season.
Valentine Emu Bush, Eremophila species Valentine™
Surprise your sweetheart by planting several of these incredible shrubs. Blooming begins in January, is in full swing by Valentine’s Day, and continues through March. The masses of tubular red flowers are truly spectacular. For the rest of the year, this evergreen shrub provides nice, deep green foliage and a dense, rounded form. Plant Valentine™ in full sun, and allow it plenty of room to develop, as it can quickly grow to 4 feet tall by 5 feet wide. It is cold hardy to the mid-20s F.
Angelita Daisy, Hymenoxys acaulis (reclassified to Tetraneuris acaulis)
Angelita daisy is one of the best perennials to plant for year ’round color. Although blooming slows down in the winter months, it can still be counted on to provide a splash of sunny yellow in the garden. Angelita daisy has slender, bright green leaves that form a clump to 10 inches tall by 15 to 18 inches wide. Daisy-like flowers are perched above the foliage on tall, leafless stems. Angelita daisy makes a great low border plant and should be planted in clusters or masses for the greatest impact. Plant in full sun, and be careful not to over water. Trim back spent flower spikes periodically to initiate new flower production and keep the plants looking fresh. Angelita daisy is cold hardy to 0° F.
Foliage Color & Texture
Desert Milkweed, Asclepias subulata
Don’t be misled by the unflattering common name of this terrific plant. Desert milkweed is a real winner! This unique plant has a strong vertical form, forming a 4-foot clump of leafless, flexible silver-grey stems. Unusual clusters of creamy yellow flowers crown each stem from spring through fall, attracting butterflies to the garden. Tuck desert milkweed in among boulders, interplant it with herbaceous shrubs and perennials or grow it in a container. This clean plant is also ideal for use around swimming pools Desert milkweed thrives in full sun and reflected heat, and needs good drainage. It is hardy to 23º F.
Wooly Butterfly Bush, Buddleja marrubiifolia
The soft, silvery foliage of wooly butterfly bush helps to liven up winter landscapes. Combine this rounded evergreen shrub with green-leafed plants for an interesting contrast. Wooly butterfly bush grows to 5 feet tall and wide, maintaining a dense form with little maintenance. It prefers full sun and well-drained soils and is hardy to at least 15º F.As an added bonus, its small orange flower balls attract butterflies in the spring and summer!
Gopher Plant, Euphorbia rigida
Strange and wonderful, this unusual shrub looks like something from another planet but is native to the Mediterranean. Its arching, spreading stems are lined with linear, fleshy grey-green leaves. Broad clusters of chartreuse flowers appear at the branch tips in late winter and early spring. This shrub can reach a mature size of 3 feet tall by 4 feet wide. After flowering and fruiting, the stems die back, leaving a clump of grey-green foliage near the ground. It is hardy to at least 5º F, and is tolerant of full sun and reflected heat exposures.
Purple Prickly Pear, Opuntia santarita Tubac™
Although this colorful cactus doesn’t show its yellow blossoms until late spring, the rich purple pads provide plenty of winter interest. Mix the purple prickly pear in with shrubs and perennials for a softer effect. It is quite spiny, so set it well back from high traffic areas. This plant will grow to 4 feet tall by 6 feet wide.Tubac™ needs full sun and is hardy to at least 15º F.
Other Plants for Winter Color and Interest
- Agave species … For sculptural interest
- Caesalpinia cacalaco [reclassified as Tara cacalaco] (Cascalote) … Blooms in the winter with yellow flowers
- Calliandra californica (Red fairy duster) … Red blossoms in late fall, early spring
- Cassia oligophylla [reclassified as Senna artemisioides v. oligophylla] (Outback cassia) … Yellow flowers in late winter
- Dalea versicolor v. sessilis Mountain Delight™ … Purple flowers in late fall, early spring
- Dasylirion species … For sculptural interest
- Hesperaloe species … For sculptural interest
- Justicia californica (Chuparosa) … Tubular red flowers in late fall, early spring
- Justicia candicans (Red Justicia) … Orange-red flowers through the cool months
- Leucophyllum candidum Thunder Cloud™ … Silver foliage
- Nolina species … For sculptural interest
- Penstemon eatonii (Firecracker Penstemon) … Red flowers in late winter, early spring
- Plumbago scandens Summer Snow™ … Foliage turns red in the winter
- Salvia clevelandii (Chaparral Sage) … Blue flowers in late fall, early spring
- Tagetes lemmonii (Mt. Lemmon marigold) … Intense yellow-orange flowers in late fall
and early spring
- Yucca species … For sculptural interest
Be sure to check out our other Plants of the Month to find the perfect low-water-use plant for your landscape.
From time to time, Water – Use It Wisely features guest bloggers who write about topics related to water and water conservation. The author of this blog is Mountain States Wholesale Nursery, a wholesale plant nursery in Arizona. Mountain States strives to utilize desert-adapted plants to add beauty, color, and variety to Southwest landscapes.
« Five Favorite Blogs of 2022
|
<urn:uuid:48b2b323-6b24-4d5c-8aed-4e63c337553d>
|
CC-MAIN-2023-23
|
https://waternewshubb.com/2023/01/17/plant-of-the-month-winter-color-means-winter-wonderful/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00619.warc.gz
|
en
| 0.89439 | 1,920 | 2.578125 | 3 |
We know high stress can be a major health risk, but do you know just how damaging stress can be? Protect yourself by learning how men's health can be affected.
What is Stress? Stress is not a useful term for scientists because it is such a highly subjective phenomenon that it defies definition. And if you can't define stress, how can you possibly measure it? Stress is difficult to define because it is so different for each of us. Stress is a condition that is often characterized by symptoms of physical or emotional tension.
Stress can be positive, but if it's chronic, it can affect your health. WebMD looks at stress triggers and how the body responds.
There are many types of stress, from minor incidents to chronic stress. Read more about how to cope with these different types of stress.
Everyone—adults, teens, and even children—experiences stress at times. Stress can be beneficial by helping people develop the skills they need to cope with and adapt to new and potentially threatening situations throughout life.
Stress can involve a recent change or a daily pressure. Stress happens to everyone and can be motivating and productive or negative and destructive.
|
<urn:uuid:f21a6312-1dfa-40a6-9800-740bc36967b2>
|
CC-MAIN-2017-34
|
https://elink.io/p/stress-and-health
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102993.24/warc/CC-MAIN-20170817073135-20170817093135-00626.warc.gz
|
en
| 0.962152 | 238 | 2.90625 | 3 |
What is a freight embargo and why do carriers set them?
Authored by SMC³ on July 12, 2023
Embargoes are common in less than truckload (LTL) shipping. While there are many reasons why a carrier might set a freight embargo, they’re often necessary for carriers to comply with legal restrictions, overcome logistical challenges and balance capacity during times of peak demand.
LTL temporary service outages are particularly relevant in today’s carrier market, when demand for freight is at record highs and resources are still lean for many carriers. This blog explains the purpose of LTL freight embargoes, who decides when they go into effect and why embargoes can actually help make the supply chain work more smoothly for shippers and carriers alike.
What is an LTL freight embargo?
A freight embargo is when a carrier stops accepting loads from shippers. LTL embargoes can be set for a certain timeframe, geographic region or even specific freight characteristics (i.e. maximum weight or shipment size) according to the carrier’s decision.
Who decides when freight gets embargoed?
Embargoes are often set by carriers themselves. They can also be set by state and federal governments, but this is less common in American domestic freight.
Why do carriers set freight embargoes?
An LTL carrier might set an embargo on freight during peak shipping season or in case of bad weather conditions, natural disasters or limited access to certain locations. An embargo can also help carriers maintain better control over capacity and lessen strain by selectively refusing freight for a set time.
With SMC³ CarrierConnect® XL, carriers can manage embargoes and custom messaging for shippers at the terminal, city or postal code level, allowing carriers to adjust pickup dates and calculate estimated delivery dates based on optional embargo data.
How long do freight embargoes last?
LTL carrier embargoes can last days, weeks or even months depending on the carrier’s decision. For this reason, it is particularly important for carriers to have a solution that helps them communicate operational capabilities.
What do LTL embargoes mean for shippers?
If a carrier sets an embargo that affects a shipper’s freight, the shipper will either have to wait until the carrier’s embargo lifts or, more likely, they’ll look for another carrier to move their freight in the meantime. Visibility between carriers and shippers remains crucial so that all parties can reallocate resources for higher-value activities.
Additionally, proactive alerts direct from the carrier or via TMS help avoid the challenges that came with the traditional, manual approach of relaying information via phone calls or broad email distributions.
Why freight embargoes aren’t always a bad thing
An embargo means a carrier stop accepting freight, which obviously means they lose out on some amount of revenue from turning down those loads – so why would they turn down the opportunity to make more money? Embargoes might seem counterintuitive for carriers, but they’re not arbitrary.
Carriers often set embargoes on LTL freight to ease the strain on their capacity. For example, when natural disasters disrupt the supply chain, carriers often experience a spike in demand as shippers look for new ways to get their freight where it needs to go. If a carrier knows it doesn’t have the capacity to deliver that freight on time, the carrier might set an embargo on the freight affected by that natural disaster.
Carriers might also set a temporary service outage even when there’s no immediate disaster or a sudden spike in demand. Sometimes, they just get too busy to accept certain types of freight or freight from certain locations. Setting up a transit service alert for a certain length of time helps them catch up so they can predict their business, plan out capacity and better serve their customer base more consistently.
Even if accepting that freight would mean additional revenue, carriers would be adding strain on their capacity, possibly resulting in late deliveries. Many carriers decide that the payout isn’t worth the decreased performance and increased stress on their drivers and equipment – hence, the embargoes.
How will I know when an embargo is set?
When setting service interruptions, communication is important. Shippers and carriers alike benefit from clear, early, consistent communication of information that affects their freight.
Carriers can communicate embargoes to shippers through CarrierConnect® XL with custom messaging that explains the terms and reasons for the embargo and offer alternatives, helping maintain the symbiotic carrier/shipper relationship during an embargo.
Implementing an embargo is a very easy process for carriers via a simple data file upload, and if received before 2:00pm ET, the embargo update will be reflected in CarrierConnect® XL the same day. Embargo messaging can also be viewed by any customer with a CarrierConnect® XL license v3.2 or higher via SMC³’s online CCXLWebApp.
To learn more about how you can access the most accurate, comprehensive, up-to-date- transit details available, visit https://www.smc3.com/carrierconnect.htm.
|
<urn:uuid:8ced087c-9d87-47b4-8f08-bcea424db63d>
|
CC-MAIN-2023-40
|
https://smc3blog.com/what-is-a-freight-embargo-and-why-do-carriers-set-them-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00326.warc.gz
|
en
| 0.93143 | 1,072 | 2.53125 | 3 |
Box turtle Habitat
A common overlooked aspect of box turtle care is cage size. In the wild, box turtles occupy relatively arge areas, and providing an enclosure that offers plenty of room is essential to permanently keep them in captivity. Outdoor turtle pens are the best way to accomplish this. They are not difficult to construct and are cheaper than setting up an indoor enclosure. When kept outside, box turtles are exposed to unfiltered sun light, including beneficial UVB rays, which are required for turtles to process calcium from their diet. See Building an Outdoor Box Turtle Pen for more information about constructing one.
Unfortunately, not every environment is suitable to house box turtles outdoors. In areas outside of their natural range, it may be necessary to bring the turtle inside during cold or hot weather, and in some regions, it might not be suitable to keep box turtles outside at all. In these situations, an enclosure indoors will be necessary.
Box turtle habitats continued
Standard glass aquariums don’t work well for housing turtles. Many box turtles, particularly wild-caught animals, pace back and forth against the side of an aquarium trying to walk through the glass, which can be stressful for the turtle. Glass aquariums are also expensive, easily broken, and heavy, and are best passed up for other housing options. Large plastic tubs, such as cement mixing trays, large storage containers, or stock ponds, can be used. Some people have also had success keeping turtles in large indoor pens constructed out of wood, often on top of a table or raised legs. You keep can turtle in a 50 gallon tub that measures 43 inches long by 22 inches wide by 18 inches high (109 cm by 56 cm by 46 cm) during the winter and late fall. It cost less than $15 and offers more space than an average aquarium.
Box turtle substrate
Box turtles do best when kept on a substrate that they can burrow in. In indoor enclosures, coconut husk fiber (bed-a-beast, eco earth, forest bed, etc.) is an ideal substrate. Large bark nuggets and sand can be mixed into the coconut husk fiber. Other possible substrates include cypress mulch, peat moss, or top soil mixed with sand. Gravel, newspaper, sand, reptile carpeting, and indoor/outdoor carpeting make poor substrates and do not work well long-term because turtles can not easily burrow in them, and they do not hold moisture well.
Most captive box turtles are fairly secretive and prefer to remain hidden during the day. To accommodate this, a few hide areas should be provided. These can include pieces of cork bark, commercially available reptile hide spots, driftwood, or cardboard shelters with an entrance hole cut in them.
Box turtle UVB Lighting:
Box turtles that are kept indoors need two types of lighting to stay healthy. They need to be exposed to UVB rays that are produced by a fluorescent or mercury vapor light bulb, and heat that is produced by an incandescent light bulb. Box turtles will need to receive UVB rays in order for their body to process calcium from their diet. Choose a bulb that produces at least “5%” UVB radiation. Place the UVB emitting light bulb over a screen section or open section of the cage because glass and plastic filter out UVB rays. The amount of UVB radiation that is produced by the currently available bulbs slowly decreases over time, so UVB emitting light bulbs need to be replaced every five to seven months regardless of if they burn out or not. Incandescent bulbs can be used to heat the cage to an appropriate temperature. Infra-red incandescent light bulbs can be used to heat the cage at night without disturbing the turtle. All lights should be turned on for 10 to 14 hours a day, with the exception of infra-red light bulbs.
Box Turtle Temperature and Humidity:
The exact temperature that is right for a turtle depends on the species that is kept and where it is from. It’s important to have both a warm and a cool side in the cage so that the box turtle can regulate its body temperature. Box turtles from the northern end of their range may do better when kept cooler than box turtles from the southern part of their range. The warm side should have a warm spot provided by a low wattage light bulb that reaches 80°F-90°F (27°C-32°C). The cooler end of the cage should generally stay between 65°F-75°F (18°C-24°C). If the temperature falls too low for long periods of time some wild-caught box turtles may try to hibernate. If they aren’t conditioned before they start hibernating the turtle will run into health problems.
Eastern box turtles spend much of their time in the leaf litter of forests and woody grasslands. The humidity in the soil and leaf litter is often high. Ornate box turtles are generally found in drier prairies and partial forests where the humidity is lower. Half of a box turtle’s cage can be sprayed with water daily to create a humid area for the turtle to go. The bottom layer of soil substrate should remain moist or damp on one half of the cage as well. Box turtles that are kept in dry conditions often remain burrowed under the substrate for extended periods of time in an attempt to stay in a humid area.
Box turtle Water:
A source of clean water should always be available to box turtles. Most bathe in it a couple times a day or more and it can become dirty quickly. The water dish should be changed at least once a day, more often if needed. Box turtles are also not the best swimmers, so the water dish should be fairly shallow. It should be large enough for the entire turtle to fit into it. To ensure that captive box turtles stay hydrated it can be helpful to soak them in lukewarm water for up to an hour once a week.
Explore our box turtle care section and find information on the following:
- Box turtle care
- Eastern box turtle for sale
- Box turtle Diet
- Box Turtle water
- 3 Toed box turtle for sale
- box turtle pictures
- baby box turtles for sale
- Box turtle UVB Lighting
- Box Turtle Habitat
- Baby Ornate box turtle for sale
- Box Turtle temperature
- Box turtle lifespan
- Size of box turtle
- Box Turtle Humidity
- Box turtle substrate
- Chinese box turtle
Largest selection of box turtle for sale in the USA!
At TortoiseTown, we are proud to have the largest selection of box turtles for sale online anywhere. We have everything from the common box turtle for sale, including the eastern box turtle, baby eastern box turtles for sale, adult eastern box turtle for sale, 3 toed box turtle, ornate box turtles including baby ornate box turtle for sale. Baby ornate box turtles are very similar to desert box turtles.
We also have florida box turtles, gulf coast box turtles, chinese box turtle for sale and more. While the baby chinese box turtle is probably the most expensive, it is also the most rare. All of our baby box turtles for sale are 100% captive bred and are raised inside our baby turtle adoption facility. With a biologist on site, you can expect a health new pet box turtle for sale from tortoise town, shipped year round!
Remember when searching for any tortoises for sale, including a new baby tortoise for sale, tortoise town is your source for the best tortoise for sale , baby tortoises for sale , baby turtles for sale, and adult turtles for sale of any turtle store anywhere including a huge aquatic turtles for sale section. If you are interested in tortoise care, please visit our care section.
|
<urn:uuid:01518ca8-52a0-47b7-a46d-437068d23f50>
|
CC-MAIN-2023-40
|
https://www.tortoisetown.com/box-turtle-habitat/?avia_extended_shop_select=yes&product_order=rand
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00445.warc.gz
|
en
| 0.936906 | 1,620 | 3.0625 | 3 |
A pacemaker is a tiny device that is implanted in the abdomen or chest area to control abnormal heart rhythms. It utilizes electrical impulses to help the heart muscle maintain a proper rhythm and heart rate.Continue Reading
Pacemakers are mostly used to treat arrhythmia. The can also be used to treat hypertrophic cardiomyopathy, congestive heart failure and fainting spells. A typical pacemaker consists of a computerized generator, wires with sensors and a battery. Implanting a pacemaker requires a minor surgery that takes a few hours.
Complications due to pacemaker surgery are rare, and most people can resume their normal activities after a few days. However, precautions have to be taken in everyday life after a pacemaker has been implanted.Learn more about Organs
|
<urn:uuid:252ec60a-44ba-49d8-b96d-bf5954bd4c2e>
|
CC-MAIN-2017-43
|
https://www.reference.com/science/pacemaker-c9fa0f612ae7bd69
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822822.66/warc/CC-MAIN-20171018070528-20171018090528-00143.warc.gz
|
en
| 0.918807 | 160 | 3.484375 | 3 |
Alternating high current output stages. Both stages are capable of driving the gate of a power MOSFET. Each stage is capable of 500-mA peak source current, and 1-A peak sink current.
The output stages switch at half the oscillator frequency, in a push-pull configuration. When the voltage on the RC pin is rising, one of the two outputs is high, but during fall time, both outputs are off. This dead time between the two outputs, along with a slower output rise time than fall time, insures that the two outputs can not be on at the same time. This dead time is typically 60 ns to 200 ns and depends upon the values of the timing capacitor and resistor.
The high-current output drivers consist of MOSFET output devices, which switch from VDD to GND. Each output stage also provides a very low impedance to overshoot and undershoot. This means that in many cases, external Schottky clamp diodes are not required.
|
<urn:uuid:fc75a715-ee49-469b-bc59-98c892415ff0>
|
CC-MAIN-2020-34
|
https://www.ti.com/document-viewer/UCC2808A-2/datasheet/outa-and-outb-t4374330-13
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735881.90/warc/CC-MAIN-20200804161521-20200804191521-00419.warc.gz
|
en
| 0.934444 | 207 | 2.90625 | 3 |
I was happy to see that National Aquarium CEO John Racanelli wrote about the important activities that we, as individuals and as a society, can do to protect the environment, without once mentioning the impossible goal of "stopping climate change" ("Take back the planet," April 22).
Sadly, Earth Day Network, the organization behind Earth Day, is not so practical. Their website for 2013 Earth Day focused so intensely on climate change that one would think they were promoting "Climate Day."
This is a big problem for Earth Day's future. As the hypothesis that humanity's carbon dioxide emissions are causing dangerous global warming falls into disrepute, all those associated with the climate alarm will also lose credibility. Earth Day participants, indeed all practical environmentalists, must distance themselves from the ideologically-driven climate scare or risk the movement degenerating into irrelevance.
Tom Harris, Ottawa, Ontario, Canada
The writer is executive director of the International Climate Science Coalition.
|
<urn:uuid:e1e4436c-9cff-41bb-9240-f077e16a6614>
|
CC-MAIN-2014-35
|
http://www.baltimoresun.com/news/opinion/readersrespond/bs-ed-earth-day-letter-20130425,0,1011791.story
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829916.85/warc/CC-MAIN-20140820021349-00435-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.953403 | 195 | 2.546875 | 3 |
Our pediatric allergists treat children who have airborne, environmental, and food allergies.
When your child has multiple allergies, is at risk for a life-threatening allergic reaction, or is experiencing growth issues related to food allergies, it affects the entire family. You may often worry about your child’s health, and he or she may worry too—about having an allergic reaction and about feeling different from his or her friends.
Our team at the Pediatric Allergy Program, which includes a pediatric allergist, a pediatric nurse practitioner, and two pediatric allergy registered nurses, understands the challenges of living with allergies. We provide practical solutions for avoiding allergic triggers and access to the latest in allergy treatments. Our goal is to develop a long-term relationship with your child and family and provide you with the education and support you need.
At the Pediatric Allergy Program, part of Hassenfeld Children’s Hospital at NYU Langone, we start by talking with your child and you to understand the history of allergy and how it affects your family’s everyday life. We then use specialized allergy testing to identify your child’s triggers. This can include a skin test to look for reactions to small amounts of allergens and blood tests to look for antibodies to certain allergens. Our child life specialist supports your child through these tests, creating distractions and providing comfort to help ease fears and make the process more manageable.
The most effective treatment for food allergies is to avoid anything that contains the allergen. This is not always an easy task, however, when the most likely food allergies in children—milk, eggs, peanuts, and soy—are found in many common foods. From the school lunchroom table to the care packages at summer camp, children are constantly exposed to food and are socially inclined to share. Also, some ingredients are hard to detect or identify.
We teach your child and family ways to avoid certain foods and provide treatments that can build up tolerance for certain allergens. This includes oral immunotherapy to treat peanut allergy. For children at risk of developing food allergy, such as infants who have severe eczema or egg allergy, we offer early introduction of allergenic foods such as peanuts, tree nuts, and eggs during supervised oral food challenges in our office. This approach can reduce the chance of your child developing severe food allergies later in childhood.
We also determine the allergy medication for your child that is most likely to lessen symptoms if they are exposed, including antihistamines and, in cases of severe allergies, an epinephrine autoinjector.
Some children react to airborne allergens, such as pollen, mold, and pet dander, or have allergies to insects, medicines, or chemicals. We teach your child and family ways to avoid these allergens, such as asking about pets before scheduling a playdate, using special bedding covers, and removing drapes that can harbor allergens. Sometimes we recommend immunotherapy for children, also known as allergy shots.
Living with allergies can be challenging. Children with allergies often worry about their own health and can feel overwhelmed by the responsibility of avoiding triggers. Some children are mocked and bullied by peers. Our social worker can provide emotional support and coping tools. Your child and family also have access to a registered dietitian who offers practical tips for avoiding food triggers and ensures that your child’s restricted diet provides proper nutrition.
Our pediatric experts provide the best care possible for children with conditions ranging from minor illnesses to complex, more serious conditions.
|
<urn:uuid:a79c0aee-5de4-40b9-92a5-c727c283d33c>
|
CC-MAIN-2020-24
|
https://nyulangone.org/locations/pediatric-allergy-program
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347400101.39/warc/CC-MAIN-20200528201823-20200528231823-00109.warc.gz
|
en
| 0.955664 | 718 | 2.8125 | 3 |
The best fertilizer for your plants depends on their needs. Whether your azalea bush lacks the vibrant green leaves it should possess, your grass is doing well but your lawn is still sparse or your fruit trees are succumbing to every pest, disease and cold spell that comes their way, there is a particular fertilizer type to suit your needs. Choose the best fertilizer for your needs based on the nutrients your plants are lacking.
Plants that are lacking in lush greenery or lawns that need a pick-me-up benefit from the nutrient nitrogen. While nitrogen is an essential nutrient for all plant life, those that are primarily leafy or rely heavily on their greenery need more nitrogen than others. It is the basis for protein manufacture in plants and plays a major part in photosynthesis. For lawns, shrubs and leafy houseplants, a nitrogen-rich fertilizer is the best choice. When reading a fertilizer package, nitrogen will be the first in a series of numbers appearing with dashes between them. For example, a formula of "10-0-0" is a nitrogen-only fertilizer.
Roots and Flowers
Phosphorous is another macronutrient essential to plant growth. Phosphorous aids in the transfer of energy from one part of the plant to another and is responsible for strong root growth and healthy, hearty blooms. If you need to revitalize a blooming plant, a plant that isn't producing as much fruit as it should or a sparse lawn, a phosphorous rich fertilizer is the best choice. Phosphorous is represented on a fertilizer label as the middle number on the nutrient analysis. A formula represented as "10-20-10" has more phosphorous than any other nutrient and would thus be ideal for root and flower or fruit development.
Potassium helps every part of the plant. Without potassium, plants suffer from yellowing, curling leaves, dark blotches and are more susceptible to disease and pest infestations. Potassium is essential for the overall health of a plant and helps fortify plants against cold, disease, pests and the everyday rigors of nature. Choose a potassium-based fertilizer for sickly plants or plants that are actively flowering and fruiting. Potassium is represented as the last number on the nutrient analysis of a fertilizer package. For example, a fertilizer with "10-10-20" has more potassium than any other nutrient.
|
<urn:uuid:031ec2f0-9c43-4275-9d45-82265430d039>
|
CC-MAIN-2017-30
|
http://www.gardenguides.com/103826-fertilizers.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426234.82/warc/CC-MAIN-20170726162158-20170726182158-00229.warc.gz
|
en
| 0.947845 | 490 | 2.65625 | 3 |
Engine Oil Pump
The oil pump is the device in a vehicle's engine,which is responsible for circulating oil throughout the engine. Any parts in the engine that get too hot or are experiencing excessive amounts of friction will have their life spans greatly reduced. This pressurized oil may also be used as a hydraulic fluid to power small actuators. There are many different types of oil pumps which include gear pumps, trochoid pumps, vane pumps, and plunger pumps. To avoid the need for priming, these pumps are mounted submerged or around the oil level in the sump. Oil is sucked up from the oil pan and through the pickup tube were it is pressurized before being sent into the engine. Since most of the oil is stored at the bottom part of the engine in the oil pan when the engine is off, the filter will house a small amount of oil that is used to lube and cool the top parts of the engine at start-up.
Mechanical pumps are usually used for the oil pump because it is simple and provides unmatched reliability. These mechanical pumps are driven by mechanical gear-trains from the crankshaft and sometimes the camshaft or distributor shaft. Having a reduced pump speed is beneficial which is why attaching the pump to the camshaft or distributor shaft is preferred if the engines setup allows for it. It is rare to have pumps driven by belts or gears because if they fail, the engine can be starved of oil which can cause catastrophic failure.
The oil pressure that is generated by most of these pumps is around 10 psi per every 1000 revolutions per minute, peaking at around 55-65 psi in some parts of the system. Pressure near the crankshaft journal and bearing may reach a few hundred psi which shows how much the pressure of the oil will vary in specific parts of the engine. Monitoring the oil pressure gauge inside the vehicle to ensure that the oil is at the proper pressure is important to do whenever the engine is on. Low oil pressure is often caused by things such as a faulty oil pump, a clogged oil pickup screen, excessive wear on high mileage engines, or simply low oil volume. Loss of oil pressure over time is somewhat normal in an engine because as parts start to wear down, the gaps in between get bigger which allows more oil into the area. Oil pressures in high performance engines that rev higher will be much higher than a regular vehicle that has the ability to rev up to only about 5 to 6 thousand rpm. High performance engines that don’t have high enough oil pressure can find air pockets trapped in the oil which can cause excessive wear to the engine.
Who Makes This
- Item Name Coming Soon
Where to Buy
|
<urn:uuid:d14eb6a1-745c-4891-a6c1-ab77ec9ba197>
|
CC-MAIN-2017-34
|
http://wiki.shopperoutletnetwork.com/index.php/Engine_Oil_Pump
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886120573.0/warc/CC-MAIN-20170823132736-20170823152736-00490.warc.gz
|
en
| 0.974673 | 548 | 3.078125 | 3 |
This is one of the etymologies that delighted me in my salad days. What could seem simpler? Part of a nail that hangs, right? Incredibly though it’s possible that the nail referred to is an iron nail. Over to OED.
hang-nail, n. < hang v. + nail n.; but historically an accommodated form of angnail
agnail, n. (OED redirects angnail here)
Probably cognate with or formed similarly to Old Frisian ongneil , ogneil , ognīl ingrowing nail, hangnail < the Germanic base of ange n. + the Germanic base of nail n. Compare (with the same initial element) Old English angseta carbuncle, abscess, boil. Compare later hang-nail n.
The original semantic motivation for this formation is unclear. Although all the complaints it denotes cause pain in or around the fingernails and toenails (compare nail n. I.), it is possible that the word may originally (in sense 1) have shown nail n. II., the hard, rounded external callus of the corn (and perhaps also its internal root) being taken to resemble an iron nail driven into the foot. Compare e.g. Old English wernægel wart, tumour on the back of cattle (see warnel n. and discussion at that entry), and, with similar extension of meaning, classical Latin clāvus (iron) nail, also ‘wart, tumour, corn’ (see clavus n.). Senses 2 and 3 would then show subsequent extension to other painful conditions affecting the area around the fingernail or toenail, by association with nail n. 1. However, this argument does not appear to be supported by the senses attested for the cognate in Old Frisian.
With sense 2 perhaps compare also French angonailles (1611 in Cotgrave, glossed as ‘botches, (pockie) bumps, or sores’) and post-classical Latin anghiones , anguinalia , carbuncles (attested in undated saints’ lives).
The forms in n- and gn- show metanalysis (see N n.). The regional variant angernail apparently shows remodelling of the first element by association with anger n.
And there we have hangnail. I am in buoyant mood this fine day as Amazon have just delivered my replacement copy of Ovid’s Metamorphoses, translated in glorious ‘fourteeners’ by Arthur Golding. Shakespeare knew this version like the back of his hand, as many of his lines testify. It’s one of the books I’ve loved with a passion ever since first reading it. And I left it on a bus! (I take books out with me as I often read while strolling along.)
OK, sorry for the digression. Normal service will now be restored.
|
<urn:uuid:f2dbfc4f-956b-4784-9a67-817e5f1a5b03>
|
CC-MAIN-2017-43
|
http://www.wordorigins.org/index.php/forums/viewthread/3754/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823630.63/warc/CC-MAIN-20171020025810-20171020045810-00644.warc.gz
|
en
| 0.929055 | 632 | 2.703125 | 3 |
What is PCOS?
Many girls do not get their periods all their lives. Talking about the medical terms, we call the condition as amenorrhea. This ultimately leads to infertility, and of course, the shame of something she is not responsible for. Even in recent times when medical science is developing every day, people do think twice before going for artificial fertilization. There can be many reasons behind the infertility of a woman. One such reason is PCOS. PCOS stands for Polycystic Ovary Syndrome.
It affects 6 to 12% (as many as 5 million) of US women who are in their reproductive age. It refers to the condition when the ovaries start to form cysts all over, impacting their functioning significantly. According to the explanation of the female reproductive system, ovaries are the production house of reproductive eggs. They are responsible for the transportation of ova (the reproductive eggs) in the fallopian tube. There, they meet the male reproductive sperms and initiate the process of reproduction.
If one or both of the ovaries start forming cysts, they fail to perform their function, leading to infertility.
Root Cause of PCOS
The doctors cannot explain the specific condition responsible for PCOS. Early diagnosis, personal care, treatment, and weight loss may decrease the risk of long-term complications such as type 2 diabetes, cardiac vascular diseases, and other heart diseases. PCOS, one of the most common hormonal disorders found in women, leads to various complications like infertility, unwanted and uncontrollable weight gain, acne, hair loss, mood swings, and irregular periods. PCOS not only puts an impact on these externally visible factors, but also certain psychic factors like decreased breast size, low-sex drive, fatigue, and almost dead will to masturbate are also noticed in females with PCOS.
Yes, there are specific treatments available, so you need not panic about the condition. But the foremost thing that you must consider is lifestyle changes and shifting yourself to the organic mode. By organic, we mean that you must move forward with the things that facilitate your PCOS treatment. It includes things like a healthy diet, yoga, and meditation.
Research says that personal care and hygiene always bring better results when the cause of infertility is PCOS. Studies show that losing weight by going organic in food habits can facilitate your treatment to a great extent. Significant differences have been cited in the recovery of people who start taking a healthy diet and the ones who do not.
Types Of PCOS
Depending upon the symptoms of PCOS, you can classify the syndrome into four different types:
- Insulin-resistant PCOS
- Pill-induced PCOS
- Inflammatory PCOS
- Adrenal PCOS
There are medical tests available to help you diagnose your type of PCOS so that you can get the best treatment for it. Read ahead for detailed information on all the different types of PCOS.
Insulin is the hormone released by the body when we eat something. It is responsible for bringing the blood sugar levels to the optimum standards as per the body’s requirement. Being insulin resistant refers to the situation when your body fails to utilize the insulin present in it. So it keeps on manufacturing but is not being used.
Insulin-Resistant PCOS refers to the situation when the body fails to handle the high blood sugar levels (hyperglycemia) and insulin together. It has been proven that people with insulin resistance are less efficient in their activities than those who optimize their insulin level as per the need of the body. Insulin resistance is one of the most common causes of PCOS. Talking specifically about women with PCOS, almost 30 to 40% of such patients suffer from problems related to their insulin levels. It is one of the critical features of both lean and obese fat in PCOS patients. Insulin-resistant PCOS also causes higher levels of androgens, which indirectly stops the transportation of reproductive eggs into the fallopian tube. This is why the eggs fail to contact male sperm for the formation of a baby. This mechanism makes PCOS the leading cause of infertility.
Other Diseases That Rise Due To Insulin Resistant PCOS
One must not forget the fact that one thing leads to the other. Similarly, many conditions come along with insulin-resistant PCOS. High insulin levels are also responsible for making women overweight to an unusual extent. This also invites various serious diseases, like:
As we all know that insulin resistance also accelerates the severity of diabetes, people with PCOS are more prone to develop the disease. This makes them lose control of their blood sugar levels, and they end up getting the worst consequences of Diabetes. The only possible method to prevent yourself from insulin resistance is to optimize the diet according to the body’s requirements.
When there is a dysfunction in the formation and regulation of insulin in the body, it results in harmful acidic substances. This leads to gestational diabetes, which is yet another severe disease that a woman can develop when she is pregnant. Our body is never prepared to deal with more than one disease at the same time. The only way out is to eradicate the food items that may cause such problems.
The heart is one of the most important organs that regulate the whole functioning of the body. When the body develops PCOS, there are chances that it develops certain heart diseases that are incurable and resistant. Some of them are autoimmune. They attack the patient’s immunity directly so that there is no scope of recovery. This increases the chances of fatality.
High Blood Pressure
The direct target of high blood pressure (hypertension) is the heart. The other marks of high blood pressure are the kidneys and brain. There are medicines available in the market that can help you optimize your blood pressure according to the situation. You can try them out but make sure that you take them only after the prescription of an expert or a doctor.
It is also one of the significant complexities that come along with insulin-resistant PCOS. This is a disorder in which the person loses the ability to breathe while sleeping. It increases the risk of heart diseases and type 2 diabetes.
There can be many things that you can use to control insulin-resistant PCOS. After consulting a doctor about the treatment, you can take inositol as your medication to cure the disease. You can also take metformin if your doctor prescribes it.
This is everything that you need to know about insulin-resistant PCOS.
Pill Induced PCOS or Post Pill PCOS
At some or other point of time in life, we take birth control pills to avoid unwanted pregnancy. As a consequence, we may suffer from disturbances in our menstrual cycle. As soon as we stop taking birth control pills, we get back to our average period. So if you are wondering about the cause of Pill-induced PCOS, then here is what you need to know.
If you find that your menstrual cycle is still facing some problems, there is a chance that there is a formation of androgens. This type of PCOS is temporary. It can be treated with the help of good nutrition and physical exercise. To diagnose pill-induced PCOS, you can go for the basic androgen level test along with the other PCOS tests.
Since we have mentioned earlier that this type of PCOS is temporary and can be treated easily, there is nothing as such that you need to avoid in the recovery phase. However, if you find any signs of hormonal imbalances, you must treat them as early as possible.
More About Pill-Induced PCOS
Moving to another recovery site or treatment, you can facilitate your recovery by adding certain things like Zinc, Peony, Licorice, and other multivitamins to your diet. You must avoid junk food and more straightforward carbohydrates that may contain harmful substances, like gluten and fats. The presence of such harmful nutrients may impact the recovery rate adversely.
Another thing that you can try is to go on intermittent fasting, which means that you will not eat anything for the next 12 to 14 hours so that the body gets enough time to utilize the fats that are already stored in the body.
If you talk about the personal care things you can do to facilitate your PCOS recovery, if you suffer from pill-induced PCOS, then there is no restriction on the exercises or workout activities you want to try. To have the best results from these exercises and workout sessions, you must see that you devote at least 150 minutes in a week to these exercises.
You must not take it lightly just because it is a temporary kind of PCOS and will not harm you much. If you are diagnosed with it, it is your sheer responsibility to take care of yourself and get rid of it soon. You must not take it lightly just because it is a temporary kind of PCOS and will not harm you much. If you are diagnosed with it, it is your sheer responsibility to take care of yourself and get rid of it soon.
This is everything that you need to know about pill-induced PCOS.
First of all, we need to understand what inflammation is. Inflammation is the body’s response towards something which was not expected to come. We experience two types of inflammations; one is acute inflammation another is chronic inflammation.
Acute inflammation refers to the wounds we get when we hurt ourselves. This can happen in a road accident, maybe falling from a bicycle. It pulls on the exterior body and heals with time. It has nothing to do with the immunity of the body and heals with the help of medicines.
Chronic inflammation is internal and happens due to certain unwanted substances in the body. It directly attacks the immune system, making the body unable to function correctly. It usually ends up causing a significant loss to the body. PCOS is also an example of chronic inflammation in the ovaries in the female body.
More about Inflammatory PCOS
If you do not show up with any signs of insulin-resistant PCOS or pill-induced PCOS, you must go for the diagnosis of inflammatory PCOS. Inflammatory PCOS obstructs the ovulation cycle and stimulates adrenal androgens in the body. It can be caused due to stress, toxins present in the environment, and food items that contain an excessive amount of gluten. It is essential to diagnose it in the most initial phase.
The most efficient test to diagnose inflammation in the ovaries is C-reactive Protein, which is also called CPR, levels of Vitamin D, Thyroid antibodies, Blood count, and gluten antibodies. Other signs of inflammatory PCOS are irritable bile, syndrome, fatigue, headache, and joint pain. To prevent yourself from the complexities of inflammatory PCOS, the first thing that you can do is to establish a diet free of gluten. Other things that you need to avoid are trans fats, junk food, sugar, simple carbs, and other harmful food items.
How To Treat Inflammatory PCOS
If you want to treat inflammatory PCOS, you need to shift yourself to a healthy diet that must include berries, green tea, avocado, pineapple, turmeric, coconut oil, ginger, jowar, ragi, bajra, and coconut milk. Always be careful about the market-based products, as you are never sure about the nutrition content in them. You must also go for nutritional supplements, like Zinc, Omega-3, and Magnesium.
Intermittent fasting is also one of the best methods to take control of the inflammation in the ovaries. The best time to continue fasting is 12-16 hours, following it more than the given time may have adverse effects. You can also practice certain physical exercises, like running, strengthening, and stretching. A big NO to weight lifting, and High-Intensity Interval Training (HIIT), as it can put an adverse impact on the muscles. This is all about Inflammatory PCOS.
If your symptoms do not match with any other type of PCOS, then you are most likely to have Adrenal PCOS. 10% of women across the world suffer from this type of PCOS. Talking about the leading cause of Adrenal PCOS, it is stress. When you are stressed with heavy loads of work and other problems in life, then there are chances that there is an elevation in the cortisol levels that causes high DHEAS.
Another cause is the elevated androgen levels in the patient. They start showing the characteristics of males. There are situations when you may not know but you suffer from heavy stress at times. It is very important to get it diagnosed as soon as possible. Three blood tests that can help you diagnose the inflammatory PCOS in the least time are Androgen levels, DHEA, and testosterone.
More About Adrenal PCOS
Other signs of Adrenal PCOS include extreme stress, anxiety, depression, low energy levels, fatigue, and insomnia. To prevent yourself from the complexities, you must be aware of some treatment ideas to follow. You must give yourself enough supplements like magnesium and Vitamin B5. You can also add food items to your diet like chamomile tea, nuts like almonds, walnuts, and pistachio, pumpkin seeds, sunflower seeds, and chocolates.
Like all the other types of PCOS, exercise plays a vital role in facilitating the medical treatment that you are taking. You can start practicing exercises like Yoga, pranayam, mindful yoga, or even simple walking. Doing any other difficult exercises can accelerate the severity of PCOS. You must wait till your stress levels come back down to normal. When your stress levels are high, then you must avoid intermittent fasting.
A Word From Mantra Care
This is everything that you need to know about PCOS and its different types. The syndrome is one of the leading issues that women across the world suffer from. Unfortunately, there is no permanent remedy that ensures fertility and a healthy lifestyle for them. All you can do is watch your activities and diet along with the regulation of physical exercise. This will help you prevent yourself from the worst consequences of the syndrome.
If you are looking for more information on this topic or on Diabetes treatment, Online Therapy, Hypertension, PCOS treatment, Weight Loss, and Physiotherapy, please visit mantracare.org or feel free to reach out to us at +91-9711118331 or email at [email protected]. You can also download our free Android App or IOS app.
Here at Mantra Care, we have an incredibly skilled team of health care professionals and coaches who will be happy to answer any questions and provide further information so you know what’s best for your unique needs.
|
<urn:uuid:85a75a1f-4454-42d6-8710-819df6d49a5b>
|
CC-MAIN-2023-40
|
https://mantracare.org/women/pcos/pcos-and-its-types/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510810.46/warc/CC-MAIN-20231001073649-20231001103649-00887.warc.gz
|
en
| 0.942696 | 3,066 | 2.609375 | 3 |
Our Best Barbecue Side DishesFrom potato salad to hush puppies, prepare these delicious dishes.
Low-growing, spreading plants for edgings, rock gardens, ground covers, pattern plantings. All kinds have attractive year-round foliage and clusters of small, white, pink, or rose-purple flowers in spring. Seldom browsed by deer. Give good drainage.
- Native to mountain elevations of Europe.
- Low, tufted, rough-hairy plant 410 inches high, 2 feet wide.
- Produces white flowers in dense, short clusters.
- Selection 'Rosea' bears pink flowers; 'Variegata' has yellow-edged green leaves.
- caucasica (A.
- WALL ROCKCRESS.
- Native from Mediterranean region to Iran.
- This plant is a dependable old favorite.
- Forms mat of gray-green leaves to 6 inches high, 112 feet wide.
- White flowers almost cover plant during bloom season.
- Excellent ground cover and base planting for spring-flowering bulbs such as daffodils and 'Paper White' narcissus.
- Provide some shade in hot climates.
- Variegata has gray leaves with creamy white margins; 'Flore Pleno' is double flowered; 'Rosabella' and 'Pink Charm' bear pink blooms.
- Zones US, MS; USDA 6-7.
- Native to southeastern Europe.
- Creeping plant with 112 inches leaves and white flowers clustered on 4- to 12 inches stems.
- Over time, spreads widely.
- Dense, fist-size cushions of small, bright green leaves eventually grow into small mats bearing clusters of white flowers on 2- to 3 inches stems.
- Some consider this species among the finest rock garden plants.
|
<urn:uuid:cc10a165-0f66-444d-9073-d514ca47b2ab>
|
CC-MAIN-2017-30
|
http://www.southernliving.com/plants/rockcress
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424088.27/warc/CC-MAIN-20170722162708-20170722182708-00241.warc.gz
|
en
| 0.833684 | 381 | 2.546875 | 3 |
(Embargoed) CHAPEL HILL - Children who grow up breathing polluted air may be at increased risk of lung disease, according to a study of school-age children in Mexico.
Researchers reached that conclusion after evaluating standard chest x-rays of 241 southwest metropolitan Mexico City children and another 19 from a small coastal town. The city children were exposed daily to high levels of a variety of pollutants, compared to the absence of such pollution in the coastal town comparison group.
The new research is being presented Thursday November 29th in Chicago at the 87th Scientific Assembly and National Meeting of the Radiological Society of North America.
The study investigators were led by Dr. Lillian Calderon-Garciduenas from the department of environmental sciences and engineering at UNC-CH and the National Institute of Pediatrics in Mexico City and Dr. Lynn A. Fordham, associate professor and section chief of pediatric imaging at the University of North Carolina at Chapel Hill School of Medicine.
"These were a large number of very healthy, middle-class children who received excellent health care. Dr. Calderon screened out any of the candidate children with asthma," Fordham said. "While I think these are preliminary findings, they appear to have important implications for the effects of air pollution on the lungs of otherwise healthy children."
Fordham points out that the chest x-rays from Mexico were interpreted by radiologists at UNC who had no knowledge of where the children lived. "We looked at the kids in a blinded fashion and with no knowledge of Dr. Calderon's project," she said. "We were able to separate out those who were exposed to air pollution and those who were not."
Excessive inflation (hyperinflation) of both lungs was found in 63 percent of the city group. About 52 percent of the city children showed an abnormal amount of interstitial markings in their lungs, changes that may be predictive of future lung abnormalities.
The study also found abnormalities in CT scans obtained in 25 of the children whose chest x-rays were the most abnormal. Mild wall thickening of bronchial air passages was seen in 10 CT's, four showed unusually prominent central airways, eight children had air trapped in their lungs, and one child had a lung nodule.
Further statistical analysis pointed to a significant link between hyperinflation, interstitial markings and exposure to the polluted atmosphere of southwest metropolitan Mexico City. All children in the Mexico City study group lived within a 10-mile radius of a pollution monitoring station and ozone levels were recorded for the year the children were recruited into the study. On average, during the 20-month study period, ozone levels exceeded air quality standards more than four hours per day. Some small particles of solids, or particulate matter (PM), were above U.S. standards.
"The children studied were very active, and many of them spent hours playing soccer in the later afternoon - when pollutant levels are at their peak," Fordham said. "I think the study may contain findings that are concerning to parents. They indicate that air pollution may cause lung disease in children. Children might be safer staying indoors in the after-school hours on days when ozone levels are high."
Note to media: Contact Dr. Fordham at 919-966-5948, [email protected]. In Chicago, 11/26 thru 11/30, reach her at the McCormick Place Convention Center, RSNA newsroom, 312-791-6667. UNC School of Medicine contact, Les Lang, 919-843-9687, [email protected]
|
<urn:uuid:38aa96ad-340d-4a05-b170-6eb0b3aac0cc>
|
CC-MAIN-2020-29
|
https://www.eurekalert.org/pub_releases/2001-11/uonc-apc112001.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886802.13/warc/CC-MAIN-20200704232817-20200705022817-00483.warc.gz
|
en
| 0.975354 | 741 | 2.71875 | 3 |
By the end of World War One in 1918, 200,000 Irishmen were involved in the conflict, proportionately the greatest deployment of armed manpower in the history of Irish militarism.
Irishmen had been awarded the Victoria Cross, awarded for valour in the presence of the enemy, since its creation in January 1856 by Queen Victoria.
30 Irish VCs were awarded in the Crimean War, 59 Irish VCs in the Indian Mutiny, 46 Irish VCs in numerous other British Empire campaigns between 1857 and 1914, 37 Irish VCs in World War I, and eight Irish VCs in World War II.
James Duffy, a native of Gweedore in Donegal, became one of the Irish recipients of the VC, the highest level of gallantry available to a soldier serving in the British Army. This is his story.
Duffy was born on the 17th of November 1889 in the parish of Gaoth Dobhair in Donegal to his mother Catherine Doogan and father Peter Duffy.
Peter was working in Bonagee, Letterkenny, and the family joined him when James was just a few months old. James attended a local primary school in Drumlodge, near Letterkenny.
His father was employed on a seasonal basis in the agricultural and fishing industries, picking up work wherever and whenever he could. James would go on to try his hand at fishing but like so many of the young men in Ireland at that time it was not long before he crossed the water to Scotland to Glasgow. He quickly found work in the massive shipyards that lined the River Clyde working in the famous John Brown Shipyard in Clydebank.
When war broke out, James was still working in the shipyards, but along with thousands of other young men swept up in the jingoistic fever of the time, he quickly enlisted. He did so on the 1st of December 1914, joining the 6th (Service) Battalion, Royal Inniskilling Fusiliers, which had been raised in Omagh, Co. Tyrone, in August.
The battalion was part of the 31st Brigade, 10th (Irish) Division, the first complete Irish division to serve with the Army. The constituent member regiments were drawn from Ireland’s four provinces and its early training took place in the Dublin area.
The Division moved to Basingstoke, Hampshire in May 1915 and was earmarked to participate in the ill-fated Gallipoli campaign which had stalled and descended into the static trench warfare that had blighted the western front.
In July, Duffy and his regiment embarked for the Gallipoli Peninsula, arriving on Mudros on the 7th of August. The 10th (Irish) Division later landed on “C” Beach, south of Suvla Bay, and Duffy was soon busy as the battalion went into action.
While the landing was successful, heavy fighting continued throughout August as the Allies attempted to expand the beachhead they had created and move inland.
However, the offensive failed. During the summer months the hot conditions, and a constant struggle by the allies to supply enough fresh drinking water to its troops, meant that conditions at Gallipoli were awful. Large numbers of troops, on both sides, succumbed to a dysentery epidemic that spread across the peninsula in the late summer.
The cost of Gallipoli was enormous in terms of human life, with an estimated 130,000 men losing their life in action or from diseases contracted while on the peninsula. In that total are approximately 4,000 Irish men who never returned home.
The 6th Royal Inniskilling’s were later transferred to the Salonika front on the 24th of October and were involved in the fighting of the 7th and 8th December, at Kosturino and then Karajakois, and remained in the theatre of operations until September 1917, when they were posted to Alexandria, to prepare for the forthcoming invasion of Palestine.
On the 1st of November, the battalion captured Abu Irgeig and took part in the successful operations in the Third Battle of Gaza when the British forces under the command of General Edmund Allenby successfully broke the Turkish defensive Gaza-Beersheba line. The critical moment of the battle was the capture of the town of Beersheba on the first day by Australian light horsemen.
Throughout his time in Palestine, Duffy was kept busy in his role as stretcher-bearer, and on the 27th of December, he performed the following act which was to lead to the award of the VC:
"While his company was holding an exposed position, Private Duffy (a stretcher-bearer) and another stretcher-bearer went out to bring in a seriously wounded comrade; when the other stretcher-bearer was wounded, he returned to get another man, when again going forward the relief stretcher-bearer was killed.
"Private Duffy then went forward alone, and under heavy fire succeeded in getting both wounded men undercover and attended to their injuries. His gallantry undoubtedly saved both men's lives, and he showed throughout an utter disregard of danger under very heavy fire”.
Six months after the fighting in which Duffy performed his heroic deeds, the battalion was sent to France and landed at Marseilles on the 1st of June 1918.
James Duffy was presented with his Victoria Cross by King George IV in the quadrangle of Buckingham Palace on the 25th of July 1918, and later returned home to Bonagee, Donegal where he was given a rousing reception.
Later that year, James married Maggie Hegarty, and the couple went on to have seven children and twenty-four grandchildren. Duffy was demobilised in 1919, little knowing that he was never to enjoy the luxury of regular employment again.
If he did find work, it was usually as a casual labourer on the roads or on farms when the harvest was due in, but ill health and the situation in Ireland during the 1920s conspired against him, which included being kidnapped by the IRA in 1921, because he had served in the British Army and was of a higher profile than many others because of the VC.
It appears that Duffy missed out on several VC events, including the VC Garden Party of 1920 and the service for the Unknown Warrior, due to the non-arrival of the invitations which were incorrectly addressed. The matter was resolved in time for the 1929 House of Lords VC Dinner and Duffy attended the event.
In 1934, he took part in the Armistice Parade in Derry, but his ill health continued to cause problems for him, and he was living off a disability pension for malaria and rheumatism of 13 shillings and 6 pence a week, out of which he had to pay 2 shillings and 6 pence for the rent of his cottage in Bonagee.
When he was ill, Duffy was sent to Leopardstown Hospital, Dublin, where he received a much-needed boost to his income with a weekly grant of 25 shillings from a fund set up by a wealthy American businessman for distressed VC recipients and the Royal British Legion assisted when they could.
Duffy’s misery continued when his wife passed away in 1944, and it is reported that pressure from within the family to sell the VC to the highest bidder may have caused some friction, but Duffy bequeathed his medals, in the event of his death, to his former regiment in 1949.
In 1956, he attended the Dublin Festival of Remembrance, where he joined three other VC recipients, Sir Adrian Carton de Wiart VC, KBE, CB, CMG, DSO (1916), Joseph Woodhall VC (1918), and John Moyney VC (1917), and later the VC Centenary celebrations in London. Two years later, he was invited to a dinner held in Dublin to commemorate the six Irish regiments that were disbanded in 1922.
Duffy was, like many other VC recipients, reluctant to speak of his actions that led to the VC and would often play down the award, but the medal attracted attention and on at least one occasion Duffy was visited by Earl Mountbatten during one of his regular summer holidays to Ireland.
In 1966, Duffy met the Queen when she attended the 50th anniversary of the Battle of the Somme at the Balmoral Showgrounds, Belfast.
On the 7th of April 1969, following a long illness, Duffy passed away at Drumany, Co. Donegal, and was buried in Conwal Cemetery, Letterkenny, Co. Donegal.
He was afforded a full military funeral which was arranged by Major George Shields, Chairman of the Belfast branch of the Royal Inniskilling Fusiliers Regimental Association, and who had served with Duffy in 1917, and by Archdeacon Louis Crooks, who had become a good friend of Duffy’s.
The funeral began at Duffy’s cottage and his coffin had to be passed through the sitting room window and was carried by eight members of the Royal Irish Rangers, led by CSM William O’Neill and the cortege was led by Piper Major James Creggan who played the lament “Flowers of the Forest”.
A Requiem Mass was held at St. Eunan’s Cathedral in Letterkenny, and then moved onto the cemetery passing through the town.
The shops and offices closed, lorries, cars, and buses were parked up on the side of the road and their drivers stood along with the majority of the population in silence as the cortege passed, and it was reported that the only sound to be heard was the clink of the medals of the old soldiers.
Duffy was laid to rest beside his wife and several wreaths were laid before Lance-Corporal J. Maxwell, played The Last Post and then Reveille at the graveside.
Duffy left five sons and one daughter and in 1997, one of the sons, Hugh, was buried with his parents. Ten years later, a stone bench was unveiled in Letterkenny Town Park on the 10th of July 2007 to honour Duffy. His daughter Nellie was present when former Letterkenny Mayor Ciaran Brogan unveiled the bench in one of his final duties in the office.
Private Duffy was again honoured when Chaplain to the Irish army's Finner Camp, Bundoran, Fr Alan Ward celebrated a Mass in his memory at Donegal County Museum. Private Duffy's Victoria Cross was brought from the Inniskilling Museum for the service.
In November 2017, the Ulster History Circle unveiled a blue plaque at Castle Street, Letterkenny in his honour.
Love Irish history? Share your favorite stories with other history buffs in the IrishCentral History Facebook group.
This article was submitted to the IrishCentral contributors network by a member of the global Irish community. To become an IrishCentral contributor click here.
|
<urn:uuid:0502f614-8028-4b3e-b039-5eca7cab721d>
|
CC-MAIN-2023-14
|
https://www.irishcentral.com/opinion/others/james-duffy-gweedore-victoria-cross
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00569.warc.gz
|
en
| 0.988553 | 2,251 | 2.84375 | 3 |
Becoming physically active can legthen the lifespan of adults who are in middle age and older.
Exercise is good for us, without a doubt. From lowering the risk of cardiovascular disease, cancer, and diabetes, to increasing life expectancy, the benefits of physical activity are numerous, as countless studies have shown.
But does it matter when one starts to exercise, and is it ever too late to reap the benefits? New research looks at the effects that exercise in middle and older age have on the risk of premature death and lifespan.
Specifically, a team of researchers has examined how changes in exercise levels over time affect a person’s risk of dying from any cause, as well as dying from specific conditions — such as cardiovascular disease.
Alexander Mok, a doctoral researcher at the University of Cambridge in the United Kingdom, led the new research, which appears in the journal The BMJ.
As Mok and colleagues explain in their paper, while numerous studies have already addressed the links between physical activity and mortality risk, fewer have focused on how exercise levels fluctuate over time and how these changes may affect longevity.
So, the scientists set out to remedy this research gap by conducting a large “population-based cohort study,” which included data on almost 15,000 people.
Studying changes in activity levels over time
Mok and team accessed the health data of 14,599 men and women who had enrolled in the European Prospective Investigation into Cancer and Nutrition-Norfolk study between 1993 and 1997. The participants were between 40 and 79 years old.
The researchers examined the study participants once at the beginning of the study and then three more times until 2004. At this stage of the research, Mok and team looked at lifestyle and risk factors such as diet, alcohol intake, and smoking status, as well as measurements like age, height, weight, and blood pressure.
The team also considered the participants’ education level and social class — that is, whether they were unemployed, non-skilled or skilled workers, etc. Their “medical history of heart disease, stroke, cancer, diabetes, fractures […], asthma, and other chronic respiratory conditions” was also considered.
Questionnaires about physical activity provided useful information on the participants’ activity levels or sedentarism at work as well as in their spare time. The data from the questionnaires were corroborated with “objective measurements of individually-calibrated combined movement and heart rate monitoring.”
To assess mortality in the cohort, Mok and team followed the participants over a median period of 12.5 years after the last assessment, until the year 2016.
Becoming active slashes death risk
Throughout the follow-up period, a total of 3,148 people died. Of these deaths, 950 resulted from cardiovascular disease and 1,091 from cancer. The researchers adjusted for factors that might have confounded the results, such as existing levels of physical activity and other health risk factors.
After accounting for these confounders, high levels of exercise and increased physical activity over time correlated with a lower mortality risk overall.
Also, the results suggested that even if someone decided to exercise after being physically inactive, the benefits for longevity would still be significant.
Specifically, looking at physical activity energy expenditure, the analysis revealed that with each physical activity increase of 1 kilojoule/kilogram/day (kJ/kg/day) per year, the risk of premature mortality from any cause dropped by 24%.
The same modest increase in exercise correlated with a 29% lower risk of cardiovascular death and an 11% lower risk of dying from any form of cancer.
The authors explain that an increase of 1 kJ/kg/day per year is the equivalent of not being physically active at all at the start of the study and gradually becoming more active over a 5-year period, to the point of meeting the minimum physical activity guidelines issued by the government.
The United States Department of Health and Human Services recommend that adults engage in “at least 150 minutes (2 hours and 30 minutes) to 300 minutes (5 hours) a week of moderate-intensity, or 75 minutes (1 hour and 15 minutes) to 150 minutes (2 hours and 30 minutes) a week of vigorous-intensity aerobic physical activity.”
Benefits do not depend on past activity
The analysis also revealed that, “regardless of past activity levels,” people who increased their activity levels over time were less likely to die from any cause than people who were “consistently inactive.”
Finally, the greatest longevity benefits were seen among individuals who had high physical activity levels at the start of the study and increased them even more with time. These highly active people were 42% less likely to die prematurely from any cause. Mok and colleagues conclude:
“These results are encouraging, not least for middle-aged and older adults with existing cardiovascular disease and cancer, who can still gain substantial longevity benefits by becoming more active, lending further support to the broad public health benefits of physical activity.”
The authors also recommend, “In addition to shifting the population towards meeting the minimum physical activity recommendations, public health efforts should also focus on the maintenance of physical activity levels, specifically preventing declines over mid to late life.”
|
<urn:uuid:93940eb4-8413-4004-b7bf-a2a1942beeda>
|
CC-MAIN-2023-23
|
https://medicaldiscover.com/aging/exercise-may-increase-lifespan-regardless-of-past-activity-levels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644913.39/warc/CC-MAIN-20230529205037-20230529235037-00744.warc.gz
|
en
| 0.959429 | 1,091 | 3.078125 | 3 |
I caught wind of an exciting research project coming out of North Dakota State University in Fargo, North Dakota. A research team, led by research engineer Cherish Bauer-Reich, has invented an RFID tag that uses the metal object on which it is mounted as its antenna! Here’s the university’s article.
RFID hasn’t made great inroads into the packaged gas and cylinder asset tracking software space due to (1) the difficulty of getting tags to work reliably when mounted on metal objects (gas cylinders) and (2) the issue with discriminating between various tags answering the siren song of the RFID reader. Hopefully with this new invention, problem #1 is on its way to being solved. Congratulations to Cherish and her team are in order. Now its up to her university’s technology transfer team to license the technology and get tags into the real world in volume.
As the university’s press release states, existing RFID tags that work on metal tend to be quite bulky. This is due to the need to create space between the antenna and the metal so the antenna can perform its intended function. A bulky tag creates a large attack surface which makes it more prone to damage. This new design promises to enable a much thinner tag, as the spacing (and antenna!) is no longer necessary.
There are still a few things that barcodes do better than RFID tags.
- Barcodes are considerably cheaper than even the cheapest RFID tags, let alone tags that work well on metals.
- You can print multiple barcodes with the same unique ID and place them on the same asset. This adds redundancy and also enables barcode scanning from multiple angles. Most RFID tags for our applications are purchased in bulk and show up in bags, so managing duplicate tags for the purpose of redundancy is not realistic. Writing tags on the fly would be one solution, but it requires more expensive rewritable tags and the hardware to write them, which adds cost.
- Barcodes are extremely thin and unlikely to be knocked off during use as easily as a tag could be.
- At no extra cost, barcodes can contain a human readable number. This is useful in many scenarios and is unusual to find on the typical RFID tags we see used in cylinder tracking applications today.
- And last but certainly not least, barcodes can be read by modern smartphones. As TrackAbout continues to extend its capabilities, we want to make sure our customers benefit from the ongoing revolution in mobile devices.
Arguably, many of these “wins” for barcodes must be balanced against the ability to scan large quantities of assets quickly and without human intervention or line-of-sight. Time is money, and scanning cylinders one at a time with a handheld scanner takes time.
As our customers will attest, there are definite use cases where automatic scanning via fixed readers would be fantastic, but we still have the need for scanning assets individually in the field. For this, the handheld scanner remains the right tool for the job. That means we still need technology that can solve the tag discrimination problem, and this ups the bar for an all-in-one RFID tag solution for the packaged gas industry.
|
<urn:uuid:fde3885e-9ea6-4e2c-a595-ea0c7c9ef7bc>
|
CC-MAIN-2017-34
|
https://corp.trackabout.com/blog/antenna-less-rfid-tags-may-solve-the-problem-of-tracking-metals-and-liquids
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104636.62/warc/CC-MAIN-20170818121545-20170818141545-00313.warc.gz
|
en
| 0.928089 | 662 | 2.78125 | 3 |
Cancer is one of the serious problems in today’s world. Even the researchers, doctors and scientist are unable to find the exact cause of cancer but the unnecessary change in the gene due to mutation or its improper functioning is the basic reason for the cancer. So before going deep into the topic of cancers and talking about the genes involved, it is important to first know that what are genes and how they functions in our body.
Genes are the main elements of the cell that are made of DNA fragment. These are the main point that determines how the cell function and works, this is done when these genes codes for proteins those are necessary for the cell to provide all the necessary information. Therefore, correct coding is very much necessary for proper functioning of the cell and incase the coding gets wrong due to mutation, it certainly leads to cancer.
It would be wrong to say that any mutation will result in cancer because mutation generally happens in the body but are usually corrected by the system. Further, Mutation can be divided into two types; like germ line mutation and acquired mutation. Acquired means those mutation that arise due to changes in the genes at later stages like UV rays, chemicals etc whereas germ line mutation means the mutation that are inherited form the parents and these accounts for very less percentage of cancer.
The development of cancer is not preceded in a single step; rather it involves number of steps that changes the normal cell into malignant cell due to some alterations. The increase in capacity of the cell for proliferation, survival, invasion and metastasis finally leads to cancer.
Now coming to the main portion of the topic, the genes that cause cancer can be divided into various types; the first one is tumor suppressor gene and the other is oncogenes.
Tumor suppressor gene: Tumor suppressor genes are important genes that look different process of the cell. It looks upon any mistakes that have occurred in the DNA and repairs it; it carries the process of cell apoptosis I.e. death of the cell. The most important thing about these genes is that it slows down cell division so that cell divides in the normal way. Therefore, it can be said that these are protective genes. Now we can figure out that mutation in this gene can lead to cancer because once these genes gets mutated, cell start to divide in an uncontrolled way thus resulting in tumor and hence finally to cancer. The examples of such genes are P53 and RBI etc.
Oncogenes: Before going onto oncogene, it is important to learn about proto- oncogene. Thus, a proto- oncogene is that gene that helps cell to grow and progress. But when this gene anyhow mutates; then it becomes oncogenes that is dangerous for the cell making them grow in uncontrolled manner thus turning into bad gene. These genes when turns on starts the proliferation of cell thus causing cancer. Example of these genes includes Myc gene, sis gene, Src gene etc.
Beside these two types of gene, there is one more type of gene that can result in development of cancer. The gene is thus named as DNA repair gene. This DNA repair gene helps to correct any mistakes in the DNA and thus help in proper functioning of the cell and the body. Hence, any problem in this gene can led to mutation that in turn can be pathway towards cancer. Other than this, some of the genes that cause cancers in human are hepatitis B viruses, hepatitis C viruses, papillomaviruses, herpesviruses and many more.
We cannot protect ourselves from getting cancer but we can adopt good habits and healthy living environment that keeps our system healthy and well functional.
|
<urn:uuid:b32ef17d-0164-49b3-ab35-c3779221031d>
|
CC-MAIN-2017-43
|
http://www.assignmenthelp.net/genetics-of-cancer
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024001059-00357.warc.gz
|
en
| 0.94342 | 754 | 3.5 | 4 |
Three-day-old broccoli sprouts, a widely available human food, could prevent stomach cancer by suppressing Helicobacter pylori (H
pylori) infections, according to a new study.
H pylori infections are one of the most common bacterial infections worldwide and can lead to stomach cancer.
For the study, researchers enrolled 48 Helicobacter-infected Japanese men and women and randomly assigned them to eat 70 grams of fresh broccoli sprouts daily for eight weeks or an equivalent amount of alfalfa sprouts.
“Broccoli has recently entered the public awareness as a preventive dietary agent. This study supports the emerging evidence that broccoli sprouts may be able to prevent cancer in humans, not just in lab animals,” said Jed Fahey, Sc D, a faculty research associate in the Department of Pharmacology at Johns Hopkins School of Medicine.
Researchers assessed the severity of H. pylori infection at enrollment, and again at four and eight weeks using standard breath, serum and stool tests.
They found that H pylori levels were significantly lower at eight weeks on all three measures among those patients who had eaten broccoli sprouts, while they remained the same for patients who had eaten alfalfa sprouts.
A reduction in H pylori is expected to lead to a reduction in stomach cancer due to their well-established cause-and-effect link. Stomach cancer has a grim prognosis and is the second most common and the second deadliest cancer worldwide.
The study is published in the journal Cancer Prevention Research.
|
<urn:uuid:cdbd50eb-40c1-46a3-ae8d-e05330a749bf>
|
CC-MAIN-2017-39
|
http://mediconews.com/2009/04/07/broccoli-sprouts-may-help-prevent-stomach-cancer/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686705.10/warc/CC-MAIN-20170920071017-20170920091017-00605.warc.gz
|
en
| 0.948841 | 321 | 3.671875 | 4 |
ES6 Let there be let
In the beginning there was var
And var was a little bit tricky to understand. So, along came es6 with the new shiny let.
Block level scoping
With es6 the introduction of the let keyword introduces block level variable scoping. This allows the declaration and assignment of variables that have block level scope. Now we can see that the first messageInBottle let variable retains its value as the second messageInBottle let variable is restricted to the scope of its code block.
Hoisted by your own petard
In the code below we would expect the output to be the range of numbers 0-9 squared but the output is in fact the number 10 repeated 10 times. This occurs due to the reference of n pointing to the value of n in the loop which has exited when it incremented to the number 10. This variable hoisting moves the declaration of the variable n out of the loop and instead to the top of the function scope.
This can be solved by using a closure which are nested functions that retain a reference to the enviroment in which they were created. The closure retains the value of n that it was passed during its creation. We now see the expected output of the range 0-9 squared.
The newly introduced let keyword can help us gain the expected output by its ability to create a new instance of n each time the code goes through the for loop.
|
<urn:uuid:4fffba3d-9b66-42da-973d-8c1b3e1c9919>
|
CC-MAIN-2017-30
|
http://www.itsmycodeblog.com/es6-let-there-be-let/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549448198.69/warc/CC-MAIN-20170728103510-20170728123510-00045.warc.gz
|
en
| 0.941866 | 293 | 3.25 | 3 |
Compared with other Eastern European countries, Moldova has experienced relatively low motorisation. Drivers and passengers of cars bear the highest burden of road traffic crashes and resulting injuries, accounting for 58%* of all annual fatalities.
Inappropriate speed and drink-driving are key risk factors. As such, the country has implemented national speed limits and drink-driving laws, although both are only moderately enforced and 12%* of all road traffic deaths are recorded to involve alcohol.
Scaling up capacity of Governments, civil society organizations and the Red Cross Society of the Republic of Moldova in road safety fundamentals and advocacy for road safety through sub-regional and national workshops.
Knolwedge and practices:
Establishment of online library for public awareness campaigns.
Development of the technical guide, in-country trainings on first response in road crashes.
Training of trainers (ToT) road policing training for 15-20 mid-level road police on evidence-based and outcome-focused policing.
The TRACECA Road Safety II project brought together governments and civil society to actively promote the safety and security of road users, the public, property, and the environment within the Europe-Caucasus-Asia region’s transport corridor.
Safe to School – Safe to Home incorporates assessment of road safety conditions, the installation of appropriate and low-cost local traffic engineering improvements, extensive road safety education for children, parents and the community, together with enhanced enforcement of helmet wearing, parking restrictions and speeding.
Road user groups
With around 186 300 children under 18 years die from road traffic crashes annually, it is unacceptable that some countries still do not have legislation regarding obligatory usage and set safety standards for child restraints.
Novice drivers are at high risk levels of participating in a road traffic crash due to lack of experience and common behavioral traits. The risk can be reduced through educational programmes and effective road policing, thus saving many lives on the road.
With more than 270 000 pedestrians killed on roads each year, they account to almost a quarter of all road traffic casualties annually. Certain roads, especially in low and middle income countries, completely fail to separate road users from the rest of the road users, which put them in imminent danger.
|Website||Carrying out RS activites||Interested in expanding RS work|
|Red Cross Society of the Republic of Moldova||Yes||Yes|
Lead agency: National Council on Road Safety
Speed limit law
Motorcycle helmet law
Child restraint law
Mobile phones while driving law
Annual road fatalities
Fatalities per 100K pop. per year
Estimated GDP loss
|
<urn:uuid:c0687004-dcdc-423d-bebb-7721f5b66231>
|
CC-MAIN-2020-16
|
https://www.grsproadsafety.org/programmes/countries/moldova/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371611051.77/warc/CC-MAIN-20200405213008-20200406003508-00186.warc.gz
|
en
| 0.905627 | 534 | 2.65625 | 3 |
Basic wiring practices for AFCI-protected circuits
Unlike a conventional circuit breaker, which detects overloads and short circuits, an arc fault circuit interrupter (AFCI) uses advanced electronic technology to sense different arcing conditions. This device weeds out the harmful arc characteristics from the “normal” arcs that occur during the normal operation of loads and other wiring devices. Common household items, such as a motor-driven vacuum cleaner or a furnace motor, naturally create arcs when they operate—each of which is considered a normal arc (click here to see Fig. 1).
Another example is the arc that may occur when a light switch is turned off. Dangerous arc faults, however, may result from improper installation, damaged wiring, overheated or stressed electrical cords, worn electrical insulation, wires and/or cords in contact with vibrating metal, damaged electrical appliances, and more. This type of arc condition creates high-intensity heat, which may exceed 10,000°F and result in burning particles that can easily ignite surrounding material, such as wood framing or insulation.
AFCIs are designed to recognize arc faults when they occur and automatically shut the circuit down before it becomes a fire hazard. Manufacturers of AFCIs test for hundreds of possible operating conditions, designing each AFCI to constantly discern between normal and dangerous arcs.
Due to the proven effectiveness of AFCIs, it’s important electricians follow proper wiring practices to help minimize troubleshooting efforts. The following sections highlight some of the best practices for electrical installation projects, but especially those performed on circuits that will be protected by AFCIs. Appropriate steps to successfully troubleshoot a potential wiring problem that will cause the AFCI to trip are also covered.
Proper Tools and Work Practices
Using the right tools to do the job is critical. A simple task like drilling holes in studs, if done incorrectly, can jeopardize the integrity of the insulation of the wiring being pulled. Damaged conductors during installation could result in immediate tripping of the AFCI when the circuit is energized.
For example, simply changing the blade in a razor blade knife can not only prevent needlessly damaging conductors, but also increase the safety of performing the task. Keep in mind, if you nick a wire or accidentally remove strands from a conductor, there is less copper to carry the same amount of current, resulting in overheating and possibly further damage to the installed wiring. These same conductors, if damaged due to poorly maintained tools, will eventually be hidden by drywall and paint, preventing easy identification of the cause of an AFCI tripping.
Selecting proper equipment and derating conductors is as much a part of circuit protection as the application of the circuit breaker itself. Make sure you select the right conductor and wiring device for the application. Additionally, pay attention to ampacity, interrupting ratings, and other important factors. Derating of conductors when necessary and making ambient/other adjustments could help you avoid a call back to a job — and the hours of troubleshooting that follow to remedy the situation.
Protecting the conductors and other wiring devices from the environment in which they are placed is also important. Simply placing nail guard plates in those areas where the likelihood is high that a future tradesperson will nail a trim or secure a cabinet/other item to the wall could save the wire from being damaged — and save you hours of work when the AFCI detects the problem. Choosing where to drill your holes through the studs and joists can save the money in nail guards. For example, knowing that kitchen cabinets will be installed on a wall — more specifically, how high up on that wall—can help you determine where to route your wires, ensuring they are out of the danger zone.
It’s important to remember that you are not the only trade that will be working on the installation. Other trades will be on-site before and after your work is completed. Don’t forget that these trades working around your electrical installation can jeopardize it. Timing your work to avoid unnecessary damage to the conductors you have installed is recommended. In a typical home construction scenario, for example, plumbing and HVAC trades should have completed their work before you start pulling wire.
Understanding this process and the timing of construction elements can help reduce, if not eliminate, troubleshooting due to other trades damaging conductors, wiring devices, and any other electrical component in your installation. You can make the right decisions on where to route wiring and what preventive measures to take in order to ensure a nail or screw won’t penetrate or nick electrical wiring behind walls. A nicked wire, if left uncorrected, may lead to an arc fault condition, which will trip an AFCI. Therefore, installing electrical wiring around the installation of HVAC duct work and water supplies/drains will help avoid any future repairs that arise from such damage.
Installation and Troubleshooting Tips
Install the breaker and connect the pigtail to the neutral bar. Reset the breaker, if necessary, and turn it ON. Press the test button. The breaker should trip. Turn the breaker OFF. Connect the load hot (black) and neutral (white) wires to the breaker. Turn the breaker ON. It should not trip. If it does, you must now troubleshoot the circuit and/or system.
Items you should focus on during the troubleshooting stage include: reversed neutral and ground wires; shared neutral wiring on single-pole AFCI circuits; and ground wires touching neutral wires. Lighting fixtures and appliances attached to these circuits have also been found to be damaged/faulty and should be inspected if an AFCI trips.
Some electrical contractors have been very active in providing information about these types of wiring problems. Many indicate that the initial installation errors have disappeared as installers become more familiar with the installation and operation of AFCIs.
Investigating and determining the true reasons why AFCIs trip ultimately prove beneficial to everyone. The troubleshooting guidelines, as outlined in Fig. 2, Fig. 3, Fig. 4, and Fig. 5, provide common scenarios and the appropriate steps to diagnose and effectively alleviate any problem you might encounter in the field.
Winstanley is a program manager for the National Electrical Manufacturers Association (NEMA), Washington, D.C. He can be reached at: [email protected].
Sidebar: AFCIs and the NEC
The National Electrical Code (NEC) requirements for AFCI installation in new home construction have expanded with each Code cycle. AFCIs first appeared in the 1999 edition of the NEC, which required their use on all branch circuits that supply 125V, single-phase, 15A and 20A receptacle outlets installed in dwelling unit bedrooms, effective Jan. 1, 2002. After further research and analysis of the technology and its potential safety benefits, the 2002 NEC expanded its requirement for AFCIs to all branch circuits that supply 125V, single-phase, 15A and 20A outlets installed in dwelling unit bedrooms, including those that supply lighting fixtures, smoke alarms, and other equipment. The 2008 edition of the NEC took safety a step further by requiring that all new home construction install the technology on other circuits in the home.
As per 210.12 of the 2008 NEC, “All 120V, single-phase, 15A and 20A branch circuits supplying outlets installed in dwelling unit in family rooms, dining rooms, living rooms, parlors, libraries, dens, sun rooms, recreation rooms, closets, hallways, or similar rooms or areas shall be protected by a listed arc-fault circuit interrupter, combination type installed to provide protection of the branch circuit.”
|
<urn:uuid:c44d0f7c-60d0-40a4-a594-451fec56274a>
|
CC-MAIN-2013-48
|
http://www.nema.org/News/Pages/Troubleshooting-Tips-for-AFCI-Installations.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164758033/warc/CC-MAIN-20131204134558-00084-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.912204 | 1,580 | 3.46875 | 3 |
January 17, 2006
This Medium Resolution Imaging Spectrometer (MERIS) image is centered over Sudan, in northeastern Africa. It is the largest country of the African continent. Sudan is bordered to the north by Egypt, the east by Eritrea and Ethiopia, the south by Kenya, Uganda and the Democratic Republic of the Congo and to the west by the Central African Republic, Chad, and Libya. Khartoum is the capital and largest city (grey area in the center of the image). The Nile river crosses the image from south to north along the Nubian Desert; in the upper right corner is the Red sea.
- Satellite: Envisat
- Instrument: MERIS
- Acquisition: 08-Feb-2004
- Orbit nr: 10152
- Center coordinates: lat. 13.31, lon. 35.59
Topics: Politics, Envisat, European Space Agency, Spaceflight, Outline of Sudan, Global organisation of the Catholic Church, Khartoum, MERIS, Nile, Sudan
|
<urn:uuid:28221705-4492-4188-bfab-2eff7ecab723>
|
CC-MAIN-2014-35
|
http://www.redorbit.com/images/pic/10008/sudan/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500821666.77/warc/CC-MAIN-20140820021341-00257-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.846027 | 215 | 2.65625 | 3 |
Sore throat is one of the most common medical complaints. Too many people in Turkey go to the doctor with this complaint.
FACTORS THAT CAUSE SORE THROAT
A sore throat is a complaint that occurs in various diseases, especially infections. Infections are caused by viruses (such as colds, flu) or bacteria. The most important difference between viruses and bacteria is that viruses do not respond, although bacteria respond to antibiotics. Viruses: a sore throat most commonly caused by viruses is a sore throat that is accompanied by a runny nose, itching, sneezing, resentment and pain in the body, and one of the hundreds of known types of viruses is the cause of the disease. The body beats the disease in about a week by producing antibodies against viruses. Sore throat can also be accompanied by other viral diseases such as measles, chickenpox, whooping cough and kurp. AFTs and fever blisters in the throat can also be quite painful. A special viral infection called exquisite mononucleosis can take longer than a week to heal. The virus settles into the lymph system, creating swelling in the tonsils, neck, armpit and groin. This disease, along with severe pain in the throat, can sometimes cause difficulty breathing, liver disease and associated jaundice. It also causes severe fatigue, which can last 6 weeks or longer. This disease affects people in bulug age or young adulthood. Because the disease is transmitted by saliva, it is also called kissing disease.
The disease can also be transmitted by mouth-to-hand, hand-to-mouth, or by using the same towels or cutlery. Bacteria: sore throat is a condition that can also be caused by various types of Streptococci. The disease can also affect the heart valves and kidneys. Streptococci can also lead to tonsillitis, pneumonia, sinusitis and ear diseases. Because of all these serious complications, a sore throat caused by streptococci should be treated with antibiotics. Bacterial sore throats usually cause disease that lasts longer than a cold. If the disease caused by streptococci cannot be recognized by examination, a throat culture may be required.
The recently introduced ‘strep test " can indicate the presence of streptococcal infection within 15 minutes compared to the reproduction time in a 24-hour culture. The positivity of these tests causes the doctor to prescribe antibiotics. But strep testing or culture antibiotics can cause many bacteria that deserve to be overlooked. Tonsollitis is an inflammation of the tonsils located on both sides of the throat. In the first 2-3 years of life, these tissues catch the infection and help the child create his own defense system.
Healthy tonsils do not remain infected, and frequent sore throats due to tonsillitis indicate that inflammation in the tonsils is not fully treated. A recent study has shown that children who have frequent episodes of tonsillitis (3-4 episodes of tonsillitis a year for several years) are healthier after their tonsils are removed by a surgical operation. Infections in the nose or sinuses can also cause a sore throat, because the diseased discharge with bacteria inside goes to the throat, which carries the disease here. Irritation dry heat in cold winter months causes a sore throat in a repetitive and flammable manner, especially in the morning. This condition improves by moistening the room and increasing fluid intake. Dry throat also occurs in patients with nasal congestion and constantly breathing through the mouth. In these patients, nose examination and treatment are required. A rare cause of sore throat that occurs in the morning is the return of gastric acid secretion to the mouth and throat and The Associated irritation pain. The treatment for this is to make sure that the head is slightly higher than the bed level when lying down. It is also necessary to be careful not to eat anything 1-2 hours before going to bed. In such a case, it is useful to see your doctor. Industrial pollution and chemicals irritate the throat and nose, but smoking is the most common cause of air pollution.
It bothers people who are allergic or sensitive to the substances in it. A person who pushes his voice too hard (for example, in a sports match) complains to a sore throat, and the cause of this pain is tension of the vocal cords and mistreatment of the vocal cords. Well-trained and experienced announcers and singers learn not to strain their voices and throats in this way. They remove loud sounds using deep breaths and abdomen and rib cage without straining the throat muscles. Tumors of the throat, tongue, and larynx are also usually associated with long-term smoking and alcohol consumption. A sore throat and difficulty swallowing, which can sometimes spread to the ear, can be symptoms of such a tumor. Often sore throat is mild and chronic and may go unnoticed by the patient. Other important symptoms include hoarseness, mass in the neck, unexplained weight loss, and/or having blood in saliva. Diagnosis of this disease can be made by examination of doctors specializing in otolaryngology with special mirrors and telescopic instruments showing suspicious areas.
HOW CAN I TREAT MY SORE THROAT ?
A sore throat caused by a cold can be relieved with the following measures:
Increase the amount of liquid you take.
Keep the air in your bedroom moist.
Gargle with salt water several times a day.
Use mild painkillers such as acetaminophen.
WHEN SHOULD I GO TO THE DOCTOR?
If your cold should normally go away in 5-7 days, if it has not passed, you should seek medical attention if it is not due to allergies and irritants. If there are symptoms below, you should see your doctor.
Severe and prolonged sore throat
Difficulty breathing and swallowing
Difficulty opening the mouth
Ear pain, joint pain
Blood in saliva
Frequent recurrent sore throat
Mass in the neck
Hoarseness lasting more than 2 weeks
|
<urn:uuid:24908086-35bf-4569-a54b-3e2c30a6dedc>
|
CC-MAIN-2023-50
|
https://www.medicabil.com/en/blog/throat-ache
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00744.warc.gz
|
en
| 0.955321 | 1,240 | 3.40625 | 3 |
The movement of the rear axle assembly also
causes the distance between the rear axle and
transmission to change. (T/F)
When is a center support bearing needed and
Grinding or squeaking from the drive shaft is
frequently caused by
How do you check for worn universal joints?
If a universal joint fails to press together with
normal force, it is possible that one of the needle
bearings has fallen out of place. (T/F)
Learning Objective: Identify differential design
variations. Describe the principles of the limited slip
differential. Explain basic service and repair of a
differential. Explain the adjustment of the ring and
Another important unit in the power train is the
differential, which is driven by the final drive. The
differential is located between the axles and permits
one axle to turn at a different speed from that of the
other. The variations in axle speed are necessary when
a vehicle rounds a corner or travels over uneven
ground. At the same time, the differential transmits
engine torque to the drive axles. The drive axles are on
a rotational axis that is 90 degrees different than the
rotational axis of the drive shaft.
A differential assembly uses drive shaft rotation to
transfer power to the axle shafts. The term differential
can be remembered by thinking of the words different
and axle. The differential must be capable ofproviding
torque to both axles, even when they are turning at
different speeds. The differential assembly is
constructed from the following: the differential
carrier, the differential case, the pinion gear, the ring
gear, and the spider gears (fig. 5-12).
The differential carrier provides a mounting place
for the pinion gear, the differential case, and other
differential components. There are two types of
differential carriers: the removable type and the
integral (unitized) type.
REMOVABLE TYPEa carrier that bolts to
the front of the axle housing. Stud bolts are
installed in the housing to provide proper carrier
Figure 5-12.Conventional differential.
alignment. A gasket is installed between the
carrier and the housing to prevent leakage.
I N T E G R A L T Y P E a c a r r i e r t h a t i s
constructed as part of the axle housing. A
stamped metal or cast aluminum cover bolts to
the rear of the carrier for inspection of the gears.
The differential case holds the ring gear, the spider
gears, and the inner ends of the axles. It mounts and
rotates in the carrier. Case bearings fit between the
outer ends of the differential case and the carrier.
The pinion gear turns the ring gear when the drive
shaft is rotating. The outer end of the pinion gear is
splined to the rear U-joint companion flange or yoke.
The inner end of the pinion gear meshes with the teeth
on the ring gear.
The pinion gear is mounted on tapered roller
bearings that allow the pinion gear to move freely on
the carrier. Either a crushable sleeve or shims are used
to preload the pinion gear bearings. Some differentials
use a pinion pilot bearing that supports the extreme
inner end of the pinion gear. The pinion pilot bearing
assists the tapered roller bearings in supporting the
pinion gear during periods of heavy loads.
The pinion gear drives the ring gear. It is bolted
securely to the differential case and has more teeth than
the pinion gear. The ring gear transfers rotating power
through an angle change or 90 degrees.
|
<urn:uuid:a297a701-ef98-4895-a35c-c59d13650055>
|
CC-MAIN-2017-26
|
http://constructionmanuals.tpub.com/14273/css/Differentials-187.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00318.warc.gz
|
en
| 0.895405 | 788 | 3.046875 | 3 |
Here is the follow-up I promised to my post on the July track map for polar bears being followed by satellite in the Beaufort Sea by the US Geological Survey (USGS) – Ten out of ten polar bears being tracked this summer in the Beaufort Sea are on the ice. See that post for methods and other background on this topic, and some track maps from 2012.
The track map for August was posted on the USGS website on September 4th and is copied here below (Figure 1). The ice moved a bit further offshore during August but not nearly as far as it did in 2012. The ten bears from July were down to eight – their collars might have stopped working or fallen off (most likely), they might have left the area entirely (also possible) or they might have died (the researchers don’t say which).
Figure 1. “Movements of 8 satellite-tagged polar bears for the month of August, 2013. Polar bears were tagged in 2013 on the spring-time sea ice of the southern Beaufort Sea. All 8 of these bears have satellite collar transmitters [i.e., all are females]. Polar bear satellite telemetry data are shown with Ice Analysis charts from 26 August, 2013. Ice Analysis charts are made available by the National Ice Center. The land cover is made available by Natural Earth. Click on the above image to enlarge.” [Note that the dots with the polar bear icons are the end points (end August), while the other end of the string is their position in early August. The yellow dot is behind the purple dot, on shore; two of the bears present in July (see Fig. 2 below) are no longer being tracked – their collars might have stopped working or fallen off (most likely), they might have left the area entirely (also possible) or they might have died. The researchers don’t say.]
So, of the eight polar bears still being followed by USGS researchers in August, three were on shore and five were on the ice. Only time will tell if the three females on shore are pregnant and preparing maternity dens for the winter, but this seems the likely reason they are not on the ice with the others.
I’ll post the track map for September when it is available in early October at the USGS website.
The map for July 2013 is below, for comparison: Continue reading
Posted in Life History, Sea ice habitat
Tagged Alaska Science Center, Beaufort Sea, Chukchi Sea, females with radio collars, Regehr, Rode, satellite radio collars, summer ice minimum, summer sea ice, swimming polar bears, tracking polar bears by satellite, US Fish, us geological survey, USGS
Tracking Beaufort Sea polar bears over the summer — what can it tell us about how important the position of summer sea ice relative to the shoreline in this region is to these bears? Do Beaufort Sea bears get stranded on shore like the polar bears in Davis Strait and Hudson Bay?
Polar bear biologist Eric Regehr (with the US Fish & Wildlife Service, or FWS) has a team working with US Geological Survey researchers (USGS) in the southern Beaufort tracking where adult female polar bears go throughout the year. This is part of on-going research in the Beaufort and Chukchi Sea (see previous post here; see also Fish & Wildlife 2009; Polar Bear News 2010 and 2013; Rode and Regehr 2010, pdfs below; and just out, the “accepted” version of the Rode et al. paper discussed here, and announced in my last post here).
The researchers have been posting a summary map at the end of each month on the USGS website showing the tracks of the females they fitted with radio collars the previous spring — for 2013, and back to 2010. They can’t put collars on male bears because their necks are larger around than their heads, so a collar would just slip off.
I’ve posted the July 2013 track map below, which shows all ten bears out on the ice, and the previous month (June 2013) to compare it to (the August map should be out shortly). I’ve included a few maps from 2012 to allow you to compare this year’s results to the situation last summer.
The August tracks should be available after the Labour Day weekend – check back next week to see where the bears have been this month. I’ll post the map here or you can go to the USGS website directly. [UPDATE Sept 4, 2013: The August map is up, posted here.]
Posted in Life History, Sea ice habitat
Tagged Alaska Science Center, Beaufort Sea, Chukchi Sea, Davis Strait, females with radio collars, Hudson Bay, Regehr, Rode, satellite radio collars, summer ice minimum, summer sea ice, swimming polar bears, tracking polar bears by satellite, US Fish & Wildlife, USGS
The polar bear biologists and professional activists of the IUCN Polar Bear Specialist Group (PBSG) continue to insist that since 1979 increasingly smaller amounts of Arctic sea ice left at the end of summer (the September ice minimum) have already caused harm to polar bears. They contend that global warming due to CO2 from fossil fuels (“climate warming” in their lexicon) is the cause of this decline in summer ice.
In a recent (2012) paper published in the journal Global Change Biology (“Effects of climate warming on polar bears: a review of the evidence”), long-time Canadian PBSG members Ian Stirling and Andrew Derocher (both of University of Alberta) summarized their position this way:
“Climate warming is causing unidirectional changes to annual patterns of sea ice distribution, structure, and freeze-up. We summarize evidence that documents how loss of sea ice, the primary habitat of polar bears (Ursus maritimus), negatively affects their long-term survival”
I’ve spent the last year examining their evidence of on-going harm, but in addition, I’ve looked at the evidence (much of it not mentioned in the Stirling and Derocher paper1) that polar bears have either not been harmed by less sea ice in summer or have thrived in spite of it.
This is a summary of my findings. I’ve provided links to my original essays on individual topics, which are fully referenced and illustrated. You are encouraged to consult them for complete details. This synopsis (pdf with links preserved, updated; pdf with links as footnotes, updated) complements and updates a previous summary, “Ten good reasons not to worry about polar bears” (pdf with links preserved; pdf with a foreword by Dr. Matt Ridley, with links as footnotes).
Update 8 September 2013: to include links to my post on the recently published Chukchi population report; updated pdfs have been added above.
Update 22 January 2014: added figure comparing March vs. September sea ice extent using the same scale, from NOAA’s “2014 Arctic Report Card,” discussed here.
Posted in Conservation Status, Population, Sea ice habitat, Summary
Tagged Arctic, Barents Sea, Beaufort Sea, body condition, breakup dates, cannibalism, Chukchi, climate change, climate warming, Davis Strait, death spiral, Derocher, global warming, harm to polar bears, heavy sea ice, Hudson Bay, hybridization, ice-free, negative effects, polar bear, polar bear numbers increasing, Polar Bear Specialist Group, Polar Bears International, prolonged ice-free season, ringed seals, sea ice, sea ice decline, September ice minimum, Stirling, summary, summer ice minimum, victim of climate change
A paper published last week in the journal Science, written by a team of biologists and atmospheric scientists, expounds on a possible dire future for a range of Arctic animals. It’s called, “Ecological consequences of sea-ice decline” and surprisingly, polar bears are discussed only briefly.
However, with the inclusion of one short sentence, the paper manages to perpetuate misinformation on grizzly/polar bear hybridization that first appeared in a commentary essay three years ago in Nature (Kelly et al. 2010)1. The Post et al. 2013 missive contains this astonishing statement (repeated by a Canadian Press news report):
“Hybridization between polar bears and grizzly bears may be the result of increasing inland presence of polar bears as a result of a prolonged ice-free season.”
Lead author of the paper, Professor of Biology Eric Post, is quoted extensively in the press release issued by his employer (Penn State University, pdf here). In it, Post re-states the above sentence in simpler terms, removing any doubt of its intended interpretation:
“… polar and grizzly bears already have been observed to have hybridized because polar bears now are spending more time on land, where they have contact with grizzlies.”
Both statements are patently false. All recent hybridization events documented (2006-2013) occurred because a few male grizzlies traveled over the sea ice into polar bear territory and found themselves a polar bear female to impregnate (see news items here and here, Fig. 1 below). These events did not occur on land during the ice-free season (which is late summer/early fall), but on the sea ice in spring (March-May).
Grizzlies have been documented wandering over the sea ice of the western Arctic since at least 1885 (Doupe et al. 2007; Fig. 2, below) and the presence in this region of hybrid grizzly/polar bear offspring is not an indicator of declining summer sea ice, whether due to global warming or natural causes, or some combination thereof.
Posted in Advocacy, Hybridization, Life History, Sea ice habitat
Tagged advocacy, Arctic melting pot, Brendan Kelly, Eric Post, grizzly bears, grizzly polar bear, hybridization, inland, misdirection, misinformation, polar bears, prolonged ice-free season, sea ice, sea ice decline, sea ice loss, spring ice, Stirling, summer ice minimum
I’ve been in the process of looking at the status of polar bears in the Baffin Bay region, which lies to the north of Davis Strait (Fig. 1), but a related issue caught my attention that I think deserves discussion.
Figure 1. Polar bear subpopulations defined by the Polar Bear Specialist Group (PBSG). Note that Baffin Bay, Davis Strait, Western Hudson Bay and Southern Hudson Bay are all similar in that they become ice-free by early fall (the September minimum) or even before.
Recall that in a recent post on the Beaufort Sea ice extent comparison offered by the National Snow and Ice Data Center (NSIDC) here, I commented:
“What puzzled me was why they featured only the last 7 years when satellite data go back to at least 1979. Is there something in that data they don’t want us to see?”
Something similar struck me about the analysis of sea ice in Baffin Bay and Davis Strait conducted by polar bear researchers Karyn Rode and colleagues (Rode et al. 2012). In their comparison of body condition (relative fatness) of bears in Davis Strait and Baffin Bay (see previous post here), they introduced an entirely new sea ice metric – “mean daily summer sea ice concentration,” defined as the mean of values between May 15 and October 15 each year based on ice charts provided by the Canadian Ice Service.
Why invent a metric that has never been used (as far as I know) for analysis of polar bear health, survival or success?
Why not use breakup dates, as has been done for decades for subpopulations in Hudson Bay (e.g. Cherry et al. 2013), where the ice also disappears in late summer?
Is there something in the ice data for Baffin Bay and Davis Strait that Rode and colleagues don’t want us to see?
Since I had already made a composite of Cryosphere Today ice maps at July 12 for my discussion of the Chukchi/Beaufort NSIDC analysis mentioned above, it was relatively easy to look at what was going on in Baffin Bay and Davis Strait on that date in mid-summer. Keep in mind that ice extent and concentration at July 12 records the state of polar bear habitat prior to the late summer decline in sea ice that occurs every year.
Posted in Life History, Sea ice habitat
Tagged baffin bay, breakup dates, Cryosphere Today, Davis Strait, Karyn Rode, sea ice concentration, sea ice extent, Seth Cherry, Southern Hudson Bay, summer ice minimum, summer sea ice mean, western hudson bay
Previously, I highlighted new research results that showed, contrary to expectations, polar bears in the Chukchi Sea subpopulation are doing better – despite declines in extent of September sea ice – since the 1970s. So it might not come as much of a surprise to find that the same is true for the primary prey of polar bears in the Chukchi and Bering Seas, Arctic ringed seals (Phoca hispida hispida).
Surprisingly, less than 6 months after Arctic ringed seals were placed on the American list of “threatened” species (under the ESA, see previous post here), actual research in Alaska has shown that declines in sea ice have proven better for ringed seals, not worse.
At a presentation given at the Lowell Wakefield Fisheries Symposium in March (Anchorage, Alaska) [program and links to pdfs here] Justin Crawford, a biologist with the Alaska Department of Fish and Game (ADF&G) presented the results of ringed seal research conducted by himself and fellow ADF&G biologist Lori Quakenbush in the Chukchi and Bering Seas (posted online by the event organizers, see references below).
As for polar bears, the Crawford and Quakenbush presentation provides some very interesting details on the status of Chukchi and Bering Sea ringed seals over the last 40 years, and contains some mighty “inconvenient” conclusions that should raise some eyebrows.
I’ve summarized these details and conclusions below in point form, with a map.
Posted in Conservation Status, Life History, Sea ice habitat
Tagged ADF&G, arctic seals, Bering Sea, body condition, Chukchi, ESA, Justin Crawford, Kelly, Lori Quakenbush, lowell wakefield, Phoca hispida, resilient, ringed seals, sea ice declines, sea ice extent, snow cover, summer ice minimum, threatened species, winter ice maximum
Previously, I summarized preliminary results of polar bear research in the Chukchi Sea undertaken between 2008 and 2011 by US Fish & Wildlife biologist Eric Regehr and US Geological Survey researcher Karyn Rode. At the time, a peer-reviewed paper on this study was promised shortly.
It now appears this paper is indeed on the way. I’m sure of that because a few weeks ago, I came across a conference presentation given by Karyn Rode that is a summary of the upcoming Chukchi research paper. The title of both presentation and ‘in review’ paper is:
“Variation in the response of an Arctic top predator experiencing habitat loss: feeding and reproductive ecology of two polar bear populations.”
Rode’s slide presentation (given at the annual Lowell Wakefield Fisheries Symposium at the end of March, in Anchorage, Alaska) was posted online by the symposium organizers. It provides some very interesting details on the status of Chukchi Sea bears compared to bears in the Southern Beaufort, and contains some mighty “inconvenient” conclusions that should raise some eyebrows.
I’ve summarized these details and conclusions below in point form, below the maps.
Figure 1. Chukchi and Beaufort Seas (from Wikipedia), upper. ‘Chukchi Sea’ polar bears are shared between the USA and Russia; ‘Southern Beaufort’ bears are shared between the US and Canada, lower (from PBSG, with labels added). Pink dots are the subpopulations featured in the Rode et al. presentation and upcoming paper.
Posted in Conservation Status, Sea ice habitat
Tagged Bering Sea, body condition, Chukchi, cub survival, Derocher, Eric Regehr, Karyn Rode, Lowell Wakefield Symposium, messaging the complexity, polar bear status, Southern Beaufort, Stirling, summer ice minimum, the "message", thick spring ice, unpublished data
We know that thick-ice springs occurred in 1974, 1975, 1986, 1992, 2004, and 2005 in the former ‘Eastern Beaufort’ – now the southern portion of the ‘Northern Beaufort’ and the eastern portion of the ‘Southern Beaufort.’ We know that these severe spring ice conditions negatively impacted both polar bears and ringed seals in this region every decade since the 1960s because the effects have been documented by numerous studies conducted in April through May for polar bears (Amstrup et al. 2006; Cherry et al. 2009; Pilfold et al. 2012; Stirling 2002; Stirling and Lunn 1997; Stirling et al. 1980; Stirling et al. 1993; Stirling et al. 2008) and in June and July for ringed seals (Harwood et al. 2012; Smith 1987), see previous posts here, here, and here.
For example, even though Ian Stirling and colleagues argued in their 2008 paper that the thick spring ice conditions in 2004, 2005 and 2006 (but not those in previous decades) were caused by storms initiated or intensified by greater amounts of open water in previous summers, they did not deny that the thick-ice springs occurred. They stated quite clearly that:
“The 1960s, 1970s, and 1980s each experienced a two- to three-year decline in seal productivity in the eastern Beaufort Sea and Amundsen Gulf, associated with heavy ice conditions, around mid-decade. Each was followed by a decline in polar bear reproduction and condition, after which both seal and bear populations recovered (Smith, 1987; Harwood et al., 2000; Stirling, 2002). The beginning of each of those three periods was associated with heavy ice conditions through the winter before the reproductive decline of the seals, followed by a late spring breakup.” [my bold]
So, I have to say, I was shocked but not surprised to find that in the more recent scientific literature, the phenomenon of thick-ice springs every decade in Southern and Northern Beaufort has been deliberately ‘disappeared.’
Not surprised because I suspected it had happened — this issue was a feature of the Stirling and Derocher (2012) paper from late last year which was the topic of my very first blog post, “Cooling the polar bear spin.”
However, I think it is important to document how the transmogrification of sea ice effects on polar bears was managed in the scientific literature so that everyone can see exactly what has been done. In a truly astonishing move for what is supposed to be a field of science, thick-ice springs have been effectively replaced by an open-water red herring as the scourge of Southern Beaufort polar bears.
Posted in Advocacy, Conservation Status, Sea ice habitat
Tagged Beaufort Sea, Cherry, Derocher, Eastern Beaufort, heavy sea ice, Northern Beaufort, open water, Regehr, ringed seals, Rode, Southern Beaufort, status, Stirling, summer ice minimum, thick spring ice
1972 – a bit over 40 years ago. Seven years before we had reliable sea ice extent data from satellites and the year before the international agreement was signed by Arctic nations to protect polar bears from overhunting.
In 1972, a bear biologist by the name of Jack Lentfer was working for the Alaska Department of Fish and Game, stationed at the Naval Arctic Research Lab in Barrow. Lentfer was one of the founding delegates of the Polar Bear Specialist Group, where he represented US interests until 1981.
In the proceedings of the 1972 PBSG meeting (Lentfer 1972a), Lentfer stated the following in his report to the group:
“Long term warming and cooling trends occur in the Arctic and probably affect polar bear distribution and numbers. Climatic trends should be considered when assessing bear distributions and population data on a long term basis.” [my bold]
Warming and cooling, not just warming.
He also had a paper published that year (Lentfer 1972b), entitled “Polar bear: Sea ice relationships.” Forty years on, I thought it was worth having a look at what Lentfer told his fellow polar bear biologist colleagues back then. Continue reading
Posted in History, Sea ice habitat
Tagged climate, cooling trends, Lentfer, PBSG, Polar Bear Specialist Group, population trend, sea ice extent, summer ice minimum, warming trends, winter ice maximum
It’s like pulling teeth, getting up-to-date information on breakup dates of Hudson Bay sea ice. You’d think with the importance of this seasonal event to the polar bears of Hudson Bay (some of which, we’re told, face the most perilous future of all polar bears worldwide), we’d get a press release every summer alerting us to the precise date of sea ice breakup and the subsequent arrival of the bears onshore. I’m thinking of something similar to the dispatches we get from the National Snow and Ice Data Center (NSIDC) when Arctic sea ice reaches its yearly maximum (e.g. March 2012) and its yearly minimum extent (e.g. September 2012).
Sadly, this is not the case.
So I was intrigued to see that a new paper just out in the Journal of Animal Ecology, by Seth Cherry (a Ph.D. student of Andrew Derocher) and colleagues, dealt with Hudson Bay breakup dates. I was hoping for some data beyond 2007, which has been the limit of information provided so far by polar bear biologists (see previous posts here and here). Unfortunately, because the methods for determining breakup dates in this paper are so different from previous ones (more detail below), the new data (1991-2009) can’t be compared to earlier studies that go back to 1979. But there is some good news.
Although you wouldn’t know it by the author’s conclusion, the results of the study confirm for this region my previously stated contention that polar bears need spring and early summer ice (March through June) for gorging on young, fat seals and documented declines in sea ice have rarely impinged on that critical feeding period – by which I meant, bears have seldom, if ever, been forced off the ice of Hudson Bay as early as June.
The study also confirms that there has not been any kind of spectacular retreat of sea ice breakup dates – coming earlier and earlier in the season – over the last 19 years and that polar bears did not arrive on shore in 2009 until very late – approximately 22 August – the same date they came ashore in 1992.
Below are two figures from the paper: one (the map) necessary to understand the new “Cherry method” of calculating breakup dates for Hudson Bay (no disrespect intended) and the other (the graph), which presents the data collected. The table with my converted breakup dates is below them. A few quotes from the study and some comments on it follows.
UPDATE (March 21 2013; 6:12 PM PST). A typo in the table has been fixed (2001 is Jun 21 not Jul 21) and the post amended accordingly.
UPDATE 2 (July 7, 2013) The Cherry et al. paper is now in print, the references have been updated accordingly.
You must be logged in to post a comment.
|
<urn:uuid:755b7bd3-818f-423d-bd5f-ca73d0c03a9c>
|
CC-MAIN-2023-23
|
https://polarbearscience.com/tag/summer-ice-minimum/page/2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00235.warc.gz
|
en
| 0.939712 | 5,033 | 2.84375 | 3 |
Risk is all in the mind. It is a word that refers to a future that exists only in the imagination. Contrary to the insistence, routinely found in discussions of the subject, on a distinction between "objective" risk and "perceived" risk, all risk is subjective.
To take a risk is to do something that has a possibility of an adverse outcome. Why should anyone want to do such a thing? Because, as well as possible adverse effects, risks also bring rewards.
Of course, everything we do carries some unknown probability of an accident - an unintended, undesired outcome. In the past such outcomes were commonly characterised as acts of God, who moves in mysterious ways, or, in a secular age, as bad luck. With the help of a good lawyer, however, it is increasingly possible to transform almost any stroke of bad luck into culpable negligence. We now live in ...
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content.
|
<urn:uuid:b00b8a9d-ffb6-4c92-a0e3-ff6313d52da9>
|
CC-MAIN-2014-23
|
http://www.newscientist.com/article/mg18725171.800-big-ideas-risk.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510276353.59/warc/CC-MAIN-20140728011756-00375-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.974703 | 212 | 2.734375 | 3 |
Originally known as Feather Ranch, Maysville was founded in 1879 as a tent camp. Adjacent to Maysville was another place called Crazy Camp, and the two camps merged. The name Maysville came from the Kentucky hometown of Gen. William Marshall. It was Gen. Marshall who is credited with the discovery of Marshall Pass to the south and used by the Denver & Rio Grande to reach Gunnison.
School: Maysville School.
Where: The Maysville School is located along U.S. 50 in its climb up Monarch Pass approximately five miles west of Poncha Springs.
By 1882, Maysville was Chaffee County's largest town and had several hotels, a bank, lumberyard, stores and a number of homes. It also once had two newspapers, the South Arkansas Miner and the Maysville Chronicle. The latter boasted of 1,000 readers. The town got its own post office in 1879.
A fire spread through the town in 1880 and destroyed five buildings before a bucket brigade could get the blaze under control. Maysville enjoyed prosperity until the silver crash of 1893 when the United States abandoned the silver standard. Without the U. S. government's required purchase of silver, the price dropped to almost half of its previous value. Maysville was nearly abandoned.
The red Maysville School with its white trim sits along U.S. 50 in its climb up Monarch Pass and is a local landmark. The school opened in 1881 near the tracks of the Denver & Rio Grande, a spur that ended at the town of Monarch.
Fortunately after the precious metal ore had been exhausted, a limestone quarry opened up. The limestone provided one of the essential ingredients for Colorado's steel industry in Pueblo and the trains continued to run through Maysville. The railroad saw a future in the spur and converted it from narrow gauge to standard gauge.
With a declining student population, the school closed in 1939 and was converted into a bus barn. The east wall was cut out for the vehicles to enter the structure.
In 1978, residents of Maysville raised money and got a grant from the Colorado Historical Fund to replace the missing wall as well as the floor and windows. In 2007, the South Arkansas Landowner's Association held its annual picnic and voted to scrape and repaint the building. Residents and interested parties worked on the school with donations coming from area businesses in the form of money and materials.
Second-grade students have field trips to see the Maysville School and its desks. They are even allowed to ring the school bell, an original. This historic school is owned by the Salida Museum Association.
Kenneth Jessen has been a Loveland resident since 1965. He is an author of 18 books and more than 1,300 articles. He was an engineer for Hewlett-Packard for 33 years and now works as a full-time author, lecturer and guide.
|
<urn:uuid:202e7521-b9d8-4146-9826-6a069cfb17f6>
|
CC-MAIN-2014-10
|
http://www.reporterherald.com/columnists/ghost-towns/ci_23457307/maysville-school-and-place-called-crazy-camp
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021365169/warc/CC-MAIN-20140305120925-00083-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.977452 | 602 | 2.71875 | 3 |
Personality disorders are characterized by the presence of inflexible and maladaptive patterns of perceiving oneself and relating to the environment that result in psychosocial impairment or subjective distress. The enduring nature of the behaviors, their impact on social functioning, the lack of clear boundaries between normality and illness, and the patient's perception of the symptoms as not being foreign make this group of conditions more difficult to conceptualize than the more typical, episodic mental disorders.
Personality disorders are both frequent and difficult to treat. Individuals with these problems consume substantial resources and seriously burden society. A survey of the work of Australian psychiatrists showed that although patients with personality disorders amounted to only 6 percent of the people in treatment, they exhausted 13 percent of the psychiatrists' treatment time (Andrews and Hadzi-Pavlovic).
The term personality disorders includes diverse conditions that originated in very different clinical, theoretical and research settings, as Rutter pointed out. Some conditions, such as the concept of borderline personality disorder, are mainly the result of psychodynamic thinking. Others, such as schizotypal personality disorder, have their origin predominantly in genetics. Irrespective of the history of each construct, most experts agree that personality disorders emanate from childhood.
Despite this, little empirical evidence is available on the developmental pathways that underpin these disorders, with the exception of antisocial personality disorder (Robins; Zoccolillo and others). This evidentiary lack may be the consequence of ambiguities surrounding the concepts of temperament, character and personality (Rutter) or the result of child and adolescent psychiatrists being reluctant to make a diagnosis of personality disorder. The recent surge of research reports dealing with personality disorders in adolescent groups suggests that this reluctance may be waning.
Because personality is shaped by experiences during childhood and adolescence, it is likely that mental disorders occurring during these years may have an influence on personality development. Childhood mental disorders may increase the risk of affected children developing a personality disorder when they grow up. This can happen in a variety of ways. The disorder itself, for example, depression, may directly influence personality development. Alternatively, symptoms of the condition (e.g., disruptive disorder) may elicit environmental responses (e.g., increased control or likelihood of abuse by caregivers) that in turn may alter personality development. It may be that the disorder observed in childhood is an earlier manifestation of the same underlying pathology that results in the development of personality disorder in adulthood. Consequently, the study of the continuities between child or adolescent disorders and adult personality disorders is likely to be a fertile ground that will facilitate our understanding of these conditions.
Seeking to clarify some of these issues, my colleagues and I followed up a group of adolescents who had been referred for assessment to an adolescent unit in Sydney, Australia (Rey and others). Follow-up consisted of a lengthy interview during which a variety of diagnostic instruments and questionnaires was administered. These included the Personality Disorders Examination (Loranger). At the time of initial assessment, the average age was 14 years, while at follow-up it was 20 years. Of the 205 subjects who were located, 145 were fully interviewed. About half of these (44 percent) were female.
During the ensuing six years, four of the subjects had died. One female, initially diagnosed as having attention-deficit disorder with hyperactivity, died of a heroin overdose following a period of severe disturbance during which she probably met criteria for conduct disorder. Two males suffered from conduct disorder. One committed suicide; the other died of multiple organ failure caused by hepatitis one day after being released from prison. One male had an adjustment disorder with disturbance of conduct. Reports from relatives at the time of follow-up suggest he was well-adjusted. He died in a car accident. There were 114 (56 percent) individuals with a disruptive disorder diagnosis among the 205 subjects located. Although numbers are too small to draw conclusions, these findings suggest that mortality (3.5 percent) among adolescents with these conditions is likely to be high.
The main findings from the examination of the relationships between adolescent diagnosis, developmental variables and adult personality disorder were:
- Personality disorders were frequent (28 percent), particularly among those with disruptive diagnoses (40 percent). Further, of those young adults with a personality disorder, one-third had more than one personality disorder diagnosis.
- Females were more likely than males to have a Cluster C personality disorder. However, males were not more likely to have a Cluster B disorder once the effect of adolescent diagnosis was taken into account.
- Adolescents with disruptive disorders were more likely to have a Cluster B personality disorder than those with an emotional disorder but not less likely to have a Cluster C disorder.
- Significant associations existed between conduct disorder and antisocial personality disorder and between attention-deficit/hyperactivity disorder .i.attention-deficit/ hyperactivity disorder;(ADHD) and borderline personality disorder.
- Quality of the family environment before the age of 12 years was the most robust developmental predictor of personality disorder in young adults. Externalizing symptoms between the ages of 4 and 7 years was also predictive of Cluster B personality disorders (unpublished data).
|
<urn:uuid:c4e85e70-7729-4400-ab62-4eafc93c1572>
|
CC-MAIN-2013-20
|
http://www.psychiatrictimes.com/display/article/10168/53946
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00075-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.965253 | 1,045 | 3.6875 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.