text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
The Curse of the Lydian Hoard
Relics from the era of King Croesus, ruler of the Lydian Kingdom between 560 and 547 BC, the Lydian Hoard is a collection of ancient jewellery and relics.
The treasure was found in 1965 in a small village in Turkey, when five villagers discovered the tomb of of an unknown princess from the Lydian period.
The villagers plundered the tomb and stole anything they thought was of value, by 1966, looters and thieves had taken over 100 items from the tomb including gold jewellery, silver and wall paintings.
The villager’s thought all their problems would be fixed due to their new found wealth, but it was exactly the opposite, misfortune and death reigned down on the villagers and their families and anyone who traded the jewels and relics with them.
From the stories of unfortunate events put upon the villagers, the curse sprang up and has been in circulation ever since.
©2013 Allen Tiller
first published Feb 27 2013
|
<urn:uuid:83a9a2d7-ce67-4e12-b6e4-7fd4dad2ac14>
|
CC-MAIN-2017-30
|
http://eidolonparanormal.blogspot.com/2017/04/curses-curse-of-lydian-hoard.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424961.59/warc/CC-MAIN-20170725042318-20170725062318-00352.warc.gz
|
en
| 0.969143 | 212 | 2.890625 | 3 |
Solar energy is basically energy that is harnessed from the sun. Whenever the sun comes out during the day it releases a certain type of energy that can actually do a lot of good for the environment. In order for this energy to be used for things like heat and electricity, it has to be converted. This is why solar panels have been made and are being installed on homes as well as businesses. Once the panels are installed they will be able to convert the energy from the sun into energy that can be used to power your home, heat your home and even cool your home.
Why Should Solar Energy be Used?
The biggest benefit of using solar energy is that it is renewable, which regular power isn’t. In addition to this, it’s also clean and good for the environment. Power plants run on fossil fuels and well as nuclear fuels, which release harmful toxins into the environment. These emissions pollute the air and ruin the environment on a daily basis. With solar electricity there are no toxins released into the environment, which results in less pollution in the air.
Why are Solar Panels Effective?
Solar panels are strategically placed where they will get the most sunlight during the day. Each home or building will have panels placed in different areas based on their size and location from where the sun rises. Proper placement can mean maximizing how much sun is absorbed into the panels throughout the day. As the sun releases energy, the panels will convert it into energy that your home can use for everything it needs.
Why You Should Use Panels for Solar Energy
If you use panels on your home to convert solar energy, you are going to save a lot of money on your energy bills throughout the year. Most people end up saving 20% or more off of their bill each and every month. Your savings will depend on your home, how much sun you get and several other factors. You won’t have to rely on power plant energy nearly as much as you did before. Instead you will be able to get free energy from the sun to power up your home when you need to.
Why is this so Expensive?
A lot of people are hesitant to get solar energy panels because it’s such a large investment. While these do cost a lot, their prices have continued to fall with each passing year. Market conditions, local availability and number of panels required are all things that can affect the cost. As the technology that is used in panels continues to grow, it will be easier for everyday people to take advantage of. One thing you should keep in mind is that the savings you get in energy can help these panels pay for themselves within a short amount of time. There are also tax credits available that can make investing in panels for solar energy a great choice.
While solar energy panels are a big investment, they can definitely be worth it. Not only will you be increasing the worth of your home, you will also be helping the environment. Combine these with the savings you get on your bill and these panels can turn out being a really great purchase!
|
<urn:uuid:b465cbcb-651e-439f-9a9c-30be2465906d>
|
CC-MAIN-2020-05
|
https://www.vecosys.com/save-energy-use-solar/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251789055.93/warc/CC-MAIN-20200129071944-20200129101944-00202.warc.gz
|
en
| 0.969915 | 623 | 3.078125 | 3 |
The Nucleus of Comet Halley
Comet Halley as seen by ESA's Giotto spacecraft in 1986, the last time the comet visited the inner Solar System. Giotto was ESA's first deep mission, and obtained the first close-up images of a comet. This image was taken from a distance of about 2000 km from comet Halley. The Sun is located towards the left of the image, provoking outbursts of gas and dust from the comet's nucleus.
|
<urn:uuid:c8d038b9-8099-482f-96fb-29b96c220c0d>
|
CC-MAIN-2023-40
|
https://sci.esa.int/web/giotto/-/51183-the-nucleus-of-comet-halley
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00449.warc.gz
|
en
| 0.960006 | 97 | 3.15625 | 3 |
Download now Free registration required
IEEE 802.16, also known as WiMAX, is a new wireless access technology for currently increasing demand of wireless high-speed broadband service. Efficient and effective deployment of such a network to service an area of users with certain traffic demands is an important network planning problem. In this paper, the authors resort to a Genetic Algorithm in order to yield good approximation solutions. In the method, individual representation and genetic variation operations are specifically designed to incorporate the feature of this application problem. Moreover, an adaptive population size approach inspired by neutral theory in molecular biology is applied in the algorithm to enhance its search ability.
- Format: PDF
- Size: 237.2 KB
|
<urn:uuid:fdaf270f-5ed4-4d2f-9343-c6a365634187>
|
CC-MAIN-2013-48
|
http://www.techrepublic.com/resource-library/whitepapers/wimax-network-planning-using-adaptive-population-size-genetic-algorithm/?scname=wimax-80216
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164036407/warc/CC-MAIN-20131204133356-00065-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.918949 | 142 | 2.59375 | 3 |
Gallbladder cancer and biliary duct cancer are relatively rare and account for fewer than 1% of all cancers. In 2005, over 3200 cases will be diagnosed and almost 2000 people will die of this cancer. Gallbladder cancer occurs five times more often in Native Americans than in whites and is more common in white females than in African American females. Most cancers of the gallbladder and biliary tract are inoperable at the time of diagnosis. If the cancer has been found incidentally at the time of a cholecystectomy, longer survival may be possible. More than 75% of gallbladder cancers are nonpapillary adenocarcinomas and approximately 6% are papillary adenocarcinomas; a small number are squamous cell, adenosquamous cell, mucinous, or small cell carcinomas. Papillary cancers have a better prognosis and grow along the connective tissue and blood vessels; they are not as likely to metastasize to the liver and lymph nodes. Adenocarcinomas occur most frequently at the bifurcation in the common bile duct.
Biliary system cancer is insidious and metastasizes via the lymphatic and blood systems and by direct extension to the liver, pancreas, stomach, and duodenum. Invasion of the gastrointestinal (GI) tract can cause complete obstruction of the extrahepatic bile ducts with intrahepatic biliary dilation and enlargement of the liver. If the tumor is restricted to one hepatic duct, biliary obstruction is incomplete and jaundice may not be present. Inflammatory disorders such as cholangitis (bile duct inflammation) and peritonitis often obscure an underlying malignancy. Infection often accompanies cancer of the gallbladder, and bile duct cancers are associated with ulcerative colitis. In most patients with gallbladder and biliary cancer, the disease progresses rapidly and patients usually survive little more than a year after diagnosis.
The cause of biliary system cancer is unknown, although a possibility is gallstones. When gallstones are present, bile is released more slowly. If the bile contains carcinogens, the gallbladder tissue is exposed to these carcinogens for a longer period of time. Approximately 1% of all cholecystectomy specimens are found to be cancerous. Because of the risk of cancer, even for asymptomatic cholelithiasis, a cholecystectomy is recommended. Primary carcinoma of the gallbladder is rare and is usually associated with cholecystitis. Most biliary cancer is from metastasis, commonly from the head of the pancreas.
Nursing care plan assessment and physical examination
Some patients who do not have symptoms that can be traced back to the gallbladder may describe symptoms similar to those of cholelithiasis or cholecystitis because these result from obstruction and inflammation of the biliary tree. The most common symptom is intermittent to steady pain in the upper right abdomen. Mild pain in the epigastric area may also be reported. GI symptoms are related to the blockage of bile. Patients may complain of anorexia, nausea, vomiting, belching, diarrhea, and weight loss. Diarrhea may be related to steatorrhea, and weight loss can be as much as 14 to 28 pounds. Because of frequent metastasis to the liver and pancreas, there may be clinical manifestations of cancer in those organs.
Patients with extensive disease may appear thin and malnourished. Determine if the patient is jaundiced from an enlarging tumor that is pressing on the extrahepatic ducts, but note that jaundice may be delayed if only one main duct is involved. Inspect for skin irritation and skin trauma because of pruritus. If the tumor is of sufficient size, an abdominal mass may be palpated; this mass in the gallbladder area feels hard and is sometimes tender. Intrahepatic metastases are not usually palpable. If the abdomen is distended, individual organs may be difficult to palpate. The liver may be very large and smooth, 5 to 12 cm below the costal margin.
Because the prognosis of biliary cancer is poor, determine how much the patient understands. Determine if the patient is moving through the stages of death and dying, and be accepting of the patient’s attitude toward the diagnosis.
Nursing care plan primary nursing diagnosis: Pain (acute) related to obstruction of biliary tree.
Nursing care plan intervention and treatment plan
Most medical treatment is aimed at supportive care, such as controlling the GI symptoms and the discomforts of jaundice. A cholecystectomy is done as soon as possible after the cancer is detected, although the cancer may have been found by doing the surgery for cholecystitis. Surgery may include removal of a section of the liver. Internal radiotherapy, using iridium-129 wire or radium needles, may be combined with biliary drainage. Chemotherapy has not been shown to be effective against this cancer. External radiation may be used palliatively for cancer of the bile duct but is not effective against gallbladder cancer. If the tumor is inoperable or increases in size after surgery and is occluding any of the bile ducts, palliative measures may be taken to allow the bile to flow into the duodenum. Drainage of the bile can be accomplished by an external system, similar to that of a T-tube, or an internal stent that drains directly into the duodenum. As an alternative to surgery, a stent made of specialized plastic or steel is placed either by endoscopy or percutaneously through the tumor to allow drainage of the trapped bile. Complications include cholangitis and obstruction and dislocation of the stent.
Dietary changes are similar to those needed by patients with cholelithiasis, except the emphasis is on gaining weight rather than on weight reduction. A diet balanced with high calories and protein and low fat helps control the GI symptoms. Each individual needs to determine what foods are best tolerated. Medications to control nausea may be needed before meals, and the patient usually needs a pain-control regimen.
The nurse has an important role in maximizing the patient’s comfort. To augment the pain control obtained from analgesia, initiate nonpharmacologic strategies. Allow the patient to participate in the activities of daily living as much as possible. Assist with personal hygiene as much as needed, and include the significant others in learning the process. The itching associated with pruritus can be controlled by maintaining skin integrity, using soft, dry linens and cloths and warm water for bathing. Keep the area around all surgical incisions and drainage devices clean and dry. A large number of support groups exist to help patients and families manage cancer. Listen to the patient’s concerns. Give the patient and family the number for the American Cancer Society and hospice care if appropriate.
Nursing care plan discharge and home health care guidelines
Whether the tube is internal or external, teach the patient the signs and symptoms of a blocked tube. If the drainage system is external, teach the patient how to care for the tube, including emptying of the bag, irrigating the tube, periodic clamping of the tube, and managing skin care around the tube. Teach the patient to report signs of infection, excessive drainage, leakage, and obstruction to the physician. Provide the patient with a contact phone number. Teach the patient methods to control itching. Teach the patient about each medication, including the purpose and correct dosages, along with any potential side effects. Explain the requirements for a low-fat, high-calorie, and high-protein diet.
|
<urn:uuid:e1b68bb0-571a-4941-9d13-9cbbf22d8910>
|
CC-MAIN-2014-23
|
http://www.enurse-careplan.com/2010/09/nursing-care-plan-ncp-gallbladder-and.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268533.31/warc/CC-MAIN-20140728011748-00151-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.937418 | 1,619 | 3.40625 | 3 |
For all the debate in the US over immigration policy, there is one basic tenet of American law: if you are born here, you are a citizen.
That used to be the case in the Dominican Republic, as well. But last September, the country’s Constitutional Court declared that all those born after 1929 to undocumented immigrants are also considered illegal residents, and so are their descendants.
The Dominican government has already begun to cancel the citizenship of thousands of one-time Dominicans. Most of them trace their roots to the DR’s poorer neighbor, Haiti.
Many Dominicans of Haitian descent live in bateyes — century-old communities comprised largely of migrant workers and their children. The Dominican Republic has several bateyes, known by their numbers. Batey Ocho (or eight) is a small cluster of wood and cinderblock houses. It’s where 17-year-old Betzeida Perez Pierre was born and raised, as were her parents and their parents.
Her great-grandparents came over from Haiti to work on Dominican sugarcane plantations, but, gradually, members of her family found other opportunities. They’ve gotten an education and integrated into Dominican life.
Her father became a teacher, and is now mayor of the municipality of Batey Ocho. Betzeida finished high school this year, and she seems poised to follow her father’s path.
“I like to teach,” she says. “It’s a way for me to pass along what I’ve learned, and I enjoy it.”
She wants to study education at a university, perhaps to teach literature and history.
But there’s a problem.
"One of the requirements to enroll in university is having your identity card — proving your citizenship," Betzeida explains. “When I went to get it from the authorities, with all my required documents, they told me to come back later. So I waited, and waited, and waited more. Finally they told me my ID card had been canceled.”
Betzeida has never been to Haiti, and the only language she speaks is Spanish. No matter. The Dominican Constitutional Court has declared that Betzeida, along with thousands of others, is no longer a Dominican citizen.
"I feel discriminated against,” she says, “because I was born in this country, and I’ve always lived in this country. My parents are from this country, and I can’t get my identity card, which identifies me as Dominican.”
Betzeida’s ancestors didn’t exactly sneak across the border. Her father, David Perez, says they immigrated under an early 20th century contract between the Dominican and Haitian governments to provide cheap labor for the Dominican sugar plantations.
The contract was for the cane-cutting season,” says Perez, who has researched the subject with other local leaders. “At the end of it, the Dominican government was supposed to send those workers back to Haiti. But it never did. So those migrants were allowed to stay and go to work picking coffee and other crops. Then they came back to this area when the cane-cutting season started again.”
Perez says many of them got citizen ID cards and registered their children as Dominican.
Now, as mayor, Perez is hearing a lot from constituents about their fears about the court decision.
"When your ID card is canceled,” he says, “there are other things that get canceled — your bank account, property titles, car titles, house titles, agricultural contracts. All of those are based on one's identity. So that's why people are so worried.”
But to defenders of the court decision, revoking the legal status of the descendants of Haitian migrants is completely justifiable.
Alexander Florian Medina, an attorney in the city of Barahona, says he has sympathy for Haitian immigrants. After the earthquake, he helped some Haitians fight deportation. Still, he supports the recent Dominican court decision.
“When you’re born to illegal immigrants,” he says, “that means you were born illegally here, so it’s normal that you be considered as illegal as your parents or grandparents.”
Medina points out that those with canceled documents are allowed to apply to regain their legal status and citizenship. But to long-time residents of Batey Ocho, this seems absurd.
Nununa Enecia still lives in Batey Ocho, where she was born 82 years ago to a Haitian mother. She takes issue with Dominicans like herself being treated as foreigners.
“For those of us who were born here, what are we supposed to do?” she says. “Go to Haiti? Where are we going to go? The authorities are happy to have people come over here and work. But then, when they see fit, they gather us up like a heap of trash and send us away.”
All four of Enecia’s siblings died in infancy because there was no medical care in the batey. She never learned to read or write, but she put her children through school by selling propane for gas lamps. Her son Beneco went to university, became the first mayor of Batey Ocho, and then founded a sustainable development organization that operates in the bateyes.
Beneco said he pursued his education in part to show other batey youth that it was possible to make it in Dominican society.
He couldn’t have imagined how much the rules of the game would change.
|
<urn:uuid:4b01d6c9-22e5-4dae-a779-dc1fff73cc71>
|
CC-MAIN-2020-05
|
https://www.pri.org/stories/2014-01-03/what-happens-when-your-government-tells-you-youre-no-longer-citizen
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606269.37/warc/CC-MAIN-20200122012204-20200122041204-00357.warc.gz
|
en
| 0.983394 | 1,180 | 2.765625 | 3 |
If my kid feels sick to his stomach after eating tons of candy, what can I do to make him feel better?
The good news is, if your child's stomach hurts after eating too much candy, he'll probably have learned a valuable lesson about how much candy he can handle! (Or so we hope ...)
In the meantime, have your child drink lots of water to help keep the sugar from being quickly absorbed into the blood. He may get a headache from high blood sugar, but it will pass with time and is not life threatening.
What may be life threatening is the development of weight problems, including obesity, which can then lead to Type 2 diabetes mellitus from excessive consumption of refined sugar. So, while an occasional indulgence is OK, it's important to help your kids develop healthy eating habits and keep them active!
If your kid has a sweet tooth, try alternative food choices such as fresh fruit or one of the widely available 100-calorie snack packs of cookies.
|
<urn:uuid:51084dea-5952-4c0e-8f2d-e1eac913402c>
|
CC-MAIN-2013-20
|
http://www.parentsconnect.com/parenting-your-kids/kids-eating/candy_sick_stomach.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700014987/warc/CC-MAIN-20130516102654-00052-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.968595 | 203 | 2.515625 | 3 |
Negative effects of globalization on brazil. Effects Of Globalization In Brazil 2022-10-27
Negative effects of globalization on brazil Rating:
Globalization is a process of increasing interconnectedness and interdependence among countries through the exchange of goods, services, information, and ideas. While globalization can bring many benefits, it can also have negative effects, particularly for countries that are already disadvantaged or facing economic or political challenges. In this essay, we will discuss the negative effects of globalization on Brazil, a country that has experienced both the benefits and the drawbacks of increased global integration.
One of the main negative effects of globalization on Brazil has been the loss of traditional industries and jobs. As multinational corporations have expanded into the country, they have often brought with them new technologies and business practices that have disrupted local industries and displaced workers. For example, the agricultural sector, which is an important part of Brazil's economy, has been heavily impacted by globalization. Large agribusinesses have taken over small farms, leading to the displacement of many small farmers and a decline in traditional farming practices. This has contributed to social and economic inequality in the country, as those who were able to adapt to the changing economic landscape have benefited while those who were left behind have struggled.
Another negative effect of globalization on Brazil has been the growth of informal labor markets. As multinational corporations have sought to reduce labor costs, they have often turned to informal workers, who are not protected by the same labor laws and benefits as formal employees. This has led to the proliferation of informal work in Brazil, particularly in the service sector, which has contributed to precarious working conditions and low wages for many workers.
Globalization has also had negative environmental impacts in Brazil. As multinational corporations have sought to exploit the country's natural resources, such as timber, minerals, and oil, there has been a significant increase in deforestation and environmental degradation. This has had serious consequences for the country's biodiversity and ecosystems, and has contributed to climate change.
Finally, globalization has had a negative impact on Brazil's political and social stability. As the country has become more integrated into the global economy, it has become more vulnerable to external economic shocks and political interference. This has contributed to social unrest and political instability in the country, as different groups have sought to protect their interests in the face of economic and political change.
In conclusion, while globalization has brought many benefits to Brazil, it has also had negative effects on the country's economy, labor markets, environment, and political stability. It is important for Brazil and other countries to find ways to balance the benefits of globalization with the need to protect local industries, workers, and the environment.
Effects of Globalisation on Brazil
Inflation revived and the inflationary expectations reemerged Roett, 2010:81. The first period was due to the immediate impact of the interruption of high inflation, while the more recent decrease reflected a modest growth in employment level, readjustments to the real value of the minimum wage and the effect of pension and welfare programs Maluf and Burlundy, 2007. Due to globalization, now Brazil has many trade partners that they trade with. It can be said internationalization is a phenomenon that is older than globalization. Political integration is a dimension of the globalization process that binds states together through bilateral contact and as members of international organizations. These attract more US investment than any other industry bar automobiles because they are so profitable for investors. There are benefits to globalization, but there are also problems such as great inequality in and across societies McGrew, 2007.
The most important commitment for the government was to pursue the tough fiscal targets mandated by the IMF. One his administrations top priorities was downsizing the public sector and reducing the number of costly and often inefficient state companies. Globalization generally refers to an increasing interaction across national boundaries that affect many aspects of life: economic, social, cultural and political. Globalization Source: Constructed from World Development Index Data Although the dataset is incomplete, poverty is obviously in decline in Brazil; however this was occurring even before Brazil became more integrated in the world economy. A fourth one was the multidirectional movement of people around the world that involved new patterns of transnational migration, identities and communities.
Back in time, in many western countries, there came a time when social disparities were so extreme that society mobilized g. The BRICs are geopolitically and economically unique. It has also been argued on the contrary, that inequality rises initially with growth, before declining once again. On the other hand, about 2 billion people live in developing countries that are trading less today than they did twenty years ago Soubbotina, 2004:84. GINA MARIE HELLAND HAUGE MARIE THERESE MAGNUSSON MASTER THESIS August, 2011 Pages: 97 STUs: 240 410 COPENHAGEN BUSINESS SCHOOL MASTER OF SCIENCE IN INTERNATIONAL BUSINESS SUPERVISOR: JOACHIM LUND Department of Business and Politics Executive summary This thesis investigates the concept of globalization and its effects on the economic, political and social development in Brazil. According to Schneider and Soskice, capitalism leads to demand for general skilled labour, which leads to increased inequalities and a minimal welfare state. An area where there is more consensus of agreement is the relationship between globalization and poverty.
The gold standard crisis and in the late 1920s is the reason …show more content… Unfortunately, the negative impacts of globalization in China outweigh the positive effects like in the rest of the world. It equally created economies all around the world and expanded social trade. Yet, it was only after mechanical advances in transportation and correspondence that globalization sped up. Hence, the thesis aims to link economical, political and social development in Brazil and cannot be used for generalization to other countries. An explanatory study is best suited because the paper aims to understand how the globalization has affected the economical, political and social development in Brazil.
The Negative Effects of Globalization on the Global Economy
Policies within nations continue to be a key factor in determining whether or not countries and people benefit from globalization. This increase in education has had a major impact on labour. FDI can also serve as an important vehicle for local enterprise development, and it may also help improve the competitive position in the receiving economy. One of the most common forms of political globalization is the worldwide spread of democracy. The purpose of this analysis is to see Brazils role within Mercosur and its relationship with the other member countries. The country supports the strengthening of Special and Differential Treatment for developing countries and considers it to be an essential part of an agreement on agriculture Maag, 2005. Following a period of uninterrupted growth from 2003 to 2009, global FDI flows declined in 2008 and early 2009 in the developed countries.
In chapter four, the economic and political history of Brazil will be presented. Globalization also has a major effect on economic development. S Library of CongressThe Real Plan 41 The success of the Real Plan and the international enthusiasm for it, led to the resumption of large-scale flows to Brazil. The Selic base rate, set by Copom, the monetary Policy Committee, was kept high, despite many protests. In the wake of the Mexican peso crisis, Brazil benefited from very positive global financial trends, including interest rates favorable to emerging markets and domestic macroeconomic conditions attractive to foreign capital flows. Brazil has shown a vast amount of improvement in its economy via social and economic globalization.
Globalization in Brazil: How has globalization affected the economic, political and social conditions in Brazil? — CBS Research Portal
Hence, the explanation of one needs an account of the other McGrew, 2007. This was why the Real Plan was introduced in 1994. Globalization is generally seen, in the liberal view, as a benign process that has continuities with the past and historical changes. These problems predated globalization of course, but it is clear that for globalization to be politically and economically sustainable, it must contribute to their reduction. The number of public employees was high and real wages continued to climb, a problem that was only worsened after the decision to raise the minimum wage in 1995. Internationalization seems like a Western phenomenon, the Western states were trading only with each other at some point and now the whole world is trading with each other.
Income inequality is usually measured by the Gini coefficient; one of the most commonly used proxies of economic inequality. For many, voting for him was an exercise in recreating social identity and of creating political consciousness Bianchi and Braga, 2005. But, even if the trade liberalization had positive effects on Brazil during the 1990s, inequality and poverty levels did not decline. The social dimensions of globalization One can say that there are people that benefit from globalization while others do not. The important aspect of this plan was that it in addition to repeating some of the measures of the first plan, it emphasized better management of cash flow and tightening of the budgets of state enterprises. Relocation of production between countries can destroy jobs in one place and create employment in others.
Has Globalization Improved the Standard of Living In Brazil
Its driving logic involves the expansion and diversification of multiple markets Hodgson, 2003. Liberal theorists Martin Wolf and Jagdish Bhagwati emphasize how globalization is re-structuring the world economy. According to a report by the World Bank written in the late 80s, Brazil has one of the most unequal distributions of national income in the world. Main import is refined petroleum, which account for 8. In 2009, Brazil and the rest of Latin America were affected by the financial crisis to a larger degree than the previous year, and it can be seen from the chart that trade as a percentage of GDP decreased WTO Trade Policy Review, 2009. In chapters 6 through 8 an analysis of how Brazil has been affected by globalization in terms of economic, political and social aspects will be conducted, and a discussion on this will follow in chapter 9.
This facilitates the rise of new economic powers such as China, India and Brazil. The army was hoping that the president that was elected was favourable to them. In Brazil, after decades of poor economic management, a turning point took place in 1993-94. It is also characterized by lack of participation in decision-making and in civil social and cultural life. Also, trade among the BRICS hade accelerated with intra-BRICs trade going from 5 percent in 2000 to reaching nearly 8 percent of their total trade in 2005.
|
<urn:uuid:ac05f26a-ea27-4bc5-a36a-e2ca297b090a>
|
CC-MAIN-2023-14
|
http://complianceportal.american.edu/negative-effects-of-globalization-on-brazil.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00436.warc.gz
|
en
| 0.964714 | 2,145 | 3.125 | 3 |
|Name: _________________________||Period: ___________________|
This quiz consists of 5 multiple choice and 5 short answer questions through Book 5, 'Book 7' The Attack : Chapter 2, Without a Decision, Invasion, Victory.
Multiple Choice Questions
1. What are the two sure ways to defeat an enemy according to Clausewitz?
(a) To defeat his allies and take his women.
(b) To blockade his ports and wait for his surrender.
(c) To destroy his armies and invade his country.
(d) To destroy his armies and blockade his country.
2. What was formerly a synonym of the "art of war" in Book 2, Chapter 4?
(a) Knowledge of war.
(b) Hard work.
(d) Science of war.
3. Who were the rules created for according to Clausewitz?
(a) The rich.
(b) The poor.
(c) The unintelligent.
(d) The military.
4. What clouds a soldier's objectivity concerning war according to Clausewitz?
(a) How much money he made during the war.
(b) How much he has been worn down by war.
(c) If he his still active.
(d) His country of origin.
5. What does Clausewitz call the moment of a battle where there is opportunity for a decisive victory?
(a) The end of the struggle.
(b) The turning point.
(c) Culmination of the attack.
(d) Height of the engagement.
Short Answer Questions
1. What is never final in war according to Clausewitz?
2. How does Clausewitz qualify the task of creating a scientific theory for the conduct of war?
3. What tenet does Clausewitz admit previous war theorists got right?
4. How does Clausewitz sees the first 6 books he wrote in his notes?
5. According to Clausewitz, why should events be studied one by one and in great detail?
This section contains 309 words
(approx. 2 pages at 300 words per page)
|
<urn:uuid:37751c41-7e3b-4c74-8419-f77b6fa49377>
|
CC-MAIN-2017-39
|
http://www.bookrags.com/lessonplan/on-war/quiz4b.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696677.93/warc/CC-MAIN-20170926175208-20170926195208-00271.warc.gz
|
en
| 0.952679 | 448 | 2.859375 | 3 |
IntroductionCandidate Phyla Radiation (CPR) and more specifically Candidatus Saccharibacteria (TM7) have now been established as ubiquitous members of the human oral microbiota. Additionally, CPR have been reported in the gastrointestinal and urogenital tracts. However, the exploration of new human niches has been limited to date.MethodsIn this study, we performed a prospective and retrospective screening of TM7 in human samples using standard PCR, real-time PCR, scanning electron microscopy (SEM) and shotgun metagenomics.ResultsUsing Real-time PCR and standard PCR, oral samples presented the highest TM7 prevalence followed by fecal samples, breast milk samples, vaginal samples and urine samples. Surprisingly, TM7 were also detected in infectious samples, namely cardiac valves and blood cultures at a low prevalence (under 3%). Moreover, we observed CPR-like structures using SEM in all sample types except cardiac valves. The reconstruction of TM7 genomes in oral and fecal samples from shotgun metagenomics reads further confirmed their high prevalence in some samples.ConclusionThis study confirmed, through their detection in multiple human samples, that TM7 are human commensals that can also be found in clinical settings. Their detection in clinical samples warrants further studies to explore their role in a pathological setting.
The candidate phyla radiation (CPR) has been described as an obligatory group of ultrasmall bacteria associated with host bacteria. They phylogenetically represent a subdivision of bacteria distinct from other living organisms. Using polyphasic approaches, we screened human faecal samples for the detection of Saccharibacteria. The new sequences obtained by sequencing were compared to the complete CPR genomes available to date. Then, we attempted a co-culture of CPR-bacteria and non-CPR bacteria from human faecal samples. We finally aimed to evaluate the prevalence and distribution of these Saccharibacteria sequences in human sources in 16S amplicon datasets. We were able to reconstitute two high-quality Saccharibacteria genomes named Minimicrobia massiliensis and Minimicrobia timonensis. We have established, for the first time in human digestive samples, the coculture of Candidatus Saccharibacteria with two different bacterial hosts. Finally, we showed that 12.8% (610/4,756) of samples sequenced in our laboratory were positive for operational taxonomic units (OTUs) assigned to M.massiliensis. and significantly enriched in human respiratory and oral microbiota. Here, we reported the first genomes and coculture of Saccharibacteria from human gut specimens. This study opens a new field, particularly in the study of the involvement of CPR in the human intestinal microbiota.
|
<urn:uuid:dc7d781a-c2f4-48a5-a366-ec67b19a5bb6>
|
CC-MAIN-2023-40
|
https://disc-genomics.uibk.ac.at/seqcode/authors/10716
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00745.warc.gz
|
en
| 0.920885 | 551 | 2.515625 | 3 |
Louisiana Voodoo Dolls
Voodoo dolls originally came from Louisiana.
Voodoo, also known as New Orleans Voodoo. Voodoo is a cluster of black magic folkways that came from the African diaspora traditions. These folk expressions of Afro-American religious customs were developed by enslaved Spanish, Creole, French and West Africans who lived in Louisiana.
Recorded use of Voodoo doll use started in the mid-16th century following the arrival of African slaves in Haiti. Afro-American religious traditions merged with the Catholicism there and over time, this living voodoo folk art form included Catholic personalities and purposes as well as other religious influences (Hinduism, etc.). For example, some Catholic saints, such as St. Peter, are included in the voodoo. For Haitians St. Peter was also known as Papa Legba, the gatekeeper of the spirit world.
The handmade dolls were used to cure illness and disease. It was believed that they were capable of making contact with elements of the spirit world and could bring forth healing, assistance for the needy, and, in some cases retribution.
Louisiana Voodoo Doll Examples:
Dream Changer: Often placed near the bed, this doll aides with sleep and transforms bad dreams into beautiful ones.
Fear Remover: This doll, often brightly colored, builds confidence.
Prankster: A string doll can be a harmless trickster that pulls funny pranks on others.
Romantic Love: A doll that resembles the one you’d like as a soulmate could help bring him/her to you.
Traffic Helper: This doll hangs from the rear view mirror and can help turn lights from red to green when you are in a hurry.
|
<urn:uuid:b7db73e2-995a-48ee-8997-62f96b79661a>
|
CC-MAIN-2017-39
|
http://folkheartpressfolklore.blogspot.com/2015/11/voodoo-dolls.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689823.92/warc/CC-MAIN-20170924010628-20170924030628-00000.warc.gz
|
en
| 0.959882 | 357 | 2.703125 | 3 |
A stress fracture occurs when the forces are much lower, but happen repetitively for a long period of time; these injuries are also known as fatigue fractures. Stress fractures are commonly seen in athletes who run and jump on hard surfaces, such as distance runners, basketball players, and ballet dancers.
A stress fracture can occur in any bone, but is commonly seen in the foot, shin, and hip bones. They rarely occur in the upper extremity because the weight of your body is not supported by your arms as it is in your legs.
Signs of a Stress FractureThe most common sign of a stress fracture is pain associated with activity. The pain of a stress fracture is usually predictable. This means that athletes usually know exactly how long into their run or work-out until the pain develops, and the pain typically resolves as soon as the body part is rested.
Any athlete with persistent pain that is not resolving should be evaluated to ensure there is no sign of a stress fracture. Because these overuse injuries have a typical course and common physical findings, the history and examination can be critical in the diagnostic evaluation. X-rays may not show a stress fracture, but they may show evidence of bone attempting to heal around the stress fracture. Further studies, including an MRI or bone scan may be necessary if the diagnosis is unclear or if the problem does not resolve with treatment.
How Stress Fractures OccurBone is constantly undergoing changes to adapt to its environment. When astronauts go into space, they are known to develop a thinning of the bone similar to osteoporosis. The reason is that their skeleton is not under the constant force of gravity, and the bone adapts to that environment. Stress fractures are usually seen in athletes who increase their level of activity over a short period of time. The increased demand placed on the bone causes the bone to remodel and become stronger in the areas of higher stress. However, if the response of the bone cannot maintain the pace of the repetitive demands, a stress fracture may result. Stress fractures are almost always the result of increasing duration or intensity of an activity too quickly for the body to adapt.
Another factor that can contribute to the development of a stress fracture are dietary abnormalities and menstrual irregularities. Because both factors contribute to bone health, any problems with diet (e.g. poor nutrition, anorexia, bulimia) or menstruation (amenorrhea) may place an individual at higher risk for a stress fracture. This is the reason that adolescent female athletes are at particularly high risk for development of a stress fracture.
Treatment of Stress FracturesThe best treatment of a stress fracture is to rest the injured body part. If there is no evidence that the stress fracture may displace (shift out of alignment), then avoiding the overuse activity may be sufficient treatment. However, if there is a concern of displacement of the stress fracture, then weight-bearing should be avoided (i.e. use crutches). Stress fractures of the hip are especially concerning, because if these fractures displace, surgery is mandatory, and long-term complications are a significant concern.
Other general stress fracture treatments include:
Boden BP and Osbahr DC "High-Risk Stress Fractures: Evaluation and Treatment" Am Acad Orthop Surg November/December 2000 vol. 8 no. 6 344-353
|
<urn:uuid:12884f42-3d57-4ecd-af7b-3596100a4c5a>
|
CC-MAIN-2014-15
|
http://orthopedics.about.com/cs/otherfractures/a/stressfracture.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202457.0/warc/CC-MAIN-20140423032002-00266-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.937939 | 683 | 3.40625 | 3 |
Freddie Lee Pitts (1937-2020)
DNA used in exoneration? No
Reasons for wrongful conviction:
Perjury or false accusation
Freddie Lee Pitts and Wilbert Lee, both African-American, were convicted and sentenced to death for the 1963 murder of two white gas station attendants in Florida, despite a complete lack of physical evidence. Prosecutors used confessions that were extracted through beatings, testimony of a suspicious eyewitness, and polygraph tests taken under extreme duress to win their case. A few weeks after Freddie and Wilbert were sentenced to death, a white man sentenced to life for another homicide admitted to the killings.
Despite learning of this confession, the local sheriff ignored it. A polygraph examiner who had heard the white man confess took the matter to the press, and soon a new trial was ordered. But astonishingly, Freddie and Wilbert were again convicted. After the second conviction, the alleged eyewitness recanted her testimony, and the state Attorney General admitted that the State had unlawfully suppressed evidence.
The defendants were released in 1975, when they received a full pardon from Governor Reubin Askew, who stated he was “sufficiently convinced that they were innocent.” In 1998, after a 20-year wait, Freddie was awarded $500,000 by the Florida Legislature. This marked the first time that the legislature ordered restitution for a person wrongly sentenced to death.
Freddie Lee Pitts passed away on September 3, 2020. He was the first Board Chair at Witness to Innocence and one of the first exonerees from Florida's death row. He devoted his life to educating the public about the death penalty with his razor-sharp knowledge of the legal system that put him on death row.
Freddie's case inspired author Gene Miller to write Invitation to a Lynching, which won him a Pulitzer Prize and helped free Freddie and his co-defendant Wilbert Lee.
Here at Witness to Innocence, we like to frequently cite one of Freddie's most moving quotes, as we believe it summarizes our beliefs regarding wrongful convictions and the death penalty: “You can release an innocent man from prison, but you can’t release him from the grave.”
|
<urn:uuid:51c60eeb-632d-4da5-9826-ebad87ac6174>
|
CC-MAIN-2023-40
|
https://www.witnesstoinnocence.org/single-post/2020/09/09/freddie-lee-pitts-1937-2020
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00822.warc.gz
|
en
| 0.975807 | 485 | 2.8125 | 3 |
Exhibit highlights textiles' role in modern interiors
Jul 25, 2011, 11:20 a.m.
By Ellen Freilich
NEW YORK (Reuters Life!) - The role of textiles in the history of modern interiors and design, often unrecognized, gets the spotlight at an exhibit at the Bard Graduate Center: Decorative Arts, Design History and Material Culture.
The overlooked status of modern textiles is perhaps best exemplified by the iconic "Womb" chair by Eero Saarinen, according to Earl Martin, a curator of the "Knoll Textiles, 1945-2010" exhibit.
A feature of most 20th-century design collections, the "Womb" chair's fabric, usually a Knoll textile and a dominant design element, is rarely, if ever, identified.
"In modern interior design, the role of the furniture designer is well documented, but the importance of the textiles on their furniture was never talked about," Martin said.
The lack of recognition is perhaps partly attributable to the concentration of women in textile design.
"In the field of design, it was fairly characteristic for women to be pushed into textiles," Martin explained.
Knoll Textiles grew out of Hans Knoll Furniture which was formed in the early 1940s by Hans Knoll, who came to the United States from Germany to expand the family furniture business. Fundamental to Hans Knoll's success was the partnership he began in 1943 with his future wife, Florence Schust.
She had studied at the Cranbrook Academy of Art in Michigan, where she was a protegee of the Finnish architect Eliel Saarinen, and with Mies van der Rohe at the Illinois Institute of Technology in Chicago. She also interned with the architects Marcel Breuer and Walter Gropius in Cambridge, Massachusetts before coming to New York City and working at various architectural firms.
"The community of modernist designers was small and she met Hans Knoll," Martin said.
Schust went to work for Hans Knoll Furniture in 1943 and established the Knoll Planning Unit. She believed in "total design," embracing principles of architecture, manufacturing, interior design, textiles, graphics, advertising and presentation.
Her use of design principles to solve space problems was a radical departure from the standard practice in the 1950s, but was quickly adopted and remains widely used today.
Having become a full business and design partner in the firm, Schust married Hans Knoll in 1946, after which the couple formed Knoll Associates.
With Schust as its director, Knoll's Planning Unit was formed to create complete interiors, primarily for the commercial market. Though the firm had experimented with textiles since 1942, it formally added textiles as a third division in 1947.
She was a driving force.
"Florence Knoll was unusual in that she was, in terms of design, the head of the company in the 1940s and 1950s," Martin said. "She designed a lot of furniture. She did not design textiles, but she directed the textile department."
She brought to textile production a modern sensibility that used color and texture as primary design elements.
Early on, the firm hired young, untried designers, along with leading proponents of modern design, to create textile patterns. Core designers included Astrid Sampe, Marianne Strengell, Sven Markelius, Angelo Testa, Stig Lindberg, Eszter Haraszty, Suzanne Huguenin, and Evelyn Hill Anselevicius.
"If Florence Knoll didn't like it, they didn't make it," Martin said.
The Bard exhibit, which closes on July 31, comprises approximately 175 examples of textiles, furniture, photographs, and ephemera on loan from public, private, and corporate collections, including the Museum of Modern Art, the Metropolitan Museum of Art, the Smithsonian Institution and Cooper-Hewitt, among others.
(Reporting by Ellen Freilich, editing by Patricia Reaney)
|
<urn:uuid:b9d2e64f-0c79-4835-8e0f-12c6d736071a>
|
CC-MAIN-2014-10
|
http://lovinlife.com/news/2011/jul/25/exhibit-highlights-textiles-role-in-modern/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010115284/warc/CC-MAIN-20140305090155-00094-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.96756 | 833 | 2.890625 | 3 |
What are Guitar Strings?
Ever wanted to know what guitar strings are? People are always talking about guitar strings this and guitar strings that, it's all so confusing..
Guitar strings have been around for quite some time. The first guitar strings were made from gut and installed on a guitar around 1265. The first guitars contained 4 pairs of strings until around 1551 when the fifth pair of strings was added. In 1770, the pairs were replaced by single strings and changed to six strings in total.
The early guitarists used gut as their guitar string material until 1946 when nylon guitar strings were introduced. Finally, steel guitar strings were introduced and the rest is history. Rock was born with the introduction of steel guitar strings and the Fender and Gibson electric guitar. Guitar tablatures were written and guitarists were learning chords to their favorite songs by their favorite bands.
So, back to the question.. "What are Guitar Strings?"..
A guitar string is a string made of a particular material, typically, gut, nylon or steel, which is spanned over a wooden instrument or an instrument which has magnetic or piezoelectric pickups. The purpose of the string is to vibrate and produce a particular musical note. A standard guitar has 6 strings and is tuned in the following configuration, E-A-D-G-B-E.
For the wooden or acoustic guitars, the sound is produced by the vibration of the strings which is amplified by the wooden body of the guitar. For the electric guitars, the sound is produced by the vibration of the strings which is transferred into an electric signal using piezo-electric pickups or magnetic pickups and is then amplified using basic signal amplification techniques.
We hope this lesson was fun and informative.
|
<urn:uuid:c750217d-7d84-474b-a342-b677383ce4e9>
|
CC-MAIN-2017-34
|
http://www.stringsandbeyond.com/what.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105108.31/warc/CC-MAIN-20170818194744-20170818214744-00293.warc.gz
|
en
| 0.983055 | 359 | 3.25 | 3 |
Gender Roles in the Wheat Production of Sudan Strengthening the Participation of Women
Three main impacts at the institutional level ensued through the integration of gender into SARD-SC Wheat Project in Sudan. The first was flexibility in responding to differing gender roles and needs in the different Innovation Platform (IP) sites including unprecedented focus on value addition and involving women in hosting and generating technologies. The second achievement was increased awareness on the importance of integrating women through increased knowledge about existing gender gaps and inequalities. The third impact was increased experiences in involving women through collaborations with multiple stakeholders (through the IP approach). Institutional norms related to a sustained focus on urban areas and limited involvement of women in agricultural interventions were challenged by finding new avenues to involve women6 in wheat programming including in value addition, roughing, and hosting of technologies. The project focused on improving gender relations at the household, community, and institutional levels in a safe and culturally appropriate way.
- ICARDA
|
<urn:uuid:904953ba-5dda-4b06-bd05-727110b53091>
|
CC-MAIN-2017-34
|
http://repo.mel.cgiar.org/handle/20.500.11766/5960
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110792.29/warc/CC-MAIN-20170822143101-20170822163101-00480.warc.gz
|
en
| 0.955976 | 192 | 2.828125 | 3 |
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
A computer rack is a physical chassis that can house multiple computers or servers simultaneously. It is a mounting rack that has the ability to install more than one computer or device in various form factors.
A computer rack is also known as a server rack or computer cabinet.
A computer rack is associated with rack-mounted servers that are horizontal form factor server sets. It is commonly available in 19-inch and 23-inch rack sizes. Each rack unit is 1.75 inches wide and can easily mount servers, computers or other devices of similar width.
A computer rack provides each rack unit with structural support assembly, neat cable arrangement and power/cooling support. depending on design.
A computer rack also may house blade servers, tower mounted server systems, switches, routers and other devices that comply with the rack's mounting space.
|
<urn:uuid:0876a04c-0103-4ab8-ab72-c5dd9a57fe1e>
|
CC-MAIN-2020-10
|
https://www.techopedia.com/definition/2271/computer-rack
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146127.10/warc/CC-MAIN-20200225172036-20200225202036-00441.warc.gz
|
en
| 0.95229 | 200 | 3.046875 | 3 |
Here’s how to start an essay:
- Write a catchy hook.
- Provide some context and background on your topic.
- State a thesis, establishing your purpose and position on the topic.
- Overview the main points you’ll cover in the essay.
- Check and revise if necessary.
In this article, we’re going to tell you how to start a college essay.
Indeed, it’s the most challenging part of essay writing for many students. They doubt everything here: how many sentences to write, what to include in the very first sentence, how to mention a thesis, what essay hook to choose, etc.
It’s time to clear up this matter once and forever.
Ready? Let’s get it started!
Table of Contents:
What is an Essay Introduction?
Here’s the mistake of most students: When searching for the information on how to start a college essay, they suppose a thesis statement writing.
Do not confuse an essay introduction with a thesis. A thesis is a part of the introductory paragraph, and it closes rather than substitutes it.
- An essay introduction is the first paragraph of your work where you grab a reader’s attention, give context on your topic, and set up the purpose of your essay.
In other words, you inform readers about what they’ll see in your essay and motivate them to keep on reading to learn more about the topic and the problem you’re addressing.
Why You Need to Know How to Start a College Essay
Students write tons of essays in college, and most of their A-worthy works fail because of poor introductions. The introductory paragraph is the first thing a professor evaluates, so a mistake in the very beginning can cost you a high grade. (Even if the rest of your essay is fantastic!)
An introduction demonstrates how well you understand a topic. It shows your critical thinking skills, your ability to separate main points and emphasize on specific issues, and your writing skills. Reading your essay introduction, a teacher sees if you can logically express your thoughts.
More than that:
Once written, your essay introduction simplifies further work for you.
Look: You’ve figured out the core issue, expressed it in a clear and brief thesis statement, overviewed the points you’ll cover – so, the following paragraphs of your paper are much easier to write now, agree?
The purpose of an introductory paragraph of your essay is to give a clear idea of what you’ll cover, provide some context (background info) on the problem you’ll address, and state your thesis (position, contention, main argument).
Yeah, we know it sounds too challenging, and that’s why some of you ask our writers for help with essays. But believe us, it’s not that difficult as it seems. All you need to remember is what to include in the introductory paragraph.
And here it goes!
The Structure of the Essay Introduction
As a rule, an introductory paragraph of your essay should have three elements: a general opening statement (a hook) to engage readers, a thesis statement (your position, response to the problem), and a brief outline of the arguments you’ll use.
With that in mind, here’s how to start an essay:
1. Write a Catchy Hook
It’s the first one or two sentences to grab a reader’s attention and provide them with some context on your topic. It sets the tone of your whole essay, so don’t hurry up and spend some time writing it.
Think of a statement that would give some background information to your topic so readers would understand what’s the problem and why it’s worth their attention. Stay brief and relevant yet intriguing: Your hook should make the audience want to keep on reading.
2. State Your Position
It’s a thesis statement of your essay — a sentence or two summarizing your focus and overall argument.
This part of an essay introduction is the most important one as it explains to the reader which aspect of the topic you’ll address and how you will answer to the problem.
In other words, establish your position and purpose of the essay.
3. Outline the Main Points of Your Essay
Provide a short overview of how you’ll approach the essay and what arguments you are going to use. It will show readers what to expect to see in your work.
And, next time when you think about how to write an introduction, feel free to use this template from Bid4Papers:
How NOT to Start a College Essay
The first impression is most lasting, and that is why the beginning of your essay should be compelling. Sure, you’ll say a final word in the essay conclusion, but your hook and thesis need to be strong enough for the audience to read your work till the end.
Here we’ll cover the writing techniques to avoid in essay introductions. They aren’t that awful but overused. Most of them have become so cliched that they make teachers roll the eyes heavenward.
So, try not to start a college essay with:
A quote. As we mentioned in the article on essay hooks, quotes aren’t bad themselves. The problem is that students use them so often, choosing too obvious or irrelevant sayings to start essays, that teachers stop taking it seriously. They want to hear YOUR thoughts.
But, if you still want to use a quote from famous people in your essay introduction, find a rare, witty, and relevant one. Don’t copy-paste the first available from quotations websites.
A definition. Opening your essay with a description from online dictionaries, you’ll make readers yawn. No one needs introductions such as “Webster’s Dictionary defines ‘truth’ as…;” most of us have Internet access after all.
But, if you still want to use a definition in the introduction, think of rephrasing it so it would sound bold, outrageous, or exaggerated. It will help to hook readers.
A too-obvious thesis. Avoid spoilers in your essay introduction. Who needs reading a 2,000-word paper if you reveal everything in its first paragraph? Leave explanations and details for your essay body to make it sound persuasive.
Essay Introduction Examples
Okay, it’s all good and well, but what about the real-life examples instead of a theoretical blah-blah-blah, huh?
First, let’s recap the introductory paragraph. (Here we’d like to thank Laura Randazzo, an experienced English teacher who shared the below template in her YouTube blog.)
Second, keep watching her video to find the essay introduction sample from her students with explanations. That’s the sample itself:
Third, check the example from the University of Newcastle experts. They took the assignment, such as “Discuss how media can influence children. Use specific examples to support your view,” and that’s what they have:
Frankly speaking, we disagree a bit with the type of hook they used: It’s a too general statement, not intriguing enough for a reader to become curious about the details. Also, this essay introduction could be shorter: Its outline part reveals the details about the arguments a student will use in the essay body. We would also avoid passive voice in this introduction.
But despite tiny nuances, this introduction is an excellent example to get the idea of how to start an essay.
And finally, what about the essay introduction example from the University of Leicester? They address the topic, “What is the importance of imitation in early child development?”
FAQ oh How to Write an Essay Introduction
Our writers get tons of questions from students on essay introduction writing. We’ve taken the top five most frequently asked, and here go the answers:
- How to write an introduction paragraph for an essay?
An introductory paragraph of your essay needs to have the following elements: a hook, a thesis, and a summary of what you’re going to discuss. Be concise, keep your summary brief (no more than three sentences), and make sure your thesis is clear and including the subject of the essay and your opinion on the topic.
- How to start an essay introduction?
The first sentence of your essay introduction is a hook. It’s a so-called attention grabber, allowing you to get readers interested in your essay topic. Types of essay hooks are many, but the most popular ones include a famous quote (relevant and rare; avoid too distinct variants which are overused and boring), a metaphor, and some interesting fact or shocking statement.
- How many sentences should be in a paragraph?
An average length of your introductory paragraph is five sentences: one for a hook, two or three for a summary (overview), and one for a thesis statement.
- How to write a research paper introduction?
As well as any other essay introduction, the one for a research paper should include a context (introduce your topic and tell about the research you are going to cover) and a thesis (state your hypothesis and rationale). Also, add a sentence about why this research is essential.
Here goes the structure of a research paper introduction from Wordvice:
- How to start a college essay about yourself?
In personal essays, your main goal in introductions is to hook readers and get them interested in your story. That is why focus on a killer first sentence. Ethan Sawyer, aka College Essay Guy, shares nine creative techniques on how to start a college essay, and you might want to consider some of them. For example, start a personal essay with a strange fact about yourself, a confession, a philosophical question, or a shocking image.
Your Checklist on How to Start a College Essay
So, let’s make this long story short. Here goes your step-by-step checklist on writing essay introductions:
- The first sentence has a hook: It’s engaging, attention-grabbing, and relevant to the topic of your essay.
- You’ve introduced the topic with necessary terms and background information: It’s clear, logical, and not boring for readers.
- You’ve stated a thesis: It shows the essay focus and explains your position on the issue.
- The essay introduction is around 5-6 sentences: one – for a hook, two or three – for a background, and one or two – for a thesis and, if necessary, a bridge to the essay body.
- Everything in your introductory paragraph is relevant to the body of your essay.
And now, over to you:
Are there any tips or practical tricks you have on how to start a college essay? Share with your peers in the comments! And remember – you can always use a pro essay maker to get a good example 😉
|
<urn:uuid:62e29435-4a80-45cf-8588-17eecc1c2b77>
|
CC-MAIN-2020-29
|
https://bid4papers.com/blog/how-to-start-a-college-essay/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00541.warc.gz
|
en
| 0.912452 | 2,300 | 3 | 3 |
Imec also presented novel designs that would allow using mono-layer 2D materials to enable Moore’s law even below 5nm gate length.
2D materials, a family of materials that form two-dimensional crystals, may be used to create the ultimate transistor with a channel thickness down to the level of single atoms and gate length of few nanometers.
A key driver that allowed the industry to follow Moore’s Law and continue producing ever more powerful chips was the continued scaling of the gate length. To counter the resulting negative short-channel effects, chip manufacturers have already moved from planar transistors to FinFETs.
They are now introducing other transistor architectures such as nanowire FETs. The work reported by imec looks further, replacing the transistor channel material, with 2D materials as some of the prime candidates.
In order to fit FETs based on 2D materials into the scaling roadmap, it is essential to understand how their characteristics relate to their behavior in digital circuits.
Imec scientists havevpresented guidelines on how to choose materials, design the devices and optimize performance to arrive at circuits that meet the requirements for sub-10nm high-performance logic chips.
Their findings demonstrate the need to use 2D materials with anisotropicity and a smaller effective mass in the transport direction. Using one such material, monolayer black-phosphorus, the researchers presented novel device designs that pave the way to even further extend Moore’s law into the sub-5nm gate length.
These designs reveal that for sub-5nm gate lengths, 2D electrostatics arising from gate stack design become more of a challenge than direct source-to-drain tunneling. These results are very encouraging, because in the case of 3D semiconductors, such as Si, scaling gate length so aggressively is practically impossible.
“2D materials, with the atomically-precise dimension control they enable, promise to become key materials for future innovations. With advancing R&D, we see opportunities emerging in domains such as photonics, optoelectronics, (bio)sensing, energy storage, photovoltaics, and also transistor scaling. Many of these concepts have already been demonstrated in the labs,” says Imec’s Iuliana Radu, “our latest results show how 2D materials could be used to scale FETs for very advanced technology nodes.”
|
<urn:uuid:f320d0a9-2144-4ef0-b8ff-cc0838a1232f>
|
CC-MAIN-2023-23
|
https://tahium.com/news/imec-enables-5nm-2d-fets/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00577.warc.gz
|
en
| 0.927115 | 523 | 3.09375 | 3 |
"Children learn, develop critical skills, and have fun when provided the opportunity for creative, artistic expression. Painting, coloring, writing, making music, and making crafts are all creative activities. Creative expression helps children articulate their feelings and thoughts." ~ Kaboom
This week we encourage you to visit (virtually) museums which we hope will inspire children and families to build, make, create, play, and learn through art exploration.
- OPL has partnered with MoCHA (Museum of Children's Art) for many years. Did you know they have recorded art lessons?
- Our neighbor Oakland Museum of California (OMCA) has also created learn at home activities.
- Exploratorium's Tinkering @ Home "is an active, hands-on approach to discovering the richness and depth of the world around you".
- The Bay Area Discovery Museum has an extensive collection of creative activities filterable by age, skill, difficulay, duration, topics and cost.
- The Purple Museum also known as the Children's Discovery Museum in San Jose offers weekly broadcasts, and at home activities.
- SFMOMA for Kids provides opportunties to watch, explore and make art.
- PBS Kids suggests Using Art to Explore Math.
- If you're looking to engage in some art appreciation the Louvre has a virtual tours and Google's Arts and Culture showcases various museusm collections.
- If you want to explore art outside, downtown Oakland is a gallery of protest art.
Art is everywhere! How do you express yourself? Please share your art photos online using the #OPLSummer hashtag.
|
<urn:uuid:958c72af-7914-42dc-af4d-3b5988535a71>
|
CC-MAIN-2020-34
|
https://oaklandlibrary.org/category/tags/art-0
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740733.1/warc/CC-MAIN-20200815065105-20200815095105-00447.warc.gz
|
en
| 0.934436 | 332 | 3.484375 | 3 |
Most horse owners have happy memories of trotting down a tree-shaded lane, riding along a stream of clear water, or cantering across an open field. Nature and horses just go together.
"Taking steps to protect the environment can improve your horse's health as well," said University of Guelph researcher Bronwynne Wilton, PhD. "More and more horse people are interested in 'going green,' saving money on fuel and energy, and protecting the natural environment."
For example, Wilton said, "If you have a pond or wetland or stream on your farm, you can improve the water quality, not just for your property but for the lands downstream, by planting a buffer strip of native vegetation along the shore. Buffer strips help to filter run-off from manure piles and fields which promote improved water quality."
This fairly simple step also reduces the risks of flooding during rainy weather.
Whether or not you have a pond or stream on your property, Susan Raymond, PhD, Communications and Program officer at Equine Guelph, recommended every horse owner should be aware of the potential environmental impact of manure.
"An average horse can produce nine tons of manure a year," Raymond said. "Without a plan, that can be pretty intimidating. When it's not properly managed, manure can be an eyesore, a health risk, and a cause of environmental damage. With good management, it can be used to enrich the soil and actually improve the environment."
Manure needs to be stored away from water sources, Raymond said, and needs to have the right amount of oxygen and moisture to promote composting so that it can be used as fertilizer. Having the manure pile on a concrete pad, with a cover to protect it from rain, and PVC pipes inserted to allow oxygen to get to the middle could work on some farms. A system of three-sided boxes built with wood slats allows the farm owner to store manure and manage it in sections as it breaks down and turns into lovely garden soil. Each time the manure is turned; it adds oxygen and keeps the composting process going.
These are just two examples of the kinds of topics Raymond and Wilton will cover in a new online course called Stewardship of the Equine Environment: Reducing Your Environmental Hoofprint, offered through Equine Guelph and Office of Open Learning, University of Guelph.
The course will also help horse owners understand some of the new legislation which might apply to them and give the students tools to identify areas where they can improve their environmental management.
"The horse industry grew by almost 17% between 2001 and 2006," said Raymond, "and we now have more than 380,000 horses in Ontario. There's the potential for a significant environmental impact--either positive or negative. We find horse owners generally care about the land, and want to protect it."
The course is part of Equine Guelph's diploma program, but can be taken on its own. Visit the course Web site for more information.
Read more about the Eco-Friendly Farm.
Disclaimer: Seek the advice of a qualified veterinarian before proceeding with any diagnosis, treatment, or therapy.
|
<urn:uuid:2c1993ca-0611-4f1d-a678-b29f849cb4b2>
|
CC-MAIN-2014-23
|
http://www.bloodhorse.com/horse-racing/articles/53833/going-green-environmental-stewardship-for-horse-owners
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894275.63/warc/CC-MAIN-20140722025814-00188-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.94932 | 651 | 3.0625 | 3 |
The Klingons are an alien race from the science fiction series Star Trek.
The Klingon Empire was founded around 500ce by Kahless the Unforgettable on the Klingon homeworld, Qo'noS, and is still going strong nearly 2,000 Earth years later.
In 2267 the Klingons and the Romulans forged a military alliance and the Klingons traded several D7 battlecruisers (Birds of Prey) in exchange for some cloaking devices.
In 2293 the atmosphere of Qo'noS was contaminated when Praxis, one of its moons, exploded. This event was a turning point in relations between the Klingons and the United Federation of Planets, as the Klingon Empire couldn't afford to maintain their excessive military activities and deal with this new problem. Thus, the Federation and the Klingons entered an alliance which lasted, I believe, about eighty years, ending in 2372 when the Klingons attacked the Cardassians. (Star Trek VI: The Undiscovered Country, The Way of the Warrior, Part I and Part II)
In 2342 the Klingons and Romulans began a violent war after the Romulans attacked the Klingon outpost Narendra III.
In 2357, Worf, Son of Mogh became the first Klingon to enter the Starfleet Academy and in 2364 he was assigned to the NCC-1701-D as relief conn and tactical officer. (Rank: Lieutenant j.g)
In 2367 the Klingon Civil War began after Chancellor K'mpec was murdered. Prior to his murder, K'mpec had named Captain Jean-Luc Picard his Arbiter of Succession. Gowron was selected, but the House of Duras opposed this decision and the war began. It was later revealed that the Romulans were backing Duras and and Duras quickly lost all support, ending the war and putting Gowron as leader of the empire. (Redemption, Part 1 and Part 2)
Around 2370, they joined in an alliance with the Federation against the Dominion.
Shortly before the end of the Dominion War (When It Rains...), Worf murdered Gowron for using bad tactics in the war simply to hurt General Martok's political position. Worf then granted the role of Chancellor to Martok rather than taking it himself.
In 2375 the Federation-Romulan-Klingon fleet defeated the Dominion with the assistance of the Cardassian fleet during a final assault on Cardassia Prime. (What You Leave Behind)
Leaders of the Klingon Empire include:
The Klingon Language (thlinang Hol) was created by Marc Okrand. The Klingon Language Institute (KLI) puts out a newsletter called Qo'noS QonoS and a quarterly journal, HolQeD. There is also a programming language based on Klingon: Var'aq.
Terms and phrases that have been noded include:
This writeup is licensed under the GNU Free Documentation License and the Creative Commons Attribution-ShareAlike License. (Use whichever you prefer.)
|
<urn:uuid:49c296d0-a23f-4e69-9218-f25dfb60ed81>
|
CC-MAIN-2020-34
|
https://m.everything2.com/title/Klingon
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735964.82/warc/CC-MAIN-20200805183003-20200805213003-00507.warc.gz
|
en
| 0.94533 | 629 | 2.84375 | 3 |
On this date, Martin Luther King, Jr., was born in Atlanta, Georgia. The civil rights leader, Baptist minister and founder of the Southern Christian Leadership Conference believed in a strict separation of church and state. Although his many speeches are peppered with references to Jesus and God and often depend for the force of their authority upon “the natural law of God,” the Rev. King knew that the religious status quo tended to support segregation. In his famous “Letter from Birmingham Jail,” dated 16 April 1963, King revealed his pique at continued criticism of the civil rights movement by clergy, pointing out that Sunday morning is the most segregated hour in the country:
In the midst of blatant injustices inflicted upon the Negro, I have watched white churches stand on the sideline and merely mouth pious irrelevancies and sanctimonious trivialities. . . . [H]ere we are moving toward the exit of the twentieth century with a religious community largely adjusted to the status quo, standing as a tail light behind other community agencies rather than a headlight leading men to higher levels of justice. . . . The contemporary Church is so often a weak, ineffectual voice with an uncertain sound. It is so often the arch-supporter of the status quo. . . Is organized religion too inextricably bound to the status quo to save our nation and the world?
- Martin Luther King, Jr., “Letter from Birmingham Jail,” 1963
|
<urn:uuid:03bbd589-3bf1-4203-8f35-3bcc56eb7ac1>
|
CC-MAIN-2020-24
|
https://diogenesii.wordpress.com/2014/01/15/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347387155.10/warc/CC-MAIN-20200525001747-20200525031747-00590.warc.gz
|
en
| 0.961341 | 299 | 3.46875 | 3 |
Recent motor shows show a small number of emerging trends that will give very few benefits. The most overhyped theme is hydrogen fuel while truly useful features, including better steering and bigger doors, are hidden behind the gloss. Avoid the junk over the next five years and get read for some real improvements in car design after 2010.
All the recent motor shows show a small number of emerging trends that will cost you money and give very few benefits. Some trends will eventually be useful. Avoid the junk over the next five years and get read for some real improvements in car design after 2010.
The common themes are hydrogen fuel, better steering in tight spaces, and cars that have bigger doors.
Hydrogen produces very little power which is the reason we use carbon for fuel. The lack of power makes hydrogen an alternative to safe, clean, pollution free electric cars but not an alternative to carbon based cars.
Carbon provides the grunt power for heavy loads and long distances. Hydrogen might survive as a fuel for driving short distances in crowded cities but electric cars are already doing a better job in that market. Hydrogen is promoted for suburban driving but hybrid petrol/electric cars are already doing a better job in that market.
I live in Australia. Australia is hot and we drive long distances. Most of the cars sold in Australia are designed for driving short distances in the cold. Both batteries and hydrogen work for short distances. Hydrogen has just one advantage over batteries and that is sustained performance in cold weather where batteries lose power. Hydrogen makes sense for northern Japan, Korea, and Scandinavia.
For Australia the lost of battery power in cold weather is only relevant to the vehicles we send to our research stations in Antarctica. Hybrid petrol/electric cars work over our long distances. Hydrogen has no advantages in Australia and has lots of disadvantages. Expect the hydrogen car to get lots of sales here among the fashion victims and expect most of the "hydrogen powered" cars to use more electricity and carbon than hydrogen.
The world's worst polluting petroleum products contain some hydrogen. The hydrogen makes those fuels liquid instead of solid black coal. If governments let you sell hydrocarbons as
hydrogen based fuel then all liquid fuels can be called hydrogen fuels. When you are driving a big fat heavy gas guzzling American car, start talking about the car's
hydrogen based fuel.
Hydrogen has to come from somewhere. You need power to produce hydrogen. Where will all that power come from?
Fuel cells convert fuel to electricity and gas at room temperatures. You can plug a fuel cell in to your notebook computer and use the notebook continuously on a 35 hour flight from Tasmania to Scotland. Every few hours you pour in a little more fuel. The fuel can be vodka; which is readily available on most airplanes and is usually tax free. Those fuel cells are often sold by marketing people as
hydrogen fuel cells.
Real hydrogen fuel cells use pure hydrogen and the only country currently implementing pure hydrogen is Germany. Germany does not state the source of the electricity used to create the hydrogen.
Marketing people often use
hydrogen fuel cell and
fuel cell together when talking about hydrocarbon fuel cells which convert both hydrogen and carbon to electricity. Some of the hydrocarbon fuel cells use the high energy of the carbon atoms to strip oxygen from hydrogen in water, giving you a pure supply of hydrogen for a hydrogen fuel cell. You feed in a mix of hydrocarbon and water. The first stage of the hydrocarbon fuel cell produces carbon dioxide and hydrogen. The second stage mixes the hydrogen with oxygen and produces water plus electricity.
The fuel for current fuel cells is alcohol. Common vodka is 40 percent alcohol. The fuel cell converts the carbon from the alcohol in to power. The hydrogen in the alcohol makes the alcohol liquid at low temperatures and provides a token extra dash of power. Unfortunately alcohol has too much hydrogen to remain liquid in the heat of Australia which means the alcohol will have to be mixed with, or replaced by, a heavier liquid. The water in alcohol helps the alcohol remain liquid at slightly higher temperatures but not high enough for use in cars.
Hydrogen fuel calls are impractical unless you have very high pressure storage for the hydrogen and high pressure tanks are not allowed in airplanes. They can be used in cars but the addition of small amounts of carbon is far easier and safer than those high pressure tanks. Expect the fuel cell industry to push dual carbon/hydrogen fuel cells and to hide the fact that they are hydrocarbon fuel cells. Expect the suppliers of hydrocarbons to start selling
hydrogen fuel that is liquid at room temperature without pressure.
Nuclear power plants can feed electricity direct in to electric cars. If that electricity is diverted in to hydrogen powered cars then the electricity has to go a factory that produces hydrogen. The factory will be waste most of the electricity producing hydrogen. You then have to transport the hydrogen to the refuelling stations where you will waste more power compressing the hydrogen in to the heavy expensive hydrogen storage tanks.
If you feed nuclear power direct in to electric cars then there is no conversion loss and much less transport loss. Customers can recharge at normal food and shopping stops instead of special hydrogen refuelling stations. Batteries weigh the same or less than hydrogen storage tanks. You can recharge a battery at every stop which means you can use batteries that are much smaller and lighter than the huge heavy hydrogen tanks.
Plants produce lots of liquids containing hydrogen. Can we use those liquids as hydrogen sources? Yes. We already use alcohol from plants as fuel.
Most of the "hydrogen based" fuels from plants are standard everyday hydrocarbons the same as petroleum. All the fuels contain carbon. All the fuels produce carbon dioxide when used. The difference with using plants is that the plants take as much carbon dioxide from the air as they place back in the air. If we use plant based fuels then we maintain a carbon balance.
Those lovely aromatic oils we extract from plants are all hydrocarbons. You could use a $500 drop of rose oil to fuel your notebook computer for a few minutes. Your $88,698.90 bottle of Gianni Vive Sulman Parfum VI could seduce a beautiful woman for the night or propel your fuel cell car for 20 seconds.
In cold climates you can use a variety of common methods to convert plants in to a clean fuel named alcohol. In hot climates you need something heavier and oil from plant seeds converts easily in to bio diesel which works in cars and trucks during extreme hot weather. If your climate is somewhere in between hot and cold, simply mix bio diesel with alcohol.
Hydrogen hates to be stored. Hydrogen atoms do not stick to neighbouring hydrogen atoms without intense pressure and extreme cold. You cannot safely maintain the extreme cold in a car or the intense pressure in a crash. How do you store hydrogen?
One way is to add an absorbent material to hydrogen tanks. This makes hydrogen tanks almost exactly the same as conventional car batteries and is one reason why batteries are better than hydrogen.
The easiest way to store lots of hydrogen is to add some carbon atoms. The carbon atoms link up the hydrogen atoms in dense liquids that are easy to store in small light weight tanks. The carbon atoms also provide far more power than the hydrogen atoms which means you use far less fuel. This is why we currently use carbon based fuels.
Some of the
hydrogen fuel cells are actually carbon/hydrogen hybrid cells that process carbon to provide power and process hydrogen so they can be labelled Green. The extreme pressure and expensive absorbent materials used in hydrogen storage tanks makes them no more green than the better choices from modern batteries. The addition of some carbon to the fuel suddenly makes the storage problem go away.
One consistent problem with modern cars is there large turning circle which means you cannot turn easily on narrow roads or park in difficult spaces. Most modern cars use front wheel drive which means the power has to go through flexible shafts to the front wheels. Those flexible shafts are not flexible enough to let your car turn in a small space.
One reason I have not traded my twenty year old car in for a shiny new car is that I cannot find a well designed modern car with a small turning circle. My car can turn inside 10 metres which lets me turn out of my house on to the local road using only one lane of the road. The closest modern equivalent car has a turning circle of over 11.5 metres. That extra 1.5 metres means I my car would need two lanes of the road to complete the turn. I would have to wait for both lanes of traffic to be empty before driving out on to the road. I can give numerous other examples of occasions when I was able to drive my car somewhere where an equivalent sized modern car can not go.
Toyota's Fine-X show car shows the way for the future. The Fine-X does what I suggested back in the 1980s before the technology was ready. The Fine-X bypasses the petrol/electric hybrid and goes straight to the type of system called diesel electric when used on trains. Instead of using an electric motor to supplement the diesel or petrol motor, you commit the engine to generating electric power. You place an electric motor on each wheel and drive the electric motors from a mixture of power sources and batteries.
When you have an independent electric motor on every wheel, you can turn all the wheels to get faster tighter steering. You can turn all the wheels at one and you can turn every wheel further than you can with standard mechanical drive systems. Your car should be able to turn within it's own length. You can park in the spaces that other people envy.
The diesel electric approach has several advantages. You do not have to use diesel. Diesel is great in Europe where it is common and cheap. In Australia diesel is common in the country but not common in the city. In Australia diesel is far more expensive than conventional petrol. If you disconnect the hydrocarbon power source from the wheels then you can use any power source or even multiple power sources. You could have a small diesel engine next to a small petrol engine.
The important part of diesel electric is the electric part which means you can use batteries and you can recharge the batteries using power generated from braking. The batteries provide the peak power which means you need only a small petrol engine to charge the batteries while you are cruising along or stopped at the traffic lights. You can top up the batteries with cheap off peak electricity while at home.
Australia and some other countries have cheap off peak electric power but do not have provision for charging electric cars. The power companies should start now with off peak charging systems. Have one power socket in the garage connected to the off peak system so that people start buying electric cars. People will top up their hybrid cars today and move to full electric as batteries are improved.
The full electric car gives you all the advantages of all wheel drive, all the advantages of hybrid power systems, and lets you turn in to spaces where no one else can go.
Cars are getting smaller which means smaller doors. People are becoming older which means they need bigger doors. The only alternative today is to stop buying cars and by the type of vehicle called a 4WD in Australia and an SUV in America. Car makers are experimenting with sliding doors and dual opening doors where the front and back doors both open from the middle of the car. Both types of doors will become more common because people are getting less room to open their doors.
I tried to park an average size car in the garage of a modern building and found the garage to be a tiny size suitable only for a 1940s style Morris Minor. If the car had sliding doors then I could get in and out of the car without having to breath out. Using that car in that garage would be practical instead of an extreme Yoga session.
The move to bigger doors is accompanied by a move to make the top of the doorway higher and squarer so that you can get your head out of the doorway without concussion or a visit to the chiropractor. Modern diets include more dairy products which means taller people. Up until this year only Mercedes made tall small cars. A couple of years ago Toyota made their Camry a token two centimetres taller. This year they released the Kluger which shared most components with the Camry and is another few centimetres taller.
In the future the Japanese manufacturers will all have small cars that are tall. The Toyota Fine-X has an almost square doorway to give you better head room. They choose an attention grabbing gull-wing doors but the same body shape would make a fin match for sliding doors.
Expect the Europeans to copy the Japanese in a couple of years and the Americans to copy the Europeans several years later. In fact the only hope among American cars is the German owned Chrysler who managed to repackage the headbangingly short Neon as the acceptable PT Cruiser before the Germans stormed Chrysler's board room.
Expect more clones of the Mercedes A series and M series. Expect cars with shorter fronts, shorter backs, and longer middles with wider doors. Expect sliding doors to jump from a few rare people movers and some vans to the everyday car.
|
<urn:uuid:71ddd381-2123-468e-96f9-1e01dd3bacdc>
|
CC-MAIN-2013-20
|
http://petermoulding.com/cars_of_the_future
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703788336/warc/CC-MAIN-20130516112948-00051-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.948496 | 2,697 | 2.875 | 3 |
It has always been something of a mystery to me as to why the empty tomb is not the official symbol of Christianity rather than the cross. Resurrection and hope were the promises of Christ and the empty tomb seems a fitting symbol of that promise -- a permanent monument to the defeat of death.
In mythology, the cycle of the god and goddess always take the same form: god is anointed by goddess, god is sacrificed, god is resurrected and appears to goddess in a garden. Christianity has all the elements of the story but by and large focuses on the sacrifice rather than the resurrection -- except this time of year! This time of year the focus returns to the promise of resurrection, the promise that something outshining the shadow of death.
Dreams of tombs or graves may be interpreted in a similar fashion -- the meaning coming from where the dreamer places her emphasis. While tombs represent death and burial, they may also represent rebirth. Sometimes we hold on to things -- relationships, jobs, outdated ways of being -- that should have been buried long ago. Sometimes these are aspects of ourselves that should be honored in the way that one honors the grave of an ancestor, but they are not aspects that we should honor by clinging to them. "Noli me tangere" as Christ said -- "Do not cling to me." It depends on where one's focus is on that which has been buried -- clinging to that which is no longer of service, or honoring it by letting it go so that resurrection can commence.
This does not mean that grief should not be experienced in the letting go. Any type of death requires mourning - mourning and possibly anger over the loss. It is important to express and acknowledge these feelings. It is equally important to place one's faith in what comes after the mourning period -- the morning, the daybreak, the resurrection of the new.
A tomb or grave in a dream may also indicate that parts of one's self that have been "buried" will come to life once again. It may be that one has gone underground after an emotional hurt or pain and has been waiting for the right time to resurface. Again, the meaning comes from where the dreamer places her focus -- on the event that caused the pain, or on that which allows her to arise from the grave.
When thinking of graves, think of the image of the Magdalene who went to the garden to grieve but instead found cause for celebration.
Until next time, sleep well and dream out loud!
*~Aisling Ireland~* is an ordained Spiritual Counselor providing dream interpretation and Tarot readings. To make an appointment check out her website at: web.mac.com/aisling.ireland
|
<urn:uuid:7953a682-6178-4651-a389-3bdf255da6a5>
|
CC-MAIN-2017-43
|
http://www.bellaonline.com/articles/art29573.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00118.warc.gz
|
en
| 0.9571 | 555 | 2.734375 | 3 |
(Cinnmomum cassia, C. zeylandicum)
The fragrance of hot mulled cider, the spicy comfort of warm apple pie, the soft texture of a freshly baked cinnamon bun and the alluring coziness in a cup of chai tea all share the luxurious wealth of our beloved ancient herb Cinnamomum. Although everyone is familiar with the long curled sticks that look so pretty in a potpourri, many people are unaware of the many grades of cinnamon or prevalence of the closely related spice, Cassia (C. cassia) that is commonly sold as Cinnamon.
Over 90% of the world’s true Cinnamon (C. zylandicum) is grown in Sri Lanka, and is mostly prized as a culinary ingredient; its smooth flavor is much milder than Cassia, and costs a bit more. The cultivation of this cherished spice requires that young saplings –about two or three years old- be coppiced, that is, cut to the ground and harvested, subsequently, young shoots will spring up the following year, and the cycle is renewed.
The inner layer of the coppiced shoot is separated from the outer bark after a fermentation period of 24 hours. This thin, moist cambium layer naturally curls as it is dried, first in the shade, then in the sun, overall for about 3 or four days. These “quills” are about ½ inch in diameter may be inserted into larger rolls and bundled into “pipes” for export. The processed quills of Cinnamon are evaluated and sorted; the thinnest, finest textured quills are graded “00000”, while the coarsest quills get a “0” designation. The “quillings” are broken bits of cinnamon that chip off during drying and sorting, and these are sold for considerably less.
It doesn’t take long for powdered cinnamon to lose its flavor, as the volatile oils evaporate quickly, therefore Cinnamon should be purchased whole to be ground at home in a spice mill or in a coffee grinder used only for spices. Poor quality Cinnamon and the rough bark of Cassia may damage home grinders if they are too coarse; the finer the quality of Cinnamon, the more easily it crumbles. Ceylon Cinnamon is considered to be of the highest quality obtainable.
C. Cassia is a very close cousin to Cinnamon, and is legally allowed to be sold as such in both the US and France; in other parts of Europe and in Australia, it is illegal to misrepresent Cassia as Cinnamon. Cassia often includes both the inner and outer bark and is harvested from tree at least seven years old; it has a much sharper and bold flavor and is valued as an herbal remedy more so than true Cinnamon.
Native to China, Cassia has a long history of use in Traditional Chinese Medicine (TCM), primarily for the treatment of “Cold Central Qi.” Rou gui, as it is called in Pinyin, is a wonderfully warming herb that can help restore libido, bring strength to a weak lower back, relieve certain types of asthma, increase the appetite and stop watery diarrhea. When symptoms are associated with chilliness and lassitude, Cassia is the go-to herbal pick-me-up.
As for a medicinal diet, Cinnamon/Cassia is the perfect accoutrement for our damp, cold winters. Flavoring meats, soups, squash, teas and baked goods with this sweet and spicy seasoning not only helps improve digestion, but it brings our core temperature up while allowing the surface of our body to acclimate to blustery weather conditions.
Current medical studies are researching the use of Cassia for the treatment of a variety of conditions including insulin dependent Type II Diabetes; one study found compelling evidence to support the use of cinnamon/cassia, but subsequent studies have not been able to duplicate the positive results. So, although it appears that Cinnamon/Cassia may lower blood sugar, the jury is still out on its effects on Type II Diabetes. In any case, modest amounts of the spice can improve digestion and may even lower cholesterol, just be cautious if you are taking blood thinning drugs or are pregnant.
The twig of C. cassia is known as Gui Zhi in TCM and is used in a slightly different way; when taken at the onset of a cold exhibiting such symptoms as an excessively runny nose with clear mucous, chills, and aversion to draughts, Cinnamon Twig will help push the illness back out of the body. If the normal attempts at getting up a good sweat don’t begin to resolve this pathogenic invasion, Cinnamon Twig is generally very helpful, particularly in combination with fresh ginger.
Cinnamon Twig is also great in a formula when it comes to some cases of Renaud’s Syndrome because it can help lead warmth out to the extremities and assist poor circulation. I use it with many clients in a custom built formula that also addresses the underlying issues, often with herbs that nourish the blood and move stagnant Qi. When I add ear reflexology to the treatment, my clients and I literally watch their fingers turn from white or purple to a healthy pink color.
I also have available in my pharmacopeia the essential oils of Cinnamon Bark and Cinnamon Leaf; both are energetically very hot in nature and must be applied with a carrier oil, or sandwiched between milder oils. I use either of them for skin parasites like lice or scabies, or for intestinal parasites by applying the oil –diluted or specifically layered- to the belly and putting a couple of drops in rice to be eaten. For achy muscles and joints, I use different layers of healing oils, including Cinnamon, to create a natural icy/hot combination that brings fast relief.
Cinnamon Bark essential oil can eradicate a plantars wart in about two weeks; use it undiluted directly on the wart after showering and immediately put on a sock. It helps to open up the wart and to pull out the roots with tweezers. Cinnamon Leaf essential oil is a great natural way to get rid of the spider mites that seem to thrive in the dry indoor environment while our houseplants are overwintering. Simply add 40 drops of Cinnamon Leaf essential oil to 4 oz of water in an atomizer and mist the plants daily.
Please remember that the medicinal-grade essential oils that are used safely in therapy are NOT the ones you can readily buy at a retail establishment. Feel free to contact me for quality oils, I am happy to help. Also, a word of caution about the Cinnamon essential oil: it is VERY hot!! Do not put it anywhere else on your skin because it will burn like the dickens (although so long as it’s medicinal-grade, it should do no permanent damage).
If, despite caution, the oil still manages to burn you, DO NOT wash the area with water!! The nature of essential oils is to be absorbed by oil/fat (your skin cells) and repelled by water, so washing with water will only serve to intensify the burn by thrusting the oil faster into your fat cells. The best thing to do if you feel the burn is to apply a heavy amount of any type of oil you have on hand, (olive, sesame, canola, vegetable) and the heat will diminish in a few moments.
Cinnamon is a well-known aphrodisiac, and certainly the smell of it cooking is no deterrent to cozy feelings of intimacy. The oil, when used intentionally, can help individuals and couples get to the core of their issues, bring more closeness to a relationship and help open up communication. Once valued more than its weight in silver, Cinnamon is a treasure we could all take a new look at.
Please call 8 6 0 - 4 8 0 - 0 1 1 5 or email [email protected] if you have any questions, would like to schedule an appointment or are interested in participating in classes, workshops or retreats.
|
<urn:uuid:1417c93e-da3b-4671-8f07-bb082692111a>
|
CC-MAIN-2014-23
|
http://herbalisl.blogspot.com/2011/02/cinnamon-let-me-in.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997888283.14/warc/CC-MAIN-20140722025808-00126-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.93827 | 1,672 | 2.515625 | 3 |
Asian Civilizations - Ancient to 1800 AD
Asia is the world's largest and most populous continent. This book features the empires and civilizations that sprang out of the five regions of Asia – West Asia, East Asia, South Asia, Central Asia and Southeast Asia.
Let’s take a journey through time and space to the five Asian regions and discover the great conquerors of the ancient land. Explore how these civilizations have influenced the world we live in today and thus, gain a better understanding of Asian history and culture.
Who are the great conquerors of ancient Asia? How have these civilizations influenced the world we live in? Filled with plentiful information and accompanied with stunning illustrations by Philip Tan, this book will give a quick overview on the expansive history of Asian civilization. Give this a read on to find out more!
Written by Lim SK
Illustrated by Philip Tan
Size: 150 x 210mm
|
<urn:uuid:53c13237-b334-4965-897a-dfbf326bc897>
|
CC-MAIN-2020-16
|
http://asiapacbooks.com/products/asian-civilizations-ancient-to-1800-ad
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510287.30/warc/CC-MAIN-20200403030659-20200403060659-00482.warc.gz
|
en
| 0.862347 | 185 | 2.953125 | 3 |
Newswise — The study of creativity has a long history. Creative people include those who have the potential to offer progressive ideas, modernize, and implement innovations. Over 16 years, South Ural State University researchers have kept track of the pupils of a Chelyabinsk lyceum. This multi-year research allowed researchers to test the concept of developing children’s aptitude and determine resources which allow children to maintain and develop their intellect and creativity for many years.
A 16-year Research Project
Intellect and creativity are absolutely necessary qualities for modern people and have great value in science, business, politics, and art – in all of the dynamically-developing spheres of life where competition is fierce. The creative class of people are the ones who determine the development of any society or country. SUSU professor Vera Gryazeva-Dobshinskaya has developed a sociopsychological concept for developing children’s aptitude: “Gifted Children: the Ecology of Art”. Under her guidance, scientists of the laboratory of Psychology and Psychophysiology of Stress Resistance and Creativity of the SUSU School of Medical Biology research the links between intellect, creativity, and adaptive resources among children. Yuliya Dmitrieva is one of the research staff of the laboratory.
“Several years ago, the group of researchers, under the guidance of Doctor of Sciences (Psychology) Professor Vera Gryazeva-Dobshinskaya and Candidate of Sciences (Psychology) Vera Aleksandrovna Glukhova completed a research project – parts of a large, longitudinal research in which around 500 children studying in a lyceum in Chelyabinsk took part. The goal for this research was to determine the characteristics of creativity and also determine resources for adaptivity to determine strategies for these children’s development in the future,” explains Yuliya Dmitrieva.
Creativity is the potential of man which can change and, undoubtedly, is determined by the conditions in which children’s social adaptation occurs in classrooms and at the school. In certain facilitating conditions, creativity can develop and grow, but in non-facilitating conditions – they can remain the same or even decline. So SUSU researchers completed a study aimed at determining the connections between creativity, intellect, and personal adaptive resources among children.
Studying the Creativity of Schoolchildren
Children’s time studying in school is very important for their social adaptation. Often in schools, children are required to meet a certain standard. In many cases, unfortunately, this leads to conflicts between a child’s creative potential, their creative initiative, and the necessity of meeting norms.
“Our research involves defining characteristics of creativity and identifying options for combining them with children’s personal adaptive resources beginning from preschool age. This study is aimed at determining the interrelations of these phenomena (creativity and adaptive resources) at various levels of originality, and the development of these ideas as a specific characteristic of creativity among children,” continues Yuliya Aleksandrovna.
All of the children who participated in the research were divided into 4 groups according to their level of originality and the development of their ideas.
“To obtain credible results, we used a set of reliable psychodiagnostic methods. For the psychological identification of creativity and its main characteristics, we used the E. Torrence test. This test includes 4 independent scales “fluency”, “flexibility”, “originality”, and “development”. For the psychological determination of a child’s level of intellect, we used a children’s form of the Wexler WISC intellectual test. To determine the creative and adaptive resources of individuals such as intellectual control, reality and complexity of perception, and types of experiences, we used the Rorschach test,” says Yuliya Dmitrieva.
Diagnostics for Successful Education
According to the results of the study, a mathematic model of creative and personal adaptation resources was built. It was found that children with a high level of originality and development, personal adaptive resources, intellect, and creativity were integrated in to a single, interconnected system. For these children, creativity is an expression of their personality, takes into account the reality of their environment, and is associated with the use of their intellectual resources. Children with a low level of originality and development of their personal adaptive resources did not have connections between their intellect and creativity.
“The mathematical model that we obtained from our work can be used to predict the development of creativity and personal adaptive resources among young schoolchildren and the deployment of a differentiated approach to education for such children. This will allow them to study successfully in school, maintaining and developing their intellect and creativity,” stresses Yuliya Aleksandrovna.
The results that SUSU researchers obtained are already being used in the work of Chelyabinsk psychologists in working with gifted children. The results of this multi-year study are being prepared for publication in a highly-rated research journal Psychology in Russia: State of the Art, which is part of the Scopus and Web of Science scientometric databases. The results were also presented at the Russian Research and Pedagogical Forum “Modern Children: What Are They Like?”, one section of which, “Development of the Intellect of Modern Children”, was organized at South Ural State University.
MEDIA CONTACTRegister for reporter access to contact details
Psychology in Russia: State of the Art
|
<urn:uuid:75e14672-db34-41c6-a107-7854178c27d0>
|
CC-MAIN-2023-14
|
https://www.newswise.com/articles/wunderkind-or-innovator%3F-susu-researchers-have-come-up-with-a-concept-for-developing-children%E2%80%99s-aptitude
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00471.warc.gz
|
en
| 0.949627 | 1,155 | 2.875 | 3 |
Practice dividing whole numbers with this engaging math board game! You will need to provide a dice (or spinner) and a set of game pieces.
Students will practice 41 dividing whole numbers problems during this game. Math board games are perfect to use for small group stations, partner practice, or whole group review.
In this resource, you will find:
-Directions Page for Students
-Board Game with 41 questions
-Recording Sheet for Students (5 different options!)
Looking for a way to engage your students' families? Use this as a fun homework assignment!
*Printer Friendly Resource! All pages are in black ink ONLY. If you are looking to add color, feel free to print on colorful cardstock.
Directions To Play:
You'll need a dice or a spinner for each game board and a game piece for each player. The person whose name comes first in alphabetical order will play first in the game. Roll the die and move that number of spaces on the game board. Each person will solve the problem on their own recording sheet. Everyone will double check their answers with each other. If you have the same correct answers, the next person should roll the die. If you have different answers, discuss it with your team. Find a mistake in your work or try to solve the problem again, then the next player may go. If you land on a space with an arrow, you must solve the problem before moving to the next space. If you finish early, play the game again.
*This game is included in the 5th Grade Year Long Game Board BUNDLE
Questions or comments?
Please email me at: [email protected]
|
<urn:uuid:288db120-1988-4b7f-be21-d3cd4e50d265>
|
CC-MAIN-2017-34
|
https://www.teacherspayteachers.com/Product/Divide-Whole-Numbers-Board-Game-1781870
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104631.25/warc/CC-MAIN-20170818082911-20170818102911-00112.warc.gz
|
en
| 0.911602 | 354 | 3.921875 | 4 |
First she sounds if she will not be accessed in such a place: Dublin creates characters all with a different conclusion, which makes this method easy to relate to. Later in the same time, when Capulet's party is breaking up, Jennifer sends the Beginning to find out Caleb's name.
William Shakespeare even made up many in his plays that are essentially used today. Bad reason is that it is a word that includes romance violence and many other topics and it eventually ends with the hotly character dying.
You have to ask has to your English teacher, which i might add i have an expected English teacher. What are two ways Shakespeare uses foreshadowing and make in Romeo the death of the two elements and using american to show how they were ruled to die since the archival, what was one other exotic nbsp; Roman Mythological Allusions and Resounding Unity in Romeo and May interprets formal elements in.
Many centres are banned from dating each other due to your differences in cultural, revisionism or racial backgrounds. The two conflicting families in the draft stopped their work when their kids were meant, but it can teach us that we should give arguements before they get out of voice.
Additionally, the analysis we ask in any of other of literature is to common their brains to learn how to earn anything: However, only in few ideas, he has included a complete form of a particular. The next and last thing she will see him is time after he has emerged himself in her brighten, believing that she is thought.
Knowing the story, plots, lessons, and tone will also consider students to better understand more paras and even simple mistakes like clever quips in daily interactions and possibly even professional shows. Style though the language is difficult to figure I would know it is still a topic story to learn because of the things it can teach us.
Benvolio laurels that Romeo might find somone new there, masterpiece than Rosaline. The chorus reaffirms to the audience that for the next two areas, they will cultivate a doomed love story of these two politicians, which suffers due to enmity between your parents.
Shakespeares plays describe how vulnerable was like back then and what your vocabulary was. Or, she says, the Topic could. There is no tangible love, they are literally 13 and Informal how i personally think Will and Juliet just wants your thinking skills, but i will add it does make you think a very conscious amount.
So then everyone will throw that you are smart. As it makes out, he does get her lab, and dies for it, too. Inevitably the poetry and the beautiful young of certain people such as love statistics an older and more quantitative and lovely way of things. The does 39; frequent thoughts of death: It is a very different story that we should know about.
I can also contact more words and expand my time by understanding and using the big rewards used in this play. I also make we should study Romeo and Juliet because it gives us a glimpse at what made was like back then.
When or maybe he just wanted to get rid of so. Everything depends on how do powers are used; too much of a particular thing is dangerous, and a bad route can sometimes be used for new.
Also to learn that if something bad puns, it can solve your thoughts, even if its really sad. Act II Triangle Now old son doth in his death-bed lie, And hyperbole affection gapes to be his post; That fair for which love groan'd for and would die, Join tender Juliet match'd, is now not necessarily.
Romeo knows he has reached a teacher of no return; he will find Tybalt to ensure Mercutio, but he knows that won't be the end of anything. It will also consider us because of the languge that it is only in because then it helps us know different cultures and how they belong.
Another reason to study this point is to learn about the time searching it was written in.
Species have also claimed that he has impacted the two genres of causation and drama in his meaningful tragic love story Clinton and Juliet.
However, in the end, she leaves in to the information of Romeo and they kiss, ending the false. Overall I think that paraphrasing Romeo and Juliet has a lot of subjects and I hide that its good to study it. Gift Analysis of Romeo Romeo and Juliet:.
There are a few motifs in Romeo and Juliet that reveal this intention. The first is the recurring motif of death. In Act I, there are several moments where the characters foreshadow the death to come. After she meets Romeo, Juliet states, "If he be married, / My grave is like to be my wedding bed" ().
A summary of Act 2, prologue–scene 1 in William Shakespeare's Romeo and Juliet. Learn exactly what happened in this chapter, scene, or section of Romeo and Juliet and what it means. Perfect for acing essays, tests, and quizzes, as well as for writing lesson plans. In Romeo and Juliet, by William Shakespeare, foreshadowing is used to predict outcomes of the play and express love, which Juliet and Romeo share for one another.
Many Shakespearean writers exploit the use of foreshadowing to make there writings all the better. Foreshadowing Essay Examples. 33 total results of the Foreshadowing in The Grapes of Wrath, a Novel by John Steinbeck. words. 2 pages. The Use of Foreshadowing in the Act II of Shakespeare's Romeo and Juliet.
words. 1 page. The People in the Kite Runner of the Afghanistan History The Use of Irony and Foreshadowing to Prove the. The theme of love, which is characteristic of Shakespeare's comedies, also sets Romeo and Juliet apart from other tragedies.
In fact, the first two acts of Romeo and Juliet contain elements of comedy before the tone turns more tragic. One of many moments of foreshadowing in the play is in act 1, scene 4, wherein Romeo's friends are wanting him to go to the Capulet ball.
Romeo, however, in linesexpresses that he fears.The use of foreshadowing in the act ii of shakespeares romeo and juliet
|
<urn:uuid:bf31ad73-b2fd-4682-b3e8-cd486b66150b>
|
CC-MAIN-2020-10
|
https://nezotoqalodevih.lemkoboxers.com/the-use-of-foreshadowing-in-the-act-ii-of-shakespeares-romeo-and-juliet-29605gp.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146665.7/warc/CC-MAIN-20200227063824-20200227093824-00135.warc.gz
|
en
| 0.970253 | 1,290 | 3.015625 | 3 |
Information on penguins is available at the National Geographic and the Defenders of Wildlife websites. Some universities also publish research information about penguins on their websites.Continue Reading
The National Geographic website provides information about different types of penguins, such as Adelie, emperor, gentoo and rockhopper penguins. The site includes the locations of the penguins on a world map, their diet and average life span in the wild, and other facts about these flightless birds. National Geographic also provides photos and videos of penguins and other types of birds.
The Defenders of the Wildlife website features basic facts about penguins, including their diet, range, population, reproduction and behavior. Since the site is dedicated to protecting the animals in the wild, it also includes information such as the protection status of the penguins, various threats to the birds and what the organization is doing to help save the penguins.
The online research portal of the University of Illinois at Urbana-Champaign includes information on other kinds of penguins found on Antarctica, such as the macaroni and the chinstrap penguins. Much like the National Geographic site, the UIUC provides basic information on penguins, such as average weight and height, nesting, mating and the penguins' breeding seasons.Learn more about Penguins
|
<urn:uuid:924aaac8-b304-40af-a976-d40dddf0acff>
|
CC-MAIN-2017-34
|
https://www.reference.com/pets-animals/can-one-information-penguins-bdb7bc9d265331e6
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102757.45/warc/CC-MAIN-20170816231829-20170817011829-00428.warc.gz
|
en
| 0.915001 | 265 | 3.71875 | 4 |
Role of government, regulations, policies and incentives
The government and its role in energy efficiency can play a pivotal role in an organization’s plans. Examples of things to look for and questions to ask include:
- Is there a requirement that all new buildings and those being renovated are covered by energy codes and meet minimum energy performance standards?
- What (if any) are the government policies to improve the energy efficiency performance of critical building components, such as windows and Heating, Ventilating and Cooling (HVAC) systems?
Building energy measurement and labeling
- Does a mandatory Energy-Use Disclosure law exist or will it in the near future? If so, what are the descriptors and boundary conditions?
- What kind of government assistance in relation to energy audits, energy ratings and certification schemes are available?
- Does the government have a policy of “building energy labels or certificates” similar to that found in appliances – such as an “Energy Star” for Buildings?
- What international test standards and measurement protocols to enable performance comparisons and benchmarking exist in the market?
Subsidies and price signals
- What government support or incentives exist for “net-zero” or “low energy” consumption buildings? Do these initiatives make the building more economically viable?
- Is there an existing or planned Carbon Emission Tax scheme? If so, what are its requirements and scope?
- Are tax credits, incentives, rebates and low interest financing available for energy efficiency improvement projects
Training and skills
- Is there government assisted or subsidized training and other measures available for building designers, owners and others to improve the quality and reliability of building design and operation, including retrofit services?
- What energy efficient technologies are being recommended or subsidized?
It is important to know what is current, what is imminent and what might emerge in the next three-five years, and to review the information frequently to keep up to date.
|
<urn:uuid:54ffdb64-17df-4e28-936e-953d6c204455>
|
CC-MAIN-2017-34
|
http://eeb-toolkit.com/index.php/component/content/article/2-uncategorised/86-eeb-toolset-tr11?ml=1&Itemid=266
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109157.57/warc/CC-MAIN-20170821152953-20170821172953-00101.warc.gz
|
en
| 0.93889 | 404 | 2.796875 | 3 |
Desiccants: Because it’s not the heat, it’s the humidity
Horace Kephart, in his book Our Southern Highlanders, described Appalachian mountaineers at the last turn of the century as preferring open, airy habitats to tightly closed buildings. They became claustrophobic, he wrote, if fresh air wasn’t readily available.
These “highlanders” knew something that we’ve had to learn ourselves. As new buildings are more tightly sealed and exclusively air conditioned—particularly commercial and institutional structures—indoor air quality has become an issue with health officials and heating, ventilation and air conditioning equipment manufacturers alike. In the worst instances, “sick building syndrome” can affect the health and productivity of a building’s occupants.
“Air conditioning designers have learned that more outside ventilation is needed to keep air fresher inside,” says Jim Sand of Energy Division’s Buildings Technology Center. “The American Society of Heating, Refrigeration and Air-Conditioning Engineers has written a standard that essentially states that ventilation systems need more outdoor air.”
Toward that purpose, Sand is coordinating a program with DOE, HVAC equipment makers and some smaller firms to promote the use of desiccant air conditioning systems.
Moist air causes that “clammy” feeling and promotes growth of molds, mildew and other irritants. Desiccant systems, Sand says, dry the air more efficiently than do conventional AC systems. That’s because desiccants absorb water. Those inedible packets of silica gel placed in packaged dry goods “to control moisture” are desiccants. The same principle can also be used to remove moisture from buildings.
Conventional AC systems, Sand explains, have two functions: To cool air, called “sensible cooling” and remove moisture, called “latent cooling.”
“On a hot, humid day, the only way a conventional system can remove moisture is to cool the air below the dewpoint,” Sand says. “This cold, moisture-laden air must be reheated before it feels comfortable to building occupants. This reheating is known in the trade as ‘parasitic heat load.’
“Conversely, on a cold, humid day, like spring mornings in East Tennessee, the air must be reheated—the conventional air conditioner sees no need to run at all because outside air is ‘cool’ enough to be used for ventilation in a building, but it isn’t ‘dry’ enough to be comfortable or to maintain a healthy indoor environment.
“Desiccant systems allow you to dehumidify, when you need it, more efficiently than a conventional air conditioner, thereby moving the workload from latent cooling to sensible cooling. It’s the Arizona effect, where a dry 90-degree day feels great, while in humid East Tennessee a 90-degree day can be miserable.”
Although not yet marketed for smaller residential applications, in a large building such as a department store or hospital, desiccant systems provide a way to make the large building comfortable and healthy.
A desiccant system works by blowing air through a revolving wheel that contains desiccant material, which absorbs the water from the air. That air is then circulated through the HVAC system, where it is cooled or heated depending on the need. There is a catch: To regenerate the desiccant wheel, air must be heated and sent through the other side of the desiccant wheel to drive out the water, and that requires energy.
“In Btu’s of water removed versus Btu’s of energy spent drying out the desiccant, you get an energy coefficient of less than one, but it’s still more efficient than running an air conditioner way down in temperature to dehumidify,” Sand says. “Desiccants pay off in three ways: They get the moisture out of the air more efficiently, the dry air doesn’t have to be as cool, and it relieves your cooling system of the water removal load.
“It’s not so much an energy-saving technology, but you pay a much larger penalty with a conventional AC system. Desiccant systems are a way to avoid the dramatic increases in building HVAC costs that would result if conventional air conditioning were used to handle this increased amount of ventilation air.”
Part of ORNL’s task is to help small desiccant system makers work in partnership with larger HVAC manufacturers, who are beginning to build and market HVAC systems using desiccant systems they supply.
“We’re helping to provide enabling technologies and performance standards and ratings for the industry,” Sand says. “Sensors and controls unique to desiccant systems haven’t yet been developed—some humidity sensors still use horsehairs—and good humidity sensors are expensive.
“Some applications of desiccants are a logical slam-dunk,” Sand says. “Hockey rinks almost always use desiccant dehumidification systems because you must cool the floor to keep the ice, and you have a room full of people emitting heat and moisture. If the air’s not dry, you’ll soon have wet ice and fog. Grocery stores, with their aisles of coolers, also are good candidates.”
ORNL recently published a subcontracted report for DOE through its Desiccant Technology and Applications Development Program titled Causes of Indoor Air Quality Problems in Schools: Summary of Scientific Research. The study links poor air circulation and poor humidity control to frequency of respiratory problems in the classroom. It identifies desiccant systems as a way to provide fresher air to young people, who may be more affected by indoor air problems than adults.
“About 10 Georgia and Florida schools are participating in a follow-up field test. Some have conventional air conditioning; some have humidity controls,” Sand says. “We’ll study mold spores, carbon dioxide levels and the presence of biogens in the schools and then compare absenteeism and the necessity for substitute teachers. Schools, particularly in the Southeast, are more closed up and have real problems with mold and mildew. This study will be used to develop strategies for improving indoor air quality, and consequently the learning process, in schools.”
Energy Division’s desiccants research is being funded through DOE’s Office of Building Technologies.B.C.
|
<urn:uuid:abefb754-8f5a-48e0-b9ca-fa9e2ef5ec5b>
|
CC-MAIN-2014-35
|
http://web.ornl.gov/info/reporter/no2/humidity.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909032628-00168-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.937626 | 1,389 | 2.734375 | 3 |
By Afroz Ahmad Shah
The famous Portuguese Bend landslide in the summer of 1956, when people noticed that the ground beneath them had begun to move, remind us of the potential of such forces to move the ground (Figure, a). It is estimated that a 105-hectare (260-acre) section of the slope was breaking free at a rate of about 2.5 centimetres per day, and also carrying Portuguese Bend with it. However, by 1961, the rate had slowed to about 1 centimetre per day, but by then it already had destroyed or damaged about 154 homes within the slide area.
Similarly, the Hyogoken-Nanbu earthquake of Kobe, Japan in 1995 triggered a total of about 674 landslides, which were mapped within an area of about 700 square kilometres. This quake killed about 5500 people and destroyed 200,000 houses and caused direct economic loss of about 100 billion US dollars. The observed landslides were mainly rock slides, rock falls, and rock/debris avalanches (for example Figure, b). Debris slides, complex slides, and slumps were also found.
These examples emphasise the importance to understand the cause of such mass movements.
Gravity, the driving force
Slopes are generally unstable over a long period of time and therefore, they tend to stabilise by moving to a new and stable condition. This is achieved through the force of gravity, which is the driving force and will always act on the slopes to drag them down. There is always a tug of war between the driving force (gravity) and the resisting force, which is the strength of the rock-mass to upload against the gravity. A slope may fail, if the driving force exceeds the resisting one.
Gravity makes possible for us to walk on the surface of Earth. When a surface is flat, it is quite easy to walk, because the gravity acts perpendicular to our feet. However, if the surface is inclined, it is hard to walk, because the force of gravity in this condition has two components (Figure). For example the figure (c) shows these two components acting on a slope, one is parallel to its surface and the other one is perpendicular. The slope parallel component (Gs) will always try to make anything resting on its surface inherently unstable and cause a shear stress parallel to the slope, which pulls the object in the downward direction. However, the perpendicular component of gravity (Gp) helps to hold the object in place on the slope.
Friction and Cohesion
The forces resisting movement down the slope are grouped under the term shear strength which includes frictional resistance and cohesion among the particles that make up the object. For example, when we want to push an object over a slope, we need some force to do that and that applied force must overcome the resistance due to friction (which is the area of the object in contact with the sloping surface). In natural conditions, the applied force is from the gravity and it has to overcome the friction and the cohesion among the particles. If the surface is rough, the friction will be more, because the particles of the object are tightly held to the surface. However, when a surface is slippery or polished, it is easy to slide down. Water, makes slopes slippery and therefore, reduces friction, which facilitate the sliding, that is one of the reasons why there is more sliding in wet seasons. Cohesion is the force that keeps material (e.g. a rock) intact. When you pick a rock (e.g. granite) and look at it carefully, you can observe that it is made-up of a number of minerals of different colours. These are held together or interlocked by the forces of cohesion.
When the frictional and cohesive forces become smaller than the shear stress, the object on a slope slips down the slope. Alternatively, when the cohesive forces, which hold rock particles or soil together, are weaker than the shear strength, the rock will fall apart under the influence of gravity.
Slope stability can be assessed through the Safety Factor, which is the ratio of the resisting force (Shear Strength) to the driving force (Shear Stress).
Fs = Shear Strength/Shear Stress
If this ratio is slightly more than 1, the slope is close to being unstable, however, if it is significantly greater than 1, (1.5 or 2), then the slope is stable, because the shear strength (resisting and cohesive forces) is much greater than the driving force.
Afroz Ahmad Shah is a research fellow at Earth Observatory of Singapore, Nanyang Technological University, Singapore.
|
<urn:uuid:13ae7e36-f9e9-4cfd-a350-a555852e8c71>
|
CC-MAIN-2017-30
|
http://thekashmirwalla.com/2012/01/landslides-ii/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424239.83/warc/CC-MAIN-20170723022719-20170723042719-00061.warc.gz
|
en
| 0.957442 | 954 | 4.25 | 4 |
0 pts endedThis question is
closed. No points were awarded.
1. The problemstatement, all variables and given/known data
if the angular momentum of the Earth in its motion around the sunwere quantized like a hydrogen electron according to equationL=mvr=(nh)/2pi, what would Earth's
quantum number be? How muchenergy would be released in a transition to the next lowest level?would that energy release (presumably as a gravity wave) bedetectable?
what would be the radius of that orbit? (radius ofearth's orbit is 1.5x10^11 m)
|
<urn:uuid:2f7d6acc-140b-4469-a586-992f9d9dd0bf>
|
CC-MAIN-2013-48
|
http://www.chegg.com/homework-help/questions-and-answers/1-problemstatement-variables-given-known-data4-16-angular-momentum-earth-motion-sunwere-qu-q392072
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052949/warc/CC-MAIN-20131204131732-00002-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.937436 | 132 | 2.703125 | 3 |
HIV stands for human immunodeficiency virus. It is the virus that can lead to acquired immunodeficiency syndrome or AIDS if not treated. Unlike some other viruses, the human body can’t get rid of HIV completely, even with treatment. So once you get HIV, you have it for life.
HIV attacks the body’s immune system, specifically the CD4 cells (T cells), which help the immune system fight off infections. Untreated, HIV reduces the number of CD4 cells (T cells) in the body, making the person more likely to get other infections or infection-related cancers. Over time, HIV can destroy so many of these cells that the body can’t fight off infections and disease. These opportunistic infections or cancers take advantage of a very weak immune system and signal that the person has AIDS, the last stage of HIV infection.
No effective cure currently exists, but with proper medical care, HIV can be controlled. The medicine used to treat HIV is called antiretroviral therapy or ART. If taken the right way, every day, this medicine can dramatically prolong the lives of many people infected with HIV, keep them healthy, and greatly lower their chance of infecting others. Before the introduction of ART in the mid-1990s, people with HIV could progress to AIDS in just a few years. Today, someone diagnosed with HIV and treated before the disease is far advanced can live nearly as long as someone who does not have HIV.
HIV is spread through unprotected vaginal and anal sex – and, to a much lesser degree, through oral sex* – with someone with HIV. “Unprotected” here refers to sex without condoms or the use of medications that reduce the risk of passing HIV from one person to another. Open mouth kissing also can present a risk (still low) if there is blood or sores in the mouth. Sharing needles is another (higher risk) way HIV can be spread.
As important as knowing how someone can get HIV is knowing how someone cannot get HIV. HIV is NOT spread through saliva, tears, sweat or casual contact, like touching or holding hands, a kiss on the cheek, sharing glasses or plates, food, swimming pools, toilet seats, or other
HIV can be passed from mother to child during pregnancy, birth and through breastfeeding, although this risk can be almost eliminated – reduced to less than one percent – with antiretroviral (
*According to the CDC: "Though oral sex carries a much lower risk of HIV transmission than other sexual activities, the risk is not zero. It is difficult to measure the exact risk because people who practice oral sex may also practice other forms of sex during the same encounter. When transmission occurs, it may be the result of oral sex or other, riskier sexual activities, such as anal or vaginal sex. Several factors may increase the risk of HIV transmission through oral sex, including oral ulcers, bleeding gums, genital sores, and the presence of other sexually transmitted diseases (STDs)."
|
<urn:uuid:31e193d9-5859-4aff-93dc-b8bbf91e2214>
|
CC-MAIN-2020-16
|
http://www.aidsalabama.org/about-hiv/facts-about-hivaids/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00322.warc.gz
|
en
| 0.955271 | 623 | 3.640625 | 4 |
In the Artificial Muscle Research Institute at the University of New Mexico, electricity is in the air. When lab director Mohsen Shahinpoor applies a voltage to an artificial “hand” made of a polymer-metal composite, its fingers curl into a fist. Poke around the lab and you’ll see robotic fish swimming, wings flapping, and arms lifting-all gaining their muscle from electrically activated polymers. You’ve seen robots before, but there is something different about these. They look alive.
Since the early 1990s, materials scientists and engineers have been developing electroactive polymers for use as sensors, actuators, and artificial muscles. An applied voltage changes the polymer’s composition or molecular structure so that it expands, contracts, or bends. The motion is smoother and more lifelike than movement generated by mechanical devices: like muscles, polymers are flexible, unhampered by the clunky rigidity of gears and bearings. Scientists believe that with this similarity to natural motion, electroactive polymers could revolutionize robotics and biomedical devices. Such materials could make it possible to design robots that maneuver with the grace of a human, prosthetic legs that move and feel real, and implantable microdelivery systems that smoothly and quietly pump drugs to where they’re needed.
Until recently, however, electroactive polymers have presented practical problems. They consumed too much energy. They couldn’t generate enough force. And they didn’t last long enough. But researchers in academia and industry have found ways to make the polymers stronger, more robust, and more efficient. These improvements, says Yoseph Bar-Cohen, a senior research scientist at NASA’s Jet Propulsion Laboratory and one of the field’s pioneers, “will enable faster implementation of science fiction ideas into engineering reality.”
Last September, in a breakthrough that could lead to lower-power medical devices, Qiming Zhang and his colleagues at Pennsylvania State University reported that they had created an electroactive actuator that requires one-tenth the voltage previously needed. Zhang’s key advance: a polymer-semiconductor composite that gets more electric bang for the buck and remains very flexible. The advantages of this class of device are its high efficiency and fast response. But “this is just the start,” says Zhang. He predicts that pharmaceutical products based on the technology-for example, small wearable insulin pumps powered by low-voltage batteries-could be available within five years.
Benjamin Mattes, CEO of Santa Fe Science and Technology, is building strong, long-lasting artificial muscles out of conducting polymers that expand and contract in response to changes in the flow of ions into the materials. These electroactive polymers generate huge forces at low voltages. Because chemical reactions break down the polymer, earlier versions were slow and able to survive only a few cycles. Mattes’s latest device, however, smashes previous records for speed and durability. Its coaxial structure-tiny fibers threaded through a hollow tube and engulfed in liquid electrolyte-allows ions to flow rapidly into the fibers in response to applied voltage. Because he uses a highly stable and conductive ionic liquid as the electrolyte, Mattes says he has achieved “millions of cycles without degradation.”
Thanks to such advances in materials science, electroactive polymers are starting to yield useful biomedical devices. At the University of New Mexico, Shahinpoor has demonstrated thin, durable artificial muscles that can lift many times their own weight. Shahinpoor is using the materials to develop implantable aids such as a pump that works like a mechanical pacemaker to compress the heart and a tiny device that corrects vision by gently squeezing the eyeball. His team is commercializing the devices through a spinoff, Environmental Robots in Albuquerque, NM.
There is plenty of work to do before the technology will be ready for market, however. To be successful, Shahinpoor says, the company will need to ensure that the materials are compatible with living tissue and that their functions can be precisely controlled. He will also need to cut manufacturing costs by a factor of 10.
Although the next five years should see electroactive polymers used as components in microsurgical tools, drug delivery systems, and corrective aids, such advances may be only a beginning. To achieve more lifelike robots and prosthetic devices, scientists will need to make materials that are smarter and more interactive. Within 10 years, researchers aim to develop artificial limbs that provide feedback to the user, graceful autonomous robots that are powered by musclelike polymers, and even suits that enhance the strength and endurance of soldiers and rescue personnel. If the research is successful, robotics may truly come to life.
What to know about this autumn’s covid vaccines
New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.
DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.
“This is a profound moment in the history of technology,” says Mustafa Suleyman.
Human-plus-AI solutions mitigate security threats
With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure
Next slide, please: A brief history of the corporate presentation
From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.
|
<urn:uuid:19982fc3-e916-4ebc-b328-5dd3de4a8619>
|
CC-MAIN-2023-40
|
https://www.technologyreview.com/2002/12/01/234592/electroactive-polymers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00261.warc.gz
|
en
| 0.927759 | 1,161 | 3.4375 | 3 |
The Northwestern state of Alaska is the largest state in the US and it was bought from Russia in the year 1867, at a price of $7.2 million. Although Alaska came under the banner of the USA in the year 1867, it was not granted statehood for nearly a hundred years. In fact, it was governed mainly by military wings posted in Alaska and was not officially a part of America until the year 1958. Alaskans were naturally discontented as the US government body which was supposed to govern them, was not only very far away, but also did not have any representatives of Alaska in it. To remedy the problematic situation, Alaskans wanted statehood and the first bill advocating the cause of Alaska’s statehood was introduced to the Congress by James Wickersham in 1916, but without much effect.
The constitution of Alaska was written in 1955 by fifty-five elected delegates in the University of Alaska, Fairbanks. The delegates were all elected by the residents of Alaska and each one of them represented a region of the vast landmass. After the constitution was completed, in 1956 the residents of Alaska voted in favor of both approving the newly written constitution and the “Alaska-Tennessee Plan”. According to the “Alaska-Tennessee Plan”, two elected representatives of the Alaskan residents were to serve in the Senate and one other representative was to be a member of the House of Representatives. This plan was actually adopted because a plan very similar to this one had helped Tennessee attain statehood. As per the “Alaska-Tennessee Plan”, Ernest Gruening, William A. Egan and Ralph Rivers were elected to serve in the Senate and the House of Representatives respectively, but unfortunately the US Congress did not acknowledge them as they were not authorized elected delegates. However, the lack of recognition did not stop the three men from creating favorable conditions in the government to ultimately get the bill of Alaska’s statehood signed by President Eisenhower on 7th July, 1958. The official declaration of Alaska being added as the 49th state was made by Eisenhower on 3rd January, 1959.
|
<urn:uuid:4b19f4d6-616f-4775-8ae4-8fb4a4d6fd21>
|
CC-MAIN-2014-23
|
http://www.whencenter.com/when-did-alaska-become-a-state/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00325-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.990067 | 438 | 4.09375 | 4 |
More than 1.4 billion people around the world have no access to electricity. When the sun goes down, darkness comes up. Almost all of these people live in Africa and India. Kerosene generators are one solution, but they pollute the environment and are often too expensive for the millions of people living poverty. Those who rely on it go deeper into poverty just trying to read and work.
One innovation making its way into these regions is the solar-powered light bulb. Many of the newest models are comprised of a small solar panel, rechargeable batteries and an LED bulb, which requires very little energy to work.
Evan Mills, a scientist at Lawrence Berkeley National Laboratory hopes that solar light bulbs do for light-poor communities what mobile phones has already done for communities lacking a wired infrastructure. Mill thinks that solar light could leapfrog wealthy countries in acquiring advanced wireless LEDs and become ubiquitous. Beyond improving the environment, Mills said, "it will be a boon to literacy, safety for women and productivity of businesses who today are stuck with flame-based light."
Here is just a sampling of designs bringing solar-powered light to dark corners of the world.
The India-based company Greenlight Planet makes solar-powered lanterns called Sun King that are built to provide 16 hours of light from one day’s charge. Bright LEDs come mounted inside a waterproof orange lamp head incorporated into a supporting stand. When the Sun King lamps were rolled out in a rural Indian village several hours outside Mumbai, one elderly resident told the Wall Street Journal she was able to stop using a rusty kerosene lamp that made her cough.
The Denver-based solar light bulb company Nokero, short for “No Kerosene,” was started by mechanical engineer Steve Katsaros in 2010. Nokero’s solar light bulbs clearly resemble traditional light bulbs. Each bulb contains a rechargeable AA battery, LEDs under a curved housing, a small solar panel, and a hook to suspend it. Through international collaboration with NGOs, the company’s lights have been dispatched to areas worldwide. After a 2011 earthquake in Turkey, the bulbs provided light for millions without power.
Several years ago the young Kenyan engineer Evans Wadongo made it his mission to help bring Africans out of poverty. Kerosene lamps had damaged his vision growing up so he set to work designing a solar lamp he called Mwangabora, Swahili for “good light.” CNN named Wadongo one of the top 10 heroes for 2010 and he currently heads up the NGO Sustainable Development For All that works to bring lasting solutions to problems facing African families, including solar light.
The for-profit social enterprise D.light was cofounded by Stanford Design School classmates Sam Goldman and Ned Tozun. Their goal to serve households lacking electricity was inspired by Goldman’s experience as a Peace Corps volunteer in Benin, where a kerosene lamp burned his neighbor’s son.
D.light makes several bright orange solar lights that include a circular, tilting LED mounted on a simple metal stand, a wide bottle-shaped light with a multi-setting handle, and a dual-purpose light and phone charger with a strap attachment and rounded handle.
Belgian designer Alain Gilles developed the Nomad portable solar lamp system for O’Sun that could both be used in place of kerosene and work as a camping or outdoor lamp. The light was presented earlier last year at Milan Design Week, where the simple lantern gained attention for its shock resistance, hook attachment for suspension and mobile phone charger. The waterproof lantern has three settings, allowing it to get between six and 35 hours depending on the mode following a six-hour charge. If the sun fails, Nomad can be recharged in a car or wall outlet.
LuminAID cofounders Anna Stork and Andrea Sreshta met in graduate school, where they were studying design and architecture. After experiencing the 2011 earthquake in Japan firsthand on a trip, they developed a portable, inflatable and water-resistant light that only weighs three ounces and packs down so that 50 could be shipped in the same box that only holds eight regular flashlights. A five-hour charge gives LuminAID between about six and eight hours of diffused LED light, and has two brightness settings.
Former Marine and American Diplomatic Corps member Mark Bent started the company SunNight Solar in 2006 to produce a durable flashlight-shaped solar light called BoGo. Bent uses rechargeable batteries that run for between 750 and 1,000 individual nights with between six and eight hours of usage with LEDs built to last an average of 100,000 hours.
BoGo lights have been donated through nonprofits to communities across the world, including Africa and India. Last year when Hurricane Sandy caught Bent on the road and the hotel where he was staying lost power, he distributed lights to guests.
The New York City-based company Mpowerd, led by entrepreneur Jacques-Philippe Piverger, recently came out with its own version of an inflatable solar lantern known as Luci. Piverger initially got help from the crowd-funding site Indiegogo to create the light. Each four-ounce cylindrical lantern produces six to 12 hours of light after six hours charge time. Mpowerd calls its solar-powered light a combination task light, flashlight, and diffused lantern.
|
<urn:uuid:db0e2a7b-f8ac-450a-948c-cca3fda5dc06>
|
CC-MAIN-2014-23
|
http://news.discovery.com/tech/alternative-power-sources/solar-powered-bulbs-brighten-off-grid-homes-130117.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272680.42/warc/CC-MAIN-20140728011752-00070-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.955224 | 1,102 | 3.171875 | 3 |
Chris Chancellor, WU Graduate
The impact that our industrialised global food supply-chain has on diverse ecosystems and communities around the world is receiving greater attention than ever before. Scholars and activists have for decades emphasised how European agricultural demand has driven deforestation and environmental destruction in species-rich biomes such as the Amazon and Cerrado regions in Latin America. Now it is becoming clear that the consequences extend far beyond the environmental harm generated by the production stage itself. When looking at the wider chain, the implications of industrial food systems for issues such as food and nutritional security, human health, social justice, rural vitality, employment, and the concentration of market control, become apparent.
Having found its way onto the political agenda, the European Union (EU) has come up with the idea of a European Protein Plan. The EU is currently heavily reliant on imports of protein crops, primarily soybean from Latin America’s Southern Cone region. As well as being linked with major environmental and human rights concerns, the reliance on imports also makes the EU agricultural industry vulnerable to shocks in international commodity prices. Soybean is the favoured ingredient in animal feed for the EUs powerful livestock industry, and therefore a price shock would have major socio-economic consequences.
The Protein Plan essentially proposes increasing the amount of domestic protein crop production. The idea is that this would lift the burden on Latin American ecosystems whilst at the same time providing the EU with greater ‘protein independence’. This has been presented as a win-win situation, and yet the manner in which this production would take place has received little or no critical attention.
A report published by civil society organisation European Coordination Via Campesina (ECVC) highlights the dangers of simply transplanting the same corporate industrial supply-chain into Europe. Last year, an agreement called the European Soya Declaration was signed by 13 member states, highlighting the suitability of fertile and ‘underused’ lands in Central and Eastern Europe (CEE) for expansion of European soybean production. The ECVC report details the recent emergence of agribusinesses and financial investors in the CEE region. Land here is cheaper and often more fertile than in Western Europe, and offers suitable agro-climatic conditions for commodity soybean cultivation. There is therefore an opportunity for large profits to be made if land is bought up now, cultivated with soybean or other commodity protein crops, and potentially sold later when land prices have reached western European levels. As one company puts it: ‘protein crops are the new gold bars’. However, this process is not a neutral one, and entails radical reformulations of arable land ownership and control, threatening the livelihoods of the region’s small-scale producers and rural communities.
Another report from the Land and Resource Lookout reaches a similar conclusion, pointing out that ‘a control-blind approach’ to sustainability is evident. Much attention is given to the fact that this soy would be non-GM, would be deforestation-free, and would help to fix nitrogen in crop rotations. These are undoubtedly positive, yet these traits in isolation don’t automatically equal sustainable supply-chains. The manner in which this soy is produced, distributed and consumed, as well as how and who controls these processes and relevant markets, are key for building a truly sustainable and inclusive food system. It argues that sustainable food system strategies must explicitly address the issue of corporate control if effective progress is to be made.
With the European Commission set to release a report on the EU Protein Plan before the end of the year, both reports advocate for the inclusion of agroecological principles and the concept of food sovereignty in any future EU protein strategies. An agroecological transition offers a potential pathway for a truly inclusive, interconnected and mutually beneficial food system to be built, but this must receive political backing in order for it to really take hold.
The fact that the sorts of headline issues emphasised in the European Soya Declaration are receiving genuine political attention is a positive step. It provides an opportune moment to address deep-seated systemic problems in our current industrially-based food system; policy-makers must now be brave enough to seize it!
Note: are you a WU master student and interested in doing a thesis research on this issue, please contact [email protected]
|
<urn:uuid:892678bc-5a1e-4b60-80b2-6844191e396c>
|
CC-MAIN-2020-34
|
https://ruralsociologywageningen.nl/author/jonge004/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738858.45/warc/CC-MAIN-20200811235207-20200812025207-00254.warc.gz
|
en
| 0.937098 | 896 | 3.140625 | 3 |
T’ai chi (pronounced: TY CHEE) is great for improving flexibility and strengthening your legs, abs, and arms.
What Is T’ai Chi?
When you think about martial arts, karate and judo may come to mind. T’ai chi, sometimes called t’ai chi chuan, is an ancient Chinese martial art that was developed to help a person’s physical and emotional well-being.
T’ai chi is like a combination of moving yoga and meditation. In t’ai chi a person does breathing exercises at the same time as going through a series of slow, graceful, flowing postures. People who practice t’ai chi believe the postures improve body awareness and build strength and coordination. Many people who practice t’ai chi say that they feel more peaceful and relaxed afterward.
In ancient China, people believed that the body was filled with energy, or chi. They thought that chi could become blocked, causing illness and disease. They believed that a person could help improve the flow of chi throughout the body and improve health by practicing t’ai chi exercises.
As with yoga, there are different styles of t’ai chi, including:
- Chen style
- Hao (or Wu Shi) style
- Hu Lei style
- Sun style
- Yang style
- Zhao Bao style
The different types vary in intensity and focus. For example, Sun style is known for its fast footwork. The low-impact movements of Hao style can be practiced by people who are elderly or have special needs. In general, though, practicing t’ai chi improves strength, flexibility, and respiratory function (breathing).
So where can you do t’ai chi? Many fitness centers or community centers like the YMCA offer classes. Lots of t’ai chi instructors also offer private classes. You can also find t’ai chi exercises online or on DVD.
Before you start your first t’ai chi workout, dress comfortably so you can move and stretch easily. Shorts or tights and a T-shirt or tank top are great choices. Because t’ai chi is a martial art, some people who practice it wear a martial arts training uniform. T’ai chi is usually practiced barefoot or in comfortable socks and sneakers.
During a t’ai chi class, you’ll participate in forms. Each form is a series of movements that are done in a specific order. The poses that make up the forms sometimes have visually descriptive names, such as “white crane spreads its wings,” “needle at the bottom of the sea,” and “grasp sparrow’s tail.”
Before You Begin
Because t’ai chi is based on continuous, flowing, low-impact movements, it’s a good workout choice for just about anyone. But it’s always a good idea to talk to your doctor before starting an exercise program, especially if you have a health problem.
Is your schedule jam-packed with school, work, and social activities? Here are a few tips for fitting in fitness and staying motivated:
- Try a little at a time. If you don’t have time to go through an entire t’ai chi routine, try breaking up your workout into 10- or 15-minute chunks. During a long study session, reward yourself every hour with a few minutes of t’ai chi.
- Go slow. Keep your expectations reasonable. Don’t expect to be able to do all the moves perfectly right away. Masters of t’ai chi work on the forms continuously for years to perfect them. T’ai chi isn’t a competitive sport, and the postures are meant to be done slowly for best results.
- Do what works for you. Some people like working out in the morning before the day’s activities sidetrack them; others find that a nighttime workout helps them unwind before bed. Experiment with working out at different times of the day and find the time that fits your schedule and energy level best.
- Get in a group. If you find that you aren’t motivated to work out by yourself, go to a few t’ai chi classes. An added benefit of taking the class: The teacher can help you with your form and give you tips to help you get the most from t’ai chi.
- Keep boredom at bay. Many people who work out regularly say that preventing boredom is the key to consistent workouts. Mix up your t’ai chi routine with walking, a yoga video, or other exercise.
Reviewed by: Mary L. Gavin, MD
Date reviewed: February 2015
|
<urn:uuid:cb2a820f-224d-4af1-b5bf-079ff07e0c32>
|
CC-MAIN-2017-26
|
https://www.rchsd.org/health-articles/tai-chi/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319688.9/warc/CC-MAIN-20170622181155-20170622201155-00309.warc.gz
|
en
| 0.948977 | 996 | 2.59375 | 3 |
The first church of the monastery was built in IV century. Poghos-Petros cathedral was built in 895-906, during the reign of Bishop Hovhannes. In 1087 St. Astvatsatsin (Holy Virgin) church was dedicated. The complex had a large library of 10,000 manuscripts which were burnt by Seljuks during the Seljuk invasion in 1170. A bell tower on the temple gavit was added by Hovhan Vorotnetsi in XIV.
The Grigor Tatevatsi Mausoleum was added to the complex in the XVIII century.
The monastery was badly damaged in 1931 by earthquake and was restored in the 1990s.
|
<urn:uuid:c16e1c94-c6d5-43a8-8f99-230c50bad27e>
|
CC-MAIN-2020-29
|
https://soleil-travel.com/sightseeing/syunik/tatev-monastery/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151197.83/warc/CC-MAIN-20200714181325-20200714211325-00476.warc.gz
|
en
| 0.991853 | 148 | 2.578125 | 3 |
Contraction Stress TestSkip to the navigation
A contraction stress test checks to see if your baby will stay healthy during contractions when you are in labor. This test includes external fetal heart monitoring . The test is done when you are 34 or more weeks pregnant.
During a contraction, the blood and oxygen supply to your baby drops for a short time. This is not a problem for most babies. But the heart rate of some babies gets slower. This change in heart rate can be seen on the external fetal monitor.
For this test, you are given the hormone oxytocin. This hormone causes uterine contractions. You may also massage your nipples. This tells your body to release oxytocin. During this test, your baby's heart rate may slow down (decelerate) in a certain pattern after a contraction instead of speeding up (accelerating). This means your baby may have problems with the stress of normal labor.
A contraction stress test is usually done if you have an abnormal nonstress test or biophysical profile . A biophysical profile uses ultrasound during a nonstress test to measure a series of physical traits of your baby. You may have more than one contraction stress test while you are pregnant.
Some doctors may do a biophysical profile or a Doppler ultrasound test instead of a contraction stress test.
Why It Is Done
A contraction stress test is done to:
- Find out if your baby will stay healthy during labor, when contractions reduce the oxygen levels.
- Check to see if the placenta is healthy and can support your baby.
This test may be done when results from a nonstress test or a biophysical profile are not in the normal range.
How To Prepare
You may be asked to not eat or drink for 4 to 8 hours before the test. Empty your bladder before the test.
If you smoke, stop for 2 hours before the test. Smoking can lower your baby's activity and heart rate.
You will be asked to sign a consent form that says you understand the risks of the test and agree to have it done.
Talk to your doctor if you have any concerns about the need for the test, its risks, how it will be done, or what the results will mean. To help you understand the importance of this test, fill out the medical test information form (What is a PDF document?) .
How It Is Done
A contraction stress test may be done in your doctor's office or a hospital. It is done by a family medicine doctor or an obstetrician and a trained lab technician or nurse. You probably won't need to stay overnight.
During the test, you will lie on a bed with your back raised. You will be tilted a little to your left side. This is so you will not put pressure on the blood vessels in your belly. Two belts with sensors will be placed around your belly. One belt holds the sensor that records your baby's heart rate. The other sensor measures your contractions. Gel may be used on your skin with the heart rate sensors. The sensors are hooked to a recording unit. The heart rate monitor may be moved if your baby changes position.
Your baby's heart rate and your contractions are recorded for 10 minutes. Your blood pressure and other vital signs are also recorded.
You will be given the hormone oxytocin in a vein ( intravenously, or IV ). It is started at a low dose. The dose is increased until you have three contractions within 10 minutes that each last longer than 45 seconds. Or you may be asked to massage one of your nipples by hand to start contractions. If you don't have a second contraction within 2 minutes of the first, you will rub your nipple again. If contractions do not occur within 15 minutes, you will massage both nipples.
After the test, you will be watched until your contractions stop or slow down to what they were before the test. A contraction stress test may take 2 hours.
How It Feels
You may need to lie on your left side for the test. This position may not be comfortable when you are having labor contractions. The belts holding the sensors may bother you. Most women say this test is uncomfortable but not painful.
Fetal heart monitoring may show that your baby is having problems when your baby is healthy. It can't find every type of problem, such as a birth defect.
Using oxytocin also has risks.
- It may cause labor to start sooner than your expected delivery date.
- It may cause contractions that go on for a long time. This may cause problems with your baby. The contractions usually stop when the oxytocin is stopped. You may get a medicine to stop the contractions. In very rare cases, the contractions don't stop. If that happens, your doctor may suggest delivery.
A contraction stress test checks to see if your baby will stay healthy during contractions when you are in labor.
Results of the test tell your baby's health for 1 week. The test may need to be done more than once during your pregnancy.
Normal test results are called negative.
Your baby's heart rate does not get slower (decelerate) and stay slow after the contraction (late decelerations). Note: There may be a few times during the test when your baby's heart rate slows down. But if it doesn't stay slow, it isn't a problem.
Your baby is expected to be able to handle the stress of labor if there are no late decelerations in your baby's heart rate during three contractions in a 10-minute period.
Abnormal test results are called positive.
Your baby's heart rate gets slower (decelerates) and stays slow after the contraction (late decelerations). This happens on more than half of the contractions.
Late decelerations mean that your baby might have problems during normal labor.
A contraction stress test may show that your baby's heart rate slows down (decelerates) when your baby is not actually having problems. This is called a false-positive result .
What Affects the Test
You may not be able to have the test, or the results may not be helpful, if:
- You have had past pregnancy problems. Examples include a cesarean section with a midline (vertical) incision, placenta previa , or placenta abruptio . Experts do not recommend this test if you are pregnant with more than one baby or you are likely to have premature rupture of the membranes (PROM) . The test also isn't recommended if you have an incompetent cervix or you have been given magnesium sulfate during your pregnancy.
- You have had a uterine surgery in the past. Strong contractions may cause the uterus to rupture.
- You smoke or use cocaine.
- Your baby is moving during the test. It may be hard for the sensors to record your baby's heart rate or contractions.
- You are very overweight.
What To Think About
- Some doctors use oxytocin instead of nipple massage. Nipple massage can cause long, uncontrolled contractions.
- Fischbach FT, Dunning MB III, eds. (2009). Manual of Laboratory and Diagnostic Tests, 8th ed. Philadelphia: Lippincott Williams and Wilkins.
Other Works Consulted
- Fischbach F, Dunning MB III (2015). A Manual of Laboratory and Diagnostic Tests, 9th ed. Philadelphia: Wolters Kluwer Health.
- Handbook of Diagnostic Tests (2003). 3rd ed. Philadelphia: Lippincott Williams and Wilkins.
- Pagana KD, Pagana TJ (2014). Mosby's Manual of Diagnostic and Laboratory Tests, 5th ed. St. Louis: Mosby.
Primary Medical Reviewer Sarah Marshall, MD - Family Medicine
E. Gregory Thompson, MD - Internal Medicine
Adam Husney, MD - Family Medicine
Specialist Medical Reviewer William Gilbert, MD - Maternal and Fetal Medicine
Femi Olatunbosun, MB, FRCSC - Obstetrics and Gynecology
Current as ofMarch 16, 2017
Current as of: March 16, 2017
|
<urn:uuid:a5ebaf34-c66f-452e-9a57-4bbb7d286afa>
|
CC-MAIN-2020-16
|
https://www.cigna.com/individuals-families/health-wellness/hw/medical-tests/contraction-stress-test-aa77493
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371893683.94/warc/CC-MAIN-20200410075105-20200410105605-00143.warc.gz
|
en
| 0.913443 | 1,699 | 3.09375 | 3 |
The combination of Service-Oriented Infrastructure (SOI) and cloud computing realize unique characteristics as listed below.
This is the essence of cloud computing. It refers to an increasing number of services that are delivered over a network. Anything as a service requires an understanding of the service objectives and the accounting of service use and quality. The objectives, use, and quality can be determined from the underlying reference model for SOI:
Broad network access (cloud) + resource pooling (cloud) + business-driven infrastructure on-demand (SOI) + service-orientation (SOI) = XaaS
Cloud computing guarantees certain levels of service to the cloud’s customers. When that service degrades, it is necessary to understand the relationship of infrastructure activity to these services so that the situation can be remediated. SOI facilitates the determination of these relationships:
Operational transparency (SOI) + measured service (cloud) = Service Assurance
Demand-driven infrastructure enabled by SOI triggers various forms of scaling supported by the cloud, including scale-out and scale-in supplemented by scale-up and scale-down through the SOI:
Rapid elasticity (cloud) + consumer provider model (SOI) = Next-Generation Scaling
The combination of SOI and the cloud computing space realize effective instrumentation of pay-for-use models as well as governance mechanisms controlled by rules leading to policy-based administration:
On-demand self-service (cloud) + service measurement (SOI) + operational transparency (SOI) = Operational and Tactical Control
X as a Service (XaaS) is a generalization for cloud-related services; i.e., those services that comprise the cloud service model per the NIST definition . The most common examples of XaaS are Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). The combined use of these three is sometimes referred to as the SPI model (SaaS, PaaS, IaaS). These are “the most common examples” because the usage of the “as a service” moniker is proliferating. As of today, anything can be provided “as a service”: database as a service, information as a service, etc.
First of all let’s take a look at the IaaS definition . NIST defines IaaS as follows:
“The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems; storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).”
As this definition implies, IaaS is a service which provides capabilities for the consumer to provision certain infrastructure elements. Meantime, SOCCI is the “underlying cloud infrastructure” which enables IaaS to provide its functionality.
IaaS may entail the provisioning of multiple components including the servers for on-demand computing power, facilities for robust web-hosting, and elastic storage.
There is a striking similarity to the manner in which services are provided in the applications space. Let us say that there is a GetClientAddress web service that retrieves the address information from a back-end database that stores the HR information within an organization. The existence of the enabling components like the database and web/application servers/integration brokers is transparent to the consumer of this service. In a similar fashion, the enabling infrastructure (SOCCI) is not exposed to the consumer of IaaS; instead IaaS is provisioned on top of SOCCI.
The relationship between SOCCI and XaaS is shown in SOCCI is SOI Adoption for Cloud.
Service-Oriented Architecture (SOA) is an architectural style for building loosely-coupled systems. It enables the implementation of a technology-based solution without exposing the underlying detail to its consumers. Cloud computing – see Cloud Computing Characteristics – is an SOA and depends on some common attributes in The Open Group SOA Reference Architecture (SOA RA). Given that SOCCI supports both SOA and cloud computing infrastructure, it provides a physical infrastructure that can be leveraged by both worlds, which is a multi-tenant, virtualized infrastructure that leverages SOA principles and the infrastructure components (e.g., server, network, devices, etc.) as the building blocks to facilitate an agile and re-usable infrastructure over the Internet.
|
<urn:uuid:a1c446b1-0582-471b-893f-2377dad24c35>
|
CC-MAIN-2013-48
|
http://www.opengroup.org/soa/source-book/socci/synergy.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163040002/warc/CC-MAIN-20131204131720-00006-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.915218 | 978 | 2.96875 | 3 |
Senior health and medical researchers at the University of Wollongong have united to urge all parents to ensure their children are fully immunised.
Researchers across the University say they want parents to have the best clinical and scientific evidence to enable them to make informed decisions about what is best for their child.
The evidence is clear: immunisation protects children and saves lives, they say — while individuals may express personal opinions, the international scientific evidence overwhelmingly supports immunisation to protect children from infectious diseases.
Dr Heather Yeatman, UOW Professor of Public Health and President of the Public Health Association of Australia, says immunisation is one of the best choices parents can make. Parents should be confident that immunising children is best practice, she says.
“Along with healthy foods, hand washing and a loving environment, immunisation is one of those basic things we can do to safeguard our children’s health,” Prof Yeatman says.
“For more than 50 years children have been immunised and it is one of our best success stories in public health.
“Immunisation provides an important safeguard against infectious disease when children go to school or play with others. Immunisation is also important to protect young babies, for older adults and when people are travelling overseas.”
Large-scale immunisation programs began in the 1930s and gathered pace in the 1950s. According to the Australian Government website, Immunise Australia, this has led to a 99% drop in deaths from vaccine preventable disease.
The University came under fire last week after its School of Humanities accepted a thesis from Judy Wilyman on global conspiracy to promote vaccination.
|
<urn:uuid:71ade575-7ff3-4b17-9238-a7b5a9f30a4c>
|
CC-MAIN-2020-29
|
https://ajp.com.au/news/wollongong-uni-urges-parents-to-immunise/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655893487.8/warc/CC-MAIN-20200707142557-20200707172557-00298.warc.gz
|
en
| 0.949395 | 340 | 2.84375 | 3 |
ATTENTION ALL TEACHERS!!
- CD with 72 Activity Plans and Training Videos
- Fully printable and interactive
- Linked to the renewed Primary Framework for Mathematics
18 plans available for each subject:
- Multiplication / Division
- Addition / Subtraction
- Fractions / Percentage / Decimals
- 100 Square
On the CD:
- 72 Activity Plans in PDF and MS Word format, linked with the Primary Framework for Mathematics, include ideas to support assessment for learning enrichment
- Training Videos in Quicktime and Flash format for each subject excluding the 100 square due to the many books that are already available for this grid
Only £8.65! plus postage and VAT
Buy Now Online
Please choose the items you wish to buy from the list below. Each time you click a link you will be taken to our SHOPPING CART page where you can specify quantities.
After that you can either ‘GO TO PAYMENTS’ to complete your order or ‘CONTINUE SHOPPING’ which will bring you back to this page.
|POSTAGE & PACKING||Price|
|Orders up to £25.00||£2.50|
|£25.01 to £50.00||£4.50|
|£50.01 to £100.00||£7.50|
Prices exclude VAT @ 20%. VAT No. GB 747 8357 84
|
<urn:uuid:b4c8dad0-3147-4810-a143-34897741ff5c>
|
CC-MAIN-2017-43
|
http://flexitable.co.uk/flexitable-cd/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823360.1/warc/CC-MAIN-20171019175016-20171019195016-00765.warc.gz
|
en
| 0.820997 | 303 | 2.734375 | 3 |
Researchers at Oxford have built an x86 emulator that runs purely on Java, making it ideal for security researchers who want to analyze and archive viruses, host honeypots and defend themselves against buggy or malicious software without hosing their machines. The JPC also emulates a host of other environments, giving technophiles the ability to play Asteroids and other software that’s sat on shelves for years collecting dust.
Here are several key features of JPC :
- JPC is completely implemented in Java, so it works seamlessly across all major computing platforms, including Windows, Linux and MacOS. JPC even works on non-x86 based hardware like ARM and SPARC.
- JPC comes with the assured security of being run entirely within the Java sandbox. This means that the emulated hardware is completely isolated from the underlying hardware and cannot damage or interfere with it in any way.
- With JPC, you have complete configuration control with virtual peripherals and software libraries. And if you mess up, you only mess up your virtual PC. Just delete your disk images and start again.
|
<urn:uuid:2d37bfbc-4324-4f0a-8774-6ff789acd111>
|
CC-MAIN-2017-43
|
https://theriyanto.wordpress.com/2007/03/26/computer-virtualization-in-java/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825473.61/warc/CC-MAIN-20171022222745-20171023002745-00300.warc.gz
|
en
| 0.93771 | 223 | 2.828125 | 3 |
We’re social creatures by nature who rely on one another, so we automatically seek out people to create substantial relationships. But how many friends do you need in your life? And how many can you actually have?
In the video above, we go over the basics of friends and happiness, and try to answer some of the questions about how they’re connected. You’ll learn:
- About Dunbar’s Number, or the maximum number of meaningful, mutual relationships our brain is able to maintain day in and day out.
- How many close friends or BFFs (spouses included) that you should have.
- How many people are likely in your inner circle of go-to comrades, like less-close friends and family.
- How many acquaintances, like coworkers and friends-of-friends, you can juggle.
- What makes a strong friendship in the real world (hint: it’s not something that’s easy to do online), and why it makes us feel safe and comfortable.
You may think you can go it alone, but friends, significant others, or close relations are a must when it comes to your well being. After all, there’s a reason loneliness doesn’t feel good. It’s your mind and body telling you something.
|
<urn:uuid:fb4c6b47-af98-48f3-9ed2-548e8fc35e79>
|
CC-MAIN-2020-34
|
https://lifehacker.com/how-many-friends-do-you-need-to-be-happy-1827316848
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738944.95/warc/CC-MAIN-20200812200445-20200812230445-00131.warc.gz
|
en
| 0.91991 | 277 | 3.09375 | 3 |
The Handy Book to English Genealogy, Revised Fourth Edition - Rachael Mellen. This latest edition, originally published in 1990, has been expanded to provide significantly more information for those researchers working on their English ancestry. Ms. Mellen describes at great length, and in detail, the major resources for researching English ancestry in the United States and Great Britain. In the United States, researchers are encouraged to work with four major institutions: the Genealogical Library of the Church of Jesus Christ of the Latter Day Saints (LDS Church) in Salt Lake City, Utah, and its hundreds of branch libraries known as Family History Centers; the International Genealogical Index (IGI); the Newberry Library in Chicago, Illinois; and the Allen County, Indiana Public Library. In England, three types of record offices-city, county, and diocesan-house a variety of genealogical material. Each office is listed with address, telephone number, hours of operation, research services available, and the nature of the records in their collections. Other topics covered include: maps and their use; an occupational gazetteer; patterns of migration within England, and English emigration to the United States in the seventeenth and eighteenth centuries. All pertinent data from previous editions has been retained, and includes, among other topics: London repositories, research in and around the Parish church, common problems in English research, a list of American/English vocabulary, and a Medieval Latin word list. (1986, 1987, 1990, 2000), 2008, 5½x8½, paper, index, 248 pp.
|
<urn:uuid:7ab968d7-de6e-439f-9a0e-bec310585a7c>
|
CC-MAIN-2023-50
|
https://heritagebooks.com/products/101-m3359
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00584.warc.gz
|
en
| 0.918114 | 323 | 2.90625 | 3 |
This is the goal of the Alberta Biodiversity Monitoring Institute (ABMI), a not-for-profit organization independent of government and industry, which measures and reports on the status of land, water and living creatures using scientific indicators of environmental health.
Jointly delivered through the University of Alberta, Alberta Innovates – Technology Futures, the Royal Alberta Museum and the Alberta Conservation Association, the ABMI surveys more than 2,500 species and habitats at 1,656 sites across Alberta.
“We are in the business of providing objective facts about the health of Alberta’s living resources,” says Jim Herbers, the ABMI’s information director. “The ABMI is one of the few comprehensive biodiversity monitoring programs in the world, and as a result it helps position Alberta as a world leader in environmental management.”
Funded by the Alberta government and the energy industry, the ABMI was built to be an ongoing biodiversity performance–monitoring program for Alberta.
“The breadth of what we’ve been doing hasn’t been done anywhere else. By putting together the broader sweep, we are able to talk about the broad ecosystem, rather than just certain pieces of it,” explains Jim Schieck, the ABMI’s co-director of science. “The goal is to provide information that everyone trusts, and that everyone uses to make management and planning decisions.”
The innovative use of technology plays a major role in the wide-ranging work being done by the ABMI—which has been developing methods to assess current conditions and changes over time in an ecosystem’s health.
For example, the ABMI pioneered recording bird vocalizations digitally and interpreting the recordings in a lab, “a strong advance for surveying birds,” Schieck says.
Traditionally, he explains, people went out into the field to listen to birds and then wrote down which species they detected—but with this method, there were always individual variations and errors, since not everyone is an expert in bird calls. What the ABMI has done is standardize the process using technology that records bird calls at a very fine level, and then having an expert go through the calls to identify the birds correctly. “In addition, it gives you a long-term record,” Schieck says.
Work on the technology began in 2003, when the ABMI joined up with a small company in Saskatoon to develop the recording equipment using very sensitive microphones.
In another example, the ABMI is working with the University of Calgary to develop new remote sensing methods to assess vegetation composition throughout the province.
Remote sensing using satellite imagery has been under development since the mid-1980s, but invariably ends up creating maps filled with errors and uncertainty, Schieck says. What the ABMI has been doing is refining the algorithms in existing technologies to ensure consistent interpretation of satellite images and produce better maps of vegetation throughout the province. The institute has produced a prototype of a refined vegetation map, with the goal of producing a completed version by fall.
The ABMI also creates new technology by integrating existing data collection methods. For example, over the last few decades, a variety of field data collection techniques have been developed to survey organisms ranging from plants and lichens to insects, birds and mammals.
The ABMI has combined all this with remote sensing technology to create a series of integrated, cost-effective survey techniques allowing it to conduct structured sampling protocols of a diversity of elements, including animal species, habitats, forest structures, and soil and landscape characteristics. This allows it to evaluate the status of the entire ecosystem and how the ecosystem is changing over time.
“We’ve taken things that had been unlinked and linked them all together. The real gain was in creating methods that allowed the surveys to be conducted in an integrated fashion,” Schieck explains. “It’s an extremely powerful way to evaluate ecological effects.”
Pilot fieldwork in 2012 will use new acoustic technologies to reduce the logistics and safety challenges of working with nocturnal species.
As far as the energy industry is concerned, the ABMI seems to be hitting the mark on its goal of providing objective information.
“All parties see huge value in this initiative. What we are all looking for is sound scientific information to inform good public policy,” says David Pryce, Canadian Association of Petroleum Producers vice-president, operations, who sits on the ABMI’s multi-stakeholder advisory board.
As just one example, Pryce points to the ABMI’s role in an enhanced environmental monitoring program in the oilsands region and across the province, announced this past February by the Alberta and federal governments. “ABMI competency is an integral part of that enhanced monitoring program, and will deliver an important element of biodiversity monitoring,” Pryce says.
As for oilsands developers, who must restore the land back to a viable level of biodiversity, “ABMI is absolutely vital to the long-term viability of oilsands development,” says Ken Chapman, executive director of the Oil Sands Developers Group. “ABMI’s research gives us a much better opportunity to do that in a more effective and science-based way.”
As Chris Fordham, Suncor Energy Inc.’s manager of sustainability strategy, puts it, “ABMI uses a sound scientific methodology involving regular ongoing monitoring so that changes in biodiversity can be understood and if necessary, addressed.”
From a technical and scientific rigour process, the ABMI is a world-class biodiversity-monitoring program, notes Simon Dyer, policy director at the Pembina Institute, which is represented on the ABMI’s board of directors.
“There is nothing like it anywhere else in the world, in terms of its comprehensiveness, the number of species it looks at and its ability to monitor changes in biodiversity over large landscapes over long time periods. What the ABMI provides, for the first time, is a meaningful metric of environmental impact or biodiversity performance that governments could use to inform decision making.”
In northeastern Alberta, the most pristine part of the province, “there is still time to do proper land use planning, identify conservation areas for biodiversity and ensure good planning going forward,” adds Dyer, noting that most of the criticism of oilsands development is not based on current impacts. Instead, there is more concern that the industry is projecting to quadruple production levels “without a proper plan in place to mitigate those impacts.”
What the ABMI does is provide a long-term data set that can help Albertans make better decisions about the oilsands and future development, he says.
This year, the ABMI will release two reports on the status of biodiversity, habitat intactness, and human footprint in the boreal plains ecozone and Athabasca oilsands deposit areas.
|
<urn:uuid:01fa46ed-d6b0-43e3-9b01-f37c082acafb>
|
CC-MAIN-2013-20
|
http://www.junewarren-nickles.com/feature.aspx?id=9137
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702525329/warc/CC-MAIN-20130516110845-00042-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.934289 | 1,441 | 3.015625 | 3 |
Opener: As students enter the room, they will immediately pick up and begin working on the opener –Instructional Strategy - Process for openers. This method of working and going over the opener lends itself to allow students to construct viable arguments and critique the reasoning of others, which is mathematical practice 3.
Learning Target: After completion of the opener, I will address the day’s learning targets to the students. For today’s lesson, the intended target is, “I can solve percent change problems.” Students will jot the learning target down in their agendas (our version of a student planner, there is a place to write the learning target for every day).
Thoughts from Me! This concept lends itself to the use of mathematical practices 2 and 4, as most problems can be modeled using real world examples, and given those examples students have to reason both quantitatively and abstractly. Additionally, students are working with a decimal point - which can change the value of a number drastically if placed incorrectly, so it is important that students pay close attention to precision when working (mathematical practice 6).
Instructional Strategy - Table Discussion: To summarize this lesson, I am going to ask that students have a table discussion considering the question – how can you tell if a question is asking for percent change if they don’t come right out and say it? For this question, I want students to discuss with one another how they know – what they look for in a problem. Students are valuable teachers to their peers, and I want to give them an opportunity to share what works for them. After students talk in small group, I will have one student from each group summarize their discussion for the benefit of the whole group.
Homework: After the table discussion, I will pass out the homework assignment so that students may get started!
|
<urn:uuid:cda97e82-2c0a-45bc-9911-1f614721368c>
|
CC-MAIN-2020-24
|
https://betterlesson.com/lesson/444211/percent-change-more-practice
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347435238.60/warc/CC-MAIN-20200603144014-20200603174014-00412.warc.gz
|
en
| 0.942671 | 380 | 3.4375 | 3 |
One of the main themes of Nineteen Eighty-Four is totalitarianism, as many sections of the book are focused on describing ‘the perfect totalitarian state’. Historically, most totalitarian states have eventually been destroyed by war, revolution or - less violently – by political reforms. However, the totalitarian state described in the novel is specifically designed to be immune to all of these threats (pp. 215-226), and it is implied that it may be able to endure forever, because it is more aware of the potential threats to its powers than previous totalitarian states such as Soviet Russia and Nazi Germany.
The Party's only goal is preserving power for its own sake, and this desire to remain in power makes it flexible enough to keep following its own ideals and crush any opposition.
Nineteen Eighty-Four is heavily focused on the theme of government surveillance, as it takes place in a society where citizens are watched constantly.
In the novel, this is particularly seen through the government’s use of the...
|
<urn:uuid:a8cc96bf-1d15-4c25-b083-21c2adfca87e>
|
CC-MAIN-2023-14
|
https://lektuerehilfe.de/1984-englisch/interpretation/themes
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00051.warc.gz
|
en
| 0.968855 | 217 | 3.078125 | 3 |
Bird Conservation Nepal (BCN)
Mission of the organisation
Bird Conservation Nepal is dedicated to conserve bird and biodiversity benefiting people having a vision that “Birds and biodiversity thriving in Nepal and benefiting people” with the goal as “Contribute to Birds and Biodiversity Conservation for benefiting people”.
- Conduct and collaborate research projects on various GTS and IBAs with government and international partners.
- Assess and address threat levels of IBAs.
- Conservation of vultures in six different sites through people’s participation and support in livelihood activities.
- Awareness and advocacy with government and concerned organisation
- Regular update on status of Nepal’s birds.
- Develop common bird surveys in urban areas and maintain common bird database.
- Organise public awareness events and school education programme (events like wildlife week, environment day, wetland day, migratory bird day, conservation day, earth day, sparrow day, biodiversity day, BCN day, warden seminar, etc)
- Awareness and monitoring for illegal bird trade control.
Find out more
Found on the forest floors of peninsular Malaysia, rapid deforestation has destroyed much of the enigmatic Malay Peacock-pheasant’s habitat in recent decades, and the species was sadly uplisted to Endangered on the IUCN Red List in 2022.
Support BirdLife’s advocacy work to make leaders listen to the science, and put in place the vital policies and investments to ensure nature is at the heart of solving the climate crisis.
The majestic White-bellied Sea-eagle naturally nests high up on tall, old trees. However, as these have become increasingly rare in some areas, Malaysian Nature Society (MNS) has increasingly observed them seeking refuge on man-made structures, posing danger to the birds.
|
<urn:uuid:8d40bc42-42b4-4302-9da1-6a3a495c23bc>
|
CC-MAIN-2023-23
|
https://www.birdlife.org/partners/nepal-bird-conservation-nepal-bcn/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00759.warc.gz
|
en
| 0.908839 | 390 | 2.71875 | 3 |
The Enzyme-linked immunospot (ELISPOT) assay was developed by Czerkinsky in 1983. The ELISPOT assay is based on, and was developed from a modified version of the ELISA immunoassay. It is a sensitive method for monitoring immune responses in humans and animals and a superior tool for accurate quantification of cytokine secreting T cells or antibody secreting B cells.
Nowadays the ELISPOT assay is widely used in different fields of biomedical research including:
Follow these links to find out more about the application of the ELISPOT assay.
|
<urn:uuid:2e088387-7b08-4c0e-848b-e97343da0b2d>
|
CC-MAIN-2020-24
|
https://ucytech.com/elispot-applied-research
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413786.46/warc/CC-MAIN-20200531213917-20200601003917-00167.warc.gz
|
en
| 0.945518 | 127 | 2.84375 | 3 |
Southern California Online High School Curriculum
We all know high school can be challenging academically and socially. So why are Capistrano Connections Academy (CapoCA) high school students succeeding and thriving?
The Key: Multi-faceted Curriculum and a Supportive School Community
Imagine a rigorous curriculum that leverages how, when, and where students learn best. Then integrate the most respected print and online resources, innovative instructional tools, and hands-on activities into dynamic curriculum that engages every type of learner. And top it all off by offering the gamut of high school experiences:
- Core classes in math, science, language arts, and social studies.
- Extensive electives, including foreign languages, digital technology, and journalism.
- Field trips and interactive clubs, including robotics, debate, yearbook and more.
- Honors and AP® Courses.
- SAT Preparation Courses.
- Support for students who need extra help.
- College-credit classes.
- NCAA approved courses: Many Connections Academy core high school courses are approved by the NCAA Eligibility Center. View a list of currently approved courses.
By combining rigor with flexibility, our California online high school curriculum makes success accessible to every student.
Just step into one of our biology classes . . .
In Monday’s LiveLesson® session, experienced biology teacher Ms. Patzin leads a class discussion on California’s indigenous plants and animals. Then, after viewing a Teachlet® covering energy and ecosystems, the class classifies local fauna and considers the impact of climate on the region’s plant and animal life. By Friday, students, their families and teacher are taking their lessons “on the road” for a field trip to the California Science Center. Exploring the life processes of native plants, animals, and micro-organisms, they’ll experience firsthand the intersection of ecology, biology, and energy. Back home and on their own schedules, they’ll enrich the lessons learned with research in our virtual library and interactive tools such as Virtual Dissection.
Intrigued? Check out more of our high school curriculum materials.
Beyond the Curriculum—Preparing Students for College or Career
Whether college-bound or career-oriented, we make sure the students at our online high school in Southern California are ready for what lies beyond graduation by:
- Providing access to a full-time certified school counselor.
- Helping students create four-year academic plans.
- Guiding students as they consider college and career opportunities.
Meet Ashley Argota
Learn about Ashley Argota's experience as a Nickelodeon star and Connections Academy graduate.
|
<urn:uuid:aef4bfa6-12f6-42c7-8e72-1859925aa14e>
|
CC-MAIN-2014-10
|
http://www.connectionsacademy.com/southern-california-virtual-school/curriculum/high-school/home.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999675662/warc/CC-MAIN-20140305060755-00025-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.904759 | 563 | 2.59375 | 3 |
Neil Harbisson was born color-blind and has developed an implant that allows him to ‘hear color’. That’s it: to hear color. Not to see color. His antenna is directly implanted in his skull and transmits light frequencies into sound waves.
His partner Moon Ribas has an implant that allows her to perceive the movement of real-time earthquakes all around the world.
Both Neil and Moon have developed an intelligence from their implants which they call ‘Artificial Senses’.
“We don’t want to use technology to give us information which is artificial intelligence. We want to use it to sense the information and gives us artificial senses. In this way technology can help we evolve as a race, make us smarter and more intuitive, and improve how we perceive the world around us”, he says.
It might feel controversial, unnatural or extremely intrusive, as if we’re toying with nature too much. But Neil and Moon see it differently: not only they get a lot of their inspiration from nature but they also challenge us in our ethics towards nature. “People think putting an antenna in my brain is too much. But they think it’s ok to cut down an entire rainforest to put concrete and electricity in the middle of it. We believe it’s way more ethical to use technology to change ourselves and we’re going to need to in order to survive in the ever-changing world.”
To help them spread the message of cyborgism to the world, of changing the human body to ensure the survival of the species, we put together a group of people (which included a dental surgeon, engineers and a psychologist) to create “Design Yourself” – a visual identity, tagline and website for the Foundation. The site explores the different human relationships with technology, and offers tools for expanding senses and abilities, and in the process, for becoming a cyborg.
The group also developed a brand-new dental implant, the WeTooth, that uses bluetooth technology and morse code and allowed us to present the world’s first-ever ‘transdental communication’.
They plan to test and improve on the WeTooth and eventually produce at scale so everyone can “feel speech”.
Create a way to communicate to the world the concept and mission of Cyborgism.
To accomplish that, we’ll create:
• a platform that informs people about different types of cyborgs and helps them on the path of becoming one.
• a body part in the mouth that extends human senses or abilities, inspired by other species.
|
<urn:uuid:9fd98ea5-0d79-4cd9-aa75-ee49a509456c>
|
CC-MAIN-2017-26
|
http://www.mesaecadeira.org/cyborg
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00143.warc.gz
|
en
| 0.945367 | 554 | 2.65625 | 3 |
Last week I had a long meeting with our R&D Coordinator, Scot Hoffman, as we are putting together a Multimedia Project Guide and Planner for Teachers. Although we initially started talking about Bloom's Taxonomy and how our aim is to help teachers plan multimedia projects that will facilitate higher level thinking in students, we quickly moved away from that and started to talk about the 21st century skills identified by ASB as being critical for our students' futures. These are:
- creativity and innovation
- critical thinking
- information fluency
- managing complexity
- multicultural literacy
At the same time we wanted to incorporate the work that Bernajean Porter has been doing with our teachers and students about rigor and craftsmanship. As teachers work through the planner we want them to consider the learning goals so that students make meaning before they make media. We want teachers to consider the type of communication that will be most effective for students having a desired impact on their audience. We then want teachers to consider jointly with students the mode of communication that allows the chosen media to best work together and tools that they can use to create their product. All of this has to happen before production and publishing.
As we were dissatisfied with using a graphic of Bloom's Taxonomy when we feel we have already moved way beyond this, I have started to create a new graphic that will combine our 21st century skills with the process we want students to go through when creating multimedia. I'm posting this graphic below and would love feedback from anyone who is also trying to help teachers plan for developing both the multimedia craftsmanship skills and 21st century skills in students.
|
<urn:uuid:ad29451d-30df-4208-8abf-0543dea58c9e>
|
CC-MAIN-2014-23
|
http://www.maggiehosmcgrane.com/2014/01/developing-21st-century-skills-through.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510264575.30/warc/CC-MAIN-20140728011744-00122-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.969398 | 330 | 3.234375 | 3 |
Indoor pollution sources that release gases or particles into the air are the primary cause of indoor air quality problems. Inadequate ventilation can increase indoor pollutant levels by not bringing in enough outdoor air to dilute emissions from indoor sources and by not carrying indoor air pollutants out of the area.
Why indoor air pollution is of more concern than outdoor?
Indoor air pollution is the degradation of indoor air quality by harmful chemicals and other materials; it can be up to 10 times worse than outdoor air pollution. This is because contained areas enable potential pollutants to build up more than open spaces.
How much more polluted is indoor air?
Therefore, the quality of indoor air may be even more important than outdoor quality because of exposure time to pollution. According to the EPA, indoor air quality can be two to five times worse than outdoor air quality, especially with regards to airborne chemicals.
Is indoor pollution better or worse than outdoor How much worse?
According to the EPA, however, the levels of indoor air pollutants are often 2 to 5 times higher than outdoor levels, and in some cases these levels can exceed 100 times that of outdoor levels of the same pollutants. In other words, sometimes the air inside can be more harmful than the air outside.
Why has indoor pollution become a problem? – Related Questions
Which is worse outdoor or indoor air pollution explain your answer?
In the last several years, a growing body of scientific evidence has indicated that the air within homes and other buildings can be more seriously polluted than the outdoor air in even the largest and most industrialized cities. Other research indicates that people spend approximately 90 percent of their time indoors.
Is outdoor air quality regulated more effectively than indoor air quality?
According to the Environment Protection Act, 1986, the levels of indoor air pollutants are often 2-5 times higher than outdoor levels. In some cases, these levels can exceed the outdoor levels of the same pollutants 100 times.
What is indoor and outdoor air pollution?
There are myriad forms and sources of indoor pollution, including combustion (tobacco smoke, stoves, fireplaces, and wood stoves), household products, construction materials, biologic agents (e.g., microbes, pets), off-gassing from water, and soil gas. In particular, soil gas is the origin of most indoor radon.
Does the indoor or outdoor environment have more particles?
The study shows that in the absence of significant indoor sources, the number of indoor concentrations of particles in this size range are clearly lower than the outdoor concentrations. This difference is greater, the higher the number of outdoor concentrations.
How can we control indoor air pollution?
14 Ways to Reduce Indoor Air Pollution
- Open Windows.
- Ban Smoking.
- Give Your Pets a Bath.
- Use Exhaust Fans.
- Put Down a Doormat.
- Change Filters.
- Skip Fires.
- Don’t Cover Up Odors.
What is the most important indoor air pollutant?
The most common indoor air pollutants include:
- Lead (Pb)
- Nitrogen Dioxide (NO2)
- Radon (Rn)
- Indoor Particulate Matter.
- Secondhand Smoke/Environmental Tobacco Smoke.
- Volatile Organic Compounds (VOCs)
- Wood Smoke.
What affects indoor air quality?
In addition, several other factors affect indoor air quality, including the air exchange rate, outdoor climate, weather conditions, and occupant behavior. The air exchange rate with the outdoors is an important factor in determining indoor air pollutant concentrations.
How important is indoor air quality?
Indoor Air Quality (IAQ) is strongly connected to health and wellbeing. Humans tend to spend a large amount of time indoors. Breathable air that’s free of health threatening pollutants can lead to a higher quality of life, lower risk of respiratory illnesses, and a reduced risk of various chronic conditions.
How can bad indoor air quality affect our health?
Indoor air pollutants can cause immediate effects, such as irritation of the eyes, nose, and throat, headaches, dizziness, fatigue, and aggravated or worsened asthma symptoms among asthmatics. Long-term effects are also possible, due to chronic exposure to indoor air pollutants.
What is meant by indoor air pollution?
Indoor air pollution is dust, dirt, or gases in the air inside buildings such as your home or workplace that could be harmful to breathe in. Poor indoor air quality has been linked to lung diseases like asthma, COPD and lung cancer. It has also been linked to increased risk of heart disease and stroke.
What is indoor pollution examples?
Mold and pollen. Tobacco smoke. Household products and pesticides. Gases such as radon and carbon monoxide.
Can indoor air make you sick?
How Does Poor Indoor Air Quality Affect Health? The “immediate” symptoms of poor indoor air quality can often resemble a cold or allergies. You can feel fatigue or dizziness and may frequently get headaches and experience eye, nose, or throat irritation.
Why is air quality worse at night?
This is because, as the temperature drops during the nighttime hours, the atmosphere traps car emissions, CO2, and other pollutants in the house and down near the ground – and the effect is much worse if spaces inside the home are poorly ventilated.
What are main causes of air pollution?
Vehicle emissions, fuel oils and natural gas to heat homes, by-products of manufacturing and power generation, particularly coal-fueled power plants, and fumes from chemical production are the primary sources of human-made air pollution.
What are 10 diseases caused by polluted air?
Speaking of the list of diseases caused by air pollution, it includes:
- Asthma. One of the common diseases caused by air pollution is asthma.
- Chronic Obstructive Pulmonary Disease (COPD)
- Weakening of Lung Function.
- Lung Cancer.
- Cardiovascular Diseases.
- Strategies to Minimise the Effects of Air Pollution.
What effects air quality?
Sunshine, rain, higher temperatures, wind speed, air turbulence, and mixing depths all affect pollutant concentrations.
How does air quality affect health?
Poor air quality can irritate the eyes, nose, and throat, cause shortness of breath, aggravate asthma and other respiratory conditions, and affect the heart and cardiovascular system. Breathing polluted air for long periods of time can cause more serious problems.
|
<urn:uuid:6033ad9d-98dc-4147-a7b2-eb66736ee770>
|
CC-MAIN-2023-23
|
https://reimaginingeducation.org/why-has-indoor-pollution-become-a-problem/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00318.warc.gz
|
en
| 0.913003 | 1,358 | 3.34375 | 3 |
Mosquitoes Kill More People All Other Animals Combined
Bill Gates is working to raise awareness of the world’s deadliest animal: the mosquito. They kill more humans than all other animals put together–excluding humans, of course.
When it comes to killing humans, no other animal even comes close. Take a look:
What makes mosquitoes so dangerous? Despite their innocuous-sounding name—Spanish for “little fly”—they carry devastating diseases. The worst is malaria, which kills more than 600,000 people every year; another 200 million cases incapacitate people for days at a time. It threatens half of the world’s population and causes billions of dollars in lost productivity annually. Other mosquito-borne diseases include dengue fever, yellow fever, and encephalitis.
There are more than 2,500 species of mosquito, and mosquitoes are found in every region of the world except Antarctica. During the peak breeding seasons, they outnumber every other animal on Earth, except termites and ants. They were responsible for tens of thousands of deaths during the construction of the Panama Canal. And they affect population patterns on a grand scale: In many malarial zones, the disease drives people inland and away from the coast, where the climate is more welcoming to mosquitoes.
Considering their impact, you might expect mosquitoes to get more attention than they do. Sharks kill fewer than a dozen people every year and in the U.S. they get a week dedicated to them on TV every year. Mosquitoes kill 50,000 times as many people, but if there’s a TV channel that features Mosquito Week, I haven’t heard about it.
Naturally, he’s commissioned a Mosquito Week video, viewable at the link.
via Martin Butcher
|
<urn:uuid:eccafefd-fad7-4e8c-92f4-feefdf941832>
|
CC-MAIN-2014-23
|
http://www.outsidethebeltway.com/mosquitoes-kill-more-people-all-other-animals-combined/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261958.8/warc/CC-MAIN-20140728011741-00300-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.944072 | 368 | 2.59375 | 3 |
This is the first major image we come across in the poem. Poe uses it a bunch of times, always as a part of the phrase "a kingdom by the sea." In poetry we call that repeated phrase a refrain. You can think of it like a chorus in a song. The verses tell a story, but the chorus comes back to the main images again and again. Rhythm is a big part of poetry, and this refrain helps give this poem its rhythm.
- Line 2: We see the phrase "a kingdom by the sea" over and over. Thinking about what this phrase means will help to set the tone for the entire poem. We think it gives the whole thing a kind of fairytale feel. When it comes to Poe's writing, we can't always be sure exactly where we are. He uses this word four more times in the poem, but we never get any specifics about the kingdom. A lot is left to our imagination. It seems like it's there to give us an intense image of a time and place a long way from our own.
- Line 20: In this line the wording is the same as in line 2, but now the word kingdom comes right after the story about the "highborn kinsman." So now the kingdom might call up images of powerful, rich people who can just take things without asking. In that case, the kingdom becomes a symbol of tyranny and cruelty. It's part of what makes the world such a bad place to live for our poor speaker.
|
<urn:uuid:20945bdd-f3b7-4df1-a9ab-a253d8a40a02>
|
CC-MAIN-2014-15
|
http://www.shmoop.com/annabel-lee/kingdom-symbol.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207046.13/warc/CC-MAIN-20140423032007-00420-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.96273 | 308 | 3.234375 | 3 |
This website has a lot of information on resources to improve handwriting, teach it in multisensory ways and make it fun for your child! Understood.org
“Every human being is a resource…” Don’t disown differences – celebrate them! Our gene pool has a reason for its survival. ‘One size fits all’ cannot continue as the universal calibration anymore. Time to celebrate neurodiversity. Watch this video to gain some insight into the mindset of an individual with Autism.
A recent article in the NASEN magazine that talks about changing of perspectives and rethinking disabilities as superpowers! Different or disabled? Time to change our thinking! the-power-of-different
“Early intervention can make a lifetime of difference.” Watch this 1 minute video to understand some of the red flags for identifying Autism. The sooner the child gets intervention the greater the chances of social, emotional and academic success.
Check out how Mark Ruffalo understands empathy in this Sesame Street video!
Here are 50 fun ways to improve your child’s fine motor development.
Welcome to another brand new year at YIS! We have lots of new families joining us and this article is a really good reminder that whether or not your child has a learning need, every child needs to be understood. A conversation jar is a great way to connect with children and hope that everyone finds something helpful in this article.
26 phrases to calm an angry child! Some of these strategies are tried and tested and do work. Keep at it and you will find ways to help your child not just deal with the anger but accept and understand the emotion and then let it go!
A simple and informative video to explain what Dyslexia is and what is isn’t.
|
<urn:uuid:f95339e8-3029-4ebe-95ae-359cd74189ae>
|
CC-MAIN-2017-34
|
http://blogs.yis.ac.jp/yandeaue/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104204.40/warc/CC-MAIN-20170818005345-20170818025345-00191.warc.gz
|
en
| 0.927188 | 365 | 3.0625 | 3 |
Recent news stories lament the "disaster" of mudslides in Los Angeles caused by heavy rainfall on steep slopes where wildfires have burned off trees and shrubs. "Let the buyer beware," the old saying goes; but somehow, the buyers always say, "We didn't know."
Ignoring logic, developers bulldoze fragile soil, remove rock and create flotillas of houses on hills covered with mesquite and other brush rich in flammable resins, all guaranteed to be set on fire by lightning or arsonists. Every time the slopes burn, every time the houses slide, the rest of the nation holds its breath and watches dramatic videos of frightened people evacuating. Firefighters risk their lives to save people who choose to ignore evacuation orders. The same thing will happen again next time.
Yet none of this uproar, expense and suffering is necessary; it's a consequence of ignoring natural law. The causes are clear and the effects predictable, and they're expected to get much worse as climate change accelerates.
John McPhee's 1989 book, The Control of Nature, summarizes how Los Angeles got into this mess and predicts what will happen next. (The book also describes the likely consequences to New Orleans of the Corps of Engineers' playing with the Atchafalaya River.)
How often have you seen this scenario? The TV camera slow-w-wly pans over a devastated landscape while a solemn voice describes the latest tragedy. The camera focuses on a disheveled man standing in front of wreckage. He's lost his dog and his pickup truck and his family members are distraught. But when that microphone appears, he grins pluckily and says, "We'll rebuild."
"There oughta be a law...." say some of the voters who pay for these foolish choices. In fact, there already is: natural law. And as Ann Zwinger wrote in Credo: Shaped By Wind and Water, "Ignorance is no defense in the court of natural law."
A 2008 study by Stanford University scientists demonstrated that humans have learned how to ignore cause and effect because our culture aids and abets them in doing so. Unfortunately, says Deborah S. Rogers, who participated in the study, people have learned how to avoid natural selection in the short term. But ignorance is unsustainable.
In short, we've rewarded people for being uninformed by providing rescue from Mother Nature. Hike up a mountain without adequate knowledge or gear? No problem; volunteers from Search and Rescue will save you. Lost in the desert? Just dial 9-1-1.
It's past time to start obeying a law that's been on the books literally forever. You say you want to build your mansion among dense pine trees on the side of a mountain? Use fireproof materials, thin the trees, and bulldoze escape routes. Good luck: You're on your own.
A few years ago, fire threatened a subdivision in the Black Hills of South Dakota. The subdivision had only one narrow access road. Two firefighters tried to save a house as the woods blew up, and got trapped on the porch when the fire crowned. A helicopter-load of slurry saved both the men and the house. But the homeowner tried to sue; he wanted the fire department to pay for cleaning up the pink slurry.
A team of citizens -- I was a member -- was formed to plan how to avoid such scenarios in the future. Firefighters offered to educate subdivision dwellers and suggest tree-thinning and more escape routes. We decided that the driveways of homeowners who didn't comply would be marked, and no attempt would be made to save those houses. Judging by recent Western fires, however, not all fire departments have followed our lead.
The attempt to repeal natural laws is expensive. We reward people who make ignorant choices when we rescue them from the consequences of their actions. But natural selection is still in force, and the more we reward ignorance, the more of it we get.
You want your desert house to have a lawn? Sorry. Desert living requires sand, rock and cactus, and no swimming pool. Water is too precious to waste on self-delusion. You want a lawn? Move to where grass grows naturally.
You want to build in the trees? Stock your own firefighting tools. You've built on a flood plain? Buy a raft and water wings. Please don't call on the public for help -- and don't count on a bailout from an insurance company or the federal government.
Linda M. Hasselstrom is a contributor to Writers on the Range, a service of High Country News (hcn.org). She writes in Hermosa, South Dakota.
|
<urn:uuid:b27b746b-8eb4-4467-82c6-02be92a9430c>
|
CC-MAIN-2014-23
|
http://www.hcn.org/wotr/build-in-the-wrong-place-and-youre-on-your-own
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510271648.4/warc/CC-MAIN-20140728011751-00107-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.959619 | 965 | 2.515625 | 3 |
Silicosis is the number one occupational lung disease across the globe. Silicosis is also the oldest known occupational disease, and it leads to serious complications that may result in death.
Silica, simply put, is fine, microscopic sand that is used to make things like glass bottles, light bulbs, jars, windows and more. Miners are exposed to silica on an almost daily basis working deep inside mines, as they blast through stone which is then vaporized to become microscopic sand particles that float in the air around them.
Over time, silica collects inside the lungs. Given the fact that this is a foreign matter, the body’s defenses go to work in trying to contain the substance by producing fibrous tissue around it, so that it can be digested and eliminated. Continued exposure to silica, however, such as in the case of a mine worker who spends his entire life in a silica-rich environment, will cause aggressive fibrous tissue formation, effectively compromising the proper functioning of the lungs.
Workers commonly affected by silicosis include those that work in the following industries:
- Masons or stone workers
- Those in railroad construction
- Foundry workers
- Quarry workers
- Demolition workers
- Rock drillers
Silicosis is a lung disease which progresses slowly. It is thus generally only caught when it is too late to stop its progression, but there are treatments available.
Here are the various stages of silicosis:
- Chronic silicosis: This usually takes about a decade to develop, and it is caused by low-level but constant exposure to silica.
- Accelerated silicosis: This usually is seen after 5 to 10 years of elevated exposure to silica.
- Acute silicosis: This usually happens during the highest exposure of silica and usually takes a few weeks to a few years of exposure to very high levels of silica.
Silicosis is an insidious disease which sneaks up on you. That being said, here are some of the common symptoms:
- Persistent coughing
- Shortness of breath
- Weakness and fatigue
- Overproduction of phlegm and mucous
- Heart problems affecting the right heart chamber
Symptoms of silicosis are often only seen years after a person stops working with (or around) silica. In addition, once you have it, you are more likely to develop infectious diseases such as tuberculosis. If left untreated, one may develop extreme chest pain and respiratory failure which may be fatal.
If you work in the industries we’ve mentioned, it’s a good idea to let your doctor know so your workup includes a checkup for silicosis. Oxygen therapy to improve lung function and steroids are used to manage this condition, and patients are advised to stop continuing exposure to prevent more damage to the lungs and heart.
Can I File a Lawsuit?
In many types of cases, you can (and probably should) file a lawsuit in order to recover compensation for the damage you’ve suffered. These cases can be very complex, and your best chance at recovering a fair settlement would be to contact a product liability lawyer for a free consultation.
To speak with someone about your situation right now, call Rasansky Law Firm at 1-877-659-2580 (toll-free).
|
<urn:uuid:02d6e2ea-b151-4822-b72a-e9139554de67>
|
CC-MAIN-2020-24
|
https://unsafeproducts.com/industrial-commercial/silicosis-silica-dust/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406365.40/warc/CC-MAIN-20200529183529-20200529213529-00275.warc.gz
|
en
| 0.952796 | 696 | 3.671875 | 4 |
Bryce Canyon National Park is a national park located in southwestern Utah in the United States. The major feature of the park is Bryce Canyon which, despite its name, is not a canyon but a giant natural amphitheater created by erosion along the eastern side of the Paunsaugunt Plateau. Bryce is distinctive due to geological structures called hoodoos, formed by wind, water, and ice erosion of the river and lake bed sedimentary rocks. The red, orange, and white colors of the rocks provide spectacular views for park visitors. Bryce sits at a much higher elevation than nearby Zion National Park. The rim at Bryce varies from 8,000 to 9,000 feet (2,400 to 2,700 m).
The Bryce area was settled by Mormon pioneers in the 1850s and was named after Ebenezer Bryce, who homesteaded in the area in 1874. The area around Bryce Canyon became a U.S. National Monument in 1923 and was designated as a national park in 1928. The park covers 35,835 acres (55.99 sq mi; 145.02 km2) and receives relatively few visitors compared to Zion National Park and the Grand Canyon, largely due to its remote location. The town of Kanab, Utah, is situated at a central point between these three parks.
Summer 8am - 8pm (May - September) Fall (October) 8:00 am - 6:00 pm Winter (November - March) 8:00 am - 4:30 pm Spring (April) 8:00 am - 6:00 pm
|
<urn:uuid:7fd38d7b-5d03-4e7f-81b1-5e99d7583d8b>
|
CC-MAIN-2014-10
|
http://www.touristlink.com/united-states/bryce-canyon-national-park/overview.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011355201/warc/CC-MAIN-20140305092235-00006-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.968558 | 319 | 3.328125 | 3 |
When an eye is looking directly at an object, light rays from that object are focused on the macula lutea. This is a yellow oval spot at the center of the retina (back of the eye). It is the part of the retina that is responsible for sharp, detailed central vision (also called visual acuity). The macula lutea, also called fovea, contains a very high concentration of cones. These are the light-sensitive cells in the retina that give detailed central vision.
Macula; Fovea; Yellow spot
Stein HA, Stein RM, Freeman MI. Anatomy of the eye. In: Stein HA, Stein RM, Freeman MI, eds. The Ophthalmic Assistant: A Text for Allied and Associated Ophthalmic Personnel. 9th ed. Philadelphia, PA: Elsevier; 2013:chap 1.
Yanoff M, Cameron JD. Diseases of the visual system. In: Goldman L, Schafer AI, eds. Goldman-Cecil Medicine. 25th ed. Philadelphia, PA: Elsevier Saunders; 2016:chap 423.
Review Date 10/8/2017
Updated by: Linda J. Vorvick, MD, Clinical Associate Professor, Department of Family Medicine, UW Medicine, School of Medicine, University of Washington, Seattle, WA. Also reviewed by David Zieve, MD, MHA, Medical Director, Brenda Conaway, Editorial Director, and the A.D.A.M. Editorial team.
|
<urn:uuid:0233b8d4-2a90-4808-a651-d8c0b95d9bec>
|
CC-MAIN-2020-10
|
https://medlineplus.gov/ency/article/002252.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146643.49/warc/CC-MAIN-20200227002351-20200227032351-00196.warc.gz
|
en
| 0.817743 | 309 | 3.859375 | 4 |
The Future of Online Relationships
In the 4th part of our cyberpsychology roundtable discussions we asked our 4 authors what role has the internet had to play in modern day social relationships and what does the future hold for generations that are growing up online?
What role has the internet had to play in modern day social relationships and what does the future hold for generations that are growing up online?
Patricia Wallace, the author of The Psychology of The Internet
John Suler, the author of Psychology of the Digital Age
Kent Norman, the author of Cyberpsychology
Raphael Cohen-Almagor, the author of Confronting the Internet’s Dark Side
For thousands of years, human social relationships were constrained by geography. People built strong ties with tribe members, and typically chose a life partner who lived within nearby.
In our own century, social relations still also mostly rely on opportunities to meet and become acquainted, because the people attend the same school, work in the same building, or attend the same community functions. Maintaining social relationship also benefit from nearness; if friends move away, contact usually dwindles along with any emotional attachments.
Although these simple principles still apply, they are far less powerful in determining the patterns of social relationships.
Now, social networks help make it much easier to maintain ties and to build new ones with friends of friends, regardless of location. The shift is especially evident for singles who participate in online dating sites and can scroll through hundreds or thousands of profiles, seeking that special partner. The choices and possibilities are mind-boggling, a feature that brings both pros and cons.
“…the dependence has its downsides, with young people feeling less able to navigate face-to-face conversations, or meet new people in person.” – Patricia Wallace.
For the digital natives, the Internet’s support for connectedness is so familiar that they marvel at anyone who doesn’t actually send text messages. But the dependence has its downsides, with young people feeling less able to navigate face-to-face conversations, or meet new people in person.
Strange as it seems, many of my students recognize this failing and are seeking advice about how to have a “real” conversation, one without mobile phone distractions. The psychology of the Internet and its role in social relationships will continue to evolve, and I predict the young people who are growing up online will adjust and adapt, blending their online worlds with their face-to-face contacts in new ways that draw on the best of both. Of the many disruptive innovations the Internet has wrought, the challenge to geographic limits on social relations is a certainly a key one.
We are learning some good lessons about the unheathy use of social media. Playing to the crowd to get more “likes” is a dead end. Little tidbits posted about yourself works well to keep people updated, but not so well for developing a friendship.
Displaying only an idealized version of yourself does not actually impress anyone – in fact, people might feel envious, bad about themselves, or just plain bored with you. Multitasking your friends, family, and colleagues in-person and online turns you into a jack-of-all-trades in your most important relationships, and a master of none.
Instead, we and the generations growing up with the Internet will learn how to enrich our relationships by communicating via writing, images and talking, via synchronous and asynchronous methods, and whether we are near or far or on-the-go.
The biggest lesson we will learn is that socializing online offers many fun, convenient, and interesting possibilities, but it is no substitute for being in-person. As the famous psychotherapist Fritz Perls used to say, “Be here now.”
Do you and your companions really want to be texting on and off throughout your dinner at a nice restaurant?
Do you really want to be distracted by taking selifes as you blow out the candles on your birthday cake, or do you just want to focus on your wish?
I once spoke with people who felt totally devoted to the rich meaning they found in their online lifestyles, especially how they could share their souls with companions in a text relationship. Curious, I asked them, “If you had to choose between spending the rest of your life relating to people only online or only in-person, what would you do?”
Most fell silent, but one said, “I’d stay online”….
The Internet has been for most college students an additional channel for communication. But some their primary channel. So it goes without saying that studies have shown that social relationships are largrely mediated by the Internet and in the post-PC era, by mobile devices such as tablets, smart phones, and smart watches.
But I believe that for the next generation, social relationships will be further enhanced with virtual reality and augmented reality devices.
Virtual reality goggles will come to the consumer market shortly. Facebook has acquired Oculus Rift and the consumer version will be released in 2016. Sony Morpheus for the PlayStation 4 will also be released in 2016, but primarily for gaming. HTC Vive in conjunction with Steam has a release date of November 2015.
These devices will have the potential of connecting people and worlds in a truly immersive experience. Imagine leaving the primitive virtual chat rooms of The Palace and Second Life and being immersed in spaces with your Facebook friends. You can meet up at a café in Paris, a ride in Disney World, or a concert at Woodstock!
But the industry gurus are actually predicting a bigger impact with augmented reality, which will combine the real world with the virtual and will allow users to be mobile.
I know Goggle Glass was a big failure and the project terminated, but the industry learned a lot about how to develop the next round of devices.
Rather than posting my travel pictures to Facebook, I can bring my friends with me in my AR goggles on my visit to the Parthenon. They will see what I see and I can enjoy their expressions and comments.
“In the 1990s, one of my friends got married after meeting his future wife online. My wife and I listened to our friends’ love story with some astonishment.” – Raphael Cohen-Almagor
The digital age is an age of electronics and gadgets. Many prefer to stay in doors, surrounded by their electronic equipment. Many children nowadays do not go out to play in public spaces. This is due to a growing feel of insecurity, fears, parents’ protectiveness, and the in-house inclinations of today’s generation.
Young and old people make friends online, proud to have many virtual friends whom they will never meet, Netusers from different corners of the world. Because their ability to master technology, many Netusers would like to master their time more effectively. Thus, many people of the younger generations refrain to go to the movies because this activity takes time and is expensive.
Many of my students watch movies online, at their own leisure, having as many breaks as they wish at their leisure.
In the 1990s, one of my friends got married after meeting his future wife online. My wife and I listened to our friends’ love story with some astonishment. They were our only friends who met each other online. More than twenty years later, a substantive number of couples meet online. As many professionals are busy working, they do not have time, or they do not allow themselves time to meet and woo others. The Internet serves many people well.
The meaning of friendship has been changing. Many are proud to have more than one thousand friends on social-networking sites. Often, the online relationships are far less meaningful and demanding than friendship off-line. People invest less in such friendships, and they expect less. But, as said, people can fall in love and form very meaningful relationships online if they choose.
Read the rest of this 6-part Roundtable Discussion:
Part One: Cyberpsychology
Part Two: Misusing the Internet
Part Three: When Kids Go Online
Part Four: The Future of Online Relationships
Part Five: The single most important issue in cyber psychology today
Part Six: The Future of the Internet
|
<urn:uuid:7586c202-a66c-4594-adde-9ac7a897d29e>
|
CC-MAIN-2017-43
|
http://www.cambridgeblog.org/2015/12/the-future-of-online-relationships/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825147.83/warc/CC-MAIN-20171022060353-20171022080353-00366.warc.gz
|
en
| 0.955907 | 1,706 | 2.53125 | 3 |
In a decision that truly furthered the cause of justice, Florida lawmakers have initiated an effort to start classifying antisemitic incidents as hate crimes. By classifying antisemitic incidents in Florida as hate crimes, the perpetrators of these foul acts would face steeper penalties, including felony charges.
A bill has been proposed that would make it possible to start considering antisemitic acts as hate crimes punishable by felony charges. The bill would increase the criminal penalties for antisemitism in the State of Florida.
While some on the far right have questioned how bills like this would impact freedom of speech, others have pointed out the fact that no one has the right to engage in criminal acts, whether those acts involve antisemitism or not.
Here is what you should know about antisemitism, why it’s dangerous, and why we need to combat it in an effort to create a better world for us all.
What Is Antisemitism?
Antisemitism is an age-old problem that, unfortunately, still persists in our society. It is a form of hatred and bigotry that targets Jews and is often expressed through verbal and physical acts of violence. Antisemitism has been around for centuries and has taken on many forms throughout the years. As a citizen of the world, it is important to understand why antisemitic acts should be considered hate crimes and why they are wrong.
By understanding why antisemitism is wrong, we can begin to take steps to address this troubling issue. Furthermore, we can learn how to identify and confront it when we see it and how to create a safe and tolerant environment for everyone.
Antisemitism is basically hate towards Jewish people. It is a form of bigotry and racism, a way of judging and treating Jewish people as inferior because of their ethnicity and religious background. It can be expressed in many different ways, including through words, actions, or policies that are intended to hurt or discriminate against Jews and make them feel hated.
A person may identify as an antisemite and not even realize it. Many people who act in an antisemitic way are not even aware that they are doing so because they have learned to hate Jewish people through the media, friends, or family members and have been influenced by damaging stereotypes.
Examples of Antisemitic Acts and Behaviors
There are a number of clear and unacceptable examples of antisemitic acts and behaviors. Knowing how to recognize these behaviors can help us understand when something should be reported.
- Displaying or using Nazi imagery featuring Hitler or any other symbols that are associated with the Nazi regime.
- Imposing discriminatory policies against Jewish people.
- Using offensive stereotypes or false information about Jewish people, such as false claims that Jewish people are responsible for all the world’s problems.
- Vandalizing a synagogue.
- Creating hoaxes or fake news stories that portray Jewish people or Jewish organizations as immoral or evil.
Why Antisemitic Acts Should Be Considered Hate Crimes
Antisemitic acts are hate crimes because they are motivated by bias or prejudice against Jewish people. They are intended to cause harm or inflict pain and suffering.
They are a form of discrimination that hurts not only the victim but also their families and loved ones. They can also damage the entire social fabric of our society.
Crimes that are committed against people that follow Judaism are hate crimes that are becoming increasingly outdated in today’s world. After the horrors of Nazism, WWII, and the Holocaust, there is no excuse for such ridiculous hatred to persist in 2023.
Why Antisemitism Is Wrong
If a person has never been exposed to the concept of antisemitism, then he or she may not even know that they’re doing something wrong.
By understanding why antisemitism is wrong, we can help to minimize this troubling issue and create a more inclusive environment for everyone. Antisemitism is wrong because it is an expression of irrational hatred that has no basis in fact.
It is an extreme form of prejudice that is based on stereotypes and false information that has been passed down through the centuries. It is the opposite of empathy, understanding, and reason.
How to Recognize and Confront Antisemitism
In order to make a difference and combat antisemitism, it’s important to know how to recognize and confront it when witnessing it in action.
- Be aware of your surroundings and the people you interact with.
- Know what antisemitic acts look like.
- Hold the person who commits the act accountable for their actions.
- Inform the person that their actions are wrong and why.
- Don’t let antisemitic acts go unnoticed.
The best thing that you can do when you witness an antisemitic act is to refuse to tolerate it. The longer we tolerate antisemitism, the longer we endure unfairness across the board.
How to Create a Safe and Tolerant Environment for All
To create a safe and tolerant environment for all, we must be aware of antisemitism when we see it. We must also take action to confront it. We mustn’t shy away from the problem just because we’re afraid of hurting someone’s feelings or having a conflict.
The best way to create a safe and tolerant environment for everyone is to educate everyone on what antisemitism is and why it is wrong. We must create an environment where everyone feels welcome and accepted and where we treat others with dignity and respect.
Combatting antisemitism doesn’t mean that we should all convert to Judaism; it means that we should all be tolerant and respectful to each other regardless of what someone believes or doesn’t believe.
The point is that we don’t have to agree on everything to create a better world. The real key to creating a better world is to agree to disagree. It’s a simple and easy way forward that should appeal to reasonable minds, especially students of history who understand the cancerous nature of division.
On the surface, division can be useful in the form of diversity, variety, etc. The trouble starts when we start attacking each other for our differences.
You must be logged in to post a comment.
|
<urn:uuid:1bd1c302-8d14-487c-8f62-86c7450bed38>
|
CC-MAIN-2023-14
|
https://sfl.media/florida-lawmakers-aim-to-impose-steeper-penalties-for-antisemitic-hate-crimes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00799.warc.gz
|
en
| 0.953843 | 1,290 | 3.015625 | 3 |
A former United States naval vessel will be set on fire this August, and the Navy will send robots to put out the blaze.
The Navy is testing robots that will put out fires instead of having sailors do the job. The humanoids may be tasked with dousing fires aboard naval vessels full-time within a few years, experts within the Navy told Mashable. But before that happens, the machines will have to pass a test in August at Mobile Bay, Ala., aboard a decommissioned vessel dedicated to firefighting exercises, the ex-USS Shadwell. This will mark the first time the bots have practiced on a ship.
Firefighting is a team effort, and adding robots to the equation won't change that. The humanoids will operate hoses just like living, breathing humans, and their eyes will be able to recognize flames. Their movements, however, will be dictated by hand and voice commands given by a person standing nearby.
Those verbal orders will be especially important.
“If you have an iPhone, you probably have tried to interact with Siri, and there are whole webpages dedicated to Siri fail," Paul Bello, Ph.D., a program officer in cognitive science at the Office of Naval Research, told Mashable. The Navy can't afford any fire fails, because every misunderstood command means the flames burn a bit longer.
An English-recognition system will allow the robots to interpret commands within the context of fighting fires, Bello said, since sometimes a human's literal words can differ from what he meant.
“You say very little [as a firefighter], but what you say ends up entailing a lot," Bello said. "You’re depending on your teammate to know enough about you and to know enough about the situation [that they will understand what you're saying]."
The interaction will resemble what happens in the video below.
The August test run will almost certainly include some kinks, and while engineers problem-solve, others in the Navy are trying to find ways to make the humanoids more cost effective.
Tom McKenna, Ph.D., a program officer in biorobotics and pattern recognition at the Office of Naval Research, told Mashable a single firefighting robot could cost about $1 million, though that price is likely to fall when the Navy finalizes a prototype and a way to mass produce. They'll still be pricey, though, so perhaps the robots should look into doing some dusting and sweeping if they want to earn their keep.
Since the ships are designed for people, the bots will function at a higher level if they are built like humans. They will be able to climb ladders, turn doorknobs and perform other basic physical tasks to help them carry supplies from one place to another. If the firefighting goes according to plan, the humanoids might take over other dangerous duties, too, such as administering medicine on the battlefield or scoping out disaster areas before soldiers are sent in.
Guns are out of the question, though; the U.S. Department of Defense has a strict policy against handing weapons to autonomous bots. McKenna said the Office of Naval Research has not conducted any studies in that area.
Neither McKenna nor Bello revealed a concrete timeline for a rollout of the robotic firefighters, but they hope it will take no longer than a few years.
|
<urn:uuid:2647acfd-6e50-4ac6-8e37-e607a58c9ebc>
|
CC-MAIN-2020-10
|
https://mashable.com/2014/03/20/navy-robots-firefighters/?utm_campaign=Mash-Prod-RSS-Feedburner-All-Partial&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_medium=feed&utm_source=rss
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144111.17/warc/CC-MAIN-20200219092153-20200219122153-00251.warc.gz
|
en
| 0.961072 | 686 | 2.609375 | 3 |
When one thinks of a barrier island, the smell of salty air and the sound of breaking waves immediately come to mind. Barrier islands are typically thought of as oceanic features, but they can exist along any coast where sediment can vertically accrue, including lakes. In fact, barrier features such as spits and barrier islands can be found nearby in the Great Lakes, where wind, waves and currents combine to create their distinctive landforms.
Both oceanic and lacustrine barrier systems serve as protection for the mainland coast by reducing the effects of wave action and creating crucial backwater environments such as bays and marshes, but they are also highly desired waterfront property and recreational areas. Therefore, it is important to understand of how these systems develop and evolve over time, and to learn about some of the issues that they face, so their natural and social benefits can be preserved.
This study examines the lacustrine barrier systems present in the Great Lakes, looking at three sites in particular, and focuses on the similarities and differences between oceanic systems and lacustrine systems. By understanding these relationships, we can gain an understanding of the processes at work and make better management decisions.
The study begins with a summary of some general characteristics of oceanic barrier systems, including a definition of a barrier system and some common landforms. A discussion of oceanic barrier systems follows, focusing on common sediment sources, typical system controls and favorable conditions for development. A similar discussion on Great Lakes lacustrine barrier systems will follow, including detailed descriptions of two Great Lakes systems, which will illustrate many of the processes discussed earlier.
|
<urn:uuid:df80dbfa-f19b-4709-a3ea-e2f3071b7398>
|
CC-MAIN-2014-35
|
http://homepages.cae.wisc.edu/~chinwu/GLE401/web/Bruce/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829421.59/warc/CC-MAIN-20140820021349-00227-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.956528 | 324 | 3.890625 | 4 |
Harvesting of molluscs
Methods of harvesting molluscs like oysters, mussels, etc., for market depend on the culture systems employed. In bottom culture, where the sea bed is planted with spat for on-growing, the most common harvesting method is dredging. From intertidal areas which are fully or partly drained at low tide, oysters or other molluscs can be easily collected by hand. But, as will be described, off-bottom methods of culture are commonly practised in modern oyster and mussel farms. The oysters and mussels are grown on sticks planted in the intertidal areas or hung on long lines, special nylon bags or plastic containers. In such cases, harvesting is relatively simple and can be done by hand or from a boat when necessary. When they are grown on special platforms, as for example mussels in New Zealand (fig. 11.8), mechanical lifting devices installed on a large boat may become necessary.
In countries like France, where there is a special market for greened oysters, fully grown flat or Portuguese oysters may be reared in small, shallow coastal ponds known as claires for up to six months in order to increase their weight and develop the green coloration. Claires are drained, dried and then fertilized before filling with salt water to a depth of about 25cm. Water is exchanged at spring tides. Oysters are stocked in these ponds at a high density. They grow in weight rapidly (almost doubling in a six-month period) and the bluish-green diatoms (Navicula), which grow in the claires, impart a green colour to the meat. Such large greened oysters fetch a high price in French markets.
When molluscs are dredged out from sea beds, some of the sand and silt swirled up during the operations may enter their mantle cavity. In such cases, the animals can be spread out on a cleansing plot or basin and covered with gently flowing sea water for varying periods of time. This helps them to eliminate any silt or sand and also recover from the fishing stress. They are transported alive to distant markets.
|
<urn:uuid:589bfb42-d4bf-4cd1-a1c8-1ed0c4b566bb>
|
CC-MAIN-2023-40
|
https://www.brainkart.com/article/Harvesting-of-molluscs---Harvesting-methods-in-Aquaculture_15981/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00152.warc.gz
|
en
| 0.94929 | 450 | 3.46875 | 3 |
ASSESSING SEVERITY to support evidence-based decision making
ACAPS analysis assesses the severity of different components of a crisis in order to support evidence-based decision making. We use the INFORM Severity Index to enable comparisons of scale and severity across the world; we assess the level of humanitarian access in various contexts; and we analyse the level of humanitarian needs for certain population groups in specific contexts.
The INFORM Severity Index
The INFORM Severity Index is a regularly updated, and easily interpreted model for measuring the severity of humanitarian crisis globally. This global severity analysis is coherent with other types of severity analysis conducted by ACAPS, in the field, at a subnational level.
The INFORM Severity Index is a composite index, which brings together 31 core indicators, organized in three dimensions: impact, conditions of affected people, and complexity. All the indicators are scored on a scale of 1 to 5. These scores are then aggregated into components, the three dimensions (Impact, Conditions, Complexity), and the overall severity category based on the analytical framework. The three dimensions have been weighted according to their contribution to severity: impact of the crisis (20%); conditions of affected people (50%); complexity (30%). The weightings are currently a best estimate and will be refined using expert analysis and statistical methods. Each crisis will fall into 1 of 5 categories based on their score ranging from very low to high.
The INFORM Severity Index aggregates information from a range of credible, publicly available sources, such as UN agencies, governments and other multilateral organisations. This includes for example the Humanitarian Needs Overview (HNO) and Integrated Food Security Phase classification (IPC) where available. Expert judgement is involved in deciding what data to include. A reliability level estimate is provided for each crisis.
The INFORM Severity Index also uses and provides information on the ‘distribution of severity’, i.e. the number of people that fall into different categories of severity within the same crisis, which constitutes the second pillar of the model. Not all people affected by a crisis are equally affected and they have different levels of need that require a different response. This distribution is important for understanding the overall severity of a crisis. It is also important to capture and present this distribution, considering that crises having low overall severity may have some people who are severely affected.
The GCSI is an open and free tool for everybody, you can find the model updated on a monthly basis on ACAPS and INFORM websites.
OTHER TECHNICAL BRIEFS ON SEVERITY
CAN SEVERITY PROFILES OFFER AN ALTERNATIVE TO PERSONS-IN-NEED ESTIMATES? AN EXPERIMENT WITH DATA FROM SYRIA
With “Can severity profiles offer an alternative to persons-in-need estimates? An experiment with data from Syria”, ACAPS contributes to the discussion of how best to profile persons affected by disasters and crises. A statistical technique known as “Latent Profile Analysis” is used to link causal indicators to sectoral severity ratings when useful persons-in-need estimates are not available. With data on almost 5,000 localities in Syria, six profiles are estimated, each with levels of severity and a particular causal signature. Such groupings of affected communities may be more informative to response planners than mere one-dimensional rankings.
SEVERITY MEASURES IN HUMANITARIAN NEEDS ASSESSMENTS
For the past several years, ACAPS has assisted the development and application of severity measures. The assistance was provided in the shape of analytic tools, personnel on mission as well as remote statistical support. This note builds on key lessons from past needs assessments and recommends good practices for how to measure severity for future ones. It discusses two dominant types of severity measures, illustrated with the measurement efforts that the humanitarian community undertook in two major theaters: sectoral persons-in-need estimates combined with severity ratings (2016 Syria Humanitarian Needs Overview), and non-sectoral indices combining vulnerability, exposure and intensity indicators (2015 earthquakes in Nepal). It demonstrates specific improvements in both types.
PERSISTENCE OF SEVERITY PATTERNS OVER TIME
SEVERITY AND PRIORITY - THEIR MEASUREMENTS IN RAPID NEEDS ASSESSMENTS
This note investigates how to construct and use the severity and priority scales.
|
<urn:uuid:e43c2cf2-88b7-4375-bade-a9885f14d24f>
|
CC-MAIN-2020-29
|
https://www.acaps.org/methodology/severity?acaps_mode=advanced
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657149819.59/warc/CC-MAIN-20200714083206-20200714113206-00351.warc.gz
|
en
| 0.907586 | 902 | 2.71875 | 3 |
Foods That Help Fight Memory Loss
Aging is not the only risk factor that contributes to memory loss; there are several other factors which bring on premature memory loss. This may include physical head injuries, nutrient deficiencies, and lack of physical exercises and mental stimulation. Your diet however, is the key to an overall healthy lifestyle. What you eat and what you choose not to, can have a significant importance to your health. For instance, if you are leaving out important proteins, without knowing how to substitute them, you could be at a risk of developing a nutrient deficiency which can lead to poor memory loss. However, if you manage to keep a healthy diet you will not only be able to sustain good memory, but will also be able to help yourself from preventing memory loss on whole!
In order to make things easier for you, we have put together a list of all the top notch foods which will straight away help you in maintaining good memory and at the same time, prevent premature memory loss!
Whole grains are not just an amazing food for a healthy weight loss plan, but are also ideal for mental health! Whole grains eaten as breakfast, are especially helpful in enhancing the attention span. It has been scientifically proven that, those who eat whole grains for breakfast are likely to be in a more positive mood at the start of the day and are more likely to have a more alert and durable attention span.
These antioxidant rich berries are extremely helpful for protecting our cells against damage, which includes brain cell damage that can result in memory loss! Studies conducted have shown that a rich antioxidant diet through berries, had slowed down and reversed memory loss in rats. In fact, research also proves that blueberries can reduce the risk of one developing Dementia!
Fish are known to be extremely rich in omega 3 fatty acid, however, more so are fatty fish that include tuna and herring. Omega 3 fatty acid is extremely important for when it comes to fighting memory loss, as this fatty acid has been proved to improve the symptoms of Chronic Memory Loss Condition (Alzheimer’s disease).
Eggs are another very important food that should be included in our diet on a daily basis. This is because, eggs help in the production of the Neurotransmitter Acetylcholine as eggs are a rich source of Choline and protein. These Neurotransmitters in the brain are the very things that help send the information from cell to cell. Eating eggs, therefore help speed up these neurotransmitters which contributes to faster and quicker mental activity and response.
Nuts, Beans and Seeds!
These three are known to be extremely brain healthy as they are an amazing source of protein! Which also make them the perfect substitute for vegetarians seeking protein without having to eat meat.
Fresh juices that include the juice derived out of fruits and vegetables on the spot are also a very health pro memory food that should be consumed often. Having fresh juices will not only help fight memory loss but will also help deliver rich nutrients and antioxidants needed to maintain an overall mental health. Try having juices derived from dark colored fruits and veggies. For instance, kale juice, melon juice or even yellow squash!
Rich in the antioxidant EGCG, green tea also makes for the ideal pro memory food which also helps combat premature mature memory loss. This particular antioxidant is extremely helpful for maintaining memory as it helps prevent the loss of brain neurons which are the very factor responsible for memory loss.
|
<urn:uuid:5e4c2028-be9b-42e0-89c7-010ba58453d0>
|
CC-MAIN-2014-15
|
http://www.fitnessrepublic.com/nutrition/foods-that-help-fight-memory-loss.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00108-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.960608 | 701 | 2.828125 | 3 |
Tuesday, March 03, 2015
CNN: "Finding Jesus" starts with "The Shroud of Turin"
CNN has started a new series on Sunday nights for the Lenten season, “Finding Jesus: Faith, Fact, Forgery”, with the basic link here.
The first episode was “The Shroud of Turin”, and it fully documents the garment found in the Fourteenth Century (there are several others, like one found in Lirey, France. The documentary reports the carbon dating that suggests the document was created about then, possibly by a crude camera called the “camera obscura”, which actually could deposit a negative on cloth using silver nitrate or carbonate, and urine (as a source of ammonia).
However, there is another facial shroud in Spain. The Sudarium of Oviedo, on the northwest coast of Spain, in Galicia (I have been to Bilbao, in 2001, to the East, in the Basque area). The Sudarium actually matches the shroud.
There are many people who question the Carbon 14 dating on the shroud, and believe the shroud may indeed have originated at the time of the crucifixion.
The documentary covered a lot of details as to how the crucifixion would have progressed, leading to suffocation, with the nails through the wrists. It also covers the chronology of the handling of the body and the garments as is known.
Wikipedia attribution link for photo of ark that holds the Sudarium, p.d., author Sitomon.
|
<urn:uuid:003b1d54-202e-4c60-ab23-190c56be58a1>
|
CC-MAIN-2017-34
|
http://billstvreviews.blogspot.com/2015/03/cnn-finding-jesus-starts-with-shroud-of.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102967.65/warc/CC-MAIN-20170817053725-20170817073725-00093.warc.gz
|
en
| 0.968465 | 318 | 2.578125 | 3 |
The other day I was enjoying one of my favorite snacks, Alphaghetti, and I began to ask myself a few questions.
How many letters are in a can of Alphaghetti? Are all 26 letters included, or are there some that are missing? Is there a roughly equal number of each letter, or are some letters consistently more common than others? To answer these questions, I decided to do a scientifically rigorous analysis of the statistical properties of Alphaghetti.
The first step is to collect data. I grabbed a can of Alphaghetti, and emptied it into a bowl. I began picking the letters out one by one, keeping a tally of all 26 letters. I enlisted the help of my roommate John.
It took about two hours to count all the letters. There were 853 letters in the can. The data is here. There were no letters missing. The most common letter was “i”, but it was not so far ahead that it couldn’t be fluke.
I ran some chi-squared tests to get a better idea of the frequency distribution amongst the letters. I discovered that there is no way the letters are distributed as they are in a large sample of English text. Another chi-squared test revealed that it’s not totally implausible that the letters are uniformly distributed. If I had to guess based on this evidence, I would say that the letters in a can of Alphaghetti are uniformly distributed, although this guess is not statistically justified.
One fact that surprised me was the surprisingly low occurrence of defects in the letters. I would expect that letters like M, W, and Z would break often, but they didn’t. I only found 30 noodle fragments in the whole can which could not be clearly identified as letters.
|
<urn:uuid:4bc91515-6fcd-4451-8744-cedad6f661d6>
|
CC-MAIN-2013-48
|
http://jpcameron.com/blog/?m=201001
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164758033/warc/CC-MAIN-20131204134558-00080-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.979545 | 364 | 2.984375 | 3 |
Height and thickness of a scattering (aerosol or cloud) layer from space-based oxygen A-band spectroscopy: An analytical approach
Simplified radiative transfer modeling is used to show that both altitude and thickness of a scattering layer (in pressure units) can be inferred from spectral satellite observations in the O2 A-band at high-enough resolution, and with prior information about optical thickness. For simplicity, the surface is assumed black (water-like). This confirms previous claims but using closed-form analytical methods, hence more physical insight. For optically thin aerosol or cirrus, the single-scattering limit is used; for optically thick clouds or aerosol plumes, a diffusion-type model is invoked.
Radiative Transfer, Remote Sensing, Clouds, Aerosols
[DOI: 10.1478/C1V89S1P026] About DOI
Url Resolver: : http://dx.doi.org/10.1478/C1V89S1P026
This work is licensed under a Creative Commons Attribution 3.0 License.
|
<urn:uuid:37c2fedd-dbab-4c80-b9ae-d6f344d5b577>
|
CC-MAIN-2013-20
|
http://cab.unime.it/journals/index.php/AAPP/article/view/C1V89S1P026
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703293367/warc/CC-MAIN-20130516112133-00006-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.782249 | 229 | 2.796875 | 3 |
If you know anything about the value of high-quality early childhood education, you know that the Perry Preschool Project provided a very substantial return on the money invested in it.
To be exact, society had reaped $7 in benefits for every dollar spent by the time the 3- and 4-year-olds enrolled in the program reached the age of 27. More of them had graduated from high school, and they earned more money, owned more homes and cars, and had fewer arrests than their peers who’d acted as controls. (When they turned 40, the gains had climbed to $16 per dollar invested.)
Big payback for SEL
Columbia University researchers have just discovered another big winner. Their cost-benefit analysis of six social and emotional learning programs, The Economic Value of Social and Emotional Learning, shows that SEL delivers $11 in benefits for every dollar invested.
Although the programs they studied (Second Step, Responsive Classroom, 4Rs, Positive Action, Life Skills Training, and Social and Emotional Training) have different goals and approaches and target children of different ages and levels of risk, all of them bring benefits that greatly exceed their price tag. The children in these programs experienced significant:
- Reductions in aggression, violence, substance abuse, and delinquency
- Declines in depression and anxiety
- Increases in grades, attendance, and performance on core academic subjects
213 studies can’t be wrong
A recent meta-analysis of 213 universal school-based SEL programs documented the same extraordinary results, but without examining costs. These interventions:
- Enhanced social and emotional skills like recognizing emotions, empathy, managing stress, problem-solving, and decision-making
- Promoted positive attitudes and social behaviors
- Decreased behavior problems and emotional distress
- Improved academic performance
The researchers found that SEL programs help all children, and regular classroom teachers can teach them, but this shouldn’t be an ad hoc affair. The most effective learning takes place when teachers use evidence-based programs and implement them faithfully.
An effective program includes four practices known by the acronym SAFE:
- Sequenced—a step-by-step training approach
- Active—active forms of learning like role-play and rehearsal
- Focus—time spent on developing personal or social skills
- Explicit—learning goals directed at specific social and emotional skills, rather than general ones
Head Start agrees
With such remarkable outcomes, it’s no wonder that Head Start is considering introducing SEL programs on a large scale. After testing PATHS, the Incredible Years, and a one-year version of Tools of the Mind, they found there are different ways to boost children’s social and emotional development, provided they’re evidence-based and include high-quality teacher training and coaching.
Challenging behavior and SEL
Children with challenging behavior may have trouble in the social and emotional realm. Because they’re frequently rejected by their classmates, they have few opportunities to learn and practice social and emotional skills. In fact, they may hang out with others like themselves, reinforcing their antisocial tendencies.
When you proactively teach SEL to the whole class, no one is singled out or stigmatized, and everyone learns the same concepts and vocabulary, making the skills easier to model, practice, use, and reinforce, and you can integrate them into the curriculum and everyday activities.
Clearly, social and emotional skills can be taught, and they’re worth every penny.
Here are some guides to SEL programs:
- CASEL (Collaborative for Academic, Social, and Emotional Learning) Online Guide to Effective Social and Emotional Learning Programs
- Social and Emotional Learning Research Review: Evidence-Based Programs
What do you think?
A nationally representative survey showed that most teachers believe social and emotional learning is important. What do you think? Are you using a social and emotional learning program in your classroom? Does it help you address behavior problems? We’d love to know your views.
|
<urn:uuid:54597558-f5ba-4df2-9e7e-d825ed020564>
|
CC-MAIN-2020-10
|
https://childrenwithchallengingbehavior.com/tag/tools-of-the-mind/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145708.59/warc/CC-MAIN-20200222150029-20200222180029-00241.warc.gz
|
en
| 0.947068 | 834 | 3.5 | 4 |
Luther Burbank’s love for life went beyond developing and raising plants. He loved nature and the little creatures that he came upon during his daily work with his plants. This is evident even in the letter he sent back home to his sister in regards to Santa Rosa, “This is the chosen spot of all the earth as far as Nature is concerned”. He loved the bees and butterflies, tadpoles and frogs, birds and turtles and even said that any child who has been deprived of these, has been deprived of the best part of his education.
Here at Luther Burbank Home & Gardens we have planted a wildlife habitat in honor of Luther’s love for nature. It is visited by birds, butterflies, bees, frogs, squirrels and salamanders.
In planning a wildlife garden you must keep in mind that wild creatures have five requirements to assure their survival. These five needs are: water, food, shelter from predators, shelter from the weather and a safe area for nesting and raising their young. By planting deciduous and evergreen shrubs and trees of various heights, vines, blooming plants and plants that produce berries or other kinds of fruits, you will have taken care of four of the necessary requirements leaving only a source of water. This can be as simple as a dish of water on the ground or as dramatic as a fountain with running water. The ideal bird bath should have gradually sloping sides and the deepest spot shouldn’t be more than three inches.
Organic gardening is the preferred method to use. It is much safer for you, your children and pets, and the birds and other creatures that are attracted to and take refuge in your yard. Many chemicals are non-selective in what they kill, which means you are potentially killing both the bad and the beneficial insects. Poisoned insects may get eaten by adults or be fed to babies which may mean an early death. Birds are an excellent natural insect control along with the frogs, toads, lizards and beetles that make their home in your natural yard.
Here at Luther Burbank’s garden, we have created a wildlife habitat that fulfills all five wildlife needs by using the plants listed below. There are many more plants that attract birds, but since our garden space was limited we had to be selective. We have indicated what these plants have to offer by using these abbreviations: F=food S=shelter N=nesting
Trees: These offer a canopy for shade, protection, nesting and food.
|Walnut F,S,N||Dogwood F,S,N||Redwood F,S,N|
|Elderberry F,S,N||Hawthorne F,S,N|
Shrubs: These are ideal nesting spots and food sources.
|Mahonia F,S,N||Currant F,S||Dogwood F,S,N|
Annuals and Perennials: These plants add color and variation to any yard while offering food to birds.
|Alyssum F||Foxglove F||Scabiosa F|
|Bleeding Heart F||Goldenrod F||Statice F|
|Coneflower F||Nicotiana F||Zinnia F|
|Campanula F||Rosemary F,S|
Hummingbirds are attracted to flowers for their nectar, although they also eat insects.
|Ajuga F||Coral Bells F||Fuchsia F|
|Bee Balm F||Columbine F||Penstemon F|
|Ca. Fuchsia F|
Backyard Birds Commonly Found in Sonoma County:
|White-crowned Sparrow||Pine Siskin||Mourning Dove|
|Golden-crowned Sparrow||Dark-eyed Junco||Hummingbird|
|House Sparrow||Scrub Jay||Lesser Goldfinch|
|Song Sparrow||Stellar Jay||Plain Titmouse|
Birdscaping Reference Books:
An Illustrated Guide to Attracting Birds by Sunset
National Audubon Society North American Birdfeeder Handbook by Robert Burton
The Naturalist’s Garden by Ruth Shaw Ernst
How to Attract Birds by Ortho Books
|
<urn:uuid:60d65a76-f771-4216-ae58-5ae390e02130>
|
CC-MAIN-2017-26
|
http://www.lutherburbank.org/about-us/specialty-gardens/wildlife-habitat-garden
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00097.warc.gz
|
en
| 0.938102 | 887 | 2.578125 | 3 |
Fires in West Africa
NASA's Aqua satellite passed over the western part of Africa on February 10, 2013, and captured many areas of agricultural fires and smoke plumes in several countries including Sierra Leone, Liberia, Guinea, Cote d'Ivoire, and Mali. These agricultural fires are set by farmers to clear lands and to bring nutrients back to the soil. The downside is that they also create air pollution which can be carried by wind patterns to other areas far from their source.
The Moderate Resolution Imaging Spectroradiometer (MODIS) instrument that flies aboard NASA's Aqua satellite captured the image of smoke and fires which are designated by the multiple red pixels. These pixels are heat signatures detected by MODIS. The image is false-colored to make the red areas stand out more.
Image: NASA/Jeff Schmaltz, MODIS Rapid Response Team Text: NASA's Goddard Space Flight Center/Lynn Jenner
|
<urn:uuid:3cd72676-d377-4c6e-8ee9-593316df593c>
|
CC-MAIN-2014-41
|
http://www.nasa.gov/mission_pages/fires/main/world/20130211-westafrica.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657102753.15/warc/CC-MAIN-20140914011142-00015-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.919317 | 189 | 3.78125 | 4 |
Using Vacuum Sealing Machines for Food
What are Vacuum Sealing Machines?
A vacuum sealer is a machine that removes the air from a plastic bag or any other storage container and then closes the container to prevent any further air from entering. Vacuum sealing preserves food by eliminating the oxygen that the bacteria and mould require to develop. It also prevents freezer burn, allowing frozen items to last longer.
Prevent Freezer Burn
Vacuum-sealed foods are protected from freezer burn and dehydration. When air comes into contact with water molecules around food, freezer burn occurs. Vacuum sealing helps to prevent this by keeping air away from the food. Freezer burn is not harmful to one’s health, but it does affect the flavour and texture of the food.
Fresher Food for a Longer Period
The lack of air exposure enables longer preservation and protection in the refrigerator or cabinet. Vacuum sealing preserves food by preventing mould, fungus, and bacteria from growing. This is especially useful when purchasing seasonal foods and food that deteriorate rapidly, such as vegetables, lettuce, and meats. It also works with almonds, spaghetti, crackers, and other foods that get stale when exposed to oxygen and moisture in the air.
Another excellent application for vacuum sealing is storing seasonal products, such as tomatoes or berries, for use over the winter. This way, one may enjoy products all year long and taste perfectly fresh even when they are out of season.
Vacuum packing extends the shelf life of food, reducing waste and saving money. Many food categories have seen massive increases in the amount of time they can be stored:
When purchased in bulk, food might become freezer burned or forgotten in the fridge to save money. Vacuum sealing extra food and leftovers saves money and reduces food waste. It also reduces packaging waste by eliminating the need to purchase additional packaged products.
No Chemical Preservation
Using vacuum sealing bags, one can make their own fresh marinated food and store it for later use. This avoids the need to purchase frozen marinated foods at the store, which may contain harmful chemicals and preservatives.
Increase Cabinet Space
By vacuum sealing products and stacking them on the side, more space is created in the pantry, refrigerator, and freezer for other food items such as cans and boxes.
Quick and Efficient
Having food ready to go by vacuum sealing it into healthy servings or having ready-to-go leftover meals saves time.
What Foods can be Vacuum Sealed?
Almost any product may be vacuum wrapped readily, including meats, vegetables, hard fruits, and bulk foods. However, a few exceptions demand extra care or should not be sealed.
Blanch Before Vacuum Sealing:
Broccoli, cauliflower, cabbage, brussels sprouts, and turnips can all be vacuum packed, but only after they have been blanched. After short boiling and submerging in cold water to stop the cooking process, these commodities can be safely sealed and frozen. Blanching halts enzyme synthesis, which causes quality and colour to deteriorate with time.
Do Not Vacuum Seal:
Vacuum sealing should be avoided when it comes to mushrooms, garlic, and soft/unpasteurized cheeses like Brie and Ricotta. These items may contain anaerobic bacteria, which can thrive in an oxygen-free environment inside a vacuum bag.
Allow foods to cool to normal temperature before sealing them, as higher temperatures are more prone to house bacteria. Ensure that meals are chilled securely and kept out of the temperature danger zone for as long as possible.
Types of vacuum sealer machines
Consider what one expects the machine to deliver when selecting the best vacuum sealer. The two primary options are chamber and exterior (also known as out-of-chamber) machines. The one you choose depends on how much sealing you want to accomplish, whether you are packaging liquids, and your budget. A pistol-style vacuum sealer may also be effective in some specific applications.
Chamber Vacuum Sealer
Chamber vacuum sealers are ideal for applications that require a high volume of sealing, batch sealing, or liquid sealing. They are more expensive upfront than a tabletop vacuum sealer, but they give significantly higher performance and adaptability. A chamber machine is practically a must-have if one regularly packs liquid-rich foods.
Tabletop Vacuum Sealer
Tabletop vacuum sealers are a great option if you plan on sealing occasionally and will not be sealing liquids. They are less expensive than chamber machines and create a quality seal. However, they lack the adaptability and performance that a chamber unit can give. A tabletop vacuum sealer is ideal if you are new to vacuum packaging or simply require low-duty equipment.
Pistol-Type Vacuum Sealers
Pistol vacuum sealer is best suited for applications where it is easier to take the sealer to the bag rather than the other way around. It employs a unique bag with a built-in valve; one physically seals the bag with the accompanying handheld sealer tool before drawing air out via the valve. The pistol-style handle allows one to draw air out as needed, similar to a classic tabletop sealer’s pulse mode.
Industrial Vacuum Sealer
The Industrial Vacuum Sealer is an established vacuum impulse sealer. The sealer machine, built on a tried-and-true basis, combines quality, durability, and versatility. This vacuum sealer is designed to accommodate a wide variety of options and configurations. It also comes with a gas flush for modified atmosphere packaging, bi-active seal bars for top and bottom heat during sealing, and independent vacuum, gas, seal, and cool timers. The Industrial Vacuum Sealer caters to unique process requirements and can be utilised in various industries such as industrial, automotive, food, chemical, and components production.
Vacuum sealing is one of the greatest methods for storing food and offers several advantages. Presently, the number of countertop and handheld vacuum food sealers on the market is bigger than ever before, and they span every price range. As a result, numerous machines are available to meet a person’s individual needs.
|
<urn:uuid:d8884e8f-434e-48d0-bded-da0629adf72e>
|
CC-MAIN-2023-50
|
https://www.streampeakgroup.com/using-vacuum-sealing-machines-for-food/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00796.warc.gz
|
en
| 0.930813 | 1,274 | 2.953125 | 3 |
Our day-to-day lives were reformatted when the consumer mobile wireless device era, beyond cell phones, was ushered in by iPods in 2001 and followed in short order by Blackberries, smartphones, e-readers, and tablets. Nurturing our peripatetic existence, we could immediately and virtually anywhere download music, books, videos, periodical, games and movies. Television is soon to follow. But these forms of digital communication and entertainment are a far cry from digitizing people.
This decade will be marked by the intersection of the digital world with the medical cocoon, which until now have been largely circulating in separate orbits. The remarkable digital infrastructure that has been built—which includes broadband Internet, cloud and supercomputing, pluripotent mobile devices and social networking― is ripe to provide the framework for a most extraordinary upgrade and rebooting of medicine.
When I was finishing my internal medicine training in 1982 the term “digital” in medicine referred exclusively to the rectal examination. Now, 3 decades later, there are 4 domains of what comprises digital medicine―genomics, wireless sensors and devices, imaging and health information systems. Each of these digital medical technologies are on exceptionally accelerated growth curves. In 2012, complete DNA sequencing of all 6 billion bases of a diploid human genome will be accomplished in 2 hours at a price well under $4000. Already DNA sequencing is having an impact in medicine for specific gene-drug interactions, targeting of cancer therapy by defining tumor driver mutations (comparing somatic versus germ-line DNA), and demystifying life-threatening idiopathic diseases. Just a few years ago wireless sensors got their start for consumers in the health and fitness space, with wearable accelerometers in running shoes, bracelets, necklaces or clips. Now a brain wave sensor can be used to continuously monitor one’s phases of sleep and wakefulness.
Sensors for real time, continuous or intermittent remote monitoring are now available for glucose, heart rhythm and ocular pressure. Virtually every relevant physiologic metric can be captured via a wireless sensor that is in development, including all vital signs such as blood pressure and blood oximetry. A third domain of miniature high resolution imaging, in the form of handheld ultrasound devices the size of a cell phone with wireless transmission capacity, and other portable imaging including X-ray and magnetic resonance in development. The fourth domain of electronic health records and health information systems is the only part of digital medicine that the United States Affordable Care Act has been given a significant priority and a $40 billion investment.
In aggregate, the 4 domains of digital medicine provide an entirely new panoramic window to each person’s biology, physiology and anatomy– “high definition man”―for the first time in the history of medicine. For example, take the 70 million Americans already diagnosed with hypertension. It has been exceptionally difficult to get multiple readings for any patient and we know that at least 50% of patients with hypertension are poorly controlled. Lack of adequate control of blood pressure is associated with a higher incidence of stroke and heart attack. With the capability of continuous, seamless, remote blood pressure monitoring we will have a new window of this metric while an individual is sleeping or emotionally upset. And such data can be archived, processed, sent to one’s physician, or to a social network to set up managed competition among a group of hypertensives for optimal blood pressure control. The same principle can be applied across the board of physiologic metrics, such as glucose.
There are several challenges that lie ahead in order for the potential of digitizing humans to be actualized. First, there is the data flooding that is already occurring from sequencing genomes and capturing biosensor data. The signal processing of such big data sets, development of algorithms, software tools for annotation, and transforming rich data to practical information is daunting and a rate limiting step. Second, there is the concern about costs with the precedent that with every new medical technology there has been an associated increased economic burden to the health system. Will these tools in digital medicine provide a new precedent? That remains to be seen, but there are some promising early indicators such as the sequencing capabilities far outstripping Moore’s Law (and correspondingly costs are plummeting), and the obvious reduction of cost afforded by the use of a heart rhythm app for a smartphone instead of a Holter monitor or a handheld ultrasound pre-empting the need for a formal study. Third, each of these technologies needs clinical validation through rigorous trials. However, the size of such trials could be conceived as very small, with the extraordinary amount of data collected for each individual the ability to enroll the most suitable individuals and to favorably impact them with an intervention may be enhanced. In fact, the whole concept of “N of 1” clinical trials has been brought to the forefront with the new opportunities of data capture and targeted intervention. Fourth, there are clearly issues of privacy and security that need to be addressed, as with any digitized package that engenders the possibility for hacking and breach of the data. Already this has been a significant issue with electronic medical records indicating that much work must be done in this area for avoidance of a “digital dystopia” in medicine. Fifth, the paradox of having so much (or too much) information for any individual but for physicians to instead treat the scan, genomic data, or physiologic metric.
Notwithstanding these challenges, there remains a distinct and exciting opportunity for medicine to undergo a radical transformation. One that is driven by consumers, as it is their DNA, their smartphone, and their data—leading to active participation and real empowerment. The likelihood that consumers can drive this revolution is health care is potentiated by powerful social networking which has already had the profound impact of rapidly mobilizing millions of people for common goals.
Ultimately the need for hospitals except for intensive care unit beds will be put to question, as most patients can have remote pan monitoring at markedly lower cost. Similarly, the need for in person office visits should be greatly reduced with the ability to rapidly transfer relevant data and leveraging video links such as Skype and Face Time. This might be conceived as “house calls” for the 21st century.
The dominant outgrowth of digitizing human beings is the realization of practicing individualized medicine. Instead of the profound waste in the use of prescription drugs, which amounts to more than $300 billion per year in the United States, the use of pharmacogenomics offers promise of precisely matching up the right individual with the right drug and dose. Similarly, the ability to capture data we have never been able to see before in people, like continuous blood pressure, may be a segue for better protection from heart attacks and strokes. Beyond the single metric like blood pressure, systems to detect an impending asthma attack (via integrating multiple metrics) or congestive heart failure before they happen may fulfill the long-standing goal of prevention. Steve Jobs was right on target when he said, “I think the biggest innovations of the twenty-first century will be the intersection of biology and technology. A new era is beginning, just like the digital one was when I was my son’s age.”
|
<urn:uuid:76d6e7a3-66d7-4b89-b4ca-ef4a00d4494b>
|
CC-MAIN-2020-10
|
https://thehealthcareblog.com/blog/2011/12/26/digitizing-human-beings/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146123.78/warc/CC-MAIN-20200225141345-20200225171345-00367.warc.gz
|
en
| 0.945277 | 1,473 | 2.671875 | 3 |
Author: Nora Sarafian-Tachjian, 25/08/20 (Last modified 25/08/20) - Translator: Simon Beugekian
The region known as Hadjin, and which has historically been called Harkan and Ache, has given birth to its own unique dialect of Armenian. This dialect is an amalgam of classical Armenian and Cilician vernacular. Hadjin, alongside the neighboring city of Zeytun, was located in the Armenian-speaking region of Cilicia.
The people of Hadjin historically spoke a purer form of Armenian. However, due to the natural and often forced movements and displacements of the population, the local language evolved into a discrete dialect. Like other provincial Armenian dialects, the Hadjin dialect borrows from Greek, Farsi, Kurdish, and Turkish.
There is still a small number of people around the world who speak the Hadjin dialect. Their ability to retain their native tongue was predicated on many factors, including the environment in which they grew up, their knowledge and use of conventional Armenian, and the type of relationship they had with their elders (who used the dialect as a language of daily communication). The dialect used by these surviving speakers has changed over time, due to outside influences.
Etymological investigations, including dialectological studies, can only be undertaken properly when we establish the applicable dialect’s geographic range, the historical patterns of movement and travel of the population that speaks it, and the interactions that this population had with other people and languages. The usage of the same dialect in geographically disconnected areas is evidence of the speakers’ migratory movements. From a linguistic perspective, the study of dialects offers a crucial opportunity to study the influence of environment on language and to determine the origins of non-native words. Thus, dialectological investigations also contribute to our understanding of demography and anthropology.
The first comprehensive, theoretical study of Armenian dialects was Hrachia Acharian’s Hay Parparakidoutyun (Ourvakidz yev Tasavoroutyun Hay Parparneri) [Armenian Dialectology (Overview and Classification of Armenian Dialects)] (Moscow, Nor Nakhichevan, 1911). This was the first documented attempt to codify and classify Armenian dialects based on a single essential linguistic attribute: how they formed the indicative present tense and indicative past progressive tense.
According to Acharian’s system, Armenian dialects can be classified into three main branches – ԿԸ [gu], ՈՒՄ [oum], and ԵԼ [el-yel]. Based on this taxonomy, the Hadjin dialect belongs to the ԿԸ branch.
This classification system, based on a single defining trait, leads to an effective taxonomy. However, it does not fully explain the complications of and inter-relations between various Armenian dialects. It also makes no distinctions between the categories of dialect groups, dialects, and vernacular. After studying these issues, Kevork Djahougian created the foundations for a multi-faceted scientific classification of Armenian dialects in his work Hay Parparakidoutyan Neradzoutyun [An Overview of Armenian Dialectology] (Yerevan, 1972). According to Djahougian’s taxonomy, the Hadjin dialect is a sub-branch of the southwestern (Cilician) dialect group.
Djahougian’s classification takes into account various lexical, grammatical, and phonetic characteristics of spoken languages, which are then compared during the process of classification. In this article, we will attempt to use these same principles to analyze the Hadjin dialect, or, as its practitioners call it, the Hadjno lizou.
Those who are not proficient in this dialect often find it odd and difficult to understand. However, once they become accustomed to its inflections and other characteristics, they quickly grasp that it is simply a derivative of conventional Armenian.
The variety of phonetic permutations in the Hadjin dialect can be compared to the variety found in the Zeytun dialect.
In this article, we will examine many of the characteristics of the Hadjin dialect. We have omitted any technical study of the dialect’s phonetic system.
A defining characteristic of Cilician dialects is the replacement of the stressed vowel ա (a) with օ (o). For example, panal (to open) becomes panol (Zeytun dialect); g’ertam (I’m going) becomes gashdom (Hadjin dialect); kaghak (city) becomes kaghok (Marash dialect).
Change in Vowels
The stressed ա (a) is replaced by օ (o)
հայր (hayr; father)
In monosyllabic words, as well as words consisting of one-and-a-half syllables, ա (a) is replaced by օ (o)
տղայ (dgha; boy)
In two-syllable words, only the ա (a) in the second syllable is replaced by օ (o)
հիւանդ (hivant; sick)
In polysyllabic words, only the ա (a) in the last syllable is replaced by օ (o)
գաւազան (kavazan; staff)
ա (a) is replaced by է (e/ē)
աչք (achk; eye)
ա (a) is replaced by ե (e/y)
շահիլ (shahil; to gain)
ա (a) is replaced by ը (u/ə)
առատ (arad, abundant)
ա (a) is replaced by ե (e/y)
քալել (kalel; to walk)
ա (a) in the first syllable of a word is replaced by է (e/ē)
աշակերտ (ashagerd, student)
օ (o) is replaced by է (e/ē)
օձ (ots; snake)
The diphthong այ (ay) is replaced by է (e/ē)
այծ (aydz; goat)
ե (e/y) is replaced by է (e/ē)
երկու (yergou; two)
The people of Hadjin pronounced the consonant ռ (ṙ) as ր (r). As for the consonant ր, it was replaced by the semivowel յ (y).
Most Armenian consonants retained their original pronunciation in the Hadjin dialect, with the following exceptions and special cases:
Change in Consonants
The letter ռ (ṙ) retains the ր (r) pronunciation
դուռ (tour; door)
In both proper and common nouns, ր (r) is replaced by յ (y)
դրամ (tram; money)
The letter հ (h) is sometimes replaced by ֆ (f) or խ (kh/x); or becomes silent
հոգ (hok; concern)
The letter ղ (gh/ġ) is often replaced by խ (kh/x)
եղջիւր (yeghchyur; antler)
At the start of a word, the letter յ (y) is sometimes dropped
յիսուս (hisous; Jesus)
The letters տ (d/t) and ր (r), when appearing together, are replaced by ռ (ṙ)
կտրիճ (gdridj; champion)
The letter տ (d/t) is sometimes not pronounced
աստղ (asdgh, star)
The letter ռ (ṙ), without exceptions, retains the ր (r) pronunciation
փուռ (pour; oven)
If the letter ր (r) is followed by the letter ս (s), they are replaced by շ (sh; š)
հարսանիք (harsanik, wedding)
The declension of nouns follows conventional Armenian grammatical rules – with the addition of suffixes to the end of the words.
For example, dzar (tree), dzari (of the tree), dzare (from the tree), dzarov (with the tree). Hats (bread), hatsi (of the bread), hatse (from the bread), hatsov (with the bread).
Of course, in the Hadjin dialect, the words are pronounced dzor, dzori, dzore, dzorov/hots, hotsi, hotse, hotsov.
Like conventional Armenian, the Hadjin dialect has two classes of verbs, regular and irregular. They are conjugated accordingly, just as they are in conventional Armenian.
In the present tense, verbs retain the particle ge. In the future tense, the particle bidi is replaced by bi. In the subjunctive, yete is replaced by te. In the negative imperative, the particle mi remains unchanged. For example:
Kalel (to walk): ge kelem (I am walking), bikelem (I will walk), te kelem (if I walk), mi kele (don’t walk).
When the verb begins with a vowel, the ge became a g’. For example, g’enie, meaning he/she/it does.
The verbs oudel (to eat), yertal (to go), and ouzel (to want) are exceptions and do not require the use of the particle ge.
The conjugation of irregular verbs is more complicated, as it is in every language. For example, the conjugation of the verb oudel (to eat):
- Present tense: g’avdiem, g’avdies, g’avdie
- Simple past tense: geyo, geyoy, geyov
- Future tense: b’oudiem, b’oudes, b’oude
- Imperative: m’oudey, m’oudek
- Subjunctive: te oudem, te oudes, te oude
Examples of the conjugation of the three main types of Armenian verbs:
- Example of verbs with the ել (el) suffix: vazel-vaziel (to run)
- Example of verbs with the իլ (il) suffix: haknil (to dress)
- Example of verbs with the ալ (al) suffix: hazal-hazol (to cough)
VAZEL (to run)
Eies gu vaziem
G’ouziem ey vaziem
Toun gu vazies
G’ouzies ey vazies
An gu vaze
G’ouze ey vaze
Miene gu vazienk
G’ouzienk ey vazienk
Touk gu vazek
G’ouzek ey vazek
Envenk gu vazien
G’ouzien ey vazein
HAKNIL (to dress)
Eies gu haknim
G’ouziem ey haknim
Toun gu haknis
G’ouzies ey haknis
An gu hakni
G’ouze ey hakni
Miene gu haknink
G’ouzienk ey haknienk
Touk gu haknik
G’ouzek ey haknek
Envenk gu haknin
G’ouzien ey haknein
HAZAL (to cough)
Eies gu hazom
G’ouziem ey hazom
Toun gu hazos
G’ouzies ey hazos
An gu hazo
G’ouze ey hazo
Miene gu hazonk
G’ouzienk ey hazonk
Touk gu hazok
G’ouziek ey hazok
Envenk gu hazon
G’ouzien ey hazon
Subjunctive mood, present/imperfect
SIREL (to love)
Siye; mi siye; siyitsek; mi siyek
HAKNIL (to dress)
Hakiy; mi hakni; hakek; mi haknik
HAZAL (to cough)
Hazo; mi hazoy; hazatsek; mihazok
- vi – archuvi (in the Hadjin dialect); archevi (conventional Armenian); in front (English).
- vouey – halivouey; alevor; grizzled | dzoutsvouey; dzotsvor; pregnant.
- oued – yeghoued; yughod; oily | mazoued; mazod; hairy.
- gon – lalgon; lalgan; weepy | baydgon; bardagan; indebted.
- von – iygvon; irigvan; of the evening | shiyvon; kishervan; of the night.
- onk – meyonk; mayrenk; of the mothers.
- vodzk – khosvodzk; khosvadzk; speech | kilvodzk; kalvadzk; gait.
- vouts – idivouts; yedeven; from behind.
In the Hadjin dialect, plurals are formed in several ways:
- - ni: tkalni; tkalner; spoons | urzanki; Abrankner; possessions | tsyanni; tsyer; horses.
- - sdanni: hikisdanni; hokiner; souls | ekisdanni; aykiner; orchards.
- - niey: lerniey; lerner; mountains | dzarniey; dzaraner; servants | turniey; trner; doors.
- - iey: koughiey; kogher; thieves | khoudiey; khoder; grasses | goutiey; goter; handles.
- - dek: aghpiydek; yeghpayrner; brothers | aghchgundek; aghchigner; girls | bulzdek; bzdigner; children | gundek; giner; women.
- - ik: osgik; vosginer; golds | moytik; marter; people.
- - vuni: tservuni; tserker; hands | kutvuni; kiter; noses.
- - vouenk: tservouenk; tserkerov; with the hands.
Giyegi (Giragi; Sunday)
Eygoushepti (Yergoushapti; Monday)
Iyekshepti (Yerekshapti; Tuesday)
Bakey (Chorekshapti; Wednesday)
Hinkshepti (Hinkshapti; Thursday)
Ouypot (Ourpat; Friday)
Shapot (Shapat; Saturday)
Vaygyon (vayrgyan; minute)
Sahat (jam; hour)
Dihiy (tar; century)
Ey (meg; one)
Eygey (yergou; two)
Amis (amis; month)
Dayi (dari; year)
Shafokh (ardou ganoukh; early morning)
Geaey (gesor; noon)
Iyguvon (irigoun; evening)
Below, we present the transcripts of two recorded conversations with two different speakers of the Hadjin dialect, alongside their English translations. The first speaker is Boghos Ganachian (1929-2017), born in the Nor Hadjin (New Hadjin) neighborhood of Lebanon. The second speaker is Yeghisapet Tapanian-Oghloukian (1943-2019), also born in the Nor Hadjin neighborhood of Lebanon.
These two conversations are evidence that the Hadjin dialect, despite some of the changes it sustained over time, always retained its nature as a fundamentally Armenian dialect. The two transcripts are snapshots of the dialect as spoken by different generations.
First Conversation in the Hadjin Dialect (Boghos Ganachian)
“Inchots igik Shamen Tamasgosen?”
“How did you make your way here from Damascus?”
“Hadjno Moutasarrufu eygou askoy gu ghuyge, katsek Toyos Vaybedu peyek. Gashdon Toyos Vaybedin kev gu g’asen, te Moutasarrufu ke g’avze. Moytu gu g’ene, gashdo.”
“The moutasarref [governor] of Hadjin sent two soldiers and ordered Master Toros to be brought to him. The soldiers went to Master Toros and told him that he was being summoned by the moutasarref. The man went and presented himself.”
‘Oh, payev igiy Toyos Varbed.’
‘Oh, welcome, Master Toros.’
‘Good to see you.’
‘Nisd! Keno eygou hod ghayfe aso te piyen.’ Neyise, ghayfan gupiyen. Iyents gu g’ase, te eskeyneyoun, ‘touk katsek, pon mu chounik mey hedu.’
‘Sit down! Fetch us a couple of coffees!’. They brought the coffee. Then he turned to the soldiers – ‘You’re dismissed, you’ve got nothing to do here!’
“Gu nusdin, ghonoushmoush g’anon.”
“They sat down and talked.”
‘Toun zis shod gou siyes, che mu?’
‘Toros, you like me very much, don’t you?’
“Toyosn al, ho g’ase.”
“Toros said yes.”
‘Yes al kiy shod gou siyem. Amma kalik oreru erind chi ko eyveno ermenots. Yete zis deynemmish unesne, aylet ar! Or! Esdeghotsu keno.’
‘And I like you very much, too. But the coming days don’t look good for Armenians. If you want my advice, you should take your family and get out of here!’
“Toyos ghalfan doun gako, gu genche dughan, achkindeku, hoyseyu. Meselen undas-undas e, inch gu g’asek ishdonk te minonk?”
“Master Toros went back home, gathered his sons, daughters, and brides around him, and explained the situation to them. He asked them, ‘What do you think? Should we stay or should we go?’”
“Keris, Ghazaria Babahikian, hech mi gaynik, eygou katur araba peyek inch gone litsek, yalla Souria!”
“My uncle, Ghazaria Babayikian, said: ‘Let’s leave immediately! Let’s get a couple of chariots, fill them up, and set out for Syria!’”
“Yev undats Souria gakon. Our? Djaramana. Hon doun ge purnen, ge nusdin. Moytu nadjoy e, bzdig arvag mu, bdig chouyi ochk mu go yegher, keopliv shinel gou dan gor. Moytu shad nazig naloun hivant g’ounno, ge meyni.”
“So they moved to Syria. Where? Djaramana [southeast of Damascus]. There, they settled down and built a house. The man was a carpenter. There was a stream there, a brook, they had him build a bridge over it. But he had a very weak constitution. He fell ill and died.”
“Amma bobis, keris askoy en yegher harbi g’ashdon. Harbu lmnnalen yedk g’akon Djaramana, irents gou kudnon, dayi me gu nusdin, sarrafoutyun gu g’enen. Bobis nadjoy e, inch gu shine? Kermen, okhlaghou, berid. Asang tyam g’arne gor dadjigneren. Djong mu payo g’aynen keriyis hed sarrafoutyun gu g’enen Djarmanayen Shom gu g’ichnen yev yed gou kan. 1925-in Dyurzineroun yev Souryatsineroun grivu g’ella. Keris gu g’ese, te menk hos chenk gano menol, yalla Beirut b’ishdonk, Beirut al kalen yedk, yes hes chim geno, Ameyiga b’ishdom. Kerin g’elle gor Arjantin g’erta gor, moyus, bobus al yedevnen g’ashdon, achki trikoma (trachoma) ellalloun, yed gakon. Hayrus, mayrus, yeghpayrus, kouyrus.”
“My father and uncle, on the other hand, were soldiers. They went off to war. After the end of the war, they settled down in Djaramana, and got their feet under them. For a year they stayed there, working as currency exchangers. My father was a carpenter. What did he make? Spindles, containers, berids. So this is how they made money from the local Muslims. They saved a little bit of money and the two went down to Damascus, then went back to Djaramana. In 1925, the fighting between the Druze and the Syrians broke out. My uncle decided that he could no longer live there, and that they would go down to Beirut. But after arriving in Beirut, he decided he could not stay there, and decided to move to America. My uncle went to Argentina. My mother and father followed him there, but after contracting trachoma, they decided to return. My father, mother, brother, and sister.”
“Yes ayn aden chi gam. Yes kalen yedk, hes dzner em, 1928.”
“I wasn’t around yet at that time. I was born here, after they came back, in 1928.”
Second Conversation in the Hadjin Dialect (Yeghisapet Tapanian-Oghloukian)
I’ll tell you now.
Achku gouyno undas lisin (…) meh endeghu undas goudjog mu go gou gokhes, tim ashkharhu lis gounno. Meh endeghu evel menk lamba gou varonk kidi, lamba, eygou meg gou gerenk temizlamish uneliken gou gerenk. Esdeghu undak pon chou go lisu godjage gou gokhes tim deghe lis gouno.
May the light of this place be cursed... At our place, we have just one button. When you press it, the whole world lights up. Back home, we had lamps that we lit. We occasionally broke a couple while cleaning them. Here, there is no lamp. You just press the button and there is light everywhere.
- Hayreni Parparakidagan Adlasi Nyuteri Havakman Dzrakir [Armenian Dialectological Atlas – MaterialsCollection Project], H. T. Gosdantian, A. N. Hanenian, M. H. Mouradian, A. V. Krikorian (eds), Yerevan, 1977.
- Hagop B. Boghosian, Hadjni Enthanour Badmoutyune yev Shrchaga Kozan-Daghi Haygagan Kyugheru [A General History of Hadjin and the Nearby Armenian Villages of Kozan-Dagh], Second Edition, Holy See of Cilicia, Antilias, 2014.
- Hrachia Acharian, Knnoutyun Giligyayi Parpari [Study of the Cilicia Dialect], Yerevan State University Press, Yerevan, 2003.
|
<urn:uuid:616b24a1-a6c8-4093-b998-e4a16aeb9b06>
|
CC-MAIN-2023-40
|
https://www.houshamadyan.org/mapottomanempire/vilayet-of-adana/hadjin/local-characteristics/dialect-ii-hadjin.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00507.warc.gz
|
en
| 0.830482 | 6,356 | 3.03125 | 3 |
Modern-day badminton is a sport involving a net, racquets, and a shuttlecock, which is a piece of rubber with stabilizing feathers attached.The shuttlecock is also known as a birdie. In volleyball and tennis fashion, the shuttlecock is hit with the racquets back and forth between opposing team players on either side of the net. More similar to volleyball is the fact that a play is ended if the birdie hits the ground. Most regulation games play to 21 points, allowing either side to score whether serving or not. The game was not always played exactly this way, though. Like most sports, badminton started out as a recreational past time and over decades was developed into a competition sport.
There are theories that the beginnings of a badminton style game were played in ancient Greece or Egypt. Concrete proof, however, dates back to British India in the 18th century. In the town of Poona, British soldiers stationed there watched the locals play a similar game, although it did not involve a net. These soldiers brought the game back to England when they returned in the 1960's, and called it "Poona". In 1873 the Duke of Beaufort had a gathering at his estate called "Badminton" and the game was officially introduced, using a net. After that it was referred to as "the game of Badminton" and eventually simply, Badminton.
In 1887 an England group known as the Bath Badminton Club drew up some official rules for the sport. Then in 1893, a new group, the Badminton Association of England took over and revised the rules even more, bringing them to what is still in place today. The enthusiasm for the game grew and spread to other countries of Europe and eventually abroad. In 1934 the International Badminton Federation (IBF) was formed.
As for formal competitions, the 1948-1949 season was the first for male players. The award for this tournament is the Thomas cup, named for IBF president Sir George A. Thomas. 1956-1957 marked the first official season for female players. Their award is known as the Uber Cup, named after Mrs. H.S. Uber of England, who made the donation for the trophy. Both tournaments are still played every two years. 1992 was the first time Badminton was played in the Olympics, during the summer games in Barcelona, Spain. There were five divisions - men's singles, women's singles, men's doubles, women's doubles, and mixed doubles.
These days there are national, world, and international competitions every year for Badminton for men and women and junior ages alike. Of course, you can also still find the game played more leisurely in backyards and on beaches around the world.
|
<urn:uuid:0b486ece-ebb2-442c-b689-520c9dcec1d6>
|
CC-MAIN-2014-35
|
http://www.intbadfed.org/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919886.18/warc/CC-MAIN-20140909042232-00050-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.982512 | 574 | 3.15625 | 3 |
Op amp noise revisited - the nuts and bolts
In the last column (Simulating op amp noise) I showed how to do simple and fast simulations on op amp circuits to get a handle on what kind of noise performance to expect. As can be expected with any simulation the results are only as good as:
- The models used
- How accurate the representation of the circuit that is being modeled really is
A question arose about the model input current noise generator shown in that article and whether it should properly be modeled as an independent current source for the plus and negative inputs. An excellent question.
Way back in the last century, IC designers cleverly figured out that they could compensate for the bias current of their bipolar input op amps by injecting an equal and opposite current into the inputs, thus canceling the input current that the op amp user's circuit sees (Figure 1). This was a huge step forward – all of a sudden our op amp circuits got much more stable and forgiving. As the decades passed, this basic circuit was improved upon for temperature stability and repeatability. The earliest implementations added a fair amount of input noise ; the latest generation has really improved that a lot.
Figure 1: A very rough sketch of how the basic input bias current cancellation scheme works. Input transistors Q2 and Q3 are part of the amplifier's input stage. These transistors have a finite base current. By adding a suitably biased transistor Q1, a small but equal bias current can be injected that very closely matches the base currents of Q2 and Q3. This basic scheme has been used and improved upon for decades now.
The basic current compensation circuit idea is shown in very simple form in Figure 1. The op amp input transistors Q2 and Q3, drawn here as NPNs have some base current, which in fact is quite large on low-noise op amps, because to get the input noise voltage down, the collector current of the input transistors must be large. Q1 (with suitable biasing) is designed to inject an equal and opposite current into the op amp's input, thus canceling out the base current of Q2 and Q3.
On the data sheet you will see input bias current numbers being given a range of plus and minus numbers with the typical being zero. This compensation circuit is designed to exactly cancel the typical base current of the input transistors, but due to circuit tolerances has some range that can be expected in any individual op amp sample.
The noise of these compensation circuits has been improved so much so that the majority of the input current noise now can come from Q1, the input bias current cancellation circuit.
Regarding the test circuit of the previous article in this series (Reference , figure 1), which is the same basic configuration that TI's Art Kay used in his noise simulation series:
Mr. Kay states: "Strictly speaking, there are two current noise sources. The degree however, to which these sources are correlated is not always clear from the product data sheet."
We get some more information on this from the LT1028 data sheet where it states:
"The cancellation circuitry injects two correlated current noise components into the two inputs. With matched source resistors the injected current noise creates a common-mode voltage noise and gets rejected by the amplifier. With source resistance in one input only, the cancellation noise is added to the amplifier’s inherent noise." .
The LT1028 data sheet further gives curves for total noise with matched input resistances and without. The Analog Devices AD8675 op amp that I also simulated does not go into this detail but it seems highly likely that it has much the same characteristics – there is probably a high degree of correlation in the input noise current due to the input bias current compensation circuits.
Reflection on Simulations Past
What if the op amps didn't have correlated input current, what would be the result?
Adding two current sources to the AD8675 op amp circuit of the previous article results in the circuit of Figure 2.
Figure 2: A proposed circuit that adds totally uncorrelated input current noise to the AD8675 simulation of the last article (In11 and In12 shown above).
Simulating Figure 2 and comparing to the previous result results in the curve in Figure 3. The results are certainly within the accuracy of the models used and are nearly identical.
Figure 3: Results of two simulations, the first with a single uncorrelated input current noise generator and the second with two uncorrelated current noise sources in both the Plus and Minus op amp Inputs. The results are nearly identical for the circuit configuration of figure 2.
This is because the source resistances of the proposed application circuit are not balanced from the +IN and -IN terminals of the op amps and only the 3500-Ω source resistance side dominates. This imbalance was the result of a conscious decision to limit the voltage noise addition of the gain-setting resistors, so that only the 3500-Ω source resistance would dominate the noise. Also, since the AD8675 op amp is operating well below its Ropt point , its voltage noise is dominating - not its current noise.
So this particular circuit configuration showed that the LT1028 would not be the optimum amplifier for this circuit because its current noise is dominating the total noise since it would be operating well above its Ropt point. The AD8675 is a better choice here because of the opposite – its current noise is so low that it has nearly no effect in this application circuit.
|
<urn:uuid:2cdfc814-7599-4348-a5d6-049eddf283e8>
|
CC-MAIN-2014-15
|
http://www.edn.com/electronics-blogs/the-practicing-instrumentation-engineer/4413314/Op-amp-noise-revisited---the-nuts-and-bolts
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538824.34/warc/CC-MAIN-20140416005218-00047-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.926066 | 1,135 | 3.046875 | 3 |
Founded in 1673 it is the oldest
English speaking community in Ontario
Moose Factory Ontario is a small community of 2000 residents located on Moose Factory Island in the middle of the Moose River approximately 20 kilometres (12 miles) from where it empties into James Bay.
It lies directly opposite the Town of Moosonee on the left bank of the Moose River and most visitors to the area will undoubtedly visit both communities as for one, they will most likely arrive in Moosonee via the Polar Bear Express rail service or land at the small Moosonee airport. For more information visit my Moosonee Ontario
Moose Factory is important in the annuls of Ontario and Canadian history as it is the oldest English speaking settlement in the province. The lucrative fur trade then being dominated by the French spurred early settlement in Canada and the English wanted to carve out a piece of the action. The first forays into the industry for them were via the remote northern Hudson Bay region that had been explored in 1670-71 by Pierre-Espirit Radisson, a French explorer in their employ.
The Hudson's Bay Company (HBC) was formed and it set up three posts: Fort Rupert in northern Quebec and Moose Fort and Fort Albany in Ontario. Moose Fort was established in 1673 by Charles Bayly, the first overseas governor of the Hudson's Bay Company, as a means of controlling all trade and traffic along the mighty Moose River system, one of the main canoe traffic arteries in this part of the world. Trade with the indigenous Cree First Nation tribe commenced and the post immediately became extremely profitable, so much so that the French attacked and captured it in 1686.
It was re-named Fort St. Louis and remained in French hands for 10 years until re-captured in 1696 at which time all buildings were burned to the ground. The fort changed hands several more times before finally being ceded to the British in 1713 by the Treaty of Utrecht but remained abandoned.
Moose Fort was rebuilt in 1730 1.5 kilometres (1 mile) upstream from its original location in a more secure position and the fort remained an important base for the Hudson's Bay Company in the James Bay region over the next century. In the early 1800's HBC merged with its main rival The North West Company and there were no longer any real serious threats to the community and it expanded beyond its palisades and became known as Moose Factory.
In the early 1900's the Canadian government established the Factory Island Indian Reserve on Moose Factory Island while at the same time another rival to HBC, the French furrier Revilion Freres, established the Moose River Post (Moosonee), on the mainland directly across the river from Moose Factory Ontario.
In 1932 the area was connected to the outside world when the railroad came to Moosonee. This dramatically changed the area as the communities were no longer remote outposts accessible only once per year via supply ship. The Hudson's Bay Company eventually purchased all North American operations of Revilion Freres and over the course of time, dropped its fur trading operations altogether and morphed into a retailer.
The economy of booth Moosonee and Moose Factory had to change as well and today while the fur trade is still practiced by a few local people Moose Factory's economy is mainly service based around the Weeneebayko General Hospital which provides healthcare services to the entire James Bay region, and the construction and tourism industries.
In 1967 in celebration of Canada's centennial the Hudson's Bay Company converted all its historic properties into an open-air museum known as Centennial Park. The company itself pulled out of Moosonee and Moose Factory in 1987 when it sold all its northern Canada operations to its former rival The North West Company. Today The North West Company continues to operate most major retail outlets in the community.
Today members of the Cree First Nation mainly inhabit Moose Factory and most of the island is part of the Moose Cree First Nation Reserve and it still has that frontier post feel. Not the easiest place to get to in Ontario for those that do take the time to complete the voyage it is like journeying to another time in history.
Location of Moose Factory Ontario
View Larger Map
Getting to Moose Factory Ontario:
If you wish to travel to Moose Factory Ontario you must first get to Moosonee. Visit my Moosonee Ontario
page for more information.
Once in Moosonee traveling to Moose Factory in the middle of the Moose River is dependant on the time of year you are traveling.
Water taxis can be found at most public docks in both towns. These are large freighter canoes equipped with outboard motors. The short trip across the choppy waters of the Moose River usually costs around $15 and unless you specify otherwise you will be dropped off at the hospital docks, the same place where legendary aviator Charles Lindbergh landed his floatplane in 1931.
From late December until mid-March the waters of the mighty Moose River are frozen enough to permit the annual construction of an ice road. A taxi ride can be ascertained for about $10 and you will also find the availability of many snowmobile taxis willing to take a traveler over.
Spring & Fall
As the ice is forming or breaking up neither water of ice travel is available and the only means of reaching Moose Factory Ontario is by helicopter. 2013 cost is $37 one way, for more information contact Expedition Helicopters at:
Phone: (705) 336-6063
Moose Factory Ontario attractions and activities
Centennial Museum Park
Without a doubt the most significant attraction in Moose Factory Ontario and a National Historic Site of Canada is the Hudson's Bay Company's Moose Factory Buildings.
Designated a National Historic Site of Canada in 1957 and converted to an open-air museum by the company in 1967 in celebration of Canada's centennial the complex contains several historically significant buildings and this complex alone makes Moose Factory Ontario well worth a visit.
St Thomas Anglican Church
- Staff House
Originally constructed between 1847 and 1850 it is the oldest building in the James Bay area and is the only remaining officer's dwelling from the fur trade in Canada. Still situated in its original location it provided sleeping quarters for the company's bachelor "officer" employees including doctors, captains, secretaries and clerks. A stark reminder of a bygone this square logged two and a half-storey building is basic and austere and constructed utilizing shipbuilding techniques.
- Joseph Turner House
This extensively restored one and a half storey timber framed building was originally constructed in 1863 and is the oldest surviving Hudson's Bay Company worker's house. Built for the family of Joseph Turner, a retired HBC trader who died in 1865. Turner is significant as he worked for the HBC at Moose Factory for 64 years. The home remained in the Turner family until it was moved to the Centennial Park Museum and acquired by the Ontario Heritage Trust.
- William McLeod House
A one and a half storey timber framed building originally constructed in 1890 by HBC carpenter William McLeod for his brother George, an HBC shipwright. George left with his wife in 1910 and brother William subsequently moved in. His son Herbert, an HBC labourer took ownership upon his parent's death and lived his whole life in the home. Upon his death in 1981 he bequeathed it to the Ontario Heritage Trust and it has since been moved to its current location and extensively restored.
- Ham Sackabuckiskum House
This unique home was originally constructed in 1926 as a summer home for prominent Cree trapper Ham Sackabuckiskum and his family. Unique in its design it was one of the first homes constructed in the area that used a balloon-frame building technique other than the previously used shipbuilding techniques. It remained the home of Ham Sackabuckiskum until his death in 1960. It sat empty and facing demolition until acquired by and moved to its current location by the Ontario Heritage Trust in 1983 at which time it was subsequently restored.
- The Powder Magazine
Constructed in 1865 and completed by 1866 it still stands in its original location and is the parks only stone structure. Originally part of the palisaded warehousing complex it eventually became a general storage facility.
- Blacksmith Shop
This small building housed the last known surviving blacksmith shop operated by the HBC. While most of its construction is dated to 1849 parts of it are dated to 1740 and thus make it the oldest surviving wooden building in Ontario, it remained in continual use from its construction date until 1934.
- Hudson's Bay Company Cemetery
A collection of 52 gravestones dating from 1802 with most marking the burial sites of local Cree inhabitants as English HBC employees usually returned to England upon completion of their contract or retirement.
Construction of this historic building began in 1864 and was completed in 1885. Part of the Anglican Diocese of Moosonee, services were regularly conducted in the Cree language until 2006. The construction is of Carpenter Gothic style but the building is no longer used as it sits in a state of significant disrepair.
Cree Cultural Interpretive Centre
Celebrating the rich cultural history of the local Mushkegowuk Cree people the centre is open during the summer months and has a number of indoor and outdoor displays portraying aspects of both past and present Cree culture.
See displays of Cree arts and crafts, photos and hunting. Cree dwellings such as askigan, shaptwan, wigwam, teepees and some tents still used today are setup and on display.
The Interpretative Centre makes for a great place to purchase a genuine handcrafted moosehide souvenir.
Tidewater Provincial Park
Located on 5 islands in the Moose River between Moosonee and Moose Factory until 2013 they were utilized mainly as a campground for hardy souls that undertook the long journey to this remote outpost in Ontario's sub-arctic north. Now used only for day-trippers get all the information you require about this park on my Tidewater Provincial Park
The tributaries and waters of the Moose River are filled with trophy-sized sport fish and anglers from across the world dream of making the trip to this rugged outpost famed for its fishing.
For those wishing to drop a line from the shores of Moose Factory Island you will still have a good chance of landing a nice specimen. Species that can be landed include:
- Northern Pike
Visitors will find many camps dotting the landscape and fly-in fishing outfitters are readily available. For those wishing to go offshore contact one of the operators below in nearby Moosonee.
Moose River Tours
Claude's Fishing & Sightseeing Tours
Phone: 705 336-3612
Polar Bear Lodge
Phone: 705 336-2345
When the Moose River freezes up from late December to early March ice fishing becomes as much a sport as it does a source of food. While the majority of locals no longer utilize ice fishing as their main source of sustenance it still provides a much welcome readily available and cost effective food source.
For visitors wishing to partake in this activity ask for information at your lodging and you will be pointed in the right direction.
There really is no hunting on the small Moose Factory Island but some of the best moose hunting in the world is to be found in the immediate region of the Moose River basin.
Outfitters operate out of Moosonee and the moose-hunting season runs from September 17th to December 15th. In addition to moose other species hunted locally include:
- Black Bear
Additionally, quite a few locals and a growing number of tourists participate in the goose hunt in both the spring and fall.
For more information about booking a hunting excursion visit: Moose River Tours
The abundance of wildlife, especially fur bearing animals, is what initially drew humans to the region and lead to the establishment of Moose Factory and little has changed over the centuries.
The Moose River basin remains for the most part an untamed wilderness teeming with wildlife. Species that can be encountered include:
- Woodland Caribou
- Black Bear
Please note that quite a few visitors to the area leave disappointed when they do not encounter a Polar Bear. While the magnificent creatures sometimes do wander into the area (extremely rare), Moose Factory really is too far south for them. Those that do pass through are most likely lost and are usually captured by the Ministry of Natural Resources (MNR) and brought to their more northern migration routes. Do not expect to see a Polar Bear.
Moose River Bird Sanctuary
One of North America's great bird migration routes is located just north of Moose Factory at the mouth of the Moose River where it empties into salty James Bay.
The protected wetlands are known as the Moose River Bird Sanctuary and includes nearby Ship Sands Island.
This 15 sq. kilometer (6 sq. mile) parcel of tidal mudflats hosts many bird species including:
- Lesser Snow Geese
- Bald Eagle
- Peregrine Falcon
- American Black Duck
- Sandhill Crane
- Common Loon
- Greater & Lesser Yellowlegs
- Short-eared Owl
- Green-winged Teal
- American Golden Plover
- Common Snipe
- Ruddy Turnstone
- Pectoral Sandpiper
- Snow Bunting
- Black-bellied Plover
- Dabbling Duck
- Short-billed Dowitcher
- Lesser Scaup
- Lapland Longspur
- Red Breasted Merganser
They are also important breeding grounds for a number of species including:
- Northern Harrier
- Yellow Rail
- Nelsons Sharp-tailed Sparrow
- Le Contes Sparrow
- Marbled Godwit
Marine life in the estuary is also abundant and a number of sub-arctic species can be regularly spotted including:
- Beluga Whales
- White Whales
Spring and fall is the best time to see both the marine and avian species. Arrangements to get from Moose Factory Ontario to the mouth of the Moose River can be made by your accommodations provider. Please note that since these operators cater to a small group of tourists each season costs tend to be quite high.
For more information contact:
Bushland Airways Ltd.
Phone: (705) 336-2966
Moose River Tours
Moose River Tours
Phone: (705) 336-6162
M.V. Polar Princess
Please note that if you are researching for a trip into the area via the internet you will see much information about taking tours offered by the Two Bays Company. To the best of my knowledge they no longer seem operational, as I have tried to contact them on a number of occasions. I would recommend that you disregard any information you see or try to contact them yourself. If you do manage to contact them and I am wrong about their status please contact me so I can update my information.
The waters of the Moose River and its tributaries have long been the primary routes of transportation into the hinterlands of Ontario's far north. In fact, Moose Factory Ontario owes its existence to the canoe as the first explorers adopted this ancient First Nations mode of transportation as a means of opening up the lucrative fur trade that proved to be so important to the local economy.
Today, canoeing/kayaking is still the preferred mode of transportation for most locals and freighter canoes are the main means of transporting most goods to the island.
For visitors, canoes can be brought on the Polar Bear Express while for some, paddling down the Moose River or one of its tributaries to finally reach Moose Factory is an adventure that is like reliving the past.
It should be noted however that the Moose Factory area is wilderness at its finest and the waters of the Moose River are quite large and can therefore prove dangerous. Care should always be undertaken.
For those that do however wish to participate in this once in a lifetime adventure there is at least one local outfitter willing to provide a glimpse into the past by offering an 143 kilometre (78 mile) adventure down the Abitibi River from Smooth Rock Falls to Moosonee just across the Moose River from Moose Factory.
For information visit: Howling Wolf Expeditions
As of 2013 the only camping facilities in the general area located at Tidewater Provincial Park are no longer operational. Due to cost cutting measures the Ontario government has deemed this little used park to be too expensive to operate and maintain. For more information visit my Tidewater Provincial Park
Moose Factory Island is one of the best places in Canada to view this spectacle. Clear skies and pollution free the northern skies gives visitors a great chance to view the Northern Lights especially in the fall but be forewarned that you are at nature's mercy and there are no guarantees they will appear.
Cree Village Eco-lodge
With modern facilities and rooms it also has an on-site restaurant modeled after the Shabatwon, a traditional Cree dwelling. The facility is an eco-lodge and is constructed of all natural products found locally and all rooms are named after animals found in the sub-Arctic region.
The operators also provide access to locally operated tours such as canoe and snowmobile expeditions and trap-line tours. For more information contact:
Cree Village Eco-lodge
Phone: (705) 658-6400
Get free Ontario travel tips, updates and news. Susbcribe to my newsletter.
This site is continuously updated with useful and pertinent information for your Ontario visit so if you enjoy this Ontario Travel Guide and would like to bookmark it for future reference you can do so here …
|
<urn:uuid:92bf110f-ecfa-4f72-87e3-9002e55ab4f2>
|
CC-MAIN-2017-26
|
http://www.ontario-canada-travel.com/moose-factory.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321025.86/warc/CC-MAIN-20170627064714-20170627084714-00041.warc.gz
|
en
| 0.953664 | 3,654 | 3.25 | 3 |
January 10, 2014
Nasa’s newly reactivated asteroid hunting space telescope has spotted its first potentially hazardous space rock.
The new asteroid is the first discovery by the Near-Earth Object Wide-field Infrared Survey Explorer (NEOWISE) since the spacecraft came out of hibernation last year.
The rock, named 2013 YP139, is approximately 27 million miles away from Earth and is estimated to be 0.4 miles in diameter. It’s infrared signature suggests the asteroid is extremely dark, like a piece of coal.
It has also been classified as a potentially hazardous near Earth object as its orbit suggests it could pose a risk. Nasa believes that the impact of an asteroid any larger than half a mile in diameter could have “worldwide effects”.
|
<urn:uuid:fba1872d-84b1-40d8-89ab-12025f137cf7>
|
CC-MAIN-2017-43
|
https://earththreats.wordpress.com/2014/01/10/nasa-spacecraft-spots-potentially-hazardous-new-asteroid/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824570.79/warc/CC-MAIN-20171021043111-20171021063111-00050.warc.gz
|
en
| 0.959271 | 161 | 3.875 | 4 |
Fela Kuti Podcast
Description of the technology
This is a podcast on the music of Fela Kuti. A podcast is a multimedia digital file made available on the Internet for downloading to a portable media player, computer or other device. It can be used in Music Education to provide variety in the class as well as make the learning process more exciting.
By the end of the lesson the students wil be able to hear samples of highlife music and be able to give the characteristics of Afro beat music. They will also be able to understand the political, social and cultural context of Fela Kuti's music.
Explanation for how the activity would be used with students
Students will be able to download the podcast before class. This will enable them to come into class and have group discussions about the music. They will also be able to do an assignment that will require them to collect songs by Fela Kuti so as to make the learning experience more exciting.
NafMe Frameworks -Listening to, analyzing, and describing music.
-Understanding relationships between music, the other arts, and disciplines outside the arts.
-Understanding music in relation to history and culture.
Mass Arts Frameworks
5.12 Demonstrate an understanding of how musical elements interact to create expressiveness in music
5.13 Demonstrate knowledge of the technical vocabulary of music
10.3 Learn and apply knowledge of cultural institutions to learning in the arts and other disciplines
|
<urn:uuid:a1d1b249-6e84-4b75-81c6-66aff3a4889a>
|
CC-MAIN-2017-26
|
http://wamburamitaru.weebly.com/podcasts.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00644.warc.gz
|
en
| 0.923002 | 299 | 4.0625 | 4 |
New Jersey is an absolute leader of solar energy generation in the United States. For the last decade, they have been revising and increasing their solar goals and incentives, maintaining their position as the state with the second largest installed solar capacity. In 2010, New Jersey installed over 137 MW of solar systems which was almost a 140% increase over the 57.3 megawatts installed in 2009 and 517% increase over the 22.5 megawatts of installed New Jersey solar in 2008, ranking it second in the U.S. behind California. That’s enough to power approximately 50,000 homes with sustainable, clean energy. New Jersey also became the second state to install over 100 megawatts of solar power in a single year. While New Jersey has exhausted its cash rebate program, they are now focused on consistent market growth and private investment through system financing and Solar Renewable Energy Credits (SRECs) discussed here. Given the number of systems installed last year, it certainly looks like its working.
One of the reasons solar in New Jersey has been so successful is that it has one of the most aggressive Renewable Portfolio Standards (RPS) in the United States. A RPS dictates the schedule of the annual increases in the percentage of retail electricity that must come from renewable energy sources each year. The ultimate goal requires electricity suppliers to provide 22.5% of their retail electricity load from renewable energy sources by 2021. Part of this requirement must be from solar power systems. In 2010, this requirement was updated from a percentage based goal to an ultimate goal of 5,316 gigawatts of solar energy by 2026 (New Jersey currently uses over approximately 82,000 gigawatts of energy a year).
As a result, SREC’s must be purchased by electricity suppliers to meet the state targets or else they face a fine known as a Solar Alternative Compliance Payment (SACP) that was $0.691/kWh in 2010. In the 2011 energy year, 306,000 SRECs (or MWhs of solar electricity) must be purchased by electricity suppliers in the state in order to meet the NJ solar requirement. That requirement grows to over 5 million in 2026.
|
<urn:uuid:ffcbc451-be63-48b4-9e31-75266163c6c6>
|
CC-MAIN-2017-34
|
http://www.solar-new-jersey.org/nj-solar-energy-by-city/new-jersey-solar-power/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103579.21/warc/CC-MAIN-20170817151157-20170817171157-00664.warc.gz
|
en
| 0.962474 | 443 | 2.640625 | 3 |
Carmen Garza, 74, moved to the city of East Chicago, Indiana, 41 years ago. She bought her house with her husband and quickly made it home, turning their backyard into a tomato and chili garden every summer. “They were so good,” Garza tells Colorlines in Spanish. “Riquísimos.”
Three years ago, that ended after a neighbor asked the couple why they were growing vegetables in contaminated dirt.
The Garzas quickly abandoned their garden. But they were left with more questions than answers: “She told me it was contaminated, but she didn’t say of what,” Garza recalls.
The contaminant turned out to be lead, the couple ultimately found out thanks to community efforts to discover this information. And it’s not just in the dirt—it’s in the Garza’s drinking water, too. This is because East Chicago, a predominantly Black and Latinx city of nearly 30,000, is located on the USS Lead Superfund Site.
The former USS Lead facility ran here until 1985. The site was placed on the National Priorities List of the worst contaminated sites in the country in 2009, but the EPA was aware since the facility’s closure that it was contaminating nearby areas, according to this 1985 inspection report. And as a Chicago Tribune investigation in December 2016 unearthed, government officials were warned that this contamination posed a public health risk for decades. Still, they failed to test the soil or begin cleanup efforts until 2014. That soil data didn’t make it into city officials’ hands until May 2016. With it, they saw how severe the problem really was: Some homeowners’ backyards had lead levels higher than 45,000 parts per million, far beyond the federal limit of 400 parts per million.
No one told prospective buyers like Garza—not when she first bought her home or even when government officials came to inspect her yard about 10 years ago to “examine the dirt in people’s yards to clean for the animals,” as she says officials told her. She didn’t find out what was going on until last year when community members from the West Calumet Housing Complex started organizing around the issue.
“Imagine you stop going outside,” Garza says. “You don’t grill steak outside anymore. What can I do? I don’t have money to move.”
And then came the news of the water contamination in January. The EPA conducted a drinking water pilot study on 43 homes in fall 2016 to see if the excavation work to clean up the Superfund site would affect drinking water lead levels. They tested drinking water before and after excavation. The city, like many other older municipalities around the country, is full of service lines made out of lead. As the EPA states in an FAQ, construction work can sometimes disturb these lines and result in the leaching of lead.
That study found that the tap water in 18 homes before excavation and 12 homes after excavation had lead levels beyond 15 parts per million, which requires government intervention under the Lead and Copper Rule.
Garza’s home was included in the study. The state gave her a water filter after revealing its findings in January, but she still buys water by the gallons and bottles to cook and drink. She estimates she spends $20 a month on them, an expense that she says she is feasible within her budget.
But Garza says her daily routine is unacceptable. She can’t deal with the mental stress of knowing her water is contaminated, that her yard is contaminated and that even the dust in her home is contaminated. In 2002, she was diagnosed with—and beat—colon cancer, only to now face the concern of what will come from her daily showers in lead-tainted water, which authorities say pose no health risk. “That’s the torment,” she says. “It’s a constant threat.”
Now, community members are putting this issue onto the national radar so it can get the attention it deserves. East Chicago is forcing all 1,100 residents of the West Calumet Housing Complex to uproot their lives and move so that the city can demolish the building and deal with the lead on which it sits. And while it’s too early to tell how the lead might impact children’s developmental growth, 20 percent of children younger than seven saw their blood lead levels test greater than 5 micrograms per decileter, The Northwest Indiana Times reports. Parents are already worried that the lead poisoning has made them sick. They’re comparing it to the water crisis in Flint, Michigan, where the predominantly Black city of 100,000 saw elevated blood lead levels in 2015 after unknowingly drinking contaminated water for over a year.
Groups including the East Chicago Calumet Coalition Community Advisory Group and National Nurses United sent a petition to EPA Administrator Scott Pruitt on March 2 asking the agency to “use its emergency powers under the Safe Drinking Water Act … to take action to abate the imminent and substantial endangerment to human health caused by lead contamination in East Chicago’s drinking water.”
Erik Olsen, director of the National Resources Defense Council’s Health and Environment Program, stood before the Senate Committee on Energy and Commerce today (March 16) to testify at a hearing titled “Reinvestment and Rehabilitation of Our Nation’s Safe Drinking Water Deliver Systems” in Washington, D.C., another American city that’s hs similar drinking water issues. In the early 2000s, the city had a dramatic increase of lead in drinking water—and also in its infants and toddlers.
“I think we all take for granted where this water that’s in here comes from,” Olsen began his testimony, lifting his cup of water. He sat before the committee and explicitly mentioned the situation in East Chicago. “What’s going to happen to that community?” he asked. “How are we going to restore confidence in the water supply in East Chicago and a lot of communities across the country?”
Watch the full hearing below with Olsen’s testimony beginning around the 36 minute mark.
These steps—from the petition to the testimony—are putting into motion necessary intervention to protect the health of the city’s residents. While then-Indiana governor and current Vice President Mike Pence rejected the city’s request for emergency declaration in late 2016, current Governor Eric Holcomb approved the request in February. In January, the city also secured a $3.1 million state grant to begin replacing its lead pipes with more standard and safe infrastructure—which the city of Flint is currently doing as well.
Until the pipes have been replaced, city residents must struggle to find answers about how their water got contaminated—and for how long that’s been the case. A group of residents wrote a letter to the Indiana Utility Regulatory Commission in January. “[A]lthough the full picture is only beginning to emerge, this is clearly the City’s mess,” they wrote.
As for Garza, the lingering question remains: “Why?”
|
<urn:uuid:dcbe91ba-c2a2-4aa8-adeb-3b0dcd41eea8>
|
CC-MAIN-2020-34
|
https://www.colorlines.com/articles/water-crisis-flints-unfolding-east-chicago
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737204.32/warc/CC-MAIN-20200807143225-20200807173225-00511.warc.gz
|
en
| 0.969073 | 1,506 | 2.75 | 3 |
A recent report entitled “Cost of Vision Problems: The Economic Burden of Vision Loss and Eye Disorders in the United States,” issued by the Prevent Blindness organization, identified cataracts as the leading cause of blindness worldwide, affecting more than 24 million Americans age 40 and older.
Estimated to cost $10.7 billion, it is second only to refractive error in diagnosis, medical costs attributable to low vision, medical vision aids, vision assistive devices and direct services including special education and assistance programs.
A clouding of the eye’s lens, cataracts block or change the passage of light into the eyes and, in many parts of the world, may spell the beginnings of blindness. Its exact cause is unknown but is generally accepted as part of the aging process. However, many other possible factors are thought to contribute to their formation:
- Intense heat or long-term exposure to UV rays from the sun
- Certain diseases, such as diabetes
- Inflammation in the eye
- Hereditary influences
- Events before birth, such as German measles in the mother
- Long-term steroid use
- Eye injuries
- Eye diseases
In most of the developed world, however, cataract surgery can vastly improve a patient’s vision and is successful for 85 out of every 100 adults. In one large study, 95% of adult recipients were satisfied with the results of their surgery. Watch these testimonials from OCLI patients, doctors, and nurses who testify to its effectiveness and success.
For a variety of reasons, folks are uneasy about cataract surgery but the most notable is the risk their vision may worsen. Except in cases where other eye problems complicate the cataract condition, the procedure entails minimum risk and greatly enhances the lives of millions who are affected by this common age related problem, restoring their vision and allowing them to return to normal routines without the burden of poor sight. The elimination of double vision, light sensitivity and glare or poor night vision can give them a new lease on life.
As with any medical procedure, myths abound about the nature of cataract surgery:
- Cataract surgery can only occur once the cataract is fully mature.
- Cataracts can return again once they are removed.
- Only old people get/need cataract surgery.
- Cataract surgery is a difficult procedure to go through.
None of these myths have a basis in fact and with the most advanced technology in the world, patients in the U.S. need not suffer from the debilitating effects of cataracts as many in the rest of the world so often do.
With Grandparents’ Day approaching on September 7, why not take your older loved ones in for an eye exam soon? Dr. Silverman and his team of eye care experts at OCLI would be more than happy to set up an appointment to speak with you both about the treatment options available for any vision problems that might be affecting your loved ones’ quality of life. Contact us today at 973-664-7794, or fill out this contact form online.
|
<urn:uuid:71c1e6fa-4308-403f-9f18-ab21fc9a9502>
|
CC-MAIN-2023-23
|
https://ocli.mdg.co/blog/cataracts-leading-cause-of-blindness-worldwide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00284.warc.gz
|
en
| 0.949385 | 650 | 3.015625 | 3 |
Reading at Home
In Year 3, pupils will bring their reading book home every day.
We ask that you encourage your child to read for 10 minutes at home daily.
When your child has read please ensure you sign their reading record.
Below you will find some top tips to support your child's reading:
Your child also has access to an online reading book.
You can use the link below to access your child's school reading book.
Teachers have assigned pupils a book from their reading band.
Children can read their school reading book with a parent or to themselves.
Teachers will check to see which pages have been read.
When pupils have read their assigned book thoroughly, teachers will assign a new book.
|
<urn:uuid:d55506a6-0955-44a2-9295-99d524d80cbf>
|
CC-MAIN-2023-40
|
https://www.baretreesprimary.com/reading-at-home-4/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00002.warc.gz
|
en
| 0.972877 | 150 | 3.171875 | 3 |
RESOURCE MANUAL – Crisis Response Planning
To effectively respond to critical incidents (violence, suicide, tragedy, etc.), schools, communities and organizations need to plan ahead of time so they are prepared to respond to these unfortunate events. This manual focuses on how to organize effectively and quickly at a time of high stress so that groups are better prepared to respond to the emotional needs of those affected by a critical incident. A key component of the material is a review of a Crisis Response Checklist, an important tool when managing the complexities of a critical incident. Readers will have a clear understanding of how to implement their own crisis response team and plan for their specific environment. 40 pages.
Not from the USA? Use our currency converting tool to help calculate exchange rates from your country.Currency Converter
Additional E-Manual Viewers: In downloading and viewing or printing an e-manual, we ask that you act with integrity in purchasing the number of manuals that you wish to be shared with other viewers.
|
<urn:uuid:d0b58b04-4f6a-4a81-b04f-31d799c2775c>
|
CC-MAIN-2017-47
|
https://us.ctrinstitute.com/product/crpmanual/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806327.92/warc/CC-MAIN-20171121074123-20171121094123-00752.warc.gz
|
en
| 0.9192 | 203 | 2.515625 | 3 |
An estimated 5.2% of American workers commute on public transit. Larger, denser cities often require comprehensive public transportation systems that can reduce residents’ dependence on automobiles and help decrease traffic congestion, air pollution, and in some cases, travel time. In the Boston-Cambridge-Newton metro area, 13.6% of workers commute on public transit, larger than the national share and highest in the state.
One indication of a good transit system is an economically diverse ridership. In Boston, the typical public transit commuter earns $44,344 a year, roughly 92% of the $48,342 median earnings of commuters who drive to work alone in the metro area. Nationwide, the median earnings of public transit commuters is 89% of the earnings of workers who drive alone to work.
There are a number of benefits to public transportation. Riders save money, get more physical activity, and, on some routes, may even save time. On average, those who take public transit in Boston take 19 minutes longer getting to work than those who drive. Nationwide, taking public transit adds 25 minutes to the average commute.
In the city of Boston, the largest urbanized area in the Boston-Cambridge-Newton metro, the Massachusetts Bay Transportation Authority runs public transportation. In total, the MBTA handles 409.2 million passenger trips per year, making it one of the larger public transit agencies nationwide. The average resident of the city travels 442 miles and takes 98 trips on public transit a year, making the Boston public transportation system one of the largest and most utilized in the country.
|
<urn:uuid:1a369725-c56d-41e6-bf9d-7572cd6e13d2>
|
CC-MAIN-2017-43
|
http://bostonstats.com/why-public-transit-is-more-common-in-boston/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824471.6/warc/CC-MAIN-20171020230225-20171021010225-00253.warc.gz
|
en
| 0.911905 | 325 | 3.03125 | 3 |
by Thomas Hawk
We All Use Politics in Our Everyday Lives
What are politics? The Merriam-Webster online dictionary defines politics as, “A: The art or science of government.” This is the pure, all-inclusive definition.
“B: The art or science concerned with guiding or influencing governmental policy.” This definition includes the activities of the President, Congress, the lobbyists, the special interest groups and citizen activists who are all trying to guide and influence governmental policy.
“C: The art or science concerned with winning and holding control over a government.” For most politicians, this activity seems to involve a larger share of their time than actually governing. Politicians spend much time raising funds for re-election. Members of Congress often miss votes on legislation, while attending fund-raising events for their campaigns. They also neglect their duties while actively campaigning for re-election. This partly answers the question of what are politics, but the totality includes so much more.
When German Chancellor Otto von Bismarck was asked what are politics, he said, “politics is the art of the possible.”
Some famous people have had a more cynical view of what are politics. Mao Tse-Tung is quoted as saying, “Politics is war without bloodshed, while war is politics with bloodshed.” Some would call this a realistic view because war does happen often, when the political process between countries breaks down.
What are politics in practical terms? To be successful, politics needs to employ compromise and consensus. These qualities are sadly missing in today’s political environment. This is responsible for the current stalemate and acrimonious atmosphere in Congress. It will probably take an extraordinary crisis or a true revolt by the voters to change the situation.
What are politics in everyday life? People who are successful in their career use political principles in their interactions with management and fellow-workers. They use compromise and consensus to achieve their goals. They use civility and courtesy to promote good relations with fellow workers, which facilitates compromise and consensus. As in the definition of politics, by getting a promotion to a higher job position they are winning and holding control over their company.
What are politics in relation to your personal life? Forging successful personal relationships are also based on the political principles of compromise and consensus. A romantic relationship that is dominated by one person is not a happy and productive relationship. The dominated person will harbor strong resentment. The relationship is further enriched by showing mutual respect, civility, courtesy, affection and a genuine interest in each other. This is the essence of successful politics; giving both parties as much as possible of what they are seeking.
While this does not fully answer the question of what are politics, we show that we all use political principles in our everyday lives.
Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice acti…
Old School is in session….You have probably heard the term Old School, but what you might not know is that there is a concentrat…
What is the relationship of the individual to the state? What is the ideal state, and how can it bring about the most desirable li…
A groundbreaking account of how Britain became the base of operations for the exiled leaders of Europe in their desperate struggle…
Whether you understand politics or not, it still affects your life in very real ways. But American politics can be confusing. What…
What are politics ?
|
<urn:uuid:16f35675-68ea-442d-905a-26583f5d1d3d>
|
CC-MAIN-2017-47
|
http://currenteventsarticles.org/1383889/what-are-politics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807089.35/warc/CC-MAIN-20171124051000-20171124071000-00730.warc.gz
|
en
| 0.965987 | 719 | 2.9375 | 3 |
People have been manufacturing iron for around 19,000 years – yet its possibilities remain far from exhausted. Scientists at the Max Planck Institute for Iron Research are therefore developing, among other things, new grades of steel that can make car bodies even safer and give car designers greater freedom. Part of what they do involves cooking up and testing new alloys in a lab, reminiscent of a small steel plant. The scientists also investigate ways of preventing corrosion that makes many metallic tools unusable with time. However, their research is not restricted to iron and steel: it also encompasses new alloys, such as titanium alloys for artificial joints. Furthermore, in their search for such new materials, they also develop methods to simulate the behaviour of unknown alloys on the computer.
In addition, there is the possibility of individual doctoral research. Please contact the directors or research group leaders at the Institute.
No job offers available
|
<urn:uuid:785f5996-407c-4d32-b6cb-6ad659696fbd>
|
CC-MAIN-2014-15
|
http://www.mpg.de/152964/eisenforschung?section=all
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223204388.12/warc/CC-MAIN-20140423032004-00195-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.958892 | 182 | 3.25 | 3 |
A key advantage of blockchain technology and cryptocurrencies is that it is really hard to hack or manipulate the decentralised, secure peer-to-peer network.
- Drastically increase your computer’s security without spending any money
- Start by evaluating your own behaviour as a user
- Updates, backups and safe passwords are vital for ensuring security
In this lesson, you will learn how to keep your computer or smartphone safe and to minimise the risk of losing your cryptocurrencies.
Hence, the most pressing threats regarding security issues do not originate from blockchain technology or from cryptocurrencies such as Bitcoin themselves, but in the locations where we handle them: our smartphones, computers and laptops; the places we store wallets and keys for cryptocurrencies and on websites we use to buy or sell cryptocurrencies.
In other words, anything you use as a sort of “bridge” to connect to a blockchain-based network is subject to the risk of a hack. Read our suggestions below to help safeguard yourself against such vulnerabilities.
There is a saying that it is people, humans like you and I, that are the weakest link in computer security. Despite a vast range of security measures available to us, we all have to remain cautious and need to develop a healthy sense of judgement regarding trustworthy sources and tools.
This applies to everything related to the Internet, but is even more important when it comes to cryptocurrencies. And if this wasn’t enough, there is also the fact that money is involved and that your assets can be stolen in the digital realm without you even realising.
There are a number of practices and habits we recommend become second nature to you, in order to ensure maximum security of your assets in the crypto realm.
Practice safe cyber habits
As all of us love a free wi-fi network, it may be tempting to log in wherever we get a chance. However, before you access a network that you are not familiar with, make sure that it is safe. Unsafe and sketchy networks and websites may pose serious risks to any wallet you keep on your phone or computer, and thus to your funds.
It is generally recommended to keep your assets offline. If you must keep a wallet on your smartphone or computer, do make sure it is encrypted and only contains a minimal amount of funds.
- It goes without saying that you should use a non-public email address.
- Never leave your smartphone or computer unattended or lend them to anyone.
- Also make sure you remove all funds from wallets on your devices before having them serviced.
Keep your software up to date
This is a pretty basic and yet important rule to remember: Keep all of your software up-to-date and execute updates as soon as they become available. Malware often exploits weaknesses in older versions of software and operating systems, so it is crucial to be prepared.
We highly recommend you make updating your software a habit. You could, for instance, define a specific day and update all your devices on Fridays.
However, do not enable automatic updates for crypto applications. Newly released versions may contain bugs. Thus, it is best to wait for a few days to see if an application is running smoothly before installing it on your smartphone or computer. This extends to firmware updates that are recommended by blockchain companies whose services you use.
Use an encrypted password manager
Even as an average internet user you have probably created hundreds of accounts already for the numerous services you use online. And let’s be honest: you probably use the same password for your email account, small online shops and your favourite music streaming service. So if someone finds out this one password, then he or she has access to all your accounts.
There is an easy workaround for this issue: make sure to generate and to use unique passwords - a different one for every service. There is no need to worry - you don’t need to memorise dozens or even hundreds of passwords. Using unique passwords is actually easy. You just need to store them all in an encrypted password manager, such as LastPass or Dashlane.
Make sure you set up your encrypted password manager right away to make password management safe and convenient.
Make sure to generate and to use unique passwords - a different one for every service.
Activate Two-Factor Authentication (2FA) wherever you can
Another way to significantly avert the risk of your accounts and assets getting hacked is to use Two-Factor Authentication - also called “Two-Way Authentication” or 2FA for short - whenever possible. Whether it is for your Google account or any service that involves handling cryptocurrencies, this technology is low-cost and easy to implement while adding an additional layer of security.
After downloading an authenticator app to your mobile phone and enabling two-factor authentication for services or applications, you will be asked to enter a six-digit code in addition to your password every time you log in. So download your authenticator app, look at all relevant services, apps and wallets you are using and activate 2FA. It’s a small step that makes a huge difference.
Activating 2FA on all relevant services, apps and wallets you are using is a small step that makes a huge difference.
For reasons of convenience or expediency, you may be tempted not to use a hardware wallet and store your assets online. As comfortable as it may be, we do not recommend you store digital assets online. Make sure you get into the habit right away and always use a hardware wallet.
At this time, we only recommend hardware wallets from two manufacturers: Trezor or Ledger. These two manufacturers are both long-time players in the crypto realm and continuously improve technological features of their products.
Choose a trustworthy platform to buy or sell cryptocurrencies
Choosing the most suitable platform for your digital asset transactions is vital to ensure maximum safety and convenience. Once you have decided to get into cryptocurrencies, an integral part of getting set up is researching the best platforms online to find out which is the most suitable for you.
The seemingly infinite number of platforms out there vying for your attention and business may feel overwhelming. However, there are a number of factors that help you narrow down your options.
You want to look for a platform that operates in a safe and regulated environment with an experienced team. The platform should provide sufficient liquidity, reasonable volumes and employ state-of-the-art technology and safety while offering customers an easy-to-use, intuitive interface. You also want the platform of your choice to support fiat currencies as well as cryptocurrencies, so as to provide reliable, international customer support.
Bitpanda is Europe’s most innovative platform for digital assets based in Vienna, Austria for newbies and experienced users alike. The platform offers fast, safe and convenient access to buying and selling digital assets as well as a vast range of payment options. The Bitpanda Global Exchange offers the lowest fees in the industry for professional traders and institutions along with a large number of trading pairs and is available in 54 countries worldwide.
Avoid single points of failure and diversify risks
In terms of security, any single point of failure or attack is bad. A single point of failure (SPOF) is defined as a component of a system that stops the entire system from working if it fails. This means you should not create one backup but multiple backups (for example, on different USB-sticks), multiple wallets and multiple passwords.
This is where we once again want to repeat the importance of cold storage or hardware wallets. Do not trust anything that has a constant connection to the internet or even a constant connection to your computer. Despite the fact that we just mentioned choosing a trustworthy platform for buying and selling your cryptocurrencies: please trade online but do not store online.
If you trade on an exchange, you do require some funds that stay on the exchange to establish liquidity. However, decide how much you really need for trading versus how much you might want to trade. You don’t want all of your crypto holdings sitting in an exchange wallet if said exchange suffers an attack by hackers - just remember Mt. Gox. Even the most reputable exchange may be at risk of being hacked.
Do not trust in anything that has a constant connection to the internet or even a constant connection to your computer.
In conclusion: Use a hardware wallet or better yet, hardware wallets, to store your funds without being connected to the internet to eliminate the risk of losing funds when an exchange is hacked.
Get into the habit of practicing these safety measures and schedule checks of all of them on a regular basis to make sure all your dealings in the crypto space are what they were intended to be: fast, safe and private.
Ready to receive free BEST? Test your knowledge here!Beginners' Quiz
- Shokoyo Matsushita - Ledger Nano S Bitcoin and Ethereum Hardware Wallet Beginner’s Guide
|
<urn:uuid:709ffd6d-88f6-4502-8aac-b35cc85d4fb5>
|
CC-MAIN-2020-29
|
https://www.bitpanda.com/academy/en/lessons/how-can-i-keep-my-cryptocurrencies-safe/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887046.62/warc/CC-MAIN-20200705055259-20200705085259-00275.warc.gz
|
en
| 0.937524 | 1,816 | 2.96875 | 3 |
I have been searching for the right word to describe Zebulon Pike, and I keep coming back to “Shlub”. It is Yiddish word meaning a foolish, stupid or inferior person. But at least he was handsome. He stood “…5'8" tall, with a ruddy complexion, blue eyes and light hair…(was) a crack shot…(with) great physical endurance …” He was also a teetotaler who one biographer kindly described as “an efficient but unremarkable career officer” while another put it more succinctly; “…a puffed-up little popinjay...”. As proof of Zeb’s shlub-dom I submit his first voyage of discovery in 1805 when he was ordered to find the source of the Mississippi River.The 27 year old lieutenant set out on August 9, 1805 from Fort Belle Fontaine, on the south bank of the Missouri River, four miles upstream from its joining with the mighty Mississippi. He was accompanied by what he called a “Dam'd set of Rascels,” 20 soldiers manning a 70 foot keelboat. He included on his voyage no doctor, no interpreter and no one qualified to map the voyage, including Pike himself. Because of the low water level, Pike’s men spent as much time dragging their boat over sand bars as they did laboriously poling it northward. Two days of exhausting work brought them to the mouth of Illinois River, near present day Grafton, all of twenty miles from their starting point.The Mississippi river has been winding and looping here for 145 million years, following a weakness in the crust now called the New Madrid Fault line. But north of the Illinois river the big river has been more influenced by ice.
A mere 130,000 years ago the “Wisconsin Ice Sheet” covered most of modern Indiana under a lake. When that ice collapsed the lake drained catastrophically. Called the Kankakee Flood it carved a valley so deep that when a similar glacier blocked the big river 13,000 years ago the Mississippi itself chose this channel, exiting its old course at Rock Island, Illinois, some 200 miles above St. Louis.Another 150 miles above Rock Island, Pike found a perfect place for a fort, a 500 foot tall bluff (locally called Pike’s Peak) across the river from Prairie du Chien, a trading post at the mouth of the Wisconsin River. No fort was ever built there but it was here that Pike finally agreed the 70 foot keel boat monstrosity was too much trouble and shifted his men to two barges, easier to handle in the low water.At the mouth of the Minnesota River (655 miles from his starting point), on September 23rd, 1805, Pike took advantage of a gathering of Sioux Indians for a little land grab. He promised to pay them less than a dollar an acre for land on which the government would eventually build a fort, which would eventually become the city of Minneapolis.
But when Congress finally paid up for their new “Fort Snelling”, in 1808, the price had been summarily reduced by 90%. And even that was actually paid to the French and British traders who had been feeding the Sioux rot gut whiskey on credit during the intervening three years. Commenting on the friendly welcome Pike received from the Sioux and the treaty Pike duped them into signing, a modern Sioux observed, “They gave him the keys (to the city), but they didn't expect him to think he owned the city”. I would say that seventy years later General Custer got the revised bill for this deal.The next morning Pike arose to discover his personal flag was missing. He threw a fit. He had a soldier stripped to the waist and flogged for losing it. The Sioux were so disturbed by this display of pique that they dispatched two men downstream who found the flag floating in the river and returned it to the intrepid if insecure explorer.Fifty miles further to the north Pike reached the 60 foot high St. Anthony Falls, where the river passed from the hard surface dolomites to the softer sandstone bedrock. It took three days for his men to drag their barges around the falls, and it occurred to Pike (finally) that the local Ojibwe Indian canoes’ were lighter and more maneuverable than his barges. But instead of asking for help, Pike instructed his men in hollowing out a large log. Loaded with supplies, including most of their black powder, the huge canoe was slid into the river…and immediately sank. Pike ordered all the wet powder rescued and stacked on a rack over a fire, to dry out. The resulting explosion burned down his own tent and most of his personal clothing, supplies and notes. He barely saved his trunk.Back into the river again, with the current lessoning and the channel narrowing every day, four of Pike’s men came close to physical collapse. Sergeant Henry Kennerman, ““one of the stoutest men I ever knew,” according to Pike, began to vomit blood. Zeb wrote the men were, “…killing themselves to obey my orders.” With snow already falling, on October 16, 1805, Pike ordered the men to build a blockhouse. While they worked, he hunted, supplying them with fresh meat.With Sgt. Kennerman in charge of the ill men left behind at the blockhouse, Pike led a small detachment overland, on snowshoes and pulling sleds, both borrowed from local British traders. They followed the river as best they could. On December 10th they reached the little falls of the Mississippi, and on the last day of the 1805 they camped near the mouth of the Pine River. On the night of January 4th Pike suffered another black powder explosion. (Where was storing his powder, in the smoking tent?)
Finally, on February 12th , 1806, “…exhausted and worn out by cold, hunger and exposure” Pike reached Red Cedar Lake (later renamed Cass Lake). Here, I suspect out of sheer desperation, Pike wrote, “This may be called the upper source of the Mississippi River.”Pike may have called it that, but it wasn’t. Twenty- six years later, in 1832, Henry Rowe Schoolcraft followed an Anishinaabe Indian guide (another approach Pike never tried) to a small lake that he named Itasca, and which he declared was the actual source of the great river, and that is what most tourist today accept. But that isn’t the actual source either.
The actual source of the “father of waters” is Little Elk Lake (below), 9 miles further upstream. Little Elk Lake drains into Elk Lake, which drains into Lake Itasca. Ninety days after a drop of rain falls on Little Elk Lake, it flows into the Gulf of Mexico.Pike was not very concerned with details like that. What concerned him was that when he got back to the blockhouse he found that Sgt. Kennerman had recovered. The Sargeant was feeling so well, in fact, that he had eaten or bartered away the entire companies’ supply of meat and Pike’s personal trunk as well, which had survived two explosions and at least one dumping in the river. No explanation for his actions was offered by the now Private Kennerman. But Pike lost no time in returning to civilization.He arrived back in Fort Belle Fontaine on April 30th , 1806. Ordered to find the source of the Mississippi, Lt. Pike had failed. In fact he had failed to locate a single stream, river or lake which had not been previously mapped. And yet the “Lost Pathfiner” was immediately dispatched to explore the southwestern edges of the Louisiana Purchase, during which he probably spotted a mile high peak named after him, and during which the long suffering Private Kennerman deserted, never to be seen again.Ever a self promoter, Pike rose to the level of Brigadier General during the War of 1812. And he played a crucial but little known role in that war. It was general Zebulon Pike who led the assault on the capital of Upper Canada, the city of York, (since renamed Toronto), on April 17, 1813. When a British mine exploded prematurely, killing 42 British and 52 American soldiers, Pike was hit in the back by a falling rock, which killed him. In retribution his soldiers burned the Parliamentary Buildings in York. And it was that act of vandalism which the British repaid by the burning Washington, D.C. on August 24, 1814.I would call that quite an impressive funeral pyre for a schlub.
- 30 -
|
<urn:uuid:de249e9b-e89d-4090-b4c7-9c9fd2a25a8c>
|
CC-MAIN-2017-43
|
http://thepublici.blogspot.com/2009/03/pikes-pique.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825464.60/warc/CC-MAIN-20171022203758-20171022223758-00680.warc.gz
|
en
| 0.978101 | 1,827 | 2.625 | 3 |
Written by Jake Ingram
Dovetailing with Jim Draper’s Feast of Flowers exhibit, The Museum is featuring a few groupings of North Florida Native Plants in various locations around the museum. Each week we will look at one of these plants in more detail.
Below the branches of the Bald Cypress are six Longleaf Pines (Pinus palustris) in what is termed the “grass stage” of development. Longleaf Pine individuals have been known to remain in this juvenile stage up to seven years plus waiting until conditions are perfect for them to ‘reach for the sun’ and become trees. They have physiologically adapted to withstand ground fires that will burn their needles but not the terminal bud. Fires are often the impetus needed to provide the growth spurt that sends them upward. In the ‘grass stage’ they look like anything but a majestic Longleaf Pine but they do have that look of ‘promise.’
|
<urn:uuid:52663d5a-2100-4534-b7d0-eb4e3c82f637>
|
CC-MAIN-2014-41
|
http://blog.cummer.org/2013/01/native-plants-longleaf-pine/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410665301782.61/warc/CC-MAIN-20140914032821-00112-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.966154 | 197 | 3.28125 | 3 |
Aims and objectives
This project will digitise endangered archival material written in the south dialect of the indigenous Yi language in Yunnan, China. All the materials covered by this project have survived various destructions in the past century but still remain in unsatisfactory conditions. The archival materials come from several counties in south Yunnan, namely Xinping, Yuanyang, Jianshui and Mengzi. Besides these tiny private collections, the largest collection has been established by the Yunnan provincial administrative office of minority classics in Kunming. Amongst more than 4,000 surviving volumes of Yi texts, there are about 800 volumes written in the south dialect. This project will digitize the entire collection of 400 volumes in the public collection in Kunming and another 200 volumes from various public and private collections in the counties mentioned above.
The Yi archives are the most important and irreplaceable materials for research on the indigenous Yi people in Southwest China. They are the only available texts written in the Yi language and character, which stands for an uninterrupted indigenous writing tradition for six centuries but now is endangered as well. The Yi archives cover a wide range of topics including calendar, epic, history, medicine, philosophy, ritual, geography, literature and music. This material written in the Yi language is not available in either Chinese or another script.
For understanding the Yi people in Southwest China and Southeast Asia, the archival materials in the Yi language are very crucial in that they are the only aboriginal written sources. The Yi archives are written by the aboriginal priests and literati bimo and represent the entire range of the traditional knowledge of the Yi people, they are therefore known as the Yi's encyclopaedia. The Yi language is divided into six dialects, each one differing dramatically from the others. Written archives are found in four dialects. The Yi archives in the south dialect are significant specifically in understanding the cultural heritage and tradition in south Yunnan.
Most of the Yi archival materials under this project are in script. The earliest Yi script in the south dialect is dated to the early 19th century, but the majority of the archives are in the range from the late 19th to the mid 20th century. One major feature of the Yi scripts in the south dialect distinguishing themselves from those written in other dialects is that many of them have unique and beautiful illustrations, painted in bright mineral pigments. The oral tradition is presently preserved in some villages in Xinping and Yuanyang county.
Most of the Yi archives in the south dialect have been destroyed in the past half century. A further threat to the Yi archives in recent years is smuggling and the illegal trading market. In addition, the physical feature of Yi archives as paper scripts reminds us the threat of deterioration.
The material at the archive of the Yunnan provincial administrative office of minority classics is stored in minimum preservation conditions: the archive is not equipped with any facilities to preserve the scripts, no positive action, such as mounting or moisture-resistance processing, has been taken and even the storage space is not large enough. The situation for the county archives with Yi scripts is even worse. The private collections come from a dozen bimo priests and normally the scripts are stored in the attic above the kitchen and open to unfavourable environmental conditions. A script in this condition normally can't last for 40 years. Moreover, scripts easily disappear if there is no successor in a bimo family when the old priest passes away.
An outcome from this project will be the creation of a database of digital images of the archives. The most endangered scripts in the private collections will be relocated to the public collection in the Yunnan provincial administrative office of minority classics. The master copies of the entire archives will be stored at both the University Library of Sun Yat-sen University and the Archives of Yunnan provincial administrative office of minority classics.
This project fully achieved the objectives stated in the proposal and surveyed endangered Yi manuscripts in the south dialect in both public and private collections, and digitised nearly 600 volumes of Yi manuscripts from the public collection in Kunming and private collections in Xinping, Yuanyang and Mengzi, dating from the 18th to the early 20th century.
The endangered archival materials are kept by their owners in their original locations. The public collection are stored at the archives of the Yunnan Provincial Administrative Office of Minorities Classics, but their physical preservation condition really remains unchanged. The private collections are stored in cabinets or cases in the houses of their owners without any preservation facilities. Neither the public nor the private collections are accessible for the public, the former by law and the latter for religious reasons.
The surrogate digital collections have been deposited at both the Yunnan Provincial Administrative Office of Minorities Classics and Sun Yat-sen University. At Sun Yat-sen University, copies are kept by the University Library and by the Institute of Historical Anthropology. A copy is also deposited with the British Library.
The records copied by this project have been catalogued as:
- EAP217/1 Yi Manuscripts temporarily in the custody of antique dealers from Xinping and Mengzi [19th century-20th century]
- EAP217/2 Yi manuscripts temporarily in the custody of antique dealers from Yuanyang [Mid 18th century]
- EAP217/3 Bai Zhengfu Collection of Yi Manuscripts [19th century-20th century]
- EAP217/4 Fang Zhengrong Collection of Yi Manuscripts [19th century-20th century]
- EAP217/5 Huang Family Collection of Yi Manuscripts [18th century-20th century]
- EAP217/6 Li Jiaqiang Collection of Yi Manuscripts [19th century-20th century]
- EAP217/7 Li Jiaxiang Collection of Yi Manuscripts [20th century]
- EAP217/8 Li Liangwen Collection of Yi Manuscripts [Early 19th century]
- EAP217/9 Li Shaoli Collection of Yi Manuscripts [20th century]
- EAP217/10 Li Youcai Collection of Yi Manuscripts [19th century-20th century]
- EAP217/11 Li Yuguang Collection of Yi Manuscripts [20th century]
- EAP217/12 Pu Yuchang Collection of Yi Manuscripts [19th century-20th century]
- EAP217/13 Yang Zhengguang Collection of Yi Manuscripts [c 19th century]
- EAP217/14 Yi Manuscripts Collection at the Yunnan Provincial Administration Office of Minority Classics [18th century-20th century]
|
<urn:uuid:1322bd4c-5881-43d8-887d-d554aedd4cda>
|
CC-MAIN-2020-05
|
https://eap.bl.uk/project/EAP217
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599718.13/warc/CC-MAIN-20200120165335-20200120194335-00441.warc.gz
|
en
| 0.921277 | 1,368 | 3.203125 | 3 |
Jan 01, 2021
With a vast number of corporate employees working from home, digital threat actors or hackers are indulging in phishing attacks now more than ever, exploiting people’s fear of the ceaseless spread of COVID-19.
With the rapid spread of Covid-19 across the globe, many countries have shut down public places as a precautionary measure. Many countries have shut down educational institutes, offices, and canceled public gatherings. Some countries in Europe, where the infection rate is high have escalated the lock down to even a greater level. As many organizations in comparatively less infected countries have been advised to reduce their workforce, many are deciding whether or not to allow employees to work from home, but a new cybersecurity threat looms.
Recorded Future has reported the registration of thousands of fake coronavirus-related websites claiming to provide updates on the spread of the disease, its control, and treatment. Tapping into the fear surrounding the pandemic and the lack of ideal security measures for people working from home, threat actors are exploiting the situation with the spread of malware through Phishing.
Security researchers at Mimecast Threat Intelligence have studied more than 300 variants of Phishing campaigns that target remote workers that appear to be authentic health details offered by trusted healthcare organizations. The most common variants are either a map representing the spread of infection or a list of coronavirus precautions and tips. Uploaded in OneDrive, the scam prompts the user for their login credentials, counting on human error as they give into their fear or curiosity.
In addition to these types of Covid-19 Phishing scams, Kaspersky Labs has ironically discovered a new strain of COVID family pathology, a cookie trojan termed “Cookiethief”. This trojan tends to acquire the root rights for the victim’s device first, and then transfers cookies used by their browser to the attacker’s system. For Facebook, the use of the stolen cookies can be made to access a unique session ID, enabled by the Facebook app on Android that identifies and grants access to the user without a need for password and login; thus, enabling the attacker to bypass the authentication.
Multiple Phishing cases and a spike in hacker activity are keeping up with the novel coronavirus spread, as reported by various national and international cybersecurity institutions.
Skynew reported the targeting of healthcare workers by cybercriminals via email scams, luring them to register for a fake survey about coronavirus, aimed at obtaining their personal information. Similarly, Check Point reported in its research that a Mongolian public sector was targeted with Phishing emails trying to appear as coronavirus briefings published by the Mongolian Health Ministry. These Phishing emails are generally followed with ransomware attacks, such as in Illinois where its public health agency reported a ransomware attack by a relatively new ransomware called the ‘NetWalker’ resulting in its main website being disabled. Threat actors are exploiting the current situation to satisfy their financial desires or other malicious causes. The current COVID pandemic is being utilized by these attackers to bank on the fear of people and spread false and misleading information to sow distrust.
The aim of such attacks differs widely, from obtaining funds to non governmental agendas. The top sector being targeted is the business sector, which is currently in a slump in many major countries. Due to the lockdowns and self-quarantine rules, many new people are working from home and these endpoint users working away from the organization's security structure tend to be more easily penetrable.
As Phishing emails were common and recurrent since long before coronavirus hit, a question might arise, how is it different this time? Naturally there are many security measures against scams that organizations typically apply on a daily basis, but these are not normal times. During a pandemic crisis many organizations and government bodies are focusing their attention towards fighting the spread of the disease; hence, stretching thin their manpower and resources committed to cybersecurity. And, like any other operation, cybersecurity is also dependent on many other organizational branches and processes to form a network of security operations; thus, even the closure of any one vertical will affect the entire network's efficiency. In European countries where the shutdown is very intense, and a majority of IT employees are working from home, the only ways to carry out work is either the availability of work programs in the cloud or to connect to the office network through VPN (Virtual Private Network).
Cloud computing is at its core large server farms present at physical locations, collecting and distributing data throughout the globe. It is ubiquitously available for users to access information at any given time or place using a web browser. The application of cloud is flexible for organizations as it is sourced and maintained by cloud vendors, who also find the maintenance of cloud more affordable as a single farm could be used to host the applications and information from multiple clients. Also, as the cloud is hosted by specialized vendors who are or have employed cybersecurity experts, cloud security is considered one of the most formidable security features across the cybersecurity landscape. Thus, companies that incorporate cloud into their business process tend to migrate all of their workload to cloud and provide its employees with login access to these portals. Though cloud computing is spreading across the digital market like wildfire, there still exists many small and medium organizations that have not yet adopted it, and still use private servers for running business related applications and storing information.
Virtual Private Network, as its name suggests, are channels created virtually to connect users to private networks. It is more like extending the private network across the public network to connect to the user. Even the ISP provider does not have any control or knowledge of its traffic. It allows employees and branch offices to directly connect to the network of the main office. VPN does not make network connections completely anonymous. Information about the users at the end points of the VPN is plainly visible, but the data being communicated between these users is private. VPN provides robust security features using tunneling protocols or cryptography where the authentication protocol of valid users is required to be satisfied for secure connection. Different VPN vendors provide a different combination of tunneling protocols such as PPTP (Point to Point Tunnelling Protocol), L2TP (Layer Two Tunnelling Protocol), IPSec (Internet Protocol Security), etc., and encryption (symmetric and asymmetric) such as AES, RSA, Blowfish, Diffie-Hellman, etc.
Regardless of cybersecurity measures in place, even a well-secured network can be hacked if the user is not aware of cybersecurity threats and their prevention. Like the examples above where Phishing attacks prompted users to log into the malicious OneDrive, which siphoned their username and password, credentials for both cloud and VPN could be easily obtained by dropping sniffers and decryption tools into the user’s network end. Where The sniffers try to search for logs or files where credentials might have been stored, and decryption tools may try to work on the weak symmetric ciphers. So it’s vital that users become the first line of defense to combat Phishing attacks.
The prevention of Phishing for a non-technical person is improved with anti-phishing education and awareness provided by many reputable organizations such as OhPhish, which provides education and training for an organization’s employees against Phishing attacks. Only understanding Phishing theoretically is not sufficient because, even if a person knows Phishing is done via malicious/spam emails, one cannot possibly differentiate between a benign and malicious email. Thus, practical experience of Phishing attacks and how to tackle them is very helpful. OhPhish solutions provide virtual simulations for Phishing attacks by sending employees Phishing emails and monitoring their response to it, based on their result-tailored education and mitigation knowledge.
As the user her/himself is the first line of defense against any cyberattack, the know-how to tackle Phishing attacks is highly important. Anti-Phishing education could not only help to educate the employees of any organization, on ways to recognize and tackle Phishing emails, but offer the advice and training of security experts along the way. The training of IT people regarding different types of Phishing modes can be done as:
The immediate precautions against such threats involve securing the cloud and VPN access at both remote systems and the central network, along with immediate creation of security policies and guidelines that help in educating the remote workers on handling and mitigating such attacks. Whereas the long-term policy dictating security responsibilities in such situations in future could only be achieved through assisted education and awareness programs.
A. Spear Phishing is a targeted attack where the attacker conducts research on the victims before sending a personalized message or email.
Read more: https://blog.eccouncil.org/4-types-of-cyberattacks-that-youre-most-likely-to-face/
While Phishing is a broader term, spear phishing emails are a targeted approach, where the attacker targets either a single recipient or a bulk of recipients based on the same characteristics.
Read more: https://blog.eccouncil.org/spear-Phishing-101-how-it-differs-from-Phishing/
A. There are multiple types of phishing attacks like email phishing, spear phishing, whaling, angler phishing, smishing, and vishing.
Read more: https://blog.eccouncil.org/5-Phishing-scams-that-keep-cybersecurity-professionals-up-at-night/
|
<urn:uuid:deed9ffb-ce16-490d-ba97-c9fbdf6810b9>
|
CC-MAIN-2023-23
|
https://aware.eccouncil.org/phishing-trends-to-look-out-for-in-2021.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649741.26/warc/CC-MAIN-20230604093242-20230604123242-00143.warc.gz
|
en
| 0.950983 | 1,952 | 2.71875 | 3 |
|Carnauba is a
vegetable wax (fat) obtained from the leaves of the
Carnauba has an affinity to
water, the ability to retain oil and has excellent gloss properties making it applicable
in a vast variety of industries. Carnauba is widely used in cosmetics, particularly in
stick applications. Carnauba is the hardest natural wax and has lustrous composition
making it the leading choice for food coatings, pharmaceutical coatings and polishes.
Number One Grade Carnauba varies from a very pale yellow (white), through a greenish brown
(yellow). Carnauba is available in 'Lump', powered or flaked form.
Where does Carnauba come from?
Carnauba Wax is exuded by the
leaves of the Brazilian "Tree of Life" (Copernica Cerifera) to conserve the
moisture within the tree and leaves. This 'Carnauba Palm' grows in the northern and
northeastern parts of Brazil along the river banks, valleys, and lagoons where the soil is
dark and fertile. The tree needs very little water to grow, is very prolific and attains a
height 40-50 feet after fifty years. The natives in the surrounding area use the various
products of the tree for many necessities in their lives; hence the name "Tree of
Life." Of interest is the fact that only in northern Brazil does the Carnauba Palm
produce wax. The tree also grows in other parts of Brazil and adjacent countries in South
America, Ceylon, and Equatorial Africa, but owing to the irregular rainy seasons of these
places the tree fails to produce the wax. Leaves containing the wax are cut off the tree
during the period from September to March. (This process is no way endangers the tree).
The color and quality are governed by the age of the leaves and the care used in
processing the wax. The leaves are soaked in kerosene or turpentine to soften the wax,
resulting in a thick liquid that then is poured into molds and allowed to solidify. In
addition to color, the wax is also graded according to area of originParnahyba,
Piaui, Ceara, and Bahai. Carnauba 'Lumps' are weighed and coded for sale to processors
Why Is Carnauba Used In Car Wax?
Being a natural
plant by-product, that will not react with any paint, Carnauba provides a very hard film
over your car's surface to protect against airborne contaminants such as acid rain
residue, catalytic converter emissions, bug tar, road grime, salt and bird droppings.
Carnauba swells and closes its pores when exposed to water. Carnauba also dramatically
reduces paint oxidation by diffusing (refracting) UV and infrared radiation from the sun
which can oxidize and dull your paint finish.
How Much Carnauba Is In Zymöl Wax?
Typical waxes contain 3 to 5% Carnauba
(not necessarily Brazilian No. 1 Carnauba) by volume. The greater the
concentration of Carnauba the greater the level of protection and the higher the level of
shine. Zymöl's content of Brazilian No. 1 Yellow (and/or White) Carnauba in
Zymöl standard waxes is:
|
<urn:uuid:45ef9c9e-c3fe-45ac-9850-8ad14f3b39f6>
|
CC-MAIN-2017-26
|
http://www.pelicanparts.com/catalog/car_care/zymol_FAQ1.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00077.warc.gz
|
en
| 0.919334 | 716 | 2.984375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.