text
stringlengths 206
500k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 16
1.39k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
128k
| score
float64 2.52
4.91
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
The library subscribes to many different databases. A database is basically a large electronic warehouse, accessible online, which stores the content (articles and other information) from journals, magazines, and other publications. Some databases focus on a particular subject or topic (nursing/allied health, psychology, or history, etc.), while others are more general and contain information about many different subjects and topics. Each database offers further instruction on how to use their site. Look for Help/Support/FAQ links within each database.
The databases link on the library homepage (http://sanjuancollege.edu/learning/departments/library/research/library-database/) brings you to a list of databases By Subject. This helps narrow down the long list of databases to ones which are most likely to have information related to the subject or topic you're researching. You can also view an A-to-Z list of all our databases by clicking on the By Title tab.
Remember, when searching for articles in a database, be sure to always click the Full Text checkbox. This ensures that all articles in the search results contain the full text of the article and not just a preview or summary. If your assignment requires you to use scholarly/academic or peer-reviewed sources, click the Peer Reviewed checkbox also.
Watch this short video for a quick introduction to library databases.
Watch this short video for tips on effective searching within databases.
Watch this short video for information on journals, the articles they contain, and what "peer review" means. | <urn:uuid:625a5512-b948-44a1-885d-2f795433b585> | CC-MAIN-2019-26 | http://libguides.sanjuancollege.edu/c.php?g=711421&p=5061849 | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998607.18/warc/CC-MAIN-20190618043259-20190618065259-00413.warc.gz | en | 0.876205 | 318 | 2.875 | 3 |
accent, dialect, language | part of: encyclopedia/language
Pronounced: \noo mek-si-kuhn ing-glish\ | IPA: /nu ˈmɛk sɪ kən ˈɪŋ glɪʃ/
Definition of New Mexican English
The American English language as used in New Mexico (also other parts of the American Southwest), the dialect referred to as New Mexican English, centers around the Middle Rio Grande Valley; just north of Taos, through Albuquerque and the Albuquerque Metropolitan Area, to just south of Las Cruces. This dialect exists with a few variations urban variation (sometimes referred to as Burqueño English or Cruces English), a rural variation (Found in towns such as Tucumcari and Carlsbad, but also small cities such as Roswell), and a mountain variation (referred to as Northern New Mexico English, due to its prominence in Sangre de Cristo and Jemez mountain towns, but it also occurs in other ranges such as the Gila National Forest).
Examples of New Mexican English
Standard New Mexican English
It is a contact language, which means that it derives from close contact with native speakers of other dialects and languages, and can be exaggerated by bilingualism but is not dependent upon it. New Mexican English can be most easily identified, in terms of accent, with several key features.
- Substantial intercommunication with speakers of those prior languages has also lead to a sing-song pattern, in that there is a pitch change between words, this mostly comes from the languages of New Mexican Spanish, Latin American Spanish, Zuni, Tiwa, Navajo, Hopi, Keresan, and Tanoan. Bilingualism can increase the song pattern’s audibility, however bilingualism is not the primary factor. Most New Mexican English speakers are primarily English or solely English speakers, and studies in International Journal of Bilingualism have concluded that the Voice-Onset Time plays a low-factor in the pattern. Meaning that speakers proficient or native English speakers will display the pattern but at less audible level.
- The Spanish language letters ll and ñ are pronounced in the context of Spanish words, and since they are not featured in English writing, as happens with ñ, are sometimes replaced with n in writing. Many Spanish origin words that end in an audible short e are likewise audible, such as grande being pronounced gran-day.
- Adding an assuring “or what,” “or no,” or “huh,” to the end of a question, is fairly common. Likewise, ‘you know’ can sometimes be added in the middle of sentences. These are used in a similar manner to the Canadian English “eh,” in the sense that it’s a reassurance to getting an answer. A confirmation with a simple ‘I know’ , or even combining with an assuring ‘I know huh’, is a simple agreement similar to ‘I agree’ or ‘I concur’.
- Pronunciation is influenced, by varying leanings to sub-dialects and to varying degrees, by; New Mexico Spanish, Mexican Spanish, Ranchero English, Western American English, Californian English, Texan English, Chicano English, and Midwestern English. Pronunciation isn’t the only thing that is influenced by these languages, there are also a few loanwords, like; ‘nana’ for Grandmother in Northeastern American English, and a plethora of Spanish words being used including ‘acequia’ for community-operated watercourse, ‘arroyo’ for temporary/seasonal creek/stream, and ‘lobo’ for gray wolf.
- Sometimes words can be borrowed from Spanish, Tiwa, Hopi, Zuni, Navajo, and/or Southern Athabaskan languages for emphasis and exaggeration. Example, “Diné” means “Navajo people” in Navajo and “Sí” mean “Yes” in Spanish, these can be used, as, “oh diné” and “oh si” being used in a similar manner to “oh man” and “oh boy”, from Standard English, in that it emphasizes a statement, and expresses joy or anger, but can uniquely extend to sincere questioning. But, beyond that, any number of words from the contact languages can simply be used for similar types of expression. Another popular example is “bueno bye” (with the “b” in bueno being very subtley pronounced), which is used at the end of conversations, especially at the end of a phone call.
- The partial pronunciation of certain words, most obviously with the word crayon, pronounced with a single syllable as cran, whereas in standard American English, it is pronounced with two syllables as cray-on. This can be exaggerated in certain situations, though it doesn’t occur quite as often, including pronouncing ‘remember’ as ‘member’ and ‘especially’ as ‘specially’. Such pronunciation creates obvious homophones.
- Many unique context-sensitive interjections exist, including; ‘hui’ as a fear based interjection, ‘y’ pronounced as a long “e” is an exclamation of bewilderment, and the trepidatious usage of the word ‘omber’. “a la” short for the curse term “a la maquina” is fairly common as well. Pípíhearted, a combination of the Spanish term “pío” (as in pío-pío, which is an onomatopoeia from the sound of a baby bird or chick) and the English terms “chicken-hearted” or “broken-hearted”, is a slang expression used to tell someone to not be distressed or offended at a prior remark or situation.
Alphabet and Characters; ll and ñ. Contact languages; Jicarilla, Tiwa, Lipan, Keres, Navajo, New Mexico Spanish, Mexican Spanish, Picuris, and Zuni. Idioms and Interjections; A la, All, Hui, I know huh, O sí, Omber, Or what/Or no, and Y. Nouns; Acequia, Canales, Coke, Coyote, Lobo, and Vigas. Proper Nouns; Many common place names often have multiple names associated, from the contact languages, with some being more common than others. An example being Tsi-ku’mu-P’in and Cerro Chicoma, which both translate to “flaking stone mountain”, located in Central New Mexico.
Though these sub-dialects exist, they display similar pronunciation styles and grammar usages as the aforementioned Standard New Mexican English. Scholars have tended to label numersous standards, varieties, dialects, and accents without further qualification of the dialectic regions within the American Southwest. Recent interest in the primary dialect of New Mexican English, and its three primary sub-dialects, has numerous descriptive labels of the various sub-dialects of New Mexican English. The terms usually center around “Northern New Mexico”, rural areas, and Southeastern New Mexico each containing their own sub-dialects of New Mexican English, but current naming conventions are dubious at best. Sub-dialects of New Mexican English are mostly sub-regional variations, including minor influencing accents.
In the old Pueblos and Spanish towns, in Central New Mexico, there is the common Standard New Mexican English. The most popular variety is urban variety made popular due to its usage in populated areas such as Albuquerque and the Albuquerque Metropolitan Area, which is why is is sometimes called the Burqueño dialect, however this name is misleading as it can be heard throughout the Albuquerque-Santa Fe-Las Vegas, New Mexico Combined Statistical Area, and even in Las Cruces, El Paso, Farmington, Clovis, and any other Metropolitan and Micropolitan areas throughout the State. This urban variety tends to be influenced by Californian English, Chicano English, Texan English, and General American English. In and around the Sangre de Cristo Mountains, there is a Northern New Mexico and Southern Colorado variety sometimes referred to as Northern New Mexican English, Hispano English, and/or Nuevomexicano English, the accents of the old Spanish and Mexican settlers from the 1500s to the 1800s are prevalent, alongside influences from the Navajo, Apache, Pueblo, and Ute, there are also several unique Spanish loadwords including Canales, Colchon, and Vigas. Rural areas add variants of Midwestern American English terminology, including variations of phrases such as a version of the Minnesotan “dontcha know” in the form of “I know huh”, and other English dialects further influence rural areas, Texan English in the East and Western American English, to form another variety of New Mexican English, sometimes called Ranchero English.
There are a few accents that influence the phonetics in subregions, in Southeastern New Mexico especially near El Paso, Texas, the Mexican Spanish accent is more audible, and Texan English has a similar influence in eastern New Mexico. Various Native American languages, have influence in and around New Mexico’s large reservations, especially Tiwa, Hopi, Zuni, Navajo, and other Southern Athabaskan languages; with a Navajo language accent most obvious in and around the Northwestern part of the state.
Specific examples of New Mexican English
More examples will be added later, and specific moments in the examples will be clarified in future updates.
Standard New Mexican English
- Valentino De La O interviewing Jerry Apodaca, Governor of New Mexico from 1975 – January 1, 1979.
- Animator and director Mike Judge, best known for Beavis and Butthead, King of the Hill, Office Space, Idiocracy, and Silicon Valley.
- Automobile race car driver Al Unser Sr., and the entire Unser family.
New Mexican English rural variety
- Musician Bo Brown
- Poet Baxter Black.
- Musician and poet Mike Moutoux.
Various New Mexican English
- Located in Canutillo, Texas. When in this form, the accent usually features heavy Texas, Texico, and Tex-Mex influences. http://www.dialectsarchive.com/new-mexico-1
- Artist Maria Martinez. https://www.youtube.com/watch?v=M18b6XMB81o
- Located in Isleta Pueblo. http://www.dialectsarchive.com/new-mexico-2
- Located in Gallup, New Mexico, Zuni and Navajo influenced. http://www.dialectsarchive.com/new-mexico-3
- Located in Isleta Pueblo. http://www.dialectsarchive.com/new-mexico-4
Multiple comedians use their dialect in comedy, as with most comedians this is to extenuate the circumstances of a story, in order to emphasize the joke.
- James and Ernie, a comedy duo from Farmington, New Mexico, and Fort Defiance, Arizona.
- Actor Stephen Michael Quezada, best known for his role as Agent Gomez in Breaking Bad.
- Two comedy skits by the Blackout Theatre Company, went viral on YouTube, titled “Shit Burqueños (New Mexicans) Say”. The main character, named Lynette, is played by actress Lauren Poole.
- It is rumored that the actors of Breaking Bad performed with New Mexican accents.
Origin of New
This dialect is part of the capacious Southwestern American English, as designated by the Department of Translation Studies at the University of Tampere. Other major Southwestern American English dialects are Navajo English, Arizonan English, Texan English, Californian English, and multiple Native American English variants. New Mexican English is the standard pronunciation of English used in New Mexico at large. More specifically, for commonalities within large population centers and throughout rural areas. It is not confined to a singular sub-accent or sub-dialect, as the pronunciation and grammar have varied since the mid-to-late 19th century, with the general New Mexican dialect being recorded at least since the 1920s. The term New Mexican English covers all varieties, across multiple regional, ethnic, and social backgrounds. There are multiple accents and dialects that are influences on this dialect, including; American English and General American English, as well as neighboring and other Western American English accents and dialects (California English, Texan English, Pacific Northwest English). Because of this, there are many sub-varieties. With this interpretation, New Mexican English encompasses a range of accents and dialects, including the prior mentioned standard varieties. According to the Modern Language Association, the number of English speakers in New Mexico is 1,197,144, or 63.96% of the population. And, with 2013 U.S. Census Estimates of New Mexican’s born and raised within the state at about 51.4%, and a population of 2,085,287 brings the total to approximately 1,071,837. Following studies performed by The University of New Mexico, around 90% of people born within the state are native English speakers, or are proficient with English, it would be safe to assume that 90% of the 51.4% of those born within the state would speak New Mexican English to some degree, meaning that 46.26% of the population speaks with this accent. This leaves us with ~964,653 speakers of this dialect. This still excludes estimates based beyond this sample, including Southern Colorado, Eastern Arizona, Eastern Navajo Nation, and West Texas which have populations of New Mexican English speakers, and as such is subject to variability.
Alternate spellings exist; New Mexican English, NME, New Mexico accent/dialect. According to Google Trends “New Mexico English” is the most popular term, however “New Mexican English” is proper English, as linguistic variations commonly take on the term of their demonym.
First Known Use: 18th-19th century | <urn:uuid:b1d74fce-206c-4ad3-b7a1-a6f3d7dfc3c1> | CC-MAIN-2020-05 | https://newmexico.heavensentgaming.com/lexicon/new-mexican-english/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594705.17/warc/CC-MAIN-20200119180644-20200119204644-00330.warc.gz | en | 0.94005 | 3,046 | 4.03125 | 4 |
All dogs are special, but living with a pit bull really is different. While they’re incredibly popular, they also have a reputation that makes many fear them. Pit bull owners know how loyal and lovable their dogs are, but they can be affected by unfair laws and policies. In The Pit Bull Life you’ll learn the history of this category of dog and what you can do to help secure its present and future. You’ll also get information about how to find a good match and read inspiring stories of people who’ve devoted their lives to this special dog. In an effort to clear the pit bull name, the authors of The Pit Bull Life debunked 10 popular pit bull myths for PEOPLE.
Myth 1: Pit Bulls Aren’t Classic American Dogs
Pit bulls were once the iconic American canine. When artists in the early twentieth century wanted to represent the classic boy and his dog, that pup looked like a pit bull: Buster Brown and his Tige and The Little Rascals and their Pete are still recognizable. Well-known for loyalty and bravery, the pit bull was also used as a symbol of the nation in art during the two world wars. And some real dogs were actual war heroes, like Sgt. Stubby, who served in World War I and earned an obituary in the New York Times.
Myth 2: Pit Bulls Have a Specific, Easy-to-Recognize Look
Most of the dogs we call “pit bulls” aren’t purebred. Many of them aren’t even pit bull mixes. Studies have shown that even dog experts can’t accurately guess whether there’s pit bull in a mixed-breed dog just by looking at it. Lots of different breeds can mix up to produce the short-coated, big-headed dog that we call “pit bull,” though our grandparents would probably have just called this pup a “mutt” or “mongrel.” | <urn:uuid:7fb1fc52-8e04-4fb8-862a-dac07a67d36f> | CC-MAIN-2021-25 | https://pinupsforpitbulls.org/tag/jon-stewart/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487612154.24/warc/CC-MAIN-20210614105241-20210614135241-00278.warc.gz | en | 0.965999 | 412 | 2.515625 | 3 |
This work is the continuation of the study of the Pyramidellidae from deep waters in the Central and Tropical South Pacific collected by IRD and MNHN in numerous campaigns over the years. In this work the species belonging to the tribes Eulimellini and Syrnolini have been included. In total 154 species have been studied, 8 of which were previously known (but one with a non valid name), whereas the remaining 146 proved to be new to science. The type material of the already known species is displayed and micrographs to the scanning electron microscope of the material of the new species have been shown. In the tribe Eulimellini, a total of 110 species have been studied; they belong to six genera: Hamarilla, Ebalina, Eulimella, Raoulostraca, Bouchetmella (new genus) and Careliosis. The great majority of species (92) were included in the genus Eulimella. In the tribe Syrnolini, 44 species have been studied, belonging to 6 genera: Iphiana, Syrnola, Puposyrnola, Colsyrnola, Styloptygma and Aghata; most species (35) were included in the genus Syrnola. In the Conclusions and Comments part, information about the number of specimens collected for each species, its geographical distribution and bathymetry area are mentioned. A new name is given to Eulimella angusta (Saurin, 1959) non Watson, 1886. | <urn:uuid:227ead30-c6b1-4dc3-a299-c32833c3c05a> | CC-MAIN-2023-14 | https://www.marinespecies.org/imis.php?module=ref&refid=283212 | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00216.warc.gz | en | 0.946629 | 320 | 2.875 | 3 |
Remembering the Nanyang volunteers
WHEN THE SECOND Sino-Japanese war between China and Japan reached its height after July 7, 1937, China’s ports were blockaded by Japanese forces, forcing China to transport military supplies by a land route to support their war efforts. At this point China’s General Long Yun proposed The Burma Road project in August 1937.
The Burma Road was a passage from Kunming to Lashio in Burma (Myanmar). Built with the sweat and hard work of 200 engineers and about 200,000 labourers, the Burma Road was officially put to use on January 10, 1939, but not without constant modifications and repairs.
The Burma Road spanned over 1,146km and involved crossing 289 bridges and 1,959 treacherous bends to navigate.
In 1939, a total of about 3,400 volunteers were recruited to deliver medication, war ammunition and supplies through the Burma Road.
According to the documented lists, not all were Chinese. There were 100 non-Chinese volunteers; 55 Indians, 18 Malays, 11 Burmese, 2 Indonesians and others whose nationalities were unknown.
The war supplies for China were sent to Yangon port and then transported to Lashio by rail, from which the Nanyang Volunteers took over the transportation from Lashio to Kunming with US Dodge trucks.
The drive to Kunming was not a short trip; it would take about one week to drive through the mountainous trail.
A monthly average of about 600 vehicles with a combined capacity of 10,000 tonnes were used the Burma Road by 1941.
Fu Cai Qi was one of the Nanyang Volunteers. Born in 1909 in Kuching, at the age of 30, Fu volunteered for the China Relief Fund which was formed by expatriate Chinese in neighbouring countries to support China in its war against Japan.
As a volunteer during the war, Fu served as a driver and a clerk at the Southwest China-Burma Transport Company in Kunming.
Once the war ended, however, Fu failed to return to Sarawak due to insufficient identity and travelling documents. So he stayed in China working at a factory producing machine parts until his retirement.
He also married a local woman named Zhang Ju Hua. They both had a daughter named Fu Ze Xiu.
Throughout his lifetime, Fu hardly reminisced about his work as a military driver during the war, his thoughts mostly on his family back in Sarawak where he left behind his parents, a wife and two children.
In 1983, Fu passed away in Chongqing without the chance to visit his family in Sarawak. His last wish was that his daughter Ze Xiu would unite with her half-brother and sister in Sarawak.
It was not until 2005, more than 20 years after Fu died that the Fu siblings were united, fulfilling their father’s wish.
Fu’s story is only one of the many moving stories in a book called ‘The Intrepid Sarawak Volunteer Mechanics 1937-1945’ by Dr Julitta Lim Shau Hua and her late husband Fong Hon Koh.
‘The Intrepid Sarawak Volunteer Mechanics 1937-1945’ is the new edition of the 1998 version which is now out of print.
The book captures the stories of the volunteers, otherwise known as ‘Nanyang Ji Gong’ or overseas Chinese mechanics that were recruited from Southeast Asia.
Finishing the Story
Dr Lim, 72, was the woman behind several publications including ‘From an Army Camp to a Teachers College’ and ‘Pussy’s in the Well – Japanese Occupation of Sarawak 1941-1945’.
Her work on the Nanyang volunteers was started back in 1997 together with her late husband who sadly passed away on November 21, 2010.
“My husband and I thought it our mission to leave this part of the history to the younger generation of Sarawak.
“Unfortunately when we came up with the little bilingual book in 1998, the Heroes Story, my husband regretted not able to interview Thomas Liaw Ping in Canada,” said Dr Lim.
Liaw, 94, migrated to Canada in the 1970s, and is one of the four surviving Sarawak volunteers.
After Fong passed away, Dr Lim managed to go to Toronto, Canada and interview Liaw on June 23, 2012.
The interview turned out to be a success because Liaw did not only provide an almost detailed experience of the war but also photos and documents which is now included in the book.
“When I came back, there was more material and there were requests from the descendants from the former volunteers to look for their relatives in Sarawak.”
Dr Lim was sure there were many other channels for these volunteers to go to China in helping the war besides through the recruitment centre in Kuching.
“For those Sarawakians who went to Kunming to help in the war as mechanics and drivers, they entered China through different channels. Some of them went through recruitment centre in Kuching.”
But according to Dr Lim it is safe to say that 100 volunteers were from Sarawak, many were from Kuching and others from Sibu, Miri, Engkilili and Bintulu.
“At the moment, I still couldn’t find a lot of them who are from Sarawak.”
She is now continuing her search for these former Nanyang volunteers to document their experience for future generations and help reunite Sarawak Nanyang volunteers left behind in China with their relatives here in Sarawak.
“We are hoping that the young people to know this part of the history. It is not just China’s history; it is a history of Sarawak as well as the history of Malaysia.”
Continuing the Legacy
Tan Kah Kee was born on October 21, 1874 in China and moved to Singapore at the tender age of 17 to help in his father’s rice store.
Along the way he ventured into rubber planting and manufacturing factories.
Eventually Kah Kee became a powerful entrepreneur, making his money in different parts of Southeast Asia.
On August 15, 1937 the Malaya/Singapore Overseas Chinese Relief Fund Committee would be formed to help China in the Sino-Japanese war and Kah Kee was elected as its chairman.
“He canvased, he sent word out. As a result of his canvasing they managed to gather were than 3,200 volunteers,” said Tan Dib Jee, 65, Kah Kee’s grandson, of his grandfather’s war efforts.
On how he got involved in telling his grandfather’s story on Nanyang volunteers, Dib Jee explained, “I went to China to attend an event in 1993 or 1994. From there, from the museum then I realised there was this group of volunteers, drivers and mechanics that helped out fellow Chinese.”
Dib Jee who was born and raised in Singapore said, “I started with Professor Chen Yi Ming. She was the curator in overseeing Chinese museum in Xiamen. After that, one project led to another, and I got to know more about my grandfather.”
Dib Jee never had the chance to meet his grandfather but remembered how his grandfather was mentioned during normal household conversation, “At that time, for my parents and my father’s siblings, every time talking about my grandfather was a sensitive issue.”
Clearing the air, Dib Jee explained that the colonial government at the time had treated his grandfather as a suspected communist.
Dib Jee then realised about five years ago how sensitive the topic of his late grandfather was when he went to London to check on the documents in the museum archives.
He saw reports on his grandfather, with ‘Potential Communist’ underlined in red. Dib Jee said, “Only 60 years later I realised how sensitive my parents’ conversations were.”
Out of the 3,200 volunteers, only about 1,200 came back to South-East Asia. One third of them perished in China due to accidents, disease and as casualties of war, especially when the Burma Road was air-raided by the Japanese.
“Literally we can say that for every kilometre of the route there would be one volunteer who had an accident or was killed,” said Dib Jee.
According to Dib Jee, as many of them were in different places and news was slow, many of them missed out on the window period of repatriation.
Hence he said, “Many of them were left behind at Yunnan province, some of them choose not to come back because they married local girls. Those who did not know, they were in Kunming city.”
The hardships of war did not just end there. According to him, some volunteers left behind were left with no other option but to become beggars.
“At that time, the Communist party said they were pro-Taiwanese, they couldn’t get work. When they went to the Taiwanese looking for work, the Taiwanese regarded them as communists. So they were caught in limbo.”
Dib Jee clarified, however, that the volunteers were not involved in any party. “They were independent bodies.”
Dib Jee was however grateful when in 2004, the Chinese government officially acknowledged the former volunteers who resided in China after the war, providing them compensation which includes healthcare protection.
Dib Jee believes their job is not finished yet, “After Dr Lim’s book, I’m sure there are still a lot of things behind. We’re still trying to dig out more information in East Malaysia because I’m sure there are a lot more in our list that have not been discovered.”
“In the Chinese media this is pretty well covered. However in the Western media, this is part of the history that they think has nothing to do with the colonial time. They know very little even up to this day,” he said.
“I started this work since 1994. I learnt a lot from nothing to something. Till now I’m still trying to canvas these volunteers.”
He said just as his grandfather canvassed these volunteers to help in the war, he is now canvasing these former volunteers to accord them recognition.
“We must also say deep inside in our hearts we are grateful and thankful for all of their hardship and hard work in order to give us this peaceful time,” said Dib Jee.
A Daughter’s Journey
Tang Xiao Mei was born and raised in China but her father was from Penang and one of the volunteers during the Sino-Japanese war.
According to Tang, 62, when the repatriation period was announced, Tang’s father was still on the road and did not receive the news of repatriation.
He ended up remaining in China and could not go back to Penang. Eventually he married Tang’s mother and settled down in China.
Inspired by her father’s past, Tang is now the Executive Vice President of Yunnan Voluntary Mechanics Historical Research Society.
Apart from tracing all the volunteers who settled in China after the war, Tang’s effort is also to fight for more recognition and better allowance from the Chinese government for these former volunteers.
To date, 14 of the Nanyang Volunteer Mechanics and Drivers are still living; 9 living in China, 1 in Perak, 3 in Sarawak and the fourth Sarawak volunteer, Liaw who is now living in Canada.
The other three surviving Sarawak volunteers are Lee Ah Liew, 94, from Lundu, Kho Hai Seng, 93, from Serian and Fong Chen Piao, 94, from Kuching.
Photo credits: Dr Julitta Lim Shua Hua | <urn:uuid:1f5ca0e1-c071-46b3-9ef4-b27c64ac9146> | CC-MAIN-2018-09 | http://seeds.theborneopost.com/2014/07/18/remembering-the-nanyang-volunteers/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812788.42/warc/CC-MAIN-20180219191343-20180219211343-00616.warc.gz | en | 0.985086 | 2,506 | 3.28125 | 3 |
Branko Glišić and Naveem Verma - Sensing Sheet for Structural Monitoring
The 2007 collapse of the Interstate Highway 35W bridge over the Mississippi River in Minneapolis spurred Princeton engineers Branko Glišić and Naveem Verma to develop a low-cost yet accurate sensor system for detecting defects in such massive structures. Embedded in customizable plastic sheets, the sensors can differentiate between a minor and major structural problem, and feature integrated circuits that allow communication with other sensors in a bridge. Glišić, an assistant professor of civil and environmental engineering, and Verma, an assistant professor of electrical engineering, worked with Princeton’s James Sturm, the William and Edna Macaleer Professor of Engineering and Applied Science, and Professor of Electrical Engineering Sigurd Wagner.
Traditional sensors measure defects at a single point, rather than across a large area, and data must be transmitted to computers and evaluated using complex algorithms and expensive technology. The Princeton sensors are made from inexpensive thin-film circuit technology that can be “stamped” on large, flexible plastic sheets at a cost far lower than manufacturing conventional electronics. The plastic sheets can then be molded into the shape of a structure allowing comprehensive coverage, or cut to fit irregular forms, both without hindering their function.
An additional advantage of Glišić and Verma’s sensors is that their integrated circuits communicate with each other, even double-checking data to differentiate between false alarms or minor structural issues, versus real problems that require immediate repair.
“This system will allow funds and time to be used to their best advantage,” Glišić said. “If workers are sent for repairs too early, it wastes money. But send them too late, and you have a disaster. | <urn:uuid:6d00e007-da43-4956-b4f2-636edba34f7a> | CC-MAIN-2014-49 | http://www.princeton.edu/research/news/features/a/index.xml?id=8960 | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400378724.10/warc/CC-MAIN-20141119123258-00110-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.923339 | 372 | 2.890625 | 3 |
The Horse Diet and its Importance in Hoof Care
Reconsidering what constitutes a good horse diet is essential if you want to look after your horse's feet naturally, because you can no longer rely on shoes to cover up the foot problems that the domestic horse's diet often causes. Like our fingernails, the hoof is directly affected by the horse's diet, but of of course for the horse, considering the stresses the hoof is under, any negative effects on the hoof caused by the diet have much greater consequences.
The natural horse diet
If you try to think about the horse's hoof with a beginners mind, it is a challenging set of circumstances that the hoof has evolved over millions of years to deal with. The wild horse requires the hoof to be constantly replacing itself - enough to deal with the wear caused by the distances a wild horse must cover in the wild to find food, water and shelter, but not so much that the foot would become overgrown, which could lead to potentially crippling problems. In the wild a horse who was held back by foot problems would become easy prey.
So for a wild horse's feet to maintain themselves with just the right amount of growth versus wear is a fairly delicate balance, and an important part of this balance is the diet of the wild horses in their original habitat.
The modern domestic horse may seem very different from his wild counterpart, but millions of years of evolution and adaptation to a specific environment are not undone by a few hundred years of selective breeding. Domestic horses have a very different appearance, but the basic functioning of the body remains the same, and of course the feet are part of this. So the point is that if we don't want to do damage to our horse's feet, we must try to make his diet as close to what it would be in his natural state as possible.
What is the natural horse diet?
Horses evolved in the plains of Asia and Eastern Europe. The only remaining truly wild horses in this original habitat are Przewalsky's horses, the Mongolian wild horse.
This steppe or plateau habitat is characterized by vast open plains with hay-type grasses that may be abundant but have low nutritional value due to the stony, infertile ground - very different from the rich green grass that most domesticated horses graze on in America and Europe.
This is why the horse is not evolved to metabolize large quantities of sugars or carbohydrates, instead they have evolved an incredibly long gut in order to be able to get every bit of nutrition possible out of forage that has a very low nutritional value.
The difficult balance of the domestic horse diet
The problem with applying the wild horse diet to our domesticated horses is that in the process of breeding horses that are taller, lighter and more athletic for the various riding disciplines, and also due to their different lifestyle, they are no longer as efficient at taking what they need to maintain their condition from low-value forage, and they have equally lost to some extent the incredible physical resilience of wild horses.
This is why it has become traditionally accepted that green grass, rich hay or haylage, and considerable quantities of grain are necessary to maintain a working horse in good condition. Whether or not this is the case, the high sugar content of this diet is still harmful to the feet. Actually, a high sugar-diet is bound to make the gut less efficient, and cause other metabolic imbalances - see Horse Nutrition for more on this.
The sensitive laminae, which can be imagined like the glue or velcro that holds the hoof wall onto the sensitive tissues underneath, is very easily damaged by any toxin in the blood. The horse's gut not being predisposed to metabolize large amounts of sugar, if it reaches the hind gut it disturbs the balance of fibre-digesting gut flora resulting in the production of toxins. These are carried to the feet in the blood, where they do damage to the laminae - known as laminitis.
This damage, whether it be to a little or large degree, causes not only increased sensitivity in the foot, but also disrupts the form of the whole hoof.
The other problem with the high sugar horse diet is that the greater level of nutrition causes the hoof horn to grow at a considerably faster rate (the cause of the rings in a laminitic foot) and as soon as the hoof wall becomes much longer than the level of the sole of the foot, it starts to flare (bend outwards) putting further strain on the laminae and eventually forcing the bones of the foot into an incorrect position.
The conventional solution: cover up the problem
The practice of shoeing is actually a very effective way of hiding the problem of the effect of the traditional domestic horse diet on the feet. The fact that shoeing inhibits circulation and numbs the feet means that the chronic sensitivity caused by the high-sugar diet is not apparent, because the shod horse cannot feel his feet.
Also shoes artificially contain the hoof wall, so that it cannot flare and break as an overgrown hoof would normally.
Of course, this superficial remedy does not mean that the problem has gone away and no damage is being done, it just means that the problems will only surface later as serious and 'untreatable' problems such as navicular, pedal osteitis, and severe laminitis with rotation of the pedal bone. All of these diseases incidentally are unknown in wild horses who have the right environment, not only because they are barefoot, but also because of the healthy wild horse diet.
The real diet solution for healthy feet
Yes, you probably guessed it by now: cut out the sugar!
Actually it's a bit more complicated than than, because, as we mentioned already, many domestic horses simply aren't 'good-doers' in the same way as wild or native-type horses are, in addition we are often placing more intense athletic demands on them through equestrian sports. However, this means that we have all the more reason to provide the horse diet that makes their gut as efficient as possible, so that we don't have to resort to sugar to provide energy and condition.
Healthy and holistic solutions address issues at the source instead of trying to cover up symptoms as the conventional approach very often does. The solution that is healthy for the horse in one way, is usually beneficial in lots of other ways, setting up a positive circle instead of a negative one. A diet based on ample good quality, low-sugar forage encourages the gut to become more efficient at getting energy from fibre instead of carbohydrates, as it creates the hind-gut environment that is suitable for fibre-digesting gut flora, instead of the acidic environment created by a high-sugar diet that prohibits these bacteria.
Other ways we can make the gut more efficient are:
- Encouraging as much continual movement as possible through land-management solutions like Paddock Paradise, and by limiting confinement to the stable
- Keeping the horse's spine healthy, again through enough everyday movement, but also by working the horse in engagement, and by addressing stiffnesses and blockages with healing therapies such as Cranio-Sacral Therapy
- Keeping the horse as calm and happy as possible by giving him the social interaction and security provided by the herd environment
For more on the functioning of the horse's gut, look at Preventing Horse Colic
In addition to all of this, for horses that have greater nutritional demands, we still need to find alternatives to the high-sugar horse diet. Our own experience of trying to almost completely remove carbohydrate from our horses' diet made this clear. We subsequently discovered copra (coconut meal) which provides energy through one of the healthiest forms of fat there is: coconut oil. See the Ideas in Action section of our Horse Nutrition page for a full description of our experience of finding the horse diet that provides enough energy but is low in sugars.
Aside from its low sugar-content, we think that copra is directly beneficial for hoof horn quality due to its high content of healthy oils. Having personally trimmed our horses feet over the whole period of changing their diet and introducing copra, I have seen a significant improvement in the elasticity and resilience of the horn, and I am sure this has a lot to do with the the fatty acids provided by the coconut oil, which are required for healthy horn growth. Coconut oil is now available as a supplement for horses from Stance Equine in the UK.
Is it necessary to provide supplements in the horse diet for healthy feet?
If you start researching the nutrients that are required for healthy horn growth, you quickly accumulate a mind-bogglingly long and complex list of substances, many of which are available as nutritional supplements, such as methionine, selenium, biotin, and so on.
You would start to wonder how the wild horses get along with such healthy feet on such a sparse diet… In fact all of these substances are available, in the right balance, in the natural diet of low-sugar grasses, other plants and shrubs that horses naturally browse on, and natural mineral sources.
The fact is that it is dangerous territory to start adding these nutritional supplements into the diet separately. We humans have a tendency to think that more is always better, but almost all of the nutrients required by the feet, including trace substances such as copper and selenium, can have very damaging effects on them if too great a quantity is consumed in the horse diet.
On the other hand it is true that we cannot always provide for our domestic horses the kind of grazing that the ideal wild horse environment gives. Often our pastures are devoid of a natural variety of herbs and grasses, and the soil may be depleted of the minerals that the horse requires.
This is why we give our horses bee pollen as their only nutritional supplement.
It contains an incredibly rich array of trace substances and natural enzymes, and most importantly has its natural synergistic make-up intact, unlike synthetic supplements which are much more disruptive to the body's finely-tuned biochemical systems. Look at Horse Nutrition for more about bee pollen.
The point here is that usually, in giving supplements for hoof problems, horse owners are trying to address the wrong issue. Often the source of the problem lies in shoeing, an unhealthy lifestyle or a high-sugar diet. It is only once these issues have been addressed that we can go on to consider supplementing the horse's diet as a necessity. But like everything natural and holistic, the right horse diet is usually simple and straightforward, and it is your own intuition that tells you that it is healthy for your horse.
To share your own Barefoot horse story, and read other people's, go to: The Barefoot Horse Revolution: Share Your Story!
relevant pages on Happy Horse Training that may interest you:
Natural Horse Hoof Care
The Natural Trim: The Solution For Healthy Horse Hoof Care
Hoof Boots: A Revolution In Horse Hoof Protection
Going Barefoot: Seven Steps for Success
The Barefoot Horse Revolution: Share Your Story!
The Simple Seven-Step Natural Trim eBook
return from The Horse Diet and its Importance in Hoof Care to Happy Horse Training home | <urn:uuid:6335280d-f6c6-4dc9-8d07-54877a325a57> | CC-MAIN-2018-26 | http://www.happy-horse-training.com/horse-diet.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864822.44/warc/CC-MAIN-20180622220911-20180623000911-00184.warc.gz | en | 0.959416 | 2,330 | 3.109375 | 3 |
Defying 30 mph gusts and temperatures down to minus 22 F,NASA’s new polar rover recently demonstrated in Greenland that it could operate completely autonomously in one of Earth’s harshest environments.
The robot known as GROVER, which stands for both Greenland Rover and Goddard Remotely Operated Vehicle for Exploration and Research, was designed by teams of students attending engineering boot camps at Goddard in the summers of 2010 and 2011. Built to carry a ground-penetrating radar to analyze layers of snow and ice, the rover was later transferred to Boise State University for fine-tuning with NASA funding.
Although researchers had tested GROVER at a beach in Maryland and in the snow in Idaho, the May 6 to June 8 testing at Summit Camp, the highest spot in Greenland, was the rover’s first polar experience. One of the main goals was proving that the robot could execute commands sent from afar over an Iridium satellite connection – an objective GROVER accomplished.
“When we saw it moving and travelling to the locations our professor had keyed in from Boise, we knew all of our hard work had paid off,” said Gabriel Trisca, a graduate student from Boise State University who has been involved in the GROVER project from its start. “GROVER has grown to be a fully-autonomous, GPS-guided and satellite-linked platform for scientific research.” Trisca accompanied the robot to Greenland. | <urn:uuid:38b2e88e-9c2b-4ce5-bf55-259936a8e0e0> | CC-MAIN-2017-22 | http://www.learn.ca/tag/nasas-polar-robotic-ranger/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607862.71/warc/CC-MAIN-20170524211702-20170524231702-00293.warc.gz | en | 0.973201 | 298 | 3.59375 | 4 |
A new government report reveals that even though Hispanic Americans have lower income and less health insurance, they live longer than non-Hispanic whites (the most medically insured group in the US).
There are a number of guesses as to why Latinos are living longer. One is that Hispanics who manage to immigrate to the US are among the healthiest from their countries. Tight-knit social communities and more physical activity could also play a role in life expectancy. Let’s consider another possibility.
The common perception is that income, education, and access to health insurance are the most important factors for longevity, but these recent findings turn that assumption upside down. In fact, the revelation that Latinos lack health insurance at a rate higher than other groups (they are two to three times as likely to be uninsured as the rest of the population) may be significant. Could the very avoidance of modern medicine be keeping US Latinos alive longer?
What is indisputable is that Western medicine is killing people prematurely. Statin drugs make us vulnerable to foodborne illnesses, and make us deficient in the vital nutrient vitamin D and COQ10. The latter deficiency can make us vulnerable to heart failure. Chemotherapy causes and hastens cancer deaths.
Medical errors are the number one killer in America, ahead of heart disease, cancer, and more. As Gary Null wrote in his book Death by Medicine, “The number of people who die each day because of medical errors—physician mistakes, hospital-related illness, and reactions to FDA-approved medications—is the equivalent of six jumbo jets falling out of the sky. More Americans are dying each year at the hands of medicine than all American casualties in WWI and the Civil War combined.”
Another possibility is diet. Traditional Latino diets, although far from perfect, are much better than the modern American diet with its reliance on sodas, junk food, and fast food. If this is a key factor, it ought to be possible to pinpoint by looking inside the data. But if it were just diet, why do Latinos suffer from some diseases at higher rates than non-Hispanic whites, including diabetes and heart disease, but die from these diseases at a lower, not a higher rate? That fact alone might suggest that the standard medical treatments available through health insurance are backfiring. | <urn:uuid:a6297e06-f83a-4b68-9a09-11bd9766f9f2> | CC-MAIN-2015-18 | http://www.anh-usa.org/cdc-report-on-life-expectancy-latinos-live-longest-what-might-this-tell-us-about-medicine/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661916.33/warc/CC-MAIN-20150417045741-00131-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.95825 | 468 | 2.921875 | 3 |
Invasive D-hydrilla (Hydrilla verticillata) typically grows upward first, forming dense canopy mats during summer. But an open understory often exist in which those big bass can hide. Fish heavy punch baits. If you can get them below the top layer, you should get a bite.
Two biotypes of invasive hydrilla exist in TVA reservoirs: monoecious (M-hydrilla) and dioecious (D-hydrilla). While the two may look similar, the growth habits of each are very different. D-hydrilla often appears larger and more robust than M-hydrilla.
Spring—D-hydrilla will be some of the only plant material to make it through the winter so finding these mats can provide for some early grass fishing. M-hydrilla, on the other hand, will be sprouting from tubers creating an emerging grass edge early in the spring.
Summer—D-hydrilla typically grows upward first, forming dense canopy mats during summer. But an open understory often exist in which those big bass can hide. Fish heavy punch baits. If you can get them below the top layer, you should get a bite. M-hydrilla is much more difficult to fish in summer. It first covers most of the bottom, then begins growing toward the water's surface. This growth habit often leads to a “wall-like” bed of vegetation with few holes and very little understory for fish to hide in. Flip holes created by underwater obstructions (logs, rocks) or fish the edge of these impenetrable mats.
Fall—Both D-hydrilla and M-hydrilla provide excellent cover for the ever popular frog bite of fall. M-hydrilla will begin to die back in middle to late fall, leaving open areas beneath floating mats. D-hydrilla will continue to maintain the canopy and understory which are conducive for big bass. As these and other plants decay, a “slime” of algae will begin to form, and fish will take advantage of newly released nutrients. Find the combination of decaying plants and “slime,” and give them all you’ve got.
Winter—D-hydrilla will slow growth and die back some, but should maintain clumps of vegetation around existing root crowns. This will be some of the only grass available for fishing in winter, so target isolated clumps with a slow presentation. M-hydrilla will die back completely in winter, so little structure is left behind to target.
Fish—D-hydrilla provides good habitat and safety structure for fry and juvenile sport fish as well as a refuge for baitfish. An open understory can also provide foraging opportunity for predatory fish. M-hydrilla can inhibit fishing access during the peak of summer, but does provide edge habitat.
Waterfowl—Both species can be a key resource for waterfowl in the Tennessee Valley, not because of their nutritional value, but because of their abundance as invasive species. Hydrilla has been associated with avian vacuolar myelinopathy (AVM) in other areas, which can negatively impact water birds and predatory birds like eagles.
What It Looks Like—Small, pointed leaves whorled around the stem, most often in sets of four to six. Distinguishing the two biotypes from one another can be very difficult, but an apparent size difference (D-hydrilla being larger) can often be seen.
Where to Find It—In TVA reservoirs, hydrilla is one of the most abundant plants in the system. Being a very aggressive plant and growing out into deep water can make this plant one of the easiest to find.
Similar Species—This species resembles Canadian elodea and Brazilian elodea. Canadian elodea is often much smaller and whorls are in sets of three or less. Brazilian elodea is often larger and does not produce the characteristic tubers of hydrilla.
Hydrilla is by far the most costly plant to manage in the TVA system. Reportedly growing one to four inches per stem per day, this plant can quickly impede all recreational activities, including fishing access. Cost to manage: $$$$$ out of $$$$$. | <urn:uuid:6e925f39-7dbc-47ad-99cf-c4124c5f369e> | CC-MAIN-2021-17 | https://www.tva.com/environment/environmental-stewardship/angler's-aquatic-plant-id/aquatic-weed-detail-page/hydrilla-(d-hyrdilla-m-hydrilla) | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039398307.76/warc/CC-MAIN-20210420122023-20210420152023-00301.warc.gz | en | 0.938324 | 898 | 3.140625 | 3 |
Psoriasis is a condition in which the immune system attacks cells in the skin. This immunological reaction causes inflammation, which stimulates the rapid growth of skin cells. As a result, people with psoriasis develop red raised plaques as the reproducing skin cells accumulate. Although there is not enough clinical evidence to support diet changes as a method for treating psoriasis, some foods may help relieve symptoms.
Omega-3 Fatty Acids
One of the main kinds of foods that can be used to relieve psoriasis symptoms are those that are high in omega-3 fatty acids. Omega-3 fatty acids are a type of unsaturated fat that can help the body in many ways. One possible effect of these essential fatty acids is that they may reduce inflammation throughout the body, the National Psoriasis Foundation notes. Because psoriasis is caused by an overactive immune system, reducing inflammation can help relieve psoriasis. One of the best sources of omega-3 fatty acids is fatty fish, such as salmon, mackerel, herring, tuna and cod, because they contain fish oil. Other foods with these beneficial fats are flax seeds, soy products and some vegetable oils, such as canola oil.
If you do not eat enough fiber, partially digested food spends more time in your intestines, which can cause harmful chemicals to be absorbed, possibly exacerbating psoriasis. In order to reduce the risk of this happening, WomenFitness.net recommends that people who suffer from psoriasis consume a high-fiber diet. Fiber can be found in whole grains, fruits, vegetables and other foods derived from plants.
Folic acid is another nutrient that is important for psoriasis sufferers. A deficiency in folic acid has been observed in some people who have psoriasis. You can increase your folic acid intake in a variety of ways. Many breakfast cereals and breads have been fortified with folic acid. Green leafy vegetables, such as spinach, broccoli and Brussels sprouts, also contain significant amounts of folic acid. | <urn:uuid:488f6bc9-72fb-4cc3-b383-c9ad36caf9e0> | CC-MAIN-2017-39 | http://www.livestrong.com/article/311631-good-foods-for-psoriasis-sufferers/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689102.37/warc/CC-MAIN-20170922183303-20170922203303-00336.warc.gz | en | 0.950664 | 425 | 3 | 3 |
Presentation on theme: "Exposure & Effects Pilot Study (EEPS) RMP Objective #4 Measure pollution exposure and effects on selected parts of the Estuary ecosystem (including humans)"— Presentation transcript:
Exposure & Effects Pilot Study (EEPS) RMP Objective #4 Measure pollution exposure and effects on selected parts of the Estuary ecosystem (including humans) EEPS goals: Develop a suite of indicators for S&T Conduct short-term studies to assess SF Bay E&E
2003 Program Review: Recommendation for EEPS Great chemical characterization of the Bay but what does it mean? Recommendation: need to understand biological impacts of chemicals detected In response, TRC/SC allocated $200K/yr for EEPS thru 2008
EEPS: Selection of Indicators Rationale presented in Conceptual Framework (Hunt et al., 2004) Fish Clapper rails Benthos/ sediment Terns Cormorants
EEPS Projects – 2005 Avian Se Analysis of Diving Ducks $20K Hg Analysis of Tern Eggs$ 4K Fish Analysis of Hg in Small Fish (3 Yr)$50K E&E on Shiner Surfperch (2 Yr)$60K Benthos Sediment Assessment $15K Benthic Archive $ 6K
EEPS 2005 & 2006 Avian 2005: Se in diving ducks Report early 2006 (2005 and 2002 data) 2005: Hg in Forster, Least, and Caspian tern eggs Report early 2006 2006: Egg injection study?
EEPS Fish 2005, 2006 & 2008: Small Fish Mercury Project Understanding impact of management actions Small fish – an ideal monitoring tool Accumulate MeHg Integrate over fixed time (1-yr) Indicate spatial variation Indicate risk to piscivorous wildlife Activities coordinated with SBSP, IEP and CalFed FMP
EEPS: Small Fish Hg Project Study Design 4 near restoration projects 4 near existing marshes 2 additional sites (IEP) Pelagic species: Topsmelt and Inland silversides Benthic species: Arrow goby, Cheekspot goby, and Shimofuri goby, Bay goby from deep water Study Design
Plans for 2006 Sample 8 sites Obtain additional funding EEPS Fish 2006: Small Fish Hg Project Inland silversides Bay goby Shimofuri goby
EEPS 2005 & 2006: Shiner Surf Perch Study Goal: Determine if shiner surfperch show effects of contamination on some aspect of their fitness, growth or reproduction. Difficult to demonstrate effects Work undertaken by AMS and UC-Davis
EEPS 2005 & 2006: Shiner Surf Perch Strategy: Yr 1: Field study measuring growth and reproduction Yr 2: Lab study on effects of mixtures on growth and fitness Yr 2: Develop population models explaining role of contaminants
EEPS – 2005 Shiner Surf Perch Collection of Fish 3 contaminated sites in Bay (Oakland Middle Harbor, Candlestick, and IEP station) 1 reference site (Big River Mendocino) Fish measured, weighed, dissected, sexed, young counted and weighed, and tissues stored. Initiated evaluation of biomarkers (P-450 induction, histopathology, and vitellogenin).
EEPS – 2005 Shiner Surf Perch Study Preliminary results: Skewed sex ratios toward females. All fish livers positive for vitelloginen antibodies. All fish positive for P-450 induction. Results suggest need to identify new reference site
EEPS – 2006 Shiner Surf Perch Study For 2006: Identify new reference site Develop laboratory culture Continue to evaluate biomarkers Develop anti-body tests for EDC Continue to examine fish for effects and sex ratios | <urn:uuid:33b192b9-ed69-4133-9c23-fb8c5e0c0605> | CC-MAIN-2017-47 | http://slideplayer.com/slide/718083/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805362.48/warc/CC-MAIN-20171119042717-20171119062717-00489.warc.gz | en | 0.789529 | 772 | 2.75 | 3 |
How to minimise the environmental impact of your farm’s operation
Potential challenges and reliable solutions
Poultry farming has an overall lower footprint than any other livestock farming. Nevertheless, the environmental impact of poultry production might be significant on poorly managed farms. The environmental impact of poultry production depends on numerous factors, such as housing systems, management practices and, of course, feed & nutrient management.
Agriculture is responsible for more than 80% of ammonia emissions, mainly from livestock farming. Ammonia emissions from poultry farms has been a hot topic over the last ten years or so. Governments around the world are adopting tougher regulations every day and poultry farmers face more and more restrictions to reduce ammonia output on their farms.
Adopting a practical strategy
The total amount of ammonia emitted from a poultry farm depends on a number of factors such as housing systems, management practices and, of course, feed & nutrition management. Adopting a proper strategy is the first step towards tackling excessive ammonia emissions on your farm and, within this strategy, nutrition management might be the most important factor. A practical nutrition management plan is one that provides both profitability and sustainability in poultry production.
Optimising nutrient intake and improving the nutrient utilization efficacy of the animal must be the key part of your nutrition management strategy.
Nutrition management improves the feed digestibility, and higher digestibility of nutrients, particularly proteins, may considerably reduce the ammonia precursors in poultry faeces.
Nutrition management also improves your bird’s feed conversion through optimal diet balancing and feeding regimes. It simply reduces the amount of feed consumed per unit of livestock product.
Potential challenges and reliable solution
Poultry farming has an overall lower footprint than other livestock farming... | <urn:uuid:c86a84f1-eb62-40e8-8ea1-1233c5070e6c> | CC-MAIN-2021-31 | https://ab-neo.com/industry/poultry/environmental-pollution | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154897.82/warc/CC-MAIN-20210804174229-20210804204229-00336.warc.gz | en | 0.9023 | 353 | 3.265625 | 3 |
Emergency situations happen every single day.
You could find yourself facing a child who is choking, a co-worker who is suddenly unconscious or a complete stranger in need of first aid.
It could happen at anytime, and a Hope first aid instructor stresses that it’s better to be prepared for it.
“You can be a vital link to that person’s survival, if you know what to do,” says Kim Richardson.
There are numerous Red Cross courses coming up at the Hope Recreation Centre, and Richardson can help anyone figure out which class is the best.
Anyone who hasn’t taken a course in the past three years, is due to get re-certified. First aid certification only lasts three years, as a way to make sure people stay up-to-date on life-saving techniques. And that’s getting easier than ever, Richardson says.
“It’s so much easier,” she says. “The courses are user friendly, and I can promise you will leave knowing how to save someone’s life.”
The techniques taught several years ago were somewhat complex, she explains. But it’s all been streamlined, with shorter, more concise lessons.
There’s something else that has changed in the past few years, too. The arrival of AED machines in many larger centres, including the Hope Recreation Centre, means anyone can become a first responder. Everyone who takes a Red Cross course will come out knowing how to operate an AED.
However, the machine is probably one of the simplest machines to operate.
“Once the AED is attached to the patient, it takes over,” Richardson says. And while they are designed to be extremely user-friendly, handling one in a first aid course can hugely increase the chance of helping save a life.
“AEDs do save lives,” Richardson says. “For every minute an AED is not hooked up, the chance of survival diminishes by 10 per cent.”
And in a situation where someone is not breathing, the clock is ticking.
It’s a scary thought, but reality. And it’s not just adults who need to be prepared to help in an emergency.
Children are capable of administering simple first aid, and of carrying out the number one step in any emergency.
“Call 911,” Richardson says. “That’s the most important thing you can do.”
But beyond that, children can learn awareness, how to recognize dangerous situations, and basic first aid, starting as young as five years old.
“Never underestimate the smarts of a child,” she says.
Courses for kids are kept light and upbeat.
The intensity of the courses increases as children grow into their early teens, when they can be taught CPR skills. And while someone who learns first aid may never need to save a life, it’s a skill that will shine through in other situations.
“We teach the babysitting course,” she says, which includes first aid. Learning to be a confident and reliable babysitter can lead to better employment. And first aid certification could that one thing that sets a young person apart in the job market.
“It would definitely increase the chance of getting an interview,” Richardson says.
There are several courses this fall available, including the Red Cross People Savers, for ages nine to 10 years old. That course starts on November 21, and and runs from 9 a.m. to 12 p.m. for $40.
A similar course for children ages 11 and 12 runs the same day from 1 p.m. to 5 p.m., for $50.
The Red Cross Babysitting program runs through four days over the Christmas break, and is designed for children aged 11 and older for $65.
For teens 15 and older, and adults, there are three more course this year. The first is the Red Cross Standard First Aid with CPR-C and AED on November 26 and 27.
Next is the Red Cross CPR-C and AED course on December 4, then the Red Cross Child Safe with CPR-B on December 11.
For more information, phone 604-869-2304. | <urn:uuid:b34b9895-310c-4adb-9d46-8d637fd6cfce> | CC-MAIN-2019-26 | https://www.agassizharrisonobserver.com/news/never-underestimate-the-smarts-of-a-kid/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998813.71/warc/CC-MAIN-20190618183446-20190618205446-00543.warc.gz | en | 0.955394 | 904 | 2.75 | 3 |
National Park Service Ranger Rick Jenkins of Cabrillo National Monument communicated with students in real time and answered an array of their questions.
Credit: Kimberly Mann Bruch, UC-San Diego
This Research in Action article was provided to LiveScience in partnership with the National Science Foundation.
For several years, the National Science Foundation-funded High Performance Wireless Research and Education Network team has been working with the Pala Native American Reservation Learning Center staff to produce distance learning activities that link interesting science sites with Learning Center students.
Recently, the effort brought two sites to the students: the Cabrillo National Monument intertidal area along the southern California coastline and the California Wolf Center located in rural San Diego County. Both activities used Skype to connect the learning center students with the remote field scientists so that they could interact in real time with one another.
Coined Live Interactive Virtual Explorations, the distance learning events allow students to talk with scientists out in the field and participate in hands-on activities — without the students ever leaving the reservation.
Specifically, before the Cabrillo tide pools distance-learning activity, the students received several pieces of coastal vegetation and preserved seastars, clams and urchins. The students used the materials to better understand the ecosystem of the science site that they were about to explore via LIVE.
Likewise, prior to the California Wolf Center interaction, the students received a traveling trunk that encompassed several pelts that allowed them to better visualize the size difference of the wolf, coyote and fox.
Editor's Note: Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author and do not necessarily reflect the views of the National Science Foundation. See the Research in Action archive. | <urn:uuid:a530534e-6838-4ad8-96bc-081c7fafa626> | CC-MAIN-2015-06 | http://www.livescience.com/25278-hpwren-live-wireless-education-nsf-ria.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115868812.73/warc/CC-MAIN-20150124161108-00133-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.930414 | 354 | 3.609375 | 4 |
Brickendonbury Estate History
Brickendonbury Estate History
The Brickendonbury estate, has a long and colourful history. Little is known about it until Saxon times (approx. 500 AD), when the hill site was claimed by the Saxon, Brica. The word don means hill - the bury was added in mediaeval times and indicates the site of a manor house: hence Brickendonbury, a fortified manor house standing on Brica's hill. It is probable that Brica's land extended from the River Lea to the north, where he would have been able to build a mill, back to uncleared land to the south which would have provided timber for construction and fuel, together with game. Perhaps Brica merely claimed an earlier site, although the only evidence for this is the 'Brickendonbury Hoard', consisting of some 430 Roman coins dug up from the moat in 1893 when the gardens were being renovated. All the coins date from the same period, which may indicate that there was a Roman settlement on the site two thousand years ago. An L-shaped part of the moat still exists on the south and west sides of the mansion. It was probably a dry moat until the construction of the present mansion.
By 1016 the estate was held by the Canons of what was to become Waltham Abbey, and this was subsequently recognized in 1062 by Edward the Confessor and also by Harold II shortly before the Norman Conquest (1066). The activities of the inhabitants around this time are recorded in the Domesday survey (1086), giving a glimpse of 11th century rural life centring on working the land, either for arable crops or as pasture for cattle. Later still, Henry II confirmed the manor of Brickendon to the Abbey as part of his expiation for the murder of Thomas á Becket. By granting certain privileges concerning taxation and the non-forfeiture of criminals, the Liberty of Brickendon was established. This ancient name is still used; on local maps Brickendon Liberty describes the area surrounding the present TARRC site.
At the dissolution of the monasteries during the reign of Henry VIII the estate passed first to Thomas Knighton of Little Bradbury in 1542 and subsequently to Edmond Allen who, in 1588, sold it to Stephen Soame or Soames and his son William, of Suffolk, for the sum of £1000. Over the next three centuries the estate changed hands many times and a succession of owners and tenants came and went.
In 1682, Edward Clarke purchased the estate from the Soames' family. Clarke was a successful merchant, who moved to London from Leicestershire at a time when the city was recovering from the dual devastations of plague and fire. He was knighted in 1689, became Master of the Merchant Taylor's Company from 1690-91 and eventually Lord Mayor of London in 1696. A vivid portrait depicts a powerful businessman. His importance in terms of Brickendonbury is that he was probably responsible for the first, and what has remained the most imposing, part of the mansion.
Sir Edward died in 1703 and the estate passed via his son to his grand-daughter Jane Morgan. She in turn left it to her daughter, also called Jane, who had married Charles Gould, the Judge Advocate General and Judge Martial of H.M. Forces. Charles Gould changed his name to Morgan upon his wife's inheritance. As befits such an eminent man, his picture was painted by the leading portrait painter of the time - Gainsborough - leaving a permanent record of this imposing figure. The Morgan family appear to have been responsible for many of the extensions to the mansion. They also laid out the fine avenue of trees which connects the mansion with Hertford, known as Morgan's Walk. The last Morgan to have lived at Brickendonbury was George Gould Morgan who died there in 1845.
For the next 40 years or so the estate appears to have been leased or let to a series of tenants, the most notable of whom was Russell Ellice, who died at Brickendonbury in 1873. Ellice was Chairman of the East India Company in 1853 and a Director from 1831 until his death; his position in this company provides a first link between the estate and South East Asia.
By the 1870s the Morgans had clearly lost interest in the estate and disposed of it in a series of sales between 1878 and 1883. Not only did the estate shrink in size during this period and no longer extend to the whole Liberty, but it also lost its Lordship, which was sold at this time.
A Nottingham lace merchant, Charles Grey Hill, then purchased the estate, but died before taking up residence. In 1893 George Pearson acquired the mansion, with an estate extending to over 1000 acres, for £30.000; it seems likely that by this time both the house and the estate had fallen into poor condition. Both George and his son Sir Edward were associated with the major civil engineering contractors S. Pearson & Sons, who built the Great Northern and City underground railway. This line forms the City end of the present railway line from Moorgate to Hertford North; the line from Hertford cuts across land which used to form the western side of the estate. The media company Pearson plc, publisher of the Financial Times, is a direct descendent of the original Pearson civil engineering company.
On George Pearson's death in 1902 the estate passed to Sir Edward, a civil engineer who was also a Justice of the Peace of Hertfordshire and High Sheriff for the County in 1909. He was Mayor of Hertford for three years and donated the War Memorial to the town. While living at Brickendonbury, Sir Edward did a considerable amount of work on scientific farming, which involved soil analysis (by the famous Dr Augustus Voelcker & Sons) and intensive cultivation of arable crops, as well as breeding a fine stud of Shire horses and first-class herds of Dairy Shorthorn and Devon cattle. The cattle provided dairy products for the house and estate via a dairy, built in 1900 to a design based on the dairy at the Queen's residence in Sandringham. Later the estate lodges, cottages and much of the Home Farm were redeveloped with a part of the farm subsequently forming the site for the laboratories - an appropriate conversion given Sir Edward's leaning to scientifically based farming.
The Pearsons were also responsible for extending the mansion, rebuilding the west end of the south front, adding an extra storey and, in 1919, a Jacobean style banqueting hall, which now serves as the conference room. The gardens were redeveloped to include, at the end of the moat, an artificial rock garden made from a special type of concrete known as Pulhamite and developed by Pulham and Son who described themselves as "Garden Craftsmen". They were based in Oxford Street, London and held the Royal Warrant as gardeners to King Edward VII and King George V. The Pearson's gardener, R. Smith, was one of the foremost fruit growers in the country at the time, and a feature in Gardeners' Magazine in 1909 describes Brickendonbury as enjoying 'considerable fame for the extent, beauty, and high keeping of its gardens'.
After her husband's death in 1925, Lady Pearson, who herself survived until 1973, moved from Brickendonbury and the mansion was eventually used by Stratton Park School, a private preparatory school for about fifty boys which relocated from Great Brickhill in Buckinghamshire. Two reminders of this function remain. The conference room, which then served as a gymnasium, has hooks for ropes, and there is a swimming pool in the grounds, which has been renovated and is used during the summer by the Research Centre's staff. In the late 1930s Mrs Pearson finally sold the estate with the new owner being Mr Ernest Gocher a businessman from Roydon. However he was was unable to take up residence because the property was requisitioned by the Government following the outbreak of war in 1939. It has even been written that Mrs Pearson personally made sure the Government were aware that Brickendonbury was available and empty!
Throughout the Second World War (1939-45), Brickendonbury was used by the Special Operations Executive, European Theatre of War, and became Station 17, specializing in training agents and resistance workers in industrial sabotage. Vital operations such as the daring raid to destroy the Norwegian heavy water plant (part of Germany's nuclear bomb programme) and the bombing of the Renault engineering plant in France were launched from the estate. A television documentary The Secret War showed archive film of parts of the estate being used for rehearsing such raids and a reminder of these activities was found during building work in 1973, when unexploded hand grenades and live mortar shells were discovered in the drained moat!
After the war, Brickendonbury took on a peaceful role once more. The mansion was used by the Highways Department of the County Council and as offices for the local branches of the National Agricultural Advisory Service and the War Agricultural Executive. During this time the grounds were neglected and government beige was applied liberally on all internal walls. Immediately before being rescued by the Association in 1971, it was used as the setting for a children's television series Catweazle.
Today, Brickendonbury's role as home to a busy research laboratory has seen the estate revived to a thriving condition.
The mansion, both inside and out, has been restored to provide elegant working accommodation, and the grounds are now well cared for. The purpose-built laboratories, mill room, library and development areas, housing the practical work of the Research Centre, are in part concealed behind the facade of the Pearson's model farm, which still retains the family motto, just as appropriate for the endeavours of a large rubber research laboratory as it was for the Pearsons - 'Do it with thy Might'.
© Tun Abdul Razak Research Centre 2010 | <urn:uuid:ea9e139d-6976-498b-83ee-a6a1861683b1> | CC-MAIN-2014-23 | http://www.tarrc.co.uk/pages/brickhistory.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268533.31/warc/CC-MAIN-20140728011748-00282-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.980165 | 2,045 | 2.890625 | 3 |
Advanced ceramics are used in automotive including the following aspects: Hybrid Vehicles, Exhaust Manifolds, Diesel Particulate Filters, etc.
Precision engineered ceramic shafts and bearings are used in the water cooling pumps of next-generation hybrid vehicles for cooling critical engine electronics and lithium-ion batteries. In addition to their longevity due to their excellent chemical resistance to the glycol coolant, ceramics are lightweight which can improve fuel efficiency and low noise running. E.g., boron carbide ceramics are used in brake linings of vehicles. Silicon carbide ceramics are used for high performance “ceramic” brake disks, as they are able to withstand extreme temperatures.
Protecting the electronic engine management system of a vehicle from high temperatures surrounding the engine is a major challenge for design engineers. Ceramic materials can handle the extreme heat from the exhaust manifold. Besides providing heat protection, these systems can also mitigate engine noise.
Diesel Particulate Filters
The segments of a diesel particulate filter are bonded together using a ceramic paste composed of specially engineered low biopersistent fibers. The application properties of the paste are controlled by these fibers during production. In addition, these fibers deliver the thermal shock performance essential for the high temperature regeneration cycle used for filter cleaning during driving the vehicle. | <urn:uuid:452610f7-3c41-4a2d-b84b-3cae97298cfd> | CC-MAIN-2021-04 | https://www.eticeramics.com/applications/automotive/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519843.24/warc/CC-MAIN-20210119232006-20210120022006-00506.warc.gz | en | 0.9177 | 272 | 2.984375 | 3 |
What does the liver do?
The liver performs thousands of functions every minute of the day, just to keep you alive. The most well-known function is to filter the blood, which helps maintain energy levels and enables thought and concentration. The liver also metabolizes fat, breaks down unhealthy cells and bacteria, and generates warmth (body temp) and energy you require. However, did you know that your liver is also responsible for maintaining hormonal balance, especially eliminating excess estrogen, and manufacturing essential proteins necessary for healthy immune function?
How can I recognize a problem?
The liver performs many important jobs within the body, and keeping it functioning optimally is key to a long and healthy life. When function has been compromised and the liver requires attention, there are usually warning signs which include the following:
- Fatigue, unpleasant moods
- Abdominal bloating, reflux, heartburn, gallbladder problems
- Unexplained weight gain, inability to lose weight even when dieting
- Abdominal fat, a “pot belly” and/or "liver roll" (upper abdominal fat)
- Indigestion and/or intolerance of fatty foods
- Fatty yellowish lumps often near the eyes (xanthelasma)
- Overheating of the body, excessive sweating
- Body odor, bad breath, coated tongue
- Red itchy and/or dry eyes, itchy skin or rashes
- Acne or rosacea on face, brown liver spots on skin
- Redness of the palms of the hands, hot or burning soles of feet
- Headaches, especially associated with nausea
- Discomfort or pain over the liver (right upper abdominal area)
- High blood pressure, cholesterol and/or triglycerides
What causes these problems?
The first step is to uncover how these symptoms came about and to understand what lifestyle habits are contributing to them. Some of the most common causes of an unhealthy liver or sluggish liver are within your direct control and include:
- Chemically sprayed crops
- Eating packaged foods with refined oils and high amounts of sugar
- Too much alcohol and caffeine
- Prescription medication or antibiotic use
- Drug use and unprotected sex
- Low-quality animal products
- High stress levels and hormonal imbalances
- Air pollution and environmental toxin exposure
- Using chemical household and beauty products
What can I do?
When the above and other poor conditions persist, the results can lead to fatty liver disease. So what can you do to prevent or reverse these conditions? Below are several all-natural steps you can take to stop and reverse a liver damage.
1. Eat an Anti-inflammatory Diet. A low-sugar, low glycemic index, low-toxin diet that’s filled with nutrient-rich, high-fiber foods is crucial for supporting your liver. High amounts of antioxidants and fiber can even reverse liver damage and disease.
2. Properly Prepare Your Food. Also important is properly preparing the foods you eat in order to reduce the presence of toxins, antinutrients and carcinogens that damage the liver. Antinutrients are types of natural toxins found in foods like grains, beans, nuts and seeds. While they help the actual plants protect themselves from rodents or bugs, the human body has a hard time digesting them so they can interfere with the liver’s ability to absorb nutrients and metabolize proteins. Soak and sprout your grains, nuts, beans/legumes and seeds before eating them to make their toxin levels lower and nutrient availability higher.
3. Eat Organic Crops and Grass-Fed, Cage-Free or Wild Animal Foods. The quality of your diet is very important, because crops sprayed with chemicals, farm-raised fish or factory-farm-produced meat/poultry are more likely to carry toxins, antibiotic residue and added synthetic hormones that the liver then needs to remove. In addition, the healthier the animal, or the fresher the produce, the more nutrients (like omega-3s or antioxidants) are available when you eat them.
4. Use Liver-Boosting Supplements. Several powerful herbs known to give the liver a boost in converting nutrients and removing toxins are:
- Milk thistle: n excellent source of the antioxidant called silymarin, which prevents depletion of glutathione in the liver and also fights liver disease.
- Holy basil: contains essential oils that help combat bacteria, heavy metals and even strains of fungus.
- Dandelion root: offers a natural diuretic effect. This means it helps balance fluid levels and boosts the liver’s efforts to quickly eliminate toxins, strengthening the immune system, helping with blood sugar balance and relieving indigestion.
- Bupleurum: a medicinal root used for fighting infections and improving digestion problems like acid relfux, diarrhea and constipation. It improves adrenal gland function, reduces the effects of stress and boosts immune system function.These herbal supplements help the liver properly metabolize foods, eliminate waste and even balance hormones.
5. Maintain Intestinal Hygiene. Keeping your colon clear of lodged toxins and excess stored debris is important in keeping your liver flowing and releasing bile. In addition to proper diet and hydration, regular colon hydrotherapy and a periodic cleanse program will assist digestion and elimination, and help keep you liver functioning properly.
6. Reduce Stress and Practice Forgiveness. High amounts of chronic stress — which can be caused by emotional issues, relationship problems, and holding on to guilt, anger or shame — all promotes inflammatory response in your endocrine, digestive, reproductive and immune systems and worsens liver damage. A damaged liver blocks healthy emotional flow, produces frustration and causes anger which all have physical implications: brain fog, rib pain or fullness, dizziness, headaches, cramping, joint or tendon problems, menstrual problems, low libido, hormone imbalance, blurry vision, and digestive disorders. It’s important to let go of built-up anger and keep positive energy moving by avoiding conflict and stressing over small things.
7. Move Your Body More
Because the liver stores and processes your blood, circulation is important for allowing its cleansing effects to unfold. The body can become stagnant and more susceptible to disease when blood isn’t flowing, but during physical activities, the heart pumps more blood. The liver is then better able to release blood to your brain, organs, tendons, joints and muscles. Exercise helps oxygen-rich blood and nutrients reach reproductive and digestive organs, helping bring on a healthy, more pain-free menstrual cycle and more regular bowel movements.
Sources: liverdoctor.com, draxe.com | <urn:uuid:3e53beee-a16f-4f7e-8616-64f79bf1844f> | CC-MAIN-2019-18 | https://www.essentialblu.com/blog/march-01st-2017 | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529962.12/warc/CC-MAIN-20190420180854-20190420202854-00240.warc.gz | en | 0.902962 | 1,382 | 2.859375 | 3 |
As we meditate it can sometimes feel as if things are getting worse rather than more peaceful. This is not because meditation makes us more uptight or anxious, but because we start to tune in more quickly to the worried thoughts and emotions that previously we may have been oblivious to. In the early days of meditation we may not be aware of some of this self-critical inner dialogue, but it can become more clear the longer we meditate. But just because we don’t notice it dose not mean it is not there – it’s just that the low mod or sense of upset we feel we do not associate with what we have been telling ourselves, instead we just notice we are feeling low or sad with no idea of why. In contrast, when we do start to notice the inner critic we are actually better able to stop the downward mood swing before it has become too established.
One method for understanding your self-talk is explored in the ABCD model. Each letter stands for a step in recognising and disputing negative self-talk.
A: the ACTIVATING event that initiates the self-talk. An example might be walking along a street and waving at a friend, only for them not to respond and to walk on past.
B: the BELIEF (or negative thinking) that this activating event initiates. Depending on our temperament we may take the blame for what has happened, blame the other, or be neutral. Thoughts such as “what have I done wrong”, “why do they not like me any more” will be common if we take the blame for what has happened. Whereas thoughts such as “how dare you”, “I hate you” will occur if we blame the other. Or with a more neutral mind we may consider: “perhaps they did not see me”, “that is so unlike them, I hope they are alright”, or even “silly fellow, forgot their contact lenses again no doubt!”. With all of these we have no evidence for the truth of our belief – it is presenting itself as an objective statement on the situation, but is in fact coming from our underlying way of seeing ourselves in the world at that moment: victim, aggressor or neutral observer.
C: the CONSEQUENCES of having that thought. These are the feelings that arise as a result of having the thought. If we have blamed ourself for our friend not waving back we may then feel anxiety, worry, remorse or dread. If we blame then we feel angry, resentful or resentful. Neutral thoughts may lead to the most calm state of mind, and that calm state of mind is a result of having neutral thoughts about our friend not waving back.
D: the DISPUTING self-talk that we can use to counteract the negative inner talk. If we have taken the blame for our friend not waving back we may have started to think “I’m such a bad friend” , “people always see through me”, “I’ll never manage to keep any lasting friendships”. Noticing these thoughts we can start to counter them by deliberately thinking in a way that brings in a different perspective. We may say to ourselves in this case “just because someone does not wave back does not mean they hate me…I need to find out first if they even saw me!”
Another example might be:
A: I spill coffee all over my new carpet
B: This activating event triggers the belief: “I’m always so clumsy and stupid”
C: the consequences of this belief is that I feel depressed and hopeless – lost in self recrimination.
D: to dispute the statement: “I’m always so clumsy and stupid” one might think, “No, just now I spilt coffee and it needs to be cleared up. This does not happen every time I have coffee, in fact this is the first time in years it has happened – so it is not true that I am always clumsy. If I were there would be a pool of coffee around me wherever I go and this is clearly not true!”
To fully engage with the final stage of disputing the self-critical thought one can use the process of thought stopping. Negative self-talk will often occur vey quickly when we are in a triggering situation and this will quickly lead to a downward tail spin as we are pulled into difficult emotions associated with the negative self-talk. In fact it is almost as if we go into a default mode where an event triggers a belief that then takes us to a familiar emotional landscape. In one way we feel comforted by the familiarity, but it means we can come to return again and again to a landscape that is harsh and difficult to thrive in: blame, self-deprecation, feeling guilt, sad or bad.
To interrupt this automatic cycle of events leading to familiar landscapes of belief, we first need to recognise what our habitual thought patterns are. Once we start to know the territory we can then prepare some alternative ways of thinking. You will need to work out your own according to what your habitual self-talk is, but here are a few examples:
- “I do not need to be perfect. All humans make mistakes – and making a mistake does not mean I am a mistake”
- “Relax and breathe. I can cope with this situation”
- It is not helpful to think like this. I do not deserve to treat myself like this. This self-talk is just a bad habit”
- “Even if he rejected me it does not mean I am unlovable – my friends love me, so I am lovable”
- “I have value, regardless of what anyone says”
- “Not everyone is looking for a cover model as a boyfriend” – useful when one thinks no-one will ever find one attractive!
It may feel hard to say these at first. We somehow feel it is natural and authentic and honest to say harsh things to ourself – but arrogant, false or disingenuous to say anything positive. In a latter email I’ll address the issue of core-beliefs and how these can make it hard to say anything positive to ourselves. But for now, explore going to your edge and recognise that discomfort may simply mean you are in new territory that does not feel familiar, but that does not mean you are wrong to be saying these positive things to yourself.
You may like to make your own list of pleasant, encouraging or positive thoughts that you can say to yourself when you notice you are caught in negative self-talk.
Interrupting the Loop: this final method is used when we feel we are in a repetitive loop of negative self-talk that keeps repeating like a needle stuck in a scratch in a record. When you recognise that this is happening gently say to yourself: “stop”, as you would to a good friend who is caught in self recriminations or blame. It is not a harsh “stop” but loving and gentle, but this may also find expression though an assertive and firm statement, as you would to someone trying to cross you boundary. The idea is to say it emphatically enough that you interrupt the flow of thought.
If you find that you are feeling frustration building up as a result of the repetitive negative self- talk you can create an assertive “talk back” statement as a way to challenge the primacy of the negative self-talk. For example:
- “stop blaming and catastrophizing”
- “this negative garbage is not helping”
- “these old messages are wrong and unfair”
Feel into what your own might be but remember, you are rebutting the old negative messages, not speaking to yourself in a punitive way. Then, after stopping the constant flow of negative self-talk you can insert an affirming statement.
If you have enjoyed this, you may like to look at the book that I am drawing from: Loving Ourselves, the gay and lesbian guide to self-esteem, Kimeron N. Hardin | <urn:uuid:c5c8830d-d494-4eb8-a9e1-500fa7acfe40> | CC-MAIN-2021-49 | https://evolvingminds.org.uk/tools-for-self-love/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363149.85/warc/CC-MAIN-20211205065810-20211205095810-00042.warc.gz | en | 0.958697 | 1,712 | 2.828125 | 3 |
Outside of my professional life as a physicist, I have not seen any visceral evidence that makes me believe in climate change. One Indian summer, one hurricane, or one hot day is not enough evidence to convince me the climate is changing.
According to the National Aeronautics and Space Administration (NASA), the average temperature of the Earth has increased 1 degree Fahrenheit over the last 100 years. I have neither lived for a century, nor do I have the ability to sense a one-degree temperature increase.
But even though I cannot feel or see the effects, climate change still presents a dire threat to the United States and the world.
Jim White, a climate scientist at the University of Colorado – Boulder, best summarized the reason for this concern by saying “humans have really taken over the planet. We are not talking about a system in which we are small riders on space ship earth. We are the pilots.”
“We now out do plate tectonics,” White says. Humans now move 10 times more earth through mining and construction than all the winds, rivers, rains, snows and glaciers on the planet. We also produce more fertilizers than all natural processes on earth, which vastly increases our planet’s ability to support a growing human population which will reach 9 billion by 2050; a blisteringly fast increase from the 1 billion in 1804.
But the biggest impact of this growing human population is that we release carbon dioxide into the atmosphere at a rate that is absolutely unprecedented in recent Earth history. When it comes to climate, the science is absolutely unambiguous that increasing carbon dioxide in the atmosphere causes the Earth’s temperature to increase.
Ten thousand years ago, the Earth began thawing from an ice age due to a natural change in the Earth’s orbit around the sun, which caused the Earth to receive a little more heat. This extra energy was the trigger that caused the Earth to naturally release carbon dioxide into the atmosphere that was dissolved in oceans. This extra carbon then warmed the Earth a little more, which released more carbon, putting the Earth into a cycle scientists call a positive feedback loop.
At the end of the last ice age, atmospheric carbon dioxide stood at 180 parts per million (ppm) and modestly increased to pre-Industrial Revolution level of 280 ppm in the mid-1800s. So, over those 10,000 years between the end of the ice age and the Industrial Revolution, the natural yearly increase in carbon dioxide was 0.01 ppm per year.
The technological developments of the Industrial Revolution rapidly increased the human standard of living. But, it was also when humans began releasing substantial amounts of carbon dioxide in to the atmosphere, a result of burning fossil fuels.
So, when humans started to fuel an explosion of technology by burning coal, oil, and natural gas, the atmosphere had 280ppm carbon dioxide. Today, 166 years after the end of the Industrial Revolution, atmospheric carbon dioxide stands at 400ppm. This crunches out to an average annual increase of 0.7ppm per year: 70 times the natural rate.
We have only been increasing our fossil fuel consumption, so carbon dioxide increases in recent years have also increased, and they have increased significantly. In 2015 alone atmospheric carbon dioxide increased by a staggering 3 parts per million; that’s 300 times the natural rate, and we show no signs of stopping!
A concentration of 400ppm means that the atmosphere is a measly 0.04% carbon dioxide. Why such a big concern over such a small number? Because every other time in Earth’s history, when the atmosphere was 0.04% carbon dioxide, sea levels were about 40 feet higher (high enough to completely engulf Miami under 34 feet of ocean) because the average temperature of the Earth was 6-7 degrees Fahrenheit warmer than today. The warmer temperature causes the water in the ocean to expand, and also melts Antarctic land ice; both effects contribute to raising the sea level.
But, if our atmosphere currently has 400ppm carbon dioxide why aren’t oceans and temperatures already that high? “We don’t have a 400ppm planet, yet, because it takes about 50-100 years before you feel the effects of the increased carbon dioxide,” says White.
The oceans are responsible for this delay. Water takes longer to heat up than air and most other substances, so oceans trap a lot of extra solar energy before their temperature rises. So, just like you have to wait for water on the stove to boil, we have to wait until the Earth heats up in response to extra carbon dioxide. This is why that everyday evidence of climate change is hard to find.
So even though we don’t realize it yet, we are the pilots steering the Earth’s climate. We have control over the future of the climate and can do something, if we choose.
“At least the White House will be river front property,” says Jim White.
By Nate Crossette | <urn:uuid:0f9d4de5-5e25-4661-8107-8b17dad2059f> | CC-MAIN-2023-14 | https://sciencebuffs.org/2016/10/12/space-ship-earth-has-a-new-pilot/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00659.warc.gz | en | 0.942278 | 1,036 | 3.53125 | 4 |
The OSI model has seven layers. Let’s start at the Application layer.
An application layer where the user interacts with the network communication means the user prompts the network-aware application(Firefox, Google Chrome, Outlook, etc.) to access something over the network Like web applications, Emails, File transmissions, etc.
Lots of protocol works on Application layer Like Http,Https,FTP, SMTP ,Telnet,POP etc etc .
Each and every protocol has its own set of rules, HTTP is used for the web, and SMTP has been invented for mail communications.
The application layer basically displays the data which the user wants to access over the network.
Let’s say you are trying to access some files from a webserver.So you open up your web browser and type in the URL of your website. Your computer will send a message to the webserver requesting a certain web page. You are now using the HTTP protocol which lives on the application layer.
Once the Application layer has completed its work, Then the presentation layer will structure the information of the application in a certain format
Presentation layer Performs translation of cross-platform standards that may be understood by the local machine: Pictures into .jpg,.png and .wav into .mp3 etc.
Presentation Layer formatting data at the source device into a compatible form for the receiving device and is Responsible for compressing data and it is also responsible for encrypting data.
Data Encryption and Decryption: Encryption is needed for security purposes when sending data across networks. An encryption algorithm is used during transmission, while a decryption algorithm is used at the receiving node. Encryption and decryption typically involve the secure sockets layer (SSL) protocol, which has become more popular when used by the presentation layer.
The presentation layer will make sure that information is readable for the application layer by formatting and structuring the data. Most computers use the ASCII table for characters. If another computer would use another character like EBCDIC then the presentation layer needs to “reformat” the data so both computers agree on the same characters.
Layer-5: Session Layer.
The session layer takes care of establishing, managing, and termination of sessions between two hosts. When you are browsing a website on the internet you are probably not the only user of the web server hosting that website. This webserver needs to keep track of all the different sessions. Session layer Creates and maintains dialogs between source and destination applications.
Normally when you access a server in multiple tabs of your browser, each and every tab is going to create a separate session.
Let’s you open a google.com in one tab, youtube.com, in another tab, and Facebook is another tab they all are going to be differentiated by some sort of session id. So each and every tab is going to do some unique task so that each and every session’s data is going to display in their respective tab. So the computers keep track of all sessions.
Some well known ports are there , Like HTTP-80,https-443,telnet-23 etc etc .
Data Flow from Application to Session layer.
Every time you do anything and you store anything in the computer that stores in the format of an electric signal and stored as an electrical code.
In an electrical signal the value is 0 and 1 . every time you do something in the computer that is stored as an electrical code.
Let’s say, you want to open a website in your browser and you went into the browser and type the website name you want to access .once you type the computer converted those data into binary to 0 and 1 and now it will go to the Presentation layer. Once those 0 and 1 will reach the presentation layer, it will do the encryption to it and it will add some additional bit into the data also the presentation layer does the decryption in the receiver end. Now the data will move to session layer, In session layer also it will add some bit into it . The session layer is going to assign a random port based on the application types. Now the packet will move to the transport layer and the transport layer will add some additional bits to it. That’s how Data encapsulation works.
These 3 layers we discussed as of now are considered upper layer and their PDU is called Data. | <urn:uuid:3f605a8b-40d9-4751-a4a1-a4c288b0e69a> | CC-MAIN-2023-06 | https://ip-noc.com/day-8-osi-model-part-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499819.32/warc/CC-MAIN-20230130133622-20230130163622-00581.warc.gz | en | 0.9044 | 921 | 4.34375 | 4 |
Students Will Build Guitars and STEM Skills
Edgecombe Community College will offer students a guitar-making workshop this fall to teach diverse subjects from physics to electronics.
The workshop will focus on STEM (science, technology, engineering, and mathematics) skills, but it’s the “coolness” factor that will likely attract students to the pilot project.
“The students will have a tangible learning experience to emphasize what they’re learning in class,” says Doug Parrish, department chair of Industrial and Technical Trades. “They’ll learn about physics, carpentry, painting and refinishing, and electronics, and be able to walk away with a really cool project.”
Parrish spent a week in July at the Guitar Building Institute held at Johnston Community College. Part of the National STEM Guitar Project, the institutes are designed to energize and inspire STEM instructors.
During the week, instructors showed community college and public school officials how to implement the program at their institutions.
“Many students believe that STEM classes are difficult and don’t apply to them,” Parrish says. “It’s a struggle to overcome that preconceived notion. With this project, we mix all those subjects and combine them with the arts.”
Parrish says he’s made guitars in the past, and he’s enthusiastic about the possible applications at Edgecombe Community College.
The project will be linked to the College’s manufacturing curriculum, but students will discuss other topics as well – from the different reactions of the strings to how paints respond to different woods.
Within the month, ECC instructors in physics, facility maintenance, and information technology will invite about a dozen of their students to participate in the pilot program. They’ll meet as a club in the afternoons, and the group will be affiliated with the SkillsUSA program for career and technical education students.
“Hopefully, we can implement a class in the spring,” Parrish adds.
Even if the student doesn’t turn out to be the next Les Paul or Leo Fender, he or she might walk away with a working knowledge of algebra, electronics, carpentry, and even chemistry.
And possibly an axe to channel their inner Eric Clapton or Chuck Berry. | <urn:uuid:43530c97-6603-4bea-adfb-4f1404c9ebba> | CC-MAIN-2018-09 | https://www.edgecombe.edu/news/students-will-build-guitars-stem-skills/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816912.94/warc/CC-MAIN-20180225190023-20180225210023-00679.warc.gz | en | 0.935434 | 484 | 2.78125 | 3 |
Our guest author today is Dan Ariely, James B Duke Professor of Psychology and Behavioral Economics at Duke University, and author of the book The Honest Truth About Dishonesty (published by Harper Collins in June 2012).
A recent article in The Chronicle of Higher Education suggests that students cheat more in online than in face-to-face classes. The article tells the story of Bob Smith (not his real name, obviously), who was a student in an online science course. Bob logged in once a week for half an hour in order to take a quiz. He didn’t read a word of his textbook, didn’t participate in discussions, and still he got an A. Bob pulled this off, he explained, with the help of a collaborative cheating effort. Interestingly, Bob is enrolled at a public university in the U.S., and claims to work diligently in all his other (classroom) courses. He doesn’t cheat in those courses, he explains, but with a busy work and school schedule, the easy A is too tempting to pass up.
Bob’s online cheating methods deserve some attention. He is representative of a population of students that have striven to keep up with their instructor’s efforts to prevent cheating online. The tests were designed in a way that made cheating more difficult, including limited time to take the test, and randomized questions from a large test bank (so that no two students took the exact same test).
But the design of the test had two potential flaws: first, students were informed in real time whether their answers were right or wrong; second, they could take the test anytime they wanted. Bob and several friends devised a system to exploit these weaknesses. They took the test one at a time, and posted the questions along with the correct answers in a shared Google document as they went. None of them studied, so the first one or two students often bombed the test, but students who took the test later did quite well.
When we hear such stories of online cheating, the reasons for this behavior seem rather simple: It doesn’t take a criminal mastermind to come up with ways to cheat on a test when there’s no supervision and the entire Internet is at hand. Gone are the quaint days of minutely lettered cheat sheets, formulas written on the underside of baseball cap bills, sweat-smeared key words on students’ palms. Now it’s just a student sitting alone at home, looking up answers online and simply filling them in.
While we can probably all agree that cheating in online courses is easier to pull off than in a physical classroom, I suspect that this simple intuition is far from the whole story, and that e-cheating is more than just a increased ease of getting away with it.
When my colleagues and I have examined the effects of being caught on dishonesty, we found that, by and large, changing the probability of being caught doesn’t really alter the level of dishonesty. In one of our experiments we asked two Master’s students at Ben-Gurion University of the Negev named Eynav, who is blind, and Tali, who has normal sight, to take a cab back and fourth between the train station and the university twenty times. We chose this route for a particular reason: if the driver activates the meter, the fare comes out to around $7 (25 NIS). However, there is a customary rate on this route that costs around $5.50 (20 NIS), if the meter is not activated. Both Eynav and Tali asked to have the meter activated every time they caught a cab, regardless of whether the drivers informed them of the cheaper customary rate. At the end of the ride, the women would pay the fare, wait a few minutes, then take another cab back to where they started.
What we found was that Tali was charged more than Eynav, despite the fact that they both insisted on paying by the meter. Eynav quickly supplied us with the explanation behind this curious phenomenon. “I heard the cab drivers activate the meter when I asked them to," she told us, “but before we reached our final destination, I heard many of them turn the meter off so that the fare ended up close to 20 NIS." This never happened to Tali. What’s more, other experiments with undergraduates and people selling produce at a market yielded similar outcomes. What these results suggest is that simply making the situation such that people cannot get caught does not automatically leads to higher levels of dishonesty.
So if it’s not necessarily the fear of getting caught, what might the reasons for increased cheating be? Based on our research, I would propose that the primary reason is the increased psychological distance between the dishonest act and its significance, and between teacher and student. The difference a little distance can make is rather impressive. Take the results from a study of around 10,000 golfers who were asked—among other things—how likely golfers were to cheat by moving the lie of a ball by 4 inches through various means: by nudging it with the golf club; by kicking it; or by picking it up and moving it. What these golfers told us was that 23% of golfers would likely move a ball with their club while only 14% and 10% would move it by kicking it and picking it up, respectively. What this tells us is that the extra distance provided by the club allows for twice as much cheating as the unavoidably conscious and culpable act of picking up the ball and moving it.
What does this have to do with cheating in online courses? Online classes are by definition taken at a distance, from the comfort of the student’s home where they are removed from the teacher, the other students, and the academic institution. This distance doesn’t merely allow room for people to get away with dishonest behavior; it creates the psychological distance that allows people to further relax their moral standards. I suspect that it is this aspect of psychological distance, and not simply the ease of pulling it off, that is at the heart of the online cheating problem.
There is another important reason why we should care whether the cause for online dishonesty is due to its ease or to a change in the perceived moral meaning of the action. If online cheating is simply a matter of a cost benefit analysis, we can assume that over time online universities will find ways to monitor and supervise students and this way prevent such behavior. However, if we think that the root cause of online cheating is more relaxed internal morals, then time is working against us.
Let’s think for a minute about illegal downloads. Raise your hand if you’ve ever downloading a song or TV show illegally. How badly do you feel about that? When I ask my students these questions, almost all of them admit to having plenty of illegally downloaded files on their computers—and they don't feel badly about it. As it turns out, dishonesty lies on a continuum: there are behaviors we feel badly about, which is where our own morality holds us back. But as cheating in a particular domain becomes more commonplace, the negative feeling associated with it decrease until we don’t really feel badly at all.
Let’s return to Bob and to cheating in online courses. This kind of behavior in online classes worries me because it is becoming more pervasive, and once we reach a point of moral indifference, it is nearly impossible to change this behavior. I don’t think we’ve reached this point yet, so we need to work as hard as we can to counteract the trend toward dishonesty. Otherwise, what’s often considered an important tool for democracy in education could be made worthless.
- Dan Ariely | <urn:uuid:dc1d3ffd-c25d-4367-ab5c-7f7a864bd827> | CC-MAIN-2015-14 | http://www.shankerinstitute.org/blog/cheating-online-courses | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298819.92/warc/CC-MAIN-20150323172138-00021-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.973708 | 1,604 | 2.5625 | 3 |
Bursitis is inflammation of a bursa. A bursa is a thin sac that lies between bone and soft tissue. It can be found near some joints. A healthy bursa allows smooth movement of soft tissue over bone. If a bursa becomes inflamed it can make movement painful.
Bursitis occurs most often in the:
Copyright © Nucleus Medical Media, Inc.
Bursitis may be caused by:
Factors that may increase your chance of bursitis include:
Bursitis may cause any of the following:
You will be asked about your symptoms. The doctor may also ask about your daily habits and any injuries. The painful area will be looked at carefully. The diagnosis is often made based on how the area looks and symptoms.
Bursitis treatment will focus on decreasing inflammation and pain. The main step is to stop the activity causing the pain. You will be asked to rest the area and protect it from injury. Your doctor may also recommend:
Most bursitis will clear up with basic care. However, it can become a long-term problem if the cause is not relieved. Options for chronic bursitis or bursitis that does not respond to steps above include:
Chronic bursitis may need more aggressive treatment. Additional steps may include:
To help reduce your chance of bursitis:
Family Doctor—American Academy of Family Physicians
Ortho Info—American Academy of Orthopaedic Surgeons
Canadian Association of General Surgeons
Canadian Orthopaedic Foundation
Bursitis. The Ohio State University Wexner Medical Center website. Available at: http://wexnermedical.osu.edu/patient-care/healthcare-services/arthritis-rheumatology/bursitis. Accessed November 10, 2017.
Bursitis. National Institute of Arthritis and Musculoskeletal and Skin Diseases website. Available at: https://www.niams.nih.gov/health-topics/bursitis. Updated February 28, 2017. Accessed November 10, 2017.
Elbow (olecranon) bursitis. Ortho Info—American Academy of Orthopaedic Surgeons website. Available at: http://orthoinfo.aaos.org/topic.cfm?topic=A00028. Updated January 2011. Accessed November 10, 2017.
Hip bursitis. Ortho Info—American Academy of Orthopaedic Surgeons website. Available at: http://orthoinfo.aaos.org/topic.cfm?topic=a00409. Updated March 2014. Accessed November 10, 2017.
Prepatellar bursitis. EBSCO DynaMed Plus website. Available at:http://www.dynamed.com/topics/dmp~AN~T114661/Prepatellar-bursitis. Updated June 5, 2017. Accessed November 10, 2017.
Tendinitis and bursitis. American College of Rheumatology. Available at: https://www.rheumatology.org/I-Am-A/Patient-Caregiver/Diseases-Conditions/Tendinitis-Bursitis. Updated May 2015. Accessed November 10, 2017.
Last reviewed November 2018 by EBSCO Medical Review Board Warren A. Bodine, DO, CAQSM Last Updated: 6/12/2018 | <urn:uuid:85afd4e4-218c-485f-ab31-d8ddfd58541d> | CC-MAIN-2019-30 | https://healthlibrary.epnet.com/GetContent.aspx?token=a4c1f00b-d245-44f2-a90e-20b047f84a6a&chunkiid=11988 | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527089.77/warc/CC-MAIN-20190721164644-20190721190644-00444.warc.gz | en | 0.864676 | 721 | 3.015625 | 3 |
Patents; Auto Beams Shift With The Traffic
By Edmund L. Andrews
Published: November 10, 1990
WASHINGTON— DRIVERS at night frequently fume when they are blinded by approaching cars with headlights on the high beam. Yet the need to continuously flick between high-beam and low-beam lights as traffic ebbs and flows can confuse even the most conscientious drivers.
But now the Nissan Motor Company of Japan has patented an intelligent headlight that automatically adjusts the angle of its beam as it detects vehicles either in its lane in front or in oncoming traffic. The lamp would do more than merely switch from high to low, however. It would also gauge the distance to nearby cars and project light as far as possible without bothering other drivers.
As described in the patent, the new headlight would contain light sensors to detect both oncoming traffic and the tail lights of cars. If the sensor detected a car in its lane in front, the lamp would tilt the beam down so that the light reached no farther than that car's rear wheels.
In addition, the headlight would contain a shading device to allow a car to adjust simultaneously for both oncoming cars and those ahead in the same lane. The problem, Nissan said, is that lowering the headlights for oncoming traffic may leave drivers with a dangerous unlighted space between their car and the one in the same lane in front. The shading device, a rotating metal plate, would keep glare from reaching cars in the other lane, while allowing the headlight to throw considerable light straight ahead.
A Nissan researcher, Yasutoshi Seko, obtained patent 4,967,319. | <urn:uuid:393d6118-3dbf-4114-8c04-6d73fadb1852> | CC-MAIN-2015-35 | http://www.nytimes.com/1990/11/10/business/patents-auto-beams-shift-with-the-traffic.html?src=pm | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644066266.26/warc/CC-MAIN-20150827025426-00006-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.956829 | 334 | 2.71875 | 3 |
The world’s largest lithium ion battery has begun dispensing power into an electricity grid in South Australia.The 100-megawatt battery, built by Tesla, was officially activated on Friday. It had in fact provided some power since Thursday due to demand caused by local hot weather.South Australia has been crippled by electricity problems in recent times.Tesla boss Elon Musk famously vowed to build the battery within 100 days – a promise that was fulfilled.In a Twitter exchange in March, an Australian software entrepreneur asked Mr Musk if he was serious about helping South Australia after it suffered a statewide blackout.Mr Musk said he was – and if the battery wasn’t built within 100 days, South Australia would receive it for free. The countdown began on 30 September after approval from regulators. Tesla finished the battery in about 60 days.The renewable power plant is located in Jamestown, about 200km (125 miles) north of Adelaide, and connected to a wind farm run by French energy company Neoen.
It can power up to 30,000 homes for an hour on its own, but will more likely be used to support and stabilise existing electricity supplies.Mr Musk has described it as three times more powerful than the world’s next biggest battery.”It will completely transform the way in which renewable energy is stored, and also stabilise the South Australian network as well as putting downward pressure on prices,” South Australian Premier Jay Weatherill said in July.Tesla has been expanding its battery business alongside its car production.
Source: BBC News | <urn:uuid:58e8f5d5-726b-436f-a040-087f965b7176> | CC-MAIN-2018-47 | https://free-london-business-directory.co.uk/tesla-mega-battery-in-australia-activated/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743717.31/warc/CC-MAIN-20181117164722-20181117190722-00511.warc.gz | en | 0.978692 | 315 | 2.859375 | 3 |
The BICEP claim of detecting the primordial B-mode in the polarization of the Cosmic Microwave Background was a huge news. If confirmed, it would be an evidence of gravity waves produced during cosmic inflation, and open a window on physics at an incredibly high energy scale of order 10^16 GeV. Possible implications were described in detail in some 300 papers triggered by the BICEP announcement. But, among this understandable excitement, we have been aware that the signal has to be confirmed by other experiments before the discovery is established. Back then, Résonaances precisely estimated the chances of the signal being true at `fifty-fifty'. It appears it's the latter fifty that's gaining an upper hand...
Barring a loose cable, the biggest worry about the BICEP signal is that the collaboration may have underestimated the galactic foreground emission. BICEP2 performed the observations at only one frequency of 150 GHz which is very well suited to study the CMB, but less so for polarized dust or synchrotron emission. As for the latter, more can be learned by going to higher frequencies, while combining maps at different frequencies allows one to separate the galactic and the CMB component. Although the patch of the sky studied by BICEP is well away from the galactic plane, the recently published 353 GHz polarized map from Planck demonstrates that there may be significant emission from these parts of the sky (in that paper the BICEP patch is conveniently masked, so one cannot draw any quantitative conclusions). Once the dust from the BICEP announcement had settled, all eyes were thus on precision measurements of the galactic foreground. The rumors that have been arriving from the Planck camp were not encouraging, as they were not able to confirm the primordial B-mode signal. It seems that experts now put a finger on what exactly went wrong in BICEP.
map shown by the Planck collaboration at a conference. However, it seems they misinterpreted the Planck results: that map shows the polarization fraction for all foregrounds, not for the galactic dust only (see the "not CIB subtracted" caveat in the slide). Once you correct for that and rescale the Planck results appropriately, some experts claim that the polarized galactic dust emission can account for most of the BICEP signal. The rumor is that the BICEP team has now admitted to the mistake [Update: this last statement is disputed and outwardly denied].
Note that we should not conclude that there is no observable tensor modes in the CMB. Indeed, the tensor to scalar ratio of order 0.1 is probably consistent with the existing experimental data, and may be responsible for a part of the B-mode signal detected by BICEP. New data from Planck, POLARBEAR, ACTpole, and Keck Array should clarify the situation within a year from now. However, at this point, there seems to be no statistically significant evidence for the primordial B-modes of inflationary origin in the CMB. | <urn:uuid:7d3af100-a0f5-4eea-b97f-34592ca74a2e> | CC-MAIN-2018-43 | http://resonaances.blogspot.com/2014/05/is-bicep-wrong.html?m=1 | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512268.20/warc/CC-MAIN-20181019020142-20181019041642-00064.warc.gz | en | 0.958446 | 620 | 2.71875 | 3 |
The resource has been added to your collection
NASA's Mars Exploration Rover Opportunity is currently traveling southward over a pavement of outcrop dubbed the " Erebus Highway."" Erebus Crater,"the rover's next target, lies less than 100 meters (328 feet) south of its current position. This view is a mosaic produced from from frames taken by the rover's navigation camera during Opportunity's 582nd martian day, or sol (Sept. 13, 2005). It shows fractured blocks of ancient sedimentary rock separated by recent sand dunes. Mars Exploration Rover team scientists are investigating both the composition of the rocks and the processes by which the distinctive fracture pattern arose.
This resource has not yet been reviewed.
Not Rated Yet. | <urn:uuid:729a8c99-612e-4e0d-bc1b-dd8c5f48fc2d> | CC-MAIN-2019-43 | https://www.curriki.org/oer/Heading-South-on-Erebus-Highway--650063 | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660067.26/warc/CC-MAIN-20191015155056-20191015182556-00313.warc.gz | en | 0.94456 | 150 | 2.8125 | 3 |
A Primer of Ecology
With the aim of teaching students the essential models in population and community ecology, this book explains in detail the basic concepts of exponential and logistic population growth, age-structured demography, metapopulation dynamics, competition, predation and island biogeography.
14 pages matching MacArthur-Wilson model in this book
Results 1-3 of 14
What people are saying - Write a review
We haven't found any reviews in the usual places.
Logistic Population Growth
AgeStructured Population Growth
5 other sections not shown
Other editions - View all
abundance age class age structure Allee effect allenbyi ascidian assumptions axis birth and death birth rate calculate carrying capacity Chapter coexistence colonization competition competitors constant death rate decrease density-dependent depends ecology environmental stochasticity Euler equation example exponential growth Expression extinction rate Figure fluctuations functional response go extinct habitat immigration rate interspecific competition isocline of species iteroparous K-selection large islands Leslie matrix logistic growth logistic model Lotka-Volterra equations Lotka-Volterra model MacArthur-Wilson model mathematical maximum metapopulation metapopulation models number of individuals number of species Number of victims offspring oligochaetes parasite passive sampling model patches persist population cycles population growth rate population increases population sizes predator and victim predator isocline predator population primer propagule pyramidum rate of increase red grouse represents reproductive value rescue effect schedule simple source pool species richness species-area relationship state-space graph survivorship survivorship curve tion turnover ulation victim density victim isocline victim population zero | <urn:uuid:84448acb-e6e9-4a60-a78a-6b0916025c7a> | CC-MAIN-2017-43 | https://books.google.co.uk/books?id=yAkUAQAAIAAJ&q=MacArthur-Wilson+model&dq=related:ISBN0521448557&source=gbs_word_cloud_r&hl=en | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823482.25/warc/CC-MAIN-20171019231858-20171020011858-00060.warc.gz | en | 0.740806 | 328 | 2.796875 | 3 |
In reality, the definition of "property" was much broader in the late 18th century. Property refers not just to land, equipment or money in a bank. It is the ownership we have in our mental existence and in the right to try to better ourselves. The best example of what was actually meant by the term was set forth by James Madison in a short essay published in the National Gazette on March 29, 1792 which you can read in full here.
Madison informs his readers that the term has both a particular application to "external things of the world" as well as a "larger and juster meaning" which:
. . . embraces every thing to which a man may attach a value and have a right; and which leaves to every one else the same advantage.Included in this larger meaning Madison references:
. . . a property in his opinions and the free communication of them.Madison goes on to say, "Conscience is the most sacred of property".
. . . a property of particular value in his religious opinions
. . . equal property in the free use of his faculties and free choice of the objects on which to employ them
. . . a property in his rights
The role of government is to protect property of every sort. A just government "impartially secures to every man, whatever is his own." In contrast, an unjust government denies to "its citizens that free use of their faculties, and free choice of their occupations, which not only constitute their property in the general sense of the word; but are the means of acquiring property strictly so called."
Madison's thought is echoed several times in the speeches of Abraham Lincoln, where he uses the term "liberty" instead of "property" in support of the right to free exercise of labor and ambition.
The more restrictive meaning of the term "property" that arose in the 20th century was not an accident. By doing so it allowed Progressive thinkers and Marxist demagogue to impugn the ideas of the Founding and to set the stage for the artificial distinction between economic rights and personal liberty pioneered by the Supreme Court in the 1930s, in which rights in the former were severely restricted.
Ironically, as noted by Walter Dellinger (Solicitor General during the Clinton Administration) in The Indivisibility of Economic Rights and Personal Liberty, "the New Deal Court's elimination of any effective protection of economic rights seriously weakened the bases for protecting personal liberty as well", noting that the shaky rationale of Justice Douglas' "inept opinion" in the contraceptive ban case of Griswold v Connecticut was made necessary by the evisceration of economic rights. As Dellinger points out, it was the justices accused by the New Dealers of being reactionaries in the 1930s, who in the prior decade wrote the decisions in Pierce v Society of Sisters and Meyers v Nebraska overturning state statutes which discriminated on ethnic and religious grounds, relying on theories of economic liberties. | <urn:uuid:ba7b5c81-c216-43ac-ad07-a29b8441f214> | CC-MAIN-2018-05 | https://havechanged.blogspot.com/2017/04/madison-on-property_20.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890582.77/warc/CC-MAIN-20180121120038-20180121140038-00485.warc.gz | en | 0.973761 | 606 | 3.453125 | 3 |
Hi, I am a young writer who has just found her passion for writing. Hope you guys support and love.
Human Health Facts
Do you ever sit and thought about your body? I have known you didn't. So, today I'll tell you something about it. The human body is the most complex creature in this world. Without it, nothing is possible. Varying from easy tasks like cooking to hard things like manufacturing. One should always take care of their health by eating healthy and exercising. Once our Father of Nation Mahatma Gandhi said, "It is health which is real wealth and not gold and silver". So, let's see some interesting facts about "Human Health".
- A normal human being is more creative at night and least creative in the morning.
- A healthy human's thigh bone is tougher than concrete.
- A person who cut off their limbs to become disabled is called "Transabled".
- A human at the time of birth has 300 bones and 206 bones when they become adults.
- The hydrochloric acid(HCl) in your stomach can dissolve a piece of metal like a blade.
- The amount of saliva which human produce during lifetime is enough for filling two swimming pool.
- The heart can continue to pump even after being removed from the body.
- A normal healthy heart beats about 115,000 times.
- The lung of humans are not of the same size, the right lung is bigger than the left lung.
- If a child is born with renal agenesis(with one kidney), the remaining kidney will grow until it equalizes the weight of a combined pair of kidneys.
- The size of the kidney is less or equal to a closed fist and it weighs under 0.4kgs.
- The amount of blood that an average kidney filter is 112 to 114 liters and on filtering this much blood they produce 0.94 to 1.7 liters of urine.
- An average human heart pumps about 2,000 gallons of blood every day.
- The size of the heart is about the human fist.
- If you lose your small pinky finger, then the power of your hand will decrease by 50%.
- Laughing is the best exercise for your heart. It reduces stress and strengths your immunity system
- A man's heart is heavier than that of a woman. But, a woman's heart beats faster than that of men.
- A brain is more creative when it is tired.
- When a person dies, they have 7 minutes of brain activity left in which they see a dream-like sequence of their memories.
- It takes about 21 days to form any habit.
- Drinking water in the morning will make you feel happier, sharper, and energetic throughout the day.
- Humans cannot resist good-looking food or danger.
- Craving for junk food lasts only for 10 minutes. If you control for several minutes then you can avoid eating unhealthy food.
- Loneliness is a very dangerous poison. It is as bad as smoking cigarettes per day.
- Farting helps in reducing high blood pressure.
- Religious practices like prayer and fasts are associated with lower levels of psychological distress.
- The brain treats rejection like physical pain. This affects our mental health.
- Crying makes you feel better, reduces stress, and may help to keep your body healthy.
Hope you guys enjoy and like these facts.
© 2021 Anushka Sharma
Anushka Sharma (author) from India on April 24, 2021:
Very happy to hear that :)
Audrey Hunt from Pahrump NV on April 23, 2021:
I really enjoyed these health facts. Many, are new to me. I will drink more water in the morning! | <urn:uuid:c93e73ce-3aae-450d-b78c-06cad0aea740> | CC-MAIN-2022-33 | https://discover.hubpages.com/health/28-Interesting-Health-Facts-about-Human-Body | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00344.warc.gz | en | 0.947823 | 782 | 2.859375 | 3 |
Stuttering involves irregular and
interrupted speech patterns. Characteristics of typical speech patterns
- Repetitions of sounds, syllables, or short
words. These may occur as:
- False starts:
- One-syllable words: "I-I hear you."
words that have more than one syllable: "Giraffes-giraffes are
- Phrases: "I want-I want to go too."
- With word interruptions (interjections):
"How do I—um—get up there?"
- Within a word (broken words): "I am hun
... [pause] ... gry."
- With lips together or mouth open but no words
- Word substitutions (circumlocution) to avoid
trying to say difficult words.
- Complete changes of words or
thoughts: "I found my—Do you want to eat?"
- Drawn-out words
(prolongations), usually at the beginning of sentences: "M-m-m-m-m-mommy, you
have ice cream."
You may notice that your child stutters more when excited,
anxious, overwhelmed, or tired. For example, talking to someone who does not
appear interested or asking or answering questions may trigger or increase
stuttering. Also, stuttering often gets worse when a child tries to
explain something complex.
Stuttering may also occur with
repetitive gestures or unusual mannerisms, such as exaggerated blinking or
tension around the mouth. This is more likely to occur when stuttering is
severe or getting worse. These symptoms often mean that the speaker is
aware of and embarrassed by his or her stuttering.
Types of stuttering
Stuttering can be categorized
into three main types according to when it begins, its typical pattern, and
whether it resolves on its own.
- Normal disfluency is stuttering that
occurs during early childhood, when speech is rapidly developing, but resolves
without treatment before puberty. This type of stuttering may appear
sporadically and gradually decrease until it no longer occurs. The irregular
speech may be infrequent, and the child usually does not notice or is not
bothered by it.
- Developmental stuttering generally requires
treatment to improve. Speech problems most often first appear around age 5
during the critical stages of language development but can occur any time
between about 2 and 7 years of age. Symptoms can range from mild to severe.
- Mild developmental stuttering and normal
disfluency can be hard to tell apart. In general, mild stuttering causes
more frequent symptoms. It may also recur after a temporary improvement or get
worse. Children with mild developmental stuttering may feel frustrated and
bothered by their speech problem.
- Severe developmental stuttering
affects almost every sentence of speech in all situations. Children usually
become frustrated, upset, and embarrassed by their stuttering and often cover
their mouths with their hands while attempting to speak. They also may develop
mannerisms such as nodding the head or closing, blinking, or frequently moving
the eyes in an exaggerated way. Severe stuttering most often affects older
children, but it can occur in very young children as well.1 Speech therapy and other forms of treatment are needed to
improve severe stuttering.
- Acquired stuttering may result from an injury
or condition that damages the brain, such as a
Alzheimer's disease. Less often, stuttering begins
after experiencing an emotional trauma. Typically, a person with acquired
stuttering repeats or draws out sounds, syllables, or word patterns. The
speaker maintains normal eye contact, does not seem anxious or bothered by his
or her speech problems, and doesn't have unusual mannerisms, such as grimacing | <urn:uuid:120a2aeb-67a9-4f19-9df8-c8f3ca13e184> | CC-MAIN-2015-06 | http://www.everydayhealth.com/health-center/stuttering-symptoms.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115900160.86/warc/CC-MAIN-20150124161140-00007-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.942878 | 810 | 4.09375 | 4 |
One of the terrific realities of modern Cannabis is that it is possible, and often quite simple, to make effective products at home. With suitable education and access to testing facilities, the soil, nutrients, and plant growth can be supported at home, lab-tested for make-up and potency, as well as safety-checked for potential microscopic contaminants, and ultimately, individualized medicine can be created right at home!
Here is a sample instructional for just one way that cannabis tincture can be made at home. There are countless others and hopefully, many that are yet to be discovered!
To explore related information, click the keywords below:
Benjamin Caplan, MDVideo: Do-It-Yourself Cannabis Tinctures
Title: CB1 receptor antagonism in capuchin monkeys alters social interaction and aversive memory extinction
A recent study has revealed that the dysregulation of the endocannabinoid system may play a role in autism spectrum disorders (ASD). Using non-human primates, researchers were able to mimic some of the social impairment seen in autism models by antagonizing cannabinoid 1 receptors with synthetic cannabinoids. Future research may continue to show links between ASD and the endocannabinoid system, suggesting that cannabinoids may be used to treat the social impairments characteristic in ASD.
This research highlights how the endocannabinoid system may provide novel targets for developing therapies for what have seemed, previously, to be treatment-resistant disorders. Autism is still not well-understood and has many false beliefs associated with it. By studying the possible role of the endocannabinoid systems in ASD, researchers may be able to shed light on the mechanism(s) underlining the disorders and develop targeted treatments that allow patients a degree of greater control over the symptoms.
This 2018 review summarizes the available data regarding the safety and effectiveness of medical cannabis in young ASD patients. Here’s our video adaptation:
Autism spectrum disorder (ASD) defines a group of neurodevelopmental disorders that are frequently associated with general cognitive deficits
DSM-5 criteria of ASD include:
A. Persistent deficits in social communication and social interaction
B. Restricted, repetitive patterns of behavior, interests, or activities
C. Symptoms must be present in the early developmental period
D. Symptoms cause clinically significant impairment in social, occupational, or other important areas of current functioning.
E. These disturbances are not better explained by intellectual disability or global developmental delay
ASD is frequently accompanied by co-morbidities:
attention-deficit/hyperactivity disorder (ADHD)
mood and cognitive disorders
Despite it being one of the most severe chronic childhood disorders with relatively high prevalence, morbidity and impact on the society, no effective treatment for the core symptoms of ASD is available yet.
There is increasing interest in cannabinoids, especially cannabidiol (CBD), as monotherapy or add-on treatment for the core symptoms and co-morbidities of ASD.
CBD Use for Epilepsy
20-30% of people with ASD also suffer from epilepsy
Surveys conducted among parents of children suffering from epilepsy suggest improvement following treatment with CBD-enriched cannabis extracts. These results however, do not necessarily apply when it comes to treating adults with epilepsy (Alexander et al., 2009).
Still, in a retrospective study that examined the effect of CBD enriched medical cannabis oil on children with intractable epilepsy, the treatment caused a reduction in seizure frequency in 89% of patients (Tzadok et al., 2016).
CBD Use in Psychiatry
CBD in Psychosis
In some cases, psychosis can be a comorbidity of ASD, with the simultaneous onset of schizophrenia at adolescence or early adulthood (Sagar et al., 2013).
A 2006 study that investigated the influence of CBD as monotherapy in treatment-resistant schizophrenia found that it was ineffective (Zuardi et al., 2006).
But a 2018 study showed that, in patients with schizophrenia, adding CBD to ongoing antipsychotic treatment resulted in greater antipsychotic activity and beneficial effects, as compared to placebo add-on (Mcguire et al., 2018).
CBD and Anxiety
Many ASD patients suffer from anxiety disorders that harm their quality of life (Gu, 2017; Haan et al., 2008; Perrin, 2011).
CBD may possess anxiolytic effects both in animals and humans (Bergamaschi et al., 2011).
When tested in humans, CBD showed an anxiolytic effect in patients that suffer from social anxiety disorder (SAD), contrary to THC that may induce anxiety (Devinsky et al., 2014).
CBD, mood and cognitive disorders
It was previously shown that a variety of psychiatric co-morbidities may occur in ASD patients, the most common one being mood disorders (Ghaziddin and Zafar, 2008).
Risks of THC
THC use may be associated with onset or aggravation of depression, bipolar disorder, mania and psychosis (Rong et al., 2017).
THC administration may also result in memory impairment (Ranganathan and Souza, 2006; Rong et al., 2017).
Benefits of CBD
On the other hand, CBD possesses agonistic activity at the 5-HT1A serotonin receptor and shares similar mechanisms with lithium. These pharmacological properties may indicate its potential role in the treatment of mood disorders (Rong et al., 2017).
Therapeutic CBD properties were investigated for cognitive deficits as well. In a preclinical study that tested the effect of CBD on cognition in an Alzheimer’s Disease mouse model (APPxPS1), chronic CBD treatment reversed the cognitive deficits without affecting anxiety-related behaviors (Cheng et al., 2014).
CBD and sleep disorders
Sleep disorders are highly prevalent among children with ASD.
In the general population insomnia is the most common sleep complaint, and treatment with medical cannabis may be effective, especially when the insomnia is associated with pain (Gates et al., 2014).
It has been claimed that long term use of cannabis may induce sleep disturbances (Gates et al., 2014). however, a case series indicated that CBD treatment may actually improve the quality of sleep in Parkinson’s disease (Chagas et al., 2014).
CBD and ADHD
ADHD is one of the most common psychiatric co-morbidities in young ASD patients (Ghaziddin and Zafar, 2008), with comorbidity rates in the range of 40-70% (Antshel et al., 2016).
In a pilot randomized placebo-controlled experimental study of a cannabinoid medication (an oral spray containing 1:1 ratio of THC:CBD) in adults who suffer from ADHD, there was no significant improvement in the cognitive performance, but there was a significant improvement in the hyperactivity, impulsivity and inhibition measures after the treatment with the medical cannabis (Cooper et al., 2017).
The role of cannabis use for social behavior
Some studies show that THC administration may lead as well to a reduction in social interaction in rats, while co-administration of CBD seems to attenuate this effect (Malone et al., 2009).
On the other hand, in a study that tested the influence of marijuana smoking on healthy human volunteers, subjects reported retrospectively that while smoking marijuana they were happier, friendlier and calmer, responded more warmly to others, seemed to have a better understanding of their peers’ state of mind and were less likely to respond angrily or defensively. However, they had a harder time focusing and paying attention to what others said (Galanter et al., 1974).
CBD Use for Children
The administration of cannabinoids for children and adolescents suffering from ASD is a controversial legal and ethical issue (Khalil, 2012).
Those who oppose the use of medical cannabis in pediatrics claim that this treatment might harm young children and adolescents’ brain development.
In the field of pediatric mental illnesses, CBD is sometimes used as a treatment for anxiety disorders. In a case report describing a 10-year-old girl who suffered from PTSD after being sexually abused, it was reported that CBD treatment reduced her anxiety and improved her sleep (Shannon, 2016).
The use of cannabinoids in general and CBD in particular in the treatment of numerous medical and mental conditions, including ASD, is growing rapidly.
There certainly is a big gap in the field and such studies are needed before drawing any conclusions on the potential therapeutic applications of cannabinoids in ASD.
Further pre-clinical and clinical studies are needed in order to examine the pros and cons of CBD and other cannabinoids in ASD, before they are established as a treatment for ASD symptoms and co-morbidities. | <urn:uuid:14d2f512-d802-4c2b-ad66-a45f331a6232> | CC-MAIN-2021-21 | https://www.cedfoundation.com/category/autism/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991641.5/warc/CC-MAIN-20210511025739-20210511055739-00105.warc.gz | en | 0.929807 | 1,788 | 2.6875 | 3 |
A construction site is usually a beehive of many activities. On commercial job sites, in particular, there can be up to 100 tradespeople working at once. There are specific tradesmen that are in charge of operating the crane (or cranes if there is more than one on-site) with heavy construction material. Other tradespeople are on top of the building fixing blocks with concrete, the supervisor is around making sure the work is going right, and the list of activities is endless.
As you could imagine, when working along-side heavy machinery and materials, there are many risks and safety precautions involved. Especially when some of the largest cranes and concrete slabs are present tradesmen and bystanders need to be extremely careful. The presence of heavy equipment being lifted, the noise and dust emitted by the construction activities are all potential health and safety hazards. Any person at or close to the construction site is, therefore, expected to notice and heed the safety signs.
National construction authorities must ensure that safety and health precautions are sufficient. The most common way of ensuring this is by placing safety signs on the construction site. Doing so sensitises workers and anyone accessing the construction site of the risk of injuries and other health hazards. Besides, employers could land in legal problems if they overlook the responsibility of placing these signs. And because they must be noticed, construction site safety signs are presented in bright colours such as red, yellow, green, and blue. These colours often create a contrast for the symbols or words that bear the actual safety message often written in black or white, in large fonts, and sometimes in two or more languages.
Here are the top 5 safety messages on construction site safety signboards.
The prohibition of entry sign
A prohibition of entry sign forbids unauthorised persons from accessing the construction site. They can be written with different wording but always deliver the same message. Here are some examples of no entry messages:
- Stop! Do not enter. Construction area
- Danger: Construction Area. Authorised personnel only.
- Warning: Do not enter. Construction area.
- Danger: Hard hat area.
- Caution: Construction area. Keep out/off
Constructor protection-wear signs
These are signs that target the constructors’ safety, calling them to protect themselves from accidents and health risks. They include:
- Hard hats required in this area
- High visibility jackets must be worn
- Protective footwear must always be worn
Visitor safety signs
Messages on visitor safety signs preempt dangers by requiring unauthorised persons to follow a particular procedure or announce their presence. They may take one of these forms:
- Anyone who wishes to visit the site should report to the head office first
- Notice: Permission must be obtained before entering the construction site
Children safety signs
Children look for play space anywhere and may do so at construction sites. To ensure the children’s safety; construction sites may put up signs that call those who have responsibility for children to ensure their safety. The signs may read:
- Attention: Children must not play on this site
- Warning: Parents are advised to keep children away from the construction site
The danger of dropping objects signs
Dropping objects are a common occurrence in construction. Signboards reminding both constructors and anyone near the construction site of falling objects are crucial. We may not always be aware of what is above us.
Common warning messages to protect from dropping objects include:
- Caution: Workers above. Be alert!
- Warning: Men working overhead
- Danger: Demolition work in progress
- Beware of falling objects
Whether you are a tradesmen, a visitor, or just passing by, a construction site, it is essential to pay attention to health and safety signs. It’s always better to be safe than sorry. | <urn:uuid:d89415f5-186b-43f1-b433-df027b516d80> | CC-MAIN-2022-21 | https://www.outlawsmc.com.au/construction-site-safety-signs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529538.2/warc/CC-MAIN-20220519141152-20220519171152-00188.warc.gz | en | 0.930893 | 782 | 2.546875 | 3 |
Understanding Crime : Essentials of Criminological Theory
19 Jun 2009
Wadsworth Publishing Co Inc
L. Thomas Winfree, Jr.
This thought-provoking examination of crime and criminological theory takes a direct approach to a question that often confuses and frustrates students why do people commit crimes? UNDERSTANDING CRIME begins with an overview of the key elements of the study of crime and criminology, including law, public policy, research literature, and the philosophical origins of crime theories. These theories, based in biology, psychology, and sociology, are then broken down to their basic elements and causal processes in order to be explored. The authors examine the practical implications and applications each theory has on the administration of justice. In conclusion, the text looks at the future of crime theory by speculating whether or not new research designs, theories, and paradigms are needed. With a new modular format, this text can be customized for any teaching or learning style. | <urn:uuid:13e9f888-10e3-4ff3-8d3b-09f7b79c02ce> | CC-MAIN-2018-05 | https://www.zookal.com/understanding-crime-essentials-of-criminological-theory-9780495600831/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890991.69/warc/CC-MAIN-20180122034327-20180122054327-00205.warc.gz | en | 0.881454 | 201 | 2.671875 | 3 |
Everyone understands that automobile design is a complex process with teams working for years to perfect each part. However I often get raised eyebrows when I tell people that it took three people two months to design our Pushcart. After all, it’s got four wheels and a handle. A week to design they would guess. Why two months?
Early years catalogues are full of little pink prams, plastic wheelbarrows, baby walkers and wagons. Each serves a specific function and not much else. Our challenge was to create one piece of equipment that would serve children from one-year-olds taking their first steps to rambunctious three-year-olds moving a pile of blocks from the construction corner to the role play area.
I will only touch on one aspect of the design.The Pushcart does not have swivelling castors at the front to make it easy to steer like a shopping cart. That might work for a two- or three-year-old, but when a one-year-old wants to use the Pushcart she crawls over and pulls herself up on the sides of the cart. Then her hands ‘walk’ up the handle. If there were castors on the front, the Pushcart would swivel sideways and the child would end up face-down on the floor. On the other hand, an older child needs to steer the cart. The team used anthropometric charts and observed children to figure out the balance of height and weight so that an older child could press down on the handle to steer it while the beginning walker would not tip it. The final Pushcart design looks simple, but there's much more to it than meets the eye. | <urn:uuid:9637df28-5a5d-47ee-b776-015b811aca29> | CC-MAIN-2020-05 | https://www.communityplaythings.co.uk/learning-library/blog/2012/january/how-we-design-for-children | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250620381.59/warc/CC-MAIN-20200124130719-20200124155719-00465.warc.gz | en | 0.973534 | 349 | 2.640625 | 3 |
Baptists are a group of Christians who began in England in the early 1600s. They emerged from the English Separatist movement of the seventeenth century as dissenters from the Church of England, with some influence from the continental Anabaptists. Beginning as a small and despised group, Baptists now number 43 million baptized believers (2001) worldwide. With almost 34 million members in North America, Baptists now constitute the single largest Protestant denomination of Christians in the United States.
Baptists come in many varieties and traditions with many significant differences among them. A core value of Baptist life is the voluntary approach to matters of faith. Derivative of this voluntary approach are some of Baptists' commonly held beliefs: believer's baptism by immersion, local church independence, freedom of conscience, separation of church and state, and the authority of scripture for faith and practice. Most, but not all, Baptists are nonliturgical in worship and nonsacramental in their view of baptism and the Lord's Supper. A fervent commitment to evangelism and missions has characterized many Baptists for the last two hundred years.-- Walter Shurden
Baptists trace their origins to several points, depending upon questions of theology, polity and ethnicity. The first people to be properly called "Baptist" emerged from a Puritan/Separatist community in England about 1606. They fled to the Netherlands where they lived in the midst of a Mennonite community. They developed a view of the atonement that Christ died for all and were called "General" Baptists. Their early leaders included John Smyth, Thomas Helwys and John Murton. A second group was to come from among English Congregationalist or Independents in the 1640s. This family was Calvinistic and believed that Christ died only for the Elect. They became known as "Particular Baptists." In the 1650s yet another group of Baptists emerged from Christians who held the Sabbath to be holy. They were called Seventh Day Baptists." So far, it would appear that the first Baptists came from England. This does not explain however, how some slaves on a plantation in Tidewater Virginia came Baptists in the 1740s. They did so with only a preacher and a sense of fidelity to the bible's teachings. The Black Baptist movement has its origins in that tradition. Still, other stories could be written of people who, while studying their bibles, or in response to someone's witness, arrived at a Baptist understanding of what it means to be a Christian. Baptists, therefore, enjoy a wide series of "origins," the earliest coming from England.
-- William Brackney
Although Protestant Christians with Baptist principles existed as early as 1609, the name "Baptists" has been used only since the 1640s. Prior to the 1640s, they were variously called "brethren," "brethren of the baptized way," "baptized churches," or derogatorily as "Anabaptists." Baptists chose the name Baptists because it characterized their preference for believer's baptism. The name also derived from the practice of immersing baptismal candidates and was often assigned to Baptists by opponents who ridiculed their practice of immersion. Not until the eighteenth century did Baptists widely use this name to describe themselves. Because believer's baptism (as opposed to infant baptism) is absolutely central to Baptist convictions, it is easy to understand why Baptists have kept this name for centuries.
-- Charles DeWeese
The Baptist movement began as part of the English Reformation in the early seventeenth century. From that small beginning, a denominational tradition was born and spread throughout England to Wales and Scotland. By the end of the seventeenth century, all three types of English Baptists could be found in the American colonies. In 1800 the Baptist movement was essentially an English-speaking, Anglo-American religious tradition. The exception to this was the emerging Black Baptist community, first identified in the slave congregations of the southern American colonies and later in free churches in the northern U.S. and Jamaica. Major missionary witness took place in the nineteenth century from England, Scotland, and the United States Baptists and the denomination expanded to Africa, Europe, India, Burma, China, Latin America. In the twentieth century, through indigenous movements and missions, Baptists can be found in virtually every nation on earth. Their numerical strength is in the United States, Britain and Asia, with growth occurring in Africa and Latin America. There are over 35 million Baptist worldwide.
Baptists in America, especially, are a broad based and diverse group of faithful people. Therefore, Baptists can be found as participant -- and often as leaders -- in virtually every field of life as well as in their own religious affairs. John Smyth and Thomas Helwys were early Baptist "founders" in England. Roger Williams is often viewed as the symbolic founder of Baptists in the American Colonies. Isaac Backus was a prominent early New England Baptist. William Carey was an early English Baptist missionary who went to India. He helped inspire Adoniram Judson and Luther Rice who were the first Baptist missionaries who went out from America. Henry Dunster, one of Harvard's early Presidents, was a Baptist. Francis Wayland and William Rainey Harper, Presidents of Brown University and the University of Chicago, were prominent Baptist educators. Russell H. Conwell who founded Temple University was a Baptist.
American industrialists, entrepreneurs and philanthropists have included Baptists John D. Rockefeller, James B. Colgate and many others. Political leaders have included Presidents Harry S Truman, Jimmy Carter, Bill Clinton and perennial Presidential candidate, Harold Stassen. Supreme Court Justice Charles Evans Hughes was Baptist; Representative Adam Clayton Powell was Baptist and Jesse Jackson is a Baptist, as are Jesse Helms, Strom Thurmond, Trent Lott, Richard Gephart and many other present day and recent members of the US Senate, House of Representatives and other high government officials.
Harry Emerson Fosdick, preacher and founding pastor of New York's Riverside Church as well as prominent contemporary religious leaders like Calvin Butts and Gardiner Taylor, once described as the "Dean of American Preachers" are Baptists. The evangelist Billy Graham is a Baptist. The journalist and television commentator Bill Moyers is Baptist as is contemporary novelist John Grishom.
Notable figures in the fields of sports, entertainment, science might also be listed. The few individuals noted here are only a tiny representation and are only singled out as of unique historical importance or because their names may be easily recognized. Notable Baptists have given their names to a great many colleges, seminaries, universities, hospitals, churches and other institutions which represent their achievements and visions. It is consistent with Baptist belief, however, to note that the most notable Baptists are often among those faithful and committed people whose names are not broadly recognized, but who are notable because of the profound effect they had by faith, example and effect on others.
Baptists, although a distinct denomination of Christians for four hundred years, are clearly part of the larger Christian communion. Baptists do have, however, a core group of spiritual convictions, which, if taken together, distinguishes them as a unique group.
One core Baptist conviction is the concept of a believer's church. The basis of membership in a Baptist church is a voluntary and conscious commitment to Christ as Lord. Because the church should be composed only of believers, Baptists have opposed infant baptism, affirmed baptism by immersion for believers only, and utilized evangelism energetically as a means of encouraging belief in Christ.
A second core Baptist conviction has to do with the local church. While affirming the universal Church of Christ, Baptists believe that each local church is competent under Christ to shape is own life and ministry. Therefore, Baptists believe the affairs of each local church are in the hands of that congregation, allowing no outside ecclesiastical interference, civil intervention, or clergy domination. Most Baptist churches practice two ordinances, baptism and the Lord's Supper, and these are interpreted usually as symbols rather than sacraments.
Freedom of conscience is a third cardinal Baptist conviction. The promotion of "soul liberty" has meant that Baptists have been champions of religious liberty and separation of church and state.
Finally, authority in Baptist life is rooted in the Lordship of Christ as interpreted by the local congregation and manifested explicitly in Holy Scripture, especially the New Testament. Baptists generally take a non-creedal approach to scripture.
-- Walter Shurden
Baptists believe that "when Jesus came up out of the water" at his own baptism by John it implies being immersed in the water. Immersion also carries the symbolism expressed by Paul when he spoke of being "buried with Him through baptism into death and raised from the dead through the glory of God." (Romans 6:3-6 ) An 18th century Baptist hymn writer used the term "liquid grave" to describe this meaning of immersion.
-- Don Sanford
A person is baptized after he or she has decided to accept God's gift of salvation. The decision must be made by the person accepting the gift, not by his or her parents nor by any other person or group of persons. Infants lack the maturity to make such a decision; therefore they should not be baptized.A person is baptized in order to publicly declare his or her new relationship with God and with other baptized believers. Baptism is a symbol of and an experience of grace but is not necessary for salvation.
-- Eljee Bentley
Baptists have never recognized any sort of central authority or discipline. Consequently, when there is a strong difference of opinion, there is the possibility of a division of fellowship. New Baptist groups have been born over theology, ethnicity, racial differences, polity and practice, and leadership directions. Most Baptists find reasons to cooperate with each other and in North America and elsewhere can be called "convention" or "union" Baptists. But, others are resistant to cooperation and are non-aligned or "Strict" Baptists. Those who are non-aligned see little possibility or need for cooperation and the differences have often kept mainstream Baptists from pursuing conversations. For many Baptists, there is no sin in diversity; indeed it reflects the pattern of New Testament Christianity. In a very real sense, every local Baptist church can be thought of as a denomination of Christians, "knit together and complete in itself," to use the words of an early confession.
-- William Brackney
The term "evangelical" applies to those Christians who hold to the authority of Scripture, the deity and Lordship of Christ, the power of the Holy Spirit, and the imperative of sharing the gospel. The term came into popular usage in the early nineteenth century and includes several denominational traditions. Baptists held to evangelical views before "evangelicals" emerged as such. They have had deep affinities with those evangelicals who accept Baptists on doctrinal grounds. However, a major point of division between Baptists and evangelicals has been the strict Baptist requirement that believers only are baptized. The Landmarkist Movement is said to have kept Baptists out of the early development of American evangelicalism. Increasingly in the twentieth century, Baptists have found common cause with evangelicals and are considered by most to be "evangelical" if not "Evangelical", meaning they hold to evangelical views but are not part of formally organized Evangelicalism, which can take on the appearances of a separate denomination. Within several Baptist groups there may be found persons variously described as "mainstream evangelicals," "conservative evangelicals," "progressive evangelicals," and "liberal evangelicals."
-- William Brackney
Yes. Baptists today trace their origins most directly to a group of English reformers, particularly the "Puritans," in the late 16th and early 17th centuries. In general these reformers were "protesting" what they saw as corruption and faithlessness in the long established "official" church of the time. These early Baptists were also influenced by the beliefs of the Mennonites and other "grass roots reform" movements on the European continent. The word "Protestant" thus generally describes the wide variety of new Christian churches and groups that emerged from this intense period of religious reform often called the "Protestant Reformation." Most Baptist scholars and the majority of Baptists agree that Baptists are, in this historic sense, "Protestant."
Some Baptists, however, maintain that a spirit of reform and faithful resistance to established church traditions had always been present in the Christian church. This spirit was seen even before the Protestant Reformation in such early reformers as the Waldensians and the Moravians, in the individual example of people like Balthazar Hubmaier in Germany, and in the intensely committed faith of groups like the Hutterites and the Brethren. In that sense, many Baptists maintain their origin is earlier than any one historic episode.
-- Everett Goodwin
Baptists, other Christians, and Jews affirm that all are made in the image of God; therefore able to respond to God: response able, responsible, and if responsible, free. (Gen. 1:26-27).Believers come directly to God; one mediator between God and all humankind (I Tim. 2:5). God wants free followers and no other kind (Gal. 5:1).If anyone's religious freedom is denied, everyone's religious liberty is endangered (Acts 5:29). Baptists have taken seriously Jesus' words about the separation of church and state (Matt. 22:15-22). Overwhelmingly, Baptists believe in religious liberty and its essential corollary, the separation of church and state.
-- James Dunn
Some people consider themselves born-Baptists, especially if they are the next in a succession of generations of family members who have identified themselves as Baptist. When surveys are taken of religious affiliation, a high percentage of respondents check the box for "Baptist" whether there is a formal relationship with the denomination or not.Technically, though, becoming Baptist involves a process and a conscious choice to accept some commonly-held beliefs. Believers usually "join a church" by "walking the aisle" during the closing hymn of a worship service. They present themselves before the congregation as candidates for baptism or as previously-baptized believers who want to "move their letter" to another church. This public profession of faith is made by children and adults. Ideally children discuss their feelings and makethis decision with parents and pastors at an age that is considered appropriate to those involved. Church members are asked to show support of the candidates by "a show of hands" or a verbal "Aye" or "Amen" and baptism is planned at a later date.
-- Susan Broome
Yes. The word "Christian" has been used for nearly 2000 years to describe those who follow the teachings, example and lordship of Jesus of Nazareth, a resident of Nazareth near Galilee in the north of Israel. His teachings and ministry ultimately led to his crucifixion in Jerusalem about the year 30 AD. Most of those called Christians affirm that Jesus' life did not end in physical death, and that in some important way he was raised from the dead to continue his ministry, that he empowered his disciples and followers to minister in his name, and that the same spirit which gave him vital spiritual life, empowers those who follow him. Christians of different perspectives often disagree or debate many things. However, all Christians affirm in some very specific way that Jesus was the Son of God, or the Christ. Baptists are among those who affirm Jesus in this way as Christ and are therefore Christians.
-- Everett Goodwin
Historically, Baptists of all kinds are firm believers in the Trinity. All the confessions of faith plus the vast majority of Baptist pastors and leaders have affirmed the Holy Trinity. There have been notable examples of Baptists who have developed anti-trinitarian views, like Robert Robinson, William Vidler, Elhanan Winchester, Asa Messer, Crawford H. Toy, and minor figures, but the churches quickly shunned their position and they either left the Baptist family or modified their positions. Of the persons of the Trinity, Baptists have a strong doctrine of the Lordship of Christ and a less clear understanding of the work of the Holy Spirit. God the Father is understood as Creator and sovereign of the universe.
-- William Brackney
The vast majority of Baptists today worship on Sunday, the first day of the week continuing in the tradition dating back to the early days of the Christian Church with its rejection of Jewish legalism and celebration of the Resurrection. However, there are some Baptists who from about 1650 in their Bible study believed that the seventh day of the week as commanded by God in the Ten Commandments and practiced by Christ and the New Testament Church is still valid and ought to be observed.
-- Don Sanford
Some scholars describe today as a post-denominational age. Many Protestant Christians do rotate among churches of various denominations. They do not join a Baptist church or remain in a Baptist church simply because parents and grandparents did. They often choose churches that meets the needs of their children or youth, churches that worship in a certain way, or churches that meet certain socioeconomic expectations. However, being Baptist still matters-it matters a great deal. For many, being Baptist best represents the impulses towards freedom and accountability reflected in the teachings of Jesus; it also best matches the general patterns of New Testament Christianity. Good Baptists, however, do not belittle other denominations. Instead, they recognize that much good resides in all Christian traditions.
-- Charles DeWeese
Many Baptists struggle with the term "ecumenical" because it has twentieth century connotations that relate to undesirable relationships. There can be no doubt that many Baptists over their almost four centuries of history, have cooperated with other Christians. In the seventeenth century, English Baptists made common cause with other Reformed Christians in their writing of confessions of faith. General and Particular Baptists in England stood together in the Orthodox creed and Seventh Day pastors often preached in First Day churches. Baptists joined Quakers, Congregationalists, Unitarians and Presbyterians in early eighteenth century England to address their concerns for political ands social issues as the "Three Dissenting Denominations." In the American colonies Baptist cooperated with Congregationalist and New Light revivalists. Later camp meetings were common with Disciples of Christ, the Christian Church and Methodists. On special holidays like Thanksgiving or Days of fasting and prayer, Baptists have joined other Christians in worship at the local and regional levels.
Beginning in the later nineteenth century, Baptists in Britain, the United States, Canada began to cooperate with other denominations in the Evangelical Alliance, mission organizations and eventually in the establishment of councils of churches. The Northern Baptist Convention was for instance a charter member of the Federal Council of the Churches of Christ in the USA when it was established in 1913. Likewise, Baptists in the former Soviet Union were partners with Pentecostals and Mennonites during the Soviet era. In Germany, Hungary, and Poland, to name some countries, Baptists are full members of national ecumenical bodies. The Baptist World Alliance has become a venue for Baptist cooperation. The Alliance has engaged in "theological conversations with the Roman Catholic Church, Lutherans. Reformed Churches, Mennonites, Eastern Orthodox Patriarchiate, and the Church of England. Members of the BWA staff attend meetings of world Christian organizations like the World Council of Churches. Within the Baptist family there are historic mergers like that between the Northern Baptists and the Freewill Baptists in 1911 and discussions with the Disciples of Christ (Christian Churches, as well as those who want no relationship with other Christians at all. These Baptists have often been referred to as "Landmarkist" Baptists and populate the American South and Southwest. For many years the Southern Baptist Convention was involved in ecumenical discussions, but in the 1990s has withdrawn from involvements to maintain the integrity of their Baptist witness. Baptists are found on boards and membership rosters of Americans United for the Separation of Church and State, World Vision, bible societies, and educational institutions and publications like Christianity Today and Christian Century.
-- William Brackney
Baptist polity is organized on the foundation of the local congregation. In the ordinary senses of the terms, Baptists have no synods, presbyteries, or bishops. Congregations are gathered by the Holy Spirit and mutually internally accountable. Only on a voluntary basis are congregations accountable for certain matters to each other. Historically these accountabilities include confessions of faith, ordination of leaders, and mission tasks. Baptist organizations like associations, societies, unions, conventions, and the Baptist World Alliance are only advisory and voluntary. They may deliberate and debate but their decisions are binding only upon those involved and not upon congregations. Baptist churches send "messengers" or "delegates" to such meetings in order to "report" back on the issues and discussions. As one Baptist put it, "No one represents a congregation."
-- William Brackney
The predominant theological character of Baptists across their four centuries has been in the "Reformed" tradition among Reformation and Post-Reformation categories. Baptists in early seventeenth century England were close to the Presbyterian Westminster Confession of Faith and much of the character of that confession is seen in the First and Second London Confessions, and the Philadelphia and New Hampshire Confessions of Faith. Some Baptists have held very strictly to five point Calvinism, while others have not affirmed so strongly the doctrines of perseverance of saints or reprobation. Some Baptists, like Old School or Primitive Baptists, refer to "sovereign grace doctrines" and hold tenaciously to five or even six principle Calvinism, including double predestination. Since the late eighteenth century and the ministry of Baptists like Andrew Fuller and Robert Hall, Jr., plus the impact of revivalism, most Baptists prefer to hold fast to the sovereignty of God and human depravity, while also affirming the grace of God to allow human freedom of choice with respect to the offer of salvation and ethical decisions. Most Baptists now hold to a general view of the atonement, meaning that Christ died for all humankind.
-- William Brackney
Baptists have a very high view of the Bible. Specifically they believe it is "the inspired written record of God's revelation to men," as one scholar phrased it. Baptists believe the Bible is the only authoritative source of religious truth, knowledge and experience. In general, all Baptists turn to the Bible to guide their understanding of religious doctrine, practices in the local church, human relationships, relationships between churches and between the church and the social context in which Baptists live, and, of course, worship and daily living. Baptist reliance on the Bible is emphasized because Baptists do not believe in the ultimate authority of institutions, even religious institutions, traditions, significant individuals or other sources.
Baptists also frequently disagree about what is the best interpretation of the Bible. This is because Baptists place great reliance upon the privilege of individual interpretation. Modern Baptists, therefore, frequently (and loudly!) dispute the way the Bible was revealed, the precise way its truth is expressed, and how that truth is applied in practical living. But all of such disagreements are simply an example of the extreme importance the Bible has in Baptist faith and life. Baptists are "people of the book," and therefore Bible study and reflection is central to Baptist teaching. preaching, and worship, and every Baptist is encouraged to read and study the Bible's contents.
-- Everett Goodwin | <urn:uuid:1f62560a-752b-4523-a458-689455d12d99> | CC-MAIN-2015-40 | http://www.baptistheritage.com/questions/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737951049.91/warc/CC-MAIN-20151001221911-00158-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.970724 | 4,902 | 3.84375 | 4 |
Legislative findings and declaration of policy. 43.001(1)(a)
The importance of free access to knowledge, information and diversity of ideas by all residents of this state;
The critical role played by public, school, special and academic libraries in providing that access;
The major educational, cultural and economic asset that is represented in the collective knowledge and information resources of the state's libraries;
The importance of public libraries to the democratic process; and
That the most effective use of library resources in this state can occur only through interlibrary cooperation among all types of libraries and the effective use of technology.
The legislature declares that it is the policy of this state to provide laws for the development and improvement of public libraries, school libraries and interlibrary cooperation among all types of libraries.
History: 1985 a. 177
; 1997 a. 150
Municipal libraries are a matter of statewide concern. Accordingly, home rule provisions will not justify local departures from the provisions of ch. 43. 76 Atty. Gen. 203
In this chapter:
“Department" means the department of public instruction.
“Division" means the division for libraries and technology in the department.
“Municipality" means a city, village, town, tribal government or tribal association, or a school district that maintained and operated a public library facility prior to December 17, 1971.
“Network" means a formal arrangement between libraries or other informational service organizations whereby materials, information and services are exchanged and made available to potential users.
“Public library system" means a system established as either a federated public library system under s. 43.19
or a consolidated public library system under s. 43.21
“State superintendent" means the state superintendent of public instruction.
“Tribal college" means an accredited college, operated or controlled by a federally recognized American Indian tribe or band in this state, that meets the requirements of 25 USC 1804
General duties of state superintendent.
The state superintendent shall:
Promote, assist and plan the organization, development and improvement of school library media services to provide the resources needed for teaching and learning in the schools.
Promote, assist, plan and coordinate the organization, development and improvement of public library services and public library systems to serve the needs of all citizens in the state.
Promote cooperation and resource sharing among public libraries, school libraries, other types of libraries and related agencies.
Plan, coordinate, evaluate and set statewide priorities for the development of networks to enable library cooperation and resource sharing within this state and between this state and resource providers in other states.
Submit to the council on library and network development a biennial report which describes the programs and policies carried out under pars. (a)
in the preceding biennium and the programs and policies to be carried out under pars. (a)
in the succeeding biennium.
Plan and coordinate the provision of library services to groups with special needs, including institutional residents, the physically and mentally handicapped, the socially and economically disadvantaged and racial and ethnic minorities.
Accept, on behalf of the state, grants from the federal government or any federal agency or gifts or grants from any other source to be used for the purposes designated under this chapter.
Enter into an annual contract with the public library in a 1st class city for the provision of library services to physically handicapped persons, including the blind and visually handicapped, certified by competent authority as unable to read or use conventional printed materials as a result of physical limitations. For the purpose of this subsection, “competent authority" means any member of the medical or allied professions, and professional persons in the fields of public health, education, library service, rehabilitation, social work and public welfare.
Contract for service with libraries and other resource providers in and outside of this state to serve as resources of specialized library materials and information not available from the resources for libraries and lifelong learning service under s. 43.05 (11)
Establish procedures necessary for the internal administrative operation of the division.
Develop and maintain a computer database containing bibliographic and library holding information for all types of library materials owned by libraries throughout the state to serve as a resource sharing tool and assist libraries in developing computerized bibliographic databases.
Disseminate information regarding appropriate continuing education activities available to librarians, library board members, library support staff and other related professionals.
General duties of the division.
The division shall:
Coordinate and conduct continuing education programs for librarians of school library media programs, public libraries, public library systems and institutional library programs.
As it deems appropriate, assist libraries in the identification and recruitment of qualified personnel.
Provide professional and technical advisory, consulting and informational services to assist:
School districts establishing, maintaining or expanding school library media programs and facilities;
Public libraries, municipalities establishing, maintaining or expanding public libraries, counties establishing, maintaining or expanding public library services, public library systems and their governing bodies;
Collect library statistics and conduct studies and surveys of library needs throughout the state and report and publish the findings. The research shall be coordinated with statewide library planning.
Designate a librarian to serve as a coordinator of activities for state document depository libraries under ss. 35.81
and to fulfill its responsibilities under ss. 35.81
Recommend and distribute standards for school library programs and facilities to school library media programs, standards for public libraries to public library governing bodies and standards for institutional library programs to governing bodies and administrators of institutional library programs and to heads of departments, as defined under s. 15.01 (8)
, which administer institutional libraries.
Establish standards for and issue certificates to public librarians under s. 43.09 (1)
Approve the establishment of public library systems under s. 43.13
Administer aids to public library systems under s. 43.24
Maintain a resources for libraries and lifelong learning service to supplement the collections of all types of libraries in this state by providing specialized materials not appropriately held and information sources not provided by local libraries or readily available from other area or state-level resource providers. The service shall provide specialized library and information services to state agency libraries and state employees, institution libraries, public library systems, public libraries, school libraries, and other types of libraries according to policies developed by the division. Library and information services may include development of collections of specialized materials, interlibrary loan services, reference services, provision of database search services, and maintenance of a statewide database of library materials. The service may contract with state agencies and libraries to provide library material cataloging and processing services.
Assist the council on library and network development in the preparation of the descriptive and statistical report to be prepared by the council under s. 43.07 (5)
Carry out such other programs and policies as directed by the state superintendent.
Conduct a review of a public library system if at least 30 percent of the libraries in participating municipalities that include at least 30 percent of the population of all participating municipalities state in the report under s. 43.58 (6) (c)
that the public library system did not adequately meet the needs of the library. If the division determines that the public library system did not adequately meet the needs of libraries participating in the system, it shall prepare an advisory plan suggesting how the public library system can so do in the future, including suggestions designed to foster intrasystem communications and local dispute resolution. The advisory plan shall be distributed to the public library system board, the boards of all libraries participating in the system and the county boards of all counties participating in the system.
Collection and maintenance of data. 43.06(1)(1)
The division may perform any of the following activities to collect and maintain public library-related data, including all of the following:
Purchase licenses for data collection software.
Train library staff on the effective use of data in decision-making.
Establish digital processes for the efficient collection, analysis, and reporting of data to library patrons and staff.
Create dashboard tools for libraries to use internally in analyzing, and to report to the public about, library use.
Develop, implement, and maintain technology systems that allow for secure, interoperable data exchange and the automation of work processes.
Create an automated system for the initial certification and recertification of public librarians, as described in s. 43.09 (1)
Establish library user authentication systems.
History: 2017 a. 142
Council on library and network development.
The state superintendent and the division shall seek the advice of and consult with the council on library and network development in performing their duties in regard to library service. The state superintendent or the administrator of the division shall attend every meeting of the council. The council may initiate consultations with the department and the division. The council shall:
Make recommendations to the division in regard to the development of standards for the certification of public librarians and standards for public library systems under s. 43.09
Advise the state superintendent in regard to the general policies and activities of the state's program for library development, interlibrary cooperation and network development.
Advise the state superintendent in regard to the general policies and activities of the state's program for the development of school library media programs and facilities and the coordination of these programs with other library services.
Hold a biennial meeting for the purpose of discussing the report submitted by the state superintendent under s. 43.03 (3) (d)
. Notice of the meeting shall be sent to public libraries, public library systems, school libraries and other types of libraries and related agencies. After the meeting, the council shall make recommendations to the state superintendent regarding the report and any other matter the council deems appropriate.
On or before July 1 of every odd-numbered year, transmit to the state superintendent a descriptive and statistical report on the condition and progress of library services in the state and recommendations on how library services in the state may be improved. The state superintendent shall include the report as an addendum to the department's biennial report under s. 15.04 (1) (d)
Review that portion of the budget of the department relating to library service. Recommendations of the council in regard to the budget shall accompany the department's budget request to the governor.
Receive complaints, suggestions and inquiries regarding the programs and policies of the department relating to library and network development, inquire into such complaints, suggestions and inquiries, and advise the state superintendent and the division on any action to be taken.
Certificates and standards. 43.09(1)(1)
The division shall issue certificates to public librarians and promulgate, under ch. 227
, necessary standards for public librarians. The qualifications for public librarians shall be based on education, professional training and experience. Any relevant instruction, as defined in s. 440.075 (1)
, that an applicant for a certificate has obtained in connection with any military service, as defined in s. 111.32 (12g)
, counts toward satisfying any requirement for instruction for a certificate under this subsection if the applicant demonstrates to the satisfaction of the division that the instruction obtained by the applicant is substantially equivalent to the instruction required for the certificate. Certificates already granted prior to December 17, 1971, shall remain in effect.
Public library systems.
The division, by rule, may promulgate necessary standards for public library systems. If promulgated, such rules shall be consistent with s. 43.15
and shall be established in accordance with ch. 227
, except that the division shall hold a public hearing prior to adoption of any proposed rule. In addition to the notice required under s. 227.17
, the division shall endeavor to notify each public library of such public hearings.
See also ch. PI 6
, Wis. adm. code.
County library planning committees. 43.11(1)(1)
Any county board may appoint a county library planning committee under this section. If a county board, in a county where all public library service is administered or coordinated by an existing county library board or where there is a single-county public library system board, determines to appoint a committee under this section, the existing library board may serve as the county library planning committee. The county board shall notify the division immediately upon appointment of the committee.
The committee may prepare a new plan for the organization of a county or multicounty system, revise an existing plan or change the boundaries of a public library system. It shall conduct public hearings concerning these plans, revisions and changes to which representatives of all libraries in the county shall be invited.
The committee's final report, including a new plan, revisions to an existing plan or changes to the boundaries of a public library system and copies of any written agreements necessary to implement the proposal, shall be filed with the county board and submitted to the division. Plans for multicounty systems shall include a method for allocating system board membership among the member counties.
The plan of library service for a county, whether for a single county or a multicounty system, shall provide for library services to residents of those municipalities in the county not maintaining a public library under this chapter. The services shall include full access to public libraries participating in the public library system and the plan shall provide for reimbursement for that access. Services may include books-by-mail service, bookmobile service, the establishment of additional libraries or other services deemed appropriate by the committee. Services may be provided by contracting with existing public libraries in the county or in adjacent counties or with the public library system or by creating a county library organization under this chapter. The plan of library service for a county may provide for improving public library service countywide and in municipalities that have libraries. The plan shall specify the method and level of funding to be provided by the county to implement the services described in the plan, including the reimbursement of public libraries for access by residents of those municipalities in the county not maintaining a public library.
The plan of library services for a county may include minimum standards of operation for public libraries in the county. The county shall hold a public hearing on any standards proposed under this paragraph. The standards shall take effect if they are approved by the county and the public library boards of at least 50 percent of the participating municipalities in the county that contain, according to the most recent estimate prepared under s. 16.96
, at least 80 percent of the population of participating municipalities in the county.
The plan of library services for a county may require that a municipality located in whole or in part within the county that operates a public library compensate another municipality located in whole or in part within the county that operates a public library whenever the latter public library provides library services to residents of the municipality that operates the former public library. The plan's compensation for each loan may not exceed the actual cost of the loan, as defined by the department by rule. | <urn:uuid:489f356e-37ed-4d59-8be0-372fc8b7dd99> | CC-MAIN-2019-30 | http://docs.legis.wisconsin.gov/statutes/statutes/43/03/7 | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529480.89/warc/CC-MAIN-20190723151547-20190723173547-00059.warc.gz | en | 0.915843 | 3,069 | 2.640625 | 3 |
Castle Hill National Historic Site of Canada
Links and documents
1692/01/01 to 1762/01/01
Listed on the Canadian Register:
Statement of Significance
Description of Historic Place
Castle Hill National Historic Site consists of the remains of French and British fortifications and outworks from the late 17th to the early 19th centuries that sit on the tip of a peninsula, high above Placentia Newfoundland, on the east side of Placentia Bay. It contains the remains of defensive walls, three military works, and a historic pathway.
Castle Hill was designated a national historic site because:
- from 1692 to 1811, its defences played an important role in the defence of Placentia and the larger economic and strategic interests of France and Britain in what is now Atlantic Canada.
The heritage value of Castle Hill National Historic Site of Canada lies in its historical associations as illustrated by the remains of the 17th and 18th-century French defence works, the British blockhouse, as well as of both French (1692-1713) and British (1713-1811) occupancy. The site was stabilized and interpreted by Parks Canada as a national historic park in 1962-1968 to commemorate Placentia’s tercentenary. Archaeological investigation was conducted on the site at that time.
Source: Historic Sites and Monuments Board of Canada, Minutes, October 1971, 2001; Commemorative Integrity Statement 2002.
Key elements of the associative landscape include:
- the siting of the fortress, high up on the tip of a peninsula;
- remnants of the wall, Fort Royal, Gaillardin Redoubt, Detached Redoubt and the pathway in their location, extent, form, footprints, and materials;
- the spatial inter-relationship of these components;
- the craftsmanship and materials of structures remaining on the site;
- the archaeological resources directly linked to 17th through 19th-century military life on the site, including in situ and moveable artifacts stored by Parks Canada (pipe fragments, ceramics, glass, tools, cannon balls, gunflints, buttons, faunal remains, and assorted military equipment);
- the visual and physical links between these hilltop defence works and the town of Placentia such as the pathway and the viewscapes;
- the viewscapes from the site to in situ archaeological evidence of 18th-century military life beyond the designated place including La Fontaine Battery, former sites of Fort Louis and Fort Royal;
- the viewscapes from the site inland including those to Jerseyside, over Placentia Bay, and to the harbour approach from Placentia Bay;
- the visibility of Castle Hill from land and from the sea.
Government of Canada
Historic Sites and Monuments Act
National Historic Site of Canada
1692/01/01 to 1811/01/01
1692/01/01 to 1713/01/01
1713/01/01 to 1811/01/01
Theme - Category and Type
- Governing Canada
- Military and Defence
Function - Category and Type
- Historic or Interpretive Site
- Military Defence Installation
Architect / Designer
Location of Supporting Documentation
National Historic Sites Directorate, Documentation Centre, 5th Floor, Room 89, 25 Eddy Street, Gatineau, Quebec
Cross-Reference to Collection | <urn:uuid:ad7c96b6-25a0-4805-baa8-de26dc1aa620> | CC-MAIN-2015-35 | http://www.historicplaces.ca/en/rep-reg/place-lieu.aspx?id=7565&pid=0 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064865.49/warc/CC-MAIN-20150827025424-00278-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.913707 | 710 | 3.171875 | 3 |
"I have a difficult time handling the high workload during Instrument approaches. What are some keys to staying ahead of the airplane?" - Tim H.
“The first skill that an instrument pilot needs to master is anticipation. You must be able to think ahead of the airplane and anticipate the next action rather than react. You should be thinking at least two steps ahead of the airplane. It’s not enough to know what your next action should be but also the step after that.
The next step is to know exactly what is required for each phase of flight. In instrument flying (especially for light single-engine aircraft) there are really only several configurations – climb, descent, cruise, and approach. You must be able to precisely configure the aircraft for each phase. Working with your instructor, develop a specific flow for each configuration and then practice transition between configurations. Instrument flying demands so much of your attention that you can’t afford to spend time fiddling with the aircraft controls. The configuration, pitch and power requirements MUST be pre-determined and known for the aircraft that we fly. Learn how to set and forget so you can devote your attention to other tasks.
Then you can concentrate on the approach tasks – getting the weather, briefing the approach, setting up the radios and navaids. These should be completed before reaching the initial approach fix. Slow down well before reaching the final approach fix to give yourself more time to prepare and stabilize the aircraft in the new configuration.
Once intercepting the final approach course, you can concentrate on monitoring your progress and quickly catching any deviations from track and altitude.
Set up your GPS so that you are displaying Track and Bearing, even on an ILS or VOR approach. As long as the track and bearing numbers are the same, you’re on course. You will be able to detect lateral deviations much quicker than watching for CDI displacement.” | <urn:uuid:e66658a7-4bd5-45d4-b38c-db1770aca2d0> | CC-MAIN-2019-35 | https://pilotworkshop.com/tips/staying-ahead-approaches/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314732.59/warc/CC-MAIN-20190819114330-20190819140330-00351.warc.gz | en | 0.935641 | 389 | 2.5625 | 3 |
- Bill Lile/Flickr
- Home to an ancient coral reef, Guadalupe Mountains National Park has an otherworldly feel to it.
As a New England expatriate in Texas, a trip to the desert seems like a visit to another planet. At the Guadalupe Mountains National Park, that otherworldly feeling is quite real, achieved through a travel in time, if not through space. Just below the flat line where New Mexico perches over Texas, the park is home to a coral reef some 250 million years old.
Rewinding to the Permian period — around 252 to 298 million years ago — much of West Texas and Southeast New Mexico was covered in an inland sea.
"It would be about the size of Lake Erie," said Jonena Hearst, the park's official geologist. "Because we were sort of a backwater and most of the exciting geology like volcanoes and vaults occurred elsewhere, what was preserved here has not been destroyed."
As the sea dried up, the reef's sponges, algae and other lime-secreting organisms remained in a petrified state, creating the highest point in Texas at 8,751 feet. Like a skeleton to a med-school student, the reef has helped researchers understand how a coral reef works when it's fleshed out and teeming with life.
"It's difficult to see the backbone in the modern reef," said UT-Austin geology professor Charles Kerans. "'Cause you're looking at the shark that's coming at the back of you, and you're not paying attention to the fine structure of the reef."
- Katie Yates/National Parks Service
- Rains flooded the Guadalupe Mountains National Park salt flats in 2014.
A few hundred million years is beyond the reach of human understanding, but in the ancient and undeveloped land of West Texas, it's a temporal blink of the eye. Before the Guadalupe Mountains were an underwater reef system, the area was a battleground for the supercontinents of Gondwana and Laurasia.
"About 300 million years ago, these continents ran into each other and raised a huge mountain chain that probably rivaled the Himalayas," said Hearst.
Reaching even deeper in the record, there are rocks in the area dating back 1.8 billion years.
"They form the core of what will become the North American continent in another billion years are so," Hearst said.
In 2015, the most important time related to the Guadalupe Mountains is seven hours — the time it takes to get from San Antonio to the park's entrance.
In the fall, Guadalupe's massive fossilized ridges share top billing with the beauty of the changing season.
"The most spectacular area is McKittrick Canyon," said Kerans. "Sometime in the second or third week of October, when the leaves start to change in the canyon itself, it's very impressive. You have these beautiful limestone ridges with amazing red Maple. It's a beautiful place in October." | <urn:uuid:5c2ca18f-6de1-4e5e-af8e-99be44142af0> | CC-MAIN-2018-43 | https://m.sacurrent.com/sanantonio/the-geologic-wonders-of-the-guadalupe-mountains-national-park/Content?oid=2473965 | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516071.83/warc/CC-MAIN-20181023044407-20181023065907-00423.warc.gz | en | 0.956775 | 628 | 3.359375 | 3 |
Click For Photo: https://3c1703fe8d.site.internapcdn.net/newman/gfx/news/2018/5abaa6b5ecd05.jpg
Much has been made of quantum computing processes using ultracold atoms and ions, superconducting junctions and defects in diamonds, but could we be performing them in our own brains?
It's a question UC Santa Barbara theoretical physicist Matthew Fisher has been asking for years. Now, as scientific director of the new Quantum Brain Project (QuBrain), he is seeking to put this inquiry through rigorous experimental tests.
Might - Computers - Robots - Building - Quantum
"Might we, ourselves, be quantum computers, rather than just clever robots who are designing and building quantum computers?" Fisher asks.
Some functions the brain performs continue to elude neuroscience—the substrate that "holds" very long-term memories and how it operates, for example. Quantum mechanics, which deals with the behavior of nature at atomic and subatomic levels, may be able to unlock some clues. And that in turn could have major implications on many levels, from quantum computing and materials sciences to biology, mental health and even what it is to be human.
Idea - Brains - Fact - Rounds - While
The idea of quantum computing in our brains is not a new one. In fact, it has been making the rounds for a while with some scientists, as well as those with less scientific leanings. But Fisher, a world-renowned expert in the field of quantum mechanics, has identified a precise—and unique—set of biological components and key mechanisms that could provide the basis for quantum processing in the brain. With $1.2 million in grant funding over three years from the Heising-Simons Foundation, Fisher will launch the QuBrain collaboration at UCSB. Composed of an international team of leading scientists spanning quantum physics, molecular biology, biochemistry, colloid science and behavioral neuroscience, the project will seek explicit experimental evidence to answer whether we might in fact be quantum computers.
"We are extremely grateful to the Heising-Simons Foundation for the bold vision in granting this project at the very frontier of quantum- and...
Wake Up To Breaking News! | <urn:uuid:9c898454-f95a-4930-bc4e-9bc28fe875a8> | CC-MAIN-2019-39 | https://longroom.com/discussion/950938/are-we-quantum-computers-international-collaboration-will-investigate-the-brains-potential-for-quantum-computation | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573053.13/warc/CC-MAIN-20190917061226-20190917083226-00454.warc.gz | en | 0.924312 | 465 | 3.046875 | 3 |
BANGKOK, Thailand – It seemed like a good idea at the time: Remove all the feral cats from a famous Australian island to save the native seabirds.
But the decision to eradicate the felines from Macquarie island allowed the rabbit population to explode and, in turn, destroy much of its fragile vegetation that birds depend on for cover, researchers said Tuesday.
Removing the cats from Macquarie "caused environmental devastation" that will cost authorities 24 million Australian dollars ($16.2 million) to remedy, Dana Bergstrom of the Australian Antarctic Division and her colleagues wrote in the British Ecological Society's Journal of Applied Ecology.
"Our study shows that between 2000 and 2007, there has been widespread ecosystem devastation and decades of conservation effort compromised," Bergstrom said in a statement.
The unintended consequences of the cat-removal project show the dangers of meddling with an ecosystem — even with the best of intentions — without thinking long and hard, the study said.
"The lessons for conservation agencies globally is that interventions should be comprehensive, and include risk assessments to explicitly consider and plan for indirect effects, or face substantial subsequent costs," Bergstrom said.
Located about halfway between Australia and the Antarctic continent, Macquarie was designated a World Heritage site in 1997 as the world's only island composed entirely of oceanic crust.
It is known for its wind-swept landscape, and about 3.5 million seabirds and 80,000 elephant seals arrive there each year to breed.
The cats, rabbits, rats and mice are all nonnative species to Macquarie, probably introduced in the past 100 years by passing ships. Authorities have struggled for decades to remove them.
The invader predators menaced the native seabirds, some of them threatened species.
So in 1995, the Parks and Wildlife Service of Tasmania that manages Macquarie tried to undo the damage by removing most of the cats.
Several conservation groups including the International Union for Conservation of Nature and Birds Australia said the problem was not the original eradication effort itself — but that it didn't go far enough. They said the project should have taken aim at all the invasive mammals on the island at once.
"What was wrong was that the rabbits were not eradicated at the same time as the cats," University of Auckland Prof. Mick Clout, who also is a member of the Union's invasive species specialist group. "It would have been ideal if the cats and rabbits were eradicated at the same time, or the rabbits first and the cats subsequently."
Liz Wren, a spokeswoman for the Parks and Wildlife Service of Tasmania, said authorities were aware from the beginning that removing the feral cats would increase the rabbit population. But at the time, researchers argued it was worth the risk considering the damage the cats were doing to the seabird populations.
"The alternative was to accept the known and extensive impacts of cats and not do anything for fear of other unknown impacts," Wren said. "Since cats were eradicated, the grey petrel successfully bred on the island for the first time in a century and the recovery of Antarctic prions has continued since the eradication of feral cats."
Now, the parks service has a new plan to finish the job, using technology and poisons that weren't available a decade ago.
Wren said plans to eradicate both rabbits as well as rats and mice from the island will begin in 2010. Helicopters using global positioning systems will drop poisonous bait that targets all three pests. Later, teams will shoot, fumigate and trap the remaining rabbits, she said.
Some of the earlier critics are now behind this latest eradication effort, saying it should help the island's ecosystem fully recover because it would remove the last remaining invasive species.
"Without this action, there will be serious long-term consequences for the majestic seabirds which nest on the island including the four threatened albatross species, and for the health of the island ecosystem as a whole," said Dean Ingwersen, Bird Australia's threatened bird network coordinator.
"We believe that the process they are going to follow uses best practice for this type of work," Ingwersen said. "And that all possible ramifications have now been considered." | <urn:uuid:42ec5f09-f315-4931-a762-5f53af23e1ab> | CC-MAIN-2018-26 | http://www.foxnews.com/story/2009/01/13/australian-cat-removal-plan-backfires-as-rabbits-move-in.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859766.6/warc/CC-MAIN-20180618105733-20180618125733-00152.warc.gz | en | 0.961368 | 869 | 2.9375 | 3 |
Essays and criticism on ernest hemingway, including the works the sun also the story revolves around two americans—jake barnes, a newspaperman. Miscommunication ernest hemingway's “hills like white elephants” is an intense story that depicts a couple at a crisis point in a relationship. Short story about a professor examining his own life and teaching hemingway to various groups of students in different classes. The questions at issue are: what is characteristic of hemingway's style when the analysis shows that the frequency of adjectives is very low. The recognition of hemingway as a major and representative writer of the a vivid and charged sequence, as if it were a 10-second video summary in the image of immortality in the african story the snows of kilimanjaro,.
Much of the short story by hemingway, “the snows of kilimanjaro” is thus given over to the idea of infection and its causes—namely, in this. In these stories, hemingway uses the natural world as a defense mechanism for nick many critics have already analyzed the content of “two-hearted river”. The hemingway story is an extreme example of one of my favorite types with each analysis, its shape shifts and you find something different.
This study is conducted to explore hemingway's famous short story sequence, “ big two-hearted river” on the basis of stylistic approach the writer is a. Hemingway's concept of the short story and narrative discourse this duality of narratives in hemingway‟s short stories can be analyzed. Check out our thorough summary and analysis of hemingway uses a variety of literary techniques to.
It's a story so short that it could fit into a title yet it resonates with depth did or did not hemingway wrote the shortest, saddest story of six words. American political system short introduction the united states of america is the most powerful nation on earth, politically, economically and militarily, but. Summary in the early 1920s, an american man and a girl, probably nineteen or twenty years old, are waiting at a spanish railway hemingway's short stories.
What i conclude then is that nick represents hemingway in each story further this could mean that hemingway himself found that a person like alice still has the. Hemingway's stories run counter to the traditional nineteenth and early analysis after the publication of his last major work, the old man and the sea, ernest. 222 the aspect of movement in stories of initiation 223 the aspect of effect in stories of initiation 3 analysis of hemingway's short fiction 31 childhood:. Analysis of the genre the short stories of ernest hemingway, for example, may often gain their force from an exploitation of traditional mythic symbols (water,.
Short stories of ernest hemingway study guide contains a biography of questions, major themes, characters, and a full summary and analysis. This story is set in a small, coastal italian village this town may have been familiar to hemingway, as he was stationed in italy during world war i the great war. Hemingway app makes your writing bold and clear the app highlights lengthy, complex sentences and common errors if you see a yellow sentence, shorten or .
The selection of stories in this volume is based on the stories found in high- school and college literature anthologies that ranked them as not only the best of. A summary of a very short story in ernest hemingway's in our time learn exactly what happened in this chapter, scene, or section of in our time and what it.Download | <urn:uuid:ad27a8c9-02a3-4e38-afbb-c06eb82e64a8> | CC-MAIN-2018-26 | http://sitermpaperqfse.epitaphs.us/hemingway-story-analysis.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865250.0/warc/CC-MAIN-20180623210406-20180623230406-00212.warc.gz | en | 0.947435 | 766 | 2.96875 | 3 |
NEW YORK, Aug. 15 (UPI) -- Cigarette smoking combined with tuberculosis appears to be far deadlier than previously believed, according to a new study in India.
The finding has important public health implications in developing countries where both are major public health problems, the New York Times said.
The study, appearing Saturday in the journal Lancet, found that smokers are four times as likely as nonsmokers to die of TB in India. The researchers estimate nearly 200,000 people die there from the disease every year because they have been smokers.
At every age, smokers in the study had twice the risk of dying as nonsmokers. The study also found Indian smokers, on average, die about 20 years earlier from all causes than they would if they did not smoke.
Smoking and TB kill an estimated 5 million people worldwide every year, according to New York Health Commissioner Thomas Frieden. | <urn:uuid:ef039d50-705e-4bbb-9811-00959234d7a5> | CC-MAIN-2017-26 | http://www.upi.com/Science_News/2003/08/15/Study-says-smoking-TB-deadly-combo/UPI-92831060953292/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00694.warc.gz | en | 0.959596 | 183 | 2.640625 | 3 |
Teaching Your Bird the Step-Up Command
“Step up,” or just plain “Up,” is the most important command you teach your bird. When you ask your bird to perform this motion, he should step up onto whatever you’re offering, be it your finger (for smaller birds), your fist or arm (for larger birds), or a wood dowel or perch. The step-up command establishes you as the leader and is the basis for all other training.
If your new pet was hand-fed and well socialized, he may already know the step-up command, but even if he doesn’t, expect him to pick it up quickly. Teach it to him by following these steps:
1. Place your hand (if he’s friendly) or a T-perch or a dowel (if he’s not) gently against his breast, just above the legs, and say “Step up” in a firm but friendly tone.
A T-perch is just what it sounds like: a perch shaped like the letter T. Some trainers don’t like using a T-perch or dowel, and recommend putting a towel over your hand instead.
The pressure triggers an instinctive reaction, and the bird usually steps right onto the perch or hand.
2. Follow with lots of praise and even a seed treat or two.
Make “Step up” a normal part of everyday life with your bird; you can use the command many times a day. The request and response are not only convenient in all kinds of situations, but they also constantly reinforce your gentle leadership. | <urn:uuid:a00806a9-0d90-4544-9bb7-b7634f7d95b1> | CC-MAIN-2019-22 | https://www.dummies.com/pets/birds/teaching-your-bird-the-step-up-command/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257624.9/warc/CC-MAIN-20190524124534-20190524150534-00136.warc.gz | en | 0.946688 | 349 | 3.0625 | 3 |
Structure of telecommunication networks are complex and create large quantities of geographically dispersed data. Consider you are a data engineer working in the telecommunication sector who wants to plot telephone pole locations with its attribute data to keep the track for its operations and maintenance. The attribute data added with the plotted locations can help you to observe information associated with each telephone pole and maybe embed this map on the department website.
GIS technology is advancing in various field including the telecommunications sector to build maps and perform GIS analysis. Limited GIS software are available that provides services in both creating maps and hosting them on websites. GIS mapping enables people working in telecommunication sectors to enhance network planning, deployment, maintenance, operations, and even sales and marketing.
IGISMap gives powerful tool sets to create interactive maps of locations and geospatial features associated with any applications based on social services, business analysis, scientific research etc. Using the tools in the IGISMap application, we can track, maintain and analyze the telephone poles. IGISMap is a web platform providing multiple GIS applications that are most important in the field of geospatial analytics. GIS tools of IGISMap application allows users to Add Data, Create Data, Map Data, Style Data, Process Data, Analyze Data and also help users to Share Data privately or publicly.
How to plot Telephone pole locations online with Attributes?
Create Point Data tool of IGISMap is a powerful GIS tool to plot point vector data to represent locations and point objects with latitude and longitude value. Using this online tool, we can plot the locations of telephone poles and can add the attribute data to each location of the data created.
Click https://map.igismap.com/add-points to open Create Point Data tool
Start Plotting Points for Telephone Pole Locations
First step is Add Points, where we can start plotting the telephone pole locations as pins. IGISMap provides you with three features for plotting points: Drop Points, Search Address, and Lat Lon Values.
Drop points let us drop a pin at the desired location on the map. Zoom to the location of the telephone pole and click to add the pin.
Search Address option opens a search address box, where you can enter an address and choose the right location address from the dropdown and click the Plot button to plot a point on that location.
Lat Lon Values will open two boxes to enter latitude and longitude values of the location you want to plot, Plot Location button in this option will plot a pin at the location you have entered.
Also, a popup will open for entering attribute values in each attribute field for that telephone pole locations when a point is plotting. Click the Submit button to submit the save the attribute entries. You can choose to delete the point you plotted by clicking the Delete Point button. You can disable the default opening of this popup using the toggle button.
But we can open this popup anytime while plotting, by simply clicking on an existing pin.
Note: If the Drop Points option is active for dropping pins, it should be unselected for selecting the plotted pins to open the attribute popup.
After plotting every desired slum locations for our data, click the Save and Publish button to publish your data in the map.
Review and edit the datatable
After publishing Telephone poles, Show/Edit Datatable section will be opened. Here you can edit the attribute values entered for each point location after clicking button in the datatable along each row in the datatable. You can also choose to delete a point by clicking button.
Options to edit or delete the attribute fields are also available in this step along with the option to add new attribute fields to this data. If you thought of adding more points to the data of ATM Locations, select the Back button to go to the Add Points section, where you can add more points and make changes to the already published data.
Option to update the data table as bulk is available in this section. Where the whole data table can be downloaded in Excel format using Download Datatable button. And to make the changes outside IGISMap, then upload the edited/updated spreadsheet file using Upload Datatable button and integrate with the same point data of ATM locations.
After making all the changes in the datatable, let’s move to the styling section by clicking the Next button to finish plotting.
Style Your Telephone Pole Points
A map will become more meaningful if appropriate icons and colors are used to visualize the features of the map. In IGISMap styling options, Bubble Style and Icon Style are provided for point GIS data.
In Icon Styling, IGISMap provides two more options – Basic and Category styling. Basic Style will provide an appropriate pin icon for styling the telephone pole points and apply it on the telephone poles data as follows.
Another style is the Category Icon styling, where users can select the category on the basis of which styling is added to the point data. For example, if the user selects maintenance attribute as a categorical option, style is changed to symbol using those items.
Check this article to understand How to style point GIS data categorically using Icon Style tool
Bubble style is used to visualize the data quantitatively based on the numerical fields in the datatable. We can assign the size and color of the bubble for each class of values.
Check this article understand How to create Bubble Map for point GIS data
Click on Save Style option to save the Bubble style option for the added points.
It’s done! Now if the user wants to add more points, click on Create more points on the layer option. If the user wants to create a new layer, select Create New Layer option.
After the point GIS data of telephone pole locations is published in the name Telephone poles, More option beside the data provides list of other features. They can be used for adding more points, showing the legend in the map, editing the style and more.
Check the article Share your Map to understand about Share Map feature of IGISMap.
Check other articles:
- Map habitat locations of endangered animals & keep track of their living
- Map the locations of slums and embed the map on your website
- Create GIS Bubble Map – IGIS Map Tool
- Charts with Map – Create Bar Chart, Histogram, Number Chart, Table
- How to Share Map – Publicly | <urn:uuid:60199e84-3c3c-43e9-98bd-9ad152eabf43> | CC-MAIN-2024-10 | https://www.igismap.com/tag/embed-map/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00855.warc.gz | en | 0.851473 | 1,311 | 3.046875 | 3 |
The Orange Volunteer Fire Department has been busy recently with carbon monoxide calls around town. Early Monday morning an alarm went off and the family could not be reached by phone, which is a frightening scenario for the dispatcher and first responders who aren’t sure what they will encounter. In this case, the family did make it out of the house after the OVFD arrived.
The Orange Fire Marshal’s Office in cooperation with the U.S. Consumer Product Safety Commission (CPSC) urges the community to be aware of the important facts and safety information regarding Carbon Monoxide.Carbon Monoxide poisoning is a serious threat that people need to get informed about.
By educating ourselves on the dangers of carbon monoxide, we can significantly reduce the health risk, as well as save lives. So in response to many of the questions that the Fire Marshal’s Office has received, we have decided to include this article to help you and your families stay safe.
HOW DOES CARBON MONOXIDE HARM YOU?
Carbon monoxide is harmful when breathed because it attaches to the hemoglobin, which is the part of the blood that carries the oxygen to the brain, heart, and other vital organs. By attaching itself to the hemoglobin, the carbon monoxide displaces the oxygen, thus depriving your body of much needed oxygen. Large amounts of carbon monoxide can overcome you in minutes without warning, causing you to lose consciousness and suffocate.
WHAT IS CARBON MONOXIDE?
Carbon Monoxide is an odorless, colorless gas that is a product of combustion. The carbon monoxide produced while using fuel-fired equipment is usually not harmful. Normally, increased carbon monoxide levels in homes are caused by faulty heating equipment, poor maintenance of exhaust systems, or something as simple as allowing your vehicle to warm up in your garage during those cold winter days. How can you reduce the opportunity for increased levels of carbon monoxide in your home? It’s simple. Follow these preventative measures to ensure your family will not suffer from carbon monoxide poisoning:
- • At the beginning of every heating season, be sure to have your fuel burning equipment such as your oil or gas fired furnaces, water heaters, oven ranges and stoves, clothes dryers, fire places and wood stoves inspected by certified technicians.
- • Have you flues and chimneys checked for any buildup of creosote or blockage of the chimney.
- • Be sure to maintain all your fuel-fired equipment as described by the manufacturer’s specifications.
- • NEVER leave your car running in an attached garage. The vapors from the vehicle’s exhaust could increase the level of carbon monoxide in your home dramatically in a matter of minutes!
- • NEVER use a gas stove to heat your home in the event of a power failure or heating equipment failure.
- • NEVER use charcoal or propane grills indoors. Not only does this pose an extreme carbon monoxide hazard, it is also a severe fire hazard as well.
- • Think safety first when considering the use of alternative heating, such as space heaters. Make sure the space heater is far away from combustible materials at a minimum of three to four feet. If using fuel fired space heaters, never sleep in a room without proper ventilation. Make sure that all fuel-fired space heaters are equipped with oxygen depletion sensors.
- • Do not use gasoline-powered equipment in enclosed areas of the home. Such engines create a mass amount of carbon monoxide.
- • Install carbon monoxide detectors as you would smoke detectors. It is recommended that you should have a carbon monoxide detector on every level of the home, as well as in all sleeping areas. When installing your carbon monoxide detectors, be sure not to install them within five feet of any fuel burning equipment. Make it a point to install these live saving alarms. They will not work if they stay in the package on your workbench!
SIGNS AND SYMPTOMS OF CARBON MONOXIDE POISONING
Because carbon monoxide is an odorless and colorless gas, it is not always immediately evident when it has become a problem. All too often, people who have mild or moderate problems with carbon monoxide will find they feel sick while they spend time at home.
When venturing out into the fresh air, they will begin to feel much better but will have re-occurring symptoms shortly after returning to their home. People who are most susceptible to the effects of carbon monoxide are infants, elderly residents, those family members who suffer from respiratory or heart disease, or anemia, and women who are pregnant must take special care. However, nobody is immune to the effects of carbon monoxide. Symptoms of carbon monoxide poisoning include the following:
- Physical Symptoms: Headache, nausea, vomiting, muscle pain, joint pain, chronic fatigue, dizziness, numbness, tingling, vertigo
- Cognitive/Memory Impairments: attention problems, multi-tasking problems, word-finding problems, short-term memory loss, verbal and/or visual deficits
- Affective Disorders (Emotional/Personality Effects): irritability, anxiety, lack of motivation, temper, loss of interest, sleep disturbance
- Sensory and Motor Disorders: blurred vision, double vision, buzzing in the ears, decreased coordination, speaking, eating, and swallowing disorders
- Gross Neurological Disorders: Seizures, inability to speak, balance problems, tremors
WHAT TO DO IN THE EVENT OF A CARBON MONOXIDE EMERGENCY:
Should you or a family member suspect that there may be an increased level of carbon monoxide in your home, or you have installed the recommended carbon monoxide alarms in your residence and they begin to go into alarm, follow these simple steps to help resolve the problem:
- First and foremost, CALL 9-1-1! This important step will allow trained first responders with the equipment needed to protect you and your family to investigate the possible presence of carbon monoxide. DO NOT HESITATE TO CALL THIS EMERGENCY NUMBER! Many times, calls will be made directly to a volunteer firehouse, which will delay the response of emergency personnel. After asking the caller why they did not decide to call 9-1-1, more often they state that they did not think this type of situation is what they would consider as an emergency that warranted such a call, when in reality it is!
- Get any suspected victim into fresh air immediately!
- If you can not get the victim out of the house, open all of the windows and doors to allow fresh air into the home. Be sure to turn off any fuel-fired appliances.
- Those persons who have been exposed to elevated levels of carbon monoxide should be taken to the closest hospital as soon as possible. A simple blood test will determine the amount of carbon monoxide in the bloodstream.
Should you have any questions pertaining to this matter, you may contact the Orange Fire Marshal’s Office at (203) 891-4700. The Orange Fire Marshal’s Office also has a website, which you can find information about this and many other fire related topics. You can visit the website by going to www.orangefiremarshal.com.
Fire Marshal Tim Smith urges all residents to install a carbon monoxide detector in their home, and the Fire Marshal’s office gives them out for free. If you don’t have one, call the Smith at the number above to see if his office has any more available. | <urn:uuid:508fa494-24fc-4c07-b968-739202309302> | CC-MAIN-2021-25 | https://orangectlive.com/2019/12/16/carbon-monoxide-safety-information-that-you-should-know/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488519735.70/warc/CC-MAIN-20210622190124-20210622220124-00222.warc.gz | en | 0.937537 | 1,576 | 3.421875 | 3 |
Phenotype: Base coat colors are lightened (diluted) to paler shades. For example, black becomes a gray-blue color (often called "blue" by breeders) and chocolate brown becomes a pale silvery red (in some breeds, this can be called "lilac"; in the French Bulldog, this is typically referred to as "isabella" - other breeds may have different names for this dilution).
Dogs with D/D genotype are not expected to display dilute coat colors; they have no known dilution variants. They cannot produce dilute offspring or transmit any of the known dilution variants to their offspring.
Dogs with D/d1, D/d2, or D/d3 genotype are not expected to display dilute coat colors, but they are carriers of dilution variants. They will transmit the dilution variant they carry to 50% of their offspring. Matings between two carriers of dilute variants are expected to produce 25% puppies with dilute coat colors.
Dogs with d1/d1, d2/d2, d3/d3, d1/d2, d1/d3, or d2/d3 genotype are expected to display dilute coat colors. They will transmit a dilution variant to all of their offspring.
At least 15 business days; may be delayed beyond 15 business days if sample requires additional testing, or a new sample is requested.
A recessive mutation d1, previously named d, in the melanophilin (MLPH) gene (g.48121642G>A, c.-22G>A) was identified as the cause of color dilution phenotypes in several dog breeds (Drögemüller et al. 2007). However, this mutation alone does not account for all dilute color phenotypes. In 2018, Bauer et al. identified a second dilution in MLPH,variant d2 (c.705G>C, p.Gln235His) in the Sloughi, Chow Chow, and Thai Ridgeback dogs. Analysis at the Veterinary Genetics Laboratory (VGL) determined that the d2 variant is present at a frequency of less than 1% in phenotypically dilute French Bulldogs, thus suggesting that additional variants also cause this phenotype. Subsequent research at the VGL identified a third, very rare dilution variant d3 (c.667_668insC, p.His223Profs*41). The d3 variant has been detected in the Italian Greyhound, Chihuahua, Mudi, Pumi, Shih Tzu, Pekingese, Tibetan Mastiff, Yorkshire Terrier, Shetland Sheepdog, indigenous dogs, and wolf-dog hybrids (Van Buren et al. 2020).
Two copies of any of the three dilution variants, or any combination of two of these variants, are necessary to lighten the color. The d1 mutation is known to cause a reduction in the amount of full-length protein product, thus producing less pigment. The effect of the d2 mutation on the resultant protein is unknown, although in the homozygous state it dilutes color. The phenotype produced by two copies of the d3 variant is unknown, but this mutation is predicted to shorten the MLPH protein and likely disrupt function. Dogs that are compound heterozygotes d1/d2, d2/d3, or d1/d3 have a dilute phenotype. This diagnostic DNA test can detect all three known variants of the MLPH gene.
Note: The known variants d1, d2, and d3 do not account for all color dilution in some breeds such as Doberman Pinscher, French Bulldog, Italian Greyhound, and English Bulldog. This means that there are still unknown mutations that dilute color which need to be investigated. In these breeds, and likely others, some dogs may carry one known and one unknown dilution mutation and present a dilute phenotype.
Drögemüller, C., Philipp, U., Haase, B., Günzel-Apel, A-R., & Leeb, T. (2007). A noncoding melanophilin gene (MLPH) SNP at the splice donor of exon 1 represents a candidate causal mutation for coat color dilution in dogs. Journal of Heredity,98(5), 468-473. doi: 10.1093/jhered/esm021
Bauer, A., Kehl, A., Jagannathan, V., & Leeb, T. (2018). A novel MLPH variant in dogs with coat colour dilution. Animal Genetics,49(1), 94-97. doi: 10.1111/age.12632
Van Buren, S. L., Minor, K. M., Grahn, R. A., Mickelson, J. R., Grahn, J. C., Malvick, J., Colangelo, J.R., Mueller, E., Kuehnlein, P., & Kehl, A. (2020). A Third MLPH Variant Causing Coat Color Dilution in Dogs. Genes, 11(6), 639. doi: 10.3390/genes11060639 | <urn:uuid:72728723-31b3-4a86-a164-c8d54012f276> | CC-MAIN-2023-50 | https://vgl.ucdavis.edu/test/dilute-dog | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00246.warc.gz | en | 0.890338 | 1,102 | 3.046875 | 3 |
The 7 health tests that can tell if YOU are at risk of dementia: Smokers and people who are overweight or have unhealthy diets are most at risk
- People who look after their heart health in their 60s are less at risk of dementia
- Researchers recommend people stop smoking, stay slim and exercise often
- They also advice two portions of fish a week, and three of fruit and veg a day
- In addition, keep cholesterol, glucose and blood pressure levels in check
Scientists have revealed the seven health tests that tell a person their risk of developing dementia in later life.
These seven tests are whether a person: smokes, is overweight, exercises regularly, eats fish and fruit or vegetables often, and has healthy blood pressure, glucose and cholesterol levels.
The French study concluded that people over 60 who look after their heart health are less likely to suffer memory and cognitive decline eight years later.
Around 850,000 people in the UK have dementia, of which approximately 62 per cent suffer from Alzheimer's, the most common form of the disease. Some 5.7 million have Alzheimer's in the US.
Scientists have revealed the seven health tests that tell a person their risk of developing dementia in later life - and it all comes down to looking after your heart (stock)
THE SEVEN TESTS THAT TELL A PERSON THEIR RISK OF DEMENTIA
According to the University of Bordeaux, people over 65 are more at risk of dementia in later life if they:
- Have a BMI over 25
- Do not exercise regularly
- Do not eat fish twice a week or fruit and vegetables three times a day
- Have high blood pressure
- Have high cholesterol
- Have high blood sugar
How the research was carried out
The researchers, from the University of Bordeaux, assessed the heart health of 6,626 people aged over 65 to determine whether this affected their risk of dementia.
Heart health was evaluated via the seven-item checklist from the American Heart Association.
The heart-health recommendations include not smoking, having a BMI under 25, exercising regularly and eating well.
Other advice includes having a cholesterol level of less than 200 mg/dL, glucose under 100 mg/dL and a blood pressure reading of no more than 120/80 mm Hg.
After assessing all of the participants for the above, they were given a heart health score.
Their cognitive function was investigated multiple times between 1999 and 2016.
People can maintain their heart and cognitive health by exercising often (stock)
WHAT IS DEMENTIA? THE KILLER DISEASE THAT ROBS SUFFERERS OF THEIR MEMORIES
Dementia is an umbrella term used to describe a range of neurological disorders
A GLOBAL CONCERN
Dementia is an umbrella term used to describe a range of progressive neurological disorders, that is, conditions affecting the brain.
There are many different types of dementia, of which Alzheimer’s disease is the most common.
Some people may have a combination of types of dementia.
Regardless of which type is diagnosed, each person will experience their dementia in their own unique way.
Dementia is a global concern but it is most often seen in wealthier countries, where people are likely to live into very old age.
HOW MANY PEOPLE ARE AFFECTED?
The Alzheimer’s Society reports there are more than 850,000 people living with dementia in the UK today, of which more than 500,000 have Alzheimer's.
It is estimated that the number of people living with dementia in the UK by 2025 will rise to over 1 million.
In the US, it's estimated there are 5.5 million Alzheimer's sufferers. A similar percentage rise is expected in the coming years.
As a person’s age increases, so does the risk of them developing dementia.
Rates of diagnosis are improving but many people with dementia are thought to still be undiagnosed.
IS THERE A CURE?
Currently there is no cure for dementia.
But new drugs can slow down its progression and the earlier it is spotted the more effective treatments are.
Source: Dementia UK
Looking after your heart benefits your brain
Results suggest people with poor heart health scores in their 60s are more at risk of dementia eight years later.
The more cardiovascular advice a person fails to follow, the greater their risk of dementia becomes.
Limitations of the study include its participants only being white and from urban areas. Therefore the findings, published in the journal JAMA, may not apply to the general population.
Osteoporosis sufferers are up to 30% more likely to develop dementia
This comes after research released earlier this month suggested osteoporosis patients are up to 30 per cent more likely to develop dementia.
Women with the bone-weakening disorder are 30 per cent more at risk of developing the memory-loss condition, while males with osteoporosis are 20 per more likely to develop dementia, according to the first study of its kind.
Study author Dr Louis Jacob, from Paris University, said: 'The major hypothesis to explain the association between osteoporosis and dementia is that these two conditions have similar risk factors.'
Such risks factors include certain genetic mutations, as well as vitamin and hormone deficiencies.
Osteoporosis affects around one in four women and one in eight men worldwide. Women are more at risk due to them having smaller, thinner bones. Their risk increases post-menopause when the protective hormone oestrogen declines. | <urn:uuid:656d3f2b-711b-4425-ae8c-fb6de393255b> | CC-MAIN-2019-22 | https://www.dailymail.co.uk/health/article-6083509/The-7-health-tests-tell-risk-dementia.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257553.63/warc/CC-MAIN-20190524064354-20190524090354-00409.warc.gz | en | 0.948391 | 1,141 | 2.796875 | 3 |
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Welcome to my course on "introduction to Matrices and Determinants" ., The course is MUST for any Math student. The topics that are covered in this course are the most essential ones, those that will touch every Math and Science student at some point of their education. Matrices and determinants gives students the ability to understand the main concept of matrices and determinants, i have explained the types of matrices and determinants with the brief examples so that student can easily got the concept of the topic. The course is divided into several sections. Matrices section and determinant section. Students of sciences ,O.level, A.level, can take this course with confidence. I hope this course will be very beneficial for all students. student should take this course for easy approach.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
Introduction to coursePreview
|Section 1: What is Matrices? And its Types|
What is matrices?Preview
Types of matrices 1Preview
Types of matrices IIPreview
Types of matrices III
|Section 2: How to Multiply Matrices? Addition and Subtraction , Transpose Etc|
Addition and Subtraction
How to Multiply Matrices?
Transpose of a Matrix
Scalar Multiplication of Matrices
How to take Adjoint of a Matrix
|Section 3: What is Determinants? How to Expand Determinants|
Introduction to determinants
Properties of Determinant I
Properties of Determinant II
|Section 4: How to Expand 3 by 3 Determinant|
How to Expand 3 by 3 Determinant
How to Expand 3 by 3 Determinant by an ExamplePreview
Hermition matrix and Skew Hermition matrix
I Love math; I truly do. Since as long as I can remember, I've always found it fascinating, interesting, and highly rewarding. But what I love even more than ripping through a problem set is sharing my passion for math with ambitious students.
I've been teaching math for almost 10 years, ever since I was in middle school. Throughout my academic and professional life, I have continuously set time aside to help kids understand all sorts of math concepts. Why? Because math is a subject matter that I not only enjoy thoroughly, but one that I am able to adeptly teach. No matter who you are or what your educational level, I am 100% confident that I can bring you clarity in whatever math subject you are studying. I have helped all ages of kids learn arithmetic, pre-algebra, algebra, geometry, algebra 2, trigonometry, precalculus, and calculus. If you are a motivated student shooting for excellence, I want to teach you.
I have Specialization in Statistics , Finance and also teach Economics , Statistics and Mathematics to students in an academy and now I have started to teach online . I also hold
Now I want to teach online and I'm very passionate about it.
I teach Economics, Mathematics, Statistics, Finance and English. Now i'm creating courses online in all these subjects.
Enroll today, create change, and be amazing! | <urn:uuid:3c6489e5-993e-4adf-beed-19b3cd77eeb2> | CC-MAIN-2017-04 | https://www.udemy.com/introduction-to-matrices-and-determinants/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279923.28/warc/CC-MAIN-20170116095119-00528-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.913827 | 717 | 3.15625 | 3 |
Click on Tornado Safety on the right menu for more information.
Important Terms for Spring Severe Weather.
Severe Thunderstorm - A thunderstorm that produces a tornado, winds of at least 58 mph (50 knots), and/or hail at least ¾" in diameter. Structural wind damage may imply the occurrence of a severe thunderstorm. A thunderstorm wind equal to or greater than 40 mph (35 knots) and/or hail of at least ½" is defined as approaching severe.
Flash Flood - A flood which is caused by heavy or excessive rainfall in a short period of time, generally less than 6 hours. Also, at times a dam failure can cause a flash flood, depending on the type of dam and time period during which the break occurs.
Tornado Watch - Tornadoes are possible in your area. Remain alert for approaching storms. Listen to the media for updates.
Severe Thunderstorm Watch - Tells you there is a possibility of severe thunderstorms in your area likely to occur. Watch the sky and stay tuned to know when warnings are issued.
Flash Flood Watch – Flash flooding is possible in and close to the watch area, but the occurrence is neither certain or imminent. Listen to the National Weather Service, radio or television for information.
Tornado Warning - A tornado has been sighted or indicated by weather radar. Take shelter immediately.
Severe Thunderstorm Warning - A severe thunderstorm is occurring or will likely occur soon in your area. Warnings are for imminent danger to life and property to those in the path of the storm. Seek shelter immediately.
Flash Flood Warning - Flash flooding is in progress, imminent, or highly likely. Seek higher ground immediately or evacuate if directed to do so.
Wright State Alert | <urn:uuid:c505865a-bcbf-4793-bf55-7ad514b5d4fd> | CC-MAIN-2015-27 | http://www.wright.edu/emergency-management?alt-style=high-contrast | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094690.4/warc/CC-MAIN-20150627031814-00057-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.913797 | 361 | 3.21875 | 3 |
I have been reading some studies latley which find the same plaque build up in the arteries that caused heart disease, can also impact the brain. Think about it, the heart and brain are linked by arteries that supply blood, oxygen and nutrients. When plaque builds up and the arteries harden, they deprive the heart and the brain of blood, which can lead to stroke, heart attack or even death.
Here are a few simple thoughts to feed both your brain and your heart:
-Eating just one or two 4 ounce servings of fatty fish a week; salmonn, mackerel, trout. High in omega 3 fats, helps reduce inflammation and keeps blood flowing to the brain.
-Red Wine contains compounds which help lower cholesterol and blood pressure and can prevent clots. So sit down and enjoy a glass!
-Fifteen minutes of moderate exercise can extend your life by 3 years!! So go ahead a park that car at the farest end in the lot!
-Eat your fruits and vegetables. Grandma was right, who would have thought? | <urn:uuid:a2af355d-2f07-4ee9-8f4c-be9af07bfbea> | CC-MAIN-2017-13 | http://www.chicagonow.com/healthy-tasty-with-chef-jody/2012/02/smarter-heart-healthy-mind-what-are-your-thoughts/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187519.8/warc/CC-MAIN-20170322212947-00296-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.953271 | 217 | 2.78125 | 3 |
Normandy has long played an important role in European History from the Norman invasion of England in the 11th Century to the D-Day Landings during WWII. Today this French region offers visitors the opportunity to see firsthand its long and rich history and culture.
Going all the way back to the 6Th century Mont Saint Michel is a wonder to be discovered. Built a on the tidal island, the picturesque Island was built after Bishop Aubert of Avranches had a vision from the Archangel Michael instructing him to build the oratory. The Island became one of the big pilgrim locations and even today thousands of tourists and pilgrims visit the Island.
During the hundred Years War the English couldn’t conquer Mont Saint Michel, due to its defenses. When a young peasant woman heard of the incredible feats of Mont Saint Michel she was inspired to fight for France, Joan of Arc became of one of the greatest French Heroines.
The Region is littered with stories of triumph and bravery and the D-Day Landings of 1944 only add to the stories. As the largest naval, air and land operation in history the assault consisted of 18 000 Paratroopers dropping in, 14 000 maneuvers were flown by the allied air forces and nearly 7 000 naval vessels took part in the operation. The operation, although successful for the Allied forces had a great cost of life, over 425 000 people, both Allied and German were killed, wounded or went missing during the Battle of Normandy.
The Norman beaches today are littered with touching memorials and museums. Head down to the beaches, Museums and cemeteries to discover how this historic region played host to one of the most important fronts of WWII.
Normandy is always open | <urn:uuid:9160da5b-73ea-4ea0-b186-2828f7021f66> | CC-MAIN-2019-04 | https://citywonders.com/attractions/normandy | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00416.warc.gz | en | 0.964538 | 348 | 3.15625 | 3 |
The recent spotlight on early literacy (birth – age 9) skills development shines bright, and rightly so. There is a vast amount of research that proves the critical nature of early literacy skills development and its relationship to long-term academic and life success. In addition, there are many research based proven practices that are effective at developing early foundational literacy skills. In a nutshell, we understand the stakes, challenges and opportunities of early literacy and also understand the practices that effectively build early literacy skills. As educators, it is beneficial, if not imperative to have solid understanding of the importance of early literacy and its connections to school and life success.
A recent research report, Turning the Page: Refocusing Massachusetts for Reading Success does an outstanding job of detailing the issues, challenges and solutions around addressing literacy development from birth through age 9. The report is grounded in the latest research and provides a very succinct roadmap for how practitioners and society can address early literacy development. If you are interested in learning more about the importance of early literacy, the report is an excellent way to become familiar with the issues and answers around this critical topic.
As Keys to Literacy prepares to address instructional training for PreK teachers, para –professionals, and administrators, we have been thrilled to find a deep trove of research on best practices for early literacy. Should you be interested in learning more about these topics you can find lots of research and resources at Strategies for Children and at The Center for Public Education.
Here are a few more suggested articles: | <urn:uuid:f017f654-8bca-487b-9ed6-65abce882537> | CC-MAIN-2020-34 | https://keystoliteracy.com/blog/early-literacy/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737319.74/warc/CC-MAIN-20200808080642-20200808110642-00119.warc.gz | en | 0.947183 | 304 | 3.546875 | 4 |
Rhodonite, Greek for rose, is red and pink in color with black dendritic inclusions. Deposits of rhodonite can be found in Australia, Finland, Canada, Japan, Madagascar, Mexico, Russia, Sweden, South Africa, Tanzania, and The United States (New Jersey). The columns in Mayakovskaya underground railway station in Moscow, built in 1938 are faced with beautiful slabs of pink rhodonite!
Our Rhodonite beads are a gorgeous deep rose color. Some of the strands (those with extra black matrix) are marbled with black – we love pink and black together!
More About Rhodonite
Rhodonite, from the Greek word “rhodon”, meaning “rose” is a pink colored manganese silicate. It is often confused with rhodochrosite, which is a rose colored manganese carbonate. Not surprisingly, the two gemstones are often found in close proximity. Rhodonite is often marbled with a black matrix of manganese oxide. | <urn:uuid:3fb877d6-3561-4f8e-b244-b5172f779743> | CC-MAIN-2014-41 | http://www.limabeads.com/Rhodonite-Gemstone-Beads-C281 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133568.71/warc/CC-MAIN-20140914011213-00294-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.922657 | 216 | 2.71875 | 3 |
At a glance
Overview of waste in New Zealand
Waste represents an inefficient use of our resources. Improperly disposed of, waste can also pose a risk to human health and the environment.
The amount of waste generated in New Zealand has increased over time as our population and levels of production and consumption have grown. However, in recent decades, the amount of waste recovered from the waste stream to be reused, recycled, or reprocessed has increased.
Recycling and landfills
The amount of solid waste disposed of to New Zealand landfills has reduced slightly from an estimated 3.180 million tonnes in 1995 to 3.156 million tonnes in 2006. Converted to tonnes of waste disposed of to landfill per thousand dollars of gross domestic product (GDP), the estimated waste disposed of in 2006 was 29 per cent lower than in 1995. The shift to increased recycling and reprocessing, and the introduction of user-charges to dispose of waste, has helped reduce the amount of waste disposed of to landfills.
In 1995, 327 landfills were in use in New Zealand. Many of these had poor environmental controls. Today, there are about 60 landfills in use. Of these, 54 per cent use engineered liners (these help minimise leachate entering and contaminating surface and groundwater systems), 77 per cent collect leachate (liquid produced in landfills through the decomposition of waste), and 23 per cent recover landfill gas. New Zealand also has about 300 cleanfills across the country; these sites accept material that is not harmful to the environment when buried.
Recycling rates are increasing. In 2006, 73 per cent of New Zealanders had access to kerbside recycling, up from 20 per cent in 1996, and 97 per cent had access to either kerbside recycling or drop-off centres.
In 2005, 329,283 tonnes of paper, plastic, card, glass, steel, and aluminium collected through municipal recycling were diverted from being sent to landfills. When commercial waste is included, the total amount of material diverted from landfills is estimated to be about 2.4 million tonnes a year.
However, despite these advances, many potentially useful materials continue to be disposed of to New Zealand landfills and cleanfills. Organic (mostly garden and food) waste, timber, and construction and demolition waste make up nearly 50 per cent of waste disposed of to landfills.
Hazardous waste flows and treatment of wastewater
Quantities of hazardous waste are not yet well understood in New Zealand because of a lack of available data. A significant portion of hazardous waste is liquid and disposed of to the sewerage system, where it is treated at one of the country’s 320 wastewater treatment plants.
Wastewater treatment plants discharge approximately 1.5 billion litres of domestic wastewater daily into the sea and other waterways, and onto land. Sewage sludge (biosolids) is removed from the wastewater during treatment and has, traditionally, been disposed of in landfills. Each year, wastewater treatment plants, serving almost 30 per cent of the country’s population divert about 155,000 tonnes of sewage sludge to beneficial uses such as land reclamation, application to forested land as fertiliser, and blending with green waste to produce compost.
Present and future management
Since 1997, waste management in New Zealand has focused on managing the human health and environmental effects of waste, primarily by putting in place standards for waste disposal.
Today, many businesses, householders, and communities are paying greater attention to minimising the amount of waste they generate and dispose of. This reflects an international shift towards using valuable natural resources more efficiently, and reducing the costs associated with production and disposal of waste. Producers are also taking greater responsibility for reducing the environmental effects of their products, from manufacture to disposal. Consumer purchasing choices will increasingly drive the 'green design' of products, including products which produce less waste throughout their life cycle.
In the future, the minimisation of waste generation and disposal is likely to remain a focus for New Zealand. In particular, attention is likely to focus on reducing the levels of potentially valuable wastes such as organic waste, construction and demolition waste, and some hazardous wastes. A further challenge is to improve the monitoring of waste flows. | <urn:uuid:90c525c9-4541-4f52-b5a6-66ef932628f1> | CC-MAIN-2020-40 | https://www.mfe.govt.nz/publications/environmental-reporting/environment-new-zealand-2007/chapter-6-waste | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400209999.57/warc/CC-MAIN-20200923050545-20200923080545-00608.warc.gz | en | 0.943435 | 883 | 3.453125 | 3 |
Excess weight is one of the less graceful side effects of pregnancy. For some women, the weight is easily shed after giving birth, and within a year they are back in their pre-pregnancy jeans. For others, it’s not as easy. Based on a new study, those who fail to lose their baby weight within a year of giving birth are faced with more serious complications than just a fuller figure. Failure to lose excess baby weight increases the risk for diabetes and heart disease.
The experiment, led by Dr. Ravi Retnakaran, followed 305 obstetrical patients at Mount Sinai Hospital in Canada. It was the first study to measure women’s weight patterns a year after they had given birth and check them for metabolic and cardiovascular risk factors. Results showed that nearly three-quarters of the women were able to successfully lose some weight a year after giving birth. These women were also able to maintain healthy levels of cholesterol and blood pressure.
For the quarter of women who were unable to lose any weight by the year after they gave birth, researchers saw a clear increase in risk factors for diabetes and cardiovascular disease. The test results prove a clear correlation between failure to lose weight between three and 12 months after giving birth and difficulties with blood pressure, cholesterol, and insulin. “This finding helps us to advise women about the importance of losing their excess pregnancy weight in the first year after delivery,“ Retnakaran explained in a recent press release.
Although it was already suspected that failure to lose pregnancy weight had the potential to cause health complications, the study yielded some ground-breaking results regarding a window of opportunity in regard to weight loss. Research showed that increased health factors observed 12 months after giving birth had not been present at three months after giving birth.
“That means that the nine-month window leading up to one year after birth is a critical time for women to ensure that they are losing at least some of their pregnancy weight," Retnakaran concluded. Although the results are promising, more research needs to be conducted in order to help women maintain a healthy weight after they give birth. The study hopes to widen its scope and test the weight and metabolic risk factors of women up to two or three years after they have given birth.
Source: Kew S, Ye C, Hanley AJ, et al. Cardiometabolic Implications of Postpartum Weight Changes in the First Year After Delivery. Diabetes Care. 2014 | <urn:uuid:73b71c9a-4111-432a-bdde-d91d6b2bfe3e> | CC-MAIN-2017-04 | http://www.medicaldaily.com/losing-baby-weight-increased-diabetes-heart-disease-risk-women-who-dont-drop-extra-pounds-1-year | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284376.37/warc/CC-MAIN-20170116095124-00398-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.972393 | 500 | 2.90625 | 3 |
The Assyrian Empire was one of the most powerful military forces in the Middle East. From the 14th to the 8th century BC, it grew from a defense of the Assyrian farming heartlands to a swathe of conquered territory running from the Mediterranean Sea to the Persian Gulf.
How did the Assyrians rise to such dominance?
The striking strength of Assyrian armies came from their chariots.
The chariot was in use in the Assyrian region in the 13th century BC. It was developed by the Hurrian and Mittian people into a useful weapon of war. These early chariots were heavy vehicles drawn by four horses, more like transport wagons than the battle implements of later centuries. They provided a mobile platform from which attacks could be made and a quick way of moving around the battlefield. They were not very maneuverable.
As the centuries progressed, these wagons developed into agile two-wheeled chariots. They allowed Assyrian chariot teams to race around the battlefield launching powerful and sudden attacks. Initially, they were ridden by two men – one driving and the other fighting with either a lance or a bow. In later centuries, a shield-bearer or two was added, providing greater protection for those on board.
The Assyrians employed chariots in two ways. Sometimes they were used as shock troops at the center of an attack, breaking the strength of massed infantry. At other times they were used on the wings, harassing and surrounding the enemy.
Horses were so important to Assyrian warfare that raids were made especially to capture more. Lists of horse supplies were maintained.
The most effective tool of the Assyrian infantry was the bow. Many men were equipped with spears, but it was the bow that allowed the massed Assyrians to outfight their foes in open battle, in skirmishes in broken terrain, and in siege warfare.
The bows in Assyrian armies varied wildly. Some were composite weapons while others were simply made of wood. Arrows heads were usually metal, but some arrows were tipped with bone or flint. Tail feathers were obtained from eagles or vultures to make the flights.
Flaming arrows referred to as the “messenger of death,” were used when attacking wooden buildings and crops.
Formations of archers included shield bearers to protect the vulnerable bowmen. These shields were as tall as a man and sometimes curved over at the top to protect the archers from falling missiles.
An Organized Army
The troops were effectively deployed thanks to a very organized army.
The Assyrian Kings had a royal bodyguard, including a contingent of foreign troops, which provided a permanent fighting force and professional core for the military. The bulk of soldiers were raised by a mass levy from across the nation. Farmers, hill men, and nomads joined to provide a significantly large force.
There was a permanent branch of the civil service which kept a census of the Empire’s citizens. They could then be called up for tasks such as public building projects and wars.
Once raised, the army worked within a well-defined structure. At the head was the King. Next was a field marshal responsible for the details of running the military. There followed a clear chain of command down to the officers running units of ten men.
Large units were identified by standards showing divine symbols of gods such as Shamash (the sun) and Nergal (the god of destruction).
Supplies and Communications
Communication was essential to running large armies and bringing them to where they were needed.
Smoke signals and beacon fires were used to send pre-arranged signals over long distances, in particular warnings of an attack. Fires placed half a kilometer apart carried news of attacks and defeats.
Within the army, mounted messengers and runners on foot carried orders and reports.
The Assyrians were also organized with their supplies. In enemy territory, they often lived off the land, pillaging as they went. Within the Empire, stores were located at provincial centers to provide food for the soldiers. Travel rations kept them fed on the march.
The Middle East contained some of the world’s earliest fortified towns and the Assyrians inevitably ran up against these. Considering their formidable resources, they were extremely successful in their siege works.
On facing a fortified city, the Assyrians used starvation rather than assault. They built earth walls around a city and pillaged the surrounding land, ensuring that inside the citizens struggled for supplies. They would then hurl threats, propaganda, and orders to surrender at the people trapped within. No-one was allowed out until the city capitulated. The message was clear; there was only pain and starvation for those who held out.
When it came to attacking, the Assyrians used a formidable array of weapons, building on the existing technology of the region. Earth ramps and causeways allowed them better access to defenses. Heavy battering rams were hauled into place by beasts and men. Devices to soak these in water prevented the defenders from setting them alight.
When a river defended a town, the Assyrians built a siege tower and floated it downstream into position. From there, they gained considerable firepower against the people within the walls.
Through a systematic approach to conquest, the Assyrians achieved a lasting expansion. The rulers of newly raided areas were forced to swear an oath binding them to obey the Assyrians or face further invasion. Satellite kingdoms were established. If the leaders got out of hand, the Assyrians moved in and conquered all their land.
Satellite rulers were obliged to provide troops and supplies. Supply depots and communication networks allowed the Assyrians to operate in these areas. By bringing each new area under tight control before moving on to the next, the Assyrians maintained their growth.
Through their careful organization, systematic strategy, strong tactics and technology in both battle and siege, they conquered a large swathe of the known world.
General Sir John Hackett, ed. (1989), Warfare in the Ancient World.
William Weir (2006), 50 Weapons that Changed Warfare. | <urn:uuid:02e75294-f190-4da9-9d59-60ef99dfa85c> | CC-MAIN-2023-06 | https://www.warhistoryonline.com/ancient-history/assyrian-armies-dominated.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00007.warc.gz | en | 0.981219 | 1,265 | 4.1875 | 4 |
In this post, I’m going to talk a little about passive and active voice.
What exactly is passive voice? Simply put, passive voice occurs when the subject performing the action is not the focus of the sentence. Typically, you can identify passive voice with the following formula:
“to be” words + past participle = passive voice
What are “to be” words?
Is, are, am, was, were, has/have/had been, will be, will have been, being.
What is a past participle?
A form of a verb that typically (not always) ends in -ed.
Example of passive voice:
The city was destroyed by the explosion.
The explosion destroyed the city.
Another example of passive voice:
Burning meteors were streaking across the sky.
Burning meteors streaked across the sky.
So, how did I fix those sentences?
First thing you need to do is determine what the subject is. In the first example “The city was destroyed by the explosion”, “explosion” is the subject performing the action. Move the subject to the front of the sentence. “The city was destroyed by the explosion” becomes “The explosion the city was destroyed”.
Obviously, this makes no sense, so what now? Next, identify the verb. The verb in this sentence is “was destroyed”. Move those words to follow the subject. Now, we have “The explosion was destroyed the city”. Closer, but still not quite right.
Finally, remove the “being” verbs. In this example, “was” is the verb in question. This leaves us with, “The explosion destroyed the city.” Tada!
Not all passive writing is bad or unnecessary. In fact, sometimes you need passive voice. Keep in mind that a little passive voice most likely is not going to ruin your story. What really matters is the content of that story and, as always… | <urn:uuid:7d8b67d8-dee2-44b7-9fbf-bf16cfbf47a6> | CC-MAIN-2021-31 | https://authorallisonmoore.com/2019/11/09/leave-the-passive-in-the-past/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155458.35/warc/CC-MAIN-20210805063730-20210805093730-00262.warc.gz | en | 0.961469 | 433 | 3.84375 | 4 |
Dehydration, breathing through your mouth and certain medications can interfere with saliva production. Saliva protects teeth from acid and bacteria which can lead to plaque and enamel erosion.
– Drink plenty of water
– Check with your GP if your medication is making your mouth feel dry
– See your dentist if bad breath is becoming an issue
A dry mouth can lead to dental problems so talk to your dentist or doctor if you think you suffer from this condition.
“Our teeth are meant to be constantly bathed in saliva for a reason!”
Full article here: | <urn:uuid:e4ddd577-8f2b-4b4a-9944-482ddb72e512> | CC-MAIN-2017-39 | http://sherwoodparkdental.co.uk/dry-mouth-cause-tooth-decay/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696696.79/warc/CC-MAIN-20170926212817-20170926232817-00703.warc.gz | en | 0.920592 | 118 | 2.78125 | 3 |
Walter Scott , Founder and Chief Technical Officer, DigitalGlobe
Walter Scott was driving home from a paintball game some 20 years ago when he came up with an idea that helped give rise to a $550 million U.S. commercial remote sensing industry that, through applications like Google Earth, has literally changed the way people see the world.
At the time, he was with the U.S. Department of Energy’s Lawrence Livermore National Laboratory, where he worked on space-related projects including the Brilliant Pebbles missile defense initiative. The geopolitical landscape was changing dramatically, with the end of the Cold War and breakup of the Soviet Union imminent. Communications and information technologies, meanwhile, were advancing at breakneck speed.
Scott saw an opportunity to commercialize an activity that until then had been the sole province of governments: the collection of high-resolution imagery by satellite. In 1992, Scott founded WorldView Imaging Corp., which is now known as.
With the 1992 Land Remote Sensing Policy Act providing the legal framework, WorldView in 1993 obtained a license to collect and sell satellite imagery sharp enough to distinguish ground objects as small as 3 meters across, detail that was unprecedented outside military and intelligence circles. As Scott describes it, getting the company off the ground proved to be 100 times more difficult than he hoped, but infinitely easier than he feared. Raising money to do something no company had ever done before was the hardest part, he says.
Technology also was an obstacle: WorldView and its competitors were plagued by an early string of launch and satellite failures. Once they got their initial satellites in orbit, the companies struggled financially until the U.S. government stepped in to become a major anchor customer, if only reluctantly.
Today, DigitalGlobe and competitorare major providers of satellite imagery to the U.S. government, primarily through contracts with the National Geospatial-Intelligence Agency (NGA) that helped finance some of their satellites. DigitalGlobe operates three spacecraft — Quickbird, WorldView-1 and WorldView-2 — that together can collect more than 500 million square kilometers of imagery a year.
The company went public last May and reported 2009 revenue of $282 million, about 82 percent of which came from government customers. DigitalGlobe recently submitted its bid for the NGA’s EnhancedView program, which will expand even further the government’s use of commercial satellite imagery.
Scott spoke recently with Space News staff writer Turner Brinton.
Did you expect the
commercial remote sensing industry would have such a government-dominated customer base?
We didn’t expect that the government would be as aggressive an early adopter of commercial remote sensing as it turned out to be. So when I wrote the original business plan for WorldView Imaging Corp., we actually thought the government would not be one of the first adopters. I think the desire to be able to share imagery with coalition partners was one of the primary drivers for the government becoming an early adopter. In some respects, U.S. government involvement in the industry has been an accelerator of growth, because we’ve been able to profit and plow those profits back into developing new systems and expanded capabilities.
Would you say the commercial side of your business hasn’t grown as quickly as you would have thought?
Actually it’s done pretty well. We’ve had double-digit revenue growth over the last five years.
Do you think your industry has been hampered by
Yes and no. I’ll say in general the regulatory regime in the United States has been pretty forward-leaning, except in the sense that it tends to lag behind what foreign capabilities can provide. I don’t think regulations have hampered the growth of the electro-optical imaging industry. So far, we’ve been able to expand the industry dramatically, particularly over the past five years. We’re starting to see international competition emerge that in some cases can offer imagery with resolution that approaches what we can offer domestically. So that’s something we have to pay attention to.
But if you look at radar, for example, I think there’s no domestic commercial radar industry in large measure because of the imposed restrictions. That, combined with the fact that we’ve had millions of years of evolution looking at optical pictures that we haven’t had with looking at radar pictures, and I think basically that’s why you’ve seen radar go abroad.
Is there commercial demand for
radar satellite capability?
Yes and no. It’s really a function of what the product is. If the product is radar pixels, then it’s probably limited to a small set of government users. But if instead you combine radar with other types of data to do things like finding ships, or using radar as another color, I think there may be value in that. What we’re seeing with WorldView-2 is that the additional four color bands we have really add a lot of information to images. You can pull things out automatically that previously required a human in the loop.
Do you think exquisite imagery will always be the domain of the government?
Yes, but the definition of exquisite changes. My definition of the exquisite means anything that is bleeding edge and really pushes the limits of technology. That’s something the government does well. Generally speaking, it has the staying power and the willingness to tolerate risk to push the envelope. In general it’s been the government that’s pushed space technologies along. Commercial companies are really good at operating technologies efficiently once they have been developed and offering more for less. We’ve consistently increased volumes and decreased costs. It doesn’t make sense for the government to do things that can be done commercially.
Early on, the companies in this industry sought to get a piece of the billion-dollar aerial photography market. Why do you think that never really happened?
The aerial photography industry is really about custom collection. Satellite constellations historically just haven’t had short enough revisit rates to meet many needs served by aerial photography. But what you’re starting to see now, certainly with our constellation, are daily revisit times. We collected the whole country of Haiti in a single day and actually imaged the country many times over in the period after the recent earthquake there. That’s the kind of currency that begins to enable applications that were previously project-based.
The other piece to the aerial story is you can fly airplanes as low as you want. You can collect 10-centimeter imagery with an airplane if you want to. Technological limitations and government regulations prevent us from doing things like that. So there’s always going to be a tier where aerial is the right answer.
You gave away imagery of
to relief organizations after the earthquake. Do you have a policy of giving away imagery under certain circumstances?
It’s generally bad business to have a business dependent on the misfortune of others. So we try to do the right thing. We don’t see that as a revenue loss, because we don’t think a lot of relief organizations are in a position to go buy the imagery. Not only are we not losing revenue, but we are doing the right thing, and down the road there will be opportunities aplenty to monetize the imagery we’ve collected over that area.
What do you think is the next big thing in commercial remote sensing?
There are really three pieces of the problem. One is getting enough accurate pixels with enough frequency over enough of the globe. I think we are doing a pretty good job as an industry in doing that. The second piece is accessibility. It doesn’t matter how great the satellite is at collecting pixels and streaming them down into an archive if there’s not a good way of widely distributing them in a timely manner. So we’ve been making investments in global content dissemination systems where we pre-stage servers, for example, in Europe, to get data out to users faster. Web services and open standards make it really easy to integrate. The last piece is the things that you do with the imagery. The application of yesterday and today is being able to pull up a satellite imagery map. It’s really cool, I can see my house from space, but what can you now start doing with that imagery? For example, Google Maps doesn’t really pull up elevation information. If I want to do something like put up cellular towers, I need elevation information. So products like that are part of the future. Collecting images is just a starting point.
What kinds of technological advancements have been made since WorldView-2 was designed that you might be able to leverage for the EnhancedView program?
I can’t say much because there’s an active procurement going on and we are a public company. I will say when we started designing WorldView-2 in 2003, the main advancement was moving to a larger 1.1-meter aperture and eight spectral bands. There’s still quite a bit of territory to be mined just as a result of those improvements.
Have you started doing any work on your next satellite?
I can’t comment. | <urn:uuid:15aebe22-9c8e-46cd-89a7-33d06b82aa8e> | CC-MAIN-2022-49 | https://spacenews.com/walter-scott-founder-and-chief-technical-officer-digitalglobe/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710890.97/warc/CC-MAIN-20221202014312-20221202044312-00766.warc.gz | en | 0.959083 | 1,933 | 2.84375 | 3 |
Critical Reactions in Modeling the Jovian Ionosphere
Find this in a Library
Jupiter's upper atmosphere is composed mostly of H2 and He with significant mixing ratios of hydrocarbons near and below the homopause. Photoionization by solar EUV and photoelectron impact ionization produces an ionosphere that is characterized by H+ at high altitudes and hydrocarbon ions at low altitudes. A large number of chemical reactions involving hydrogen-, helium- and carbon-containing ions have been included in models of the Jovian ionosphere. Explaining the electron density profiles measured by spacecraft radio occultation experiments has proved problematic. Some of the difficulty is due to incomplete information on chemical reactions in three categories: (1) vibrational state specific reactions of H2, (2) reactions of hydrocarbons and hydrocarbon ions with more than two carbon atoms, and (3) three-body reactions of meteoric metallic ions. At high altitudes, the major ion H+, which has a long life time, can be destroyed efficiently by reaction with H2(v > 3), resulting in significant reduction of the electron densities. Reliable reaction coefficients for reactions that produce, destroy, and exchange vibrational levels of H2 are crucial to modeling the density profile of H2(v > 3). At low altitudes, complex hydrocarbon ions are expected to be produced at significant rates, especially in the auroral regions where particle precipitation produces ionization near and below the homopause. Complex hydrocarbon ions may play an important role of forming upper atmospheric haze that are observed in the Jovian polar region. Current models include explicitly reactions of hydrocarbon ions up to two carbon atoms, but the link to haze formation is speculative. Rate coefficients for various carbon-adding reactions as well as carbon bond-breaking reactions involving CnHm+(n > 2) are needed to understand quantitatively the polar haze formation. In addition to endogenic ions, meteoric ions have recently been included in Jovian ionospheric models to explain the large electron densities measured under predawn conditions. Since some of meteoric ions, particularly Fe+, Mg+, Na+ do not react with H2 or hydrocarbons in two-body interactions, they dominate the ionosphere in the region of the hydrocarbon ions, which may account for the predawn electron density profiles measured by radio occultation experiments. These metallic ions, however, may react with H2 and/or hydrocarbons in three-body interactions, so their density profiles are uncertain. These three-body reaction rate coefficients are therefore crucial for models of meteoric ions. In addition to ion reactions, some of neutral reactions of hydrocarbons and meteoric atoms are important as well to explain the measured electron densities. We identify a list of critical reactions whose laboratory measurements could result in significant progress in understanding the Jovian ionosphere.
Kim, Y. H.,
& Fox, J. L.
(1999). Critical Reactions in Modeling the Jovian Ionosphere. Eos, 80 (17 - Spring Meeting Supplement). | <urn:uuid:6ce44959-682d-4357-a1fb-efaff06fa090> | CC-MAIN-2018-09 | https://corescholar.libraries.wright.edu/physics/540/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812579.21/warc/CC-MAIN-20180219091902-20180219111902-00540.warc.gz | en | 0.913022 | 632 | 2.921875 | 3 |
Deloading | Give Your Body a Break
The benefits found in resistance training seem to be endless, but those benefits are stunted due to chronic training sans a deloading week. Often, detraining and deloading are used interchangeably to describe the cessation or reduction of exercise; however, the difference between the two will elicit one of two responses, positive or adverse effects in the body’s physiological response.
Detraining is the complete cessation of all exercise or a dramatic reduction. Gym goers often think that detraining is a necessary component to anaerobic training adaptation enhancement, but the truth of the matter is that it provides the opposite effects. Detraining may result in a loss of muscular strength in as little as two weeks; however, the severity of force reduction will depend upon the length of the detraining phase. Not only will strength gains decrease, but muscle atrophy will continue to persist as the detraining period extends. Typical responses seen in detrained individuals include decreases in muscular strength and muscle fiber size, increases in body fat percentage, increases in capillary and mitochondrial density leading to increases in aerobic enzymes, as opposed to anaerobic, and decreases in short-term endurance and maximal oxygen uptake. While these changes aren’t ideal following detraining, the adaptations typically revert to pre-training levels.
Deloading differs from detraining in that it still employs training, but the frequency, intensity, volume or any combination of the three decreases. A semi-frequent deloading phase is essential to physiological growth in anaerobic training to prevent a plateau. Symptoms of overtraining include fatigue, muscle soreness, and the inability to adapt to known stimuli, this results in the maintenance of strength and muscular size, rather than growth, in addition to mental and physical exhaustion. Athletes may employ an active rest period which gives the body a break, but not so much so that the symptoms of detraining begin to occur. The deloading phase occurs within a larger active rest period and lasts for one week to ensure that maladaptation does not occur. The deload period not only provides the body with the necessary rest for growth, but it prepares it for increased and changing demands of the upcoming training program. The larger active rest phase may consist of a 1-4-week period composed of lighter intensity, volume, and the frequency with unstructured workouts and various recreational activities, typically not about the typical training stimulus.
Consequences of not participating in deloading phases will eventually lead to increased stresses both inside and outside of the gym, causing exhaustion that suppresses the bodies natural adaptation to stimuli. Training may still be performed through the stress and exhaustion phase; however, will yield little results. To allow growth to occur, some form of deloading must happen every few months for at least one weeks’ time. | <urn:uuid:755593c6-ae8d-4af7-9db9-8943caeb6036> | CC-MAIN-2018-34 | https://mindandmuscle.net/articles/give-body-break-deloading/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213737.64/warc/CC-MAIN-20180818193409-20180818213409-00441.warc.gz | en | 0.940489 | 581 | 2.90625 | 3 |
In the annual State of the Union address, President Barack Obama addressed several policy areas of importance to the 56 million Americans with disabilities and their families. As the independent federal agency which advises the President and Congress on disability policy, the National Council on Disability (NCD) applauds the significant agenda proposed by the President and recommends the following actions to guarantee full participation and integration in all aspects of society for Americans with disabilities.
The President called for an increase in the minimum wage to $9.00 an hour by stating “in the wealthiest nation on Earth, no one who works full-time should have to live in poverty.”
NCD agrees. In 2010, statistics released by the U.S. Census Bureau revealed that nearly 28 percent of Americans with disabilities aged 18 to 64 live in poverty.
Today, hundreds of thousands of Americans with disabilities earn less than minimum wage under a little-known relic of employment policy that assumed people with disabilities were not capable of meaningful, competitive employment.
As the President said, “America is not a place where chance of birth or circumstance should decide our destiny. And that is why we need to build new ladders of opportunity into the middle class for all who are willing to climb them.”
Twenty three years after the passage of the Americans with Disabilities Act, the time has come for minimum wage to be available to everyone who works, including Americans with disabilities. Over a quarter of a million Americans with disabilities work under the Fair Labor Standards Act 14 (c) program resigning people with disabilities to earning less than minimum wages and the poverty, isolation and segregation that often results.
In our August 2012 Report on Subminimum Wage and Supported Employment, NCD recommended a gradual phase out of the 14 (c) program. The ladders our nation builds to opportunity must be accessible to every American – including those with disabilities. As America works toward increasing minimum wage, implementation of a comprehensive set of supports and targeted investments in integrated employment services to make it possible for people with disabilities to rise to the same heights as other Americans must also be assured.
In addition, the President announced a non-partisan commission to improve voting in America by emphasizing “our most fundamental right as citizens: the right to vote. When any Americans ... are denied that right ... we are betraying our ideals.” A Fact Sheet on the Voting Commission issued by the White House lists voters with disabilities and “physical barriers” among the issues to be corrected.
NCD appreciates inclusion of the difficulties faced by voters with disabilities as part of the Commission’s work. A Government Accountability Office (GAO) report found as recently as 2008, only 27 percent of polling places were barrier-free. In fact, the Federal Election Commission confirmed that, in violation of state and federal laws, more than 20,000 polling places across the nation are inaccessible, depriving Americans with disabilities of their fundamental right to vote. People with disabilities and senior citizens are particularly disenfranchised by long lines at polling places and by constraints on and, in some places, the discontinuation of early voting.
To address this disparity, NCD has been collecting the experiences of voters with disabilities in the November 2012 General Election from across the nation in coordination with the National Disability Rights Network and EIN SOF Communications. NCD will issue a report on our findings later this year.
NCD urges the Voting Commission to consider the findings of our upcoming report and to include voters with disabilities on their Commission.
The President also stressed the importance of key reforms to realize cost savings in the Medicare program, including the shift from a fee for service payment system to a managed care model designed to pay for performance. NCD understands the importance of shifting to payment models that both manage costs and increase quality for our health care financing infrastructure. However, it is crucial that people with disabilities and seniors retain the ability to have their needs met.
Over the last two years, NCD has conducted a detailed exploration of managed care within Medicaid, issuing comprehensive recommendations on due process safeguards, program design, performance measures and other facets of responsible managed care frameworks that consider the needs of Americans with disabilities without causing adverse consequences on the quality of care we receive. As the Administration considers various measures to enhance health care quality while controlling costs, NCD stands ready to apply this expertise to Medicare reforms.
As President Obama affirmed, “the responsibility of improving this union remains the task of us all.” NCD looks to continuing its role in developing and promoting robust disability policies in close collaboration with the Administration, Congress and the public.
-- Jeff Rosen, Chairperson
On behalf of the National Council on Disability | <urn:uuid:b93020c2-4158-41af-b672-ed383e04a8ca> | CC-MAIN-2016-07 | http://www.ncd.gov/newsroom/2013/021413 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163421.31/warc/CC-MAIN-20160205193923-00106-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.959571 | 948 | 2.53125 | 3 |
Chapter 1 – 60 points
Definition of organic compounds-two main elements-why carbon is so important
Organic compounds or organic molecule is a chemical which mainly contains carbon, forming carbon-carbon bonds and carbon-hydrogen.
Carbon is the key for:
-Diversity of compounds possible thanks to forms chaims easily
-Forms 4 covalent bounds, especially other carbom atoms and can form chains of carbom atoms with very strong bonds.
-Is a small atom.
Orbitals – s, p, d – shells/ capacities – electron configurations – core vs valence electrons
An orbital is a region in space where an electron has a high probability of being found.
There are four types of atomic orbitals, s, p, d and f. These atomic orbitals can be different shapes (s is a sphere, p a dumbbell,...). Atomic orbitals are organized in shells; up to two electrons are allowed in any orbital, so the first shell can contain up to two electrons (a duet), the second can contain up to 8 electrons (an octet) and the third shell can contain up to 18 electrons. There are infinite number of shells that are definied by the pricipal quantum number, n.
According to the Pauli´s exclusion priciple, no more than two electrons can occupy a single orbital; two electrons in the same orbital must have opposite spins.
And by Hund´s Rule, electrons in degenerate orbitals are more stable in separate orbitals.
Valence electron ae those occupying the lighest energy shell.
Core electrons occupy the remaining lower energy shells of the atom.
Covalent bond – How it forms – simgle/multiple bonds – Bonds length /strenght (trends)
A covalent bond is one of two types of fundamental bonds in chemistry. Is characterized by the sharing of valence electrons between two or more atoms. When some atoms share two or three pairs of electrons form a double or triple bonds, respectively. Double bonds are shorter and stronger than single bonds, and triple bonds are shorter and stronger than double bonds.
Electronegativyty – Scale/trends in Periodic Table – Polar vs Nonpolar covalent bonds – Bond dipoles – use of partial charges or dipole arrows
When two atoms are bond by a covalent bond and exists a inegual sharing is because they have different electronegativities (ability of an atom to attract electrons).
A polar bond is when atoms have different electronegativities and the most electronegativity attracts more strongly the electrons. Asymmetry occurs in the distribution of charges between the two atoms bonded.
A non polar bond is when atoms have the same electronegativity or the difference is compensated.
Bond dipole is the separation of charges along a bond, resulting a partial charges in a molecule with a positive charge in an extrem and a negative charge in the other extrem.
Ionic bonds – polyatomic ions
A ionic bonds occurs when the difference in… | <urn:uuid:f5c7b859-d83d-48a9-bbf8-d2ce92473270> | CC-MAIN-2018-51 | https://www.majortests.com/essay/Organic-Chemistry-Exam-1-Review-604368.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823009.19/warc/CC-MAIN-20181209185547-20181209211547-00265.warc.gz | en | 0.851877 | 640 | 3.859375 | 4 |
To easily check Body Voltage ground the Black Lead (to radiator or Earthing Product or Ground Plug) and hold the Red Lead between finger and thumb, or place on bare skin on the body. Take a reading while not earthed. You may need to adjust the AC Voltage Range by pressing the Range Button to obtain a reading.
Then test again while feet are on the Earthing Product to see how much Body Voltage has been reduced by. Using an Earthing Mat for example, you should see the AC Voltage reading drop into the low mV and to even 10ths of a mV. Can also be used to give an idea of the Resistance (therefore conductivity) of the Earthing Product. Full instructions provided. Will also measure flow of Free Electrons into the Body. | <urn:uuid:e7a8ab2c-dab2-4b82-aa8b-d1fa597cb5ad> | CC-MAIN-2021-31 | https://www.equilibrauk.com/product-category/barefoot-earthing-products/body-voltage-checker/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154320.56/warc/CC-MAIN-20210802110046-20210802140046-00395.warc.gz | en | 0.9355 | 159 | 2.53125 | 3 |
Found 2 items, similar to Ball cartridge.
English → English
Definition: ball cartridge
n : a general purpose cartridge having a primer and a ball and a
full charge of powder
English → English
Definition: Ball cartridge
(b[add]l), n. [OE. bal, balle; akin to OHG. balla,
palla, G. ball, Icel. b["o]llr, ball; cf. F. balle. Cf. 1st
, n., Pallmall
1. Any round or roundish body or mass; a sphere or globe; as,
a ball of twine; a ball of snow.
2. A spherical body of any substance or size used to play
with, as by throwing, knocking, kicking, etc.
3. A general name for games in which a ball is thrown,
kicked, or knocked. See Baseball
, and Football
4. Any solid spherical, cylindrical, or conical projectile of
lead or iron, to be discharged from a firearm; as, a
cannon ball; a rifle ball; -- often used collectively; as,
powder and ball. Spherical balls for the smaller firearms
are commonly called bullets
5. (Pyrotechnics & Mil.) A flaming, roundish body shot into
the air; a case filled with combustibles intended to burst
and give light or set fire, or to produce smoke or stench;
as, a fire ball; a stink ball.
6. (Print.) A leather-covered cushion, fastened to a handle
called a ballstock; -- formerly used by printers for
inking the form, but now superseded by the roller.
7. A roundish protuberant portion of some part of the body;
as, the ball of the thumb; the ball of the foot.
8. (Far.) A large pill, a form in which medicine is commonly
given to horses; a bolus. --White.
9. The globe or earth. --Pope.
Move round the dark terrestrial ball. --Addison.
10. (Baseball) A pitched ball, not struck at by the batter,
which fails to pass over the home plate at a height not
greater than the batter's shoulder nor less than his knee
(i.e. it is outside the strike zone). If the pitcher
pitches four balls before three strikes are called, the
batter advances to first base, and the action of pitching
four balls is called a walk.
[Webster 1913 Suppl. +PJC]
10. a testicle; usually used in the plural. [vulgar]
11. pl. courage; nerve. [vulgar]
Ball and socket joint
, a joint in which a ball moves within
a socket, so as to admit of motion in every direction
within certain limits.
, a mechanical device for lessening the
friction of axle bearings by means of small loose metal
, a cartridge containing a ball, as
distinguished from a blank cartridge, containing only
, a faucet or valve which is opened or closed by
the fall or rise of a ball floating in water at the end of
, a pivot of a spherical form, which permits
lateral deflection of the arbor or shaft, while retaining
the pivot in its socket. --Knight.
, the lever used in a ball cock.
Ball of the eye
, the eye itself, as distinguished from its
lids and socket; -- formerly, the pupil of the eye.
(Mach.), a contrivance by which a ball, placed
in a circular cup with a hole in its bottom, operates as a
(Mining), a sort of iron ore, found in loose
masses of a globular form, containing sparkling particles.
, or Three golden balls
, a pawnbroker's sign
on the ball
alert; competent and knowledgeable.
to carry the ball
to carry on the task; to assume the
to drop the ball
to fail to perform as expected; to fail to
live up to a responsibility.
Syn: See Globe
(k[aum]r"tr[i^]j), n. [Formerly cartrage,
corrupted fr. F. cartouche. See Cartouch
A complete charge for a firearm, contained in, or held
together by, a case, capsule, or shell of metal, pasteboard,
or other material.
, a cartridge containing a projectile.
, a cartridge without a projectile.
, a cartridge in which the fulminate
occupies an axial position usually in the center of the
base of the capsule, instead of being contained in its
rim. In the Prussian needle gun the fulminate is applied
to the middle of the base of the bullet.
, a cartridge in which the fulminate is
contained in a rim surrounding its base.
, a bag of woolen cloth, to hold a charge for
, a belt having pockets for cartridges.
, a case, usually of leather, attached to a
belt or strap, for holding cartridges.
(a) A thick stout paper for inclosing cartridges.
(b) A rough tinted paper used for covering walls, and also
for making drawings upon. | <urn:uuid:8e8a57b8-4e20-400d-a6fe-818333d8da35> | CC-MAIN-2019-35 | http://kamus.landak.com/cari?emang=Ball%20cartridge | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027323067.50/warc/CC-MAIN-20190825042326-20190825064326-00559.warc.gz | en | 0.830781 | 1,133 | 3.125 | 3 |
As a part of the ongoing National Historic Publications and Records Commission (NHPRC) grant to process the Center’s Depression-era collections, the AHC has created several new finding aids for anti-trust collections that were previously unprocessed. The Oxford English Dictionary defines anti-trust as “Opposed to trusts or similar monopolistic combinations.” Anti-trust law is also known as competition law and refers to law that promotes or maintains market competition by regulating anti-competitive conduct by companies (Wikipedia). At any rate, the 20th century saw a flurry of anti-trust legislation and other measures to prevent the growth of monopolies by corporations. These lawyers’ papers reflect such efforts.
Hugh Baker Cox (1905-1973) was one such lawyer. Cox worked in the anti-trust division of the U.S. Department of Justice during the 1930s and early 1940s. He also served on the Board of Economic Warfare in London, concentrating on economic intelligence activities. Perhaps most notably, Cox worked on federal policy formulation regarding a dispute between Montgomery Ward and the National War Labor Board which resulted in the seizure of the company under presidential executive order.
Paul H. LaRue was an anti-trust lawyer who worked with the Federal Trade Commission (FTC) in Washington, D.C. first as a trial lawyer and later as attorney-adviser to the FTC commissioner in the early 1950s. After, he moved to Chicago and joined the firm Chadwell, Keck, Kayser, & Ruggles in 1958. There, he was a public member of the Illinois Conflict of Interest Laws Commission. LaRue authored many works on anti-trust publications. Earl W. Kintner (1912-1991) also worked as a trial lawyer with the FTC and went on to become chairman from 1959 to1961. Kintner was a proponent of industry self-regulation while simultaneously enforcing anti-trust measures. He also published and lectured on antitrust law, trade practices, and administrative law.
Philo Clarke Calhoun (1889-1964) was an anti-trust lawyer who often partnered with another anti-trust notable, Judge Thurman Arnold. Together, the two are remembered as some of the New Deal’s most iconoclastic “trust-busters.” However, Calhoun had another, decidedly less aggressive hobby – Dickens scholarship. Calhoun was an expert on rare editions of Charles Dickens’s works, and also enjoyed hymnology.
Finally, Louis B. Schwartz was an attorney and lawyer known for his work on anti-trust laws and penal code reform. A legal scholar, Schwartz taught at a number of institutions, including Pennsylvania State University, the University of California’s Hastings College of Law, Harvard, Cambridge, and others. Schwartz served as a member of the Attorney General’s National Committee to Study the Anti-trust Laws from 1954-1955 and director of the National Commission on Reform of Federal Criminal Law from 1968-1971.
–Kathryn Brooks, Processing Archivist | <urn:uuid:255c1801-086d-4fbf-988f-3f02897bd4ad> | CC-MAIN-2016-07 | https://americanheritagecenter.wordpress.com/2012/01/17/new-anti-trust-finding-aids-available/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701160958.15/warc/CC-MAIN-20160205193920-00343-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.976969 | 629 | 2.65625 | 3 |
||This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. (July 2014) (Learn how and when to remove this template message)|
A reverberatory furnace is a metallurgical or process furnace that isolates the material being processed from contact with the fuel, but not from contact with combustion gases. The term reverberation is used here in a generic sense of rebounding or reflecting, not in the acoustic sense of echoing.
Chemistry determines the optimum relationship between the fuel and the material, among other variables. The reverberatory furnace can be contrasted on the one hand with the blast furnace, in which fuel and material are mixed in a single chamber, and, on the other hand, with crucible, muffling, or retort furnaces, in which the subject material is isolated from the fuel and all of the products of combustion including gases and flying ash. There are, however, a great many furnace designs, and the terminology of metallurgy has not been very consistently defined, so it is difficult to categorically contradict the other view.
Applications and comparison with blast furnace
The applications of these devices fall into two general categories, metallurgical melting furnaces, and lower temperature processing furnaces typically used for metallic ores and other minerals.
A reverberatory furnace is at a disadvantage from the standpoint of efficiency compared to a blast furnace due to the spatial separation of the burning fuel and the subject material, and it is necessary to effectively utilize both reflected radiant heat and direct contact with the exhaust gases (convection) to maximize heat transfer. Historically these furnaces have used solid fuel, and bituminous coal has proven to be the best choice. The brightly visible flames (due to the substantial volatile component) give more radiant heat transfer than anthracite coal or charcoal. Contact with the products of combustion, which may add undesirable elements to the subject material, is used to advantage in some processes. Control of the fuel/air balance can alter the exhaust gas chemistry toward either an oxidizing or a reducing mixture, and thus alter the chemistry of the material being processed. For example, cast iron can be puddled in an oxidizing atmosphere to convert it to the lower-carbon mild steel or bar iron. The Siemens-Martin oven in open hearth steelmaking is also a reverbetratory furnace.
Reverberatory furnaces (in this context, usually called air furnaces) were formerly also used for melting brass, bronze, and pig iron for foundry work. They were also, for the first 75 years of the 20th century, the dominant smelting furnace used in copper production, treating either roasted calcine or raw copper sulfide concentrate. While they have been supplanted in this role, first by flash furnaces and more recently also by the Ausmelt and ISASMELT furnaces, as they are very effective at producing slags with low copper losses.
The first reverberatory furnaces were perhaps in the medieval period, and were used for melting bronze for casting bells. They were first applied to smelting metals in the late 17th century. Sir Clement Clerke and his son Talbot built cupolas or reverberatory furnaces in the Avon Gorge below Bristol in about 1678. In 1687, while obstructed from smelting lead (by litigation), they moved on to copper. In the following decades, reverberatory furnaces were widely adopted for smelting these metals and also tin. They had the advantage over older methods that the fuel was mineral coal, not charcoal or 'white coal' (chopped dried wood).
In the 1690s, they (or associates) applied the reverberatory furnace (in this case known as an air furnace) to melting pig iron for foundry purposes. This was used at Coalbrookdale and various other places, but became obsolete at the end of the 18th century with the introduction of the foundry cupola, which was a kind of small blast furnace, and a quite different species from the reverberatory furnace.
Today, reverberatory furnaces are widely used to melt secondary aluminium scrap for eventual use by die-casting industries.
The simplest reverberatory is nothing more than a steel box lined with alumina refractory brick with a flue at one end and a vertically lifting door at the other. Conventional oil or gas burners are placed usually on either side of the furnace to heat the brick and the eventual bath of molten metal is then poured into a casting machine to produce ingots.
- W G Davenport, "Copper extraction from the 60s into the 21st century," in: Proceedings of the Copper 99–Cobre 99 International Conference. Volume I—Plenary Lectures/Movement of Copper and Industry Outlook/Copper Applications and Fabrication, Eds G A Eltringham, N L Piret and M Sahoo (The Minerals, Metals and Materials Society: Warrendale, Pennsylvania, 1999), 55–79.
- J L Bill, T E Briffa, A S Burrows, C R Fountain, D Retallick, J M I Tuppurainen, J S Edwards, and P Partington, "Isasmelt—Mount Isa copper smelter progress update," in: Sulfide Smelting 2002, Eds R L Stephens and H Y Sohn (The Minerals, Metals and Materials Society: Warrendale, Pennsylvania), 2002, 181–193.
- Japanese studied with the book then built furnace, book titled The Casting Processes at the National Iron Cannon Foundry in Luik (present-day Liège), 1826 written by Huguenin Ulrich(1755-1833) Ref:Science and industry:Ulrich Huguenin (1755-1833) and http://d-arch.ide.go.jp/je_archive/society/wp_je_unu8.html
- Encyclopædia Britannica, 14th ed.
- J. Day & R. F. Tylecote (eds.), The Industrial Revolution in Metals (1991)
- P. W. King, "The Cupola at Bristol", Somerset Araeology and Natural History 140 (for 1997), 37–52.
- P. W. King, "Sir Clement Clerke and the Adoption of coal in metallurgy", Transactions of the Newcomen Society 73(1) (2001–2), 33–53.
- Media related to Reverberatory furnaces at Wikimedia Commons | <urn:uuid:0bb7d1c6-4b78-426d-8231-6f5507f397f1> | CC-MAIN-2016-50 | https://en.wikipedia.org/wiki/Reverberatory_furnace | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542932.99/warc/CC-MAIN-20161202170902-00021-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.912695 | 1,361 | 3.59375 | 4 |
Answer not a fool according to his folly,So do we answer the fool or not?
lest you be like him yourself.
Answer a fool according to his folly,
lest he be wise in his own eyes. (Proverbs 26:4-5)
There are a couple responses to be made to this. Firstly, it must be remembered that the book of Proverbs contains proverbs: aphorisms that are generally true. Pointing to isolated cases that don't conform to the rule is hardly proof of their error. That being said, if they are generally true, how can opposite claims both be generally true?
For starters they could be suggestions that are both true in different situations. Situations can differ according to the nature of the folly (refute the facts, don't imitate the demeanour); or the foolish claim (refute some claims not others).
But the biggest clue comes in looking at the larger context. The first 12 verses of chapter 26 (save the second verse) discuss the problem of dealing with fools. Fools are not due honour, do not learn from their mistakes, misuse proverbs, and generally cause problems to all those around them. The problem here is not Solomon's proverb, it is the fool. Because he is a fool no matter how you deal with him everything turns to custard.
There is a somewhat similar type of proverb in English: You are damned if you do and damned if you don't. No one thinks this proverb is nonsense, it basically means the issue is intractable: no matter which course you take it will fail or someone will be unhappy. It is the same problem with the fool. He needs to be rebuked for his foolishness yet even doing that risks that we might imitate him. | <urn:uuid:60180b9f-6a34-4ee4-8e09-e00f5f3ff847> | CC-MAIN-2017-30 | http://bethyada.blogspot.com/2015/09/answering-fool.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423812.87/warc/CC-MAIN-20170721222447-20170722002447-00634.warc.gz | en | 0.971766 | 362 | 2.53125 | 3 |
By: CBC News
Trees in Newfoundland and Labrador may be doing a better job than anyone thought at pulling carbon dioxide out of the atmosphere.
Why this is the case, however, is not clear.
A research scientist at Memorial University, who has been studying how trees in Newfoundland and Labrador’s boreal forest are becoming more efficient at removing carbon from the atmosphere, is determined to find the answer.
“The specifics of this program [are] really to investigate nutrient and carbon dynamics which tell us a lot about how forests will contribute, perhaps, to taking up carbon dioxide, or in fact, releasing it,” said Susan Ziegler, Canada Research Chair in Environmental Science at Memorial University,
Ziegler is using her research to examine precisely how the province’s forests are managing carbon.
She said that her research also focuses on important carbon stores in the soil.
“A lot of our work so far has suggested, in the systems that we’re looking at that where we’ve got lots of moisture, that there’s actually increases in productivity with climate change, and the carbon stocks seem to remain fairly stable, which is a good thing,” she said.
In other words, trees in the boreal forest are becoming more efficient at taking carbon out of the atmosphere, and Ziegler said she is now looking at the implications and limits of that.
‘We get a really good understanding of what we’re expected to undergo in these kinds of systems in the future.’- Dr. Susan Ziegler
Since 2008, Ziegler has been establishing a platform of research spanning along Newfoundland’s west coast and in southern Labrador.
She said the area covers a range of climates that parallel what is expected to happen with climate change within the next 100 years.
“This allows us to really investigate how the ecosystems are responding to differences in climate by looking at the same kinds of forest systems, and in doing that, we get a really good understanding of what we’re expected to undergo in these kinds of systems in the future,” Ziegler told the Central Morning Show.
Awarded federal grant funding
Her work in the future be bolstered by a $500,000 federal grant through the Strategic Partnership Grant program offered by the Natural Sciences of Engineering Research Council of Canada.
She said she is now working with Canadian Forest Service in Corner Brook and the province’s Centre for Forest Science and Innovation to examine climate change impacts on forest resources and provide information on how to best manage natural resources.
By: CBC News | <urn:uuid:50393618-2764-4101-a414-6ba1f1561cd8> | CC-MAIN-2019-43 | https://www.workingforest.com/studying-trees-mun-scientist-looks-boreal-forest-climate-research/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986684425.36/warc/CC-MAIN-20191018181458-20191018204958-00274.warc.gz | en | 0.952626 | 540 | 3.546875 | 4 |
Add Up to 10 Bingo
- This game is easy to take home!
Click here to view the Standards Addressed
Value of Playing Add Up to ___ Bingo:
Level: Grades 1-3
Recommended # of Players: 2-5, can also be played with whole class.
Materials: game boards (one per player); transparent or semi-transparent chips (to cover numbers on game boards so that numbers can be seen through the chips); triangle cards (the sum is always written on the top in red)
Math Skills: Missing addends (to 12)
Number Sense with Missing Addends: The Add Up To __ Bingo family of games is a simple and fun way to encourage students to think about the relationships among numbers and operations. This game is designed so that students are looking for a missing addend, (6+__=10) which invites reasoning about the inverse relationship between addition and subtraction. Over time, this game has the potential to help students mentally manipulate numbers, increasing their mathematical fluency and developing a strong foundation of number sense.
Spatial Reasoning: The game provides an added benefit of asking students to think spatially – not only considering their horizontal and vertical options, but also the diagonal. Often, students are being asked to consider multiple options at once. They must begin to reason about which space will be most beneficial to them and where are they most likely to achieve 5 in a row. Advanced thinkers will begin to consider probability as the stack of possible numbers diminishes. They will begin to realize that if there are only two 4’s and if both have been played, waiting for a 4 to complete their row is not strategically wise. As a challenge to these students, a dice with the target number of sides can be substituted for the triangle cards.
Social Benefits: All students are able to be actively engaged throughout the game. As each card is shown, each student must either find or defend the solution and then place a chip on their board. There is little “down time†when a student is waiting to participate.
Click on the icons below to print out game boards and cards. | <urn:uuid:8f3dc484-bda3-4d2c-915e-12b2c8c7008b> | CC-MAIN-2015-22 | http://www.uni.edu/coe/special-programs/regents-center-early-developmental-education/ceestem/games/math-games/addition-gam-0 | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207932596.84/warc/CC-MAIN-20150521113212-00272-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.956615 | 449 | 3.515625 | 4 |
- Code EMSC4117
- Unit Value 6 units
- Offered by Research School of Earth Sciences
- ANU College ANU Joint Colleges of Science
- Course subject Earth and Marine Science
- Academic career UGRD
- Mode of delivery In Person
First Semester 2017
See Future Offerings
This course is for Honours students
The influence of changing pressure, temperature and chemical environment on the origin and occurrence of different classes of minerals and rocks will be discussed. Rocks and minerals are investigated in hand specimens and in thin sections under the microscope. Simple phase relations and phase diagrams relevant to important mineral groups will be examined, in the context of explaining formation and properties of minerals and rocks. Other aspects explored will be the characteristics and economic significance of the most important ore and gem minerals, and the properties of minerals that may cause health problems.
Laboratory: Practical work will give students skills in physical, microscopic, instrumental analytical and numerical techniques necessary for the identification and study of natural minerals and rocks.
Note: Honours students attend joint classes with undergraduate students and graduate students but are assessed separately.
Upon successful completion, students will have the knowledge and skills to:
On satisfying the requirements of this course, students will have the knowledge and skills to:
- Compare and contrast different mineral assemblages and host rocks, including igneous, metamorphic and sedimentary rocks and some ores.
- Explain and articulate that minerals are crystalline materials; that macroscopic symmetry arises from a repeated arrangement of atoms and describe how this is used for mineral classification.
- Balance chemical formulas of relevant reactions and discuss simple structural formulas from chemical analyses of common minerals.
- Explain and describe the physical properties of hand specimens of rocks and minerals, with clear sketches and at least provisional identification of mineral species, with explanation of reasoning.
- Describe and differentiate different minerals and rocks using the petrographic microscope and identify minerals and hence classify host rocks.
- Relate mineralogical and textural observations in a simple way to host rock petrogenesis and tectonic processes.
- Apply basic phase diagrams to explain partial melting, fractional crystallization and other deep Earth processes.
Assessment will be based on
- 3 assignments done out of class time (10% each, LOs 1, 2, 3 and 7)
- 3 practical exercises done during Practical Classes and out of class time (10% each, LO 4, 5 and 6)
- 1 closed book exam on whole course content, held at the end of the course (40%, LO 1-7)
Honours students attend joint classes with undergraduates (EMSC2017) but will be given alternative assessment which will be agreed upon in the first week of semester.
The ANU uses Turnitin to enhance student citation and referencing techniques, and to assess assignment submissions as a component of the University's approach to managing Academic Integrity. While the use of Turnitin is not mandatory, the ANU highly recommends Turnitin is used by both teaching staff and students. For additional information regarding Turnitin please visit the ANU Online website.
WorkloadA maximum of 65 hours formal contact time, including lectures, workshops and laboratory classes. Up to 55 hours non-contact time for completion of assessable practical exercises, assignments and revision.
Requisite and Incompatibility
You will need to contact the Research School of Earth Sciences to request a permission code to enrol in this course.
Prescribed TextsNo prescribed textbook. We provide a class library of textbooks for use in class and advice on other useful learning resources.
Assumed KnowledgeSome Earth Science and/or Chemistry background
Tuition fees are for the academic year indicated at the top of the page.
If you are a domestic graduate coursework or international student you will be required to pay tuition fees. Tuition fees are indexed annually. Further information for domestic and international students about tuition and other fees can be found at Fees.
- Student Contribution Band:
- Unit value:
- 6 units
If you are an undergraduate student and have been offered a Commonwealth supported place, your fees are set by the Australian Government for each course. At ANU 1 EFTSL is 48 units (normally 8 x 6-unit courses). You can find your student contribution amount for each course at Fees. Where there is a unit range displayed for this course, not all unit options below may be available.
- Domestic fee paying students
- International fee paying students
Offerings, Dates and Class Summary Links
ANU utilises MyTimetable to enable students to view the timetable for their enrolled courses, browse, then self-allocate to small teaching activities / tutorials so they can better plan their time. Find out more on the Timetable webpage.
Class summaries, if available, can be accessed by clicking on the View link for the relevant class number.
|Class number||Class start date||Last day to enrol||Census date||Class end date||Mode Of Delivery||Class Summary|
|4228||20 Feb 2017||27 Feb 2017||31 Mar 2017||26 May 2017||In Person||N/A| | <urn:uuid:e520e2da-7d33-4e47-8567-ed4bac7beb5f> | CC-MAIN-2023-23 | https://programsandcourses.anu.edu.au/2017/course/EMSC4117 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00211.warc.gz | en | 0.869399 | 1,143 | 2.9375 | 3 |
Chimeras Offer Solution to Organ Shortage
Earlier this month researchers announced the use of CRISPR-Cas9 genome editing technology to successfully eliminate a porcine retrovirus that served as a stumbling block in organ transplants between pigs and humans.
Currently there are more than 117,000 people on the waiting list for an organ transplant in the United States. It is estimated that another person is added every 10 seconds, and that more than 20 people die per day due to a shortage of transplantable organs. Using chimera organ transplants could help to solve this problem.
Because pigs have organs roughly the same size and with the same function as human organs, they are considered prime candidates for inter-species organ transplants. However, the presence of active Porcine Endogenous Retrovirus (PERV) has stymied research thus far. PERV is a polytropic virus released from pig cells and is the result of the incorporation of a viral genome into a pig’s own DNA. The incorporated viral DNA is then passed on to future generations of pigs through their own genetic material.
Humans have their own form of an endogenous retrovirus, called HERV (human endogenous retrovirus). Unlike PERV, HERV is primarily inactive in the body. Like PERV, HERV is the result of a viral genome being incorporated into the human genome, likely millions of years ago.
Top 10 Hospitals by # of All-Payor Kidney Transplants Performed in 2015
|Hospital||State||# Kidney Transplants|
|Jackson Memorial Hospital||FL||966|
|New York Presbyterian Hospital||NY||718|
|Medical University of South Carolina||SC||554|
|University of Wisconsin Hospital||WI||520|
|Emory University Hospital||GA||498|
|Tampa General Hospital||FL||488|
|Auxilio Mutuo Hospital||PR||485|
|Vanderbilt University Hospital||TN||484|
|St Barnabus Medical Center||NJ||473|
Fig 1 Data from Definitive Healthcare using ICD-9 codes 5561 and 5569. Most recent CMS data available.
PERV has been one of the major roadblocks in testing the transplant of pig organs into the human body. Now, using CRISPR-Cas9, researchers have been able to remove PERV from pig genomes entirely. A new generation of genetically engineered piglets shows no sign of having inherited the retrovirus.
Despite the elimination of PERV, the human immune response still poses a significant barrier to successful organ transplant between species. But this hasn’t stopped researchers from testing chimera transplants in other animals.
Scientists have successfully used pluripotent mouse cells to grow a pancreas in fetal rats. Once the chimera rats are born, they have a fully functional, rat-sized pancreas made entirely of mouse cells. Sections of the pancreas can then be transplanted into diabetic mice, curing their illness for about a year—or half their life.
Similarly, intermediate stem cells have been used in human-pig tests. Researchers inserted human intermediate stem cells into a pig embryo. When the pig was born, about 1 of every 100,000 cells was human rather than pig. The human cells composed about 10 percent of the pig’s heart cells, and about 1 percent of the pig’s liver and kidneys.
These kinds of tests are promising, as they prove that pig and human cells can coexist and function together to form organs and other body tissue. This chimera pig, however, was dubbed “highly inefficient” by researchers. But it is one step closer to solving the problem of organ shortages.
In addition to the physiological barriers to research, there are also ethical concerns. Many of the obstacles researchers face involve the inability to test organ harvesting and preservation methods on humans. In the case of brain-dead donors, doctors have only minutes to remove the still-functioning organs from a cadaver before they start deteriorating.
Top 10 Hospitals by # of All-Payor Heart Transplants Performed in 2015
|Hospital||State||# Heart Transplants|
|Cedars-Sinai Medical Center||CA||134|
|Newark Beth Israel Medical Center||NJ||109|
|Baylor University Medical Center at Dallas||TX||89|
|Hospital of University of Pennsylvania||PA||88|
|Montefiore Medical Center Main Campus – Henry and Lucy Moses Hospital||NY||86|
|Memorial Herman – Texas Medical Center||TX||74|
|Tampa General Hospital||FL||67|
|Nebraska Medicine – Nebraska Medical Center||NE||67|
|Ronald Reagan UCLA Medical Center||CA||61|
Fig 2 Data from Definitive Healthcare using ICD-9 code 3751. Most recent CMS data available.
In these situations, it could be beneficial to use certain drugs or procedures to preserve the organs for longer periods of time until they can be removed and stored properly. But the issue of informed consent proves complicated. The patient cannot give informed consent if they are brain-dead. Would the question move to the surviving family? To the patient receiving the organ(s)? One cadaver can often supply organs to recipients living hundreds or thousands of miles apart, and it would be nearly impossible to contact them in such a short window.
Because organ preservation tests would have to be performed on living humans, review boards must approve the procedures and methodology to ensure it is ethical and poses minimal risk to all involved.
In a 2015 trial at the University of California San Francisco (UCSF), researchers wanted to test the idea that cooling a cadaver to hypothermic temperatures would help maintain ideal organ function during removal and transportation. The UCSF research board determined that the organ donors involved in the trial were dead, and therefore did not qualify as human research subjects. Doctors then did not require informed consent to carry out their tests.
UCSF consequently suffered major backlash from the medical community, resulting in a request by Public Citizen for a federal investigation from the Office for Human Research Protections in April 2016.
One of the major barriers in organ transplant research is a disagreement between institutional review boards and surgeons on what qualifies “human subjects research.” In a hypothetical scenario published by New England Donor Services in 2016 involving dead organ donors, 82 percent of institutional review board members considered the trial to be human subjects research compared with 58 percent of transplant surgeons.
For now, researchers are strictly limited when it comes to researching organ transplant methods on humans. But the mouse-rat chimeras and PERV-inactivated pigs can serve as a springboard for new trials and innovations in the world of organ transplants.
Visit the Definitive Blog to read more about popular outpatient procedures.
Definitive Healthcare has the most up-to-date, comprehensive and integrated data on over 7,700 hospitals, 1.4 million physicians, and numerous other healthcare providers. Our database allows subscribers to search inpatient and outpatient procedure analytics by CPT/HCPCS, DRG, and ICD-9 codes. | <urn:uuid:f6c8553a-89b1-4248-b3d4-acd5fe5f3c55> | CC-MAIN-2017-47 | https://www.definitivehc.com/news/chimera-organ-shortage | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806455.2/warc/CC-MAIN-20171122031440-20171122051440-00710.warc.gz | en | 0.910034 | 1,490 | 2.6875 | 3 |
Special populations such as pregnant and lactating women, infants and preschool
children and the elderly are at nutritional risk under the best of circumstances,
but their vulnerability increases when diseases such as HIV/AIDS, or poverty,
civil conflicts and drought are superimposed. For example, in addition to the
individual who has HIV/AIDS being at nutritional risk, another consequence of
the HIV/AIDS epidemic in Africa and other developing countries is the rampant
increase in orphaned children and in adults who cannot continue productive lives.
When children are forced to care for sick adults and must take on adult responsibilities,
they lose their own security, may be forced to leave school, and are even more
at risk for malnutrition and illness (USAID Project Profiles: Children Affected
by HIV/AIDS, 2002).
Protein, carbohydrate and fat comprise the macronutrients and are referred to as the energy nutrients because upon burning in the lab or by the human body, heat is yielded (measured in calories). These nutrients provide us with calories to continue life processes, such as breathing, growth and maintenance, cardiac work, voluntary activity, and thousands of metabolic reactions.
Protein is always a concern in malnutrition both in terms of adequacy and quality. Protein quality is measured using the Protein Digestibility Corrected Amino Acid Score (PDCAAS) (Report of the Joint FAO/WHO Expert Consultation, 1991). This score takes into account the digestibility and therefore bioavailability of the protein and how the amount of essential amino acids contained in the protein compare to the amino acid requirements of children 2-5 years of age. It is a useful tool, because one can quickly see on a scale of 0 to 1.0 a protein's quality score and compare it to other protein sources.
All people require nutrients to sustain life and those with acute illnesses have increased requirements for specific nutrients. For example, persons with fever will burn more calories than people with normal temperatures. Any person with an illness is in a state of metabolic stress which results in increased nutrient requirements and therefore places him/her at risk for malnutrition. If malnutrition is not alleviated, the disease is further exacerbated which in turn further increases the degree of malnutrition.
People living with HIV/AIDS, a disease of the immune system, have increased nutrient requirements over their healthy counterparts. HIV/AIDS infects men, women, pregnant and lactating women, children and infants so nutrient requirements must be determined by gender, age and condition. Nevertheless, some general guidelines are suggested by Food and Nutrition Technical Assistance (FANTA).
Weight loss and wasting are characteristic of AIDS patients. These symptoms are a result of reduced food intake (appetite is impaired), poor absorption of nutrients, and changes in metabolic processes affecting protein synthesis. Additionally, some individuals experience diarrhea and nausea, further compounding the problems of maintaining body weight and nutrient stores. FANTA guidelines recommend 10-15 percent additional calories per day for adults with HIV/AIDS. For example, if 2070 kcal per day is used as the estimate for energy needs for an active non-HIV-infected adult, then the additional calories needed for HIV/AIDS patients (at the 15% level) are about 300 to 400 for women and men respectively. For protein, the additional recommended amount is 50 to 100 percent per day. This translates to approximately 72 grams of protein per day for women and about 85 grams per day for men. Amino acid supplementation is not recommended, but instead, foods such as rice, soybeans, nuts and grains are preferred for obtaining needed amino acids. Easy to digest foods with high quality protein are needed.
About 50 % or the total carbohydrate recommended for healthy adults and children should be complex carbohydrate. For people with HIV/AIDS, this percentage may need to be higher since fat should be restricted and these fat calories must be replaced by either carbohydrate or protein. Burning carbohydrate in the human body as a fuel rather than fat and protein requires less water. Reliance on fat and protein to meet energy needs results in frequent urination and increased requirements for water intake. Easily digestible foods, high in carbohydrates such as rice, bread, millet, maize porridge, potato, sweet potato and crackers are recommended. Further, if diarrhea exists, one of the remedies recommended is to consume rice soup (1 cup rice + 5 cups water and a bit of salt-the latter provides the electrolyte, sodium- boiled for one hour). FANTA states that this is a traditional medicine for diarrhea and is used because of its well-known efficacy, limited side effects, and ease of preparation. Amounts of the electrolytes, potassium and sodium, required to restore hydration vary according to age, gender, weight, and health status.
Micronutrients required specifically for building a strong immune system are needed in excess over those required for a non-HIV-infected adult. These include vitamins A, B6, iron and zinc as well as specific amino acids. Another issue to keep in mind is that certain medications may interact with specific nutrients and prevent either the nutrient or the drug from performing as intended. For example, vitamin B6 (10mg daily) supplementation is recommended for TB patients treated with isoniazid (FANTA). Further, when macronutrients are increased, specific micronutrients are needed to facilitate metabolism of the increased macronutrients. For example, an increase in dietary protein requires increased vitamin B6 for the metabolism of the extra protein. This latter point reemphasizes the importance of keeping in mind the interrelationships among nutrients when planning diets or food products.
FANTA points out that supplementation of the micronutrients, vitamin A and the B-group vitamins, (B6 and B12) have improved survival and reduced disease progression in people with HIV/AIDS. Children with HIV/AIDS need to be given supplements of both iron and vitamin A and should be encouraged to consume foods rich in vitamin C.Because of the complexity of determining nutrient requirements for specific populations, it is obvious that food product developers rely on general guidelines which may not be precise, but are directed toward a majority of particular populations. It is, therefore, necessary to know the intended populations and use of a food product when determining the appropriate macronutrient content and fortification levels. | <urn:uuid:e4854d3f-e672-4657-b438-0edcfafa7645> | CC-MAIN-2013-20 | http://www.usarice.com/index.php?option=com_content&view=article&id=631&Itemid=260 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697745221/warc/CC-MAIN-20130516094905-00037-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.930235 | 1,295 | 3.53125 | 4 |
Every second grader begins the day by reading the morning message, practicing their literacy and using text to learn about the day. Some prefer to read with help from a teacher, while others are happy to show that they can do it alone.
Throughout the year, they’ll learn about the people, culture, and customs of Japan, bring Greek myths to life on stage, and zing around a make-believe circulatory system as a red blood cell. They’ll study different family structures, how various cultures use light to celebrate in winter, and develop their skills with simple hand tools.
Interdisciplinary study units combine art, science, writing, math, and technology to help children grasp the most important lesson of all–that learning is really, really fun.Inquire | <urn:uuid:57f332b1-53fd-464d-9aea-37902ad74813> | CC-MAIN-2018-22 | https://www.mosesbrown.org/explore-grades/lower-school/2nd-grade/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863662.15/warc/CC-MAIN-20180520170536-20180520190536-00558.warc.gz | en | 0.953033 | 160 | 3.296875 | 3 |
A New Reading of Mendelssohn’s Early Symphonies
It is simply breathtaking to think what the twelve-year-old Felix Mendelssohn had already achieved in the field of composition. In a letter of 1821 his mother reported, »Nobody can imagine this free, genial nature. His productivity is really to be admired. During the past year he has written two operas, in addition a five-part psalm for the Akademie, six symphonies in the manner of early composers, without wind instruments, some sonatas, etc.« Mendelssohn composed these first six string symphonies (of a total of twelve) while receiving instruction from Carl Friedrich Zelter, and they most certainly were performed during the matinées presented every two weeks at his parents’ home. According to the contemporary witness Adolf Bernhard Marx, they were accompanied by Felix »mostly or throughout in the thoroughbass manner.« And this is the starting point for the musicians of the L’Orfeo Baroque Orchestra under their conductor Michi Gaigg: a historical fortepiano as if by nature forms the thoroughbass »in the manner of early composers.« At long last Michi Gaigg has found just the right sound guise for these early strokes of genius. »The musicians of L’Orfeo here too once again know what it takes to captivate the listener with their playing, their effective dynamic shadings, their fresh tempi, and the historically informed sound« (klassik. com of the Gluck Symphonies).
Mendelssohn, Felix: Symfonier for strykere Vol. 1: nr. 1-6 | <urn:uuid:072d0be1-8aa6-4233-ac4f-1456758ed62e> | CC-MAIN-2019-30 | https://lawostore.no/cd/gaigg-michi-mendelssohn-felix-symfonier-for-strykere-vol-1-nr-1-6-13514 | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526670.1/warc/CC-MAIN-20190720194009-20190720220009-00036.warc.gz | en | 0.93817 | 360 | 2.5625 | 3 |
Important step forward for safety of xenotransplantation
This week in the Proceedings of the National Academy of Sciences, researchers from Immerge BioTherapeutics, Inc., announced that they have identified the receptors that are used by porcine endogenous retrovirus (PERV) in order to enter and infect a cell (PNAS; May 27, 2003; vol. 100, no. 11; 6759-6764). This is a critical discovery because it allows scientists to begin to develop strategies to prevent PERV replication. PERV has been considered a key safety issue in the development of xenotransplantation using pig organs because the virus has shown the ability to infect some human cells in laboratory tissue cultures. The study was performed in a collaborative effort between Immerge and the academic groups of Professors Robin Weiss, University College, London, UK and Daniel Salomon, The Scripps Research Institute, La Jolla, CA.
"Our identification of the PERV receptor is a major step forward because it allows us to address fundamental aspects of the biology of this virus," said Dr Clive Patience, Director of the Safety Program at Immerge. "For instance, PERV has grown in only three of approximately 40 human cell lines that we and others have tested. To date, we have not understood why most human cells do not support PERV growth. We can now begin to address this type of fundamental issue."
Susan Hayes | EurekAlert!
Nanoparticles as a Solution against Antibiotic Resistance?
15.12.2017 | Friedrich-Schiller-Universität Jena
Plasmonic biosensors enable development of new easy-to-use health tests
14.12.2017 | Aalto University
DNA molecules that follow specific instructions could offer more precise molecular control of synthetic chemical systems, a discovery that opens the door for engineers to create molecular machines with new and complex behaviors.
Researchers have created chemical amplifiers and a chemical oscillator using a systematic method that has the potential to embed sophisticated circuit...
MPQ scientists achieve long storage times for photonic quantum bits which break the lower bound for direct teleportation in a global quantum network.
Concerning the development of quantum memories for the realization of global quantum networks, scientists of the Quantum Dynamics Division led by Professor...
Researchers have developed a water cloaking concept based on electromagnetic forces that could eliminate an object's wake, greatly reducing its drag while...
Tiny pores at a cell's entryway act as miniature bouncers, letting in some electrically charged atoms--ions--but blocking others. Operating as exquisitely sensitive filters, these "ion channels" play a critical role in biological functions such as muscle contraction and the firing of brain cells.
To rapidly transport the right ions through the cell membrane, the tiny channels rely on a complex interplay between the ions and surrounding molecules,...
The miniaturization of the current technology of storage media is hindered by fundamental limits of quantum mechanics. A new approach consists in using so-called spin-crossover molecules as the smallest possible storage unit. Similar to normal hard drives, these special molecules can save information via their magnetic state. A research team from Kiel University has now managed to successfully place a new class of spin-crossover molecules onto a surface and to improve the molecule’s storage capacity. The storage density of conventional hard drives could therefore theoretically be increased by more than one hundred fold. The study has been published in the scientific journal Nano Letters.
Over the past few years, the building blocks of storage media have gotten ever smaller. But further miniaturization of the current technology is hindered by...
11.12.2017 | Event News
08.12.2017 | Event News
07.12.2017 | Event News
15.12.2017 | Power and Electrical Engineering
15.12.2017 | Materials Sciences
15.12.2017 | Life Sciences | <urn:uuid:2bce067c-c6b6-4583-96a1-52fd51a9c8f5> | CC-MAIN-2017-51 | http://www.innovations-report.com/html/reports/medicine-health/report-18737.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948596051.82/warc/CC-MAIN-20171217132751-20171217154751-00427.warc.gz | en | 0.898636 | 807 | 2.65625 | 3 |
To count or not to count, that is the age-old question. And since the 1950s, millions of people have looked to calorie counting as the answer to a healthy lifestyle.
But is it really the best answer? We don’t think so.
If you’ve ever ordered Model Meals before, you know that we don’t include calories on our packages. That’s because we believe that choosing the right food is way more important than counting the calories in that food. We also know that there’s a difference in the way your body will use 500 calories worth of broccoli vs 500 calories worth of chocolate cake (even though chocolate cake is delicious).
We’re also speaking from experience… that’s right, we’ve calorie counted too! And after years of obsessing with calories in vs calories out, we’ve found that getting back to trusting your body's natural cues is the most effective way towards optimal health. When you get back to eating real, whole foods, your body regulates for you naturally.
It’s also important to remember that your body uses calories and nutrients to function, so depriving yourself will only cause harm.
We’re not the only ones who avoid calorie counting. According to Registered Dietitian, Abby Langer, “the thought of anyone counting calories, aka the energy you get from what you eat and drink, causes me to sigh audibly. Counting calories is a time-consuming, soul-sucking practice that’s actually a lesson in futility, as far as I’m concerned.” We couldn’t have said it better ourselves.
On top of that, a new study published in JAMA highlighted the importance of focusing on whole foods over calorie counting in order to maintain a healthy lifestyle. Dr. Dariush Mozaffarian, a cardiologist and dean of the Friedman School of Nutrition Science and Policy at Tufts University suggests that “health authorities should shift away from telling the public to obsess over calories and instead encourage Americans to avoid processed foods that are made with refined starches and added sugar, like bagels, white bread, refined flour and sugary snacks and beverages.”
It goes beyond dietitians and doctors as well. New York Times best-selling author Jonathan Bailor has done research on calorie counting and says, “Depriving our bodies of calories, it turns out, only tends to slow down our metabolism.” So not only does counting calories hurt our mental state, it can also hurt our bodies and do the opposite of what we want it to do in the first place.
So if calorie counting isn’t the answer, what is?
Well if you’re asking us… the answer is REAL FOOD!
What do we mean by that? It’s simple really. Sticking to real food means eating things that are as natural as possible and staying away from processed or refined food.
If you can eat foods as close to their natural state as possible, you’ll be fueling your body with more nutritional value than eating foods that have been modified. That’s why vegetables, fruits, and proteins are such an important part of the whole food lifestyle.
The proof is in the research. Dr. David Katz of Yale University's Prevention Research Center and his colleague Stephanie Meller have been studying the effects of different types of food, and have published their findings that a lifestyle with “minimally processed foods close to nature, predominantly plants, is decisively associated with health promotion and disease prevention."
It’s not just about your physical health either. When you stop obsessing about numbers and calories and start focusing on real nutrition, you’ll also be taking care of your mental health. Counting calories and feeling guilty about eating can lead to a negative relationship with food and can hinder your progress in creating a healthy and balanced life.
Food is what powers our bodies and minds. So don’t deprive yourself of the fuel you need to do all the amazing things you want to do. Just keep it simple, and remember the importance and benefits of eating whole foods.
Your body will be thanking you for the real food you’re eating AND the time you’re saving not having to count every calorie you’ve consumed. ENJOY! 💛 | <urn:uuid:85b5f161-a282-4115-8ec3-0bdb48a0afa6> | CC-MAIN-2019-04 | https://modelmeals.com/blogs/blog/counting-calories-vs-real-food | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583745010.63/warc/CC-MAIN-20190121005305-20190121031305-00212.warc.gz | en | 0.947515 | 910 | 2.5625 | 3 |
Helen Tamiris, original name Helen Becker (born April 24, 1905, New York, N.Y., U.S.—died Aug. 4, 1966, New York City), American choreographer, modern dancer, and teacher, one of the first to make use of jazz, African American spirituals, and social-protest themes in her work.
Helen Becker began her dance studies with Irene Lewisohn in freestyle movement. Later, trained in ballet by Michel Fokine and at the Metropolitan Opera Ballet School, she danced for three seasons with the Metropolitan Opera Ballet Company. By that time she had adopted the stage name Tamiris. She later toured South America with an Italian company. Dissatisfied with traditional ballet technique, she studied briefly at the Isadora Duncan School in New York City but disliked its emphasis on purely personal expression and lyrical movement. She began to develop her own approach and in 1927 made her concert debut. She toured Europe in 1928 and in 1930 founded her own company and school, which she directed until 1945. She also organized the Dance Repertory Theatre (1930–32), which produced concerts jointly with such modern dance choreographers as Martha Graham, Doris Humphrey, and Charles Weidman. She encouraged the inclusion of dance in the WPA Federal Theatre Project and served as principal choreographer from 1937 to 1939.
Tamiris, believing that each dance must create its own expressive means, did not develop an individual style or technique. Her works were often described, however, as vigorous and exuberant, and they frequently made use of American themes (as in Bayou Ballads and Liberty Song). Many of the approximately 135 dances she choreographed between 1930 and 1945 reflected her concern for social and political problems. Her best-known concert piece, How Long Brethren (1937), depicted the despair of unemployed Southern blacks and was danced to Lawrence Gellert’s “Negro Songs of Protest” sung by an African American chorus.
As a choreographer for musical plays (1945–57), Tamiris excelled at creating clever characterizations and evoking the spirit of U.S. regions and periods. Annie Get Your Gun (1946), Touch and Go (1949), for which she won the Antoinette Perry Award for choreography, and Plain and Fancy (1955) were among the many musical plays for which she created the dances. She returned to concert modern dance with additional use of American themes, notably in Dance for Walt Whitman (1958), and in 1960 formed the Tamiris–Nagrin Dance Company with her partner and husband, the dancer Daniel Nagrin. | <urn:uuid:f74d8ae9-73c3-4f75-b1ca-444ab33e7654> | CC-MAIN-2017-26 | https://www.britannica.com/biography/Helen-Tamiris | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320570.72/warc/CC-MAIN-20170625184914-20170625204914-00638.warc.gz | en | 0.970895 | 544 | 2.953125 | 3 |
To stay competitive, businesses and governments are constantly looking for materials that will open the door to new technologies or sources of energy. Materials that will make their products faster, lighter, stronger or more efficient. Whoever develops those materials first will have a significant edge over the competition.
And in recent years it has become increasingly apparent that the key to getting that edge, and maintaining it, is computational research.
“Problems that used to take years to solve can now be solved in a month,” says Srikanth Patala, a materials science and engineering researcher at NC State.
Computational research uses complex models in a variety of ways, all of which advance materials science and engineering.
“These computational models can help researchers understand the outcome of an experiment, identify the most promising avenues for future experiments, and give us insight into processes that can’t be easily explored in the lab,” says NC State researcher Don Brenner, a pioneer in the field of computational materials research who has been publishing in the field since the late 1980s. “For example, computational research helps us understand the behavior of materials in nuclear reactors, which are exposed to high levels of heat and radiation.”
“And we can now use models to design new materials that have a specific set of characteristics for use in any given application,” Patala says.
“By using computational models, we can evaluate hundreds or more possible material combinations,” Brenner explains. “It would take years to evaluate those combinations using traditional experimental methods, but we can narrow it down to a handful of the most promising materials combinations.”
“There are a lot of people at NC State who embrace computational research as a way to gain meaningful insight into how to design new materials,” says Doug Irving, another materials researcher at NC State. “Ultimately, this gives our researchers a big advantage over researchers who don’t use these capabilities.”
For example, Brenner’s lab recently led an effort to understand what causes metal oxide scales to deposit on the fuel rods in nuclear reactors – a job that would be both dangerous and incredibly difficult (if not impossible) using traditional experimental techniques.
“What we found will make it possible to develop new techniques for eliminating these scales, which would make the reactors more efficient and extend the lifetime of nuclear fuel rods,” Brenner says.
But computational research in materials science extends well beyond nuclear power.
“We do work on optical and electronic materials, structural materials, energetic materials and soft materials,” Irving says. “We’re talking about applications in everything from electronics and LEDs to pharmaceuticals and biomedical devices.”
In other words, theoretical models can lead to practical solutions for real world problems.
And people far from the realm of academia have noticed.
In 2011, the White House unveiled its Materials Genome Initiative (MGI), stating that advanced materials “are essential to economic security and human well-being, with applications in industries aimed at addressing challenges in clean energy, national security, and human welfare.” But the White House also noted that it takes too long to bring new materials to the marketplace, and put an emphasis on “accelerating the pace of discovery and deployment” of advanced materials in order to ensure that the United States remains competitive in the global economy.
The MGI, in short, urged the U.S. materials research community to marry computational research to experimental research in order to expedite the development of new materials for use in a wide range of applications. And that was good news for NC State.
“We have one of the largest materials science computational research programs in the United States,” says Yara Yingling, a materials researcher at NC State. And that longstanding focus on computational research has put NC State in an enviable position.
“We were effectively implementing the MGI model before the MGI even existed,” Brenner says. “We’ve long believed that computational and experimental researchers can and should work together to address challenging problems that can’t be adequately addressed by theory or experiment alone.” | <urn:uuid:052eb6dd-a9a0-448f-a0e6-e2a651ffc04a> | CC-MAIN-2019-30 | https://news.ncsu.edu/2015/04/mse-comp-research/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526506.44/warc/CC-MAIN-20190720091347-20190720113347-00135.warc.gz | en | 0.929794 | 864 | 3.109375 | 3 |
We trust artificial intelligence algorithms with a lot of really important tasks. But they betray us all the time. Algorithmic bias can lead to over-policing in predominately black areas; the automated filters on social media flag activists while allowing hate groups to keep posting unchecked.
As the problems caused by algorithmic bias have bubbled to the surface, experts have proposed all sorts of solutions on how to make artificial intelligence more fair and transparent so that it works for everyone.
These range from subjecting AI developers to third party audits, in which an expert would evaluate their code and source data to make sure the resulting system doesn’t perpetuate society’s biases and prejudices, to developing tests to make sure that an AI algorithm doesn’t treat people differently based on things like race, gender, or socioeconomic class.
Now scientists from IBM have a new safeguard that they say will make artificial intelligence more safe, transparent, fair, and effective. They propose that, right before developers start selling an algorithm, they should publish a Supplier’s Declaration of Conformity (SDoC). As a report or user manual, the SDoC would show how well the algorithm performed at standardized tests of performance, fairness and risk factors, and safety measures. And they should make it available to anyone who’s interested.
In a research paper published Wednesday, the IBM scientists argue that this kind of transparency could help build public trust and reassure prospective clients that a particular algorithm will do what it’s supposed to without screwing anyone over based on biased training data. If a particular algorithm does seem likely to screw someone over, the client (and even interested citizens) would ideally be able to tell from the test results and choose not to put it to use.
In their paper, the IBM scientists draw on the examples given by SDoCs in other industries, which are rarely required by law but are encouraged in order to keep potential customers from going to more transparent competitors. For instance, consumers can trust the brakes of a car, the autopilot capabilities of an airplane, the resilience of a bridge because these things are exhaustively tested based on standard, well-known metrics. And yet, there’s no equivalent test to make sure that artificial intelligence tools will perform as claimed.
The researchers propose that an AI SDoC would answer questions like: “Was the dataset and model checked for biases?” and “Was the service checked for robustness against adversarial attacks?” In general, the questions would evaluate an algorithm based on its performance rather than checking out its components or its code as an auditor might. Here are a few more that an AI SDoC might include, as the researchers write in the paper:
Does the dataset used to train the service have a datasheet or data statement?
Was the dataset and model checked for biases? If yes, describe bias policies that were checked, bias checking methods, and results.
Was any bias mitigation performed on the dataset? If yes, describe the mitigation method.
Are algorithm outputs explainable/interpretable? If yes, explain how the explainability is achieved (e.g. directly explainable model, local explainability, explanations via examples).
What kind of governance is employed to track the overall workflow of data to AI service?
Asking developers to publish SDoCs won’t solve all of the problems our growing reliance on AI presents. We know how brakes stop a speeding car, but some of the more complex algorithms out there (like those that employ deep learning techniques) can be inscrutable. Plus, if a transparency report based on standardized testing is going to have an impact, everyone would have to play along.
Sure, developers would be motivated to start releasing SDoCs if their competitors are doing it. But the system will only work if customers, governments, and companies that use AI show that they actually care what these reports say. Will a police department like the LAPD, which has used blatantly racist policing algorithms in the past, necessarily care enough about the details of an SDoC to find a better system? Truth is, we don’t know yet.
These reports are unlikely to force anyone to employ more ethical algorithms, or even to develop them. But if you combine these reports with other tools like third-party audits, the public can demand algorithms that treat everyone fairly.
More on how to make AI safe and fair: Microsoft Announces Tool To Catch Biased AI Because We Keep Making Biased AI | <urn:uuid:37bc9130-fff9-445e-a6f9-60ca88286729> | CC-MAIN-2019-39 | https://futurism.com/trust-artificial-intelligence-ibm | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574182.31/warc/CC-MAIN-20190921022342-20190921044342-00297.warc.gz | en | 0.946246 | 926 | 2.921875 | 3 |
Fog as a meteorological phenomenon can have a high impact on the economy but also on personal safety. The estimated total economic losses associated with fog events on aviation, marine and land transportation to be comparable to those of winter storms.
There is thus increasing demand for precise fog forecasting. Despite the improvements in numerical weather prediction models over recent years, accurate forecasting of fog is still challenging. The main reason is fog’s considerable variability in space and time as a result of the nonlinear interaction between several processes, such as radiation, turbulent mixing, cloud microphysics, and energy transfer in the atmosphere–surface–soil continuum. Turbulence-resolving simulations (so-called
large-eddy simulations, LES) provide an ideal framework for studying these processes and their interaction.
This talk provides an introduction into the fog physics and its life cycle and outline recent advancements in fog research using high-resolution LES at Leibniz University Hannover.
Invited by Christoph Thomas, Micrometeorology
|Th. 2019-11-14 now|
Analysis of ozone formation and trend over northern Bavaria by using stochastic and deterministic models
Quantification of subsurface properties using the groundwater response to Earth and atmospheric tides
Mikroplastik in der Umwelt
Changing the game in Earth Observation - The European Union’s Copernicus programme -
Stoichiometric controls of C and N cycling
Flying halfway across the globe to dig in the dirt – a research stay in Bloomington, USA
EGU – interesting research and free coffee
Picky carnivorous plants? | <urn:uuid:98372530-4a65-4ca3-9789-b1ec07e1df8a> | CC-MAIN-2019-47 | https://www.bayceer.uni-bayreuth.de/bayceer/en/aktuelles/13769/kolloquium/index.php?id_obj=150114 | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668529.43/warc/CC-MAIN-20191114154802-20191114182802-00539.warc.gz | en | 0.843092 | 336 | 2.921875 | 3 |
If you thought poor sleep habits only affected teenagers’ mental well being, academic performance, memory retention, hormone levels and cardiovascular health, don’t worry — the ill effects of shoddy adolescent shut-eye don’t stop there.
A new study, published in Developmental Cognitive Neuroscience, offers evidence that poor sleeping habits have long-term effects on teen brain development.
During adolescence, the brain experiences a vital growth sprint, including a process called “neural pruning.” During this stage, the brain sheds unnecessary neurons (the building blocks of gray matter) to make room for additional white matter fibers, which connect neurons and insulate brain structures. This is called myelination.
The additional white matter improves processing speed and connectivity of the pre-frontal cortex. This is the area of the brain that’s central to mental processes, such as impulse control and decision-making, which are famously weak in teens. Additionally, the teen brain is highly “plastic” during periods of development, meaning it’s unusually susceptible to environmental influence.
Cognitively speaking, becoming an adult hinges on the white-matter uptick that caps off teenagehood. But sleeping issues common among the youths may interfere with the growth of white matter.
Forty-eight high school-aged teenagers kept daily sleep diaries for two 14-day periods during fall semester, a year apart. They wrote down when they went to sleep and woke up, as well as how many hours they slept.
Within a few months of the second diary period, the teenagers underwent brain scans. Researchers used a specialized type of Magnetic Resonance Imaging (MRI), called DTI, which captures white matter in detail. They performed the brain scans six months and (roughly) a year-and-a-half after the respective diary periods. Researchers were looking for a connection between erratic sleep and white matter growth.
Indeed, they saw a link between lower levels of white matter and varied sleep patterns. But only in comparison to the first diary period, not the second. This suggests that poor sleep took more than one year to affect brain development. Furthermore, participants who reported inconsistent sleep duration during the week demonstrated lower white matter. Researchers didn’t find the same link between white matter levels and bedtimes, waking times, or even duration differences in weekend vs. weekday sleep.
It appears that, for the sake of long-term brain development, the most important behavioral factor is a consistent amount of sleep on a day-to-day basis.
The study is among the first to measure the impact of sleep schedules on adolescent white matter levels. It suggests that teenagers should prioritize getting the same amount of sleep in between filling out college apps and sexting strangers. Erratic sleep duration seems to play a role in white matter growth, a crucial part of the cognitive coming-of-age process.
But that’s about all we know. It may be the case, the study says, that we’ve flipped the causal relationship — paltry white matter could lead to wonky sleeping patterns, rather than the other way around. Additionally, observing structural brain differences is only half of the equation. Future research needs to establish a connection between white matter levels and the suspected cognitive and behavioral consequences.
Different doesn’t always mean deficient. But, if rebelling against sleep recommendations means graduating high school with an under-myelinated brain, then, in this case, conformists probably have the edge.
Stay tuned to Van Winkle’s for more research on sleep and cognition. | <urn:uuid:e10832a6-82af-48c2-b39c-99f74c70f1b0> | CC-MAIN-2018-09 | http://vanwinkles.com/study-for-teen-brains-consistent-sleep-patterns-are-critical-for-growth | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813626.7/warc/CC-MAIN-20180221143216-20180221163216-00255.warc.gz | en | 0.940766 | 738 | 3.796875 | 4 |
Pop quiz. Which of the following statements are true?
- The census is constitutionally required in order to count every person in the U.S.
- The census determines how much federal money—more than $6 billion—flows into New Mexico’s economy every year.
- New Mexicans are more at risk of not being counted by the census than are people in most every other state.
- The census is in jeopardy—and that puts New Mexicans in jeopardy.
If you said all of the above are true, you’d be correct. Unfortunately, that doesn’t guarantee you the prize of being counted and represented in the next big census if things continue the way they are going.
Amber Wallin is the KIDS COUNT Director at New Mexico Voices for Children
Since 1790, the U.S has been constitutionally required to count every person living in the United States every ten years. As you can imagine, this effort, known as the decennial census, is a massive and complicated endeavor. Our founding fathers included it in the Constitution—and it is crucial that we get it right—because it is used to draw voting districts in the United States, from the U.S. House of Representatives and state legislatures to city councils and school boards. The census is a cornerstone of our democracy and ensuring that it is fair and accurate is important to everyone.
In addition to being foundational to democratic representation, census data are used to guide nearly $600 billion in funding for programs across the country—$6.2 billion of which comes to New Mexico. That translates to nearly $3,000 in federal program dollars per New Mexican per year for the next decade. These census-dependent programs are crucial for the health and well-being of our children and families, as well as our state’s economy. They include Medicaid, the Supplemental Nutrition Assistance Program (SNAP), highway construction, Medicare, Title I grants for education, the school lunch program, Head Start, and housing programs, to name just a few.
The next big census count—Census 2020—takes place in three years, and while that may sound far away, the Bureau should already be significantly ramping up preparation efforts, which requires additional funding. Unfortunately, the Census Bureau and Census 2020 are already being underfunded, which could be extremely harmful to our state.
When the census is under-resourced, it is more likely that some groups of people will not be counted. While the goal of the census is to count all populations equally well, certain people are harder to reach and to count than others. Some of the people most likely to be undercounted include Hispanics, Native Americans, immigrants, young children, and people living in rural areas, in poverty, or without internet access. Chances are, even if you don’t belong to any of these groups you know someone who does. Because New Mexico has high percentages of each of these populations, New Mexicans are more at risk of not being counted than residents of almost any other state. Statewide, 53 percent of our Hispanic population and 45 percent of our young children live in areas that are considered hard to count. This has some pretty troubling implications for the amount of federal funding our state receives.
Even a small undercount could have harmful effects for New Mexico. For example in 2000, the undercount in New Mexico was estimated at almost 2 percent. That means 35,000 New Mexicans were not counted. An undercount in 2020 as small as 1 percent could cost New Mexico $600 million in federal funding over the next decade. Unfortunately for us New Mexicans, Census 2020 continues to face serious threats of underfunding that will jeopardize its accuracy.
The decennial census is an enormous undertaking that involves tens of thousands of people, offices across the country, and complex technologies. In order to prepare well so it can meet its constitutional requirements, the Census Bureau needs Congress to ramp up funding levels prior to 2020. But the census is already being hobbled: Congress budgeted far less in 2016 and 2017 than the Census Bureau requested. As a result, the Census Bureau has already reduced, postponed, or canceled key tests and many preparations for Census 2020. Just as troubling is the fact that the Trump administration’s funding request for 2018 is much lower than what is needed. Taken together, the Census Bureau “ramp-up” funding budgeted for the past two years and proposed for the next year is much lower than in past decades. To put it simply, census funding is woefully short of what is required to ensure an accurate, inclusive, and cost-effective decennial census.
Therefore, to help ensure a census that is equally successful in all New Mexico communities, lawmakers should take these immediate actions:
- Congress should appropriate at least $1.8 billion for the Census Bureau in FY 2018 ($303 million more than the administration requested) and possibly more based on updated cost projections and information. Congress should also seek information from the Census Bureau on the specific consequences of underfunding the census.
- Congress should reject all proposals to add untested questions to the 2020 census, including H.R. 3600, sponsored by Rep. Steve King (R-Iowa), which would ask immigrants under which federal program or law they became legal residents or citizens. Such questions could keep some immigrants—no matter their legal status—from returning their census form. Not only would they not be counted, but their children—even those born in the U.S.—would also not be counted. This could seriously undermine the accuracy and fairness of the census and would be particularly damaging to New Mexico.
Not only is a decennial census constitutionally required, it is also a necessary basis for equal voting representation and equal access to economic opportunities, vital federal programs and state services, and private-sector investment.
An accurate census is critical for our democracy and every American and every New Mexican deserves to be counted and to be equally represented. An under-funded census is a constitutional issue, an economic issue, and a fairness issue. Census 2020 is something that will impact all New Mexicans, and we need to ensure that it is adequately funded and as fair, thorough, and accurate as possible. | <urn:uuid:7fdd4c74-5024-48b4-a06a-c5fe8a45304d> | CC-MAIN-2019-30 | http://nmpoliticalreport.com/2017/10/11/democracy-and-lots-of-money-are-at-stake-for-new-mexico-in-the-upcoming-census/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195530385.82/warc/CC-MAIN-20190724041048-20190724063048-00309.warc.gz | en | 0.965837 | 1,268 | 3.265625 | 3 |
|Low stakes, informal||High Stakes, formal|
|High Impact Practice||Low positive impact on student learning|
|Continuous, takes place during the instruction session||Periodic, usually takes place at the midpoint or end of a course|
|Monitors student learning||Evaluates student's learning/performance by comparing to a benchmark/standard|
|Ask the student to demonstrate learning via authentic tasks||Students take a test, give a performance, or write a paper|
|Offers descriptive feedback||Evaluative feedback|
|The instructor can adjust the teaching based off of real-time feedback from student's performance of tasks||May be used diagnostically|
These are commonly used formative assessment techniques that quickly assess student learning. These CATs can give you real-time feedback, allowing you to adjust your teaching based off of student performance of specific tasks. When all else fails, have the students reflect on what they learned with you that session!
Recall and Understanding
Background Knowledge Probe - Create a brief questionnaire to give you a sense of student baseline knowledge in order to decide where to begin instruction.
Poll Everywhere - create a poll using polleverywhere.com. For example, ask students questions about what you covered in the previous class session or in a video they watched before coming to class. Use this to assess if they "got" the information, and to decide if you need to spend more time on this content before moving on.
Muddiest Point - have students reflect on something that is still unclear to them. Collect the responses and follow up with the instructor post-class, or at the next instruction session.
One-Minute Paper - students reflect on something that they learned, something they found useful, or something that they might use after the class.
Application Cards - pass out note cards and ask the students to tell you how they might apply what they learned in the instruction session to their assignment, or in another class.
One Sentence Summary - Challenge students to answer: “Who does what to whom, when, where, how and why?” about a topic. Then they synthesize those answers into one single summary sentence.
3–2–1 Countdown - Students are asked to reflect on what they didn't know, what surprised them, and how they might apply these knew skills or behaviors to their work. End the class with this activity. Give them index cards to write on, or they can respond orally. They are required to respond to three separate statements: | <urn:uuid:b20799c2-9c60-4bb5-af0a-f3a3bd33a0b3> | CC-MAIN-2023-40 | https://libguides.wustl.edu/c.php?g=676977&p=4770599 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00034.warc.gz | en | 0.925681 | 535 | 3.9375 | 4 |
Leafy Greens Linked with Slower Age-Related Cognitive Decline
A recent report in the journal Neurology found that a diet containing approximately one serving of green leafy vegetables per day is associated with slower age-related cognitive decline.
Dr. Martha Clare Morris and colleagues from Rush University in Chicago and the Tufts Human Nutrition Research Center in Boston followed 960 older adults enrolled in the Rush Memory and Aging Project.
The research team focused on the level of consumption of green leafy vegetables, like spinach, kale, collards, and lettuce, which have been suggested in previous research to have protective factors against cognitive decline and examined the association with performance on cognitive tests.
The average age of the participants was 81 years and all were dementia-free at the beginning of the study.
Over an average of nearly 5 years, participants underwent an annual battery of tests that assessed cognition in five domains (episodic memory, working memory, semantic memory, visuospatial ability, and perceptual speed).
Data from food frequency questionnaires administered at the beginning of the study were used to assess how frequently people ate some 144 items over the previous 12 months. Dietary intake levels of the nutrients of interest were estimated from responses to all food items.
The three green leafy vegetable items and their serving sizes included in the questionnaire were: spinach (1/2 cup cooked), kale/collards/greens (1/2 cup cooked), and lettuce salad (1 cup raw). Additional diet, health, and demographic information was collected during annual visits.
In the study, consumption of green leafy vegetables was positively and significantly associated with slower cognitive decline.
When comparing the highest daily consumption (median 1.3 servings a day) with the lowest (median 0.09 servings a day), the rate of cognitive decline among those who consumed the most to those who consumed the least was equivalent to being 11 years younger cognitively, based on average global cognitive scores over time.
There was no evidence the association was affected by cardiovascular conditions, depressive symptoms, low weight, or obesity.
The researchers also examined the relationship between cognitive change and nutrients for which green leafy vegetables are a rich source (folate, phylloquinone, nitrate, alpha-tocopherol, kaempferol, and lutein).
Intake of these nutrients were each individually positively and significantly associated with slower rates of cognitive decline and were not due to other underlying health issues. Further investigation indicated phylloquinone, lutein, and folate likely were the source of the effect seen on cognitive decline.
This study indicates that consumption of green leafy vegetables is associated with a slower rate of cognitive decline in older adults, possibly due to the neuroprotective actions of specific nutrients.
As research continues, the researchers suggest adding a daily serving of green leafy vegetables to one’s diet may contribute to brain health.
To learn more, see Morris et al. (2017). Nutrients and bioactives in green leafy vegetables and cognitive decline. Neurology, 90(3), e214-e222.
Plan your trip to the nation’s capital during the GAPNA Annual Conference, September 26-29, 2018 by checking out all the things to do, places to eat, and ways to have fun.
Find out about it! | <urn:uuid:94d056c3-1ec9-4db5-bd41-ab1369066a5d> | CC-MAIN-2019-47 | https://www.gapna.org/publications/gapna-newsletter/n/18fal/dem-impa | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496666229.84/warc/CC-MAIN-20191113063049-20191113091049-00381.warc.gz | en | 0.951653 | 698 | 2.875 | 3 |
Black Mulch and Black Bark
In most cases, black mulch greatly simplifies your gardening chores. Black Mulch includes a variety of materials that you use to cover the bare soil in your gardens. Most often you think of it as organic materials such as wood chips, cedar bark and compost, but it also includes materials like stone and gravel. Adding a layer of mulch pays off by:
- Reducing water loss from the soil. It slows evaporation and improves water absorption when it rains or you turn on the sprinkler.
- Slowing weed growth.
- Improving soil quality. Organic types enrich the soil as they decompose.
- Protecting plant roots from hot and cold temperature extremes and sudden fluctuations.
- Adding color and texture as part of your overall garden design.
Whether you’re an ardent gardener or a casual one, you’ll have less watering, weeding, fertilizing and general maintenance. | <urn:uuid:880292b5-abff-4ef3-9e7b-75d6f7854988> | CC-MAIN-2019-18 | https://allseasonslandscapingservice.com/landscaping/mulch-installation/black-mulch-and-bark/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578593360.66/warc/CC-MAIN-20190423054942-20190423080942-00149.warc.gz | en | 0.919122 | 197 | 2.765625 | 3 |
BLOOCK supports different type of encryption algorithms so you can choose the one that better fits your requirements. Currently, we support the two most common types of encryption: symmetric and asymmetric.
Symmetric encryption is an encryption type where only one key (a secret key) is used to both encrypt and decrypt some data. This requires that both entities (the encrypter and the decrypter) exchange this key so it can be used in the decryption process.
The specific algorithms that we support for symmetric encryption are:
- AES (Advanced Encryption Standard)
- RSA (Rivest–Shamir–Adleman)
Asymmetric encryption is an encryption type where a key pair (public key + private key) is used to encrypt and decrypt data in a way that data encrypted using the public key can only be decrypted using the private key.
The specific algorithms that we support for asymmetric encryption are:
- ECIES (Elliptic Curve Integrated Encryption Scheme) | <urn:uuid:003bde7c-62cc-4abe-bd9b-0363a55f9eeb> | CC-MAIN-2023-40 | https://docs.bloock.com/encryption/supported-algorithms | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00512.warc.gz | en | 0.88146 | 211 | 2.8125 | 3 |
Oromo, also known as Afaan Oromoo, Oromiffa(a), and sometimes in other languages by variant spellings of these names (Oromic, Afan Oromo, etc.), is an Afro-Asiatic language, and the most widely spoken of the Cushitic sub-phylum. It is spoken as a first language by approximately 25-6 million people of the Oromo and neighboring nationalities in Ethiopia and in Kenya. Formerly, the language and people were often referred to by non-Oromos within Ethiopia as well as by Europeans as Galla, but this term is no longer recognized in a modern context.
Oromo uses a modified Latin alphabet called Qubee, which was formally adopted in 1991, and used by the Oromo Liberation Front rebels by the late 1970's. The Saphalo script was an indigenous Oromo script invented by Sheikh Bakri Saphalo (also known by his birth name, Abubaker Usman Odaa) in the years following Italian invasion of Ethiopia, and used underground afterwards.
Oromo = AfanOromoo = Oromiya — all the same! It not preferred by all Oromoo People and its not actual name given. | <urn:uuid:046ee019-14e4-481b-9a7c-086c95cc448a> | CC-MAIN-2014-42 | http://wiki.laptop.org/go/Afan_Oromo | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119660038.53/warc/CC-MAIN-20141024030100-00186-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.975203 | 262 | 3.234375 | 3 |
We are searching data for your request:
Almost all ancient documents contain references to vampires. And how many ways to deal with them have been invented - these are garlic, and holy water, and silver bullets.
Were these bloodsuckers fictitious, or were there really terrible fanged creatures in the middle of the Middle Ages? It's difficult to say, but there are a few people left in history who are really considered vampires. Some of their deeds are unverified legends, and some are quite real facts.
You can talk for a long time about the nature of vampirism. It turns out that some of them lived not so long ago.
Count Dracula, he is Vlad the Impaler. This character is a classic vampire. The name Dracula comes to mind first when it comes to people who drink blood. And how many films have been made about him! In fact, Vlad Tepes is quite a historical character. This ruler of Wallachia was famous for his talents as a military strategist, as well as for extreme cruelty. Although Dracula is considered the most famous vampire, he still did not drink blood. But with the graph, it just flowed like a river. This is evidenced by at least his nickname "Tepes", which means "impaling on a stake." Vlad Tepes appeared in the town of Sighisoare in 1431. As a child, he was sent to the court of the Turkish Sultan as a hostage. Historians believe that it was there that the psyche of a young man broke down. In Turkey, Vlad often saw people being cruelly tortured. After his release at the age of 17, Vlad returned home, and soon became the ruler of all Wallachia. His fate was difficult - the count repeatedly lost his throne and recaptured it. Tepes received his nickname Dracula (Son of the Dragon) in honor of his father, who was in the elite Order of the Dragon. He wore a medallion with the image of a mythical creature and minted it even on coins. The legend of Dracula's cruelty is based on an anonymous German document, which told about the ruler's bloodthirstiness. It describes executions and tortures perpetrated by the count. Allegedly, Tepes constantly impaled his subjects and enemies. At the same time, the pieces of wood were not too sharp to prolong the agony of the victims up to 4-5 days. However, historians today doubt the veracity of such legends. And Vlad Tepes ended his life in battle, defending his state from the Turks.
Count Vargoshi. The Magyar chronicles bear witness to the atrocities of another count, who lived in Central Europe. They said that in the XIII century, this terrible man killed about a thousand innocent girls. The count turned out to be a real sadist and sexual maniac, having committed suicide during his next orgy. And Vargoshi was considered a vampire after his death. Legends say that 40 days after his suicide, seven female corpses were found in the courtyard of a local village church. The unfortunates had broken limbs and bitten through their necks. Some force knocked down and bent the church crosses. The unfortunate people apparently tried to find protection in the holy place, but they did not have time. The count was cursed and excommunicated, people even tried to destroy all memories of the sadist. It was said that Vargosha's corpse was covered with red ulcers, and his skin turned green. After the death of the count, his corpse was wrapped in silver and bronze chains, placed in a strong oak barrel, poured with boiling resin, again wrapped in chains and thrown into a deep well. Fearing the resurrection of the vampire, they poured more hot tin, water on top and closed it with a cast-iron plug. Aspen stakes were driven into the ground around the well. Only then did the surrounding residents breathe freely, but it was not there. Such measures, as it turned out, did not stop him. After the incident, the parishioners stopped checking the well. It turned out that the earth around him was blasted with a spiral like a huge plow. The aspen stakes were knocked down. There was no water under the cast-iron plug, and the frozen tin was torn to pieces. On the same day, the body of a priest was found in his own house. His neck was crushed by the very chain that wrapped the barrel. The priest's cross was melted, and a silver clot remained on his chest. A week later, there was a terrible thunderstorm in that area. The strongest lightning strike fell on the old castle of Count Vargosha. The element blew the vampire's dwelling to pieces. For 40 days, people then watched a strange glow over the ruins. Eyewitnesses said that it was the souls of the innocent victims who soared into heaven. For 400 years, rumors of a vampire have disturbed the entire district. Here people disappeared, Count Vargosha was blamed for everything. It is quite possible that his cruel activity caused a surge of negative energy in these lands, which after the death of the villain transformed into a bloodthirsty vampire.
Countess Elisabeth (Erzhebet) Bathory. At the beginning of the 17th century, a terrible story happened in Transylvania. Countess Bathory was charged with the murder of 650 innocent girls from neighboring villages. Allegedly, she painfully treated her victims - beat them, took them out naked in the cold, tortured with needles and a hot iron. The most popular legend has it that the Countess loved to take baths from the blood of her victims. She believed that such a procedure would rejuvenate her blood. Attacks of rage and anger were noted in Elizabeth as a child. After marriage, she took over all the affairs of the castle. Now no one prevented the countess from committing her atrocities. At first she tortured her servants; she liked the sight of blood and torture. Over time, the countess's beauty began to fade, then one witch taught Elizabeth how to prolong her youth. For this it was necessary to become a vampire and start drinking blood. In order not to lack material, the countess ordered to steal the village girls. For the time being, the authorities turned a blind eye to this, but over time Bathory began to kill already noble ladies. True, the proof of her guilt is also dubious. The trial proceeded swiftly, and the testimony of witnesses was knocked out by torture. The matter was largely political - the countess had powerful enemies who encroached on her land. The main evidence at the hearing was the diary of the bloodsucking countess. The court sentenced Elizabeth Bathory to life in prison. The Countess was walled up in the tower, leaving an opening for the transfer of water and food. Three years later, the jailer discovered the dead body of a female vampire. They say that after the death of Elizabeth Bathory became a real vampire, continuing her bloody activities. Locals say that at night you can hear the lingering groans of either new victims or not dead souls in their castle.
Heinrich Spatz, killer doctor. On the one hand, this doctor from the city of Würzburg was highly respected, was actively involved in charity work, and on the other hand, he had a very strange hobby. Spatz lived in Bavaria since 1818 with his wife. He left behind several works on infectious diseases and military field surgery. Suddenly, the doctor received a favorable offer from the University of Prague and left Würzburg, selling all his property. A month after Spatz's departure, his assistants began to tell the terrible truth about him. It turned out that a respected and respectable person actually turned out to be a real monster. The doctor, along with his wife, killed homeless vagrants, quenching his thirst for blood. The Spatz family turned out to be vampire. Shortly before they left the hospital for the poor, where the doctor worked, a one-armed soldier disappeared. The police launched an investigation and it turned out that there were quite a few cases of missing people. The police searched Spatz's former home and found 18 dismembered corpses in the basement. Beggars and sick people became victims of the maniac. It was not possible to find Doctor Spatz himself - he did not appear at the Prague University itself. Most likely, the vampire found out about the progress of the investigation and chose to hide, possibly using his supernatural abilities for this. A terrible fate awaited the informers themselves. One of them soon lost his mind - he rushed about, shouted blasphemy, prayed fervently. Then he left his family, became a recluse. The informer lived constantly in the dark, fearing sunlight. He began to eat pig blood, losing a lot of weight. As a result, the unfortunate man committed suicide, and in a suicide note blamed Spatz for everything. Another assistant also committed suicide after killing a relative. At the same time, they saw how he tried to drink blood from his victim. It turns out that both assistants became vampires. The authorities were never able to find Spatz himself. His identity has remained a mystery. Was it just a vampire, or a member of a satanic sacrifice practicing sect? Perhaps Heinrich Spatz turned out to be an ordinary pathologist who embarked on bold scientific experiments.
Fritz Haarmann. The whole world learned about this man in 1924 city. In the capital of Saxony, Hanover, in 1924 terrible crimes took place. The police found the remains of 24 people at the bottom of the river. The whole city was shocked and enveloped in fear, they started talking about a serial killer, and the most desperate even suggested the presence of a real vampire in Hanover! I must say that there were grounds for such a suspicion - there was practically no meat on the bones of the dead, it was thoroughly cleaned. Also, the internal organs disappeared somewhere. The police found out that all these crimes were committed by a certain Fritz Haarmann alone. The investigation lasted a month and a half. During this time, the maniac told how he bit his victims in the Adam's apple, and then gnawed the throat. Those simply did not have a chance to survive. After the murder, Haarmann dismembered the bodies, separating the meat from the bones and draining the blood into a bucket. Experts later found him to be quite mentally healthy and sane. It is unclear what made an ordinary person a maniac and a vampire. In 1925, Haarmann was executed by decapitation and his brain was transferred to the University of Göttingen for study.
James Brown. In the spring of 1866, the American whaling ship Atlantic was fishing in the Indian Ocean. The crew consisted of 30 people, relations between the sailors were strained - skirmishes and fights were commonplace. On May 23, James Foster stabbed Coke, 25-year-old Portuguese James Brown. The brawlers were separated by James Gardner and John Soares. It soon turned out that Foster and Gardner had disappeared somewhere. As a result, the whole team began to look for their comrades. The captain went down to the hold where barrels of whale oil were kept. There he discovered a terrible picture - James Brown bent over the lifeless body of Gardner and greedily drank blood from his throat. Foster's body was lying there too, already without blood. The captain ordered the sailors to grab the vampire and lock him in a closet. Upon examination, it turned out that huge wounds were made on the bodies of the victims with a knife. Obviously, Brown did indeed drink blood. Having pacified the team, the captain nevertheless delivered the killer to Boston. On November 13, 1866, a trial was held, which found James Brown in double premeditated murder. The death sentence was commuted to life imprisonment through the pardon of President Johnson. The killer was placed in Charleston Prison, Massachusetts. From the general cell, the pugnacious Brown was quickly transferred to a solitary one. Once a hardened criminal, also sentenced to life, was hooked up to him. And again the vampire showed himself - he killed the robber and sucked his blood. In 1889, Brown was transferred to an even stricter prison in Ohio. And then he rushed at the guards, trying to grab their throats. In the end, the authorities decided that Brown was simply crazy. He was referred to the National Psychiatric Hospital in Washington, DC. It is believed that it was there that the vampire eventually died in a soft cell. Only here in the archives there were no records of his death. In those days, the American press wrote that Brown was a real vampire, but went crazy due to the inability to drink further blood.
Roman Stropikaro. It’s probably fashionable among vampires to have the title of count. The name and activities of this man are inextricably linked with the village of Pokrovskoye, now Romanovo, as well as the old abandoned church, which has survived to this day. It was built in 1847 in honor of the Most Holy Theotokos at the expense of the merchant Vukol Kozovlev. And soon a visiting Count Roman Stropikaro settled in the village. He built a stone house that looked like a castle. In this fortress, a strange nobleman lived in seclusion. During the day, no one saw him, only at night he got into a carriage with a strange coat of arms and left somewhere. Silent hunched servants remained in the courtyard. Soon after the count was settled, the villagers began to notice that people began to disappear. At the same time, some disappeared without a trace, while others were found dead, with no apparent cause of death. Only now the bodies were pale, as if without blood. Then the inhabitants began to think that some strange disease, bites of wild animals, or strangulation were to blame. This continued until the son of one of the landowners came to Pokrovskoye, who started to investigate. The detective's conclusions turned out to be terrible - the traces of all the victims led to the vampire, who was quickly recognized as the strange and incomprehensible Count Roman Stropicaro who had come from. An excited and angry crowd of residents gathered near the Intercession Church. Led by the clergy and detectives, she went to the count's house to find out the whole truth and deal with the vampire. People began a siege of the house-fortress. It was getting dark and then the villagers saw how the shadow of the count slipped out from the back door and headed towards the abandoned fields. Half a kilometer from the house, the crowd overtook the vampire and beat him to death with sharp stakes. After that, Stropicaro's body was buried with all precautions, and the grave itself was razed to the ground. True, they said that instead of the count, his double was killed. In any case, the mysterious deaths of the peasants stopped immediately. Stropikaro's house was razed to the ground, and the village itself was renamed Romanovo in memory of those events. Today, excursions are conducted in mysterious places, there are even those who want to walk here at night, armed with an aspen stake.
Kane Presley. Usually vampires hide from the public eye, but this is a completely different case. A woman from El Paso, Texas, discovered strange inclinations in herself when she wrote the famous American book "There is something in the blood." Now Kane does not get tired of giving interviews, because everyone wants to talk with a real vampire. Moreover, according to her information, about eight thousand of her colleagues live in the United States. She herself admits that she did not want to become a star or an outcast at all. But now everyone around is wondering whether she has fangs and whether she sleeps in a coffin. People want this to be so, while Presley herself in every possible way emphasizes her image. The woman wears dark clothes, her pale face is framed by black hair, the figure is sophisticated, and the image is completed by bright red lipstick. Kane recalls that the need to consume some fresh blood every day came to her a long time ago. Now she needs a living red liquid like air. And to satisfy his need, Kane is given to men not for money, but for blood. At worst, she buys cow blood from a thrush.The woman was silent for a long time about her addiction, entrusting the secret only to her friends. One of them could not resist, having blurted out the secret of the vampire. Although many turned their backs on Kane, there were also those who supported her. With her publicity, Mrs. Presley tries to explain that she is tormented by a lust for blood, and not at all by the desire to kill. She drinks the blood of voluntary donors, cutting his arm, carefully sucking the fluid without stopping the vein. Kane says that she gets pleasure comparable to sexual, only much more intimate. And the men who give her blood become more attached to the vampire. Today, many letters come to Presley, and voluntary donors also write to her. However, there are also letters with threats.
Mercy Brown. This girl is considered the last true vampire in North American history. Tourists are taken to her grave, telling the mystical story of Mercy, who turned into a vampire after her death. At one time, the fight against vampires became for society a way of detente and destruction of the evil that plagued them from within. In the story with Mercy Brown, pulmonary tuberculosis became such an evil. In the 18th century, every fourth person died of consumption. Tuberculosis killed someone for years, and someone extremely quickly - in a matter of weeks. The symptoms of consumption gave reason to classify the sick as vampires. People lost weight, became pale, and the skin took on an unhealthy appearance. At night, the situation became especially difficult, fluid and blood accumulate in the lungs, breathing becomes heavy. In the latter stages, the patient may find blood on himself in the morning, which belongs to himself and not to the victims. That is why some experts believe that the emergence of stories about vampires is associated precisely with consumption. In the Brown family, Mercy's mother, Maria Brown, was the first to die of the disease in 1883. Then the eldest daughter, Maria Olive, died. His only son, Edwin, also fell ill. Mercy Brown died in 1892, her brother at that time was 19 years old. After his sister's funeral, Edwin got worse and worse. Medicine could not help the head of the family, George Brown, in his grief - he had almost buried his entire family. As a result, he turned to folklore. For some reason, he decided that it was Mercy who was the source of the trouble in the family. The man had read about how to kill vampires. George decided to dig up his daughter's body, burn her heart, and feed the ashes to his son. So Edwin was supposed to find health, and the family was to get rid of the curse. It turned out that in the coffin, Mercy's body was turned over. There was no doubt then that she was a vampire. And in her body they found liquid blood, which was mistaken for fresh. This was another argument in favor of the fact that the girl was sucking blood from her brother. True, forensic medicine can explain all this and natural causes. Be that as it may, the girl's heart was burned, and the ashes were eaten. True, Edwin died anyway after a couple of months. Already today, people are talking about seeing the ghost of Mercy in the form of a glow over her grave.
A vampire from Alnwick Castle. Quite reliable sources often testify to the appearance of vampires. This story became known thanks to William of Newburgh, a renowned medieval historian. It was this man who wrote The History of England, an important source on the country's history dating back to the 12th century. I must say that the work has always attracted attention to itself with multiple occult stories about elves, vampires and ghosts. The historian described an incident that happened during his lifetime. The owner of Alnwick Castle had an unpleasant person in his service. He was constantly angry and annoyed, especially because of his nervous wife. It remains unknown what exactly worried her. One day a man decided to observe his bedroom, climbing to the roof for this. However, the mistrustful husband broke loose, fell and died the next day. Since then, something went wrong in the city. Several people have died inexplicable deaths. People began to fear leaving their homes in the evenings. They said that a strange man was wandering the streets. As a result, a series of deaths were attributed to a vampire who settled here after his death. A local priest on Palm Sunday gathered a crowd of the most devout and active residents, going with them to the cemetery. People dug up the grave of that very evil man and found a body filled with fresh blood. The corpse was hit with a shovel, and it literally exploded with liquid. It was decided that this is the vampire. The body was taken to the city, where it was burned. The series of strange deaths was interrupted, and people remembered for a long time about the vampire from Alnwick Castle. | <urn:uuid:b0eed86f-7bda-435c-9254-a5f8bfd4c248> | CC-MAIN-2022-33 | https://ss.fatdaddysmarina.com/1659-the-most-famous-vampires.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00408.warc.gz | en | 0.986687 | 4,378 | 2.53125 | 3 |
Great Strides: The Partnership Between VVA And The
BY MARC McCABE
Some three years ago VVA’s Florida State Council undertook an effort to help the veterans of the Seminole Tribe of Florida and their families.
Who are these veterans? They have fought in every war in which Americans have been involvedsometimes with, sometimes against. In Vietnam they fought valiantly and participated in major battles, from the Ia Drang Valley to Khe Sanh to Dak To. The Seminoles have a long warrior traditiona tradition that extends to the current wars in Iraq and Afghanistan.
The Seminole people are descendants of the Creeks. The diversity of the tribe is reflected in the fact that its members spoke seven languagesMuscogee, Hitchiti, Koasati, Alabama, Natchez, Yuchi, and Shawnee.
The early history of the Creek people in Florida is not well understood. The Apalachee were a Hitchiti-speaking people who may have been related to the Creek, Tamathli, or Apalachicola. The Apalachee, who lived along the Apalachicola River in the Florida Panhandle, were already in Florida at the time of Spanish contact.
At the beginning of the sixteenth century the Spanish attempted to set up a system of missions across northern Florida and southern Georgia. While these efforts failed in Creek country, some Creeks were drawn from Georgia down to the Spanish missions in Florida.
Around 1760 the first Creek-speaking people settled at Chocuchattee (Red House) near present day Brooksville, Florida. Drawn together by clans of early Creeks, they became the Seminole Indians. They were cattlemen. Soon the vast cattle herds of the growing Seminole Nation drew the attention of their white neighbors to the north. The conflicts occurring in Georgia began to spill into Florida due to an increased white hunger for land and cattle.
During the early 1800s the Seminole population in Florida remained fairly smallaround 1,200compared to the main body of Creeks in Georgia and Alabama, who numbered possibly 25,000. Then came the War of 1812 (1812-15), the Creek War (1813-14), the Creek Civil War (1813), the First Seminole War (1818-19), the Second Seminole War (1835-42), the Scare of 1849-50, and the Third Seminole War (1855-58).
These dates can be misleading. Some historians claim that the destruction of the British post on the Apalachicola River was the last battle of the War of 1812, while others call it the first battle of the First Seminole War. It is unlikely that anyone at the time saw the difference. In reality, all of these conflicts added up to one long, half-century war against the Creeks.
By 1823 the Seminole population had increased three or four fold with the arrival of newcomerssmall bands of Creeks and Seminoles who became cattle farmers. This population of about five thousand was thrown together and subjected to the Second Seminole War, the fiercest ever waged by the U.S. Government against native peoples. By the end of the war there were only three hundred Seminoles left in the territory. Then, during the Third Seminole War, another 240 or so Seminoles died. In the protracted conflict nearly the entire Seminole populationmen, women, and childrenwas slaughtered.
As VVA chief service officer, my office is located at the VA Regional Office in St. Petersburg, Floridasome 165 miles from the Seminole Tribe of Florida’s Brighton Reservation, which includes the Veterans Building for tribal members who served in the armed services. I have made this trek for close to three years; it’s a trip of some six and a half hoursnot counting the seven hours spent working with veterans. The initial trips were physically, intellectually, and emotionally exhausting.
My first visits also were very intimidating. I knew very little about Seminole culture or about the veterans themselves. They had an enormous mistrust of the U.S. Government and of the VA in particular.
I continued to make trips to the reservation at Brighton to help veterans with their claims, but those early days were full of uncertainty and mistrust. Once a month I left my house at 4:30 a.m. to arrive at the reservation by 9 a.m. For the first several months I questioned why I made the trips, as it was clear I was perceived as an outsider and an ignorant interloper. In order to help these veterans (at first only Vietnam-era veterans), I knew I had to do my homework, so I went to the Florida State University libraries. I quickly learned why these warriors were both proud but apprehensive.
It took nearly ten months to break the ice. Now there is very good communication among us veterans. We trust each other, and together we have enjoyed many successes. I am proud of the cooperation between VVA and the Seminole Tribe of Florida.
Often the closure is as significant as the financial windfall. One success story developed from the plight of a Seminole veteran who was attempting to get his claim before the Veterans Benefits Administration for type 2 diabetes and ischemic heart disease. Joe Lester John had served in Vietnam with the U.S. Air Force as a survival team leader for air crew members. His claim recently had been denied as had those of many other tribal members before him. We researched and developed his claim, then asked for a reconsideration based on new and material evidence.
During this process, Joe Lester John asked me pointed questions about a subject that I knew was difficult for him to broach. His daughter was born with a birth defect that he felt he had caused. She was a victim of his exposure to Agent Orange and had been diagnosed with spina bifida at birth. When I explained that this is a compensable illness, Joe Lester John was leery because he already had been denied this benefit.
But by this point I had been accepted and the veterans treated me as one of their own, something that brings me great pride and satisfaction. When I asked John to trust me and develop the case again, his family once again was plunged into a whirl of anguish about John’s 32-year-old daughter. We compiled the paperwork. Then, because she had already been denied, I traveled to the Regional Office in Denver to argue that this was a clear and unmistakable error by the VBA. Armed with abundant evidence, I was able to present the case to the assistant service center case manager for children of Vietnam veterans.
Just prior to the decision, Joe Lester John died. Two weeks later, while his daughter was going through yet another surgery, I received a phone call from Denver explaining that, yes, the original determination was in error and the grant of level III spina bifida would be retroactive to 2010.
This case opened the gates not only to Seminole veterans of all eras but also to the veterans who are employed by the Seminole Tribe of Florida. We filed a notice of disagreement on the date of benefits. While we are pleased to get the grant, we feel it should be retroactive to the date that a claim for this helpless child was filed in 2000. The Seminole Tribe of Florida’s Health Plan will be reimbursed some $1.34 million for the care they provided the daughter of this Vietnam veteran.
One other story became very personal for me and my support staff: that of Charlie Steel Gopher.
I didn’t know Gopher, but I knew and served with people who could have been his twin. We all served in our own little hell in the Republic of Vietnam. We are the faces and survivors of those horrific moments in life, the battles for Hoa Hoi, Khe Sanh, Hill 881, Kim Son, and many others whose strange names live forever in our psyches.
Charlie Steel Gopher was a Native American fighting for his country with the 1st Cavalry Division. However, he also fought the demons that came with those battles, compounded by the mixture of alcohol and race relations prevalent in the military during the ’60s.
Almost thirty-seven years ago Gopher took his life. The demons of war and the disrespect of his government that sent him to that faraway jungle to fight in an unpopular war finally got the best of him. That, however, wasn’t the only loss that day: Charlie Steel Gopher was abandoned by his government once again when his family applied for burial benefits.
The Veterans Administration (today the Department of Veterans Affairs) denied his family’s request and said Gopher was a dishonorable veteran who rated no benefits from his country. His family did what most did in the ’70s: They accepted it and moved on. They buried him. Gopher’s legacy was left to be discovered by his daughter, Rita McCabe.
The story really began in 1965 in the Ia Drang Valley. Charlie Steel Gopher had enlisted in the Army and decided he wanted to join the Army’s elite Airborne. He enlisted for a three-year tour of duty. He went to Vietnam and served with valor in two of the fiercest battles of the war.
Gopher continued to serve with distinction, completed his tour in Vietnam, and returned home. The Army asked that he immediately be discharged so he could re-enlist for six more years. This is where Gopher’s tale gets lost and the government betrayed his honorable service.
The VA decided that because Gopher did not serve out his original enlistment of three years he should not have the honors of a military funeral. They took it one step further and said Gopher’s service was dishonorable. While it is true that his second tour was considered other than honorable, it was not dishonorable. But Gopher had no one to speak for him in 1975.
The VA should have honored Charlie S. Gopher with a full military funeral and a flag for his casket, a headstone, and an honor guard. Now, after a request to reopen his case, the VA finally has granted his family the honors Gopher so rightfully deserved thirty-seven years ago.
Last Veterans Day, after we won this case before the VBA, the Seminole Tribe of Florida once again celebrated the life of this brave warrior. The brigade commander from the 1st Battalion of the 12th Cavalry of the 1st Cavalry Air Mobile presented the family and the tribal veterans the awards and honors Gopher never received during his brief life.
These and similar stories will be told for some time to come as the Seminole Tribe of Florida continues to see the toll of wars in far-off countries. Presently, young Seminoles serve in Afghanistan, Iraq, and other areas of conflict with valor, distinction, and honor.
With the help of VVA’s Florida State Council, the Veterans Council of the Seminole Tribe of Florida, and the Americans Serving Veterans Foundation, we have enrolled all veterans and the employees of the Seminole Tribe of Florida in the VBA system. To date we have recovered more than $5 million (not including the $1.34-million spina bifida award) for our Seminole brothers and sisters who fought in Vietnam.
VVA Welcomes Home all Seminole tribal veterans of Florida. A strong and vibrant partnership has developed between VVA and Florida’s Seminole Tribe. Great strides have been made in outreach.
|The VVA Veteran® is a publication of Vietnam Veterans of America. ©All rights reserved.
8719 Colesville Road, Suite 100, Silver Spring. MD 20910 | www.vva.org | contact us | <urn:uuid:4376c717-8c8a-47a6-a934-d1f5caec8f76> | CC-MAIN-2015-14 | http://vvaveteran.org/33-4/33-4_seminoles.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298889.70/warc/CC-MAIN-20150323172138-00120-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.979871 | 2,433 | 3.375 | 3 |
Most of the choices we make have uncertain consequences. In some cases the probabilities for different possible outcomes are precisely known, a condition termed "risky". In other cases when probabilities cannot be estimated, this is a condition described as "ambiguous". While most people are averse to both risk and ambiguity1,2, the degree of those aversions vary substantially across individuals, such that the subjective value of the same risky or ambiguous option can be very different for different individuals. We combine functional MRI (fMRI) with an experimental economics-based method3 to assess the neural representation of the subjective values of risky and ambiguous options4. This technique can be now used to study these neural representations in different populations, such as different age groups and different patient populations.
In our experiment, subjects make consequential choices between two alternatives while their neural activation is tracked using fMRI. On each trial subjects choose between lotteries that vary in their monetary amount and in either the probability of winning that amount or the ambiguity level associated with winning. Our parametric design allows us to use each individual's choice behavior to estimate their attitudes towards risk and ambiguity, and thus to estimate the subjective values that each option held for them. Another important feature of the design is that the outcome of the chosen lottery is not revealed during the experiment, so that no learning can take place, and thus the ambiguous options remain ambiguous and risk attitudes are stable. Instead, at the end of the scanning session one or few trials are randomly selected and played for real money. Since subjects do not know beforehand which trials will be selected, they must treat each and every trial as if it and it alone was the one trial on which they will be paid. This design ensures that we can estimate the true subjective value of each option to each subject. We then look for areas in the brain whose activation is correlated with the subjective value of risky options and for areas whose activation is correlated with the subjective value of ambiguous options.
23 Related JoVE Articles!
Studying Food Reward and Motivation in Humans
Institutions: University of Cambridge, University of Cambridge, University of Cambridge, Addenbrooke's Hospital.
A key challenge in studying reward processing in humans is to go beyond subjective self-report measures and quantify different aspects of reward such as hedonics, motivation, and goal value in more objective ways. This is particularly relevant for the understanding of overeating and obesity as well as their potential treatments. In this paper are described a set of measures of food-related motivation using handgrip force as a motivational measure. These methods can be used to examine changes in food related motivation with metabolic (satiety) and pharmacological manipulations and can be used to evaluate interventions targeted at overeating and obesity. However to understand food-related decision making in the complex food environment it is essential to be able to ascertain the reward goal values that guide the decisions and behavioral choices that people make. These values are hidden but it is possible to ascertain them more objectively using metrics such as the willingness to pay and a method for this is described. Both these sets of methods provide quantitative measures of motivation and goal value that can be compared within and between individuals.
Behavior, Issue 85, Food reward, motivation, grip force, willingness to pay, subliminal motivation
An Alternative to the Traditional Cold Pressor Test: The Cold Pressor Arm Wrap
Institutions: Marquette University.
Recently research on the relationship between stress and cognition, emotion, and behavior has greatly increased. These advances have yielded insights into important questions ranging from the nature of stress' influence on addiction1
to the role of stress in neural changes associated with alterations in decision-making2,3
. As topics being examined by the field evolve, however, so too must the methodologies involved. In this article a practical and effective alternative to a classic stress induction technique, the cold pressor test (CPT), is presented: the cold pressor arm wrap (CPAW). CPT typically involves immersion of a participant's dominant hand in ice-cold water for a period of time4
. The technique is associated with robust activation of the sympatho-adrenomedullary (SAM) axis (and release of catecholamines; e.g.
adrenaline and noradrenaline) and mild-to-moderate activation of the hypothalamic-pituitary-adrenal (HPA) axis with associated glucocorticoid (e.g.
cortisol) release. While CPT has been used in a wide range of studies, it can be impractical to apply in some research environments. For example use of water during, rather than prior to, magnetic resonance imaging (MRI) has the potential to damage sensitive and expensive equipment or interfere with acquisition of MRI signal. The CPAW is a practical and effective alternative to the traditional CPT. Composed of a versatile list of inexpensive and easily acquired components, CPAW makes use of MRI-safe gelpacs cooled to a temperature similar to CPT rather than actual water. Importantly CPAW is associated with levels of SAM and HPA activation comparable to CPT, and can easily be applied in a variety of research contexts. While it is important to maintain specific safety protocols when using the technique, these are easy to implement if planned for. Creation and use of the CPAW will be discussed.
Behavior, Issue 83, Sympathetic Nervous System, Glucocorticoids, Magnetic Resonance Imaging (MRI), Neuroimaging, Functional Neuroimaging, Cognitive Science, Stress, Neurosciences, cold pressor, hypothalamic-pituitary-adrenal axis, cortisol, sympatho-adrenomedullary axis, skin conductance
Laboratory-determined Phosphorus Flux from Lake Sediments as a Measure of Internal Phosphorus Loading
Institutions: Grand Valley State University.
Eutrophication is a water quality issue in lakes worldwide, and there is a critical need to identify and control nutrient sources. Internal phosphorus (P) loading from lake sediments can account for a substantial portion of the total P load in eutrophic, and some mesotrophic, lakes. Laboratory determination of P release rates from sediment cores is one approach for determining the role of internal P loading and guiding management decisions. Two principal alternatives to experimental determination of sediment P release exist for estimating internal load: in situ
measurements of changes in hypolimnetic P over time and P mass balance. The experimental approach using laboratory-based sediment incubations to quantify internal P load is a direct method, making it a valuable tool for lake management and restoration.
Laboratory incubations of sediment cores can help determine the relative importance of internal vs. external P loads, as well as be used to answer a variety of lake management and research questions. We illustrate the use of sediment core incubations to assess the effectiveness of an aluminum sulfate (alum) treatment for reducing sediment P release. Other research questions that can be investigated using this approach include the effects of sediment resuspension and bioturbation on P release.
The approach also has limitations. Assumptions must be made with respect to: extrapolating results from sediment cores to the entire lake; deciding over what time periods to measure nutrient release; and addressing possible core tube artifacts. A comprehensive dissolved oxygen monitoring strategy to assess temporal and spatial redox status in the lake provides greater confidence in annual P loads estimated from sediment core incubations.
Environmental Sciences, Issue 85, Limnology, internal loading, eutrophication, nutrient flux, sediment coring, phosphorus, lakes
Monitoring Intraspecies Competition in a Bacterial Cell Population by Cocultivation of Fluorescently Labelled Strains
Institutions: Georg-August University.
Many microorganisms such as bacteria proliferate extremely fast and the populations may reach high cell densities. Small fractions of cells in a population always have accumulated mutations that are either detrimental or beneficial for the cell. If the fitness effect of a mutation provides the subpopulation with a strong selective growth advantage, the individuals of this subpopulation may rapidly outcompete and even completely eliminate their immediate fellows. Thus, small genetic changes and selection-driven accumulation of cells that have acquired beneficial mutations may lead to a complete shift of the genotype of a cell population. Here we present a procedure to monitor the rapid clonal expansion and elimination of beneficial and detrimental mutations, respectively, in a bacterial cell population over time by cocultivation of fluorescently labeled individuals of the Gram-positive model bacterium Bacillus subtilis
. The method is easy to perform and very illustrative to display intraspecies competition among the individuals in a bacterial cell population.
Cellular Biology, Issue 83, Bacillus subtilis, evolution, adaptation, selective pressure, beneficial mutation, intraspecies competition, fluorophore-labelling, Fluorescence Microscopy
A Proboscis Extension Response Protocol for Investigating Behavioral Plasticity in Insects: Application to Basic, Biomedical, and Agricultural Research
Institutions: Arizona State University.
Insects modify their responses to stimuli through experience of associating those stimuli with events important for survival (e.g.
, food, mates, threats). There are several behavioral mechanisms through which an insect learns salient associations and relates them to these events. It is important to understand this behavioral plasticity for programs aimed toward assisting insects that are beneficial for agriculture. This understanding can also be used for discovering solutions to biomedical and agricultural problems created by insects that act as disease vectors and pests. The Proboscis Extension Response (PER) conditioning protocol was developed for honey bees (Apis mellifera
) over 50 years ago to study how they perceive and learn about floral odors, which signal the nectar and pollen resources a colony needs for survival. The PER procedure provides a robust and easy-to-employ framework for studying several different ecologically relevant mechanisms of behavioral plasticity. It is easily adaptable for use with several other insect species and other behavioral reflexes. These protocols can be readily employed in conjunction with various means for monitoring neural activity in the CNS via electrophysiology or bioimaging, or for manipulating targeted neuromodulatory pathways. It is a robust assay for rapidly detecting sub-lethal effects on behavior caused by environmental stressors, toxins or pesticides.
We show how the PER protocol is straightforward to implement using two procedures. One is suitable as a laboratory exercise for students or for quick assays of the effect of an experimental treatment. The other provides more thorough control of variables, which is important for studies of behavioral conditioning. We show how several measures for the behavioral response ranging from binary yes/no to more continuous variable like latency and duration of proboscis extension can be used to test hypotheses. And, we discuss some pitfalls that researchers commonly encounter when they use the procedure for the first time.
Neuroscience, Issue 91, PER, conditioning, honey bee, olfaction, olfactory processing, learning, memory, toxin assay
Measuring Neural and Behavioral Activity During Ongoing Computerized Social Interactions: An Examination of Event-Related Brain Potentials
Institutions: Illinois Wesleyan University.
Social exclusion is a complex social phenomenon with powerful negative consequences. Given the impact of social exclusion on mental and emotional health, an understanding of how perceptions of social exclusion develop over the course of a social interaction is important for advancing treatments aimed at lessening the harmful costs of being excluded. To date, most scientific examinations of social exclusion have looked at exclusion after a social interaction has been completed. While this has been very helpful in developing an understanding of what happens to a person following exclusion, it has not helped to clarify the moment-to-moment dynamics of the process of social exclusion. Accordingly, the current protocol was developed to obtain an improved understanding of social exclusion by examining the patterns of event-related brain activation that are present during social interactions. This protocol allows greater precision and sensitivity in detailing the social processes that lead people to feel as though they have been excluded from a social interaction. Importantly, the current protocol can be adapted to include research projects that vary the nature of exclusionary social interactions by altering how frequently participants are included, how long the periods of exclusion will last in each interaction, and when exclusion will take place during the social interactions. Further, the current protocol can be used to examine variables and constructs beyond those related to social exclusion. This capability to address a variety of applications across psychology by obtaining both neural and behavioral data during ongoing social interactions suggests the present protocol could be at the core of a developing area of scientific inquiry related to social interactions.
Behavior, Issue 93, Event-related brain potentials (ERPs), Social Exclusion, Neuroscience, N2, P3, Cognitive Control
Compensatory Limb Use and Behavioral Assessment of Motor Skill Learning Following Sensorimotor Cortex Injury in a Mouse Model of Ischemic Stroke
Institutions: Illinois Wesleyan University, University of Victoria.
Mouse models have become increasingly popular in the field of behavioral neuroscience, and specifically in studies of experimental stroke. As models advance, it is important to develop sensitive behavioral measures specific to the mouse. The present protocol describes a skilled motor task for use in mouse models of stroke. The Pasta Matrix Reaching Task functions as a versatile and sensitive behavioral assay that permits experimenters to collect accurate outcome data and manipulate limb use to mimic human clinical phenomena including compensatory strategies (i.e.
, learned non-use) and focused rehabilitative training. When combined with neuroanatomical tools, this task also permits researchers to explore the mechanisms that support behavioral recovery of function (or lack thereof) following stroke. The task is both simple and affordable to set up and conduct, offering a variety of training and testing options for numerous research questions concerning functional outcome following injury. Though the task has been applied to mouse models of stroke, it may also be beneficial in studies of functional outcome in other upper extremity injury models.
Behavior, Issue 89, Upper extremity impairment, Murine model, Rehabilitation, Reaching, Non-paretic limb training, Good limb training, Less-affected limb training, Learned non-use, Pasta matrix reaching task
Eye Tracking, Cortisol, and a Sleep vs. Wake Consolidation Delay: Combining Methods to Uncover an Interactive Effect of Sleep and Cortisol on Memory
Institutions: Boston College, Wofford College, University of Notre Dame.
Although rises in cortisol can benefit memory consolidation, as can sleep soon after encoding, there is currently a paucity of literature as to how these two factors may interact to influence consolidation. Here we present a protocol to examine the interactive influence of cortisol and sleep on memory consolidation, by combining three methods: eye tracking, salivary cortisol analysis, and behavioral memory testing across sleep and wake delays. To assess resting cortisol levels, participants gave a saliva sample before viewing negative and neutral objects within scenes. To measure overt attention, participants’ eye gaze was tracked during encoding. To manipulate whether sleep occurred during the consolidation window, participants either encoded scenes in the evening, slept overnight, and took a recognition test the next morning, or encoded scenes in the morning and remained awake during a comparably long retention interval. Additional control groups were tested after a 20 min delay in the morning or evening, to control for time-of-day effects. Together, results showed that there is a direct relation between resting cortisol at encoding and subsequent memory, only following a period of sleep. Through eye tracking, it was further determined that for negative stimuli, this beneficial effect of cortisol on subsequent memory may be due to cortisol strengthening the relation between where participants look during encoding and what they are later able to remember. Overall, results obtained by a combination of these methods uncovered an interactive effect of sleep and cortisol on memory consolidation.
Behavior, Issue 88, attention, consolidation, cortisol, emotion, encoding, glucocorticoids, memory, sleep, stress
Optogenetic Stimulation of the Auditory Nerve
Institutions: University Medical Center Goettingen, University of Goettingen, University Medical Center Goettingen, University of Goettingen, University of Guanajuato.
Direct electrical stimulation of spiral ganglion neurons (SGNs) by cochlear implants (CIs) enables open speech comprehension in the majority of implanted deaf subjects1-6
. Nonetheless, sound coding with current CIs has poor frequency and intensity resolution due to broad current spread from each electrode contact activating a large number of SGNs along the tonotopic axis of the cochlea7-9
. Optical stimulation is proposed as an alternative to electrical stimulation that promises spatially more confined activation of SGNs and, hence, higher frequency resolution of coding. In recent years, direct infrared illumination of the cochlea has been used to evoke responses in the auditory nerve10
. Nevertheless it requires higher energies than electrical stimulation10,11
and uncertainty remains as to the underlying mechanism12
. Here we describe a method based on optogenetics to stimulate SGNs with low intensity blue light, using transgenic mice with neuronal expression of channelrhodopsin 2 (ChR2)13
or virus-mediated expression of the ChR2-variant CatCh14
. We used micro-light emitting diodes (µLEDs) and fiber-coupled lasers to stimulate ChR2-expressing SGNs through a small artificial opening (cochleostomy) or the round window. We assayed the responses by scalp recordings of light-evoked potentials (optogenetic auditory brainstem response: oABR) or by microelectrode recordings from the auditory pathway and compared them with acoustic and electrical stimulation.
Neuroscience, Issue 92, hearing, cochlear implant, optogenetics, channelrhodopsin, optical stimulation, deafness
Automated, Quantitative Cognitive/Behavioral Screening of Mice: For Genetics, Pharmacology, Animal Cognition and Undergraduate Instruction
Institutions: Rutgers University, Koç University, New York University, Fairfield University.
We describe a high-throughput, high-volume, fully automated, live-in 24/7 behavioral testing system for assessing the effects of genetic and pharmacological manipulations on basic mechanisms of cognition and learning in mice. A standard polypropylene mouse housing tub is connected through an acrylic tube to a standard commercial mouse test box. The test box has 3 hoppers, 2 of which are connected to pellet feeders. All are internally illuminable with an LED and monitored for head entries by infrared (IR) beams. Mice live in the environment, which eliminates handling during screening. They obtain their food during two or more daily feeding periods by performing in operant (instrumental) and Pavlovian (classical) protocols, for which we have written protocol-control software and quasi-real-time data analysis and graphing software. The data analysis and graphing routines are written in a MATLAB-based language created to simplify greatly the analysis of large time-stamped behavioral and physiological event records and to preserve a full data trail from raw data through all intermediate analyses to the published graphs and statistics within a single data structure. The data-analysis code harvests the data several times a day and subjects it to statistical and graphical analyses, which are automatically stored in the "cloud" and on in-lab computers. Thus, the progress of individual mice is visualized and quantified daily. The data-analysis code talks to the protocol-control code, permitting the automated advance from protocol to protocol of individual subjects. The behavioral protocols implemented are matching, autoshaping, timed hopper-switching, risk assessment in timed hopper-switching, impulsivity measurement, and the circadian anticipation of food availability. Open-source protocol-control and data-analysis code makes the addition of new protocols simple. Eight test environments fit in a 48 in x 24 in x 78 in cabinet; two such cabinets (16 environments) may be controlled by one computer.
Behavior, Issue 84, genetics, cognitive mechanisms, behavioral screening, learning, memory, timing
A Fully Automated Rodent Conditioning Protocol for Sensorimotor Integration and Cognitive Control Experiments
Institutions: Michigan State University, Michigan State University, Michigan State University.
Rodents have been traditionally used as a standard animal model in laboratory experiments involving a myriad of sensory, cognitive, and motor tasks. Higher cognitive functions that require precise control over sensorimotor responses such as decision-making and attentional modulation, however, are typically assessed in nonhuman primates. Despite the richness of primate behavior that allows multiple variants of these functions to be studied, the rodent model remains an attractive, cost-effective alternative to primate models. Furthermore, the ability to fully automate operant conditioning in rodents adds unique advantages over the labor intensive training of nonhuman primates while studying a broad range of these complex functions.
Here, we introduce a protocol for operantly conditioning rats on performing working memory tasks. During critical epochs of the task, the protocol ensures that the animal's overt movement is minimized by requiring the animal to 'fixate' until a Go cue is delivered, akin to nonhuman primate experimental design. A simple two alternative forced choice task is implemented to demonstrate the performance. We discuss the application of this paradigm to other tasks.
Behavior, Issue 86, operant conditioning, cognitive function, sensorimotor integration, decision making, Neurophysiology
Automated Visual Cognitive Tasks for Recording Neural Activity Using a Floor Projection Maze
Institutions: Brown University, Brown University.
Neuropsychological tasks used in primates to investigate mechanisms of learning and memory are typically visually guided cognitive tasks. We have developed visual cognitive tasks for rats using the Floor Projection Maze1,2
that are optimized for visual abilities of rats permitting stronger comparisons of experimental findings with other species.
In order to investigate neural correlates of learning and memory, we have integrated electrophysiological recordings into fully automated cognitive tasks on the Floor Projection Maze1,2
. Behavioral software interfaced with an animal tracking system allows monitoring of the animal's behavior with precise control of image presentation and reward contingencies for better trained animals. Integration with an in vivo
electrophysiological recording system enables examination of behavioral correlates of neural activity at selected epochs of a given cognitive task.
We describe protocols for a model system that combines automated visual presentation of information to rodents and intracranial reward with electrophysiological approaches. Our model system offers a sophisticated set of tools as a framework for other cognitive tasks to better isolate and identify specific mechanisms contributing to particular cognitive processes.
Neurobiology, Issue 84, Rat behavioral tasks, visual discrimination, chronic electrophysiological recordings, Floor Projection Maze, neuropsychology, learning, memory
Perceptual and Category Processing of the Uncanny Valley Hypothesis' Dimension of Human Likeness: Some Methodological Issues
Institutions: University of Zurich.
Mori's Uncanny Valley Hypothesis1,2
proposes that the perception of humanlike characters such as robots and, by extension, avatars (computer-generated characters) can evoke negative or positive affect (valence) depending on the object's degree of visual and behavioral realism along a dimension of human likeness
) (Figure 1
). But studies of affective valence of subjective responses to variously realistic non-human characters have produced inconsistent findings 3, 4, 5, 6
. One of a number of reasons for this is that human likeness is not perceived as the hypothesis assumes. While the DHL can be defined following Mori's description as a smooth linear change in the degree of physical humanlike similarity, subjective perception of objects along the DHL can be understood in terms of the psychological effects of categorical perception (CP) 7
. Further behavioral and neuroimaging investigations of category processing and CP along the DHL and of the potential influence of the dimension's underlying category structure on affective experience are needed. This protocol therefore focuses on the DHL and allows examination of CP. Based on the protocol presented in the video as an example, issues surrounding the methodology in the protocol and the use in "uncanny" research of stimuli drawn from morph continua to represent the DHL are discussed in the article that accompanies the video. The use of neuroimaging and morph stimuli to represent the DHL in order to disentangle brain regions neurally responsive to physical human-like similarity from those responsive to category change and category processing is briefly illustrated.
Behavior, Issue 76, Neuroscience, Neurobiology, Molecular Biology, Psychology, Neuropsychology, uncanny valley, functional magnetic resonance imaging, fMRI, categorical perception, virtual reality, avatar, human likeness, Mori, uncanny valley hypothesis, perception, magnetic resonance imaging, MRI, imaging, clinical techniques
From Voxels to Knowledge: A Practical Guide to the Segmentation of Complex Electron Microscopy 3D-Data
Institutions: Lawrence Berkeley National Laboratory, Lawrence Berkeley National Laboratory, Lawrence Berkeley National Laboratory.
Modern 3D electron microscopy approaches have recently allowed unprecedented insight into the 3D ultrastructural organization of cells and tissues, enabling the visualization of large macromolecular machines, such as adhesion complexes, as well as higher-order structures, such as the cytoskeleton and cellular organelles in their respective cell and tissue context. Given the inherent complexity of cellular volumes, it is essential to first extract the features of interest in order to allow visualization, quantification, and therefore comprehension of their 3D organization. Each data set is defined by distinct characteristics, e.g.
, signal-to-noise ratio, crispness (sharpness) of the data, heterogeneity of its features, crowdedness of features, presence or absence of characteristic shapes that allow for easy identification, and the percentage of the entire volume that a specific region of interest occupies. All these characteristics need to be considered when deciding on which approach to take for segmentation.
The six different 3D ultrastructural data sets presented were obtained by three different imaging approaches: resin embedded stained electron tomography, focused ion beam- and serial block face- scanning electron microscopy (FIB-SEM, SBF-SEM) of mildly stained and heavily stained samples, respectively. For these data sets, four different segmentation approaches have been applied: (1) fully manual model building followed solely by visualization of the model, (2) manual tracing segmentation of the data followed by surface rendering, (3) semi-automated approaches followed by surface rendering, or (4) automated custom-designed segmentation algorithms followed by surface rendering and quantitative analysis. Depending on the combination of data set characteristics, it was found that typically one of these four categorical approaches outperforms the others, but depending on the exact sequence of criteria, more than one approach may be successful. Based on these data, we propose a triage scheme that categorizes both objective data set characteristics and subjective personal criteria for the analysis of the different data sets.
Bioengineering, Issue 90, 3D electron microscopy, feature extraction, segmentation, image analysis, reconstruction, manual tracing, thresholding
Training Synesthetic Letter-color Associations by Reading in Color
Institutions: University of Amsterdam.
Synesthesia is a rare condition in which a stimulus from one modality automatically and consistently triggers unusual sensations in the same and/or other modalities. A relatively common and well-studied type is grapheme-color synesthesia, defined as the consistent experience of color when viewing, hearing and thinking about letters, words and numbers. We describe our method for investigating to what extent synesthetic associations between letters and colors can be learned by reading in color in nonsynesthetes. Reading in color is a special method for training associations in the sense that the associations are learned implicitly while the reader reads text as he or she normally would and it does not require explicit computer-directed training methods. In this protocol, participants are given specially prepared books to read in which four high-frequency letters are paired with four high-frequency colors. Participants receive unique sets of letter-color pairs based on their pre-existing preferences for colored letters. A modified Stroop task is administered before and after reading in order to test for learned letter-color associations and changes in brain activation. In addition to objective testing, a reading experience questionnaire is administered that is designed to probe for differences in subjective experience. A subset of questions may predict how well an individual learned the associations from reading in color. Importantly, we are not claiming that this method will cause each individual to develop grapheme-color synesthesia, only that it is possible for certain individuals to form letter-color associations by reading in color and these associations are similar in some aspects to those seen in developmental grapheme-color synesthetes. The method is quite flexible and can be used to investigate different aspects and outcomes of training synesthetic associations, including learning-induced changes in brain function and structure.
Behavior, Issue 84, synesthesia, training, learning, reading, vision, memory, cognition
Using the Threat Probability Task to Assess Anxiety and Fear During Uncertain and Certain Threat
Institutions: University of Wisconsin-Madison.
Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e.
, “startle probes”). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g.
, neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g
., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion.
Behavior, Issue 91,
Startle; electromyography; shock; addiction; uncertainty; fear; anxiety; humans; psychophysiology; translational
Cortical Source Analysis of High-Density EEG Recordings in Children
Institutions: UCL Institute of Child Health, University College London.
EEG is traditionally described as a neuroimaging technique with high temporal and low spatial resolution. Recent advances in biophysical modelling and signal processing make it possible to exploit information from other imaging modalities like structural MRI that provide high spatial resolution to overcome this constraint1
. This is especially useful for investigations that require high resolution in the temporal as well as spatial domain. In addition, due to the easy application and low cost of EEG recordings, EEG is often the method of choice when working with populations, such as young children, that do not tolerate functional MRI scans well. However, in order to investigate which neural substrates are involved, anatomical information from structural MRI is still needed. Most EEG analysis packages work with standard head models that are based on adult anatomy. The accuracy of these models when used for children is limited2
, because the composition and spatial configuration of head tissues changes dramatically over development3
In the present paper, we provide an overview of our recent work in utilizing head models based on individual structural MRI scans or age specific head models to reconstruct the cortical generators of high density EEG. This article describes how EEG recordings are acquired, processed, and analyzed with pediatric populations at the London Baby Lab, including laboratory setup, task design, EEG preprocessing, MRI processing, and EEG channel level and source analysis.
Behavior, Issue 88, EEG, electroencephalogram, development, source analysis, pediatric, minimum-norm estimation, cognitive neuroscience, event-related potentials
Functional Imaging with Reinforcement, Eyetracking, and Physiological Monitoring
Institutions: Columbia University, Columbia University, Columbia University.
We use functional brain imaging (fMRI) to study neural circuits that underlie decision-making. To understand how outcomes affect decision processes, simple perceptual tasks are combined with appetitive and aversive reinforcement. However, the use of reinforcers such as juice and airpuffs can create challenges for fMRI. Reinforcer delivery can cause head movement, which creates artifacts in the fMRI signal. Reinforcement can also lead to changes in heart rate and respiration that are mediated by autonomic pathways. Changes in heart rate and respiration can directly affect the fMRI (BOLD) signal in the brain and can be confounded with signal changes that are due to neural activity. In this presentation, we demonstrate methods for administering reinforcers in a controlled manner, for stabilizing the head, and for measuring pulse and respiration.
Medicine, Issue 21, Neuroscience, Psychiatry, fMRI, Decision Making, Reward, Punishment, Pulse, Respiration, Eye Tracking, Psychology
Brain Imaging Investigation of the Neural Correlates of Emotional Autobiographical Recollection
Institutions: University of Alberta, Edmonton, University of Illinois, Urbana-Champaign, University of Illinois, Urbana-Champaign, University of Illinois, Urbana-Champaign.
Recollection of emotional autobiographical memories (AMs) is important to healthy cognitive and affective functioning 1
- remembering positive AMs is associated with increased personal well-being and self-esteem 2
, whereas remembering and ruminating on negative AMs may lead to affective disorders 3
. Although significant progress has been made in understanding the brain mechanisms underlying AM retrieval in general (reviewed in 4, 5
), less is known about the effect of emotion on the subjective re-experience of AMs and the associated neural correlates. This is in part due to the fact that, unlike the investigations of the emotion effect on memory for laboratory-based micro
events (reviewed in 6, 7-9
), often times AM studies do not have a clear focus on the emotional aspects of remembering personal
events (but see 10
). Here, we present a protocol that allows investigation of the neural correlates of recollecting emotional AMs using functional magnetic resonance imaging (fMRI). Cues for these memories are collected prior to scanning by means of an autobiographical memory questionnaire (AMQ), therefore allowing for proper selection of emotional AMs based on their phenomenological properties (i.e., intensity, vividness, personal significance). This protocol can be used in healthy and clinical populations alike.
Neuroscience, Issue 54, Personal Memories, Retrieval Focus, Cognitive Distraction, Emotion Regulation, Neuroimaging
A Fully Automated and Highly Versatile System for Testing Multi-cognitive Functions and Recording Neuronal Activities in Rodents
Institutions: The Neurosciences Institute, San Diego, CA.
We have developed a fully automated system for operant behavior testing and neuronal activity recording by which multiple cognitive brain functions can be investigated in a single task sequence. The unique feature of this system is a custom-made, acoustically transparent chamber that eliminates many of the issues associated with auditory cue control in most commercially available chambers. The ease with which operant devices can be added or replaced makes this system quite versatile, allowing for the implementation of a variety of auditory, visual, and olfactory behavioral tasks. Automation of the system allows fine temporal (10 ms) control and precise time-stamping of each event in a predesigned behavioral sequence. When combined with a multi-channel electrophysiology recording system, multiple cognitive brain functions, such as motivation, attention, decision-making, patience, and rewards, can be examined sequentially or independently.
Neuroscience, Issue 63, auditory behavioral task, acoustic chamber, cognition test, multi-channel recording, electrophysiology, attention, motivation, decision, patience, rat, two-alternative choice pitch discrimination task, behavior
Brain Imaging Investigation of the Neural Correlates of Observing Virtual Social Interactions
Institutions: University of Alberta, University of Illinois, University of Alberta, University of Alberta, University of Alberta, University of Illinois at Urbana-Champaign, University of Illinois at Urbana-Champaign.
The ability to gauge social interactions is crucial in the assessment of others’ intentions. Factors such as facial expressions and body language affect our decisions in personal and professional life alike 1
. These "friend or foe
" judgements are often based on first impressions, which in turn may affect our decisions to "approach or avoid
". Previous studies investigating the neural correlates of social cognition tended to use static facial stimuli 2
. Here, we illustrate an experimental design in which whole-body animated characters were used in conjunction with functional magnetic resonance imaging (fMRI) recordings. Fifteen participants were presented with short movie-clips of guest-host interactions in a business setting, while fMRI data were recorded; at the end of each movie, participants also provided ratings of the host behaviour. This design mimics more closely real-life situations, and hence may contribute to better understanding of the neural mechanisms of social interactions in healthy behaviour, and to gaining insight into possible causes of deficits in social behaviour in such clinical conditions as social anxiety and autism 3
Neuroscience, Issue 53, Social Perception, Social Knowledge, Social Cognition Network, Non-Verbal Communication, Decision-Making, Event-Related fMRI
Brain Imaging Investigation of the Neural Correlates of Emotion Regulation
Institutions: University of Illinois, Urbana-Champaign, University of Alberta, Edmonton, University of Alberta, Edmonton, University of Alberta, Edmonton, University of Alberta, Edmonton, University of Illinois, Urbana-Champaign, University of Illinois, Urbana-Champaign.
The ability to control/regulate emotions is an important coping mechanism in the face of emotionally stressful situations. Although significant progress has been made in understanding conscious/deliberate emotion regulation (ER), less is known about non-conscious/automatic ER and the associated neural correlates. This is in part due to the problems inherent in the unitary concepts of automatic and conscious processing1
. Here, we present a protocol that allows investigation of the neural correlates of both deliberate and automatic ER using functional magnetic resonance imaging (fMRI). This protocol allows new avenues of inquiry into various aspects of ER. For instance, the experimental design allows manipulation of the goal to regulate emotion (conscious vs. non-conscious), as well as the intensity of the emotional challenge (high vs. low). Moreover, it allows investigation of both immediate (emotion perception) and long-term effects (emotional memory) of ER strategies on emotion processing. Therefore, this protocol may contribute to better understanding of the neural mechanisms of emotion regulation in healthy behaviour, and to gaining insight into possible causes of deficits in depression and anxiety disorders in which emotion dys
regulation is often among the core debilitating features.
Neuroscience, Issue 54, Emotion Suppression, Automatic Emotion Control, Deliberate Emotion Control, Goal Induction, Neuroimaging
Brain Imaging Investigation of the Memory-Enhancing Effect of Emotion
Institutions: University of Alberta, University of Illinois, Urbana-Champaign, Duke University, University of Illinois, Urbana-Champaign.
Emotional events tend to be better remembered than non-emotional events1,2
. One goal of cognitive and affective neuroscientists is
to understand the neural mechanisms underlying this enhancing effect of emotion on memory. A method that has proven particularly influential in the
investigation of the memory-enhancing effect of emotion is the so-called subsequent memory paradigm (SMP). This method was originally used to investigate the
neural correlates of non-emotional memories3
, and more recently we and others also applied it successfully to studies of emotional memory (reviewed in4, 5-7
Here, we describe a protocol that allows investigation of the neural correlates of the memory-enhancing effect of emotion using the SMP in conjunction with
event-related functional magnetic resonance imaging (fMRI). An important feature of the SMP is that it allows separation of brain activity specifically
associated with memory from more general activity associated with perception. Moreover, in the context of investigating the impact of emotional stimuli,
SMP allows identification of brain regions whose activity is susceptible to emotional modulation of both general/perceptual and memory-specific processing.
This protocol can be used in healthy subjects8-15
, as well as in clinical patients where there are alterations in the neural correlates of emotion perception
and biases in remembering emotional events, such as those suffering from depression and post-traumatic stress disorder (PTSD)16, 17
Neuroscience, Issue 51, Affect, Recognition, Recollection, Dm Effect, Neuroimaging | <urn:uuid:68e29242-37de-44bc-b367-ceee651d6c20> | CC-MAIN-2016-50 | http://www.jove.com/visualize/abstract/22479547/led-into-temptation-rewarding-brand-logos-bias-neural-encoding | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541324.73/warc/CC-MAIN-20161202170901-00506-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.910057 | 8,669 | 2.953125 | 3 |
Fossil remains of dinoflagellates consist primarily of the nonmotile or cyst stage. Dinoflagellate cysts are common in most sediment samples from the Chesapeake Bay. They are useful in documenting temporal trends in Chesapeake phytoplankton during climatic changes in the Holocene, as well as during the postcolonial period of 19th century agricultural land clearance and 20th century fertilizer application and urbanization.
Dried sediment samples, weighing between 4.0 and 7.0 grams, were prepared for palynological analysis by decalcifying with dilute (i.e. 10%) hydrochloric acid and then neutralizing (to a pH of 7) with deionized water to remove carbonates. After neutralization, hydrofluoric acid (52% by volume) was added to each sample and the resulting mixture was allowed to rest at room temperature for ~48 hours. After resting, the samples were rinsed with deionized water into 50 milliliter (ml) centrifuge tubes. A 10 ml solution of acetic anhydride and sulfuric acid, in a ratio of 9:1, was added to each sample. Samples were heated in a water bath at 100°C for 10 minutes after which, 25 ml glacial acetic acid was added to each sample to arrest the reaction. The samples were then treated with 25 ml solution of 10% potassium hydroxide and heated to 70°C in a water bath.
The samples were then centrifuged with a Damer/IEC Model K centrifuge at 1500 rpm and washed until neutralized to a pH of 7. If the samples contained sand, heavy minerals, or organic material, they were centrifuged at 500 rpm for 20 minutes and then at 1500 rpm for 10 minutes with 3 ml zinc chloride, a heavy liquid with a specific gravity of 2.1. After neutralization, the samples were sieved through 1249 micron (µm) and 10µm nylon mesh sieves to remove plant material and clay-sized particles. The residue was mixed with warm (i.e. 5°C) glycerin jelly and placed on microscope slides for final preparation.
Two drops of the residue and glycerin jelly mixture was dropped onto a clean slide and placed on a warming table at ~40°C. The coverslips were carefully placed on the slides and allowed to cure for 48 hours on the warming table. The slides were cured upside-down (by supporting the edges of the slides with thin wood dowels) to bring the fossil cysts closer to the coverslip, making it easier to focus. The coverslip was then outlined with clear acrylic to seal the slide and each slide was labeled with location, sample date, and depth.
The slides were mounted on a binocular microscope to identify and count a minimum of 300 dinoflagellate cysts for meaningful statistical analysis (Imbrie and others, 1973). Scanning Electron Micrographs were taken of individual dinoflagellates to insure taxonomic identity (Verardo, 1999). The relative abundance (i.e. percent of total number of individuals) of each species was calculated by dividing the number of individuals by the total number of individuals in each sample.
The age model for MD99-22099 was developed from radiocarbon dating (see Colman and others, Chapter 6, this volume) and pollen biostratigraphy (Willard and Korejwo, Chapter 7, this volume). One datum of particular importance when interpreting dinoflagellate trends is the agricultural horizon, which occurs at ~250-260 cm in core MD99-2209. This horizon refers to the sharp rise in Ambrosia (ragweed) pollen to greater than 10% of the total pollen assemblage that occurred during the 1800's (Brush and others, 1982). Willard and others (in prep.) discuss recent data on the timing and impact of 19th century land clearance on Chesapeake Bay and its watershed.
The mean abundance of Spiniferites cysts in MD99-2209 varies from <30 to ~60% between the bottom of the core (~1700 cm) and the unconformity near 800 cm. Above the unconformity the abundance of Spiniferites progressively increases, reaching a peak above 80% near 200 cm, above which it varies between 50 and 80%. These variations in relative abundance presumably signify changes in temperature and salinity, although we cannot yet quantify these factors for this site. It is noteworthy that the relatively high proportions of Spiniferites in the uppermost 200 cm, which corresponds to the past 150 years, is reminiscent of the dominance of this genus between 1600 and 1720 cm.
One species in particular, Spiniferites mirabilis, seems to be an excellent indicator of the negative impact of 19th century agriculture and 20th century fertilizer application had on Bay dinoflagellates. Prior to the 19th century, this species varied from <4-7% of the total dinocyst assemblage, with the exception of an interval between 600-700 cm (about 1300-1600 yr BP). Pre-historical low abundance of S. mirabilis contrasts sharply with its abundance since the middle 1800's, when it increased to 10-15%, occasionally reaching 20% during the 1900's. Harland (1983) and Turon (1984) present evidence that S. mirabilis can tolerate increased nutrient concentrations of phosphate and nitrate and warm surface waters. Recent studies of the modern distribution of S. mirabilis in coastal bays and estuaries along the Atlantic and Gulf coasts of North America support the idea that this species is extremely tolerant of high nutrient levels, reduced and variable salinity, high turbidity, and perhaps reduced levels of dissolved oxygen (Verardo, unpublished data; Willard and others, in prep.). The results from MD99-2209 demonstrate that during the last 30 years, S. mirabilis has reached unprecedented levels of abundance in Chesapeake Bay, probably related to changing environmental conditions.
The second most abundant dinoflagellate genus in MD99-2209 is Operculodinium centrocarpum. O. centrocarpum has a modern distribution associated with estuarine and coastal waters in mild to cool temperate regions (Wall and others, 1977; Harland, 1983; de Vernal and others, 1992; Brenner, 1998). This species comprised 5 to 30% of early Holocene assemblages between 1600 and 1400 cm. The abundance then decreased to 10% before increasing to 25% by 900 cm. O. centrocarpum maintained a steady relative abundance of 5-15% for much of the past 2000 years (above 800 cm) although a small net decline can be observed and increased variability above the 200 cm level. Other species, such as Polysphaeridium zoharyi and Lingulodinium macherophorum are presently both found along the southeastern seaboard of the United States and the Caribbean and are considered tropical-subtropical marine species (Wall and others, 1977; Harland, 1983; Edwards and Anderle, 1992). Both of these species exhibit oscillating abundances between 5-10% during the early Holocene (between 1700 cm and 900 cm).
One of the noteworthy results to emerge from this preliminary data is the progressive decrease in the relative abundances of Polysphaeridium zoharyi, Lingulodinium macherophorum and Nematophaeropsis spp. in the last ~2300 years of Late Holocene deposition (the interval 800 cm to 0 cm). Nematophaeropsis spp., a genus found in the North Atlantic associated with the cold North Atlantic Gyre (Wall and others, 1977; Harland, 1983; Edwards and Anderle, 1992), decreased to ~1% at the surface. The only taxonomic groups that did not decrease in abundance during the Late Holocene were Spiniferites spp. and S. mirabilis, which presently is the dominant taxon in the Bay. These trends are also observed in dinoflagellate assemblages from other Chesapeake Bay cores (Verardo and others, 1998; Willard and others, in prep.) and suggest a diminished phytoplankton biodiversity during the post-Colonial period.
There are several reasons to support the argument that the cysts recovered from MD99-2209 and other Holocene sediments from Chesapeake Bay cores represent autochthonous assemblages that inhabited Chesapeake Bay. First, the excellent preservation of cysts (Verardo, 1999), including coloration similar to cysts from modern sediments, suggests they have not been transported. Second, although species such as P. zoharyi occur in sediments near the Bay (Edwards, 1986), P. zoharyi is also a component of the modern assemblage. Extinct Miocene species have rarely been encountered in the several hundred Holocene dinocyst samples from the Chesapeake Bay. Third, other microfaunal and floral paleoecological indicators (Cooper and Brush, 1991; Cronin and others, 2000) show concordant trends with those of the dinoflagellates, suggesting the entire ecosystem, including phytoplankton, respond to environmental change. Fourth, P. zoharyi and other Chesapeake Bay dinoflagellate taxa typically live in marine environments, phytoplanton populations could easily enter the Bay at its mouth where deep saline water flows into the main channel from the continental shelf. In sum, there is no evidence for significant reworking of Cenozoic dinoflagellates in the Marion-Dufresne and other Chesapeake Bay sediment cores.
Brush, G., Martin, E., DeFries, R., and Rice, C., 1982, Comparisons of 210Pb and pollen methods for determining rates of estuarine sediment accumulation: Quaternary Research, v. 18, p. 196.
Cronin, T., Verardo, S., Weimer, L., Ishman, S., and Dwyer, G., 1999, Holocene climatic variability in the eastern U.S. recorded in Chesapeake Bay sediments [abs.]: American Geophysical Union, San Francisco.
Cronin, T., Willard, D., Karlsen, A., Ishman, S., Verardo, S., McGeehin, J., Kerhin, R., Holmes, C., Colman, S., Zimmerman, A., 2000, Climatic variability in the eastern United States over the past millennium from Chesapeake Bay sediments: Geology, v. 28, p. 3.
de Vernal, A., Londeix, L., Mudie, P., Harland, P., Morzadec-Kerfourn, M., Turon, J-L., and Wrenn, J., 1992, Quaternary organic-walled dinoflagellate cysts of the North Atlantic ocean and adjacent seas - ecostratigraphy and biostratigraphy, in Head, M., and J. Wrenn, eds., Neogene and Quaternary dinoflagellate cysts and acritarchs: American Association of Stratigraphic Palynologists, p. 289.
Edwards, L., 1986, Late Cenozoic dinoflagellate cysts from South Carolina, U.S.A., Wrenn, J.S., Duffied, Stein, J., eds., American Association of Palynologists, Contribution Series Number 17.
Edwards, L., and Anderle, V., 1992, Distribution of selected dinoflagellate cysts in modern marine sediments, in Head, M., and Wrenn, J., eds., Neogene and Quaternary dinoflagellate cysts and acritarchs: American Association of Stratigraphic Palynologists, p. 259.
Fensome, R., Riding, J., Taylor, F., 1996, Dinoflagellates, in Jansonius, J., and McGregor, D., eds., Palynology - principles and applications: American Association of Stratigraphic Palynologists, p. 107.
Harland, R., 1983. Distribution maps of recent dinoflagellate cysts in bottom sediments from the North Atlantic Ocean and adjacent seas: Paleontology, v. 26, p. 321.
Imbrie, J., van Donk, J., and Kipp, N., 1973, Paleoclimatic investigation of a late Pleistocene Caribbean deep-sea core: Quaternary Research, v. 3, p. 10.
Turon J-L., 1984, Le palynoplancton dans l'environnement de l'Atlantique nord-oriental. Evolution climatique et hydrologique depuis le dernier maximum glaciaire: Memoires de l'Institut de Geologie du Bassin d'Aquitaine, v. 17, p. 1.
Verardo, S., 1999, Dinoflagellates, in Cronin, T., Wagner, R., and Slattery, M., eds., Microfossils from Chesapeake Bay sediments - illustrations and species database: United States Geological Survey Open-File Report 99-145, 159 sp.
Verardo, S., Cronin, T., Willard, D. and Edwards, L., 1998, Catastrophic impact of 19th century environmental changes on Chesapeake Bay Dinoflagellate Cysts [abs.]: Geological Society of America.
Wall, D., Dale, B., Lohmann, G., and Smith, W., 1977, The environmental and climatic distribution of dinoflagellate cysts in modern marine sediments from regions in the North and South Atlantic Oceans and adjacent seas: Marine Micropaleontology, v. 2, p. 121.
Willard, D.A., Verardo, S., Cronin, T.M., in prep., Late Holocene climate variability and anthropogenic influence in Chesapeake Bay.
U.S. Department of Interior, U.S. Geological Survey
URL of this page: http://pubs.usgs.gov/openfile/of00-306/chapter8/index.html
Maintained by: Eastern Publications Group Web Team
Last modified: 03.30.01 (krw) | <urn:uuid:a2da9a67-5096-4fcb-be29-c9460c2f6d71> | CC-MAIN-2015-11 | http://pubs.usgs.gov/of/2000/of00-306/chapter8/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00162-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.883097 | 3,052 | 2.984375 | 3 |
St. George’s School
What supports students to be motivated, self-directed learners? To address this question, RSI collaborated with a group of teachers at St. George’s School to carry out a mixed methods study on motivation. Students from grades 9-12 completed an online survey designed to explore factors that contribute to motivation.
Consistent with previous research, we found that students are most internally motivated when they:
- have autonomy to make choices in their learning,
- feel socially connected to classmates and teachers, and
- are interested in their work.
Students at the school report that when they are given choice they "are more interested in the work and work harder." In addition, students report being more intrinsically motivated when teachers encourage feelings of social connectedness. As one student expresses, "[It’s motivating when] teachers connect on a much more sociable level and allow the student to feel like they are on the same team, or they are working cooperatively." Finally, students report being more intrinsically motivated when they are interested in a subject. When discussing a subject that they are especially interested in, students most often report that they are motivated by "doing my best," "personal growth," and "interest in the subject," all of which exhibit intrinsic motivation. By contrast, when discussing a subject that they are least interested in, students most often report that they are motivated by "grades" and "a desire to please my parents and/or teachers," which reveals extrinsic motivation.
To read more about this work, check out this Harvard Graduate School of Education's Usable Knowledge article!
RSI partnered with Mid-Pacific Institute to conduct a study exploring motivation, mindset, and happiness among elementary, middle, and high school students. All participating students completed an online survey measuring motivation, mindset, happiness.
Results from this study reveal interesting relationships between motivation, mindset, and happiness. Specifically, we found that happiness is associated with higher levels of intrinsic and extrinsic motivation, and having a growth mindset is associated with higher levels of intrinsic motivation and lower levels of extrinsic motivation.
In addition, we found that the following practices are associated with greater intrinsic motivation:
- giving students the freedom to choose the topic or medium of their work
- connecting learning to the real world, and
- providing students with opportunities to collaborate with others.
Motivation, Independence, and Love of Learning
RSI carried out a mixed methods study at Bedales School to explore student motivation. Students at the school completed an online survey designed to measure motivation, independence, and passion for learning. The survey also assessed the prevalence of teaching practices that academic research shows support motivation.
The vast majority of students at Bedales report being "a good amount" or "very" motivated in academic courses. In addition, students at Bedales describe how the school culture supports them to be independent learners. Further, Bedales students tend to report having a genuine love of learning and describe a school culture that inspires curiosity.
Results also reveal that teachers at Bedales often practice pedagogical techniques that research suggests support motivation, self-determination, interest, and passion, notably:
- connecting academic learning to real life,
- providing challenge with appropriate scaffolding, and
- encouraging independent learning.
Whether you are a cadet at West Point Military Academy or a sixth grader at a spelling bee, grit may be the quality that best predicts your success. Angela Duckworth and colleagues define grit as perseverance and passion for long-term goals. Grit predicts academic success across a range of outcomes, including grades, competitions, and awards.3 How do gritty students sustain effort over time? RSI partnered with Wellington Learning and Research Centre to explore this question with students in years 7-13 at Wellington College.
Consistent with previous academic research, results suggest that gritty students tend to show more metacognitive awareness,4 growth-minded thinking about abilities,5 and self-compassion.6
To read more about this study, check out this BBC article about our study!
Phillips Exeter Academy
Phillips Exeter Academy uses a dialogic teaching and learning method called Harkness that supports students to be motivated, self-directed learners. RSI carried out a mixed methods study to explore and identify the key components of this student-directed learning method. RSI researchers collected data from students in grades 9-12 at Exeter using online surveys and classroom observations over the course of one academic year.
This research identifies eight key components of Harkness learning and teaching:
- learning is student-directed,
- learning is discussion-based,
- learning is democratic,
- teachers act as facilitators,
- students act as teachers,
- students engage in collaborative inquiry,
- students actively listen to one another, and
- students come to class prepared with the necessary materials and knowledge.
In addition, results indicate that students at Exeter tend to demonstrate high levels of motivation and take responsibility for their own learning. Students are motivated to participate in Harkness discussions and learn from one other. Many students note that Harkness discussions enable them to construct a greater understanding of material together with their classmates than they could have on their own.
Colegio Rio Branco
Research has shown that when learning is more student-centered, students are more motivated. RSI partnered with Colegio Rio Branco to explore student-centered learning and teaching in math classrooms in grades 5-12.
This study reveals several ways educators can make learning activities student-centered, including:
ask students questions that do not have a clear right answer to help students construct their own understanding of the material,
teach students metacognitive strategies to help them better understand and take responsibility for their own learning processes,
assign projects using real-world problems so students see that their learning is relevant and valuable, and
consider flexible methods of assessment such as portfolios, which can capture and reward student work in more nuanced ways than traditional testing.
Active Learning, motivation, and memory
RSI partnered with Sydney Church of England Grammar School’s (Shore) to explore how teachers in years 1-6 can support students' motivation and memory of academic material.
Results from this study suggest that engaging students in active learning is a powerful way to boost their motivation to learn academic content. Moreover, using active learning techniques engages students in learning the material in deeper and more meaningful ways, thereby improving their memory of it. Below are a few ways educators can provide students with active learning opportunities in the classroom:
- offer students choice,
- allow students to set their own goals,
- provide opportunities for students to reflect on their learning,
- encourage students to learn independently,
- construct knowledge through collaboration with the teacher or students,
- encourage students to ask questions,
- provide opportunities for student input, and
- connect learning to the real world.
Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American Psychologist, 55(1), 68-78.
Ryan, R. M., & Deci, E.L. (2000). Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. Contemporary Educational Psychology, 25(1), 54–67.
Duckworth, A. L., Kirby, T. a., Tsukayama, E., Berstein, H., & Ericsson, K. a. (2011). Deliberate practice spells success: why grittier competitors triumph at the national spelling bee. Social Psychological and Personality Science, 2(2), 174–181; Ivcevic, Z., & Brackett, M. (2014). Predicting school success: Comparing conscientiousness, grit, and emotion regulation ability. Journal of Research in Personality, 52, 29-36.
Arslan, S., Akin, A., & Citemel, N. (2013). The Predictive Role of Grit on Metacognition in Turkish University Students. Studia Psychologica, 55(4), 311–320; Wolters, C. A., & Hussain, M. (2014). Investigating grit and its relations with college students’ self-regulated learning and academic achievement. Metacognition and Learning.
Mueller, C. M., & Dweck, C. S. (1998). Praise for intelligence can undermine children's motivation and performance. Journal of Personality and Social Psychology, 75(1), 33.
Neff, K. D., Hsieh, Y.P., & Dejitterat, K. (2005). Self-compassion, achievement goals, and coping with academic failure. Self and Identity, 4(3), 263–287; Neff, K. D., Rude, S. S., & Kirkpatrick, K. L. (2007). An examination of self-compassion in relation to positive psychological functioning and personality traits. Journal of Research in Personality, 41(4), 908–916. | <urn:uuid:03ef113d-3ea6-4e05-b2ed-5412f01c7cc6> | CC-MAIN-2018-34 | https://researchschools-international-cmna.squarespace.com/motivation/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211403.34/warc/CC-MAIN-20180817010303-20180817030303-00413.warc.gz | en | 0.936622 | 1,885 | 2.671875 | 3 |
Toxicity of chemical substances in aquaculture
Difficulties in assessing, establishing safe concentration limits for toxic metabolites
Toxicity in aquaculture systems usually refers to the harmful effects of elevated concentrations of metabolites (carbon dioxide, ammonia, nitrite, and hydrogen sulfide), algal toxins, heavy metals, and agricultural and industrial chemicals. Photo by Darryl Jory.
The dictionary definition of toxicity is “the quality, relative degree, or specific degree of a substance being toxic” and toxic is further defined as a substance containing a material capable of causing injury or death to living things (being poisonous). Stress, injury or death to aquatic organisms resulting from adverse water temperature, low dissolved oxygen concentration, gas supersaturation and suboptimal salinity usually are not referred to by aquaculturists as toxic effects. In aquaculture, toxicity usually is reserved for harmful effects of elevated concentrations of metabolites (carbon dioxide, ammonia, nitrite and hydrogen sulfide), algal toxins, heavy metals and agricultural and industrial chemicals.
Toxicity may be expressed by several reactions of organisms to harmful substances. By slowly and methodically increasing concentrations of potentially toxic substances, a series of responses can be observed. Initially, concentration is too low to evoke a measurable or observable response. At a higher concentration, animals will exhibit behavioral changes such as avoidance, increased respiration, coughing (fish have a response similar to coughing to rid gills of foreign substances), changes in swimming patterns, etc. Increasing concentration of the substance further will cause observable lesions on gills or other body parts, mucus coating on gills and internal lesions. At a greater toxin concentration, animals will exhibit erratic behavior such as swimming at the surface and loss of equilibrium.
Assessing lethal concentrations
Although aquatic animals exhibit symptoms of poisoning or toxicity at lower than lethal concentrations of a substance, the typical endpoint in tests to assess toxicity of a substance is death. In a toxicity test, fish or other aquatic organisms are exposed to a range of toxin concentrations. Mortality at each toxin concentration is recorded after a certain period and adjusted for mortality of animals held under identical conditions in a control (no toxin). Toxicity tests may be run for six to 24 hours, several days, or even for the life cycle of the test organism. Toxicity tests usually are conducted for 24 to 96 hours, and the 96-hour toxicity test is likely the most common.
Toxicity may be reported in various ways. The highest concentration causing no mortality may be reported, or alternatively, the concentration killing a given percentage of the test organisms reported. Most commonly, the concentration that killed 50 percent of test animals is presented (Fig. 1). This concentration is known as the lethal concentration to 50 percent of test animals or the LC50 at a particular exposure time, i.e., 24-hr LC50, 48-hr LC50, 72-hr LC50, or 96-hr LC50.
Fig. 1: Graphical estimation of the LC50.
There are difficulties in assessing LC50 with respect to effects of a toxin in natural waters or in aquaculture. Obviously, it is desirable not to have either low level mortality or sublethal effects that stress animals and impair normal behavioral and physiological responses. In aquaculture, stress leads to poor appetite and it weakens immune responses increasing susceptibility to disease. The LC50 does not provide this information directly.
Some investigators have run toxicity tests at low enough concentrations to determine the lowest concentration a toxin necessary to cause mortality. Others have used a sublethal but measurable or observable response such as growth rate, lesions, or behavioral change. Such tests are difficult, time consuming, and expensive to conduct, and few have been conducted in comparison with the number of short-term LC50 tests that have been published.
Results from long-term LC50 tests often are used to extrapolate the expected maximum concentration of a toxin permissible without causing any observable effect to a particular species upon continuous exposure. The ratio of the safe or no-effect concentration from long-term toxicity tests to the LC50 concentration (usually the 96-hour LC50) can be used to predict a safe concentration of the toxin. For example, if the long-term, no effect concentration of a toxin is 0.01 mg per liter and the 96-hour LC50 of this toxin is 0.25 mg per liter, the ratio (often called the application factor) is 0.04. An estimate of the safe concentration of the toxin can be made by multiplying 0.04 by the 96-hour LC50.
Interpreting toxicity test results
The problem with the application factor is that it is not available for many species. Available data often are applied beyond the species for which they were obtained. The application factor also may vary among toxins. Application factors of 0.05 and 0.01 are probably most commonly used. A larger application factor likely should be used for less toxic substances and a smaller one for more toxic substances. Use of the application factor may result in poor decisions in some instances, but it is often the only procedure for use in practical predictions of acceptable toxin concentrations.
Several other issues are related to interpretation of toxicity test results. Toxicity tests are typically run at constant temperature in water of a particular chemical composition, and with constant pH, near saturation with dissolved oxygen and fixed concentrations of the toxin. Many toxins increase or decrease in toxicity with respect to water quality, as will be illustrated for a few examples. Copper and zinc are less toxic in water of high calcium concentration, because calcium ion interferes with metal uptake. In freshwater, chloride ion lessens nitrite uptake across gills of fish through competition for absorption sites. The proportion of toxic, un-ionized ammonia in water increases with total ammonia nitrogen, temperature and pH. Hydrogen sulfide concentration also decreases in relation to total sulfide concentration as pH increases. Elevated carbon dioxide concentration is more likely to affect aquatic animals when dissolved oxygen concentration is low, because it lessens the ability of hemoglobin to combine with oxygen.
In aquaculture systems, concentrations of pH, temperature, dissolved oxygen and carbon dioxide fluctuate on a daily basis. Toxin concentration also is continually changing because of differential rates of release into the water and loss from the water by detoxification or other means. Exposure time to high concentrations of potential toxins such as carbon dioxide, ammonia, nitrite, hydrogen sulfide, algal toxins, metals, etc., are continuously changing. There have been few studies showing how such fluctuations effect the toxicity of substances to aquaculture species.
When a mortality problem or slow growth by a species cannot be explained by the usual causes, managers have complete water quality analyses conducted. There is a tendency to suspect the cause to be the variable or variables that the analysis report indicates to be outside what the manager considers the normal range.
The decision on presence of toxic concentrations of substances can sometimes be improved by examination of typical LC50 values such as presented in Table 1 for toxic metabolites and aid of an application factor. Nevertheless, it often is virtually impossible to be sure that a problem is associated with a particular variable. This is especially true for algal toxins. Some laboratories have the capability to measure algal toxins, but there is little information on toxic concentrations. With toxic pollutants from agricultural and industrial chemicals, knowledge that one or more such chemicals entered the pond and failure to find evidence of the presence of another toxin often is a strong indicator that the pollutants caused the observed mortality.
Boyd, Toxicity, Table 1
|96 hour LC50 (mg/L)||Estimated safe concentration for extended exposure (mg/L)|
|Carbon dioxide, freshwater fish||-||20|
|Carbon dioxide, marine shrimp||60||6|
|Ammonia, warmwater fish||0.74-2.88||0.05-0.15|
|Ammonia, coldwater fish||0.32-0.93||0.015-0.045|
|Ammonia, marine fish||0.64-1.72||0.05-0.15|
|Ammonia, marine shrimp||0.69-2.95||0.05-0.15|
|Nitrite, warmwater fish||7.1-140||0.5-2.5|
|Nitrite, coldwater fish||0.24-11||0.01-0.5|
|Nitrite, marine fish||-||5-50|
|Nitrite, marine shrimp||9-980||0.5-15|
|Hydrogen sulfide, freshwater species||0.02-0.05||0.002|
|Hydrogen sulfide, marine species||0.05-0.5||0.005|
Table 1. Toxicity information on potentially-toxic metabolites in aquaculture systems.
There also is wide variation in the 96-hour LC50 values for individual metals and agricultural and industrial chemicals, and great variation in toxicity has been found among these chemicals. The 96-hour LC50s for some representative metals were given as follows: manganese, 16 to 2,400 mg per liter; zinc, 0.43 to 9.2 mg per liter; copper, 0.033 to 1.9 mg per liter. The 96-hour LC50s reported for different agricultural and industrial chemicals range from less than 1 mg per liter to over 100,000 mg per liter.
In summary, assigning the cause of an observed sublethal or lethal toxic effect to a particular concentration of a known toxin is not an easy task. Moreover, it is equally difficult to establish safe concentration limits for toxic metabolites in aquaculture systems for use in assessing measured concentrations.
Two students from the HCM City University of Economics and Finance have made biodegradable products from potato starch in an effort to reduce the use of single
Those involved in shrimp farming and other kinds of coastal aquaculture recognize salinity as an environmental factor of importance
Microbial water quality assessment has the potential to provide insights into the temporal and spatial dynamics of bacterial communities within aquaculture | <urn:uuid:1adfcd51-f33a-41e0-8523-fa8432b00328> | CC-MAIN-2021-25 | https://m.2lua.vn/article/toxicity-of-chemical-substances-in-aquaculture-5e16e005425cc5a336c16dd5.html?hl=en | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488517820.68/warc/CC-MAIN-20210622124548-20210622154548-00412.warc.gz | en | 0.911496 | 2,081 | 3.34375 | 3 |
How to Repair a Clay Pipe
pipe image by Anthony CALVO from Fotolia.com
Clay pipes have been used for hundreds of years as a cheap and accessible way to smoke tobacco. From the 1500s and the export of tobacco from the New World to Europe to the introduction of Brier pipes in the late 1800s, clay pipes were the most widely used pipes in North America and Europe.
While easy to manufacture, clay pipes were also very fragile. Over the past 500 years clay pipes have become more elaborate, featuring faces, animals and even sports scenes. The fragile clay can become chipped and cracked, but it can be repaired with common moulding clay.
- Clay pipes have been used for hundreds of years as a cheap and accessible way to smoke tobacco.
- The fragile clay can become chipped and cracked, but it can be repaired with common moulding clay.
Clean the pipe thoroughly with pipe cleaners of any excess tobacco and dirt, particularly around the broken area. Study the design of the pipe and determine how the repairs may affect the pipe's smokability. For example, if it is a portrait pipe of someone's face, a replacement nose will generally not affect its smokability. However, if there is a large crack or hole in the bowl of the pipe, the smokability may be greatly diminished even if it is repaired. Extensive damage such as this may require sealing the crack on the outside and inside of the bowl.
Place the broken pipe in a small bowl of sand with the broken area entirely exposed. The sand will hold the pipe steady while you make the repairs. If the area to be repaired is too large to use this method, pipe clamps or other things can be used to hold the pipe in place.
Mold the self-hardening clay (of a shade similar to the original pipe) into the missing shape and attach it to the pipe. If repairing a hole on the stem, fill the hole as much as possible with clay without pushing it into the stem. If repairing a hole on the pipe bowl, smooth out the clay on both the inside and outside of the bowl to create an airtight seal. If the clay is cracked, create a "patch" that seals the crack by smoothing the clay over the cracked area.
- Place the broken pipe in a small bowl of sand with the broken area entirely exposed.
- If repairing a hole on the stem, fill the hole as much as possible with clay without pushing it into the stem.
Allow the clay to dry as directed on the package. Drying times for self-hardening clay are dependent on the temperature and humidity of the drying room.
Paint the repaired area of the pipe to match the style of the rest of the pipe with acrylic paint using a colour that matches that of the original pipe colour. Note that not all clay pipes are painted or glazed, so this step can be skipped if painting is not needed.
- "Clay Tobacco Pipes"; Eric G. Ayto; 1994
- Smoking causes cancer.
Michael Belcher has been a public relations professional since 2008 working for university groups and volunteer groups. He has a Bachelor of Science in journalism from Murray State University and is in Dublin, Ireland to finish a Master of Science in mass communications. | <urn:uuid:95c6804f-9aac-4fbd-9ac6-a3ea2a636b11> | CC-MAIN-2021-17 | https://www.ehow.co.uk/how_7764469_repair-clay-pipe.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077810.20/warc/CC-MAIN-20210414095300-20210414125300-00407.warc.gz | en | 0.935976 | 674 | 3.03125 | 3 |
Goldfinch( Carduelis carduelis)
AKA: European goldfinch
What does the Goldfinch look like ?
A oloured finch with a bright red face and gleaming yellow wing patch/bar. Sociable, often breeding in loose colonies, they have a delightful liquid twittering song and call. The young are grey brown lacking grey on head Long fine beaks allow them to extract otherwise inaccessible seeds from thistles and teasels. Increasingly they are visiting birdtables and feeders. In winter many UK goldfinches migrate as far south as Spain.
How big Is It ?
Aprox 12 cm . weighing 16 g
Where does it live?
Likes trees and bushes with areas of tall weeds nearby. Often breeds near man in parks, gardens, nurseries, orchards and churchyards. In wider countryside likes woodland edges and heaths and commons with gorse and hawthorn.
Similar to breeding habitat, but forms into flocks which may range over waste land, coastal fields and flats, and rough pasture. Anywhere with plenty of thistles, burdock and teasels.
When does it Breed ?
May to August, 4 - 6 Eggs , Incubation 13 days, Young Fledge in 13 - 15 Days, Nests in trees
Where to see it
Anywhere there are scattered bushes and trees, rough ground with thistles and other seeding plants. Likes orchards, parks, gardens, heathland and commons. Less common in upland areas and most numerous in southern England.
What does it eat?
Thitle Dandilions , Tree Seeds and insects such as aphids in summer.
What does it sound like?
A liquid, twittering song with trills; twittering calls
To hear a Goldfinch click here
When to see it
All year round. | <urn:uuid:619075d7-b352-419f-82db-67d30c6dfd5a> | CC-MAIN-2018-51 | http://www.ukwildlife.net/birds/goldfinch.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824601.32/warc/CC-MAIN-20181213080138-20181213101638-00122.warc.gz | en | 0.908051 | 395 | 3 | 3 |
PyX — Example: bargraphs/month.py
from pyx import * mypainter = graph.axis.painter.bar(nameattrs=[trafo.rotate(45), text.halign.right], innerticklength=0.1) myaxis = graph.axis.bar(painter=mypainter) g = graph.graphxy(width=8, x=myaxis) g.plot(graph.data.file("minimal.dat", xname=1, y=2), [graph.style.bar()]) g.writeEPSfile("month") g.writePDFfile("month")
To name the bars you just need to use a proper data column (instead of column 0, which is the line number in
data.file instances). Beside that we show in this example how to adjust the bar axis painter to properly show the names.
The internals of a bar axis are quite different from a continuous axis (like a linear or logarithmic) axis. A bar axis just handles a set of subaxes - one for each discrete value. The painting of a bar axis can only draw the names for the subaxes and some ticks between the subaxes. Other axes features known from continous axes like ticks and labels, partitioners, texters, raters are non-existent for bar axes. | <urn:uuid:2e7f4d9b-6bf9-4083-a3ef-c601ffcfd650> | CC-MAIN-2015-06 | http://pyx.sourceforge.net/examples/bargraphs/month.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121983086.76/warc/CC-MAIN-20150124175303-00168-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.715176 | 292 | 2.78125 | 3 |