text
stringlengths
195
587k
id
stringlengths
47
47
dump
stringclasses
8 values
url
stringlengths
14
2.28k
file_path
stringlengths
125
138
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
46
159k
score
float64
2.52
5.06
int_score
int64
3
5
Some pets eat like they are never going to see food again, gulping it down so fast they barely have time to chew it, let alone taste it. If it seems that your dog or cat is eating meals faster than necessary, and is behaving in an obsessive manner towards the food, there are some methods you can use to modify your pet’s behavior. Why is Eating Fast Bad? First, why should you be concerned with your pet’s eating speed? Because they are not chewing their food thoroughly, rapid eating can lead to choking or gagging. Also, because this type of eating behavior often is associated with greedy behavior, it can lead to aggressive behavior if another pet or person comes close while the animal is eating. In households with children or other animals, an animal that gobbles down its food can be a danger to anyone it perceives as a competitor for its food. There is also a medical condition that affects some animals, especially large-breed dogs, called gastric dilatation-volvulus (GDV). The rapid eating and gulping results in excessive air, fluid and food filling the stomach, followed by swelling (dilatation) of the stomach cavity. As the stomach expands, it can twist around on its axis (volvulus), making it impossible for anything to pass through the stomach to the intestines. If this occurs, the animal can go into shock and die quickly. What Causes This Behavior? For some puppies and kittens, mealtime is a competition to get enough food before it is all gone -- a casualty of their littermates and the adult animals. It may have even started while the animal was nursing. This becomes a pattern of behavior, and is carried on into a new home. The behavior may be most pronounced when there are other animals in the home, but it may also be present even if s/he no longer has competitors. Of course, there are also underlying medical conditions that can lead to this behavior. Your pet may be infected with parasites that are affecting the body’s ability to absorb the nutrients in the food. Another possibility to consider is that the food is simply nutritionally inadequate for the animal’s needs and is leaving the animal feeling hungrier than it should as a result. What Can Be Done? There are several possible solutions you can try to modify your pet’s behavior. One recommendation is to place objects such as toys or balls that are too large to swallow in the food bowl -- with the food -- so that the animal must eat around the object. Another method using the same idea is to partition the food by placing a smaller bowl inside the larger bowl. Placing the small bowl upside down in the larger bowl, pour the food into the space around the small bowl. This makes it so that your pet can only take small bites from the narrowed space. Or, if time is not an issue, you can try feeding your pet small meals throughout the day, so that large amounts cannot be consumed at once. There are also feeding bowls that are designed to slow an animal’s eating speed. These bowls are often made with embedded pegs in the hollow of the bowl, so that the animal cannot grab large bites all at once. Other products are made to disperse the food slowly. A timed dish that allows specific amounts at a time; a compartmentalized dish that the animal must adjust to get to the small portions of food (such as sliding tops that can be moved with the paw or snout); or a ball that holds food but must be manipulated by the pet to release the contents from the ball. As far as nutritional concerns, make sure to feed your pet a high-quality, highly digestible cat or dog food so that you can be sure that his or her nutritional needs are being met. And, as a matter of course, you should make sure that your pet is free from parasites. A regular good health visit with a veterinarian should turn up anything that should not be there, and if anything is found, it can be treated before it becomes a life threatening issue. In any case, if your pet is behaving in an aggressive way while eating and you have children or other pets in the home, you will need to protect them by setting aside a space where your pet can eat without feeling threatened and defensive. Featured Image: iStock.com/LightFieldStudios Help us make PetMD better Was this article helpful?
<urn:uuid:72f7e74b-7fd7-4b69-b193-8fd7f6f1ea7c>
CC-MAIN-2023-40
https://www.petmd.com/dog/nutrition/evr_multi_controlling_pets_eating_behavior/p/3
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00840.warc.gz
en
0.970046
918
3.078125
3
Famous Brit of the Week #49 - Alfred the Great Today's Famous Brits Assembly was about King Alfred the Great who was born between 847 and 849, living until 26 October 899. He was King of Wessex from 871 to c. 886 and King of the Anglo-Saxons from c. 886 to 899. He was the youngest son of King Æthelwulf of Wessex. His father died when he was young and three of Alfred's brothers reigned in turn. Alfred took the throne after the death of his brother Æthelred and spent several years dealing with Viking invasions. He won a decisive victory in the Battle of Edington in 878 and made an agreement with the Vikings, creating what was known as Danelaw in the North of England. Alfred also oversaw the conversion of Viking leader Guthrum to Christianity. He successfully defended his kingdom against the Viking attempt at conquest, and he became the dominant ruler in England. He was also the first King of the West Saxons to style himself King of the Anglo-Saxons. Details of his life are described in a work by 9th-century Welsh scholar and bishop Asser.Alfred had a reputation as a learned and merciful man of a gracious and level-headed nature who encouraged education, proposing that primary education be conducted in English rather than Latin, and improving his kingdom's legal system, military structure, and his people's quality of life. He was given the epithet "the Great" during and after the Reformation in the sixteenth century.
<urn:uuid:b00d79f7-efc6-4b28-b6aa-338eacaecb76>
CC-MAIN-2023-40
https://www.stepney.hull.sch.uk/post/2019/05/01/famous-brit-of-the-week-49-alfred-the-great
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00840.warc.gz
en
0.991822
323
3.078125
3
Kenyan cuisine: locally sourced, fresh and delicious Simple and wholesome are the two best words to describe Kenyan cuisine, but don’t be fooled for one minute into thinking that means the cuisine is bland or boring. There is no national Kenya dish as such and food varies massively across the country, but one thing remains true wherever you’re eating in Kenya – the food is guaranteed to be fresh and delicious, cooked with just enough seasonings to enhance the flavour but not so much as to mask the true taste of the fish, meat or vegetables. Locals in rural locations put whatever seasonal ingredients they can get their hands on to very good use, creating honest, nutritious and hearty meals during the process. Since most people who live in this part of the country work in agriculture, food needs to be filling and provide them with enough energy to get through a full day of hard work. This is why the majority of rural dishes are made up of energy-providing starchy grains, such as maize. In rural parts of Kenya, most meals are vegetarian, but meat – usually roasted goat meat or beef – is served on special occasions, such as for religious ceremonies. In coastal areas, fish and seafood make up a large part of the diet, since these ingredients are available in abundance from lakes and the sea. Mangrove mud crabs are also harvested along the coastline and appear in a variety of traditional stews. Meals in this part of the country often pack more flavour than those inland, thanks to the use of Arabic and South Asian spices. This is because the coast of Kenya was more influenced by colonisation and merchant travellers (and subsequently the ingredients and recipes they brought with them) than the inland towns and villages. History and influences Cattle herding has a long history in Kenya which dates back to around 1,000AD when Hima – a clan from North Africa – introduced the rewarding pastime to the natives. Keeping cattle allowed the locals to produce enough meat, milk, butter and blood to easily feed the whole village – something which still stands true today. When the Portuguese landed on the coast of Kenya in the late 1400's, they brought with them the food they had just discovered during their trip to Brazil, mainly maize, pineapples, bananas, peppers, chillies, sweet potatoes and cassava. The locals took to these new ingredients well, with most of them quickly becoming strong staples used in everyday cooking. The Portuguese also introduced oranges, limes and lemons they’d sourced from India and China, as well as pigs, but these new additions didn’t catch on as well. In the mid-1800's, European explorers came upon Mount Kilimanjaro and Mount Kenya and shortly after, they developed an interest in the natural recourses of East Africa. As Britain slowly increased its domain, the potatoes, cucumbers and tomatoes they brought with them began to be farmed throughout the country and incorporated into traditional Kenyan dishes to create more flavourful and nutritious recipes. The one influence which stands out from the others due to its strength and its ability to spread is without a doubt India. In the 19th century, the British imported thousands of Indian workers to Kenya to build a railway network. But the workers didn’t come empty handed – they brought with them the spices, cooking methods and recipes from home. This is why chapatis, samosas, chai tea, chutneys, curries and seasonings made up of a plethora of Indian spices – such as cumin, turmeric, ginger and coriander – are found throughout Kenya today. Key ingredients in Kenyan cuisine Leafy green vegetables – like cassava leaves, sweet potato leaves, pumpkin leaves and ‘Sukuma Wiki’ leaves, similar to collard greens – are the most common vegetables found in Kenya because they’re easy to grow throughout the year in dry conditions. These leaves are usually sautéed in oil or stirred into soups to add colour, flavour and nutrition. They’re also an effective way to pad out dishes when other ingredients are scarce. Beef and goat Meat doesn’t play an important role in Kenyan cuisine – in fact, you’ll find that most Kenyan dishes are entirely vegetarian. However, when meat does feature in a recipe, it’s usually in the form of beef or goat meat, which are the two animals most commonly farmed across the country. Meat is usually cooked plain on the bone over a barbecue with nothing to season it but a sprinkling of salt or de-boned, cubed and cooked alongside seasonal vegetables and water or coconut milk to make a flavourful stew. Villages and towns along the Indian Ocean and around Lake Victoria and Lake Turkana feast on fish more often than locals inland enjoy meat. Freshly caught fish is available all-year-round, with tilapia and Nile perch being the most common types caught in the lakes. However, due to the recent over-fishing at the lakes, fish is starting to become less common in villages around these areas. When it is eaten, fish is most commonly fried whole for crispy skin and perfectly-cooked flesh or sliced in half and cooked on a barbecue for a crunchy outside and smoky flavour. Although fruits in Kenya are seasonal, there are always several types of fruits available at any one time in the country. Passion fruits, mangoes, pineapples, oranges, bananas, pears and papaws are the most popular fruits which are often sliced and served up for breakfast. Fruit is also served for dessert in the form of fresh fruit salads and mousse-like puddings when it’s cooked with coconut milk. Along with coffee, tea is the most popular hot drink in Kenya. Known locally as ‘Chai’, the local tea is brewed dark, sweetened with a lot of sugar and mixed with a generous amount of whole-fat milk. During the brewing process, a combination of Indian spices, such as cinnamon, ginger, cardamom, nutmeg and cloves are added, creating layers upon layers of intense flavour with every sip. Traditional Kenyan dishes Sukuma Wiki is the closest thing you’ll find in Kenya to a national dish, made from onion, collard greens and tomato cooked in water or stock. How the dish is flavoured really depends on where you are in the country – in some parts its served as it is with just a sprinkling of salt and pepper and in some places which were colonised by India, it’s favoured with peanut oil, cumin, coriander and turmeric. Ugali is the staple food of Kenya which is eaten as an accompaniment to all kinds of meat, fish and vegetable dishes. This starchy dish is made from cornmeal, millet flour or sorghum flour (or a combination of two or three) cooked with water until it forms a dough-like consistency. The most common way to eat Ugali is to roll a lump of it into a ball which you then dip into a sauce or stew. You can also make an indent into the ball and use it as a scoop or flatten it out and then wrap it around pieces of meat, fish or vegetables, just like a flat bread. After Ugali, Irio is the most common staple dish in Kenya which originated in Kikuyu but quickly spread throughout the country because it’s cheap to make, easy to prepare and filling to eat. To make Irio, simply boil potatoes and green peas until soft, drain off the excess water and mash them up together. Individual corn kernels are then stirred in to add some colour and texture. Whilst Irio can be used as a side dish for any stew, fish or meat, it’s most often served alongside Nyama Choma. At its most basic, Nyama Choma is barbecued meat, but really, it’s so much more than that. Goat and beef are the two types of meat which usually make up Nyama Choma but it can also be made from chicken (in which case it’s called Kuku Choma) or fish (Samaki Choma). You won’t find any barbecue sauces or honey glazes with Nyama Choma. To make this incredible dish, the meat is taken on the bone and simply cooked as it is on the barbecue with, at most, a sprinkling of salt. The result is far from boring – when cooked this way, the flavour of the meat really shines through and every bite is worth savouring. Maharagwe is a flavour-packed curry-like dish usually served with Ugali, chapatis or plain boiled rice. It’s made by sautéing garlic, onion and chillies together in a hot pan before adding kidney beans, tomatoes, curry powder and coconut and simmering until all the flavours infuse and the curry thickens. The ingredients are kept fairly simple, so you won’t be overloaded with spice after spice – just treated to a few exotic hints of flavour here and there. Mutura is a delicious protein-packed sausage which serves as a great way of ensuring all the odds and ends of an animal are used to their full potential. Goat intestines form the sausage casing which is stuffed with a mixture of ground meat held together with goats’ blood. The sausage is boiled in water until it’s partly cooked, then finished on a flaming barbecue which dehydrates the sausage and adds a sensational smoky flavour. Cuisine at safari camps and game lodges The food served at safari camps and game lodges in Kenya is greatly varied, with an eclectic selection of international dishes as well as traditional favourites the locals love. Since most of the Kenyan dishes on offer will be made from fresh produce grown locally onsite (in terms of fruit and vegetables) or sourced from local farmers (in terms of meat and poultry) it’s definitely worth trying the typical cuisine – not matter how unsure you’re feeling! If you visit any safari camps or game lodges by the sea, it’s an absolute must to try the fish and seafood offered, as it will likely have been freshly caught that very morning. Some things to keep in mind are that the food you’ll enjoy at safari camps and game lodges will certainly be seasonal and in summer, some fresh fruits and vegetables will be tough to get a hold of. But don’t worry – you’ll never have to go without – a tasty alternative will always be available if circumstances change. Sukuma Wiki recipe Sukuma Wiki is one of the most popular and commonly eaten dishes in the country, mainly due to its simplicity and affordability. The Swahili phrase translates into English as “stretch the week”, meaning that this type of dish was used as a filler to pad out other dishes or replace them altogether when richer, more expensive food was scarce. The collard greens which comprise most of this dish are grown in practically every family garden in Kenya and are a great way of stretching even the most frugal diets into filling ones. This recipe takes 5 minutes to prep, 30 minutes to cook and feeds 2-3 people as a side dish. 1 tablespoon vegetable oil 1 onion, finely chopped 450g collard greens 3 medium-sized tomatoes, chopped Juice of 1 lemon Salt and pepper to taste 1. Heat the oil in a large frying pan over a medium-high heat 2. When the oil is hot, add in the chopped onion and cook for 5 minutes, until soft 3. Tip the collard greens into the pan and stir. Leave to cook for a further 5 minutes, until all the greens are wilted 4. Add the tomatoes, lemon juice and water to the saucepan and stir. Add salt and pepper to taste 5. Wait until the liquid begins to boil then reduce the heat down to low. Leave the pan to simmer uncovered for around 20 minutes, or until the greens are soft and cooked through
<urn:uuid:1cbb60c4-2a8d-4ff7-983b-6f418fe26665>
CC-MAIN-2023-40
https://www.tropicalsky.ie/africa-holidays/kenya/a-true-taste-of-kenya
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00840.warc.gz
en
0.961917
2,543
2.53125
3
pH Measurement in Laboratories: What You Need to Know Although the science behind pH testing may be complicated, the idea at the heart of it all couldn’t be more straightforward. The term is used to describe a very precise numeric scale that itself specifies the acidity or basicity of any aqueous solution you’re working with. The scale runs from 0 on the low end all the way up to 14 on the high end. If a solution is tested and comes in lower on the scale, it is therefore more acidic. If it comes in higher on the scale, it is more alkaline (or “basic”). pH levels can ultimately have a major impact on someone’s health, which is why they’re monitored so closely – particularly in the food and beverage industries. When discussing our drinking water, for example, the Environmental Protection Agency requires all water to be kept in a range of between 6.5 and 8.5 on the scale. This is because without regulation, drinking water that is too acidic or alkaline can have potentially harmful impacts on someone’s health. pH Measurements and Our Health Indeed, the potential impacts of substances with certain pH levels on our health are among the myriad reasons why pH measurement is so important to laboratories around the country. To continue with the example of drinking water, consider that water below a pH level of about 7 naturally has a corrosive quality to it. This means that the levels of iron, copper, lead or even zinc in that water are far too high for someone to consume – thus making even a normal glass of water more dangerous than it appears. Knowing the pH level of water can also help shed insight into problems located elsewhere within an environment. If there is too much iron in drinking water, this could be a sign that plumbing and other metal fixtures may have begun to corrode. Generally speaking, the first sign that something is wrong would be a glass of water that has a metal or bitter taste to it. If water has too much alkaline, it will likely taste like baking soda. While high-alkaline water doesn’t necessarily pose any serious health risks like its acidic counterpart, it CAN contribute to the formation of scale, which is why it’s always so important to be aware of. The Impact on What We Eat The pH of substances has other implications, too – particularly in terms of what we eat. pH levels are regularly taken in laboratories in the food and beverage industry to determine the quality of meats, for example. If you take the pH measurement of pork and it comes in at around 5.5 to 6.0, it’s a good indication that the pig in question was raised well and that it lived a relatively stress-free life. If the pH is between 4.9 and 5.5, however, this could indicate that the pig was raised poorly – or that it had experienced stress. The same type of information can be obtained by taking the pH level of cheese. Generally speaking, most milk falls within a range of 6.5 to 6.7. If the pH reading of cheese (which is made from milk) comes in above those levels, it could indicate that the cow the milk was obtained from had some kind of illness. Values below that range could indicate that the process of lactic acid fermentation has started. pH levels will even impact whether the cheese is crumbly, solid or devoid of any shape entirely. All of this is actionable information that food and beverage processors can use to not only make the right decisions for their customers moving forward, but make the safest possible decisions, as well. pH Measurement in Laboratories The hardworking men and women in laboratories use a wide range of different techniques for fast and accurate pH measurement, including, but not limited to, pH indicators, pH test papers and pH meters. pH indicators are interesting because they’re actually liquid. They normally have a precise pH range, and if the liquid they’re poured into falls within that range, they will change colors accordingly. This is an efficient technique if you already know a bit about the substance you’re working with – they’re less helpful if something falls outside the given pH range. pH test papers are often a special type of litmus paper designed to broadly test where a solution falls on the scale. They typically come in three main types – blue, red and neutral. A blue pH test paper will turn red in the presence of an acidic solution, while a red test paper will turn blue in the presence of a base. Neutral test papers will then turn red OR blue depending on the nature of the solution. There are also more precise pH testing papers available that can not only find out where something falls on the scale, but can do so down to an accuracy of about 0.2 pH units. pH meters are by far the most accurate of the options, as they give laboratory workers the most actionable information to work from. When a solution is analyzed, the meter will actually analyze the difference between a pH electrode and a reference electrode. At that point, the meter converts the results into a pH reading – usually with an accuracy of about 0.01 pH units. These are ideal when an intense level of precision is required and, because of that, are the most common tools found in laboratories. pH meters come in handheld and portable meters, too, making them ideal for field or remote work. Learn About Weber Scientific For decades, the team at Weber Scientific has made it a priority to stock only the highest quality products for your laboratory, manufactured by some of the most-trusted names in the industry today. Whether you’re in need of high-quality pH testing equipment or just need to stock up on critical supplies, we have everything you need and more – all at the types of competitive prices you won’t find anywhere else. If you’d like to find out more information about the importance of pH measurements in laboratories, or if you run a lab yourself and would just like to discuss your needs with someone in a little more detail, visit the Weber Scientific website today.
<urn:uuid:38bae20c-fcc2-4af9-b378-c3bcf4b0cb6e>
CC-MAIN-2023-40
https://www.weberscientific.com/ph-measurement-in-laboratories-what-you-need-to-know
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00840.warc.gz
en
0.952179
1,268
3.53125
4
3rd Grade Elements of Poetry Review This game covers the definition of poetry, haiku, rhyme, alliteration, and basic figurative language including simile, metaphor, and personification. Home Runs and Figures of Speech Figures of speech 2nd grade reading map vocabulary Examples of Repetition and Sound Devices With examples, this game teaches the various literary terms used to describe repetition and sound. Baseball: Types of Repetition or Sound Devices AP Literary Terms find the answers to these terms used in literature იავნანამ რა ჰქმნა?! (Review: What is Lavanaa) გაიხსენე მოთხრობა, სწორად უპასუხე კითხვებს და შექმენი შენი მუსიკალური ბენდი What part of the sentence is missing? What punctuation mark is needed? "Number The Stars" Chapter 3 Sequence the events in Chapter 3 of "Number The Stars" by American author Lois Lowry Figurative Language Game Play to review!
<urn:uuid:6d95e42c-ff49-4014-8ada-a905e31fa340>
CC-MAIN-2023-40
https://www.wisc-online.com/arcade/games/humanities/literature?gameTypes=HAVEUHERD_SPINWIN_BASEBALL_SEQUENCE
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00840.warc.gz
en
0.731521
434
3.9375
4
Russian revolution essay The 1917 Russian Revolution was not, as many people suppose, one well organised event in which Tsar Nicholas II was overthrown and Lenin and the Bolsheviks took power. Free russian revolution papers, essays, and research. Causes Of The Russian Revolution toppled by a popular revolution, and the people rejoiced. Huge Russian defeats at. situation in the countryside caused problems in the cities. What Were The Causes Of The Russian Revolution there were lots of problems which led up to the revolution and we call them the long term causes. The peasants working and. Russian Revolution The Russian Revolution did not happen overnight, and there were different stages that took place. There are so many small things that fit in to the bigger picture it is hard to put where and how the Russian Revolution started and ended. Russia was run backwards compared to all other countries in Western Europe. The peasants. The February Revolution grew from a street demonstration gone out of control; there was no single political force behind it, and it was not a strategically planned event. Once the military mutinied and the situation had become uncontrollable, the Duma recognized that the tsar’s abdication was the only likely way to quell the unrest. The Duma was. In 1900 Russia was the last remaining absolute autocracy out of the great powers of Europe. Approximately eighty four per cent of Russians were peasants, lead by an over privileged upper class who had enslaved them for centuries. There existed a total lack of understanding or sympathy between the workers/peasants and their ruling class, who cared. Color Rating The Revolution of 1905: The First Russian Revolution – The Revolution of 1905: The First Russian Revolution We are, however, slightly ahead of our story. The short period of 1900-1906 provides an essential piece of the puzzle to make the picture of the Russian Revolution complete. Russia s Asian policy under Nicholas II took a. The Russian Revolution of 1917 The Russian Revolution of 1917 was a rebellion of the Russian people against the rule of the Russian emperor, Nicholas II. Russia was going through changes in the early 1900’s and the late 1800’s. This revolution brought forth the Soviet Union, and was known as the Marxist Revolution. In the 1905 Revolution, thousands. Causes Of The Russian Revolution History Essay Before 1905, Russia was a country that was led by a Czar who held full power and control over the country and its inhabitants. The people of the country suffered greatly under the regime of the many of the Czars through reforms, incompetence and general disregard of the needs of the people. Repression. These Russian Revolution essay questions have been written and compiled by Alpha History authors, for use by teachers and students. They can also be used for short-answer questions and other research or revision tasks. If you would like to contribute a question to this page, please contact Alpha History : 1. Explain the challenges and difficulties.
<urn:uuid:82a25894-9a21-4bbf-a3da-5f84b5fe63e6>
CC-MAIN-2023-40
http://essayrate.com/russian-revolution-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.970322
600
2.890625
3
Applications of uniform standardized assessment procedures to population samples of children in different societies make it possible to statistically compare problems reported in the different societies. L. A. Rescorla and colleagues from dozens of societies collaborated to compare CBCL/6-18 scores for 55,508 children in 31 societies, TRF scores for 30,957 students in 21 societies, and YSR scores for 27,206 youths in 24 societies. The societies were in Africa, Asia, Australia, the Caribbean, all parts of Europe, the Middle East, and North America.The very large samples and the great diversity of the populations enabled the researchers to test multicultural variations in problem scores with more statistical power and precision than in any previous studies. Statistically significant differences between problem scale scores from different societies were of small to medium magnitude. Scale scores for most societies were near the “omnicultural mean” (the mean of scores from all societies). However, scores from a few societies were enough lower or enough higher than the omnicultural mean to warrant different sets of norms. Consequently, data from societies with relatively low scores and data from societies with relatively high scores have been used to construct the different sets of norms that are included in the ADM computer-scoring Module for Ages 6-18 with Multicultural Options. Another important finding was that scores within each society varied much more than the mean scores varied between societies. In other words, the differences within societies were greater than the differences between societies. The researchers also identified certain age and gender differences that were very consistent across societies according to certain informants but not others. For example, in most societies, parents and teachers rated boys higher than girls on the Attention Problems syndrome, but gender differences were negligible in self-ratings of Attention Problems. To determine the degree to which people in different societies rated the same problems low, medium, and high, the researchers computed correlations between the mean ratings obtained on each item in each pair of societies. Averaged across all pairs of societies, the correlations were .74 for the CBCL and TRF and .69 for the YSR. This indicated considerable multicultural similarity in the items that were rated low, medium, and high. References: Rescorla, L.A. et al. (2007). Consistency of teacher-reported problems for students in 21 countries. School Psychology Review, 36, 91-110. Rescorla, L.A. et al. (2007). Epidemiological comparisons of problems and positive qualities reported by adolescents in 24 countries. Journal of Consulting and Clinical Psychology, 75, 351-358. Rescorla, L.A. et al. (2007). Behavioral and emotional problems reported by parents of children ages 6 to 16 in 31 societies. Journal of Emotional and Behavioral Disorders, 15, 130-142.
<urn:uuid:63a6abe5-1dc6-4915-86cf-e9e9104456b6>
CC-MAIN-2023-40
https://aseba.org/research/multicultural-comparisons-of-cbcl-6-18-trf-and-ysr-scores/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.957625
579
3.140625
3
Hydrocele – A type of swelling in the scrotum (Hydrocela) is a collection of fluid. It is caused by the lack of a duct that connects the abdominal cavity with the scrotum. Latin name: Hydroceletunicae vaginalis testis, eng. Hydrocele. They occur more frequently in children but can also occur in adults. Hydrocele is an anomaly of boys, while in girls a similar condition called Cyst of Nuck. Hydrocele is a relatively benign condition that does not have to impair the health of the child, but in large hydrocells, high pressure in testis and their atrophy with subsequent sterility can also occur. It is most often congenital and can be acquired due to injury, infection, etc. Most hydrocele have no symptoms. It is manifested by swelling of the scrotum, a painless enlargement of one, or both scrotum (scrotum), or in the elderly, a feeling of pressure from the side on which the testis is. Hydrocele is diagnosed by ultrasound examination of the testicles. The size of the hydrocele can decrease in the supine position and increase in the standing position. If you have hydrocele, now is the right time to call and schedule your examination and intervention at a promotional price of 65,000 dinars if the intervention is performed under local anesthesia or 85,000 dinars if the intervention is performed under general anesthesia. The cost of the intervention is increased by the cost of hospital days. Types of hydrocele Incomplete obliteration of the processus vaginalis of the peritoneum leads to the formation of a communicable hydrocele, alone or associated with intrascrotal pathology (hernia). It occurs in 80-94% of newborns and in 20% of adults. Non-dominant hydrocele is secondary to minor trauma, testicular torsion of epididymitis, varicocele surgery, or may occur as a relapse after the primary treatment of the communicable hydrocele. Communicating hydrocele varies in size, depending on the activity. Diagnosed on the basis of physical examination and medical history, swelling is transparent and enlightenment of the scrotum facilitates diagnosis. If intrascrotal mass is suspected, ultrasound should be performed. Also, it should be noted if there is a contralateral disease. Surgery is performed in case hydrocele is not withdrawn spontaneously. Hydrocele surgery is an easy routine operation and is performed under local or general anesthesia. It lasts about half an hour. During surgery, the existing duct through which fluid is circulating is removed. Early surgery is indicated for suspected for the same side inguinal hernia or testicular anomalies and other pathology. In children, surgery is the ligation of the vaginalis process through inguinal incision, leaving the distal end open. The most distal part of the hydrocele around the testicle is conserved and thus preserved later forms the envelopes – protection of the testis. Recovery after hydrocele surgery Hospitalization is short-if the patient is well enough on the same day he goes home or stays for one day. In 2 weeks he can return to the sport and compelte life activities. Sometimes it is necessary to leave the drain at the site of intervention. Complete recovery takes about 3 weeks and it is recommended that you wear a scrotal suspender and put on cold compress to reduce swelling after surgery. BEST PRICE: OPERATION OF HYDROCELE -65,000 dinars Call our call center on 011 785 88 88 for any additional information.
<urn:uuid:b8260e49-9b2c-432a-bfba-3df7822a3616>
CC-MAIN-2023-40
https://atlasklinika.com/en/hydrocele-repair/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.930347
763
2.625
3
In 2020, our faculty will begin teaching the first cohort of students emerging from B.C. secondary schools with some experience of the new curriculum. This new curriculum has the potential to transform the learning style of our future students. On Monday May 6, during CapU’s Symposium week, the CTE will be facilitating a workshop on the changing face of education in BC. Conrad King (the K-16 faculty liaison) has invited guests from the Ministry of Education and from the superintendents’ offices of local school districts to discuss the recent curricular reforms in secondary schools. Find out what our future students will know, understand and be able to do. K-16 Connections: the new high school curriculum and its impact on CapU For the last few months, Conrad King has been the faculty liaison between CapU and the K-16 sector (especially secondary school) to better understand and disseminate recent curricular reforms. There have been substantial reforms made to school curriculum in B.C., and faculty at Cap will start encountering students taught with this new curriculum as early as September 2020. How can we prepare for these new types of learners? The expected outcomes for the new curriculum will mean we will see the next generation of domestic students arriving at CapU with new skills and competences. Gone are high stakes, summative assessments (such as provincial exams) and Prescribed Learning Outcomes based primarily on knowledge content in specific disciplines. Instead, students will cultivate an understanding of big ideas and develop their skill-sets, with fewer prescriptions for specific content. The curriculum will be more inquiry-based, interdisciplinary, and indigenized. And students will engage in more formative assessment and self-evaluation, in order to be more self-reflective on how they learn. The result could be a very different kind of learner in the post-secondary classrooms of the future. This will impact not only what we teach – we can no longer assume the same ‘base knowledge’ for students emerging from BC secondary schools – but also how we teach (and assess) new cohorts of students. If you would like to learn more about the curricular reforms to BC secondary, you are invited to attend the workshop on May 6.
<urn:uuid:50c0ed82-b643-44c0-a225-ebfe2475caa9>
CC-MAIN-2023-40
https://cte.capilanou.ca/2019/04/26/cap-2020-bcs-new-high-school-curriculum/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.958275
456
2.515625
3
MicroRNAs (miRNAs) are small non-coding RNA molecules, which in recent years have emerged to have enormous potential as biomarkers. Recently, there have been significant developments in understanding miRNA biogenesis, their regulatory mechanisms and role in disease process, and their potential as effective therapies. The identification of miRNAs as biomarkers provides possibilities for development of less or non-invasive and more specific methods for monitoring tumor growth and progression. This review summarizes the recent developments in methods to detect and quantitate miRNAs in body fluids and their applications as biomarkers in cancers. The prospect of miRNAs as potential diagnostic and prognostic biomarkers with clinical applications is significant as more evidence points to their central role in cancer pathobiology. - Diagnostic and prognostic markers - Serum biomarkers
<urn:uuid:4738bd32-631e-4e5f-ba67-d0316e79ef96>
CC-MAIN-2023-40
https://experts.umn.edu/en/publications/micrornas-as-biomarkers-in-cancer
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.954488
179
2.984375
3
A tonsillectomy is the removal of the tonsils. Tonsils are nodes found in the back of the throat. Copyright © Nucleus Medical Media, Inc.http://services.epnet.com/getimage.aspx?imageiid=73287328si55550932.jpgsi55550932.jpgNULLjpgsi55550932.jpgNULL\\hgfiler01a\intellect\images\si55550932.jpgNULL17NULL2008-11-072543907328_908005Copyright © Nucleus Medical Media, Inc. Reasons for Procedure Tonsils are part of the immune system. They trap germs that come in through the mouth and nose to prevent infection in the throat or lungs. Sometimes this can cause problems such as: - Chronic or recurrent bacterial throat infections that do not respond to treatment - Peritonsillar abscess—a pocket of infection spreading outside the tonsil Removing the tonsils may decrease the number of throat infections. Some tonsils can also become enlarged and obstruct the flow of air. This can lead to problems like sleep apnea. Problems are rare, but all procedures have some risk. The doctor will go over some problems that could happen, such as: - Excessive bleeding - Problems from anesthesia, such as wheezing or sore throat - Injury to the teeth, voice box, or palate Chronic diseases like diabetes or obesity may raise the risk of problems. Teens who smoke or drink alcohol are also at increased risk. What to Expect Problems to Look Out For Call the doctor if your child is not getting better or has: - Signs of infection, such as fever and chills - Redness and swelling - Increased bleeding or leakage from the wound - Pain that cannot be controlled with medicine - Nausea and vomiting that is severe or lasts a long time - Been spitting or vomiting blood - New or worsening symptoms Call for emergency medical services right away if your child has problems breathing. If you think your child has an emergency, call for medical help right away. Prior to Procedure The surgical team will meet with you to talk about: - Anesthesia options - Any allergies your child may have - Current medicines, herbs, and supplements that your child takes and whether they need to be stopped before surgery - Fasting before surgery, such as avoiding food or drink after midnight the night before - Tonsillectomy. Cincinnati Children’s website. Available at: https://www.cincinnatichildrens.org/health/t/tonsillectomy. - Tonsillectomy. EBSCO DynaMed website. Available at: https://www.dynamed.com/procedure/tonsillectomy. - Tonsils and tonsillectomies. Kids Health—Nemours Foundation website. Available at: https://kidshealth.org/en/parents/tonsil.html. - Kari Kuenn, MD (C) Copyright 2023 EBSCO Information Services This content is reviewed regularly and is updated when new and relevant evidence is made available. This information is neither intended nor implied to be a substitute for professional medical advice. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with questions regarding a medical condition. To send comments or feedback to our Editorial Team regarding the content please email us at [email protected].
<urn:uuid:381a9287-abce-4858-8af2-8f27d3a40cd6>
CC-MAIN-2023-40
https://health.cvs.com/search/consumer_health/details?id=T1643501754248
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.867686
776
3.0625
3
College planning experts guide the students in selecting the right colleges which are appropriate for their skills, interests and financial abilities. SAT or ACT test the students’ skills and knowledge that are gained from high school. SAT and ACT prep courses improve the chances of enrolling in a College Application Process. Joining their dream college is something that every student aspires to do after completing high school. It is an important step in their life that will decide the course of their life. Enrolling in a good college lays the foundation for future success. This process can be made easy with some help from College Planners who are experienced in guiding students in selecting the right college. Taking the service of a college planner will have benefits such as: · Right career path – deciding on the right career path will ensure graduation in 4 years. · Right college – selecting the college that is appropriate for the student’s aptitude, interests and financial ability. · College application – the student is advised to apply in at least six colleges that are appropriate, among the various colleges in the country. · Reduce financial expenditure – financial aids are assured for students who graduate in four years. · College experience – successful experience in college results in building confidence and self-esteem. College planners offer help through various programs. An ideal college planner will provide programs such as: · Online aptitude tests that determine students career path · Information on completed steps through College tracking lists · Students positioning session with a professional councilor · Completing CSS and financial aid forms given from the college · Filling up correctly Free Application for Federal Student Aid. · Discussion on loan and budget options with the family · Effective customer service Preparing well for SAT or ACT can increase the probability of enrolling in the desired college. These tests are taken by juniors, sophomores or seniors. SAT or ACT scores along with the GPA serve as a better indicator of the student’s abilities that will be crucial for doing well in college. ACT is a consistent test that is designed to gauge the skills and knowledge developed in high school and is used for the college admissions process. It mainly tests the student’s skill in four aspects namely English, Reasoning, Math and Reading. The SAT (Scholastic aptitude Test) is a test that is intended to determine the skills of students that are necessary to be academically successful in college. It is a standardized test developed and published by the College Board. The test requires the student to analyze and solve problems using the skills learned in high school. SAT examines the skill of students in Critical reading, writing and mathematics. Preparing in advance for these tests will help you to determine the college you want to join and the major(s) you want to pursue. Prep courses help you to understand and familiarize yourself with the type and format of question papers which significantly reduces the anxiety associated with the tests. Students are provided with SAT or ACT mock tests which bring out their strengths and weaknesses indicating the areas they need to work on. Students are trained to perform consistently by setting their priorities regarding various topics.
<urn:uuid:b9d36f9b-e280-4ef4-83a4-9cfa418693f5>
CC-MAIN-2023-40
https://lesboisdepierre.com/college-planners-helping-you-enroll-in-your-dream-college/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.958865
635
3.125
3
The Slovenian National Assembly has just voted in favor of changes to laws that give same-sex couples the right to marry and adopt, making it the first country in Eastern Europe to do so. This is a historic victory for the LGBTQ+ community in Slovenia; it sends a powerful message of inclusion and acceptance to LGBTQ+ people across the region. The process that led Slovenia to legalize same-sex marriage was long and arduous. In March 2015, the Assembly finally passed a bill legalizing same-sex marriage by a vote of 51-28. However, opponents quickly launched a petition for a referendum and were successful in obtaining the required number of signatures. The referendum was held in December 2015, and the bill was defeated. In April 2016, they made a significant step forward when the Assembly passed a bill granting same-sex people in partnerships all the rights of marriage that only opposite-sex marriages could benefit until now, except for joint adoption and in vitro fertilization. However, this progress was short-lived, as the National Council vetoed the bill later that year. Finally, in October 2016, the Assembly voted to override the veto, and the law entered into effect in February 2017. This was a major victory for LGBTQ+ rights in Slovenia, as it brought legal recognition to same-sex unions. July 2022 was a turning point for Slovenia. It was the month when the country’s Constitutional Court ruled that the law defining marriage as a community of life between a man and a woman was unconstitutional. This legalized equal marriage throughout the country with immediate effect. That day, the Constitutional Court also called on legislators to amend existing laws within six months to legalize marriage equality on the books. The Slovenian Democratic Party, the country’s main opposition party, organized several rallies to oppose the court decision. But fortunately, this criticism no longer reflects the values of the Slovenian people, most of whom now support equal marriage. In 2015, a poll showed that 59% of Slovenians were in favor of equal marriage. This was a dramatic increase from 2006 when only 31% of the population supported same-sex marriage. And fortunately, this opposition did not sway lawmakers too, and the country’s Assembly approved the amendment that allows same-sex couples to marry and adopt by 48 votes to 29, with one abstention. The final adoption of equal marriage and adoption in Slovenia is a cause for rejoicing not only for LGBTQ+ rights activists in the country but also for those in the rest of the region. It must be said that the situation of LGBTQ+ people in neighboring countries is far from ideal. While Estonia nearly legalized same-sex marriages in 2016, they ultimately opened registered partnerships to same-sex couples instead. Croatia, the Czech Republic, and Montenegro made similar decisions. Meanwhile, Hungary, Poland, and Russia have all intensified their repression of the LGBTQ+ community in recent years. This climate of intolerance can make it difficult for LGBTQ+ people to feel safe and supported in these countries. There is no escape for them from violence or discrimination. You now understand the joy of LGBTQ+ people in Slovenia seeing their country moving in the right direction. It is also a sign that progress is possible, even in countries where public opinion may initially be opposed to change. This amendment represents a major step forward in the fight for equality. It is likely to have a positive impact on the lives of many LGBTQ+ people in Slovenia. It will allow them to form families and have relationships that are recognized and protected by the law like opposite-sex couples. This will help to reduce discrimination and ensure that they can enjoy the same rights as everyone else. This new law is also a sign of hope for LGBTQ+ people living in countries where equality is not yet a reality. It shows that progress is possible, even in the face of opposition. We congratulate the Slovenian Parliament for its progressive leadership. And we call on other countries to follow Slovenia’s lead and provide equal rights for all their citizens, regardless of their sexual orientation or gender identity.
<urn:uuid:f2c2357c-b2a7-4dd4-8bbe-de16bbe3ba72>
CC-MAIN-2023-40
https://lqioo.com/news/europe/historic-victory-for-equal-marriage-and-adoption-in-slovenia
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.967534
827
2.90625
3
The adjustments of the temperature profile during gas chromatography change the ramp rate of the components of the mixture, allowing the quick elution of the desired component. During the separation of a mixture with unknown components by gas chromatography, a generic temperature program is used in the investigation of retention behavior of the components. Gas chromatography is an analytical separation technique used in the separation of a mixture of volatile compounds. Several factors such as boiling points, molecular weight, and relative polarity of the components of the mixture, column length, and the amounts of materials injected are responsible for the separation of the mixture. Key Areas Covered 1. What is Gas Chromatography – Definition, Principle, Applications 2. What is the Advantage of Temperature Programming in Gas Chromatography – Influence of Temperature Programming on Separation Key Terms: Boiling Point, Detector, Gas Chromatography, Mobile Phase, Stationary Phase What is Gas Chromatography Gas chromatography is a separation method for volatile components of a mixture using the differential distribution between a gaseous mobile phase and a liquid stationary phase. The mobile phase is an inert gas such as argon, helium or hydrogen. The liquid stationary phase coats the inner side of the column as a thin layer in the gas chromatography. The volatile components move through the stationary phase along with the stationary phase. The separation of the molecules within a mixture depends on several factors: - Boiling points of the components in the mixture – Components with low boiling points elute quickly. - Molecular weight of the components in the mixture – Components with lower molecular weights elute quickly. - Relative polarity of the components with respect to the polarity of the stationary phase – Polar compounds interact more with the stationary phase and elute slowly. - Column temperature – Higher column temperatures elute all of the components quicker from the column. - Column length – Higher lengths of the column increases the elution time. But, it gives a proper separation. - Amounts of materials injected – Higher amounts from a particular component increases the elution time. The instrumentation of gas chromatography is shown in figure 1. A detector is used in the identification of the separated components of the mixture with respect to time and produces a chromatogram. Each peak of the chromatogram represents a particular type of component in the mixture. At a defined set of conditions, the elution time of a particular compound is a constant. Hence, the compounds of the chromatogram can be identified based on the elution time (qualitative measurement). The size of the peak represents the amount of that particular component (quantitative measurement). What is the Advantage of Temperature Programming in Gas Chromatography Gas chromatography uses two methods in the temperature control; isothermal operation and temperature programming. During isothermal operation, the column runs at a constant temperature throughout the process. The temperature at the midpoint of the boiling point range is used as the isothermal temperature. There are disadvantages in this method when the sample contains heavy compounds with higher molecular weights and higher boiling points. These disadvantages include: - Poor resolution of lighter components at higher temperatures - Broad peaks for the compounds that elute later - Carryover effect of the heavier components or ghost peaks due to decomposition - Longer run times - Lower sample throughput During temperature programming mode, the column temperature raises continuously at a predominant rate. The ramp rate or the elution rate is proportional to the column temperature. In the beginning, it uses lower temperatures that give a higher resolution of lighter compounds. With the increasing temperature, the ramp rate of the heavier compounds also increases. This gives sharper peaks for heavier compounds. The advantages of temperature programming are listed below. - High resolution of lighter compounds - Sharp peaks for heavier compounds - Reduced run times - Lesser carryover - Higher sample throughput - Extended application range from a single column Gas chromatography is an analytical method of separating volatile compounds from a mixture. It separates compounds mainly based on boiling point and molecular weight. Temperature programming permits the higher resolution of lighter compounds and sharp peaks for heavier compounds, reducing the long run times generated by heavier compounds. 1. “Temperature Control of the Gas Chromatographic Column.” Lab-Training.com, 29 Dec. 2015, Available here.
<urn:uuid:7aea92aa-13b4-457f-a180-57ecab3c1ce7>
CC-MAIN-2023-40
https://pediaa.com/what-is-the-advantage-of-temperature-programming-in-gas-chromatography/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.881761
893
3.671875
4
This July 4th marks the 400th anniversary of the death of the great recusant composer William Byrd. Byrd’s legacy includes more than over 400 pieces of music, and his life reminds us that even in times of persecution, great Catholic art is still possible and worthwhile. Byrd’s Catholic music deserves to be given a few minutes of our time, however busy we may be, for it is one of the many treasures in the Church’s culture, both natural and supernatural, with which our lives need to be enriched. Consequently, this whole anniversary year is an opportunity to discover his music and its meaning. William Byrd was born around 1540, to Thomas and Margery Byrd, probably in London. His family was well off and musical. His brothers were merchants in the livery trade, and his sisters likely married into the mercantile class as well; one of his brothers in law was an instrument maker. Byrd’s childhood religion is uncertain; his family was likely Protestant. Byrd was probably a chorister in the Chapel Royal, under Thomas Tallis, another brilliant composer of the time who remained Catholic while working in reformation England. Byrd’s first major post was that of organist and music director at the Lincoln Cathedral—one of the largest and most magnificent cathedrals in England. Here he had to provide music for Anglican services, navigating between those who enjoyed rich church music and puritans like the archdeacon John Aylmer. In the BBC documentary on Byrd, Playing Elizabeth’s Tune, Charles Hazlewood compares the florid signature of Byrd with the simple and angular one of Aylmer—a quaint manifestation of differences which would eventually lead to Byrd’s suspension as choirmaster, probably due to his elaborate organ playing and polyphony. In 1568, when he must have been in his late twenties, Byrd married Juliana Birley. Their union produced at least seven children. Perhaps it was Juliana who inclined Byrd to Catholicism; within a few years he was associating with known Catholics. In England at this time, all were required to attend Anglican church services. Records were kept of attendance, and those absent were reported and called to account as “recusants,” that is, scorners of the legal requirement. This often resulted in penalties like fines, loyalty to the secular government being intertwined with religion since Henry VIII had declared himself head of England in both spiritual and temporal affairs. Byrd’s wife Juliana herself was cited for recusancy starting in 1577, while he began to appear on the recusancy lists starting in 1584. Having obtained in 1572 a post at the prestigious musical ensemble of the court, the Chapel Royal, Byrd’s Catholicism was tolerated. In Playing Elizabeth’s Tune, Christopher Haigh, of Christ Church, Oxford, suggests that the presence of “tame Catholics” like Byrd at court was useful for Queen Elizabeth’s publicity. “How tolerant and generous of her to allow some freedom of conscience—she’s not an uncouth puritan with no taste for the arts,” some might say. On the one hand, Byrd did sign an oath acknowledging Elizabeth supreme head of England in matters spiritual and temporal—but at the same time, he seems to have received some sort of license to practice Catholicism, often (at least during this period) evading the fines associated with recusancy. He managed to retain the queen’s favor and trust while continuing to fraternize with prominent Catholics, including priests. Many scholars see Byrd’s textual choices in his motets as reflecting the climate in which he practiced his Catholicism: motets such as his Vigilate for five voices take up themes of persecution, sorrow, and watchfulness. Watch ye therefore, for you know not when the lord of the house cometh, at even, or at midnight, or at the cock crowing, or in the morning: Watch therefore, lest coming on a sudden, he find you sleeping. And what I say to you, I say to all: Watch. This is a piece full of tension—not only admonishing but requiring vigilance to sing! Byrd’s use of fast note values and syncopation creates an atmosphere of energy. His word painting is dramatic: on the word “gallicantu” (cockcrow), the parts climb in quick cascades of notes, a stylized crowing. A cluster of passing eight notes in all the parts are as sudden as the word they set: “repente” (sudden), while immediately following the time-values lengthen on “dormientes” (sleeping) into a dreamlike passage full of chromaticism and suspensions. Two excellent recordings of this piece are by the Voices8 scholars and Apollo5 (this last video includes the score). Around 1594, Byrd’s involvement with the Chapel Royal decreased, and he moved to the village of Stondon Massey in Essex where he lived for the rest of his life. Proximity to his patron Baron John Petre was probably the main reason for the move. A quiet recusant, John Petre was a talented musician in his own right who was well equipped with instruments: lute, five viols, virginals and organ. Byrd is known to have brought musicians to the Baron’s residence to entertain on several occasions and to have provided music for secret Masses. An eyewitness account recalls finding the Jesuit martyr Henry Garnet “in company with several Jesuits and gentlemen, who were playing music: among them Mr William Byrd, who played the organ and many other instruments. To that house came, chiefly on the solemn days observed by the Papists, many of the nobility and many ladies by coach or otherwise”1 Despite the adverse conditions under which he had to live and work, Byrd’s ambitious sacred music remains among the most beautiful of the high renaissance. Although such compositions as his “Mass for Three Voices” could have been sung by unskilled musicians, some of his others are quite difficult. Unlike his contemporaries on the continent Andea and Giovanni Gabrieli, Byrd did not have dozens of musicians for whom to compose polychoral works. Much of Byrd’s vocal music, while difficult, is composed for half a dozen singers or fewer. Byrd’s Miserere a5 sung by the Gesualdo Six is an excellent example of how rich a musical texture can be created with five lines of music. Excellent musicianship is required to make such music; but only five musicians, not the dozen or more Gabrieli’s works would require. This performance of Giovanni Gabrieli’s Suscipe clementissime Deus is a fine example of a continental composition which would require at least 14 performers. One of Byrd’s most famous and beloved motets, the Ave Verum for four voices, is another exquisite example of how few voices are needed to create a truly timeless piece of polyphony. The Gesualdo Six’s rendition allows us to hear how it might have sounded historically when sung by all male voices. As noted before, Byrd also provided music for Anglican services, composing in English as well as in Latin. While his corpus of sacred music is dominated by Latin texts, his English music is no less masterful. Voices8’s virtuosic rendition of Praise our Lord all ye Gentiles showcases a musical style comparable to his Latin polyphony, while revealing sensitivity to the different accentuation of English. Complex counterrhythms in the different voices as well as melodic imitation create an extraordinary rich texture. An intimate piece which initially sounds like it might be secular is his “Lulla, lullaby”, a poem in which the Virgin Mary sings to the Christ child a lullaby deploring the slaughter of the Holy Innocents by Herod (the full text can be found here). The time signature change in the second part creates a sense of agitation, ironically beginning on the words “Be still my blessed babe”. This segues into the refrain: “O woe and woeful heavy day when wretches have their will!” A favorite performance of mine is by Sarah Richards and Les Luths Consort; Richards’ delicate and lilting voice compliments the lutes perfectly to create an intensely domestic sound. A different effect is produced by The Sixteen, performing it as a fully choral piece—an example of the variety of instrumentation that renaissance music allows. Not all of Byrd’s English music was a concession to Anglicanism, however. His Why do I use my paper, ink and pen? is a setting of a poem by St. Henry Walpole composed to commemorate the death of St. Edmund Campion—who, incidentally, was an exact contemporary of Byrd’s, having been born in 1540, the conjectural date of Byrd’s own birth. However, Byrd was not just a composer of sacred music. His music for ensembles and keyboard was both virtuosic and pioneering. He wrote for nearly every musical medium then available, except perhaps for lute. As a lute player myself, I can only speculate that this was because he did not feel comfortable composing for an instrument he did not play himself—especially since there were so many contemporaneous lutenists who could and did arrange his music for their instrument. An interesting example is one of his fantasias—presumably intended for viola de gambas—played by Les Luths Consort on four lutes. The viol consort—usually made up of four to seven viols—was a special product of the English renaissance. A viola da gamba is most similar to the modern cello, but there are important differences. Its five to seven strings are tuned differently and the instrument is held between the legs (“viola da gamba” is Italian for “viol of the legs”). Viols come in a number of sizes, from soprano to bass. Their sound is noticeably more delicate and mellow than that of the violin family, although the concept of a string quartet is very similar to that of a viol consort. The music composed for viol consorts in Elizabethan England used essentially the same musical vocabulary of polyphony, each viol taking a part. In fact, playing vocal music on viols was common, and it is likely that Byrd’s vocal music was often performed with a combination of voices and viols. A famous piece for viol consort is Byrd’s In Nomine a4. While Byrd did not compose much secular music besides the instrumental music mentioned above, he did leave a few gems to adorn the English madrigal tradition. In the words of Susan Treacy, Byrd’s Though Amarillis dance in green is “among the best in England’s madrigal garden”.2 The Fretwork ensemble—one of England’s leading viol consorts—has a charming rendition with soprano Grace Davidson. Byrd continued to live at Stondon Massey until his death. Although it seems that he began to be fined more heavily after he moved away from London, he nonetheless died a wealthy man. In the 1590s or slightly after, he composed Mass settings for three, four, and five voices. Although they were probably only intended for use in recusant homes, he had these printed, and audaciously included his name on every page of the music—perhaps he was not as “tame” as some thought. These were the first settings of the Mass to have been composed in England since the restoration under Queen Mary in the 1550s. While the Mass texts are set to sublime music, there is relatively little word painting or unusual emphasis except on the words of the Credo: et unam sanctam catholicam et apostolicam ecclesiam. In each setting, all the voices come together, emphasizing these words with the clarity of homophony. Byrd’s dedication to his faith was confirmed in his will, where he wrote that he desired to die as he had lived: “And that I may live and die a true and perfect member of his holy Catholic Church without which I believe there is no Salvation”. He also asked to be buried “near unto the place where my wife lies buried.” Although I have spoken primarily of his life as a musician, Byrd’s life as a recusant Catholic should serve as inspiration for Catholics today, who face varying degrees of persecution not only from secular governments, but from within the Church’s hierarchy itself. Figures like Byrd remind us that the creation of great art is possible even in times of adversity. Byrd’s music is part of that culture which is ours by right as Catholics and inheritors of European Christendom. It is ours to know and to pass on. As Joseph Shaw has commented in The Liturgy, the Family, and the Crisis of Modernity, the culture which we need as individuals and families is not simply devotional. We need to create an environment in which parents and children can truly feel at home is not built exclusively on prayer and the sacraments. The family needs culture. It needs a tradition of cooking, of clothing, of architecture, of home decoration; it needs Christmas carol and fairy stories….Catholic culture is a natural culture as well as a supernatural one, and it is the family’s task to maintain it, develop it, and pass it on. Music like Byrd’s is an excellent middle ground between the purely secular and the religious. Primarily inspired by liturgical worship, it can be apprised as art for its own sake. At a time when it is hardly possible for earnest Catholics to follow the degrading trends of secular culture and difficult to reconcile living the traditional faith with the attitudes of many Catholic leaders, the feeling that faithful Catholics are recusants is increasing. In the fight against what Shaw calls the “final capture of the Church as a human institution by her enemies,” it will be the “refusal of ordinary Catholics to go along with” the Church’s secularization which will ultimately preserve the faith. Let us take inspiration then, from the life of William Byrd. Let us take time to soak in the beauty his music contains; such peaceful nourishment on transcendent art will give—like prayer—our recusancy depth and piety. Such nourishment will prevent our senses and souls from being deadened by the pervasive banality and ugliness which fills our world. Listen—and don’t let any monarch, reformation, or liberal Catholic tame you. 1 Quoted in Philip Caraman, Henry Garnet (1555-1606) and the Gunpowder Plot (New York: Farrar, Straus & Co., 1964), p. 320. If you value the news and views Catholic World Report provides, please consider donating to support our efforts. Your contribution will help us continue to make CWR available to all readers worldwide for free, without a subscription. Thank you for your generosity!
<urn:uuid:0d7b432d-fa3c-4125-8062-66181219cafe>
CC-MAIN-2023-40
https://www.catholicworldreport.com/2023/07/02/not-a-tame-byrd-remembering-a-great-recusant-composer/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.973376
3,171
3.21875
3
Artificial Intelligence: Simple Overview And All You Must Know4.9 out of 5 based on 9874 votes Last updated on 30th Aug 2022 21.3K Views Artificial Intelligence is one of the vast fields that is also developing fast in today’s world. To know more about it read this post. Artificial Intelligence is a modernistic and rampantly developing technological domain that deals with the intelligent design of a system that emulates human intelligence. It is a beneficial technological asset to various higher-end enterprises in the IT industry for complex data analysis processes, efficient chat boxes, recommendation systems, etc. AI systems can perform complex tasks in a complex environment they can also improve themselves using deep learning and machine learning algorithms. It has become a substitute for human intervention in repetitive and onerous tasks such as responding to customers on the web, personalized shopping, etc. Therefore, it is a huge field that currently dominates the job market in the IT sector and there is considerable value for the certification from Artificial Intelligence Training in Noida if you are a job seeker. Developers also utilize the field along with Data Science and Machine Learning to predict trends and solve problems. Now, let us get going with the subsequent section and analyze more details about the field at a micro level. Importance of Artificial Intelligence Generally, nowadays top enterprises utilize the technology to form prudent decisions for more revenue in the coming market trends. Apart from the applications in Business Intelligence, the field also has vast applications in enhancing all the technologies and making everything sophisticated. For example, it creates a high-tech business environment by integrating embedded systems with the internet. Artificial Intelligence renders the users with an efficient way of collaboration and information sharing. Consequently, the field contributes to upgrading the efficiency of organizations and helps them perform complex tasks much faster. Essentially, all the organizations look to be better prepared for the forthcoming trends so that they can perform better. Therefore, the field precisely helps in this aspect and aids in driving businesses with data-driven decisions. Now, let us proceed to the next section and peruse a few points signifying the multi-faceted applications of AI. Applications of Artificial Intelligence (Use Cases) It is one of the vast fields that is also developing fast in today’s world. The use of Artificial Intelligence comes in almost every predominant domain and industry. Furthermore, it is a futuristic technology that already provides solutions to the industry such as healthcare, finance, entertainment, education, etc. The main purpose of the field precisely is to maximize human efforts and bring more comfort to their tasks. The universe is gigantically large and consists of elements that require complex mathematical equations to understand. Therefore, Artificial Intelligence solves this problem and aids astronomers with sophisticated tools that can compute such complex mathematical equations, which otherwise would take hours for a human to solve. Furthermore, it is a useful domain in building futuristic technology that can help physicists in studying the origins and mechanics of our universe. In the last few hours, experts have truly begun to comprehend the vast application range of AI in the healthcare sector. Furthermore, as the technology continues to evolve, it is expected to have more impact in future scenarios as well. Essentially, AI is a field that can save lives by ensuring faster diagnosis and preparing cures for non-treatable diseases. Now, gaming is an area where we can already see the impact of AI. Traditionally, people used to enjoy playing games such as Chess and Checkers with the computer. However, now with technological evolution, the impact of AI on the gaming industry has also evolved. Nowadays, AI is used in high-graphic games such as Mass Effect where the AI is tougher to beat. So, here was a short overview of Artificial Intelligence. The article succinctly explains the field and its importance and also highlights the underlying applications in many industries and multifarious domains. It is quite advisable to pursue the field as a career choice. This is because it provides excellent job opportunities and good remuneration prospects. Furthermore, it also gives developers a chance to be part of an intriguing field. In the preceding years, there has been quite an upsurge in the set-up of IT training centers for Artificial Intelligence Training in Delhi and other metropolitan cities all around the world. Since it is a vast field, it requires undying curiosity and continuous hard work to move further in the domain. Subscribe For Free Demo Free Demo for Corporate & Online Trainings. Your email address will not be published. Required fields are marked *
<urn:uuid:2b2112da-82a3-49dd-8488-5d3626dbb3f7>
CC-MAIN-2023-40
https://www.cromacampus.com/blogs/artificial-intelligence-simple-overview/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.943264
931
2.671875
3
June 22, 2019WE'VE ALL BEEN THERE BEFORE--- sitting in the middle of a job interview or a first date and realizing that our breath is far from minty fresh. Even when everything else is going perfectly, bad breath can be enough to ruin your confidence and turn a good experience sour. Why do we get bad breath, and what can we do to stop it? Oral Bacteria And The Food We EatIn order to effectively fight bad breath, it's important to figure out what's causing it. The simplest and most common cause is leftover food particles stuck between our teeth after a meal. The bacteria in our mouths break down these particles, and the end result doesn't smell good.We can combat this with a good daily hygiene routine,including daily flossing, twice-daily brushing, scraping our tongues clean, and chewing sugar-free gum. Causes Of Chronic Bad BreathChronic cases of bad breath (also called halitosis) might not be solved by good oral hygiene practices alone. Halitosis may be caused by: - Chronic conditions.Sometimes, bad breath is linked to conditions that you wouldn't think are connected to oral hygiene, such as diabetes, liver or kidney disease, and acid reflux. - Medications.A common side-effect of medications is dry mouth. Without saliva to wash away food particles and neutralize acid, the mouth is vulnerable to problems like bad breath. - Mouth-breathing.Whether it happens by habit or because breathing through the nose is difficult, mouth-breathing tends to dry out the mouth, leading to the same problems as described above. - Mouth, nose, and throat infections.Bad breath can be the result of increased mucous when we have a cold or a sinus infection. - Pregnancy.Symptoms such as morning sickness and nausea can cause bad breath, because of the extra acid in the mouth. This is also a problem for people struggling with bulimia. - Tobacco products.Tobacco in any form leaves smelly chemicals in the mouth and can also dry it out. In addition, it increases the risk of oral cancer and gum disease, which negatively impact breath as well. - Tooth decay and gum disease.Poor dental health often goes hand-in-hand with chronic bad breath because cavities and periodontitis are caused by the same bacteria that produces those nasty-smelling chemicals.
<urn:uuid:d5afabeb-f1e0-4637-9071-6cc34368dfb8>
CC-MAIN-2023-40
https://www.dentalcareofmidfl.com/blog/defeating-bad-breath
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.936009
496
3.109375
3
Big O Notation in C In Data Structure and Algorithms in C programming, we have learned so many algorithms where we have understood different aspects and purposes of an algorithm. We have also studied the complexity of an algorithm and how to analyze and calculate an algorithm's complexity. We have found the time and space complexity of an algorithm and concluded that the algorithm that has less time and space complexity is evaluated as the best algorithm. We understood how to find the best case, worst case, and the average case of an algorithm. Thus, for analyzing all such complexities and representing them, the concept of Asymptotic Notation is used under which there are different types available for representing the complexities. One such type is Big O Notation. In this section, we will discuss the Big O notations and briefly introduce Asymptotic notations and its types. What are Asymptotic Notations These are the mathematical notations that are used for the asymptotic analysis of the algorithms. The term 'asymptotic' describes an expression where a variable exists whose value tends to infinity. In short, it is a method that describes the limiting behavior of an expression. Thus, using asymptotic notations, we analyze the complexities of an algorithm and its performance. Using the asymptotic notations, we determine and show the complexities after analyzing it. Therefore, there are three types of asymptotic notations through which we can analyze the complexities of the algorithms: So, these three asymptotic notations are the most used notations, but other than these, there are more common asymptotic notations also present, such as linear, logarithmic, cubic, and many more. Big O Notation The Big O notation is used to express the upper bound of the runtime of an algorithm and thus measure the worst-case time complexity of an algorithm. It analyses and calculates the time and amount of memory required for the execution of an algorithm for an input value. For a function, f(n) and another function g(n), where both functions are defined on some unbounded set of real (positive) numbers. Where g(n) is strictly positive for all large values of n. It can be written as: f(n) = O(g(n)) where n tends to infinity (n → ∞) But it is seen that the assumption of n to infinity is left unstated, and so we can simply write the above expression as: f(n) = O(g(n)) Here, f and g are the necessary functions from positive integer to non-negative real numbers. Thus, the Big O asymptotic refers to large n values. Properties of Big O Notation Certain essential properties of Big O Notation are discussed below: Here, in terms of Big O, every log functions increase in the same manner. How does Big O Notation make runtime analysis of an algorithm For analyzing an algorithm's performance, we used to calculate and compare the worst-case running time complexities of the algorithm. The order of O(1), which is known as the Constant Running Time, is considered to be the fastest running time for an algorithm where the time taken by the algorithm is the same for different input sizes. However, the constant running time is the ideal runtime for an algorithm, but it is achieved very rarely. It is because the runtime of an algorithm depends on the input size of n. As we know that the runtime performance of an algorithm depends on the input size of n. Let's see some mathematical examples for making the runtime analysis of an algorithm for different size of n: Thus, similarly, we calculate the runtime performance of an algorithm. Let's see some algorithmic examples and see the runtime analysis of those algorithms: How does Big O notation analyze the Space complexity It is essential to determine both runtime and space complexity for an algorithm. It's because on analyzing the runtime performance of the algorithm, we get to know the execution time the algorithm is taking, and on analyzing the space complexity of the algorithm, we get to know the memory space the algorithm is occupying. Thus, for measuring the space complexity of an algorithm, it is required to compare the worst-case space complexities performance of the algorithm. In order to determine the space complexity of an algorithm, the following two tasks are necessary to be done: Task 1: Implementation of the program for a particular algorithm is required. Task 2: The size of the input n is required to know the memory each item will hold. Both these are two important tasks to be accomplished first then only we can calculate the space complexity for an algorithm. Examples of Algorithms Below we have mentioned some algorithmic examples with their space complexities: Example of Big O Notation in C Below we have implemented the selection sort algorithm in C and calculated the worst-case complexity (Big O notation) of the algorithm: In order to analyze the algorithm: You can implement other algorithms in C, analyze it and determine the complexities in a similar way.
<urn:uuid:ecce5a03-007e-4bba-aabd-5a8259d74e0c>
CC-MAIN-2023-40
https://www.javatpoint.com/big-o-notation-in-c
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.920479
1,072
3.890625
4
Designed by nensuria / Freepik Ask your child how was your day at school? at the beginning of the school year they could make them babble. However, after a while, they may give you one-word answers. There are many things to tell about how her day at school went. There are new friends, new projects, new classrooms, and even new teachers. To keep track of your child’s school day, mix them up with these 15 questions to ask about their day. - What happened today that you wish could happen any day? - Who would you like to play with during break tomorrow? - What are you looking forward to tomorrow at school? - What was the hardest thing today? - What did you eat first at lunch? - What’s the funniest thing that happened today? - If I should teach your class what would you like me to teach? - How did you help someone today? - What did you learn today? - What games did you play during the break? - Who or what made you smile today? - If one of your classmates could be the teacher for the day, who would it be? Why? - When were you most proud of yourself today? - Tell me what you learned about a friend today. - What do you hope to do before school is out for the year?
<urn:uuid:46df5fd5-5b44-4f1f-b156-da73b48c6c32>
CC-MAIN-2023-40
https://www.kathyblogger.com/15-questions-to-ask-instead-of-how-was-your-day/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.989657
292
2.640625
3
Memorial Day is that one day, in three hundred and sixty- five days, we pause and honor those who died in the military service of our country. The practice of decorating the graves of fallen soldiers originated 1868 to honor those who died in the Civil War. In 1971 Memorial Day became a national holiday. Whereas Veteran’s Day, celebrated on the 11th of November, honors all those who served or are serving in any branch of the military. Memorial Day honors veterans who gave the ultimate sacrifice for our country. Those who gave their life. Their numbers are great, and we should always remember our deadliest war was the Civil War, when we fought each other, with greater causalities even than WW II. Revolutionary War – 4,435 War of 1812 – 2,260 Indian Wars – 1,000 Mexican War – 13,283 Civil War – 498,332 Spanish American War – 2,446 WW I – 116,516 WW II – 405,399 Korean – 54,246 Vietnam – 90,220 Persian Gulf War – 1,565 Global War on Terror – 6,852 Total number of Americans killed in all U. S. wars is more than 1.1 million Source Department of Defense and of Veterans Affairs On May 30, 2022 many Americans will gather, fire up the grill, and have the first picnic of the summer season. Hopefully they will also recall why we have this day free from work. They will take a moment to acknowledge the sacrifice of human life that has provided and secured our freedoms. In addition to the hot dogs, burgers, and beer, perhaps take in a Memorial Day parade? Go to the cemetery and teach your kids and grandkids what those flags on graves mean. Another beautiful way to honor our war dead occurs everywhere in the United States of America. It’s easy to participate. At 3 p.m. your local time take part in the national moment of remembrance … Taps Across America. If you play a musical instrument step outside and play taps, if you don’t play turn up your smart speaker as loud as it will go and ask it to play taps. Be still and listen. See if another within your earshot is showing their appreciation for those who gave their life to get us where we are today and to keep us a great and free democracy. You are welcome to call us any time of the day, any day of the week, for immediate assistance. Or, visit our funeral home in person at your convenience.
<urn:uuid:22418678-b760-4d50-bd88-a7c4c29ac67b>
CC-MAIN-2023-40
https://www.myers-mortuary.com/blog-posts/9102/memorial-day
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.949889
532
2.828125
3
Washington: NASA and European Space Agency's Sun-watching spacecraft has captured the first solar eruption. On February 12, the Solar Orbiter caught sight of coronal mass ejection, or CME, NASA said in a statement. The CME was captured by NASA instrument, the Solar Orbiter Heliospheric Imager (SoloHI) onboard the spacecraft. SoloHI watches the solar wind, dust, and cosmic rays that fill the space between the Sun and the planets. It used one of its four detectors at less than 15 per cent of its normal cadence to reduce the amount of data acquired.A The view captured is brief and grainy, but shows a sudden blast of particles, the CME, escaping the Sun, which is off camera to the upper right. The CME starts about halfway through the video as a bright burst -- the dense leading edge of the CME -- and drifts off screen to the left. At the time the eruption reached the spacecraft, Solar Orbiter had just passed behind the Sun from Earth's perspective and was coming back around the other side. When the mission was being planned, the team wasn't expecting to be able to record any data during that time. Two more imagers on Solar Orbiter -- ESA's Extreme Ultraviolet Imager and Metis -- also captured views of the CME. NASA's STEREO-A spacecraft, short for Solar Terrestrial Relations Observatory, also caught a glimpse from its COR2 detector, which blocks out the Sun's bright disk to see otherwise faint phenomena in the solar wind. NASA spacecraft have been watching CMEs for decades, but Solar Orbiter is still a game-changer. "We've realised in the last 25 years that there's a lot that happens to a CME between the surface of the Sun and Earth," said Robin Colaninno, principal investigator for SoloHI at the US Naval Research Laboratory in Washington DC. "So we're hoping to get much better resolution images of all of these outflows by being closer to the Sun," Colaninno added. Solar Orbiter was launched in February 2020. The spacecraft has already taken the closest picture of the Sun to date. Its official mission begins in November, when SoloHI and the rest of the remote-sensing instruments will be switched on in full science mode.
<urn:uuid:052064ba-f226-4519-841a-6a2d045e2a23>
CC-MAIN-2023-40
https://www.siasat.com/tag/solar-eruption/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.949866
473
3.265625
3
Fertility and Nutrients Sponsored: Evaluating elemental sulphur Fitting this macronutrient into a long-term fertility and soil nutrient plan. May 24, 2019 By Top Crop West Staff Sulphur (S) is an important macronutrient for crop production. While canola is most often recognized in Western Canada as a crop that requires the largest amount of S, most crops benefit from proper S fertilization. Like other macronutrients, sulphur helps optimize yield and quality. However, it is only in understanding how sulphur does this, can the reason for its necessity be fully realized. “In crops, sulphur is particularly important for protein synthesis and is a key component of two essential amino acids, cysteine and methionine, which are needed for that process,” explains Elston Solberg, research agronomist with Sun Mountain Inc. in Edmonton. “These amino acids are the mediators of the efficient creation of the 18 other amino acids involved in protein synthesis, secondary plant compounds, and protein enzymes required by crops to regulate photosynthesis and nitrogen fixation,” Solberg says. “Sulphur enhances the utilization of every other nutrient. Interestingly, the Mulder chart, which shows synergistic or antagonistic interactions between plant nutrients, does not include S because it plays well with all others.” Thanks to current research, growers and agronomists can better understand the complexity and functionality of these S-based compounds. A plant loaded with S is able to synthesize and create glutathione, which is an important antioxidant or stress fighter within the plant. Another group of secondary plant S compounds are the glucosinolates, which help plants (brassica species in particular) defend against certain insects and diseases. To support all these functions, adequate S needs to be available to the crop. Sulphur levels are usually extremely variable across a field, making it challenging to get a representative soil sample, which often results in misleading numbers. It only takes one sample in an overabundant area to totally skew the sulphur test. “One of the complications with S deficiency is that applying N fertilizer without S in deficient areas will actually decrease yields,” Solberg says. “Therefore, the most important factor to look at is a balanced N:S ratio in plant tissue, which is typically 10:1 for cereal crops and grass forages, 8:1 for pulse crops and 6:1 for canola crops.” Solberg says this is how he bases sulphur recommendations, regardless of soil test sulphur levels. “How much nitrogen does it take to grow this crop yield? Then I use the appropriate ratio to come up with the sulphur recommendation. The best indicator of adequate S levels in the crop is a tissue test of newer leaves. We take the newer leaves because sulphur is immobile in the plant and can’t be remobilized from older to new tissue, so this is where sulphur deficiency shows up first.” To ensure crops have adequate S available every year, Solberg recommends including elemental sulphur (ES) as part of a long-term fertility management plan. Plants utilize S in the sulphate (SO4-S) form, and through a biological process, ES is converted to the available form. The key to success with ES is broadcasting and leaving the ES on top of the soil, increasing surface contact and allowing soil microorganisms to find the ES faster and easier. Broadcasting produces the best results, with a 20 to 30 per cent conversion in the first year. Incorporating ES into the soil through banding or tillage, slows the conversion to less than 10 per cent. Because only a portion of the ES is converted to sulphate every year, the remaining ES stays in the soil until it is converted, acting like a slow-release fertilizer. This, in combination with the large amounts applied once every few years, enables growers to remove a huge amount of fertilizer bulk out of the air seeder tanks and improve logistics. By applying elemental sulphur in fall or early spring, removing the sulphur typically placed at seeding time, seeding efficiency increases by roughly 20 per cent. Solberg adds, “Because the conversion to SO4-S is a biological process done by the soil microorganisms, soil acidity does not change immediately. The acid added by agronomic rates of ES application will not increase soil pH by significant amounts, and the small amount of biologically produced acid helps release other nutrients that have become crop unavailable. We have lots of research tissue test results since the mid-90s to prove this. On the other hand, he adds, all fertilizers applied, except for potash, create acid extremely rapidly in a chemical process, depending on the product being used, at much higher levels than ES. Ammonium sulphate also has a very high salt index, whereas ES is almost zero.” Bio-Sul Premium Plus is an ES amended granular compost product that is applied at a variable rate, depending on farm needs. It maintains effectiveness for multiple years, eliminating the need for annual application. “The product is comprised of 70 per cent ES from recovered industrial ES sources and 30 per cent compost from diverted food waste streams,” Solberg explains. “It is custom broadcast by a spin spreader for proper application.” Solberg adds the biggest consideration when determining application rates is really whether the land is owned or rented. Many growers try to negotiate rental agreements of three to five years, so may back off application rates slightly to fit within those timelines. Overall, using ES, especially Bio-Sul, on a per pound basis is much cheaper than other ES and sulphate products available. “By blanketing fields with higher recommended rates, depending on which product is being used, you are avoiding a yield and/or quality penalty in areas where the N:S ratio would, otherwise, be too wide.” “For us, one of the main benefits of using elemental S is it takes a lot of product out of the seed drill, which significantly speeds up seeding. It also reduces the amount of fertilizer hauled to the farm and field, wear and tear, as well as the amount of storage space required to handle our annual supply,” says Richard Limoges of Limoges Seed Farms near McLennan, Alta. “If S is no longer in the blend, we can seed a lot more acres per fill, or use the space to apply higher rates of other nutrients. Ensuring proper S fertilization is needed to maintain the correct N:S ratios and is very important in our area in the Peace region for improving nutrient use efficiency and crop performance, in particular crop maturity. Other factors such as oil content and protein levels are also improved by proper S nutrition. In our area, S is generally underapplied, so many growers see a bit of a yield bump when they apply ES at these high rates.” Nikki Olson, an agronomist with Exactly Ag and farmer near Red Deer, Alta., agrees. She notes taking S out of the blend increases the feasibility of getting the fertilizer blends through the drill. “For growers using variable rate (VR) precision applications, they don’t need as many tanks either. One of the benefits we have seen on our farm and with other growers I work with is that using ES balances out some of our nutrient ratios and helps the crop be more efficient. For example, we have been able to decrease some of our N applications as we have improved the N:S ratio balances, which, in turn, helps to improve the protein and grain quality as well.” Another benefit, notes Olson, is using elemental S has helped the whole management program on the farm. She’s found that the crop has the required nutrients when needed, even in those sulphur-heavy years with canola crops. “We have done intensive soil and tissue testing, and since using Bio-Sul, the efficiency on some of our client farms has really improved.” Limoges adds that the majority of elemental sulphur in the Peace Region is applied in the fall because the application window is typically wider. “In our area, there are many other things farmers prefer to do in the fall, such as anhydrous ammonia application, harrowing or drainage projects. Some growers will apply elemental S to their whole farm upfront, while others, for example those using a three-year rotation, may apply the elemental sulphur in the fall prior to the areas planned for canola the following spring, and do that every year until the whole farm has been covered. That takes the S out of the canola fertilizer blend and breaks up the payments on the elemental S. And most importantly, products like Bio-Sul and other ES sources help growers address the need for S in long-term fertility and soil nutrient programs.”
<urn:uuid:052e37e6-6d61-4356-be6b-fa88928c1c13>
CC-MAIN-2023-40
https://www.topcropmanager.com/evaluating-elemental-sulphur/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.940677
1,863
3.3125
3
What is Contractor: Everything You Need to Know What is a contractor? It's an independent entity who agrees to supply services, goods, materials, equipment, or personnel that meets stated requirements. 3 min read What is a contractor? It's an independent entity who agrees to supply services, goods, materials, equipment, or personnel that meets stated requirements. A contractor may work for a company, but they aren't a company employee. Instead, they work according to an agreed-upon contract for a set period of time. What Is a Contractor? If you're a contractor, you operate much like a business owner. You work for yourself, you negotiate deals, and you have your own clients. You're often rewarded by how hard you work. In many cases, contractors earn more working this way versus being company employees. They put in the effort of finding clients, so they enjoy all the profits of their work. Contractors may also be any of the following: - Someone who oversees construction sites - Someone who manages vendors and trades, serving as the central point of communication for all parties - Someone who coordinates projects, including assessing documents or determining sites for renovations A contractor may hire subcontractors to do some or all of the work they're contracted to perform. They'll draft subcontractor agreements, which protect them and the subcontractors they hire. A contractor agreement outlines which services and materials will be provided. It also details the cost of the job and any included warranties. The following sections outline some of the pros and cons of working contract-to-contract for contractors. Contractor or Freelancer Although some people use "contractor" and "freelancer" in much the same way, the two terms aren't interchangeable. Rather, they're two different terms for similar professional fields. A freelancer is a professional who supplies specialties to various clients. Freelancers have no permanent contracts or clients. They have a great deal more flexibility than contractors and company employees. Freelancers have the potential to earn a significant income in their specialty field. Contractors, on the other hand, are under contract. While freelancers may provide a service for a business and move on, contractors are bound by the contract. They're contracted to fulfill their part of an agreement. How Contractors Work Because contractors are professionals who work through their own company, they're not in the same tax bracket that company employees fall into. Although contractors may work for a business, they're not actually employed by the business. Instead, they're self-employed individuals who work on a contract basis. They don't enjoy company benefits that certain employees are entitled to, but they also avoid some of the downsides that come with employment. Since contractors don't fill a permanent role at a company, they can work on their own schedule, provided they fulfill their duties and don't breach their contract. Being able to work on their own schedule gives them flexibility, which is seen as a plus in today's working world. When you're under contract to work with a company, you'll take direction from the company about the specific work they want you to do. Depending on the job you're assigned to do, you may need to attend meetings, track the time you spend on a project, and use the company's computer and software. The company may also request that you bring your own laptop. You may have to sign a non-disclosure agreement, as well. If so, you shouldn't put the work you've done for the company in your portfolio without asking their permission to do so. Contractors may be more vulnerable to financial insecurity than employees, so contractor insurance is important for protecting them from potential losses. Contractors receive no pay for sick leave or accidental injury. If they get sick, make a mistake, or have an accident, they're on their own because they don't have the coverage that an employer provides. There are different types of contractor insurance that provide for the following: - Negligence coverage - Breach of duty coverage - Sickness coverage - Neglectful misrepresentation coverage It's usually worth the cost of insurance to have this important protection. Contractors often enjoy a great deal of flexibility, which is why many people choose to work this way. As long as you understand the pros and cons of contracting, this may be suitable for your working plans. Being a contractor is best for people who are disciplined about finishing a job and can work with minimal supervision. If you need legal help with contractors, you can post your legal need on UpCounsel's marketplace. UpCounsel accepts only the top 5 percent of lawyers to its site. Lawyers on UpCounsel come from law schools such as Harvard Law and Yale Law and average 14 years of legal experience, including work with or on behalf of companies like Google, Menlo Ventures, and Airbnb.
<urn:uuid:4116fb4b-0035-4d3f-b352-651bdeb34fa6>
CC-MAIN-2023-40
https://www.upcounsel.com/what-is-contractor
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.971412
1,007
2.75
3
Sugars and allied Sugars are a very large family of compounds. In nature we have a lot of sugar. The specific term sugar, commonly used in food, is reserved for the sucrose, which are industrially manufactured in Italy is extracted from sugar beet, a plant typical of the temperate zones, and also elsewhere from sugar cane, a plant typical of tropical regions. Monosaccharides - disaccharides - polysaccharides. Chemically, sugars are carbohydrates, composed of molecules whose elements are carbon, hydrogen and oxygen. The sugar family consists of three different classes of sugars known as monosaccharides, disaccharides and polysaccharides. These classes are characterized by lower or higher molecular complexity, depending on which are formed from one, two or more molecules of simple sugars, ome is evident from the following list of definitions. MonosaccaridiI monosaccharides are formed by a single molecule of simple sugars. For example, glucose, which is mainly found in grapes, and from which is obtained by fermentation, the wine; glucose is also used to prepare cakes, jams, candies, candy, liquor, etc .; then again fructose, which it is located in ripe fruit, and many others, which for brevity not citiamo.DisaccaridiI disaccharides are formed by the natural combination of two molecules of simple sugars. Among these the most important is precisely the sucrose, resulting from the union of glucose and fructose, and which is located in sugar beet and sugar cane to about 18%. We then maltose (two alpha-glucose units), which is obtained by enzymatic hydrolysis of starch, and which is located in the malt of barley and wheat, and used, along with other components, in the preparation of polysaccharides birra.PolisaccaridiI they are formed by more molecules of simple sugars, such as starch, which is located in potatoes, cereals, etc. The complete classification of sugar is complex. The reason for this complexity resides in the fact that in each class the three constituent elements of the molecule, namely carbon, hydrogen and oxygen, can be linked together in a different way, and this different dispozione is the cause of chemical and physical properties different , and therefore of different compounds. Beets, the raw material from which sugar is obtained, are processed in sugar. Here the beets are reduced in tapes, and treated in speakers with hot water, obtained by extraction of a so-called "sugar sauce" (which is the liquid part from which to obtain sugar), together with the "pulp exhausted", byproduct, used as feed for animals. The gravy is refined, freeing it from the non-sugar (the so-called sludge), and then subjected to successive vacuum concentrations in multiple-effect evaporators. When the sugar solution has reached the appropriate concentration, we proceed to crystallization (just enter in the sugar solution a small amount of crystalline sugar at the right time to instantly obtain the crystallization of the whole solution, the so-called "massecuite"), and the subsequent centrifugation of "cooked mass", obtaining raw sugar and molasses. The raw sugar is refined later, while molasses is stored, to extract the alcohol after the sugar year. In addition to direct consumption sugars they are in demand by the confectionery industries and small artisan producers who operate in the fields of pastry, ice cream and chocolate. Also the canning industries of jams, jams, jellies and fruit juices, using substantial amounts of sugars, both as sweeteners, both as preservatives (in solutions with concentrations of not less than 60% sugars block the development of microbial activity). Honey and other natural sweeteners. In addition to sucrose (common sugar), which is the most important natural sweetener and more widespread, also an important place should be reserved for honey, which is a better sweetener common sugar, because more easily digestible and more nutritious. Natural honey is made by bees from the nectar of flowers or other sugary juices. To produce one pound of honey bees must visit more than two million flowers. The developed are 303 kilocalories per 100 grams of honey. The composition of honey is complex contains mainly glucose, fructose, mellocosio, many vitamins and minerals, and to some antibiotic substances. They can distinguish different varieties of honey on the market: a) according to the floral origin (millefiori, acacia honey, linden, mountain flowers, etc.). b) according to the method of manufacture (centrifuged honey, drained, with honeycomb pieces, comb honey, etc.); c) according to the aspect (smooth, dense, crystallized). It may be adulterated with added sugar, molasses, dextrin, ecc.Tra synthetic sweeteners include saccharin (E954, with sweetening power 300 times greater than that of sugar, used by diabetics), and aspartame (E951, with sweetening power 180 times greater than that of sugar), already treated in the section on food additives.
<urn:uuid:0f0944b8-c316-4862-8baf-7ff7572a8f84>
CC-MAIN-2023-40
https://zeferino.it/en/foods/lesson-7/sugars-and-allied
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00740.warc.gz
en
0.951346
1,095
3.390625
3
CUBA: POSSIBLE THREAT TO THE NATIONAL SECURITY OF THE UNITED STATES THROUGH NON-CONVENTIONAL MILITARY METHODS Anthrax is, as mentioned before, in conjunction with smallpox, the biological weapon most likely to be encountered. It is highly lethal; easy to produce in large quantities; relatively easy to develop as a weapon; easily spread in the air over a large area; easily stored; dangerous for a long time. All of these factors contribute to suspect that Cuba produces and store anthrax. Anthrax is caused by the bacteria Bacillus Anthracis. Anthrax has been recognized as an illness for centuries. Anthrax still occurs in countries where animals are not vaccinated, mainly in Africa and Asia. It does occur infrequently in many other countries, including the United States. When anthrax is used as a biological weapon, people become infected by breathing anthrax spores that are released into the air. Symptoms of inhalation anthrax can begin as early as 24 hours after breathing the spores. Initial symptoms include: fever, cough, weakness, and usually progress to breathing problems, shock, and death. It is expected that anthrax spores will be disseminated by air, causing inhalation anthrax. Because atmospheric stability is important to efficient spread, and because sunlight, as previously mentioned, is highly toxic to biological agents, they are most likely to be delivered at night. Particles from 1 to 5 microns in size are most efficient in causing infection, and can be present in clinically significant quantities more than 20 km. downwind. The inhaled infectious dose in man is quite high, estimated to be larger than 3,000 particles. The addition of detergents, irritants, or immuno-supressives to the aerosol may decrease the infective dose needed by up to 10-fold. Inhalation anthrax, also known as Woolsorter's disease, is a biphasic illness. The first phase occurs when the spores are carried to the mediastinal lymph nodes by pulmonary macrophages and cause a suppurative infection with edema and hemorrhage.This phase is characterized by nonspecific flu-like symptoms; mild fever, malaise, fatigue, myalgia, nonproductive cough, and at times a sensation of chest oppression or pressure. Rhonchi may be heard with a stethoscope. This phase can last for several days, or for as little as 24 hours in heavy infections, and can be followed by an asymptomatic period. The disease is treatable in this stage, but blood cultures are probably negative. The second phase develops suddenly with the development of severe shortness of breath and cyanosis. Hypotension and shock can occur. Stridor may be present due to enlargement of the lymph nodes near the trachea. The second acute phase typically lasts less than 24 hours. Usually ends in death despite therapy, due to the high number of toxin-producing organisms present by this stage in the illness. The standard therapy for inhalation anthrax is intravenous penicillin G by continuous infusion, 50 mg/kg in the first hour, followed by 200 mg/kg over the following 24 hours. In a biological warfare situation, it is recommended that vancomycin be a part of the regimen, in a dose of 500 mg every 6 hours. As soon as in vitro susceptibility data are available, therapy should be adjusted to include effective drugs. However, since most probably in a biological warfare situation, communications and support services will degenerate to a point of complete chaos, in vitro data would not be available. Recent tests with anthrax raise fears that U.S. vaccine can be defeated. The concern stems from recent evidence that Russia may have mixed together several strains of anthrax, presumably to enhance the lethality of its germ weapon. There is evidence also that Russian scientists have produced strains of anthrax genetically engineered to produce new toxins. The vaccine works by disabling a component of anthrax known as protective antigen, which helps the microbe's two toxins penetrate the cells they are attacking. Anthrax is one of the most effective and lethal bioweapons in existence. Smallpox is caused by a virus. The virus spread when an uninfected person comes in direct contact with a sick person and breath in the virus. After two weeks, the incubation period of the smallpox virus, the infected person develops high fever, muscle aches and pains. After about three days of fever the person breaks out in a rash all over the body. At first it looks like red spots, and the spots gradually become blisters about the size of a pencil eraser. After about five days of rash, the fluid in the clear blisters turns to pus. The more pus spots that a person has, the more likely the person will die. There are two main types of smallpox virus: variola major, which kills about 25% of the people infected, and variola minor, which kills about 5%.of its victims. In 1965, the world Health Organization began a world-wide effort to eradicate smallpox. Studies by epidemiologists showed that the disease could be stopped from spreading if the people who came in contact with infected persons were all vaccinated. The disease was completely eradicated from the earth by 1977. Today, the smallpox virus exists only in two freezers, one in Moscow, Russia, and the other in Atlanta, Georgia, United States. There is evidence that certain countries may have harvested smallpox for use in weapons, threatening to revive a plague for which vaccines are no longer produced. Ironically, the danger smallpox would pose to a targeted population stems in part from the success medical science has enjoyed in battling the virus. Smallpox is unlike anthrax in that it is highly contagious but can be handled with impunity by those who are immunized against it. Yet with smallpox no longer recognized as a threat to human health, inoculations in the United States and most other countries have all but stopped. Military translation: the world's population is extremely vulnerable. The Pentagon has a program under way to develop a new vaccine, but its testing and development is projected to take until 2003. New intelligence assessment on countries doing research and development on the smallpox virus-Russia, Iraq, North Korea, Cuba- could end up accelerating the Pentagon's program. Actual vaccine requires periodic boosters and wears out after ten years, though revaccination is required after three years in case of infection. Outside of the lab, variola virus thrives only in the human body. A virus's effectiveness as a weapon can be measured by its mortality rate, which reflects the number of people to contract the disease after exposure. Smallpox kills between 35 to 55% of unvaccinated persons, but its morbidity rate ranges from 70 to 90 percent. Those who do not die, can be permanently blinded. Others will bear scars as long as they live. Smallpox, unlike anthrax, requires no concentration process. It is, like anthrax, one of the most effective and lethal bioweapons in existence. Botulinum Toxin (Bot Tox)It is the most toxic substance in the world. C. botulinum can be isolated from its natural habitat, the soil. It grows rapidly on common bacterial media. The conditions for achieving optimum toxin production have been well researched in Cuba. Cuba has the capacity to produce several grams in one day. Box tox is relatively stable, and can be stored in crystalline form. It can be absorbed through the mucous membranes, so aerosol dispersal is a likely way to be used. It can also be added to a municipal water or food supplies. Box tox is tasteless and odorless. Depending on the dosage, symptoms appear between 2 to 14 days. The symptoms include double vision, difficulty in swallowing and speaking, vomiting, and eventually respiratory failure. The protein is a neurotoxin and once the symptoms appear, the damage is irreversible. The only treatment involves passive antibody shots against the strains. The known disadvantages are that box tox is unstable in the air if exposed to sunlight and dry conditions. Box tox can also be destroyed by brief boiling. Ricin is a protein toxin extracted from the castor bean plant. Ricin kills by destroying an important component of the protein synthesizing machinery of cells, the ribosome. It works as a slow poison, eventually causing a total body collapse as necessary proteins are not replaced. Ricin can be used to specifically target an enemy. An agent could be specific enough to use this procedure to target a single individual for assassination. There are not effective treatment once the ricin has produced clinical symptoms. Este y otros excelentes artículos del mismo autor MANUEL CEREIJO aparecen en la REVISTA GUARACABUYA con dirección electrónica de: http://www.amigospais-guaracabuya.org
<urn:uuid:c55af96c-b347-4579-b3e2-281e8d110363>
CC-MAIN-2023-40
http://amigospais-guaracabuya.org/oagmc026.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.943184
1,878
3.046875
3
Drainage around the house — what it is, what it is for, drainage depth, features of different types Many owners of private houses think about the safety of buildings. To do this, organize drainage around the house and around the perimeter of the site. In order for it to cope with its functions, you need to know how to choose the right design and build it according to all the rules. What is drainage around the house? This is a system designed to ensure the organized collection and removal of excess water from the site, which can lead to negative consequences for buildings and plants. It is recommended to plan the scheme even at the design stage of the house. This helps to easily tie the drainage job around the house and place the rain cover up to the blind area. The drainage system around the house collects not only precipitation, but also the flow of groundwater and melted precipitation. Factors influencing the choice of design: - the location of the site on the ground; - soil composition; - position of the site relative to water bodies; - average annual rainfall; - building density on the site. What is the purpose of drainage around the house? The main purpose of the drainage system is the accumulation of melt, rain and excessive groundwater and their withdrawal beyond the boundaries of the site. The creation of such a system is necessary in such situations: - The basements are damp due to the proximity of groundwater. - The structure is located on clay soils or in a lowland. - During heavy rainfall, waterlogging of the soil occurs. - It is necessary to level the site, ensuring the removal of excess moisture. Drainage depth around the house In order for the system to perform the functions assigned to it, it must be correctly calculated. The optimal indicator for the depth of laying pipes near a house that is heated during the cold season is 130 cm. The following methods are often used to calculate the drainage depth: - Based on the depth of the foundation. Drainage and storm water around the house will help remove water even before it begins to wash away the building. For calculation, 50 cm is added to the drainage depth. - Based on the depth of soil freezing. Pipes are located below a certain level, the only way to ensure maximum performance in any conditions. 30 cm are subtracted from the freezing depth and pipes are laid. Types of drainage around the house The chosen option depends on several factors: the ease of installation, the location of the site and the characteristics of the premises. The following species are currently known: - deep drainage around the house; Open drainage system The easiest way to drain water. The arrangement of this drainage around the house is used in the following cases: - the soil is clayey and poorly permeable to moisture, which leads to waterlogging; - the site is in a lowland and rainwater flows there; - the absence of a natural slope in the relief of the site. The arrangement of this drainage around the house does not require a diagram. The system consists of trenches 0.5 m wide and 0.6 m deep. The sides are placed at an angle of 30̊. They are dug around the perimeter of the site and direct water into a ditch or pits. Their size is directly related to the area of the site and the intensity of precipitation in the region. So that this drainage system does not lose its efficiency over time, they take a geotextile and overlap it on a ditch. From above, you can sprinkle everything with a layer of fertile soil. Backfill drainage system The system is created without the use of pipes. The main goal is to drain the site after heavy rainfall. It is advisable to use such a drainage drain in a small area where there is no possibility of building another type. At the initial stage, ditches are dug, the depth of which is 150 cm. It is important that there is a slope of 3 cm for each linear meter. Crushed stone or gravel is poured into them instead of pipes. All side trenches must be connected to the main trench, which is connected to the drainage tray, which should be located at the lowest point of the site. So that this system does not quickly fail, it is recommended to make the bottom of concrete and cover it with geotextiles. In addition, if the site is sloping, the drainage trench can be located along the fence, which is located at the lowest point. closed drainage system In this case, the construction of an entire highway is carried out, consisting of pipes that are located underground. Such a drainage system around the house is invisible, so it is suitable for any site. For gasket - trenches are dug along the perimeter with a depth of 30 cm, the slope of the walls for each meter is 2 cm; - they are combined into a single system at the point of water collection; - dig a well to collect water; - fine gravel is poured at the bottom of the trench; - spread the geofabric and fall asleep large gravel; - carry out pipe laying; - gravel is poured on top and covered with geotextile; - the final stage is sand with a layer of 15 cm. Such a water drainage system is created using a pipe made of plastic, PVC or polyethylene. The use of two-layer products helps to self-clean and prevent blockages, which increases the life of the drain. This system is suitable for areas where there is no clay. Otherwise, it will quickly fail due to silting. The variety includes a drainage pit, which is a cavity that is filled with filter media. Types of drainage systems Several types are used in construction: - open. It consists of trenches 50 cm deep. They are located on a slope. - trenches with gravel. The device is similar to the previous version, but sand and gravel are poured inside. They are used to filter water. - Trays with grids. Installed in dug trenches and protect the inside with a grate. The following materials can be used: concrete or plastic. - closed drains. They are located underground. Water can drain not only under gravity, but also be guided by a pump. In addition to this, there are differences in the installation method: - ring drainage around the house; This type of drainage around the house has been used for a very long time and we can say that such a system is necessary, since the benefits are invaluable. The system helps to collect water that falls on the ground from roofs, lawns or paths. To implement storm sewers, point water collectors are used — storm water inlets, they collect water only where they are installed. A mandatory point is the installation of filters for purification. Such a drainage device around the house has the following positive qualities: - protection of buildings from premature destruction; - the ability to neutralize the impact of dampness on the lower floors; - lack of puddles on the site; - prevention of erosion processes and waterlogging of the soil; - improving the appearance of the site. Such drainage is used to protect the foundation of the building from flooding. The linear system is a trench buried in the ground. Such a drainage system is designed based on the nodes available for use. Water gets into them from all over the site. The linear system consists of the following elements: - sand traps; - drainage grids. For water intake, concrete, polymer concrete or plastic pipes with perforation are used. Lattices that provide ease of movement of people and equipment around the site can be metal or plastic. Linear drainage around the house is used in the following cases: - The slope of the site is more than 3̊, which, in case of heavy precipitation, can wash away the fertile layer of the earth. - Removal of water from the foundation of the building after prolonged precipitation. - When outbuildings are located below the surface level of the site. - Protection of paths from flooding. This method is used to discharge liquid into sewer systems. Point drainage helps to significantly reduce the amount of work performed when laying surface trays. In modern construction, the following types of devices are used: - Cast iron elements. They have high strength and durability. They have high throughput. - Plastic elements. Their advantages are minimal weight, ease of installation. The elements that are used in the production have a high frost resistance. Such a drainage scheme around the house has the following advantages: - the ability to connect to the existing sewerage; - high throughput; - no negative impact on the landscape; - the presence of a garbage collector simplifies maintenance. Drainage around the house with your own hands If there is a desire to make such a system, it is easy, the main thing is to know what stages the creation process consists of. Consider how to make drainage around the house yourself: - They dig a ditch about 1 m deep. It should go into the nearest reservoir or sewer. If not, then dig a well. For its location, choose the lowest place on the site. - Sand, expanded clay or screenings are poured at the bottom. The layer thickness is 10 cm. Everything is rammed. - Fall asleep crushed stone of the middle fraction. The layer should be about 30 cm. - Lay the drainage pipe, after making holes in it that will take the liquid. - To prevent it from clogging, winding with natural or synthetic material is carried out. - From above, everything is covered with a fine fraction of gravel or sand. Layer thickness 15 cm. - At the end, the trench is leveled with a layer of soil. What kind of gravel is needed for drainage around the house? The most popular option for use as a system to get rid of excess moisture. The following types of rubble are known: - granite. The most durable, frost-resistant and durable material. The disadvantages include the high cost. Service life is about 40 years. - gravel. Broken rock. The strength is lower, but the price is also more affordable. - Dolomitic or limestone. This gravel for drainage is made from sedimentary rocks. More demanding to use. Service life 15 years. - Secondary. Produced from construction waste. The advantage is the low price, and the disadvantage is the low strength of the products. - slag. It turns out as a result of crushing of slags of the metallurgical industry. Depending on the particle size, the following fractions are distinguished: - screening – up to 5 mm; - shallow – up to 20 mm; - average – up to 40 mm; - large – up to 70 mm; - non-standard – up to 120 mm.
<urn:uuid:c561bb1e-8565-437c-b35e-ef88bda20e36>
CC-MAIN-2023-40
http://noseherb.xyz/2023/06/13/drainage-around-the-house-what-it-is-what-it-is-for-drainage-depth-features-of-different-types/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.946147
2,315
3.140625
3
We were so excited that this year Benny gave his own presentation about Down syndrome to his class and after school care program for World Down Syndrome Day using his talker, also known as an Augmented Alternative Communication or AAC Device. This is no easy feat, he had to practice diligently for some time to get the pacing and order right, and he is so proud of himself! This was the first presentation he's ever given himself, and he did a great job. Leading up to World Down Syndrome Day we invited Rio Vista Elementary School to help us celebrate by learning and sharing five fun facts about Down syndrome, and wearing crazy socks on March 21st. Five fun facts about Down Syndrome! 1. People who have Down syndrome have something extra in their bodies that makes them special, an extra chromosome! What is a chromosome? It's what gives our cells the genetic information that makes us who we are, like what color our eyes are, or whether we are good at math. Most people are born with 46 chromosomes, people with Down syndrome are born with 47! This triple chromosome is located on the 21st strand, which is why we celebrate World Down Syndrome Day on the 21st day of the third month of the year. Can you think of something special you were born with that makes you different? 2. People with Down syndrome may share some similar facial characteristics but each person with Down syndrome is unique. Just like you might have the same eye color as someone else, but in other ways you are different, people with Down syndrome have similarities and differences from each other. You share the same genetic information with your family members, but you also share unique traits that make you different. Can you think of ways that you are the same as other people in your family, and ways that you are different? 3. A person has Down syndrome, but they are not Down syndrome. With any diagnosis or difference it is polite to ask the person how they like their difference to be referred to. If you don't know what a person's preference is, it is best to say the person first, and then give their diagnosis or difference. This is called person first language, and it helps remind us to see the person first before we see their difference. Our son Benny has Down syndrome, he is a kid with Down syndrome, NOT a Down syndrome kid. Think about who you are and what makes you different. Do you want people to say your name first, and then what makes you different, or is it okay for them to call you by your difference? There is no right answer, only what feels good to you. 4. Many people with Down syndrome have difficulty with speech, but that doesn't mean that they don't have a lot to say. It also doesn't mean that they don't understand what you are saying. Our son Benny has trouble with articulation and uses sign language and a "talker" to help people understand what he is saying. His talker looks like a tablet, but has software on it that he uses to speak. Waiting to hear what Benny is trying to say often takes patience, kindness and creativity, all important characteristics for success. Besides speech, we all have non-verbal ways that we communicate. What are some ways you can think of to communicate without speaking? 5. Including people with Down syndrome in the classroom benefits everyone in the class. We all have different ways of learning, and different things that we are good at. Sharing a classroom with someone who learns differently, and who takes longer to learn, benefits everyone in the classroom. Statistics show that typical students who share a classroom with a child with a disability are less likely to bully each other and are more likely to do better academically. There is even a statistic that shows that children who share a classroom with a child with a disability have higher IQ scores! How do you learn differently from other people? What is a subject that is easy for you, and what is one that is more difficult? Happy World Down Syndrome Day! Curriculum using rhythm to teach academic and life skills to young learners and learners of all ages with Intellectual and Developmental Disabilities. Presenter: Eddie Tuduri Two day Workshop $20 Suggested Donation for Both Days Day One: May 6th, 4 to 7 PM Day Two: May 7th, 10:30 AM to 2 PM First Christian Church 740 East Speedway Blvd. Tucson, AZ 85719 (corner of Speedway & Euclid) Step 1: Email [email protected] or call 619-990-5773 requesting registration Step 2: Donate $20 or more HERE (Please indicate for TRAP in Tucson) For more information visit traplearning.org In just one week from today Eddie Tuduri will be coming to Tucson to teach a workshop on his amazing program TRAP. I am so excited to have helped make this happen, this is going to be a blast! I remember the exact moment I met Eddie Tuduri in person. For almost a year our son Benny had been unsuccessfully attending Kindergarten via zoom. I was pretty sure Benny hadn't learned anything from these fruitless zoom classes. He refused to participate in all but the very interactive adaptive PE sessions, and his behaviors had gotten so bad that I could barely get him to put on pants. We found out about TRAP from a neighbor in Santa Barbara who also had a child with special needs and understood how much we were struggling. Since we were local, Eddie offered to come and work with Benny in person to show us how the program worked. The second he walked in the room with all of his magical rock and roll energy Benny just lit up. The first lesson in the curriculum addressed a fundamental skill that Benny is still working on, saying your own name. As he tapped out the syllables of his name using the drum, we could see Benny getting visibly excited. The combination of the physical sensation of tapping the drum, the auditory input of hearing the sounds and the visual input of seeing the syllables tapped out, all worked together to help him access this information in a new way. Benny has apraxia of speech, a motor planning issue between the brain and the muscles required for accurate, reproducible speech. One of the things that helps him to be able to create speech is a physical gesture, so many of the words that he is able to say verbally are ones that he learned early on through sign language as a baby. For Benny, learning through music and movement is so much more effective on so many levels, the TRAP curriculum is perfect for him. Eddie had developed the TRAP curriculum from his own experience. He was a touring rock and roll musician who created the program after an accident left him paralyzed from the neck down. Through force of will and divine intervention Eddie taught himself to walk, talk and play the drums again. Today most people would never suspect that he is a quadriplegic. Despite the fact that he uses a cane Eddie's energy is so unstoppable that this is the last thing most people notice about him. For over 20 years Eddie has built schools and programs all over the world to help others overcome similar obstacles to achieve their goals. After moving back to Tucson and becoming frustrated by the lack of options for families of children with special needs, I began to dream of providing something different, something that families with children who did not fit into the typical mold could take advantage of. I began to dream of a school. A school that would include all types of learners. As I started to talk to people about this school, it began to take shape. Soon I had a beautiful space and an entire committee of lovely people from First Christian Church in Tucson working with me to help make this happen. I called Eddie up and asked him what he thought about bringing TRAP to Tucson as part of my dream of starting an inclusive school. His answer was a resounding "Yes!", and as always his infectious positivity gave me the confidence I needed to start making it happen. After months of planning the event is almost upon us. Through the generosity of First Christian Church in providing space and some grant funding we are able to cover the costs of the workshop to provide this to the community asking only a small commitment of a $20 donation to TRAP, with scholarships available to those in need. If you are interested in attending the workshop on May 6th and 7th 2022, please click here for all the details. It's going to be a beautiful event! This morning my son Benny's first grade teacher called in response to a concerned email I had sent regarding his AAC device that we call his "talker". He had been coming home with the volume turned down so low that we could barely hear him in a quiet room, and I was worried that he was being silenced in class. His teacher reassured me that she made sure that he always had his talker available and turned up loud enough to be heard, and she told me a story that for most parents would be so commonplace as to not be remarked upon, but for me brought tears of joy to my eyes. She told me that the previous day it was Benny's turn to be called upon during storytime. She said that he had his talker ready and his response was exactly right. Everyone was happy and excited for him which prompted him to use his talker to continue talking, but when she let him know that it was time for the next student to have their turn he quieted down. This is the kind of interaction that students in a general education classroom have all the time. For most students it is not a big deal to answer a question in class, but for our family this interaction is the result of years of hard work. When Benny was diagnosed with Down syndrome prenatally, we knew that he would most likely have to work a lot harder to gain speech than a typical child. What we weren’t expecting was that Benny would gain speech and then lose it again. After years of standard speech therapy Benny was struggling to gain speech only to slide back again. A speech pathologist with experience in apraxia gave him a diagnosis of childhood Apraxia of speech. This diagnosis is different than a typical speech delay because it is a motor speech disorder in which the child's brain is unable to communicate appropriately with the muscles of the mouth and tongue, leaving the child unable to articulate clearly and consistently. We knew that Benny could understand what we were saying and that he had a lot to say himself, he just needed help saying it. We had taught him sign language as a baby, but unfortunately very few people know sign language, so although this helped mitigate some of his frustration this was not helping him be able to communicate outside of our home. We asked for an AAC device assessment through the Department of Developmental Disabilities, and after looking at a variety of different devices decided on a Tobii Dynovax AAC device. We were fortunate enough to receive training from a speech pathologist focused on the use of AAC devices. In addition, Tobii Dynovax has a robust customer service program with local reps available to answer questions, and we were fortunate that they happened to be having a training workshop in our area that I was able to attend. All of this was very helpful to get us started on how to support Benny in learning how to use the talker. Even with all of this support it took years for him to get comfortable and confident enough to be able to have an interaction like he had in class yesterday. For a child like Benny to be able to raise his hand in class and successfully answer a question there were a lot of steps we had to take. Acquiring and learning how to use an AAC device took a lot of time and effort. So did finding a school and teacher willing to have Benny attend the general education classroom with his peers. A few years ago I wasn't sure if it would ever be possible for Benny to raise his hand and answer a question in class. There were so many steps to take for him to get there. Now that I have seen how beneficial the AAC Device has been I am excited to continue to work to support Benny in using it, and other tech that can help him overcome his challenges so that he can continue to participate fully in his community at school and beyond. When I was in sixth grade my literature teacher assigned a slew of books about World War II. “The Nazis wanted to create a perfect race of people with white skin and blue eyes.” Mrs. Winston told the class ominously as she pointed to herself, “I wouldn’t have survived. I would have been one of the people they would have rounded up and sent to the gas chamber. Who here would have survived? Who in this room would make it if they were killing people with dark hair and brown eyes?” Everyone looked at me and shouted my name as I sunk lower in my desk. As one of the only white kids at an American Indian reservation school I did not at all appreciate Mrs. Winston’s pointing out the obvious to everyone. I was white. I was one of the whitest people around. Out there, in the rest of the world, my whiteness protected me. Here my whiteness worked against me and subjected me to both the hate of being different and the hate that comes from being part of the enemy who has subjected your people to years of genocide and oppression. That moment in the classroom stuck with me throughout the rest of my life. My white skin was a constant reminder that I was a part of a painful history that I had not caused but that I was implicitly a part of. It took me a very long time to learn to accept myself. To come to terms with the fact that what I looked at in the mirror was not a reflection to feel ashamed of, but one that I could look at and love. Despite, or maybe because of, the pain of this, I determined that I would not be someone who would be a part of hatred or violence. I had read many books about the Jewish holocaust, and always wondered how so many Germans had stood by and let these atrocities happen to the people around them. I decided that if it came down to it, I would put my own life at risk to stand against Nazis. But I always hoped that I would never be put to the test when it came down to it. Last Wednesday I watched in horror as a mob of angry white people with confederate flags, swastikas and other white supremacist signs and clothing violently breached our nation’s capitol building as the president egged them on and refused to call the national guard for assistance. The whole experience left me shaken, the world forever changed, my country unrecognizable to me. I felt that I must do something, to stand up against this violation. Someone recommended checking out a group called refuse fascism that was organizing a national response. I searched for an event in Santa Barbara, but there wasn’t one. I decided to host one myself. That Saturday I showed up to the event late and a little nervous. A small handful of people were there, and we held signs and made art and made friends. For the first time in a long time I felt a little bit hopeful. We decided that we wanted to do it again, and maybe invite more people and make a little more noise. “We’ll have music and art and make it fun and peaceful and loving!” we said. We would contact other organizations and see if anyone else wanted to show up with us. For the first time in a long time I didn’t feel sad and alone as the country spiraled downward. I felt connected and excited that other people were out there who felt the same way. But then I got a message from an old friend asking some difficult questions about how we plan to include black voices, and how we plan to protect people of color who may be targeted by the nature of our event. I gave her a call and my heart sank as we talked. She tells me that as a black woman and an educator she is afraid that my event will attract young people of color who will then potentially be exposed to both covid and white supremacists, both of which they are more at risk from being hurt by. I am torn between the need to stand up against the coup, and the desire to protect young people of color who might also want to stand with me. I am not sure where my responsibility lies. Is it my responsibility to stand up to Nazis when I see them, and to do anything and everything I can to impact legislators and the people around me to take action? Or is it my responsibility to model safety to those around me who are more vulnerable than I am? What takes more courage? What will have a greater impact on the world? While trying to explore these questions we meet with an experienced local activist. She says that we should have “consulted black and brown elders” about the right way to demonstrate. Because we have not done so, the protests we’ve organized are done with the mindset of white supremacy. I’m instructed to speak with a group called SURJ who are white activists who provide support roles to social justice organizations led by people of color. Reluctantly I agree to talk to a couple of activists from SURJ. I’m feeling increasingly uncomfortable, and I find myself unable to articulate to them how wrong it feels to me to be told that I have to ask permission from a “black or brown elder” if I want to organize a protest against a coup on our government. “I’m not trying to be a white ally.” I say. I want them to understand that it is not that I’m not a white ally either, just that in this instance I’m not trying to stand up in support of someone else’s movement, I'm standing up not just for every American impacted by this, but for myself, my children and my country. The conversation continues awkwardly until I am told that I can “NEVER FORGET” my whiteness. The pain of this runs so deep I can’t respond. I’m right back in that classroom again. I had hoped that activists from SURJ would want to work with us, and I’ve just royally screwed that up. I feel sad and hurt and defensive and I don't know how to fix it. I bring all of these questions and concerns back to my amazing little organizing team to see how they want to move forward. We make some changes to emphasize safety including illuminating our car caravan option as a safer way to participate, reiterating our covid safety rules and reminding people of the potential dangers of those who agree with the ideology behind the coup showing up to harass us. We discuss cancelling the event altogether for safety, but ultimately come to the conclusion that “having a vigorous public presence against the coup is itself a public safety benefit.” This has been an emotional process for me personally, bringing up some very deep feelings. As we head into MLK day weekend, I take heart, and inspiration from him. This morning I watched a speech by Martin Luther King Jr called “The Other America”. In it he talks about the disparities between those who grow up privileged and those who do not. His speech is full of the reality of our country; it's history of slavery, genocide and racism, and the struggle to overcome our past to achieve true liberty and justice for all. “I realize and understand the discontent and the agony and the disappointment and even the bitterness of those who feel that whites in America cannot be trusted.” he says. “And I would be the first to say that there are all too many who are still guided by the racist ethos. And I am still convinced that there are still many white persons of good will. And I'm happy to say that I see them every day in the student generation who cherish democratic principles and justice above principle, and who will stick with the cause of justice and the cause of Civil Rights and the cause of peace throughout the days ahead. And so I refuse to despair. I think we're gonna achieve our freedom because however much America strays away from the ideals of justice, the goal of America is freedom.” Hearing that, I do not think MLK would have called me a white supremacist for organizing against this coup as quickly as I knew how. I think he knew, like I know, that you cannot fight racism with racism. The only way to heal from racism is with love, acceptance and understanding. Tomorrow I will show up in front of my courthouse here in Santa Barbara, and I will help anyone who wishes to show up to do so. Covid is scary right now so I will be doing my best to protect myself and others by wearing an n95 mask, standing 15 feet apart from others while I help to decorate cars and banners so that a car caravan can circle the courthouse, and support those who do not have cars to stand 15 feet apart around the Santa Barbara courthouse in masks holding signs. Together we will ask our legislators to stand strong, and send a powerful message to our community that those who support fascism are not welcome here. I encourage those who are not in Santa Barbara or unable to attend in person to check out these suggestions for actions of transformation and peace for MLK day. I hope that wherever you are and however that you are able to that you will show up in some way to join me. Love and peace and acceptance will win in the end, as long as we are willing to fight for it. Having a school aged child sucks right now. Having a school aged child with special needs is unbelievably difficult. There's this thing that seems to be missing in our national dialogue about schooling during the pandemic, and that is the fact that most of us need our children to go to school so that we have childcare for them. I don't understand how parents are doing this. Teaching our young children at home requires near constant vigilance. It is a logistically impossible situation for most families made all the more difficult by the fact that we aren't automatically giving parents funding to stay home and teach their children until school can be in person again. My family is lucky enough that we can work from home and have enough flexibility to care for our children, but it still feels impossibly hard. Our son Benny has a dual diagnosis of Autism and Down syndrome and has been home with us full time without any kind of childcare or in-person support for his extra challenges since mid-March. And it is August. And we are exhausted. Not just the exhausted like I need a day to myself to recover and I'll be fine, the exhausted like I am so physically, emotionally, mentally and spiritually tired that I don't know how I can go on another moment kind of exhausted. And in the midst of this exhaustion, my son started kindergarten. And instead of a bus coming and whisking him away so my husband Max and I could have a moments reprieve from the bone grinding task of keeping our little one alive, we are being forced into some kind of horrible punishment for parents called "distance learning". What distance learning entails is pretending that my son is going to learn something from a series of zoom calls with his teacher when we can't even get him to put pants on anymore. Don't be fooled by these pictures, I am a crafty photographer and managed to capture a couple of rare moments Max got Benny to look at the computer during a zoom lesson. Seconds after this last picture was taken Benny slammed the laptop shut and refused to get back on the rest of the lesson. The jig is up. We don't know what we're doing, the school doesn't know what it's doing, and my son is no fool. He's not going to sit down in front of the computer and smile and nod while his teacher tries to pretend that this is anything like a kindergarten classroom. Add to that the fact that the therapies he receives from the school are also only being given over zoom, and we can basically guarantee that this is a lost year for Benny. And a lost year for us. Every moment that Benny is supposed to be on a zoom call we have to be there with him trying to get him to attend it. Every project that he needs to do has to be prepared by us and we have to assist him for every aspect of it. The occupational therapist sends us a project for us to have ready and asks if we can prepare it for the session. Can we print out this pdf? Can we cut it out ahead of time? Can we have tongs and little bowls and play dough available? There is a long list of school supplies to have on hand, scissors, glue, paint, crayons, q-tips... Later I look through the directions, and sit down to cut out the forms. It's all so much work. Time eaten out of my life that I don't have to give, but if I don't find some way to do this I will fail my child. Every step of this project falls on our shoulders, just another weight on a burden so heavy it is beginning to crush us. Because he needs help doing every task, every aspect of Benny's education is now up to us. We knew from trying to do distance learning and distance therapies at the end of the last school year that zoom wasn't going to work for him, or us, as a replacement for kindergarten, but we decided to give it a try anyway because we don't know what else to do. The first day of classes we were surprised to find out that he only had one half hour session at the end of the day in the general education classroom on his schedule, and everything else was in special ed. Even though I knew the zoom format wasn't going to work for Benny either way, I was taken aback that this was the setup after we had worked so hard to make sure he was going to be in the general education classroom as much as possible, and this was supposed to be at least 60% of the time according to his Individualized Education Plan (IEP). We are now looking at less than 25% of his time in class being spent in the gen ed class. We met with the special education teacher and the special education director and told them how upset we were about this. They agreed to add Benny to the other general education zoom calls for now to see how it would go. We decided to give it a try, because at the very least we could see what he was going to be missing out on. The first general education kindergarten zoom class we tried to participate in the teacher admonished the kids to sit up straight, pay attention, and speak clearly and appropriately in their responses. This last part was heartbreaking for us because Benny has a major speech delay. He uses a combination of verbal approximations, sign language and a communication device we call his "talker" for the majority of his communication. That morning the teacher proceeded to call on every child to say "good morning" to the class. If we had been prepared for this we could have made sure to practice this using his talker, but instead we felt embarrassed because this simple task is an impossible one for our child to perform without support. Why had I pushed for him to be in this class? Wouldn't it just be easier to accept that he belongs in special ed? Max has taken time off this week to help get kindergarten sorted out. He spent most of the zoom classes doing everything in his power to get Benny to sit for more than two minutes straight. "This isn't working out" we agree. "He doesn't like either, but he spends more time paying attention to the special education zoom calls." Max says. "Maybe we should just-" I stop him and ask him to wait, let me write about this so I can gather my thoughts together, figure out how to explain to him why I don't want to give up on fighting for inclusion. Even if it is a pandemic. Even if we are both so tired we have almost no fight left. In an ideal world Benny would be in a class with support for his speech delays and a mixture of kids of all abilities to interact with and model behavior from. But it is far from an ideal world. In the world we're in we have to decide between a class with typical peers, high expectations and no support, or a class of peers with special needs, low expectations and some support. And neither class is in a format that works for him. There are no good options here. And the thing is, I don't know what the right thing is for Benny in this situation. How do we fight for inclusion when we're confined to our homes? If we are all socially distancing what is there to be included in? The other day I was briefly on social media because I've mostly been avoiding it to protect my mental health. I saw a post that I tried to unsee. Another mom of a child with down syndrome sharing screenshots of an ugly conversation. A parent in a district that was only letting kids with special needs attend school wrote that letting children with special needs attend school was unfair because they aren't going to do anything with their lives anyway, so why should they get extra resources that the rest of the kids don't? How our society treats their most vulnerable members shows how well, or how poorly, that society is doing. We are not doing ok. Everyone is scared, resources are scant, and the first to get turned against are the ones who most need to be protected. Ultimately I know there is an answer somewhere, and it's not in pretending that a zoom call with a teacher can replace a classroom. These zoom calls don't work for my son, and they don't work for my family. Do they work for anyone? In my heart I am still an optimist. I believe in human ingenuity. Maybe it's time to rethink the whole thing. Maybe all of our systems are failing, and it's ok to let them fail because they were never that good to begin with. If I look at it from a different angle, I can be grateful for distance learning because now I can see what was so clearly missing at this school all along. Inclusion has never meant sticking a child with special needs in a general education classroom just so they can meet some ratio on paper. Putting a child with special needs in any kind of classroom without giving them the proper supports is setting them up to fail. And just like Benny was set up to fail in the general education classroom, we were set up to fail here at home. It hurts because what we are failing at is so critical. Most kids will catch up, but when our son is already so far behind, how will he ever be able to catch up? When I reimagine an education system in which my son is truly included, even during social distancing, I imagine a system that optimizes the experience for every student. One in which we use technology as an equalizer, and take the time to make sure that each child has their own individualized education plan, not just the ones who are identified as having special needs. Why can't we have that? If we're stuck at home using technology to learn anyway, why not take advantage of this time to make everything more accessible for everyone? I think about my own schooling, and how stupid it all was. The way I was made to feel bad about myself because of the challenges I had with organization, and the struggles I had with boredom. So much of the work seemed pointless, and looking back as an adult I can confirm, it was. Numbers were gathered and used against us as weapons. We were categorized and sorted into groups according to standards that upon further reflection are completely irrelevant in any sort of real way. All these years later I am sending my kids to school and seeing that we have continued to shape our education system based on these standards even though all of the research about how people learn shows that this doesn't work. We don't have to do this anymore. There is no future in it. It's a flawed system that barely worked before and it's completely broken now. Life is short, and the world is on fire. There's no time to pretend that this messed up system of ours is still working. It's broken, I'm broken, I'm at my end of being able to pretend like everything is ok. I can't do this and I shouldn't have to. There's got to be a better way. Not just for Benny, for us all. When I brought my friend Joel with me to see if my church needed any help during their "hospitality week" of hosting asylum seekers, I never imagined that a few months later Joel would have become so involved with those hospitality weeks that he would choose to celebrate his birthday there. Before dinner on his birthday night I joined his family and the asylum seeker families as we all surrounded Joel in a circle. A Guatemalan woman gave him a long blessing in Spanish. Although I could not understand most of the words, their meaning came across plainly and filled my heart in a way that only the most pure form of love and gratitude can. After dinner Joel shared his birthday cake and ice cream with the families and then brought everyone out to hit a piñata. Children laughed and ran to catch the rain of candy that showered down. A casual observer would never know that these were families who had just spent months traveling and risking their lives to escape situations so harrowing that their stories would bring me to tears. But that night, because of the generous spirit of a tiny congregation in Tucson, those children got to be children again. They got to laugh and play again. Those families had a brief respite where they could eat good food, shower, relax and feel safe for a few days as they journeyed on their way to their sponsors who would help them complete the asylum process. It is one thing to hear the statistics about those seeking asylum in the United States, it is quite another to spend time with the families who are being impacted, to hear their stories, to see the love they have for their children, the gratitude they have for the little things we take for granted - food, sleep, shelter, safety. A few days later Joel shared a screenshot of a translation on his phone from one of the asylum seekers. "As a family we are very grateful. Thank you for all, God bless you." There is very little that can fill the soul quite like receiving a message like this, and knowing that you are part of a community that values compassion over all else. Asylum seekers are people who are legally seeking citizenship within the United States. They have committed no crime other than being born in the wrong place at the wrong time. But when they get to the border they are treated like criminals. They are detained until the bogged down courts can process them, and they are forced to give up all of their possessions, including their shoelaces and bras, which are not returned. Sometimes they are separated from their children. Sometimes they are made to wait in dangerous border towns in Mexico for months, where they are vulnerable to predators and human trafficking. The exact same day that the asylum seekers were blessing Joel for his compassion and sharing cake and ice cream with us, the Supreme Court passed a new ruling by the Trump administration that made it nearly impossible for asylum seekers to get past the border. The rule bars asylum applications from anyone who has not already been denied asylum in one of the countries they traveled to on their way to the United States. The ruling forces migrants to apply for asylum in dangerous countries where the situations are just as bad or sometimes even worse than the dire predicaments they are fleeing from. It is a terrible, cruel, heartless ruling, and the impact was immediate. For several months after the ruling there were no hospitality weeks at all. The weeks were scheduled and then cancelled because there were not enough asylum seekers who had made it through the system. Our hearts broke because we knew what this meant on a very personal level. We weren't just thinking of some abstract idea of an immigrant from a foreign country, we were thinking of the lovely people we had met, who despite all that life had handed them were still so grateful for simple generosity. We thought of all the parents, desperate to protect their children, being turned away from their requests for safety, and it hurt. Today, January 29th, 2020, is the Faith4Asylum National Day of Prayer and Action to Save Asylum. Wherever you are, please find or start an action this week and join us in asking our leaders to please show some compassion. All people are people. All people deserve respect and dignity. The church where Joel and I helped out during hospitality weeks is First Christian Church. They will be participating in Tucson this Friday, January 31st at 4:30pm at the Tucson Federal Building, please join us if you're in the area. (300 West Congress) We can change this tide of cruelty, with the strength of our compassion. People do not leave their homes and communities and travel thousands of miles because they have other options. We do have room for them. We have buildings sitting empty, we have jobs that are not filled, and we have room in our hearts to welcome those who most need it. Don't turn away from it. Don't think that just because you are lucky enough to have been born in the right place at the right time that you are different or better than those who weren't. Stand up for what is right. Stand up for those who can't stand up for themselves. Join us. Tell congress now to protect asylum seekers. Thank you! This Saturday the peace organization CodePink is calling for an International Day of Action for people around the world to stand up against the United States going to war with Iran. Check out the CodePink website to join or create a rally in your area. If you are in the Tucson area you can join other concerned citizens and representatives from the local organizations of Extinction Rebellion, Veterans for Peace and the Tucson Peace Center as they protest in unity with CodePink. The rally will begin at 4:30 pm in front of the First Christian Church on the corner of Speedway and Euclid. The Peace Center is hosting a free spaghetti dinner for peace activists afterwards in the dining hall of the First Christian Church. The spaghetti is rumored to be quite excellent and there will be gluten free options as well. Please come and support the call for peace. War is not good for anyone. It hurts our people and our planet. Please, come stand with us in support of peace. Last night I dreamt Bad guys were surrounding me They wanted something I did not want to give I awoke afraid It was midnight My son’s small foot pressed against my back I was alone and not alone The house creaked and rocked This is the time When all my fears and worries come alive Crawling into my bed to haunt me But I must be brave, for I am a mother Everyone I know is anxious Tight bellies that ache, night terrors that wake A friend asks how I am so calm When her feelings are bubbling on the surface I didn’t have an answer for her then Now, in the middle of the night Searching for a pill to soothe my troubled thoughts I contemplate this question How am I so calm When the people in charge Seem to be on a mission To destroy all life on the planet? How am I so calm When everyone around me Seems to be dying of cancer Or some other awful disease? How am I so calm When my community is being torn apart By mental illness Alcoholism and drug addiction? How am I so calm When this is the world My children will inherit After I'm gone In this blackest of nights I say prayers of gratitude Thank you God, thank you God Thank you God My heart stops racing I begin to relax, Now I remember How I am so calm I am so calm Because there is nothing I can do That will change the outcome All I can do is thank God for what I have Anxiety is the feeling we get When we are trying to control Something that is I am of the unpopular opinion That I do not have control Over anything other than My own thoughts I am of the unpopular opinion That death is inevitable And I honor the animal By eating it I am of the unpopular opinion That no matter what happens It is what was meant to be So just let it go Or maybe I am not so calm at all I am the storm about to wake And it’s not me, but it’s the bad guys Who should be afraid Anyone who has ever had to rush to a public bathroom to deal with their infant or toddler's horrific poop explosion understands the feeling of horror one experiences upon discovering that there is no changing table available. This is the problem that bill HB2529 attempts to address here in Arizona. The bill was written to address the general concerns of parents of infants and young children, but there is another group of parents who heard about the bill and decided to get involved. These are parents of teenage and adult children who are still in diapers, a group who has called themselves Dignified Changes. If you haven't experienced it, it's hard to fully understand the daily struggles of parents whose teenage and adult children need diaper changes, and what that looks like in a public space. This is an issue that I admit I didn't even realize was a problem until I heard about it from other parents in my local disability community. My friends told stories about the isolation of deciding not to venture out to events and community spaces, or the humiliation of trying to change a diaper in the back of a pickup truck or on the floor of a public restroom. Having heard about bill HB2529, this group of parents and their supporters worked with legislators to get an amendment added to the bill to include adult changing stations in new publicly funded buildings. In an ideal world a universal changing station would include a wheelchair hoist, and would be available in every public building in the state. The compromise that Dignified Changes came to with legislators was that the new universal changing stations would be large enough to push a wheelchair into and include a table large enough for an adult to lie down on, and low enough for another adult to be able to lift them from a wheelchair onto the surface. The average cost of this would be around $300-400, making the impact of this on taxpayers very minimal. We were all very excited when the amendment was voted on and passed unanimously by both Republicans and Democrats on the Health and Human Services Committee. Now all that had to happen was for the bill itself to be added to the Rules Committee agenda for review and a vote, which we all thought would be a simple step in the process. Unfortunately in our excitement we had forgotten that some politicians see our democracy as a game, with the concerns of their constituents used as a ball to kick around the political field. So instead of the bill moving forward it has gotten stuck on the desk of Representative Anthony Kern. Kern is not only refusing to put the bill on the agenda, he's also not responding to the many emails and phone calls from concerned citizens who want to know why. In the meantime he has had time to add to the agenda such important and critical bills as one on whether our state drink should be lemonade. To be clear, there is no logical or party based reason that bill HB2529 should not be passed. This is not a bill that would impact local businesses or cost taxpayers thousands more dollars in renovations to already built public spaces. This bill only impacts future builds of publicly funded buildings and large renovations, adding a minor cost to the project and a major benefit to the community. This bill was unanimously passed by both Republican and Democratic legislators on the Health and Human Services Committee. Mr. Kern has an opportunity to be a champion to Arizona families and the disability community. All he needs to do to help make the lives of thousands of people better is to add this bill to the agenda so that it can be reviewed and voted on. If you are outraged by this, as you should be, feel free to give Mr Kern, or Governor Doug Ducey, a piece of your mind and let them know what you think about it. There are many easy ways to get involved and help this bill pass: join the facebook group, call or email [email protected]/602-926-5766, follow the hashtag #dignifiedchanges on instagram or twitter, or come to the state capital tomorrow to "play ball" on the capitol lawn with other families hoping for "change" in Arizona's public bathrooms. Since becoming a mom to a little boy with Trisomy 21 I have written a lot about Down syndrome and disabilities. I am a storyteller, wife and mom to a teen and a toddler. Life is busy!
<urn:uuid:2bf72195-9367-4a61-9d62-cd77840d6ca6>
CC-MAIN-2023-40
http://www.pixleydust.com/blog/category/all
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.982556
9,408
3.109375
3
Every now and then, you hear advice that’s just absurd. “Sleep when the baby sleeps." Sure. And should I do dishes when the baby does dishes, too? “Don’t squat! It’s bad for your knees.” Okay. But how should I sit down on the toilet if I’m not allowed to squat? “Do 100 Kegels, twice per day. That’s the only way to get stronger.” Wait, what? Would you do 200 reps per day of any other exercise? I doubt it! These examples are pretty obvious, but most of us just don’t know enough about the pelvic floor to be able to tell what pieces of advice are true and which are nonsense. After all, the pelvic floor is tucked away where we can’t see it, and we hardly ever talk about it outside of pregnancy or when something goes wrong. Let’s bring it out into the light. The pelvic floor is a group of muscles that sit inside the pelvic cavity. That’s it – just a group of muscles, like any other muscles in our bodies. These muscles are responsible for supporting our pelvic organs and stabilizing the pelvis alongside other core muscles for dynamic tasks like walking or balancing. Though they play a role in sexual function and orgasm, these muscles are far more than just “sexual”. They are essential to our everyday lives. We pulled together the top myths we’ve heard about the pelvic floor and debunked each one, plus a bit about what to consider instead. 1. Myth: The pelvic floor is something only pregnant and older women need to worry about. Fact: Everyone with a pelvis has a pelvic floor. That includes men, women, young, old, pregnant or not, and everyone in between. Just as we take care of our bodies in other ways, we can also take care to keep the pelvic floor healthy and happy throughout our lifespan. Female athletes are at particularly increased risk of urinary incontinence, even well before they ever experience pregnancy. Studies show that specific exercise for the pelvic floor can help reduce symptoms in incontinent athletes, which can keep them participating in their sport longer (and drier) than they might otherwise be able to. Men can also have concerns that are related to pelvic floor function, including urinary or fecal incontinence, pelvic or back pain, constipation, and sexual dysfunction. Each of these concerns (plus many more) can also be treated with an individualized approach. Though pregnancy is a risk factor for pelvic floor dysfunction, it’s certainly not the only factor that can affect the health of those particular muscles during a lifetime. It may be helpful to think of the pelvic floor as exactly what it is... Which is just another muscle group. Yes, the pelvic floor is closely related to other systems of the body (urinary, gastrointestinal, reproductive, for example) but at the end of the day, it’s there to help you move and function throughout your day, much like your quads, your abs, or your shoulders. Why not take care of it? 2. Myth: The pelvic floor should be activated all day in order to be effective in supporting organs. Fact: The pelvic floor functions just like any other muscle group in the body. Would you grip your biceps, your jaw, or your abdominal muscles all day long on purpose? Probably not. The pelvic floor is no different. The pelvic floor cycles on and off all day long according to what you’re doing and how much support your body needs. Imaging shows that your pelvic floor actually moves slightly up and down in the same direction as your diaphragm as you breathe. If you’re breathing and moving at the same time, the pelvic floor anticipates your movements. Just like your eyelids blink at exactly the right moment when something is heading toward your face, your pelvic floor kicks on at the right moment (for instance, just before your foot strikes the ground) without any additional effort on your part! If your pelvic floor is in a gripped or activated position all day, it may struggle to move freely and support your body. Ideally, we want to build pelvic floor awareness, strength, and coordination during exercise just like any other muscle group, and then allow the muscles to return to their baseline and do their jobs (without extra effort) for all the other hours of the day. There are many reasons why someone might find that they “grip” or “clench” their pelvic floor – pain, trauma, habit, and structural issues can contribute to a tendency toward tension. To get to the root cause and the best solution for you, see a pelvic PT in person. 3. Myth: Impact exercise is bad for the pelvic floor. Fact: Have you ever heard that running or jumping is bad for the pelvic floor? Or that you can permanently damage the pelvic floor with these activities? Though high-level athletes often experience incontinence, so do individuals who are sedentary. As with all things, there’s a balance. Studies that have looked at high-level athletes and pelvic floor function show that their pelvic floors are not necessarily stronger or weaker than the general population, and athletes who were interviewed years after their competitive training days were over were not more likely to be incontinent than the general population. This suggests two things: endurance or impact activity like running or jumping won’t necessarily make your pelvic floor super strong, and it also won’t leave it super damaged or weak for the long term. It’s still a good idea to address any impairments you might notice as you increase your impact-type exercise. For example, if you’re leaking or feeling pressure or heaviness, a little emphasis on the pelvic floor strength, endurance, timing, coordination, and surrounding muscles may help reduce your symptoms and protect other pelvic structures without compromising your training plan. 4. Myth: Kegels are the only way to exercise your pelvic floor. Fact: Kegels are an umbrella term for an isolated contract-and-relax of the pelvic floor. That doesn’t give us much direction, does it? But just like any other muscle group, you can train the pelvic floor according to your individual goals. Did you know that your pelvic floor contracts slightly before all kinds of movements? It does this as part of your core stabilization system so that your body is ready for whatever it is you’re about to do. Catch a ball? Check. Pick up a heavy box? Check. Laugh with your friends? Check. You can see that these tasks don't necessarily require max capacity of the pelvic floor. Strength is only one aspect of a healthy pelvic floor – other essential functions are endurance, control, and reflexive support. If all these functions are working well you’ll be able to use those muscles just the right amount and at just the right time. For example, you may need to practice timing and coordination, such as quickly contracting before a cough or sneeze, or practicing a pelvic floor lift immediately before your foot hits the ground. If you’re leaking when you lift heavy things, you may need to strengthen pelvic floor coordination with that particular movement. If you’re feeling pressure or heaviness after a good laugh with friends, you might be experiencing more of an endurance issue. The pelvic floor is one piece of the broader puzzle of your body, so “doing your kegels” at every stoplight might not necessarily get you where you want to go. Consider your whole-body goals and exactly when you’re experiencing symptoms, and see how you can bring awareness of the pelvic floor (and all its many skills) into the bigger picture. 5. Myth: Painful sex? You just need to relax. Fact: There are many reasons why sex might be painful for both men and women, and some of those reasons may be related to pelvic floor function. However, there’s nothing less relaxing than feeling pressure to “relax.” If you’ve heard this advice before, don’t despair – there are many different approaches that can help address this common concern. Mobility of the pelvic floor muscles is essential for circulation, arousal, comfort during penetration, and even reaching/enjoying a pain-free orgasm. Some people hold more tension in those areas than others, which can make penetrative, or even nonpenetrative arousal or orgasm, a painful experience. If your pelvic floor is tense and tight, having a glass of wine to relax may not actually be your best solution. Your mental state does play an important role since the pelvic floor muscles tense up when we experience fear or stress. That said, for most people who experience painful intercourse, there’s more we can do to get those tissues moving, hydrated, and happy so that you can finally relax for real. Some interventions might include manual therapy (think deep tissue massage) to release any specific trigger points in the muscle or nerve entrapments that might be contributing to painful sensations. Along similar lines, circulation keeps tissues healthy and improves lubrication, so sitting on a heating pad, using vibration regularly, and doing hip stretches and pelvic floor release exercises can also be incredibly helpful. If dryness or tissue elasticity is the issue, you may want to try different lubricants, daily moisturizers, or vulvar estrogen cream (by prescription) to boost tissue health and reduce friction. Deeper discomfort with penetration can be modified using buffer tools like the OhNut. And at the end of the day, there are many ways to enjoy sexual intimacy without pain for either partner. Above all, painful intercourse is an excellent reason to seek out a pelvic floor physical therapist. There may be more going on than you can figure out on your own (plus more tools available that you haven’t heard of yet), so don’t stop seeking support after you’ve tried “relaxing." That’s not the end of the road. 6. Myth: It's normal to leak after babies. Fact: Though urinary incontinence (leaking urine) is a very common experience for postpartum women, it’s not something you have to live with. Studies show that 20-40% of postpartum women experience urinary incontinence after babies and 10% experience fecal incontinence. It’s “normal” in the sense that you’re certainly not alone. But living with it forever? No thanks. The good news? It’s totally treatable. Even a small amount of urinary incontinence is a sign that there is some kind of imbalance in the systems related to the pelvic floor, and a pelvic floor physical therapist can help you figure out where that imbalance lies. For example, you might experience leakage if you have a strength impairment, nerve injury, bladder irritation, changes in postural alignment and downward pressure, or a combination of these and many other causes. There are also several types of urinary incontinence that require different strategies for treatment. Stress urinary incontinence describes a situation where the pelvic floor is not able to stop the flow of urine due to increased pressure demand. Think leaking with a cough, sneezing, laughing, jumping on a trampoline, or urine loss with exercise. Urge urinary incontinence is also a common concern and describes the intense urgency and frequency associated with bladder irritation that sometimes leads to leaking. Many experience mixed incontinence, which represents a sneaky combination of the two. As you can see from all of these causes and types, an individual approach to treatment is essential. Many postpartum moms need to build strength following pregnancy and delivery, so although kegel exercises can certainly help they’re not the only solution. An individualized evaluation and treatment plan with a pelvic floor physical therapist is always your best approach if you’re experiencing postpartum urine leakage that’s bothering you. 7. Myth: Kegels didn’t work, so now I probably need surgery. Fact: Studies show that up to 50% of people don’t perform kegels correctly, especially if they’ve never been instructed in person. Before you schedule surgery, it’s worth taking the time to see a pelvic floor physical therapist for at least a few visits, so that you can ensure you’re using your muscles in the most effective way. Even if you end up choosing surgery down the road, your body will thank you for putting in the work ahead of time to maximize your chances of success. 8. Myth: You must have a physician’s referral to see a pelvic floor PT. Fact: There is no longer a requirement to see your physician before heading to a physical therapist. As a patient, you have direct access to a physical therapy evaluation and some amount of treatment without a physician's referral in all 50 states. Your physical therapist will be able to inform you of any requirements specific to your state. This development has allowed patients to access physical therapy care faster and with fewer steps (and expenses!) along the way. Pelvic physical therapy is simply a specialty service within the broader scope of physical therapy care, so the benefit of direct access still applies. Some facilities may require a referral before scheduling you for specialty services, but that’s usually the exception and not the rule. You can find out more about your local requirements by calling the physical therapy provider directly and asking what you need to do to get started. At the end of the day, what’s important is simply understanding that the pelvic floor is a muscle group like any other. We all have one, even men, kids, and athletes! We can make adjustments to the way we use them, according to our needs at that time, and in many cases, we can even reduce or eliminate symptoms. There are lots of resources available depending on your needs, so if you’re noticing symptoms related to the pelvic floor, seek support from a pelvic health physical therapy specialist. They can help you get to know this muscle group as it relates to your needs and navigate the next steps to get your body moving as smoothly as possible.
<urn:uuid:95ec06f8-9b02-4fe6-9d7f-f8612f5bc667>
CC-MAIN-2023-40
https://aeroflowbreastpumps.com/blog/eight-myths-and-facts-about-the-pelvic-floor
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.938397
2,971
2.515625
3
Researchers create first large-scale model of human mobility that incorporates human nature By Denise Brehm Civil & Environmental Engineering For more than half a century, many social scientists and urban geographers interested in modeling the movement of people and goods between cities, states or countries have relied on a statistical formula called the gravity law, which measures the “attraction” between two places. Introduced in its contemporary form by linguist George Zipf in 1946, the law is based on the assumption that the number of trips between two cities is dependent on population size and the distance between the cities. (The name comes from an analogy with Newton’s Law of Gravity, which describes the attraction of two objects based on mass and distance.) Though widely used in empirical studies, the gravity model isn’t very accurate in making predictions. Researchers must retrofit data to the model by including variables specific to each study in order to force the results to match reality. And with much more data now being generated by new technologies such as cellphones and the Internet, researchers in many fields are eyeing the study of human mobility with a desire to increase its scientific rigor. To this end, CEE Professor Marta González and researchers from Northeastern University and Italy’s University of Padua have identified an underlying flaw in the gravity model: The distance between two cities is far less important than the population size in the area surrounding them. The team has now created a model that takes human motives into account rather than simply assuming that a larger city attracts commuters. They then tested their “radiation model” on five types of mobility studies and compared the results to existing data. In each case, the radiation model’s predictions were far more accurate than the gravity model’s, which are sometimes off by an order of magnitude. “Using a multidisciplinary approach, we came up with a simple formula that works better in all situations and shows that population distribution is the key factor in determining mobility fluxes, not distance,” says Marta González, the Gilbert Winslow Career Development Assistant Professor in and the Engineering Systems Division, and co-author of a paper published Feb. 26 in the online edition of Nature. “I wanted to see if we could find a way to make the gravity model work more accurately without having to change it to fit each situation.” Physics professor Albert-László Barabási of Northeastern is lead author and principal investigator on the project. Filippo Simini of Northeastern and Amos Maritan of the University of Padua are co-authors. “I think this paper is a major advance in our understanding of human behavior,” says Dirk Brockmann, an associate professor of engineering sciences and applied mathematics at Northwestern University who was not involved in the research project. “The key value of the work is that they propose a real theory of mobility making a few basic assumptions, and this model is surprisingly consistent with empirical data.” The gravity law states that the number of people in a city who will commute to a larger city is based on the population of the larger city. (The larger the population of the big city, the more trips the model predicts.) The number of trips will decrease as the distance between cities grows. One obvious problem with this model is that it will predict trips to a large city without taking into account that the population size of the smaller city places a finite limit on how many people can possibly travel. The radiation model accounts for this and other limitations of the gravity model by focusing on the population of the surrounding area, which is defined by the circle whose center is the point of origin and whose radius is the distance to the point of attraction, usually a job. It assumes that job availability is proportional to the population size of the entire area and rates a potential job’s attractiveness based on population density and travel distance. (People are willing to accept longer commutes in sparsely populated areas that have fewer job opportunities.) To demonstrate the radiation model’s accuracy in predicting the number of commuters, the researchers selected two pairs of counties in Utah and Alabama — each with a set of cities with comparable population sizes and distances between them. In this instance, the gravity model predicts that one person will commute between each set of cities. But according to census data, 44 people commuted in Utah and six in the sparsely populated area of Alabama. The radiation model predicts 66 commuters in Utah and two in Alabama, a result well within the acceptable limit of statistical error, González says. The co-authors also tested the model on other indices of connectedness, including hourly trips measured by phone data, commuting between U.S. counties, migration between U.S. cities, intercity telephone calls made by 10 million anonymous users in a European country, and the shipment of goods by any mode of transportation among U.S. states and major metropolitan areas. In all cases, the model’s results matched existing data. “What differentiates the radiation model from other phenomenological models is that Simini et al. assume that an individual’s migration or move to a new location is determined by what ‘is offered’ at the location — e.g., job opportunities — and that this employment potential is a function of the size of a location,” Brockmann says. “Unlike the gravity model and other models of the same nature, the radiation model is thus based on a plausible human motive. Gravity models just assume that people move to large cities with high probability and that also this movement probability decreases with distance; they are not based on an underlying first principle.”
<urn:uuid:e7fe616f-2bef-464e-9930-a3f4a5362e7c>
CC-MAIN-2023-40
https://cee.mit.edu/researchers-create-first-large-scale-model-of-human-mobility-that-incorporates-human-nature-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.953982
1,167
3.71875
4
The 'Battle off Samar' was the central element of the 'Battle of Leyte Gulf', the largest naval battle in history, which was fought between US and Japanese naval forces in the Philippine Sea off Samar island in the Philippine islands group (25 October 1944). This was the only major action in the larger battle in which the US forces were generally unprepared. The 'Battle off Samar' has been cited by historians as one of the greatest last stands in naval history, and ultimately the US forces prevailed over a massive armada, the Imperial Japanese navy’s 5th Fleet, 1st Strike Force, Main Body under the command of Vice Admiral Takeo Kurita, despite their very heavy casualties and odds that were overwhelmingly in favour of the Japanese. Kurita’s Force 'A' and Force 'B' (1st Strike Force, Northern Force) comprised the super-battleships Yamato and Musashi and the battleship Nagato of Vice Admiral Matome Ugaki’s Battleship Division 1, the battleships Kongo and Haruna of Vice Admiral Yoshio Suzuki’s Battleship Division 3, the heavy cruisers Atago, Takao, Chokai and Maya of Kurita’s Cruiser Division 4, the heavy cruisers Myoko and Haguro of Rear Admiral Shintaro Hashimoto’s Cruiser Division 5, the heavy cruisers Kumano, Suzuya, Chikuma and Tone of Vice Admiral Kazutaka Shiraishi’s Cruiser Division 7, the light cruiser Noshiro and the fleet destroyers Shimakaze, Hayashimo, Akishimo, Kishinami, Okinami, Naganami, Asashimo, Hamanami and Fujinami of Rear Admiral Mikio Hayakawa’s Destroyer Squadron 2, and the light cruiser Yahagi and the fleet destroyers Nowaki, Kiyoshimo, Urakaze, Yukikaze, Hamakaze and Isokaze of Rear Admiral Susumu Kimura’s Destroyer Squadron 10. Nishimura’s Force 'C' (1st Strike Force, Southern Force) was also powerful, comprising the battleships Yamashiro and Fuso and the heavy cruiser Mogami of Nishimura’s Battleship Division 2 and the fleet destroyers Michishio, Asagumo, Yamagumo and Shigure of Destroyer Division 4, supplemented by Vice Admiral Kiyohide Shima’s Northern Force of Mikawa’s South-West Area Force, namely the heavy cruisers Nachi and Ashigara of Shima’s Cruiser Division 21, and the light cruiser Abukuma and the fleet destroyers Akebono, Ushio, Kasumi, Shiranuhi, Wakaba, Hatsushimo and Hatsuhara of Kimura’s Destroyer Squadron 1. The South-West Area Force also contributed Vice Admiral Naomasa Sakonju’s Transport Force with the heavy cruiser Aoba, the light cruiser Kinu, the destroyer Uranami, the fast attack transport T-6, and the landing ships T-101, T-102 and T-131. And to complete the Japanese offensive disposition there was Ozawa’s Mobile Force, Main Body, Northern Force of Toyoda’s Combined Fleet, comprising the fleet carrier Zuikaku and the light carriers Zuiho, Chitose and Chiyoda of Ozawa’s Carrier Division 3, the hybrid battleship/carriers Ise and Hyuga of Rear Admiral Chiaki Matsuda’s Carrier Division 4, the destroyers Hatsutsuki, Akitsuki, Wakatsuki and Shimotsuki, the light cruiser Isuzu and the destroyers Maki, Kiri, Kuwa and Sugi of Rear Admiral Heitaro Edo’s Escort Squadron 31, Oyoda, Tama and Isuzu, and the light cruisers Oyodo and Tama. The aircraft strength of the Mobile Force was only 116 machines (80 Mitsubishi A6M Reisen 'Zero' single-engined fighters, 25 Nakajima B6N 'Jill' single-engined level and torpedo bombers, four Nakajima B5N 'Kate' single-engined level and torpedo bombers, and seven Yokosuka D4Y 'Judy' single-engined dive-bombers) on the four carriers, while the hybrid battleship/carriers had no aircraft. Admiral William F. Halsey was lured into taking his powerful 3rd Fleet after a decoy fleet of what was left of the Imperial Japanese navy’s carrier force, the Mobile Force, Strike Force including Zuikaku, the last surviving member of the of the six carriers that had undertaken the 'Ai' attack on Pearl Harbor in December 1941, taking with him every ship in the area which he had the power to command. The remaining US forces in the area were three escort carrier groups of the 7th Fleet. The escort carriers and destroyer escorts which had been built to protect slow convoys from submarine attack, had been since been developed for attacks on ground targets and had few torpedoes as they normally relied on Halsey’s fleet to protect them from armoured warships. A Japanese surface force of battleships and heavy cruisers led by the super-battleship Yamato, one of the two largest and most heavily-gunned ships afloat, had been battered earlier in the larger battle and was thought to have retreating. Instead, it had turned round and encountered the northernmost of the three groups, Task Unit 77.4.3 ('Taffy 3'), commanded by Rear Admiral Clifton A. F. Sprague. Taffy 3’s three destroyers and four destroyer escorts possessed neither the firepower nor the armour to oppose the 23 ships of the Japanese force capped by Yamato's nine 460-mm (18.11-in) guns, but nonetheless attacked with their 5-in (127 mm) guns and torpedoes to cover the retreat of their charges, the slow 'jeep' carriers. Aircraft from the carriers of Taffies 1, 2 and 3, including General Motors FM-2 Wildcat single-engined fighters, Grumman F6F Hellcat single-engined fighter-bombers and Grumman TBM Avenger single-engined bombers, strafed, bombed, torpedoed, rocketed, depth-charged and, when they had exhausted their ammunition, made numerous 'dry' runs at the Japanese force as distractions. The US force lost two escort carriers, two destroyers, one destroyer escort and several aircraft, and more than 1,000 US sailors died, a figure comparable to the combined losses of US men and ships at the 'Battle of the Coral Sea' and the 'Battle of Midway'. In exchange, the US force sank three Japanese heavy cruisers, disabled another three and caused enough confusion to persuade Kurita to regroup and ultimately to withdraw rather than advance to sink troop and supply ships in Leyte Gulf. Half of all Americans killed at Leyte Gulf were lost in this battle. Although the super-battleship Yamato and the remainder of the force returned to Japan, the battles marked the final defeat of the Imperial Japanese navy, as the returning ships remained in port for most of the rest of the war and ceased to be effective as a significant naval force. The Japanese overall strategy in the 'Battle of Leyte Gulf', a plan known to the Japanese as 'Sho 1', called for Vice Admiral Jisaburo Ozawa’s Mobile Force, Strike Force to decoy the US 3rd Fleet away from the Allied 'King II' landings on Leyte island, using the apparently vulnerable lure of the Japanese carriers as bait. The landing forces, stripped of air cover by the 3rd Fleet’s movement away from the Philippine islands group, would then be attacked from the west and south by Kurita’s Northern Force, which was to sortie from Brunei in northern Borneo, and Nishimura’s Southern Force. Kurita’s Northern Force comprised five battleships, including Yamato and her sister ship Musashi, escorted by cruisers and destroyers. Nishimura’s Southern Force comprised two battleships and would be followed by Shima with two heavy and one light cruisers. On the night of October 23, the US submarines Dace and Darter detected the Northern Force as its ships entered the Palawan Passage. After alerting Halsey, the submarines torpedoed and sank two cruisers, and crippled a third which was thus forced to withdraw. One of the cruisers lost was Kurita’s flagship, but the admiral was recovered and transferred his flag to Yamato. Subsequently, the carriers of the 3rd Fleet launched a series of air attacks on Kurita’s forces in the Sibuyan Sea, damaging several vessels and sinking Musashi, initially forcing Kurita to retreat. One wave of the 3rd Fleet’s aircraft also struck Nishimura’s Southern Force, inflicting minor damage. At the same time, Vice Admiral Takijiro Onishi’s land-based 1st Air Fleet launched strikes from airfields on the island of Luzon against Halsey’s forces, with one bomber scoring a hit on the US light carrier Princeton that ignited explosions and caused her to be scuttled. On the same night, Nishimura’s Southern Force of two battleships, one heavy cruiser and four destroyers was to approach from the south and co-ordinate with Kurita’s Northern Force. The second element of the Southern Force, commanded by Vice Admiral Kiyohide Shima and comprising three cruisers and seven destroyers, lagged behind Nishimura by 46 miles (74 km). In the 'Battle of Surigao Strait', Nishimura’s ships entered a deadly trap. Outmatched by the 7th Fleet Support Force (Battle Line), they were devastated as they ran a gauntlet of torpedoes from 28 PT-boats and 28 destroyers before coming under the accurate radar-directed gun fire of six battleships (five of them survivors of the Pearl Harbor attack) and eight cruisers. After this, as Shima’s force encountered what was left of Nishimura’s ships, it too came under attack, but managed to withdraw. Of Nishimura’s force, only one destroyer survived. At the 'Battle of the Sibuyan Sea', Halsey’s 3rd Fleet savaged the Northern Force, which had been detected on its way to landing forces from the north. The Northern Force lacked any air cover with which to defend itself against the 259 sorties flown from the fleet carriers Intrepid, Essex, Lexington, Enterprise and Franklin, and the light carrier Cabot, the combination of which sank the super-battleship Musashi with 17 bombs and 19 torpedoes. It had seemingly been beaten into a retreat, but even that overwhelming force failed to stop Kurita, as most of the attacks were directed at sinking just one battleship. Beside a cruiser crippled by a torpedo, every other ship, including Yamato, remained battle-worthy. Halsey’s 3rd Fleet would miss the battle and head off to the 'Battle off Cape Engaño', in which Ozawa’s Mobile Force, Strike Force comprised one fleet carrier and three light carriers fielding a total of 116 aircraft, which was only slightly more than the normal complement of a single large carrier), two battleships, three light cruisers and nine destroyers. Halsey was convinced that the Mobile Force, Strike Force was the main Japanese threat, just as the Japanese had planned in creating their sacrificial diversion. Halsey took three groups of Task Force 38, overwhelmingly stronger than Ozawa’s force, with five aircraft carriers and five light fleet carriers carrying more than 600 aircraft, six fast battleships, eight cruisers, and more than 40 destroyers. Halsey easily despatched what was later revealed to be a merely decoy of no serious threat. As a result of Halsey’s decision, the door was left open for Kurita. When Kurita initially withdrew, the US forces came to the assumption that the Japanese force was retreating from the battle. Kurita eventually turned back and made his way through the San Bernardino Strait under cover of darkness, intent on destroying the US landing forces. Only the light Taffy forces attached to support the landing forces of the 7th Fleet stood in his way. They were equipped to attack ground troops and submarines under the protection of Halsey’s fleet carriers, not stand against Kurita’s battleships and cruisers, which had already escaped from the combined attacks of six fleet and light carriers. It would be up to the Taffies to improvise a last-ditch defence as they were thrust by Halsey’s mistake into the role of a sacrificial diversion to protect the US landing forces. The Japanese Northern Force now comprised the super-battleship Yamato, the battleships Nagato, Kongo and Haruna, the heavy cruisers Chokai, Haguro, Kumano, Suzuya, Chikuma and Tone, the light cruisers Yahagi and Noshiro, and 11 'Kagero', 'Yugumo' and 'Shimakaze' class destroyers. While the force had no aircraft carriers, Japanese warships carried small numbers of catapult-launched floatplanes which could be launched, but not land aboard: Yamato for example, carried seven such aircraft. In this battle Japanese aircraft were used for kamikaze suicide attacks. The battleships and cruisers were fully armoured against the 5-in (127-mm) shells fired by Taffy 3’s largest-calibre guns. The Japanese ships had dozens of larger-calibre guns, including the Yamato's nine 460-mm (18.11-in) guns, which could range out to 43,750 yards (40000 m). Surface gunnery was controlled by optical sighting which fed computer-assisted fire-control systems, though these were less sophisticated than the radar-controlled systems on the US destroyers. In addition to guns, many of the Japanese ships carried Type 93 'Long Lance' 610-mm (24-in) heavyweight torpedoes. Unknown to the Allies, these torpedoes were the most advanced in the world: they possessed at least twice the range of Allied torpedoes, and did not produce a visible wake of bubbles. The Imperial Japanese navy considered them to be a potentially decisive weapon. The torpedoes used liquid oxygen instead of compressed air in their propulsion system. However, the Type 93 was far more likely to detonate as a result of shock, as from a near miss, than a compressed-air torpedo, sinking or heavily damaging the ship carrying it. Each of the three task units of the 7th Fleet’s Task Group 77.4 had six small 'Casablanca' class or larger 'Sangamon' class escort carriers defended by destroyers and destroyer escorts. The destroyers had five 5-in (127-mm) guns while the destroyer escorts had two such weapons, and the carriers each carried only one 5-in (127-mm) gun at the stern. Most of the pilots and sailors were reservists with scant combat experience, and because of their primary tasking against ground troops and submarines, the carriers had available only a few armour-piercing bombs or torpedoes against the unlikely possibility that they might encounter attack by other ships. Lacking any ships with any larger-calibre guns that could reach beyond 17,600 yards (16100 m), Taffy 3 appeared hopelessly mismatched against Japanese gunnery, which emphasised engagement at long range with large-calibre guns. The battle revealed that the Imperial Japanese navy’s part-automated fire-control arrangements were largely ineffective against manoeuvring ships at long range, although some ships such as Kongo hit their targets when they closed the range. Although the Japanese warships opened fire with their heavier armament at maximum range and scored some hits, and misses near enough for the explosions to cause significant damage, their fire was not effective until they had closed within range of the carriers' and escorts' own 5-in (127-mm) armament. By contrast, the US destroyers (but not the destroyer escorts) had the Mk 37 gun fire-control system that aimed automatic, accurate fire against multiple surface and air targets while they manoeuvred at speed. The lack of a comparable system in Japanese ships also contributed to reports from US pilots on the ineffectiveness of the Japanese anti-aircraft fire. Rear Admiral Thomas L. Sprague’s Task Unit 77.4.1 (Taffy 1) comprised Carrier Division 22 with the escort carriers Sangamon, Suwannee, Santee and Petrof Bay. (The other two escort carriers of Taffy 1, Chenango and Saginaw Bay of Rear Admiral George R. Henderson’s Carrier Division 28, had departed for Morotai island in the Dutch East Indies on October 24, carrying aircraft of other carriers for repair, and returned with replacement aircraft only after the battle.) In Rear Admiral Felix B. Stump’s Task Unit 77.4.2 (Taffy 2), Carrier Division 24 comprised Natoma Bay and Manila Bay, and Rear Admiral William D. Sample’s Carrier Division 27 comprised Marcus Island, Kadashan Bay, Savo Island and Ommaney Bay. Clifton Sprague’s Task Unit 77.4.3 (Taffy 3) comprised Carrier Division 25 with Fanshaw Bay, St Lo, White Plains, Kalinin Bay, and Rear Admiral Ralph A. Ofstie’s Carrier Division 26 had Kitkun Bay and Gambier Bay. Screening for Taffy 3 were the destroyers Hoel, Heermann and Johnston, and destroyer escorts Dennis, John C. Butler, Raymond, and Samuel B. Roberts. Each of the escort carriers was small and carried an average of 28 aircraft, but had no dive-bombers and only obsolescent FM-2 Wildcat fighters. That gave the 16 escort carriers of the three Taffies a combined total of some 450 aircraft, equivalent to the aircraft complement of five large fleet carriers. While their maximum speed of 17.5 kt was adequate for the escort of slow cargo convoys or the provision of support to ground forces, it was too slow for either the engagement or evasion of a fast task force. Since the aircraft carried by the Taffies' carriers were intended for ground attack, anti-aircraft and anti-submarine warfare, Taffy 3’s first flights were armed only with machine guns, depth charges, and high explosive and anti-personnel bombs that were effective against ground troops, aircraft, submarines and destroyers, but not against armoured ships such as battleships and cruisers. In later sorties from the carriers of Taffy 2, there had been time to rearm the aircraft with torpedoes and armour-piercing bombs that could be expected to be more effective against warships. Kurita’s force passed through San Bernardino Strait at 03.00 on 25 October and steamed to the south along the coast of Samar island in the hope that Halsey had taken the bait represented by Ozawa’s force and moved most of his fleet away, as he had in fact done. Kurita had been advised that Nishimura’s Southern Force had been destroyed in the 'Battle of Surigao Strait' and would therefore not be joining his force at Leyte Gulf. However, Kurita did not receive the transmission from the Northern Force that it had successfully lured away Halsey’s 3rd Fleet of battleships and fleet carriers. Through most of the battle, Kurita would be haunted by doubts about Halsey’s actual location. The wind was from the north-north-east and the visibility was about 23 miles (37 km) with a low overcast and occasional heavy rain squalls which the US forces would exploit for concealment in the battle to come. Steaming about 69 miles (110 km) to the east of Samar before dawn on October 25, St Lo launched four aircraft on an anti-submarine patrol while Taffy 3’s other carriers prepared for the day’s air attacks against the Japanese ground forces opposite the US landing beaches. At 06.37, Ensign William C. Brooks, flying a TBF Avenger from St Lo, sighted a number of ships expected to be from Halsey’s 3rd Fleet, but appearing to be Japanese. When he was notified, Sprague was incredulous, and he demanded positive identification. Flying in for an even closer look, Brooks reported that 'I can see pagoda masts. I see the biggest meatball flag on the biggest battleship I ever saw!' (Yamato alone displaced as much as all units of Taffy 3’s ships.) Brooks had spotted the largest of the three attacking Japanese forces, comprising four battleships, six heavy cruisers, two light cruisers and about 20 destroyers. These were approaching from the west-north-west and were only 20 miles (32 km) distant, and thus were already well within gun and visual range of Taffy 3, the closest US task group. Armed only with depth charges in case of an encounter with Japanese submarines, the US pilots nevertheless carried out the first attack of the battle, dropping several depth charges which just bounced off the bow of a cruiser. Taffy 3’s look-outs spotted the anti-aircraft fire to the north, and then the Japanese came upon Taffy 3 at 06.45, achieving complete tactical surprise. At about the same time, others in Taffy 3 had picked up targets from surface radar and Japanese radio traffic. At about 07.00, Yamato opened fire at a range of 33,900 yards (31000 m). Lacking the US ships' gunnery radars and Ford Mk 1 Fire-Control Computer, which provided co-ordinated automatic firing solutions as long as the gun director was pointed at the target, Japanese fire control relied on a mechanical calculator for ballistics and another for own and target course and speed, fed by optical rangefinders. Colour-coded dye loads were used in the battleships' armour-piercing shells so that the spotters of each ship could identify their own ship’s fall of shot, a common practice for the capital ships of many navies. The Americans, unfamiliar with battleship combat, were soon astonished by the spectacle of colourful geysers as the first shell salvoes found their range. Nagato used a brilliant pink, Haruna a greenish-yellow variously described as green or yellow by the Americans; and Kongo blood red which could appear red, purple or even blue. Yamato used no dye loads, so her shell splashes appeared white. Not finding the silhouettes of the tiny escort carriers in his identification manuals, Kurita mistook them for large fleet carriers and assumed that he had a task group of the 3rd Fleet under his guns. His first priority was to eliminate the carrier threat, ordering a 'General Attack': rather than a carefully orchestrated effort, each division in his task force was to attack separately. The Japanese had just changed to a circular anti-aircraft formation, and the order caused some confusion, allowing Sprague to lead the Japanese into a stern chase, which restricted the Japanese to using only their forward guns, and restricted their anti-aircraft gunnery. Sprague’s ships would not lose as much of their firepower in a stern chase, as their stern-chase weapons were more numerous than their forward guns, and his carriers would still be able to operate aircraft. At 06.50 Sprague ordered a formation course change to 090°, directed his carriers to turn to launch their aircraft and then withdraw eastward in the direction of a squall, hoping that bad visibility would reduce the accuracy of the Japanese gunnery. He ordered his escorts to the rear of the formation to generate smoke and thus mask the retreating carriers and ordered the carriers to take evasive action, 'chasing salvoes' to throw off the Japanese aim, and then launched all available FM-2 fighters and TBM torpedo bombers with whatever armament they were already carrying. Some of the aircraft had rockets, machine guns, depth charges, or nothing at all, and only a very few carried anti-ship bombs or air-launched torpedoes which would have enabled them to tackle heavy armoured warships with any chance of success. The FM-2 fighters were deemed a better fit on such small aircraft carriers instead of the faster and heavier Grumman F6F Hellcat single-engined fighter-bombers carried by the larger carriers. The FM-2 pilots were ordered 'to attack the Japanese task force and proceed to Tacloban airstrip, Leyte, to rearm and refuel'. After expending all of their ammunition and ordnance, many of the US aircraft continued to make 'dry runs' in order to distract the Japanese. At about 07.20 the US formation entered the squall, and the Japanese fire slackened markedly as they did not possess the gunnery radar that could have penetrated the rain and smoke. Meanwhile, Kurita was already experiencing the consequences of ordering a General Attack, as his 5th Cruiser Division and 10th Destroyer Division cut across the course of the 3rd Battleship Division in their haste to close the US carriers, forcing the battleship Kongo to turn to the north out of formation; Kongo acted independently for the remainder of the battle. Concerned that his destroyers would burn too much fuel in a stern chase of what he presumed were fast carriers, while at the same time obstructing his battleships' line of fire, at 07.10 Kurita ordered his destroyers to the rear of his formation, a decision which had immediate consequences as the 10th Destroyer Squadron was forced to turn away just as it were gaining on the right flank of the US formation. For the 2nd Destroyer Squadron, the consequences were more significant if less immediate: ordered to fall in behind the 3rd Battleship Division, the light cruiser Yahagi and her destroyers, they steamed to the north from their position on the southern side of Kurita’s formation seeking Kongo, the divisional flagship, leaving no Japanese units in position to intercept the US carriers when they turned back to the south at 07.30. Despite his General Attack order, Kurita continued to dictate fleet course changes throughout the battle. Three destroyers and four smaller destroyer escorts had been tasked to protect the escort carriers from aircraft and submarines. The three 'Fletcher' class destroyers were fast enough to keep up with a fast carrier task force. Each had five single 5-in (127-mm) guns and several light anti-aircraft guns, none of which were effective against armoured warships. Only their 10 21-in (533-mm) Mk 15 torpedoes, accommodated in two trainable quintuple launchers amidships, posed a serious threat to battleships and cruisers. An advantage that the US destroyers possessed was the radar-controlled Mk 37 Gun-Fire Control System, which as noted above provided co-ordinated automatic firing of their 5-in (127-mm) guns as long as the gun director was pointing at the target. A dual-purpose system, the Mk 37’s gunfire radar and anti-aircraft capabilities allowed the destroyers' guns to remain on target despite poor visibility and their own radical evasive manoeuvring. The Japanese reliance on optical range finders aided by colour-coded dye loads in each shell and mechanical calculators made it difficult for them to identify their targets through the rain and smoke and limited their ability to manoeuvre while firing. The four 'John C. Butler' class destroyer escorts were smaller and slower than the fleet destroyers as they had been created for the protection of slow freighter convoys against submarines. They were armed with two 5-in (127-mm) guns without automatic fire control, and three torpedoes, though their crews rarely trained for torpedo attacks. Since the torpedoes had a range of only some 11,000 yards (10080 m), they were best used at night: during daylight, an attack on heavy warships would have to pass through a gauntlet of shellfire that could reach out to 50,300 yards (46000 m). In this battle they would be launched against a fleet led by the largest battleship in history, though it was the ships' ability to generate dense, heavy smoke from their funnels and chemical smoke generators which would most influence the course of the battle. After laying smoke to hide the carriers from the Japanese gunners, the US destroyers were soon making desperate torpedo runs, using their smoke for concealment. The profiles and aggression of the ships caused the Japanese to think the destroyers were cruisers, and that the destroyer escorts were fleet destroyers. The US warships' lack of armour allowed armour-piercing rounds to pass right through without detonating, until the Japanese gunners switched to high explosive shells, which caused considerably greater damage. Their speed and agility enabled some ships to dodge shellfire completely before launching torpedoes. Effective damage control and redundancy in propulsion and power systems kept them running and fighting even after they had absorbed dozens of hits before they sank, although by that time their decks were strewn with the dead and the seriously wounded. Destroyers from Taffy 2 to the south also found themselves under Japanese fire, but as they were spotted by Gambier Bay, which had signalled for their assistance, they were ordered back to protect their own carriers. At 07.00, Commander Ernest E. Evans of the destroyer Johnston responded to the Japanese fire bracketing carriers of the group he was escorting by laying down a protective smokescreen and zigzagging. About 10 minutes later, the gunnery officer began firing at the closest attackers, then 17,600 yards (16100 m) distant, and registered several hits on the leading heavy cruisers. The Japanese targeted Johnston and shell splashes were soon bracketing the destroyer. In response and without consulting with his commanders, Evans ordered Johnston to 'flank speed, full left rudder' and the destroyer, still making smoke and zigzagging, accelerated at maximum speed toward the Japanese. At 07.15, the destroyer’s gunnery officer concentrated his fire on the leading cruiser squadron’s flagship, the heavy cruiser Kumano. Firing the destroyer’s 5-in (127-mm) guns at their maximum range of 21,000 yards (19200 m), Johnston scored several hits on Kumano's superstructure, which erupted into flame and smoke. At 07.16, Sprague ordered Commander William Dow Thomas aboard Hoel, in charge of the small destroyer screen, to attack. Struggling to form an attack formation, the three small ships (Hoel, Heermann and Samuel B. Roberts) began a long maximum-speed run to get into firing position for their torpedoes. Johnston pressed her attack, firing more than 200 shells as she followed an evasive course through moderate swells, making her a difficult target. Johnston closed to within maximum torpedo range, and at 9,000 yards (8230 m) fired a full salvo of 10 torpedoes. At 07.24, two or three struck, blowing the bow off Kumano. Minutes later, at 07.33, four torpedoes, from Johnston or Hoel, narrowly missed Kongo. The heavy cruiser Suzuya, suffering damage from air attacks, was also taken out of the fight as she stopped to aid Kumano. The effect of Johnston's attack was to generate confusion in the minds of the Japanese commanders, who thought they were being engaged by US cruisers. Evans then reversed course and, under cover of his smokescreen, opened the range between his ship and the Japanese. At 07.30, three battleship main battery shells passed through Johnston's deck and plunged into her port engine room, which cut the destroyer’s speed to 17 kt and disrupted electric power to her after gun mounts. Based on the bearing and the angle of fall, the shells had probably been fired by Yamato at a range of 20,280 yards (18545 m) as, moments later, three 155-mm (6.1-in) shells from Yamato's secondary battery struck Johnston's bridge, causing numerous casualties and severing the fingers of Evans’s left hand. The US ship was severely damaged, with dead and dying sailors littering across her bloody decks. Yamato reported sinking a 'cruiser' (the Japanese consistently overestimated the size of the US ships) with a main battery salvo at 07.27. The destroyer Kishinami, which was also firing at Johnston at the time, reported that 'Yamato sank one enemy cruiser' at 07.28. Johnston was not sunk, however. Already depleted before the battle, her remaining fuel oil did not feed a catastrophic explosion and the ship found sanctuary in rain squalls, where her crew had time to repair some of her damage, restoring power to two of the three after gun mounts. Johnston's search radar had been destroyed, toppled to the deck in a tangled mess. Also damaged, the fire-control radar was quickly returned to service. Only a few minutes were required to bring Johnston's main battery and radar back intro service, and from her position in the rain, at about 07.35 Johnston fired several dozen rounds at the leading Japanese destroyer, 9,550 yards (9100 m) distant. [e[Johnston then shifted her fire to the cruisers approaching from the east, directing several dozen more rounds at the closest ship, 10,935 yards (10000 m) away. Neither target could be observed visually, and thus were not positively identified, and Johnston's presumed 'cruiser' was almost certainly the battleship Haruna. At 07.37, Commodore Thomas ordered a torpedo attack via voice radio. Johnston and Heermann acknowledged. As Johnston continued on her away from the Japanese, she came upon the charging screen force, led by the damaged Hoel. Evans had Johnston rejoin the attack, to provide gun support to Thomas’s small squadron on its torpedo run. Attacking Tone, the leading heavy cruiser to the east of the formation, Johnston closed to 6,000 yards (5485 m), now firing with reduced efficiency as her SC radar had been lost yet nonetheless registering many hits. During the battle, Evans engaged in several duels with much larger Japanese opponents. At 08.20, emerging through smoke and rain squalls, Johnston was confronted by a 36,600-ton Kongo class battleship, probably Haruna, which reported engaging a US destroyer with her secondary battery around this time. Johnston fired at least 40 rounds, and observed more than 15 hits on the battleship’s superstructure. Johnston then reversed course and disappeared in the smoke, avoiding the return foire of Haruna's 14-in (355.6-mm) main armament, At 08.26 and again at 08.34, Thomas requested an attack on the heavy cruisers to the east of the carriers. Responding at 08.30, Johnston bore down on a heavy cruiser firing at the helpless Gambier Bay, then closed to 6,000 yards (5465 m) and fired for 10 minutes at a heavier and better-armed opponent, possibly Haguro, scoring many hits. At 08.40, a more pressing target appeared astern: seven Japanese destroyers in two columns, closing to attack the carriers. Reversing course to intercept, Evans attempted to pass in front of the formation, crossing their 'T' to reduce the number of guns they could bring to bear. Evans ordered Johnston's guns to engage the Japanese destroyers, which returned fire and struck Johnston several times. Perhaps seeing his disadvantage, the commander of the leading destroyer turned away to the west. From as close as 7,000 yards (6400 m), Johnston's gunnery officer fired and scored a dozen hits on the destroyer leader before she veered away, and then shifted fire to the next destroyer in line, scoring five hits before she too turned away. Amazingly, the entire squadron turned to the west to avoid Johnston's fire. These Japanese destroyers finally managed to fire their torpedoes at 09.20 at a range of 10,500 yards (9600 m). Several torpedoes were detonated by strafing aircraft or defensive fire from the carriers, and the rest failed to find any target. The Japanese and US ships were now intertwined in a confused fight. The heavy smoke had made the visibility so poor by 08.40 that Johnston nearly collided with Heerman while she crossed the formation to engage the Japanese destroyers, forcing Samuel B. Roberts to evade them both. Gambier Bay and Hoel were sinking. Finding targets was not difficult. After 09.00, with Hoel and Samuel B. Roberts out of the fight, the crippled Johnston was an easy target, and she exchanged fire with four cruisers and numerous destroyers. Johnston continued to take hits, which knocked out the no. 1 gun mount, killing many men. By 09.20, forced from the bridge by exploding ammunition, Evans was commanding his ship from the stern by shouting orders down to men manually operating the rudder. Shellfire knocked out the remaining engine, leaving Johnston dead in the water at 09.40. Her attackers concentrated their fire on her rather than the fleeing carriers, and Johnston was hit so many times that one survivor recalled that 'they couldn’t patch holes fast enough to keep her afloat'. At 09.45, Evans finally gave the order to abandon ship, and Johnston sank 25 minutes later with 186 of her crew. Evans abandoned ship with his crew, but was never seen again. Although destroyer escorts had been conceived as inexpensive small warships for the protection of slow cargo convoys against submarines, they retained a limited anti-ship capability with torpedoes and 5-in (127-mm) guns. Samuel B. Roberts distinguished herself in this battle as the 'destroyer escort that fought like a battleship' combating armoured cruisers designed to withstand 5-in (127-mm) gunfire. At about 07.40, Lieutenant Commander Robert W. Copeland manoeuvred his small ship to evade the charging Heermann. Watching that destroyer approach the Japanese, Copeland realised that his own ship’s location and heading put her in a textbook position to launch a torpedo attack at the leading heavy cruiser. Over his ship’s public-address system, he told his crew 'This will be a fight against overwhelming odds from which survival cannot be expected. We will do what damage we can.' Against orders, he set course at full speed to follow Heermann's attack on the cruisers. Under the cover of the smokescreen from the destroyers, Samuel B. Roberts escaped detection. Not wanting to draw attention to his small ship, Copeland repeatedly denied his gun captain permission to open fire with the 5-in (127-mm) guns: even though targets were clearly visible and within range, Copeland intended to launch torpedoes at a range of 5,000 yards (4570 m). A stray shell, probably intended for one of the nearby destroyers, hit Samuel B. Roberts's mast, which fell and jammed the torpedo mount at 08.00. Finally recovering, at 4,000 yards (3660 m) Samuel B. Roberts launched her torpedoes at Chokai without herself being engaged. Quickly reversing course, Samuel B. Roberts disappeared into the smoke. A look-out reported at least one torpedo hit, and the crippled Chokai began to lose speed and fall to the rear of the Japanese cruiser column at 08.23. By 08.10, Samuel B. Roberts was approaching the US carrier formation. Through the smoke and rain, the heavy cruiser Chikuma appeared, firing broadsides at the carriers. Copeland changed course to attack and told his gun captain, 'Mr Burton, you may open fire.' Samuel B. Roberts and Chikuma began to exchange broadsides. Chikuma now divided her fire between the carriers and Samuel B. Roberts. Hampered by the closing range and slow rate of fire, Chikuma fired only with difficulty at her small, nimble opponent. (Early in the battle, when it had become apparent that Samuel B. Roberts would have to defend the escort carriers against a surface attack, her chief engineer, Lieutenant Trowbridge, had bypassed all the engine’s safety mechanisms, enabling the escort destroyer to reach as much as 28 kt.) Samuel B. Roberts did not share Chikuma's problem of a slow rate of fire, and for the next 35 minutes, from a range as short as 5,250 yards (4800 m), her guns fired almost her entire supply of 5-in (127-mm) ammunition, more than 600 rounds. In this seemingly unequal contest, Chikuma was raked along her entire length. Unknown to the crew of Samuel B. Roberts, however, shortly after she engaged Chikuma, Heermann also aimed her guns at the heavy cruiser, placing her in a crossfire. Chikuma's superstructure was ripped by salvoes of armour-piercing shells, high explosive shells, anti-aircraft shells, and even star shells that created chemical fires even in metal plates. Chikuma's bridge was devastated, fires could be seen along her superstructure, and her no. 3 gun turret was no longer in action. Chikuma was not alone, however, and soon the Japanese fleet’s multi-hued salvoes were bracketing Samuel B. Roberts, indicating that she was under fire by Yamato, Nagato and Haruna. In a desperate bid to avoid approaching shells, Copeland ordered full astern, causing the salvoes to miss. Now, however, his small ship was an easy target, and at 08.51, cruiser shells found their mark, damaging one of the destroyer escort’s boilers. Reduced to 17 kt, Samuel B. Roberts began to suffer a succession of hits, and credit is given to Kongo for striking the final decisive blows at 09.00: these hits knocked out the US ship’s remaining engine and, dead in the water and sinking, Samuel B. Roberts's part in the battle was over. The companion destroyer escorts Raymond, Dennis and John C. Butler also launched torpedoes. While they missed, this helped slow the Japanese chase. Dennis was struck by a pair of 8-in (203.2-mm) shells, and John C. Butler ceased fire after expending her ammunition an hour into the engagement. The fleet destroyer Hoel, captained by Commander Leon S. Kintberger, was the flagship of Taffy 3’s small destroyer and destroyer escort screen. As splashes from Japanese shells began bracketing the ships of the task group, Hoel began to zigzag and lay smoke to help defend the now fleeing escort carriers. When the Japanese had closed to 17,500 yards (16000 m), Kintberger opened fire, and was in turn targeted by the Japanese. Yamato's 155-mm (6.1-in) secondary armament scored a hit on Hoel's bridge at a range of 14,215 yards (13000 m), knocking out all voice radio communication, killing four men and wounding Kintberger and the screen’s flag officer, Thomas. Sprague then ordered Thomas to deliver a torpedo attack on the Japanese ships. From his position on the damaged Hoel, Thomas formed the three destroyers of his command as best he could and at 07.40 ordered 'Line up and let’s go.' Through rain showers and smoke, Hoel zigzagged toward the Japanese ships, followed by Heermann and Samuel B. Roberts. Lurking in the rain, Johnston was targeting unsuspecting Japanese cruisers with her radar. Kintberger now had to select a target quickly as the range was closing rapidly. In the combat information centre, his executive officer suggested a course that would put Hoel in a position to attack the leading 'battleship', which was in fact either Kongo or possibly the heavy cruiser Haguro. Without hesitation, Kintberger ordered Hoel in to the attack. The course took the ship into the middle of the oncoming Northern Force. Lieutenant Bill Sanders, the ship’s gunnery officer, directed Hoel's main battery of five 5-in (127-mm) guns in a rapid-fire barrage and scored several hits, drawing the attention of a major part of the Japanese force, and shells of all calibres were soon straddling the destroyer. At about 07.27, at a range of 9,000 yards (8230 m), Hoel fired a half salvo of torpedoes and reversed course. The salvo’s results were not observed, but several accounts aver that Haguro was forced to turn away sharply from the torpedo attack and dropped out of the lead to a position to the rear of Tone, an assertion that is contradicted by Haguro's action report, which records turning to engaging an 'enemy cruiser' at 10,275 yards (9400 m), but not a torpedo attack. Only a very short time after Hoel had launched her first half salvo of torpedoes, a devastating series of hits by shells of several calibres struck Hoel in rapid succession, disabling all the destroyer’s main and secondary battery weapons abaft of the second stack, stopping her port engine and depriving her of the Mk 37 fire-control director, fire-direction radar, and bridge steering control. His ship slowing to 17 kt under hand steering, Kintberger realised that he would have to fire his remaining torpedoes quickly while he still possessed this facility. Heading to the south-west after his initial torpedo attack, Kintberger turned to the west and launched his second torpedo torpedo salvo at a 'heavy cruiser' (probably Yamato or Haruna), both sides having difficulty with target identification in the poor visibility) at about 07.50. This time, Hoel's crew was rewarded by what appeared to be the sight of large columns of water alongside their target. The torpedo hits could not be confirmed, however. The water spouts were probably near misses by bombs. Japanese action reports reveal that Hoel's target was probably Yamato, which turned hard to port to evade a torpedo salvo at 07.54 and was forced to run to the north until the torpedoes had run out of fuel: this took Kurita out of the battle and caused him to lose track of his forces. Hoel was now crippled and surrounded, and her speed reduced to 17 kt. Within a few minutes, steerage had been restored from the after steering room, and Kintberger ordered a course to the south in the direction of Taffy 3. In the process of fishtailing and zigzagging, she peppered the closest Japanese ships with her two remaining guns. Finally, at about 08.30, after taking more than 40 hits from guns ranging in calibre between 5 and 16 in (127 and 406.4 mm), an 8-in (203.2-mm) shell disabled her remaining engine. With her engine room under water and no. 1 magazine ablaze, the ship began listing to port, settling by the stern. The order to abandon ship was given at 08.40, and many of her surviving crew swam away from the ship. A Japanese cruiser and several destroyers closed to within 1,970 yards (1800 m), giving the two forward gun crews, under gun captain Chester Fay, a large target at close range. For about 10 minutes this gun exchanged fire with the 'Tone' class cruiser. When the destroyers slowed and approached to about 1,000 yards (915 m), they too were engaged. The Japanese fire stopped only at 08.55 after Hoel had rolled over and sunk after enduring 90 minutes of punishment. Hoel was the first of Taffy 3’s ships to be sunk, and suffered the heaviest proportional losses: only 86 of her complement survived, the other 253 officers and men dying with their ship. Captained by Commander Amos T. Hathaway, Heermann was on the disengaged side of the carriers at the start of the fight when at 07.37 she was ordered by Thomas to take the lead position in a column of 'small boys' to attack the approaching Japanese force. Heermann steamed into the action at flank speed through the formation of 'baby flat-tops' through smoke and intermittent rain squalls that had reduced visibility at times to less than 100 yards (91 m), twice having to back emergency full to avoid collisions with friendly ships, first with Samuel B. Roberts and then at 07.49 with Hoel, as she tried to take her assigned position at the head of the column in preparation for a torpedo attack. At 07.50, Heermann engaged the heavy cruiser Haguro with her 5-in (127-mm) guns while hurriedly preparing a half-salvo torpedo attack. In the confusion of battle, the torpedoman on the no. 2 mount mistakenly fired two extra torpedoes at the same time as the no. 1 mount before he was stopped by the mount captain. After firing seven torpedoes, Heermann changed course to engage a column of three battleships that had started to fire at her. Hathaway may now have been responsible for causing a series of events that may have had a decisive influence on the outcome of the battle. He directed 5-in (127-mm) fire on the battleship Haruna, which was leading the Japanese column. Then he quickly closed to a mere 4,400 yards (4025 m) and fired his last three torpedoes. Haruna evaded all of them, but it has been asserted that Yamato was bracketed between two of Heermann's torpedoes on parallel courses, and for 10 minutes was forced to head to the north, and thus away from the action. Another assertion, based on a comparison of both Japanese and US sources, is that the torpedoes came from Hoel's second salvo fired at 07.53. In either case, Kurita and his most powerful ship were temporarily out of the action, and the Japanese had now lost the initiative. The stubborn US defence had completely destroyed the cohesion of the Japanese attack. At 08.03, believing that one of the torpedoes had hit the battleship, Hathaway set course for the carrier formation, zigzagging and under the cover of smoke. Still undamaged, Heermann was able to fire through the smoke and rain at nearby targets. Now under continuous fire, Heermann began an unequal duel with Nagato, whose salvoes were beginning to land uncomfortably close. At one point between 08.08 and 08.25, Heermann was within throwing distance of a Japanese destroyer for several minutes, before being separated by the smoke. During this time, neither ship fired on the other, each having higher-priority targets. At 08.26, Thomas requested covering fire on the cruisers engaging the escort carriers from the east. Hathaway responded but first had to pass through the formation of carriers and escorts. This hazardous nature of this task is shown by the fact that Heermann, steaming at flank speed, had two more near misses, this time with Fanshaw Bay and Johnston. Finally on course for the Japanese cruisers, Heermann came across the heavily damaged Gambier Bay, which was being savaged at pointblank range. At a range of 12,000 yards (10975 m), Heermann engaged Chikuma as her guns cleared Gambier Bay. Chikuma was now caught in a crossfire between Heermann and Samuel B. Roberts, and was receiving considerable punishment. During this phase of the battle, Heermann came under fire from the bulk of the Japanese force. Coloured splashes of red, yellow and green indicated that she was being targeted by Kongo and Haruna. Many uncoloured splashes were also observed, most probably from the fire of the line of heavy cruisers led by Chikuma. At 08.45, a hit on Heermann's wheelhouse killed three men and fatally wounded another. A series of 8-in (203.2-mm) hits flooded the forward part of the destroyer, pulling her bow down so far that her anchors were dragging in the water, and one of her guns was knocked out. At 08.50, aircraft from the VC-10 composite squadron approached the scene and were vectored by Taffy 3 to the cruisers to the east. By 08.53, Chikuma and the other three heavy cruisers were under heavy air attack. At 09.02, under the combined effort of the gunfire of Heermann and Samuel B. Roberts, and the bombs, torpedoes and strafing of carrierborne aircraft, Chikuma finally disengaged, but sank during her withdrawal. At 09.07, the heavy cruiser Tone exchanged fire with Heermann until she too turned away at 09.10. By 09.17, Sprague had ordered Hathaway to lay smoke on the port quarter of the escort carriers, and by 09.30, the group had re-formed in its normal formation and was headed to the south. As a result of the ferocity of the resistance offered by the US warships, Kurita had become convinced that he was facing a much larger force than was actually the case, and gave a 'cease action' order at 09.00, with instructions to rendezvous to the north. Thus, unexpectedly, the Japanese began to disengage and turn away. Though extensively damaged, Heermann was the only destroyer of the screen to survive. Temporarily safe within the rain squall, Sprague had a difficult decision to make. The easterly course was drawing the Japanese too close to the San Bernardino Strait and away from any help that might come from the battleships of Rear Admiral Jesse B. Oldendorf’s Battle Line forces to the south, and Kurita was about to get up to windward of his formation, which would render his smoke less effective. Consequently, at 07.30 Sprague ordered a course change, first to the south-east and then to the south, and ordered his escorts to make their torpedo attack to cover the carrier’s emergence from the squall. This was a very risky decision as it gave Kurita a chance to cut across the diameter of Sprague’s arc and cut him off. However, Kurita missed the chance and his forces followed Taffy 3 around the circle, his earlier decision to send his destroyers to the rear having removed them from a position that they could have intercepted or prevented the US formation’s turn. The escort carriers of Taffy 3 turned to the south and withdrew through shellfire at their maximum speed of 17.5 kt. The six carriers dodged in and out of rain squalls, occasionally turning into the wind to launch the few aircraft they still had available. After an hour, the Japanese had closed the range to less than 17,600 yards (16095 m), and the fact that the carriers had managed to evade destruction reinforced the Japanese belief that they were opposed by fast fleet carriers. The heavy clouds of black and white smoke generated by the US ships were now making target observation extremely difficult. At 08.00, Sprague ordered the carriers to 'open fire with pea-shooters when the range is clear'. The stern chase was also advantageous for the sole anti-ship armament of small carriers was a single manually controlled stern-mounted 5-in (127-mm) gun as a stinger, though they were provided with anti-aircraft shells. Fire from the escort carriers' 'stingers' was later credited with hitting Japanese warships that ventured within 5-in (127-mm) gun range and contributing to the sinking of the heavy cruiser Chokai. During the run to the east the escort carriers had been battered by near-misses. At 08.05, Kalinin Bay was struck by an 8 in (203.2-mm) shell and the carriers started taking direct hits. However, the Japanese ships were firing armour-piercing shells, which often penetrated right through the unarmoured escort carriers without detonating. Though CVEs were popularly known as 'Combustible Vulnerable Expendable', they would ultimately prove durable in first dodging and then absorbing heavy shell fire and in downing attacking kamikaze aircraft. When Yamato opened fire at 06.59 at an estimated range of 35,000 yards (32000 m), she targeted White Plains with her first four salvoes. The third of these was a close straddle landing at 07.04. One shell from this salvo exploded beneath the turn of White Plains' port bilge near frame 142, close to her after (starboard) engine room. While the ship was not struck directly, the shock effect of the under-keel explosion severely damaged her hull, deranged her starboard machinery, and tripped all the circuit breakers in her electrical network. Prompt and effective damage control restored power and communications within three minutes, and the ship was able to remain in formation by overspeeding her port engine. The gout of black smoke resulting from the shock of the explosion convinced Yamato and Nagato, which was also firing her main battery at White Plains at the time, that they had scored a direct hit, so they shifted fire to other targets. The turn to the south put White Plains in the lead of the formation, and she escaped any further hits from Japanese fire. During the surface phase of the action, White Plains' 5-in (127-mm) gun crew claimed six hits on the heavy cruiser Chokai, which shortly after this was struck by a bomb. As the Japanese gunners concentrated on the closest target, Gambier Bay's plight effectively diverted attention from the other fleeing carriers. At 08.10, Chikuma closed to within 10,175 yards (9300 m) and finally landed hits on Gambier Bay's flightdeck. Subsequent hits and near misses, as the Japanese switched to high explosive shells, soon caused Gambier Bay to lose speed, and she was soon dead in the water. Three cruisers then closed to pointblank range, as destroyers such as Johnston were unsuccessful in drawing fire away from the carrier. Fires raged through the riddled escort carrier, and she capsized at 09.07 and sank at 09.11. Four TBM Avenger torpedo bombers went down with the carrier, and 130 men of her crew were killed. The majority of her nearly 800 survivors were rescued two days later by landing and patrol craft despatched from Leyte Gulf. Gambier Bay was the only US carrier sunk by naval gunfire in World War II. Straddled several times during the run to the east, St Lo escaped serious damage during the surface phase of the action. By 07.38 the Japanese cruisers approaching from St Lo's port quarter had closed to within 14,215 yards (13000 m). St Lo responded to their salvoes with rapid fire from her single 5-in (127-mm) gun, claiming three hits on a 'Tone' class cruiser. At 10.00, the escort carrier launched an Avenger armed with a torpedo to join the attack launched by Kitkun Bay at 10.13. At 10.51 Lieutenant Yukio Seki, leader of the Shikishima squadron of the Special Attack Unit, crashed his A6M fighter into the carrier’s flightdeck from astern in the first organised kamikaze attack. The resulting explosions and fires within his ship’s hangar forced Captain Francis McKenna to give the order to abandon ship at 11.00, and St Lo capsized and sank at 11.25 with the loss of 114 men. Six FM-2 fighters and five TBM torpedo bombers went down with St Lo. As the trailing ship in the escort carrier van after the turn to the south, Kalinin Bay came under intense Japanese fire. Though partially protected by smoke, a timely rain squall and counterattacks by the screening destroyers and destroyer escorts, she took the first of 15 direct hits at 07.50. Fired from a battleship, the large-calibre shell struck the starboard side of the hangar deck just abaft the forward elevator. By 08.00, Tone and Haguro, the Japanese heavy cruisers off her port quarter, had closed to within 18,000 yards (16460 m), and Kalinin Bay responded to their straddling salvoes with her 5-in (127-mm) gun. Three 8-in (203.2-mm) armour-piercing projectiles struck the escort carrier within minutes. At 08.25, the US ship scored a direct hit from 16,000 yards (14630 m) on the no. 2 turret of a 'Nachi' class heavy cruiser, and a second hit shortly then forced the Japanese ship to withdraw temporarily from its formation. At 08.30, five Japanese destroyers steamed over the horizon off Kalinin Bay's starboard quarter, and opened fire from a range of about 14,500 yards (13260 m). As screening ships engaged the cruisers and laid down concealing smoke, Kalinin Bay shifted her fire, and for the next hour traded shots with the ships of Destroyer Squadron 10. No destroyer hit Kalinin Bay, which nonetheless took ten more 8-in (203.2-mm) hits from the now obscured cruisers. One shell passed through the flightdeck into the communications area and destroyed all the radar and radio equipment. Most of the hits occurred after 08.45 when Tone and Haguro had closed to within 10,100 yards (9235 m). At 09.15, an Avenger from St Lo strafed and exploded two torpedoes in Kalinin Bay's wake about 100 yards (91 m) astern of her. A shell from the latter’s 5-in (127-mm) gun deflected a third from impact with her stern. At about 09.30, as the Japanese ships fired parting salvoes and reversed course to the north, Kalinin Bay scored a direct hit amidships on a retreating destroyer. Five minutes later, she ceased fire and retired southward with the other survivors of Taffy 3. At about 10.50, the task unit came under concentrated air attack. During the 40-minute battle, the first attack by a kamikaze unit, all the escort carriers but Fanshaw Bay were damaged. Four diving aircraft attacked Kalinin Bay from astern and the starboard quarter: two were shot down when close, but the third crashed into the port side of the flightdeck, damaging it severely, and the fourth destroyed the after port stack. Kalinin Bay suffered extensive structural damage during the morning’s intense action, as well as 60 casualties including five men killed. Twelve direct hits and two near-misses by large-calibre shells were confirmed. The two near-misses exploded under the escort carrier’s counter, and were the severest threats to the ship’s survival. Straddled several times early in the surface action during the run to the east as she was at the rear of the formation alongside White Plains, Kitkun Bay was toward the front of the formation after the turn to the south and escaped serious damage. At 10.13 she launched five Avenger aircraft (four armed with torpedoes and one with bombs) to attack the retreating Japanese. The five, supplemented by one aeroplane from St Lo, attacked Yamato at 10.35 without result. Attacked by a kamikaze at 11.08, Kitkun Bay was successfully defended by her own and Fanshaw Bay's anti-aircraft batteries, and was the only one of Sprague’s carriers to escape undamaged. Targeted by Kongo and Haruna early in the action, Sprague’s flagship Fanshaw Bay escaped serious damage during the run to the east and was on the far side of the formation across from Gambier Bay during the run to the south. During the later kamikaze attacks, Fanshaw Bay took a near-miss kamikaze close aboard, helped shoot down an aeroplane just about to crash into Kitkun Bay, and landed aircraft from her sunk or damaged sisters. Fanshaw Bay suffered four dead and four wounded. Yamato engaged US surface forces for her first and only time at Samar, entering the battle 6.7 ft (2 m) down by the bow and limited to 26 kt as a result of the 3,000 tons of flooding caused by three armour-piercing bomb hits during the 'Battle of the Sibuyan Sea'. Yamato opened the battle at 06.59, firing on White Plains at a range estimated at 34,525 yards (31570 m), severely damaging White Plains with a near miss from her third salvo. The resulting gout of smoke from the stricken carrier obscured the target and convinced Yamato that the escort carrier had been destroyed, so she ceased fire at 07.09. At 07.27, Yamato reported main and secondary battery hits on an 'enemy cruiser' at a range of 20,315 yards (18575 m): the time, range and bearing all correspond with the hits on the destroyer Johnston. At 07.51, the super-battleship turned her secondary battery on the destroyer escort Raymond at a range of 10,095 yards (9230 m) before steering hard to port to avoid a torpedo salvo from Hoel at 07.54. At 07.55, Yamato opened fire on Hoel with her 5-in (127-mm) anti-aircraft guns and was struck by a US shell of this same calibre in return. Hemmed in by Haruna to starboard and her destroyers to port, Yamato was forced to run due north away from the battle until the torpedoes ran out of fuel, finally turning back at 08.12. At 08.23, one of Yamato's F1M2 reconnaissance and spotter floatplanes reported a main battery hit on Gambier Bay, though this hit was also claimed by Kongo. Gambier Bay's own records report a damaging near miss from a battleship-calibre shell around this time. At 08.34 Yamato trained her secondary batteries on another 'light cruiser', probably Hoel, which was observed sinking at 08.40. At 08.45 Yamato sighted three of the US escort carriers, US smokescreens preventing her from seeing the entire US formation. Between 09.06 and 09.17, Yamato received several strafing and torpedo attacks from US aircraft, claiming one US aircraft shot down at 09.15. A fighter pilot, Lieutenant Richard W. Roby, reportedly attacked destroyers before raking Yamato's decks and then bridge with his 0.5-in (12.7-mm) machine guns, further discouraging her. However, US reports that Yamato closed to within 2,400 yards (2195 m) of the American ships before she was attacked by US aircraft are not supported by Yamato's own action report. At 09.11, Kurita ordered his ships to regroup to the north, and at 09.22 Yamato slowed to 20 kt and came round to course 040°, finally setting course 000° (due north) at 09.25. Kurita reported that his force had sunk two carriers, two cruisers, and some destroyers, apparently assuming that Yamato had indeed sunk White Plains with her first four salvoes. Kurita’s forces had actually sunk one carrier, two destroyers, and one destroyer escort, and Yamato's guns had in all probability contributed to the sinking of three out of the four, with claimed hits (some unconfirmed or disputed) on all except Samuel B. Roberts. Targeted by 5-in (127-mm) fire from the destroyers and destroyer escorts, the heavy cruiser Chokai was hit amidships, starboard side, most likely by the sole 5-in (127-mm) gun of White Plains. The shell could not pierce the hull armour, but it was thought, until an expedition to the cruiser’s wreck in 2019 found her torpedoes still intact, that the shell’s 7-lb (3.175-kg) bursting charge might have set off the eight sensitive deck-mounted Type 93 torpedoes. An explosion was observed aboard Chokai before a TBM from Kitkun Bay dropped a 500-lb (227-kg) bomb on her forward machinery room. The cruiser’s rudder and engines were damaged, causing the ship to drop out of formation. Fires began to rage and she became dead in the water. Later in the same day, she was sent to the bottom by torpedoes from the destroyer Fujinami, or by bombs from aircraft of Ommaney Bay, an escort carrier of Taffy 2. Haguro's detailed action report states that the damage which immobilised Chokai resulted from a bomb hit at 08.51, and it is possible that Chokai was struck by a 14-in (355.6-mm) shell from Kongo as she steamed into Kongo's line of fire. After Johnston blew off the bow of Kumano with a torpedo, the Japanese ship retired toward the San Bernardino Strait, where she suffered further, minor, damage from an air attack. Chikuma engaged the US escort carriers, helping to sink Gambier Bay, but came under fire from Heermann, on which Chikuma inflicted severe damage, but was soon attacked by four TBM torpedo bombers. One of these aircraft, flying from Manila Bay, hit her port quarter with a Mk 13 torpedo that severed her stern and disabled her port propeller and rudder. Chikuma's speed dropped to 18 kt and then to 9 kt but, more seriously, she became unsteerable. At 11.05, Chikuma was attacked by five TBM bombers from Kitkun Bay, and was hit amidships on the port beam by two torpedoes, causing her engine rooms to flood. At 14.00, three TBM bombers from a composite squadron of aircraft from Ommaney Bay and Natoma Bay launched more torpedoes which hit Chikuma on the port beam. It is generally thought that the destroyer Nowaki took survivors of Chikuma, and then scuttled her late in morning of 25 October, but a more recent study suggests that Chikuma sank from the effect of the air attack, and that Nowaki arrived only in time to pick up survivors. While withdrawing from the battle area, Nowaki was herself sunk, with the loss of all but one of Chikuma's surviving crew. The heavy cruiser Suzuya, which had also engaged the carriers, received fatal damage from the air, although not hit directly. Early in the battle, she was attacked by 10 Avenger bombers from Taffy 3, and a near-miss close astern to port by a high explosive bomb carried away one of Suzuya's propellers, reducing her maximum speed to 20 kt. At 10.50, the heavy cruiser was attacked by 30 more carrierborne aircraft. Another near-miss by a bomb, this time starboard amidships, detonated a Type 93 torpedo loaded in one of her starboard mounts. The fires started by the explosion soon spread to other torpedoes nearby and beyond, the subsequent explosions damaging one of the boilers and the starboard engine rooms. The order to abandon ship was given at 11.50, and the fires set off the remaining torpedoes and ship’s main magazines 10 minutes later. Suzuya rolled over and sank at 13.22, 401 officers and crewmen being rescued by the destroyer Okinami, followed by further rescues by US ships. Although Kurita’s battleships had not been seriously damaged, the US air and destroyer attacks had broken up his formations, and he had lost tactical control. His flagship Yamato had been forced to turn and run to the north in order to avoid torpedoes, causing him to lose contact with much of his task force. The determined, concentrated sea and air attack from Taffy 3 had already sunk or crippled the heavy cruisers Chokai, Kumano and Chikuma, which seemed to confirm to the Japanese that they were in battle with major fleet units rather than escort carriers and destroyers. Kurita was initially unaware that Halsey had already taken the bait offered by Ozawa’s Mobile Force, Strike Force and that his battleships and carriers were therefore far out of range. The ferocity of the renewed air attacks further contributed to his confusion and reinforced his suspicion that Halsey’s aircraft carriers were nearby. Signals from Ozawa eventually convinced Kurita that he was not currently engaged with the entirety of the 3rd Fleet, and that the remaining elements of Halsey’s forces might close and destroy the Northern Force should Kurita linger too long off Samar. Finally, Kurita received word that the Southern Force with which he was to link had been destroyed during the previous night. Calculating that the fight was not worth further losses and believing he had already sunk or damaged several US carriers, Kurita broke off the engagement at 09.20 with the order that 'All ships, my course north, speed 20'. Kurita set a course for Leyte Gulf but became distracted by reports of another US carrier group to the north. Preferring to expend his ships against capital ships rather than transports, Kurita turned to the north after the non-existent US fleet and ultimately withdrew back through the San Bernardino Strait. As the Northern Force retreated to the north and then to the west through the San Bernardino Strait, the smaller and heavily damaged US force continued to press the battle. Soon after 08.00, desperate messages calling for assistance began to arrive from the 7th Fleet. One, from Kinkaid, sent in plain language, read 'My situation is critical. Fast battleships and support by airstrikes may be able to keep enemy from destroying CVEs and entering Leyte.' At 08.22, Kinkaid radioed 'Fast Battleships are Urgently Needed Immediately at Leyte Gulf.' At 09.05, Kinkaid radioed 'Need Fast Battleships and Air Support.' At 09.07, Kinkaid broadcast what his mismatched fleet was up against as '4 Battleships, 8 Cruisers Attack Our Escort Carriers.' Some 3,500 miles (5630 km) away at Pearl Harbor, Admiral Chester W. Nimitz had monitored Taffy 3’s desperate calls and sent Halsey the terse message 'Where is TF34?'. To complicate decryption, communications officers were to add a nonsense phrase at both ends of a message, in this case the prefix 'Turkey trots to water' and the suffix 'The world wonders.' The receiving radioman repeated the 'where is' section of this message and his staff failed to remove the trailing phrase 'the world wonders'. A simple query by a distant supervisor had, through the random actions of three sailors, become a stinging rebuke. Halsey was infuriated since he did not recognise the final phrase as padding, threw his hat to the deck and began to curse. Halsey sent back Vice Admiral John S. McCain’s Task Group 38.1 to assist Kinkaid. Halsey recalled that he did not receive the vital message from Kinkaid until about 10.00 and later claimed that he had known that Kinkaid was in trouble but had not dreamed of the seriousness of the crisis. McCain, by contrast, had monitored Sprague’s messages and turned TG38.1 to aid Sprague even before Halsey’s orders arrived, making Halsey’s defence questionable. At 10.05, Kinkaid asked 'Who is guarding the San Bernardino Strait?' McCain raced towards the battle and briefly turned into the wind to recover returning aircraft. At 10.30, a force of Curtiss SB2C Helldiver single-engined dive-bombers, Avenger torpedo bombers and Hellcat fighter-bombers was launched from Hornet, Hancock and Wasp at the extreme range of 380 miles (610 km). Though the resulting attack did little damage, it strengthened Kurita’s decision to pull back. At 11.15, more than two hours after the first distress messages had been received by his flagship, Halsey ordered TF38 to turn and head back to the south to pursue Kurita, but the Japanese forces had already escaped. Just hours after his perceived chastisement by Nimitz, Halsey’s forces destroyed all four Japanese aircraft carriers of the decoy force he had pursued. However, despite the complete absence of the 3rd Fleet against the main Japanese force, the desperate efforts of Taffy 3 and assisting task forces had driven back the Japanese. A relieved Halsey sent the following message to Nimitz, Kinkaid and General Douglas MacArthur at 12.26 'It can be announced with assurance that the Japanese Navy has been beaten, routed and broken by the Third and Seventh Fleets.' Partly as a result of disastrous communication errors within the 7th Fleet and a reluctance to expose search ships to submarine attack, a very large number of Taffy 3’s survivors, including those from Gambier Bay, Hoel, Johnston and Samuel B, Roberts, were not rescued until 27 October after two days adrift. An aeroplane had spotted the survivors, but the location radioed back was incorrect. By then, many of the survivors had died from exposure, thirst and shark attacks. The Japanese had succeeded in luring Halsey’s 3rd Fleet away from its role of covering the Leyte Gulf invasion fleet, but the remaining light forces nonetheless proved to be a very considerable obstacle. The force that Halsey had unwittingly left behind carried about 450 aircraft, comparable to the forces of five fleet carriers, although of less powerful types, and not armed for attacks on armoured ships. The ships themselves, though slow and almost unarmed, in the confusion of battle and aided by weather and smokescreens, mostly survived. Their aircraft, though not appropriately armed, sank and damaged several ships, and did much to confuse and harass the Northern Force. The breakdown in Japanese communications left Kurita unaware of the opportunity that Ozawa’s decoy plan had offered him. Kurita’s mishandling of his forces during the surface engagement further compounded his losses. Despite Halsey’s failure to protect the northern flank of the 7th Fleet, Taffy 3 and assisting aircraft turned back the most powerful surface fleet Japan had sent to sea since the 'Battle of Midway'. Domination of the skies, effective and timely manoeuvres by the US ships, tactical errors by the Japanese admiral, and superior US radar technology, gunnery and seamanship all contributed to this outcome. In the engagement, the Japanese had numerous large-calibre battleship and cruiser main guns with considerably greater range and power than those of the US ships, but the Japanese guns lacked a blind-fire capability and were therefore thwarted by rain squalls and the smoke laid by screening US destroyers. Japanese fire-control systems manually computing solutions for targets on a constant course were fighting US destroyers which constantly changed course. The Japanese visual aiming system produced bracketing salvoes, but the US ships manoeuvred rapidly to avoid following accurate shots but were themselves still able to fire accurately as a result of their possession of the Mk 37 radar-directed fire-control system and its computer, and to their faster reloading. Moreover, the accurate US 5-in (127-mm) guns and 40-mm anti-aircraft fire directed by radar and computer control shot down several kamikaze aircraft, and the lack of comparable systems made the Japanese ships vulnerable to US air attack. Lastly, the attacking Japanese force initially used armour-piercing shells which were largely ineffective against unarmoured ships as they passed right through without detonating. US destroyers and destroyer escorts were engineered with enough redundancy to survive dozens of such hits. The US escort carriers landed hits when the large Japanese ships, which could not manoeuvre while firing, came within range of guns as small as the 5-in (127-mm) guns. In summary, the Japanese had built the largest battleships, but the fleet was in general unrefined and had numerous technical limitations and weaknesses, and the commanding officers made mistakes and failed to take into account their weaknesses or to make the best use of their strengths. The US Navy had superior technology and, while the commanding officers made some mistakes, these latter were limited, and the Americans had sufficient numbers of all types of ships and weapons to compensate for the mistakes. It may be argued that of all of the battles in the Pacific War, the 'Battle off Samar' best demonstrates the effectiveness of air attack and destroyer-launched torpedoes against larger surface vessels. Japanese tactics were cautious, in the belief that they were fighting a much more powerful force. Clifton Sprague’s task unit lost two escort carriers in the form of Gambier Bay to surface attack and St Lo to kamikaze attack. Of the seven screening ships, fewer than half, the destroyers Hoel and Johnston and the destroyer escort Samuel B. Roberts were lost, as were several aircraft. The other four US destroyers and destroyer escorts were damaged. Although it was only a small task unit, more than 1,500 US men died, comparable to the losses suffered at the Allied defeat of the 'Battle of Savo Island' off Guadalcanal, when four cruisers were sunk. It was also comparable to the combined losses of the 543 men and three ships in the 'Battle of the Coral Sea', and the 307 men and two ships in the 'Battle of Midway'. On the other side of the balance sheet, the Japanese lost three heavy cruisers, and a fourth limped back to base with serious damage, All of Kurita’s battleships except Yamato suffered considerable damage, all of the other heavy ships stayed inactive in their bases, and the Imperial Japanese navy had, as a whole, been rendered ineffective for the remainder of the war. Of the six US ships, totalling 37,000 tons, lost during the Leyte Gulf operations, five were from Taffy 3. The Japanese lost 26 ships, totalling 306,000 tons at the Leyte Gulf fighting. Halsey came under considerable criticism for his decision to take TF38 to the north in pursuit of Ozawa and for failing to reverse course after Kinkaid had first appealed for help. In his despatch after the battle, Halsey gave reasons for his decision as follows: 'Searches by my carrier planes revealed the presence of the Northern carrier force on the afternoon of October 24, which completed the picture of all enemy naval forces. As it seemed childish to me to guard statically San Bernardino Strait, I concentrated TF38 during the night and steamed north to attack the Northern Force at dawn. I believed that the [Northern] Force had been so heavily damaged in the Sibuyan Sea that it could no longer be considered a serious menace to Seventh Fleet.' Halsey also said that he had feared that leaving TF34 to defend the strait without carrier support would have left it vulnerable to attack from land-based aircraft and leaving one of the fast carrier groups behind to cover the battleships would have significantly reduced the concentration of air power going north to strike Ozawa. In a footnote, the US official naval historian wrote that 'Admiral Lee, however, said after the battle that he would have been only too glad to have been ordered to cover San Bernardino Strait without air cover.' Had Halsey been in proper communication with the 7th Fleet, the escort carriers of TF77 could have provided adequate air cover for TF34, a much easier matter than it would be for those escort carriers to defend themselves against the onslaught of Kurita’s heavy ships. It may be argued that the fact that Halsey was aboard one of the battleships and 'would have had to remain behind' while the bulk of his fleet charged northward to locate and engage the Japanese carriers, and that this may have contributed to that decision. However, it would have been perfectly feasible and logical to have taken one or both of the 3rd Fleet’s two fastest battleships, Iowa and New Jersey, with the carriers in the pursuit of Ozawa, while leaving the rest of the Battle Line off San Bernardino Strait. (Indeed, Halsey’s original plan for the composition of TF34 was that it would contain four rather than all six of of the 3rd Fleet’s battleships.) Therefore, to guard San Bernardino Strait with a powerful battleship force would have been compatible with Halsey’s personally going north aboard New Jersey. It seems likely that Halsey was strongly influenced by his chief-of-staff, Rear Admiral Robert Carney, who was also wholeheartedly in favour of taking all of the 3rd Fleet’s available strength northward to attack the Japanese carrier force.
<urn:uuid:7fe5c0ce-3a87-4147-92f2-16675e44316b>
CC-MAIN-2023-40
https://codenames.info/operation/battle-off-samar/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.974305
17,824
2.53125
3
Automatic Reference Counting (ARC) and Memory Management in Swift Manage your memory better with ARM and Swift. Join the DZone community and get the full member experience.Join For Free Memory management is a key factor when we develop apps. If a program is using a lot of memory, it can make apps run slowly or even cause crashes. To handle this in Swift, you can work with Automatic Reference Counting (ARC) to keep your apps memory usage minimal. This doesn’t mean you can completely forget about the memory in your app, but it does take care of most things for you. It’s important to note that ARC only works when working with classes. Structs and enums are value types and therefore are stored differently in memory than classes, which are stored and passed by reference. You amy also like: Learn Swift With This Hands-On Tutorial. Your app could use too much phone memory. This could cause your application to perform badly, crash, or exhibit other unexpected behavior. For example: Too much phone memory used In the figure above, we have a viewController, label, or a tableView that loaded in memory, and for some reason, if you forgot to use dequeueReusableCell, all cells in the array will load all cells, causing your app's memory problem. Your application could also add something to memory and then never remove it. For example, you have a view controller that shows a popup, which closes and is never removed. If you use that popup so many times, then it uses so much memory and never gets released from memory. You assign something to memory but unexpectedly remove it from memory. Then, you try to access it or try to get the value of it, which results in a crash because the element doesn’t exist in memory anymore. These are three different memory problems that are not all but for now, we are going with there. How These Things Happen There are two different types in Swift that you need to understand: Value types: This type can be a String, Int, Stuck, Enum, Array, Dictionary, etc. Each value of an instance (like a String or Int) holds its own value, and if you use it somewhere else, it makes a copy of the variable and passes it around your application. Reference Types: A class is a reference type. Reference type instances share a single copy of data. So, if you use or pass it around your app, then only one copy exists, and you are just passing a pointer or reference back to your class. The Job has a default value of 2, and Job first instance created called person. It will have a job of 2. Now, create a new object called new and assign the previous object to this like as in the code above. Now change the job of new to 5 and then print the job of both the instance. Both will print the number 5. This is because the class is a reference type. When Will Swift Remove a Reference Type From Memory? This only occurs when there are no more variables pointing to the reference type. Swift uses ARC for this. How ARC Works First, create a project with swift language and then select your ViewController.Swift file. Add the following class to the bottom of your ViewController.swift: This is a very simple viewController and a class named MyClass. In DidLoad just initiate the class and create a couple more variables pointing to the same class; then, set them all to nil. See the definite function in the MyClass code. This is called right before the object is removed from memory. So, there is a three-pointer (three reference count for MyClass). Once you nil-all of them, you can see the print statements. Now, let’s see the second memory problem in which I mention adding something to memory and it never gets removed. Add the following class to the bottom of you ViewController.swift: Here, in this example, we are using two classes, Job and Person. The Job class has a variable named person with the type of Person Class. Similarly, the Person class has a variable named job with type of Job Class. We create these properties in DidLoad(). Variables, joe and dev, that we created in DIdLoad() both have their space, memory, and a reference count of 1. Joe is a Person type class variable and dev is a Job type class variable. We now assign Joe dev as his job. joe?.job = dev Joe’s job variable will now reference the dev object. Becasue fo this, Job now has a reference count of two, meaning that two objects point to it. Similarly with dev in the Person Class, dev?.person = joe Now, the person variable of dev points to the Person Class, so it also has a reference count of two. So, what happens if we did use their variables, and we set them to nil? joe = nil dev = nil Still, there is no output from the deallocation print statement in console, and the Job and Person classes can’t be removed from memory because of the job and person variable point to them. This is called the Retain cycle. In this instance, Apple holds on to these objects and does not let them go with the reference count > 1, as both object reference each other. Using Instruments Tool to Detect These Problems in Xcode In Xcode, Go to Product and click on Profile. Then, a new tool will open named Instruments. Once you've selected that, select Leaks and press Choose. Then, you can see it point to our simulator and show it next to our app as a target to run. Then, you just need to tap on the red button and it starts recording. You can see the red cross sign showing two leaks (just tap on it). Then, you can see what objects are leaking like Job and Person here. You can look it a different way to like click on Leaks. Then, it will show three options (Leaks, Cycles & Roots, and Call Tree). Choose Cycles & Roots. Then, a cycle graph will be displayed (Retain Cycle). This is what the actual problem with memory was. Both classes point to each other. How to Fix a Retain Cycle: Use a Weak or Unown reference instead of a Strong reference. A weak or unknown reference does not increment the reference count. Strong Reference : It is by default if you make a reference without using weak or unowned then it is a strong reference. A weak reference's child may or may not exist if the parent is removed from memory. It’s optional it can be set to nil. In this case, the child definitely exists all the time, but it is removed when the parent is removed, so it is not optional, and we can’t set it to nil. Let’s fix the Retain Cycle in Code. As a solution to this, I made the job a weak variable then run the app, so it hits the print the statement for deallocating Job and Person. Now, if we run the Instrument app then again record our app into it, we can see the green checkmark in place of the red cross. And it's showing no leaks as well This is how you can track and resolve the Retain Cycle and solve some memory leaks problems. Published at DZone with permission of Prashant Sharma. See the original article here. Opinions expressed by DZone contributors are their own.
<urn:uuid:892c7a2b-a699-49c0-a25b-a7651fce5248>
CC-MAIN-2023-40
https://dzone.com/articles/automatic-reference-counting-arc-and-memory-manage
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.909575
1,625
3.140625
3
Jump to navigation Jump to search - A physical tilt or bend. - The inclination of his head increased and he awoke with a start. - A slant or slope. - The road up to the house had a steep inclination. - A tendency. - His inclination to drink escalated to alcoholism. - (geometry) The angle of intersection of a reference plane - Artillery must take account of a weapon's precise inclination. - (obsolete) A person or thing loved or admired. physical tilt or bend slant or slope geometry: angle of intersection - The translations below need to be checked and inserted above into the appropriate translation tables. See instructions at Wiktionary:Entry layout § Translations. Translations to be checked inclination f (plural inclinations) - inclination (all senses)
<urn:uuid:c6969db5-18f0-4ef8-817d-9d4f66e4598e>
CC-MAIN-2023-40
https://en.wiktionary.org/wiki/inclination
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.65125
282
2.6875
3
In 1969 Joseph Kosuth wrote, “The artist cannot compete with flying to the moon by rocket, the lights of Las Vegas, coloured television or movies. The visual experiences of the modern day man make painting impotent.” Had Kosuth worked on our Alternative Provision programme in 2017 with students excluded from mainstream education he may have expressed similar sentiments. How can you engage teenagers with Attention Deficit Hyperactivity Disorder in painting and drawing, instead of the constant stimulation of the online world? As the Digital Special Interest Representative for Engage, I’m an advocate of using digital solutions, particularly when they are offline. Buttons can be pressed, screens can be lit up and two parts of the curriculum can be joined: art and technology. This workshop began with an image projected onto the wall, which the students identified almost correctly as a star. We discovered it was only with recent advances in technology that the resolution of telescopes was high enough to distinguish the light from the bright point in the night sky as from two bright points close together – two stars. Cue a discussion about who had the best camera phone. This concept was explored further as images of pixelated celebrities were projected onto the wall and students competed to identify them first as the resolution improved. Manipulating their eyeball apertures, students discovered that by squinting like in a life drawing class helped distinguish tonal areas. Pixelated portraits of Beyonce, Barack Obama and Paul Pogba were recognised increasingly quickly. Worryingly, the image that was recognised fastest was a highly pixelated version of Donald Trump, even with the orange fully desaturated. Next the process was reversed. Students photographed one another under extreme lighting conditions, with images placed on light boxes and covered in grids of varying size. Dark squares were filled in black. Light squares were left empty. The bigger the grid the less time the drawing took to complete. But the resolution was worse, making it harder to identify one another from their own pixelated portraits. The workshop culminated with a Kano Pixel Kit – a programmable build-it-yourself computer and light board that students used to illuminate designated tonal areas, creating digital portraits. They may not have flown to the moon by rocket but they were now the stars.
<urn:uuid:261ae8e1-b1e6-4b68-b17b-9637a22951a9>
CC-MAIN-2023-40
https://fermynwoods.org/alternative-monday-24-pixelated-portraits/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.970271
466
3.046875
3
Advancing Health Research through Improved Models To uncover the role of genetic changes in the development of hereditary diseases such as cancer, it is possible to “knock out” selected genes in mice either by removing them, or selectively turning them on or off. Known as gene trapping or gene targeting, this process is accomplished by creating mouse embryonic stem cells in which a single gene has been replaced with a “null” gene—a non-functioning placeholder or a “conditional” gene-a modified gene for experimental testing. As the knock out mice grow to adulthood, researchers can study the effects of the altered gene. The North American Conditional Mouse Mutagenesis (NorCOMM) project brought together research groups from across Canada, the US and Europe to develop mouse models for genomics health research and drug discovery. The mouse is a critical model organism because 99 percent of the genes in mice are also present in humans. NorCOMM established a resource of mutant mouse embryonic stem cell lines that allows researchers to study the function of virtually any gene of interest. This resource is helping to elucidate the role of genetic predisposition in development, adverse drug reactions, obesity, diabetes, cancer, and other major diseases. As more industry, academic and government labs use mouse models for health research, the economic and social benefits of NorCOMM will perpetuate well into the future. The process to isolate just one gene, which used to take up to two years of specialized work, has been streamlined to produce up to 1,000 isolations in one month. Some genes are more easily trapped than others, but after the mouse genome sequence became available for NorCOMM researchers, new methods were devised to target specific genes of interest to industry, academic and government labs. As the NorCOMM project gained momentum, an international effort came together; the International Knock out Mouse Consortium (IKMC). The IKMC enabled NorCOMM to coordinate efforts with international partners, the European Conditional Mouse Mutagenesis (EUCOMM) Program, the Knockout Mouse Project (KOMP) (National Institutes of Health – USA), and the Texas A&M Institute for Genomic Medicine (TIGM) to focus on high-throughput targeted gene knockouts, prioritizing requests from researchers and biotech companies worldwide. To date, the IKMC effort has developed over 36,180 knock out ES cell lines and over 2,150 knock out mouse lines. Over 220 knockout cell lines have been incorporated into external research programs in over 18 countries and in 10 Canadian academic labs. There have been 63 peer-reviewed publications using IKMC resources. 41 of these were released in 2012 and this number is expected to grow rapidly as more end-users access the resource. Two biopharmaceutical firms have incorporated NorCOMM cell lines into their drug discovery and validation pipelines. The National Institutes of Health estimates that any user will save $20-50K in development costs for each cell line ordered from NorCOMM. NorCOMM researchers leveraged over $30 million in additional funding to enhance the utility and use of the embryonic stem cell resource. The International Mouse Phenotyping Consortium (IMPC) has been developed to help researcher utilized the IKMC resource. The IMPC will determine the function of every gene in the mouse genome. These mice will be preserved in repositories and made available to the scientific community.
<urn:uuid:c0284861-2c9c-4cec-a423-0bebc42e79a2>
CC-MAIN-2023-40
https://genomeprairie.ca/project/norcomm/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.929301
705
3.484375
3
What is Sperm Test (Semen Analysis)? How is Sperm Test performed? Sperm Test, also known as Semen Analysis, is a diagnostic test that evaluates the quality and quantity of sperm in a man’s semen. It is a crucial test in assessing male fertility and is often recommended for couples who are struggling to conceive. The test involves examining various parameters of the semen sample, including sperm count, motility, morphology, and other factors that can affect fertility. By analyzing these factors, doctors can determine if there are any underlying issues that may be causing infertility. Sperm Test is typically performed in a laboratory by trained professionals. Here is a step-by-step guide on how the test is conducted: 1. Collection of the semen sample: The first step in performing a Sperm Test is to collect a semen sample. This is usually done through masturbation, where the man ejaculates into a sterile container. It is important to collect the entire ejaculate to obtain an accurate analysis. 2. Sample handling: Once the semen sample is collected, it needs to be handled carefully to maintain its integrity. It should be kept at body temperature and delivered to the laboratory within 30 minutes to an hour after collection. If it cannot be delivered within this timeframe, it should be kept at room temperature. 3. Sample liquefaction: After the sample is received in the laboratory, it undergoes a process called liquefaction. This involves allowing the semen to sit at room temperature for about 20-30 minutes to become less viscous. Liquefaction is necessary to obtain accurate results during analysis. 4. Sperm count: The next step is to determine the sperm count, which refers to the number of sperm cells present in the semen sample. This is usually done using a device called a hemocytometer, which is a specialized microscope slide with a grid pattern. A small amount of the semen sample is mixed with a diluting fluid, and a drop of the mixture is placed on the hemocytometer. The sperm cells are then counted under a microscope, and the total count is calculated. 5. Sperm motility: After determining the sperm count, the next parameter analyzed is sperm motility. This refers to the ability of the sperm cells to move and swim. Motility is assessed by examining a small drop of the semen sample under a microscope. The percentage of sperm cells that are actively moving is recorded, and different categories of motility are identified, such as progressive motility (forward movement) and non-progressive motility (movement in place). 6. Sperm morphology: Another important parameter analyzed in a Sperm Test is sperm morphology, which refers to the shape and structure of the sperm cells. Abnormalities in sperm morphology can affect fertility. Morphology is assessed by staining a small portion of the semen sample and examining it under a microscope. The percentage of sperm cells with normal morphology is recorded. 7. Other factors: In addition to the above parameters, other factors may also be analyzed during a Sperm Test, depending on the specific requirements of the individual case. These may include pH levels, volume of semen, white blood cell count, and presence of any infections or abnormalities. 8. Interpretation of results: Once all the parameters are analyzed, the results are interpreted by a specialist. The results are compared to established reference ranges to determine if they fall within normal limits. If any abnormalities are detected, further investigations may be recommended to identify the underlying cause. In conclusion, Sperm Test, or Semen Analysis, is a diagnostic test that evaluates the quality and quantity of sperm in a man’s semen. It is an important tool in assessing male fertility and can help identify any underlying issues that may be causing infertility. The test is performed in a laboratory by analyzing various parameters of the semen sample, including sperm count, motility, morphology, and other factors. The results are then interpreted by a specialist to determine if any abnormalities are present.
<urn:uuid:f0440438-df1d-495c-b016-5ccf194a2db1>
CC-MAIN-2023-40
https://healthmagazineonline.com/what-is-sperm-test-semen-analysis-how-is-sperm-test-performed/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.934693
818
3.203125
3
The village of Shaktoolik (shak-TOO-lick) is located on a little spit of land that juts out into the Norton Sound. There is one road that runs through town out to the air strip with houses, two stores, two churches, the school, the power plant, the city well, the clinic and the Armory spread along its sides. No cross roads, just one long main road! Most of the residents are from Inupiaq family lines. The name Shaktoolik means “scattered things.” Early Shaktoolik settlers lived 6 miles up the river from the present village site. Because of storms and high winds, the people relocated to the present site at the mouth of the Shaklootik River. Another story has it that originally the villagers did live out on the spit but after their village burned they decided it was just to windy to rebuild there so they moved inland. After spending one summer with the mosquitoes in the new sheltered area, they decided to move back out on the spit where there was wind to blow the mosquitoes away. In the 1890’s there was a famine in the region. It was thought that reindeer could provide a new source of food and clothing. The government hired herders from Norway and brought them along with animal to Unalakleet and Shaktoolik to teach the Inupiaq Eskimos how to raise, tame, corral, lasso and drive reindeer. The Norwegians even taught the Eskimos how to make cheese using reindeer milk and make clothing from reindeer skins. Twenty years later, five hundred thousand reindeer grazed in western Alaska. A reindeer transportation system was developed. Reindeer were used to deliver mail and haul freight for the military and equipment for the gold miners. Domestic herds used mostly for food exist even today. Handler learned about the Reindeer Project at a Sami Exhibit in the museum at McGrath, Alaska. From Wikipedia, I found out that residents of Shaktoolik live a subsistence life style. They depend on fish, crab, moose, beluga whale, caribou, reindeer, seal, rabbit, geese, cranes ducks, ptarmigan, berries greens and roots for their primary food sources. There are some part time jobs in commercial fishing, education, construction and reindeer herding. The village has a piped water and sewer system that serves two-thirds of the homes. People and cargo arrive in the village either by air or water transportation. The Alex Sookiayak Memorial Airstrip is nearly two miles from the center of the village. Daily flights arrive from Nome. Pam’s Taxi service provides a shuttle between the village and the airstrip. Local travel is by 4-wheeler, motorbike, snowmachine and boat. Fifty students attend classes at the K-12 Shaktoolik School. If asked what they like to do for fun, kids will say they love outdoor activities, hunting and fishing and they enjoy having big bonfires with their friends. Iditarod teams follow the main snowmachine trail from UNK to Shak. From sea level at UNK, the trail rises 1,000 feet to its highest point in the Blueberry Hills. The teams will travel through woods, open areas, sloughs and dunes; over exposed ridge tops and along the barren coastline. Don Bowers tells the mushers in his trail notes to be ready for the Shaktoolik winds. He says if the wind is blowing from the north it can reach hurricane force. That combined with below zero temperatures can drive the windchill to the bottom of the charts. Libby Riddles’ Storm Run in 1985 is perhaps the best know story about the infamous winds and blizzards of Shaktoolik. Departing shaktoolik in a howling blizzard, Riddles left her competition behind. It was a bold move but living and training on the windy coast near Nome, Libby was confident she and her dogs could make it through the storm. She did and became the first woman to win Iditarod. The weather of Shaktoolik is influenced by its location on the Bering Sea, especially during May through October when the sound is ice free. Average summer temperatures range form 47 to 62 degrees. Average winter temperatures range between 4 below to 11 above. The coldest temperature ever recorded in Shaktoolik was 50 degrees BELOW zero. The warmest temperature was 87 degrees. Precipitation averages around 14 inches each with 43 inches of snow. From Shaktoolik, the residents can keep and eye on Besboro Island. Looking at a map, Besboro is the only island in Norton Sound. It seems to be a magical landform. Height, width, color, size and shape change minute to minute, hour to hour and day to day. One of the explanations for these continuous changes is that cold air is trapped near the ice by warm air aloft. The light’s rays are bent as they pass between the two layers of air and a mirage occurs. Tired mushers don’t believe their eyes as Besboro rises, falls and shimmers while they run to the village of Shaktoolik. Well, there you have it – a snapshot of life in Shaktoolik, a peek at Besboro and a few words of warning about the trail. From Shaktoolik, the mushers run across Norton Bay to Koyuk, the northern most Iditarod checkpoint. Stay tuned for that story and remember in everything do your best every day and always have a plan. Born to Run,
<urn:uuid:2e6baa1d-0c21-4940-9296-a84d99433493>
CC-MAIN-2023-40
https://iditarod.com/zuma/virtual-trail-journey-shaktoolik/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.961406
1,174
2.765625
3
There I stood, almost 14 years ago, at a San Francisco airport counter, waiting for the agent to hand me my ticket. The “Today” show had arranged to fly me to New York to tell the world about a story I’d written for an early issue of Mother Jones concerning the 40 percent decline in men’s sperm counts since the 1930s, and the possibility that low-level, everyday exposure to pollutants threatened human reproduction. “Castleman…” the agent murmured, scanning his screen. “Here you are, first class to New York. No, wait. This is strange. Your ticket has just been canceled.” Canceled? I telephoned “Today.” “Sorry,” the producer explained. “We decided not to go with your sperm story. It just isn’t solid enough.” Fourteen years later, the sperm crisis still hasn’t cracked prime time. A few scattered, incomplete reports have appeared here and there over the years–recently in Newsweek and the New York Times–but the major media have not given this story the attention it deserves. Yet it is clear that the alarm Mother Jones sounded in 1982 should be ringing louder than ever. The story has become more disturbing than even the most paranoid environmentalist would have imagined. The sperm crisis turns out to be just one aspect of a bigger environmental crisis that links male fertility problems with the accelerating disappearance of wildlife and the increasing epidemic of breast cancer in women. What could possibly account for such disparate problems? Xenoestrogens–chemicals that look nothing like the female sex hormone estrogen but have similar effects. Some of these estrogen mimics are chemicals environmentalists have opposed for years: PCBs, DDT, and other pesticides and industrial pollutants. But many other chemicals have taken the scientific community by surprise, such as nonylphenol, which is widely used in plastics and that even staunch environmentalists considered benign–at least until recently. Xenoestrogens do their dirty work by breaking a classic tenet of biochemistry: the rule that chemicals that have similar effects have to have a similar molecular structure, because chemicals bind to cellular receptor sites in lock-and-key fashion. But despite a different structure, xenoestrogens are able to bind to estrogen receptors. They are, in effect, female sex hormones in disguise. Sex hormones and their mimics are very potent. Even low-level exposure to xenoestrogens kills sperm. Similar low-level exposure also disrupts wildlife reproduction. Animal studies over the last decade show bizarre reproductive anomalies, including an epidemic of penile malformations among alligators in the Everglades. In the Great Lakes, fish populations have become hermaphroditic, with males developing female genitalia. Studies in England document similar gender-bending changes–all in waterways contaminated with xenoestrogens, some of which are not necessarily pollutants. Finally, as I reported in “Breast Cancer Cover-Up” in Mother Jones (May/June 1994), xenoestrogens also appear to contribute to the breast cancer epidemic. Estrogen has long been known to stimulate the growth of breast tumors. It appears xenoestrogens do as well. I suspect I was dumped from the “Today” show because some producer checked my original Mother Jones article with some researcher who spouted the scientific consensus of the time: There was no sperm crisis; allegations of one were a paranoid’s nightmare. Back then, scientists had plausible comebacks for every discovery that pointed to a decline in male fertility. Yes, many studies showed plummeting sperm counts, but several did not. Sure, a Florida State chemistry professor had discovered sperm-killing pollutants (PCBs and other toxic chemicals) in the semen of students with low sperm counts, but without corroboration, that lone study meant nothing. Yes, clusters of sterility had turned up in men working in pesticide plants, but the men’s sperm counts returned to normal after additional factory safeguards reduced their chemical exposure. Sperm-crisis skeptics insisted that the alleged sperm decline was a meaningless fluke caused by changes in men’s underwear and sperm-counting techniques. The reference to the change in underwear pertained to the trend away from boxer shorts to jockey shorts. Jockey shorts hold the testicles unnaturally close to the body, warming sperm (which die by the thousands when heated). If underwear were not responsible, argued the skeptics, then changes in counting techniques surely were. Researchers in the 1930s had counted sperm manually; by the 1970s, counts had become computerized. But since “Today” canceled my ticket, the sperm crisis has become undeniable. During the 1980s, a New York urologist tested the notion that tight-fitting underwear lowered sperm counts. His conclusion: Men who wear jockey shorts have the same sperm count as men who wear boxers. Then, in 1992, Danish scientists confirmed that men’s average sperm count has declined 42 percent since 1940. The University of Copenhagen researchers analyzed 61 sperm-count studies from a 50-year period, the largest review ever, and excluded those that used computerized counts. Since the Danish report, two more studies have shown a decline in men’s sperm counts. Meanwhile, the sperm-crisis story has taken an ominous turn. Until a few years ago, researchers knew of no link between the sperm crisis, wildlife feminization, and the breast cancer epidemic. Then, independently, various researchers began focusing on xenoestrogens, and the connection became clear. The world is rapidly becoming an estrogen bath, and as living things soak in it, they all fall victim to estrogenic effects. The case against xenoestrogens is slowly going mainstream. Recently, the Journal of the American Medical Association published a comprehensive article that sounded a warning about the estrogen hazard. At the same time, a small but vocal group of scientists is calling for hormonal screening of all chemicals in wide use, with rapid phaseout of those shown to be most estrogenic. Unfortunately, given the mood in Washington, any phaseout seems unlikely. The xenoestrogen peril is not yet front-page news, but it would come as no surprise to Rachel Carson, the early environmentalist who in 1962 first pointed an accusing finger at DDT. Today we recoil from DDT and other toxic chemicals because they are proven or suspected carcinogens. But 34 years ago, when Carson published her landmark book, Silent Spring, she focused not on cancer, but on the fact that DDT disrupted songbird reproduction, decimating their numbers (hence the title, Silent Spring). Apologists for the chemical industry dismissed her as a nut, just as they continue to insist that all’s well with human and animal reproduction. But today we know that DDT represents just the tip of a massive, worldwide xenoestrogenic iceberg, and that all the world’s animal species are on board a figurative Titanic heading right for it. Michael Castleman is a contributing writer to Mother Jones. His most recent article, “To Hell With Harvard,” covering breast cancer research, appeared in the Nov./Dec. 1995 issue. His latest book, Nature’s Cures, is being published this month by Rodale Books.
<urn:uuid:ee44e181-b643-4bc4-b20a-bd1c5ee0ec1c>
CC-MAIN-2023-40
https://practice.motherjones.com/politics/1996/01/down-count/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.955874
1,514
2.515625
3
How Much Does a 12kW Solar System Produce? A 12kW solar system can power almost anything in your house, but exactly how much power can such a system produce? Join us as we calculate and help you answer that question. Before we can begin to figure out how much power a 12kW or a slightly smaller 10kW solar system can produce, we need to understand kW hours in general. Factors that Determine Solar Panel Output We need to understand a few key factors before we can determine how much power a 12kW solar system produces. These factors also let us know what a 5kW solar system can run or any other smaller system. Shading and Irradiance The location of your solar system and its surroundings affect what appliances a 12kW system or a smaller 5kW solar system can run. If your solar panels are blocked by trees or buildings and spend most of their time in the shade, you won’t have an efficient solar system. Irradiance can be determined by looking at an online solar map. This allows you to determine how many sun hours you are receiving per day. if you’re in an area that doesn’t receive a lot of sunlight, your system won’t reach its full potential. This also means that certain weather and climate conditions such as heavy snowfall and harsh storms will cause a drop in performance. The worst-case scenario is that these weather conditions end up damaging or breaking your solar panels. The Tilt Angle Orientation is key when it comes to achieving the best solar results. If you want the best performance, your solar panels should face towards the south. Your solar installation team will recommend orientations based on where you reside as well as where you want the panels to be installed. The tilt of the solar panel however remains constant throughout any placement. You want to ensure that the angle of your solar panels sits anywhere between 30 and 45 degrees. If you have a flat roof, you’re going to need brackets so that your panels can stand and be slanted at the right angle. You also want to ensure that your roof is well-maintained and reinforced to withstand the weight of solar panels. Some other factors that play a role in decreasing solar efficiency are the type of solar panel you’re using and whether or not you have all the components needed in a system. Monocrystalline solar panels are more efficient than polycrystalline and thin film solar panels so you want to ensure that these are the ones in your system. As for the components, you want to have all the necessary components of a solar system. Outside of the solar panel, you should have inverters, resistors, a solar generator or battery, and good wiring. How to Calculate Solar Panel Output There are two ways to figure out how much a 12kW solar system produces. The first is using national average amounts and the second is through manual calculations. The national daily power usage in the states is around 30kWh. The first step is to take this value and divide it by the irradiance value from earlier. Let’s say you receive around 5 peak sun hours per day. So, if we take 30kWh and divide it by the 5 sun hours, we’re left with a value representing the amount of KW needed in your household. In this example, you would need 6kW, but today, we’re working with a 12kW system. The modern solar panel produces around 250W of power during peak conditions, but as we stated before, certain factors prevent that number from being the true output amount. The power in your home that’s being supplied to appliances is AC, but solar panels produce direct current (DC). During the conversion process that occurs in your solar system, almost 80% of that power is lost. So, if we have our 12kW system and divide it by 80%, we get 15kW of DC power. Based on average amounts, you can determine anything from how much a 75kw solar system produces to what exactly such a system can power. Number of Panels To figure out how many solar panels we need, we take the DC amount of 15kW and divide it by the solar panel’s rating. If we’re using 200W solar panels in our 12kW solar system, we get 75 panels. This means our 12kW solar system contains 75 200W solar panels within it. If we have a 12kW system, that receives around 5 hours of sun per day, for 365 days, we get around 17,500kWh of energy per year. Divide this value by 12, and your 12kW system produces nearly 1,460kWh every month. If you want to know how much power a 3kW solar system produces, you can use the same method to figure it out. Considering you’re still using 200W solar panels, you end up with a system producing 6,850KWH every year. This law states that the voltage of a system is equal to the current multiple by the resistance. We also use the wattage, which equates to the current of a system multiplied by the voltage. In our 12kW solar system, we’re going to assume that it’s made up of multiple 200W solar panels. A panel reaches peak power when connected to a certain value of the resistive load. You want to ensure that the resistor hooked up to your system is significantly higher than the solar panel. Resistors for such a system are typically the wire wound 15kW braking resistors. These are measured at around 10,000 ohms. If you want to know how much power a 7kW solar system produces per day, you can use a smaller resistor. Connecting a volt meter across the resistor in the system, and in direct sunlight, you should get a reading of no more than 100V. If we want to calculate the current we would take the voltage of 100 and divide it by the resistor's measurement of 10,000. All these values are interchangeable and the calculations can become complicated if you aren’t keen on mathematics. However, whichever path you choose, you end up with the same or similar value. Did You Find Our Blog Helpful? Then Consider Checking: - How Much Power Does a 45 Kw Solar System Produce - How Much Electricity Does a 4kw Solar System Produce - How Much Power Does a 15kw Solar System Produce - How Much Energy Does a 6kw Solar System Produce - How Much Does an 8kw Solar System Produce - Solar Battery Storage System Cost - Add Battery to Solar System - Should I Get a Battery with My Solar System - Solar Power System - Cost of Off Grid Solar System - Off Grid Solar System Components - Solar Heating System - Solar Systems for Cabins - Average Residential Solar System Size - Solar System Air Conditioner
<urn:uuid:a3d12c50-4b04-42d7-a9a9-8c6ce3a32f44>
CC-MAIN-2023-40
https://shopsolarkits.com/blogs/learning-center/how-much-does-a-12kw-solar-system-produce
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.92131
1,485
2.890625
3
In 2019, Prof Michael Shaver was invited to give the keynote talk for the Innovation Zone at the Greater Manchester Green Summit hosted by Mayor Andy Burnham. As a leading expert in polymer science, Prof Shaver called on Greater Manchester to provide the vision to solve the global problem of plastic waste. He highlighted the need for economic reform to help solve plastics pollution alongside new polymer development and the need to recover value from waste rather than demonizing all plastics use. Professor Michael Shaver outlined the scale of the issue, with 40 billion tons of plastic waste projected to be in the Earth’s system by 2050. To address this threat, a change is needed in public attitudes to plastics, in waste management processes, and in the design of new ‘smarter’ materials. With materials innovation at The University of Manchester and a major policy commitment across the region to deal with plastic waste, Professor Shaver commented that Greater Manchester is well-positioned to provide a sustainability model for others to follow: One of the major problems we have is not valuing plastic materials, and throwing them away as waste. In the past couple of years we have a welcome change of language. From going ‘plastic free’ – which, for example, would double food waste and quadruple packaging waste – we’re now talking about better materials, and the smarter use of materials. We need to focus on the different types and use of plastic – to look at what we can biodegrade, reuse, and recycle. Plastics are often in many hidden product components – and the way we treat each one requires optimization. As scientists we are working on new materials to support this, but we need to think broadly. The Greater Manchester Green Summit was hosted on 25 March 2019 and was used to launch Greater Manchester’s Five-Year Environment Plan. The plan was the result of 12-months’ consultation and collaboration with all parts of the Greater Manchester family. Click here to find out more about the event. Sustainability Workshop for Art Packaging Hear about the latest news, opinions and activities from the SMI Hub
<urn:uuid:10b092fc-7148-4a92-bdb2-40d791035a28>
CC-MAIN-2023-40
https://smihub.ac.uk/resource/prof-michael-shaver-calls-on-greater-manchester-to-provide-vision-for-global-sustainable-plastics-debate-at-green-summit-2019/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.938614
435
2.65625
3
Caitie is sharing tips for using the preschool song”Old MacDonald Had A Farm” in the classroom and at home for lots of fun learning with little ones. She has lots of great ideas! And she’ll lead us through the song using gestures – an excellent way to introduce a song to children. Our version of “Old MacDonald Had A Farm” is a fun cumulative song that asks the listener to connect the sound to the animal on the farm. Try these ideas in the classroom or at home! - Our cumulative version of this classic song is really fun to sing along to but can be a bit tricky for young learners. To help make it easier for students trying to follow along, use images of each animal and place them on the board as they are introduced in the song. That way, students can see what animal is next and they can focus more on making the animal sound. - Before you sing the song go over all the farm animals using flashcards. Ask your students what sound that animal makes and practice making the sounds altogether. Then they’ll be ready and confident to sing along and have fun with the animal sounds. - Our version includes the farm animals pig, duck, horse, sheep, cow, and turkey, but there are many other animals that also can be found on farms. Try singing this song without the music and add in other animals. - Try singing this song in a circle and let each student take a turn picking an animal to add to the song. - You can also group your students together and assign them an animal. They can dress up as the animal or hold up a drawing to represent the group. Each group is responsible for making their animal’s sound in the song. - This is a great song to sing during a theme about farms and farm animals. You can pair this song with other farm songs like The Farmer In The Dell, The Animals On The Farm, and Who Took The Cookie (On The Farm) version. - You can also bring the song to life with our Old MacDonald Had A Farm – Dancing Farm Animals Craft! - Make a fun farm sensory bin with some simple toys and sensory material. Put some sensory material, like corn kernels, into a large bin along with some farm toys or cutouts. Toy farm animals, toy tractors, and a painted cardboard box for a barn make great additions to a farm sensory bin. Allow your little ones to explore the bin and see what kind of imaginary play they can come up with! You can play the song in the background and encourage them to act it out with the items in the bin.
<urn:uuid:a330902a-ec98-41ed-b6c8-de6f849e6440>
CC-MAIN-2023-40
https://supersimple.com/how-to-teach-super-simple-songs/how-to-teach-old-macdonald-had-a-farm/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.946467
541
3.609375
4
Promising a new, transparent, scientifically rigorous look at UFOs, NASA said Thursday it had appointed a director of research on the subject — and then kept the director’s name secret for nearly seven hours. The new position is part of NASA’s response to recommendations made by an independent study group convened by the agency. The panel looked at how to better gather and study information about “unidentified anomalous phenomena,” or UAP – the modern term for UFOs. The panel report, released Thursday, doesn’t attempt to provide a definitive answer on whether galaxy-trotting extraterrestrials have zipped through Earth’s skies. But it suggests a bigger role for NASA in tackling the question. “NASA will make this very clear,” Bill Nelson, NASA’s administrator, said at a news conference Thursday morning at the agency’s headquarters in Washington, DC, discussing the report. During the news conference, Mr. Nelson first talked about NASA’s Perseverance rover on Mars, which is collecting rock samples that may contain hints of life that lived there billions of years ago. Then he turned to the James Webb Space Telescope, which was studying planets around distant stars for clues that they might be inhabited or even inhabited by life. UAP’s work, he said, follows a similar desire to learn about the possibilities of life elsewhere in the universe. “This is the first time that NASA has taken concrete action to take a serious look at UAP.” said mr. Nelson. Nicola Fox, the associate administrator for NASA’s science mission directorate, said the person serving as the new UAP research director has been in that role “for a while now,” but declined to be identified. “We will not give his name,” he said. On Thursday night, the agency identified the director as Mark McInerney in an updated news release. He previously served as NASA’s liaison to the Defense Department for UAP issues. In the news release, NASA said he also worked in various positions at NASA’s Goddard Space Flight Center in Maryland, the National Oceanic and Atmospheric Administration and the National Hurricane Center. In a post on Xthe social network formerly known as Twitter, writes Dr. Fox, “As we continue to dig into the study team’s report and findings, treat him with respect in this very important role to help us better scientifically understand UAP” NASA officials said that part of the reason for the initial secrecy of Mr. McInerney was the harassment experienced during the study by some of the 16 members of the independent panel, which included university professors, space industry officials and a science journalist. “Some of them have actually risen to actual threats,” said Daniel Evans, assistant deputy associate administrator for research in NASA’s science mission directorate. “And yes, that’s part of why we don’t say our new director’s name there, because science has to be free.” The federal government’s knowledge of UAPs has recently been the subject of proposed federal legislation. At a House oversight subcommittee hearing in July, lawmakers questioned a former intelligence official who claimed knowledge of the government’s cover-up of extraterrestrial technology. UAPs often appear to be innocuous objects, like weather balloons. Most experts consider alien spacecraft an unlikely explanation for any of the events. But it is possible that some of those observed may be undiscovered atmospheric phenomena or tests of advanced weapons systems. “One of the main goals of what we’re trying to do here now is to move speculation and conspiracy toward science and sanity,” said Dr. Evans. “And you do that with data.” The panel recommended that NASA use its Earth observing instruments to collect environmental data to coincide with the UAP reports and enlist members of the public to transmit a wider range of observations, perhaps through a smartphone app. “It always comes back to the data you feed into your analysis,” said David Spergel, an astrophysicist who is president of the Simons Foundation and served as chair of the UAP panel. “If you don’t have good data, you can’t learn things.” Smartphones can take sharp pictures, record specific locations, magnetic fields and record sounds. “There’s a lot of data that a cellphone captures,” said Dr. Spergel. “If you see something you don’t understand, collect data. We aggregate the data and we learn from it.” Greater data collection could also reduce the stigma and stigma that many people fear if they talk about something they’ve seen. “Stigma has limited reporting by pilots, both civilian and military,” said Dr. Spergel. The panel also suggested using sophisticated computer algorithms, including artificial intelligence and machine learning, to look for subtle patterns in UAP reports that could help identify underlying phenomena. Some of the inquiries veered towards the strange and surreal. A journalist asked about the ufologist who on Tuesday showed the Mexican Congress what he described as two corpses of aliens. “Has NASA been in contact with Mexican authorities regarding the rather gruesome revelations earlier this week of two alleged non-human corpses?” said the journalist. “And what, if any, significance do you attach to these discoveries?” Dr. answered. Spergel, “It’s something I know I just saw on Twitter.” He provided analogies of the moon rocks collected by NASA during the Apollo moon landing 50 years ago, which are available for study to scientists around the world. “If you have something unusual, make samples available to the scientific community and we’ll see what’s there,” said Dr. Spergel. The UAP study was announced in June last year by Thomas Zurbuchen, then the associate administrator of the science mission directorate. said Dr. Zurbuchen that the analysis of UFO reports may be “high-risk, high-impact type of research,” possibly turning up some completely new scientific phenomenon, or possibly nothing new or interesting. At a public hearing in May, the panel tried to explain some of the material that has gripped the public. It uses some (it’s a bit confusing) high school geometry to explain how the object was captured in a video by a Navy plane in 2015, known as “HURRY UP” is not moving fast but only at 40 miles per hour by illustrating how the vantage point on an object can be a visual trick.
<urn:uuid:dddae055-1275-4403-8b81-67c1e3d89052>
CC-MAIN-2023-40
https://theglobeherald.com/nasa-ufo-report-what-the-uap-study-does-and-doesnt-say/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.950726
1,410
3.015625
3
KYB and KYC are both methods used to verify a client’s identity before they do business. Both require critical information about the individual and the business. The information required varies depending on the method used. Both methods help companies identify a person’s identity and protect their interests. Despite differences in approach, they are both equally important for protecting a company’s interests. Here are some key differences between the two. KYB refers to a process that identifies and verifies a company’s legal representative before providing a service. KYB is often used to reduce fraud and increase trust. In the world of fintech, KYB is an essential tool to protect a company. However, it is not only important for the fintech industry. Any business needs to ensure its clients are safe and protected. KYB can be implemented to prevent financial fraud and protect any business. While KYC requires financial institutions to verify the identity of all parties, businesses may not have beneficial owners who are required to be listed. Because there is no obligation to verify the identities of unreported or unidentified beneficial owners, certain businesses are exempted from KYB requirements. KYB checks help financial institutions and other regulated organizations monitor their risk. But they require a higher volume of data than KYB. Routable, for example, requires clients to complete a KYC verification process. This is a standard procedure, aimed at simplifying the process and protecting all parties. It requires clients to provide basic documents and upload information. Fintechs also need to perform KYC verification to protect themselves from exposing themselves to the risk of money laundering. KYB requirements vary from country to country. But, in general, KYB is mandatory for financial services.
<urn:uuid:3c7c61b5-851e-4779-bc59-7a08a7c755cc>
CC-MAIN-2023-40
https://wordblog.info/kyb-vs-kyc-whats-the-difference/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.936383
354
2.671875
3
The Federal Reserve Board of Governors is a body that oversees the nation’s banking system and bank holding companies. It is also charged with conducting research on domestic and international financial developments. Its main functions include regulation of the Federal Reserve Banks, the nation’s payments system, and consumer credit protection laws. The Fed chair is an executive officer who oversees the board’s day-to-day operations. He or she also serves as a spokesperson for the Federal Reserve and negotiates with the president, Congress, and other members of the executive branch. In some cases, the Fed’s chairman is given authority to make policy decisions that do not require approval by the President. Nevertheless, the President can speak out about the direction of the Fed. The Fed chair is an active executive who reports to Congress twice a year. However, he or she does not have the power to remove or appoint a member of the Fed. This means that the President can appoint someone to fill a vacant seat on the Board. Occasionally, someone from a previous administration will be appointed to fill that spot. During the Obama years, the Fed became known for economic stimulus measures. Its quantitative easing program helped alleviate the housing crisis, and the Fed acted as a lender to commercial banks. But, inflation had fallen well below the Fed’s target. In his first year on the Board, Powell echoed the recommendations of Janet Yellen, a former Yale University economist and White House advisor. She argued that the Fed should raise short-term interest rates and fight inflation. Initially, Powell followed Yellen’s recommendation of raising rates slowly. However, Yellen’s policy was criticized by Donald Trump in the 2016 campaign. At the same time, the Fed’s chairman also faced criticism from Senator Elizabeth Warren, who said that the tools the Fed uses are painful. While Yellen is a good Fed chair, she has yet to be reappointed by the current President. Instead, President Trump has appointed Jerome Hayden “Jay” Powell. Despite some criticism, he has been confirmed as the Federal Reserve’s chair. His term will end in 2022. Unlike Yellen, who is not an ivory-tower economist, Powell is a data-driven individual who is viewed as a centrist. Earlier in his tenure, he worked as an under secretary of finance in the Treasury Department of George H.W. Bush. Before that, he served as a visiting scholar at the Bipartisan Policy Center. As a result, he is better suited for overseeing the Fed’s balance sheet unwinding. Currently, the Federal Reserve has $4.5 trillion in assets. It is expected that the Fed will soon begin to unwind its balance sheet, allowing more money to be put into the financial system. When that happens, it will impact the paychecks of millions of Americans. According to Federal Reserve officials, the central bank’s role is to keep inflation stable and maintain the economy’s 2 percent annual growth rate. This is a complex task that requires the Fed to do several things. For example, it can purchase bonds to reduce the cost of borrowing. It can also set the discount rate, which is a way to increase the money supply.
<urn:uuid:afaac778-dba3-4dd5-b59f-2c9cf60ebcd8>
CC-MAIN-2023-40
https://www.550events.com/2023/01/09/the-fed-board-of-governors-and-jerome-powell/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.971017
665
2.6875
3
Friday 8th September Welcome to the year 1 Blog! The children have made a brilliant start to year 1 and settled in amazingly. They have all worked really hard, even with the VERY hot weather! This week in year 1 we have started our new power of reading book - Beegu. The children have been imagining the planet that Beegu has come from and how it must feel to be in a new place. In maths we have been learning to count objects accurately and use cubes and ten frames to show our numbers. We have had both indoor and outdoor PE this week. The children are doing gymnastics in the hall, thinking about how they can travel on different pieces of equipment. In outdoor PE we are practising our throwing and catching skills. During Art, all the children had to follow some difficult instructions to make their own view finders, which they managed brilliantly and then think about the different textures that they can see and feel in the outside world. All the teachers this week have said that the children have managed the transition from reception to year 1 fantastically.
<urn:uuid:07295ede-cdf0-4f84-8773-76904ac29197>
CC-MAIN-2023-40
https://www.buckdenacademy.org/blog/?pid=59&nid=98&storyid=2213
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.980834
221
2.625
3
Brian Cooley, a HAM radio operator who lives in Central Marin, guided a group of NRG volunteers through the basics of using a handheld two-way radio. Communication is essential after disasters, so having and knowing how to use these radios is one way Block Captains can better respond to disasters affecting their neighborhoods. After making sure their households are safe, Block Captains will survey their neighborhood to make sure everyone is safe and uninjured. They can use handheld radios to report their findings to a local Command Post (staffed by volunteers). This video captures the basics of how the radio works and the guidelines for creating concise messages. Watch the recording below to find out more!
<urn:uuid:4736ac1a-beab-4afb-8f05-edd256d5cd4e>
CC-MAIN-2023-40
https://www.nrgmarin.org/post/radio-basics-for-block-captains
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.953317
137
2.71875
3
A fruit that doesn't look great but is full of important nutrients"! Yes, we're talking about the bael fruit, or bilwa in Hindi. It is a fruit that grows on the bael tree. It is sweet and smells good. In India, Bael, which is also known as the Tree of Lord Shiva, is a holy place. Bael, also called wood apple or Aegle marmelos, is a middle-sized tree with thin branches and pale brown bark that often leaks gum that can be eaten. It is also a very important medicinal plant that has been used for many years. The root, leaf, stem, fruit, and seeds of bael can all be used to treat different diseases. The unripe fruits are greenish-gray, and when they are ready to eat, the woody outside turns yellow. What is bael? The wood apple, or Bael, is also called Bilva in Sanskrit, Bilva Pazham in Tamil, Bilva or Maredu Phalam in Telugu, and Bengal Quince. It is native to India, Malaysia, Thailand, Sri Lanka, and other Southeast Asian countries. Aegle marmelos, which is the scientific name for bael, is a medium-sized tree with thin branches and pale brown bark that often leaks a gum that can be eaten. The leaves of bael are unusual in that they have three leaflets. This means that each leaf has between four and twelve pairs of side veins that meet at the edge. The Bael fruit is round and hard on the outside, so it doesn't split open when it's ripe. When they are raw, the fruits have a greenish-gray colour, but when they are ripe, the woody outside turns yellow. When the fruit is ripe, it has an aromatic pulp with about 10 to 15 seeds in a sac made of natural glue. The wood of the tree is yellow-white and hard, but it doesn't last long. The trees grow slowly and have strong spines and leaves with three leaflets that grow in pairs. The white flowers have a sweet smell and grow in clusters called panicles. Sometimes, the flowers are used to make perfumes. The fruit is pear-shaped or oblong and has a diameter of 2–10 inches (5–25 cm). It has a hard, woody, grey or yellow rind and a sweet, thick, orange-colored pulp. Usually, the bael fruit is between 5 and 12 cm across. It is round or slightly pear-shaped and has a thick, hard rind. When it ripens, it doesn't split. The smooth, green, woody shell is grey until it is fully ripe, at which point it turns yellow. Inside are 8 to 15 or 20 sections filled with fragrant orange pulp. Each section has 6 to 10 flattened, oval seeds that are about 1 cm long, have woolly hairs, and are wrapped in a clear, sticky sack that hardens when it dries. The exact number of seeds varies from one book to the next. It takes about 11 months to ripen on the tree, and some of them are even bigger than a large grapefruit or pomelo. The shell is so hard that you need a hammer or machete to break it. Nutritional value of bael: Vitamins – vitamin C, vitamin B-complex, beta carotene, Minerals – potassium, magnesium, , calcium, zinc, copper, and iron Religious significance of bael: Hindu scriptures also have a lot to say about the Bael tree. People thought that Lord Maha Shiva liked this tree best. The Rig Veda made a special note of how good it was, and people also thought that Goddess Lakshmi lived there to bring wealth and prosperity. When people pray to Lord Shiva, they use bilva leaves and fruits a lot. How to use bael fruit in daily diet? If you want to eat these hard-skinned fruits every day, homemade bael sharbat is the best way to do it. On a hot day, this sherbet is popular in the Indian states of Odisha and West Bengal. It is a quick way to cool down and wake up. Bael fruits don't split open even after getting ripened. Try to break the shell of a pale yellow, sweet-smelling fruit with something hard. To make this easy sherbat, just scoop out the pulp. How to eat bael fruit? You can eat the fruits right off the trees or after they have been dried and turned into candy, toffee, pulp powder, or nectar. If the juice is fresh, it is strained and sweetened to make something like lemonade. It can be turned into a drink called sharbat or Bela pana. In Odisha, fresh cheese, milk, water, fruit pulp, sugar, crushed black pepper, and ice are used to make Bela Pana. The pulp, water, sugar, and citron juice are mixed together, left to sit for a few hours, strained, and served over ice to make the drink bel pana. Five or six litres of sharbat can be made from a large bael fruit. If the fruit is going to be dried, it is usually cut up and put out in the sun to dry. The hard pieces of leather are then put in water. People eat the leaves and small shoots in salads. Bael fruits are good for your diet, and the pulp of the fruit is used to make tasty foods like murabba, puddings, and juices. Health benefits of bael - Bael for Cholera and Diarrhoea: Bael has properties that kill bacteria and parasites, and it also has tannins, which help fight the infection called shigellosis, which causes diarrhoea and is used to treat cholera. Studies show that cholera and diarrhoea were cured in people who ate ripe Bael in the form of juice or just the pulp. - Bael for Diabetes: The bark and branches of the bael tree contain a substance called "Feronia gum," which has been shown to help control diabetes. It controls how much insulin is released from cells into the blood, and the low glycemic index of bael keeps the blood sugar level steady. People with diabetes have found it helpful to drink a glass of Bael juice every morning, but not on an empty stomach. - Bael for Digestive Problems and Constipation: Because it is antibacterial and antifungal, bael is a good fruit for treating many digestive problems. People with stomach ulcers are told to use it because its leaves have a lot of tannin, which reduces inflammation. Bael's laxative properties help clean the intestines and keep people from getting constipated. People with constipation have found that drinking Bael juice with a pinch of salt and pepper every day helps a lot. - Bael for Scurvy: Scurvy is a disease that happens when your body doesn't have enough Vitamin C. It makes your arms and legs hurt and makes you feel weak. People with a lack of vitamin C are lucky that Bael is full of vitamin C because it helps them get better quickly. - Bael for Earaches: This is one of the lesser-known benefits of Bael, but it is very important for getting good results. Bael's antibacterial properties help treat infections and get rid of hardened wax in the ear, which keeps hearing problems from happening. - Bael for Skin Problems: Because Bael has antibacterial properties, it is very good at fighting skin infections, curing many skin disorders, and improving the health of the skin. - Bael to Cleanse the Blood: Bael is also very important for lowering the amount of cholesterol in the blood. It can be used to treat problems with the heart, liver, and kidneys. Because it has a lot of potassium, it cleans the blood, gets rid of toxins, and boosts the body's immunity. - Bael for the Heart: Since Bael is a natural antioxidant and a heart-protecting fruit, it has been found to be good for the heart and to help treat a wide range of heart problems. It not only makes the heart muscles stronger, but it also lowers the amount of cholesterol in the blood and stops lipids from building up. This lowers the risk of atherosclerosis, heart blocks, heart attacks, blood clots, etc. - Bael for Respiratory Problems: Because it is anti-inflammatory, anti-bacterial, and anti-asthmatic, bael is a very important medicine for treating cold, cough, and flu symptoms. It also thins and loosens rheum deposits in the chest and nose, making it easier to breathe and helping the body get rid of mucus. It can also help treat bronchitis and asthma. - Bael for Hair: Bael has been a blessing for hair growth since ancient times, and it's also good for your health as a whole. Because the plant is anti-microbial, it can treat infections of the scalp and hair, such as folliculitis, itching, and dandruff. It gives the hair follicles the nutrients they need, increases blood flow, and makes the hair stronger from the roots up. By making the stress hormone come out at a normal rate, it also stops hair loss and breakage caused by stress and anxiety. - Bael for Breastfeeding: If you take bael or any of its different forms every day, it helps your body make more prolactin and corticoids. This causes galactagogue action, which improves lactation and the quality of breast milk. This is very good for the children because breast milk is the best food for them and helps their immune systems get stronger. To improve galactagogue action, eat bael juice with dry ginger powder and a pinch of jaggery.
<urn:uuid:57114459-e348-4261-ac19-83a7add6f535>
CC-MAIN-2023-40
https://www.potsandpans.in/blogs/articles/bael-health-benefits-uses-and-important-facts
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00640.warc.gz
en
0.958197
2,093
2.96875
3
Rwanda has moved a step closer towards harnessing the benefits of modern biotechnology following the introduction of a draft biosafety law. The Cabinet approved the law on 13th July 2023 and has since been tabled in Parliament for scrutiny before it is passed as a new law. The draft law provides a framework for ensuring safe and sustainable use of genetically modified organisms (GMO). The law establishes a National Biosafety Committee whose mandate is to review GMO applications and advise Rwanda Environment Management Authority. Institutional Biosafety Committees will regulate contained use and confined field trials of GMO activities. The Government is banking on modern biotechnology to contribute towards attainment of Rwanda Vision 2050 that aims at ensuring high quality standards of living for all Rwandans while targeting attainment of upper middle-income country status by 2035 and high income status by 2050. The law, once approved, will be an important instrument in ensuring the Government utilizes this technology to achieve its goal. Currently Rwanda is conducting confined field trials for a GMO cassava resistant to cassava brown streak virus disease (CBSD), a vicious disease that threatens production of this crop. Cassava is a staple for most communities in the country and the rest of sub-Saharan Africa. Click here to access the Draft Biosafety Law
<urn:uuid:307889fd-34da-487d-a646-9df4aaf559f4>
CC-MAIN-2023-40
https://africenter.isaaa.org/rwanda-approves-draft-biosafety-law/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.914314
259
2.6875
3
Objectives: This paper illustrates the preventive and minimal intervention dentistry (MI) concepts with examples from cariology, but the philosophy is much wider and should have an impact across all dental specialties and the entire undergraduate curriculum. Collaboration between researchers, educators and clinical dentists is very important for the continuing improvement of dentistry. Methods: This paper considers the potential of preventive dentistry and "MI Dentistry" and then outlines a modern core cariology curriculum recently developed for use across Europe. Related initiatives from the ICDAS Foundation's ICCMS (TM) (International Caries Classification and Management System), the International Association for Dental Research and the Alliance for a Cavity Free Future (ACFF) are also outlined. Conclusions: Preventive and minimal intervention dentistry are important topics, both for the present and increasingly for the future. (C) 2011 Published by Elsevier Ltd. - Minimally invasive dentistry - Dental caries
<urn:uuid:60ac0d4e-ebc2-493c-89c2-c0bb65ac66f4>
CC-MAIN-2023-40
https://discovery.dundee.ac.uk/en/publications/preventive-and-minimal-intervention-dentistry-in-the-undergraduat
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.901361
210
3.15625
3
A unique type of helium that can flow without being affected by friction has helped a KAUST team better understand the transformation of rapidly moving liquids into tiny droplets. Everyday occurrences, such as taking a shower or turning on the kitchen faucet, involve an intriguing physical phenomenon known as jet breakup. When a liquid exits a nozzle and encounters something it cannot immediately mix into—a gas, for example—it forms a cylinder. Quickly, small surface perturbations and various forces cause the liquid tube to break apart into droplets. The entire cylinder either pinches off into droplets one at a time at the tip, takes on a wavy or corkscrew-like structure, or atomizes into a fine spray. Since the late 1800s, researchers have tried to understand and predict the behavior of jet breakups using classical theories of viscosity, aerodynamics and surface tension. However, many earlier studies present conflicting evidence about where to draw the line between different breakup modes—a problem that could impact manufacturers looking to optimize spray technologies. “Engineers are interested in knowing the size and direction of the droplets formed and how far from the nozzle the jet stays intact,” notes Nathan Speirs, a researcher in Sigurdur Thoroddsen’s lab at KAUST. “There’s so much variety in the ways liquid jets break up.” To update this field for the 21st century, the Thoroddsen group collaborated with researchers at the University of California, Irvine, to build a device capable of reaching temperatures near absolute zero with windows for viewing with high-speed cameras. At these chilly depths, liquid helium can take on a range of different behaviors, including as a frictionless superfluid. The experimental setup is tricky to work with because “when liquid helium becomes superfluid, the absence of viscosity allows it to escape from the tiniest of imperfections, which we call superleaks,” says Kenneth Langley, another member of Thoroddsen’s team. “We have to be very careful when closing the cell, and once it’s shut, there’s no way to adjust what’s inside.” The detailed images produced using the new low-temperature device enabled the KAUST team to precisely quantify jet breakup regimes and identify physical factors overlooked by previous studies. “Our results show that the gas and liquid flows are equally important in the interface region, an idea neglected by most other studies,” says Speirs. “The irregular shapes of the droplets formed are quite interesting as well, and we hope to analyze them in more detail,” adds Langley. - Speirs, N.B., Langley, K.R., Taborek, P. & Thoroddsen, S.T. Jet breakup in superfluid and normal liquid 4He. Physical Review Fluids 5, 044001 (2020).| article You might also like Squeezing more from carbon dioxide Applied Mathematics and Computational Sciences Balancing renewable energy systems in Saudi buildings Droplets reach lift-off Laser imaging helps clean fuels live up to their reputation Smarter sensor sniffs out target gases Carbon nanochemistry written in the stars Blending a renewable fuel
<urn:uuid:bd10ba60-95b8-4857-bb52-ed8ab900288a>
CC-MAIN-2023-40
https://discovery.kaust.edu.sa/en/article/6372/slippery-superfluids-push-jets-to-breaking-point/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.913736
716
4
4
The victims of the Holodomor were commemorated in Brussels A liturgy and memorial service for the Holodomor victims took place on November 21 in the center of Brussels in the Cathedral of Saints Michael and Hudula. Attendees remembered and prayed for the souls of millions of Ukrainians who died as a result of a mass man-made famine organized by the communist regime in Ukraine in 1932-1933, Ukrinform reports. The Holodomor was caused by purposeful measures of the Soviet authorities aimed at the physical destruction of the “bourgeois” Ukrainian peasantry, the suppression of any resistance, and the national liberation movement. There was a blockade of villages and entire districts, where people died of starvation. At the same time, the Soviet government had large reserves of grain and sent it for export. As a result of these violent measures, as the complex forensic examinations established, 10 million 500 thousand Ukrainians died. During the service in the Cathedral of St. Michael and St. Hudula, those present remembered these horrific events, which should never happen again, and commemorated the victims. “Days like today are important to remember these events,” during the liturgy it was said. – Our commemorations make sense because they teach us that evil can never have the last word. May this remembrance also strengthen our prayer that this may never happen again in our history.” At the same time, the trident, which was laid out from lamps on the stairs in front of the church, as a reminder to the world of the tragedy suffered by Ukrainians, drew the attention of the passers-by outside.
<urn:uuid:1d820571-5f8e-4f66-a39f-7c62d02ac8eb>
CC-MAIN-2023-40
https://holodomormuseum.org.ua/en/news/the-victims-of-the-holodomor-were-commemorated-in-brussels/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.970609
338
3.25
3
U.S. GLOBAL MAGNITSKY SANCTIONS The best-known of the United States government’s (USG) targeted sanctions tools to address human rights abuse and corruption is the Global Magnitsky (GloMag) sanctions program. Although inspired by and named for Russian whistleblower Sergei Magnitsky, the program has worldwide applicability. Its flexible criteria and its mandate for consultation with civil society make it an attractive tool for NGOs recommending sanctions. However, the USG often defaults to using country-specific sanctions programs for human rights abuses and corruption instead of GloMag, when such a program exists. Congress passed the original Magnitsky Act in 2012 in response to the death in custody of Russian tax advisor Sergei Magnitsky, who had uncovered a major tax fraud conspiracy. The Magnitsky Act authorized U.S. sanctions against Russians involved in Magnitsky’s brutal detention and those involved in human rights abuses against other activists. The Global Magnitsky Human Rights Accountability Act was passed in 2016. The executive branch implemented the law in 2017 by adopting Executive Order (E.O.) 13818, which created a sanctions program covering a broad range of human rights abuses and acts of corruption anywhere in the world. In 2022, the Act was permanently reauthorized. These sanctions can be imposed on foreign individuals and entities anywhere in the world that are responsible for or involved in: Serious human rights abuse - The term “serious human rights abuse” is not defined in law or regulation. In practice, the USG has applied GloMag to human rights abuses involving at least one incident of physical violence against one or more victims or a serious deprivation of liberty. - Specifically, GloMag has most frequently been applied to killings, torture, and unlawful or arbitrary detentions. - GloMag sanctions have also been applied to gender-based violence, enforced disappearance, certain acts of human trafficking, and more. - Corruption is not defined under E.O. 13818, but U.S. practice demonstrates the corruption must involve an improper exchange or provision of a benefit involving government actors or entities. - The E.O. provides illustrative examples of corruption such as misappropriation of state assets and bribery. The program has also covered government procurement, money laundering, and state capture. - Transferring the proceeds of corrupt acts is also sanctionable, even years after the original acts. Other bases for sanctions include being leaders or officials of entities that have engaged in sanctionable acts; attempting such acts; or assisting perpetrators. Generally, the USG imposes these sanctions only in response to acts occurring in the last five years. Process and Implementation Penalties: These sanctions impose an entry ban and asset freeze and are publicly announced. Sanctioned persons generally cannot obtain or keep a U.S. visa or access U.S.-based funds or property. Persons under U.S. jurisdiction cannot transact with them. Implementing agencies: The Treasury Department has the authority to impose these sanctions, and doing so is purely discretionary. Treasury must consult with the State and Justice Departments. Congressional oversight and involvement: Certain requests from members of Congress can require the USG to consider and report on a particular sanctions recommendation. - When the chair and ranking member of certain committees ask, the USG must determine if a specific person has engaged in a sanctionable activity and report whether the President intends to impose sanctions, within 120 days. - Separately, the chair and ranking member of certain committees can provide information that the USG must consider in deciding whether to impose sanctions. The USG must report annually to Congress on newly imposed and terminated sanctions under the program, as well as efforts to encourage other governments to impose similar sanctions. NGO involvement: Unusually, the USG is required by law to consider “credible information obtained by…nongovernmental organizations that monitor violations of human rights” in implementing this program. The Treasury and State Departments accept and consider recommendation files from NGOs and periodically consult with NGOs that have submitted such information. Since 2017, roughly one-third of the USG’s sanctions under this program have had a basis in recommendations submitted by the civil society network that HRF coordinates. Patterns of Use Numbers and Type of Abuse: As of June 20, 2023, 475 individuals and entities from 45 countries have been designated under the GloMag program. - 316 designations have been imposed for corruption only. - 145 designations have been imposed for serious human rights abuses only. - 14 designations have been imposed for both. The greater number of corruption actions is largely due to the USG’s practice of targeting multiple companies in a corrupt network. Regional coverage: The USG has imposed GloMag sanctions on persons in all regions of the world. Europe and Eurasia is the most sanctioned region, and South and Central Asia the least. Pace and timing: The USG has imposed between 35 to 176 GloMag sanctions annually. Typically, the USG announces many designations around International Anti-Corruption and Human Rights Days (December 9 and 10, respectively). Perpetrators: The USG has imposed GloMag sanctions on a wide range of actors for their involvement in sanctionable activity or their connections to it, including: - state and non-state actors. - human rights abusers whose actions harm only one victim, in addition to those whose actions harm large victim classes. - senior officials, including former heads of state, as well as judges or prosecutors. The USG has often, though not always, failed to impose GloMag sanctions on corrupt or abusive officials from governments that are security partners. Abuses against marginalized populations such as women, children, LGBTIQ+ persons, and Indigenous persons have also been underrepresented. Serious Human Rights Abuse Human Trafficking: In December 2022, the USG for the first time issued GloMag sanctions for human trafficking abuses. In the largest GloMag action to date, the sanctions targeted companies, individuals, and vessels involved in forced labor on a China-registered distant-water fishing fleet. These were the first U.S. sanctions targeting an entity listed on the NASDAQ stock exchange. In June 2023, after one of the perpetrators’ role in an Australian organization was uncovered, the individual resigned, demonstrating the sanctions’ impact beyond the U.S. Also in December 2022, the USG sanctioned Apollo Quiboloy for sex trafficking, systemic rape, and physical abuse of young girls in the Philippines. Quiboloy has been indicted for sex trafficking-related crimes by U.S. federal prosecutors and is currently on the FBI’s most wanted list. This was the first time that sex trafficking and rape were the central abuses sanctioned in a GloMag action. Russia: In March 2023, the USG designated six persons, including three individuals under GloMag, for their involvement in the arbitrary detention of Russian opposition leader, journalist, and historian Vladimir Kara-Murza. Kara-Murza has been jailed in Moscow since April 2022 for criticizing Russia’s invasion of Ukraine. This was the first use of GloMag based on a single arbitrary detention. Canada issued similar sanctions in November 2022, the UK in April 2023, and the EU in June 2023. The Gambia: In December 2017, the USG designated 14 persons for abuses and corruption in The Gambia. Yahya Jammeh, the former president, was designated for killing and torturing political opponents and journalists and corruption. Yankuba Badjie, a former intelligence chief, was also designated for various abuses. In 2020, Jammeh’s wife was sanctioned for supporting his corruption. In May 2022, the U.S. Justice Department completed a civil forfeiture action against Jammeh’s Maryland mansion, seizing the property based on evidence it was purchased with the proceeds of corruption. Saudi Arabia: After congressional pressure, the USG designated 18 Saudi officials and the Saudi government’s “Tiger Squad” for their involvement in the murder in Istanbul of Saudi dissident and journalist Jamal Khashoggi. Crown Prince Mohammed bin Salman, whom the USG determined was responsible for the assassination, was not sanctioned, though the case highlights the USG’s ability to use GloMag to sanction officials even from close U.S. partners; for a single incident of abuse; and for attacks on journalists (see also Julio Antonio Juarez Ramirez and Marian Kocner). China: In three separate actions, the USG sanctioned eight high-ranking Chinese Communist Party officials as well as major government entities for involvement in human rights abuses committed against the Uyghurs and other minorities in Xinjiang Uyghur Autonomous Region. The sanctioned entities included a regional security agency and the Xinjiang Production and Construction Corps, a sprawling, government-backed administrative and paramilitary body. The third set of sanctions, in March 2021, was coordinated for the first time with similar actions by the other major Magnitsky jurisdictions, Canada, the EU, and the UK. Cambodia: In December 2019, the USG designated Try Pheap, a Cambodian businessman, for building a large-scale illegal logging consortium reliant on the collusion of Cambodian officials. 11 entities he owned or controlled were also sanctioned. Kun Kim, a senior Cambodian general, was designated for reaping significant financial benefit by using Cambodian soldiers to intimidate, demolish, and clear out land sought by a Chinese state-owned entity. DRC: In December 2017, the USG designated Dan Gertler, an Israeli billionaire, for engaging in corrupt mining and oil deals with the Congolese state, including then-President Joseph Kabila, resulting in more than $1.36 billion lost revenue for the state. The USG issued two follow-up actions, imposing sanctions on a total of 46 companies and individuals in Gertler’s network, making this one of the largest sets of GloMag sanctions. Latvia: In December 2019, the USG sanctioned Aivars Lembergs, a Latvian politician, for money laundering, expropriation, bribery, and abuse of office. Four entities that Lembergs owned or controlled were also designated, including the Ventspils Freeport Authority, which operated a major international port. The Latvian government promptly took steps to remove Lembergs from control of the entity, leading the USG to remove the sanctions on it and highlighting the potential effectiveness of sanctions to spur behavior modification.
<urn:uuid:433a3b22-e9d1-44bd-8930-492a3346794e>
CC-MAIN-2023-40
https://humanrightsfirst.org/library/u-s-global-magnitsky-sanctions/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.952493
2,236
2.875
3
There is a lot of confusion about what happened to Ishmael. The Taurat, written 3500 years ago by the prophet Musa (PBUH), helps clarify this for us. Allah had promised Ibrahim (PBUH) that he would bless him and make his descendants as many as the sand on the seashore (see here). Ibrahim (PBUH) finally obtained two sons by his two wives, but a rivalry between them forced him to send Hagar and Ishmael away. This rivalry occurred in two stages. The first stage occurred after the birth of Ishmael and before the birth of Isaac. Here is what the Taurat says about this rivalry and how Allah protected Hagar, appeared to her and gave His blessing to Ishmael (PBUH). Hagar and Ishmael – Genesis 16 Now Sarai, Abram’s wife, had borne him no children. But she had an Egyptian slave named Hagar; 2 so she said to Abram, “The LORD has kept me from having children. Go, sleep with my slave; perhaps I can build a family through her.” Abram agreed to what Sarai said. 3 So after Abram had been living in Canaan ten years, Sarai his wife took her Egyptian slave Hagar and gave her to her husband to be his wife. 4 He slept with Hagar, and she conceived. When she knew she was pregnant, she began to despise her mistress. 5 Then Sarai said to Abram, “You are responsible for the wrong I am suffering. I put my slave in your arms, and now that she knows she is pregnant, she despises me. May the LORD judge between you and me.” 6 “Your slave is in your hands, ” Abram said. “Do with her whatever you think best.” Then Sarai mistreated Hagar; so she fled from her. 7 The angel of the LORD found Hagar near a spring in the desert; it was the spring that is beside the road to Shur. 8 And he said, “Hagar, slave of Sarai, where have you come from, and where are you going?” “I’m running away from my mistress Sarai,” she answered. 9 Then the angel of the LORD told her, “Go back to your mistress and submit to her.” 10 The angel added, “I will increase your descendants so much that they will be too numerous to count.” 11 The angel of the LORD also said to her: “You are now pregnant and you will give birth to a son. You shall name him Ishmael, for the LORD has heard of your misery. 12 He will be a wild donkey of a man; his hand will be against everyone and everyone’s hand against him, and he will live in hostility toward all his brothers. ” 13 She gave this name to the LORD who spoke to her: “You are the God who sees me, ” for she said, “I have now seen the One who sees me.” 14 That is why the well was called Beer Lahai Roi; it is still there, between Kadesh and Bered. 15 So Hagar bore Abram a son, and Abram gave the name Ishmael to the son she had borne. 16 Abram was eighty-six years old when Hagar bore him Ishmael. We see that Hagar was a prophetess since she spoke with the LORD. He that told her the name of her son was to be Ishmael and gave her a promise that Ishmael would become ‘too numerous to count’. So with this encounter and promise she returned to her mistress and the rivalry paused. The Rivalry Grows But when Isaac was born to Sarai 14 years later the rivalry started again. We read in the Taurat how this happened. 8 The child [i.e. Isaac] grew and was weaned, and on the day Isaac was weaned Abraham held a great feast. 9 But Sarah saw that the son whom Hagar the Egyptian had borne to Abraham was mocking, 10 and she said to Abraham, “Get rid of that slave woman and her son, for that woman’s son will never share in the inheritance with my son Isaac.” 11 The matter distressed Abraham greatly because it concerned his son. 12 But God said to him, “Do not be so distressed about the boy and your slave woman. Listen to whatever Sarah tells you, because it is through Isaac that your offspring will be reckoned. 13 I will make the son of the slave into a nation also, because he is your offspring.” 14 Early the next morning Abraham took some food and a skin of water and gave them to Hagar. He set them on her shoulders and then sent her off with the boy. She went on her way and wandered in the Desert of Beersheba. 15 When the water in the skin was gone, she put the boy under one of the bushes. 16 Then she went off and sat down about a bowshot away, for she thought, “I cannot watch the boy die.” And as she sat there, she began to sob. 17 God heard the boy crying, and the angel of God called to Hagar from heaven and said to her, “What is the matter, Hagar? Do not be afraid; God has heard the boy crying as he lies there. 18 Lift the boy up and take him by the hand, for I will make him into a great nation. ” 19 Then God opened her eyes and she saw a well of water. So she went and filled the skin with water and gave the boy a drink. 20 God was with the boy as he grew up. He lived in the desert and became an archer. 21 While he was living in the Desert of Paran, his mother got a wife for him from Egypt. We see that Sarah (her name had been changed from Sarai) could not live in the same household with Hagar and demanded that she be sent away. Though Ibrahim (PBUH) was reluctant, Allah promised that he would bless Hagar and Ishmael (PBUH). Indeed He spoke to her again, opened her eyes to see water in the desert and promised that Ishmael (PBUH) would become a ‘great nation’. The Taurat continues showing how this nation started in its development. We read about Ishmael (PBUH) at the time of the death of Ibrahim (PBUH). Death of Ibrahim Genesis 25:8-18 8 Then Abraham breathed his last and died at a good old age, an old man and full of years; and he was gathered to his people. 9 His sons Isaac and Ishmael buried him in the cave of Machpelah near Mamre, in the field of Ephron son of Zohar the Hittite, 10 the field Abraham had bought from the Hittites. There Abraham was buried with his wife Sarah. 11 After Abraham’s death, God blessed his son Isaac, who then lived near Beer Lahai Roi. 12 This is the account of the family line of Abraham’s son Ishmael, whom Sarah’s slave, Hagar the Egyptian, bore to Abraham. 13 These are the names of the sons of Ishmael, listed in the order of their birth: Nebaioth the firstborn of Ishmael, Kedar, Adbeel, Mibsam, 14 Mishma, Dumah, Massa, 15 Hadad, Tema, Jetur, Naphish and Kedemah. 16 These were the sons of Ishmael, and these are the names of the twelve tribal rulers according to their settlements and camps. 17 Ishmael lived a hundred and thirty-seven years. He breathed his last and died, and he was gathered to his people. 18 His descendants settled in the area from Havilah to Shur, near the eastern border of Egypt, as you go toward Ashur. And they lived in hostility toward all the tribes related to them. Ishmael lived a very long time indeed and that his sons became 12 tribal rulers. Allah had blessed him as He had promised. Arabs to this day trace their ancestry to Ibrahim through Ishmael.
<urn:uuid:aabc121a-3f5a-43df-9daf-957838c0ff25>
CC-MAIN-2023-40
https://injil.xyz/from-taurat-the-account-of-the-prophet-ishmael-pbuh/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.988725
1,772
2.828125
3
Bertha Rayner Frank Bertha Rayner Frank became the epicenter of a national debate on anti-Semitism when she forced an Atlantic City hotel to publicly apologize for refusing to serve Jews. Educated privately, Bertha Rayner Frank married Dr. Samuel Leon Frank in 1869 but fell ill in the 1870s and spent the rest of her life struggling with chronic pain and illness. Despite this, she remained involved in the community by supporting numerous charities such as the Federated Jewish Charities of Baltimore, the Working Girls’ Home, and Daughters of Israel, a direct service organization founded in 1890. In fact, her giving often exceeded her means: having donated her estate after her husband’s death, she had only a small annuity for herself and often dipped into that for further donations to important causes. In 1907, while staying at the Marlborough-Blenheim Hotel, she was told that her nieces would be barred from the hotel based on their Jewish appearance. The New York Times used the case to discuss widespread discrimination against Jews, but although the hotel quickly apologized to Frank, such policies continued for decades more across the country. More on Bertha Rayner Frank How to cite this page Jewish Women's Archive. "Bertha Rayner Frank." (Viewed on October 4, 2023) <https://jwa.org/encyclopedia/article/frank-bertha>.
<urn:uuid:72f8887b-1385-40f4-b36b-b57647905108>
CC-MAIN-2023-40
https://jwa.org/encyclopedia/article/frank-bertha
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.970754
293
3.53125
4
Through public history projects, LMU History students and faculty can bring their research to a broader community and engage in important areas of public debate, commemoration, and interpretation. Here are some recent public history projects created in LMU History courses. An exhibition of Civil War artifacts from the library's collections, curated by the students of History 550, based on the research they had conducted during their Fall 2014 course. On display January-May 2015. Subject guides that highlight ARTstor content related to various disciplines, including African and African-American Studies, American Studies, Architecture, Asian Studies, Classical Studies, Design, Fashion and Costume, History of Medicine and Natural Science, Language and Literature, Medieval Studies, Religious Studies, Theater and Dance, and Women's Studies. More than 200,000 digitized items (photographs, documents, newspaper pages, political cartoons, works of art, diaries, transcribed oral histories, advertising, etc.) that reflect the diverse history of California. Collections support California Content Standards, including primary sources sets. Alliance of libraries, museums, and other cultural institutions dedicated to preserving and improving access to the raw material of Los Angeles history. Educators interested in arranging class visits can browse by "class visits" in their searchable directory of over 230 local collections. Quarterly online publications created by the Library of Congress Educational Outreach Division in collaboration with the TPS Educational Consortium, focusing on pedagogical approaches to teaching with Library of Congress digitized primary sources in K-12 classrooms. Teachers' resources provided by the National Archives, including lesson plans and activities, school tours and activities, using primary sources, state and regional resources, featured activities and resources, and professional development opportunities. Includes reproducible copies of primary documents from the National Archives and various teaching activities, including lectures, demonstrations, analysis of documents, independent research, and group work. Materials include subjects such as the American Revolution, Civil War and Reconstruction, the Great Depression, and World War II. Join the DocsTeach community to create custom activities for the classroom, share activities with students via DocsTeach Classrooms, use lessons that other educators have created, and publish activities to be used by other educators who use this site. Offers hundreds of free, innovative online resources for teaching and learning American history, developed by the National Museum of American History and includes Lessons & Activities, Interactives & Media, Teacher Resources, and more. Teacher-selected resources around a number of topics, including Civil Rights, Colonial America, Invention, Native American History, Transportation, and Westward Expansion. Each topic includes document-based questions (DBQs), lesson plans, primary sources, and video. The SAA Reference, Access, and Outreach Section’s Teaching with Primary Sources Working Group is pleased to disseminate a bibliography that compiles resources focusing on the use of primary sources in elementary, secondary, and collegiate classrooms. This bibliography is an ideal resource for archivists who wish to learn more about utilizing primary sources in interactions with teachers, faculty, and students.
<urn:uuid:c52b72cd-dce4-4175-92cd-2846098207c1>
CC-MAIN-2023-40
https://libguides.lmu.edu/c.php?g=323806&p=2169138
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.929241
631
2.71875
3
The explosive growth of online shopping has been heralded as a benefit for the environment, as consumers avoid the fossil fuel emissions associated with traveling to and from brick-and-mortar stores. However, e-commerce goods still have to be stored and delivered, and frequently, distribution warehouses are sited in lower-income communities that already suffer disproportionately with air pollution and other environmental challenges. Max Zhang, the Kathy Dwyer Marble and Curt Marble Faculty Director of the Cornell Atkinson Center for Sustainability and a professor in the Sibley School of Mechanical and Aerospace Engineering, is leading a project to quantify truck emissions around e-commerce warehouses in New York City. He will also be studying the air quality impact of wood stoves and fuel oil in Tompkins County. The three-year project will be supported by a $330,000 contract agreement from the New York State Energy Research and Development Authority (NYSERDA). “Typically, these e-commerce warehouses are being located near low-income neighborhoods or communities of color with existing air quality problems, and now you’re adding to the environmental burden,” Zhang said. “My goal in this research is to inform policy in a more environmentally responsible, just way.” An expert in air pollution engineering and sustainable energy systems, Zhang has already supported projects that address air quality issues in the U.S., UK and China. Zhang developed the concept for this project in collaboration with the New York City Department of Health. Zhang approached the health department and asked what he as a scientist could do to support their work. Their biggest knowledge gaps were in understanding air quality patterns throughout the city, especially in industrial areas, he said. “There are factors that make New York City unique, but this problem exists in almost every metropolitan area. We are hoping that while we address the New York City problems, we are also providing tools that can be used elsewhere,” he said. Zhang’s lab will work to quantify truck emissions using a wide array of methods, including satellite imagery, computer vision and machine learning to make sense of the satellite images, air quality modeling, and data mining of social media feeds to take advantage of public citizen reports about air pollution, idling trucks or other potentially relevant information. “We are pleased that NYSERDA has funded Dr Zhang’s work," said Sarah Johnson, executive director of the Air Quality Program in New York City's Department of Health and Mental Hygiene. "It will help us to develop hyper-local emissions inventories in the industrial neighborhoods of our city and design policies and programs that will improve air quality in our most burdened communities.” In upstate New York, Zhang will be using similar methods to help the Tompkins County Department of Planning and Sustainability quantify greenhouse gas emissions associated with wood stoves and fuel oil. A previous project on wood stove pollution involved mobile air quality monitoring around Ithaca. The recommendations Zhang’s group developed from that project have already improved air quality in some Ithaca neighborhoods. “This study is a great example of research that can demonstrate how taking action on climate can also clean the air and improve quality of life for all,” said Ben Furnas ‘06, executive director of The 2030 Project: A Cornell Climate Initiative. “This is a key value of Cornell’s 2030 Project: informing climate work that leaves no one behind.” “We are creating tools that the community and policymakers can use to address these problems,” Zhang said. “Community empowerment is always my goal for research.” Krisy Gashler is a freelance writer for Cornell Atkinson.
<urn:uuid:539de0f4-0940-4f78-9b77-fc8723dede47>
CC-MAIN-2023-40
https://news.cornell.edu/stories/2022/06/new-assessment-maps-emissions-new-york-neighborhoods-near-industrial-areas
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.94976
758
2.84375
3
The wetlands of Rukiga District in southwest Uganda are home to Uganda’s national bird, the Grey Crowned Crane. They are vital to local communities, which rely on the wetlands for their food, water and livelihoods, or ways that community members support themselves and their families. But increasing human activity is putting pressure on the wetlands and their cranes. A new project between the International Crane Foundation/Endangered Wildlife Trust (EWT) Partnership, Rugarama Hospital, the Margaret Pyke Trust, and the London School of Hygiene & Tropical Medicine is working to respond to these pressures for the benefit of Rukiga’s wetlands, its cranes and its people. The population of Grey Crowned Cranes in East Africa has declined by over 80% in the last 25 years, largely due to increasing pressure on wetlands. As cranes are pushed into smaller and more marginal wetlands to care for their eggs and young, they are increasingly disturbed by people, dogs, and livestock and cannot breed successfully. Chicks raised on fragmented and degraded wetlands are easily captured for traditional medicine use, domestication within Africa, or exported to captive facilities at zoos and safari parks. The population of Grey Crowned Cranes in Uganda (a stronghold for the species) is now believed to consist of only 10,000 to 20,000 individuals. Understanding the Communities’ Needs As a first step, the project team spent six months undertaking research in Rukiga to properly understand the communities’ health, livelihood, social, and environmental challenges and views, and how the communities saw the connections between them. They reported a diversity of challenges, not least of which was inadequate healthcare, poor soil and water quality, and increasing sub-division and fragmentation of land on which to farm their crops. For these reasons, project partners are implementing a Population, Health and Environment, or PHE, project that aims to empower communities to conserve their cranes and manage wetlands while also meeting the health and livelihood needs of Rukiga’s communities. The project research highlighted that the people of Rukiga District wanted better health services, including family planning. These resources in turn keep women involved in local livelihood activities to support their families and reduce pressure on local natural resources, benefiting both people and cranes. Integrating Community Health With Wetland Conservation The project team is engaging community members in various ways to raise awareness about wetland and crane conservation, sustainable livelihoods and family planning. For instance, in the same session, the International Crane Foundation/EWT conservation experts and Rugarama Hospital nurses raise awareness about the importance of wetlands for health, livelihoods and cranes, and the benefits of family planning. This integrated approach means that men and women hear messages that they might not have heard before. Similarly, even though both men and women undertake livelihoods, men are more likely to attend livelihood training, meaning that women often miss these important messages. By integrating actions across multiple sectors, PHE can reach more people linked to biodiversity outcomes, engage more men in reproductive health, and more women in livelihood and natural resource management. PHE can, ultimately, achieve more significant and longer-lasting conservation outcomes than would likely occur without integration. Story submitted by Adalbert Aine-omucunguzi, International Crane Foundation/Endangered Wildlife Trust Partnership and Kathryn Lloyd, Margaret Pyke Trust
<urn:uuid:9d084278-de55-4392-a775-e5a99dc4c3aa>
CC-MAIN-2023-40
https://savingcranes.org/2022/02/healthy-wetlands-for-the-cranes-and-people-of-rukiga-uganda/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.949794
684
2.953125
3
A third classification of automation is a constantly moving or indexing device that conveys parts through the cleaning process. This can either be in the form of a conveyor that suspends parts on hooks or other fixtures that hang from an overhead track or in the form of a conveyor belt on which the parts rest as they are moved through the cleaning process. This type of automation is particularly attractive in cases where parts are already handled using a conveyor in manufacturing steps preceding or following cleaning and is also ideal in many “lean” applications. Good examples are sheet metal parts being cleaned prior to plating or painting. The use of a conveyor for cleaning often eliminates one or more handling steps which would otherwise be required if parts were cleaned in baskets or individual racks. A clear benefit of using a conveyor system is that the cleaning process is continuous. Parts can enter the system at random intervals and still receive consistent processing. Parts progress through the cleaning process in order which means that batch integrity can be maintained if required. Conveyors are probably best employed in applications where parts are not immersed for cleaning. Conveying parts through a spray washer, for example, is a relatively simple matter. Processing steps are aligned horizontally with the parts being moved by the conveyor. In cases where changing of the elevation of parts is required (as in an immersion process), the attraction of using a conveyor may be somewhat diluted. One excellent application for a conveyor is in the processing of parts in “near field” ultrasonic applications. It is relatively simple to spin a part about its vertical axis using a simple sprocket arrangement similar to a rack and pinion mounted at the top of each suspension device. - In order to immerse a part for cleaning, a conveyor must ramp vertically into and out of the immersion tank since most conveyors can not accommodate a drastic change in elevation within a short horizontal distance. Instead, the conveyor must gently slope to effect elevation changes. These gentle slopes can add considerable length to a cleaning system especially in cases where the vertical profile of the part being cleaned requires a considerable change in elevation for total immersion. - In the case of a conveyor belt, immersion requires that the conveyor belt itself must be immersed in the cleaning process. In essence, the conveyor belt adds to the overall load on the cleaning system as, although it may not be dirty, it still adds to tank – to – tank carryover and requires drying on each pass. As is the case with walking beams and pushers (which are really just intermittently indexing conveyors with a vertical motion component), a conveyorized process is relatively inflexible. The time in each processing step is determined by the relative horizontal length of each process step as the conveyor moves at a single speed. Slowing down or speeding up the conveyor will result in the duration of all process steps being increased or decreased accordingly and will, of course, result in a associated change in the total throughput capability of the system. Although not applicable in all situations, conveyors are a viable option for automation for cleaning and are worthy of consideration especially in cases where parts are already being moved through the manufacturing process by a conveyor. – FJF –
<urn:uuid:2fa508f5-d187-487a-9395-33696800a834>
CC-MAIN-2023-40
https://techblog.ctgclean.com/2014/06/automation-conveyors-belts/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.94541
666
2.578125
3
In today’s rapidly evolving digital landscape, where technology is interwoven into every aspect of our lives, ensuring network security has become a paramount concern. As businesses and individuals become increasingly reliant on interconnected systems, the risk of network security threats has also surged. This article will delve into the latest network security threats causing disruptions worldwide and explore effective mitigation strategies. Explore the Contents - 1 Network Security Threats - 2 Rise of Cyber Attacks - 3 Phishing: Baiting the Unwary - 4 Ransomware: Holding Digital Assets Hostage - 5 IoT Vulnerabilities: Exploiting the Connected - 6 Supply Chain Attacks: Targeting the Weakest Link - 7 Zero-Day Exploits: Unveiling the Unknown - 8 Insider Threats: Danger from Within - 9 Data Breaches: Leaking Sensitive Information - 10 Cloud Insecurities: New Avenues for Attackers - 11 Mobile Malware: Targeting On-the-Go Users - 12 AI and ML Risks: The Dark Side of Innovation - 13 Social Engineering: Manipulating the Human Element - 14 DDoS Attacks: Overwhelming Digital Resources - 15 Ensuring Network Security: A Holistic Approach - 16 Conclusion: Network Security Threats - 17 FAQs: Network Security Threats Network Security Threats The interconnectedness of devices, systems, and platforms has ushered in unparalleled convenience, but it has also opened doors to many network security threats. This article will explore the most prominent threats and how they affect businesses and individuals. Rise of Cyber Attacks In recent years, the frequency and sophistication of cyber attacks have surged dramatically. Cybercriminals are becoming adept at exploiting network vulnerabilities, often with devastating consequences. These attacks range from individual identity theft to large-scale data breaches that can weaken entire organizations. Phishing: Baiting the Unwary Phishing remains one of the most pervasive threats in the digital realm. Attackers use fraudulent emails, messages, or websites to deceive users into revealing sensitive information, such as passwords or credit card details. Vigilance and education are essential in mitigating this threat. Ransomware: Holding Digital Assets Hostage Ransomware attacks have grown in scale and severity. These attacks involve encrypting a victim’s data and demanding a ransom for its release. High-profile incidents have underscored the importance of robust backup systems and proactive security measures. IoT Vulnerabilities: Exploiting the Connected The Internet of Things (IoT) has introduced unparalleled convenience and expanded the attack surface for cybercriminals. Insecure IoT devices can be hijacked to launch attacks or compromise users’ privacy. Supply Chain Attacks: Targeting the Weakest Link Cyber attackers are increasingly targeting the supply chain to infiltrate larger organizations indirectly. By compromising a supplier or partner, hackers can access their target’s systems, often with disastrous results. Zero-Day Exploits: Unveiling the Unknown Zero-day exploits target vulnerabilities that are unknown to software vendors. Attackers leverage these vulnerabilities to launch attacks before patching them, making them particularly dangerous. Insider Threats: Danger from Within Not all threats come from external actors. Insider threats by employees or partners with malicious intent can result in significant data breaches or compromises. Data Breaches: Leaking Sensitive Information Data breaches can have far-reaching consequences, from financial losses to reputational damage. Cybercriminals frequently sell or expose stolen data on the dark web, perpetuating the cycle of breaches. Cloud Insecurities: New Avenues for Attackers In the rapidly evolving landscape of technology, cloud services have emerged as a transformative force, offering organizations scalability, flexibility, and cost-effectiveness. However, along with these benefits come new challenges and vulnerabilities that attackers quickly exploit. Cloud insecurities have become a significant concern, creating fresh avenues for cybercriminals to breach systems and compromise data. Misconfigured Cloud Settings One of the primary culprits behind cloud-related security breaches is misconfigured settings. In their haste to migrate to the cloud, organizations must look into critical security configurations. A simple oversight in access controls, encryption protocols, or authentication mechanisms can create a gaping hole that attackers can easily exploit. Cybercriminals keenly monitor for such lapses, searching for unprotected resources they can infiltrate. Inadequate Access Controls In the realm of cloud security, access control is paramount. However, managing access permissions can be challenging due to the complex nature of cloud environments. When not properly enforced, unauthorized users might gain access to sensitive data or critical infrastructure. These vulnerabilities, whether through weak passwords or a lack of multifactor authentication, give attackers a foot in the door. Data Breaches and Data Leakage The allure of cloud services lies in the convenience of data storage and sharing, but this convenience comes with risks. Data breaches and data leakage are constant threats in cloud environments. Cybercriminals target weak points to gain unauthorized access to sensitive information, leading to data theft, financial losses, and reputational damage. Organizations must implement robust encryption and monitoring mechanisms to counter these threats effectively. Cloud providers operate on a shared responsibility model, providing security for the infrastructure while customers are responsible for securing their applications and data. This model can create confusion and gaps in security coverage. Attackers exploit these gaps, targeting customer-controlled components that might be inadequately secured. Insider Threats and Privilege Abuse The cloud’s collaborative nature means that multiple users can access resources simultaneously. While this fosters productivity, it also introduces risks. Insider threats, including employees with malicious intent or those who unwittingly compromise security, can exploit cloud vulnerabilities. Privilege abuse, where authorized users misuse their access rights, can lead to unauthorized data exposure or compromise. The convenience of cloud services can inadvertently lead to shadow IT, where employees use unauthorized cloud applications or services without the knowledge of IT departments. This practice exposes organizations to security risks, as these applications might lack necessary security controls. Attackers can also take advantage of these unauthorized entry points to infiltrate networks. Protecting Cloud Environments Organizations must adopt a proactive approach to cloud security to address cloud insecurities. This includes thorough risk assessments, regular security audits, and continuous monitoring of cloud environments. Encryption of data both in transit and at rest is crucial, as is maintaining proper access controls and strong authentication mechanisms. Employee training is pivotal in preventing data breaches and raising awareness about cloud-related security threats. In conclusion, while cloud services offer transformative benefits, they also introduce novel avenues for attackers to exploit. Understanding the nuances of cloud security, embracing the shared responsibility model, and implementing robust security measures are essential for safeguarding digital assets in cloud environments. By staying vigilant and proactive, organizations can harness the power of the cloud while mitigating the risks posed by evolving cloud insecurities. Mobile Malware: Targeting On-the-Go Users As mobile devices become central to our lives, they have become lucrative targets for malware creators. Malicious apps, phishing attacks, and mobile-specific vulnerabilities threaten users’ personal information. AI and ML Risks: The Dark Side of Innovation Artificial intelligence and machine learning bring tremendous benefits, but cybercriminals can exploit them. These technologies can automate attacks, evade traditional security measures, and amplify the scale of threats. Social Engineering: Manipulating the Human Element Despite technological advancements, humans remain vulnerable to manipulation. Social engineering attacks exploit human psychology to trick individuals into divulging sensitive information or performing actions compromising security. DDoS Attacks: Overwhelming Digital Resources Distributed Denial of Service (DDoS) attacks aim to disrupt online services by overwhelming traffic. These attacks can cause downtime, impacting user experience and organizational operations. Ensuring Network Security: A Holistic Approach In an interconnected world driven by digital innovation, ensuring network security has become a paramount concern for individuals and organizations. The evolving threat landscape demands a holistic approach beyond traditional security measures. By adopting a comprehensive strategy encompassing technology, education, and proactive measures, we can fortify our digital landscapes against myriad threats. Regular Security Assessments A fundamental pillar of a holistic network security approach is conducting regular security assessments. This involves identifying vulnerabilities, evaluating potential risks, and analyzing the effectiveness of existing security measures. Organizations can stay one step ahead of potential attackers by identifying weak points and addressing them promptly. Robust Employee Training Human error remains a significant factor in security breaches. Educating employees about best practices in network security is crucial. Training should cover recognizing phishing attempts, practicing strong password hygiene, and understanding the importance of regular software updates. An informed workforce becomes a formidable line of defense against cyber threats. Proactive Patch Management Cybercriminals often exploit known vulnerabilities in software. To counter this, organizations must implement proactive patch management procedures. Regularly updating software, operating systems, and applications can significantly reduce the risk of exploitation. Ignoring updates can leave systems exposed to easily preventable attacks. Multifactor Authentication (MFA) Multifactor authentication adds an extra layer of security beyond traditional username and password combinations. By requiring users to provide multiple forms of identification, such as a password and a unique code sent to a mobile device, unauthorized access becomes significantly more challenging. MFA can thwart many cyber attacks that rely on stolen or compromised credentials. Incident Response Planning No system is entirely immune to attacks. A well-defined incident response plan is crucial for minimizing damage and reducing downtime in a breach. A comprehensive plan outlines steps to be taken in the event of an attack, including isolating affected systems, notifying stakeholders, and initiating recovery protocols. Encryption: Data in Transit and at Rest Data is a prime target for cybercriminals. Encrypting data both in transit and at rest ensures that it remains unreadable even if data is intercepted without the appropriate decryption keys. Encryption provides an additional layer of protection, particularly when sensitive information is being transferred or stored. Security Culture and Awareness Creating a security-conscious culture within an organization is pivotal. Employees should be encouraged to report suspicious activities and potential security breaches promptly. Regular security awareness campaigns reinforce good security practices and foster a sense of collective responsibility for network security. The landscape of network security threats is dynamic and ever-evolving. Collaborating with trusted partners, sharing threat intelligence, and staying updated on emerging threats is essential for maintaining a robust security posture. Information sharing can help anticipate and prepare for new attack vectors. Read More: What is the LTE-M network? Conclusion: Network Security Threats In a world characterized by unprecedented connectivity and digital integration, staying vigilant against the ever-evolving landscape of network security threats is paramount. The myriad challenges presented by cybercriminals require proactive measures, continuous adaptation, and a commitment to safeguarding sensitive information and digital assets. As we’ve explored the latest network security threats, it’s evident that attackers are becoming more sophisticated, exploiting vulnerabilities across various domains. From phishing and ransomware to IoT vulnerabilities and insider threats, the range of attack vectors is vast and ever-expanding. However, there is hope. Organizations and individuals have the power to fortify their defenses and mitigate these threats. Adopting a holistic security approach involving technology, education, and proactive strategies can reduce the risk of successful attacks. FAQs: Network Security Threats 1. What are the common signs of a phishing email? Phishing emails often exhibit telltale signs, such as misspelled words, generic greetings, urgent demands for personal information, and suspicious links. Always scrutinize sender addresses and avoid clicking on unexpected or unfamiliar links. 2. How can I protect my IoT devices from being compromised? Securing IoT devices involves updating firmware regularly, changing default passwords, turning off unnecessary features, and segregating IoT devices from critical networks. Implementing strong encryption and keeping devices behind firewalls are also essential. 3. What should I do if my organization falls victim to a ransomware attack? If a ransomware attack hits your organization, isolate affected systems to prevent further spread, notify law enforcement, and engage with cybersecurity experts. Paying ransoms is discouraged, as it does not guarantee data recovery and can perpetuate the cycle of attacks. 4. Are AI-driven security solutions more effective against emerging threats? AI-driven security solutions offer promising capabilities in identifying and responding to emerging threats. However, they could be more foolproof and should complement traditional security measures. Human expertise remains crucial in analyzing context and making critical decisions. 5. What steps can I take to secure my cloud-based data effectively? To secure cloud-based data effectively, implement robust access controls, strong authentication mechanisms, and encryption for data at rest and in transit. Regularly audit and monitor cloud settings to identify misconfigurations and educate employees about cloud security best practices.
<urn:uuid:c88cf8c3-df2e-47eb-a7da-f9fea52fd863>
CC-MAIN-2023-40
https://techmag.com.pk/the-latest-network-security-threats/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.902463
2,663
2.515625
3
A celebration of the publication in 1820 of Melmoth the Wanderer by the Dublin writer Charles Robert Maturin. Maturin lived close to Marsh’s Library and was a regular visitor to the building. This exhibition shows that Maturin used a familiarity with 16th- and 17th-century printed material to condemn religious hypocrisy, and to draw a sharp distinction between the light of culture and the darkness of fanaticism. ‘Ragged, Livid & On Fire’ has been curated by Dr Christina Morin of the University of Limerick and Dr Jason McElligott of Marsh’s Library. As a child, Charles Robert Maturin dreamed of becoming an actor, but financial concerns meant that he followed a more conventional career as a Church of Ireland clergyman. In 1803 he became curate of Loughrea in Co. Galway. Three years later, he moved back to Dublin to become curate of the wealthy parish of St. Peter’s, with his church in Aungier Street and his residence in nearby York Street. A flamboyant and eccentric individual, Maturin was often in trouble with the Church authorities. Among their concerns was his publication of popular novels with romantic or supernatural themes. Maturin was in the habit of reading in Marsh’s Library for several hours every day. This exhibition examines some of the unusual 16th- and 17th-century books and pamphlets that Maturin refers to in his most famous novel, Melmoth the Wanderer. In a letter to his friend Sir Walter Scott, Maturin wrote: ‘Tales of superstition were always my favourites, I have in fact been always more conversant with the visions of another world, than the realities of this’. An obituary remarked of him that ‘This eccentric character was undoubtedly a man of genius, though it manifested itself…more in the extravagances of an over-weaning imagination, than in the refinements of a correct taste or the coherency of intellectual power’. Continue to exhibition below: click image thumbnails to see more Maturin’s early novels were popular with readers who subscribed to circulating libraries. He had a critical and commercial success with the play Bertram (1816), but his subsequent output had little impact at the time. Melmoth has made a pact with the devil — his soul in exchange for another 150 years of life. Filled with bitter regret, he is condemned to wander the earth until he can find someone to take his place. Maturin constructed Melmoth the Wanderer around three key sources: the King James Bible, the Anglican Liturgy, and the works of William Shakespeare. Maturin prided himself on being a good Classical scholar. Melmoth the Wanderer has many references to Virgil’s Aeneid, which was widely considered to be the definitive masterpiece of Latin literature. Melmoth the Wanderer shows a surprising familiarity with the polemical books and pamphlets of the English Revolution of the mid-17th century. Maturin loved literature and the theatre. He had a particular fondness for what he called ‘the vast mine of unworked treasures’ from the 16th and 17th centuries. The Albigenses (1824) is a historical romance set against the backdrop of two crusades against religious dissidents in the south of France in the first decades of the 13th century. Melmoth the Wanderer is crammed full of references to books of the 16th and 17th centuries. Maturin was a voracious but chaotic reader. He spent so much time in Marsh's Library that he constructed a desk for himself with his own hands. Marsh’s Library was a signicant part of literary life and culture in early 19th century Dublin. ‘Ragged, Livid & On Fire’ has been curated by Dr Christina Morin of the University of Limerick and Dr Jason McElligott of Marsh’s Library. The support of the Irish Research Council is gratefully acknowledged. Marsh’s Library gratefully acknowledges the continuing support of the Department of Tourism, Culture, Arts, Gaeltacht, Sport and Media. Phone: +353 1 4543511 See here for opening hours and directions.
<urn:uuid:225c3163-866e-4bb9-877e-119df5892979>
CC-MAIN-2023-40
https://web.marshlibrary.ie/digi/exhibits/show/melmoth
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.967754
939
2.671875
3
Are you tired of reading the same old novels and short stories? Do you crave something different, something that pushes the boundaries of traditional fiction? Look no further than the novella, a unique and often overlooked form of literature. Novellas are longer than short stories but shorter than novels, typically ranging from 20,000 to 50,000 words. They offer a perfect balance between the brevity of a short story and the depth of a novel, allowing for more character development and complex plotlines. Novellas require the writer to be concise and focused, while still maintaining the richness of language and detail that readers crave. So why aren’t they more popular? Perhaps because they don’t fit neatly into traditional publishing categories, or because they haven’t received the same level of attention and recognition as novels or short stories. But for those who appreciate innovation and experimentation in literature, novellas are a must-read. - Novellas are a unique and often overlooked form of literature that fall between short stories and novels in length. - They offer more room for character development, complex themes, and richer narrative structure compared to short stories, while still maintaining a more focused plot and smaller cast of characters compared to novels. - Novellas can pack a punch in a short amount of pages, leaving a lasting impact on readers, and are often considered a literary genre in their own right. - Understanding the unique aspects of a novella can lead to a greater appreciation of its depth and intensity, and they offer a more immersive and satisfying reading experience compared to short stories. What is a Novella? So, what’s a novella? It’s basically a shorter story that’s longer than a short story, but shorter than a novel. The novella is often considered a literary genre in its own right, with its origins dating back to the Renaissance period. Novellas were initially popular in Italy, where they were known as ‘novelle,’ and were often written in prose as a form of entertainment. Over time, the novella evolved into a more complex literary form, with writers experimenting with different styles and themes. Today, novellas continue to have a significant impact on contemporary literature, with many writers using them as a way to explore complex ideas and themes in a shorter format. Novellas are often considered a bridge between short stories and novels, offering readers a chance to dive deeper into a story without committing to a lengthy novel. So if you’re looking for a shorter but more substantial read, a novella might just be the perfect choice for you. Differences from Short Stories You can think of a novella like a long train ride with stops along the way, while a short story is more like a quick sprint to the finish line. Novellas are longer than short stories, typically ranging from 20,000 to 50,000 words. They offer more room for character development, complex themes, and a richer narrative structure. Themes explored in novellas are often more complex and nuanced than those in short stories. Novellas have more space to delve into the complexities of human relationships, explore philosophical ideas, and examine societal issues. The narrative structure of a novella is also more intricate than that of a short story. Novellas often have multiple plotlines, as well as more fully-developed characters, making the reading experience more immersive and satisfying. Differences from Novels A novella, compared to a novel, typically has a more focused plot and a smaller cast of characters. While a novel may delve into the lives of numerous characters, a novella tends to focus on a smaller group of individuals and their interactions within a more tightly woven plot. This allows for a greater emphasis on character development, as the reader has the opportunity to delve deeper into the motivations and complexities of each character. Despite having a more focused plot, novellas can still possess a great deal of plot complexity. In fact, due to their shorter length, novellas often require a greater degree of precision in terms of plot development. Each event and character interaction must serve a purpose in moving the story forward. This can result in a more tightly woven and intense reading experience, as each moment in the story carries a greater weight and significance. Examples of Notable Novellas You’re in for a treat if you haven’t read ‘Heart of Darkness’ by Joseph Conrad, a novella that will take you on a journey through the depths of the human psyche and leave you breathless with its raw intensity. This classic piece of literature is a perfect example of how a novella can pack a punch in a short amount of pages. Here are some other notable novellas that showcase the unique characteristics of this fiction form: - ‘The Metamorphosis’ by Franz Kafka – This surreal tale follows the transformation of a man into a giant insect, leading to an exploration of isolation and alienation. - ‘The Strange Case of Dr. Jekyll and Mr. Hyde’ by Robert Louis Stevenson – This gothic novella delves into the duality of human nature and the consequences of giving in to one’s darker impulses. - ‘Animal Farm’ by George Orwell – This political satire uses a group of farm animals to explore the corruption and abuse of power in a dystopian society. - ‘The Ballad of the Sad Café’ by Carson McCullers – This Southern Gothic novella explores the complexities of love, identity, and human connection through the lens of a small town in the American South. Analyzing structure and exploring themes are integral parts of reading and appreciating a novella. With their concise length, novellas often have a tight narrative structure and a laser focus on a particular theme or idea. These characteristics give novellas the power to pack a punch and leave a lasting impact on readers. Get ready to delve into the world of novellas, where you can experience a unique depth and intensity that sets it apart from other literary forms. One of the most intriguing aspects of a novella is the way it balances structure and theme. Unlike a novel, a novella has a more compact structure, which can lead to a more focused exploration of themes. This allows the reader to fully immerse themselves in the story, without the distractions of unnecessary subplots or characters. When analyzing structure and theme in a novella, it’s important to compare it to other literary forms. For example, short stories are often more focused on a singular moment or event, while novellas provide more room for character development and exploration of themes. On the other hand, novels can offer a more expansive look at a character’s life, but may lose focus on specific themes. By understanding the unique aspects of a novella, you can fully appreciate the depth and intensity that it offers. Novellas as a form are worth appreciating for their unique qualities. While they share similarities with both short stories and novels, novellas have a distinct length and structure that sets them apart. They offer a more in-depth exploration of characters and themes than a short story, but are more concise and focused than a novel. So, next time you’re looking for a satisfying read that won’t take up too much of your time, consider picking up a novella. You may just discover a new favorite genre.
<urn:uuid:438a20b0-a5b8-4903-b6fb-7778b9ae97e4>
CC-MAIN-2023-40
https://whenyouwrite.com/definition-of-novella/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.948501
1,595
2.765625
3
Most of the cells in your body are highly specialized. A kidney cell, for example, can multiply and create new kidney tissue, but it can’t turn into a bone cell or neuron. Stem cells, on the other hand, are able to differentiate into many different cell types. The primary function of adult stem cells, which reside throughout the body, is to maintain and repair tissues. Their innate brilliance lies in their ability to zero in on areas of damage or degeneration. Signaled by inflammation, they migrate wherever they’re needed and, taking cues from surrounding cells, facilitate healing, restoration, and regeneration. Stem cell therapy used to involve embryonic cells, which understandably generated a lot of controversy. Today’s research focuses on non-embryonic adult mesenchymal stem cells—and there is nothing controversial about using your own cells in a safe and therapeutic manner. Adult stems cells may be derived from bone marrow. However, this isn’t a particularly abundant source, and cells must be cultured over several days to create enough for therapeutic use. Furthermore, their number and viability decline dramatically with age. More recently, fat was discovered to be a far richer, much more accessible repository of robust adult stem cells. New technologies now make it possible to remove a few ounces of a patient’s fat through a “mini” liposuction procedure, separate out the stem cells in a special process that yields extremely high numbers of viable cells, and return them back into that person’s body via an IV or injection. Performed in a physician’s office, under sedation and local anesthesia and using a sterile “closed system” technology so the cells never come into contact with the environment, there is minimal discomfort and risk of infection. And because the stem cells come from the patient’s own body, there is no risk of rejection or disease transmission. Thanks to our association with one of the most established and experienced stem cell treatment centers–which is part of an Investigational Review Board (IRB)-based stem cell treatment network that has adopted an array of IRB-approved protocols and is committed to furthering research in this exciting field–Whitaker Wellness patients now have access to non-embryonic adult mesenchymal stem cell therapy. It’s easy to see how concentrating and mobilizing these remarkable cells could have tremendous therapeutic benefits, and that has certainly proved to be the case. Non-embryonic adult mesenchymal stem cells are being used to treat a wide variety of health challenges across a broad range of clinical specialties. Patients’ own adult stem cells have been used to regenerate cardiac tissue damaged by heart attacks and heart failure; improve outcomes in multiple sclerosis, Parkinson’s, stroke, and other neurological disorders; promote healing of fractures and damaged cartilage; relieve inflammation and pain; and treat cosmetic and reconstructive dermatological conditions. No one can guarantee results for this or any other treatment, and outcomes vary from patient to patient. Each patient must be assessed individually to determine the potential for optimal results from this regenerative process. To learn even more about this remarkable therapy and its myriad benefits, click here. Because fat-derived adult mesenchymal stem cells are able to change into a variety of cell and tissue types—including bone, cartilage, blood vessels, muscles, nerves, and skin—they may be useful in treating a broad range of conditions including, but not limited to: - Autoimmune diseases - Back and neck pain - Cardiovascular disorders - Heart failure - Lung diseases - Neurological disorders - Parkinson’s disease - Skin conditions - Sports injuries - Stroke damage - Wellness and rejuvenation Click the link below to read more about non-embryonic mesenchymal adult stem cell therapy. *Individual results may vary One-Stop Shop for Wellness Renowned physician, author, and speaker, Julian Whitaker, MD, opened the doors of the Whitaker Wellness Institute in 1979. Since then, our clinic has helped more than 45,000 patients overcome serious health challenges and get back on the road to healthy living. We’re proud to offer nearly two dozen safe, innovative, healing therapies under one roof—that’s more than any other facility in the northern hemisphere. Just think of us as your “one-stop shop for wellness.” To find out how stem cell therapy can help restore your health and vitality, click on the buttons below to schedule a complimentary consultation or contact us to learn more. You can also schedule your complimentary consultation or obtain more information by calling our Patient Services Representatives at (866) 944-8253. Please share our adult mesenchymal stem cell therapy page with your friends and family on your favorite social media site(s) below:
<urn:uuid:89efa493-224b-4f43-bd39-8382c0f23a8b>
CC-MAIN-2023-40
https://whitakerwellness.com/therapies/adult-stem-cell-therapy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.915086
1,014
2.78125
3
When it comes to teaching Environmental Studies (EVS) for the Central Teacher Eligibility Test (CTET), educators often face the challenge of making the subject interesting and engaging for students. CTET is a crucial examination for aspiring teachers, and having an exciting EVS curriculum can enhance their preparation. In this article, we will explore some effective strategies and tips to make CTET EVS interesting and enjoyable for both teachers and students. - CTET Preparation Strategy: A Comprehensive Guide - CTET Eligibility Criteria for Computer Teacher - CTET Eligibility Criteria for PRT - CTET Eligibility Criteria 2023 for OBC: Everything You Need to Know - CTET Eligibility for SC Candidate - What is the Meaning of Language 1 and Language 2 in CTET? Why is CTET EVS Important? Before we delve into the techniques to make CTET EVS interesting, it’s essential to understand the significance of this subject. EVS plays a crucial role in the holistic development of students by creating awareness about the environment, sustainability, and social issues. It helps in nurturing responsible citizens who are environmentally conscious and actively participate in preserving and conserving natural resources. CTET EVS aims to assess the candidates’ understanding of these concepts and their ability to teach them effectively. Tips to Make CTET EVS Interesting Here are some effective tips to make CTET EVS interesting and engaging: 1. Use Real-Life Examples Integrate real-life examples into your teaching approach to connect theoretical concepts with practical scenarios. By relating EVS topics to the students’ daily lives, you can capture their attention and make the subject more relatable. For instance, when discussing pollution, you can highlight local pollution-related issues and encourage students to brainstorm solutions. 2. Incorporate Hands-On Activities Engage students actively by incorporating hands-on activities in the EVS curriculum. Practical experiments, nature walks, and fieldwork can help students explore the environment firsthand and understand its intricacies. These activities stimulate curiosity and provide a more immersive learning experience. 3. Connect to Students’ Interests To make CTET EVS interesting, tap into the students’ interests and hobbies. Incorporate topics and examples that resonate with their passions. For instance, if students are interested in wildlife, discuss biodiversity and conservation efforts. By catering to their preferences, you can create a personal connection that enhances their engagement. 4. Make it Interactive Encourage active participation and discussions during EVS classes. Create a classroom environment where students feel comfortable expressing their opinions and sharing their knowledge. Interactive activities like debates, group projects, and presentations promote critical thinking and collaboration among students. 5. Introduce Technology Utilize technology to enhance the learning experience. Incorporate audiovisual aids, interactive presentations, and educational apps to make the EVS curriculum more engaging. Technology allows for dynamic and visually appealing content, capturing students’ attention and facilitating better understanding. 6. Use Multimedia Resources Diversify your teaching materials by incorporating multimedia resources. Use videos, images, infographics, and online articles to supplement textbook content. Multimedia resources provide a multi-sensory experience, catering to different learning styles and making the subject matter more captivating. 7. Organize Field Trips Organize field trips to natural reserves, museums, or local environmental organizations. Field trips provide students with hands-on learning opportunities and allow them to witness the real-world application of EVS concepts. These experiences make the subject more tangible and memorable. 8. Foster Group Discussions Encourage group discussions and peer-to-peer learning during EVS classes. Group activities promote active engagement, critical thinking, and the exchange of ideas among students. By fostering collaborative learning environments, you can make the subject matter more interactive and thought-provoking. Making CTET EVS interesting is crucial to create an engaging learning experience for students and ensure effective teacher preparation. By incorporating real-life examples, hands-on activities, technology, and multimedia resources, educators can bring EVS to life and foster a love for the subject among students. Through interactive discussions, field trips, and connection to students’ interests, CTET EVS can become an exciting and meaningful part of their educational journey. Q: Can these strategies be applied to other subjects as well? A: While these strategies are primarily focused on making CTET EVS interesting, many of them can be adapted and applied to other subjects too. Tailoring the techniques to suit the specific subject matter can help create engaging lessons across various disciplines. Q: Are field trips essential for making CTET EVS interesting? A: Field trips provide valuable experiential learning opportunities, but they are not the only way to make CTET EVS interesting. Incorporating other strategies like hands-on activities, multimedia resources, and interactive discussions can still create an engaging learning environment without field trips. Q: How can technology be effectively integrated into CTET EVS? A: Technology can be integrated effectively by using educational apps, interactive presentations, and audiovisual aids. The key is to select appropriate resources that align with the curriculum and enhance the students’ understanding of EVS concepts. Q: Can these tips be applied to different age groups? A: Yes, these tips can be adapted for different age groups. Educators should consider the cognitive abilities and interests of their students while implementing these strategies. Modifying the activities and resources according to the students’ age and grade level can ensure maximum engagement. Q: How can teachers encourage active participation during EVS classes? A: Teachers can encourage active participation by creating a safe and inclusive classroom environment where students feel comfortable sharing their thoughts. Incorporating group discussions, debates, and interactive activities motivates students to actively engage in the learning process.
<urn:uuid:6e52f93c-2c58-4b4e-ba67-fcbe31a3d9a6>
CC-MAIN-2023-40
https://www.avdhootblogger.com/2023/06/how-to-make-ctet-evs-interesting.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.895994
1,229
3.296875
3
Last updated on May 2nd, 2020 Lifestyle refers to the daily life we are living everyday. It is directly related to a person’s physical, mental and emotional well being. Having a healthy lifestyle is all about making the right choices for your health such as healthy eating, being physically active, exercising and maintaining a healthy weight. Our physical health, in most cases, is affected by the lifestyle we lead like irregular eating habits, improper diet, addictions such as — tobacco, alcohol or drugs, excess sugars , junk foods in one’s diet, etc. Not only do these wrongly picked up habits compromise your present-day health status but also pave the way ahead to much serious health hazards, inviting chronic diseases like obesity, diabetes, cardiovascular disorders and hypertension which come in later in life. Importance of lifestyle modification in physical well being Several research studies conducted over the years have documented the risks of erratic lifestyle & the number of premature deaths around the world due to cardiovascular diseases, hypertension, diabetes (which are now called as lifestyle disorders) is staggering. Small changes to a healthier lifestyle will make a huge difference and take one a long way. Improve Your Lifestyle Choices: When we talk about lifestyle it means a comprehensive approach towards life. Lifestyle not only comprises of our routine diet and exercise but it also signifies our habits, our choices, our behaviour and our decisions. Exercise and nutrition are a gateway towards a healthy lifestyle but one has to rework at improving small habits, make informed choices in order to achieve a healthier lifestyle. E.g. Stay away from smoking, Reduce eating junk/ cut the junk Meditate often to calm your mind, Take the staircase instead of an elevator, Make conscious choices when eating in a restaurant, and eat fresh and natural foods. Nourishing / Dead Food : The human body requires relevant amount of all the minerals, vitamins, carbohydrates, proteins and fats on regular basis. These nutrients are required by our body to function optimally and remain disease-free. After all, we are what we eat. Ask yourself a conscious question while eating anything – Will this satiate my senses, fill me up and nourish my body or am I eating dead food with empty calories and no nutrients? Your answer will help you make better choices. How is your Sleep Health: The purpose of sleep is to allow your body to recover fully in order to be able to function optimally the following day. Eight hours of sleep is recommended by the experts to obtain the maximum health benefits. Just because you don’t have insomnia doesn’t mean sleep is doing a good job for you. One should listen to the circadian rhythm ( a.k.a the body clock also called the biological clock ) that tells your body when to eat, sleep and rise. This internal body clock takes cues from the cycle of sunrise and sunset, temperature, environment around you etc. Sleep deprivation has been known to lower the efficiency of human brain and also affects our immune system. Several research studies have shown the relation between sleep deprivation and obesity. Good sleep improves memory and keeps you more agile. Take Care of Your Mental Health: Mental well-being, often the most underrated one as it being non-tangible is equally important as physical health, if an individual is mentally unhealthy he will also be physically unfit which will reflect in every work that he does. The human body can achieve an optimum level of health and fitness only when both mental and physical fitness are achieved. Just like muscles need relaxation after exercise, mind needs de-stressing. Every individual de-stresses in a different way. For some, a sport is their stress-buster, for others a colouring book helps them relax. Yoga, meditation, a good night sleep and listening to light music are a few popular ways to unwind and de-stress. Physical well being is a combination of many things, regular exercise, including good nutrition, and a positive attitude. No matter how small you start, you can make a big change and can improve your lifestyle. Take care of your body so that it can take care of you – Kajal Bhatia - Balanced Diet Improves Cognition A study on cognitive development establishes the importance of nutrition in cognition. It shows that children who were fed healthy and balanced diet performed better in school. For good cognitive health one needs to consume all the micro-nutrients, including omega-3 fatty acids (which is present in walnuts and flax seeds) vita, iron (found in dates, , green leafy vegetables), iodine (found in natural sea salt), folic acid (sources green leafy vegetables, avocado, peas and beans) and zinc (which is found in chickpeas, mushrooms, cashew nuts, spinach ). Undernourished brain is slow to perform in comparison to a well-nourished brain. - Nutrition Revamps the Quality of Life The food you ate yesterday leads to the current status of your health today. In the absence of disease your body functions the way it is designed to and you are at complete wellbeing. Recharge your energies by feeding your body well. Instead of focusing only on carbohydrates, proteins and fats, up your micronutrient intake. Nourish your body don’t just feed it and kickstart a preventative lifestyle today.Last Updated on by Dr. Damanjit Duggal The information included at this site is for educational purposes only and is not intended to be a substitute for medical treatment by a healthcare professional. Because of unique individual needs, the reader should consult their physician to determine the appropriateness of the information for the reader’s situation.
<urn:uuid:98e7b865-c7ba-42d6-b596-f83e5cf263dd>
CC-MAIN-2023-40
https://www.breathewellbeing.in/blog/embracing-a-healthier-lifestyle/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.94566
1,177
2.953125
3
The Neuropsychology of Trauma Tuesday, April 13, 2021 at 8:00 - 11:15 am The impact of trauma on children has been increasingly well understood in recent years. This includes a better grasp on the impact of a prolonged stress response on the brain and body, impacting physical and mental health. More recently, research has begun to consider the effect of sub-clinical trauma, or adverse childhood events (ACE), on mental and physical health. There is increasing evidence that when the stress system stays “on”, the mental and physical penalties can be severe. This is true for both posttraumatic stress disorder (PtSD) and sub-clinical trauma seen with ACE.
<urn:uuid:161364aa-6ca2-41da-9391-f325cd43f4c4>
CC-MAIN-2023-40
https://www.brown.edu/initiatives/star/news/2021/03/neuropsychology-trauma
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.939234
141
2.609375
3
- Author(s):Gill Budgell, Kate Ruttle - Available from: December 2015 Penpals for Handwriting is a complete handwriting scheme for 3–11 year olds. Send a Query× The Practice Books provide specific handwriting focused practice – either introducing or practising letters, joins or key concepts such as size and proportion. They are designed to support independent practice in the classroom, following a whole-class teaching session. Each page corresponds to the units within the Teacher’s Books and includes opportunities for: Finger and pencil tracing, writing letters or joins; Writing phrases or sentences; Pattern practice; Self-assessment check. Having learnt individual letters previously, children are introduced to letters within words for the first time in Year 1. Ideal for use in smaller groups. Augments the interactive resource. Provides plenty of opportunity to perfect letter formation through repetition. - Term 1 1 Practising long-legged giraffe letters 2 Writing words with ll 3 Introducing capitals for long-legged giraffe letters 4 Practising one-armed robot letters 5 Practising long-legged giraffe letters and one-armed robot letters 6 Introducing capitals for one-armed robot letters 7 Practising curly caterpillar letters 8 Writing words with double ff 9 Writing words with double ss 10 Introducing capitals for curly caterpillar letters Term 2 11 Practising long-legged giraffe letters, one-armed robot letters and curly caterpillar letters 12 Practising zig-zag monster letters 13 Writing words with double zz 14 Mixing all letter families 15 Practising all capital letters 16 Practising all numbers 0–9 17 Writing words with ck and qu 18 Practising long vowels: ee, oa, oo 19 Practising long vowels: ee, oa, oo 20 Assessment Term 3 21 Numbers 10–20: spacing 22 Practising ch unjoined 23 Introducing diagonal join to ascender: ch 24 Practising ai unjoined 25 Introducing diagonal join, no ascender: ai 26 Practising wh unjoined 27 Introducing horizontal join to ascender: wh 28 Practising ow unjoined 29 Introducing horizontal join, no ascender: ow 30 Assessment Thank you for your feedback which will help us improve our service. If you requested a response, we will make sure to get back to you shortly.×
<urn:uuid:e4bfa4f3-af32-4d83-a1cb-d7ba79b8e3b3>
CC-MAIN-2023-40
https://www.cambridge.org/hk/education/subject/english/literacy/penpals-handwriting-2nd-edition/penpals-handwriting-year-1-2nd-edition-practice-book?format=PB&isbn=9781316501337
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.768202
526
3.515625
4
People are always interested in attracting more butterflies to their gardens, but no one really considers trying to draw in moths. Moths have a reputation for being dull in color and eating up your sweaters, so it makes sense why you wouldn’t want them around. But there are plenty of magnificent moths that would be a delight to see in your garden. Take the luna moth, for instance. The nocturnal luna moth has stunning characteristics, the most notable being its gorgeous, translucent green wings and large eyespots. Luna moths used to be way more common, and while they are technically not an endangered species, pollution has dwindled their numbers. If you don’t want to go an entire lifetime without seeing one, here’s how to turn your garden into a suitable environment for them. As caterpillars, they like to feed on the leaves of certain trees. So consider planting one of these trees: American chestnut, black cherry, black walnut, hickory, paper birch, persimmon, red maple, sweetgum, white oak, and willow. Some flowers they like are honeysuckle, moonflower, gardenias, and jasmine. To protect themselves from predators during the caterpillar stage, they will rear up their heads and make a clicking noise with their mandibles. Then, they will release a repulsive fluid. They have many predators, such as bats, owls, and rodents. Luna moths usually don’t stray very far from where they were hatched since they don’t want to waste valuable energy flying long distances. Once the moths mate with each other, female luna moths will lay about 200 eggs at a time upon a leaf. Avoid using pesticides around your garden, including any natural alternatives, such as neem oil. The ingredients in these products can be harmful to luna moths.
<urn:uuid:59912ba0-aa71-45ba-9ae3-e87046190ed1>
CC-MAIN-2023-40
https://www.chipchick.com/2023/07/heres-how-you-can-attract-luna-moths-to-your-garden.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.958838
400
2.859375
3
IT is the greatest leader’s greatest speech. Seventy years ago today, Mohammad Ali Jinnah took to the floor of the Constituent Assembly as its first elected president and delivered the iconic lines, “You are free; you are free to go to your temples, you are free to go to your mosques or to any other place or worship in this state of Pakistan. You may belong to any religion or caste or creed that has nothing to do with the business of the state.” He added: “We are starting in the days where there is no discrimination, no distinction between one community and another, no discrimination between one caste or creed and another. We are starting with this fundamental principle that we are all citizens and equal citizens of one state.” Seventy years later, Mr Jinnah’s founding vision and direction for the country have yet to be realised. Indeed, an argument can be made that this nation has drifted further than ever from the one that he had envisioned. The founding father had warned that the “first duty of a government is to maintain law and order, so that the life, property and religious beliefs of its subjects are fully protected by the state”, but society itself has fallen prey to extremism and an infrastructure of hate. Most worryingly, Mr Jinnah’s vision of a secular, constitutional democratic state focused on the welfare and material good of its people has itself fallen victim to hate and distortion. The very word ‘secular’ is considered taboo by large sections of the polity. Democracy, too, is yet to be meaningfully accepted, with elected governments always vulnerable to undemocratic pressure and attack. What would Mr Jinnah make of the sight of yet another ousted elected prime minister travelling down the fabled GT Road as political uncertainty and turmoil swirl across the political landscape again? Surely, as Mr Jinnah exhorted in his Aug 11 speech, some of the responsibility for the upheaval and drift from the country’s founding ideals lies with the political class too. Bribery and corruption, black-marketing, nepotism and jobbery — all ills that Mr Jinnah identified as fundamental impediments to a democratic, fair and just society fall in the domain of civilian control. The failure to address fundamental social inequalities is nearly at par with the crimes against democracy the country has suffered. It may take several more decades before a Pakistan more in line with Mr Jinnah’s aspirations can be established. Published in Dawn, August 11th, 2017
<urn:uuid:5f1d4ff5-c7ed-448b-ae7e-ad0f8f62bf76>
CC-MAIN-2023-40
https://www.dawn.com/news/1350847/jinnahs-address
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.968138
525
2.671875
3
The Endangered Species Act of 1973 requires periodic reviews of species that are listed as threatened or endangered to ensure that the listing is still accurate. Specifically, section 4(c)(2) of the ESA states that the Secretary shall: - Conduct, at least once every five years, a review of all species included in a list. Determine on the basis of such review whether any such species should: Be removed from such list. Be changed in status from an endangered species to a threatened species. Be changed in status from a threatened species to an endangered species. These reviews are known as "5-year reviews." 5-Year Review Recommendations A 5-year review may result in a recommendation to reclassify or delist an animal or plant. The criteria for reclassification or delisting are based on reducing the five listing threat factors described in the species’ final listing rule and recovery plan. A species’ listing status can only be changed by the rulemaking process. Species may be removed from the endangered or threatened species list for three reasons: The species has recovered to such an extent that it no longer needs ESA protection. The original information warranting listing has been shown to be incorrect, or new information suggests that the species is not actually endangered or threatened. The species has become extinct. A 5-year review may also result in a recommendation to maintain the species’ current classification status (i.e., threatened or endangered). Guidance and Templates NOAA Fisheries and the U.S. Fish and Wildlife Service developed a 5-Year Review Guidance document (PDF, 74 pages) to promote a consistent nationwide approach to 5-year reviews. The document also clarifies the scope and role of these reviews in relation to other ESA requirements. The 5-year review can be as straightforward as gathering current information on a species and determining whether recovery plan criteria have been met. Some species do not have recovery plans or have recovery criteria that do not meet all current ESA requirements. In these cases, the 5-year review will analyze information available on the species relative to the definitions of “endangered” and “threatened” and in the context of the five ESA section 4(a)(1) factors.
<urn:uuid:9fe7948d-171e-4ab4-b828-ec4791d5c7fc>
CC-MAIN-2023-40
https://www.fisheries.noaa.gov/national/endangered-species-conservation/endangered-species-act-5-year-reviews
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.919477
490
3.09375
3
Online Foreign Language Flashcards Children can learn vocabulary in over 30 languages with award-winning enhanced flashcards. A QR scanner is used to access games and pronunciation by native speakers. Skills are practiced in reading, writing, listening, and speaking. Leave a Review - Pre-K - 12th Grade Games Multiple Formats Online Classes Online Curriculum Toys & Products
<urn:uuid:3e54c61b-a308-49c2-b972-b3fd80fcf698>
CC-MAIN-2023-40
https://www.homeschool.com/resource-guide/flashcards/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.840253
112
3.265625
3
Audio Guide to Spring: Native gardening IPR's Red Pine Radio brings you nature spotting tips and wildlife news from northern Michigan. This is the time to plant flowers, and when you do, why not go wild? Right now, eye-popping flowers like lilacs and peonies get lots of attention. But native wildflowers are far more important. You might think of wildflowers as charming things you spot on a hike through the woods or over the dunes, not as plants in home gardens. But Cheryl Gross with Plant it Wild, a northern Michigan nonprofit that promotes native plant use and protection, has gardens thriving with indigenous plants. Native gardens don't just look nice, they feed insects and birds much more effectively than non-native species. “Our insects, our critters, our birds all evolved with native plants. And they have this long-standing relationship," she says. Where there is less native flora, there is less food, meaning there are fewer animals and insects. Gross also says some popular non-native species can actually directly harm the ecosystem, too. These species can change the chemistry of the soil and sometimes poison it for indigenous species. Breaks in the food chain like these can even contribute to drops in songbird numbers. One invasive shrub that’s blooming now is the autumn olive. It was actually introduced by conservation districts to control erosion and attract birds with its red berries. But the berries don’t give migrating birds the kind of nutrition they need for their long flights. “You might as well have one of those popsicles with sugar and food coloring. And so the seeds go through them really quickly. They poop them right out. And we now have autumn olives everywhere!” Gross says. Native plants may not be as showy as a lot of non-natives, but they have plenty of advantages. Because they are already suited to the local climate and soil, they need little, if any, extra fertilizer or watering. They’re often longer lasting than non-native plants. And of course they attract those delightful birds, bees and butterflies. They’re also becoming easier to find. “In northwest Lower Michigan we have tremendous plant producers, and we did not fifteen years ago. Many of our natives across the state are sold in what I call pop-up sales. Conservation districts do them, clubs do them, all sorts of things,” Gross says. When buying, Gross says to be careful of native plant cultivars, which can also be harmful. An example of this is ninebark. There is a variety that’s been genetically modified to produce red leaves rather than green. “The chewing insect that lives on ninebark can’t live on the red leaf. If you’re thinking, ‘Well, I’ll do a good thing for the environment and I’ll get my red color,’ and you put in a red ninebark, you won’t," Gross says. And when you go wild, don’t limit yourself to flowers. Plant grasses, vines and shrubs too to get the whole structure of the native landscape. If you’re out and about birding, Doug Cook, one of our local birding experts, says it’s a good time to learn bird songs using an app called Merlin. “It allows you to record the birds that are around in the area. And through artificial intelligence, it will start matching up that with calls on its database and tell you what you're hearing,” Cook says. But Cook says it’s not 100% accurate, and that if you rely on it completely, you won't learn the bird songs yourself. “Just go out and practice. If you can know the songs of the birds, or at least most of them, you'll see a lot more. You always hear more than you see,” Cook says. Let us know what you’re seeing! Send your photos of northern Michigan flora and fauna to [email protected]. Put "Audio Guide to Spring" in the subject line. Special thanks to Leslie Hamp, who also reported for this episode, and to the National Audubon Society for birdsongs. More from IPR's Red Pine Radio: Want more news from northern Michigan? Subscribe to IPR 's newsletters!
<urn:uuid:9f34f236-4083-4fe3-b813-7449481b109e>
CC-MAIN-2023-40
https://www.interlochenpublicradio.org/show/red-pine-radio/2023-06-03/audio-guide-to-spring-native-gardening
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.944062
942
3.3125
3
Newswise — From space, the light reflected from fields of corn and soybean appear very similar—what separates them is time, explained Lan Nguyen, a doctoral student at South Dakota State University. He is developing an algorithm to more accurately differentiate vegetation based on the seasonality of land surface objects in the Dakotas, Minnesota, Iowa and Nebraska. Nguyen’s model utilizes images captured throughout the year from moderate resolution imaging spectroradiometers aboard NASA’s Terra and Aqua satellites, known as MODIS, and from finer spatial resolution imaging sensors on a pair of Landsat satellites. MODIS can view the Earth’s surface every day or two, while the pair of Landsats do so every eight days, if clouds don’t get in the way. “Traditionally, a couple of satellite images, typically taken during the growing season, are used to identify land cover,” he explained. “This approach looks at land cover from the temporal dimension, one that may see the changing fields more fully and perhaps fill in some gaps.” The model links the vegetation index through time as viewed with the Landsat sensors with the temperature of the land surface measured by the MODIS sensors. “Even though this region does not have a lot of people, there are many changes in land use going on,” Nguyen said. Accurately tracking how land is being used and how that changes over time provides important data for those managing land and other natural resources. Nguyen won second place in the student poster competition at the 20th William T. Pecora Memorial Remote Sensing Symposium November 13-16, 2017 in Sioux Falls, South Dakota. The national conference brought together scientists who evaluate land and water resources using Earth-observation satellite data. Geospatial Sciences Center of Excellence Co-Director Geoffrey Henebry is Nguyen’s dissertation adviser and chair of his advisory committee. Nguyen completed two master’s degrees at Marshall University in Huntington, West Virginia, and worked as part of a geospatial sciences team for two years before coming to SDSU in 2015. He did his undergraduate work in Vietnam. Nguyen’s model uses a new approach to more accurately identify the type of vegetation, such as crops, based on their temporal development. For instance, he can differentiate corn from soybeans using multiple images because corn has a longer growing season than soybeans and has a lower vegetation index peak value. The vegetation index is based on sunlight reflected from the surface, Nguyen explained. The index uses red and near infrared light reflectance. “Green vegetation absorbs much red light, but it reflects lots of near infrared light,” he said. “This difference is larger for vegetated areas, and smaller for areas of bare soil, building materials, dry vegetation, or open water,” he explained. To evaluate his new maps of land cover and land cover change, Nguyen used the U.S. Geological Survey’s National Land Cover Dataset, which has fewer than 20 land cover classes, and the U.S. Department of Agriculture’s Cropland Data Layer, which has over 100 classes of specific crops and other land cover types. “Different datasets are created with different purposes in mind—it depends on the questions you’re looking to answer,” he said
<urn:uuid:8abce296-0493-46ee-ab70-d0cb0a3a4566>
CC-MAIN-2023-40
https://www.newswise.com/articles/modeling-vegetation-more-accurately-using-satellite-imagery
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.949871
698
3.28125
3
Why Naval STEM? Naval Science, Technology, Engineering and Mathematics (STEM) supports the Department of the Navy (DoN)’s Navy and Marine Corps education and outreach programs. Naval STEM programs are deliberate investments in the current and future DoN workforce, which enhance the Navy and Marine Corps’ ability to meet present and future war-fighting challenges. The Naval STEM Strategy provides new strategic direction for Naval STEM. The focus areas of Naval STEM programs include: - To inspire, engage, and educate the next generation of scientists and engineers, technology professionals, and medical professionals. - To employ, retain, and develop diverse civilian and military technical workforce. - To collaborate across the Naval STEM communities and with other agencies to maximize benefits to the DoN. Where can I find Naval STEM opportunities? Naval STEM communities are located throughout the United States and worldwide. The list of Naval STEM communities can be found by downloading the Guide to Naval STEM. Where can I find student opportunities? STEM development begins with Naval STEM outreach programs at the Pre-K through 12th grade levels, continues through undergraduate and graduate school, supports student advancement into post-doctoral work, and continues through all stages of their STEM professions. The list of opportunities for high school, undergraduate, graduate, and doctoral students can be found below and by downloading the Naval STEM Opportunities for Students handout. For information about the Funding Opportunity Announcement (FOA) for the Office of Naval Research (ONR) Navy and Marine Corps Science, Technology, Engineering & Mathematics (STEM), Education and Workforce Program please refer to the list of active funding opportunities. For Additional Information contact the Naval STEM Coordination Office:
<urn:uuid:42dcedcb-c4db-4970-a760-b858e2083720>
CC-MAIN-2023-40
https://www.nrl.navy.mil/STEM/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.918182
359
2.578125
3
With the advent of Turkish rule in north-western India in the early 11th century, Muslims began to settle in the region. To their increasing numbers were added the local converts. By the time of Guru Nanak (1469-1539), Muslims had become the most visible section of the social order in Punjab. They consisted mainly of the orthodox Sunnis, represented by the ulama (mullas and qazis) who upheld the Islamic law (shariat), and the various orders of the mystics of Islam (the Sufis) who represented a parallel interpretation of religious beliefs and practices. Guru Nanak came into close contact with Islam during his 10-year stay in Sultanpur, and later at several places during his travels. He brackets Islam with the major religious systems of India in the early 16th century. The recently published Shri Guru Granth Sahib: Teachings for Muslims contains over 30 extracts from Guru Nanak’s compositions. The editor, Nanak Singh Nishtar, says in his introduction that the Sikh gurus respected Islamic beliefs and practices, and presented them to Muslims as the teachings of Islam. They told Muslims to become good Muslims, as they told Hindus to become good Hindus. This raises two issues: Guru Nanak’s familiarity with the beliefs and practices of contemporary Musalmans, and his assessment of Islam. Guru Nanak talks of God in His primal state before creation. For millions upon millions of years, there was only darkness—neither the earth nor the sky, but only the limitless Divine Ordinance, and the Creator was absorbed in unbroken trance. None other than the Only Lord was there; there was no Brahma, Vishnu or Mahesh. There was no mulla and no qazi, no shaikh and no haji; there were no Vedas, and there was no Quran. Significantly, there is no mention of Allah. In another composition, Guru Nanak equates Allah with Aad Purkh. In other words, Islamic monotheism was close to Guru Nanak’s own conception of God. By creating the universe, God revealed many of His attributes. In terms familiar to Musalmans, Guru Nanak says: “Baba! Allah is inscrutable, He is boundless; His abode is holy and His are the holy names; He is the true sustainer. His Ordinance (hukam) cannot be comprehended; it cannot be described adequately; not even a hundred poets coming together can describe the smallest fraction of it. All hear and talk about Him, but none really appreciates His worth. There are pirs, paighambars, saliks, sadiqs, faqirs and shahids; there are shaikhs, qazis, mullas and dervishes—all adore Him through their prayers (durud), in the hope of blessings (barakat). But Allah does not consult anyone when He makes or unmakes, or when He gives or takes away; He alone knows His power (qudrat); He alone is the doer. He watches everyone and bestows His grace on whomsoever He wills.” In another composition, the term Maulah (Master) is used for Allah. Maulah is the great Creator who has made the universe beautiful and green. Nothing is more important than one’s firm allegiance to God. The earthly achievements have little importance. To be a king, with forts and armies, was futile if one were to forget God. Guru Nanak says he would not forget God even if blood-sucking rulers were placed over his head. Conversely, for Guru Nanak, the Divine Name was his rulership and army. Guru Nanak brackets Islam with the brahminical and ascetic traditions. He says the qazi did not know the time of creation because it was not given in the Quran; the brahman did not know the time of creation because it was not there in the scriptures he read; and the jogi did not know the time, date, day, season or month. Guru Nanak brackets the mulla, the pandit and the jogi to underline that they all have to leave this world. The jogi and the mulla are equated, as are the Vedas and the Quran. This implies that in many ways the Islamic tradition is taken as seriously as the brahminical and ascetic traditions. However, none of them is really appreciated. Guru Nanak tells the mulla and the qazi to remember that they will die one day, and therefore, remember God all the time. Their meticulous observance of five daily prayers, recitation of the Quran, study of the sacred texts, telling the beads, fasting in the month of Ramzan and pilgrimage to Mecca would not prolong their lives. The call from the grave could come any time. Guru Nanak also makes critical comments on some practices of Musalmans. The best known is the comment on the custom of burial: “The Musalman’s dust may be kneaded after burial to make vessels and bricks. It wails in flames, the poor earth cries, and burning cinders fall over it.” Guru Nanak says that only God who created the universe knows what would happen to a human being after death. In this verse, Guru Nanak seems to underline that neither burial nor cremation was important for a genuinely religious life. Guru Nanak lays great stress on ethics. There are many statements on ethical living as indispensable for the attainment of liberation. Also, there are some statements addressed directly to Musalmans: “If blood-stained cloth is regarded as impure, how can the mind of the one who sucks human blood remain pure?” “A Musalman should make compassion his mosque, sincerity his prayer-mat, honest earning his Quran, modesty his circumcision, and noble conduct his fast. A true Musalman should make good deeds his Kaba, truth his guide, good actions his kalima and namaz, and what pleases God his rosary.” Guru Nanak’s preference for Sufi Islam over that of the mulla and the qazi is quite clear: “The Musalmans praise the shariat; they read and ponder; but only those are His true servants who become His slaves to see his face.” To see God face to face, or experience God, is a Sufi idea. In fact, the basic relationship between God and human beings in the eyes of the mullas was that of a master and a servant, but for the Sufis it was one of love. Guru Nanak argues with the mullas in the terminology of the Sufis, and in doing so he shows the Sufis as true Musalmans: “To be a Musalman is difficult. One should adopt the religion of the auliya (friends of God—the Sufis) and regard renunciation as a file that removes the rust of the heart. They would become Musalman only when they live their faith and dismiss all thoughts of life and death, accept God’s decree most willingly and believe in him as the true Creator, and efface themselves. Only then may they receive God’s grace and only then shall they be real Musalmans.” Also Read | The World As Word However, this relative appreciation for the Sufi path should not lead us to infer that Guru Nanak approves of the Sufis of his day without any qualifications. He brackets the qazi and the Sufi shaikh who suffer from self-centeredness (haumai). A true dervish abandons everything to meet his Creator. But many a shaikh subsisted on revenue-free land obtained from the State, and distributed ‘caps’ among their disciples authorising them to guide others. Thus, the shaikh was presumptuous enough to be sure of his own place of honour with God, and gave assurance to others as well. The qazis had their offices, and the shaikhs had their establishments (khanqahs). They tended to treat the means as ends, forgetting that God alone is everlasting. Guru Nanak advises them both to remember: “Allah is ineffable; He is inscrutable; He is the all-powerful Creator, the Merciful. The whole world is transitory and the Merciful alone is permanent. Only He is eternal, for He is not subject to any destiny. The earth and the heavens shall perish; only He, the only One, remains forever.” Also Read | The Kaur Of Patriarchy On the whole, Guru Nanak talks mainly of Allah and the shariat. The Prophet and the Quran are mentioned, but without much role or importance. He also talks of two different interpretations of Islam: one by the ulama or the qazi, and the other by the shaikhs or the pirs. He refers to some of their most important practices, and shows a comprehensive understanding of their beliefs. The Islamic conception of God is close to Guru Nanak’s own. He shares some of his ethical values with the Sufis and appreciates the Sufi way of life. However, he finds nothing worth appreciation in what the mulla and the qazi had to say or do. The Sufis too were not altogether free from limitations. Despite their claim to complete trust in God, they received financial support from the government. They also appeared to assume that they had found the path of union with God, and could authorise their disciples to guide others, which was rather presumptuous in Guru Nanak’s eyes. Also Read | Road To Khalsa Islam was associated by Guru Nanak with the Kaliyuga (the fourth and worst cosmic age), whereas the path discovered by him was meant to redeem the Kali Age. The question of how to become a true Musalman is answered by implication when Muslims are invited to follow the way shown by Guru Nanak. (J.S. Grewal is a historian and former vice-chancellor, Guru Nanak Dev University, Amritsar, and director and later chairman, Indian Institute of Advanced Study, Shimla. Indu Banga is professor emerita, Panjab University, Chandigarh.)
<urn:uuid:8ee9ce60-80fe-47fc-97c7-72076906e3b1>
CC-MAIN-2023-40
https://www.outlookindia.com/magazine/story/india-news-sufism-prevails-in-guru-nanaks-islam-no-place-for-mullah-or-qazi/302323
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.974264
2,165
3.25
3
Fun with the U.S. Census Students are more likely to engage in the lesson when you make it relevant to them, whether that's through personal interests, relating topics to real world events, or even delivering concepts with the help of pop culture. A great way to introduce your students to statistical analysis and data comparison, is to simulate your own classroom 'census'. The U.S. Census Bureau offers a down loadable questionnaire that you can print off for data collection. Students need not fill out names or phone numbers, only the information that will be used in the activity. Once the forms have been filled out, tally the numbers including the total number of people along with a total for each sub-category (e.g. age, sex, race, and relationship). Next comes the analysis of these totals. Tom DeRosa, middle school teacher and contributor to Lesson Planet, suggests the following: - Compute the mean, median, and mode - Visually represent the data using a histogram, stem-and-leaf plot, etc. - Divide data into ranges (e.g. 0 to 12 years, 13 to 17 years, etc.) and graph Sex, Race, & Relationship Data: - Convert into percentages and illustrate using a pie graph - Estimate current population totals using proportions For extension questions and a more detailed explanation, read the rest of DeRosa's article at Lesson Planet!
<urn:uuid:3e6ad35e-cf61-45b6-8588-a57429067af1>
CC-MAIN-2023-40
https://www.supplyme.com/products/fun-with-the-us-census-a1991
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.89311
300
4.34375
4
You are here Increasing winter temperatures and rainfall cause shifts in phenology in four California species In a nutshell The California Phenology Project, a partner of USA-NPN, was initiated in 2010 to study the effects of climatic variation on the timing of life cycle events in California flora. Volunteers and staff at 7 National Parks used Nature’s Notebook to collect data. The authors compared observations of leaf budburst, flowering, fruiting and leaf drop with climate variables such as temperature and rainfall. Species studied included four widespread, locally and ecologically important species: coyotebrush, valley oak, elderberry, and California buckwheat. The authors were able to detect differences in phenology for the four plant species studied across California. The authors found that in all four species, at least one phenophase responded to higher winter low temperatures with delayed onset. Generally, precipitation strongly influenced leaf phenology, while both precipitation and temperature were important for flower and fruit phenology. What is special about this study? This study used Nature’s Notebook protocols, which involve monitoring the same individual plants over time. This method allowed the authors to know than any difference in the timing of onset for a particular plant from year to year was due to environmental variation rather than genetic variation. This study is one of the first of its kind from a water-limited system. Plants in these water-limited systems behave differently than temperate deciduous plants. The wide geographic sampling across California enabled the authors to distinguish the effects of minimum monthly temperature and cumulative monthly precipitation on onset dates. What does this mean for YOU? This study gives an increased understanding of how the previous winter’s temperature and rainfall affects leafing, flowering, and fruiting for these species. We can now better predict how these species will respond to future warming and intensifying drought. This study highlights the importance of Nature’s Notebook data – twice weekly monitoring was enough to detect the phenological differences associated with climate among species, sites and years. This study also demonstrates the utility of data collected by trained volunteers. Citation: Mazer, S.J., Gerst, K.L., Matthews, E.R., and Evenden, A. 2015 Species-specific phenological responses to winter temperature and precipitation in a water-limited ecosystem. Ecosphere.
<urn:uuid:89f79801-750c-45ed-8026-3177755b57bc>
CC-MAIN-2023-40
https://www.usanpn.org/node/21890
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00540.warc.gz
en
0.923546
483
3.515625
4
Jennifer Brisson, DVM, DACVR Massachusetts Veterinary Referral Hospital, Woburn, MA Posted on 2016-11-29 in Diagnostic Imaging The use of ultrasound is widespread and becoming a standard of care in veterinary medicine across the diversity of practices, and not just specialty medicine. Understanding basic ultrasound physics is paramount to success in image optimization during patient evaluation. While there are proprietary differences and generational differences in the user controls of an ultrasound machine, the following basics are present in each system. Introduction to Knobology Dynamic application and manipulation of the basic controls will provide for enhanced image optimization and increased abnormality conspicuity. Adjustment of power is generally limited to the start of the exam, if manipulated at all. This should be set to a relative standard for each ultrasound machine. Keeping power the same across the diverse patient caseload contributes to the identification of abnormal tissue pathology. Gain should be manipulated for each patient, and often throughout the individual exam. The more variable penetration in depth required during a patient examination, the more manipulation of the gain control may be needed. Gain controls the amplification of echoes returning to the probe, which is used in image formation. Gain controls the overall level of brightness of the image. Specifically 2D gain establishes the gray scale brightness across the entire image. The Time-Gain-Compensation controls, usually a series of slides, allow for manipulation of gain segmentally by depth. Adjustment of the TGC slides allows the user to lessen the enhancement of the returning near field echoes, and increase the enhancement of the far field echoes, allowing for a more uniform display in the shade of gray across the tissue of interest/scan field of view. Alternatively, adjustment of the TGC slides allows for optimal gain settings to be set for a lesion or structure of interest, and minimize the signal from the surrounding structures. Focal Zone should be set to (1) the depth of the lesion of interest, or (2) the maximal depth of an organ. This control should be dynamically changed as needed during patient examination, for full organ evaluation and lesion interrogation. Focal zone is the portion of the ultrasound beam with maximum lateral resolution. Lateral resolution is the ability to define two points perpendicular to the ultrasound beam as separate and distinct. The smaller the lateral distance between two points, the greater the lateral resolution. This contributes greatly to lesion conspicuity. Image optimization starts at probe (transducer) selection. Diagnostic ultrasound ranges from 2-18MHz. Higher frequency transducers offer greater resolution, greater fine detail, with less depth penetration. High-frequency transducers refer to those with an ultrasound frequency greater than 10MHz. These are often in linear configuration. Low or mid-range frequency transducers (2-8 or 5-10MHz respectively) offer greater depth penetration and more versatile use, but less detail resolution. Select the transducer appropriate to patient size for the desired examination. Select the transducer with the maximal resolution for the depth required. Following transducer selection, set depth to the desired field of view. This should be manipulated continuously to evaluate entire organs and specific structures. With changes in the field of view, manipulation of the focal zone should then be considered. This will optimize lesion conspicuity and image resolution. For some newer ultrasound units, this may change automatically to match depth field of view. And ultimately fine tuning of gain will enhance an image. Focused Assessment with Sonography in Trauma (FAST) The FAST ultrasound technique was first developed in the human emergency room to assess patients following blunt force trauma for the presence of effusions. This groundbreaking work demonstrated the invaluable tool ultrasound could be used in a triage setting. From that initial study, numerous others have further demonstrated the importance of ultrasound in initial and recurring patient assessments across diverse ailments. Point of care ultrasound is fast, minimally invasive, dynamic, and can be performed by non-radiologists with ease. A modified abdominal FAST technique was first described in veterinary medicine in 2004 by Boysen SR, et al. Since then this technique has become widely utilized and is routinely incorporated into patient assessments at veterinary emergency and specialty care facilities. Detection of abnormalities on FAST exams can aid in diagnosis and direction of additional diagnostics. Abnormalities, such as effusions, can be sampled via abdominocentesis, and then monitored over time to assess for progression or resolution. The FAST technique for the abdomen consists of a four quadrant approach. The patient may be in variable recumbency depending on clinical presentation. Dorsal recumbency evaluation of the abdomen is recommended if possible. Alternatively, bilateral lateral recumbency evaluations can be performed. The first part of the four quadrant approach is to place the transducer in a subxiphoid position and evaluate the hepatic and perihepatic space. Evaluation should extend beyond the depth of the diaphragm if possible. This allows for evaluation of both the caudal thorax and cranial abdomen simultaneously. The second transducer position is mid left lateral abdomen to evaluate the perisplenic and left perirenal region. The third transducer position is prepubic to evaluate the peripelvic structures, including the urinary bladder and caudolateral abdominal recesses. The fourth transducer position is mid right lateral abdomen to evaluate the right perirenal region. A FAST technique has also been developed for the thorax and consists of a five-point approach, however also depends on patient recumbency. If possible, bilateral assessments should be made with the patient in sternal recumbency. The cranioventral thorax and pericardial space should be evaluated bilaterally via a para-axillary intercostal approach. The caudodorsal thorax should be evaluated bilaterally via an intercostal approach. It is recommended to start in the 8th and 9th intercostal spaces dorsally, and then adjust cranially as needed given breed conformation to view caudal dorsal pleural space and lobar parenchyma. If permissible, a subxiphoid evaluation completes the five-point assessment for interrogation of the ventral pericardial space and caudal pleural space. These techniques can be easily incorporate into daily practice of the primary care veterinarian for patients presenting with diverse illnesses. Understanding and application of the basic ultrasound controls can increase the yield of diagnostic information from FAST exams of the thorax and abdomen. - Boysen SR, Rozanski EA, Tidwell AS, et al. Evaluation of a focused assessment with sonography for trauma protocol to detect free abdominal fluid in dogs involved in motor vehicle accidents. J Am Vet Med Assoc 2004;225:1198-204. - Lisciandro GR. Abdominal and thoracic focused assessment with sonography for trauma, triage, and monitoring in small animals. J Vet Emerg Crit Care 2011;21:104-22. About the author Dr. Brisson received her Doctor of Veterinary Medicine with thesis, from Tufts University, Cummings School of Veterinary Medicine in 2004. She completed a one-year internship in small animal medicine and surgery at the Veterinary Referral and Emergency Center in Norwalk, CT, followed by a three-year residency in Diagnostic Imaging at Tufts University in July of 2008. Dr. Brisson became board certified by the American College of Veterinary Radiology in September 2009. Dr. Brisson has received extensive training in all modalities of veterinary radiology, including magnetic resonance imaging (MRI), computed tomography (CT), radiography, nuclear medicine, and ultrasound. Her professional interests in diagnostic radiology include abdominal MRI, gastrointestinal and hepatobiliary ultrasound, and thoracic computed tomography. Dr. Brisson also has a strong professional interest in Interventional Radiology. Dr. Brisson joined the radiology department at Massachusetts Veterinary Referral Hospital in July 2009. In 2014 she was promoted to Assistant Medical Director for the surgical services.
<urn:uuid:ed1f1492-e3fc-405e-af8b-3a501567489d>
CC-MAIN-2023-40
http://blog.vetbloom.com/radiology/making-the-most-of-your-ultrasound-machine/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.909352
1,656
2.53125
3
The review is to analyze the literature/research through summary, classification, and comparison. A good review does not summarize, it critically evaluates to give a clarity of piece of knowledge. What is the need for a literature review? A literature review may be helpful in the following things: - It compares and contrasts each source with other applicable literature on the topic. - It evaluates the source of literature. - It indicates how each source has contributed to the whole body of the knowledge. - It integrates the discussion. Purpose of literature review. The purpose of the literature review is to gain an understanding of the piece of research and its relevance to a particular source. It creates new ways to interpret the specific topic. It provides the foundation of knowledge and identifies the advanced areas of the topic. It also provides a relative need for additional research. Types and components of literature review. - Narrative literature review:- It is also referred to as a traditional literature review. It summarizes the body of the literature. The narrative review also talks about the conclusion of the topic and identifies gaps/inconsistencies in a body. - A systematic literature review requires well-defined advanced work to most other types of reviews. Systematic literature can be divided into two categories: meta-analysis and meta-synthesis. - Scoping literature review:- As the name suggests, it is used to identify the scope of literature on a certain topic. - Theoretical literature review pivot on a theory that has been collected in regards to solving an issue, a concept, or a phenomenon. Components of literature review. - It contains the objective of the review. - Overview of the topic under consideration. - Categorization of sources. - Discussion of its similarities with another source. Structure of a literature review. A literature review should have an introduction, the main body, and a conclusion. - Introduction:- It should define your topic and provides a context. It also helps to establish the reasons. You should explain the organization in the introduction and include the review’s scope. - Main body:- Main body should organize the literature based on themes. It should provide the relation between chosen topic and subject area. - Conclusion:- The conclusion should summarize the important points of the body of the literature. It also should link the research to existing knowledge. A literature review writer defines the topic and scope of the subject. It analyzes, interprets, and discusses the research and conclusion of the source.
<urn:uuid:6a6156d3-3932-474f-824e-9507f7d3d6ed>
CC-MAIN-2023-40
http://conexoesquesalvam.com/jobs/things-you-should-know-about-literature-review/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.906171
522
2.96875
3
- Lesson Goals - Working with Text Files - Creating and Writing to a Text File - Suggested Readings In this lesson you will learn how to manipulate text files using Python. This includes opening, closing, reading from, and writing to files using programming. The next few lessons in this series will involve downloading a web page from the Internet and reorganizing the contents into useful chunks of information. You will be doing most of your work using Python code written and executed in Komodo Edit. Working with Text Files Python makes it easy to work with files and text. Let’s begin with files. Creating and Writing to a Text File Let’s start with a brief discussion of terminology. In a previous lesson (depending on your operating system: Mac Installation, Windows Installation, or Linux Installation), you saw how to send information to the “Command Output” window of your text editor by using Python’s print command. The Python programming language is object-oriented. That is to say that it is constructed around a special kind of entity, an object, which contains both data and a number of methods for accessing and altering that data. Once an object is created, it can interact with other objects. In the example above, we see one kind of object, the string “hello world”. The string is the sequence of characters enclosed by quotes. You can write a string one of three ways: message1 = 'hello world' message2 = "hello world" message3 = """hello hello hello world""" The important thing to note is that in the first two examples you can use single or double quotes / inverted commas, but you cannot mix the two within one string. For instance, the following are all wrong: message1 = "hello world' message2 = 'hello world" message3 = 'I can't eat pickles' Count the number of single quotes in message3. For that to work you would have to escape the apostrophe: message3 = 'I can\'t eat pickles' Or, rewrite the phrase as: message3 = "I can't eat pickles" In the third example, the triple quotes signify a string that covers more than one line. You will use # file-output.py f = open('helloworld.txt','w') f.write('hello world') f.close() In Python, any line that begins with a hash mark (#) is known as a comment and is ignored by the Python interpreter. Comments are intended to allow programmers to communicate with one another (or to remind themselves of what their code does when they sit down with it a few months later). In a larger sense, programs themselves are typically written and formatted in a way that makes it easier for programmers to communicate with one another. Code that is closer to the requirements of the machine is referred to as low-level, whereas code that is closer to natural language is high-level. One of the benefits of using a language like Python is that it is very high level, making it easier for us to communicate with you (at some cost in terms of computational efficiency). In this program f is a file object, and close are file methods. In other words, open, write and close do something to the object f which is in this case defined as a .txt file. This is likely a different use of the term “method” than you might expect and from time to time you will find that words used in a programming context have slightly (or completely) different meanings than they do in everyday speech. In this case recall that methods are bits of code which perform actions. They do something to something else and return a result. You might try to think of it using a real-world example such giving commands to the family dog. The dog (the object) understands commands (i.e., has “methods”) such as “bark”, “sit”, “play dead”, and so on. We will discuss and learn how to use many other methods as we go along. f is a variable name chosen by us; you could have named it just about anything you like. In Python, variable names can be made from upper- and lowercase letters, numbers and underscores…but you can’t use the names of Python commands as variables. If you tried to name your file variable “print” for example, your program would not work because that is a reserved word that is part of the programming language. Python variable names are also case-sensitive, which means that foobar, Foobar and FOOBAR would all be different variables. When you run this program, the open method will tell your computer to create a new text file helloworld.txt in the same folder as you have file-output.py program. The w parameter says that you intend to write content to this new file using Python. Note that since both the file name and the parameter are surrounded by single quotes you know they are both stored as strings; forgetting to include the quotation marks will cause your program to fail. On the next line, your program writes the message “hello world” (another string) to the file and then closes it. (For more information about these statements, see the section on File Objects in the Python Library Reference.) Double-click on your “Run Python” button in Komodo Edit to execute the program (or the equivalent in whichever text-editor you have decided to use: e.g., click on the “#!” and “Run” in TextWrangler). Although nothing will be printed to the “Command Output” pane, you will see a status message that says something like `/usr/bin/python file-output.py` returned 0. in Mac or Linux, or 'C:\Python27\Python.exe file-output.py' returned 0. This means that your program executed successfully. If you use File -> Open -> File in your Komodo Edit, you can open the file helloworld.txt. It should contain your one-line message: Since text files include a minimal amount of formatting information, they tend to be small, easy to exchange between different platforms (i.e., from Windows to Linux or Mac or vice versa), and easy to send from one computer program to another. They can usually also be read by people using a text editor like Komodo Edit. Reading From a Text File Python also has methods which allow you to get information from files. Type the following program into your text editor and save it as file-input.py. When you click on “Run” to execute it, it will open the text file that you just created, read the one-line message from it, and print the message to the “Command Output” pane. # file-input.py f = open('helloworld.txt','r') message = f.read() print(message) f.close() In this case, the r parameter is used to indicate that you are opening a read from it. Parameters let you choose among the different options a particular method allows. Returning to the family dog example, the dog may be trained to bark once when he gets a beef-flavoured snack and twice when he gets a chicken-flavoured one. The flavour of the snack is a parameter. Each method is different in terms of what parameters it will accept. You cannot, for example, ask the dog to sing an Italian opera – unless your dog is particularly talented. You can look up the possible parameters for a particular method on the Python website, or often you can find them by typing the method into a search engine along Read is another file method. The contents of the file (the one-line message) are copied into message, which is what we’ve decided to call this string, and then the Appending to a Pre-Existing Text File A third option is to open a pre-existing file and add more to it. Note that if you open a file and use the write method, the program will overwrite whatever might have been contained in the file. This isn’t an issue when you are creating a new file, or when you want to overwrite the contents of an existing file, but it might be undesirable when you are creating a log of events or compiling a large set of data into one file. So, instead of write you will want to use the Type the following program into your text editor and save it as file-append.py. When you run this program it will open the same helloworld.txt file created earlier and append a second “hello world” to the file. The ‘\n’ stands for new line. # file-append.py f = open('helloworld.txt','a') f.write('\n' + 'hello world') f.close() After you have run the program, open the helloworld.txt file and see what happened. Close the text file and re-run file-append.py a few more times. When you open helloworld.txt again you should notice a few extra ‘hello world’ messages waiting for you. In the next section, we will discuss modularity and reusing code.
<urn:uuid:a2767e96-cf27-46f0-a44d-71aa046df9d6>
CC-MAIN-2023-40
http://programminghistorian.org/en/lessons/working-with-text-files
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.905587
2,084
3.953125
4
Australia’s commitment to become a major wine producing nation was evident as the first fleet brought vine cutting from Cape of Good Hope in 1788. The attempt to grow vine in Australia failed miserably because of the unfamiliar Sydney weather. ‘The never say die’ attitude of early settlers prevailed and by 1820 Australian made wine was available for domestic sale. In 1822 Gregory Blaxland went a step further by exporting wine overseas. The size of the land mass and variety of climatic conditions and soil types enabled Australians to produce all of the major wine types. Australia was predestined to become one of the best wine producers in world both qualitatively and quantitatively. Although around 130 grape varieties are used by commercial wine makers in Australia ,major grape varieties are Shiraz, Cabernet Sauvignon, Merlot, Chardonnay, Sauvignon Blanc, Sémillon, and Riesling. For making white and red wine different types of grape varieties are used. Major White wine grapes There are hundreds of grape varieties for making both white and red wines. Below are a few major white wine grapes used in the production . The green skinned Chardonnay is one of the most flexible and malleable varieties of grape and relatively easy to cultivate almost anywhere, making it one of the most popular. Chardonnay can be made into huge variety of different styles of from crisp, light fizz through to rich and complex barrel fermented, full bodies light wines . Modern DNA fingerprinting research at University of California, Davis, now suggests that Chardonnay is the result of a cross between the Pinot and Gouais Blanc (Heunisch) grape varieties This green skinned variety got its name from French word sauvage (“wild”) and blanc (“white”) and mainly used for producing crisp, dry, and refreshing white varietal wine. The wine is usually consumed young, as it does not particularly benefit from aging, except for some oak-aged Pessac-Léognan and Graves from Bordeaux that can age up to fifteen years. In Australia, particularly the Margaret River region, the grape is often blended with Sémillon. Varietal styles, made from only the Sauvignon Blanc grape, from Adelaide Hills and Padthaway have a style distinctive from their New Zealand neighbours that tend to be more ripe in flavour with white peach and lime notes and slightly higher acidity. This golden skinned grape is used to make dry and white wines. In Australia this variety is widely grown in hunter valley north of Sydney. Originated in the Rhine region of Germany, this aromatic grape variety is used to make dry , semi-sweet and sparkling white wines. The character of the Riesling wine is influenced by the place of cultivation. It is an early ripening variety and suited to cooler areas. It is almost never put into oak barrels and can be one of the most delicious and rewarding white wines. Gewürztraminer is a variety with a pink to red skin colour, and grows best in cooler climates, and is used for making white wine. These wines have an unmistakable flavour of lychees and rosewater. Red wine Grapes Syrah or Shiraz This dark skinned grape is primarily used for making red wines. In South Africa and Australia, it is known as Shiraz and the rest of the world by the name Syrah. Syrah grape is used for making dense, burly, deep-coloured, long lived wines of hermitage and slightly more seductively perfumed Cote-Rotie. The name is derived from the French words for “pine” and “black”. This variety is best suitable for cooler regions. At its basic Pinot Noir should have flavours like red berries , strawberry and Cherry . A little further up the scale you will find spices such as clove and aniseed. Pinot noir is also used in the production of Champagne (usually along with Chardonnay and Pinot meunier) and is planted in most of the world’s wine growing regions for use in both still and sparkling wines. Pinot noir grown for dry table wines is generally low-yielding and of lesser vigour than many other varieties, whereas when grown for use in sparkling wines (e.g. Champagne) it is generally cropped at significantly higher yields. (Courtesy: Wikipedia). The Cabernet family Cabernet Sauvignon – This variety is grown everywhere and ripens fairly reliably and relatively easy to make into good wine. Cabernet Sauvignon vines are churning out deeply coloured red wine that smells of blackcurrants is firm and tannic and can age well. It has a reputation for producing long lived wines. One of the most noted traits of Cabernet Sauvignon is its affinity for oak, either during fermentation or in barrel aging. In addition to having a softening effect on the grape’s naturally high tannins, the unique wood flavours of vanilla and spice complement the natural grape flavours of black currant and tobacco. Cabernet Franc – This variety makes a lighter wine compared to Cabernet Sauvignon and makes a bright pale red wine. it makes a fragrant , black currant smelling wine . Merlot – Merlot is a darkly blue-coloured wine grape that is used as both a blending grape and for varietal wines. Merlot-based wines usually have medium body with hints of berry, plum, and currant. Its softness and “fleshiness”, combined with its earlier ripening, makes Merlot a popular grape for blending with the sterner, later-ripening Cabernet Sauvignon, which tends to be higher in tannin. Malbec and Pett Verdot – Both the varieties usually appear only in minor supporting roles n blends with the other grapes, added for their deep colour and slightly course, rustic character. It is unusual to find petit verdot as a wine on its own right. Cabernet Franc is lighter than Cabernet Sauvignon, making a bright pale red wine and contributing finesse and a peppery perfume to blends with more robust grapes. Depending on growing region and style of wine, additional aromas can include tobacco, raspberry, bell pepper, and cassis, sometimes even violets. Records of Cabernet Franc in Bordeaux go back to the end of the 18th century; it was planted in Loire long before that. DNA analysis indicates Cabernet Franc is one of two parents of Cabernet Sauvignon, a cross between it and Sauvignon Blanc. The best illustrated wine making detail can be found at this website http://www.wineanorak.com/howwineismade.htm How white wine is made ? A Crusher – Destemmer machine will crush the grapes and will separate the stalks. Crushed Grapes will be pressed out to get the juice in a press. For white wine only the juice will be moved to a closed stainless steel tank and yeast will be added once the juice settles. Slow fermentation will be carried out by keeping the juice cool. After a few days once the fermentation is finished, pump the new wine to another tank, so that it will separate from the dead yeast and pulp that is settled at the bottom. A clarifying agent will be added to make the wine clear. How red wines are made? There are a few differences in making white and red wines. The skin of the grape is added while making red wine to get the red colour whereas only the juice is taken while making white wine. Red wine is fermented at a warmer temperature compared to white wine. How Sparkling wine is made? Sparkling wine is a wine with significant levels of carbon dioxide in it making it fizzy. Grapes are harvested early when there are high acid levels. The bunches of grapes are pressed gently without crushing them first, then yeast is added to the fine juice (without the skins ) to make an unwooded dry white wine . This is called base wine. Most sparkling wines are blends of several grape varieties. Many base wines are blended to create one final base wine that has all the top qualities. These base wines are put into thick bottles and a little yeast and sugar is added before sealing them firmly. The bottles are kept in a cool place for around 18 months. The yeast and the sugar will ferment inside the bottle again producing more alcohol and lot more carbon dioxide . This carbon dioxide will dissolve in the wine as it has no way to escape from the bottle. The dead yeast will fall as lees on the inside of the bottle, over the months this will give the wine distinctive flavour. The bottles will be shaken and turned progressively until it is standing upside down with all the lees collected at the neck of the bottle. The neck will be dipped in freezing brine. Then the bottle will be placed straight up before opening the seal, forcefully disgorging the frozen plug containing the lees . A little bit of wine and sugar is added to the bottle and the bottle will be sealed again. What is fortified wine? Fortified wine is wine to which a distilled beverage has been added. Usually brandy is added . In Short fortified wine is wine with spirit added to it. Essential Wine vocabulary for Wine lovers Vineyard – Ground planted with cultivated grapevines. Winery – An establishment at which wine is made. Vine – A weak-stemmed plant that derives its support from climbing, twining, or creeping along a surface. In Australia nearly half of all vines grow in South Australia, a third in Victoria and most of the rest in New South Wales . Wine regions of South Australia Southern Fleurie , Adelaide Hills, Barossa Valley, Clare Valley, Coonawarra, Eden Valley ,Langhorne Creek, McLaren Vale, Padthaway, Riverland, Wrattonbully Wine regions of Victoria Alpine Valleys, Beechworth, Goulburn Valley, Grampians, Heathcote wine region, Henty, Mornington Peninsula, Pyrenees, Rutherglen, Strathbogie Wine Region, Yarra Valley, King Valley Wine Regions of New South Wales Hunter Valley, Mudgee, Orange, Riverina, New England, Southern Highlands, Shoalhaven Coast Wine regions of Western Australia Greater Perth, Perth Hills, Peel, Swan Valley, South Western Australia, Blackwood Valley, Geographe , Great Southern, Albany, Denmark, Frankland River, Mount Barker, Porongurup, Manjimup, Margaret River, Pemberton ( WINE FOR PHOTO SUPPLIED BY SANAL RAJ RAJAGOPAL ) The labelling information is numbered in the order one would examine the label. Grape type being the most important aspect of information followed by country of origin and the name of the producer determined by the maturity of the wine producing country and the extent to which its wine regions have managed to establish a meaningful identity . Whether the wine is vintage or not also carries importance. As per this Wine Label, the year wine is produced is 2011 and the country of origin is Australia. Rose Mount Estate is the name of the Wine Producer. Grape variety used in making the wine is Cabernet Sauvignon. Obviously this is red wine. The back label shows name of the producer, country of origin, Bottling information, Alcoholic Strength (13.5%) and the volume which is 750ml in this case. The description at the back of the bottle about the wine says ‘Our diamond label Cabernet Sauvignon is medium bodied with generous dark plum and ripe black cherry flavours, supported by soft velvety tannins with a full smooth finish . It is equally enjoyable accompanying the effortless simplicity of a steak or a rich pasta dish with substantial bolognaises sauce’. The label carries all the information required for someone looking for the right type of wine for a dinner party or any other occasion suggesting even the best accompanying food. If you find it difficult to understand wine tasting terms like medium bodied, tannins etc. mentioned in the lable please read our article on wine tasting terms at http://www.india2australia.com/wine-tasting-terms/
<urn:uuid:3d76e1d9-6534-4e42-8e25-b31b34449c47>
CC-MAIN-2023-40
http://www.india2australia.com/wine-australian-wine/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.934761
2,653
2.6875
3
Solar thermal power generation is a clean energy technology that uses heat collectors to convert solar radiation energy into heat energy and generate electricity through a thermodynamic cycle process. The existing solar power generation systems in the world can be roughly divided into three categories according to the heat collection temperature: trough line focusing system, tower system and dish system. Some advanced ceramic materials can be applied to the heat absorber of the tower solar thermal power generation system. 1. The operating principle of trough, dish and tower solar thermal power generation systems: The trough solar thermal power generation system is an energy power system that uses a trough-shaped parabolic mirror to focus the solar fiber onto the heat collector to heat the heat transfer medium, and the steam generated by the heat exchange drives the steam turbine to drive the generator to generate electricity. Figure 1 Trough solar thermal power generation system The dish system, also known as the dish system, mainly uses a dish-shaped parabolic mirror concentrating heat collector, and its structure is similar to a large parabolic radar antenna in appearance. Since the disc-shaped parabolic mirror is a point-focused collector, its concentration ratio can be as high as hundreds to thousands, so it can generate extremely high temperatures. The dish solar power generation system can connect multiple devices in parallel to form a small solar power station to provide electricity for users. Figure 2. Dish concentrated solar thermal power generation system The tower system is also called a centralized system. Its concentrating device is composed of many large reflectors (usually called heliostats) installed on the site. Each heliostat has the ability to track the sun in two axes and can accurately Concentrate sunlight reflection on a heat absorber at the top of a high tower, and solar heat heats the heat transfer medium on the heat absorber; the superheated steam generated by the steam generating device enters the power subsystem to realize heat work conversion, thus completing computer output. Figure 3. Tower solar thermal power plant system 2. Which ceramic materials can be used in solar power generation systems: Tower-type solar thermal power generation system is highly recommended in solar power generation because of its high concentration ratio (200~1000kW/㎡), high thermal cycle temperature, low heat loss, simple system and high efficiency. As the core device of tower-type solar thermal power generation, the heat absorber needs to withstand the radiation intensity 200-300 times stronger than natural light, and the working temperature can be as high as above 1,000 °C, so its performance is very important for the stable operation and working efficiency of the thermal power generation system. important. The working temperature of traditional metal heat absorbers is limited, which makes porcelain heat absorbers a new research hotspot. 2.1 Due to the inhomogeneity and instability of the concentrated energy flow density of solar energy, there are the following requirements for the ceramic heat absorber material: (1) High-temperature oxidation resistance, the material will not be oxidized and damaged in a long-term high-temperature working environment; (2) Good high-temperature mechanical properties and thermal shock resistance can avoid material hot spot damage; (3) High solar radiation absorption rate, so that the material can fully absorb solar radiation energy; (4) It has a three-dimensional or two-dimensional connected structure, ensuring high permeability of the material, making the air flow resistance small, and conducive to the uniform and stable distribution of air flow; (5) High specific surface area ensures that the material has a large heat exchange area and ensures sufficient heat exchange with air. 2.2 The following ceramic materials can be used as heat sink materials: ① Alumina ceramics: can withstand high temperatures above 1000 ° C, high mechanical strength and chemical stability, and acid and alkali resistance, good thermal conductivity, dielectric strength, resistivity, and wear resistance; the disadvantage is that the working temperature is high but the thermal conductivity and The solar radiation absorption rate is low, and its color is white so that it must be coated on the surface when it is used as a heat absorber, thereby increasing the solar radiation water absorption rate. During high-temperature use, the substrate and coating of the product are prone to cracking, and the shock resistance is not good, which limits the actual use. ② Cordierite ceramics: It has the characteristics of low thermal expansion coefficient, good thermal shock resistance, and large specific surface area, but because of its low strength, it is usually necessary to add second phases such as mullite and zirconia to improve its strength. However, the cordierite porcelain heat absorber material has the same problem as the alumina ceramic heat absorber material, and is only suitable for medium temperature heat absorber materials. Experimental studies have shown that mullite-cordierite composite ceramics prepared by normal pressure sintering using synthetic mullite and synthetic cordierite as raw materials, waste glass powder and aluminum titanate as sintering aids can also be used for solar power generation Heat transfer piping materials used. ③Silicon carbide ceramics: It has excellent characteristics such as high strength, large specific surface area, corrosion resistance, oxidation resistance, good heat insulation, thermal shock resistance and high temperature resistance. Compared with alumina and cordierite porcelain heat absorber materials Has better high temperature performance. Research results have shown that the heat absorber made of sintered silicon carbide can make the heat absorber obtain an outlet air temperature as high as 1200 °C without material damage. Our country is relatively late in the application research of solar thermal power generation technology, and the substantive application research did not begin until the "Tenth Five-Year Plan" period. But it does not affect China's current status as the world's largest photovoltaic and solar thermal energy market. Advanced ceramics may not be widely used in the solar energy market due to technical cost and other reasons. However, with technological innovation, product upgrading, and production efficiency improvements, ceramic products that can be reasonably and efficiently adapted to solar thermal power generation systems are also available. It will be fully launched on the market, it is only a matter of time. Declaration: This article is provided by CERADIR™ users or obtained from Internet, the content does not represent the position of CERADIR™. We are not responsible for the authenticity/accuracy of the article, especially the effects of the products concerned. This article is for study only, it does not constitute any investment or application advice. For reprinting, please contact the original author. If it involves the copyright and/or other issues, please contact us and we will deal with it asap! CERADIR™ has the interpretation of this declaration.
<urn:uuid:a2f34b69-93e0-478b-9e86-29994a215cd2>
CC-MAIN-2023-40
https://academic.ceradir.com/columnists/how-do-advanced-ceramics-fit-into-solar-heating-systems.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.899744
1,424
3.734375
4
© 2022. Acta Ortopedica Brasileira. All Rights Reserved.Objective: To evaluate the effect of 3d printed models on surgical pre-operative planning of complex spinal deformities. Methods: In our study, five orthopedic surgeons made surgical planning of 5 patients with severe spinal deformity in three conditions: X-ray with computer tomography (X-ray-CT), 3D-computed tomography (3dCT), and 3d printed spine models. Operation plans were examined according to the level and number of instrumentations, osteotomy level, and time required for decision-making. Results: X-ray-CT, 3dCT, and 3d modeling methods were compared, and no statistically significant difference was observed in the number of screws and osteotomy score to be used in operation. The time required for decision ranking is 3d Model, 3d CT, and Xray-CT. Conclusions: 3d printed models do not influence the operative plan significantly; however, it reduces surgical planning time at pre-op duration, and those models gave some opportunities to practice with implants on a patient’s 3d spine model. Level of Evidence III; Diagnostic Studies - Investigating a Diagnostic Test.
<urn:uuid:c14b5608-f31f-4ca0-9a0e-ab6f0a549dec>
CC-MAIN-2023-40
https://avesis.kocaeli.edu.tr/yayin/898c9852-a894-45c5-947d-ff7209f4f627/no-significant-effect-of-3d-modelling-on-surgical-planning-in-spinal-deformities-nenhum-efeito-significativo-da-modelagem-3d-no-planejamento-cirurgico-em-deformidades-da-coluna-vertebral
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.943185
254
2.515625
3
An academic book on fossil fuel consumption reaches a startling conclusion: only a climate revolution can force governments to act to stop the planet overheating. Paul Brown, a founding editor of Climate News Network and journalist Cross-posted from Climate News Network Governments have completely failed to make progress in tackling the planetary emergency, and a climate revolution is the sole hope that they will do so. This sounds like a sound bite from Greta Thunberg, the 16-year-old Swedish climate activist who is inspiring schoolchildren worldwide to go on strike, or a slogan from Extinction Rebellion, which has been disrupting city life in the UK and elsewhere to secure an urgent government response to the climate emergency. Both campaigns might agree with the statement, but it is in fact from a scholarly book, Burning Up, A Global History of Fossil Fuel Consumption, a detailed study into the burning of fossil fuels since 1950. It looks at fuel consumption in individual countries but also at the political forces that have driven and still drive the ever-growing inferno of fossil fuels, coal, oil and gas, across the world. The book illustrates the reasons behind the rather frightening fact that since the Rio Earth Summit in 1992, despite many promises and warnings, governments have failed to take decisive action on climate change and in fact have made it decidedly worse by continuing to subsidise fossil fuels more than renewables. Simon Pirani, a senior research fellow at the UK’s Oxford Institute for Energy Studies, takes the reader through an exhaustive examination of fossil fuel consumption and the driving forces behind it. One point he makes is that governments, particularly in the US, have contrived to kill off the use of buses and trains and instead promoted private cars. And even if people wanted a choice, they don’t have the chance to make one, so we have to contribute to the increased use of fossil fuels if we want to lead a normal life. Producing many consumer goods and nearly all food depends on fossil fuels. Agriculture depends on oil-based fertiliser; and buying cars, washing machines and fridges leaves customers willy-nilly indirectly consuming fossil fuels. Pirani is also scathing about the rich world’s reaction to the sort of crisis that is here already and will become more commonplace in a warming world. He gives the example of Hurricane Katrina in New Orleans in 2005, when there was indifference from the government to the poor and disadvantaged who were most affected – an attitude mirrored across the world in subsequent disasters, especially in developing countries. Climate change is already affecting swathes of Africa, causing crop failures and famine – again largely ignored by the rich world, which he identifies as the main cause of climate change, continues to cause it, but refuses to take responsibility for its consequences. His third example is our attitude to refugees. He admits that most of the migrants converging now on Europe and the US are on the move because of wars or political oppression, but says that when millions are forced to migrate by climate change the pattern has already been set. The attitude of governments in the rich world, increasingly in the EU but already in the US, is to build walls to keep them out rather than tackle the problem at source. Altogether it is a fascinating and disturbing analysis of how the influence of the fossil fuel industry and its short-term financial advantage has come to outweigh the scientific evidence and the welfare of humanity in the minds of politicians. It certainly demonstrates why there is little hope of world leaders taking the action required to keep the world temperature from increasing more than 2°C, let alone 1.5°C. However, Dr Pirani claims that ordinary people can have an impact on governments. He points to the example of China where the government, fearful of the reaction of its people to the effects of air pollution on its children’s health, has taken decisive action to reduce the damage. India is currently going through the same process. His book was written and with the publisher before the rise of Extinction Rebellion and the school strikes, but perhaps that is exactly the sort of citizen action he would advocate. His conclusion is that unless ordinary people reject the continued dominance of the fossil fuel industry and force governments to act by continued acts of civil disobedience. there is no hope of keeping the world temperature below a dangerous level.
<urn:uuid:91031556-7005-4d38-a832-d923c002e221>
CC-MAIN-2023-40
https://braveneweurope.com/paul-brown-only-a-climate-revolution-can-cool-the-world
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.963986
880
3.28125
3
Amidst the chaos and violence that has plagued our nation in recent years, we often find it difficult to pray. For some, prayer seems like a relic of a bygone era; for others, it may be seen as an act of submission or self-pity. Regardless of our feelings about prayer in these troubled times, there is no denying that it has played an important role in American history. In this article, we will explore some of the most notable moments in America’s history when prayer was invoked or witnessed. The State of Prayer in America In America, prayer is often seen as a personal thing. However, the state of prayer in America should not be viewed in this way. Prayer is an important tool for community building and can have a positive impact on our nation. Prayer has been shown to have a significant impact on mental health and well-being. The study “The Effect of Religious Practice on Mental Health: A Meta-Analysis of Randomized Controlled Trials” found that people who practiced religious rituals had lower rates of anxiety and depression than those who didn’t. Prayer can also promote social justice. A study by the Pew Research Center found that when more Americans pray, the country is more likely to see progress on divisive issues like abortion and same-sex marriage. The state of prayer in America should be viewed as an opportunity for all Americans to come together and pray for our nation. We can use prayer to connect with God, find strength in our community, and promote social justice. What is Prayer? Prayer is an act of petition or supplication addressed to God or a deity. It is considered one of the five pillars of Islam. Prayer can be performed with or without words, and may be done alone, in a group, or in public. Prayer has been shown to have many positive effects on both the individual and society as a whole. Prayer has been shown to increase patience, understanding, and compassion. It can also help people connect with their faith and develop a deeper relationship with God. There are many different types of prayer, and people can choose the type that is most comfortable for them. Some common types of prayer include formal prayers (such as Salat), recitations (such as Tahajjud), dhikr (remembrance of God), and bowing and prostration (Istighfar). Muslims believe that every human being has a right to pray, regardless of age, social status, or race. Muslims also believe that everyone will be judged according to their prayer habits during their lifetime. Muslims are asked to recite the Quran at least once every day. The Quran is divided into 114 chapters (surahs), each divided into verses (ayat). Muslims are encouraged The Purpose of Prayer Prayer has a purpose. Prayer can help us connect with God, and it can help us connect with others. Prayer can also help us learn and grow. What would our world be like if we didn’t have prayer? We might not know about the other races in the world, or we might not be able to forgive ourselves. Prayer can help us learn and grow, and connect with God. We should all pray for our nation today. Let’s pray that our leaders will make the right decisions, that our country will be safe, and that everyone in America will have a chance to live their best life. Our Nation’s History with Prayer Prayer has been a part of our nation’s history from the beginning. George Washington said, “If it be your pleasure to appoint a day of public humiliation and fasting, I shall esteem it as the greatest honour that can be conferred upon me.” The first Papal bull of indulgences was issued by Pope Leo X in 1520 and allowed for the remission of temporal punishments for those who prayed for the pope’s intentions. The first mention of a national day of prayer was in 1784 when James Madison proposed a day of public thanksgiving. Prayer has been an important part of our history and continues to be today. There are many ways to pray, including silent prayer, praying with others, and prayerful reflection. Prayer can help us connect with God and positive outcomes will follow. The Benefits of Prayer Prayer is one of the oldest and most widely used methods of communication between humans. Prayer has been shown to provide many benefits, including: 1. Prayer Increases Relationship With God Prayer can help deepen a person’s relationship with God, which can lead to increased understanding and insight into spiritual matters. Prayer can also provide comfort during difficult times, and may even help someone to find peace in life. 2. Prayer Can Improve Mental Health Regular prayer has been shown to improve mental health. Studies have shown that people who pray regularly have lower rates of anxiety and depression, and are more likely to report feeling spiritually connected to others. 3. Prayer Can Help You Connect With Other People People who pray often have stronger relationships with other people. Prayer can help you develop empathy for others, and can increase the level of trust that exists between two people. This can lead to better communication and collaboration in both personal and professional settings. We live in a time when prayer is more important than ever. We need to pray for our nation today. Pray for our leaders, our citizens, and for the peace of our land. Thank you for reading and please share this article with your friends. Prayer for our nation today Prayer for our nation today We come to you today in prayer for our nation as we head into yet another turbulent year. We pray that you will guide us through this time and protect us from harm. Give us strength to face the challenges ahead, and may we all work together to make this a year of progress. What we can do to pray for our nation In the current political and social climate, prayer has become an integral part of our lives. Whether we are Christians, Muslims, Jews, Hindus, or any other faith tradition, we all have a responsibility to pray for our nation. Here are some ideas on how you can pray for our nation: 1. Pray for unity and peace in our society. 2. Ask God to heal the divisions that have arisen in our society. 3. Ask God to guide our leaders and protect them from harm. 4. Ask God to bless America with wisdom and guidance in the future. 5. Pray for strength and resolve during times of crisis. Our nation is facing many challenges at the moment. We are facing a president who has shown himself to be unethical and unqualified for the job, as well as a Congress that seems unwilling or unable to stand up to him. In addition, we are seeing an increasing divide between rich and poor, with those at the top pulling away from everyone else. There is much anger and frustration out there, which is manifesting itself in dangerous ways. But amid all of this chaos and division, there is also great hope. Thousands of people across the nation are protesting against Trump and his policies, fighting for what they believe in despite being met with violence and intimidation. There are grassroots movements happening everywhere – from California to Oklahoma – that are standing up against the status quo and fighting for change. So let us not be discouraged by our current situation. Let us instead channel our energy into helping make positive change happen, using whatever means we have available to us. Prayer is one tool that can help us do this; it can help us connect with our divine nature so that we can tap into the power of love and unity to fight against evil on behalf of society as a whole. So please join me in prayer today for our nation’s
<urn:uuid:378e1468-3859-482a-a8aa-01f96482da2e>
CC-MAIN-2023-40
https://churchreaders.com/prayer-for-our-nation-today/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.964052
1,614
3.578125
4
The AI Art Revolution: Empowering or Endangering the Creative Industries? It’s time to weigh in on how we can maintain a balance between AI’s capabilities and artist integrity. Ultimately, respecting the original creators and responsibly harnessing technology will pave the way for a more harmonious future in the world of art. As we delve into the topic of AI art theft, it’s essential to consider the possible future implications this may have on the art industry as a whole. Artists, collectors, and other stakeholders need to be prepared for potential challenges and changes in the market dynamics. In conclusion, it’s clear that AI’s presence in the world of art is far from being settled or universally accepted. There are valid concerns regarding originality, ownership, and its impact on the artistic community, but also potential benefits from collaborating with this technology. The future of AI-generated art and whether it’ll be deemed theft is yet to be seen, but the debate will continue. How has the use of AI impacted the art world? He wanted to make creating AI art accessible to everyone, even those of us who can’t code. «But I’m hopeful that it will contribute to human creativity in general, just like how the creation of computers added more to creativity. I’m excited for its contribution,» they said. Artists are now calling on regulators in the UK and worldwide to take more action to protect artists and the industry. «And this is not an example I’m randomly making up. There have been tests done by asking these sort of blanket questions without gender being in the text prompt and, more often than not, it’s reflecting these stereotypes.» «Let’s say we ask an image generation AI system to generate a doctor assessing care to a family,» she said. For artist and human rights researcher Caroline Sinders, it is for AI companies to address the problem. It allows artists to explore the possibilities of computer-generated art and use it as a powerful tool to create something that is truly unique. Generative art has helped to drive the growth of AI-driven art, as it provides a platform for creatives to experiment with new techniques and push the boundaries of what can be achieved through genrative ai artificial intelligence. Through generative art, artists can express themselves in ways otherwise impossible with traditional media, and create works that have never been seen before. This level of creativity is one of the key benefits that generative art has to offer and is helping to propel its popularity in the creative industry. The Benefits of Using Generative Art in Your Designs AI is playing an increasingly important role in the world of generative art, providing creatives with an array of powerful tools to create dynamic artwork. Generative art is a type of AI-generated art, where algorithms and programs are used to create unique artwork with no human intervention or input. With models such as DALL-E, generative art is becoming more accessible than ever before, and many artists are now utilizing AI-driven tools to produce complex works that push the boundaries of what’s possible. AI can be used to generate abstract images, 3D models, and even music and animation, allowing for new and innovative ways of expressing creativity. In terms of how you can start using this very powerful AI generator, here is a guide. I’m constantly impressed by, (or is it scared of?), the incredible speed at which technology is changing and improving our everyday lives. MidJourney is very impressive, but it still in its very early stages, so one can only imagine what could be next. Discover the Artistic Potential of Generative Art: A Beginner’s Guide A prolific businessman and investor, and the founder of several large companies in Israel, the USA and the UAE, Yakov’s corporation comprises over 2,000 employees all over the world. He graduated from the University of Oxford in the UK and Technion in Israel, before moving on to study complex systems science at NECSI in the USA. Yakov has a Masters in Software Development. You can also browse the prompts used by the community to produce the AI art in the website’s community feed. You can use the image generator in tandem with the CF Spark ImageMix to create even more variations of your generated art. With the Picsart AI Art Generator, you can produce visuals in a number of styles, from oil paintings to anime. Once done, use their AI photo-enhancing tool to customize your creations further. Their impressive AI algorithm can truly empower any artist to harness their creativity, whether they’re using the generator to sell products or explore new possibilities. Stable Diffusion is a cutting-edge deep learning model that turns words into images! However, at the time of writing, the defendants have suggested that they are considering an appeal. As a rule of thumb, for many types of copyright work (with some notable exceptions including film and sound recordings), the author of a work will be the first owner of any copyright in it, unless the work is made by an employee in the course of their employment. In this case, subject to any agreement to the contrary, the employer will be the first owner. As the German artist turns 75 this year, a survey of her work at Berlin’s Neue Nationalgalerie explores her ability to foreground potential over ruin. The Impact of AI on Art The extractive practice of training large language and image models on the collective commons of the internet without consent is, after all, no different from taking advantage of public roads to drive for Uber or Lyft. In 2017, a team of researchers from the University of Southern California created a sculpture called “Aurora” that was made using an AI. The sculpture was created using a 3D printer genrative ai and was based on the form of a human face. The USC team used a GAN to generate the 3D model for “Aurora.” The GAN was trained on a dataset of 3D models of human faces. Another way that artificial intelligence can be used in art is to help artists create new art styles. This can be done by using artificial intelligence to develop new ways of painting or by using it to create new ways of sculpting. With TensorFlow, you can build and train your machine-learning models to generate unique works of art based on a given dataset. To start with TensorFlow, you will need a basic understanding of machine learning and programming. Many resources are available online to help you learn these skills, genrative ai including online tutorials, online courses, and books on machine learning. Hotpot AI is a platform that uses AI to generate original pieces of art in a variety of styles. This generator offers a wide range of options for customizing your art, including colour palettes, brush strokes, and more. Using Generative AI (GAI): the rule book Before diving into these concerns, let’s briefly consider the implications that AI has on creators and the art world. Digital artist and designer, Neon Saltwater, transformed a 1930s gas station in Downtown Las Vegas for the latest edition of the Life is Beautiful festival, curated by the women-led art platform Justkids. Additionally, there are ethical concerns related to AI art, such as the potential for it to be used to create deepfakes or synthetic media that can be used to deceive or manipulate people. It’s a latent diffusion model, which is a fancy way of saying it’s a deep generative neural network developed by the CompVis group at LMU Munich. It’s the brainchild of a collaboration between Stability AI, CompVis LMU, Runway and with the support of EleutherAI and LAION. This event is free and open to all as part of the Creative Computing Institute’s public programme. - Still, there’s an ongoing debate over whether these laws need to adapt to accommodate the growing presence of AI-generated works. - The UK Government has been vocal about its ambition for the nation to be “the best place in the world for research and innovation, and at the forefront of the artificial intelligence and data revolution”. - Ultimately, we have good news and good advice for creatives that are worried about their livelihoods being under threat. - He also believes they should invest in content moderation and safety teams to respond to user complaints and flags on any harmful content generated. «It’s also very good at generating legible and correctly spelled text in images, and can even understand prompts in multiple languages,» Russell added. «Of these capabilities, the ability to generate legible text in images is perhaps the biggest breakthrough to make DeepFloyd IF stand out from other algorithms.» Digital selves is a London-based computer musician who uses algorithms of synthesis and samples to create improvised, crunchy sounds and melodic texture. They have performed at various events in the UK and internationally and use the programming mini-language TidalCycles to create algorithmic music that recontextualizes club culture, experimental art and human-computer interaction. On the other side of the debate is the copyrighted material AI models are trained on.
<urn:uuid:e4c92130-8894-4a57-87c5-4cc88dbf1450>
CC-MAIN-2023-40
https://emprendetuweb.com.ar/what-is-the-best-artificial-intelligence-art/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.939014
1,907
2.609375
3
In the late 1980s, psychologists became intrigued by a group of children who had some impressive strengths – strengths that put them far ahead of their peers. Most notably, the kids had a striking ability to manage their emotions well. These "emotionally intelligent" children were not only better at keeping a lid on strong emotions, they also enjoyed significant spin-off benefits. They were able to focus on tasks better, navigate stressful social interactions better (e.g. bullying), they enjoyed deeper, more lasting friendships, performed better academically, and even had better health than their peers. In short, they were living testimony to the truth of Proverbs 16:32. The value of being emotionally intelligent Such findings eventually prompted psychologist John Gottman to claim that "even more than IQ, your emotional awareness and ability to handle feelings will determine your success and happiness in all walks of life . . ."1 What was the specific skill set that gave these children such a strong advantage? Unlike most children who typically become overwhelmed by sadness or frustration, this unique group of kids were remarkable for their ability to "snap out of a funk" by focusing their energy on finding productive solutions. And this skill was no accident of the children’s biological makeup. Close investigation revealed that their mature self-control was the direct result of specific parenting strategies. In 1997 John Gottman spelled out the secrets of such exemplary parenting in his book Raising an Emotionally Intelligent Child. Six healthy habits for parents As it turns out, parents who excel at coaching children in self-control consistently demonstrate six healthy habits as they address their child’s emotions head on: - they are sensitive to their child’s emotional state, always engaging the child if something seems amiss, - they welcome their child’s display of emotion as an opportunity to teach and draw closer to their child, - they make a conscious effort to label emotions so the child learns to correctly identify their feelings for themself, - they listen to their child empathetically, frequently validating their child’s feelings, - they encourage their child to explore their own solutions to the problem, - and they set clear standards for behaviour, pointing out behaviours that are appropriate (when expressing emotions) and those that are unacceptable. In an earlier article, we touched on the first three aspects of nurturing self-awareness and self-control (see First steps in self-control: Helping your child identify their emotions). Here, we’ll focus on numbers four and five: listening empathetically to your child and exploring solutions. Build your empathetic listening skills The book of James includes a passage on self-control that encourages believers to be "quick to listen" (James 1:19). Ironically though, well-meaning parents often make the mistake of not really listening to their upset child at all. Instead, they rush their child through intense emotions. A parent’s instinct is often to distract an angry or sad child, to get them back to a "happy state" as quickly as possible. To use a simple example, imagine a child drops their ice cream on the sidewalk. The parent responds with: "Don’t cry; you can have a biscuit instead when we get home." The problem with this approach is that it dismisses the child’s sadness as unimportant. Rather than acknowledging the child’s loss, the child is effectively told to "stop feeling sad." And there’s another problem here as well: to a child, this message could imply that feeling sad is bad or uncomfortable, and something to be avoided at all costs. When you apply good listening skills, you offer your child something else entirely – something that research shows is far more effective: you are offering empathy. Your empathy makes all the difference, because your child knows their feelings have been heard and understood by the person who matters most in their whole world: their parent. In the lost ice cream scenario, here’s how a better, more empathetic parenting script might play out: "Oh dear; I can see that you’re sad that you lost your ice cream." [Parent identifies the emotion, giving it a label.] [Parent continues] "I would be sad too if that happened to me." [Parent validates the emotion; shows it’s okay to be sad.] "You’d been looking forward to that ice cream for so long. You must be really, really sad. Am I right?" [Parent invites the child to talk about how they are feeling.] Notice that the parent didn’t rush in to fix the problem. With empathetic listening, the parent engages the child in unhurried dialogue, allowing time for the child to experience and express their emotion, and for the parent to respond with understanding and empathy. All the while, the parent watches the child for clues that the child is comforted and ready to consider how to move on. Once the loss has been fully acknowledged and some tears shed, the parent might simply ask: "How can I help you feel better?" The child in our example scenario internalises a message that’s far more profound than a discussion about ice cream. The message is this: My parents understand me; they want to talk about my emotions and they won’t brush off my feelings or make me feel embarrassed about them. I can trust my parents to help me deal with my emotions. Conversation tips for teens and tweens With teens and tweens, it’s particularly important that parents don’t force their own agenda on their child. Here’s how a conversation might go between a tween and her mom, who is trying to listen empathetically to her troubled daughter: Mum [to tween who has been moody since arriving home from school]: "It looks like something’s on your mind. Want to talk about it?" Daughter: "You wouldn’t believe what Amanda did to me today. Some friend!" Mum: "What happened?" Daughter: "She kept texting me in class during a test. The teacher caught me answering Amanda’s text, and took my phone. Everyone was teasing me about it." Imagine, in this scenario, that the mum has her own concerns about Amanda. She’d love to see her daughter steer clear of this girl. At this point, the conversation could deteriorate into a lecture from the parent listing all the reasons why Amanda is bad news. The result, for the mum however, would not be an emotional connection with her daughter; it’s likely the daughter would react negatively to an "attack" on her choice of friends. Here’s a more positive direction for the conversation: Mum: "That must have been embarrassing, being singled out like that in class." Daughter: "It was awful. And Amanda keeps posting about it on Facebook too." Mum: "I’m sorry you have to deal with that. When I was your age, my friend Jenny printed an embarrassing picture of me in the school yearbook. I really struggled to forgive her." Daughter: "At least it only happened to you once. Amanda teases me on Facebook all the time." Mum: "Have you posted a response to Amanda?" Daughter: "Not yet." Mum: "Are you looking for ideas on what you could do?" Daughter: "No, I’ve already decided. I’m tired of Amanda’s teasing. I’m going to ignore her Facebook posts for a while. She’ll get the message." Exploring solutions together If you analyse both example conversations carefully, you’ll see that the parent is effectively asking the child two key questions that are pivotal for establishing self-awareness and self-control. Those questions are What are you feeling? and What do you need? Plenty of parents are good at listening well and showing empathy as their child expresses their hurt, anger or frustration. But suddenly, at this critical juncture, many parents stumble. To teach self-control, we need to help our child eventually get beyond the question What am I feeling?, to carefully consider What do I need? This is the crucial game play that moves a child from feeling overwhelmed, to feeling empowered to make positive change. Here, parents must play coach, not dictator. Our role is to help our child sift through various options. The final choice – how to act on their feelings – must be made by the child. In the second example conversation – between the mum and the tween daughter – notice how carefully the mum approached the issue of finding solutions. In effect, she "asked permission" to share some ideas. With older children, rushing in to offer a solution short-circuits the process of fully "feeling their feelings" alongside them, and denies the child that all-important opportunity to come up with their own solutions. With older children then, it’s best for parents to ask open-ended questions like "What do you think you’ll do?" As you talk together, you can gently help your child explore the likely outcomes of his or her suggestions, both good and bad. If your children are younger, you’ll likely be modelling and coaching self-control for several more years before your children are able to come up with good management strategies of their own. In the meantime, you can give them a strong start in managing their emotions by intentionally teaching some positive responses to intense feelings. Since children under 10 years of age have difficulty keeping more than one or two options in mind at a time, one powerful strategy is to provide a visual list of positive choices for your child and keep it in a prominent place. When your child’s emotions run high and you’ve already worked through steps one to four (noticing and identifying your child’s emotion, then empathising and validating), check the "good choices chart" together and invite your child to choose a response. Below are some potential options for a "good choices" chart. The first set of options deals with your child’s emotional state, while the second set helps equip your child to navigate difficult interactions with others. Of course, you’ll want to build your own unique chart, listing the special activities your child finds most calming and restorative. Adding pictures as visual prompts, where you can, will make the list much more meaningful for youngsters. Good choices chart When I am angry, sad or frustrated, I might also be . . . - Take a nap - Read a book on my bed - Snuggle with my toys - Listen to music - Have a bubble bath - Ask for a snack - Take ten deep breaths in a row and let them out slowly - Ask for quiet time playing on my own - Draw a picture on my own Feeling left out - Ask if I can have special "just us" time with Mum or Dad Bursting with energy - Go ride my bike / go for a run / go swimming - Ask to pray with Mum or Dad - Think of something else to look forward to instead When I am upset with someone I can ask for . . . - some time alone to calm down - an explanation ("Please help me understand why you . . . ") - forgiveness ("I’m sorry that I __. Will you forgive me?") - an apology - a re-do - a compromise ("Let’s think of a way we can both get what we want.") - an idea about how I can make it right - a hug - a truce ("I can’t agree with you but I will show respect for your ideas.") If you’d like to use a chart like this at home, keep in mind that your child can choose more than one option. For example, choosing to have some time alone to calm down, then returning to negotiate a compromise is a great strategy. After your child has made their choice from the chart, be sure to "praise and pray" together. Praise your child for making a wise choice, and pray for them that the Holy Spirit will help them carry out their choice with a positive attitude. The importance of follow-through Be careful to follow through though, so issues don’t go unresolved. Retiring to his or her room to read a book may do wonders for your child’s attitude and behaviour, but don’t let them skip making amends with a sibling later (for example, if they chose "forgiveness" or "compromise" as the second part of their plan). As you can well imagine, it takes considerable time and focused attention to work through all the steps we’ve described so far (noticing and identifying your child’s emotion, empathising and exploring solutions). In many instances, you simply won’t have the time, energy or calm state of mind required to lead your child through all these steps. In less-than-ideal circumstances, don’t feel pressured; just deal with your child’s intense emotions as best you can. But promise your child that you’ll make time later to discuss the incident. Make good on your promise, discussing the child’s feelings and guiding them through positive strategies for dealing with the situation next time. If you’d like more reading on empathetic listening, Milan and Kay Yerkovich’s book How We Love Our Kids is a great resource. For some fun ways to work on self-control with kids ages 3 to 10, check out our Kids of Integrity website. The lessons on self-control and righteousness are good places to start. - As quoted from Raising an Emotionally Intelligent Child by John Gottman and Joan Declaire, 1997. This is the second article in a series on teaching children self-control. Read part one here: First steps in self-control: Helping your child identify their emotions. And part three here: Teaching self-control: Guiding your child with discipline.
<urn:uuid:6e19b04d-e8a7-490f-b54a-8b8071103ffd>
CC-MAIN-2023-40
https://families.org.au/article/teaching-self-control-coaching-your-child-constructive-reactions/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.954529
3,006
3.109375
3
King Felipe VI says Catalonia 'will remain' Spanish Spain's King Felipe VI has said Catalonia "is and will remain" an essential part of the country. It is his second intervention in the Catalonia secession crisis. He told an awards ceremony in the northern city of Oviedo that the Catalan government was causing a rift and Spain would solve the problem through democratic institutions. Catalonia's leader has threatened to declare independence, and Madrid is making plans to impose direct rule. According to the opposition Socialists – who support the central government's stand against Catalan independence – the plans include elections in Catalonia in January. - Reality Check: Would Catalonia be a viable country? - The man who wants to break up Spain Prime Minister Mariano Rajoy will announce the full set of measures on Saturday, two days after a deadline for Catalonia's autonomous government to abandon its independence bid. - Cases for and against independence - Catalan crisis: How the press sees it - The crisis in 300 words The central government has said it will trigger Article 155 of the constitution, which allows it to impose direct rule in a crisis, for the first time. Other moves may include taking control of Catalonia's regional police force. Article 155 does not give the government the power to fully suspend autonomy. A referendum, regarded as illegal by Spain, was held in Catalonia on 1 October. Of the 43% of Catalans who reportedly voted, 90% were in favour of independence. Most anti-independence voters boycotted the ballot. King Felipe previously said Catalan President Carles Puigdemont and other separatist leaders who organised the referendum had "broken the democratic principles of the rule of law" and showed "disrespect to the powers of the state". James Badcock, BBC News, Madrid While the dissolution of Catalonia's parliament and the holding of snap regional elections may appear to offer a way of defusing today's state of extreme tension, there are plenty of reasons to doubt that such a strategy would provide a clear solution to the crisis. The far-left CUP has suggested that it would boycott any election imposed on the region. Other pro-independence forces might do the same. Massive street protests against any form of direct rule from Madrid can also be expected. And what are the potential consequences of forcing an election on Catalonia? Mr Puigdemont has promised to call a formal vote on independence in Catalonia's parliament if Article 155 is invoked. If such a declaration were approved, the pro-independence forces could style the ballot as the election of a constituent assembly for a new republic, the next stage laid down in the secessionists' road map. Assuming the participation of all parties, voters would be bound to interpret the election as a de facto plebiscite on independence. If a separatist majority emerged once again, it is hard to see how the conflict could be considered closed.
<urn:uuid:f46182e4-a51b-4cc9-8e27-a47d4fdb7c65>
CC-MAIN-2023-40
https://icetruck.tv/2017/10/20/king-felipe-vi-says-catalonia-will-remain-spanish/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.949923
600
2.609375
3
‘A Betrayal of Promise’: The South Sudan Conflict To understand the depth of South Sudan conflict, its history, which led to the formation of this independent nation, must be understood. Sudan gained its independence in 1956. However, since that time southern leaders found the independence agreements quite “irrespective” as the agreements were not benefiting the interests of the southerners. The southerners wanted sovereignty and rights for the southern ethnic and cultural groups, ranging from differences of religion to language. These “discrepancies” led to frequent and intense civil wars between Sudan and the southern forces. The first conflict lasted for over twenty years (1955 to 1972). The conflict came to an end only when the Sudanese government granted “autonomy” to the southerners. However this autonomy came with an expiration date. A few weeks before the “ending” of this autonomy, civil war arose again in 1983 and lasted for more than twenty years, finally ending in 2005 and the Comprehensive Peace Agreement was signed between the two that guaranteed regional autonomy and representation. In total, more than 2 million died (both civilian and military) while countless were displaced during the conflict. In 2011, the 10 southern most states offered a referendum for southern independence, which passed by an astonishing 99%. And thus South Sudan was formed. The new Sudanese government came under the leadership of President Salva Kiir Mayardit (an ethnic Dinka) along with the Vice President Riek Machar (an ethnic Nuer) both of whom were former freedom fighters. In the beginning there was stability and this new nation seemed to develop smoothly. Controlling over 50% of the Sudan’s oil fields along with huge investment benefits from the US and China, South Sudan developed quickly. But talks on the sharing of oil revenues with Sudan failed abruptly and in 2012, South Sudan was forced to halt oil production, stalling economic growth. There were also conflicts on the border, as both parties failed to agree on the legitimate sharing of borders. Renewed fighting began in December 2013 when a power struggle between the president and his deputy led to the deputy’s dismissal which further resulted in mass violent outbreaks between government troops and the rebels. South Sudan after two years of relative economic stability and growth fell into civil war. The most important issue today is the composition of soldiers on both sides. South Sudan is a nation with many diverse ethnic groups each comprising of loyal supporters. Ethnic issues are compounded by the fact that the President and the Deputy are from two separate ethnic groups. It is not incorrect to say that this civil war involved “ethnic violence.” Militants on both sides have violated human rights especially when people were targeted on the basis of their religion. Most of the casualties today are civilians who get caught in the politics and become victims of ethnic violence in their own country. In an effort to end the conflict, multiple ceasefires have been signed but all were quickly violated in a very short period of time. One such example is the ceasefire agreement of 24th January 2014; the agreement was violated the next day when the government troops advanced towards rebel positions. A total of 1.5 million people have been displaced and the conflict has disrupted most of the agricultural economy. Many refugees are forced to live in unspeakable and dangerous conditions. Due to the disruption of planting season, famine is in play, further deteriorating the plight of the refugees. Even those refugees who are able to make it to UN refugee camps are not safe as both the sides do not respect UN authority. For example, a group of militants “pretending” to be peacekeepers entered a refugee camps and opened fire on civilians. The international community through the UN has made efforts to bring ceasefire agreements to the table, but these efforts have been far from successful. The beginnings of the first two months were monitored closely by the UN peacekeepers, which drew heavy criticism on their “peacekeeping” skills, as atrocities were committed as they “watched.” It was another example of their “sit back and relax” strategy that is reminiscent of the Rwandan genocide. Immediately after the civilian killings in Sudan, a UN official reported the mass atrocities on both sides. Due to their inaction, international assistance organizations ranging from Doctors without Borders to Amnesty International have criticized the UN peacekeeping operation for their “ineffectiveness.” On May 28th, 2014 the Security Council unanimously passed a resolution and focussed their approach on safeguarding civilian population along with rehabilitation in other non conflict zones. However, with a few UN peacekeepers and staff on the ground, the situation turned into chaos as more civilians flooded the refugee camps. Ceasefire agreements were made to ensure no “destruction,” however, no ceasefire agreement lasted more than 24 hours. Many security analysts fear that the situation will soon turn into a “frozen” conflict, while many say otherwise. It is now up to individual nations to assist. UN Security Council approved a deployment of 14,000 troops on the ground in addition to peacekeeping staff members. Chinese troops arrived in January this year, and the US promises harsh economic sanctions. In the end, it is the civilian who understands and suffers more.
<urn:uuid:ba58533f-ecbd-4060-87ac-adf5ae25ede9>
CC-MAIN-2023-40
https://intpolicydigest.org/a-betrayal-of-promise-the-south-sudan-conflict/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.97753
1,079
3.234375
3
Peter Lobner, updated 19 March 2020 The firm Northrop Grumman Innovation Systems (formerly Orbital ATK, and before that, Orbital Sciences Corporation) was the first to develop a commercial, air-launched rocket capable of placing payloads into Earth orbit. Initial tests of their modest-size Pegasus launch vehicle were made in 1990 from the NASA B-52 that previously had been used as the “mothership” for the X-15 experimental manned space plane and many other experimental vehicles. Since 1994, Orbital ATK has been using a specially modified civilian Lockheed L-1011 TriStar, a former airliner renamed Stargazer, as a mothership to carry a Pegasus launch vehicle to high altitude, where the rocket is released to fly a variety of missions, including carrying satellites into orbit. With a Pegasus XL as its payload (launch vehicle + satellite), Stargazer is lifting up to 23,130 kg (50,990 pounds) to a launch point at an altitude of about 12.2 km (40,000 feet). You can watch a 2015 video celebrating 25 years of Orbital ATK’s Pegasus air-launched rocket at the following link: https://www.youtube.com/watch?v=0L47cpXTzQU Paul Allen’s firm Stratolaunch Systems Corporation (https://www.stratolaunch.com) was founded in 2011 to take this air-launch concept to a new level with their giant, twin-fuselage, six-engine Stratolaunch carrier aircraft. The aircraft has a wingspan of 385 feet (117 m), which is the greatest of any aircraft ever built, a length of 238 feet (72.5 m), and a height of 50 feet (15.2 m) to the top of the vertical tails. The empty weight of the aircraft is about 500,000 pounds (226,796 kg). It is designed for a maximum takeoff weight of 1,300,000 pounds (589,670 kg), leaving about 550,000 pounds (249,486 kg) for its payload and the balance for fuel and crew. It will be able to carry multiple launch vehicles on a single mission to a launch point at an altitude of about 35,000 feet (10,700 m). A mission profile for the Stratolaunch aircraft is shown in the following diagram. Stratolaunch rollout – 2017 Built by Scaled Composites, the Stratolaunch aircraft was unveiled on 31 May 2017 when it was rolled out at the Mojave Air and Space Port in Mojave, CA. Following is a series of photos from Stratolaunch Systems showing the rollout. Stratolaunch ground tests – 2017 to 2019 Ground testing of the aircraft systems started after rollout. By mid-September 2017, the first phase of engine testing was completed, with all six Pratt & Whitney PW4000 turbofan engines operating for the first time. The first low-speed ground tests conducted in December 2017 reached a modest speed of 25 knot (46 kph). By January 2019, the high-speed taxi tests had reached a speed of about 119 knots (220 kph) with the nose wheel was off the runway, almost ready for lift off. Following is a series of photos from Stratolaunch Systems showing the taxi tests. Stratolaunch first flight The Stratolaunch aircraft, named Roc, made an unannounced first flight from the Mojave Air & Space Port on 13 April 2019. The aircraft stayed aloft for 2.5 hours, reached a peak altitude of 17,000 feet (5,180 m) and a top speed of 189 mph (304 kph). The following series of photos show the Stratolaunch aircraft during its first flight. Stratolaunch posted an impressive short video of the first flight, which you can view here: Stratolaunch family of launch vehicles: ambitious plans, but subject to change In August 2018, Stratolaunch announced its ambitious launch vehicle development plans, which included the family of launch vehicles shown in the following graphic: - Up to three Pegasus XL launch vehicles from Northrop Grumman Innovation Systems (formerly Orbital ATK) can be carried on a single Stratolaunch flight. Each Pegasus XL is capable of placing up to 370 kg (816 lb) into a low Earth orbit (LEO, 400 km / 249 mile circular orbit). - Medium Launch Vehicle (MLV) capable of placing up to 3,400 kg (7,496 lb) into LEO and intended for short satellite integration timelines, affordable launch and flexible launch profiles. MLV was under development and first flight was planned for 2022. - Medium Launch Vehicle – Heavy, which uses three MLV cores in its first stage. That vehicle would be able to place 6,000 kg (13,228 lb) into LEO. MLV-Heavy was in the early development stage. - A fully reusable space plane named Black Ice, initially intended for orbital cargo delivery and return, with a possible follow-on variant for transporting astronauts to and from orbit. The space plane was a design study. Stratolaunch was developing a 200,000 pound thrust, high-performance, liquid fuel hydrogen-oxygen rocket engine, known as the “PGA engine”, for use in their family of launch vehicles. Additive manufacturing was being widely used to enable rapid prototyping, development and manufacturing. Successful tests of a 100% additive manufactured major subsystem called the hydrogen preburner were conducted in November 2018. After Paul Allen’s death on 15 October 2018, the focus of Stratolaunch Corp was greatly revised. On 18 January 2019, the company announced that it was ending work on its own family of launch vehicles and the PGA rocket engine. The firm announced, “We are streamlining operations, focusing on the aircraft and our ability to support a demonstration launch of the Northrop Grumman Pegasus XL air-launch vehicle.” You’ll find an article describing Stratolaunch Systems’ frequently changing launch vehicle plans in an article on the SpaceNews website here: What is the future for Stratolaunch? Air launch offers a great deal of flexibility for launching a range of small-to-medium sized satellites and other aerospace vehicles. With only the Pegasus XL as a launch vehicle, and with Northrop Grumman having their own Stargazer carrier aircraft for launching the Pegasus XL, the business case for the Stratolaunch aircraft has been greatly weakened. Additional competition in the airborne launch services business will come in 2020 from Richard Branson’s firm Virgin Orbit, with its airborne launch platform Cosmic Girl, a highly-modified Boeing 747, and its own launch vehicle, known as LauncherOne. Successful drop tests of LauncherOne were conducted in 2019. The first launch to orbit is expected to occur in 2020. You’ll find more information on the Virgin Orbit website here: https://virginorbit.com Additional competition for small satellite launch services comes from the newest generation of small orbital launch vehicles, like Electron (Rocket Lab, New Zealand) and Prime (Orbix, UK), which are expected to offer low price launch services from fixed land-based launch sites. Electron is operational now, and achieved six successful launches in six attempts in 2019. Prime is expected to enter service in 2021. In the cost competitive launch services market, Stratolaunch does not seem to have an advantage with only the Pegasus XL in its launch vehicle inventory. Hopefully, they have something else up their sleeve that will take advantage of the remarkable capabilities of the Stratolaunch carrier aircraft. 19 March 2020 Update: Stratolaunch change of ownership Several sources reported on 11 October 2019 that Stratolaunch Systems had been sold by its original holding company, Vulcan Inc., to an undisclosed new owner. Two months later, Mark Harris, writing for GeekWire, broke the news that the private equity firm Cerberus Capital Management was the new owner. It appears that Jean Floyd, Stratolaunch’s president and CEO since 2015, remains in his roles for now. Michael Palmer, Cerberus’ managing director, was named Stratolaunch’s executive vice president. You can read Mark Harris’ report here: https://www.geekwire.com/2019/exclusive-buyer-paul-allens-stratolaunch-space-venture-secretive-trump-ally/ It will be interesting to watch as the new owners reinvent Stratolaunch Systems for the increasingly competitive market for airborne launch services.
<urn:uuid:c914d19c-2686-423d-9be7-5f7e45b6aaeb>
CC-MAIN-2023-40
https://lynceans.org/all-posts/paul-allens-stratolaunch-aircraft-makes-its-first-flight-but-with-an-uncertain-business-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.955573
1,754
3.375
3
A book on “novel”-sounding idioms in ten languages will save you the trouble of learning the languages yourself, according to Jag Bhalla, the author of I’m not Hanging Noodles on your Ears and other Intriguing Idioms from around the World, a collection of 1,200 idioms from National Geographic Books, illustrated by New Yorker cartoonist Julia Suits. A guest column on the book by the author mentions a few examples, such as to live like a maggot in bacon (to live in luxury: German) and to strike the 400 blows (to sow wild oats: French). The last one may not be so “novel” to fans of French cinema, who will undoubtedly recall a French New Wave flick by the same name (Les quatre cents coups). Apparently, there are two bands that have discovered this delightful idiom as well. The column also discusses the use of idiom in language (which seems nearly unavoidable, at least for the native speaker) so check it out if you’re interested in anything beyond literal one-to-one language.
<urn:uuid:f30b5cab-ebd6-4c7a-9d64-1b445361fef4>
CC-MAIN-2023-40
https://multilingual.com/striking-a-blow-for-idioms/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.909659
235
2.625
3
Botulism in horses – rare and deadly! - Botulism is RARE in horses – but it does happen. Botulism is rare, deadly, and it does have a vaccine. But how do you know if your horse needs to be vaccinated, or if he’s at risk of botulism? These microscopic jerks can kill your horse. Easily. What is botulism? - It’s a bacteria – Clostridium Botulinum. You may recognize Clostridium Tetani, which causes tetanus. This particular botulism bacteria has the ability to produce 7 different toxins – aptly named A to G. - The toxic spores live in areas with no oxygen, some moisture, and a specific pH. - While we think botulism mostly lives in decaying animal matter, it’s really more likely to be found in decaying vegetation. - It’s the B version to be really worried about – it’s the most toxic to horses. The B strain of C. Botulinum is commonly found in the North East US and Appalachia, but it could be anywhere. - Type C of the toxin is usually found in association with decaying animals and bird droppings, which is a great reason to keep birds out of barns. - You also have Type A of the botulism family of bacteria, which likes to live in the Northwest US, but is typically not a problem with horses. Prevent with vaccines. Treat with antitoxin if possible. What happens if your horse is infected with botulism? - Well – the botulism toxin will interfere with your horse’s neurological system by not letting the muscles respond to the nerves. - You will likely see problems eating, swallowing, moving ears, blinking. Your horse might also lose function in his tail, and in some cases, your horse must lay down because of paralysis. - The amount of toxin influences how sick he becomes. Some horses have mild cases, other horses die within days from the lungs and heart-stopping as the pulmonary and cardiac muscles are paralyzed. - The signs of botulism also mimic those of rabies, EEE, WEE (more on those here) and other neurological diseases. There is an antitoxin that can be administered. - It will help with the spread of the toxin, but it can’t repair damage already done to the nerves. - Very often in a horse that is down, there is nothing more to do. There is also a test to detect the botulism toxin, but it can take up to 10 days, in which case it is likely too late. Your vet will need to do a neurological exam. Any time your horse has neurological signs, call the vet. Immediate intervention is key. - So how does your horse end up with botulism toxicity? Well, it’s everywhere in the soil – but remember that it really enjoys anaerobic and wet conditions, which means hay is a common location. - Round hay bales are recipes for botulism salad. Round bales often rest on the ground, are rained on, and can be a very tempting hotel for C. Botulinum. - There’s also the risk that an animal has died in the haymaking process, but that’s typically Type C. - You can also find risky amounts of botulism in hay bales that are improperly stored, hay that is thrown on the ground, and haylage or silage for cows. DUDE don’t feed this to your horse ever. - Hay tossed on wet/damp/muddy creates that moist environment that C. Botulinum loves. Also, remember about grass clippings! (More on that here!) Botulism may find its way into a wound that scabs over quickly. - Punctures are notorious for doing this, and the depth of the wound has that anaerobic factor. Even a tiny wound can be trouble, which is why clipping, cleaning, and a quick photo to your vet is a good idea. For any size wound. The horse world is very lucky that there are vaccines for C. Botulinum, types A and B. - Depending on the type of vaccine, your horse might need an initial series and yearly boosters. These are a must for the horse that eats from a round bale or has hay tossed into a paddock. Using deep trough-like feeders for outside feedings is best. - If you have a broodmare, in some parts of the country she should be vaccinated. Foals can develop (and die from) botulism-related Shaker Foal Syndrome. A broodmare properly vaccinated can pass along necessary antibodies. Again – botulism is rare in horses, but it’s also deadly. If your horse has any risk factors, talk to your vet about vaccinations against botulism.
<urn:uuid:08c980d1-3bf3-4001-8a34-0c7c7e3e3223>
CC-MAIN-2023-40
https://proequinegrooms.com/tips/health-and-well-being/botulism-in-horses-rare-and-deadly/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.942188
1,041
3.046875
3
m ( yds) Track Length:Based on parallels of m (yds) and a radius of (yds), marking the two turns. The measurement is taken 30cm . It is a relatively short distance but requires a lot of speed, power, and endurance to complete in a fast time. The meter sprint is a track-and-field event. Track & Field. Meter Dash. How fast can you walk, roll or run meters? Set up: You can do the meter dash in your yard, on a sidewalk. This tutorial will show you how to properly and efficiently run a fast meter. In track and field, having good technique in a meter race is essential. Another final, another upset: first time Worlds finalist wins thrilling men's 400m - NBC Sports If there are meter start staggers, just mark off the distance from the start(lane 1)/finish line to the stagger for lane 6, or multiply to distance of the. Typical R = (m – m) / = m. Track length of meters is measured. mm from inner edge of Lane 1. Remaining lanes are measured mm. The time difference (in the inside lane) between the fastest and slowest tracks is about s in the m race and s in the m race. The time. m. Finish for all distances lane 6 lane 5 lane 4 lane 3 lane 2. m scratch line lane 1. m. METRE TRACK. m (yds) to track. An oval-shaped meter running track (⅛ mile) is 88, meters (,20ft) long and 46,25 meters wide (,74ft) with 6 running lanes · running lane width. Elements Of The m · Phase 1: Attack The First m · Phase 2: Glide Around The Bend For m · Phase 3: Back On The Gas For The Next m · Phase 4: Keep. meters: The meter dash is the second shortest sprint and distance you can do in track. Instead of 1/4 of the track, this event takes up 1/2 of the. Because a solid meter runner can run the (open and relay) and likely can drop down to the , or at least run the backstretch of the 4× (generally. DISTANCE. m (yd). TRACK LENGTH. Based on parallels of m (yd) and a radius of. m (yd) marking the two turns. Measurement. Result. for m converts to y = y = m = Men Undersized to Flat = Men Banked/Oversized to Flat = The m much like the m is a race that primarily involves acceleration and speed. After you have accelerated to your maximum velocity you will need to. Search from Track Meter stock photos, pictures and royalty-free images from iStock. Find high-quality stock photos that you won't find anywhere. Runner ready to run on running track start line. · three runners sprinters men run in stadium on competition Stock Photo.
<urn:uuid:11ccd46d-8d8c-4473-aa3a-9ca874ce9f44>
CC-MAIN-2023-40
https://profifilm.ru/about-us/200-meters-on-a-track.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.893086
614
2.578125
3
St Joseph of Arimathæa, the patron of Glastonbury. Many martyrs of Alexandria, about 392. St Patrick, apostle of Ireland, 464 or 493. St Gertrude, virgin, abbess in Brabant, 659. Born. – Francesco Albano, painter, 1578, Bologna; David Ancillon, learned French Protestant clergyman, 1617, Metz; Carsten Niebuhr, celebrated traveller, 1733, West Ludingworth; the Rev. Dr Thomas Chalmers, 1780, Anstruther. Died. – Cneius Pompeius, Labienus, and Attius Varus, B.C. 45, killed, Munda; Marcus Aurelius Antoninus, A.D. 180, Sirmium; Bishop Gilbert Burnet, historian, 1715, Clerkenwell; Jean Baptiste Rousseau, eminent French lyric poet, 1741, Brussels; Daniel Bernouilli, mathematician, 1782, Basle; David Dale, philanthropist, 1806; J. J., Grandier, the eminent designer of book illustrations, 1847; Mrs Anna Jameson, writer on art, 1860. LEGENDARY HISTORY OF ST PATRICK. Almost as many countries arrogate the honour of having been the natal soil of St Patrick, as made a similar claim with respect to Homer. Scotland, England, France, and Wales, each furnish their respective pretensions; but, whatever doubts may obscure his birthplace, all agree in stating that, as his name implies, he was of a patrician family. He was born about the year 372, and when only sixteen years of age, was carried off by pirates, who sold him into slavery in Ireland; where his master employed him as a swineherd on the well-known mountain of Sleamish, in the county of Antrim. Here he passed seven years, during which time he acquired a knowledge of the Irish language, and made himself acquainted with the manners, habits, and customs of the people. Escaping from captivity, and, after many adventures, reaching the Continent, he was successively ordained deacon, priest, and bishop; and then once more, with the authority of Pope Celestine, he returned to Ireland to preach the Gospel to its then heathen inhabitants. The principal enemies that St Patrick found to the introduction of Christianity into Ireland, were the Druidical priests of the more ancient faith, who, as might naturally be supposed, were exceedingly averse to any innovation. These Druids, being great magicians, would have been formidable antagonists to any one of less miraculous and saintly powers than Patrick. Their obstinate antagonism was so great, that, in spite of his benevolent disposition, he was compelled to curse their fertile lands, so that they became dreary bogs; to curse their rivers, so that they produced no fish; to curse their very kettles, so that with no amount of fire and patience could they ever be made to boil; and, as a last resort, to curse the Druids themselves, so that the earth opened and swallowed them up. A popular legend relates that the saint and his followers found themselves, one cold morning, on a mountain, without a fire to cook their breakfast, or warm their frozen limbs. Unheeding their complaints, Patrick desired them to collect a pile of ice and snow-balls; which having been done, he breathed upon it, and it instantaneously became a pleasant fire – a fire that long after served to point a poet’s conceit in these lines: ‘Saint Patrick, as in legends told, The morning being very cold, In order to assuage the weather, Collected bits of ice together; Then gently breathed upon the pyre, When every fragment blazed on fire. Oh! if the saint had been so kind, As to have left the gift behind To such a lovelorn wretch as me, Who daily struggles to be free; I’d be content – content with part, I’d only ask to thaw the heart, The frozen heart, of Polly Roe.’ The greatest of St Patrick’s miracles was that of driving the venomous reptiles out of Ireland, and rendering the Irish soil, for ever after, so obnoxious to the serpent race, that they instantaneously die on touching it. Colgan seriously relates that St Patrick accomplished this feat by beating a drum, which he struck with such fervour that he knocked a hole in it, thereby endangering the success of the miracle. But an angel appearing mended the drum; and the patched instrument was long exhibited as a holy relic. In 1831, Mr James Cleland, an Irish gentleman, being curious to ascertain whether the climate or soil of Ireland was naturally destructive to the serpent tribe, purchased half-a-dozen of the common harmless snake (natrix torquata), in Covent Garden market in London. Bringing them to Ireland, he turned them out in his garden at Rath-gael, in the county of Down; and in a week afterwards, one of them was killed at Milecross, about three miles distant. The persons into whose hands this strange monster fell, had not the slightest suspicion that it was a snake, but, considering it a curious kind of eel, they took it to Dr J. L. Drummond, a celebrated Irish naturalist, who at once pronounced the animal to be a reptile and not a fish. The idea of a ‘rale living sarpint’ having been killed within a short distance of the very burial-place of St Patrick, caused an extraordinary sensation of alarm among the country people. The most absurd rumours were freely circulated, and credited. One far-seeing clergyman preached a sermon, in which he cited this unfortunate snake as a token of the immediate commencement of the millenium; while another saw in it a type of the approach of the cholera morbus. Old prophecies were raked up, and all parties and sects, for once, united in believing that the snake foreshadowed ‘the beginning of the end,’ though they were very widely differed as to what that end was to be. Some more practically minded persons, however, subscribed a considerable sum of money, which they offered in rewards for the destruction of any other snakes that might be found in the district. And three more of the snakes were not long afterwards killed, within a few miles of the garden where they were liberated. The remaining two snakes were never very clearly accounted for; but no doubt they also fell victims to the reward. The writer, who resided in that part of the country at the time, well remembers the wild rumours, among the more illiterate classes, on the appearance of those snakes; and the bitter feelings of angry indignation expressed by educated persons against the – very fortunately then unknown – person, who had dared to bring them to Ireland. A more natural story than the extirpation of the serpents, has afforded material for the pencil of the painter, as well as the pen of the poet. When baptizing an Irish chieftain, the venerable saint leaned heavily on his crozier, the steel-spiked point of which he had unwittingly placed on the great toe of the converted heathen. The pious chief, in his ignorance of Christian rites, believing this to be an essential part of the ceremony, bore the pain without flinching or murmur; though the blood flowed so freely from the wound, that the Irish named the place Struthfhuil (stream of blood), now pronounced Struill, the name of a well-known place near Down-patrick. And here we are reminded of a very remarkable fact in connection with geographical appellations, that the footsteps of St Patrick can be traced, almost from his cradle to his grave, by the names of places called after him. Thus, assuming his Scottish origin, he was born at Kilpatrick (the cell or church of Patrick), in Dumbartonshire. He resided for some time at Dalpatrick (the district or division of Patrick), in Lanarkshire; and visited Crag-phadrig (the rock of Patrick), near Inverness. He founded two churches, Kirkpatrick at Irongray, in Kircudbright; and Kirkpatrick at Fleming, in Dumfries; and ultimately sailed from Portpatrick, leaving behind him such an odour of sanctity, that among the most distinguished families of the Scottish aristocracy, Patrick has been a favourite name down to the present day. Arriving in England, he preached in Patterdale (Patrick’s dale), in Westmoreland; and founded the church of Kirkpatrick, in Durham. Visiting Wales, he walked over Sarn-badrig (Patrick’s causeway), which, now covered by the sea, forms a dangerous shoal in Carnarvon Bay; and departing for the Continent, sailed from Llan-badrig (the church of Patrick), in the island of Anglesea. Undertaking his mission to convert the Irish, he first landed and Innis-patrick (the island of Patrick), and next at Holm patrick, on the opposite shore of the mainland, in the county of Dublin. Sailing northwards, he touched at the Isle of Man, sometimes since, also, called Innis-patrick, where he founded another church of Kirkpatrick, near the town of Peel. Again landing on the coast of Ireland, in the county of Down, he converted and baptized the chieftain Dichu, on his own threshing-floor. The name of the parish of Saul, derived from Sabbal-patrick (the barn of Patrick), perpetuates the event. He then proceeded to Temple-patrick, in Antrim, and from thence to a lofty mountain in Mayo, ever since called Croagh-patrick. He founded an abbey in East Meath, called Domnach-Padraig (the house of Patrick), and built a church in Dublin on the spot where St Patrick’s Cathedral now stands. In an island of Lough Derg, in the county of Donegal, there is St Patrick’s Purgatory; in Leinster, St Patrick’s Wood; at Cashel, St Patrick’s Rock; the St Patrick’s Wells, at which the holy man is said to have quenched his thirst, may be counted by dozens. He is commonly stated to have died at Saul on the 17th of March 493, in the one hundred and twenty-first year of his age. The shamrock, or small white clover (trifolium repens of botanists), is almost universally worn in the hat over all Ireland, on St Patrick’s day. The popular notion is, that when St Patrick was preaching the doctrine of the Trinity to the pagan Irish, he used this plant, bearing three leaves upon one stem, as a symbol or illustration of the great mystery. To suppose, as some absurdly hold, that he used it as an argument, would be derogatory to the saint’s high reputation for orthodoxy and good sense; but it is certainly a curious coincidence, if nothing more, that the trefoil in Arabic is called shamrakh, and was held sacred in Iran as emblematical of the Persian Triads. Pliny, too, in his Natural History, says that serpents are never seen upon trefoil, and it prevails against the stings of snakes and scorpions. This, considering St Patrick’s connexion with snakes, is really remarkable, and we may reasonably imagine that, previous to his arrival, the Irish had ascribed mystical virtues to the trefoil or shamrock, and on hearing of the Trinity for the first time, they fancied some peculiar fitness in their already sacred plant to shadow forth the newly revealed and mysterious doctrine. Died, on the 17th March 1806, David Dale, one of the fathers of the cotton manufacture in Scotland. He was the model of a self-raised, upright, successful man of business. Sprung from humble parents at Stewarton in Ayrshire, he early entered on a commercial career at Glasgow, and soon began to grapple with great undertakings. In company with Sir Richard Arkwright, he commenced the celebrated New Lanark Cotton Mills in 1783, and in the course of a few years he had become a rich man. Mr Dale in this career had great difficulties to overcome, particularly in the prejudices and narrow-sightedness of the surrounding country gentlefolk. He overcame them all. He took his full share of public duty as a magistrate. The poor recognised him as the most princely of philanthropists. He was an active lay preacher in a little body of Independents to which he belonged, and whose small, poor, and scattered congregations he half supported. Though unostentatious to a remarkable degree, it was impossible to conceal that David Dale was one of those rare mortals who hold all wealth as a trust for a general working of good in the world, and who cannot truly enjoy anything in which others are not participators. Keeping in view certain prejudices entertained regarding the moral effects of the factory system, it is curious to learn what were the motives of the philanthropic Dale in promoting cotton mills. His great object was to furnish a profitable employment for the poor, and train to habits of industry those whom he saw ruined by semi-idleness. He aimed at correcting evils already existing, evils broad and palpable; and it never occurred to him to imagine that good, well-paid work would sooner or later harm any body. By a curious chance, Robert Owen married the eldest daughter of Mr Dale, and became his successor in the management of the New Lanark Mills. Both were zealous in promoting education among their people; but there was an infinite difference between the views of the two men as to education. Dale was content with little more than impressing the old evangelical faith of western Scotland upon the youth under his charge. Owen contemplated modes of moralising the people such as no Scotchman had ever dreamt of. The father-in-law was often put upon the defensive by the son-in-law, regarding his simple unmistrusting faith, and was obliged to admit that there was force in what Owen dais, assuming the truth of his view of human nature. But he would generally end the discussion by remarking with his affectionate smile, ‘Thou needest to be very right, for thou art very positive.’ David Dale was a remarkably obese man, insomuch it was said he had not for years seen his shoe-buckles as he walked. He one day spoke of having fallen all his length on the ice; to which his friend replied that he had much reason to be thankful that it was not all his breadth. The name of the worthy philanthropist has been commemorated in the names of two of his grandchildren – Robert Dale Owen (died in 1877), ambassador for the United States to the Kingdom of the Two Sicilies, and David Dale Owen, author of a laborious work on the Geology of Wisconsin, Iowa, and Minnesota (1852). On this Day in Other Sources. After a long episcopate, Jocelin retired to his old Abbey of Melros, died among his brethren of the convent on the 17th March 1199, and was buried on the north side of the choir.1 – Sketches, pp.29-70. 1 Chron. Mailr. – Hoved. This small priory was ruled by a prior, who had a seat in parliament: For he was present in the parliament of Brigham, on 17th March, 1290. – Select Views, pp.47-52. The year 1441 was very memorable for [omens] and wonders. In March, the 17th day, appeared 3 suns in the firmament, at [noon] of the day; and in August, a fearful comet, having a crowned sword hanging from it. After which ensued a great [grumbling] of all kinds of beasts, and famine of corn and [food]. – Historical Works, pp.166-189. The Scotish Queen, perhaps, as early as the 17th of March [1565,] seems to have secretly, fixed her affections on Darnley, as the fittest husband, considering his whole pretensions; and she some time after sent secretary Maitland to communicate her purpose to her good sister, and to beg her acquiescence. But, before Maitland could reach London Elizabeth had become quite aware of Mary’s sentiments. – Life of Mary, pp.98-126. But the following winter struck the chronicler of Fortirgall as more than usually severe. “The 22d day of February there came after noon a great storm, of snow and hail and wind, that no man nor beast might lift up their heads, nor walk nor ride, and many beasts perished without in that storm, and many men and women perished in sundry places; and all kinds of victual right dear, and that because no mills might grind for the frost. All corn came to the mill of Dunkeld out of St. Johnstoun (Perth) betwixt that and Dunkeld, and all other bounds about far and near. The meal gave that time in St. Johnstoun, 43 shillings, the malt 34 shillings; and before St. Patrick’s day (17th March ) the meal was 25s. 8d., and the malt for 30 shillings.” – Sketches, pp.341-394. Mar. 17 [1578.] – There was an ancient feud between the families of Glammis and Crawford, but as the present lords were on the same side in politics, it was felt by both as inexpedient that any hostility should take place between them. Moreover, it would have been highly indecent of Lord Glammis, who was chancellor of the kingdom, to allow any demonstration of rancour to come from his side. Nevertheless, a fatal collision took place between these two nobles. About the dusk of a spring day, Lord Glammis was coming down from Stirling Castle to his own house in the town, attended as usual by some of his friends and followers, when, in a narrow lane, he encountered the Earl of Crawford similarly attended. The two nobles bade their respective followers give way to the other; and the order was obeyed by all except the two last, who either wilfully or by accident jostled each other, and then immediately drew their swords and fell a-fighting. A skirmish then took place between the two parties, in the course of which Lord Glammis, whose stature made him overtop the company, was shot through the head with a pistol, and many were hurt on both sides. The respective friends of Glammis and Crawford fell into active hostilities after this event, and Crawford was seized and thrown into prison. Being really free from blame,and befriended by many of the nobility, he was soon liberated, to the great joy of his own people. The general joy diffused by this event exasperated Thomas Lyon, a nephew of the deceased chancellor, insomuch that ‘Crawford all his life was glad to stand in a soldier’s posture.’ – Jo. Hist. – Domestic Annals, pp.56-80. The document states, that ‘in some remote and uncivil places of this kingdom’ an old and barbarous custom was still kept up of plucking the wool from sheep instead of clipping it. The king, hearing of the practice, wrote a letter to his Council, denouncing it as one not to be suffered; telling them it had already been reformed in Ireland, under penalty of a groat on every sheep so used, and was ‘far less to be endured in you.’ The Council immediately (March 17, 1617) passed an act in the same tenor, and further stating that many sheep died in consequence of this cruel treatment – concluding with a threat of severe fines on such as should hereafter continue the practice. – P. C. R. – Domestic Annals, pp.177-227. St. Patrick in Other Sources. We know from Nennius that when St. Patrick founded in Ireland 365 churches he at the same time ordained 365 bishops, and it was the complaint of St. Bernard and other assailants of the Irish Church that they had a bishop for every congregation. In many instances indeed we find that a single religious community worshipping in one place had several bishops.1 Clanship, as an eminent Celtic scholar2 has justly said, is the true key of Irish history – political and ecclesiastical. Upon the clan Christianity was engrafted in the monastic form. When the Christian missionaries first went to Ireland they found the clans existing there as the primitive form of government, with numerous chieftains virtually independent, and one or more nominal kings. St. Patrick and his followers always addressed themselves in the first instance to the chieftain, and with his conversion followed that of the clan or sept.3 The followed the establishment of a monastery, and it was constituted on the model of a family. The abbot was the father: the monks his children. The society at Iona was known as “the family of Hy.” – Old Glasgow, pp.1-18. 1 The Early Celtic Church, by the Bishop of Argyll, p. 34. 2 Dr. Todd. 3 Godkin on the Old Church of Ireland. Bells were held in great reverence in the ancient church. They were baptised, and anointed oleo chrismatis, and there is a ritual for these ceremonies in the Roman Pontifical. They were, indeed, among the articles which appear to have been necessary to the episcopal function. It is so stated by Dr. Petrie, than whom there can be no higher authority; and he mentions as an instance the presents given to Fiac, bishop of Sletty, near Carlow, when St. Patrick conferred on him the episcopal dignity. The passage in the Book of Armagh which Dr. Petrie refers to as his authority is as follows:- “He (Patrick) conferred the degree of bishop upon him (Fiac), so that he was the first bishop that was ordained among the Lagenians; and Patrick gave a box to Fiac containing a bell, and a menstir (reliquary) and a crozier, and a poolire.” The poolire was a leather case for holding sacred books and reliquaries. – Old Glasgow, pp.19-29. C.E. 432 St. Patrick preached in Ireland. C.E. 503 Fergus, son of Erc, who is said to have received the blessing of St. Patrick in his youth, led a colony of Dalriads from Ireland, and founded the Scottish monarchy. – Ecclesiastical History of Scotland, pp. 4, 11, 44, 49.) Fergus was succeeded by Domangart, Comgal, and CONAL, by whom the Island of Iona was bestowed upon St. Columba. The saint is supposed to have been born in Donegal, A.D. 521. – Popular Tales, vol. 4, pp.35-53. Had they been the compositions and inventions of such men, was it likely that there should be so little reference to religion, and to known general history, in the ballads which give the history of the Feinne, as told by Oisein amongst his dialogues with St. Patrick on religious matters, or as they are more commonly now sung, without these pagan polemics. – Popular Tales, vol. 4, pp.180-197. The romances which treat of Charlemagne also bear a strong resemblance to the rest. “Roland and FERRAGUS” introduces a Gaelic name, though it is that of the pagan villain of the piece, who is sent by the Soudan from Babylon to fight Charlemagne. He is a giant, black, and a great deal bigger than Fergus the son of Fionn – “He had twenty men’s strength, And forty feet of length, And four feet in the face, And fifteen in breede.” “His nose was a foot and more. His browe as bristles wore.” Nevertheless, after a severe fight with Roland the Christian warrior, he is overcome, but first he sits down and argues against the true faith, exactly as Oisein does with St. Patrick in Irish Fenian tales. – Popular Tales, vol. 4, pp.237-246. “THE Culdees are not yet disposed of. Their precise character, the nature of their organization, their relations with the early Scottish missionary church, and, generally speaking, their place in the religious system of eleventh century Scotland, have furnished forth many a goodly page of historical discussion. Were they laymen, were they monks, were they canons? Dr. A. Allaria, in the Scottish Review for January, essays one more answer. He first argues (with many good points on his side) that the order followed by St. Patrick and his disciples was clerical, and belonged to that Apostolic Institute now known as Canons Regular. Next he proceeds to cite evidence, ancient and modern, to buttress his opinion that the Culdees were substantially the same, clerics living in Common or Canonical Order, whose main specialty lay in their devotion to the sick. One valuable but hitherto overlooked bit of proof he cites from the observant Giraldus Cambrensis, that the Welsh Culdees (coelibes sive colidei)1 were clerics, devoted to works of charity and hospitality, as many congregations of clerics had been before the rule of St. Benedict was introduced.” – Scots Lore, pp.114-116. 1 “coelibes sive coli dei” translates as “celibate or to worship God”. “…[The Caledonians] are the most formidable, and bravest enemy that ever Rome had to confront, every one of them will die before they yield, they are true patriots, Agricola, make all haste to your strongholds or you are done.” So the Romans had to retrace their steps, and the Caledonians pursued them until the Romans were ultimately driven into the sea. Columba burned many of these Celtic records, yet many survived his ravages. St. Patrick burned one hundred and eighty-nine of those works at Tara, Ireland, all written in the Gaelic language, with a little mixture of Latin. Edward the First, of England, destroyed many of them, and after the ignoble union with England, what portion of them were preserved extant from these ravages, are now suppressed so as to deprive Scotland of their Celtic record and of the history of their grandfathers. – Gloomy Memories, pp.ii-xiii.
<urn:uuid:3742fd35-0614-4f28-b956-a1e13881008c>
CC-MAIN-2023-40
https://randomscottishhistory.com/2019/03/17/17th-of-march-st-patricks-day/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.978529
5,757
2.953125
3
The Supreme Courts current doctrinal rules governing racial discrimination and affirmative action are unsatisfying. They often seem artificial, internally inconsistent, and even conceptually incoherent. Despite a long and continuing history of racial discrimination in the United States, many of the problems with the Supreme Courts racial jurisprudence stem from the Courts willingness to view the current distribution of societal resources as establishing a colorblind, race-neutral baseline that can be used to make equality determinations. As a result, the current rules are as likely to facilitate racial discrimination as to prevent it, or to remedy the lingering effects of past discrimination. Because the Equal Protection Clause contains few judicially manageable standards for distinguishing between constitutional imperatives and legislative policy preferences, the Supreme Court should normally defer to the representative branches for the formulation of prudent racial policies. However, the Supreme Court's insulation from immediate political pressure may give the Court greater relative institutional competence than the representative branches in making one type of determination that is relevant to enforcement of the Equal Protection Clause. Utilizing its power of judicial review, theCourt could disqualify from constitutional cognizance non-remedial equality arguments that were not being asserted with good faith sincerity. A subjective standard of good faith could be used to reject arguments that were consciously motivated by a desire to sacrifice the interests of one race in order to benefit the interests of another. In addition, an objective standard of good faith could be used to reject arguments whose unconscious racial motivations were revealed by contemporary theories of cognitive dissonance and implicit bias. Although race remains too salient a social category for the concept of colorblind, race neutrality to have much meaning in contemporary United States culture, constitutional recognition of only good faith racial motivations might be able to compensate for the ongoing subtle forms of structural discrimination that are embedded in the current distribution of resources.
<urn:uuid:2e71de14-97df-48e7-8c04-fee089f51819>
CC-MAIN-2023-40
https://scholarship.law.wm.edu/wmborj/vol23/iss3/2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.937448
370
2.90625
3
What Is Black Mold? You’ve probably heard about the dangers of black mold, an alleged silent killer that hides in water damage and ceiling tiles. But what exactly is black mold? What can be done about Black Mold? Can it cause other issues potentially? And is it dangerous? Black mold, or Stachybotrys chartarum, surfaces as blackish-green spots or blemishes. It lives on moist, cellulose-rich surfaces like fiberboard, drywall, and gypsum board. Black mold is most attracted to moisture, which is why it lives in previously-flooded homes, leaky pipe areas, or anywhere with water damage. It is important to know the differences in mold and what to do. Learn more about mold and what to do until help arrives by visiting Mold Damage Tips. How Do I Tell If It’s Black Mold? Since many types of mold can cause reactions, you should contact us regardless of the color or type of mold. In many instances, multiple types of mold may exist in the same house or structure. If you suspect you have a mold problem, contact SERVPRO of Longview immediately. If You See Signs of Mold, Call Us Today – (903) 238-8100 When water intrudes into your property, mold growth can start in as little as 48 hours. Consider the following mold facts: - Mold is present almost everywhere, indoors and outdoors. - Mold spores are microscopic, float along in the air, and may enter your home through windows, doors, or AC/heating systems or even hitch a ride indoors on your clothing or a pet. - Mold spores thrive on moisture. Mold spores can quickly grow into colonies when exposed to water. These colonies may produce allergens and irritants. - Before mold remediation can begin, any sources of water or moisture must be addressed. Otherwise the mold may return. - Mold often produces a strong, musty odor, and that odor can lead you to possible mold problem areas. - Even higher-than-normal indoor humidity can support mold growth. Keep indoor humidity below 45 percent. Locally Owned Company with National Resources SERVPRO of Longview is locally owned and operated—so we live and work here too and are proud to be part of this community. We are also part of a national network of over 1,600 Franchises with special Disaster Recovery Teams placed strategically throughout the country to respond to large scale disasters. We are proud to serve our local communities: - Liberty City
<urn:uuid:ee39bd75-dadd-4f0a-999a-78abdd3b5b41>
CC-MAIN-2023-40
https://servprolongview.com/black-mold
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.911387
542
2.90625
3
This fall, we had another term of Saturday Morning Physics, this time there were a variety of topics: Photography, Lighthouses, History of Astronomy, Tissue Engineering, Mammoths/Mastodons. I'll briefly discuss some of these topics. Brad Orr (Professor of Applied Physics at UM) gave a set of talks on photography. He started by discussing camera lenses; how they work, and some of associated distortions. He then talked about exposure and explained how to get the right exposure: you need to balance shutter speed, aperture and film speed. Among other things, Brad showed that for hand held photography under typical conditions, the shutter speed (measured in seconds) always must be less than one over the focal length of the camera lens (measured in millimeters). So for a 50mm lens, you need a shutter speed less than 1/50 second. Otherwise you will get a blurry image. To demonstrate this, Brad mounted a small red laser on the side of a camera (see photo above, the laser is on the right). He pointed the camera at the wall; the image of the red laser was visible and it seemed to vibrate within a small area. This showed that Brad at least couldn’t hold the camera steady. (No one else can either). From experiments like this, we can quantify the extent of these involuntary hand motions and derive the relationship between focal length and shutter speed. John Causland was intrigued by this, and thought that this might be modified into a “point and shoot camera” for astrophotography. In most cases professional photographers use tripods to hold cameras steady. Brad did not discuss astrophotography, but mounting the camera to a telescope or on a tripod is essential for most astrophotography since normally the shutter speed will be longer than the maximum for a hand-held shot. Brad discussed a few other topics including automatic focusing, digital cameras and the properties of light. James Woodward (Lampist, The Lighthouse Consultant, LLC) gave a set of talks on lighthouses. Mr. Woodward starting with campfires lit on a beach; prehistoric people used the campfires to find their way home. Mr. Woodward described such fires as the first lighthouses. He described a number of improvements, including the Fresnel lens. The Fresnel lens was developed in the early 1800’s and allows most of the light from a burning lamp or electric bulb to be sent in a horizontal beam (not as focused as a laser, but focused enough to produce a bright point of light visible a few miles from shore). A Fresnel lens is a complicated assembly with many pieces of glass mounted on a frame. The materials used to mount the glass break down in UV light and were a maintenance headache. They are not great at forming an image, but are a relatively inexpensive way to make a large lens. He also discussed more recent innovations. The beam from modern lighthouses (from 1800’s onward) rotate. As the speed of ships increased, it became necessary to increase the rotation speed. Before the invention of the ball bearing, this was difficult to accomplish. The idea of floating the Fresnel lens and bulb on a pool of mercury was developed. This worked well, however there were a couple problems. The fact that mercury was toxic has been known for a long time, and it certainly was known at the time, but mercury’s use was not well regulated until more recent times. Some workers and other people near the mercury pool occasionally got sick. Secondly, mercury vapor interacts chemically with other metals, including steel, resulting in corrosion. Over time, this caused significant problems in some cases. Many old mercury lighthouses have been converted to use a system using ball bearings to rotate the lamp. This removes mercury and the problems associated with mercury. After World War II, it became possible to manufacture Fresenel lens with a single piece of plastic. This reduced both production and maintenance costs. Charlie Nielsen (above) shows a plastic Fresnel lens. Owen Gingerich (Professor Emeritus of Astronomy and History of Science, Harvard) gave a presentation entitled “Four Myths of the Copernican Revolution.” As you might guess from the title, Dr. Gingerich presented four myths and explained why they are not true (to prepare this article, I borrowed some of Dick Sider’s notes). 1) Pre-Copernican models used epicycles. There were so many epicycles, that the system collapsed because it was too complicated. Copernicus solved this problem. Not true. Pre-copernican models used only one epicycle per planet (and one for the sun and one for the moon). It was slightly inaccurate, but that didn’t seem to bother anyone until the time of Tycho Brahe. And no one thought it was too complicated. The Copernican system also had epicycles, again one per planet. So it didn’t solve the problem of epicycles. 2) Copernicus’ system greatly improved the accuracy of predicting the positions of the planets. Not true. Since Copernicus assumed that the orbits were circular, his system had roughly the same accuracy as previous systems. 3) Tycho Brahe had daily records of the position of Mars. Kepler used those records to deduce that the orbit of Mars was an ellipse. It’s an oversimplification to say Tycho was only interested in collecting data and Kepler was only interested in theory. Tycho had a number of ideas, and to test these ideas he collected position measurements of Mars, but not daily; rather he collected this data primarily along key sections of the orbit. Tycho’s data on Mars and other objects was much more accurate than anything previously collected. Because of this increased accuracy, the errors caused by using circular orbits could no longer be ignored. Tycho wanted to solve this problem himself, but after some delay he finally gave his Mars data to Kepler. Kepler’s task would have been easier with daily observations, but he was able to use the data he had to deduce that the orbit of Mars was an ellipse. 4) Galileo’s observations proved that the earth and the other planets orbited the sun. Not true. Galileo showed that there were four moons orbiting Jupiter, but none of his observations proved anything one way or the other for the question: do the planets orbit the sun? Such a proof would wait for the work of Newton. I’ve presented only a very brief outline of what was discussed during these lectures, if you want more details go to http://www.lsa.umich.edu/physics/events/saturdaymorningphysics/pastevents There will be another set of talks starting in February. Most of the talks are on astrophysics or cosmology. The schedule can be found at http://www.lsa.umich.edu/physics/events/saturdaymorningphysics The photos on this page were taken by John Causland and Mike Radwick.
<urn:uuid:232c8db2-9ca7-470c-8495-45c5c62b5dd8>
CC-MAIN-2023-40
https://websites.umich.edu/~lowbrows/reflections/2008/dsnyder.23.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.965217
1,472
3.015625
3
Please note: This page has been archived and its content may no longer be up-to-date. This version of the page will remain live for reference purposes as we work to update the content across our website. What do we want to achieve? 100-YEAR VISION "Sea turtles flourish in the marine environment, providing multiple benefits to coastal communities throughout Latin America and the Caribbean." 25-YEAR GOAL "The recovery of key populations of sea turtles in the Eastern Pacific and Western Atlantic oceans." 3 TO 15-YEAR GENERAL OBJECTIVE "The significant reduction of threats to selected populations of sea turtles from the loss and degradation of their critical habitats, to unsustainable use and incidental capture in fisheries." 10-YEAR SPECIFIC OBJECTIVES: Save the critically endangered Pacific leatherbacks (Dermochelys coriacea) from extinction Ensure the recovery of Western Atlantic leatherbacks (Dermochelys coriacea) To maintain Caribbean hawksbill (Eretmochelys imbricata) genetic diversity and secure their recovery Ensure the recovery of the Eastern Pacific green turtle(Ch. mydas agassizi) Promote non-extractive uses of sea turtles that improve life quality of coastal communities Ensure that extractive uses are sustainable and allow the recovery of the species The needs of human as well as wildlife are taken into account. The slogan for curbing over-exploitation is "Turtles are worth more alive than dead". Conservation activities are based on scientific knowledge. Objectives are achieved through teamwork with partners and specialists. Case studies feed-back as conservation models into future actions with lessons learned. Horizontal transfer of best practices is stimulated by promoting encounters among peers. Alliances and coordination with stakeholders are a requirement for undertaking the challenge of conservation. We intervene at various levels, supporting local, national and international initiatives, from a regional perspective. The plan responds with dynamism and flexibility to emerging threats and opportunities. The plan's activities are evaluated using indicators of success, achievement and performance.
<urn:uuid:6db0c66c-26ca-4694-9b29-5e8dfdda8795>
CC-MAIN-2023-40
https://wwf.panda.org/discover/our_focus/wildlife_practice/profiles/fish_marine/marine_turtles/lac_marine_turtle_programme/strategy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.892131
501
2.765625
3
What percentage of cancer is caused by obesity? Key findings regarding cancer types associated with overweight and obesity: 55 percent of all cancers diagnosed in women and 24 percent of those diagnosed in men are associated with overweight and obesity. What percentage of the UK is obese 2021? 28% of adults in England are obese and a further 36% are overweight. What percentage of the UK is obese 2020? The report, Statistics on Obesity, Physical Activity and Diet, England (2020), also found the majority of adults were overweight or obese. This figure stood at 67% for men and 60% for women – while 20% of Year 6 children were classed as obese. Which cancers are mainly caused by obesity? - Breast and bowel (two of the most common cancer types) - Pancreatic, oesophageal and gallbladder (three of the hardest to treat cancers) - Womb and ovarian. - Kidney, liver and upper stomach. - Myeloma (a type of blood cancer) - Meningioma (a type of brain tumour)
<urn:uuid:a8dc0a6b-db60-4e5c-bbe8-f61704ca6b30>
CC-MAIN-2023-40
https://www.bristolcancerhelp.org/what-percentage-of-cancer-is-caused-by-obesity/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.958634
228
2.75
3
Heart Murmur in Children What is a heart murmur? The heart is a muscular organ with four chambers. It pumps blood out to the lungs to pick up oxygen, and out through the body to deliver oxygen. Four valves control the flow of blood through the chambers of the heart and out of the heart. The heartbeat sounds are the sounds of the valves closing. A heart murmur is an extra sound heard when a doctor listens with a stethoscope. This extra sound is created by turbulent blood flow. A heart murmur in children caused by turbulent blood flow can be either normal or abnormal: - In normal heart murmurs, the flow can be heard pumping through the heart normally. This normal blood flow is called an innocent, or normal, murmur. More than 66 percent of all children, and approximately 75 percent of all newborns, have normal heart murmurs. - Abnormal blood flow suggests a structural heart problem or defect, which requires further evaluation. Normal heart murmurs are usually louder when the child has a cold or fever, and typically disappear by adolescence (though not always). However, normal heart murmurs are still associated with a structurally normal heart; they do not cause any exercise restrictions or precautions, do not require antibiotics before a dental-cleaning, and do not require further cardiology evaluation. Testing and diagnosis of heart murmur in children Doctors can evaluate many characteristics of the murmur to determine if it is normal or abnormal, including: - If it is loud or soft - If it is high- or low-pitched - Where on the chest or back it can be heard - If there are differences in the sound based on your child's position - When the murmur occurs relative to the first and second heart sounds If your child's primary doctor thinks that the murmur is normal or innocent, he or she will note the murmur on the patient chart and listen again at later checkups for changes. If you switch doctors, make sure to tell the new doctor about the innocent murmur. If your child's doctor feels comfortable that the murmur is normal, there is no need for further cardiology evaluation. Sometimes the doctor will be concerned that the murmur is not normal. In these cases, you may be referred to a pediatric cardiologist, a doctor who specializes in heart problems in children. It is very important to see the pediatric cardiologist if your child's doctor tells you to do so. A pediatric cardiologist will perform a full evaluation of your child's health, including getting a history and performing an examination, as well as possibly ordering heart tests such as: - Electrocardiogram: a record of the electrical activity of the heart - Echocardiogram (also called "echo" or cardiac ultrasound): sound waves create an image of the heart - A chest X-ray Not all tests will need to be performed, as pediatric cardiologists are specially trained to tell whether these murmurs are normal or abnormal. Based on your child’s evaluation, doctors will come up with a plan for treating your child. Sometimes, abnormal murmurs don't show up right away, and develop later. Also, there are some heart abnormalities that don't even have murmurs. See our list of symptoms that might indicate a heart problem. If your child has any of them, make sure to tell your primary care doctor.
<urn:uuid:c63f6d2d-d12a-4f6e-88e5-01e794cbc198>
CC-MAIN-2023-40
https://www.chop.edu/conditions-diseases/heart-murmur
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.912431
701
3.859375
4
Types of Asian Flowers North American gardeners have plant explorers and Asian soil to thank for many flowering favorites. Native Asian flowers have made their way here, often via Europe, since the United States' earliest days. From rugosa roses (Rosa rugosa), hardy in U.S. Department of Agriculture plant hardiness zones 7 through 9, to florists' hydrangeas (Hydrangea macrophylla), hardy in USDA zones 6 through 9, many now-familiar flowers favored by American gardeners have Asian roots. Asian Annuals, Bulbs and Orchids China aster's (Callistephus chinensis) common and scientific names give away its origin. This cheery annual and its daisylike cultivars keep sunny summer gardens full of color. Wishbone flower (Torenia fournieri), an Asian annual, fills shady places with violet blooms all season. A stalwart of indoor forcing and spring gardens, grape hyacinth (Muscari latifolium) hails from southern and western Asia. With its dependable, grapelike, blue blossoms, the bulb is hardy in USDA zone 3 through 8. Giant ornamental onion (Allium giganteum) once called Central Asia home. The hardy bulb brings softball-size flowers on 4-foot scapes to USDA zone 5 through 8. Beloved moth orchids (Phalaenopsis spp.), hardy in USDA zones 10 through 12, made their way throughout the world, courtesy of Southeast Asia. - North American gardeners have plant explorers and Asian soil to thank for many flowering favorites. - From rugosa roses (Rosa rugosa), hardy in U.S. Department of Agriculture plant hardiness zones 7 through 9, to florists' hydrangeas (Hydrangea macrophylla), hardy in USDA zones 6 through 9, many now-familiar flowers favored by American gardeners have Asian roots. Perennials With Asian Origins A nod to Asian flowers is incomplete without sacred lotus (Nelumbo nucifera), hardy in USDA zones 4 through 10. Native from Japan to Iran, the aquatic perennial holds an honored spot in Asian religions and culture. The herbaceous garden peony (Paeonia lactiflora) has been grown for more than two millennia. Known as the "Queen of Flowers" in its native China, its fragrance fills spring gardens in USDA zones 3 through 8. The Japanese toad lily (Tricyrtis hirta), hardy in USDA zones 4 through 8, adds late-summer magic on 3-foot arching stems with speckled, lilylike blooms. Common bleeding heart (Lamprocapnos spectabilis), hardy in USDA zones 3 through 9, first bore its weeping, heart-shaped blossoms from Siberia to Korea. Shrub-Borne Asian Flowers Known as China's "King of Flowers" and cultivated for 1,500 documented years, the tree peony (Peonia suffruticosa) brings its spectacular 8-inch flowers to USDA zones 4 through 8. Fortune's rhododendron (Rhododendron fortunei) is the Asian native behind the beautiful flowers on many modern rhododendron cultivars. The first Chinese rhododendron introduced to Europe, it bears large, 4-inch flowers in trusses of up to 12 pale-pink blooms in USDA zones 5 through 8. The treasured camellia (Camellia japonica), as its name suggests, is native to China, Korea and Japan. Hardy in USDA zones 7 through 9, its midwinter Asian flowers delight. Gardenia (Gardenia jasminoides), hardy in USDA zones 8 through 11, treats North American gardens to flowers native to Chinese and Japanese shores. - A nod to Asian flowers is incomplete without sacred lotus (Nelumbo nucifera), hardy in USDA zones 4 through 10. - The Japanese toad lily (Tricyrtis hirta), hardy in USDA zones 4 through 8, adds late-summer magic on 3-foot arching stems with speckled, lilylike blooms. Flowering Tree Blossoms China's national flower is borne on the branches of Chinese plum (Prunus mume), also known as Japanese apricot. Hardy in USDA zones 6 through 9, the tree bears pink, five-petaled plum blossoms said to represent five blessings. Yoshino cherry (Prunus x yedoensis), is a Japanese native hardy in USDA zones 5 through 8. Cherished for branches of white cherry blossoms tinged in pink, this Asian tree provides the backbone for the annual cherry blossom display in Washington, D.C. -- a gift from their native land. Magnolia lovers have Japan to thank for the beautiful flowers of star magnolia (Magnolia stellata), hardy in USDA zones 4 through 8. The flowering stems of all three trees figure prominently in Asian art. Jolene Hansen is a lifelong gardening enthusiast and former horticulture professional. She is passionate about reshaping the way people experience gardens and gardening. Hansen's work appears regularly in consumer and trade publications, as well as numerous internet gardening and lifestyle channels.
<urn:uuid:677db902-e2f6-4809-a3ec-c16908fd1818>
CC-MAIN-2023-40
https://www.gardenguides.com/12199480-types-of-asian-flowers.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.885276
1,117
3.078125
3
Biography of Evelyn Pierrepont, 1st Duke of Kingston-upon-Hull (c.1665-1726) - Robert Pierrepont, 1st Earl of Kingston-upon-Hull (1584-1643) - Henry Pierrepont, 2nd Earl of Kingston-upon-Hull and Marquess of Dorchester (1607-1680) - Robert Pierrepont, 3rd Earl of Kingston-upon-Hull (c.1660-1682) - William Pierrepont, 4th Earl of Kingston-upon-Hull (c.1662-1690) - Evelyn Pierrepont, 1st Duke of Kingston-upon-Hull (c.1665-1726) - William Pierrepont, Earl of Kingston-upon-Hull (1692-1713) - Evelyn Pierrepont, 2nd Duke of Kingston-upon-Hull (1711-1773) - Charles (Medows) Pierrepont, 1st Earl Manvers (1737-1816) - Charles Herbert Pierrepont, 2nd Earl Manvers (1778-1860) - Sydney William Herbert Pierrepont, 3rd Earl Manvers (1825-1900) - Charles William Sydney Pierrepont, 4th Earl Manvers (1854-1926) - Evelyn Robert Pierrepont, 5th Earl Manvers (1888-1940) - Gervas Evelyn Pierrepont, 6th Earl Manvers (1881-1955) Evelyn was the third son of Robert Pierrepont of Thoresby, Nottinghamshire, and his wife Elizabeth Evelyn. He was born at West Dean, Wiltshire (an estate brought to the Pierrepont family by the marriage of Robert Pierrepont with Elizabeth Evelyn), was educated at Winchester School, and entered Christ's College, Cambridge, in 1683. He served as M.P. for East Retford from 1689-90, until he succeeded his brother as 5th Earl of Kingston-upon-Hull. In the first decade of the eighteenth century he was known as a sociable and popular man, and a member of the Kit-Kat Club. He was Commissioner for the Union with Scotland in 1706, and in the same year was created Marquess of Dorchester. Among the local offices which he held were those of Custos Rotulorum of Nottinghamshire, c.1696-c.1701, and of Wiltshire, 1706-12 and 1714-26, Deputy Lieutenant of Wiltshire c.1701-14, and Lord Lieutenant 1714-26, Recorder of Nottingham 1707-26, and Chief Justice in Eyre North of the Trent, 1714-16. He was made a Privy Councillor in 1708. In August 1715, he was created Duke of Kingston-upon-Hull. His loyal support of the Whig government ensured more appointments after receiving the dukedom. He was Lord Privy Seal from 1716 to 1718 and again from 1720 to 1726. In between, he acted as Lord President of the Council. The Duke became a Knight of the Garter in 1719, and acted as Lord Justice (Regent) during the King's absence. He died at Holme Pierrepont in March 1725/6. A portrait of the Duke, by G. Kneller, 1709, is available on the website of the National Portrait Gallery. He married 1stly, in 1687, Mary, daughter of William Feilding, 3rd Earl of Denbigh, in 1687 (d 1697), and had: - William (1692-1713), styled Viscount Newark until 1706, and Earl of Kingston 1706-1713 - Mary (1689-1762), m Edward Wortley Montagu in 1712 [n.b. Ne 4 1/24, Photograph [black and white] of a painting of Lady Mary Wortley Montagu by Jonathan Richardson; 1867] - Evelyn (1691-1727), m John Leveson-Gower, 1st Earl Gower - Frances (d 1761) m John Erskine, Earl of Mar, later Jacobite 1st Duke of Mar He married 2ndly, in 1714, Isabella, daughter of the 1st Earl of Portland (d 1728), and had: - Caroline (1716-1753), m Thomas Brand - Anne (c.1719-1739) - Title deeds and estate papers relating to the Duke's ownership of his estates are held at The British Library (Egerton Charters 2301-8836; Egerton MSS 3516-3660) - Appraisements of the property of the late Duke of Kingston, 1726, are part of the Manvers Collection held in Manuscripts and Special Collections at the University of Nottingham (Ma 4882-3) - G. F. R. Barker, rev. M. E. Clayton, ‘Pierrepont, Evelyn, first duke of Kingston upon Hull (bap. 1667, d. 1726)’, Oxford Dictionary of National Biography, Oxford University Press, 2004; online edn, Oct 2005 [available online to subscribers, http://www.oxforddnb.com/view/article/22227] - Ferris, J. P., ‘Pierrepont, Evelyn’, in Basil Duke Henning (ed), History of Parliament: The House of Commons, 1660–90 (London : Published for the History of Parliament Trust by Secker & Warburg, 1983)
<urn:uuid:9b142356-e6a1-4055-9632-2b4b18c10f6e>
CC-MAIN-2023-40
https://www.nottingham.ac.uk/manuscriptsandspecialcollections/collectionsindepth/family/manvers/biographies/biographyofevelynpierrepont,1stdukeofkingston-upon-hull(c1665-1726).aspx
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00740.warc.gz
en
0.923968
1,233
2.609375
3